Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2001-0764 |
N/A
|
Buffer overflow in ntping in scotty 2.1.0 allows … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:30:06.127Z |
| CVE-2001-0765 |
N/A
|
BisonFTP V4R1 allows local users to access direct… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:30:06.147Z |
| CVE-2001-0773 |
N/A
|
Cayman 3220-H DSL Router 1.0 allows remote attack… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:30:06.133Z |
| CVE-2001-0774 |
N/A
|
Tripwire 1.3.1, 2.2.1 and 2.3.0 allows local user… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:30:06.240Z |
| CVE-2001-0779 |
N/A
|
Buffer overflow in rpc.yppasswdd (yppasswd server… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:30:06.161Z |
| CVE-2001-0784 |
N/A
|
Directory traversal vulnerability in Icecast 1.3.… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:30:06.240Z |
| CVE-2001-0787 |
N/A
|
LPRng in Red Hat Linux 7.0 and 7.1 does not prope… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:30:06.129Z |
| CVE-2001-0796 |
N/A
|
SGI IRIX 6.5 through 6.5.12f and possibly earlier… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:30:06.138Z |
| CVE-2001-0801 |
N/A
|
lpstat in IRIX 6.5.13f and earlier allows local u… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:05.808Z |
| CVE-2001-0803 |
N/A
|
Buffer overflow in the client connection routine … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:05.842Z |
| CVE-2001-0804 |
N/A
|
Directory traversal vulnerability in story.pl in … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:05.962Z |
| CVE-2001-0805 |
N/A
|
Directory traversal vulnerability in ttawebtop.cg… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:06.365Z |
| CVE-2001-0806 |
N/A
|
Apple MacOS X 10.0 and 10.1 allow a local user to… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:06.567Z |
| CVE-2001-0815 |
N/A
|
Buffer overflow in PerlIS.dll in Activestate Acti… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:06.864Z |
| CVE-2001-0816 |
N/A
|
OpenSSH before 2.9.9, when running sftp using sft… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:06.548Z |
| CVE-2001-0819 |
N/A
|
A buffer overflow in Linux fetchmail before 5.8.6… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:06.917Z |
| CVE-2001-0822 |
N/A
|
FPF kernel module 1.0 allows a remote attacker to… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:05.942Z |
| CVE-2001-0823 |
N/A
|
The pmpost program in Performance Co-Pilot (PCP) … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:06.210Z |
| CVE-2001-0828 |
N/A
|
A cross-site scripting vulnerability in Caucho Te… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:05.962Z |
| CVE-2001-0830 |
N/A
|
6tunnel 0.08 and earlier does not properly close … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:07.092Z |
| CVE-2001-0833 |
N/A
|
Buffer overflow in otrcrep in Oracle 8.0.x throug… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:06.298Z |
| CVE-2001-0834 |
N/A
|
htsearch CGI program in htdig (ht://Dig) 3.1.5 an… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:07.249Z |
| CVE-2001-0836 |
N/A
|
Buffer overflow in Oracle9iAS Web Cache 2.0.0.1 a… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:06.473Z |
| CVE-2001-0843 |
N/A
|
Squid proxy server 2.4 and earlier allows remote … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:06.838Z |
| CVE-2001-0846 |
N/A
|
Lotus Domino 5.x allows remote attackers to read … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:06.603Z |
| CVE-2001-0850 |
N/A
|
A configuration error in the libdb1 package in Op… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:07.011Z |
| CVE-2001-0851 |
N/A
|
Linux kernel 2.0, 2.2 and 2.4 with syncookies ena… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:06.400Z |
| CVE-2001-0852 |
N/A
|
TUX HTTP server 2.1.0-2 in Red Hat Linux allows r… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:06.651Z |
| CVE-2001-0857 |
N/A
|
Cross-site scripting vulnerability in status.php3… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:06.627Z |
| CVE-2001-0859 |
N/A
|
2.4.3-12 kernel in Red Hat Linux 7.1 Korean insta… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:37:06.738Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2001-0564 |
N/A
|
APC Web/SNMP Management Card prior to Firmware 31… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:21:38.669Z |
| CVE-2001-0568 |
N/A
|
Digital Creations Zope 2.3.1 b1 and earlier allow… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:21:38.664Z |
| CVE-2001-0569 |
N/A
|
Digital Creations Zope 2.3.1 b1 and earlier conta… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:21:38.710Z |
| CVE-2001-0571 |
N/A
|
Directory traversal vulnerability in the web serv… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:21:38.669Z |
| CVE-2001-0572 |
N/A
|
The SSH protocols 1 and 2 (aka SSH-2) as implemen… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:21:38.923Z |
| CVE-2001-0575 |
N/A
|
Buffer overflow in lpshut in SCO OpenServer 5.0.6… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:21:38.618Z |
| CVE-2001-0576 |
N/A
|
lpusers as included with SCO OpenServer 5.0 throu… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:21:38.577Z |
| CVE-2001-0577 |
N/A
|
recon in SCO OpenServer 5.0 through 5.0.6 can all… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:21:38.632Z |
| CVE-2001-0578 |
N/A
|
Buffer overflow in lpforms in SCO OpenServer 5.0-… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:21:38.672Z |
| CVE-2001-0579 |
N/A
|
lpadmin in SCO OpenServer 5.0.6 can allow a local… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:21:38.622Z |
| CVE-2001-0580 |
N/A
|
Hughes Technologies Virtual DNS (VDNS) Server 1.0… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:21:38.579Z |
| CVE-2001-0581 |
N/A
|
Spytech Spynet Chat Server 6.5 allows a remote at… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:21:38.665Z |
| CVE-2001-0582 |
N/A
|
Ben Spink CrushFTP FTP Server 2.1.6 and earlier a… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:21:38.635Z |
| CVE-2001-0583 |
N/A
|
Alt-N Technologies MDaemon 3.5.4 allows a remote … |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:30:04.807Z |
| CVE-2001-0584 |
N/A
|
IMAP server in Alt-N Technologies MDaemon 3.5.6 a… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:30:05.935Z |
| CVE-2001-0585 |
N/A
|
Gordano NTMail 6.0.3c allows a remote attacker to… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:30:05.130Z |
| CVE-2001-0586 |
N/A
|
TrendMicro ScanMail for Exchange 3.5 Evaluation a… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:30:04.873Z |
| CVE-2001-0587 |
N/A
|
deliver program in MMDF 2.43.3b in SCO OpenServer… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:30:04.802Z |
| CVE-2001-0588 |
N/A
|
sendmail 8.9.3, as included with the MMDF 2.43.3b… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:30:05.520Z |
| CVE-2001-0589 |
N/A
|
NetScreen ScreenOS prior to 2.5r6 on the NetScree… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:30:04.842Z |
| CVE-2001-0591 |
N/A
|
Directory traversal vulnerability in Oracle JSP 1… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:30:05.150Z |
| CVE-2001-0593 |
N/A
|
Anaconda Partners Clipper 3.3 and earlier allows … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:30:05.164Z |
| CVE-2001-0605 |
N/A
|
Headlight Software MyGetright prior to 1.0b allow… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:30:05.791Z |
| CVE-2001-0606 |
N/A
|
Vulnerability in iPlanet Web Server 4.X in HP-UX … |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:30:05.971Z |
| CVE-2001-0607 |
N/A
|
asecure as included with HP-UX 10.01 through 11.0… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:30:05.576Z |
| CVE-2001-0608 |
N/A
|
HP architected interface facility (AIF) as includ… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:30:05.251Z |
| CVE-2001-0612 |
N/A
|
McAfee Remote Desktop 3.0 and earlier allows remo… |
n/a |
n/a |
2004-09-01T04:00:00.000Z | 2024-08-08T04:30:05.954Z |
| CVE-2001-0613 |
N/A
|
Omnicron Technologies OmniHTTPD Professional 2.08… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:30:06.045Z |
| CVE-2001-0614 |
N/A
|
Carello E-Commerce 1.2.1 and earlier allows a rem… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:30:05.258Z |
| CVE-2001-0617 |
N/A
|
Allied Telesyn AT-AR220e cable/DSL router firmwar… |
n/a |
n/a |
2001-07-27T04:00:00.000Z | 2024-08-08T04:30:06.058Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-2xpj-f5g2-8p7m |
9.8 (3.1)
9.3 (4.0)
|
Asyncpg Arbitrary Code Execution Via Access to an Uninitialized Pointer | 2021-04-20T16:30:51Z | 2024-09-12T21:06:18Z |
| ghsa-x823-j7c4-vpc5 |
6.1 (3.1)
|
Cross-site scripting in sickrage | 2021-04-20T16:31:43Z | 2024-10-22T16:42:54Z |
| ghsa-rmp7-f2vp-3rq4 |
5.4 (3.1)
|
Cross-site scripting in SiCKRAGE | 2021-04-20T16:31:54Z | 2025-04-30T20:23:25Z |
| ghsa-69q2-p9xp-739v |
9.8 (3.1)
|
Duplicate Advisory: XML Injection in petl | 2021-04-20T16:32:08Z | 2024-10-09T20:47:36Z |
| ghsa-9w8r-397f-prfh |
7.5 (3.1)
8.7 (4.0)
|
Infinite Loop in Pygments | 2021-04-20T16:35:47Z | 2024-10-14T16:12:14Z |
| ghsa-9w49-m7xh-5r39 |
6.1 (3.1)
5.3 (4.0)
|
Cross-site scripting in papermerge | 2021-04-20T16:37:56Z | 2024-10-09T20:17:44Z |
| ghsa-hj5v-574p-mj7c |
7.5 (3.1)
8.7 (4.0)
|
py vulnerable to Regular Expression Denial of Service | 2021-04-20T16:39:57Z | 2025-11-04T16:34:14Z |
| ghsa-86vp-x3pr-79rx |
6.1 (3.1)
|
Apache Airflow cross-site scripting due to incomplete fix for CVE-2020-13944 | 2021-04-20T16:40:14Z | 2024-09-11T17:06:12Z |
| ghsa-7mx5-x372-xh87 |
7.7 (3.1)
8.3 (4.0)
|
Incorrect Session Validation in Apache Airflow | 2021-04-20T16:40:27Z | 2024-09-11T21:25:17Z |
| ghsa-3pqx-4fqf-j49f |
9.8 (3.1)
9.3 (4.0)
|
Deserialization of Untrusted Data in PyYAML | 2021-04-20T16:40:42Z | 2024-10-25T21:15:15Z |
| ghsa-893h-35v4-mxqx |
7.8 (3.1)
8.5 (4.0)
|
Path Traversal in Ansible | 2021-04-20T16:43:33Z | 2024-09-06T17:59:40Z |
| ghsa-j2h6-73x8-22c4 |
5.0 (3.1)
5.1 (4.0)
|
Exposure of Sensitive Information to an Unauthorized Actor in ansible | 2021-04-20T16:43:53Z | 2024-09-11T16:56:33Z |
| ghsa-m429-fhmv-c6q2 |
7.1 (3.1)
6.9 (4.0)
|
Improper Verification of Cryptographic Signature in ansible | 2021-04-20T16:44:07Z | 2024-11-18T16:26:11Z |
| ghsa-gwr8-5j83-483c |
7.3 (3.1)
8.3 (4.0)
|
OS Command Injection and Improper Input Validation in ansible | 2021-04-20T16:44:22Z | 2024-09-06T20:14:42Z |
| ghsa-3c67-gc48-983w |
5.2 (3.1)
4.8 (4.0)
|
Path Traversal in Ansible | 2021-04-20T16:44:37Z | 2024-09-04T20:57:28Z |
| ghsa-frxj-5j27-f8rf |
5.6 (3.1)
7.0 (4.0)
|
Externally Controlled Reference to a Resource in Another Sphere, Improper Input Validation, and Ext… | 2021-04-20T16:44:49Z | 2024-11-18T16:26:11Z |
| ghsa-g4mq-6fp5-qwcf |
5.0 (3.1)
1.0 (4.0)
|
Ansible vulnerable to Exposure of Resource to Wrong Sphere and Insecure Temporary File | 2021-04-20T16:46:12Z | 2024-11-18T16:26:12Z |
| ghsa-7jgj-8wvc-jh57 |
7.5 (3.1)
|
.NET Core Information Disclosure | 2021-04-21T19:16:06Z | 2021-04-21T19:15:50Z |
| ghsa-ghhp-997w-qr28 |
9.8 (3.1)
|
.NET Core Remote Code Execution Vulnerability | 2021-04-21T19:38:01Z | 2021-04-21T19:37:39Z |
| ghsa-2fw4-mgq9-39cx |
7.5 (3.1)
|
Code Injection in oauth2-server | 2021-04-22T15:53:45Z | 2021-04-21T21:15:38Z |
| ghsa-m496-x567-f98c |
9.8 (3.1)
|
Fixes a bug in Zend Framework's Stream HTTP Wrapper | 2021-04-22T16:10:49Z | 2021-04-30T20:19:58Z |
| ghsa-fvrf-9428-527m |
9.1 (3.1)
|
Backport for CVE-2021-21024 Blind SQLi from Magento 2 | 2021-04-22T16:11:01Z | 2021-04-30T20:20:59Z |
| ghsa-mr8h-j9cv-4m8h |
6.3 (3.1)
|
Server session is not invalidated when logout() helper method of Authentication module is used in V… | 2021-04-22T16:11:17Z | 2021-04-22T14:30:10Z |
| ghsa-6hgr-2g6q-3rmc |
6.3 (3.1)
|
Server session is not invalidated when logout() helper method of Authentication module is used in V… | 2021-04-22T16:11:26Z | 2021-10-08T21:22:21Z |
| ghsa-5c66-v29h-xjh8 |
9.6 (3.1)
|
XSS Cross Site Scripting | 2021-04-22T16:11:55Z | 2021-04-20T18:36:33Z |
| ghsa-7cj4-gj8m-m2f7 |
9.8 (3.1)
|
Authentication bypass in Apache Shiro | 2021-04-22T16:13:23Z | 2021-08-31T21:06:39Z |
| ghsa-hxp5-8pgq-mgv9 |
5.9 (3.1)
|
Missing Authentication for Critical Function in Apache Calcite | 2021-04-22T16:14:14Z | 2021-04-21T20:27:19Z |
| ghsa-qq48-m4jx-xqh8 |
8.1 (3.1)
|
"Deserialization errors in MyBatis" | 2021-04-22T16:14:38Z | 2021-04-21T19:54:50Z |
| ghsa-c6p9-24rc-jr5h |
4.7 (3.1)
|
Remote Code Execution and download tracking in Mintegral SDK | 2021-04-22T16:15:15Z | 2021-04-21T19:02:43Z |
| ghsa-64x2-gq24-75pv |
6.1 (3.1)
|
Cross-site scripting in Apache CXF | 2021-04-22T16:15:23Z | 2021-04-20T22:19:53Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-212 | Malicious code in @dsgn-sys/editor-elements-corvid-utils (npm) | 2022-06-20T20:21:23Z | 2022-06-20T20:21:24Z |
| mal-2022-213 | Malicious code in @dsgn-sys/editor-elements-design-systems (npm) | 2022-06-20T20:21:23Z | 2022-06-20T20:21:23Z |
| mal-2022-726 | Malicious code in @wix-ui/editor-elements (npm) | 2022-06-20T20:21:23Z | 2022-06-20T20:21:24Z |
| mal-2022-727 | Malicious code in @wix-ui/editor-elements-corvid-utils (npm) | 2022-06-20T20:21:23Z | 2022-06-20T20:21:23Z |
| mal-2022-214 | Malicious code in @dsgnsys/editor-elements (npm) | 2022-06-20T20:21:24Z | 2022-06-20T20:21:25Z |
| mal-2022-5351 | Malicious code in pkg_test_poc_mm (npm) | 2022-06-20T20:21:24Z | 2022-06-20T20:21:25Z |
| mal-2022-5352 | Malicious code in pkg_test_poc_mm_dep (npm) | 2022-06-20T20:21:24Z | 2022-06-20T20:21:25Z |
| mal-2022-730 | Malicious code in @wixui/editor-elements-corvid-utils (npm) | 2022-06-20T20:21:24Z | 2022-06-20T20:21:24Z |
| mal-2022-2947 | Malicious code in exwc-ui (npm) | 2022-06-20T20:21:25Z | 2022-06-20T20:21:26Z |
| mal-2022-3654 | Malicious code in holvi-auth (npm) | 2022-06-20T20:21:25Z | 2022-06-20T20:21:26Z |
| mal-2022-3655 | Malicious code in holvi-message-codes (npm) | 2022-06-20T20:21:25Z | 2022-06-20T20:21:25Z |
| mal-2022-3658 | Malicious code in holvitwbs (npm) | 2022-06-20T20:21:25Z | 2022-06-20T20:21:26Z |
| mal-2022-6260 | Malicious code in spotify-playback (npm) | 2022-06-20T20:21:25Z | 2022-06-20T20:21:26Z |
| mal-2022-836 | Malicious code in activecore-react-ui-kit (npm) | 2022-06-20T20:21:26Z | 2022-06-20T20:21:26Z |
| mal-2022-849 | Malicious code in adc-session-id (npm) | 2022-06-20T20:21:26Z | 2022-06-20T20:21:27Z |
| mal-2022-850 | Malicious code in adc-ui-components (npm) | 2022-06-20T20:21:26Z | 2022-06-20T20:21:27Z |
| mal-2022-201 | Malicious code in @devcrypto/hdwallet-provider (npm) | 2022-06-20T20:21:27Z | 2022-06-20T20:21:27Z |
| mal-2022-697 | Malicious code in @unpkg-semver/wix-recorder (npm) | 2022-06-20T20:21:27Z | 2022-06-20T20:21:28Z |
| mal-2022-7163 | Malicious code in wix-chatbot-common (npm) | 2022-06-20T20:21:27Z | 2022-06-20T20:21:28Z |
| mal-2022-7175 | Malicious code in wix-react-dealer-viewer (npm) | 2022-06-20T20:21:27Z | 2022-06-20T20:21:27Z |
| mal-2022-848 | Malicious code in adc-harness-state (npm) | 2022-06-20T20:21:27Z | 2022-06-20T20:21:27Z |
| mal-2022-1649 | Malicious code in bootstrap-base-design (npm) | 2022-06-20T20:21:28Z | 2022-06-20T20:21:29Z |
| mal-2022-1651 | Malicious code in bootstrap-base-nabtrade-design (npm) | 2022-06-20T20:21:28Z | 2022-06-20T20:21:29Z |
| mal-2022-2126 | Malicious code in common-xc-frontend (npm) | 2022-06-20T20:21:28Z | 2022-06-20T20:21:29Z |
| mal-2022-696 | Malicious code in @unpkg-semver/pedops-logger (npm) | 2022-06-20T20:21:28Z | 2022-06-20T20:21:28Z |
| mal-2022-1650 | Malicious code in bootstrap-base-managed-designs (npm) | 2022-06-20T20:21:29Z | 2022-06-20T20:21:29Z |
| mal-2022-1652 | Malicious code in bootstrap-nabtraderedesign (npm) | 2022-06-20T20:21:29Z | 2022-06-20T20:21:29Z |
| mal-2022-447 | Malicious code in @nab-trade/mnt-prod (npm) | 2022-06-20T20:21:29Z | 2022-06-20T20:21:30Z |
| mal-2022-4781 | Malicious code in nab-trade (npm) | 2022-06-20T20:21:29Z | 2022-06-20T20:21:30Z |
| mal-2022-146 | Malicious code in @bootstrap-base-design/bootstrap-base (npm) | 2022-06-20T20:21:30Z | 2022-06-20T20:21:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-1863 | vm2: Schwachstelle ermöglicht Codeausführung | 2023-07-23T22:00:00.000+00:00 | 2023-09-05T22:00:00.000+00:00 |
| wid-sec-w-2023-1864 | Gitea: Schwachstelle ermöglicht Codeausführung | 2023-07-23T22:00:00.000+00:00 | 2023-07-23T22:00:00.000+00:00 |
| wid-sec-w-2023-1865 | Linux Kernel: Mehrere Schwachstellen | 2023-07-23T22:00:00.000+00:00 | 2025-10-19T22:00:00.000+00:00 |
| wid-sec-w-2023-1866 | Mozilla Thunderbird: Mehrere Schwachstellen | 2023-07-23T22:00:00.000+00:00 | 2024-02-18T23:00:00.000+00:00 |
| wid-sec-w-2023-1867 | ESRI ArcGIS: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2023-07-23T22:00:00.000+00:00 | 2023-07-23T22:00:00.000+00:00 |
| wid-sec-w-2023-1868 | Apache Kafka: Schwachstelle ermöglicht Denial of Service | 2023-07-23T22:00:00.000+00:00 | 2024-09-19T22:00:00.000+00:00 |
| wid-sec-w-2023-1871 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2023-07-24T22:00:00.000+00:00 | 2024-12-16T23:00:00.000+00:00 |
| wid-sec-w-2023-1872 | libvirt: Schwachstelle ermöglicht Denial of Service | 2023-07-24T22:00:00.000+00:00 | 2024-12-10T23:00:00.000+00:00 |
| wid-sec-w-2023-1873 | AMD Prozessor: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-07-24T22:00:00.000+00:00 | 2025-02-16T23:00:00.000+00:00 |
| wid-sec-w-2023-1874 | Apple iOS: Mehrere Schwachstellen | 2023-07-24T22:00:00.000+00:00 | 2024-01-18T23:00:00.000+00:00 |
| wid-sec-w-2023-1875 | Apple Safari: Mehrere Schwachstellen | 2023-07-24T22:00:00.000+00:00 | 2023-07-24T22:00:00.000+00:00 |
| wid-sec-w-2023-1876 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation oder Denial of Service | 2023-07-24T22:00:00.000+00:00 | 2024-04-23T22:00:00.000+00:00 |
| wid-sec-w-2023-1877 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-07-24T22:00:00.000+00:00 | 2024-07-18T22:00:00.000+00:00 |
| wid-sec-w-2023-1878 | TYPO3 Core: Mehrere Schwachstellen | 2023-07-24T22:00:00.000+00:00 | 2023-07-25T22:00:00.000+00:00 |
| wid-sec-w-2023-1879 | Ivanti Endpoint Manager Mobile: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-07-24T22:00:00.000+00:00 | 2023-07-25T22:00:00.000+00:00 |
| wid-sec-w-2023-1880 | Apple macOS: Mehrere Schwachstellen | 2023-07-24T22:00:00.000+00:00 | 2023-09-11T22:00:00.000+00:00 |
| wid-sec-w-2023-1881 | libTIFF: Schwachstelle ermöglicht Denial of Service | 2023-07-25T22:00:00.000+00:00 | 2025-06-30T22:00:00.000+00:00 |
| wid-sec-w-2023-1882 | Linux Kernel: Mehrere Schwachstellen | 2023-07-25T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2023-1883 | Apache Jackrabbit Oak: Schwachstelle ermöglicht Codeausführung | 2023-07-25T22:00:00.000+00:00 | 2023-07-25T22:00:00.000+00:00 |
| wid-sec-w-2023-1884 | Aruba ArubaOS: Mehrere Schwachstellen | 2023-07-25T22:00:00.000+00:00 | 2023-07-25T22:00:00.000+00:00 |
| wid-sec-w-2023-1886 | Sophos Unified Threat Management (UTM) Software: Mehrere Schwachstellen | 2023-07-25T22:00:00.000+00:00 | 2024-06-26T22:00:00.000+00:00 |
| wid-sec-w-2023-1887 | Paessler PRTG: Mehrere Schwachstellen | 2023-07-25T22:00:00.000+00:00 | 2023-08-03T22:00:00.000+00:00 |
| wid-sec-w-2023-1888 | Trellix ePolicy Orchestrator: Schwachstelle ermöglicht Cross-Site Scripting | 2023-07-25T22:00:00.000+00:00 | 2023-07-25T22:00:00.000+00:00 |
| wid-sec-w-2023-1889 | SolarWinds Platform: Mehrere Schwachstellen | 2023-07-25T22:00:00.000+00:00 | 2023-07-25T22:00:00.000+00:00 |
| wid-sec-w-2023-1890 | SolarWinds Platform: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-07-25T22:00:00.000+00:00 | 2023-07-25T22:00:00.000+00:00 |
| wid-sec-w-2023-1891 | Microsoft GitHub Enterprise: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-07-25T22:00:00.000+00:00 | 2023-07-25T22:00:00.000+00:00 |
| wid-sec-w-2023-1892 | Mattermost: Schwachstelle ermöglicht Denial of Service | 2023-07-26T22:00:00.000+00:00 | 2023-08-27T22:00:00.000+00:00 |
| wid-sec-w-2023-1893 | Octopus Deploy: Mehrere Schwachstellen | 2023-07-26T22:00:00.000+00:00 | 2023-07-26T22:00:00.000+00:00 |
| wid-sec-w-2023-1894 | Foxit Reader: Mehrere Schwachstellen ermöglichen Codeausführung | 2023-07-26T22:00:00.000+00:00 | 2023-07-26T22:00:00.000+00:00 |
| wid-sec-w-2023-1895 | Synology Router Manager: Mehrere Schwachstellen | 2023-07-26T22:00:00.000+00:00 | 2023-07-26T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-26-027-03 | Schneider Electric Zigbee Products | 2026-01-13T08:00:00.000000Z | 2026-01-27T20:13:34.637968Z |
| icsa-26-083-03 | "Schneider Electric Plant iT/Brewmaxx" | 2026-01-13T08:00:00.000000Z | 2026-03-24T06:00:00.000000Z |
| icsa-26-015-01 | AVEVA Process Optimization | 2026-01-15T07:00:00.000000Z | 2026-01-15T07:00:00.000000Z |
| va-26-015-01 | NOAA PMEL Live Access Server (LAS) command injection | 2026-01-15T19:59:37Z | 2026-01-15T19:59:37Z |
| icsa-26-120-04 | ABB Ability OPTIMAX | 2026-01-16T00:30:00.000000Z | 2026-04-30T06:00:00.000000Z |
| icsa-26-020-03 | Rockwell Automation Verve Asset Manager | 2026-01-20T07:00:00.000000Z | 2026-01-20T07:00:00.000000Z |
| icsa-26-022-02 | AutomationDirect CLICK Programmable Logic Controller | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-03 | Rockwell Automation CompactLogix 5370 | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-04 | Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-05 | Weintek cMT X Series HMI EasyWeb Service | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-06 | Hubitat Elevation Hubs | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-07 | Delta Electronics DIAView | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-022-08 | EVMAPA | 2026-01-22T07:00:00.000000Z | 2026-01-22T07:00:00.000000Z |
| icsa-26-036-05 | Hitachi Energy XMC20 | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-06 | Hitachi Energy FOX61x | 2026-01-27T00:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-043-09 | Hitachi Energy SuprOS | 2026-01-27T00:00:00.000000Z | 2026-02-12T07:00:00.000000Z |
| icsa-26-027-01 | iba Systems ibaPDA | 2026-01-27T07:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-027-04 | Johnson Controls Metasys Products | 2026-01-27T07:00:00.000000Z | 2026-01-27T07:00:00.000000Z |
| icsa-26-043-06 | Siemens SINEC OS | 2026-01-28T00:00:00.000000Z | 2026-02-25T07:00:00.000000Z |
| icsa-26-029-01 | KiloView Encoder Series (Update A) | 2026-01-29T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-029-02 | Rockwell Automation ArmorStart LT | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-029-03 | Rockwell Automation ControlLogix | 2026-01-29T07:00:00.000000Z | 2026-01-29T07:00:00.000000Z |
| icsa-26-034-01 | Mitsubishi Electric FREQSHIP-mini for Windows | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-02 | *Avation Light Engine Pro * | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-03 | RISS SRL MOMA Seismic Station | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-034-04 | Synectix LAN 232 TRIO | 2026-02-03T07:00:00.000000Z | 2026-02-03T07:00:00.000000Z |
| icsa-26-036-01 | TP-Link Systems Inc. VIGI Series IP Camera | 2026-02-05T06:00:00.000000Z | 2026-02-11T06:00:00.000000Z |
| icsa-26-036-02 | Mitsubishi Electric MELSEC iQ-R Series | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-03 | o6 Automation GmbH Open62541 | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| icsa-26-036-04 | Ilevia EVE X1 Server | 2026-02-05T07:00:00.000000Z | 2026-02-05T07:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-4543 | A flaw named "EntryBleed" was found in the Linux Kernel Page Table Isolation (KPTI). This issue could allow a local attacker to leak KASLR base via prefetch side-channels based on TLB timing for Intel systems. | 2023-01-04T00:00:00.000Z | 2026-04-29T14:38:18.000Z |
| msrc_cve-2022-45639 | OS Command injection vulnerability in sleuthkit fls tool 4.11.1 allows attackers to execute arbitrary commands via a crafted value to the m parameter. NOTE: third parties have disputed this because there is no analysis showing that the backtick command executes outside the context of the user account that entered the command line. | 2023-01-04T00:00:00.000Z | 2026-02-18T02:04:06.000Z |
| msrc_cve-2022-46176 | Cargo did not verify SSH host keys | 2023-01-04T00:00:00.000Z | 2026-02-21T03:58:33.000Z |
| msrc_cve-2022-46456 | NASM v2.16 was discovered to contain a global buffer overflow in the component dbgdbg_typevalue at /output/outdbg.c. | 2023-01-04T00:00:00.000Z | 2026-03-31T14:39:19.000Z |
| msrc_cve-2022-46457 | NASM v2.16 was discovered to contain a segmentation violation in the component ieee_write_file at /output/outieee.c. | 2023-01-04T00:00:00.000Z | 2026-02-18T03:09:19.000Z |
| msrc_cve-2022-4696 | There exists a use-after-free vulnerability in the Linux kernel through io_uring and the IORING_OP_SPLICE operation. If IORING_OP_SPLICE is missing the IO_WQ_WORK_FILES flag which signals that the operation won't use current->nsproxy so its reference counter is not increased. This assumption is not always true as calling io_splice on specific files will call the get_uts function which will use current->nsproxy leading to invalidly decreasing its reference counter later causing the use-after-free vulnerability. We recommend upgrading to version 5.10.160 or above | 2023-01-04T00:00:00.000Z | 2023-06-13T00:00:00.000Z |
| msrc_cve-2022-47015 | MariaDB Server before 10.3.34 thru 10.9.3 is vulnerable to Denial of Service. It is possible for function spider_db_mbase::print_warnings to dereference a null pointer. | 2023-01-04T00:00:00.000Z | 2025-10-01T23:11:26.000Z |
| msrc_cve-2022-47021 | A null pointer dereference issue was discovered in functions op_get_data and op_open1 in opusfile.c in xiph opusfile 0.9 thru 0.12 allows attackers to cause denial of service or other unspecified impacts. | 2023-01-04T00:00:00.000Z | 2025-10-01T23:11:27.000Z |
| msrc_cve-2022-47929 | In the Linux kernel before 6.1.6 a NULL pointer dereference bug in the traffic control subsystem allows an unprivileged user to trigger a denial of service (system crash) via a crafted traffic control configuration that is set up with "tc qdisc" and "tc class" commands. This affects qdisc_graft in net/sched/sch_api.c. | 2023-01-04T00:00:00.000Z | 2023-01-30T00:00:00.000Z |
| msrc_cve-2022-48281 | processCropSelections in tools/tiffcrop.c in LibTIFF through 4.5.0 has a heap-based buffer overflow (e.g. "WRITE of size 307203") via a crafted TIFF image. | 2023-01-04T00:00:00.000Z | 2023-01-31T00:00:00.000Z |
| msrc_cve-2022-48285 | loadAsync in JSZip before 3.8.0 allows Directory Traversal via a crafted ZIP archive. | 2023-01-04T00:00:00.000Z | 2026-02-19T01:17:16.000Z |
| msrc_cve-2022-48303 | GNU Tar through 1.34 has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump | 2023-01-04T00:00:00.000Z | 2026-02-18T02:24:17.000Z |
| msrc_cve-2023-0049 | Out-of-bounds Read in vim/vim | 2023-01-04T00:00:00.000Z | 2023-01-12T00:00:00.000Z |
| msrc_cve-2023-0051 | Heap-based Buffer Overflow in vim/vim | 2023-01-04T00:00:00.000Z | 2023-01-12T00:00:00.000Z |
| msrc_cve-2023-0054 | Out-of-bounds Write in vim/vim | 2023-01-04T00:00:00.000Z | 2023-01-12T00:00:00.000Z |
| msrc_cve-2023-0266 | Use after free in SNDRV_CTL_IOCTL_ELEM in Linux Kernel | 2023-01-04T00:00:00.000Z | 2023-02-07T00:00:00.000Z |
| msrc_cve-2023-0288 | Heap-based Buffer Overflow in vim/vim | 2023-01-04T00:00:00.000Z | 2023-01-20T00:00:00.000Z |
| msrc_cve-2023-0394 | A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash. | 2023-01-04T00:00:00.000Z | 2023-02-02T00:00:00.000Z |
| msrc_cve-2023-0433 | Heap-based Buffer Overflow in vim/vim | 2023-01-04T00:00:00.000Z | 2023-01-31T00:00:00.000Z |
| msrc_cve-2023-0468 | A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition of poll_refs. This flaw may cause a NULL pointer dereference. | 2023-01-04T00:00:00.000Z | 2023-02-02T00:00:00.000Z |
| msrc_cve-2023-0469 | A use-after-free flaw was found in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent in the Linux Kernel during call cleanup. This flaw may lead to a denial of service. | 2023-01-04T00:00:00.000Z | 2023-02-02T00:00:00.000Z |
| msrc_cve-2023-0512 | Divide By Zero in vim/vim | 2023-01-04T00:00:00.000Z | 2023-02-07T00:00:00.000Z |
| msrc_cve-2023-21830 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf; Oracle GraalVM Enterprise Edition: 20.3.8 and 21.3.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code | 2023-01-04T00:00:00.000Z | 2025-10-01T23:11:28.000Z |
| msrc_cve-2023-21843 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Sound). Supported versions that are affected are Oracle Java SE: 8u351, 8u351-perf, 11.0.17, 17.0.5, 19.0.1; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run on | 2023-01-04T00:00:00.000Z | 2025-10-01T23:11:28.000Z |
| msrc_cve-2023-21875 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.31 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H). | 2023-01-04T00:00:00.000Z | 2023-01-25T00:00:00.000Z |
| msrc_cve-2023-21876 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2023-01-04T00:00:00.000Z | 2023-01-25T00:00:00.000Z |
| msrc_cve-2023-21877 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2023-01-04T00:00:00.000Z | 2023-01-25T00:00:00.000Z |
| msrc_cve-2023-21878 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2023-01-04T00:00:00.000Z | 2023-01-25T00:00:00.000Z |
| msrc_cve-2023-21879 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2023-01-04T00:00:00.000Z | 2023-01-25T00:00:00.000Z |
| msrc_cve-2023-21880 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.31 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2023-01-04T00:00:00.000Z | 2023-01-26T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:10217-1 | libqpid-proton-cpp6-0.12.2-1.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10218-1 | seamonkey-2.40-6.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10219-1 | jakarta-taglibs-standard-1.1.1-257.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10220-1 | charybdis-3.5.3-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10221-1 | file-5.29-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10222-1 | ocaml-4.03.0-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10223-1 | python-pyramid-1.6-1.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10224-1 | libvdpau-devel-1.1.1-1.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10225-1 | dracut-044-17.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10226-1 | python-pymongo-3.1.1-1.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10227-1 | libopenjpeg1-1.5.2-4.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10228-1 | python-libxml2-2.9.4-1.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10229-1 | gdk-pixbuf-loader-rsvg-2.40.16-1.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10230-1 | MozillaThunderbird-45.5.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10231-1 | logrotate-3.10.0-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10232-1 | perl-PAR-1.011-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10233-1 | qemu-2.6.1-1.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10234-1 | gvim-8.0.130-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10235-1 | w3m-0.5.3.git20161120-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10236-1 | libevent-2_0-5-2.0.22-2.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10237-1 | fence-agents-4.0.24+git.1480563949.e67fcd4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10238-1 | konversation-1.6.2-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10239-1 | perl-LWP-Protocol-https-6.06-1.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10240-1 | exif-0.6.21-8.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10241-1 | libpulse-devel-32bit-9.0-2.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10242-1 | graphite2-1.3.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10243-1 | ffmpeg-3.2.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10244-1 | accountsservice-0.6.43-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10245-1 | kvirc-4.2.0-6.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10246-1 | libpcsclite1-1.8.18-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2013:1806 | Red Hat Security Advisory: samba and samba3x security update | 2013-12-10T00:15:00+00:00 | 2025-11-21T17:46:24+00:00 |
| rhsa-2013:1814 | Red Hat Security Advisory: php security update | 2013-12-11T02:24:00+00:00 | 2026-01-28T22:37:52+00:00 |
| rhsa-2013:1813 | Red Hat Security Advisory: php53 and php security update | 2013-12-11T02:34:00+00:00 | 2026-01-28T22:37:51+00:00 |
| rhsa-2013:1815 | Red Hat Security Advisory: php security update | 2013-12-11T03:44:00+00:00 | 2026-01-28T22:37:55+00:00 |
| rhsa-2013:1812 | Red Hat Security Advisory: firefox security update | 2013-12-11T05:26:00+00:00 | 2026-01-13T22:12:19+00:00 |
| rhsa-2013:1818 | Red Hat Security Advisory: flash-plugin security update | 2013-12-11T09:14:00+00:00 | 2025-11-21T17:46:27+00:00 |
| rhsa-2013:1825 | Red Hat Security Advisory: php53 security update | 2013-12-11T16:06:00+00:00 | 2026-01-28T22:37:53+00:00 |
| rhsa-2013:1824 | Red Hat Security Advisory: php security update | 2013-12-11T16:29:00+00:00 | 2026-01-28T22:37:53+00:00 |
| rhsa-2013:1823 | Red Hat Security Advisory: thunderbird security update | 2013-12-11T17:22:00+00:00 | 2026-01-13T22:22:49+00:00 |
| rhsa-2013:1826 | Red Hat Security Advisory: php security update | 2013-12-12T03:48:00+00:00 | 2026-01-28T22:37:53+00:00 |
| rhsa-2013:1802 | Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update | 2013-12-12T18:52:00+00:00 | 2026-01-13T22:11:44+00:00 |
| rhsa-2013:1829 | Red Hat Security Advisory: nss, nspr, and nss-util security update | 2013-12-12T18:56:00+00:00 | 2025-11-21T17:46:31+00:00 |
| rhsa-2013:1801 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | 2013-12-12T19:13:00+00:00 | 2026-01-13T22:35:22+00:00 |
| rhsa-2013:1842 | Red Hat Security Advisory: nodejs010-nodejs security update | 2013-12-16T18:12:00+00:00 | 2025-11-21T17:46:34+00:00 |
| rhsa-2013:1843 | Red Hat Security Advisory: Red Hat JBoss Portal 6.1.0 security update | 2013-12-16T18:15:00+00:00 | 2025-11-21T17:46:36+00:00 |
| rhsa-2013:1844 | Red Hat Security Advisory: Red Hat JBoss Web Framework Kit 2.4.0 update | 2013-12-16T18:16:00+00:00 | 2025-11-21T17:46:36+00:00 |
| rhsa-2013:1840 | Red Hat Security Advisory: nss security update | 2013-12-16T18:18:00+00:00 | 2025-11-21T17:46:32+00:00 |
| rhsa-2013:1841 | Red Hat Security Advisory: nss security update | 2013-12-16T18:18:00+00:00 | 2025-11-21T17:46:34+00:00 |
| rhsa-2013:1851 | Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.4 security update | 2013-12-17T18:28:00+00:00 | 2025-11-21T17:46:37+00:00 |
| rhsa-2013:1850 | Red Hat Security Advisory: openjpeg security update | 2013-12-17T18:29:00+00:00 | 2026-01-13T22:40:05+00:00 |
| rhsa-2013:1852 | Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.4 security update | 2013-12-17T18:29:00+00:00 | 2026-03-13T01:03:46+00:00 |
| rhsa-2013:1853 | Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.0 update | 2013-12-17T18:30:00+00:00 | 2026-01-28T22:35:02+00:00 |
| rhsa-2013:1860 | Red Hat Security Advisory: kernel security and bug fix update | 2013-12-19T21:22:00+00:00 | 2025-11-21T17:46:42+00:00 |
| rhsa-2013:1862 | Red Hat Security Advisory: Fuse ESB Enterprise/Fuse MQ Enterprise 7.1.0 update | 2013-12-19T22:49:00+00:00 | 2026-01-28T22:54:28+00:00 |
| rhsa-2013:1861 | Red Hat Security Advisory: nss security update | 2013-12-19T22:53:00+00:00 | 2025-11-21T17:46:39+00:00 |
| rhsa-2013:1863 | Red Hat Security Advisory: candlepin security update | 2013-12-19T22:54:00+00:00 | 2026-01-13T22:36:02+00:00 |
| rhsa-2013:1864 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.3 Extended Update Support 6-Month Notice | 2013-12-19T22:56:00+00:00 | 2025-11-21T17:46:41+00:00 |
| rhsa-2013:1865 | Red Hat Security Advisory: Red Hat Enterprise Linux 3 Extended Lifecycle Support 1-month Notice | 2013-12-19T22:57:00+00:00 | 2025-11-21T17:46:42+00:00 |
| rhsa-2013:1866 | Red Hat Security Advisory: ca-certificates security update | 2013-12-20T00:45:00+00:00 | 2025-11-21T17:46:42+00:00 |
| rhsa-2013:1869 | Red Hat Security Advisory: pixman security update | 2013-12-20T10:42:00+00:00 | 2025-11-21T17:46:43+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2018:3506-1 | Security update for audiofile | 2018-10-26T14:12:41Z | 2018-10-26T14:12:41Z |
| suse-su-2018:3540-1 | Security update for openssh | 2018-10-29T05:47:11Z | 2018-10-29T05:47:11Z |
| suse-su-2018:3542-1 | Security update for mysql | 2018-10-29T05:47:55Z | 2018-10-29T05:47:55Z |
| suse-su-2018:3545-1 | Security update for lcms2 | 2018-10-29T09:59:03Z | 2018-10-29T09:59:03Z |
| suse-su-2018:3553-1 | Security update for python-cryptography | 2018-10-29T16:28:06Z | 2018-10-29T16:28:06Z |
| suse-su-2018:3549-1 | Security update for python-Django | 2018-10-29T16:28:17Z | 2018-10-29T16:28:17Z |
| suse-su-2018:3555-1 | Security update for qemu | 2018-10-29T16:28:31Z | 2018-10-29T16:28:31Z |
| suse-su-2018:3554-1 | Security update for python, python-base | 2018-10-29T16:29:09Z | 2018-10-29T16:29:09Z |
| suse-su-2018:3563-1 | Security update for ardana-monasca, ardana-spark, kafka, kafka-kit, openstack-monasca-api | 2018-10-30T06:10:54Z | 2018-10-30T06:10:54Z |
| suse-su-2018:3572-1 | Security update for apache2-mod_nss | 2018-10-30T12:31:24Z | 2018-10-30T12:31:24Z |
| suse-su-2018:3571-1 | Security update for libarchive | 2018-10-30T13:43:04Z | 2018-10-30T13:43:04Z |
| suse-su-2018:3582-1 | Security update for apache2 | 2018-10-30T16:21:13Z | 2018-10-30T16:21:13Z |
| suse-su-2018:3588-1 | Security update for audiofile | 2018-10-31T09:45:48Z | 2018-10-31T09:45:48Z |
| suse-su-2018:3587-1 | Security update for ntfs-3g_ntfsprogs | 2018-10-31T09:49:46Z | 2018-10-31T09:49:46Z |
| suse-su-2018:3593-1 | Security update for the Linux Kernel | 2018-10-31T13:44:37Z | 2018-10-31T13:44:37Z |
| suse-su-2018:3589-1 | Security update for the Linux Kernel | 2018-10-31T13:44:41Z | 2018-10-31T13:44:41Z |
| suse-su-2018:3590-1 | Security update for wireshark | 2018-10-31T14:02:45Z | 2018-10-31T14:02:45Z |
| suse-su-2018:3591-1 | Security update for MozillaFirefox, MozillaFirefox-branding-SLE, llvm4, mozilla-nspr, mozilla-nss, apache2-mod_nss | 2018-10-31T14:04:14Z | 2018-10-31T14:04:14Z |
| suse-su-2018:3607-1 | Security update for curl | 2018-11-02T16:09:34Z | 2018-11-02T16:09:34Z |
| suse-su-2018:3608-1 | Security update for curl | 2018-11-02T16:09:57Z | 2018-11-02T16:09:57Z |
| suse-su-2018:3606-1 | Security update for soundtouch | 2018-11-02T16:10:21Z | 2018-11-02T16:10:21Z |
| suse-su-2018:3610-1 | Security update for soundtouch | 2018-11-02T16:10:34Z | 2018-11-02T16:10:34Z |
| suse-su-2018:3609-1 | Security update for ffmpeg | 2018-11-02T16:11:02Z | 2018-11-02T16:11:02Z |
| suse-su-2018:3618-1 | Security update for the Linux Kernel | 2018-11-05T12:59:04Z | 2018-11-05T12:59:04Z |
| suse-su-2018:3624-1 | Security update for curl | 2018-11-05T16:55:38Z | 2018-11-05T16:55:38Z |
| suse-su-2018:3625-1 | Security update for accountsservice | 2018-11-05T16:56:21Z | 2018-11-05T16:56:21Z |
| suse-su-2018:3620-1 | Security update for icinga | 2018-11-05T16:57:03Z | 2018-11-05T16:57:03Z |
| suse-su-2018:3629-1 | Security update for opensc | 2018-11-05T16:57:43Z | 2018-11-05T16:57:43Z |
| suse-su-2018:3622-1 | Security update for opensc | 2018-11-05T16:58:25Z | 2018-11-05T16:58:25Z |
| suse-su-2018:3621-1 | Security update for opensc | 2018-11-05T16:59:27Z | 2018-11-05T16:59:27Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2025-131 | Heap-buffer-overflow in vips_foreign_save_heif_write_block | 2025-02-16T00:13:44.282887Z | 2025-03-18T00:32:21.245932Z |
| osv-2025-132 | Heap-use-after-free in netsnmp_hex_to_binary | 2025-02-17T00:01:01.920904Z | 2025-03-18T00:33:26.648884Z |
| osv-2025-133 | Stack-buffer-overflow in se_read_conf | 2025-02-17T00:02:18.986364Z | 2025-03-18T00:27:33.917908Z |
| osv-2025-145 | Heap-buffer-overflow in ___interceptor_strncat | 2025-02-22T00:14:15.620085Z | 2025-02-22T00:14:15.620535Z |
| osv-2025-147 | UNKNOWN WRITE in ndpi_free_flow_data | 2025-02-22T00:18:07.814416Z | 2025-02-22T00:18:07.814726Z |
| osv-2025-148 | Heap-buffer-overflow in setup_engineID | 2025-02-23T00:00:36.951152Z | 2025-03-18T00:22:22.817245Z |
| osv-2025-149 | UNKNOWN READ in processClientServerHello | 2025-02-23T00:00:50.236281Z | 2025-02-23T00:00:50.236700Z |
| osv-2025-154 | UNKNOWN READ in ndpi_strdup | 2025-02-23T00:13:05.487818Z | 2025-02-23T00:13:05.488183Z |
| osv-2025-156 | Check failed in CheckUnwind | 2025-02-23T00:16:50.073196Z | 2025-02-23T00:16:50.073520Z |
| osv-2025-160 | UNKNOWN WRITE in ndpi_free_flow_data | 2025-02-24T00:07:49.495615Z | 2025-02-24T00:07:49.495976Z |
| osv-2025-161 | Heap-buffer-overflow in se_add_pair | 2025-02-24T00:15:33.662895Z | 2025-03-18T00:37:12.676515Z |
| osv-2025-162 | Heap-buffer-overflow in snmp_in_options | 2025-02-24T00:15:40.967551Z | 2025-03-18T00:30:24.116747Z |
| osv-2025-165 | Index-out-of-bounds in dwg_decode_eed | 2025-02-26T00:17:27.930225Z | 2025-02-26T00:17:27.930707Z |
| osv-2025-169 | Stack-buffer-overflow in utf8_in2 | 2025-02-27T00:07:08.029075Z | 2026-03-21T14:18:54.197384Z |
| osv-2025-173 | UNKNOWN READ in chunk_obj_alloc | 2025-02-28T00:11:40.566459Z | 2025-02-28T00:11:40.566797Z |
| osv-2025-174 | Heap-use-after-free in gc_trace | 2025-02-28T00:12:25.140274Z | 2025-02-28T00:12:25.140618Z |
| osv-2025-175 | UNKNOWN READ in insert_free | 2025-02-28T00:12:26.919208Z | 2025-02-28T00:12:26.919553Z |
| osv-2025-177 | Segv on unknown address in chunk_free_object | 2025-02-28T00:16:24.018716Z | 2025-02-28T00:16:24.019131Z |
| osv-2025-178 | Heap-buffer-overflow in usm_set_user_password | 2025-02-28T00:16:54.655227Z | 2025-02-28T00:16:54.655745Z |
| osv-2025-190 | Heap-buffer-overflow in std::__1::__function::__func<cv::PngDecoder::compose_frame | 2025-03-11T00:04:32.361664Z | 2025-03-11T00:04:32.362119Z |
| osv-2025-202 | UNKNOWN READ in _blit_xrgb32_lerp_spans | 2025-03-15T00:01:51.127135Z | 2026-03-18T14:26:56.370221Z |
| osv-2025-207 | Security exception in org.apache.lucene.analysis.tokenattributes.CharTermAttributeImpl.clone | 2025-03-16T00:02:33.765869Z | 2025-06-20T17:14:14.229009Z |
| osv-2025-215 | Security exception in graphql.parser.GraphqlAntlrToLanguage.createType | 2025-03-18T00:09:36.655072Z | 2025-03-18T00:09:36.655425Z |
| osv-2025-219 | Heap-buffer-overflow in opj_j2k_read_tile_header | 2025-03-18T00:18:30.566980Z | 2026-02-11T14:21:43.026699Z |
| osv-2025-226 | UNKNOWN READ in extract_sess_version | 2025-03-21T00:19:10.852617Z | 2025-03-21T00:19:10.852969Z |
| osv-2025-230 | Heap-buffer-overflow in wasm_loader_prepare_bytecode | 2025-03-22T00:05:22.916187Z | 2025-03-22T00:05:22.916485Z |
| osv-2025-240 | Security exception in com.powsybl.commons.xml.XmlUtil.lambda$skipSubElements$0 | 2025-03-28T00:05:50.145107Z | 2025-03-30T14:32:19.516483Z |
| osv-2025-248 | Heap-buffer-overflow in cli_bm_addpatt | 2025-04-02T00:00:13.427589Z | 2025-04-02T00:00:13.428120Z |
| osv-2025-249 | Heap-use-after-free in lj_strfmt_pushvf | 2025-04-02T00:09:53.120387Z | 2025-07-23T14:23:01.826780Z |
| osv-2025-251 | Heap-buffer-overflow in icu_78::RegexMatcher::MatchChunkAt | 2025-04-02T00:16:00.337471Z | 2025-04-02T00:16:00.337850Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-joomla-2021-26033 | [20210502] - Core - CSRF in AJAX reordering endpoint | 2025-04-03T14:13:17.590Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26034 | [20210503] - Core - CSRF in data download endpoints | 2025-04-03T14:13:23.793Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26035 | [20210701] - Core - XSS in JForm Rules field | 2025-04-03T14:13:30.589Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26036 | [20210702] - Core - DoS through usergroup table manipulation | 2025-04-03T14:13:37.395Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26037 | [20210703] - Core - Lack of enforced session termination | 2025-04-03T14:13:44.898Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26038 | [20210704] - Core - Privilege escalation through com_installer | 2025-04-03T14:13:51.791Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26039 | [20210705] - Core - XSS in com_media imagelist | 2025-04-03T14:13:58.891Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2021-26040 | [20210801] - Core - Insufficient access control for com_media deletion endpoint | 2025-04-03T14:14:05.591Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23793 | [20220301] - Core - Zip Slip within the Tar extractor | 2025-04-03T14:14:11.792Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23794 | [20220302] - Core - Path Disclosure within filesystem error messages | 2025-04-03T14:14:18.591Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23795 | [20220303] - Core - User row are not bound to a authentication mechanism | 2025-04-03T14:14:24.804Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23796 | [20220304] - Core - Missing input validation within com_fields class inputs | 2025-04-03T14:14:31.588Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23797 | [20220305] - Core - Inadequate filtering on the selected Ids | 2025-04-03T14:14:37.993Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23798 | [20220306] - Core - Inadequate validation of internal URLs | 2025-04-03T14:14:44.389Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23799 | [20220307] - Core - Variable Tampering on JInput $_REQUEST data | 2025-04-03T14:14:51.000Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23800 | [20220308] - Core - Inadequate content filtering within the filter code | 2025-04-03T14:14:57.695Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-23801 | [20220309] - Core - XSS attack vector through SVG | 2025-04-03T14:15:05.093Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-27911 | [20220801] - Core - Multiple Full Path Disclosures because of missing '_JEXEC or die check' | 2025-04-03T14:15:11.988Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-27912 | [20221001] - Core - Debug Mode leaks full request payloads including passwords | 2025-04-03T14:15:18.090Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-27913 | [20221002] - Core - RXSS through reflection of user input in headings | 2025-04-03T14:15:24.691Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2022-27914 | [20221101] - Core - RXSS through reflection of user input in com_media | 2025-04-03T14:15:31.388Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2023-23750 | [20230101] - Core - CSRF within post-installation messages | 2025-04-03T14:15:38.995Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2023-23751 | [20230102] - Core - Missing ACL checks for com_actionlogs | 2025-04-03T14:15:47.091Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2023-23752 | [20230201] - Core - Improper access check in webservice endpoints | 2025-04-03T14:15:54.999Z | 2025-10-22T09:08:25.162Z |
| bit-joomla-2023-23754 | [20230501] - Core - Open Redirect and XSS within the mfa select | 2025-04-03T14:16:03.188Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2023-23755 | [20230502] - Core - Bruteforce prevention within the mfa screen | 2025-04-03T14:16:09.791Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2023-40626 | [20231101] - Core - Exposure of environment variables | 2025-04-03T14:16:16.690Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2024-21724 | [20240203] - Core - XSS in media selection fields | 2025-04-03T14:16:23.491Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2024-21729 | [20240701] - Core - XSS in accessible media selection field | 2025-04-03T14:16:30.697Z | 2025-05-20T10:02:07.006Z |
| bit-joomla-2024-21730 | [20240702] - Core - Self-XSS in fancyselect list field layout | 2025-04-03T14:16:37.895Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2009-avi-164 | Vulnérabilités dans apt | 2009-04-27T00:00:00.000000 | 2009-04-27T00:00:00.000000 |
| certa-2009-avi-165 | Vulnérabilité dans FreeBSD | 2009-04-27T00:00:00.000000 | 2009-04-27T00:00:00.000000 |
| certa-2009-avi-166 | Vulnérabilité dans Mozilla Firefox | 2009-04-28T00:00:00.000000 | 2009-04-28T00:00:00.000000 |
| certa-2009-avi-167 | Vulnérabilités dans des produits Symantec | 2009-04-29T00:00:00.000000 | 2009-04-29T00:00:00.000000 |
| certa-2009-avi-168 | Multiples vulnérabilités dans des produits Symantec | 2009-04-29T00:00:00.000000 | 2009-04-29T00:00:00.000000 |
| certa-2009-avi-169 | Vulnérabilité dans Citrix Web Interface | 2009-04-29T00:00:00.000000 | 2009-04-29T00:00:00.000000 |
| certa-2009-avi-170 | Vulnérabilité dans HP-UX | 2009-04-29T00:00:00.000000 | 2009-04-29T00:00:00.000000 |
| certa-2009-avi-171 | Multiples vulnérabilités dans CA ARCserve Backup | 2009-05-05T00:00:00.000000 | 2009-05-05T00:00:00.000000 |
| certa-2009-avi-172 | Vulnérabilité dans les produits McAfee | 2009-05-05T00:00:00.000000 | 2009-05-05T00:00:00.000000 |
| certa-2009-avi-173 | Vulnérabilités dans HP OpenView Network Node Manager | 2009-05-05T00:00:00.000000 | 2009-05-05T00:00:00.000000 |
| certa-2009-avi-174 | Vulnérabilité dans Adobe Flash Media Server | 2009-05-06T00:00:00.000000 | 2009-05-06T00:00:00.000000 |
| certa-2009-avi-175 | Vulnérabilités dans Drupal | 2009-05-07T00:00:00.000000 | 2009-05-07T00:00:00.000000 |
| certa-2009-avi-176 | Multiples vulnérabilités dans Adobe Reader et Adobe Acrobat | 2009-05-07T00:00:00.000000 | 2009-05-13T00:00:00.000000 |
| certa-2009-avi-177 | Vulnérabilité dans les produits F-Secure | 2009-05-11T00:00:00.000000 | 2009-05-11T00:00:00.000000 |
| certa-2009-avi-178 | Multiples vulnérabilités de Tivoli Storage Manager client | 2009-05-11T00:00:00.000000 | 2009-05-11T00:00:00.000000 |
| certa-2009-avi-179 | Vulnérabilité dans FreeType | 2009-05-11T00:00:00.000000 | 2009-05-11T00:00:00.000000 |
| certa-2009-avi-180 | Vulnérabilités dans Google Chrome | 2009-05-11T00:00:00.000000 | 2009-05-11T00:00:00.000000 |
| certa-2009-avi-181 | Vulnérabilité du noyau Linux | 2009-05-12T00:00:00.000000 | 2009-05-12T00:00:00.000000 |
| certa-2009-avi-182 | Vulnérabilité dans Dokeos | 2009-05-12T00:00:00.000000 | 2009-05-12T00:00:00.000000 |
| certa-2009-avi-183 | Vulnérabilité dans ClamAV | 2009-05-12T00:00:00.000000 | 2009-05-12T00:00:00.000000 |
| certa-2009-avi-184 | Multiples vulnérabilités dans Dokeos | 2009-05-13T00:00:00.000000 | 2009-05-13T00:00:00.000000 |
| certa-2009-avi-185 | Multiples vulnérabilités dans Microsoft PowerPoint | 2009-05-13T00:00:00.000000 | 2009-05-13T00:00:00.000000 |
| certa-2009-avi-186 | Multiples vulnérabilités dans Apple Mac OS X | 2009-05-13T00:00:00.000000 | 2009-05-13T00:00:00.000000 |
| certa-2009-avi-187 | Multiples vulnérabilités dans Apple Safari | 2009-05-13T00:00:00.000000 | 2009-05-13T00:00:00.000000 |
| certa-2009-avi-188 | Multiples vulnérabilités dans SquirrelMail | 2009-05-13T00:00:00.000000 | 2009-05-13T00:00:00.000000 |
| certa-2009-avi-189 | Vulnérabilités dans Drupal | 2009-05-14T00:00:00.000000 | 2009-05-14T00:00:00.000000 |
| certa-2009-avi-190 | Vulnérabilités dans IPsec Tools | 2009-05-15T00:00:00.000000 | 2009-05-15T00:00:00.000000 |
| certa-2009-avi-191 | Vulnérabilité dans Xerox WorkCentre | 2009-05-18T00:00:00.000000 | 2009-05-18T00:00:00.000000 |
| certa-2009-avi-193 | Vulnérabilités dans Claroline | 2009-05-18T00:00:00.000000 | 2009-05-18T00:00:00.000000 |
| certa-2009-avi-192 | Vulnérabilités dans OpenSSL | 2009-05-19T00:00:00.000000 | 2009-06-30T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-03722 | Microsoft Windows内存错误引用漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03723 | Microsoft Windows内核位图处理内存错误引用漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03724 | Microsoft Windows Kernel 'Win32k.sys'缓冲区溢出漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03725 | Microsoft Windows Kernel 'Win32k.sys' 驱动缓冲区溢出漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03726 | Microsoft Windows Station内存错误引用漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03727 | Microsoft Windows内核对象内存错误引用漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03728 | Microsoft Windows内核brush对象内存错误引用漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03729 | Microsoft Windows Kernel 'Win32k.sys'内存破坏权限提升漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03730 | Microsoft Windows Kernel 'Win32k.sys'本地权限提升漏洞(CNVD-2015-03730) | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03731 | Microsoft Exchange Server同源策略绕过漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03732 | Microsoft Exchange Server不正确管理用户会话漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03733 | Microsoft Exchange Server输入验证跨站脚本漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03734 | Microsoft Active Directory Federation Services跨站脚本漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03735 | Microsoft Office任意代码执行漏洞(CNVD-2015-03735) | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03736 | Microsoft Office内存破坏漏洞(CNVD-2015-03736) | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03737 | Microsoft Office未初始化内存错误漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03738 | Microsoft Windows Media Player远程代码执行漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03739 | Microsoft Internet Explorer远程权限提升漏洞(CNVD-2015-03739) | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03740 | Microsoft Internet Explorer远程权限提升漏洞(CNVD-2015-03740) | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03741 | Microsoft Internet Explorer信息泄露漏洞(CNVD-2015-03741) | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03742 | Microsoft Internet Explorer远程内存破坏漏洞(CNVD-2015-03742) | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03743 | Microsoft Internet Explorer远程内存破坏漏洞(CNVD-2015-03743) | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03748 | Redis EVAL Lua沙箱安全绕过漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03752 | Cisco Edge 300/340 Series本地权限提升漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03754 | WordPress插件zM AJAX Login and Register文件包含漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03755 | Drupal Novalnet Payment模块SQL注入漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03756 | Drupal Novalnet Payment - Ubercart模块SQL注入漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03757 | PCRE 'match()'函数栈缓冲区溢出漏洞 | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03761 | RubyGems BSON拒绝服务漏洞(CNVD-2015-03761) | 2015-06-10 | 2015-06-12 |
| cnvd-2015-03762 | RubyGems BSON拒绝服务漏洞(CNVD-2015-03762) | 2015-06-10 | 2015-06-12 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-06033 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06034 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06035 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06036 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06037 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06038 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06039 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06040 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06041 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06042 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06043 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06044 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 29.03.2021 |
| bdu:2015-06045 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06046 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06047 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06048 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06049 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06050 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06051 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06052 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06053 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06054 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06055 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06056 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06057 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06058 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06059 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06060 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06061 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06062 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие злоумышленнику нару… | 28.04.2015 | 28.11.2016 |
| ID | Description | Updated |
|---|---|---|
| var-201004-0747 | The Tele Data's Contact Management Server is prone to an SQL-injection vulnerability beca… | 2022-05-17T01:51:50.296000Z |
| var-201004-0512 | vBulletin is an open source PHP forum program. The URL parameter submitted to the externa… | 2022-05-17T01:51:50.429000Z |
| var-201002-0399 | Hitachi JP1/Cm2/Network Node Manager is prone to a security vulnerability because it sets… | 2022-05-17T01:51:51.037000Z |
| var-200912-0598 | The SSL implementation in multiple Fujitsu products is prone to a buffer-overflow vulnera… | 2022-05-17T01:51:51.495000Z |
| var-200909-0582 | Nginx is a multi-platform HTTP server and mail proxy server. Nginx maintains an internal … | 2022-05-17T01:51:52.041000Z |
| var-200905-0411 | Multiple SonicWALL SSL-VPN devices are prone to a remote format-string vulnerability beca… | 2022-05-17T01:51:52.689000Z |
| var-200712-0504 | Multiple Trend Micro products are prone to a buffer-overflow vulnerability because the so… | 2022-05-17T01:51:59.857000Z |
| var-200607-0532 | Siemens SpeedStream Wireless Router is a wireless router device. Siemens SpeedStream Wire… | 2022-05-17T01:52:05.175000Z |
| var-200408-0245 | The NETGEAR DG834G is a router. The NETGEAR DG834G has a default account that can be expl… | 2022-05-17T01:52:12.005000Z |
| var-200405-0069 | Sun Java System Application Server is an application server that is compatible with the J… | 2022-05-17T01:52:12.238000Z |
| var-200306-0131 | Avaya Cajun offers a multiservice network switch system solution. Avaya Cajun switches do… | 2022-05-17T01:52:13.515000Z |
| var-200305-0089 | It has been reported that Cisco IOS is vulnerable to an issue in handling Service Assuran… | 2022-05-17T01:52:13.615000Z |
| var-200111-0084 | IOS is the Cisco Internet Operating System, distributed with and used on various Cisco ne… | 2022-05-17T01:52:14.464000Z |
| var-199904-0053 | It is reported that Cisco routers running versions 12.0 are affected by a vulnerability w… | 2022-05-17T01:52:15.425000Z |
| var-190001-0244 | Barracuda Backup Service is a network backup solution. Barracudas Backup v2.x has multipl… | 2022-05-17T01:52:16.351000Z |
| var-202107-1794 | Yingying Information actively creates a smart road monitoring integration platform, and h… | 2022-05-17T01:52:18.514000Z |
| var-202006-1862 | KingView is an industrial automation configuration software produced by Beijing Yakong Te… | 2022-05-17T01:52:29.496000Z |
| var-202005-1245 | This vulnerability allows remote attackers to execute arbitrary code on affected installa… | 2022-05-17T01:52:29.600000Z |
| var-202004-2243 | D-Link Dgs-1250 series is a new generation of intelligent 10g port Gigabit network switch… | 2022-05-17T01:52:29.690000Z |
| var-202004-2222 | IEXplorer is an industrial Ethernet tool software that provides automatic search for Delt… | 2022-05-17T01:52:29.701000Z |
| var-202004-2220 | Wuxi Xinjie Electric Co., Ltd. (XINJE) is a well-known domestic enterprise focusing on th… | 2022-05-17T01:52:29.716000Z |
| var-202003-1791 | Xintian Technology Co., Ltd. provides products and intelligent solutions to achieve energ… | 2022-05-17T01:52:29.903000Z |
| var-201911-1952 | V-SOL GPON is a network switch device. V-SOL GPON / EPON OLT platform has a file downloa… | 2022-05-17T01:52:30.595000Z |
| var-201911-1784 | GE PLC IC695CPE330 is a programmable logic controller from General Electric. GE PLC IC6… | 2022-05-17T01:52:30.609000Z |
| var-201909-1544 | Siemens SIMATIC S7-300 is a modular universal controller of Siemens (Siemens) for the man… | 2022-05-17T01:52:30.851000Z |
| var-201905-1332 | Beijing Turing Kaiwu Technology Co., Ltd. is a company engaged in technology development;… | 2022-05-17T01:52:31.268000Z |
| var-201903-1775 | This vulnerability allows local attackers to escalate privileges on vulnerable installati… | 2022-05-17T01:52:31.485000Z |
| var-201809-1222 | C10S0R (-e) PLC is a product in the programmable logic controller (PLC) series of Xiamen … | 2022-05-17T01:52:34.929000Z |
| var-201809-1201 | INVT is a key high-tech enterprise of the National Torch Plan. Its main products include … | 2022-05-17T01:52:34.945000Z |
| var-201807-2223 | Fuzhou Fuchang Weikong Electronic Technology Co., Ltd. is a technology company engaged in… | 2022-05-17T01:52:35.132000Z |