Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-1329 |
N/A
|
Buffer overflow in SysVInit in Red Hat Linux 5.1 … |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:02.759Z |
| CVE-1999-1330 |
N/A
|
The snprintf function in the db library 1.85.4 ig… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:02.989Z |
| CVE-1999-1331 |
N/A
|
netcfg 2.16-1 in Red Hat Linux 4.2 allows the Eth… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:02.977Z |
| CVE-1999-1332 |
N/A
|
gzexe in the gzip package on Red Hat Linux 5.0 an… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:02.927Z |
| CVE-1999-1333 |
N/A
|
automatic download option in ncftp 2.4.2 FTP clie… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:02.854Z |
| CVE-1999-1335 |
N/A
|
snmpd server in cmu-snmp SNMP package before 3.3-… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:02.973Z |
| CVE-1999-1336 |
N/A
|
3Com HiPer Access Router Card (HiperARC) 4.0 thro… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:02.992Z |
| CVE-1999-1339 |
N/A
|
Vulnerability when Network Address Translation (N… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:03.233Z |
| CVE-1999-1341 |
N/A
|
Linux kernel before 2.3.18 or 2.2.13pre15, with S… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:02.861Z |
| CVE-1999-1351 |
N/A
|
Directory traversal vulnerability in KVIrc IRC cl… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:02.977Z |
| CVE-1999-1356 |
N/A
|
Compaq Integration Maintenance Utility as used in… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:03.248Z |
| CVE-1999-1358 |
N/A
|
When an administrator in Windows NT or Windows 20… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:02.951Z |
| CVE-1999-1359 |
N/A
|
When the Ntconfig.pol file is used on a server wh… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:03.177Z |
| CVE-1999-1360 |
N/A
|
Windows NT 4.0 allows local users to cause a deni… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:03.175Z |
| CVE-1999-1363 |
N/A
|
Windows NT 3.51 and 4.0 allow local users to caus… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:02.923Z |
| CVE-1999-1379 |
N/A
|
DNS allows remote attackers to use DNS name serve… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:02.922Z |
| CVE-1999-1380 |
N/A
|
Symantec Norton Utilities 2.0 for Windows 95 mark… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:02.953Z |
| CVE-1999-1382 |
N/A
|
NetWare NFS mode 1 and 2 implements the "Read Onl… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:03.221Z |
| CVE-1999-1384 |
N/A
|
Indigo Magic System Tour in the SGI system tour p… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:03.217Z |
| CVE-1999-1385 |
N/A
|
Buffer overflow in ppp program in FreeBSD 2.1 and… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:03.176Z |
| CVE-1999-1386 |
N/A
|
Perl 5.004_04 and earlier follows symbolic links … |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:02.970Z |
| CVE-1999-1402 |
N/A
|
The access permissions for a UNIX domain socket a… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:03.245Z |
| CVE-1999-1407 |
N/A
|
ifdhcpc-done script for configuring DHCP on Red H… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:03.141Z |
| CVE-1999-1409 |
N/A
|
The at program in IRIX 6.2 and NetBSD 1.3.2 and e… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:03.280Z |
| CVE-1999-1411 |
N/A
|
The installation of the fsp package 2.71-10 in De… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:03.283Z |
| CVE-1999-1414 |
N/A
|
IBM Netfinity Remote Control allows local users t… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:03.225Z |
| CVE-1999-1419 |
N/A
|
Buffer overflow in nss_nisplus.so.1 library in NI… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:03.239Z |
| CVE-1999-1423 |
N/A
|
ping in Solaris 2.3 through 2.6 allows local user… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:03.246Z |
| CVE-1999-1432 |
N/A
|
Power management (Powermanagement) on Solaris 2.4… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:03.292Z |
| CVE-1999-1433 |
N/A
|
HP JetAdmin D.01.09 on Solaris allows local users… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:11:03.366Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2001-1266 |
N/A
|
Directory traversal vulnerability in Doug Neal's … |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T04:51:07.848Z |
| CVE-2001-1075 |
N/A
|
poprelayd script before 2.0 in Cobalt RaQ3 server… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:44:08.000Z |
| CVE-2001-1086 |
N/A
|
XDM in XFree86 3.3 and 3.3.3 generates easily gue… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:07.287Z |
| CVE-2001-1243 |
N/A
|
Scripting.FileSystemObject in asp.dll for Microso… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T04:51:07.116Z |
| CVE-2001-1076 |
N/A
|
Buffer overflow in whodo in Solaris SunOS 5.5.1 t… |
n/a |
n/a |
2002-02-02T05:00:00 | 2024-08-08T04:44:07.909Z |
| CVE-2001-1085 |
N/A
|
Lmail 2.7 and earlier allows local users to overw… |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T04:44:07.138Z |
| CVE-2001-1087 |
N/A
|
The default configuration of the config.http.tunn… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:07.303Z |
| CVE-2001-1408 |
N/A
|
Directory traversal vulnerability in readmsg.php … |
n/a |
n/a |
2002-08-31T04:00:00 | 2024-08-08T04:51:08.353Z |
| CVE-2001-1045 |
N/A
|
Directory traversal vulnerability in basilix.php3… |
n/a |
n/a |
2002-02-02T05:00:00 | 2024-08-08T04:44:06.982Z |
| CVE-2001-1081 |
N/A
|
Format string vulnerabilities in Livingston/Lucen… |
n/a |
n/a |
2004-09-01T04:00:00 | 2024-08-08T04:44:07.848Z |
| CVE-2001-1244 |
N/A
|
Multiple TCP implementations could allow remote a… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T04:51:07.750Z |
| CVE-2001-1026 |
N/A
|
Trend Micro InterScan AppletTrap 2.0 does not pro… |
n/a |
n/a |
2002-02-02T05:00:00 | 2024-08-08T04:44:06.556Z |
| CVE-2001-1158 |
N/A
|
Check Point VPN-1/FireWall-1 4.1 base.def contain… |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T04:44:07.936Z |
| CVE-2001-1245 |
N/A
|
Opera 5.0 for Linux does not properly handle malf… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T04:51:08.171Z |
| CVE-2001-1141 |
N/A
|
The Pseudo-Random Number Generator (PRNG) in SSLe… |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T04:44:07.880Z |
| CVE-2001-1180 |
N/A
|
FreeBSD 4.3 does not properly clear shared signal… |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T04:44:08.352Z |
| CVE-2001-1322 |
N/A
|
xinetd 2.1.8 and earlier runs with a default umas… |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T04:51:07.600Z |
| CVE-2001-1038 |
N/A
|
Cisco SN 5420 Storage Router 1.1(3) and earlier a… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:44:06.655Z |
| CVE-2001-1120 |
N/A
|
Vulnerabilities in ColdFusion 2.0 through 4.5.1 S… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:07.482Z |
| CVE-2001-1143 |
N/A
|
IBM DB2 7.0 allows a remote attacker to cause a d… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:07.867Z |
| CVE-2001-1144 |
N/A
|
Directory traversal vulnerability in McAfee ASaP … |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T04:44:07.859Z |
| CVE-2001-1146 |
N/A
|
AllCommerce with debugging enabled in EnGarde Sec… |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T04:44:07.882Z |
| CVE-2001-1178 |
N/A
|
Buffer overflow in xman allows local users to gai… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:08.284Z |
| CVE-2001-1240 |
N/A
|
The default configuration of sudo in Engarde Secu… |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T04:51:08.454Z |
| CVE-2001-1427 |
N/A
|
Unknown vulnerability in ColdFusion Server 2.0 th… |
n/a |
n/a |
2005-03-22T05:00:00 | 2024-08-08T04:58:09.619Z |
| CVE-2001-1142 |
N/A
|
ArGoSoft FTP Server 1.2.2.2 uses weak encryption … |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:07.866Z |
| CVE-2001-1176 |
N/A
|
Format string vulnerability in Check Point VPN-1/… |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T04:44:08.303Z |
| CVE-2001-1183 |
N/A
|
PPTP implementation in Cisco IOS 12.1 and 12.2 al… |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T04:44:08.238Z |
| CVE-2001-1267 |
N/A
|
Directory traversal vulnerability in GNU tar 1.13… |
n/a |
n/a |
2004-09-01T04:00:00 | 2024-08-08T04:51:08.182Z |
| CVE-2001-1268 |
N/A
|
Directory traversal vulnerability in Info-ZIP UnZ… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T04:51:07.679Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-hrcp-8f3q-4w2c |
5.4 (3.1)
|
XStream is vulnerable to an Arbitrary Code Execution attack | 2021-03-22T23:29:37Z | 2022-02-08T21:32:01Z |
| ghsa-4jhw-2p6j-5wmp |
6.1 (3.1)
|
Open Redirection in Login Handling | 2021-03-23T01:53:35Z | 2021-03-29T18:07:53Z |
| ghsa-qx3w-4864-94ch |
5.9 (3.1)
|
Cleartext storage of session identifier | 2021-03-23T01:53:42Z | 2021-03-29T17:59:09Z |
| ghsa-fjh3-g8gq-9q92 |
5.4 (3.1)
|
Cross-Site Scripting in Content Preview | 2021-03-23T01:53:47Z | 2024-02-02T16:44:46Z |
| ghsa-2r6j-862c-m2v2 |
8.6 (3.1)
|
Unrestricted File Upload in Form Framework | 2021-03-23T01:53:52Z | 2021-03-29T18:01:54Z |
| ghsa-3vg7-jw9m-pc3f |
8.3 (3.1)
|
Broken Access Control in Form Framework | 2021-03-23T01:53:57Z | 2021-03-29T18:01:00Z |
| ghsa-x79j-wgqv-g8h2 |
5.4 (3.1)
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in typo3/cms-form | 2021-03-23T01:54:06Z | 2021-03-29T18:02:42Z |
| ghsa-4p9g-qgx9-397p |
5.9 (3.1)
|
Denial of Service in Page Error Handling | 2021-03-23T01:54:09Z | 2024-02-07T18:50:34Z |
| ghsa-x7hc-x7fm-f7qh |
5.4 (3.1)
|
Cross-Site Scripting in Content Preview (CType menu) | 2021-03-23T01:54:17Z | 2024-02-02T16:44:14Z |
| ghsa-gfp2-w5jm-955q |
6.4 (3.1)
7.4 (4.0)
|
OMERO.web exposes some unnecessary session information in the page | 2021-03-23T15:26:34Z | 2024-10-07T21:25:28Z |
| ghsa-g4rf-pc26-6hmr |
4.8 (3.1)
5.9 (4.0)
|
OMERO webclient does not validate URL redirects on login or switching group. | 2021-03-23T15:26:49Z | 2024-10-08T12:43:19Z |
| ghsa-v662-xpcc-9xf6 |
|
It's possible to execute anything with the rights of the author of a macro which uses the {{wikimac… | 2021-03-23T22:47:26Z | 2021-03-23T22:24:20Z |
| ghsa-79rg-7mv3-jrr5 |
7.7 (3.1)
|
Rating Script Service expose XWiki to SQL injection | 2021-03-23T22:48:01Z | 2021-03-23T22:34:44Z |
| ghsa-xgpf-p52j-pf7m |
|
XSS in CreateQueuedJobTask | 2021-03-24T17:42:02Z | 2021-03-24T17:41:15Z |
| ghsa-vgwr-773q-7j3c |
|
Path Traversal within joomla/archive zip class | 2021-03-24T17:58:13Z | 2021-03-24T17:57:48Z |
| ghsa-537h-rv9q-vvph |
7.5 (3.1)
|
Python-RSA decryption of ciphertext leads to DoS | 2021-03-24T18:24:39Z | 2024-10-21T21:54:27Z |
| ghsa-5mg8-w23w-74h3 |
3.3 (3.1)
|
Information Disclosure in Guava | 2021-03-25T17:04:19Z | 2023-08-18T15:56:36Z |
| ghsa-8mrf-64fw-2x75 |
9.8 (3.1)
|
Command injection in fs-path | 2021-03-25T21:06:41Z | 2021-03-25T21:05:18Z |
| ghsa-8q59-q68h-6hv4 |
9.8 (3.1)
9.3 (4.0)
|
Improper Input Validation in PyYAML | 2021-03-25T21:26:26Z | 2024-10-25T21:31:44Z |
| ghsa-2h3h-vw8r-82rp |
5.1 (3.1)
|
Weak JSON Web Token in yapi-vendor | 2021-03-26T16:49:26Z | 2021-07-22T15:58:18Z |
| ghsa-246w-56m2-5899 |
6.9 (3.1)
5.1 (4.0)
|
Cross-site scripting (XSS) vulnerability in the password reset endpoint | 2021-03-26T19:52:54Z | 2024-09-30T20:30:17Z |
| ghsa-c5f8-35qr-q4fm |
6.1 (3.1)
4.9 (4.0)
|
HTML injection in email and account expiry notifications | 2021-03-26T19:53:04Z | 2024-09-30T20:35:33Z |
| ghsa-c4w7-xm78-47vh |
7.3 (3.1)
|
Prototype Pollution in y18n | 2021-03-29T16:05:12Z | 2023-09-07T20:22:08Z |
| ghsa-p6p8-q4pj-f74m |
5.9 (3.1)
|
Improper Certificate Validation in twitter-stream | 2021-03-29T16:28:42Z | 2021-03-19T19:21:49Z |
| ghsa-52p9-v744-mwjj |
9.8 (3.1)
|
Remote code execution in Kramdown | 2021-03-29T16:30:34Z | 2021-03-31T20:25:55Z |
| ghsa-mpvw-25mg-59vx |
6.5 (3.1)
7.1 (4.0)
|
Server-side Request Forgery (SSRF) via img tags in reportlab | 2021-03-29T16:32:27Z | 2024-10-26T18:34:55Z |
| ghsa-pq64-v7f5-gqh8 |
7.5 (3.1)
8.7 (4.0)
|
Pygments vulnerable to Regular Expression Denial of Service (ReDoS) | 2021-03-29T16:33:03Z | 2024-10-14T16:10:54Z |
| ghsa-57h3-9rgr-c24m |
9.8 (3.1)
9.3 (4.0)
|
Out of bounds write in Pillow | 2021-03-29T16:35:16Z | 2024-10-08T13:11:32Z |
| ghsa-p43w-g3c5-g5mq |
7.5 (3.1)
8.7 (4.0)
|
Out of bounds read in Pillow | 2021-03-29T16:35:27Z | 2024-10-09T20:12:53Z |
| ghsa-8xjq-8fcg-g5hw |
7.5 (3.1)
8.7 (4.0)
|
Out-of-bounds Write in Pillow | 2021-03-29T16:35:36Z | 2024-10-08T13:11:57Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-6290 | Malicious code in stamjs (npm) | 2022-06-20T20:20:24Z | 2022-06-20T20:20:25Z |
| mal-2022-2989 | Malicious code in fe-datalayer (npm) | 2022-06-20T20:20:25Z | 2022-06-20T20:20:26Z |
| mal-2022-3541 | Malicious code in h1test (npm) | 2022-06-20T20:20:25Z | 2022-06-20T20:20:26Z |
| mal-2022-4252 | Malicious code in lamalama (npm) | 2022-06-20T20:20:25Z | 2022-06-20T20:20:25Z |
| mal-2022-4253 | Malicious code in lamalamalama (npm) | 2022-06-20T20:20:25Z | 2022-06-20T20:20:25Z |
| mal-2022-4254 | Malicious code in lamalo (npm) | 2022-06-20T20:20:25Z | 2022-06-20T20:20:26Z |
| mal-2022-2797 | Malicious code in eslint-config-hfd (npm) | 2022-06-20T20:20:26Z | 2022-06-20T20:20:27Z |
| mal-2022-2981 | Malicious code in fc-datalayer (npm) | 2022-06-20T20:20:26Z | 2022-06-20T20:20:26Z |
| mal-2022-6283 | Malicious code in ssnap-web (npm) | 2022-06-20T20:20:26Z | 2022-06-20T20:20:27Z |
| mal-2022-830 | Malicious code in acswidget-waterfall (npm) | 2022-06-20T20:20:26Z | 2022-06-20T20:20:27Z |
| mal-2022-3720 | Malicious code in huddles (npm) | 2022-06-20T20:20:27Z | 2022-06-20T20:20:28Z |
| mal-2022-3721 | Malicious code in huddles-ui-templates (npm) | 2022-06-20T20:20:27Z | 2022-06-20T20:20:27Z |
| mal-2022-6586 | Malicious code in titanite-javascript (npm) | 2022-06-20T20:20:27Z | 2022-06-20T20:20:27Z |
| mal-2022-2052 | Malicious code in com.unity.2d.sprite (npm) | 2022-06-20T20:20:28Z | 2022-06-20T20:20:28Z |
| mal-2022-2057 | Malicious code in com.unity.collab-proxy (npm) | 2022-06-20T20:20:28Z | 2022-06-20T20:20:29Z |
| mal-2022-2063 | Malicious code in com.unity.ide.rider (npm) | 2022-06-20T20:20:28Z | 2022-06-20T20:20:29Z |
| mal-2022-2065 | Malicious code in com.unity.ide.vscode (npm) | 2022-06-20T20:20:28Z | 2022-06-20T20:20:29Z |
| mal-2022-874 | Malicious code in adt-utils (npm) | 2022-06-20T20:20:28Z | 2022-06-20T20:20:28Z |
| mal-2022-2067 | Malicious code in com.unity.modules.ai (npm) | 2022-06-20T20:20:29Z | 2022-06-20T20:20:29Z |
| mal-2022-2068 | Malicious code in com.unity.modules.androidjni (npm) | 2022-06-20T20:20:29Z | 2022-06-20T20:20:30Z |
| mal-2022-2069 | Malicious code in com.unity.modules.animation (npm) | 2022-06-20T20:20:29Z | 2022-06-20T20:20:30Z |
| mal-2022-2098 | Malicious code in com.unity.package-manager-ui (npm) | 2022-06-20T20:20:29Z | 2022-06-20T20:20:29Z |
| mal-2022-2070 | Malicious code in com.unity.modules.assetbundle (npm) | 2022-06-20T20:20:30Z | 2022-06-20T20:20:30Z |
| mal-2022-2071 | Malicious code in com.unity.modules.audio (npm) | 2022-06-20T20:20:30Z | 2022-06-20T20:20:30Z |
| mal-2022-2072 | Malicious code in com.unity.modules.cloth (npm) | 2022-06-20T20:20:30Z | 2022-06-20T20:20:31Z |
| mal-2022-2073 | Malicious code in com.unity.modules.director (npm) | 2022-06-20T20:20:30Z | 2022-06-20T20:20:31Z |
| mal-2022-2074 | Malicious code in com.unity.modules.imageconversion (npm) | 2022-06-20T20:20:31Z | 2022-06-20T20:20:31Z |
| mal-2022-2075 | Malicious code in com.unity.modules.particlesystem (npm) | 2022-06-20T20:20:31Z | 2022-06-20T20:20:31Z |
| mal-2022-2076 | Malicious code in com.unity.modules.physics (npm) | 2022-06-20T20:20:31Z | 2022-06-20T20:20:32Z |
| mal-2022-2078 | Malicious code in com.unity.modules.screencapture (npm) | 2022-06-20T20:20:31Z | 2022-06-20T20:20:32Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-1558 | tribe29 checkmk: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-06-25T22:00:00.000+00:00 | 2023-06-25T22:00:00.000+00:00 |
| wid-sec-w-2023-1559 | Mattermost Mobile Apps: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-06-25T22:00:00.000+00:00 | 2023-06-25T22:00:00.000+00:00 |
| wid-sec-w-2023-1560 | Atlassian Confluence: Schwachstelle ermöglicht Denial of Service | 2023-06-25T22:00:00.000+00:00 | 2023-06-25T22:00:00.000+00:00 |
| wid-sec-w-2023-1561 | Python: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-06-25T22:00:00.000+00:00 | 2024-05-20T22:00:00.000+00:00 |
| wid-sec-w-2023-1564 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-06-25T22:00:00.000+00:00 | 2023-10-24T22:00:00.000+00:00 |
| wid-sec-w-2023-1565 | Linux Kernel: Schwachstelle ermöglicht Denial of Service oder Offenlegung von Informationen | 2023-06-25T22:00:00.000+00:00 | 2023-12-04T23:00:00.000+00:00 |
| wid-sec-w-2023-1566 | vim: Schwachstelle ermöglicht Denial of Service | 2023-06-25T22:00:00.000+00:00 | 2023-06-25T22:00:00.000+00:00 |
| wid-sec-w-2023-1567 | Nvidia Treiber: Mehrere Schwachstellen | 2023-06-26T22:00:00.000+00:00 | 2024-05-07T22:00:00.000+00:00 |
| wid-sec-w-2023-1568 | BigBlueButton: Schwachstelle ermöglicht Manipulation von Daten | 2023-06-26T22:00:00.000+00:00 | 2023-06-26T22:00:00.000+00:00 |
| wid-sec-w-2023-1569 | Tenable Security Nessus: Schwachstelle ermöglicht Privilegieneskalation | 2023-06-26T22:00:00.000+00:00 | 2023-06-26T22:00:00.000+00:00 |
| wid-sec-w-2023-1570 | MediaWiki: Schwachstelle ermöglicht Cross-Site Scripting | 2023-06-26T22:00:00.000+00:00 | 2023-08-24T22:00:00.000+00:00 |
| wid-sec-w-2023-1571 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-06-26T22:00:00.000+00:00 | 2024-12-16T23:00:00.000+00:00 |
| wid-sec-w-2023-1572 | jQuery: Schwachstelle ermöglicht Cross-Site Scripting | 2023-06-26T22:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2023-1573 | Keycloak: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2023-06-26T22:00:00.000+00:00 | 2023-06-27T22:00:00.000+00:00 |
| wid-sec-w-2023-1574 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung | 2023-06-26T22:00:00.000+00:00 | 2024-01-31T23:00:00.000+00:00 |
| wid-sec-w-2023-1575 | xpdf: Schwachstelle ermöglicht Denial of Service | 2023-06-27T22:00:00.000+00:00 | 2024-09-24T22:00:00.000+00:00 |
| wid-sec-w-2023-1576 | D-LINK DIR-X3260 Router: Schwachstelle ermöglicht Codeausführung | 2023-06-27T22:00:00.000+00:00 | 2023-06-27T22:00:00.000+00:00 |
| wid-sec-w-2023-1577 | Ruby on Rails: Schwachstelle ermöglicht Cross-Site Scripting | 2023-06-27T22:00:00.000+00:00 | 2025-11-25T23:00:00.000+00:00 |
| wid-sec-w-2023-1580 | Ghostscript: Schwachstelle ermöglicht Codeausführung | 2023-06-27T22:00:00.000+00:00 | 2024-05-15T22:00:00.000+00:00 |
| wid-sec-w-2023-1581 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-06-27T22:00:00.000+00:00 | 2023-06-27T22:00:00.000+00:00 |
| wid-sec-w-2023-1582 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-06-27T22:00:00.000+00:00 | 2023-06-27T22:00:00.000+00:00 |
| wid-sec-w-2023-1583 | Red Hat Enterprise Linux (SQLite): Schwachstelle ermöglicht Denial of Service | 2023-06-27T22:00:00.000+00:00 | 2025-08-20T22:00:00.000+00:00 |
| wid-sec-w-2023-1584 | Red Hat Single Sign On: Mehrere Schwachstellen | 2023-06-27T22:00:00.000+00:00 | 2025-04-27T22:00:00.000+00:00 |
| wid-sec-w-2023-1585 | Red Hat Migration Toolkit for Runtimes: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2023-06-27T22:00:00.000+00:00 | 2023-08-13T22:00:00.000+00:00 |
| wid-sec-w-2023-1587 | Proofpoint Insider Threat Management: Mehrere Schwachstellen | 2023-06-28T22:00:00.000+00:00 | 2023-06-28T22:00:00.000+00:00 |
| wid-sec-w-2023-1588 | ImageMagick: Schwachstelle ermöglicht Denial of Service | 2023-06-28T22:00:00.000+00:00 | 2024-08-05T22:00:00.000+00:00 |
| wid-sec-w-2023-1589 | Proofpoint Insider Threat Management: Schwachstelle ermöglicht Denial of Service | 2023-06-28T22:00:00.000+00:00 | 2023-06-28T22:00:00.000+00:00 |
| wid-sec-w-2023-1590 | Ruby: Schwachstelle ermöglicht Denial of Service | 2023-06-28T22:00:00.000+00:00 | 2025-09-15T22:00:00.000+00:00 |
| wid-sec-w-2023-1591 | IBM MQ: Schwachstelle ermöglicht Denial of Service | 2023-06-28T22:00:00.000+00:00 | 2023-09-21T22:00:00.000+00:00 |
| wid-sec-w-2023-1592 | IBM WebSphere Application Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-06-28T22:00:00.000+00:00 | 2023-08-31T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2013:0941 | Red Hat Security Advisory: flash-plugin security update | 2013-06-12T08:58:00+00:00 | 2025-11-21T17:44:07+00:00 |
| rhsa-2013:0943 | Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 update | 2013-06-12T16:36:00+00:00 | 2026-01-28T22:54:26+00:00 |
| rhsa-2013:0944 | Red Hat Security Advisory: python-keystoneclient security and bug fix update | 2013-06-12T16:37:00+00:00 | 2026-01-28T22:34:46+00:00 |
| rhsa-2013:0942 | Red Hat Security Advisory: krb5 security update | 2013-06-12T16:46:00+00:00 | 2025-11-21T17:44:07+00:00 |
| rhsa-2013:0953 | Red Hat Security Advisory: Red Hat JBoss Portal 5.2.2 security update | 2013-06-18T14:41:00+00:00 | 2026-01-28T22:54:26+00:00 |
| rhsa-2013:0957 | Red Hat Security Advisory: java-1.7.0-openjdk security update | 2013-06-19T23:56:00+00:00 | 2025-11-21T17:44:10+00:00 |
| rhsa-2013:0958 | Red Hat Security Advisory: java-1.7.0-openjdk security update | 2013-06-20T00:00:00+00:00 | 2025-11-21T17:44:10+00:00 |
| rhsa-2013:0964 | Red Hat Security Advisory: tomcat6 security update | 2013-06-20T14:36:00+00:00 | 2026-01-28T22:34:47+00:00 |
| rhsa-2013:0963 | Red Hat Security Advisory: java-1.7.0-oracle security update | 2013-06-20T14:42:00+00:00 | 2025-11-21T17:44:10+00:00 |
| rhsa-2013:0983 | Red Hat Security Advisory: curl security update | 2013-06-25T19:14:00+00:00 | 2025-11-21T17:44:14+00:00 |
| rhsa-2013:0982 | Red Hat Security Advisory: thunderbird security update | 2013-06-25T19:51:00+00:00 | 2025-11-21T17:44:14+00:00 |
| rhsa-2013:0981 | Red Hat Security Advisory: firefox security update | 2013-06-25T20:10:00+00:00 | 2025-11-21T17:44:13+00:00 |
| rhsa-2013:0992 | Red Hat Security Advisory: python-keystoneclient security, bug fix, and enhancement update | 2013-06-27T16:34:00+00:00 | 2026-01-28T22:34:47+00:00 |
| rhsa-2013:0993 | Red Hat Security Advisory: openstack-swift security and bug fix update | 2013-06-27T16:36:00+00:00 | 2026-01-28T22:34:48+00:00 |
| rhsa-2013:0994 | Red Hat Security Advisory: openstack-keystone security and bug fix update | 2013-06-27T16:36:00+00:00 | 2026-01-28T22:34:48+00:00 |
| rhsa-2013:0995 | Red Hat Security Advisory: Foreman security and bug fix update | 2013-06-27T16:38:00+00:00 | 2025-11-21T17:44:21+00:00 |
| rhsa-2013:0996 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.6 Extended Update Support 1-Month Notice | 2013-06-27T16:42:00+00:00 | 2025-11-21T17:44:19+00:00 |
| rhsa-2013:1001 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.2 Extended Update Support 6-Month Notice | 2013-06-28T02:39:00+00:00 | 2025-11-21T17:44:20+00:00 |
| rhsa-2013:1006 | Red Hat Security Advisory: Red Hat JBoss BRMS 5.3.1 update | 2013-07-01T15:10:00+00:00 | 2026-01-28T22:54:27+00:00 |
| rhsa-2013:1011 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update | 2013-07-03T15:38:00+00:00 | 2026-01-28T22:34:48+00:00 |
| rhsa-2013:1012 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update | 2013-07-03T15:43:00+00:00 | 2026-01-28T22:34:49+00:00 |
| rhsa-2013:1013 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.0.1 update | 2013-07-03T16:18:00+00:00 | 2026-01-28T22:34:49+00:00 |
| rhsa-2013:1014 | Red Hat Security Advisory: java-1.6.0-openjdk security update | 2013-07-03T17:04:00+00:00 | 2025-11-21T17:44:22+00:00 |
| rhsa-2013:1026 | Red Hat Security Advisory: kernel security and bug fix update | 2013-07-09T15:03:00+00:00 | 2025-11-21T17:44:24+00:00 |
| rhsa-2013:1028 | Red Hat Security Advisory: Fuse ESB Enterprise 7.1.0 update | 2013-07-09T17:35:00+00:00 | 2026-01-28T22:54:27+00:00 |
| rhsa-2013:1029 | Red Hat Security Advisory: Fuse MQ Enterprise 7.1.0 update | 2013-07-09T17:51:00+00:00 | 2026-01-28T22:34:50+00:00 |
| rhea-2013:1032 | Red Hat Enhancement Advisory: Red Hat OpenShift Enterprise 1.2 Node Release Advisory | 2013-07-09T18:57:19+00:00 | 2025-11-21T17:23:56+00:00 |
| rhea-2013:1031 | Red Hat Enhancement Advisory: Red Hat OpenShift Enterprise 1.2 Infrastructure Release Advisory | 2013-07-09T19:48:02+00:00 | 2025-11-21T17:23:56+00:00 |
| rhsa-2013:1034 | Red Hat Security Advisory: kernel security and bug fix update | 2013-07-10T03:49:00+00:00 | 2025-11-21T17:44:27+00:00 |
| rhsa-2013:1035 | Red Hat Security Advisory: flash-plugin security update | 2013-07-10T08:01:00+00:00 | 2025-11-21T17:44:27+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-25-226-02 | Siemens COMOS | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-03 | Siemens SIMATIC S7-PLCSIM | 2025-08-12T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-226-04 | Siemens Simcenter Femap | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-05 | Siemens WIBU CodeMeter Runtime | 2025-08-12T00:00:00.000000Z | 2025-09-09T00:00:00.000000Z |
| icsa-25-226-06 | Siemens Opcenter Quality | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-07 | Siemens Third-Party Components in SINEC OS | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-08 | Siemens RUGGEDCOM CROSSBOW Station Access Controller | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-09 | Siemens RUGGEDCOM APE1808 | 2025-08-12T00:00:00.000000Z | 2026-01-14T22:05:42.880807Z |
| icsa-25-226-10 | Siemens SIPROTEC 5 | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-11 | Siemens SIMATIC S7-PLCSIM | 2025-08-12T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-25-226-12 | Siemens SIPROTEC 4 and SIPROTEC 4 Compact | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-13 | Siemens SIMATIC RTLS Locating Manager | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-14 | Siemens RUGGEDCOM ROX II | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-15 | Siemens SINEC OS | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-16 | Siemens SICAM Q100/Q200 | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-17 | Siemens SINEC Traffic Analyzer | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-18 | Siemens SIMOTION SCOUT, SIMOTION SCOUT TIA, and SINAMICS STARTER | 2025-08-12T00:00:00.000000Z | 2025-10-14T00:00:00.000000Z |
| icsa-25-226-19 | Siemens SINUMERIK | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-20 | Siemens RUGGEDCOM ROX II | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-21 | Siemens BFCClient | 2025-08-12T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-25-226-22 | Siemens Web Installer | 2025-08-12T00:00:00.000000Z | 2026-01-14T22:05:40.684375Z |
| icsa-25-224-03 | Schneider Electric EcoStruxure Power Monitoring Expert | 2025-08-12T04:00:00.000000Z | 2025-11-11T08:00:00.000000Z |
| icsa-25-238-03 | Schneider Electric Modicon M340 Controller and Communication Modules | 2025-08-12T04:00:00.000000Z | 2025-08-12T04:00:00.000000Z |
| icsa-25-240-03 | Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit | 2025-08-12T04:00:00.000000Z | 2025-08-12T04:00:00.000000Z |
| icsa-25-254-08 | Schneider Electric EcoStruxure | 2025-08-12T04:00:00.000000Z | 2025-09-09T04:00:00.000000Z |
| icsa-25-266-03 | Schneider Electric SESU | 2025-08-12T04:00:00.000000Z | 2025-09-09T04:00:00.000000Z |
| icsa-25-224-01 | Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, Cobalt Share | 2025-08-12T06:00:00.000000Z | 2025-08-12T06:00:00.000000Z |
| icsa-25-224-02 | Johnson Controls iSTAR Ultra, iSTAR Ultra SE, iSTAR Ultra G2, iSTAR Ultra G2 SE, iSTAR Edge G2 (Update A) | 2025-08-12T06:00:00.000000Z | 2025-12-16T07:00:00.000000Z |
| icsa-25-224-04 | AVEVA PI Integrator | 2025-08-12T06:00:00.000000Z | 2025-08-12T06:00:00.000000Z |
| icsma-25-224-01 | Santesoft Sante PACS Server | 2025-08-12T06:00:00.000000Z | 2025-08-12T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-41901 | `CHECK_EQ` fail via input in `SparseMatrixNNZ` in Tensorflow | 2022-11-02T00:00:00.000Z | 2022-12-02T00:00:00.000Z |
| msrc_cve-2022-41907 | Overflow in `ResizeNearestNeighborGrad` in Tensorflow | 2022-11-02T00:00:00.000Z | 2022-12-02T00:00:00.000Z |
| msrc_cve-2022-41908 | `CHECK` fail via inputs in `PyFunc` in Tensorflow | 2022-11-02T00:00:00.000Z | 2022-12-02T00:00:00.000Z |
| msrc_cve-2022-41909 | Segfault in `CompositeTensorVariantToComponents` in Tensorflow | 2022-11-02T00:00:00.000Z | 2022-12-02T00:00:00.000Z |
| msrc_cve-2022-41911 | Invalid char to bool conversion when printing a tensor in Tensorflow | 2022-11-02T00:00:00.000Z | 2022-12-02T00:00:00.000Z |
| msrc_cve-2022-41916 | Read one byte past a buffer when normalizing Unicode | 2022-11-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2022-42919 | Python 3.9.x before 3.9.16 and 3.10.x before 3.10.9 on Linux allows local privilege escalation in a non-default configuration. The Python multiprocessing library when used with the forkserver start method on Linux allows pickles to be deserialized from any user in the same machine local network namespace which in many system configurations means any user on the same machine. Pickles can execute arbitrary code. Thus this allows for local user privilege escalation to the user that any forkserver process is running as. Setting multiprocessing.util.abstract_sockets_supported to False is a workaround. The forkserver start method for multiprocessing is not the default start method. This issue is Linux specific because only Linux supports abstract namespace sockets. CPython before 3.9 does not make use of Linux abstract namespace sockets by default. Support for users manually specifying an abstract namespace socket was added as a bugfix in 3.7.8 and 3.8.3 but users would need to make specific | 2022-11-02T00:00:00.000Z | 2023-02-06T00:00:00.000Z |
| msrc_cve-2022-43945 | The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is passed forward to handlers. Vulnerable code in NFSD is not expecting the oversized request and writes beyond the allocated buffer space. CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H | 2022-11-02T00:00:00.000Z | 2022-11-09T00:00:00.000Z |
| msrc_cve-2022-43995 | Sudo 1.8.0 through 1.9.12 with the crypt() password backend contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries compiler and processor architecture. | 2022-11-02T00:00:00.000Z | 2022-11-09T00:00:00.000Z |
| msrc_cve-2022-44638 | In libpixman in Pixman before 0.42.2 there is an out-of-bounds write (aka heap-based buffer overflow) in rasterize_edges_8 due to an integer overflow in pixman_sample_floor_y. | 2022-11-02T00:00:00.000Z | 2022-11-09T00:00:00.000Z |
| msrc_cve-2022-44792 | handle_ipDefaultTTL in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.8 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker (who has write access) to cause the instance to crash via a crafted UDP packet resulting in Denial of Service. | 2022-11-02T00:00:00.000Z | 2022-11-09T00:00:00.000Z |
| msrc_cve-2022-44793 | handle_ipv6IpForwarding in agent/mibgroup/ip-mib/ip_scalars.c in Net-SNMP 5.4.3 through 5.9.3 has a NULL Pointer Exception bug that can be used by a remote attacker to cause the instance to crash via a crafted UDP packet resulting in Denial of Service. | 2022-11-02T00:00:00.000Z | 2022-11-09T00:00:00.000Z |
| msrc_cve-2022-45061 | An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder such that a crafted unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1 3.10.9 3.9.16 3.8.16 and 3.7.16. | 2022-11-02T00:00:00.000Z | 2022-11-17T00:00:00.000Z |
| msrc_cve-2022-45063 | xterm before 375 allows code execution via font ops e.g. because an OSC 50 response may have Ctrl-g and therefore lead to command execution within the vi line-editing mode of Zsh. NOTE: font ops are not allowed in the xterm default configurations of some Linux distributions. | 2022-11-02T00:00:00.000Z | 2022-11-16T00:00:00.000Z |
| msrc_cve-2022-45380 | Jenkins JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | 2022-11-02T00:00:00.000Z | 2025-10-01T23:11:26.000Z |
| msrc_cve-2022-45869 | A race condition in the x86 KVM subsystem in the Linux kernel through 6.1-rc6 allows guest OS users to cause a denial of service (host OS crash or host OS memory corruption) when nested virtualisation and the TDP MMU are enabled. | 2022-11-02T00:00:00.000Z | 2022-12-03T00:00:00.000Z |
| msrc_cve-2022-45873 | systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file. | 2022-11-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2022-45884 | An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvbdev.c has a use-after-free related to dvb_register_device dynamically allocating fops. | 2022-11-02T00:00:00.000Z | 2022-11-30T00:00:00.000Z |
| msrc_cve-2022-45885 | An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_frontend.c has a race condition that can cause a use-after-free when a device is disconnected. | 2022-11-02T00:00:00.000Z | 2025-10-01T23:11:26.000Z |
| msrc_cve-2022-45886 | An issue was discovered in the Linux kernel through 6.0.9. drivers/media/dvb-core/dvb_net.c has a .disconnect versus dvb_device_open race condition that leads to a use-after-free. | 2022-11-02T00:00:00.000Z | 2022-11-30T00:00:00.000Z |
| msrc_cve-2022-45887 | An issue was discovered in the Linux kernel through 6.0.9. drivers/media/usb/ttusb-dec/ttusb_dec.c has a memory leak because of the lack of a dvb_frontend_detach call. | 2022-11-02T00:00:00.000Z | 2022-11-30T00:00:00.000Z |
| msrc_cve-2022-45888 | An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device. | 2022-11-02T00:00:00.000Z | 2022-11-30T00:00:00.000Z |
| msrc_cve-2022-45919 | An issue was discovered in the Linux kernel through 6.0.10. In drivers/media/dvb-core/dvb_ca_en50221.c a use-after-free can occur is there is a disconnect after an open because of the lack of a wait_event. | 2022-11-02T00:00:00.000Z | 2022-11-29T00:00:00.000Z |
| msrc_cve-2022-45934 | An issue was discovered in the Linux kernel through 6.0.10. l2cap_config_req in net/bluetooth/l2cap_core.c has an integer wraparound via L2CAP_CONF_REQ packets. | 2022-11-02T00:00:00.000Z | 2022-12-02T00:00:00.000Z |
| msrc_cve-2022-45939 | GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input. | 2022-11-02T00:00:00.000Z | 2022-12-02T00:00:00.000Z |
| msrc_cve-2022-46146 | Prometheus Exporter Toolkit vulnerable to basic authentication bypass | 2022-11-02T00:00:00.000Z | 2024-09-11T00:00:00.000Z |
| msrc_cve-2022-37966 | Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability | 2022-11-08T08:00:00.000Z | 2022-11-17T08:00:00.000Z |
| msrc_cve-2022-37967 | Windows Kerberos Elevation of Privilege Vulnerability | 2022-11-08T08:00:00.000Z | 2023-10-10T07:00:00.000Z |
| msrc_cve-2022-37992 | Windows Group Policy Elevation of Privilege Vulnerability | 2022-11-08T08:00:00.000Z | 2022-11-08T08:00:00.000Z |
| msrc_cve-2022-38014 | Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability | 2022-11-08T08:00:00.000Z | 2023-01-23T08:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201006-0509 | Twitter for iPhone is a Twitter client for the iPhone platform. There is a buffer overflo… | 2022-05-17T01:45:44.394000Z |
| var-201005-0439 | An arbitrary code execution vulnerability exists in several EUR Form and EUR products.A r… | 2022-05-17T01:45:44.666000Z |
| var-200909-0581 | Novell eDirectory is a cross-platform directory server. If a remote attacker submits a sp… | 2022-05-17T01:45:48.975000Z |
| var-200903-0641 | Hitachi JP1/Cm2/Network Node Manager are prone to a denial-of-service vulnerability affec… | 2022-05-17T01:45:50.342000Z |
| var-200410-0110 | It is reported that ZENworks for Desktops contains a local privilege escalation vulnerabi… | 2022-05-17T01:46:07.678000Z |
| var-200406-0053 | 3Com SuperStack Switch is a cost-effective, manageable switch from 3COM. The 3Com SuperSt… | 2022-05-17T01:46:08.254000Z |
| var-200311-0103 | The FortiGate Firewall is a hardware firewall solution. The WEB interface included in the… | 2022-05-17T01:46:08.853000Z |
| var-200302-0055 | It has been reported that the Axis Video Servers do not properly handle input to the 'com… | 2022-05-17T01:46:09.985000Z |
| var-200005-0117 | A number of vulnerabilities exist in the TACACS+ protocol. These are part of the protoco… | 2022-05-17T01:46:11.656000Z |
| var-190001-0875 | Advantech BroadWin is a fully browser-based Human Machine Interface (HMI) and Monitoring … | 2022-05-17T01:46:12.483000Z |
| var-202006-1966 | This vulnerability allows remote attackers to create arbitrary files on affected installa… | 2022-05-17T01:46:20.239000Z |
| var-202006-1861 | GX Works2 is a PLC programming software. GX Works2 has a denial of service vulnerabil… | 2022-05-17T01:46:20.254000Z |
| var-202005-1083 | Xiaomi Mi Box is a Xiaomi set-top box application. There is a memory corruption vulne… | 2022-05-17T01:46:20.424000Z |
| var-202004-2274 | D-Link DWL-2600 is a wireless access point device. D-Link DWL-2600 has a security hol… | 2022-05-17T01:46:20.522000Z |
| var-202004-2211 | Wuxi Xinjie Electric Co., Ltd. (XINJE) is a well-known domestic enterprise focusing on th… | 2022-05-17T01:46:20.540000Z |
| var-201912-2034 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable instal… | 2022-05-17T01:46:21.009000Z |
| var-201910-1738 | Siemens SIMATIC STEP 7 (TIA Portal) is a set of programming software for SIMATIC controll… | 2022-05-17T01:46:21.216000Z |
| var-201909-1547 | MCGS is a Windows-based configuration software system developed by Beijing Kunlun Tongsta… | 2022-05-17T01:46:21.330000Z |
| var-201905-1352 | LSIS configuration software is a configuration software of Lexing Power Generation (Wuxi)… | 2022-05-17T01:46:21.867000Z |
| var-201905-1331 | LS Power Generation is a company mainly engaged in programmable controllers, frequency co… | 2022-05-17T01:46:21.881000Z |
| var-201812-1204 | NA300 PLC is a medium-sized programmable controller. NA300 PLC has an unauthorized oper… | 2022-05-17T01:46:22.624000Z |
| var-201810-1619 | VitekVT-HDOC16BR is Vitek's all-in-one recorder for EX-SDI, TVI, AHD, CVI, IP and Analog … | 2022-05-17T01:46:22.921000Z |
| var-201809-1217 | Hollysys Group is a professional automation company integrating R & D, production, sales … | 2022-05-17T01:46:23.035000Z |
| var-201809-1196 | Hollysys Group is a professional automation company integrating R & D, production, sales … | 2022-05-17T01:46:23.050000Z |
| var-201807-2219 | Beijing Hollysys is a provider of automation and information technology solutions. The co… | 2022-05-17T01:46:23.236000Z |
| var-201806-1813 | Eaton ELCSoft Programming Software is a suite of software for configuring programmable lo… | 2022-05-17T01:46:23.419000Z |
| var-201806-1811 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable instal… | 2022-05-17T01:46:23.440000Z |
| var-201804-1755 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable instal… | 2022-05-17T01:46:23.749000Z |
| var-201709-1267 | SAP NetWeaver is prone to an cross-site scripting vulnerability because it fails to prope… | 2022-05-17T01:46:24.784000Z |
| var-201708-1708 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable instal… | 2022-05-17T01:46:24.989000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2018:2719-1 | Security update for openssh-openssl1 | 2018-09-14T14:06:53Z | 2018-09-14T14:06:53Z |
| suse-su-2018:2752-1 | Security update for webkit2gtk3 | 2018-09-19T10:58:11Z | 2018-09-19T10:58:11Z |
| suse-su-2018:2762-1 | Security update for crowbar, crowbar-core, crowbar-ha, crowbar-init, crowbar-openstack, crowbar-ui | 2018-09-20T06:04:40Z | 2018-09-20T06:04:40Z |
| suse-su-2018:2761-1 | Security update for OpenStack | 2018-09-20T06:05:59Z | 2018-09-20T06:05:59Z |
| suse-su-2018:2765-1 | Security update for couchdb | 2018-09-20T06:06:05Z | 2018-09-20T06:06:05Z |
| suse-su-2018:2763-1 | Security update for pango | 2018-09-20T06:06:16Z | 2018-09-20T06:06:16Z |
| suse-su-2018:2771-1 | Security update for gdm | 2018-09-20T09:47:08Z | 2018-09-20T09:47:08Z |
| suse-su-2018:2775-1 | Security update for the Linux Kernel | 2018-09-20T16:27:21Z | 2018-09-20T16:27:21Z |
| suse-su-2018:2776-1 | Security update for the Linux Kernel | 2018-09-20T16:27:28Z | 2018-09-20T16:27:28Z |
| suse-su-2018:2779-1 | Security update for openslp | 2018-09-21T05:51:26Z | 2018-09-21T05:51:26Z |
| suse-su-2018:2778-1 | Security update for ImageMagick | 2018-09-21T05:51:50Z | 2018-09-21T05:51:50Z |
| suse-su-2018:2780-1 | Security update for liblouis | 2018-09-21T05:52:13Z | 2018-09-21T05:52:13Z |
| suse-su-2018:2777-1 | Security update for python-paramiko | 2018-09-21T05:52:22Z | 2018-09-21T05:52:22Z |
| suse-su-2018:2787-1 | Security update for the Linux Kernel (Live Patch 29 for SLE 12) | 2018-09-21T10:04:52Z | 2018-09-21T10:04:52Z |
| suse-su-2018:2789-1 | Security update for ant | 2018-09-21T11:51:26Z | 2018-09-21T11:51:26Z |
| suse-su-2018:2791-1 | Security update for xorg-x11-libs | 2018-09-21T12:55:33Z | 2018-09-21T12:55:33Z |
| suse-su-2018:2796-1 | Security update for nodejs6 | 2018-09-21T15:08:56Z | 2018-09-21T15:08:56Z |
| suse-su-2018:2814-1 | Security update for libzypp, zypper | 2018-09-24T06:06:49Z | 2018-09-24T06:06:49Z |
| suse-su-2018:2815-1 | Security update for apache2 | 2018-09-24T06:07:56Z | 2018-09-24T06:07:56Z |
| suse-su-2018:2812-1 | Security update for nodejs8 | 2018-09-24T06:08:37Z | 2018-09-24T06:08:37Z |
| suse-su-2018:2825-1 | Security update for gnutls | 2018-09-24T08:10:59Z | 2018-09-24T08:10:59Z |
| suse-su-2018:2841-1 | Security update for libXcursor | 2018-09-24T10:52:51Z | 2018-09-24T10:52:51Z |
| suse-su-2018:2839-1 | Security update for java-1_8_0-ibm | 2018-09-24T10:54:00Z | 2018-09-24T10:54:00Z |
| suse-su-2018:2838-1 | Security update for ant | 2018-09-24T10:54:24Z | 2018-09-24T10:54:24Z |
| suse-su-2018:2836-1 | Security update for tiff | 2018-09-24T10:54:45Z | 2018-09-24T10:54:45Z |
| suse-su-2018:2842-1 | Security update for gnutls | 2018-09-24T10:55:04Z | 2018-09-24T10:55:04Z |
| suse-su-2018:2837-1 | Security update for gd | 2018-09-24T10:55:27Z | 2018-09-24T10:55:27Z |
| suse-su-2018:2840-1 | Security update for php7 | 2018-09-24T10:55:38Z | 2018-09-24T10:55:38Z |
| suse-su-2018:2834-1 | Security update for shadow | 2018-09-24T10:55:47Z | 2018-09-24T10:55:47Z |
| suse-su-2018:2835-1 | Security update for shadow | 2018-09-24T10:56:02Z | 2018-09-24T10:56:02Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:0142-1 | Security update for opera | 2024-05-27T07:32:01Z | 2024-05-27T07:32:01Z |
| opensuse-su-2024:0143-1 | Security update for libqt5-qtnetworkauth | 2024-05-27T13:00:29Z | 2024-05-27T13:00:29Z |
| opensuse-su-2024:0146-1 | Security update for gifsicle | 2024-05-29T16:22:54Z | 2024-05-29T16:22:54Z |
| opensuse-su-2024:0147-1 | Security update for libredwg | 2024-05-29T16:41:07Z | 2024-05-29T16:41:07Z |
| opensuse-su-2024:0149-1 | Security update for python-python-jose | 2024-06-03T15:48:23Z | 2024-06-03T15:48:23Z |
| opensuse-su-2024:0150-1 | Security update for libhtp | 2024-06-04T03:11:10Z | 2024-06-04T03:11:10Z |
| opensuse-su-2024:0150-2 | Security update for libhtp | 2024-06-04T03:11:10Z | 2024-06-04T03:11:10Z |
| opensuse-su-2024:0155-1 | Security update for chromium | 2024-06-10T07:34:08Z | 2024-06-10T07:34:08Z |
| opensuse-su-2024:0156-1 | Security update for opera | 2024-06-10T07:54:32Z | 2024-06-10T07:54:32Z |
| opensuse-su-2024:0157-1 | Security update for nano | 2024-06-11T17:41:12Z | 2024-06-11T17:41:12Z |
| opensuse-su-2024:0157-2 | Security update for nano | 2024-06-11T17:41:12Z | 2024-06-11T17:41:12Z |
| opensuse-su-2024:0161-1 | Security update for plasma5-workspace | 2024-06-13T20:01:46Z | 2024-06-13T20:01:46Z |
| opensuse-su-2024:10000-1 | kdirstat-2.4.4-277.11 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10001-1 | dstat-0.7.3-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10002-1 | libXxf86vm-devel-1.1.4-1.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10003-1 | ghostscript-9.20-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10004-1 | krb5-1.15-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10005-1 | libHX-devel-3.22-2.8 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10006-1 | libreoffice-5.2.3.3-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10007-1 | mcabber-1.0.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10008-1 | kbd-2.0.3-1.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10009-1 | libupsclient1-2.7.3-2.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10010-1 | libnewt0_52-0.52.18-1.9 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10011-1 | kdelibs4-4.14.27-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10012-1 | libldap-2_4-2-2.4.44-22.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10013-1 | libjson-c-devel-0.12.1-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10014-1 | ack-2.15_02-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10015-1 | cyradm-2.4.18-3.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10016-1 | giflib-devel-32bit-5.1.4-1.12 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10017-1 | exim-4.86.2-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2025-0194 | Insertion of Sensitive Information into Externally-Accessible File or Directory in GitLab | 2025-01-10T19:11:23.175Z | 2025-05-20T10:02:07.006Z |
| bit-node-2024-37372 | 2025-01-10T19:16:12.087Z | 2025-05-03T06:34:12.721Z | |
| bit-node-2024-27980 | 2025-01-10T19:16:46.586Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2024-6324 | Inefficient Algorithmic Complexity in GitLab | 2025-01-10T19:17:23.895Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-13041 | Incorrect User Management in GitLab | 2025-01-10T19:24:39.902Z | 2025-08-06T06:08:07.957Z |
| bit-gitlab-2024-12431 | Missing Authorization in GitLab | 2025-01-10T19:24:59.289Z | 2025-05-20T10:02:07.006Z |
| bit-cilium-2025-23047 | Cilium vulnerable to information leakage via insecure default Hubble UI CORS header | 2025-01-27T07:09:11.634Z | 2025-05-20T10:02:07.006Z |
| bit-cilium-2025-23028 | DoS in Cilium agent DNS proxy from crafted DNS responses | 2025-01-27T07:09:18.725Z | 2025-05-20T10:02:07.006Z |
| bit-elk-2024-52972 | Kibana allocation of resources without limits or throttling leads to crash | 2025-01-27T07:09:41.033Z | 2025-05-20T10:02:07.006Z |
| bit-elk-2024-43710 | Kibana server-side request forgery | 2025-01-27T07:09:48.425Z | 2025-05-20T10:02:07.006Z |
| bit-elk-2024-43708 | 2025-01-27T07:09:55.231Z | 2025-04-03T14:40:37.652Z | |
| bit-elk-2024-43707 | Kibana exposure of sensitive information to an unauthorized actor | 2025-01-27T07:10:02.513Z | 2025-10-01T15:14:38.852Z |
| bit-kibana-2024-52972 | Kibana allocation of resources without limits or throttling leads to crash | 2025-01-27T07:12:30.819Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2024-43710 | Kibana server-side request forgery | 2025-01-27T07:12:37.323Z | 2025-05-20T10:02:07.006Z |
| bit-kibana-2024-43708 | 2025-01-27T07:12:44.021Z | 2025-04-03T14:40:37.652Z | |
| bit-kibana-2024-43707 | Kibana exposure of sensitive information to an unauthorized actor | 2025-01-27T07:12:51.527Z | 2025-10-01T15:14:38.852Z |
| bit-mlflow-2024-3848 | Path Traversal Bypass in mlflow/mlflow | 2025-01-27T07:13:35.132Z | 2025-05-20T10:02:07.006Z |
| bit-node-2025-23090 | 2025-01-27T07:15:14.518Z | 2025-07-19T06:08:14.411Z | |
| bit-node-2025-23089 | 2025-01-27T07:15:22.512Z | 2025-03-02T07:44:48.340Z | |
| bit-node-2025-23088 | 2025-01-27T07:15:29.521Z | 2025-03-02T07:44:48.340Z | |
| bit-node-2025-23087 | 2025-01-27T07:15:36.528Z | 2025-03-02T07:44:48.340Z | |
| bit-node-2025-23083 | 2025-01-27T07:15:43.637Z | 2025-07-23T06:06:57.881Z | |
| bit-gitlab-2025-0314 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2025-01-28T07:10:14.614Z | 2025-08-06T06:08:07.957Z |
| bit-gitlab-2024-11931 | Insufficient Granularity of Access Control in GitLab | 2025-01-28T07:25:07.907Z | 2025-08-06T06:08:07.957Z |
| bit-solr-2025-24814 | Apache Solr: Core-creation with "trusted" configset can use arbitrary untrusted files | 2025-01-29T07:20:22.315Z | 2026-01-26T15:09:56.435Z |
| bit-solr-2024-52012 | Apache Solr: Configset upload on Windows allows arbitrary path write-access | 2025-01-29T07:20:30.008Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2025-0290 | Loop with Unreachable Exit Condition ('Infinite Loop') in GitLab | 2025-01-30T19:13:11.925Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2024-45341 | Usage of IPv6 zone IDs can bypass URI name constraints in crypto/x509 | 2025-01-30T19:13:14.453Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2024-45336 | Sensitive headers incorrectly sent after cross-domain redirect in net/http | 2025-01-30T19:13:32.933Z | 2025-05-20T10:02:07.006Z |
| bit-node-2025-23084 | 2025-01-30T19:20:24.038Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-03484 | phpMyAdmin信息泄露漏洞(CNVD-2015-03484) | 2015-05-28 | 2015-06-01 |
| cnvd-2015-03485 | Wireshark拒绝服务漏洞(CNVD-2015-03485) | 2015-05-28 | 2015-06-01 |
| cnvd-2015-03486 | HP SDN VAN Controller devices拒绝服务漏洞 | 2015-05-28 | 2015-06-01 |
| cnvd-2015-03487 | 多个IBM产品拒绝服务漏洞(CNVD-2015-03487) | 2015-05-28 | 2015-06-01 |
| cnvd-2015-03488 | IBM Business Process Manager跨站脚本漏洞(CNVD-2015-03488) | 2015-05-28 | 2015-06-01 |
| cnvd-2015-03489 | IBM WebSphere Portal开放重定向漏洞(CNVD-2015-03489) | 2015-05-28 | 2015-06-01 |
| cnvd-2015-03495 | Dell NetVault Backup堆缓冲区溢出远程代码执行漏洞 | 2015-05-28 | 2015-06-01 |
| cnvd-2015-03496 | 多个IBM产品拒绝服务漏洞(CNVD-2015-03496) | 2015-05-28 | 2015-06-01 |
| cnvd-2015-03510 | WordPress RevSlider文件上传远程执行代码漏洞 | 2015-05-28 | 2015-06-02 |
| cnvd-2015-03511 | Clickheat命令执行漏洞 | 2015-05-28 | 2015-06-02 |
| cnvd-2015-03512 | MacKeeper URL处理远程代码执行漏洞 | 2015-05-28 | 2015-06-02 |
| cnvd-2015-03513 | i.FTP 'schedule.xml'处理缓冲区溢出漏洞 | 2015-05-28 | 2015-06-02 |
| cnvd-2015-03514 | SixApart MovableType Storable Perl代码执行漏洞 | 2015-05-28 | 2015-06-02 |
| cnvd-2015-03515 | FTP Media Server存在多个漏洞 | 2015-05-28 | 2015-06-02 |
| cnvd-2015-03480 | Cisco IP Phone 7861拒绝服务漏洞 | 2015-05-29 | 2015-05-30 |
| cnvd-2016-07388 | 票友ERP网页版售票系统/Sales/meb_his.aspx?id=中id参数存在SQL注入漏洞 | 2015-05-29 | 2016-09-09 |
| cnvd-2016-07390 | 票友ERP网页版售票系统/Parmset/sms_mb_edit.aspx?id=中id参数存在SQL注入漏洞 | 2015-05-29 | 2016-09-09 |
| cnvd-2016-07392 | 票友ERP网页版售票系统/Visa/gjqz_add.aspx?id=中id参数存在SQL注入漏洞 | 2015-05-29 | 2016-09-09 |
| cnvd-2016-07405 | 票友ERP网页版售票系统/flight/refund_update.aspx?id=中id参数存在SQL注入漏洞 | 2015-05-29 | 2016-09-09 |
| cnvd-2016-07823 | 票友ERP网页版售票系统/Json_db/other_report.aspx?its=11&dfs=0&jq=0&sdate=中sdate参数存在SQL注入漏洞 | 2015-05-29 | 2016-09-21 |
| cnvd-2016-07824 | 票友ERP网页版售票系统/Finance/Invoice_detail.aspx?id=中id参数存在SQL注入漏洞 | 2015-05-29 | 2016-09-21 |
| cnvd-2016-07825 | 票友ERP网页版售票系统/flight/Html.aspx?id=中id参数存在SQL注入漏洞 | 2015-05-29 | 2016-09-21 |
| cnvd-2016-07826 | 票友ERP网页版售票系统/Json_db/flight_zhekou.aspx?sd=中sd参数存在SQL注入漏洞 | 2015-05-29 | 2016-09-21 |
| cnvd-2016-07827 | 票友ERP网页版售票系统/Other/Edit.aspx?id=中id参数存在SQL注入漏洞 | 2015-05-29 | 2016-09-21 |
| cnvd-2015-03490 | Wavelink Emulation ConnectPro TermProxy远程代码执行漏洞 | 2015-06-01 | 2015-06-01 |
| cnvd-2015-03491 | Wavelink Terminal Emulation 'LicenseServer.exe'远程代码执行漏洞 | 2015-06-01 | 2015-06-01 |
| cnvd-2015-03492 | WordPress插件Free Counter跨站脚本漏洞 | 2015-06-01 | 2015-06-01 |
| cnvd-2015-03493 | WordPress插件church_admin跨站脚本漏洞 | 2015-06-01 | 2015-06-01 |
| cnvd-2015-03494 | Sensio Labs Symfony FragmentListener ESI安全绕过漏洞 | 2015-06-01 | 2015-06-01 |
| cnvd-2015-03497 | Cisco TelePresence Video Communication Server Overview Web Page跨站脚本漏洞 | 2015-06-01 | 2015-06-02 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2008-avi-538 | Vulnérabilité dans IBM Tivoli Storage Manager | 2008-11-05T00:00:00.000000 | 2008-11-05T00:00:00.000000 |
| certa-2008-avi-539 | Vulnérabilité du produit SonicWALL | 2008-11-05T00:00:00.000000 | 2008-11-05T00:00:00.000000 |
| certa-2008-avi-540 | Vulnérabilité dans net-snmp | 2008-11-05T00:00:00.000000 | 2008-11-20T00:00:00.000000 |
| certa-2008-avi-541 | Multiples vulnérabilités dans Adobe Acrobat et Adobe Reader | 2008-11-06T00:00:00.000000 | 2008-11-06T00:00:00.000000 |
| certa-2008-avi-542 | Vulnérabilité des produits Cisco | 2008-11-06T00:00:00.000000 | 2008-11-06T00:00:00.000000 |
| certa-2008-avi-543 | Multiples vulnérabilités dans VLC | 2008-11-06T00:00:00.000000 | 2008-11-06T00:00:00.000000 |
| certa-2008-avi-544 | Vulnérabilité dans Adobe ColdFusion | 2008-11-06T00:00:00.000000 | 2008-11-06T00:00:00.000000 |
| certa-2008-avi-545 | Vulnérabilité dans Nagios | 2008-11-06T00:00:00.000000 | 2008-11-06T00:00:00.000000 |
| certa-2008-avi-546 | Multiples vulnérabilités dans Adobe Flash Player | 2008-11-07T00:00:00.000000 | 2008-11-07T00:00:00.000000 |
| certa-2008-avi-547 | Vulnérabilité dans les produits VMware | 2008-11-07T00:00:00.000000 | 2008-11-07T00:00:00.000000 |
| certa-2008-avi-548 | Vulnérabilité dans HP Tru64 UNIX | 2008-11-07T00:00:00.000000 | 2008-11-07T00:00:00.000000 |
| certa-2008-avi-549 | Vulnérabilité de SMB dans Microsoft Windows | 2008-11-12T00:00:00.000000 | 2008-11-12T00:00:00.000000 |
| certa-2008-avi-550 | Vulnérabilités dans Microsoft XML Core Services | 2008-11-12T00:00:00.000000 | 2008-11-12T00:00:00.000000 |
| certa-2008-avi-551 | Vulnérabilités dans Joomla! | 2008-11-12T00:00:00.000000 | 2008-11-12T00:00:00.000000 |
| certa-2008-avi-552 | Multiples vulnérabilités du serveur DHCP de Sun Solaris | 2008-11-13T00:00:00.000000 | 2008-11-13T00:00:00.000000 |
| certa-2008-avi-553 | Vulnérabilité dans ClamAV | 2008-11-13T00:00:00.000000 | 2008-11-13T00:00:00.000000 |
| certa-2008-avi-554 | Vulnérabilités dans TYPO3 | 2008-11-13T00:00:00.000000 | 2008-11-13T00:00:00.000000 |
| certa-2008-avi-555 | Multiples vulnérabilités dans Mozilla Firefox | 2008-11-13T00:00:00.000000 | 2008-11-13T00:00:00.000000 |
| certa-2008-avi-556 | Vulnérabilité dans GnuTLS | 2008-11-14T00:00:00.000000 | 2009-06-17T00:00:00.000000 |
| certa-2008-avi-557 | Vulnérabilités de Safari | 2008-11-14T00:00:00.000000 | 2008-11-14T00:00:00.000000 |
| certa-2008-avi-558 | Vulnérabilités dans Mozilla Thunderbird | 2008-11-20T00:00:00.000000 | 2008-11-20T00:00:00.000000 |
| certa-2008-avi-559 | Multiples vulnérabilités dans Symantec Backup Exec | 2008-11-20T00:00:00.000000 | 2008-11-20T00:00:00.000000 |
| certa-2008-avi-560 | Multiples vulnérabilités dans Adobe AIR | 2008-11-20T00:00:00.000000 | 2008-11-20T00:00:00.000000 |
| certa-2008-avi-561 | Multiples vulnérabilités dans HP OpenView Network Node Manager | 2008-11-20T00:00:00.000000 | 2008-11-20T00:00:00.000000 |
| certa-2008-avi-562 | Vulnérabilités de Libxml2 | 2008-11-20T00:00:00.000000 | 2008-11-20T00:00:00.000000 |
| certa-2008-avi-563 | Multiples vulnérabilités dans Citrix XenServer | 2008-11-20T00:00:00.000000 | 2008-11-20T00:00:00.000000 |
| certa-2008-avi-564 | Vulnérabilités dans Cadic Intégrale | 2008-11-25T00:00:00.000000 | 2008-11-25T00:00:00.000000 |
| certa-2008-avi-565 | Vulnérabilité dans vBulletin | 2008-11-25T00:00:00.000000 | 2008-11-25T00:00:00.000000 |
| certa-2008-avi-566 | Vulnérabilité dans HP Secure Web Server et Internet Express | 2008-11-26T00:00:00.000000 | 2008-11-26T00:00:00.000000 |
| certa-2008-avi-567 | Vulnérabilité dans VirtualBox | 2008-11-26T00:00:00.000000 | 2008-11-26T00:00:00.000000 |