Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2002-0305 |
N/A
|
Zero One Tech (ZOT) P100s print server does not p… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.150Z |
| CVE-2002-0306 |
N/A
|
ans.pl in Avenger's News System (ANS) 2.11 and ea… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:28.938Z |
| CVE-2002-0307 |
N/A
|
Directory traversal vulnerability in ans.pl in Av… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.071Z |
| CVE-2002-0308 |
N/A
|
admin.asp in AdMentor 2.11 allows remote attacker… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.070Z |
| CVE-2002-0310 |
N/A
|
Netwin WebNews 1.1k CGI program includes several … |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.185Z |
| CVE-2002-0311 |
N/A
|
Vulnerability in webtop in UnixWare 7.1.1 and Ope… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.245Z |
| CVE-2002-0312 |
N/A
|
Directory traversal vulnerability in Essentia Web… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.188Z |
| CVE-2002-0314 |
N/A
|
fasttrack p2p, as used in (1) KaZaA before 1.5, (… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.069Z |
| CVE-2002-0315 |
N/A
|
fasttrack p2p, as used in (1) KaZaA, (2) grokster… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.183Z |
| CVE-2002-0316 |
N/A
|
Cross-site scripting vulnerability in eXtreme mes… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.245Z |
| CVE-2002-0317 |
N/A
|
Gator ActiveX component (IEGator.dll) 3.0.6.1 all… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.181Z |
| CVE-2002-0319 |
N/A
|
Cross-site scripting vulnerability in edituser.ph… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.187Z |
| CVE-2002-0320 |
N/A
|
Buffer overflow in Yahoo! Messenger 5.0 allows re… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.167Z |
| CVE-2002-0321 |
N/A
|
Yahoo! Messenger 5.0 allows remote attackers to s… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.169Z |
| CVE-2002-0322 |
N/A
|
Yahoo! Messenger 4.0 sends user passwords in clea… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.243Z |
| CVE-2002-0323 |
N/A
|
comment2.jse in ScriptEase:WebServer allows remot… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.194Z |
| CVE-2002-0324 |
N/A
|
Greymatter 1.21c and earlier with the Bookmarklet… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.184Z |
| CVE-2002-0325 |
N/A
|
Directory traversal vulnerability in BadBlue befo… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.151Z |
| CVE-2002-0326 |
N/A
|
Cross-site scripting vulnerability in BadBlue bef… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.183Z |
| CVE-2002-0327 |
N/A
|
Buffer overflow in Century Software TERM allows l… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.222Z |
| CVE-2002-0328 |
N/A
|
Cross-site scripting vulnerability in Ikonboard 3… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.284Z |
| CVE-2002-0331 |
N/A
|
Directory traversal vulnerability in the HTTP ser… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.198Z |
| CVE-2002-0332 |
N/A
|
Buffer overflows in xtell (xtelld) 1.91.1 and ear… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.169Z |
| CVE-2002-0333 |
N/A
|
Directory traversal vulnerability in xtell (xtell… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.070Z |
| CVE-2002-0334 |
N/A
|
xtell (xtelld) 1.91.1 and earlier, and 2.x before… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:42:29.196Z |
| CVE-2002-0335 |
N/A
|
Buffer overflow in Galacticomm Worldgroup web ser… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:49:27.308Z |
| CVE-2002-0336 |
N/A
|
Buffer overflow in Galacticomm Worldgroup FTP ser… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:49:27.332Z |
| CVE-2002-0337 |
N/A
|
RealPlayer 8 allows remote attackers to cause a d… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:49:27.365Z |
| CVE-2002-0338 |
N/A
|
The Bat! 1.53d and 1.54beta, and possibly other v… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:49:27.311Z |
| CVE-2002-0340 |
N/A
|
Windows Media Player (WMP) 8.00.00.4477, and poss… |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T02:49:27.335Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2001-1429 |
N/A
|
Buffer overflow in mcedit in Midnight Commander 4… |
n/a |
n/a |
2005-03-24T05:00:00.000Z | 2024-08-08T04:58:11.519Z |
| CVE-2001-0892 |
N/A
|
Acme Thttpd Secure Webserver before 2.22, with th… |
n/a |
n/a |
2002-02-02T05:00:00.000Z | 2024-08-08T04:37:06.695Z |
| CVE-2001-0893 |
N/A
|
Acme mini_httpd before 1.16 allows remote attacke… |
n/a |
n/a |
2002-02-02T05:00:00.000Z | 2024-08-08T04:37:06.816Z |
| CVE-2001-1415 |
N/A
|
vi.recover in OpenBSD before 3.1 allows local use… |
n/a |
n/a |
2005-03-18T05:00:00.000Z | 2024-08-08T04:51:08.270Z |
| CVE-2001-0723 |
N/A
|
Internet Explorer 5.5 and 6.0 allows remote attac… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:30:06.088Z |
| CVE-2001-0724 |
N/A
|
Internet Explorer 5.5 allows remote attackers to … |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:30:06.118Z |
| CVE-2001-0895 |
N/A
|
Multiple Cisco networking products allow remote a… |
n/a |
n/a |
2002-06-25T04:00:00.000Z | 2024-08-08T04:37:06.659Z |
| CVE-2001-0897 |
N/A
|
Cross-site scripting vulnerability in Infopop Ult… |
n/a |
n/a |
2002-02-02T05:00:00.000Z | 2024-08-08T04:37:06.812Z |
| CVE-2001-0898 |
N/A
|
Opera 6.0 and earlier allows remote attackers to … |
n/a |
n/a |
2002-02-02T05:00:00.000Z | 2024-08-08T04:37:06.835Z |
| CVE-2001-0899 |
N/A
|
Network Tools 0.2 for PHP-Nuke allows remote atta… |
n/a |
n/a |
2002-06-25T04:00:00.000Z | 2024-08-08T04:37:07.026Z |
| CVE-2001-0900 |
N/A
|
Directory traversal vulnerability in modules.php … |
n/a |
n/a |
2002-06-25T04:00:00.000Z | 2024-08-08T04:37:06.993Z |
| CVE-2001-1228 |
N/A
|
Buffer overflows in gzip 1.3x, 1.2.4, and other v… |
n/a |
n/a |
2002-04-12T04:00:00.000Z | 2024-08-08T04:51:08.206Z |
| CVE-2001-0901 |
N/A
|
Hypermail allows remote attackers to execute arbi… |
n/a |
n/a |
2002-06-25T04:00:00.000Z | 2024-08-08T04:37:07.020Z |
| CVE-2001-1463 |
N/A
|
The remote administration client for RhinoSoft Se… |
n/a |
n/a |
2005-04-21T04:00:00.000Z | 2024-08-08T04:58:11.591Z |
| CVE-2001-0902 |
N/A
|
Microsoft IIS 5.0 allows remote attackers to spoo… |
n/a |
n/a |
2004-09-01T04:00:00.000Z | 2024-08-08T04:37:07.049Z |
| CVE-2001-0903 |
N/A
|
Linear key exchange process in High-bandwidth Dig… |
n/a |
n/a |
2002-02-02T05:00:00.000Z | 2024-08-08T04:37:06.996Z |
| CVE-2001-0904 |
N/A
|
Internet Explorer 5.5 and 6 with the Q312461 (MS0… |
n/a |
n/a |
2002-02-02T05:00:00.000Z | 2024-08-08T04:37:06.812Z |
| CVE-2001-0908 |
N/A
|
CITRIX Metaframe 1.8 logs the Client Address (IP … |
n/a |
n/a |
2002-02-02T05:00:00.000Z | 2024-08-08T04:37:06.655Z |
| CVE-2001-0909 |
N/A
|
Buffer overflow in helpctr.exe program in Microso… |
n/a |
n/a |
2004-09-01T04:00:00.000Z | 2024-08-08T04:37:07.028Z |
| CVE-2001-0910 |
N/A
|
Legato Networker before 6.1 allows remote attacke… |
n/a |
n/a |
2002-02-02T05:00:00.000Z | 2024-08-08T04:37:06.732Z |
| CVE-2001-0911 |
N/A
|
PHP-Nuke 5.1 stores user and administrator passwo… |
n/a |
n/a |
2002-02-02T05:00:00.000Z | 2024-08-08T04:37:07.021Z |
| CVE-2001-0914 |
N/A
|
Linux kernel before 2.4.11pre3 in multiple Linux … |
n/a |
n/a |
2004-09-01T04:00:00.000Z | 2024-08-08T04:37:06.780Z |
| CVE-2001-0915 |
N/A
|
Format string vulnerability in Berkeley parallel … |
n/a |
n/a |
2002-02-02T05:00:00.000Z | 2024-08-08T04:37:06.836Z |
| CVE-2001-0916 |
N/A
|
Buffer overflow in Berkeley parallel make (pmake)… |
n/a |
n/a |
2002-02-02T05:00:00.000Z | 2024-08-08T04:37:06.889Z |
| CVE-2001-0921 |
N/A
|
Netscape 4.79 and earlier for MacOS allows an att… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:37:07.082Z |
| CVE-2001-0913 |
N/A
|
Format string vulnerability in Network Solutions … |
n/a |
n/a |
2002-02-02T05:00:00.000Z | 2024-08-08T04:37:06.798Z |
| CVE-2001-0917 |
N/A
|
Jakarta Tomcat 4.0.1 allows remote attackers to r… |
n/a |
n/a |
2002-06-25T04:00:00.000Z | 2024-08-08T04:37:07.155Z |
| CVE-2001-0918 |
N/A
|
Vulnerabilities in CGI scripts in susehelp in SuS… |
n/a |
n/a |
2002-06-25T04:00:00.000Z | 2024-08-08T04:37:07.027Z |
| CVE-2001-0924 |
N/A
|
Directory traversal vulnerability in ifx CGI prog… |
n/a |
n/a |
2002-02-02T05:00:00.000Z | 2024-08-08T04:37:06.995Z |
| CVE-2001-1350 |
N/A
|
Cross-site scripting vulnerability in namazu.cgi … |
n/a |
n/a |
2004-09-01T04:00:00.000Z | 2024-08-08T04:51:08.131Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-xw93-v57j-fcgh |
2.5 (3.1)
2.0 (4.0)
|
Division by 0 in `SparseMatMul` | 2021-05-21T14:24:48Z | 2024-10-31T20:54:32Z |
| ghsa-mqh2-9wrp-vx84 |
2.5 (3.1)
2.0 (4.0)
|
Heap buffer overflow in `SparseSplit` | 2021-05-21T14:24:51Z | 2024-10-31T20:53:20Z |
| ghsa-59q2-x2qc-4c97 |
2.5 (3.1)
2.0 (4.0)
|
Heap OOB access in unicode ops | 2021-05-21T14:24:54Z | 2024-10-31T20:52:47Z |
| ghsa-8gv3-57p6-g35r |
2.5 (3.1)
2.0 (4.0)
|
Heap buffer overflow in `RaggedTensorToTensor` | 2021-05-21T14:24:57Z | 2024-11-01T16:58:15Z |
| ghsa-gvm4-h8j3-rjrq |
2.5 (3.1)
2.0 (4.0)
|
CHECK-fail in `LoadAndRemapMatrix` | 2021-05-21T14:24:59Z | 2024-11-01T16:56:08Z |
| ghsa-36vm-xw34-x4pj |
2.5 (3.1)
2.0 (4.0)
|
CHECK-fail in `tf.raw_ops.IRFFT` | 2021-05-21T14:25:02Z | 2024-11-01T16:55:35Z |
| ghsa-ph87-fvjr-v33w |
2.5 (3.1)
2.0 (4.0)
|
CHECK-fail in `tf.raw_ops.RFFT` | 2021-05-21T14:25:05Z | 2024-11-01T16:55:05Z |
| ghsa-75f6-78jr-4656 |
2.5 (3.1)
2.0 (4.0)
|
Null pointer dereference in `EditDistance` | 2021-05-21T14:25:08Z | 2024-11-01T16:54:25Z |
| ghsa-r6pg-pjwc-j585 |
2.5 (3.1)
2.0 (4.0)
|
Null pointer dereference in `SparseFillEmptyRows` | 2021-05-21T14:25:11Z | 2024-11-01T17:03:07Z |
| ghsa-pvrc-hg3f-58r6 |
2.5 (3.1)
2.0 (4.0)
|
Heap OOB access in `Dilation2DBackpropInput` | 2021-05-21T14:25:13Z | 2024-11-01T17:03:51Z |
| ghsa-wp3c-xw9g-gpcg |
2.5 (3.1)
2.0 (4.0)
|
Lack of validation in `SparseDenseCwiseMul` | 2021-05-21T14:25:16Z | 2024-11-01T17:04:25Z |
| ghsa-4p4p-www8-8fv9 |
2.5 (3.1)
2.0 (4.0)
|
Reference binding to null in `ParameterizedTruncatedNormal` | 2021-05-21T14:25:19Z | 2024-11-01T17:05:06Z |
| ghsa-3h8m-483j-7xxm |
2.5 (3.1)
2.0 (4.0)
|
Heap out of bounds read in `RequantizationRange` | 2021-05-21T14:25:22Z | 2024-11-01T17:05:44Z |
| ghsa-545v-42p7-98fq |
2.5 (3.1)
2.0 (4.0)
|
Heap out of bounds read in `MaxPoolGradWithArgmax` | 2021-05-21T14:25:25Z | 2024-11-01T17:06:23Z |
| ghsa-whr9-vfh2-7hm6 |
4.5 (3.1)
2.0 (4.0)
|
Memory corruption in `DrawBoundingBoxesV2` | 2021-05-21T14:25:28Z | 2024-10-31T21:04:39Z |
| ghsa-5gqf-456p-4836 |
2.5 (3.1)
2.0 (4.0)
|
Reference binding to nullptr in `SdcaOptimizer` | 2021-05-21T14:25:31Z | 2024-10-31T21:03:55Z |
| ghsa-9vpm-rcf4-9wqw |
2.5 (3.1)
2.0 (4.0)
|
Division by 0 in `MaxPoolGradWithArgmax` | 2021-05-21T14:26:07Z | 2024-11-01T17:09:55Z |
| ghsa-828x-qc2p-wprq |
2.5 (3.1)
2.0 (4.0)
|
Undefined behavior in `MaxPool3DGradGrad` | 2021-05-21T14:26:10Z | 2024-10-31T20:56:37Z |
| ghsa-6qgm-fv6v-rfpv |
2.5 (3.1)
2.0 (4.0)
|
Overflow/denial of service in `tf.raw_ops.ReverseSequence` | 2021-05-21T14:26:13Z | 2024-11-01T17:10:29Z |
| ghsa-7cqx-92hp-x6wh |
2.5 (3.1)
2.0 (4.0)
|
Heap buffer overflow in `MaxPool3DGradGrad` | 2021-05-21T14:26:16Z | 2024-11-01T17:11:03Z |
| ghsa-v6r6-84gr-92rm |
2.5 (3.1)
2.0 (4.0)
|
Heap buffer overflow in `AvgPool3DGrad` | 2021-05-21T14:26:18Z | 2024-11-01T17:11:43Z |
| ghsa-6f89-8j54-29xf |
2.5 (3.1)
2.0 (4.0)
|
Heap buffer overflow in `FractionalAvgPoolGrad` | 2021-05-21T14:26:21Z | 2024-11-01T17:12:18Z |
| ghsa-79fv-9865-4qcv |
2.5 (3.1)
2.0 (4.0)
|
Heap buffer overflow in `MaxPoolGrad` | 2021-05-21T14:26:23Z | 2024-11-01T17:12:52Z |
| ghsa-x8h6-xgqx-jqgp |
2.5 (3.1)
2.0 (4.0)
|
Undefined behavior and `CHECK`-fail in `FractionalMaxPoolGrad` | 2021-05-21T14:26:26Z | 2024-11-01T17:13:23Z |
| ghsa-vq2r-5xvm-3hc3 |
2.5 (3.1)
2.0 (4.0)
|
Segfault in `CTCBeamSearchDecoder` | 2021-05-21T14:26:30Z | 2024-11-01T17:13:54Z |
| ghsa-c45w-2wxr-pp53 |
2.5 (3.1)
2.0 (4.0)
|
Heap OOB read in `tf.raw_ops.Dequantize` | 2021-05-21T14:26:32Z | 2024-11-01T17:14:26Z |
| ghsa-9xh4-23q4-v6wr |
2.5 (3.1)
2.0 (4.0)
|
Heap buffer overflow and undefined behavior in `FusedBatchNorm` | 2021-05-21T14:26:35Z | 2024-11-13T15:59:06Z |
| ghsa-xvjm-fvxx-q3hv |
2.5 (3.1)
2.0 (4.0)
|
CHECK-fail due to integer overflow | 2021-05-21T14:26:38Z | 2024-11-13T15:59:44Z |
| ghsa-mv78-g7wq-mhp4 |
2.5 (3.1)
2.3 (4.0)
|
Division by zero in padding computation in TFLite | 2021-05-21T14:26:41Z | 2024-11-13T16:00:45Z |
| ghsa-26j7-6w8w-7922 |
2.5 (3.1)
2.3 (4.0)
|
Division by zero in optimized pooling implementations in TFLite | 2021-05-21T14:26:43Z | 2024-11-13T16:01:10Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-4729 | Malicious code in mstmeetings (npm) | 2022-06-20T20:22:57Z | 2022-06-20T20:22:58Z |
| mal-2022-3091 | Malicious code in focalboard (npm) | 2022-06-20T20:22:58Z | 2022-06-20T20:22:58Z |
| mal-2022-4498 | Malicious code in mattermost-chrome-extension (npm) | 2022-06-20T20:22:58Z | 2022-06-20T20:22:58Z |
| mal-2022-4499 | Malicious code in mattermost-metrics-server (npm) | 2022-06-20T20:22:58Z | 2022-06-20T20:22:59Z |
| mal-2022-4501 | Malicious code in mattermost-mobile-e2e (npm) | 2022-06-20T20:22:58Z | 2022-06-20T20:22:59Z |
| mal-2022-4504 | Malicious code in mattermost-push-proxy (npm) | 2022-06-20T20:22:58Z | 2022-06-20T20:22:58Z |
| mal-2022-2800 | Malicious code in eslint-config-mattermost (npm) | 2022-06-20T20:22:59Z | 2022-06-20T20:22:59Z |
| mal-2022-4500 | Malicious code in mattermost-mobile (npm) | 2022-06-20T20:22:59Z | 2022-06-20T20:23:00Z |
| mal-2022-4505 | Malicious code in mattermost-qa-automation (npm) | 2022-06-20T20:22:59Z | 2022-06-20T20:22:59Z |
| mal-2022-5092 | Malicious code in open-xchange-appsuite-spamexperts (npm) | 2022-06-20T20:22:59Z | 2022-06-20T20:23:00Z |
| mal-2022-1075 | Malicious code in appsuite-mailvelope (npm) | 2022-06-20T20:23:00Z | 2022-06-20T20:23:01Z |
| mal-2022-5094 | Malicious code in open-xchange-guidedtours (npm) | 2022-06-20T20:23:00Z | 2022-06-20T20:23:00Z |
| mal-2022-5164 | Malicious code in oxapi-documentations-build-script (npm) | 2022-06-20T20:23:00Z | 2022-06-20T20:23:01Z |
| mal-2022-6801 | Malicious code in update-themes (npm) | 2022-06-20T20:23:00Z | 2022-06-20T20:23:00Z |
| mal-2022-5091 | Malicious code in open-xchange-appsuite (npm) | 2022-06-20T20:23:01Z | 2022-06-20T20:23:01Z |
| mal-2022-5093 | Malicious code in open-xchange-dynamic-theme (npm) | 2022-06-20T20:23:01Z | 2022-06-20T20:23:01Z |
| mal-2022-5256 | Malicious code in pc-web_socket (npm) | 2022-06-20T20:23:01Z | 2022-06-20T20:23:02Z |
| mal-2022-7087 | Malicious code in web3_socket (npm) | 2022-06-20T20:23:01Z | 2022-06-20T20:23:02Z |
| mal-2022-1581 | Malicious code in bing11testpak (npm) | 2022-06-20T20:23:02Z | 2022-06-20T20:23:03Z |
| mal-2022-2487 | Malicious code in discord-rude-tool (npm) | 2022-06-20T20:23:02Z | 2022-06-20T20:23:02Z |
| mal-2022-2957 | Malicious code in f5-logger (npm) | 2022-06-20T20:23:02Z | 2022-06-20T20:23:03Z |
| mal-2022-448 | Malicious code in @naugtur/callhome (npm) | 2022-06-20T20:23:02Z | 2022-06-20T20:23:02Z |
| mal-2022-5347 | Malicious code in pixivsketch (npm) | 2022-06-20T20:23:03Z | 2022-06-20T20:23:03Z |
| mal-2022-6222 | Malicious code in soydata (npm) | 2022-06-20T20:23:03Z | 2022-06-20T20:23:04Z |
| mal-2022-6573 | Malicious code in time_estimates (npm) | 2022-06-20T20:23:03Z | 2022-06-20T20:23:03Z |
| mal-2022-6858 | Malicious code in usabilla_live (npm) | 2022-06-20T20:23:03Z | 2022-06-20T20:23:04Z |
| mal-2022-4301 | Malicious code in libidn2 (npm) | 2022-06-20T20:23:04Z | 2022-06-20T20:23:04Z |
| mal-2022-4481 | Malicious code in marcom (npm) | 2022-06-20T20:23:04Z | 2022-06-20T20:23:05Z |
| mal-2022-5749 | Malicious code in render_delegates (npm) | 2022-06-20T20:23:04Z | 2022-06-20T20:23:04Z |
| mal-2022-5991 | Malicious code in searchcursor (npm) | 2022-06-20T20:23:04Z | 2022-06-20T20:23:05Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-2346 | Apache Struts: Schwachstelle ermöglicht Denial of Service | 2023-09-13T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2023-2347 | Wibu-Systems CodeMeter: Schwachstelle ermöglicht Privilegieneskalation | 2023-09-13T22:00:00.000+00:00 | 2023-09-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2348 | util-linux: Schwachstelle erlaubt Privilegienerweiterung und die Ausführung von beliebigem Code | 2023-09-13T22:00:00.000+00:00 | 2023-09-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2349 | Trellix Data Loss Prevention: Schwachstelle ermöglicht Manipulation von Dateien | 2023-09-13T22:00:00.000+00:00 | 2023-09-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2350 | QEMU: Schwachstelle ermöglicht Denial of Service | 2023-09-13T22:00:00.000+00:00 | 2023-11-07T23:00:00.000+00:00 |
| wid-sec-w-2023-2351 | gcc: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-09-13T22:00:00.000+00:00 | 2025-08-20T22:00:00.000+00:00 |
| wid-sec-w-2023-2352 | Apache Commons: Schwachstelle ermöglicht Denial of Service | 2023-09-13T22:00:00.000+00:00 | 2024-03-27T23:00:00.000+00:00 |
| wid-sec-w-2023-2353 | Ghostscript: Mehrere Schwachstellen | 2023-09-13T22:00:00.000+00:00 | 2024-05-21T22:00:00.000+00:00 |
| wid-sec-w-2023-2354 | Drupal: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-09-13T22:00:00.000+00:00 | 2023-09-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2355 | Cisco IOS XR: Mehrere Schwachstellen | 2023-09-13T22:00:00.000+00:00 | 2023-09-13T22:00:00.000+00:00 |
| wid-sec-w-2023-2356 | IBM QRadar SIEM: Mehre Schwachstellen | 2023-09-14T22:00:00.000+00:00 | 2023-09-28T22:00:00.000+00:00 |
| wid-sec-w-2023-2357 | shadow: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-09-14T22:00:00.000+00:00 | 2025-04-21T22:00:00.000+00:00 |
| wid-sec-w-2023-2358 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-09-14T22:00:00.000+00:00 | 2024-03-27T23:00:00.000+00:00 |
| wid-sec-w-2023-2359 | Eclipse Jetty: Mehrere Schwachstellen | 2023-09-14T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2023-2360 | Trellix Secure Web Gateway: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-09-14T22:00:00.000+00:00 | 2023-09-14T22:00:00.000+00:00 |
| wid-sec-w-2023-2361 | Hashicorp Vault: Schwachstelle ermöglicht Umgehung von Sicherheitsmaßnahmen oder Offenlegung vertraulicher Informationen | 2023-09-14T22:00:00.000+00:00 | 2023-09-14T22:00:00.000+00:00 |
| wid-sec-w-2023-2362 | Red Hat Quarkus: Schwachstelle ermöglicht die Umgehung von Sicherheitsmaßnahmen oder die Verursachung eines Denial-of-Service-Zustands | 2023-09-14T22:00:00.000+00:00 | 2024-07-01T22:00:00.000+00:00 |
| wid-sec-w-2023-2363 | Dell PowerEdge: Schwachstelle ermöglicht Privilegieneskalation | 2023-09-14T22:00:00.000+00:00 | 2023-09-14T22:00:00.000+00:00 |
| wid-sec-w-2023-2364 | WithSecure Endpoint Protection: Schwachstellen ermöglichen Denial of Service | 2023-09-14T22:00:00.000+00:00 | 2023-09-14T22:00:00.000+00:00 |
| wid-sec-w-2023-2367 | Roundcube: Schwachstelle ermöglicht Cross-Site Scripting | 2023-09-14T22:00:00.000+00:00 | 2023-09-14T22:00:00.000+00:00 |
| wid-sec-w-2023-2368 | IBM Operational Decision Manager: Mehrere Schwachstellen | 2023-09-14T22:00:00.000+00:00 | 2024-01-07T23:00:00.000+00:00 |
| wid-sec-w-2023-2369 | binutils: Mehrere Schwachstellen | 2023-09-14T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2023-2370 | Mattermost: Mehrere Schwachstellen ermöglicht nicht spezifizierten Angriff | 2023-09-17T22:00:00.000+00:00 | 2023-10-24T22:00:00.000+00:00 |
| wid-sec-w-2023-2372 | HPE OneView: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-09-17T22:00:00.000+00:00 | 2023-09-17T22:00:00.000+00:00 |
| wid-sec-w-2023-2373 | QT: Schwachstelle ermöglicht Denial of Service | 2023-09-17T22:00:00.000+00:00 | 2023-09-17T22:00:00.000+00:00 |
| wid-sec-w-2023-2374 | vBulletin Connect: Schwachstelle ermöglicht Cross-Site Scripting | 2023-09-17T22:00:00.000+00:00 | 2023-09-17T22:00:00.000+00:00 |
| wid-sec-w-2023-2375 | Insyde UEFI Firmware: Schwachstelle ermöglicht Codeausführung | 2023-09-17T22:00:00.000+00:00 | 2025-03-10T23:00:00.000+00:00 |
| wid-sec-w-2023-2376 | Red Hat OpenStack: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-09-17T22:00:00.000+00:00 | 2023-09-17T22:00:00.000+00:00 |
| wid-sec-w-2023-2377 | Red Hat Quay: Mehrere Schwachstellen | 2023-09-17T22:00:00.000+00:00 | 2023-09-17T22:00:00.000+00:00 |
| wid-sec-w-2023-2378 | Microsoft Edge: Mehrere Schwachstellen | 2023-09-17T22:00:00.000+00:00 | 2024-02-04T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2023-27533 | A vulnerability in input validation exists in curl <8.0 during communication using the TELNET protocol may allow an attacker to pass on maliciously crafted user name and "telnet options" during server negotiation. The lack of proper input scrubbing allows an attacker to send content or perform option negotiation without the application's intent. This vulnerability could be exploited if an application allows user input thereby enabling attackers to execute arbitrary code on the system. | 2023-03-10T00:00:00.000Z | 2026-02-18T01:12:31.000Z |
| msrc_cve-2023-27534 | A path traversal vulnerability exists in curl <8.0.0 SFTP implementation causes the tilde (~) character to be wrongly replaced when used as a prefix in the first path element in addition to its intended use as the first element to indicate a path relative to the user's home directory. Attackers can exploit this flaw to bypass filtering or execute arbitrary code by crafting a path like /~2/foo while accessing a server with a specific user. | 2023-03-10T00:00:00.000Z | 2026-02-18T01:10:36.000Z |
| msrc_cve-2023-27535 | An authentication bypass vulnerability exists in libcurl <8.0.0 in the FTP connection reuse feature that can result in wrong credentials being used during subsequent transfers. Previously created connections are kept in a connection pool for reuse if they match the current setup. However certain FTP settings such as CURLOPT_FTP_ACCOUNT CURLOPT_FTP_ALTERNATIVE_TO_USER CURLOPT_FTP_SSL_CCC and CURLOPT_USE_SSL were not included in the configuration match checks causing them to match too easily. This could lead to libcurl using the wrong credentials when performing a transfer potentially allowing unauthorized access to sensitive information. | 2023-03-10T00:00:00.000Z | 2026-02-18T01:16:21.000Z |
| msrc_cve-2023-27536 | An authentication bypass vulnerability exists libcurl <8.0.0 in the connection reuse feature which can reuse previously established connections with incorrect user permissions due to a failure to check for changes in the CURLOPT_GSSAPI_DELEGATION option. This vulnerability affects krb5/kerberos/negotiate/GSSAPI transfers and could potentially result in unauthorized access to sensitive information. The safest option is to not reuse connections if the CURLOPT_GSSAPI_DELEGATION option has been changed. | 2023-03-10T00:00:00.000Z | 2026-02-18T01:08:38.000Z |
| msrc_cve-2023-27537 | A double free vulnerability exists in libcurl <8.0.0 when sharing HSTS data between separate "handles". This sharing was introduced without considerations for do this sharing across separate threads but there was no indication of this fact in the documentation. Due to missing mutexes or thread locks two threads sharing the same HSTS data could end up doing a double-free or use-after-free. | 2023-03-10T00:00:00.000Z | 2026-02-18T01:03:13.000Z |
| msrc_cve-2023-27538 | An authentication bypass vulnerability exists in libcurl prior to v8.0.0 where it reuses a previously established SSH connection despite the fact that an SSH option was modified which should have prevented reuse. libcurl maintains a pool of previously used connections to reuse them for subsequent transfers if the configurations match. However two SSH settings were omitted from the configuration check allowing them to match easily potentially leading to the reuse of an inappropriate connection. | 2023-03-10T00:00:00.000Z | 2026-02-18T01:18:34.000Z |
| msrc_cve-2023-27561 | runc through 1.1.4 has Incorrect Access Control leading to Escalation of Privileges related to libcontainer/rootfs_linux.go. To exploit this an attacker must be able to spawn two containers with custom volume-mount configurations and be able to run custom images. NOTE: this issue exists because of a CVE-2019-19921 regression. | 2023-03-10T00:00:00.000Z | 2023-04-22T00:00:00.000Z |
| msrc_cve-2023-27579 | TensorFlow has Floating Point Exception in TFLite in conv kernel | 2023-03-10T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-27985 | emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. It is fixed in 29.0.90 | 2023-03-10T00:00:00.000Z | 2023-03-13T00:00:00.000Z |
| msrc_cve-2023-27986 | emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters. It is fixed in 29.0.90. | 2023-03-10T00:00:00.000Z | 2023-03-14T00:00:00.000Z |
| msrc_cve-2023-28154 | Webpack 5 before 5.76.0 does not avoid cross-realm object access. ImportParserPlugin.js mishandles the magic comment feature. An attacker who controls a property of an untrusted object can obtain access to the real global object. | 2023-03-10T00:00:00.000Z | 2026-02-18T03:04:22.000Z |
| msrc_cve-2023-28155 | The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | 2023-03-10T00:00:00.000Z | 2026-02-18T02:59:40.000Z |
| msrc_cve-2023-28425 | Specially crafted MSETNX command can lead to denial-of-service | 2023-03-10T00:00:00.000Z | 2023-04-15T00:00:00.000Z |
| msrc_cve-2023-28448 | Versionize is lacking bound checks potentially leading to out of bounds memory access | 2023-03-10T00:00:00.000Z | 2023-04-03T00:00:00.000Z |
| msrc_cve-2023-28450 | An issue was discovered in Dnsmasq before 2.90. The default maximum EDNS.0 UDP packet size was set to 4096 but should be 1232 because of DNS Flag Day 2020. | 2023-03-10T00:00:00.000Z | 2023-03-22T00:00:00.000Z |
| msrc_cve-2023-28464 | hci_conn_cleanup in net/bluetooth/hci_conn.c in the Linux kernel through 6.2.9 has a use-after-free (observed in hci_conn_hash_flush) because of calls to hci_dev_put and hci_conn_put. There is a double free that may lead to privilege escalation. | 2023-03-10T00:00:00.000Z | 2023-04-07T00:00:00.000Z |
| msrc_cve-2023-28466 | do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call leading to a race condition (with a resultant use-after-free or NULL pointer dereference). | 2023-03-10T00:00:00.000Z | 2023-05-03T00:00:00.000Z |
| msrc_cve-2023-28486 | Sudo before 1.9.13 does not escape control characters in log messages. | 2023-03-10T00:00:00.000Z | 2023-04-07T00:00:00.000Z |
| msrc_cve-2023-28487 | Sudo before 1.9.13 does not escape control characters in sudoreplay output. | 2023-03-10T00:00:00.000Z | 2023-04-07T00:00:00.000Z |
| msrc_cve-2023-28531 | ssh-add in OpenSSH before 9.3 adds smartcard keys to ssh-agent without the intended per-hop destination constraints. The earliest affected version is 8.9. | 2023-03-10T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2023-28617 | org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters. | 2023-03-10T00:00:00.000Z | 2023-03-27T00:00:00.000Z |
| msrc_cve-2023-28642 | AppArmor bypass with symlinked /proc in runc | 2023-03-10T00:00:00.000Z | 2023-04-03T00:00:00.000Z |
| msrc_cve-2023-28772 | An issue was discovered in the Linux kernel before 5.13.3. lib/seq_buf.c has a seq_buf_putmem_hex buffer overflow. | 2023-03-10T00:00:00.000Z | 2023-06-07T00:00:00.000Z |
| msrc_cve-2023-28866 | In the Linux kernel through 6.2.8 net/bluetooth/hci_sync.c allows out-of-bounds access because amp_init1[] and amp_init2[] are supposed to have an intentionally invalid element but do not. | 2023-03-10T00:00:00.000Z | 2023-04-05T00:00:00.000Z |
| msrc_cve-2023-21708 | Remote Procedure Call Runtime Remote Code Execution Vulnerability | 2023-03-14T07:00:00.000Z | 2023-03-14T07:00:00.000Z |
| msrc_cve-2023-23383 | Service Fabric Explorer Spoofing Vulnerability | 2023-03-14T07:00:00.000Z | 2023-06-29T07:00:00.000Z |
| msrc_cve-2023-23385 | Windows Point-to-Point Protocol over Ethernet (PPPoE) Elevation of Privilege Vulnerability | 2023-03-14T07:00:00.000Z | 2023-03-14T07:00:00.000Z |
| msrc_cve-2023-23388 | Windows Bluetooth Driver Elevation of Privilege Vulnerability | 2023-03-14T07:00:00.000Z | 2023-03-14T07:00:00.000Z |
| msrc_cve-2023-23389 | Microsoft Defender Elevation of Privilege Vulnerability | 2023-03-14T07:00:00.000Z | 2023-03-16T07:00:00.000Z |
| msrc_cve-2023-23391 | Office for Android Spoofing Vulnerability | 2023-03-14T07:00:00.000Z | 2023-03-14T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:10607-1 | libSDL2-2_0-0-2.0.16-2.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10608-1 | libSDL2_image-2_0-0-2.0.5-1.14 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10609-1 | libSDL_image-1_2-0-1.2.12+hg695-1.12 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10610-1 | libSDL_sound-1_0-1-1.0.3-94.20 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10611-1 | accountsservice-0.6.55-8.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10612-1 | adns-1.6.0-1.8 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10613-1 | alpine-2.25-24.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10614-1 | amavisd-new-2.12.1-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10615-1 | ansible-2.9.24-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10616-1 | ant-1.10.10-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10617-1 | apache-commons-beanutils-1.9.4-3.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10618-1 | apache-commons-compress-1.21-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10619-1 | apache-commons-email-1.5-3.10 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10620-1 | apache-commons-fileupload-1.4-1.9 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10621-1 | apache-commons-httpclient-3.1-13.4 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10622-1 | apache-pdfbox-2.0.23-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10623-1 | apache2-2.4.49-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10624-1 | apache2-mod_auth_openidc-2.4.9.4-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10625-1 | apache2-mod_jk-1.2.48-2.9 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10626-1 | apache2-mod_perl-2.0.11-2.12 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10627-1 | apache2-mod_apparmor-3.0.3-3.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10628-1 | apr-devel-1.7.0-2.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10629-1 | apr-util-devel-1.6.1-7.8 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10630-1 | arc-5.21q-6.7 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10631-1 | aria2-1.36.0-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10632-1 | ark-21.08.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10633-1 | arm-trusted-firmware-2.5-2.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10634-1 | arpwatch-3.1-1.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10635-1 | aspell-0.60.8-4.2 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:10636-1 | atftp-0.7.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2014:1019 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.0 update | 2014-08-06T15:06:42+00:00 | 2026-01-28T22:38:13+00:00 |
| rhsa-2014:1025 | Red Hat Security Advisory: kernel security and bug fix update | 2014-08-06T15:49:33+00:00 | 2025-11-21T17:49:29+00:00 |
| rhsa-2014:1023 | Red Hat Security Advisory: kernel security and bug fix update | 2014-08-06T17:10:29+00:00 | 2025-11-21T17:49:29+00:00 |
| rhsa-2014:1032 | Red Hat Security Advisory: redhat-ds-base security update | 2014-08-07T16:42:11+00:00 | 2025-11-21T17:49:31+00:00 |
| rhsa-2014:1033 | Red Hat Security Advisory: java-1.6.0-ibm security update | 2014-08-07T16:52:48+00:00 | 2026-01-13T21:05:04+00:00 |
| rhsa-2014:1034 | Red Hat Security Advisory: tomcat security update | 2014-08-07T18:23:30+00:00 | 2026-01-28T22:38:15+00:00 |
| rhsa-2014:1031 | Red Hat Security Advisory: 389-ds-base security update | 2014-08-07T18:23:38+00:00 | 2025-11-21T17:49:31+00:00 |
| rhsa-2014:1036 | Red Hat Security Advisory: java-1.5.0-ibm security update | 2014-08-07T21:24:51+00:00 | 2026-01-13T21:05:06+00:00 |
| rhsa-2014:1042 | Red Hat Security Advisory: java-1.7.1-ibm security update | 2014-08-11T16:44:22+00:00 | 2026-01-13T22:31:41+00:00 |
| rhsa-2014:1039 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.0 security update | 2014-08-11T16:44:36+00:00 | 2026-01-28T22:58:21+00:00 |
| rhsa-2014:1038 | Red Hat Security Advisory: tomcat6 security update | 2014-08-11T16:44:40+00:00 | 2026-01-28T22:38:14+00:00 |
| rhsa-2014:1041 | Red Hat Security Advisory: java-1.7.0-ibm security update | 2014-08-11T16:54:59+00:00 | 2026-01-13T21:05:11+00:00 |
| rhsa-2014:1040 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3.0 security update | 2014-08-11T17:05:15+00:00 | 2026-01-28T22:58:21+00:00 |
| rhsa-2014:1050 | Red Hat Security Advisory: openstack-ceilometer security and bug fix update | 2014-08-13T01:36:01+00:00 | 2025-11-21T17:49:38+00:00 |
| rhsa-2014:1051 | Red Hat Security Advisory: flash-plugin security update | 2014-08-13T09:48:55+00:00 | 2025-11-21T17:49:40+00:00 |
| rhsa-2014:1053 | Red Hat Security Advisory: openssl security update | 2014-08-13T18:18:41+00:00 | 2026-01-28T22:38:14+00:00 |
| rhsa-2014:1037 | Red Hat Security Advisory: cfme security and bug fix update | 2014-08-13T18:18:53+00:00 | 2025-11-21T17:49:33+00:00 |
| rhsa-2014:1052 | Red Hat Security Advisory: openssl security update | 2014-08-13T21:32:03+00:00 | 2026-01-28T22:38:14+00:00 |
| rhsa-2014:1054 | Red Hat Security Advisory: openssl security update | 2014-08-14T04:44:38+00:00 | 2026-01-28T22:38:15+00:00 |
| rhsa-2014:1059 | Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.2.2 security update | 2014-08-14T15:47:55+00:00 | 2026-01-28T22:38:15+00:00 |
| rhsa-2014:1073 | Red Hat Security Advisory: nss, nss-util, nss-softokn security, bug fix, and enhancement update | 2014-08-18T12:03:14+00:00 | 2025-11-21T17:49:39+00:00 |
| rhsa-2014:1075 | Red Hat Security Advisory: qemu-kvm security and bug fix update | 2014-08-19T09:12:19+00:00 | 2025-11-21T17:49:39+00:00 |
| rhsa-2014:1076 | Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update | 2014-08-19T09:22:39+00:00 | 2025-11-21T17:49:40+00:00 |
| rhsa-2014:1078 | Red Hat Security Advisory: openstack-neutron security update | 2014-08-20T04:44:40+00:00 | 2025-11-21T17:49:40+00:00 |
| rhsa-2014:1082 | Red Hat Security Advisory: thermostat1-httpcomponents-client security update | 2014-08-20T10:39:58+00:00 | 2026-01-28T22:38:16+00:00 |
| rhsa-2014:1083 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2014-08-20T10:51:31+00:00 | 2025-11-21T17:49:41+00:00 |
| rhsa-2014:1084 | Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update | 2014-08-21T00:34:31+00:00 | 2025-11-21T17:49:41+00:00 |
| rhsa-2014:1088 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 update | 2014-08-21T15:29:13+00:00 | 2026-01-28T22:38:16+00:00 |
| rhsa-2014:1087 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 update | 2014-08-21T15:29:44+00:00 | 2026-01-28T22:38:21+00:00 |
| rhsa-2014:1086 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 update | 2014-08-21T15:30:27+00:00 | 2026-01-28T22:38:16+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2019:0629-1 | Security update for yast2-rmt | 2019-03-18T10:20:42Z | 2019-03-18T10:20:42Z |
| suse-su-2019:13981-1 | Security update for openwsman | 2019-03-18T10:44:47Z | 2019-03-18T10:44:47Z |
| suse-su-2019:0635-1 | Security update for nodejs8 | 2019-03-19T08:15:58Z | 2019-03-19T08:15:58Z |
| suse-su-2019:0636-1 | Security update for nodejs10 | 2019-03-19T08:16:25Z | 2019-03-19T08:16:25Z |
| suse-su-2019:13982-1 | Security update for libssh2_org | 2019-03-19T10:42:39Z | 2019-03-19T10:42:39Z |
| suse-su-2019:0639-1 | Security update for ldb | 2019-03-19T12:06:26Z | 2019-03-19T12:06:26Z |
| suse-su-2019:0642-1 | Security update for lftp | 2019-03-19T13:28:13Z | 2019-03-19T13:28:13Z |
| suse-su-2019:0643-1 | Security update for lftp | 2019-03-19T14:14:58Z | 2019-03-19T14:14:58Z |
| suse-su-2019:0645-1 | Security update for the Linux Kernel (Live Patch 34 for SLE 12) | 2019-03-19T14:34:19Z | 2019-03-19T14:34:19Z |
| suse-su-2019:0654-1 | Security update for openwsman | 2019-03-20T09:29:19Z | 2019-03-20T09:29:19Z |
| suse-su-2019:0655-1 | Security update for libssh2_org | 2019-03-20T09:31:34Z | 2019-03-20T09:31:34Z |
| suse-su-2019:0656-1 | Security update for openwsman | 2019-03-20T10:20:13Z | 2019-03-20T10:20:13Z |
| suse-su-2019:0657-1 | Security update for python-Flask | 2019-03-20T11:49:45Z | 2019-03-20T11:49:45Z |
| suse-su-2019:0658-1 | Security update for nodejs4 | 2019-03-20T13:32:01Z | 2019-03-20T13:32:01Z |
| suse-su-2019:0672-1 | Security update for the Linux Kernel (Live Patch 32 for SLE 12 SP1) | 2019-03-20T16:11:53Z | 2019-03-20T16:11:53Z |
| suse-su-2019:0678-1 | Security update for openssl-1_1 | 2019-03-21T09:40:36Z | 2019-03-21T09:40:36Z |
| suse-su-2019:0683-1 | Security update for the Linux Kernel (Live Patch 22 for SLE 12 SP2) | 2019-03-21T15:37:14Z | 2019-03-21T15:37:14Z |
| suse-su-2019:13984-1 | Security update for unzip | 2019-03-21T17:39:52Z | 2019-03-21T17:39:52Z |
| suse-su-2019:0688-1 | Security update for wireshark | 2019-03-21T17:40:46Z | 2019-03-21T17:40:46Z |
| suse-su-2019:13985-1 | Security update for libxml2 | 2019-03-21T17:41:21Z | 2019-03-21T17:41:21Z |
| suse-su-2018:3032-2 | Security update for the Linux Kernel | 2019-03-22T09:42:51Z | 2019-03-22T09:42:51Z |
| suse-su-2019:0705-1 | Security update for libqt5-qtimageformats | 2019-03-22T12:31:09Z | 2019-03-22T12:31:09Z |
| suse-su-2019:0706-1 | Security update for libqt5-qtsvg | 2019-03-22T12:31:45Z | 2019-03-22T12:31:45Z |
| suse-su-2019:0707-1 | Security update for unzip | 2019-03-22T12:32:11Z | 2019-03-22T12:32:11Z |
| suse-su-2019:0709-1 | Security update for the Linux Kernel (Live Patch 24 for SLE 12 SP2) | 2019-03-22T14:50:35Z | 2019-03-22T14:50:35Z |
| suse-su-2019:0711-1 | Security update for libjpeg-turbo | 2019-03-22T14:51:19Z | 2019-03-22T14:51:19Z |
| suse-su-2019:0712-1 | Security update for ucode-intel | 2019-03-22T14:54:45Z | 2019-03-22T14:54:45Z |
| suse-su-2019:0716-1 | Security update for openstack-cinder, openstack-horizon-plugin-designate-ui, openstack-neutron, openstack-neutron-lbaas | 2019-03-22T15:10:31Z | 2019-03-22T15:10:31Z |
| suse-su-2019:0718-1 | Security update for ghostscript | 2019-03-22T15:50:29Z | 2019-03-22T15:50:29Z |
| suse-su-2019:0719-1 | Security update for ghostscript | 2019-03-22T15:53:51Z | 2019-03-22T15:53:51Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-libpython-2022-26488 | 2025-08-11T13:52:02.378Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2022-37454 | 2025-08-11T13:52:04.668Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2022-42919 | 2025-08-11T13:52:06.949Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2022-45061 | 2025-08-11T13:52:09.011Z | 2026-02-11T09:09:18.507Z | |
| bit-libpython-2022-48560 | 2025-08-11T13:52:10.924Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2022-48564 | 2025-08-11T13:52:12.981Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2022-48565 | 2025-08-11T13:52:14.793Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2022-48566 | 2025-08-11T13:52:16.768Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2023-24329 | 2025-08-11T13:52:18.649Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2023-27043 | 2025-08-11T13:52:20.772Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2023-36632 | 2025-08-11T13:52:24.684Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2023-40217 | 2025-08-11T13:52:27.063Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2023-41105 | 2025-08-11T13:52:29.288Z | 2025-08-11T14:19:40.295Z | |
| bit-libpython-2023-6507 | Groups not dropped before running subprocess when using empty 'extra_groups' parameter | 2025-08-11T13:52:31.237Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2023-6597 | 2025-08-11T13:52:33.085Z | 2025-11-06T13:25:46.476Z | |
| bit-libpython-2024-0397 | Memory race condition in ssl.SSLContext certificate store methods | 2025-08-11T13:52:34.942Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-0450 | Quoted zip-bomb protection for zipfile | 2025-08-11T13:52:36.704Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-11168 | Improper validation of IPv6 and IPvFuture addresses | 2025-08-11T13:52:38.571Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-12254 | Unbounded memory buffering in SelectorSocketTransport.writelines() | 2025-08-11T13:52:40.569Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2024-12718 | Bypass extraction filter to modify file metadata outside extraction directory | 2025-08-11T13:52:42.384Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2024-4032 | Incorrect IPv4 and IPv6 private ranges | 2025-08-11T13:52:45.426Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-50602 | 2025-08-11T13:52:47.408Z | 2026-02-11T09:09:18.507Z | |
| bit-libpython-2024-6232 | Regular-expression DoS when parsing TarFile headers | 2025-08-11T13:52:51.685Z | 2025-11-06T13:25:46.476Z |
| bit-libpython-2024-6923 | Email header injection due to unquoted newlines | 2025-08-11T13:52:53.987Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2020-7059 | OOB read in php_strip_tags_ex | 2025-08-11T13:52:55.929Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2024-7592 | Quadratic complexity parsing cookies with backslashes | 2025-08-11T13:52:56.070Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2020-7060 | global buffer-overflow in mbfl_filt_conv_big5_wchar | 2025-08-11T13:52:57.902Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2024-8088 | Infinite loop when iterating over zip archive entry names from zipfile.Path | 2025-08-11T13:52:58.648Z | 2025-11-06T13:25:46.476Z |
| bit-libphp-2020-7061 | heap-buffer-overflow in phar_extract_file | 2025-08-11T13:52:59.804Z | 2025-08-11T14:19:40.295Z |
| bit-libpython-2024-9287 | Virtual environment (venv) activation scripts don't quote paths | 2025-08-11T13:53:00.985Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2009-avi-554 | Multiples vulnérabilités dans Wireshark | 2009-12-18T00:00:00.000000 | 2009-12-24T00:00:00.000000 |
| certa-2009-avi-555 | Vulnérabilités dans Adobe Flash Media Server | 2009-12-21T00:00:00.000000 | 2009-12-21T00:00:00.000000 |
| certa-2009-avi-556 | Multiples vulnérabilités dans IBM AIX | 2009-12-21T00:00:00.000000 | 2009-12-24T00:00:00.000000 |
| certa-2009-avi-557 | Vulnérabilités dans OSSIM | 2009-12-21T00:00:00.000000 | 2009-12-24T00:00:00.000000 |
| certa-2009-avi-558 | Vulnérabilité dans IBM WebSphere Application Server Feature Pack for CEA | 2009-12-21T00:00:00.000000 | 2009-12-21T00:00:00.000000 |
| certa-2009-avi-559 | Vulnérabilités dans Winamp | 2009-12-22T00:00:00.000000 | 2009-12-22T00:00:00.000000 |
| certa-2009-avi-560 | Vulnérabilité dans phpMyVisites | 2009-12-23T00:00:00.000000 | 2009-12-23T00:00:00.000000 |
| certa-2009-avi-561 | Multiples vulnérabilités dans Directory Server Enterprise Edition | 2009-12-29T00:00:00.000000 | 2009-12-29T00:00:00.000000 |
| certa-2009-avi-562 | Vulnérabilité dans Sendmail | 2009-12-31T00:00:00.000000 | 2009-12-31T00:00:00.000000 |
| certa-2010-avi-001 | Vulnérabilités dans Xoops | 2010-01-05T00:00:00.000000 | 2010-01-05T00:00:00.000000 |
| certa-2010-avi-002 | Vulnérabilité dans NTPD | 2010-01-07T00:00:00.000000 | 2010-10-06T00:00:00.000000 |
| certa-2010-avi-003 | Multiples vulnérabilités dans PowerDNS | 2010-01-07T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2010-avi-004 | Vulnérabilité dans MIT Kerberos 5 | 2010-01-07T00:00:00.000000 | 2010-01-07T00:00:00.000000 |
| certa-2010-avi-005 | Vulnérabilité dans FreeBSD | 2010-01-07T00:00:00.000000 | 2010-01-07T00:00:00.000000 |
| certa-2010-avi-006 | Vulnérabilité dans Novell iManager eDirectory | 2010-01-08T00:00:00.000000 | 2010-01-08T00:00:00.000000 |
| certa-2010-avi-007 | Vulnérabilités dans Adobe Illustrator | 2010-01-08T00:00:00.000000 | 2010-01-08T00:00:00.000000 |
| certa-2010-avi-008 | Mulitples vulnérabilités dans VMware ESX | 2010-01-08T00:00:00.000000 | 2010-01-08T00:00:00.000000 |
| certa-2010-avi-009 | Multiples vulnérabilités dans IBM Lotus Domino Web Access | 2010-01-08T00:00:00.000000 | 2010-01-08T00:00:00.000000 |
| certa-2010-avi-010 | Multiples vulnérabilités dans des produits Oracle | 2010-01-13T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2010-avi-011 | Vulnérabilité dans Microsoft Windows | 2010-01-13T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2010-avi-012 | Multiples vulnérabilités dans Adobe Reader et Acrobat | 2010-01-13T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2010-avi-013 | Vulnérabilité dans MIT Kerberos | 2010-01-13T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2010-avi-014 | Vulnérabilité dans Zope | 2010-01-13T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2010-avi-015 | Vulnérabilité dans Solaris Trusted Extensions | 2010-01-13T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2010-avi-016 | Vulnérabilité dans Sun Identity Manager | 2010-01-13T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2010-avi-017 | Vulnérabilité dans Novell ZENWorks Asset Management | 2010-01-14T00:00:00.000000 | 2010-01-14T00:00:00.000000 |
| certa-2010-avi-018 | Multiples vulnérabilités dans Red Hat Linux | 2010-01-14T00:00:00.000000 | 2010-01-14T00:00:00.000000 |
| certa-2010-avi-019 | Vulnérabilité dans TYPO3 | 2010-01-19T00:00:00.000000 | 2010-01-19T00:00:00.000000 |
| certa-2010-avi-020 | Vulnérabilité dans BIND DNSSEC | 2010-01-20T00:00:00.000000 | 2010-04-29T00:00:00.000000 |
| certa-2010-avi-021 | Vulnérabilités dans Adobe Shockwave Player | 2010-01-20T00:00:00.000000 | 2010-01-20T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-04109 | IBM Leads跨站请求伪造漏洞(CNVD-2015-04109) | 2015-06-29 | 2015-06-30 |
| cnvd-2015-04110 | IBM Leads跨站请求伪造漏洞(CNVD-2015-04110) | 2015-06-29 | 2015-06-30 |
| cnvd-2015-04111 | IBM WebSphere Message Broker Toolkit和IBM Integration Toolkit信息泄露漏洞 | 2015-06-29 | 2015-06-30 |
| cnvd-2015-04112 | IBM Leads限制绕过漏洞 | 2015-06-29 | 2015-06-30 |
| cnvd-2015-04113 | IBM Leads存在未明漏洞 | 2015-06-29 | 2015-06-30 |
| cnvd-2015-04114 | IBM Leads跨站脚本漏洞 | 2015-06-29 | 2015-06-30 |
| cnvd-2015-04162 | Cisco Unified MeetingPlace SQL注入漏洞(CNVD-2015-04162) | 2015-06-29 | 2015-07-02 |
| cnvd-2015-04178 | SAP Mobile Platform XML外部实体信息泄露漏洞 | 2015-06-29 | 2015-07-02 |
| cnvd-2015-04179 | WordPress SEO by Yoast 'post-new.php'插件HTML注入漏洞 | 2015-06-29 | 2015-07-02 |
| cnvd-2015-04797 | 锐捷网络RG-NBR系列网关存在授权绕过漏洞 | 2015-06-29 | 2015-08-12 |
| cnvd-2015-04149 | Google Chrome Blink安全绕过漏洞(CNVD-2015-04149) | 2015-06-30 | 2015-07-01 |
| cnvd-2015-04150 | Cisco Nexus 9000 Application Policy Infrastructure Controller未授权访问漏洞 | 2015-06-30 | 2015-07-01 |
| cnvd-2015-04151 | Siemens Climatix BACnet/IP通讯模块跨站脚本漏洞 | 2015-06-30 | 2015-07-01 |
| cnvd-2015-04152 | IBM Business Process Manager和WebSphere Lombardi Edition目录遍历漏洞 | 2015-06-30 | 2015-07-01 |
| cnvd-2015-04153 | LimeSurvey SQL注入漏洞(CNVD-2015-04153) | 2015-06-30 | 2015-07-01 |
| cnvd-2015-04154 | Symantec Data Loss Prevention Enforce Server跨站脚本漏洞 | 2015-06-30 | 2015-07-01 |
| cnvd-2015-04155 | Symantec Data Loss Prevention Enforce Server跨站请求伪造漏洞 | 2015-06-30 | 2015-07-01 |
| cnvd-2015-04156 | osCommerce Japanese目录遍历漏洞 | 2015-06-30 | 2015-07-01 |
| cnvd-2015-04180 | IBM InfoSphere DataStage权限提升漏洞 | 2015-06-30 | 2015-07-02 |
| cnvd-2017-02460 | 中山市网政软件有限公司投资项目备案系统key参数存在SQL注入漏洞 | 2015-06-30 | 2015-08-14 |
| cnvd-2015-04163 | IBM Tivoli Storage Manager FastBack任意文件读取漏洞(CNVD-2015-04163) | 2015-07-01 | 2015-07-02 |
| cnvd-2015-04164 | IBM Tivoli Storage Manager FastBack任意文件读取漏洞(CNVD-2015-04164) | 2015-07-01 | 2015-07-02 |
| cnvd-2015-04165 | IBM Tivoli Storage Manager FastBack任意命令执行漏洞(CNVD-2015-04165) | 2015-07-01 | 2015-07-02 |
| cnvd-2015-04166 | IBM Tivoli Storage Manager FastBack任意命令执行漏洞(CNVD-2015-04166) | 2015-07-01 | 2015-07-02 |
| cnvd-2015-04167 | IBM Tivoli Storage Manager FastBack任意命令执行漏洞(CNVD-2015-04167) | 2015-07-01 | 2015-07-02 |
| cnvd-2015-04168 | IBM Tivoli Storage Manager FastBack栈缓冲区溢出漏洞(CNVD-2015-04168) | 2015-07-01 | 2015-07-02 |
| cnvd-2015-04169 | IBM Tivoli Storage Manager FastBack栈缓冲区溢出漏洞(CNVD-2015-04169) | 2015-07-01 | 2015-07-02 |
| cnvd-2015-04170 | IBM Tivoli Storage Manager FastBack栈缓冲区溢出漏洞(CNVD-2015-04170) | 2015-07-01 | 2015-07-02 |
| cnvd-2015-04171 | IBM Tivoli Storage Manager FastBack栈缓冲区溢出漏洞(CNVD-2015-04171) | 2015-07-01 | 2015-07-02 |
| cnvd-2015-04172 | IBM Tivoli Storage Manager FastBack栈缓冲区溢出漏洞(CNVD-2015-04172) | 2015-07-01 | 2015-07-02 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-06461 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06462 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06463 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06464 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06465 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 21.03.2025 |
| bdu:2015-06466 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06467 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 21.03.2025 |
| bdu:2015-06468 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06469 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 21.03.2025 |
| bdu:2015-06470 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06471 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 21.03.2025 |
| bdu:2015-06472 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06473 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 21.03.2025 |
| bdu:2015-06474 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06475 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06476 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06477 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06478 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06479 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06480 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06481 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06482 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06483 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06484 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06485 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06486 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06487 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06488 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06489 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-06490 | Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| ID | Description | Updated |
|---|---|---|
| var-201912-2033 | This vulnerability allows network-adjacent attackers to disclose sensitive information on… | 2022-05-17T02:02:22.506000Z |
| var-201910-1741 | Siemens SIMATIC is an automation software with a single engineering environment. WinCC su… | 2022-05-17T02:02:22.705000Z |
| var-201909-1553 | NAPro is a PLC programming software developed by Nanda Autotech Jiangsu Co., Ltd. NA… | 2022-05-17T02:02:22.807000Z |
| var-201907-1651 | KUNBUS-GW Ethernet / IP is a programmable logic controller (PLC), which provides an integ… | 2022-05-17T02:02:23.002000Z |
| var-201905-1336 | Wuxi Xinjie Electric Co., Ltd. is a well-known domestic company specializing in the devel… | 2022-05-17T02:02:23.239000Z |
| var-201809-1345 | SAP enterprise application software solution provider. SAP B2B / B2C CRM has local f… | 2022-05-17T02:02:24.190000Z |
| var-201809-1219 | C10S0R (-e) PLC is a product in the programmable logic controller (PLC) series of Xiamen … | 2022-05-17T02:02:24.204000Z |
| var-201809-1198 | C10S0R (-e) PLC is a product in the programmable logic controller (PLC) series of Xiamen … | 2022-05-17T02:02:24.220000Z |
| var-201805-1199 | MAC1100 PLC Programmable Logic Controller (PLC) is a product in the Dalian CECE Programma… | 2022-05-17T02:02:24.627000Z |
| var-201805-1197 | T-920 Programmable Logic Controller (PLC) is one of the products of China TENGCONTROL TEC… | 2022-05-17T02:02:24.642000Z |
| var-201801-1871 | This vulnerability allows attackers on the local network to create a denial-of-service co… | 2022-05-17T02:02:25.106000Z |
| var-201709-1268 | SAP NetWeaver is prone to an unspecified SQL-injection vulnerability because it fails to … | 2022-05-17T02:02:25.544000Z |
| var-201708-1692 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable instal… | 2022-05-17T02:02:25.642000Z |
| var-201708-1585 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable instal… | 2022-05-17T02:02:25.666000Z |
| var-201706-1163 | SAP NetWeaver is prone to a denial-of-service vulnerability. An attacker can exploit this… | 2022-05-17T02:02:25.893000Z |
| var-201703-1405 | SAP NetWeaver is prone to a security-bypass vulnerability. Remote attackers can exploit t… | 2022-05-17T02:02:26.354000Z |
| var-201611-0392 | siemens 840D is a numerical control system of Siemens, which has a wide range of applicat… | 2022-05-17T02:02:26.729000Z |
| var-201608-0492 | BIOS (BasicInput/OutputSystem) is the basic output input system, which is the most basic … | 2022-05-17T02:02:27.013000Z |
| var-201608-0428 | BHU Wi-Fi Router is a wireless router from China BHU. A security vulnerability exists in… | 2022-05-17T02:02:27.054000Z |
| var-201602-0489 | This vulnerability allows local users to elevate to administrator status on vulnerable in… | 2022-05-17T02:02:27.809000Z |
| var-201510-0774 | Multiple router products contain an issue in the protection against clickjacking attacks.… | 2022-05-17T02:02:28.205000Z |
| var-201509-0509 | There is a SQL injection vulnerability in Huawei EIE. Huawei Enterprise Information Engin… | 2022-05-17T02:02:28.315000Z |
| var-201505-0472 | ZTE AC3633R is a wireless modem product of China ZTE Corporation. An authentication bypa… | 2022-05-17T02:02:28.741000Z |
| var-201409-1258 | TRENDnet TEW-818DRU is a routing device. There are unexplained vulnerabilities in TRENDne… | 2022-05-17T02:02:29.606000Z |
| var-201408-0480 | Pebble is a smart watch that supports dual systems for Android and iOS. A denial of servi… | 2022-05-17T02:02:29.745000Z |
| var-201405-0652 | The D-Link DIR-855L and DIR-835 are router devices. There are several security vulnerabil… | 2022-05-17T02:02:30.025000Z |
| var-201405-0629 | The NETGEAR DGN2200 has a cross-site request forgery vulnerability that allows remote att… | 2022-05-17T02:02:30.037000Z |
| var-201401-0727 | Tor is an implementation of the second generation of onion routing, through which users c… | 2022-05-17T02:02:30.857000Z |
| var-201311-0405 | SAP is a world-renowned provider of enterprise management and collaborative business solu… | 2022-05-17T02:02:31.238000Z |
| var-201305-0364 | SAP NetWeaver Gateway allows developers to openly access SAP software in any environment … | 2022-05-17T02:02:32.260000Z |