Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2001-1210 |
N/A
|
Cisco ubr900 series routers that conform to the D… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:08.297Z |
| CVE-2001-1211 |
N/A
|
Ipswitch IMail 7.0.4 and earlier allows attackers… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:08.288Z |
| CVE-2001-1212 |
N/A
|
Cross-site scripting vulnerability in catgy.cgi f… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:08.372Z |
| CVE-2001-1213 |
N/A
|
The default configuration of DataWizard FtpXQ 2.0… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:08.295Z |
| CVE-2001-1214 |
N/A
|
manual.php in Marcus S. Xenakis Unix Manual 1.0 a… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:08.318Z |
| CVE-2001-1216 |
N/A
|
Buffer overflow in PL/SQL Apache module in Oracle… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:51:08.199Z |
| CVE-2001-1217 |
N/A
|
Directory traversal vulnerability in PL/SQL Apach… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:51:06.882Z |
| CVE-2001-1218 |
N/A
|
Microsoft Internet Explorer for Unix 5.0SP1 allow… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:51:07.034Z |
| CVE-2001-1219 |
N/A
|
Microsoft Internet Explorer 6.0 and earlier allow… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:51:06.886Z |
| CVE-2001-1220 |
N/A
|
D-Link DWL-1000AP Firmware 3.2.28 #483 Wireless L… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:51:06.912Z |
| CVE-2001-1221 |
N/A
|
D-Link DWL-1000AP Firmware 3.2.28 #483 Wireless L… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:51:07.105Z |
| CVE-2001-1222 |
N/A
|
Plesk Server Administrator (PSA) 1.0 allows remot… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:51:08.216Z |
| CVE-2001-1223 |
N/A
|
The web administration server for ELSA Lancom 110… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:51:06.883Z |
| CVE-2001-1224 |
N/A
|
get_input in adrotate.pm for Les VanBrunt AdRotat… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:51:06.919Z |
| CVE-2001-1225 |
N/A
|
Hughes Technology Mini SQL 2.0.10 through 2.0.12 … |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:51:07.055Z |
| CVE-2001-1226 |
N/A
|
AdCycle 1.17 and earlier allow remote attackers t… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:51:07.103Z |
| CVE-2002-0099 |
N/A
|
Buffer overflow in Michael Lamont Savant Web Serv… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.430Z |
| CVE-2002-0100 |
N/A
|
AOL AOLserver 3.4.2 Win32 allows remote attackers… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.467Z |
| CVE-2002-0101 |
N/A
|
Microsoft Internet Explorer 6.0 and earlier allow… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.588Z |
| CVE-2002-0102 |
N/A
|
Oracle9iAS Web Cache 2.0.0.x allows remote attack… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.572Z |
| CVE-2002-0103 |
N/A
|
An installer program for Oracle9iAS Web Cache 2.0… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.569Z |
| CVE-2002-0104 |
N/A
|
AFTPD 5.4.4 allows remote attackers to gain sensi… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.589Z |
| CVE-2002-0105 |
N/A
|
CDE dtlogin in Caldera UnixWare 7.1.0, and possib… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.909Z |
| CVE-2002-0106 |
N/A
|
BEA Systems Weblogic Server 6.1 allows remote att… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.505Z |
| CVE-2002-0108 |
N/A
|
Allaire Forums 2.0.4 and 2.0.5 and Forums! 3.0 an… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.607Z |
| CVE-2002-0109 |
N/A
|
Linksys EtherFast BEFN2PS4, BEFSR41, and BEFSR81 … |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.595Z |
| CVE-2002-0110 |
N/A
|
Nevrona Designs MiraMail 1.04 and earlier stores … |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.476Z |
| CVE-2002-0112 |
N/A
|
Etype Eserv 2.97 allows remote attackers to view … |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.438Z |
| CVE-2002-0113 |
N/A
|
EMC NetWorker (formerly Legato NetWorker) before … |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.596Z |
| CVE-2002-0114 |
N/A
|
EMC NetWorker (formerly Legato NetWorker) before … |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.654Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2001-1013 |
N/A
|
Apache on Red Hat Linux with with the UserDir dir… |
n/a |
n/a |
2002-02-02T05:00:00 | 2024-08-08T04:44:06.462Z |
| CVE-2001-1105 |
N/A
|
RSA BSAFE SSL-J 3.0, 3.0.1 and 3.1, as used in Ci… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:07.335Z |
| CVE-2001-1109 |
N/A
|
Directory traversal vulnerability in EFTP 2.0.7.3… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:07.345Z |
| CVE-2001-1110 |
N/A
|
EFTP 2.0.7.337 allows remote attackers to obtain … |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:07.287Z |
| CVE-2001-1111 |
N/A
|
EFTP 2.0.7.337 stores user passwords in plaintext… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:07.387Z |
| CVE-2001-1112 |
N/A
|
Buffer overflow in EFTP 2.0.7.337 allows remote a… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:07.319Z |
| CVE-2001-0984 |
N/A
|
Password Safe 1.7(1) leaves cleartext passwords i… |
n/a |
n/a |
2002-02-02T05:00:00 | 2024-08-08T04:37:06.905Z |
| CVE-2001-1136 |
N/A
|
The libsecurity library in HP-UX 11.04 (VVOS) all… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:07.854Z |
| CVE-2001-0986 |
N/A
|
SQLQHit.asp sample file in Microsoft Index Server… |
n/a |
n/a |
2002-02-02T05:00:00 | 2024-08-08T04:37:07.158Z |
| CVE-2001-0959 |
N/A
|
Computer Associates ARCserve for NT 6.61 SP2a and… |
n/a |
n/a |
2003-04-02T05:00:00 | 2024-08-08T04:37:06.820Z |
| CVE-2001-0960 |
N/A
|
Computer Associates ARCserve for NT 6.61 SP2a and… |
n/a |
n/a |
2003-04-02T05:00:00 | 2024-08-08T04:37:07.126Z |
| CVE-2001-1014 |
N/A
|
eshop.pl in WebDiscount(e)shop allows remote atta… |
n/a |
n/a |
2002-02-02T05:00:00 | 2024-08-08T04:44:06.493Z |
| CVE-2001-0961 |
N/A
|
Buffer overflow in tab expansion capability of th… |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T04:37:07.090Z |
| CVE-2001-1353 |
N/A
|
ghostscript before 6.51 allows local users to rea… |
n/a |
n/a |
2002-06-05T04:00:00 | 2024-08-08T04:51:08.428Z |
| CVE-2000-1215 |
N/A
|
The default configuration of Lotus Domino server … |
n/a |
n/a |
2005-04-21T04:00:00 | 2024-08-08T05:45:37.468Z |
| CVE-2001-0962 |
N/A
|
IBM WebSphere Application Server 3.02 through 3.5… |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T04:37:07.154Z |
| CVE-2001-0506 |
N/A
|
Buffer overflow in ssinc.dll in IIS 5.0 and 4.0 a… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:21:38.527Z |
| CVE-2001-0507 |
N/A
|
IIS 5.0 uses relative paths to find system files … |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:21:38.612Z |
| CVE-2001-0508 |
N/A
|
Vulnerability in IIS 5.0 allows remote attackers … |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T04:21:38.594Z |
| CVE-2001-0509 |
N/A
|
Vulnerabilities in RPC servers in (1) Microsoft E… |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:21:38.933Z |
| CVE-2001-0541 |
N/A
|
Buffer overflow in Microsoft Windows Media Player… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:21:38.671Z |
| CVE-2001-0543 |
N/A
|
Memory leak in NNTP service in Windows NT 4.0 and… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:21:38.955Z |
| CVE-2001-0546 |
N/A
|
Memory leak in H.323 Gatekeeper Service in Micros… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:21:38.569Z |
| CVE-2001-0547 |
N/A
|
Memory leak in the proxy service in Microsoft Int… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:21:38.616Z |
| CVE-2001-0552 |
N/A
|
ovactiond in HP OpenView Network Node Manager (NN… |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:21:38.683Z |
| CVE-2001-0636 |
N/A
|
Buffer overflows in Raytheon SilentRunner allow r… |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:30:05.990Z |
| CVE-2001-0641 |
N/A
|
Buffer overflow in man program in various distrib… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:05.998Z |
| CVE-2001-0642 |
N/A
|
Directory traversal vulnerability in IncrediMail … |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:30:05.953Z |
| CVE-2001-0643 |
N/A
|
Internet Explorer 5.5 does not display the Class … |
n/a |
n/a |
2004-09-01T04:00:00 | 2024-08-08T04:30:06.053Z |
| CVE-2001-0644 |
N/A
|
Maxum Rumpus FTP Server 1.3.3 and 2.0.3 dev 3 sto… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.054Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-72w9-fcj5-3fcg |
9.8 (3.1)
|
Improper Authentication in Apache Shiro | 2021-05-07T15:53:10Z | 2022-05-04T01:54:57Z |
| ghsa-26gr-cvq3-qxgf |
9.8 (3.1)
|
Improper Authentication in Apache Shiro | 2021-05-07T15:53:18Z | 2022-04-01T20:23:53Z |
| ghsa-grpf-gg7v-5g5h |
9.8 (3.1)
|
SQL Injection in Apache SkyWalking | 2021-05-07T15:53:31Z | 2023-11-07T22:10:55Z |
| ghsa-4pv3-63jw-4jw2 |
5.5 (3.1)
|
Missing Release of Memory after Effective Lifetime in Apache Tika | 2021-05-07T15:53:40Z | 2022-10-07T20:41:22Z |
| ghsa-3h29-52vh-pqgr |
5.5 (3.1)
|
Uncontrolled Resource Consumption in Apache Tika | 2021-05-07T15:53:48Z | 2022-10-07T20:39:59Z |
| ghsa-3264-3fm9-fg44 |
5.5 (3.1)
|
Infinite Loop in Apache Tika | 2021-05-07T15:54:00Z | 2022-10-07T20:40:10Z |
| ghsa-64gv-3pqv-299h |
7.5 (3.1)
|
Exposure of Sensitive Information to an Unauthorized Actor in Apache Wicket | 2021-05-07T15:54:15Z | 2021-05-05T22:31:00Z |
| ghsa-2vgm-wxr3-6w2j |
7.5 (3.1)
|
Authentication bypass in Apache Shiro | 2021-05-07T15:54:23Z | 2022-04-01T20:23:13Z |
| ghsa-4fcw-pq4r-f4q7 |
7.5 (3.1)
|
Server-Side Request Forgery in Spinnaker Orca | 2021-05-07T15:54:31Z | 2021-05-05T19:53:13Z |
| ghsa-wcp5-m52f-mhh5 |
9.8 (3.1)
|
Improper Restriction of XML External Entity Reference in MPXJ | 2021-05-07T15:54:36Z | 2022-09-08T14:05:32Z |
| ghsa-24ww-mc5x-xc43 |
5.9 (3.1)
|
Man-in-the-middle attack in Apache Cassandra | 2021-05-07T15:54:46Z | 2021-05-05T19:22:12Z |
| ghsa-mg53-xr8m-86hw |
7.5 (3.1)
|
Open Redirect in Liferay Portal | 2021-05-07T15:54:54Z | 2021-05-05T19:14:04Z |
| ghsa-v3px-6cc8-f8j3 |
7.5 (3.1)
|
Path traversal in servey | 2021-05-07T15:56:19Z | 2021-05-07T15:07:41Z |
| ghsa-v8w9-2789-6hhr |
9.8 (3.1)
|
Deserialization of Untrusted Data in bson | 2021-05-07T16:04:54Z | 2023-03-30T22:46:24Z |
| ghsa-73rg-x683-m3qw |
8.8 (3.1)
|
Buffer overflow in canvas | 2021-05-07T16:05:16Z | 2021-05-06T23:33:05Z |
| ghsa-8pww-pp5r-rff8 |
7.5 (3.1)
|
Path Traversal in marscode | 2021-05-07T16:06:03Z | 2023-09-05T23:32:19Z |
| ghsa-wq7q-5v6j-xfv6 |
9.8 (3.1)
|
Command Injection in picotts | 2021-05-07T16:06:11Z | 2022-07-05T17:39:33Z |
| ghsa-rhwp-9vm9-547q |
9.8 (3.1)
|
Command Injection in onion-oled-js | 2021-05-07T16:06:16Z | 2022-07-05T17:40:12Z |
| ghsa-v2jv-33gh-xx29 |
9.8 (3.1)
|
Command Injection in ps-visitor | 2021-05-07T16:06:23Z | 2022-07-05T18:00:39Z |
| ghsa-vh5w-fg69-rc8m |
6.5 (3.1)
|
Improper Input Validation in Google Closure Library | 2021-05-07T16:06:34Z | 2021-05-06T20:57:55Z |
| ghsa-xr8h-53xr-jhcm |
7.5 (3.1)
|
Path Traversal in marked-tree | 2021-05-07T16:06:43Z | 2021-05-06T18:59:36Z |
| ghsa-q6pj-jh94-5fpr |
9.8 (3.1)
|
OS Command Injection in docker-compose-remote-api | 2021-05-07T16:14:39Z | 2023-09-11T22:26:16Z |
| ghsa-h33p-5j96-w8qh |
9.8 (3.1)
|
OS Command Injection in gulkp-styledocco | 2021-05-07T16:14:48Z | 2023-09-07T20:01:18Z |
| ghsa-x67x-98x7-wv26 |
9.8 (3.1)
|
OS Command Injection in gulp-tape | 2021-05-07T16:14:56Z | 2023-09-07T20:15:05Z |
| ghsa-g4hj-r7r3-9rwv |
9.8 (3.1)
|
OS Command Injection in gulp-scss-lint | 2021-05-07T16:15:37Z | 2021-07-28T20:50:13Z |
| ghsa-m647-5wf9-3jp3 |
9.8 (3.1)
|
OS Command Injection in closure-compiler-stream | 2021-05-07T16:16:06Z | 2023-09-06T19:55:21Z |
| ghsa-f8fh-8rgm-227h |
9.8 (3.1)
|
OS Command Injection in node-prompt-here | 2021-05-07T16:16:16Z | 2023-09-13T17:35:35Z |
| ghsa-fw5f-7c6c-3vmv |
6.1 (3.1)
|
Cross-site Scripting in PrimeFaces | 2021-05-07T16:16:30Z | 2022-09-21T22:35:51Z |
| ghsa-2cf2-2383-h4jv |
5.3 (3.1)
|
Improperly Controlled Modification of Dynamically-Determined Object Attributes in querymen | 2021-05-07T16:16:43Z | 2021-07-28T18:46:07Z |
| ghsa-662x-fhqg-9p8v |
7.5 (3.1)
|
Regular Expression Denial of Service in ua-parser-js | 2021-05-07T16:18:19Z | 2021-05-03T19:19:25Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-5075 | Malicious code in one-question-survey (npm) | 2022-06-20T20:21:59Z | 2022-06-20T20:21:59Z |
| mal-2022-956 | Malicious code in amazon-oss-attribution-builder (npm) | 2022-06-20T20:21:59Z | 2022-06-20T20:22:00Z |
| mal-2022-960 | Malicious code in amazonlauncherintegration (npm) | 2022-06-20T20:21:59Z | 2022-06-20T20:22:00Z |
| mal-2022-3927 | Malicious code in ion-extension (npm) | 2022-06-20T20:22:00Z | 2022-06-20T20:22:00Z |
| mal-2022-5134 | Malicious code in oss-contribution-tracker (npm) | 2022-06-20T20:22:00Z | 2022-06-20T20:22:00Z |
| mal-2022-876 | Malicious code in advanced-wp-debugger (npm) | 2022-06-20T20:22:00Z | 2022-06-20T20:22:01Z |
| mal-2022-917 | Malicious code in ajax-env (npm) | 2022-06-20T20:22:00Z | 2022-06-20T20:22:01Z |
| mal-2022-10 | Malicious code in 0-shadowenv (npm) | 2022-06-20T20:22:01Z | 2022-06-20T20:22:01Z |
| mal-2022-1067 | Malicious code in app_bridge_auth (npm) | 2022-06-20T20:22:01Z | 2022-06-20T20:22:02Z |
| mal-2022-1084 | Malicious code in argo-checkout-template (npm) | 2022-06-20T20:22:01Z | 2022-06-20T20:22:02Z |
| mal-2022-864 | Malicious code in admin-ui-extensions-template (npm) | 2022-06-20T20:22:01Z | 2022-06-20T20:22:02Z |
| mal-2022-1135 | Malicious code in asls (npm) | 2022-06-20T20:22:02Z | 2022-06-20T20:22:02Z |
| mal-2022-3494 | Malicious code in gtt-ui (npm) | 2022-06-20T20:22:02Z | 2022-06-20T20:22:02Z |
| mal-2022-4643 | Malicious code in mkr-vote-proxy (npm) | 2022-06-20T20:22:02Z | 2022-06-20T20:22:03Z |
| mal-2022-6076 | Malicious code in sharded-redis-client (npm) | 2022-06-20T20:22:02Z | 2022-06-20T20:22:03Z |
| mal-2022-1607 | Malicious code in blank-ts-repo (npm) | 2022-06-20T20:22:03Z | 2022-06-20T20:22:04Z |
| mal-2022-1892 | Malicious code in check-my-repo (npm) | 2022-06-20T20:22:03Z | 2022-06-20T20:22:04Z |
| mal-2022-4715 | Malicious code in mrmax (npm) | 2022-06-20T20:22:03Z | 2022-06-20T20:22:03Z |
| mal-2022-4716 | Malicious code in mrmax4o4 (npm) | 2022-06-20T20:22:03Z | 2022-06-20T20:22:03Z |
| mal-2022-2039 | Malicious code in com.innogames.asset-relations-viewer (npm) | 2022-06-20T20:22:04Z | 2022-06-20T20:22:05Z |
| mal-2022-2040 | Malicious code in com.innogames.asset-relations-viewer-addressables (npm) | 2022-06-20T20:22:04Z | 2022-06-20T20:22:05Z |
| mal-2022-2555 | Malicious code in dodo-build (npm) | 2022-06-20T20:22:04Z | 2022-06-20T20:22:04Z |
| mal-2022-2588 | Malicious code in dr-json (npm) | 2022-06-20T20:22:04Z | 2022-06-20T20:22:05Z |
| mal-2022-5742 | Malicious code in remote-developer-jobs-analytics (npm) | 2022-06-20T20:22:05Z | 2022-06-20T20:22:05Z |
| mal-2022-6245 | Malicious code in spotatweet (npm) | 2022-06-20T20:22:05Z | 2022-06-20T20:22:05Z |
| mal-2022-6708 | Malicious code in twitter-webhook-boilerplate-node (npm) | 2022-06-20T20:22:05Z | 2022-06-20T20:22:12Z |
| mal-2022-7069 | Malicious code in web-frontend (npm) | 2022-06-20T20:22:05Z | 2022-06-20T20:22:06Z |
| mal-2022-1479 | Malicious code in bchd-explorer (npm) | 2022-06-20T20:22:06Z | 2022-06-20T20:22:07Z |
| mal-2022-1723 | Malicious code in buildstamp-monorepo (npm) | 2022-06-20T20:22:06Z | 2022-06-20T20:22:12Z |
| mal-2022-3467 | Malicious code in grpc-web-ci (npm) | 2022-06-20T20:22:06Z | 2022-06-20T20:22:06Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-2051 | poppler: Mehrere Schwachstellen | 2023-08-13T22:00:00.000+00:00 | 2025-04-27T22:00:00.000+00:00 |
| wid-sec-w-2023-2052 | QT: Schwachstelle ermöglicht Denial of Service | 2023-08-13T22:00:00.000+00:00 | 2023-09-07T22:00:00.000+00:00 |
| wid-sec-w-2023-2054 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-08-13T22:00:00.000+00:00 | 2024-05-01T22:00:00.000+00:00 |
| wid-sec-w-2023-2055 | ESET Server Security: Schwachstelle ermöglicht Privilegieneskalation | 2023-08-13T22:00:00.000+00:00 | 2023-08-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2056 | IBM TXSeries: Schwachstelle ermöglicht Denial of Service | 2023-08-13T22:00:00.000+00:00 | 2023-08-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2057 | F5 BIG-IP: Schwachstelle ermöglicht Denial of Service | 2023-08-13T22:00:00.000+00:00 | 2023-08-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2058 | Red Hat OpenShift Service Mesh und Service Mesh Containers: Mehrere Schwachstellen | 2023-08-13T22:00:00.000+00:00 | 2023-10-08T22:00:00.000+00:00 |
| wid-sec-w-2023-2059 | QEMU: Schwachstelle ermöglicht Denial of Service | 2023-08-14T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2023-2060 | Red Hat Satellite: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-08-14T22:00:00.000+00:00 | 2023-08-14T22:00:00.000+00:00 |
| wid-sec-w-2023-2061 | MariaDB: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-08-14T22:00:00.000+00:00 | 2023-08-14T22:00:00.000+00:00 |
| wid-sec-w-2023-2062 | Red Hat Enterprise Linux (Rust): Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2023-08-14T22:00:00.000+00:00 | 2024-09-22T22:00:00.000+00:00 |
| wid-sec-w-2023-2063 | xterm: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-08-14T22:00:00.000+00:00 | 2024-03-03T23:00:00.000+00:00 |
| wid-sec-w-2023-2064 | Google Chrome & Microsoft Edge: Mehrere Schwachstellen | 2023-08-15T22:00:00.000+00:00 | 2024-01-31T23:00:00.000+00:00 |
| wid-sec-w-2023-2065 | IBM WebSphere Application Server: Schwachstelle ermöglicht Denial of Service | 2023-08-15T22:00:00.000+00:00 | 2023-09-04T22:00:00.000+00:00 |
| wid-sec-w-2023-2066 | QT: Schwachstelle ermöglicht Denial of Service | 2023-08-15T22:00:00.000+00:00 | 2025-08-24T22:00:00.000+00:00 |
| wid-sec-w-2023-2067 | Red Hat OpenStack: Schwachstelle ermöglicht Codeausführung | 2023-08-15T22:00:00.000+00:00 | 2023-08-21T22:00:00.000+00:00 |
| wid-sec-w-2023-2069 | Microsoft OneNote: Schwachstelle ermöglicht Spoofing-Angriff | 2023-08-15T22:00:00.000+00:00 | 2023-08-15T22:00:00.000+00:00 |
| wid-sec-w-2023-2071 | Dell Storage: Schwachstelle ermöglicht Übernahme der Kontrolle | 2023-08-15T22:00:00.000+00:00 | 2023-08-15T22:00:00.000+00:00 |
| wid-sec-w-2023-2073 | Cisco Identity Services Engine (ISE): Schwachstelle ermöglicht Offenlegung von Informationen | 2023-08-16T22:00:00.000+00:00 | 2023-08-16T22:00:00.000+00:00 |
| wid-sec-w-2023-2074 | Linux Kernel: Mehrere Schwachstellen | 2023-08-16T22:00:00.000+00:00 | 2024-01-28T23:00:00.000+00:00 |
| wid-sec-w-2023-2075 | Cisco Prime Infrastructure und Evolved Programmable Network Manager: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2023-08-16T22:00:00.000+00:00 | 2023-08-16T22:00:00.000+00:00 |
| wid-sec-w-2023-2076 | Moxa NPort: Schwachstelle ermöglicht Manipulation | 2023-08-16T22:00:00.000+00:00 | 2023-08-16T22:00:00.000+00:00 |
| wid-sec-w-2023-2077 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-08-16T22:00:00.000+00:00 | 2024-01-28T23:00:00.000+00:00 |
| wid-sec-w-2023-2080 | IBM Security Guardium: Schwachstelle ermöglicht Codeausführung | 2023-08-16T22:00:00.000+00:00 | 2023-08-16T22:00:00.000+00:00 |
| wid-sec-w-2023-2082 | Red Hat Ansible Automation Platform: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-08-16T22:00:00.000+00:00 | 2023-08-21T22:00:00.000+00:00 |
| wid-sec-w-2023-2083 | Cisco Expressway und Cisco TelePresence: Schwachstelle ermöglicht Codeausführung | 2023-08-16T22:00:00.000+00:00 | 2023-08-16T22:00:00.000+00:00 |
| wid-sec-w-2023-2084 | Dell BIOS: Mehrere Schwachstellen | 2023-08-16T22:00:00.000+00:00 | 2024-06-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2085 | Cisco IP Phone: Schwachstelle ermöglicht Denial of Service | 2023-08-16T22:00:00.000+00:00 | 2023-08-16T22:00:00.000+00:00 |
| wid-sec-w-2023-2088 | Jenkins: Mehrere Schwachstellen | 2023-08-16T22:00:00.000+00:00 | 2024-02-11T23:00:00.000+00:00 |
| wid-sec-w-2023-2089 | Moxa Router: Mehrere Schwachstellen | 2023-08-16T22:00:00.000+00:00 | 2023-08-16T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhba-2014:0363 | Red Hat Bug Fix Advisory: Red Hat Enterprise Linux OpenStack Platform 3 Bug Fix and Enhancement Advisory | 2014-04-03T18:16:48+00:00 | 2026-01-13T22:12:23+00:00 |
| rhsa-2014:0368 | Red Hat Security Advisory: openstack-keystone security update | 2014-04-03T20:18:06+00:00 | 2026-01-13T22:31:12+00:00 |
| rhsa-2014:0367 | Red Hat Security Advisory: openstack-swift security update | 2014-04-03T20:18:23+00:00 | 2025-11-21T17:47:39+00:00 |
| rhsa-2014:0366 | Red Hat Security Advisory: openstack-nova security and bug fix update | 2014-04-03T20:18:29+00:00 | 2026-01-13T22:06:37+00:00 |
| rhsa-2014:0365 | Red Hat Security Advisory: python-django-horizon security and bug fix update | 2014-04-03T20:18:36+00:00 | 2026-01-13T22:06:50+00:00 |
| rhsa-2014:0364 | Red Hat Security Advisory: ruby193-libyaml security update | 2014-04-03T20:18:42+00:00 | 2026-01-28T22:37:59+00:00 |
| rhsa-2014:0369 | Red Hat Security Advisory: httpd security update | 2014-04-03T20:59:19+00:00 | 2026-01-28T22:58:10+00:00 |
| rhsa-2014:0370 | Red Hat Security Advisory: httpd security update | 2014-04-03T20:59:28+00:00 | 2026-01-28T22:58:10+00:00 |
| rhsa-2014:0373 | Red Hat Security Advisory: Apache Commons Fileupload and JBoss Web security update | 2014-04-03T21:19:48+00:00 | 2026-01-28T22:38:00+00:00 |
| rhsa-2014:0371 | Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.0.1 update | 2014-04-03T21:19:56+00:00 | 2026-01-28T22:37:59+00:00 |
| rhsa-2014:0372 | Red Hat Security Advisory: Red Hat JBoss BRMS 6.0.1 update | 2014-04-03T21:30:03+00:00 | 2026-01-28T22:38:00+00:00 |
| rhsa-2014:0374 | Red Hat Security Advisory: Red Hat JBoss Data Grid 6.2.1 update | 2014-04-03T22:01:40+00:00 | 2026-01-28T22:38:00+00:00 |
| rhsa-2014:0376 | Red Hat Security Advisory: openssl security update | 2014-04-08T03:03:51+00:00 | 2026-01-28T22:38:01+00:00 |
| rhsa-2014:0377 | Red Hat Security Advisory: openssl security update | 2014-04-08T06:58:02+00:00 | 2026-01-28T22:38:01+00:00 |
| rhsa-2014:0378 | Red Hat Security Advisory: rhev-hypervisor6 security update | 2014-04-08T11:14:53+00:00 | 2026-01-28T22:38:01+00:00 |
| rhsa-2014:0380 | Red Hat Security Advisory: flash-plugin security update | 2014-04-09T08:45:54+00:00 | 2025-11-21T17:47:44+00:00 |
| rhsa-2014:0382 | Red Hat Security Advisory: python-keystoneclient security update | 2014-04-09T17:30:05+00:00 | 2025-11-21T17:47:47+00:00 |
| rhsa-2014:0383 | Red Hat Security Advisory: samba4 security update | 2014-04-09T17:41:26+00:00 | 2026-01-13T22:11:15+00:00 |
| rhsa-2014:0389 | Red Hat Security Advisory: jasperreports-server-pro security update | 2014-04-09T18:02:28+00:00 | 2026-01-28T22:38:01+00:00 |
| rhsa-2014:0396 | Red Hat Security Advisory: rhev-hypervisor6 security update | 2014-04-10T19:52:04+00:00 | 2026-01-28T22:38:01+00:00 |
| rhsa-2014:0401 | Red Hat Security Advisory: Red Hat JBoss A-MQ 6.1.0 update | 2014-04-14T13:46:41+00:00 | 2026-01-28T22:38:01+00:00 |
| rhsa-2014:0400 | Red Hat Security Advisory: Red Hat JBoss Fuse 6.1.0 update | 2014-04-14T13:46:50+00:00 | 2026-01-28T22:35:03+00:00 |
| rhsa-2014:0407 | Red Hat Security Advisory: java-1.7.0-openjdk security update | 2014-04-16T11:23:49+00:00 | 2025-11-21T17:47:48+00:00 |
| rhsa-2014:0406 | Red Hat Security Advisory: java-1.7.0-openjdk security update | 2014-04-16T11:24:01+00:00 | 2025-11-21T17:47:47+00:00 |
| rhsa-2014:0408 | Red Hat Security Advisory: java-1.6.0-openjdk security and bug fix update | 2014-04-16T11:34:59+00:00 | 2025-11-21T17:47:49+00:00 |
| rhsa-2014:0409 | Red Hat Security Advisory: python-keystoneclient security update | 2014-04-17T01:41:42+00:00 | 2025-11-21T17:47:49+00:00 |
| rhsa-2014:0413 | Red Hat Security Advisory: java-1.7.0-oracle security update | 2014-04-17T09:28:25+00:00 | 2026-01-28T22:38:02+00:00 |
| rhsa-2014:0412 | Red Hat Security Advisory: java-1.7.0-oracle security update | 2014-04-17T09:28:34+00:00 | 2026-01-28T22:38:02+00:00 |
| rhsa-2014:0414 | Red Hat Security Advisory: java-1.6.0-sun security update | 2014-04-17T11:30:33+00:00 | 2026-01-28T22:35:04+00:00 |
| rhsa-2014:0415 | Red Hat Security Advisory: libyaml security update | 2014-04-17T12:01:57+00:00 | 2026-01-28T22:38:02+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-44617 | A flaw was found in libXpm. When processing a file with width of 0 and a very large height some parser functions will be called repeatedly and can lead to an infinite loop resulting in a Denial of Service in the application linked to the library. | 2023-02-01T00:00:00.000Z | 2023-02-07T00:00:00.000Z |
| msrc_cve-2022-46285 | A flaw was found in libXpm. This issue occurs when parsing a file with a comment not closed; the end-of-file condition will not be detected leading to an infinite loop and resulting in a Denial of Service in the application linked to the library. | 2023-02-01T00:00:00.000Z | 2023-02-08T00:00:00.000Z |
| msrc_cve-2022-46663 | In GNU Less before 609 crafted data can result in "less -R" not filtering ANSI escape sequences sent to the terminal. | 2023-02-01T00:00:00.000Z | 2023-02-14T00:00:00.000Z |
| msrc_cve-2022-48337 | GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input. | 2023-02-01T00:00:00.000Z | 2023-03-22T00:00:00.000Z |
| msrc_cve-2022-48338 | An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function and bound to C-c C-f. Inside the function the external command gem is called through shell-command-to-string but the feature-name parameters are not escaped. Thus malicious Ruby source files may cause commands to be executed. | 2023-02-01T00:00:00.000Z | 2023-03-22T00:00:00.000Z |
| msrc_cve-2022-48339 | An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function the parameter file and parameter srcdir come from external input and parameters are not escaped. If a file name or directory name contains shell metacharacters code may be executed. | 2023-02-01T00:00:00.000Z | 2023-03-22T00:00:00.000Z |
| msrc_cve-2022-4883 | A flaw was found in libXpm. When processing files with .Z or .gz extensions the library calls external programs to compress and uncompress files relying on the PATH environment variable to find these programs which could allow a malicious user to execute other programs by manipulating the PATH environment variable. | 2023-02-01T00:00:00.000Z | 2023-02-08T00:00:00.000Z |
| msrc_cve-2023-0215 | Use-after-free following BIO_new_NDEF | 2023-02-01T00:00:00.000Z | 2024-08-15T00:00:00.000Z |
| msrc_cve-2023-0286 | X.400 address type confusion in X.509 GeneralName | 2023-02-01T00:00:00.000Z | 2024-08-15T00:00:00.000Z |
| msrc_cve-2023-0361 | A timing side-channel in the handling of RSA ClientKeyExchange messages was discovered in GnuTLS. This side-channel can be sufficient to recover the key encrypted in the RSA ciphertext across a network in a Bleichenbacher style attack. To achieve a successful decryption the attacker would need to send a large amount of specially crafted messages to the vulnerable server. By recovering the secret from the ClientKeyExchange message the attacker would be able to decrypt the application data exchanged over that connection. | 2023-02-01T00:00:00.000Z | 2023-02-20T00:00:00.000Z |
| msrc_cve-2023-0461 | Use-after-free vulnerability in the Linux Kernel | 2023-02-01T00:00:00.000Z | 2023-03-10T00:00:00.000Z |
| msrc_cve-2023-0475 | Go-Getter Vulnerable to Decompression Bombs | 2023-02-01T00:00:00.000Z | 2025-01-25T00:00:00.000Z |
| msrc_cve-2023-0567 | password_verify() always returns true for some invalid hashes | 2023-02-01T00:00:00.000Z | 2023-03-01T00:00:00.000Z |
| msrc_cve-2023-0568 | Array overrun in common path resolve code | 2023-02-01T00:00:00.000Z | 2023-02-20T00:00:00.000Z |
| msrc_cve-2023-0615 | A memory leak flaw and potential divide by zero and Integer overflow was found in the Linux kernel V4L2 and vivid test code functionality. This issue occurs when a user triggers ioctls such as VIDIOC_S_DV_TIMINGS ioctl. This could allow a local user to crash the system if vivid test code enabled. | 2023-02-01T00:00:00.000Z | 2023-02-15T00:00:00.000Z |
| msrc_cve-2023-0662 | DoS vulnerability when parsing multipart request body | 2023-02-01T00:00:00.000Z | 2023-02-21T00:00:00.000Z |
| msrc_cve-2023-0687 | A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled. | 2023-02-01T00:00:00.000Z | 2025-10-01T23:11:27.000Z |
| msrc_cve-2023-0795 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3488 allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources the fix is available with commit afaabc3e. | 2023-02-01T00:00:00.000Z | 2023-02-16T00:00:00.000Z |
| msrc_cve-2023-0796 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3592 allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources the fix is available with commit afaabc3e. | 2023-02-01T00:00:00.000Z | 2023-02-16T00:00:00.000Z |
| msrc_cve-2023-0797 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368 invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921 allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources the fix is available with commit afaabc3e. | 2023-02-01T00:00:00.000Z | 2023-02-16T00:00:00.000Z |
| msrc_cve-2023-0798 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3400 allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources the fix is available with commit afaabc3e. | 2023-02-01T00:00:00.000Z | 2023-02-16T00:00:00.000Z |
| msrc_cve-2023-0799 | LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in tools/tiffcrop.c:3701 allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources the fix is available with commit afaabc3e. | 2023-02-01T00:00:00.000Z | 2023-02-16T00:00:00.000Z |
| msrc_cve-2023-0800 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3502 allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources the fix is available with commit 33aee127. | 2023-02-01T00:00:00.000Z | 2023-02-16T00:00:00.000Z |
| msrc_cve-2023-0801 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in libtiff/tif_unix.c:368 invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6778 allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources the fix is available with commit 33aee127. | 2023-02-01T00:00:00.000Z | 2023-02-16T00:00:00.000Z |
| msrc_cve-2023-0802 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3724 allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources the fix is available with commit 33aee127. | 2023-02-01T00:00:00.000Z | 2023-02-16T00:00:00.000Z |
| msrc_cve-2023-0803 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3516 allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources the fix is available with commit 33aee127. | 2023-02-01T00:00:00.000Z | 2023-02-16T00:00:00.000Z |
| msrc_cve-2023-0804 | LibTIFF 4.4.0 has an out-of-bounds write in tiffcrop in tools/tiffcrop.c:3609 allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources the fix is available with commit 33aee127. | 2023-02-01T00:00:00.000Z | 2023-02-16T00:00:00.000Z |
| msrc_cve-2023-1095 | In nf_tables_updtable if nf_tables_table_enable returns an error nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del() but the transaction was never placed on a list -- the list head is all zeroes this results in a NULL pointer dereference. | 2023-02-01T00:00:00.000Z | 2023-03-07T00:00:00.000Z |
| msrc_cve-2023-20032 | On Feb 15 2023 the following vulnerability in the ClamAV scanning library was disclosed: A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier 0.105.1 and earlier and 0.103.7 and earlier could allow an unauthenticated remote attacker to execute arbitrary code. This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process or else crash the process resulting in a denial of service (DoS) condition. For a description of this vulnerability see the ClamAV blog ["https://blog.clamav.net/"]. | 2023-02-01T00:00:00.000Z | 2023-03-01T00:00:00.000Z |
| msrc_cve-2023-20052 | On Feb 15 2023 the following vulnerability in the ClamAV scanning library was disclosed: A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier 0.105.1 and earlier and 0.103.7 and earlier could allow an unauthenticated remote attacker to access sensitive information on an affected device. This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process. | 2023-02-01T00:00:00.000Z | 2023-03-01T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201011-0303 | Cisco Unified Videoconferencing is an integral part of the Cisco Unified Communications s… | 2022-05-17T01:56:38.699000Z |
| var-201011-0281 | Multiple Fujitsu Interstage products have security vulnerabilities that allow malicious u… | 2022-05-17T01:56:38.715000Z |
| var-201009-0385 | Accton-based switches are prone to a security vulnerability due to the existence of a bac… | 2022-05-17T01:56:39.326000Z |
| var-201009-0319 | VHS to DVD is a set of video capture devices for converting video tapes to DVD discs. VHS… | 2022-05-17T01:56:39.373000Z |
| var-201007-0360 | The Apple iPad is a touch-enabled, powerful tablet. The Apple iPad has an unidentified se… | 2022-05-17T01:56:40.243000Z |
| var-201003-0519 | CompleteFTP is an FTP service program. The CompleteFTP server does not properly handle us… | 2022-05-17T01:56:41.603000Z |
| var-201002-0325 | RSLinx is prone to a remote stack-based buffer-overflow vulnerability because it fails to… | 2022-05-17T01:56:41.900000Z |
| var-200909-0698 | SAP NetWeaver is prone to multiple unspecified remote vulnerabilities, including: - Multi… | 2022-05-17T01:56:42.750000Z |
| var-200904-0651 | MiniWeb is prone to a vulnerability that lets attackers access source code because it fai… | 2022-05-17T01:56:43.745000Z |
| var-200804-0458 | Both BT Home Hub and Speedtouch are home wireless Internet routers. The default WEP/WPA k… | 2022-05-17T01:56:45.983000Z |
| var-200403-0145 | HP Web JetAdmin has an integrated and modified Apache web server. Some scripts included i… | 2022-05-17T01:57:26.911000Z |
| var-200312-0517 | The NetGear WAB102 is a wireless access AP. The NetGear WAB102 has multiple password mana… | 2022-05-17T01:57:27.177000Z |
| var-200307-0052 | The Teledat DSL Router is an ADSL router from Deutsche Telekom. The Teledat DSL Router do… | 2022-05-17T01:57:27.803000Z |
| var-200210-0315 | The DSL-500 is an ADSL broadband router developed by D-Link. The DSL-500 includes a defau… | 2022-05-17T01:57:28.577000Z |
| var-199710-0036 | Cisco IOS software is reported prone to an authentication bypass vulnerability. This vul… | 2022-05-17T01:57:30.078000Z |
| var-190001-0578 | RabbitWiki has a cross-site scripting vulnerability. The vulnerability stems from the ins… | 2022-05-17T01:57:30.619000Z |
| var-190001-0418 | Koha is prone to multiple cross-site scripting vulnerabilities because it fails to proper… | 2022-05-17T01:57:30.732000Z |
| var-190001-0078 | The D-Link DSL-2640B is a router device. The D-Link DSL-2640B has a verification bypass v… | 2022-05-17T01:57:30.962000Z |
| var-202006-1857 | Quick Control Cloud (Shanghai) Intelligent Technology Co., Ltd., a high-tech company spec… | 2022-05-17T01:57:37.146000Z |
| var-202004-2254 | Huawei Technologies Co., Ltd. (hereinafter referred to as Huawei) was established in 1987… | 2022-05-17T01:57:37.361000Z |
| var-202004-2212 | Wuxi Xinjie Electric Co., Ltd. (XINJE) is a well-known domestic enterprise focusing on th… | 2022-05-17T01:57:37.375000Z |
| var-201912-1870 | Schneider Electric TM218LDAE24DRHN is a programmable controller product of Schneider Elec… | 2022-05-17T01:57:38.040000Z |
| var-201910-1745 | Siemens SIMATIC is an automation software with a single engineering environment. WinCC su… | 2022-05-17T01:57:38.229000Z |
| var-201909-1562 | MITSUBISHI PLC is a programmable controller product of Japan's Mitsubishi Electric (Mitsu… | 2022-05-17T01:57:38.328000Z |
| var-201908-2054 | Delta TPEditor is a man-machine interface programming software. The Delta TPEditor t… | 2022-05-17T01:57:38.441000Z |
| var-201905-1338 | Display Control Remote HMI is a configuration software produced by Shenzhen Display Contr… | 2022-05-17T01:57:38.780000Z |
| var-201902-0887 | MMSLite is a communication component development library based on the IEC61850 standard o… | 2022-05-17T01:57:39.121000Z |
| var-201811-0990 | Kewei text display integrated screen configuration software IOCS is a programming softwar… | 2022-05-17T01:57:39.354000Z |
| var-201810-1595 | The D-LinkDSL-2750B is an ADSL router. There is an OS command injection vulnerability in … | 2022-05-17T01:57:39.443000Z |
| var-201809-1331 | Cisco Network Assistant (CNA) is a Cisco-based Cisco switch graphical interface managemen… | 2022-05-17T01:57:39.594000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2018:4069-1 | Security update for the Linux Kernel | 2018-12-11T08:24:31Z | 2018-12-11T08:24:31Z |
| suse-su-2018:4070-1 | Security update for xen | 2018-12-11T14:12:57Z | 2018-12-11T14:12:57Z |
| suse-ru-2018:4074-1 | Recommended update for aws-cli, python-boto3, python-botocore, python-s3transfer | 2018-12-11T20:46:06Z | 2018-12-11T20:46:06Z |
| suse-su-2018:4086-1 | Security update for qemu | 2018-12-12T08:20:05Z | 2018-12-12T08:20:05Z |
| suse-su-2018:3770-2 | Security update for postgresql10 | 2018-12-12T10:45:26Z | 2018-12-12T10:45:26Z |
| suse-su-2018:4087-1 | Security update for ghostscript | 2018-12-12T12:37:52Z | 2018-12-12T12:37:52Z |
| suse-su-2018:4090-1 | Security update for ghostscript | 2018-12-12T15:04:21Z | 2018-12-12T15:04:21Z |
| suse-su-2018:4089-1 | Security update for cups | 2018-12-12T15:05:55Z | 2018-12-12T15:05:55Z |
| suse-su-2018:3882-2 | Security update for exiv2 | 2018-12-12T15:06:31Z | 2018-12-12T15:06:31Z |
| suse-su-2018:4088-1 | Security update for git | 2018-12-12T16:32:34Z | 2018-12-12T16:32:34Z |
| suse-su-2018:3587-2 | Security update for ntfs-3g_ntfsprogs | 2018-12-13T13:38:21Z | 2018-12-13T13:38:21Z |
| suse-su-2018:4120-1 | Security update for tiff | 2018-12-14T09:57:13Z | 2018-12-14T09:57:13Z |
| suse-su-2018:4121-1 | Security update for amanda | 2018-12-14T09:58:35Z | 2018-12-14T09:58:35Z |
| suse-su-2018:4127-1 | Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) | 2018-12-14T12:24:53Z | 2018-12-14T12:24:53Z |
| suse-su-2018:4128-1 | Security update for openvswitch | 2018-12-14T15:11:59Z | 2018-12-14T15:11:59Z |
| suse-su-2018:4130-1 | Security update for ansible | 2018-12-14T15:12:26Z | 2018-12-14T15:12:26Z |
| suse-su-2018:4129-1 | Security update for qemu | 2018-12-14T15:13:03Z | 2018-12-14T15:13:03Z |
| suse-su-2018:4131-1 | Security update for tcpdump | 2018-12-14T15:44:00Z | 2018-12-14T15:44:00Z |
| suse-su-2018:4149-1 | Security update for tcpdump | 2018-12-17T07:50:49Z | 2018-12-17T07:50:49Z |
| suse-su-2018:4150-1 | Security update for openldap2 | 2018-12-17T07:51:44Z | 2018-12-17T07:51:44Z |
| suse-su-2018:4154-1 | Security update for the Linux Kernel (Live Patch 31 for SLE 12 SP1) | 2018-12-17T15:07:29Z | 2018-12-17T15:07:29Z |
| suse-su-2018:4158-1 | Security update for the Linux Kernel (Live Patch 29 for SLE 12 SP1) | 2018-12-17T15:07:33Z | 2018-12-17T15:07:33Z |
| suse-su-2018:4153-1 | Security update for the Linux Kernel (Live Patch 27 for SLE 12 SP1) | 2018-12-17T15:07:37Z | 2018-12-17T15:07:37Z |
| suse-su-2018:4157-1 | Security update for the Linux Kernel (Live Patch 28 for SLE 12 SP1) | 2018-12-17T15:07:41Z | 2018-12-17T15:07:41Z |
| suse-su-2018:4155-1 | Security update for ovmf | 2018-12-17T15:07:48Z | 2018-12-17T15:07:48Z |
| suse-su-2018:4179-1 | Security update for libqt5-qtbase | 2018-12-18T14:43:46Z | 2018-12-18T14:43:46Z |
| suse-su-2018:4183-1 | Security update for libqt5-qtbase | 2018-12-19T09:08:27Z | 2018-12-19T09:08:27Z |
| suse-su-2018:4185-1 | Security update for qemu | 2018-12-19T10:32:26Z | 2018-12-19T10:32:26Z |
| suse-su-2018:4187-1 | Security update for perl | 2018-12-19T10:32:45Z | 2018-12-19T10:32:45Z |
| suse-su-2018:4182-1 | Security update for crash | 2018-12-19T10:33:14Z | 2018-12-19T10:33:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:10378-1 | fuse-2.9.5-1.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10379-1 | patch-2.7.5-1.112 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10380-1 | lftp-4.7.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10381-1 | apache-commons-httpclient-3.1-8.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10382-1 | tar-1.29-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10383-1 | empathy-3.12.12-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10384-1 | cronic-3-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10385-1 | ncompress-4.2.4.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10386-1 | flatpak-0.6.14-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10387-1 | FastCGI-2.4.0-171.10 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10388-1 | postfixadmin-3.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10389-1 | guile-2.0.13-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10390-1 | coreutils-8.26-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10391-1 | libcgroup-devel-0.41-2.8 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10392-1 | tkimg-1.4-5.9 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10393-1 | libspice-server-devel-0.12.8-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10394-1 | kdelibs3-3.5.10-89.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10395-1 | libX11-6-1.6.4-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10396-1 | tcpdump-4.7.4-3.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10397-1 | nagstamon-2.0.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10398-1 | gnome-online-accounts-3.22.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10399-1 | filezilla-3.23.0.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10400-1 | python-logilab-common-1.0.2-1.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10401-1 | ruby2.2-rubygem-RedCloth-4.3.2-1.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10402-1 | lighttpd-1.4.37-1.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10403-1 | cyrus-sasl-2.1.26-12.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10404-1 | xalan-j2-2.7.2-5.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10405-1 | pam-1.3.0-3.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10406-1 | ruby2.2-rubygem-rack-1_6-1.6.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10407-1 | glade3-catalog-vte-0.28.2-22.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2024-12093 | Improper Validation of Consistency within Input in GitLab | 2025-05-26T07:39:36.069Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-0605 | Weak Authentication in GitLab | 2025-05-26T07:42:56.002Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-0679 | Exposure of Private Personal Information to an Unauthorized Actor in GitLab | 2025-05-26T07:43:00.261Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-0993 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-05-26T07:43:02.994Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-1110 | Insufficient Granularity of Access Control in GitLab | 2025-05-26T07:43:07.324Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-2853 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-05-26T07:43:29.030Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-3111 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-05-26T07:43:30.470Z | 2025-06-02T18:14:59.426Z |
| bit-gitlab-2025-4979 | Insufficient Granularity of Access Control in GitLab | 2025-05-26T07:43:31.883Z | 2025-08-11T00:06:06.142Z |
| bit-grafana-2025-3580 | 2025-05-28T11:44:30.552Z | 2025-10-16T11:24:40.537Z | |
| bit-pytorch-2025-3121 | PyTorch torch.jit.jit_module_from_flatbuffer memory corruption | 2025-05-28T11:55:44.258Z | 2025-05-28T12:14:51.629Z |
| bit-varnish-2025-47905 | 2025-05-28T11:59:55.247Z | 2025-05-30T06:16:06.723Z | |
| bit-gitlab-2024-7803 | Allocation of Resources Without Limits or Throttling in GitLab | 2025-05-28T12:12:16.561Z | 2025-08-11T00:06:06.142Z |
| bit-gitlab-2024-9163 | User Interface (UI) Misrepresentation of Critical Information in GitLab | 2025-05-28T12:12:54.375Z | 2025-08-11T00:06:06.142Z |
| bit-pytorch-2025-3136 | PyTorch CUDACachingAllocator.cpp torch.cuda.memory.caching_allocator_delete memory corruption | 2025-05-29T12:17:56.494Z | 2025-05-29T12:44:55.860Z |
| bit-pytorch-2025-3730 | PyTorch LossCTC.cpp torch.nn.functional.ctc_loss denial of service | 2025-05-29T12:18:15.090Z | 2025-05-29T12:44:55.860Z |
| bit-pytorch-2025-2998 | PyTorch torch.nn.utils.rnn.pad_packed_sequence memory corruption | 2025-05-30T05:56:55.766Z | 2025-05-30T06:16:06.723Z |
| bit-pytorch-2025-2999 | PyTorch torch.nn.utils.rnn.unpack_sequence memory corruption | 2025-05-30T05:56:59.244Z | 2025-05-30T06:16:06.723Z |
| bit-pytorch-2025-3000 | PyTorch torch.jit.script memory corruption | 2025-05-30T05:57:02.547Z | 2025-05-30T06:16:06.723Z |
| bit-pytorch-2025-3001 | PyTorch torch.lstm_cell memory corruption | 2025-05-30T05:57:06.043Z | 2025-05-30T06:16:06.723Z |
| bit-keydb-2025-27151 | redis-check-aof may lead to stack overflow and potential RCE | 2025-05-31T05:45:47.374Z | 2025-08-22T06:06:45.932Z |
| bit-moodle-2024-33996 | moodle: broken access control when setting calendar event type | 2025-05-31T05:57:03.857Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-33997 | moodle: stored XSS risk when editing another user's equation in equation editor | 2025-05-31T05:57:07.361Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-33998 | moodle: stored XSS via user's name on participants page when opening some options | 2025-05-31T05:57:10.769Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-33999 | moodle: unsafe direct use of $_SERVER['HTTP_REFERER'] in admin/tool/mfa/index.php | 2025-05-31T05:57:14.246Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-34000 | moodle: stored XSS in lesson overview report via user ID number | 2025-05-31T05:57:17.759Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-34001 | moodle: CSRF risk in admin preset tool management of presets | 2025-05-31T05:57:21.248Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-34006 | moodle: unsanitized HTML in site log for config_log_created | 2025-05-31T05:57:38.163Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-34007 | moodle: logout CSRF in admin/tool/mfa/auth.php | 2025-05-31T05:57:41.568Z | 2025-05-31T06:15:48.797Z |
| bit-moodle-2024-34009 | moodle: ReCAPTCHA can be bypassed on the login page | 2025-05-31T05:57:48.365Z | 2025-05-31T06:15:48.797Z |
| bit-redis-2025-27151 | redis-check-aof may lead to stack overflow and potential RCE | 2025-05-31T05:59:53.747Z | 2025-08-22T06:06:45.932Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-03895 | OpenSSL 'ssleay_rand_bytes()'函数拒绝服务漏洞 | 2015-06-17 | 2015-06-23 |
| cnvd-2015-03896 | ceph-deploy弱权限漏洞 | 2015-06-17 | 2015-06-23 |
| cnvd-2015-03897 | 多款Alcatel-Lucent OmniSwitch产品会话劫持漏洞 | 2015-06-17 | 2015-06-23 |
| cnvd-2015-03898 | hostapd和wpa_supplicant WMM Action帧解析器整数溢出漏洞 | 2015-06-17 | 2015-06-23 |
| cnvd-2015-03899 | hostapd和wpa_supplicant Total-Length字段长度拒绝服务漏洞 | 2015-06-17 | 2015-06-23 |
| cnvd-2015-03900 | CGI RESCUE BloBee任意代码执行漏洞 | 2015-06-17 | 2015-06-23 |
| cnvd-2015-03901 | Actian Matrix访问限制绕过漏洞 | 2015-06-17 | 2015-06-23 |
| cnvd-2015-03902 | SavySoda WiFi HD存在多个漏洞(CNVD-2015-03902) | 2015-06-17 | 2015-06-23 |
| cnvd-2015-03903 | Tanium任意文件覆盖漏洞 | 2015-06-17 | 2015-06-23 |
| cnvd-2015-03892 | Drupal Petition模块跨站脚本漏洞(CNVD-2015-03892) | 2015-06-18 | 2015-06-23 |
| cnvd-2015-03929 | hostapd和wpa_supplicant拒绝服务漏洞(CNVD-2015-03929) | 2015-06-18 | 2015-06-24 |
| cnvd-2015-03930 | hostapd和wpa_supplicant拒绝服务漏洞(CNVD-2015-03930) | 2015-06-18 | 2015-06-24 |
| cnvd-2015-03931 | hostapd和wpa_supplicant拒绝服务漏洞(CNVD-2015-03931) | 2015-06-18 | 2015-06-24 |
| cnvd-2015-03932 | hostapd和wpa_supplicant拒绝服务漏洞(CNVD-2015-03932) | 2015-06-18 | 2015-06-24 |
| cnvd-2015-03933 | WordPress XCloner插件静态代码注入漏洞 | 2015-06-18 | 2015-06-24 |
| cnvd-2015-03934 | TYPO3 Akronymmanager扩展SQL注入漏洞 | 2015-06-18 | 2015-06-24 |
| cnvd-2015-03935 | WordPress SEO by Yoast插件跨站脚本漏洞 | 2015-06-18 | 2015-06-19 |
| cnvd-2015-03936 | WordPress Genericons跨站脚本漏洞 | 2015-06-18 | 2015-06-24 |
| cnvd-2015-03937 | Cacti跨站脚本漏洞 | 2015-06-18 | 2015-06-24 |
| cnvd-2015-03938 | Cacti SQL注入漏洞(CNVD-2015-03938) | 2015-06-18 | 2015-06-24 |
| cnvd-2015-03939 | Cacti‘get_hash_graph_template’函数SQL注入漏洞 | 2015-06-18 | 2015-06-24 |
| cnvd-2015-03906 | DedeCMS任意代码执行漏洞 | 2015-06-22 | 2015-06-24 |
| cnvd-2015-03907 | Wind River VXWorks TCP可预测漏洞 | 2015-06-22 | 2015-06-24 |
| cnvd-2015-03908 | QEMU 'pit_ioport_read()'函数内存破坏漏洞 | 2015-06-22 | 2015-06-24 |
| cnvd-2015-03909 | Microsoft Internet Explorer ShowSaveFileDialog DLL加载任意代码执行漏洞 | 2015-06-22 | 2015-06-24 |
| cnvd-2015-03910 | PHP OS命令注入漏洞 | 2015-06-22 | 2015-06-24 |
| cnvd-2015-03911 | PHP空指针间接引用拒绝服务漏洞 | 2015-06-22 | 2015-06-24 |
| cnvd-2015-03912 | Adobe Photoshop CC/Bridge CC内存破坏漏洞 | 2015-06-22 | 2015-06-24 |
| cnvd-2015-03913 | Ubuntu Linux内核overlayfs文件系统本地权限提升漏洞 | 2015-06-22 | 2015-06-24 |
| cnvd-2015-03914 | LimeSurvey SQL注入漏洞(CNVD-2015-03914) | 2015-06-23 | 2015-06-24 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2009-avi-314 | Vulnérabilité dans IBM AIX | 2009-08-07T00:00:00.000000 | 2009-08-07T00:00:00.000000 |
| certa-2009-avi-315 | Multiples vulnérabilités dans WordPress | 2009-08-07T00:00:00.000000 | 2009-08-07T00:00:00.000000 |
| certa-2009-avi-316 | Vulnérabilité dans Fetchmail | 2009-08-07T00:00:00.000000 | 2009-08-19T00:00:00.000000 |
| certa-2009-avi-317 | Vulnérabilité dans CA Data Transport Services | 2009-08-10T00:00:00.000000 | 2009-08-10T00:00:00.000000 |
| certa-2009-avi-318 | Vulnérabilité dans CA Unicenter | 2009-08-10T00:00:00.000000 | 2009-08-10T00:00:00.000000 |
| certa-2009-avi-319 | Vulnérabilités dans Zope | 2009-08-10T00:00:00.000000 | 2009-08-10T00:00:00.000000 |
| certa-2009-avi-320 | Multiples vulnérabilités dans Subversion | 2009-08-11T00:00:00.000000 | 2009-08-11T00:00:00.000000 |
| certa-2009-avi-321 | Vulnérabilité dans libvorbis | 2009-08-11T00:00:00.000000 | 2009-08-11T00:00:00.000000 |
| certa-2009-avi-322 | Multiples vulnérabilités dans Asterisk | 2009-08-11T00:00:00.000000 | 2009-08-11T00:00:00.000000 |
| certa-2009-avi-323 | Vulnérabilités dans Apache APR-Utility | 2009-08-11T00:00:00.000000 | 2009-10-20T00:00:00.000000 |
| certa-2009-avi-324 | Vulnérabilité dans ASP.NET de Microsoft Windows | 2009-08-12T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-avi-325 | Vulnérabilités de la bibliothèque ATL de Microsoft Windows | 2009-08-12T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-avi-326 | Vulnérabilités dans le traitement de fichiers Windows Media | 2009-08-12T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-avi-327 | Vulnérabilités dans Microsoft WINS | 2009-08-12T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-avi-328 | Vulnérabilité dans le service MSMQ Microsoft Windows | 2009-08-12T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-avi-329 | Vulnérabilité dans le Service Station de Travail Microsoft Windows | 2009-08-12T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-avi-330 | Vulnérabilité dans Microsoft Telnet | 2009-08-12T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-avi-331 | Multiples vulnérabilités dans Microsoft Office Web Components | 2009-08-12T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-avi-332 | Multiples vulnérabilités dans la Connexion Bureau à distance Microsoft | 2009-08-12T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-avi-333 | Vulnérabilités de Safari | 2009-08-12T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-avi-334 | Vulnérabilité dans WordPress | 2009-08-12T00:00:00.000000 | 2009-08-19T00:00:00.000000 |
| certa-2009-avi-335 | Multiples vulnérabilités dans libxml2 | 2009-08-12T00:00:00.000000 | 2009-09-07T00:00:00.000000 |
| certa-2009-avi-336 | Vulnérabilité dans GnuTLS | 2009-08-13T00:00:00.000000 | 2009-08-21T00:00:00.000000 |
| certa-2009-avi-337 | Vulnérabilité du noyau Linux | 2009-08-14T00:00:00.000000 | 2009-08-21T00:00:00.000000 |
| certa-2009-avi-338 | Vulnérabilité de cURL et libcurl | 2009-08-17T00:00:00.000000 | 2009-08-21T00:00:00.000000 |
| certa-2009-avi-339 | Vulnérabilités dans JRun | 2009-08-18T00:00:00.000000 | 2009-08-18T00:00:00.000000 |
| certa-2009-avi-340 | Multiples vulnérabilités dans Adobe ColdFusion | 2009-08-18T00:00:00.000000 | 2009-08-18T00:00:00.000000 |
| certa-2009-avi-341 | Vulnérabilités dans IBM WebSphere Application Server | 2009-08-18T00:00:00.000000 | 2009-08-18T00:00:00.000000 |
| certa-2009-avi-342 | Vulnérabilité dans CA Host-Based Intrusion Prevention System | 2009-08-19T00:00:00.000000 | 2009-08-19T00:00:00.000000 |
| certa-2009-avi-343 | Vulnérabilité dans CA Internet Security Suite | 2009-08-19T00:00:00.000000 | 2009-08-19T00:00:00.000000 |