Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2002-0264 |
N/A
|
PowerFTP Personal FTP Server 2.03 through 2.10 st… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.921Z |
| CVE-2002-0266 |
N/A
|
Thunderstone Texis CGI script allows remote attac… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.999Z |
| CVE-2002-0268 |
N/A
|
Identix BioLogon 3 allows users with physical acc… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.611Z |
| CVE-2002-0269 |
N/A
|
Internet Explorer 5.x and 6 interprets an object … |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:29.016Z |
| CVE-2002-0270 |
N/A
|
Opera, when configured with the "Determine action… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.616Z |
| CVE-2002-0271 |
N/A
|
Runtime library in GNU Ada compiler (GNAT) 3.12p … |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.612Z |
| CVE-2002-0272 |
N/A
|
Buffer overflows in mpg321 before 0.2.9 allows lo… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.610Z |
| CVE-2002-0273 |
N/A
|
Buffer overflow in CWMail.exe in NetWin before 2.… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.573Z |
| CVE-2002-0277 |
N/A
|
Add2it Mailman Free 1.73 and earlier allows remot… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.562Z |
| CVE-2002-0278 |
N/A
|
Directory traversal vulnerability in Add2it Mailm… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.884Z |
| CVE-2002-0279 |
N/A
|
The kernel in HP-UX 11.11 does not properly provi… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.686Z |
| CVE-2002-0280 |
N/A
|
Buffer overflow in CodeBlue 4 and earlier, and po… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.954Z |
| CVE-2002-0281 |
N/A
|
Cross-site scripting vulnerability in DCP-Portal … |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:29.019Z |
| CVE-2002-0282 |
N/A
|
DCP-Portal 3.7 through 4.5 allows remote attacker… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.624Z |
| CVE-2002-0283 |
N/A
|
Windows XP with port 445 open allows remote attac… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:29.018Z |
| CVE-2002-0284 |
N/A
|
Winamp 2.78 and 2.77, when opening a wma file tha… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:29.019Z |
| CVE-2002-0285 |
N/A
|
Outlook Express 5.5 and 6.0 on Windows treats a c… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.861Z |
| CVE-2002-0286 |
N/A
|
The GetPassword function in function.php of SiteN… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:29.021Z |
| CVE-2002-0288 |
N/A
|
Directory traversal vulnerability in Phusion web … |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.855Z |
| CVE-2002-0289 |
N/A
|
Buffer overflow in Phusion web server 1.0 allows … |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:29.168Z |
| CVE-2002-0291 |
N/A
|
Dino's Webserver 1.2 allows remote attackers to c… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.934Z |
| CVE-2002-0293 |
N/A
|
FTP service in Alcatel OmniPCX 4400 allows the "h… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.928Z |
| CVE-2002-0294 |
N/A
|
Alcatel 4400 installs the /chetc/shutdown command… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:29.199Z |
| CVE-2002-0295 |
N/A
|
Alcatel OmniPCX 4400 installs files with world-wr… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:29.017Z |
| CVE-2002-0296 |
N/A
|
The installation of Tarantella Enterprise 3 allow… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.999Z |
| CVE-2002-0297 |
N/A
|
Buffer overflow in ScriptEase MiniWeb Server 0.95… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.982Z |
| CVE-2002-0298 |
N/A
|
ScriptEase MiniWeb Server 0.95 allows remote atta… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.943Z |
| CVE-2002-0301 |
N/A
|
Citrix NFuse 1.6 allows remote attackers to bypas… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.948Z |
| CVE-2002-0303 |
N/A
|
GroupWise 6, when using LDAP authentication and w… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:29.060Z |
| CVE-2002-0304 |
N/A
|
Lil HTTP Server 2.1 allows remote attackers to re… |
n/a |
n/a |
2002-05-03T04:00:00 | 2024-08-08T02:42:28.947Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2001-1438 |
N/A
|
Handspring Visor 1.0 and 1.0.1 with the VisorPhon… |
n/a |
n/a |
2005-04-21T04:00:00 | 2024-08-08T04:58:11.203Z |
| CVE-2001-1461 |
N/A
|
Directory traversal vulnerability in WebID in RSA… |
n/a |
n/a |
2005-04-21T04:00:00 | 2024-08-08T04:58:11.458Z |
| CVE-2001-1462 |
N/A
|
WebID in RSA Security SecurID 5.0 as used by ACE/… |
n/a |
n/a |
2005-04-21T04:00:00 | 2024-08-08T04:58:11.167Z |
| CVE-2001-0923 |
N/A
|
RPM Package Manager 4.0.x through 4.0.2.x allows … |
n/a |
n/a |
2002-02-02T05:00:00 | 2024-08-08T04:37:06.687Z |
| CVE-2001-0505 |
N/A
|
Multiple memory leaks in Microsoft Services for U… |
n/a |
n/a |
2001-10-12T04:00:00 | 2024-08-08T04:21:38.521Z |
| CVE-2001-0535 |
N/A
|
Example applications (Exampleapps) in ColdFusion … |
n/a |
n/a |
2001-10-12T04:00:00 | 2024-08-08T04:21:38.620Z |
| CVE-2001-0540 |
N/A
|
Memory leak in Terminal servers in Windows NT and… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:21:38.799Z |
| CVE-2001-0544 |
N/A
|
IIS 5.0 allows local users to cause a denial of s… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:21:38.683Z |
| CVE-2001-0545 |
N/A
|
IIS 4.0 with URL redirection enabled allows remot… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:21:38.671Z |
| CVE-2001-0652 |
N/A
|
Heap overflow in xlock in Solaris 2.6 through 8 a… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.047Z |
| CVE-2001-0660 |
N/A
|
Outlook Web Access (OWA) in Microsoft Exchange 5.… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.064Z |
| CVE-2001-0662 |
N/A
|
RPC endpoint mapper in Windows NT 4.0 allows remo… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.068Z |
| CVE-2001-0664 |
N/A
|
Internet Explorer 5.5 and 5.01 allows remote atta… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.020Z |
| CVE-2001-0665 |
N/A
|
Internet Explorer 6 and earlier allows remote att… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.023Z |
| CVE-2001-0666 |
N/A
|
Outlook Web Access (OWA) in Microsoft Exchange 20… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.065Z |
| CVE-2001-0667 |
7.3 (3.1)
|
Internet Explorer 6 and earlier, when used with t… |
n/a |
n/a |
2002-03-09T05:00:00 | 2025-01-16T16:14:40.211Z |
| CVE-2001-0669 |
N/A
|
Various Intrusion Detection Systems (IDS) includi… |
n/a |
n/a |
2001-10-12T04:00:00 | 2024-08-08T04:30:06.065Z |
| CVE-2001-0712 |
N/A
|
The rendering engine in Internet Explorer determi… |
n/a |
n/a |
2001-10-12T04:00:00 | 2024-08-08T04:30:06.059Z |
| CVE-2001-0713 |
N/A
|
Sendmail before 8.12.1 does not properly drop pri… |
n/a |
n/a |
2001-10-12T04:00:00 | 2024-08-08T04:30:06.076Z |
| CVE-2001-0714 |
N/A
|
Sendmail before 8.12.1, without the RestrictQueue… |
n/a |
n/a |
2001-10-12T04:00:00 | 2024-08-08T04:30:06.105Z |
| CVE-2001-0715 |
N/A
|
Sendmail before 8.12.1, without the RestrictQueue… |
n/a |
n/a |
2001-10-12T04:00:00 | 2024-08-08T04:30:06.057Z |
| CVE-2001-0717 |
N/A
|
Format string vulnerability in ToolTalk database … |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.046Z |
| CVE-2001-0718 |
N/A
|
Vulnerability in (1) Microsoft Excel 2002 and ear… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.074Z |
| CVE-2001-0728 |
N/A
|
Buffer overflow in Compaq Management Agents befor… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.100Z |
| CVE-2001-0729 |
N/A
|
Apache 1.3.20 on Windows servers allows remote at… |
n/a |
n/a |
2001-10-12T04:00:00 | 2024-08-08T04:30:06.195Z |
| CVE-2001-0730 |
N/A
|
split-logfile in Apache 1.3.20 allows remote atta… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:30:06.047Z |
| CVE-2001-1129 |
N/A
|
Format string vulnerabilities in (1) _probuild, (… |
n/a |
n/a |
2002-03-15T05:00:00 | 2024-08-08T04:44:07.860Z |
| CVE-2001-1387 |
N/A
|
iptables-save in iptables before 1.2.4 records th… |
n/a |
n/a |
2002-08-31T04:00:00 | 2024-08-08T04:51:08.314Z |
| CVE-2001-1388 |
N/A
|
iptables before 1.2.4 does not accurately convert… |
n/a |
n/a |
2002-08-31T04:00:00 | 2024-08-08T04:51:08.232Z |
| CVE-2001-0894 |
N/A
|
Vulnerability in Postfix SMTP server before 20010… |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T04:37:07.057Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-x4g7-fvjj-prg8 |
2.5 (3.1)
2.0 (4.0)
|
Division by 0 in `QuantizedConv2D` | 2021-05-21T14:21:59Z | 2024-10-30T23:17:38Z |
| ghsa-6f84-42vf-ppwp |
2.5 (3.1)
2.0 (4.0)
|
Division by 0 in `QuantizedMul` | 2021-05-21T14:22:02Z | 2024-10-30T23:18:31Z |
| ghsa-jfp7-4j67-8r3q |
2.5 (3.1)
2.0 (4.0)
|
Heap buffer overflow caused by rounding | 2021-05-21T14:22:05Z | 2024-10-30T23:19:12Z |
| ghsa-xcwj-wfcm-m23c |
2.5 (3.1)
2.0 (4.0)
|
Invalid validation in `SparseMatrixSparseCholesky` | 2021-05-21T14:22:09Z | 2024-10-30T23:19:46Z |
| ghsa-3qxp-qjq7-w4hf |
2.5 (3.1)
2.0 (4.0)
|
CHECK-fail in tf.raw_ops.EncodePng | 2021-05-21T14:22:13Z | 2024-10-30T23:20:19Z |
| ghsa-j47f-4232-hvv8 |
2.5 (3.1)
2.0 (4.0)
|
Heap out of bounds read in `RaggedCross` | 2021-05-21T14:22:17Z | 2024-10-30T23:21:38Z |
| ghsa-393f-2jr3-cp69 |
2.5 (3.1)
2.0 (4.0)
|
CHECK-fail in DrawBoundingBoxes | 2021-05-21T14:22:21Z | 2024-10-30T23:22:16Z |
| ghsa-6j9c-grc6-5m6g |
2.5 (3.1)
2.0 (4.0)
|
CHECK-fail in SparseConcat | 2021-05-21T14:22:24Z | 2024-10-30T23:22:57Z |
| ghsa-m3f9-w3p3-p669 |
2.5 (3.1)
2.0 (4.0)
|
Heap buffer overflow in `QuantizedMul` | 2021-05-21T14:22:28Z | 2024-10-30T23:23:48Z |
| ghsa-2gfx-95x2-5v3x |
2.5 (3.1)
2.0 (4.0)
|
Heap buffer overflow in `QuantizedReshape` | 2021-05-21T14:22:32Z | 2024-10-30T23:24:29Z |
| ghsa-8c89-2vwr-chcq |
2.5 (3.1)
2.0 (4.0)
|
Heap buffer overflow in `QuantizedResizeBilinear` | 2021-05-21T14:22:35Z | 2024-10-30T23:25:19Z |
| ghsa-j8qc-5fqr-52fp |
2.5 (3.1)
2.0 (4.0)
|
Division by zero in `Conv2DBackpropFilter` | 2021-05-21T14:22:38Z | 2024-10-30T23:26:36Z |
| ghsa-g4h2-gqm3-c9wq |
2.5 (3.1)
2.0 (4.0)
|
Segfault in tf.raw_ops.ImmutableConst | 2021-05-21T14:23:05Z | 2024-10-30T23:27:31Z |
| ghsa-xgc3-m89p-vr3x |
2.5 (3.1)
2.0 (4.0)
|
Heap buffer overflow in `Conv2DBackpropFilter` | 2021-05-21T14:23:09Z | 2024-10-30T23:28:15Z |
| ghsa-xqfj-35wv-m3cr |
2.5 (3.1)
2.0 (4.0)
|
Null pointer dereference in `StringNGrams` | 2021-05-21T14:23:12Z | 2024-10-31T19:58:18Z |
| ghsa-4hrh-9vmp-2jgg |
2.5 (3.1)
2.0 (4.0)
|
Heap buffer overflow in `StringNGrams` | 2021-05-21T14:23:15Z | 2024-10-31T19:58:52Z |
| ghsa-fphq-gw9m-ghrv |
2.5 (3.1)
2.0 (4.0)
|
CHECK-fail in `CTCGreedyDecoder` | 2021-05-21T14:23:18Z | 2024-10-31T20:38:49Z |
| ghsa-6g85-3hm8-83f9 |
2.5 (3.1)
2.0 (4.0)
|
CHECK-fail in `QuantizeAndDequantizeV4Grad` | 2021-05-21T14:23:22Z | 2024-11-19T19:33:14Z |
| ghsa-hmg3-c7xj-6qwm |
2.5 (3.1)
2.0 (4.0)
|
Heap buffer overflow in `SparseTensorToCSRSparseMatrix` | 2021-05-21T14:23:25Z | 2024-10-30T22:07:54Z |
| ghsa-m34j-p8rj-wjxq |
2.5 (3.1)
2.0 (4.0)
|
Division by 0 in `QuantizedBiasAdd` | 2021-05-21T14:23:28Z | 2024-10-30T23:10:12Z |
| ghsa-4fg4-p75j-w5xj |
2.5 (3.1)
2.0 (4.0)
|
Heap out of bounds in `QuantizedBatchNormWithGlobalNormalization` | 2021-05-21T14:23:31Z | 2024-10-31T20:42:12Z |
| ghsa-p45v-v4pw-77jr |
2.5 (3.1)
2.0 (4.0)
|
Division by 0 in `QuantizedBatchNormWithGlobalNormalization` | 2021-05-21T14:23:34Z | 2024-10-31T20:46:23Z |
| ghsa-x83m-p7pv-ch8v |
2.5 (3.1)
2.0 (4.0)
|
Division by 0 in `QuantizedAdd` | 2021-05-21T14:23:38Z | 2024-10-31T20:47:00Z |
| ghsa-f78g-q7r4-9wcv |
2.5 (3.1)
2.0 (4.0)
|
Division by 0 in `FractionalAvgPool` | 2021-05-21T14:23:41Z | 2024-10-30T23:16:10Z |
| ghsa-vqw6-72r7-fgw7 |
2.5 (3.1)
2.0 (4.0)
|
OOB read in `MatrixTriangularSolve` | 2021-05-21T14:23:44Z | 2024-10-31T20:49:39Z |
| ghsa-jhq9-wm9m-cf89 |
2.5 (3.1)
2.0 (4.0)
|
CHECK-failure in `UnsortedSegmentJoin` | 2021-05-21T14:23:48Z | 2024-10-31T20:50:24Z |
| ghsa-h9px-9vqg-222h |
2.5 (3.1)
2.0 (4.0)
|
Heap OOB in `QuantizeAndDequantizeV3` | 2021-05-21T14:23:51Z | 2024-10-31T20:51:10Z |
| ghsa-qg48-85hg-mqc5 |
2.5 (3.1)
2.0 (4.0)
|
Division by 0 in `DenseCountSparseOutput` | 2021-05-21T14:23:55Z | 2024-10-31T20:52:11Z |
| ghsa-r35g-4525-29fq |
2.5 (3.1)
2.0 (4.0)
|
Division by 0 in `FusedBatchNorm` | 2021-05-21T14:23:58Z | 2024-10-31T20:53:45Z |
| ghsa-fxqh-cfjm-fp93 |
2.5 (3.1)
2.0 (4.0)
|
Division by 0 in `Reverse` | 2021-05-21T14:24:39Z | 2024-10-31T20:54:11Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-6141 | Malicious code in skale-ima-agent-app (npm) | 2022-06-20T20:22:50Z | 2022-06-20T20:22:50Z |
| mal-2022-6143 | Malicious code in skale-ima-js (npm) | 2022-06-20T20:22:50Z | 2022-06-20T20:22:51Z |
| mal-2022-6145 | Malicious code in skale-ima-proxy (npm) | 2022-06-20T20:22:50Z | 2022-06-20T20:22:50Z |
| mal-2022-4673 | Malicious code in monday-code-action-template-node (npm) | 2022-06-20T20:22:51Z | 2022-06-20T20:22:52Z |
| mal-2022-4676 | Malicious code in monday-integration-quickstart (npm) | 2022-06-20T20:22:51Z | 2022-06-20T20:22:51Z |
| mal-2022-4680 | Malicious code in monday-jira-integration (npm) | 2022-06-20T20:22:51Z | 2022-06-20T20:22:52Z |
| mal-2022-6144 | Malicious code in skale-ima-owasp-helper-library (npm) | 2022-06-20T20:22:51Z | 2022-06-20T20:22:51Z |
| mal-2022-4674 | Malicious code in monday-example-app-word-cloud (npm) | 2022-06-20T20:22:52Z | 2022-06-20T20:22:53Z |
| mal-2022-4675 | Malicious code in monday-integration-github (npm) | 2022-06-20T20:22:52Z | 2022-06-20T20:22:52Z |
| mal-2022-4678 | Malicious code in monday-integration-quickstart-app-typescript (npm) | 2022-06-20T20:22:52Z | 2022-06-20T20:22:53Z |
| mal-2022-4679 | Malicious code in monday-integration-slack (npm) | 2022-06-20T20:22:52Z | 2022-06-20T20:22:53Z |
| mal-2022-3053 | Malicious code in firestore-messagebird-send-msg (npm) | 2022-06-20T20:22:53Z | 2022-06-20T20:22:53Z |
| mal-2022-4307 | Malicious code in lightweight-android (npm) | 2022-06-20T20:22:53Z | 2022-06-20T20:22:54Z |
| mal-2022-4435 | Malicious code in lyft-node-sdk-example (npm) | 2022-06-20T20:22:53Z | 2022-06-20T20:22:53Z |
| mal-2022-5786 | Malicious code in richdocuments (npm) | 2022-06-20T20:22:53Z | 2022-06-20T20:22:54Z |
| mal-2022-4828 | Malicious code in nextcloud-js-tests (npm) | 2022-06-20T20:22:54Z | 2022-06-20T20:22:56Z |
| mal-2022-4832 | Malicious code in nextcloudappstore (npm) | 2022-06-20T20:22:54Z | 2022-06-20T20:22:56Z |
| mal-2022-5029 | Malicious code in officeonline (npm) | 2022-06-20T20:22:54Z | 2022-06-20T20:22:54Z |
| mal-2022-5045 | Malicious code in ojsxc (npm) | 2022-06-20T20:22:54Z | 2022-06-20T20:22:57Z |
| mal-2022-4826 | Malicious code in nextcloud-activity (npm) | 2022-06-20T20:22:55Z | 2022-06-20T20:22:56Z |
| mal-2022-4827 | Malicious code in nextcloud-cookbook (npm) | 2022-06-20T20:22:55Z | 2022-06-20T20:22:56Z |
| mal-2022-4830 | Malicious code in nextcloud-news (npm) | 2022-06-20T20:22:55Z | 2022-06-20T20:22:56Z |
| mal-2022-6368 | Malicious code in suspicious_login (npm) | 2022-06-20T20:22:55Z | 2022-06-20T20:22:56Z |
| mal-2022-3056 | Malicious code in firstrunwizard (npm) | 2022-06-20T20:22:56Z | 2022-06-20T20:22:57Z |
| mal-2022-4829 | Malicious code in nextcloud-mail (npm) | 2022-06-20T20:22:56Z | 2022-06-20T20:22:57Z |
| mal-2022-4831 | Malicious code in nextcloud-register (npm) | 2022-06-20T20:22:56Z | 2022-06-20T20:22:56Z |
| mal-2022-6153 | Malicious code in skype4business (npm) | 2022-06-20T20:22:56Z | 2022-06-20T20:22:57Z |
| mal-2022-4497 | Malicious code in mattermost-api-reference (npm) | 2022-06-20T20:22:57Z | 2022-06-20T20:22:57Z |
| mal-2022-4503 | Malicious code in mattermost-plugin-docs (npm) | 2022-06-20T20:22:57Z | 2022-06-20T20:22:57Z |
| mal-2022-4507 | Malicious code in mattermost-webapp-profiling (npm) | 2022-06-20T20:22:57Z | 2022-06-20T20:22:58Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-2325 | Microsoft 3D Builder und Viewer: Mehrere Schwachstellen ermöglichen Codeausführung | 2023-09-12T22:00:00.000+00:00 | 2023-09-12T22:00:00.000+00:00 |
| wid-sec-w-2023-2326 | Adobe Acrobat und Reader: Schwachstelle ermöglicht Codeausführung | 2023-09-12T22:00:00.000+00:00 | 2023-09-12T22:00:00.000+00:00 |
| wid-sec-w-2023-2327 | ILIAS: Mehrere Schwachstellen | 2023-09-12T22:00:00.000+00:00 | 2023-09-12T22:00:00.000+00:00 |
| wid-sec-w-2023-2328 | Microsoft Windows und Microsoft Windows Server: Mehrere Schwachstellen | 2023-09-12T22:00:00.000+00:00 | 2023-10-31T23:00:00.000+00:00 |
| wid-sec-w-2023-2329 | Microsoft Defender: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-09-12T22:00:00.000+00:00 | 2023-09-12T22:00:00.000+00:00 |
| wid-sec-w-2023-2330 | Microsoft Office: Mehrere Schwachstellen | 2023-09-12T22:00:00.000+00:00 | 2023-09-12T22:00:00.000+00:00 |
| wid-sec-w-2023-2332 | Microsoft Exchange Server: Mehrere Schwachstellen | 2023-09-12T22:00:00.000+00:00 | 2023-09-12T22:00:00.000+00:00 |
| wid-sec-w-2023-2333 | Microsoft Developer Tools: Mehrere Schwachstellen | 2023-09-12T22:00:00.000+00:00 | 2023-11-21T23:00:00.000+00:00 |
| wid-sec-w-2023-2334 | Microsoft Azure: Mehrere Schwachstellen | 2023-09-12T22:00:00.000+00:00 | 2023-09-12T22:00:00.000+00:00 |
| wid-sec-w-2023-2335 | cURL: Schwachstelle ermöglicht Denial of Service | 2023-09-12T22:00:00.000+00:00 | 2024-03-13T23:00:00.000+00:00 |
| wid-sec-w-2023-2336 | Lenovo XClarity: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2023-09-12T22:00:00.000+00:00 | 2023-09-12T22:00:00.000+00:00 |
| wid-sec-w-2023-2337 | Apache Tomcat mod_jk Connector: Schwachstelle ermöglicht Umgehung von Sicherheitsmaßnahmen oder Offenlegung von Informationen | 2023-09-12T22:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2023-2338 | Red Hat OpenShift: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-09-12T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2023-2339 | Proofpoint Insider Threat Management: Mehrere Schwachstellen | 2023-09-13T22:00:00.000+00:00 | 2023-09-14T22:00:00.000+00:00 |
| wid-sec-w-2023-2341 | Red Hat OpenShift: Schwachstelle ermöglicht Codeausführung | 2023-09-13T22:00:00.000+00:00 | 2023-09-20T22:00:00.000+00:00 |
| wid-sec-w-2023-2342 | Epson Printer: Mehrere Schwachstellen | 2023-09-13T22:00:00.000+00:00 | 2023-09-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2343 | Fortinet FortiOS: Schwachstelle ermöglicht Cross-Site Scripting | 2023-09-13T22:00:00.000+00:00 | 2023-09-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2344 | Fortinet FortiWeb: Schwachstelle ermöglicht Cross-Site Scripting und Cross-Site Request Forgery | 2023-09-13T22:00:00.000+00:00 | 2023-09-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2345 | Fortinet FortiAnalyzer und Fortinet FortiManager: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-09-13T22:00:00.000+00:00 | 2023-09-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2346 | Apache Struts: Schwachstelle ermöglicht Denial of Service | 2023-09-13T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2023-2347 | Wibu-Systems CodeMeter: Schwachstelle ermöglicht Privilegieneskalation | 2023-09-13T22:00:00.000+00:00 | 2023-09-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2348 | util-linux: Schwachstelle erlaubt Privilegienerweiterung und die Ausführung von beliebigem Code | 2023-09-13T22:00:00.000+00:00 | 2023-09-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2349 | Trellix Data Loss Prevention: Schwachstelle ermöglicht Manipulation von Dateien | 2023-09-13T22:00:00.000+00:00 | 2023-09-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2350 | QEMU: Schwachstelle ermöglicht Denial of Service | 2023-09-13T22:00:00.000+00:00 | 2023-11-07T23:00:00.000+00:00 |
| wid-sec-w-2023-2351 | gcc: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-09-13T22:00:00.000+00:00 | 2025-08-20T22:00:00.000+00:00 |
| wid-sec-w-2023-2352 | Apache Commons: Schwachstelle ermöglicht Denial of Service | 2023-09-13T22:00:00.000+00:00 | 2024-03-27T23:00:00.000+00:00 |
| wid-sec-w-2023-2353 | Ghostscript: Mehrere Schwachstellen | 2023-09-13T22:00:00.000+00:00 | 2024-05-21T22:00:00.000+00:00 |
| wid-sec-w-2023-2354 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-09-13T22:00:00.000+00:00 | 2023-09-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2355 | Cisco IOS XR: Mehrere Schwachstellen | 2023-09-13T22:00:00.000+00:00 | 2023-09-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2356 | IBM QRadar SIEM: Mehre Schwachstellen | 2023-09-14T22:00:00.000+00:00 | 2023-09-28T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2014:0914 | Red Hat Security Advisory: libvirt security and bug fix update | 2014-07-22T18:31:05+00:00 | 2025-11-21T17:49:15+00:00 |
| rhsa-2014:0916 | Red Hat Security Advisory: nss and nspr security update | 2014-07-22T19:21:27+00:00 | 2025-11-21T17:49:15+00:00 |
| rhsa-2014:0919 | Red Hat Security Advisory: firefox security update | 2014-07-22T22:32:37+00:00 | 2025-11-21T17:49:16+00:00 |
| rhsa-2014:0920 | Red Hat Security Advisory: httpd security update | 2014-07-23T09:19:04+00:00 | 2026-01-28T22:58:20+00:00 |
| rhsa-2014:0922 | Red Hat Security Advisory: httpd24-httpd security update | 2014-07-23T10:00:08+00:00 | 2026-01-28T22:58:20+00:00 |
| rhsa-2014:0921 | Red Hat Security Advisory: httpd security update | 2014-07-23T10:00:19+00:00 | 2026-01-28T22:58:25+00:00 |
| rhsa-2014:0923 | Red Hat Security Advisory: kernel security update | 2014-07-23T15:44:06+00:00 | 2025-11-21T17:49:22+00:00 |
| rhsa-2014:0926 | Red Hat Security Advisory: kernel security and bug fix update | 2014-07-23T16:04:26+00:00 | 2025-11-21T17:49:20+00:00 |
| rhsa-2014:0925 | Red Hat Security Advisory: kernel security update | 2014-07-23T16:04:36+00:00 | 2025-11-21T17:49:20+00:00 |
| rhsa-2014:0924 | Red Hat Security Advisory: kernel security update | 2014-07-23T16:04:44+00:00 | 2025-11-21T17:49:19+00:00 |
| rhsa-2014:0927 | Red Hat Security Advisory: qemu-kvm security and bug fix update | 2014-07-23T16:15:12+00:00 | 2026-01-13T22:14:07+00:00 |
| rhsa-2014:0888 | Red Hat Security Advisory: qemu-kvm-rhev security update | 2014-07-24T15:38:25+00:00 | 2026-01-13T22:34:12+00:00 |
| rhsa-2014:0941 | Red Hat Security Advisory: openstack-swift security update | 2014-07-24T17:21:35+00:00 | 2025-11-21T17:49:22+00:00 |
| rhsa-2014:0940 | Red Hat Security Advisory: openstack-nova security and bug fix update | 2014-07-24T17:21:42+00:00 | 2025-11-21T17:49:20+00:00 |
| rhsa-2014:0939 | Red Hat Security Advisory: python-django-horizon security, bug fix, and enhancement update | 2014-07-24T17:21:49+00:00 | 2025-11-21T17:49:20+00:00 |
| rhsa-2014:0949 | Red Hat Security Advisory: kernel security update | 2014-07-28T16:03:38+00:00 | 2025-11-21T17:49:22+00:00 |
| rhsa-2014:0979 | Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update | 2014-07-29T14:39:50+00:00 | 2025-11-21T17:49:22+00:00 |
| rhsa-2014:0982 | Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update | 2014-07-29T15:40:11+00:00 | 2026-01-28T22:38:12+00:00 |
| rhsa-2014:0981 | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | 2014-07-29T15:51:11+00:00 | 2025-11-21T17:49:23+00:00 |
| rhsa-2014:0994 | Red Hat Security Advisory: openstack-keystone security update | 2014-07-31T15:18:04+00:00 | 2025-11-21T17:49:23+00:00 |
| rhsa-2014:1002 | Red Hat Security Advisory: rhevm security update | 2014-08-04T14:17:08+00:00 | 2025-11-21T17:49:24+00:00 |
| rhsa-2014:1004 | Red Hat Security Advisory: yum-updatesd security update | 2014-08-05T03:34:37+00:00 | 2025-11-21T17:49:24+00:00 |
| rhsa-2014:1007 | Red Hat Security Advisory: Red Hat JBoss BRMS 5.3.1 update | 2014-08-05T14:10:28+00:00 | 2026-01-28T22:38:13+00:00 |
| rhsa-2014:1009 | Red Hat Security Advisory: samba4 security update | 2014-08-05T18:58:04+00:00 | 2025-11-21T17:49:26+00:00 |
| rhsa-2014:1008 | Red Hat Security Advisory: samba security and bug fix update | 2014-08-05T20:00:59+00:00 | 2025-11-21T17:49:25+00:00 |
| rhsa-2014:1011 | Red Hat Security Advisory: resteasy-base security update | 2014-08-06T01:02:45+00:00 | 2026-01-28T22:58:20+00:00 |
| rhsa-2014:1012 | Red Hat Security Advisory: php53 and php security update | 2014-08-06T05:14:44+00:00 | 2025-11-21T17:49:27+00:00 |
| rhsa-2014:1013 | Red Hat Security Advisory: php security update | 2014-08-06T06:05:17+00:00 | 2025-11-21T17:49:27+00:00 |
| rhsa-2014:1021 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.0 update | 2014-08-06T14:52:25+00:00 | 2026-01-28T22:38:14+00:00 |
| rhsa-2014:1020 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.0 update | 2014-08-06T15:03:06+00:00 | 2026-01-28T22:38:13+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2023-25669 | TensorFlow has Floating Point Exception in AvgPoolGrad with XLA | 2023-03-10T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-25670 | TensorFlow has Null Pointer Error in QuantizedMatMulWithBiasAndDequantize | 2023-03-10T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-25671 | TensorFlow has segmentation fault in tfg-translate | 2023-03-10T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-25672 | TensorFlow has Null Pointer Error in LookupTableImportV2 | 2023-03-10T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-25673 | TensorFlow has Floating Point Exception in TensorListSplit with XLA | 2023-03-10T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-25674 | TensorFlow has Null Pointer Error in RandomShuffle with XLA enable | 2023-03-10T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-25675 | TensorFlow has Segfault in Bincount with XLA | 2023-03-10T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-25676 | TensorFlow has null dereference on ParallelConcat with XLA | 2023-03-10T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-25690 | Apache HTTP Server: HTTP request splitting with mod_rewrite and mod_proxy | 2023-03-10T00:00:00.000Z | 2025-05-15T00:00:00.000Z |
| msrc_cve-2023-25801 | TensorFlow has double free in Fractional(Max/Avg)Pool | 2023-03-10T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-25809 | rootless: `/sys/fs/cgroup` is writable when cgroupns isn't unshared in runc | 2023-03-10T00:00:00.000Z | 2023-04-03T00:00:00.000Z |
| msrc_cve-2023-26484 | On a compromised KubeVirt node the virt-handler service account can be used to modify all node specs | 2023-03-10T00:00:00.000Z | 2024-12-03T00:00:00.000Z |
| msrc_cve-2023-26604 | systemd before 247 does not adequately block local privilege escalation for some Sudo configurations e.g. plausible sudoers files in which the "systemctl status" command may be executed. Specifically systemd does not set LESSSECURE to 1 and thus other programs may be launched from the less program. This presents a substantial security risk when running systemctl from Sudo because less executes as root when the terminal size is too small to show the complete systemctl output. | 2023-03-10T00:00:00.000Z | 2023-04-22T00:00:00.000Z |
| msrc_cve-2023-26767 | Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the lou_logFile function at logginc.c endpoint. | 2023-03-10T00:00:00.000Z | 2023-03-22T00:00:00.000Z |
| msrc_cve-2023-26768 | Buffer Overflow vulnerability found in Liblouis v.3.24.0 allows a remote attacker to cause a denial of service via the compileTranslationTable.c and lou_setDataPath functions. | 2023-03-10T00:00:00.000Z | 2023-03-22T00:00:00.000Z |
| msrc_cve-2023-26769 | Buffer Overflow vulnerability found in Liblouis Lou_Trace v.3.24.0 allows a remote attacker to cause a denial of service via the resolveSubtable function at compileTranslationTabel.c. | 2023-03-10T00:00:00.000Z | 2023-03-22T00:00:00.000Z |
| msrc_cve-2023-27119 | WebAssembly v1.0.29 was discovered to contain a segmentation fault via the component wabt::Decompiler::WrapChild. | 2023-03-10T00:00:00.000Z | 2025-09-04T00:10:52.000Z |
| msrc_cve-2023-27477 | wasmtime is a fast and secure runtime for WebAssembly. Wasmtime's code generation backend Cranelift has a bug on x86_64 platforms for the WebAssembly `i8x16.select` instruction which will produce the wrong results when the same operand is provided to the instruction and some of the selected indices are greater than 16. There is an off-by-one error in the calculation of the mask to the `pshufb` instruction which causes incorrect results to be returned if lanes are selected from the second vector. This codegen bug has been fixed in Wasmtiem 6.0.1 5.0.1 and 4.0.1. Users are recommended to upgrade to these updated versions. If upgrading is not an option for you at this time you can avoid this miscompilation by disabling the Wasm simd proposal. Additionally the bug is only present on x86_64 hosts. Other platforms such as AArch64 and s390x are not affected. | 2023-03-10T00:00:00.000Z | 2023-05-25T00:00:00.000Z |
| msrc_cve-2023-27478 | Disclosure of unrelated data in libmemcached-awesome | 2023-03-10T00:00:00.000Z | 2024-07-13T00:00:00.000Z |
| msrc_cve-2023-27522 | Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting | 2023-03-10T00:00:00.000Z | 2023-03-14T00:00:00.000Z |
| msrc_cve-2023-27533 | A vulnerability in input validation exists in curl <8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and "telnet options" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input thereby enabling attackers to execute arbitrary code on the system. | 2023-03-10T00:00:00.000Z | 2024-09-24T00:00:00.000Z |
| msrc_cve-2023-27534 | A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user. | 2023-03-10T00:00:00.000Z | 2024-09-24T00:00:00.000Z |
| msrc_cve-2023-27535 | An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However certain FTP settings such as CURLOPT_FTP_ACCOUNT CURLOPT_FTP_ALTERNATIVE_TO_USER CURLOPT_FTP_SSL_CCC and CURLOPT_USE_SSL were not included in the configuration match checks causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer potentially allowing unauthorized access to sensitive information. | 2023-03-10T00:00:00.000Z | 2024-11-20T00:00:00.000Z |
| msrc_cve-2023-27536 | An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed. | 2023-03-10T00:00:00.000Z | 2024-11-20T00:00:00.000Z |
| msrc_cve-2023-27537 | A double free vulnerability exists in libcurl <8.0.0 when sharing HSTS data between separate "handles". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks two threads sharing the same HSTS data could end up doing a double-free or use-after-free. | 2023-03-10T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-27538 | An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However two SSH settings were omitted from the configuration check allowing them to match easily potentially leading to the reuse of an inappropriate connection. | 2023-03-10T00:00:00.000Z | 2024-11-20T00:00:00.000Z |
| msrc_cve-2023-27561 | runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges related to libcontainer/rootfs_linux.go. To exploit this an attacker must be able to spawn two containers with custom volume-mount configurations and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression. | 2023-03-10T00:00:00.000Z | 2023-04-22T00:00:00.000Z |
| msrc_cve-2023-27579 | TensorFlow has Floating Point Exception in TFLite in conv kernel | 2023-03-10T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-27985 | emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. It is fixed in 29.0.90 | 2023-03-10T00:00:00.000Z | 2023-03-13T00:00:00.000Z |
| msrc_cve-2023-27986 | emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters. It is fixed in 29.0.90. | 2023-03-10T00:00:00.000Z | 2023-03-14T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201105-0313 | The Vordel XML gateway is an XML gateway device. There is a problem with the Vordel XML g… | 2022-05-17T02:01:22.053000Z |
| var-201104-0313 | The SAP GUI is a graphical user interface client for SAP software. An attacker can build … | 2022-05-17T02:01:22.331000Z |
| var-201012-0375 | The Xerox WorkCentre is an all-in-one. The scan-to-email feature is flawed. Two different… | 2022-05-17T02:01:23.329000Z |
| var-201011-0294 | The Xerox 4595 Copier/Printer is a print copy machine. The Xerox 4595 Copier/Printer has … | 2022-05-17T02:01:23.903000Z |
| var-201011-0292 | Cisco Unified Videoconferencing (Cisco Video Conferencing Products) is Cisco's web confer… | 2022-05-17T02:01:23.919000Z |
| var-201010-0436 | This vulnerability allows attackers to deny services on vulnerable installations of Novel… | 2022-05-17T02:01:24.186000Z |
| var-201009-0317 | The Sony PlayStation 3 is a powerful game console from Sony. A security vulnerability exi… | 2022-05-17T02:01:24.513000Z |
| var-201008-0452 | SEIL routers are prone to a spoofing vulnerability. An attacker can exploit this issue to… | 2022-05-17T02:01:24.820000Z |
| var-201004-0739 | Oracle has released advance notification regarding the April 2010 critical patch update t… | 2022-05-17T02:01:26.079000Z |
| var-201004-0508 | Rumba FTP is a graphical FTP client that supports file encryption transfer. The Rumba FTP… | 2022-05-17T02:01:26.196000Z |
| var-201003-0518 | Cafu is an open source game and 3D graphics engine. Cafu has multiple security vulnerabil… | 2022-05-17T02:01:26.695000Z |
| var-201001-0445 | SAP MaxDB is prone to an unspecified information-disclosure vulnerability and an unspecif… | 2022-05-17T02:01:27.092000Z |
| var-200809-0461 | Hitachi JP1/File Transmission Server/FTP has a problem where file transmission fails due … | 2022-05-17T02:01:30.310000Z |
| var-200805-0397 | Some Buffalo routers have a vulnerability that could allow remote access from the WAN sid… | 2022-05-17T02:01:30.868000Z |
| var-200612-0786 | Dream FTP Server is a multi-threaded ftp server. Dream FTP Server has a vulnerability in … | 2022-05-17T02:01:36.065000Z |
| var-200303-0128 | The 3com SuperStack II Remote Access System 1500 is a device that accesses telecommunicat… | 2022-05-17T02:01:43.240000Z |
| var-200302-0050 | US Robotics offers a wide range of broadband router devices, including the US Robotics Br… | 2022-05-17T02:01:43.292000Z |
| var-200211-0076 | The Buffalo AirStation Pro Intelligent Access Point is a wireless access device. The Buff… | 2022-05-17T02:01:43.502000Z |
| var-200010-0161 | The HTTP router management service on Cisco IOS has been reported to be prone to a remote… | 2022-05-17T02:02:14.386000Z |
| var-199906-0038 | A vulnerability in certain versions of the Cisco IOS software running in the Cisco 12000 … | 2022-05-17T02:02:14.985000Z |
| var-190001-0871 | Sagem F@st Routers is a router product. The Sagem Fast router (3304-V1 / 3304-V2 / 3464 /… | 2022-05-17T02:02:15.401000Z |
| var-190001-0820 | Alice Modem is a modem. A cross-site scripting vulnerability exists in Alice Modem. The v… | 2022-05-17T02:02:15.444000Z |
| var-190001-0747 | Parallels Plesk Panel is prone to multiple cross-site scripting vulnerabilities and SQL-i… | 2022-05-17T02:02:15.495000Z |
| var-190001-0555 | Movicon is the first fully XML-based Scada/HMI software developed by the famous Italian a… | 2022-05-17T02:02:15.629000Z |
| var-190001-0219 | A hard-coded certificate security bypass vulnerability exists in Siemens SIMATIC S7-300. … | 2022-05-17T02:02:15.874000Z |
| var-190001-0079 | The Linksys WAG54GS Wireless Router is a wireless router device. A cross-site request for… | 2022-05-17T02:02:15.981000Z |
| var-202204-1715 | This vulnerability allows remote attackers to disclose sensitive information on affected … | 2022-05-17T02:02:17.100000Z |
| var-202012-1638 | This vulnerability allows network-adjacent attackers to execute arbitrary code on affecte… | 2022-05-17T02:02:21.305000Z |
| var-202004-2210 | NAop401 is an OP series text screen design tool. There is a denial-of-service vulnera… | 2022-05-17T02:02:22.052000Z |
| var-202003-1792 | Taiwan Yonghong Motor focuses on the high-function small and medium-sized and micro PLC m… | 2022-05-17T02:02:22.190000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2019:0539-1 | Security update for freerdp | 2019-03-04T16:42:27Z | 2019-03-04T16:42:27Z |
| suse-su-2019:0541-1 | Security update for the Linux Kernel | 2019-03-04T16:45:36Z | 2019-03-04T16:45:36Z |
| suse-su-2019:0542-1 | Security update for sssd | 2019-03-05T12:28:19Z | 2019-03-05T12:28:19Z |
| suse-su-2019:0552-1 | Security update for sssd | 2019-03-06T08:47:58Z | 2019-03-06T08:47:58Z |
| suse-su-2019:0555-1 | Security update for mariadb | 2019-03-06T09:55:52Z | 2019-03-06T09:55:52Z |
| suse-su-2019:0556-1 | Security update for sssd | 2019-03-06T09:57:00Z | 2019-03-06T09:57:00Z |
| suse-su-2019:0563-1 | Security update for audit | 2019-03-06T16:20:22Z | 2019-03-06T16:20:22Z |
| suse-su-2019:0571-1 | Security update for file | 2019-03-07T17:13:53Z | 2019-03-07T17:13:53Z |
| suse-su-2019:0572-1 | Security update for openssl-1_0_0 | 2019-03-08T08:24:27Z | 2019-03-08T08:24:27Z |
| suse-su-2019:0573-1 | Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork, runc | 2019-03-08T12:49:44Z | 2019-03-08T12:49:44Z |
| suse-su-2019:0574-1 | Security update for java-1_8_0-openjdk | 2019-03-08T14:23:01Z | 2019-03-08T14:23:01Z |
| suse-su-2019:0579-1 | Security update for ovmf | 2019-03-11T12:06:05Z | 2019-03-11T12:06:05Z |
| suse-su-2019:0580-1 | Security update for ovmf | 2019-03-11T12:06:24Z | 2019-03-11T12:06:24Z |
| suse-su-2019:0581-1 | Security update for ovmf | 2019-03-11T12:57:45Z | 2019-03-11T12:57:45Z |
| suse-su-2019:0582-1 | Security update for qemu | 2019-03-11T17:34:20Z | 2019-03-11T17:34:20Z |
| suse-su-2019:0585-1 | Security update for java-1_8_0-ibm | 2019-03-12T11:59:13Z | 2019-03-12T11:59:13Z |
| suse-su-2019:0586-1 | Security update for ceph | 2019-03-12T12:00:39Z | 2019-03-12T12:00:39Z |
| suse-su-2019:13975-1 | Security update for java-1_7_0-ibm | 2019-03-12T17:39:36Z | 2019-03-12T17:39:36Z |
| suse-su-2019:0600-1 | Security update for openssl-1_0_0 | 2019-03-12T17:40:27Z | 2019-03-12T17:40:27Z |
| suse-su-2019:13976-1 | Security update for supportutils | 2019-03-12T17:40:58Z | 2019-03-12T17:40:58Z |
| suse-su-2019:13977-1 | Security update for python-numpy | 2019-03-12T17:41:20Z | 2019-03-12T17:41:20Z |
| suse-su-2019:0603-1 | Security update for python-azure-agent | 2019-03-13T09:08:38Z | 2019-03-13T09:08:38Z |
| suse-su-2019:0604-1 | Security update for java-1_7_1-ibm | 2019-03-13T09:45:05Z | 2019-03-13T09:45:05Z |
| suse-su-2019:0609-1 | Security update for mariadb | 2019-03-13T17:48:13Z | 2019-03-13T17:48:13Z |
| suse-su-2019:13978-1 | Security update for java-1_7_1-ibm | 2019-03-14T09:38:52Z | 2019-03-14T09:38:52Z |
| suse-su-2019:0617-1 | Security update for java-1_8_0-ibm | 2019-03-15T12:14:42Z | 2019-03-15T12:14:42Z |
| suse-su-2019:13979-1 | Security update for the Linux Kernel | 2019-03-15T13:49:28Z | 2019-03-15T13:49:28Z |
| suse-su-2019:0619-1 | Security update for wireshark | 2019-03-15T14:38:43Z | 2019-03-15T14:38:43Z |
| suse-su-2019:0627-1 | Security update for nodejs10 | 2019-03-18T10:17:56Z | 2019-03-18T10:17:56Z |
| suse-su-2019:0628-1 | Security update for galera-3, mariadb, mariadb-connector-c | 2019-03-18T10:19:44Z | 2019-03-18T10:19:44Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:10588-1 | rawtherapee-5.8-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10589-1 | rmt-server-2.6.13-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10590-1 | seamonkey-2.53.9.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10591-1 | libXvnc-devel-1.10.1-17.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10592-1 | xstream-1.4.18-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10593-1 | 389-ds-2.0.10~git0.21dd2802c-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10594-1 | Botan-2.18.1-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10595-1 | FlightGear-2020.3.11-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10596-1 | GraphicsMagick-1.3.36-1.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10597-1 | ImageMagick-7.1.0.8-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10598-1 | LibVNCServer-devel-0.9.13-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10599-1 | Mesa-21.2.2-287.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10600-1 | MozillaFirefox-92.0-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10601-1 | MozillaThunderbird-91.1.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10602-1 | NetworkManager-1.32.10-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10603-1 | NetworkManager-applet-1.24.0-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10604-1 | NetworkManager-vpnc-1.2.6-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10605-1 | PackageKit-1.2.2-13.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10606-1 | libSDL-1_2-0-1.2.15-22.13 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10607-1 | libSDL2-2_0-0-2.0.16-2.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10608-1 | libSDL2_image-2_0-0-2.0.5-1.14 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10609-1 | libSDL_image-1_2-0-1.2.12+hg695-1.12 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10610-1 | libSDL_sound-1_0-1-1.0.3-94.20 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10611-1 | accountsservice-0.6.55-8.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10612-1 | adns-1.6.0-1.8 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10613-1 | alpine-2.25-24.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10614-1 | amavisd-new-2.12.1-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10615-1 | ansible-2.9.24-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10616-1 | ant-1.10.10-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10617-1 | apache-commons-beanutils-1.9.4-3.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-moodle-2025-26532 | Teachers can evade trusttext config when restoring glossary entries | 2025-08-07T08:59:21.801Z | 2025-08-07T09:23:45.368Z |
| bit-moodle-2025-26533 | SQL injection risk in course search module list filter | 2025-08-07T08:59:23.153Z | 2025-08-07T09:23:45.368Z |
| bit-mastodon-2025-54879 | Mastodon e‑mail throttle misconfiguration allows unlimited email confirmations against unconfirmed emails | 2025-08-08T05:54:51.134Z | 2025-08-27T09:06:48.117Z |
| bit-modsecurity-2025-54571 | ModSecurity's Insufficient Return Value Handling can Lead to XSS and Source Code Disclosure | 2025-08-08T05:55:15.874Z | 2025-11-06T13:25:46.476Z |
| bit-modsecurity2-2025-54571 | ModSecurity's Insufficient Return Value Handling can Lead to XSS and Source Code Disclosure | 2025-08-08T05:55:32.006Z | 2025-11-06T13:25:46.476Z |
| bit-moodle-2024-38273 | moodle: BigBlueButton web service leaks meeting joining information to users who should not have access | 2025-08-08T06:00:26.723Z | 2025-08-08T06:26:52.450Z |
| bit-moodle-2024-38274 | moodle: stored XSS via calendar's event title when deleting the event | 2025-08-08T06:00:28.390Z | 2025-08-08T06:26:52.450Z |
| bit-moodle-2024-38277 | moodle: QR login key and auto-login key for the Moodle mobile app should be generated as separate keys | 2025-08-08T06:00:33.314Z | 2025-08-08T06:26:52.450Z |
| bit-vault-2025-6013 | Vault LDAP MFA Enforcement Bypass When Using Username As Alias | 2025-08-08T06:04:14.175Z | 2025-12-16T15:14:22.118Z |
| bit-golang-2025-47907 | Incorrect results returned from Rows.Scan in database/sql | 2025-08-10T23:42:00.295Z | 2025-11-06T13:25:46.476Z |
| bit-moodle-2025-26525 | Arbitrary file read risk through pdfTeX | 2025-08-10T23:48:15.877Z | 2025-08-11T00:06:06.142Z |
| bit-moodle-2025-26526 | Feedback response viewing and deletions did not respect Separate Groups mode | 2025-08-10T23:48:17.474Z | 2025-08-11T00:06:06.142Z |
| bit-moodle-2025-26527 | Non-searchable tags can still be discovered on the tag search page and in the tags block | 2025-08-10T23:48:18.990Z | 2025-08-11T00:06:06.142Z |
| bit-moodle-2025-26528 | Stored XSS in ddimageortext question type | 2025-08-10T23:48:20.501Z | 2025-08-11T00:06:06.142Z |
| bit-moodle-2025-26529 | Stored XSS risk in admin live log | 2025-08-10T23:48:21.915Z | 2025-08-11T00:06:06.142Z |
| bit-libpython-2020-10735 | 2025-08-11T13:51:26.807Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2020-14422 | 2025-08-11T13:51:28.699Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2020-15523 | 2025-08-11T13:51:30.254Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2020-15801 | 2025-08-11T13:51:32.060Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2020-26116 | 2025-08-11T13:51:33.813Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2020-27619 | 2025-08-11T13:51:35.537Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2020-8315 | 2025-08-11T13:51:37.536Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2020-8492 | 2025-08-11T13:51:39.499Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2021-23336 | Web Cache Poisoning | 2025-08-11T13:51:41.925Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2021-28861 | 2025-08-11T13:51:44.193Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2021-29921 | 2025-08-11T13:51:46.493Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2021-3177 | 2025-08-11T13:51:48.817Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2021-3426 | 2025-08-11T13:51:50.836Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2021-3733 | 2025-08-11T13:51:53.167Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2021-3737 | 2025-08-11T13:51:55.583Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-04117 | SilverStripe CMS & Framework存在多个跨站脚本漏洞 | 2015-06-26 | 2015-06-30 |
| cnvd-2015-04118 | SilverStripe CMS & Framework开放重定向漏洞 | 2015-06-26 | 2015-06-30 |
| cnvd-2015-04119 | Cisco uBR10000 IOS拒绝服务漏洞 | 2015-06-26 | 2015-06-30 |
| cnvd-2015-04120 | Synology Photo Station-2945存在多个跨站脚本漏洞 | 2015-06-26 | 2015-06-30 |
| cnvd-2015-04121 | Synology DiskStation Manager跨站脚本漏洞 | 2015-06-26 | 2015-06-30 |
| cnvd-2015-04122 | Vesta Control Panel跨站请求伪造漏洞(CNVD-2015-04122) | 2015-06-26 | 2015-06-30 |
| cnvd-2015-04123 | Squashfs和sasquatch 'read_fragment_table_4'栈缓冲区溢出漏洞 | 2015-06-26 | 2015-07-01 |
| cnvd-2015-04124 | Web Console远程代码执行漏洞 | 2015-06-26 | 2015-07-01 |
| cnvd-2015-04142 | didjvu and pdf2djvu不安全临时文件创建漏洞 | 2015-06-27 | 2015-07-01 |
| cnvd-2015-04143 | Netty和Play Framework会话劫持漏洞 | 2015-06-27 | 2015-07-01 |
| cnvd-2015-04144 | Beaker安全绕过漏洞 | 2015-06-27 | 2015-07-01 |
| cnvd-2015-04145 | Subrion CMS 'salt' SQL注入漏洞 | 2015-06-27 | 2015-07-01 |
| cnvd-2015-04146 | SQL Buddy 'page'参数目录遍历漏洞 | 2015-06-27 | 2015-07-01 |
| cnvd-2015-04147 | concrete5 'system/registration/open.php'任意PHP代码执行漏洞 | 2015-06-27 | 2015-07-01 |
| cnvd-2015-04148 | WordPress Users to CSV插件跨站请求伪造漏洞 | 2015-06-27 | 2015-07-01 |
| cnvd-2015-04157 | Epignosis eFront 存在多个漏洞 | 2015-06-27 | 2015-07-01 |
| cnvd-2015-04158 | G-Homa WLan Power Plug存在多个漏洞 | 2015-06-27 | 2015-07-01 |
| cnvd-2015-04159 | FileZilla FTP Client远程拒绝服务漏洞 | 2015-06-27 | 2015-07-01 |
| cnvd-2015-04160 | DVDVideoTool 1 Click Extract Audio ActiveX Control缓冲区溢出漏洞 | 2015-06-27 | 2015-07-01 |
| cnvd-2015-04161 | WordPress WP-Stats插件存在多个漏洞 | 2015-06-27 | 2015-07-01 |
| cnvd-2017-02461 | 时代互联企业邮件系统name参数存在SQL注入漏洞 | 2015-06-27 | 2015-08-12 |
| cnvd-2015-04097 | Cisco Virtual WSA/ESA/SMA默认授权SSH密钥漏洞 | 2015-06-29 | 2015-06-30 |
| cnvd-2015-04098 | Cisco Virtual WSA/ESA/SMA remote-support功能默认SSH主机密钥漏洞 | 2015-06-29 | 2015-06-30 |
| cnvd-2015-04099 | Google Chrome Blink安全绕过漏洞(CNVD-2015-04099) | 2015-06-29 | 2015-06-30 |
| cnvd-2015-04100 | Google Chrome安全绕过漏洞(CNVD-2015-04100) | 2015-06-29 | 2015-06-30 |
| cnvd-2015-04102 | IBM Tivoli Security Directory Server信息泄露漏洞(CNVD-2015-04102) | 2015-06-29 | 2015-06-30 |
| cnvd-2015-04103 | IBM Tivoli Security Directory Server信息泄露漏洞(CNVD-2015-04103) | 2015-06-29 | 2015-06-30 |
| cnvd-2015-04104 | IBM Tivoli Security Directory Server信息泄露漏洞(CNVD-2015-04104) | 2015-06-29 | 2015-06-30 |
| cnvd-2015-04105 | IBM Tivoli Security Directory Server安全绕过漏洞 | 2015-06-29 | 2015-06-30 |
| cnvd-2015-04106 | IBM Tivoli Security Directory Server跨站脚本漏洞 | 2015-06-29 | 2015-06-30 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2009-avi-524 | Vulnérabilités dans IBM WebSphere | 2009-12-02T00:00:00.000000 | 2009-12-02T00:00:00.000000 |
| certa-2009-avi-525 | Multiples vulnérabilités dans ActivePerl | 2009-12-02T00:00:00.000000 | 2009-12-02T00:00:00.000000 |
| certa-2009-avi-526 | Vulnérabilité dans Ruby on Rails | 2009-12-02T00:00:00.000000 | 2009-12-02T00:00:00.000000 |
| certa-2009-avi-527 | Vulnérabilité dans Asterisk | 2009-12-03T00:00:00.000000 | 2009-12-03T00:00:00.000000 |
| certa-2009-avi-528 | Multiples vulnérabilités des systèmes FreeBSD | 2009-12-03T00:00:00.000000 | 2009-12-03T00:00:00.000000 |
| certa-2009-avi-529 | Vulnérabilités dans IBM WebSphere | 2009-12-04T00:00:00.000000 | 2009-12-04T00:00:00.000000 |
| certa-2009-avi-530 | Multiples vulnérabilités de Java pour Mac OS X | 2009-12-04T00:00:00.000000 | 2009-12-04T00:00:00.000000 |
| certa-2009-avi-531 | Vulnérabilité dans HP NonStop Server | 2009-12-04T00:00:00.000000 | 2009-12-04T00:00:00.000000 |
| certa-2009-avi-532 | Multiples vulnérabilités dans BlackBerry Attachement Service | 2009-12-04T00:00:00.000000 | 2009-12-04T00:00:00.000000 |
| certa-2009-avi-533 | Multiples vulnérabilités dans Sun Solaris | 2009-12-04T00:00:00.000000 | 2009-12-04T00:00:00.000000 |
| certa-2009-avi-534 | Multiples vulnérabilités dans le Sun Java Portal Server | 2009-12-04T00:00:00.000000 | 2009-12-04T00:00:00.000000 |
| certa-2009-avi-535 | Vulnérabilité dans le service LSASS de Microsoft Windows | 2009-12-09T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| certa-2009-avi-536 | Vulnérabilités dans Microsoft ADFS | 2009-12-09T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| certa-2009-avi-537 | Multiples vulnérabilités du service d'authentification Internet de Microsoft | 2009-12-09T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| certa-2009-avi-538 | Multiples vulnérabilités dans Internet Explorer | 2009-12-09T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| certa-2009-avi-539 | Vulnérabilité dans Microsoft WordPad et Microsoft Office Word | 2009-12-09T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| certa-2009-avi-540 | Vulnérabilité dans Microsoft Office Project | 2009-12-09T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| certa-2009-avi-541 | Multiples vulnérabilités dans Adobe Flash Player et Adobe Air | 2009-12-09T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| certa-2009-avi-542 | Vulnérabilité des produits Symantec Veritas VRTSweb | 2009-12-11T00:00:00.000000 | 2009-12-11T00:00:00.000000 |
| certa-2009-avi-543 | Vulnérabilité dans Ruby | 2009-12-11T00:00:00.000000 | 2009-12-11T00:00:00.000000 |
| certa-2009-avi-544 | Multiples vulnérabilités dans HP OpenView Network Node Manager | 2009-12-11T00:00:00.000000 | 2009-12-11T00:00:00.000000 |
| certa-2009-avi-545 | Multiples vulnérabilités dans Moodle | 2009-12-14T00:00:00.000000 | 2009-12-14T00:00:00.000000 |
| certa-2009-avi-546 | Vulnérabilités dans PostgreSQL | 2009-12-16T00:00:00.000000 | 2010-01-07T00:00:00.000000 |
| certa-2009-avi-547 | Multiples vulnérabilités dans Mozilla Firefox | 2009-12-16T00:00:00.000000 | 2009-12-16T00:00:00.000000 |
| certa-2009-avi-548 | Vulnérabilité dans VMware vCenter Lab Manager | 2009-12-17T00:00:00.000000 | 2009-12-17T00:00:00.000000 |
| certa-2009-avi-549 | Multiples vulnérabilités dans Drupal | 2009-12-17T00:00:00.000000 | 2009-12-24T00:00:00.000000 |
| certa-2009-avi-550 | Multiples vulnérabilités dans Cisco WebEx WRF Player | 2009-12-17T00:00:00.000000 | 2009-12-17T00:00:00.000000 |
| certa-2009-avi-551 | Multiples vulnérabilités dans IBM WebSphere | 2009-12-17T00:00:00.000000 | 2009-12-17T00:00:00.000000 |
| certa-2009-avi-552 | Vulnérabilité dans des produits Horde | 2009-12-17T00:00:00.000000 | 2009-12-24T00:00:00.000000 |
| certa-2009-avi-553 | Multiples vulnérabilités de PHP | 2009-12-18T00:00:00.000000 | 2009-12-18T00:00:00.000000 |