Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2002-0116 |
N/A
|
Palm OS 3.5h and possibly other versions, as used… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.591Z |
| CVE-2002-0118 |
N/A
|
Cross-site scripting vulnerability in Infopop Ult… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.651Z |
| CVE-2002-0119 |
N/A
|
Alcatel Speed Touch Home ADSL Modem allows remote… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.441Z |
| CVE-2002-0122 |
N/A
|
Siemens 3568i WAP mobile phones allows remote att… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.529Z |
| CVE-2002-0124 |
N/A
|
MDG Computer Services Web Server 4D/eCommerce 3.5… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.573Z |
| CVE-2002-0125 |
N/A
|
Buffer overflow in ClanLib library 0.5 may allow … |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.531Z |
| CVE-2002-0126 |
N/A
|
Buffer overflow in BlackMoon FTP Server 1.0 throu… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.513Z |
| CVE-2002-0127 |
N/A
|
Netgear RP114 Cable/DSL Web Safe Router Firmware … |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:35:17.610Z |
| CVE-2002-0129 |
N/A
|
efax 0.9 and earlier, when installed setuid root,… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:42:27.526Z |
| CVE-2002-0130 |
N/A
|
Buffer overflow in efax 0.9 and earlier, when ins… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:42:27.762Z |
| CVE-2002-0131 |
N/A
|
ActivePython ActiveX control for Python in the AX… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:42:27.667Z |
| CVE-2002-0132 |
N/A
|
Buffer overflow in Chinput 3.0 allows local users… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:42:27.478Z |
| CVE-2002-0133 |
N/A
|
Buffer overflows in Avirt Gateway Suite 4.2 allow… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:42:27.529Z |
| CVE-2002-0134 |
N/A
|
Telnet proxy in Avirt Gateway Suite 4.2 does not … |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:42:27.691Z |
| CVE-2002-0135 |
N/A
|
Netopia Timbuktu Pro 6.0.1 and earlier allows rem… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:42:27.573Z |
| CVE-2002-0136 |
N/A
|
Microsoft Internet Explorer 5.5 on Windows 98 all… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:42:27.528Z |
| CVE-2002-0137 |
N/A
|
CDRDAO 1.1.4 and 1.1.5 allows local users to over… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:42:27.773Z |
| CVE-2002-0138 |
N/A
|
CDRDAO 1.1.4 and 1.1.5 allows local users to read… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:42:27.445Z |
| CVE-2002-0140 |
N/A
|
Domain Name Relay Daemon (dnrd) 2.10 and earlier … |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:42:27.718Z |
| CVE-2002-0141 |
N/A
|
Maelstrom GPL 3.0.1 allows local users to overwri… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:42:27.491Z |
| CVE-2002-0142 |
N/A
|
CGI handler in John Roy Pi3Web for Windows 2.0 be… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:42:27.660Z |
| CVE-2002-0144 |
N/A
|
Directory traversal vulnerability in chuid 1.2 an… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:42:27.867Z |
| CVE-2002-0145 |
N/A
|
chuid 1.2 and earlier does not properly verify th… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T02:42:27.515Z |
| CVE-2002-0039 |
N/A
|
rpcbind in SGI IRIX 6.5 through 6.5.15f, and poss… |
n/a |
n/a |
2002-03-30T05:00:00 | 2024-08-08T02:35:17.399Z |
| CVE-2002-0077 |
N/A
|
Microsoft Internet Explorer 5.01, 5.5 and 6.0 tre… |
n/a |
n/a |
2002-03-30T05:00:00 | 2024-08-08T02:35:17.571Z |
| CVE-2002-0162 |
N/A
|
LogWatch before 2.5 allows local users to execute… |
n/a |
n/a |
2002-03-30T05:00:00 | 2024-08-08T02:42:27.489Z |
| CVE-2002-0164 |
N/A
|
Vulnerability in the MIT-SHM extension of the X s… |
n/a |
n/a |
2002-04-05T05:00:00 | 2024-08-08T02:42:27.955Z |
| CVE-2002-0165 |
N/A
|
LogWatch 2.5 allows local users to gain root priv… |
n/a |
n/a |
2002-04-05T05:00:00 | 2024-08-08T02:42:27.794Z |
| CVE-2001-1228 |
N/A
|
Buffer overflows in gzip 1.3x, 1.2.4, and other v… |
n/a |
n/a |
2002-04-12T04:00:00 | 2024-08-08T04:51:08.206Z |
| CVE-2002-0037 |
N/A
|
Lotus Domino Servers 5.x, 4.6x, and 4.5x allows a… |
n/a |
n/a |
2002-04-12T04:00:00 | 2024-08-08T02:35:17.405Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2001-0645 |
N/A
|
Symantec/AXENT NetProwler 3.5.x contains several … |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:30:06.080Z |
| CVE-2001-0646 |
N/A
|
Maxum Rumpus FTP Server 1.3.3 and 2.0.3 dev 3 all… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.245Z |
| CVE-2001-0648 |
N/A
|
Directory traversal vulnerability in PHProjekt 2.… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.078Z |
| CVE-2001-0649 |
N/A
|
Personal Web Sharing 1.5.5 allows a remote attack… |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:30:06.063Z |
| CVE-2001-0650 |
N/A
|
Cisco devices IOS 12.0 and earlier allow a remote… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:05.977Z |
| CVE-2001-0653 |
N/A
|
Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, … |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:05.999Z |
| CVE-2001-0658 |
N/A
|
Cross-site scripting (CSS) vulnerability in Micro… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.053Z |
| CVE-2001-0659 |
N/A
|
Buffer overflow in IrDA driver providing infrared… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.052Z |
| CVE-2001-0668 |
N/A
|
Buffer overflow in line printer daemon (rlpdaemon… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.046Z |
| CVE-2001-0674 |
N/A
|
Directory traversal vulnerability in RobTex Vikin… |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:30:06.024Z |
| CVE-2001-0675 |
N/A
|
Rit Research Labs The Bat! 1.51 for Windows allow… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.074Z |
| CVE-2001-0676 |
N/A
|
Directory traversal vulnerability in Rit Research… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.050Z |
| CVE-2001-0677 |
N/A
|
Eudora 5.0.2 allows a remote attacker to read arb… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.104Z |
| CVE-2001-0678 |
N/A
|
A buffer overflow in reggo.dll file used by Trend… |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:30:06.044Z |
| CVE-2001-0680 |
N/A
|
Directory traversal vulnerability in ftpd in QPC … |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:05.995Z |
| CVE-2001-0681 |
N/A
|
Buffer overflow in ftpd in QPC QVT/Net 5.0 and QV… |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:30:06.046Z |
| CVE-2001-0683 |
N/A
|
Memory leak in Netscape Collabra Server 3.5.4 and… |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:30:06.084Z |
| CVE-2001-0684 |
N/A
|
Netscape Collabra Server 3.5.4 and earlier allows… |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:30:05.997Z |
| CVE-2001-0685 |
N/A
|
Thibault Godouet FCron prior to 1.1.1 allows a lo… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:05.986Z |
| CVE-2001-0686 |
N/A
|
Buffer overflow in mail included with SunOS 5.8 f… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.049Z |
| CVE-2001-0687 |
N/A
|
Broker FTP server 5.9.5 for Windows NT and 9x all… |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:30:06.049Z |
| CVE-2001-0688 |
N/A
|
Broker FTP Server 5.9.5.0 allows a remote attacke… |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:30:06.061Z |
| CVE-2001-0689 |
N/A
|
Vulnerability in TrendMicro Virus Control System … |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:30:06.169Z |
| CVE-2001-0690 |
N/A
|
Format string vulnerability in exim (3.22-10 in R… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.024Z |
| CVE-2001-0691 |
N/A
|
Buffer overflows in Washington University imapd 2… |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:30:06.076Z |
| CVE-2001-0692 |
N/A
|
SMTP proxy in WatchGuard Firebox (2500 and 4500) … |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.058Z |
| CVE-2001-0693 |
N/A
|
WebTrends HTTP Server 3.1c and 3.5 allows a remot… |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:30:06.141Z |
| CVE-2001-0694 |
N/A
|
Directory traversal vulnerability in WFTPD 3.00 R… |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:30:06.134Z |
| CVE-2001-0695 |
N/A
|
WFTPD 3.00 R5 allows a remote attacker to cause a… |
n/a |
n/a |
2001-08-29T04:00:00 | 2024-08-08T04:30:06.044Z |
| CVE-2001-0696 |
N/A
|
NetWin SurgeFTP 2.0a and 1.0b allows a remote att… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.073Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-fmf5-j5j9-99pp |
9.8 (3.1)
|
OS Command Injection in pulverizr | 2021-05-07T16:20:44Z | 2023-09-06T18:31:16Z |
| ghsa-9534-h433-2rjf |
8.8 (3.1)
|
Improperly Controlled Modification of Dynamically-Determined Object Attributes in utilitify | 2021-05-07T16:28:47Z | 2021-07-28T18:40:29Z |
| ghsa-cgc7-mwp4-3ccx |
6.1 (3.1)
|
Cross-site Scripting in Joplin | 2021-05-07T16:29:05Z | 2022-09-09T19:57:15Z |
| ghsa-6hwh-rqwf-cxxr |
4.3 (3.1)
|
Improperly Controlled Modification of Dynamically-Determined Object Attributes in vega-util | 2021-05-07T16:32:02Z | 2021-07-28T18:36:56Z |
| ghsa-vcjf-mgcg-jxjq |
6.1 (3.1)
|
CKEditor 4.0 vulnerability in the HTML Data Processor | 2021-05-07T16:32:17Z | 2023-03-31T18:24:19Z |
| ghsa-pf2j-9qmp-jqr2 |
9.8 (3.1)
|
TypeORM vulnerable to MAID and Prototype Pollution | 2021-05-07T16:46:42Z | 2022-08-11T14:59:34Z |
| ghsa-wgfq-7857-4jcc |
7.5 (3.1)
|
Uncontrolled Resource Consumption in json-bigint | 2021-05-07T16:47:19Z | 2021-04-28T16:57:11Z |
| ghsa-qm28-7hqv-wg5j |
6.6 (3.1)
|
OS Command Injection in ng-packagr | 2021-05-07T16:47:32Z | 2021-10-05T16:28:05Z |
| ghsa-7c82-mp33-r854 |
6.1 (3.1)
5.3 (4.0)
|
Cross-site scripting in bootstrap-select | 2021-05-07T16:47:54Z | 2024-11-25T19:25:41Z |
| ghsa-g98m-96g9-wfjq |
7.0 (3.1)
|
Insecure path handling in Bundler | 2021-05-10T14:53:59Z | 2023-07-05T20:18:22Z |
| ghsa-2w7w-2j92-44hx |
6.5 (3.1)
|
HTTP Request Smuggling in akka-http-core | 2021-05-10T15:17:09Z | 2021-03-19T22:36:01Z |
| ghsa-vf7p-j8x6-xvwp |
9.1 (3.1)
|
Incorrect Authorization in Apache Solr | 2021-05-10T15:17:58Z | 2021-04-23T18:49:03Z |
| ghsa-5phw-3jrp-3vj8 |
7.1 (3.1)
|
Server-Side Request Forgery in Apache Solr | 2021-05-10T15:18:06Z | 2021-04-14T15:52:41Z |
| ghsa-jgcr-fg3g-qvw8 |
7.5 (3.1)
|
Improper permission handling in Apache Solr | 2021-05-10T15:18:17Z | 2021-05-07T16:46:48Z |
| ghsa-vwpg-f6gw-rjvf |
|
Incorrect Authorization in Spring Cloud Netflix Zuul | 2021-05-10T15:18:50Z | 2021-05-07T18:52:54Z |
| ghsa-cpcr-74q9-74gp |
6.5 (3.1)
|
Broken Authentication in Atlassian Connect Spring Boot | 2021-05-10T15:19:04Z | 2022-03-02T21:02:00Z |
| ghsa-gq28-h5vg-8prx |
8.8 (3.1)
|
Privilege escalation in spring security | 2021-05-10T15:22:39Z | 2021-08-31T21:18:55Z |
| ghsa-567x-m4wm-87v8 |
5.5 (3.1)
|
Infinite loop in Apache Tika | 2021-05-10T15:23:25Z | 2022-04-22T15:50:03Z |
| ghsa-hwj9-h5mp-3pm3 |
5.3 (3.1)
|
Regular Expression Denial of Service in postcss | 2021-05-10T15:29:24Z | 2021-06-15T15:12:13Z |
| ghsa-p3hc-fv2j-rp68 |
9.8 (3.1)
|
Prototype Pollution in swiper | 2021-05-10T15:36:30Z | 2021-05-07T17:34:38Z |
| ghsa-c94v-8fff-73ph |
6.1 (3.1)
|
Command Injection in @theia/messages | 2021-05-10T15:36:55Z | 2021-05-07T17:57:37Z |
| ghsa-4943-9vgg-gr5r |
4.2 (3.1)
|
Cross-site Scripting in quill | 2021-05-10T15:38:12Z | 2024-08-09T14:41:50Z |
| ghsa-wj6h-7chw-x4h2 |
9.8 (3.1)
|
Command injection in get-git-data | 2021-05-10T15:59:14Z | 2021-07-28T21:53:39Z |
| ghsa-4q97-fh3f-j294 |
9.8 (3.1)
|
Prototype Pollution in tiny-conf | 2021-05-10T15:59:24Z | 2021-05-07T21:50:46Z |
| ghsa-w83x-fp72-p9qc |
9.8 (3.1)
|
Command Injection in geojson2kml | 2021-05-10T15:59:33Z | 2023-09-06T23:00:08Z |
| ghsa-4j54-mxf6-wxx2 |
9.8 (3.1)
|
OS Command Injection in pomelo-monitor | 2021-05-10T18:37:16Z | 2021-07-28T21:52:51Z |
| ghsa-h3rx-g5c9-8q4x |
7.3 (3.1)
|
Prototype Pollution in bmoor | 2021-05-10T18:37:26Z | 2022-12-03T03:40:15Z |
| ghsa-jvf4-g24p-2qgw |
8.3 (3.1)
|
Arbitrary Code Execution in shiba | 2021-05-10T18:37:34Z | 2023-09-07T18:56:23Z |
| ghsa-7mg4-w3w5-x5pc |
6.0 (3.1)
|
Prototype pollution in json-pointer | 2021-05-10T18:37:47Z | 2025-03-05T19:04:37Z |
| ghsa-r2gr-fhmr-66c5 |
7.8 (3.1)
|
Duplicate Advisory: "Arbitrary code execution in socket.io-file" | 2021-05-10T18:38:11Z | 2026-01-22T22:29:07Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-3731 | Malicious code in hxgenjs (npm) | 2022-06-20T20:22:06Z | 2022-06-20T20:22:06Z |
| mal-2022-5665 | Malicious code in react-pay-with-diem (npm) | 2022-06-20T20:22:06Z | 2022-06-20T20:22:06Z |
| mal-2022-1909 | Malicious code in citrixdeveloper-vscode (npm) | 2022-06-20T20:22:07Z | 2022-06-20T20:22:07Z |
| mal-2022-2032 | Malicious code in com.citrix.cordova.testapp (npm) | 2022-06-20T20:22:07Z | 2022-06-20T20:22:08Z |
| mal-2022-4565 | Malicious code in meshblu-connector-arc-thermometer (npm) | 2022-06-20T20:22:07Z | 2022-06-20T20:22:08Z |
| mal-2022-7347 | Malicious code in yet-another-mutex (npm) | 2022-06-20T20:22:07Z | 2022-06-20T20:22:08Z |
| mal-2022-5546 | Malicious code in qiwi-widgets-landing (npm) | 2022-06-20T20:22:08Z | 2022-06-20T20:22:09Z |
| mal-2022-5987 | Malicious code in seal_online_node_server (npm) | 2022-06-20T20:22:08Z | 2022-06-20T20:22:09Z |
| mal-2022-6493 | Malicious code in test-task-react-client (npm) | 2022-06-20T20:22:08Z | 2022-06-20T20:22:08Z |
| mal-2022-7155 | Malicious code in wise_lena_bot_server (npm) | 2022-06-20T20:22:08Z | 2022-06-20T20:22:08Z |
| mal-2022-5334 | Malicious code in pijma-v2 (npm) | 2022-06-20T20:22:09Z | 2022-06-20T20:22:10Z |
| mal-2022-5448 | Malicious code in preorder (npm) | 2022-06-20T20:22:09Z | 2022-06-20T20:22:10Z |
| mal-2022-5543 | Malicious code in qiwi-neutrino-presets (npm) | 2022-06-20T20:22:09Z | 2022-06-20T20:22:09Z |
| mal-2022-5544 | Malicious code in qiwi-substrate-monorepo (npm) | 2022-06-20T20:22:09Z | 2022-06-20T20:22:09Z |
| mal-2022-1188 | Malicious code in awesomep5 (npm) | 2022-06-20T20:22:10Z | 2022-06-20T20:22:11Z |
| mal-2022-1700 | Malicious code in bs-dropdown (npm) | 2022-06-20T20:22:10Z | 2022-06-20T20:22:11Z |
| mal-2022-3415 | Malicious code in google_modes (npm) | 2022-06-20T20:22:10Z | 2022-06-20T20:22:10Z |
| mal-2022-4467 | Malicious code in makeskill (npm) | 2022-06-20T20:22:10Z | 2022-06-20T20:22:10Z |
| mal-2022-1701 | Malicious code in bs-label (npm) | 2022-06-20T20:22:11Z | 2022-06-20T20:22:11Z |
| mal-2022-1702 | Malicious code in bs-sidebar (npm) | 2022-06-20T20:22:11Z | 2022-06-20T20:22:12Z |
| mal-2022-4531 | Malicious code in med3web (npm) | 2022-06-20T20:22:11Z | 2022-06-20T20:22:12Z |
| mal-2022-5534 | Malicious code in pwamp-demo (npm) | 2022-06-20T20:22:11Z | 2022-06-20T20:22:12Z |
| mal-2022-5731 | Malicious code in reflowlist (npm) | 2022-06-20T20:22:11Z | 2022-06-20T20:22:12Z |
| mal-2022-5421 | Malicious code in poseshield (npm) | 2022-06-20T20:22:12Z | 2022-06-20T20:22:13Z |
| mal-2022-5445 | Malicious code in prefetchalyzer (npm) | 2022-06-20T20:22:12Z | 2022-06-20T20:22:12Z |
| mal-2022-5468 | Malicious code in processingjs-ide (npm) | 2022-06-20T20:22:12Z | 2022-06-20T20:22:12Z |
| mal-2022-5143 | Malicious code in ot-toy (npm) | 2022-06-20T20:22:13Z | 2022-06-20T20:22:14Z |
| mal-2022-5145 | Malicious code in ota-generator (npm) | 2022-06-20T20:22:13Z | 2022-06-20T20:22:14Z |
| mal-2022-5191 | Malicious code in pagespeed-inslides (npm) | 2022-06-20T20:22:13Z | 2022-06-20T20:22:14Z |
| mal-2022-5217 | Malicious code in paseos (npm) | 2022-06-20T20:22:13Z | 2022-06-20T20:22:13Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-2090 | ClamAV & Cisco Secure Endpoint: Mehrere Schwachstellen | 2023-08-16T22:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2023-2091 | TYPO3 Extension "hcaptcha": Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-08-16T22:00:00.000+00:00 | 2023-08-16T22:00:00.000+00:00 |
| wid-sec-w-2023-2092 | Juniper JUNOS: Mehrere Schwachstellen ermöglichen Codeausführung | 2023-08-17T22:00:00.000+00:00 | 2023-09-28T22:00:00.000+00:00 |
| wid-sec-w-2023-2093 | win.rar WinRAR: Mehrere Schwachstellen ermöglichen Codeausführung | 2023-08-17T22:00:00.000+00:00 | 2025-03-12T23:00:00.000+00:00 |
| wid-sec-w-2023-2094 | Ubiquiti UniFi Access Points und Switches: Mehrere Schwachstellen ermöglichen Codeausführung | 2023-08-17T22:00:00.000+00:00 | 2023-08-17T22:00:00.000+00:00 |
| wid-sec-w-2023-2095 | Apple Xcode: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-08-17T22:00:00.000+00:00 | 2023-08-17T22:00:00.000+00:00 |
| wid-sec-w-2023-2096 | Microsoft Edge: Mehrere Schwachstellen | 2023-08-17T22:00:00.000+00:00 | 2024-02-04T23:00:00.000+00:00 |
| wid-sec-w-2023-2097 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-08-17T22:00:00.000+00:00 | 2023-08-17T22:00:00.000+00:00 |
| wid-sec-w-2023-2099 | Apache Ivy: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-08-20T22:00:00.000+00:00 | 2024-02-28T23:00:00.000+00:00 |
| wid-sec-w-2023-2100 | Apache Nifi: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-08-20T22:00:00.000+00:00 | 2023-08-20T22:00:00.000+00:00 |
| wid-sec-w-2023-2101 | genua genucenter: Mehrere Schwachstellen | 2023-08-20T22:00:00.000+00:00 | 2023-08-20T22:00:00.000+00:00 |
| wid-sec-w-2023-2102 | Moodle: Mehrere Schwachstellen | 2023-08-20T22:00:00.000+00:00 | 2023-08-20T22:00:00.000+00:00 |
| wid-sec-w-2023-2103 | Samsung Exynos: Mehrere Schwachstellen | 2023-08-21T22:00:00.000+00:00 | 2023-08-21T22:00:00.000+00:00 |
| wid-sec-w-2023-2104 | Python: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-08-21T22:00:00.000+00:00 | 2023-08-21T22:00:00.000+00:00 |
| wid-sec-w-2023-2105 | Ivanti Sentry: Schwachstelle ermöglicht Umgehung von Sicherheitsmechanismen | 2023-08-21T22:00:00.000+00:00 | 2023-08-24T22:00:00.000+00:00 |
| wid-sec-w-2023-2106 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-08-21T22:00:00.000+00:00 | 2024-04-23T22:00:00.000+00:00 |
| wid-sec-w-2023-2107 | Varnish HTTP Cache: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-08-21T22:00:00.000+00:00 | 2023-08-21T22:00:00.000+00:00 |
| wid-sec-w-2023-2108 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2023-08-22T22:00:00.000+00:00 | 2024-01-31T23:00:00.000+00:00 |
| wid-sec-w-2023-2109 | Bitwarden: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-08-22T22:00:00.000+00:00 | 2023-08-28T22:00:00.000+00:00 |
| wid-sec-w-2023-2110 | MISP: Schwachstelle ermöglicht Cross-Site Scripting | 2023-08-22T22:00:00.000+00:00 | 2023-08-22T22:00:00.000+00:00 |
| wid-sec-w-2023-2111 | Cacti: Mehrere Schwachstellen | 2023-08-22T22:00:00.000+00:00 | 2024-12-08T23:00:00.000+00:00 |
| wid-sec-w-2023-2112 | IBM Spectrum Protect: Mehrere Schwachstellen | 2023-08-22T22:00:00.000+00:00 | 2023-08-22T22:00:00.000+00:00 |
| wid-sec-w-2023-2113 | Perl: Schwachstelle ermöglicht Privilegieneskalation | 2023-08-22T22:00:00.000+00:00 | 2023-12-18T23:00:00.000+00:00 |
| wid-sec-w-2023-2114 | binutils: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-08-22T22:00:00.000+00:00 | 2023-10-15T22:00:00.000+00:00 |
| wid-sec-w-2023-2115 | BusyBox: Schwachstelle ermöglicht Codeausführung | 2023-08-22T22:00:00.000+00:00 | 2025-02-13T23:00:00.000+00:00 |
| wid-sec-w-2023-2116 | Ruby on Rails: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-08-22T22:00:00.000+00:00 | 2025-11-25T23:00:00.000+00:00 |
| wid-sec-w-2023-2117 | Gitea: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-08-22T22:00:00.000+00:00 | 2023-08-22T22:00:00.000+00:00 |
| wid-sec-w-2023-2118 | Red Hat Enterprise Linux (subscription-manager): Schwachstelle ermöglicht Privilegieneskalation | 2023-08-22T22:00:00.000+00:00 | 2024-01-01T23:00:00.000+00:00 |
| wid-sec-w-2023-2119 | Python: Mehrere Schwachstellen | 2023-08-22T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2023-2120 | Aruba EdgeConnect SD-WAN Orchestrator: Mehrere Schwachstellen | 2023-08-22T22:00:00.000+00:00 | 2023-08-22T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2014:0416 | Red Hat Security Advisory: rhevm-spice-client security update | 2014-04-17T12:23:34+00:00 | 2026-01-28T22:35:04+00:00 |
| rhsa-2014:0421 | Red Hat Security Advisory: qemu-kvm-rhev security update | 2014-04-22T17:39:32+00:00 | 2025-11-21T17:47:59+00:00 |
| rhsa-2014:0420 | Red Hat Security Advisory: qemu-kvm security update | 2014-04-22T17:39:52+00:00 | 2025-11-21T17:47:54+00:00 |
| rhsa-2014:0419 | Red Hat Security Advisory: kernel security and bug fix update | 2014-04-22T17:39:59+00:00 | 2025-11-21T17:47:54+00:00 |
| rhsa-2014:0422 | Red Hat Security Advisory: openshift-origin-broker security update | 2014-04-23T06:29:09+00:00 | 2025-11-21T17:47:55+00:00 |
| rhsa-2014:0423 | Red Hat Security Advisory: openshift-origin-broker security update | 2014-04-23T06:39:22+00:00 | 2025-11-21T17:47:56+00:00 |
| rhsa-2014:0429 | Red Hat Security Advisory: tomcat6 security update | 2014-04-23T18:27:58+00:00 | 2026-01-28T22:38:02+00:00 |
| rhsa-2014:0435 | Red Hat Security Advisory: qemu-kvm-rhev security update | 2014-04-24T17:35:47+00:00 | 2025-11-21T17:48:01+00:00 |
| rhsa-2014:0434 | Red Hat Security Advisory: qemu-kvm-rhev security update | 2014-04-24T17:35:56+00:00 | 2025-11-21T17:47:58+00:00 |
| rhsa-2014:0433 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | 2014-04-24T17:36:04+00:00 | 2025-11-21T17:47:58+00:00 |
| rhsa-2014:0432 | Red Hat Security Advisory: kernel security and bug fix update | 2014-04-24T17:36:13+00:00 | 2025-11-21T17:47:57+00:00 |
| rhsa-2014:0441 | Red Hat Security Advisory: Red Hat Enterprise MRG Messaging 2.5 security, bug fix, and enhancement update | 2014-04-28T16:43:13+00:00 | 2026-01-13T22:33:20+00:00 |
| rhsa-2014:0440 | Red Hat Security Advisory: Red Hat Enterprise MRG Grid 2.5 security, bug fix, and enhancement update | 2014-04-28T16:43:37+00:00 | 2026-01-28T22:35:04+00:00 |
| rhsa-2014:0439 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | 2014-04-28T16:43:49+00:00 | 2026-01-06T20:21:01+00:00 |
| rhsa-2014:0442 | Red Hat Security Advisory: python-keystoneclient security update | 2014-04-28T20:06:16+00:00 | 2025-11-21T17:48:02+00:00 |
| rhsa-2014:0447 | Red Hat Security Advisory: flash-plugin security update | 2014-04-29T21:45:09+00:00 | 2025-11-21T17:48:03+00:00 |
| rhsa-2014:0449 | Red Hat Security Advisory: thunderbird security update | 2014-04-29T22:15:23+00:00 | 2025-11-21T17:48:03+00:00 |
| rhsa-2014:0448 | Red Hat Security Advisory: firefox security update | 2014-04-29T22:45:40+00:00 | 2025-11-21T17:48:03+00:00 |
| rhsa-2014:0454 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.2 security update | 2014-04-30T18:49:31+00:00 | 2026-01-28T22:58:11+00:00 |
| rhsa-2014:0453 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.2 security update | 2014-04-30T18:49:48+00:00 | 2026-01-28T22:58:10+00:00 |
| rhsa-2014:0452 | Red Hat Security Advisory: Fuse ESB Enterprise/Fuse MQ Enterprise 7.1.0 update | 2014-04-30T18:49:57+00:00 | 2026-01-28T22:38:02+00:00 |
| rhsa-2014:0459 | Red Hat Security Advisory: Red Hat JBoss Fuse Service Works 6.0.0 security update | 2014-04-30T19:00:31+00:00 | 2026-01-28T22:38:03+00:00 |
| rhsa-2014:0458 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.0.0 security update | 2014-04-30T19:01:13+00:00 | 2026-01-28T22:38:03+00:00 |
| rhsa-2014:0457 | Red Hat Security Advisory: Django security update | 2014-04-30T19:01:19+00:00 | 2025-11-21T17:48:06+00:00 |
| rhsa-2014:0456 | Red Hat Security Advisory: Django security update | 2014-04-30T19:01:28+00:00 | 2025-11-21T17:48:07+00:00 |
| rhsa-2014:0455 | Red Hat Security Advisory: openstack-glance security update | 2014-04-30T19:01:36+00:00 | 2025-11-21T17:48:06+00:00 |
| rhsa-2014:0460 | Red Hat Security Advisory: openshift-origin-broker-util security update | 2014-05-01T19:02:59+00:00 | 2025-11-21T17:48:08+00:00 |
| rhsa-2014:0462 | Red Hat Security Advisory: Red Hat JBoss Web Framework Kit 2.5.0 security update | 2014-05-01T19:43:33+00:00 | 2026-01-28T22:58:11+00:00 |
| rhsa-2014:0461 | Red Hat Security Advisory: openshift-origin-broker-util security update | 2014-05-01T19:43:37+00:00 | 2025-11-21T17:48:08+00:00 |
| rhsa-2014:0473 | Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.1 update | 2014-05-06T18:01:23+00:00 | 2026-01-28T22:38:03+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2023-22795 | A regular expression based DoS vulnerability in Action Dispatch <6.1.7.1 and <7.0.4.1 related to the If-None-Match header. A specially crafted HTTP If-None-Match header can cause the regular expression engine to enter a state of catastrophic backtracking when on a version of Ruby below 3.2.0. This can cause the process to use large amounts of CPU and memory leading to a possible DoS vulnerability All users running an affected release should either upgrade or use one of the workarounds immediately. | 2023-02-01T00:00:00.000Z | 2023-05-25T00:00:00.000Z |
| msrc_cve-2023-22995 | In the Linux kernel before 5.17 an error path in dwc3_qcom_acpi_register_core in drivers/usb/dwc3/dwc3-qcom.c lacks certain platform_device_put and kfree calls. | 2023-02-01T00:00:00.000Z | 2023-07-17T00:00:00.000Z |
| msrc_cve-2023-22996 | In the Linux kernel before 5.17.2 drivers/soc/qcom/qcom_aoss.c does not release an of_find_device_by_node reference after use e.g. with put_device. | 2023-02-01T00:00:00.000Z | 2023-03-07T00:00:00.000Z |
| msrc_cve-2023-22997 | In the Linux kernel before 6.1.2 kernel/module/decompress.c misinterprets the module_get_next_page return value (expects it to be NULL in the error case whereas it is actually an error pointer). | 2023-02-01T00:00:00.000Z | 2023-04-07T00:00:00.000Z |
| msrc_cve-2023-22998 | In the Linux kernel before 6.0.3 drivers/gpu/drm/virtio/virtgpu_object.c misinterprets the drm_gem_shmem_get_sg_table return value (expects it to be NULL in the error case whereas it is actually an error pointer). | 2023-02-01T00:00:00.000Z | 2023-03-04T00:00:00.000Z |
| msrc_cve-2023-22999 | In the Linux kernel before 5.16.3 drivers/usb/dwc3/dwc3-qcom.c misinterprets the dwc3_qcom_create_urs_usb_platdev return value (expects it to be NULL in the error case whereas it is actually an error pointer). | 2023-02-01T00:00:00.000Z | 2023-03-07T00:00:00.000Z |
| msrc_cve-2023-23039 | An issue was discovered in the Linux kernel through 6.2.0-rc2. drivers/tty/vcc.c has a race condition and resultant use-after-free if a physically proximate attacker removes a VCC device while calling open() aka a race condition between vcc_open() and vcc_remove(). | 2023-02-01T00:00:00.000Z | 2023-03-07T00:00:00.000Z |
| msrc_cve-2023-23914 | A cleartext transmission of sensitive information vulnerability exists in curl <v7.88.0 that could cause HSTS functionality fail when multiple URLs are requested serially. Using its HSTS support curl can be instructed to use HTTPS instead of usingan insecure clear-text HTTP step even when HTTP is provided in the URL. ThisHSTS mechanism would however surprisingly be ignored by subsequent transferswhen done on the same command line because the state would not be properlycarried on. | 2023-02-01T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-23915 | A cleartext transmission of sensitive information vulnerability exists in curl <v7.88.0 that could cause HSTS functionality to behave incorrectly when multiple URLs are requested in parallel. Using its HSTS support curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however surprisingly fail when multiple transfers are done in parallel as the HSTS cache file gets overwritten by the most recentlycompleted transfer. A later HTTP-only transfer to the earlier host name would then *not* get upgraded properly to HSTS. | 2023-02-01T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-23916 | An allocation of resources without limits or throttling vulnerability exists in curl <v7.88.0 based on the "chained" HTTP compression algorithms meaning that a server response can be compressed multiple times and potentially with differentalgorithms. The number of acceptable "links" in this "decompression chain" wascapped but the cap was implemented on a per-header basis allowing a maliciousserver to insert a virtually unlimited number of compression steps simply byusing many headers. The use of such a decompression chain could result in a "malloc bomb" making curl end up spending enormous amounts of allocated heap memory or trying to and returning out of memory errors. | 2023-02-01T00:00:00.000Z | 2024-11-20T00:00:00.000Z |
| msrc_cve-2023-23918 | A privilege escalation vulnerability exists in Node.js <19.6.1 <18.14.1 <16.19.1 and <14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy. | 2023-02-01T00:00:00.000Z | 2023-03-04T00:00:00.000Z |
| msrc_cve-2023-23919 | A cryptographic vulnerability exists in Node.js <19.2.0 <18.14.1 <16.19.1 <14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service. | 2023-02-01T00:00:00.000Z | 2023-03-25T00:00:00.000Z |
| msrc_cve-2023-23920 | An untrusted search path vulnerability exists in Node.js. <19.6.1 <18.14.1 <16.19.1 and <14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges. | 2023-02-01T00:00:00.000Z | 2023-03-25T00:00:00.000Z |
| msrc_cve-2023-23931 | Cipher.update_into can corrupt memory in pyca cryptography | 2023-02-01T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-23934 | Wrkzeug's incorrect parsing of nameless cookies leads to __Host- cookies bypass | 2023-02-01T00:00:00.000Z | 2023-03-25T00:00:00.000Z |
| msrc_cve-2023-23936 | CRLF Injection in Nodejs ‘undici’ via host | 2023-02-01T00:00:00.000Z | 2023-03-25T00:00:00.000Z |
| msrc_cve-2023-24329 | An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters. | 2023-02-01T00:00:00.000Z | 2023-10-11T00:00:00.000Z |
| msrc_cve-2023-24807 | Undici vulnerable to Regular Expression Denial of Service in Headers | 2023-02-01T00:00:00.000Z | 2023-03-25T00:00:00.000Z |
| msrc_cve-2023-25012 | The Linux kernel through 6.1.9 has a Use-After-Free in bigben_remove in drivers/hid/hid-bigbenff.c via a crafted USB device because the LED controllers remain registered for too long. | 2023-02-01T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-25136 | OpenSSH server (sshd) 9.1 introduced a double-free vulnerability during options.kex_algorithms handling. This is fixed in OpenSSH 9.2. The double free can be leveraged, by an unauthenticated remote attacker in the default configuration, to jump to any location in the sshd address space. One third-party report states "remote code execution is theoretically possible." | 2023-02-01T00:00:00.000Z | 2025-10-01T23:11:30.000Z |
| msrc_cve-2023-25153 | containerd OCI image importer memory exhaustion | 2023-02-01T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-25165 | getHostByName Function Information Disclosure | 2023-02-01T00:00:00.000Z | 2024-09-11T00:00:00.000Z |
| msrc_cve-2023-25173 | containerd supplementary groups are not set up properly | 2023-02-01T00:00:00.000Z | 2023-03-20T00:00:00.000Z |
| msrc_cve-2023-25193 | hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks. | 2023-02-01T00:00:00.000Z | 2023-02-14T00:00:00.000Z |
| msrc_cve-2023-25563 | GSS-NTLMSSP vulnerable to multiple out-of-bounds reads when decoding NTLM fields | 2023-02-01T00:00:00.000Z | 2025-03-14T00:00:00.000Z |
| msrc_cve-2023-25564 | GSS-NTLMSSP vulnerable to memory corruption when decoding UTF16 strings | 2023-02-01T00:00:00.000Z | 2025-03-14T00:00:00.000Z |
| msrc_cve-2023-25565 | GSS-NTLMSSP vulnerable to incorrect free when decoding target information | 2023-02-01T00:00:00.000Z | 2025-03-14T00:00:00.000Z |
| msrc_cve-2023-25566 | GSS-NTLMSSP vulnerable to memory leak when parsing usernames | 2023-02-01T00:00:00.000Z | 2025-03-14T00:00:00.000Z |
| msrc_cve-2023-25567 | GSS-NTLMSSP vulnerable to out-of-bounds read when decoding target information | 2023-02-01T00:00:00.000Z | 2025-03-14T00:00:00.000Z |
| msrc_cve-2023-25577 | Werkzeug may allow high resource usage when parsing multipart form data with many fields | 2023-02-01T00:00:00.000Z | 2023-02-20T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201809-1226 | Schneider Electric Modicon TM218LDAE40DRPHN is a 24/16 PLC from Schneider. Schneider El… | 2022-05-17T01:57:39.609000Z |
| var-201809-1205 | MAC1100 PLC is a programmable logic controller produced by Dalian University of Technolog… | 2022-05-17T01:57:39.624000Z |
| var-201808-1088 | ASUSDSLN10 is a wired and wireless modem router. In the ASUSDSLN10C1 modem firmware versi… | 2022-05-17T01:57:39.729000Z |
| var-201808-1046 | TP03-software V21 is a programmable controller. Taian Technology TP03-Software V21 has … | 2022-05-17T01:57:39.741000Z |
| var-201807-2225 | PI-ProcessBook is a powerful tool for displaying real-time data collected and stored by P… | 2022-05-17T01:57:39.838000Z |
| var-201805-1196 | Hollysys Group is a professional automation company integrating R & D, production, sales … | 2022-05-17T01:57:40.140000Z |
| var-201801-1717 | ForceControl is the configuration software developed by Force Control Technology for the … | 2022-05-17T01:57:40.607000Z |
| var-201710-1462 | SAP NetWeaver is prone to an information-disclosure vulnerability. Attackers can exploit … | 2022-05-17T01:57:40.902000Z |
| var-201709-1297 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable instal… | 2022-05-17T01:57:41.004000Z |
| var-201709-1265 | SAP NetWeaver is prone to an XML External Entity injection vulnerability. Attackers can … | 2022-05-17T01:57:41.015000Z |
| var-201708-1710 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable instal… | 2022-05-17T01:57:41.123000Z |
| var-201708-1668 | SAP NetWeaver is prone to a URI-redirection vulnerability because the application fails t… | 2022-05-17T01:57:41.143000Z |
| var-201708-1580 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable instal… | 2022-05-17T01:57:41.176000Z |
| var-201706-1158 | SAP NetWeaver is prone to an information-disclosure vulnerability. Attackers can exploit … | 2022-05-17T01:57:41.402000Z |
| var-201705-4232 | HP Conexant HD Audio Driver is prone to an unspecified local information-disclosure vulne… | 2022-05-17T01:57:41.505000Z |
| var-201705-4230 | SAP GUI is prone to a security-bypass vulnerability. Remote attackers can exploit this is… | 2022-05-17T01:57:41.521000Z |
| var-201703-1425 | SAP Enterprise Portal is prone to an unspecified cross-site scripting vulnerability becau… | 2022-05-17T01:57:41.870000Z |
| var-201611-0423 | MikroTikRouterOS is a Linux-based routing operating system developed by MikroTik of Latvi… | 2022-05-17T01:57:42.514000Z |
| var-201610-0726 | The TP-LinkArcher CR-700 is a router. A cross-site scripting vulnerability exists in TP-L… | 2022-05-17T01:57:42.593000Z |
| var-201609-0601 | 140NOE77101 is an Ethernet communication module for Schneider's Quantum series PLC. 140… | 2022-05-17T01:57:42.680000Z |
| var-201608-0437 | Fortinet FortiVoice is a complete business telephone system developed by Fortinet. Forti… | 2022-05-17T01:57:42.820000Z |
| var-201608-0416 | FX3U is a high-end PLC of Mitsubishi, and its transmission layer uses COTP protocol for c… | 2022-05-17T01:57:42.835000Z |
| var-201604-0695 | AVMFritz! Box is a router product of the German AVM company. There is a stack buffer over… | 2022-05-17T01:57:43.203000Z |
| var-201602-0482 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable instan… | 2022-05-17T01:57:43.383000Z |
| var-201602-0438 | D-Link DSL-2750B is a Model router product of D-Link. An arbitrary command execution vul… | 2022-05-17T01:57:43.409000Z |
| var-201602-0395 | Schneider Electric PLCModicon M580 It is an Ethernet programmable controller. Schneider E… | 2022-05-17T01:57:43.434000Z |
| var-201601-0717 | Buffalo LinkStation 420 is a NAS network storage of Japan Buffalo Group. A denial of ser… | 2022-05-17T01:57:43.494000Z |
| var-201509-0501 | Huawei FusionAccess is a desktop management system of Huawei FusionCloud desktop cloud so… | 2022-05-17T01:57:43.888000Z |
| var-201505-0498 | Huawei E355s Mobile WiFi is a wireless sharing device. Huawei E355s Mobile WiFi has an un… | 2022-05-17T01:57:44.445000Z |
| var-201504-0622 | Net-SNMP is a set of open source Simple Network Management Protocol software. This softwa… | 2022-05-17T01:57:44.576000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2018:4193-1 | Security update for libnettle | 2018-12-19T12:53:27Z | 2018-12-19T12:53:27Z |
| suse-su-2018:4188-1 | Security update for bluez | 2018-12-19T12:54:16Z | 2018-12-19T12:54:16Z |
| suse-su-2018:4189-1 | Security update for bluez | 2018-12-19T12:54:42Z | 2018-12-19T12:54:42Z |
| suse-su-2018:4194-1 | Security update for ovmf | 2018-12-19T12:54:50Z | 2018-12-19T12:54:50Z |
| suse-su-2018:4190-1 | Security update for git | 2018-12-19T13:16:49Z | 2018-12-19T13:16:49Z |
| suse-su-2018:4191-1 | Security update for tiff | 2018-12-19T13:17:26Z | 2018-12-19T13:17:26Z |
| suse-su-2018:4196-1 | Security update for the Linux Kernel (Live Patch 38 for SLE 12) | 2018-12-19T15:33:38Z | 2018-12-19T15:33:38Z |
| suse-su-2018:4195-1 | Security update for the Linux Kernel (Live Patch 35 for SLE 12) | 2018-12-19T15:33:42Z | 2018-12-19T15:33:42Z |
| suse-su-2018:4207-1 | Security update for ovmf | 2018-12-20T09:43:08Z | 2018-12-20T09:43:08Z |
| suse-su-2018:4209-1 | Security update for yast2-rmt | 2018-12-20T21:05:23Z | 2018-12-20T21:05:23Z |
| suse-su-2018:4210-1 | Security update for libqt5-qtbase | 2018-12-20T21:05:42Z | 2018-12-20T21:05:42Z |
| suse-su-2018:4208-1 | Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3) | 2018-12-20T21:06:25Z | 2018-12-20T21:06:25Z |
| suse-su-2018:4211-1 | Security update for mariadb | 2018-12-20T21:06:44Z | 2018-12-20T21:06:44Z |
| suse-su-2018:4214-1 | Security update for netatalk | 2018-12-21T05:45:58Z | 2018-12-21T05:45:58Z |
| suse-su-2018:4215-1 | Security update for enigmail | 2018-12-21T10:23:52Z | 2018-12-21T10:23:52Z |
| suse-su-2018:4217-1 | Security update for netatalk | 2018-12-21T13:42:04Z | 2018-12-21T13:42:04Z |
| suse-su-2018:4235-1 | Security update for MozillaFirefox, mozilla-nspr and mozilla-nss | 2018-12-21T17:47:33Z | 2018-12-21T17:47:33Z |
| suse-su-2018:4236-1 | Security update for MozillaFirefox, mozilla-nspr and mozilla-nss | 2018-12-21T17:49:53Z | 2018-12-21T17:49:53Z |
| suse-su-2018:4238-1 | Security update for the Linux Kernel (Live Patch 0 for SLE 15) | 2018-12-22T10:51:46Z | 2018-12-22T10:51:46Z |
| suse-su-2018:4237-1 | Security update for qemu | 2018-12-22T10:52:20Z | 2018-12-22T10:52:20Z |
| suse-su-2018:4274-1 | Security update for openssl | 2018-12-27T08:06:44Z | 2018-12-27T08:06:44Z |
| suse-su-2018:4296-1 | Security update for mailman | 2018-12-28T17:38:42Z | 2018-12-28T17:38:42Z |
| suse-su-2018:4300-1 | Security update for xen | 2018-12-28T17:38:50Z | 2018-12-28T17:38:50Z |
| suse-su-2018:4297-1 | Security update for containerd, docker and go | 2018-12-28T17:39:11Z | 2018-12-28T17:39:11Z |
| suse-su-2018:4294-1 | Security update for libqt5-qtbase | 2018-12-28T17:39:23Z | 2018-12-28T17:39:23Z |
| suse-su-2018:4295-1 | Security update for wireshark | 2018-12-28T17:39:38Z | 2018-12-28T17:39:38Z |
| suse-su-2018:4298-1 | Security update for wireshark | 2018-12-28T17:40:20Z | 2018-12-28T17:40:20Z |
| suse-su-2019:0002-1 | Security update for libraw | 2019-01-02T10:38:56Z | 2019-01-02T10:38:56Z |
| suse-su-2019:0003-1 | Security update for xen | 2019-01-02T10:39:50Z | 2019-01-02T10:39:50Z |
| suse-su-2019:13921-1 | Security update for xen | 2019-01-02T10:40:18Z | 2019-01-02T10:40:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:10408-1 | udisks-1.0.5-5.10 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10409-1 | jq-1.5-3.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10410-1 | yast2-3.2.7-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10411-1 | python-keystonemiddleware-4.9.0-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10412-1 | gdm-3.22.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10413-1 | unixODBC-2.3.4-3.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10414-1 | libtasn1-4.9-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10415-1 | guile1-1.8.8-19.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10416-1 | liblxc-devel-2.0.4-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10417-1 | libdmx-devel-1.1.3-5.8 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10418-1 | rocksndiamonds-3.3.1.2-2.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10419-1 | libXt-devel-1.1.5-1.19 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10420-1 | bsh2-2.0.0.b6-2.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10421-1 | libspice-client-glib-2_0-8-0.33-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10422-1 | libvpx-devel-1.6.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10423-1 | tor-0.2.8.11-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10424-1 | libXtst-devel-1.2.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10425-1 | edje-1.18.2-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10426-1 | libpython3_5m1_0-3.5.1-3.6 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10427-1 | libipa_hbac-devel-1.14.2-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10428-1 | claws-mail-3.14.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10429-1 | gstreamer-0_10-plugins-bad-0.10.23-22.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10430-1 | conntrack-tools-1.4.4-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10431-1 | xorg-x11-7.6_1-16.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10432-1 | finch-2.11.0-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10433-1 | libv8-5-5.3.171-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10434-1 | libminiupnpc-devel-2.0-1.5 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10435-1 | nano-2.7.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10436-1 | libpolkit0-0.113-3.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10437-1 | tomboy-1.15.5-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-valkey-2025-27151 | redis-check-aof may lead to stack overflow and potential RCE | 2025-05-31T06:02:22.962Z | 2025-11-06T13:25:46.476Z |
| bit-drupal-2024-11941 | Drupal core - Moderately critical - Denial of Service - SA-CORE-2024-001 | 2025-06-03T14:40:58.183Z | 2025-06-03T15:16:07.023Z |
| bit-drupal-2024-11942 | Drupal core - Moderately critical - Improper error handling - SA-CORE-2024-002 | 2025-06-03T14:41:02.265Z | 2025-06-03T15:16:07.023Z |
| bit-drupal-2024-12393 | Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2024-003 | 2025-06-03T14:41:06.473Z | 2025-06-03T15:16:07.023Z |
| bit-drupal-2024-55634 | Drupal core - Moderately critical - Access bypass - SA-CORE-2024-004 | 2025-06-03T14:41:15.479Z | 2025-06-03T15:16:07.023Z |
| bit-drupal-2024-55635 | Drupal core - Critical - Cross Site Scripting - SA-CORE-2024-005 | 2025-06-03T14:41:19.575Z | 2025-06-03T15:16:07.023Z |
| bit-drupal-2024-55636 | Drupal core - Less critical - Gadget chain - SA-CORE-2024-006 | 2025-06-03T14:41:23.754Z | 2025-06-03T15:16:07.023Z |
| bit-drupal-2024-55637 | Drupal core - Moderately critical - Gadget chain - SA-CORE-2024-007 | 2025-06-03T14:41:27.578Z | 2025-06-03T15:16:07.023Z |
| bit-drupal-2024-55638 | Drupal core - Moderately critical - Gadget chain - SA-CORE-2024-008 | 2025-06-03T14:41:31.768Z | 2025-06-03T15:16:07.023Z |
| bit-drupal-2025-31673 | Drupal core - Moderately critical - Access bypass - SA-CORE-2025-002 | 2025-06-03T14:41:39.975Z | 2025-06-03T15:16:07.023Z |
| bit-drupal-2025-31675 | Drupal core - Moderately critical - Cross Site Scripting - SA-CORE-2025-004 | 2025-06-03T14:41:48.563Z | 2025-06-03T15:16:07.023Z |
| bit-joomla-2024-21722 | [20240201] - Core - Insufficient session expiration in MFA management views | 2025-06-03T14:48:33.767Z | 2025-06-03T15:16:07.023Z |
| bit-joomla-2024-21723 | [20240202] - Core - Open redirect in installation application | 2025-06-03T14:48:37.081Z | 2025-06-03T15:16:07.023Z |
| bit-joomla-2024-21725 | [20240204] - Core - XSS in mail address outputs | 2025-06-03T14:48:43.681Z | 2025-06-03T15:16:07.023Z |
| bit-joomla-2024-21726 | [20240205] - Core - Inadequate content filtering within the filter code | 2025-06-03T14:48:46.964Z | 2025-08-20T09:06:12.327Z |
| bit-moodle-2024-45689 | Moodle: unprotected access to sensitive information via dynamic tables | 2025-06-03T14:59:02.378Z | 2025-06-03T15:16:07.023Z |
| bit-moodle-2024-45690 | Moodle: idor when deleting oauth2 linked accounts | 2025-06-03T14:59:05.874Z | 2025-06-03T15:16:07.023Z |
| bit-moodle-2024-45691 | Moodle: lesson activity password bypass through php loose comparison | 2025-06-03T14:59:09.259Z | 2025-06-03T15:16:07.023Z |
| bit-moodle-2024-48899 | Moodle: idor when accessing list of course badges | 2025-06-03T14:59:22.068Z | 2025-06-03T15:16:07.023Z |
| bit-superset-2025-48912 | Apache Superset: Improper authorization bypass on row level security via SQL Injection | 2025-06-03T15:03:14.788Z | 2025-06-03T15:16:07.023Z |
| bit-gitlab-2025-1763 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2025-06-03T15:14:55.173Z | 2025-06-03T15:16:07.023Z |
| bit-grafana-2025-3260 | 2025-06-04T14:44:55.391Z | 2025-06-04T15:15:46.482Z | |
| bit-grafana-2025-3454 | 2025-06-04T14:44:58.591Z | 2025-06-04T15:15:46.482Z | |
| bit-modsecurity-2025-48866 | ModSecurity has possible DoS vulnerability in sanitiseArg action | 2025-06-04T14:47:59.719Z | 2025-06-10T07:53:49.719Z |
| bit-modsecurity2-2025-48866 | ModSecurity has possible DoS vulnerability in sanitiseArg action | 2025-06-04T14:48:01.890Z | 2025-06-10T07:53:49.719Z |
| bit-pytorch-2024-31584 | 2025-06-04T14:56:56.215Z | 2025-06-04T15:15:46.482Z | |
| bit-joomla-2024-27184 | [20240801] - Core - Inadequate validation of internal URLs | 2025-06-05T05:48:25.183Z | 2025-06-05T06:15:32.323Z |
| bit-joomla-2024-27185 | [20240802] - Core - Cache Poisoning in Pagination | 2025-06-05T05:48:28.569Z | 2025-06-05T06:15:32.323Z |
| bit-joomla-2024-27186 | [20240803] - Core - XSS in HTML Mail Templates | 2025-06-05T05:48:32.052Z | 2025-06-05T06:15:32.323Z |
| bit-joomla-2024-27187 | [20240804] - Core - Improper ACL for backend profile view | 2025-06-05T05:48:35.583Z | 2025-06-05T06:15:32.323Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-03915 | Opsview跨站脚本漏洞 | 2015-06-23 | 2015-06-24 |
| cnvd-2015-03916 | Alcatel-Lucent CellPipe 7130路由器跨站脚本漏洞 | 2015-06-23 | 2015-06-24 |
| cnvd-2015-03917 | Joomla! EQ Event Calendar组件SQL注入漏洞 | 2015-06-23 | 2015-06-24 |
| cnvd-2015-03918 | Milw0rm Clone Script SQL注入漏洞 | 2015-06-23 | 2015-06-24 |
| cnvd-2015-03919 | ClickHeat跨站请求伪造漏洞 | 2015-06-23 | 2015-06-24 |
| cnvd-2015-03920 | Symphony CMS跨站脚本漏洞(CNVD-2015-03920) | 2015-06-23 | 2015-06-24 |
| cnvd-2015-03921 | Cisco Web Security Appliance跨站脚本漏洞(CNVD-2015-03921) | 2015-06-23 | 2015-06-24 |
| cnvd-2015-03922 | ApPHP Hotel Site SQL注入漏洞 | 2015-06-23 | 2015-06-24 |
| cnvd-2015-03923 | Dream Multimedia DreamBox DM500-S跨站脚本漏洞 | 2015-06-23 | 2015-06-24 |
| cnvd-2015-03945 | Adobe Bridge整数溢出任意代码执行漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03946 | Symantec Endpoint Protection 'sysplant.sys'拒绝服务漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03947 | Symantec Endpoint Protection管理控制台SQL注入漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03948 | Symantec Endpoint Protection DLL加载任意代码执行漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03949 | Cisco IOS XR IPv6 ipv6_io服务处理拒绝服务漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03952 | PHP 'ftp_genlist()'函数整数溢出漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03953 | Samsung Galaxy S手机远程代码执行漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03954 | Cisco WebEx Meeting Center合法用户名泄露漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03955 | Cisco IOS XR SSH链接终止拒绝服务漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03956 | Adobe Bridge堆溢出任意代码执行漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03957 | IBM InfoSphere Information Server Installer本地信息泄露漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03963 | PHP空指针引用限制绕过漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03964 | PHP 'exception::getTraceAsString'类型混淆漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03965 | PHP libmagick 'libmagic/softmagic.c'拒绝服务漏洞(CNVD-2015-03965) | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03966 | PHP libmagick 'libmagic/softmagic.c'拒绝服务漏洞(CNVD-2015-03966) | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03967 | PHP DOM及GD扩展限制绕过漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03968 | PHP SOAP访问存在多个内存破坏漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03969 | PHP SOAP访问远程内存破坏漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03970 | PHP 'incomplete_class.c'内存破坏漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03971 | Persian Car CMS SQL注入漏洞 | 2015-06-23 | 2015-06-25 |
| cnvd-2015-03972 | FiverrScript跨站请求伪造漏洞 | 2015-06-23 | 2015-06-25 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2009-avi-344 | Vulnérabilités de Cisco IOS XR | 2009-08-21T00:00:00.000000 | 2009-08-21T00:00:00.000000 |
| certa-2009-avi-345 | Vulnérabilité dans Cisco Firewall Services Module | 2009-08-24T00:00:00.000000 | 2009-08-24T00:00:00.000000 |
| certa-2009-avi-346 | Vulnérabilité dans le client IBM AFS pour Linux | 2009-08-25T00:00:00.000000 | 2009-08-25T00:00:00.000000 |
| certa-2009-avi-347 | Vulnérabilités dans la bibliothèque neon | 2009-08-25T00:00:00.000000 | 2009-08-25T00:00:00.000000 |
| certa-2009-avi-348 | Vulnérabilité dans les produits VMware | 2009-08-25T00:00:00.000000 | 2009-08-25T00:00:00.000000 |
| certa-2009-avi-349 | Vulnérabilité dans Radix Antirootkit | 2009-08-25T00:00:00.000000 | 2009-08-25T00:00:00.000000 |
| certa-2009-avi-350 | Vulnérabilité du client de messagerie Mozilla Thunderbird | 2009-08-25T00:00:00.000000 | 2009-08-25T00:00:00.000000 |
| certa-2009-avi-351 | Vulnérabilité dans les produits Symantec | 2009-08-26T00:00:00.000000 | 2009-08-26T00:00:00.000000 |
| certa-2009-avi-352 | Vulnérabilité dans Xerox WorkCentre | 2009-08-26T00:00:00.000000 | 2009-08-26T00:00:00.000000 |
| certa-2009-avi-353 | Vulnérabilité dans Lotus Notes | 2009-08-26T00:00:00.000000 | 2009-08-26T00:00:00.000000 |
| certa-2009-avi-354 | Vulnérabilité dans Sun Solaris Print Service | 2009-08-26T00:00:00.000000 | 2009-08-26T00:00:00.000000 |
| certa-2009-avi-355 | Multiples vulnérabilités du navigateur Google Chrome | 2009-08-27T00:00:00.000000 | 2009-08-27T00:00:00.000000 |
| certa-2009-avi-356 | Multiples vulnérabilités dans Symantec Altiris Deployment Solution | 2009-08-27T00:00:00.000000 | 2009-08-27T00:00:00.000000 |
| certa-2009-avi-357 | Vulnérabilités de Cisco Unified Communications Manager | 2009-08-27T00:00:00.000000 | 2009-08-27T00:00:00.000000 |
| certa-2009-avi-358 | Vulnérabilité dans Sun Solaris | 2009-08-27T00:00:00.000000 | 2009-08-27T00:00:00.000000 |
| certa-2009-avi-359 | Vulnérabilité dans Norton AntiVirus et Symantec Client Security Email | 2009-08-28T00:00:00.000000 | 2009-08-28T00:00:00.000000 |
| certa-2009-avi-360 | Multiples vulnérabilités dans Opera | 2009-09-01T00:00:00.000000 | 2009-09-01T00:00:00.000000 |
| certa-2009-avi-361 | Vulnérabilité dans Dnsmasq | 2009-09-01T00:00:00.000000 | 2009-09-01T00:00:00.000000 |
| certa-2009-avi-362 | Vulnérabilités dans OpenOffice.org | 2009-09-01T00:00:00.000000 | 2009-09-07T00:00:00.000000 |
| certa-2009-avi-363 | Vulnérabilité de wget | 2009-09-02T00:00:00.000000 | 2009-12-04T00:00:00.000000 |
| certa-2009-avi-364 | Vulnérabilité dans Qt | 2009-09-03T00:00:00.000000 | 2009-09-03T00:00:00.000000 |
| certa-2009-avi-365 | Vulnérabilités dans IBM Java | 2009-09-03T00:00:00.000000 | 2009-09-03T00:00:00.000000 |
| certa-2009-avi-366 | Vulnérabilité Java de Mac OS X | 2009-09-04T00:00:00.000000 | 2009-09-04T00:00:00.000000 |
| certa-2009-avi-367 | Vulnérabilité dans IBM Tivoli Identity Manager | 2009-09-07T00:00:00.000000 | 2009-09-07T00:00:00.000000 |
| certa-2009-avi-368 | Vulnérabilité dans IBM Lotus Domino Web Acess | 2009-09-07T00:00:00.000000 | 2009-09-07T00:00:00.000000 |
| certa-2009-avi-369 | Vulnérabilité de Microsoft JScript | 2009-09-09T00:00:00.000000 | 2009-09-09T00:00:00.000000 |
| certa-2009-avi-370 | Vulnérabilité dans le composant d'édition DHTML de Microsoft Windows | 2009-09-09T00:00:00.000000 | 2009-09-09T00:00:00.000000 |
| certa-2009-avi-371 | Vulnérabilités dans Windows Media Format | 2009-09-09T00:00:00.000000 | 2009-09-09T00:00:00.000000 |
| certa-2009-avi-372 | Multiples vulnérabilités dans TCP/IP sous Windows | 2009-09-09T00:00:00.000000 | 2009-09-09T00:00:00.000000 |
| certa-2009-avi-373 | Vulnérabilité dans Microsoft Wireless LAN AutoConfig Service | 2009-09-09T00:00:00.000000 | 2009-09-09T00:00:00.000000 |