Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2001-0891 |
N/A
|
Format string vulnerability in NQS daemon (nqsdae⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:37:06.888Z |
| CVE-2001-0921 |
N/A
|
Netscape 4.79 and earlier for MacOS allows an att⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:37:07.082Z |
| CVE-2001-0959 |
N/A
|
Computer Associates ARCserve for NT 6.61 SP2a and⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:37:06.820Z |
| CVE-2001-0960 |
N/A
|
Computer Associates ARCserve for NT 6.61 SP2a and⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:37:07.126Z |
| CVE-2001-0978 |
N/A
|
login in HP-UX 10.26 does not record failed login⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:37:06.992Z |
| CVE-2001-1008 |
N/A
|
Java Plugin 1.4 for JRE 1.3 executes signed apple⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:37:07.125Z |
| CVE-2001-1028 |
N/A
|
Buffer overflow in ultimate_source function of ma⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:44:06.602Z |
| CVE-2001-1036 |
N/A
|
GNU locate in findutils 4.1 on Slackware 7.1 and ⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:44:06.643Z |
| CVE-2001-1059 |
N/A
|
VMWare creates a temporary file vmware-log.USERNA⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:44:07.834Z |
| CVE-2001-1106 |
N/A
|
The default configuration of Sambar Server 5 and ⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:44:07.378Z |
| CVE-2001-1145 |
N/A
|
fts routines in FreeBSD 4.3 and earlier, NetBSD b⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:44:08.084Z |
| CVE-2001-1251 |
N/A
|
SmallHTTP 1.204 through 3.00 beta 8 allows remote⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:07.619Z |
| CVE-2001-1291 |
N/A
|
The telnet server for 3Com hardware such as PS40 ⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.235Z |
| CVE-2001-1296 |
N/A
|
More.groupware PHP script allows remote attackers⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.230Z |
| CVE-2001-1301 |
N/A
|
rcs2log, as used in Emacs 20.4, xemacs 21.1.10 an⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.416Z |
| CVE-2001-1303 |
N/A
|
The default configuration of SecuRemote for Check⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:07.609Z |
| CVE-2001-1327 |
N/A
|
pmake before 2.1.35 in Turbolinux 6.05 and earlie⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.094Z |
| CVE-2001-1334 |
N/A
|
Block_render_url.class in PHPSlash 0.6.1 allows r⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.400Z |
| CVE-2001-1349 |
N/A
|
Sendmail before 8.11.4, and 8.12.0 before 8.12.0.⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.292Z |
| CVE-2001-1359 |
N/A
|
Volution clients 1.0.7 and earlier attempt to con⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.224Z |
| CVE-2001-1369 |
N/A
|
Leon J Breedt pam-pgsql before 0.5.2 allows remot⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.235Z |
| CVE-2001-1370 |
N/A
|
prepend.php3 in PHPLib before 7.2d, when register⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.237Z |
| CVE-2001-1371 |
N/A
|
The default configuration of Oracle Application S⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.219Z |
| CVE-2001-1372 |
N/A
|
Oracle 9i Application Server 1.0.2 allows remote ⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.279Z |
| CVE-2001-1373 |
N/A
|
MailSafe in Zone Labs ZoneAlarm 2.6 and earlier a⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.426Z |
| CVE-2001-1374 |
N/A
|
expect before 5.32 searches for its libraries in ⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.224Z |
| CVE-2001-1375 |
N/A
|
tcl/tk package (tcltk) 8.3.1 searches for its lib⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.227Z |
| CVE-2001-1378 |
N/A
|
fetchmailconf in fetchmail before 5.7.4 allows lo⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.433Z |
| CVE-2001-1380 |
N/A
|
OpenSSH before 2.9.9, while using keypairs and mu⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.226Z |
| CVE-2001-1382 |
N/A
|
The "echo simulation" traffic analysis countermea⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.225Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2002-0697 |
N/A
|
Microsoft Metadirectory Services (MMS) 2.2 allows⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:56:38.706Z |
| CVE-2002-0698 |
N/A
|
Buffer overflow in Internet Mail Connector (IMC) ⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:56:38.726Z |
| CVE-2002-0700 |
N/A
|
Buffer overflow in a system function that perform⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:56:38.730Z |
| CVE-2002-0710 |
N/A
|
Directory traversal vulnerability in sendform.cgi⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:56:38.701Z |
| CVE-2002-0718 |
N/A
|
Web authoring command in Microsoft Content Manage⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:56:38.890Z |
| CVE-2002-0719 |
N/A
|
SQL injection vulnerability in the function that ⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:56:38.897Z |
| CVE-2002-0728 |
N/A
|
Buffer overflow in the progressive reader for lib⦠|
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T02:56:38.915Z |
| CVE-2002-0729 |
N/A
|
Microsoft SQL Server 2000 allows remote attackers⦠|
n/a |
n/a |
2004-09-01T04:00:00.000Z | 2024-08-08T02:56:38.891Z |
| CVE-2002-0730 |
N/A
|
Cross-site scripting vulnerability in guestbook.p⦠|
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T02:56:38.795Z |
| CVE-2002-0731 |
N/A
|
Cross-site scripting vulnerability in demonstrati⦠|
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T02:56:38.733Z |
| CVE-2002-0732 |
N/A
|
Cross-site scripting vulnerability in MyGuestbook⦠|
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T02:56:38.913Z |
| CVE-2002-0733 |
N/A
|
Cross-site scripting vulnerability in thttpd 2.20⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:56:38.738Z |
| CVE-2002-0734 |
N/A
|
b2edit.showposts.php in B2 2.0.6pre2 and earlier ⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:56:38.743Z |
| CVE-2002-0735 |
N/A
|
Format string vulnerability in the logging() func⦠|
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T02:56:38.923Z |
| CVE-2002-0736 |
N/A
|
Microsoft BackOffice 4.0 and 4.5, when configured⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:56:38.899Z |
| CVE-2002-0737 |
N/A
|
Sambar web server before 5.2 beta 1 allows remote⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:56:38.903Z |
| CVE-2002-0738 |
N/A
|
MHonArc 2.5.2 and earlier does not properly filte⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:56:38.810Z |
| CVE-2002-0739 |
N/A
|
Cross-site scripting in PostCalendar 3.02 allows ⦠|
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T02:56:38.914Z |
| CVE-2002-0740 |
N/A
|
Buffer overflow in slrnpull for the SLRN package,⦠|
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T02:56:38.699Z |
| CVE-2002-0741 |
N/A
|
psyBNC 2.3 allows remote attackers to cause a den⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:56:38.927Z |
| CVE-2002-0742 |
N/A
|
Buffer overflow in pioout on AIX 4.3.3. |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T02:56:38.821Z |
| CVE-2002-0743 |
N/A
|
mail and mailx in AIX 4.3.3 core dump when called⦠|
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T02:56:39.135Z |
| CVE-2002-0744 |
N/A
|
namerslv in AIX 4.3.3 core dumps when called with⦠|
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T02:56:38.909Z |
| CVE-2002-0745 |
N/A
|
Buffer overflow in uucp in AIX 4.3.3. |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T02:56:38.773Z |
| CVE-2002-0746 |
N/A
|
Vulnerability in template.dhcpo in AIX 4.3.3 rela⦠|
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T02:56:38.906Z |
| CVE-2002-0747 |
N/A
|
Buffer overflow in lsmcode in AIX 4.3.3. |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:48.935Z |
| CVE-2002-0748 |
N/A
|
LabVIEW Web Server 5.1.1 through 6.1 allows remot⦠|
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T03:03:48.547Z |
| CVE-2002-0749 |
N/A
|
CGIscript.net csMailto.cgi allows remote attacker⦠|
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:47.951Z |
| CVE-2002-0750 |
N/A
|
CGIscript.net csMailto.cgi program allows remote ⦠|
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:47.934Z |
| CVE-2002-0751 |
N/A
|
CGIscript.net csMailto.cgi program allows remote ⦠|
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:47.924Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-w873-xcqq-x922 |
9.8 (3.1)
|
Command Injection in Simiki | 2021-09-01T18:37:24Z | 2024-10-22T17:29:26Z |
| ghsa-rh5w-82wh-jhr8 |
7.1 (3.1)
|
XSS vulnerability on asset view | 2021-09-01T18:40:31Z | 2021-08-30T18:05:54Z |
| ghsa-72hm-fx78-xwhc |
8.3 (3.1)
|
XSS vulnerability on contacts view | 2021-09-01T18:40:40Z | 2021-08-30T18:05:52Z |
| ghsa-86pv-95mj-7w5f |
8.2 (3.1)
|
Stored XSS vulnerability on Bounce Management Callback | 2021-09-01T18:40:48Z | 2021-08-30T18:05:04Z |
| ghsa-32hw-3pvh-vcvc |
6.3 (3.1)
|
XSS vulnerability on password reset page | 2021-09-01T18:40:56Z | 2021-08-30T18:03:34Z |
| ghsa-x7g2-wrrp-r6h3 |
3.5 (3.1)
|
Use of a Broken or Risky Cryptographic Algorithm | 2021-09-01T18:41:06Z | 2024-02-05T15:50:17Z |
| ghsa-ggxm-pgc9-g7fp |
7.0 (3.1)
|
Arbitrary Code Execution in Rdoc | 2021-09-01T18:53:15Z | 2024-11-14T01:01:40Z |
| ghsa-xqp8-w826-hh6x |
7.5 (3.1)
|
Parse Server crashes with query parameter | 2021-09-02T16:51:14Z | 2022-08-11T16:55:01Z |
| ghsa-52cf-226f-rhr6 |
9.1 (3.1)
|
Default CORS config allows any origin with credentials | 2021-09-02T16:52:18Z | 2025-12-11T21:15:42Z |
| ghsa-j85q-whc9-g4p9 |
5.9 (3.1)
|
Use of Cryptographically Weak Pseudo-Random Number Generator in showdoc | 2021-09-02T17:07:48Z | 2021-08-16T23:13:12Z |
| ghsa-8c3f-x5f9-6h62 |
3.9 (3.1)
|
Command injection in @diez/generation | 2021-09-02T17:08:20Z | 2021-08-26T14:39:22Z |
| ghsa-c32w-3cqh-f6jx |
8.8 (3.1)
|
Weak Password Recovery Mechanism for Forgotten Password | 2021-09-02T17:08:33Z | 2021-10-21T14:15:19Z |
| ghsa-gjwp-7v3g-99pj |
5.4 (3.1)
|
Cross-site Request Forgery (CSRF) in joplin | 2021-09-02T17:09:05Z | 2021-08-25T18:00:40Z |
| ghsa-x6hx-7gh3-3q98 |
5.4 (3.1)
|
Prototype Pollution in mootools | 2021-09-02T17:09:30Z | 2021-08-25T18:25:11Z |
| ghsa-hqv3-qq72-78cv |
7.5 (3.1)
|
Directory Traversal in startserver | 2021-09-02T17:09:40Z | 2021-08-25T19:03:15Z |
| ghsa-9j49-mfvp-vmhm |
8.1 (3.1)
|
Code Injection in pac-resolver | 2021-09-02T17:10:06Z | 2021-08-25T19:28:31Z |
| ghsa-7xrj-f5rp-j55h |
6.5 (3.1)
|
Uncontrolled Resource Consumption in transpile | 2021-09-02T17:10:42Z | 2021-08-25T19:32:59Z |
| ghsa-536p-4pcj-5mr9 |
8.8 (3.1)
|
raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure ⦠| 2021-09-02T17:10:52Z | 2021-09-03T20:36:06Z |
| ghsa-7vph-p634-vrqf |
8.8 (3.1)
|
Command Injection in RaspAP 2.6.6 | 2021-09-02T17:11:00Z | 2021-09-03T20:35:52Z |
| ghsa-p9wf-3xpg-c9g5 |
7.5 (3.1)
8.7 (4.0)
|
XML External Entity Injection in PyWPS | 2021-09-02T17:11:13Z | 2024-10-24T21:53:22Z |
| ghsa-whgm-jr23-g3j9 |
7.5 (3.1)
|
Uncontrolled Resource Consumption in ansi-html | 2021-09-02T17:15:24Z | 2021-09-07T21:02:12Z |
| ghsa-38fc-wpqx-33j7 |
5.3 (3.1)
|
Uncontrolled Resource Consumption in trim-off-newlines | 2021-09-02T17:15:42Z | 2021-08-26T14:52:19Z |
| ghsa-2q95-593f-g7h7 |
8.8 (3.1)
|
OS Command Injection in Centreon | 2021-09-02T17:16:06Z | 2021-08-26T14:59:25Z |
| ghsa-947x-pv47-pp3q |
6.1 (3.1)
5.3 (4.0)
|
Cross-site scripting in pywb | 2021-09-02T17:16:18Z | 2024-10-25T20:52:18Z |
| ghsa-fjqg-w8g6-hhq8 |
7.2 (3.1)
|
Dolibarr vulnerable to Improper Authentication and Improper Access Control | 2021-09-02T17:16:28Z | 2022-08-10T23:54:51Z |
| ghsa-7f5c-rpf4-86p8 |
4.0 (3.1)
|
Insertion of Sensitive Information into Externally-Accessible File or Directory and Exposure of Sen⦠| 2021-09-02T17:16:46Z | 2021-08-26T17:12:06Z |
| ghsa-vpw5-grxx-v396 |
6.8 (3.1)
|
CSRF token exposure in TYPO3 extension | 2021-09-02T17:16:56Z | 2022-07-13T18:55:15Z |
| ghsa-hqm2-gwqf-r5g5 |
4.0 (3.1)
|
SQL injection in TYPO3 extension | 2021-09-02T17:17:06Z | 2021-08-30T17:26:36Z |
| ghsa-vrmr-f2qh-3hhf |
7.5 (3.1)
|
Improper use of cryptographic key in wal-g | 2021-09-02T17:17:16Z | 2021-08-30T17:30:36Z |
| ghsa-25pr-6pr6-68v7 |
7.5 (3.1)
|
Path traversal in atlasboard | 2021-09-02T17:17:25Z | 2025-09-29T16:41:02Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-4217 | Malicious code in kottestpackage (npm) | 2022-06-20T21:13:22Z | 2022-06-20T21:13:23Z |
| mal-2022-4951 | Malicious code in npp-analytics (npm) | 2022-06-20T21:13:22Z | 2022-06-20T21:13:22Z |
| mal-2022-6378 | Malicious code in swisscom (npm) | 2022-06-20T21:13:22Z | 2022-06-20T21:13:23Z |
| mal-2022-7234 | Malicious code in wp-scripts (npm) | 2022-06-20T21:13:22Z | 2022-06-20T21:13:22Z |
| mal-2022-1896 | Malicious code in checkpackagejson (npm) | 2022-06-20T21:13:23Z | 2022-06-20T21:13:23Z |
| mal-2022-2821 | Malicious code in eslint-plugin-orbit-internal (npm) | 2022-06-20T21:13:23Z | 2022-06-20T21:13:23Z |
| mal-2022-2822 | Malicious code in eslint-plugin-orbit-kotko (npm) | 2022-06-20T21:13:23Z | 2022-06-20T21:13:24Z |
| mal-2022-1461 | Malicious code in barisan (npm) | 2022-06-20T21:13:24Z | 2022-06-20T21:13:24Z |
| mal-2022-3478 | Malicious code in grunt-modify-json (npm) | 2022-06-20T21:13:24Z | 2022-06-20T21:13:25Z |
| mal-2022-3969 | Malicious code in isomsorphic-react-dom (npm) | 2022-06-20T21:13:24Z | 2022-06-20T21:13:25Z |
| mal-2022-6728 | Malicious code in ubuntu-drivers-common (npm) | 2022-06-20T21:13:24Z | 2022-06-20T21:13:25Z |
| mal-2022-909 | Malicious code in airbnb-cookie (npm) | 2022-06-20T21:13:24Z | 2022-06-20T21:13:24Z |
| mal-2022-3413 | Malicious code in google-cloud-node-todos (npm) | 2022-06-20T21:13:25Z | 2022-06-20T21:13:25Z |
| mal-2022-4429 | Malicious code in lwc-modules-foo (npm) | 2022-06-20T21:13:25Z | 2022-06-20T21:13:26Z |
| mal-2022-4942 | Malicious code in npm-test-failer (npm) | 2022-06-20T21:13:25Z | 2022-06-20T21:13:25Z |
| mal-2022-5278 | Malicious code in perf-benchmarks-components (npm) | 2022-06-20T21:13:25Z | 2022-06-20T21:13:26Z |
| mal-2022-2719 | Malicious code in ember-handlebars (npm) | 2022-06-20T21:13:26Z | 2022-06-20T21:13:26Z |
| mal-2022-2725 | Malicious code in ember-views (npm) | 2022-06-20T21:13:26Z | 2022-06-20T21:13:26Z |
| mal-2022-4603 | Malicious code in minimum-flow-parser (npm) | 2022-06-20T21:13:26Z | 2022-06-20T21:13:27Z |
| mal-2022-6668 | Malicious code in tslint-shared (npm) | 2022-06-20T21:13:26Z | 2022-06-20T21:13:27Z |
| mal-2022-2300 | Malicious code in cyclic-dep-1 (npm) | 2022-06-20T21:13:27Z | 2022-06-20T21:13:27Z |
| mal-2022-2301 | Malicious code in cyclic-dep-2 (npm) | 2022-06-20T21:13:27Z | 2022-06-20T21:13:27Z |
| mal-2022-4750 | Malicious code in my-toolchain (npm) | 2022-06-20T21:13:27Z | 2022-06-20T21:13:27Z |
| mal-2022-7196 | Malicious code in wm-jquery-shadow-dom (npm) | 2022-06-20T21:13:27Z | 2022-06-20T21:13:28Z |
| mal-2022-7197 | Malicious code in wm-logzio-sender (npm) | 2022-06-20T21:13:28Z | 2022-06-20T21:13:28Z |
| mal-2022-7202 | Malicious code in wm-prelib-plugin-entry-manager (npm) | 2022-06-20T21:13:28Z | 2022-06-20T21:13:28Z |
| mal-2022-7204 | Malicious code in wm-salesforce-lightning-version (npm) | 2022-06-20T21:13:28Z | 2022-06-20T21:13:29Z |
| mal-2022-7206 | Malicious code in wm-xpath-utils (npm) | 2022-06-20T21:13:28Z | 2022-06-20T21:13:29Z |
| mal-2022-7190 | Malicious code in wm-babel-runtime (npm) | 2022-06-20T21:13:29Z | 2022-06-20T21:13:29Z |
| mal-2022-7193 | Malicious code in wm-es3-function-overrider (npm) | 2022-06-20T21:13:29Z | 2022-06-20T21:13:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-0310 | Kibana: Schwachstelle ermƶglicht Offenlegung von Informationen | 2024-02-06T23:00:00.000+00:00 | 2024-02-06T23:00:00.000+00:00 |
| wid-sec-w-2024-0311 | Red Hat JBoss A-MQ: Mehrere Schwachstellen | 2024-02-06T23:00:00.000+00:00 | 2024-06-06T22:00:00.000+00:00 |
| wid-sec-w-2024-0312 | JetBrains TeamCity: Mehrere Schwachstellen | 2024-02-06T23:00:00.000+00:00 | 2024-02-06T23:00:00.000+00:00 |
| wid-sec-w-2024-0313 | JetBrains IntelliJ IDEA: Mehrere Schwachstellen ermƶglichen Manipulation von Dateien | 2024-02-06T23:00:00.000+00:00 | 2024-02-06T23:00:00.000+00:00 |
| wid-sec-w-2024-0316 | Graylog: Mehrere Schwachstellen | 2024-02-07T23:00:00.000+00:00 | 2024-02-07T23:00:00.000+00:00 |
| wid-sec-w-2024-0317 | GitLab: Mehrere Schwachstellen | 2024-02-07T23:00:00.000+00:00 | 2024-02-07T23:00:00.000+00:00 |
| wid-sec-w-2024-0318 | IBM SAN Volume Controller, Storwize and FlashSystem: Schwachstelle ermƶglicht Umgehen von Sicherheitsvorkehrungen | 2024-02-07T23:00:00.000+00:00 | 2024-02-07T23:00:00.000+00:00 |
| wid-sec-w-2024-0319 | SonicWall SonicOS: Schwachstelle ermƶglicht Umgehen von Sicherheitsvorkehrungen | 2024-02-07T23:00:00.000+00:00 | 2024-02-07T23:00:00.000+00:00 |
| wid-sec-w-2024-0320 | Drupal: Schwachstelle ermƶglicht Umgehen von Sicherheitsvorkehrungen | 2024-02-07T23:00:00.000+00:00 | 2025-01-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0321 | Cisco Expressway: Mehrere Schwachstellen | 2024-02-07T23:00:00.000+00:00 | 2024-02-07T23:00:00.000+00:00 |
| wid-sec-w-2024-0322 | ClamAV: Mehrere Schwachstellen | 2024-02-07T23:00:00.000+00:00 | 2025-07-08T22:00:00.000+00:00 |
| wid-sec-w-2024-0323 | Liferay Liferay Portal und DXP: Mehrere Schwachstellen | 2024-02-07T23:00:00.000+00:00 | 2024-02-07T23:00:00.000+00:00 |
| wid-sec-w-2024-0324 | NetApp ActiveIQ Unified Manager: Schwachstelle ermƶglicht Manipulation, Offenlegung und Denial of Service | 2024-02-07T23:00:00.000+00:00 | 2024-02-07T23:00:00.000+00:00 |
| wid-sec-w-2024-0325 | Ivanti Connect Secure and Ivanti Policy Secure: Schwachstelle ermƶglicht Umgehung von Sicherheitsmechanismen | 2024-02-08T23:00:00.000+00:00 | 2024-02-08T23:00:00.000+00:00 |
| wid-sec-w-2024-0326 | Linux "Shim": Schwachstelle ermƶglicht Ćbernahme der Kontrolle | 2024-02-08T23:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-0328 | IBM Integration Bus: Schwachstelle ermƶglicht Denial of Service | 2024-02-08T23:00:00.000+00:00 | 2024-02-08T23:00:00.000+00:00 |
| wid-sec-w-2024-0329 | Linux Kernel: Schwachstelle ermƶglicht Denial of Service | 2024-02-08T23:00:00.000+00:00 | 2024-02-08T23:00:00.000+00:00 |
| wid-sec-w-2024-0330 | Fortinet FortiOS: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-02-08T23:00:00.000+00:00 | 2024-10-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0331 | Red Hat Ceph Storage: Mehrere Schwachstellen | 2024-02-08T23:00:00.000+00:00 | 2025-09-25T22:00:00.000+00:00 |
| wid-sec-w-2024-0332 | Rancher: Mehrere Schwachstellen | 2024-02-08T23:00:00.000+00:00 | 2024-02-08T23:00:00.000+00:00 |
| wid-sec-w-2024-0333 | Red Hat Enterprise Linux (libmaxminddb): Schwachstelle ermƶglicht Denial of Service | 2024-02-08T23:00:00.000+00:00 | 2024-04-11T22:00:00.000+00:00 |
| wid-sec-w-2024-0334 | Red Hat Enterprise Linux (unbound): Schwachstelle ermƶglicht nicht spezifizierten Angriff | 2024-02-08T23:00:00.000+00:00 | 2024-02-08T23:00:00.000+00:00 |
| wid-sec-w-2024-0335 | PostgreSQL: Schwachstelle ermƶglicht Privilegieneskalation | 2024-02-08T23:00:00.000+00:00 | 2026-03-09T23:00:00.000+00:00 |
| wid-sec-w-2024-0336 | Fortinet FortiManager und Fortinet FortiAnalyzer: Schwachstelle ermƶglicht Offenlegung von Informationen | 2024-02-08T23:00:00.000+00:00 | 2024-02-08T23:00:00.000+00:00 |
| wid-sec-w-2024-0337 | Red Hat Enterprise Linux (Pillow): Schwachstelle ermöglicht Codeausführung | 2024-02-08T23:00:00.000+00:00 | 2024-05-13T22:00:00.000+00:00 |
| wid-sec-w-2024-0338 | MISP: Mehrere Schwachstellen | 2024-02-08T23:00:00.000+00:00 | 2024-02-08T23:00:00.000+00:00 |
| wid-sec-w-2024-0339 | Zabbix: Schwachstelle ermƶglicht Cross-Site Scripting | 2024-02-08T23:00:00.000+00:00 | 2024-10-03T22:00:00.000+00:00 |
| wid-sec-w-2024-0340 | Apache Solr: Mehrere Schwachstellen | 2024-02-11T23:00:00.000+00:00 | 2025-05-14T22:00:00.000+00:00 |
| wid-sec-w-2024-0341 | Angular: Schwachstelle ermƶglicht Denial of Service | 2024-02-11T23:00:00.000+00:00 | 2025-07-20T22:00:00.000+00:00 |
| wid-sec-w-2024-0342 | Mozilla Firefox für iOS: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-02-11T23:00:00.000+00:00 | 2024-02-11T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2023-22092 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2023-10-01T00:00:00.000Z | 2023-10-20T00:00:00.000Z |
| msrc_cve-2023-22097 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2023-10-01T00:00:00.000Z | 2023-10-20T00:00:00.000Z |
| msrc_cve-2023-22102 | Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.1.0 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 8.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H). | 2023-10-01T00:00:00.000Z | 2023-10-20T00:00:00.000Z |
| msrc_cve-2023-22103 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2023-10-01T00:00:00.000Z | 2023-10-20T00:00:00.000Z |
| msrc_cve-2023-22110 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2023-10-01T00:00:00.000Z | 2023-10-20T00:00:00.000Z |
| msrc_cve-2023-22111 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2023-10-01T00:00:00.000Z | 2023-10-20T00:00:00.000Z |
| msrc_cve-2023-22112 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.34 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2023-10-01T00:00:00.000Z | 2023-10-20T00:00:00.000Z |
| msrc_cve-2023-22113 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). | 2023-10-01T00:00:00.000Z | 2023-10-20T00:00:00.000Z |
| msrc_cve-2023-22114 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.34 and prior and 8.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2023-10-01T00:00:00.000Z | 2023-10-20T00:00:00.000Z |
| msrc_cve-2023-22115 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2023-10-01T00:00:00.000Z | 2023-10-19T00:00:00.000Z |
| msrc_cve-2023-34058 | VMware Tools contains a SAML token signature bypass vulnerability.Ā A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html Ā in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html . | 2023-10-01T00:00:00.000Z | 2023-10-31T00:00:00.000Z |
| msrc_cve-2023-34059 | open-vm-tools contains a file descriptor hijack vulnerability in the vmware-user-suid-wrapper.Ā A malicious actor with non-root privileges may be able to hijack the /dev/uinput file descriptor allowing them to simulate user inputs. | 2023-10-01T00:00:00.000Z | 2023-11-01T00:00:00.000Z |
| msrc_cve-2023-38546 | This flaw allows an attacker to insert cookies at will into a running program using libcurl if the specific series of conditions are met. libcurl performs transfers. In its API an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk the cloned version of the handle would instead store the file name as `none` (using the four ASCII letters no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named `none` - if such a file exists and is readable in the current directory of the program usin | 2023-10-01T00:00:00.000Z | 2026-02-18T01:14:25.000Z |
| msrc_cve-2023-38552 | When the Node.js policy feature checks the integrity of a resource against a trusted manifest the application can intercept the operation and return a forged checksum to the node's policy implementation thus effectively disabling the integrity check. Impacts: This vulnerability affects all users using the experimental policy mechanism in all active release lines: 18.x and 20.x. Please note that at the time this CVE was issued the policy mechanism is an experimental feature of Node.js. | 2023-10-01T00:00:00.000Z | 2023-10-23T00:00:00.000Z |
| msrc_cve-2023-39189 | Kernel: netfilter: nftables out-of-bounds read in nf_osf_match_one() | 2023-10-01T00:00:00.000Z | 2023-10-12T00:00:00.000Z |
| msrc_cve-2023-39191 | Kernel: ebpf: insufficient stack type checks in dynptr | 2023-10-01T00:00:00.000Z | 2023-10-11T00:00:00.000Z |
| msrc_cve-2023-39192 | Kernel: netfilter: xtables out-of-bounds read in u32_match_it() | 2023-10-01T00:00:00.000Z | 2023-10-12T00:00:00.000Z |
| msrc_cve-2023-39193 | Kernel: netfilter: xtables sctp out-of-bounds read in match_flags() | 2023-10-01T00:00:00.000Z | 2023-10-12T00:00:00.000Z |
| msrc_cve-2023-39194 | Kernel: xfrm: out-of-bounds read in __xfrm_state_filter_match() | 2023-10-01T00:00:00.000Z | 2023-10-12T00:00:00.000Z |
| msrc_cve-2023-39323 | Arbitrary code execution during build via line directives in cmd/go | 2023-10-01T00:00:00.000Z | 2026-02-18T02:57:30.000Z |
| msrc_cve-2023-39325 | HTTP/2 rapid reset can cause excessive work in net/http | 2023-10-01T00:00:00.000Z | 2026-02-18T02:41:27.000Z |
| msrc_cve-2023-40745 | Libtiff: integer overflow in tiffcp.c | 2023-10-01T00:00:00.000Z | 2023-10-06T00:00:00.000Z |
| msrc_cve-2023-40791 | extract_user_to_sg in lib/scatterlist.c in the Linux kernel before 6.4.12 fails to unpin pages in a certain situation as demonstrated by a WARNING for try_grab_page. | 2023-10-01T00:00:00.000Z | 2023-10-24T00:00:00.000Z |
| msrc_cve-2023-41175 | Libtiff: potential integer overflow in raw2tiff.c | 2023-10-01T00:00:00.000Z | 2023-10-06T00:00:00.000Z |
| msrc_cve-2023-42752 | Kernel: integer overflow in igmpv3_newpack leading to exploitable memory access | 2023-10-01T00:00:00.000Z | 2023-10-19T00:00:00.000Z |
| msrc_cve-2023-42754 | Kernel: ipv4: null pointer dereference in ipv4_send_dest_unreach() | 2023-10-01T00:00:00.000Z | 2023-10-12T00:00:00.000Z |
| msrc_cve-2023-42755 | Kernel: rsvp: out-of-bounds read in rsvp_classify() | 2023-10-01T00:00:00.000Z | 2023-10-12T00:00:00.000Z |
| msrc_cve-2023-43615 | Mbed TLS 2.x before 2.28.5 and 3.x before 3.5.0 has a Buffer Overflow. | 2023-10-01T00:00:00.000Z | 2026-02-19T01:23:34.000Z |
| msrc_cve-2023-43622 | Apache HTTP Server: DoS in HTTP/2 with initial windows size 0 | 2023-10-01T00:00:00.000Z | 2025-05-15T00:00:00.000Z |
| msrc_cve-2023-43785 | Libx11: out-of-bounds memory access in _xkbreadkeysyms() | 2023-10-01T00:00:00.000Z | 2023-10-16T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:11627-1 | postgresql12-12.9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11628-1 | postgresql13-13.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11629-1 | libecpg6-14.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11630-1 | jupyter-nbdime-6.1.2-8.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11631-1 | ctdb-4.15.2+git.193.a4d6307f1fd-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11632-1 | libspeex1-1.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11633-1 | barrier-2.4.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11634-1 | binutils-2.37-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11635-1 | liblldpctl4-1.0.13-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11636-1 | gmp-devel-32bit-6.2.1-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11637-1 | corepack16-16.13.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11638-1 | php8-8.0.13-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11639-1 | tor-0.4.6.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11640-1 | php7-7.4.26-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11641-1 | libwireshark14-3.4.10-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11642-1 | aom-tools-3.2.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11643-1 | opensc-0.22.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11644-1 | python3-mailman-3.3.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11645-1 | libnss_slurm2-21.08.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11646-1 | containerd-1.4.12-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11647-1 | docker-20.10.11_ce-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11648-1 | libmariadbd-devel-10.6.5-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11649-1 | matrix-synapse-1.47.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11650-1 | cargo1.56-1.56.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11651-1 | grafana-7.5.11-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11652-1 | ceph-16.2.6.463+g22e7612f9ad-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11653-1 | dnsmasq-2.86-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11654-1 | libzapojit-0_0-0-0.0.3-7.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11655-1 | strongswan-5.9.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11656-1 | nodejs-electron-13.6.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2016:0126 | Red Hat Security Advisory: openstack-swift security update | 2016-02-08T04:35:30+00:00 | 2025-11-21T17:54:56+00:00 |
| rhsa-2016:0129 | Red Hat Security Advisory: python-django security update | 2016-02-08T06:50:15+00:00 | 2025-11-21T17:54:57+00:00 |
| rhsa-2016:0152 | Red Hat Security Advisory: sos security and bug fix update | 2016-02-09T08:42:04+00:00 | 2025-11-21T17:54:57+00:00 |
| rhsa-2016:0155 | Red Hat Security Advisory: openstack-swift security update | 2016-02-09T20:56:35+00:00 | 2025-11-21T17:54:58+00:00 |
| rhsa-2016:0158 | Red Hat Security Advisory: python-django security update | 2016-02-10T01:15:47+00:00 | 2025-11-21T17:54:59+00:00 |
| rhsa-2016:0157 | Red Hat Security Advisory: python-django security update | 2016-02-10T01:15:56+00:00 | 2025-11-21T17:54:58+00:00 |
| rhsa-2016:0156 | Red Hat Security Advisory: python-django security update | 2016-02-10T01:16:06+00:00 | 2025-11-21T17:54:58+00:00 |
| rhsa-2016:0166 | Red Hat Security Advisory: flash-plugin security update | 2016-02-10T21:10:25+00:00 | 2025-11-21T17:54:59+00:00 |
| rhsa-2016:0174 | Red Hat Security Advisory: Satellite 6.1.7 security, bug and enhancement fix update | 2016-02-15T15:50:32+00:00 | 2025-11-21T17:54:59+00:00 |
| rhsa-2016:0188 | Red Hat Security Advisory: sos security and bug fix update | 2016-02-16T10:34:57+00:00 | 2025-11-21T17:55:01+00:00 |
| rhsa-2016:0189 | Red Hat Security Advisory: polkit security update | 2016-02-16T10:35:34+00:00 | 2025-11-21T17:55:01+00:00 |
| rhsa-2016:0197 | Red Hat Security Advisory: firefox security update | 2016-02-16T10:37:09+00:00 | 2026-03-04T07:38:09+00:00 |
| rhsa-2016:0212 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | 2016-02-16T10:46:40+00:00 | 2025-11-21T17:55:02+00:00 |
| rhsa-2016:0204 | Red Hat Security Advisory: 389-ds-base security and bug fix update | 2016-02-16T10:47:59+00:00 | 2025-11-21T17:55:02+00:00 |
| rhsa-2016:0185 | Red Hat Security Advisory: kernel security and bug fix update | 2016-02-16T11:15:39+00:00 | 2025-11-21T17:55:00+00:00 |
| rhsa-2016:0224 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | 2016-02-16T14:59:08+00:00 | 2025-11-21T17:55:03+00:00 |
| rhsa-2016:0175 | Red Hat Security Advisory: glibc security and bug fix update | 2016-02-16T15:19:38+00:00 | 2026-01-28T22:38:41+00:00 |
| rhsa-2016:0225 | Red Hat Security Advisory: glibc security update | 2016-02-16T15:38:08+00:00 | 2026-01-28T22:38:41+00:00 |
| rhsa-2016:0176 | Red Hat Security Advisory: glibc security and bug fix update | 2016-02-16T15:39:10+00:00 | 2026-01-28T22:38:41+00:00 |
| rhsa-2016:0241 | Red Hat Security Advisory: chromium-browser security update | 2016-02-17T05:02:36+00:00 | 2025-11-21T17:55:03+00:00 |
| rhsa-2016:0258 | Red Hat Security Advisory: thunderbird security update | 2016-02-18T15:23:51+00:00 | 2025-11-21T17:55:04+00:00 |
| rhsa-2016:0266 | Red Hat Security Advisory: openstack-heat bug fix and security advisory | 2016-02-18T16:41:02+00:00 | 2025-11-21T17:55:04+00:00 |
| rhsa-2016:0277 | Red Hat Security Advisory: rhev-hypervisor security update | 2016-02-19T22:19:14+00:00 | 2026-01-28T22:38:42+00:00 |
| rhsa-2016:0286 | Red Hat Security Advisory: chromium-browser security update | 2016-02-23T07:18:35+00:00 | 2025-11-21T17:55:04+00:00 |
| rhsa-2016:0296 | Red Hat Security Advisory: rh-ror41 security update | 2016-02-24T10:36:00+00:00 | 2026-03-02T16:08:40+00:00 |
| rhsa-2016:0297 | Red Hat Security Advisory: Red Hat CloudForms 3.0 - End Of Life Notice | 2016-02-25T15:17:28+00:00 | 2025-11-21T17:55:05+00:00 |
| rhsa-2016:0309 | Red Hat Security Advisory: openstack-glance security update | 2016-02-29T05:09:40+00:00 | 2025-11-21T17:55:08+00:00 |
| rhsa-2016:0308 | Red Hat Security Advisory: rabbitmq-server security and bugfix update | 2016-02-29T05:09:51+00:00 | 2025-11-21T17:55:11+00:00 |
| rhsa-2016:0321 | Red Hat Security Advisory: Red Hat JBoss Fuse 6.2.1 update | 2016-02-29T19:39:50+00:00 | 2026-03-18T01:36:24+00:00 |
| rhsa-2016:0329 | Red Hat Security Advisory: openstack-swift security update | 2016-03-01T07:01:20+00:00 | 2025-11-21T17:55:09+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2019:3288-1 | Security update for haproxy | 2019-12-12T14:52:10Z | 2019-12-12T14:52:10Z |
| suse-su-2019:3289-1 | Security update for the Linux Kernel | 2019-12-12T14:52:54Z | 2019-12-12T14:52:54Z |
| suse-su-2019:3293-1 | Security update for libssh | 2019-12-13T17:28:39Z | 2019-12-13T17:28:39Z |
| suse-su-2019:3294-1 | Security update for the Linux Kernel | 2019-12-13T17:29:22Z | 2019-12-13T17:29:22Z |
| suse-su-2019:3295-1 | Security update for the Linux Kernel | 2019-12-13T17:30:04Z | 2019-12-13T17:30:04Z |
| suse-su-2019:3296-1 | Security update for xen | 2019-12-13T17:30:44Z | 2019-12-13T17:30:44Z |
| suse-su-2019:3297-1 | Security update for xen | 2019-12-13T17:31:37Z | 2019-12-13T17:31:37Z |
| suse-su-2019:3306-1 | Security update for mariadb | 2019-12-16T13:50:20Z | 2019-12-16T13:50:20Z |
| suse-su-2019:3307-1 | Security update for libssh | 2019-12-16T13:51:09Z | 2019-12-16T13:51:09Z |
| suse-su-2019:3308-1 | Security update for libssh | 2019-12-16T13:52:01Z | 2019-12-16T13:52:01Z |
| suse-su-2019:3309-1 | Security update for xen | 2019-12-16T13:52:39Z | 2019-12-16T13:52:39Z |
| suse-su-2019:3310-1 | Security update for xen | 2019-12-16T13:53:18Z | 2019-12-16T13:53:18Z |
| suse-su-2019:3311-1 | Security update for git | 2019-12-16T13:55:39Z | 2019-12-16T13:55:39Z |
| suse-su-2019:3316-1 | Security update for the Linux Kernel | 2019-12-17T12:07:58Z | 2019-12-17T12:07:58Z |
| suse-su-2019:3317-1 | Security update for the Linux Kernel | 2019-12-17T12:09:50Z | 2019-12-17T12:09:50Z |
| suse-su-2019:3318-1 | Security update for samba | 2019-12-17T12:10:58Z | 2019-12-17T12:10:58Z |
| suse-su-2019:3319-1 | Security update for samba | 2019-12-17T12:12:06Z | 2019-12-17T12:12:06Z |
| suse-su-2019:3337-1 | Security update for MozillaFirefox | 2019-12-18T17:17:32Z | 2019-12-18T17:17:32Z |
| suse-su-2019:3338-1 | Security update for xen | 2019-12-18T17:18:17Z | 2019-12-18T17:18:17Z |
| suse-su-2019:3339-1 | Security update for MozillaThunderbird | 2019-12-18T17:18:32Z | 2019-12-18T17:18:32Z |
| suse-su-2019:3340-1 | Security update for spectre-meltdown-checker | 2019-12-19T07:25:28Z | 2019-12-19T07:25:28Z |
| suse-su-2019:3341-1 | Security update for zziplib | 2019-12-19T07:26:43Z | 2019-12-19T07:26:43Z |
| suse-su-2019:3347-1 | Security update for MozillaFirefox | 2019-12-19T15:12:50Z | 2019-12-19T15:12:50Z |
| suse-su-2019:3348-1 | Security update for spectre-meltdown-checker | 2019-12-19T15:13:05Z | 2019-12-19T15:13:05Z |
| suse-su-2019:3349-1 | Security update for trousers | 2019-12-19T15:13:16Z | 2019-12-19T15:13:16Z |
| suse-su-2019:3369-1 | Security update for mariadb | 2019-12-20T06:21:08Z | 2019-12-20T06:21:08Z |
| suse-su-2019:3370-1 | Security update for mariadb-100 | 2019-12-20T06:22:15Z | 2019-12-20T06:22:15Z |
| suse-su-2019:3371-1 | Security update for the Linux Kernel | 2019-12-20T06:23:44Z | 2019-12-20T06:23:44Z |
| suse-su-2019:3372-1 | Security update for the Linux Kernel | 2019-12-20T06:24:29Z | 2019-12-20T06:24:29Z |
| suse-su-2019:14260-1 | Security update for MozillaFirefox, mozilla-nspr, mozilla-nss | 2019-12-20T14:34:01Z | 2019-12-20T14:34:01Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-kibana-2026-33459 | Uncontrolled Resource Consumption in Kibana Leading to Denial of Service | 2026-04-13T05:42:00.230Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33460 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:42:01.870Z | 2026-04-13T06:11:47.324Z |
| bit-kibana-2026-33461 | Incorrect Authorization in Kibana Fleet Leading to Information Disclosure | 2026-04-13T05:42:03.441Z | 2026-04-23T09:10:51.830Z |
| bit-kibana-2026-4498 | Execution with Unnecessary Privileges in Kibana Leading to reading index data beyond their direct Elasticsearch RBAC scope | 2026-04-13T05:42:05.042Z | 2026-04-13T06:11:47.324Z |
| bit-logstash-2026-33466 | Improper Limitation of a Pathname to a Restricted Directory in Logstash Leading to Arbitrary File Write | 2026-04-13T05:42:10.653Z | 2026-04-22T09:10:06.651Z |
| bit-golang-2026-27140 | Code execution vulnerability in SWIG code generation in cmd/go | 2026-04-13T05:43:35.566Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-32280 | Unexpected work during chain building in crypto/x509 | 2026-04-13T05:43:38.849Z | 2026-04-13T06:11:47.324Z |
| bit-golang-2026-32281 | Inefficient policy validation in crypto/x509 | 2026-04-13T05:43:40.495Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-32282 | TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix | 2026-04-13T05:43:42.625Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-32283 | Unauthenticated TLS 1.3 KeyUpdate record can cause persistent connection retention and DoS in crypto/tls | 2026-04-13T05:43:44.464Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-32288 | Unbounded allocation for old GNU sparse in archive/tar | 2026-04-13T05:43:46.362Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-32289 | JsBraceDepth Context Tracking Bugs (XSS) in html/template | 2026-04-13T05:43:48.183Z | 2026-04-17T00:10:47.507Z |
| bit-golang-2026-33810 | Case-sensitive excludedSubtrees name constraints cause Auth Bypass in crypto/x509 | 2026-04-13T05:43:50.259Z | 2026-04-21T12:33:30.555Z |
| bit-tomcat-2026-29129 | Apache Tomcat: TLS cipher order is not preserved | 2026-04-13T05:53:00.617Z | 2026-04-13T06:11:47.324Z |
| bit-tomcat-2026-32990 | Apache Tomcat: Fix for CVE-2025-66614 is incomplete | 2026-04-13T05:53:05.369Z | 2026-04-13T06:11:47.324Z |
| bit-tomcat-2026-34486 | Apache Tomcat: Fix for CVE-2026-29146 allowed bypass of EncryptInterceptor | 2026-04-13T05:53:08.595Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2025-12664 | Improper Validation of Specified Quantity in Input in GitLab | 2026-04-13T06:05:51.788Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2025-9484 | Missing Authorization in GitLab | 2026-04-13T06:08:58.190Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-1101 | Improper Validation of Specified Quantity in Input in GitLab | 2026-04-13T06:09:20.803Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-1516 | Improper Control of Generation of Code ('Code Injection') in GitLab | 2026-04-13T06:09:35.915Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-2104 | Authorization Bypass Through User-Controlled Key in GitLab | 2026-04-13T06:09:50.678Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-2619 | Incorrect Authorization in GitLab | 2026-04-13T06:09:54.420Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-4332 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2026-04-13T06:10:11.039Z | 2026-04-13T06:11:47.324Z |
| bit-gitlab-2026-4916 | Missing Authorization in GitLab | 2026-04-13T06:10:14.681Z | 2026-04-13T06:11:47.324Z |
| bit-minio-2026-39414 | MinIO affected a DoS via Unbounded Memory Allocation in S3 Select CSV Parsing | 2026-04-13T10:10:51.384Z | 2026-04-13T10:42:00.723Z |
| bit-mongodb-2026-4147 | Stack memory disclosure in filemd5 command | 2026-04-13T10:13:04.983Z | 2026-04-13T10:42:00.723Z |
| bit-mongodb-2026-4148 | ExpressionContext use-after-free in classic engine $lookup and $graphLookup aggregation operators | 2026-04-13T10:13:07.402Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-24880 | Apache Tomcat: Request smuggling via invalid chunk extension | 2026-04-13T10:19:49.629Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-25854 | Apache Tomcat: Occasionally open redirect | 2026-04-13T10:19:50.972Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-29145 | Apache Tomcat, Apache Tomcat Native: OCSP checks sometimes soft-fail even when soft-fail is disabled | 2026-04-13T10:19:53.698Z | 2026-04-13T10:42:00.723Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2011-avi-375 | VulnƩrabilitƩ dans Novell File Reporter | 2011-06-29T00:00:00.000000 | 2011-06-29T00:00:00.000000 |
| certa-2011-avi-376 | VulnƩrabilitƩs dans Opera | 2011-07-01T00:00:00.000000 | 2011-07-01T00:00:00.000000 |
| certa-2011-avi-377 | VulnƩrabilitƩ dans Zope et Plone | 2011-07-01T00:00:00.000000 | 2011-07-01T00:00:00.000000 |
| certa-2011-avi-378 | VulnƩrabilitƩ dans Drupal | 2011-07-01T00:00:00.000000 | 2011-07-01T00:00:00.000000 |
| certa-2011-avi-379 | VulnƩrabilitƩ dans WordPress | 2011-07-01T00:00:00.000000 | 2011-07-01T00:00:00.000000 |
| certa-2011-avi-380 | Multiples vulnƩrabilitƩs dans phpMyAdmin | 2011-07-05T00:00:00.000000 | 2011-07-05T00:00:00.000000 |
| certa-2011-avi-381 | Multiples vulnƩrabilitƩs dans Bind | 2011-07-06T00:00:00.000000 | 2012-01-31T00:00:00.000000 |
| certa-2011-avi-382 | VulnƩrabilitƩ dans Cisco Content Services Gateway | 2011-07-07T00:00:00.000000 | 2011-07-07T00:00:00.000000 |
| certa-2011-avi-383 | VulnƩrabilitƩ dans Qemu | 2011-07-07T00:00:00.000000 | 2011-07-07T00:00:00.000000 |
| certa-2011-avi-384 | VulnƩrabilitƩ dans Hitachi HiRDB | 2011-07-11T00:00:00.000000 | 2011-07-11T00:00:00.000000 |
| certa-2011-avi-385 | VulnƩrabilitƩ dans Symantec Web Gateway | 2011-07-12T00:00:00.000000 | 2011-07-12T00:00:00.000000 |
| certa-2011-avi-386 | VulnƩrabilitƩ dans Trend Micro Control Manager | 2011-07-12T00:00:00.000000 | 2011-07-12T00:00:00.000000 |
| certa-2011-avi-387 | Vulnérabilité dans la pile Bluetooth des systèmes Windows | 2011-07-13T00:00:00.000000 | 2011-07-13T00:00:00.000000 |
| certa-2011-avi-388 | Vulnérabilités dans les pilotes en mode noyau du système Microsoft Windows | 2011-07-13T00:00:00.000000 | 2011-07-13T00:00:00.000000 |
| certa-2011-avi-389 | VulnƩrabilitƩ dans Microsoft Visio | 2011-07-13T00:00:00.000000 | 2011-07-13T00:00:00.000000 |
| certa-2011-avi-390 | Multiples vulnƩrabilitƩs dans CSRSS de Microsoft Windows | 2011-07-13T00:00:00.000000 | 2011-07-13T00:00:00.000000 |
| certa-2011-avi-391 | VulnƩrabilitƩ dans Trend Micro Control Manager | 2011-07-13T00:00:00.000000 | 2011-07-13T00:00:00.000000 |
| certa-2011-avi-392 | VulnƩrabilitƩ dans BlackBerry Enterprise Server | 2011-07-18T00:00:00.000000 | 2011-07-18T00:00:00.000000 |
| certa-2011-avi-393 | Mise Ć jour du noyau Red Hat | 2011-07-18T00:00:00.000000 | 2011-07-18T00:00:00.000000 |
| certa-2011-avi-394 | VulnƩrabilitƩs dans VLC | 2011-07-18T00:00:00.000000 | 2011-07-18T00:00:00.000000 |
| certa-2011-avi-395 | VulnƩrabilitƩs dans Apple iOS | 2011-07-18T00:00:00.000000 | 2011-07-18T00:00:00.000000 |
| certa-2011-avi-396 | VulnƩrabilitƩs dans Citrix Access Gateway Plug-in | 2011-07-19T00:00:00.000000 | 2011-07-29T00:00:00.000000 |
| certa-2011-avi-397 | VulnƩrabilitƩs dans Wireshark | 2011-07-19T00:00:00.000000 | 2011-07-19T00:00:00.000000 |
| certa-2011-avi-398 | VulnƩrabilitƩ dans ArcSight Connector Appliance | 2011-07-19T00:00:00.000000 | 2011-07-19T00:00:00.000000 |
| certa-2011-avi-399 | VulnƩrabilitƩ de Check Point Multi-Domain Management / Provider-1 | 2011-07-19T00:00:00.000000 | 2011-07-19T00:00:00.000000 |
| certa-2011-avi-400 | Multiples vulnƩrabilitƩs dans les produits Oracle | 2011-07-20T00:00:00.000000 | 2011-07-20T00:00:00.000000 |
| certa-2011-avi-401 | VulnƩrabilitƩ dans JBoss | 2011-07-20T00:00:00.000000 | 2011-07-20T00:00:00.000000 |
| certa-2011-avi-407 | VulnƩrabilitƩ dans CA Gateway Security and Total Defense | 2011-07-20T00:00:00.000000 | 2011-07-20T00:00:00.000000 |
| certa-2011-avi-402 | VulnƩrabilitƩs dans IBM WebSphere | 2011-07-21T00:00:00.000000 | 2011-07-21T00:00:00.000000 |
| certa-2011-avi-403 | Multiples vulnƩrabilitƩs dans Safari | 2011-07-21T00:00:00.000000 | 2011-07-21T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-05135 | GE Healthcare Precision THUNIS-800+俔任箔ēę¼ę“ | 2015-08-05 | 2015-08-06 |
| cnvd-2015-05136 | GE Healthcare Discovery XR656åXR656 G2俔任箔ēę¼ę“ | 2015-08-05 | 2015-08-06 |
| cnvd-2015-05137 | GE Healthcare Centricity PACS Workstation俔任箔ēę¼ę“ | 2015-08-05 | 2015-08-06 |
| cnvd-2015-05138 | GE Healthcare Centricity DMS Ad Hoc Reporting俔任箔ēę¼ę“ | 2015-08-05 | 2015-08-06 |
| cnvd-2015-05139 | GE Healthcare Discovery NM 750b俔任箔ēę¼ę“ | 2015-08-05 | 2015-08-06 |
| cnvd-2015-05140 | GE Healthcare Centricity PACS Workstation俔任箔ēę¼ę“ļ¼CNVD-2015-05140ļ¼ | 2015-08-05 | 2015-08-06 |
| cnvd-2015-05141 | GE Healthcare Centricity PACS WorkstationåServer俔任箔ēę¼ę“ | 2015-08-05 | 2015-08-06 |
| cnvd-2015-05142 | GE Healthcare Centricity DMS俔任箔ēę¼ę“ | 2015-08-05 | 2015-08-06 |
| cnvd-2015-05143 | GE Healthcare Infinia II 俔任箔ēę¼ę“ | 2015-08-05 | 2015-08-06 |
| cnvd-2015-05144 | GE Healthcare Centricity Image Vault俔任箔ēę¼ę“ | 2015-08-05 | 2015-08-06 |
| cnvd-2015-05145 | GE Healthcare Discovery VH俔任箔ēę¼ę“ | 2015-08-05 | 2015-08-06 |
| cnvd-2015-05146 | Qemuå åé误å¼ēØę¼ę“ | 2015-08-05 | 2015-08-06 |
| cnvd-2015-05147 | Qemu RTL8139ęŖåå§åå å åäæ”ęÆę³é²ę¼ę“ | 2015-08-05 | 2015-08-06 |
| cnvd-2015-05132 | å¤ę¬¾GEäŗ§å俔任箔ēę¼ę“ļ¼CNVD-2015-05132ļ¼ | 2015-08-06 | 2015-08-06 |
| cnvd-2015-05133 | å¤ę¬¾GEäŗ§å俔任箔ēę¼ę“ļ¼CNVD-2015-05133ļ¼ | 2015-08-06 | 2015-08-06 |
| cnvd-2015-05148 | Apple OS Xęéęå0dayę¼ę“ | 2015-08-06 | 2015-08-07 |
| cnvd-2015-05149 | GE Healthcare eNTEGRA P&R俔任箔ēę¼ę“ | 2015-08-06 | 2015-08-07 |
| cnvd-2015-05150 | WordPressč·Øē«čę¬ę¼ę“ļ¼CNVD-2015-05150ļ¼ | 2015-08-06 | 2015-08-07 |
| cnvd-2015-05152 | Chiyu BF-660C fingerprint access-control设å¤ęé访é®ę¼ę“ | 2015-08-06 | 2015-08-10 |
| cnvd-2015-05153 | å¤ę¬¾Dell设å¤ååØę¼ę“ | 2015-08-06 | 2015-08-10 |
| cnvd-2015-05339 | ę·å宽ę£ę°ē ē½ē»ē§ęęéå ¬åøęåøē 修平å°SQLę³Øå „ę¼ę“ | 2015-08-06 | 2015-09-14 |
| cnvd-2016-05889 | ęµ·åęé®č½Æä»¶ęéå ¬åøé®ä»¶ē³»ē»ååØč·Øē«čę¬ę¼ę“ | 2015-08-06 | 2016-08-03 |
| cnvd-2015-05151 | Wordpress Ephox Pluploadč·Øē«čę¬ę¼ę“ | 2015-08-07 | 2015-08-10 |
| cnvd-2015-05342 | finecms v1.9.3ååØä»»ęęä»¶äøä¼ ę¼ę“ | 2015-08-07 | 2015-09-14 |
| cnvd-2015-05154 | WordPressę¶åŗč¾¹éę»å»ę¼ę“ | 2015-08-08 | 2015-08-10 |
| cnvd-2015-05155 | WordPressęéē»čæę¼ę“ | 2015-08-08 | 2015-08-10 |
| cnvd-2015-05156 | WordPressč·Øē«čę¬ę¼ę“ļ¼CNVD-2015-05156ļ¼ | 2015-08-08 | 2015-08-10 |
| cnvd-2015-05157 | WordPresså®å Øē»čæę¼ę“ļ¼CNVD-2015-05157ļ¼ | 2015-08-08 | 2015-08-10 |
| cnvd-2015-05158 | WordPress legacy themeååØęŖęę¼ę“ | 2015-08-08 | 2015-08-10 |
| cnvd-2015-05159 | Mozilla Firefox PDF Vieweråęŗē»čæäæ”ęÆę³é²ę¼ę“ | 2015-08-08 | 2015-08-10 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-07569 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07570 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07571 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07572 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07573 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07574 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07575 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07576 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07577 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07578 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07579 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07580 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07581 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07582 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07583 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07584 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07585 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07586 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07587 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07588 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07589 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07590 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07591 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07592 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07593 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07594 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07595 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07596 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07597 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-07598 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń Red Hat Enterprise Linux, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ā¦ | 28.04.2015 | 28.11.2016 |
| ID | Description | Updated |
|---|---|---|
| var-202201-0543 | IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 is vulnerable to cross-site scripting.⦠| 2023-12-18T11:10:40.753000Z |
| var-202107-1379 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza⦠| 2023-12-18T11:11:33.414000Z |
| var-202107-1411 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza⦠| 2023-12-18T11:11:41.371000Z |
| var-202107-1419 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza⦠| 2023-12-18T11:12:13.840000Z |
| var-202108-1316 | A vulnerability has been identified in JT2Go (All versions < V13.2.0.2), Teamcenter Visua⦠| 2023-12-18T11:12:42.949000Z |
| var-202107-1403 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza⦠| 2023-12-18T11:13:22.698000Z |
| var-202112-0801 | A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visua⦠| 2023-12-18T11:14:07.778000Z |
| var-202107-1376 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza⦠| 2023-12-18T11:15:09.918000Z |
| var-202102-0320 | A vulnerability has been identified in JT2Go (All versions < V13.1.0.2), Teamcenter Visua⦠| 2023-12-18T11:15:24.020000Z |
| var-202107-1409 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza⦠| 2023-12-18T11:15:31.095000Z |
| var-202107-1382 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza⦠| 2023-12-18T11:16:00.221000Z |
| var-202203-0245 | A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i801, RUGGEDCOM i802, RU⦠| 2023-12-18T11:16:36.230000Z |
| var-202212-1163 | A vulnerability has been identified in JT2Go (All versions < V14.1.0.6), Teamcenter Visua⦠| 2023-12-18T11:18:04.462000Z |
| var-202107-1415 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza⦠| 2023-12-18T11:18:08.922000Z |
| var-202306-0900 | A vulnerability has been identified in JT2Go (All versions < V14.2.0.3), Teamcenter Visua⦠| 2023-12-18T11:18:43.852000Z |
| var-202201-0541 | IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 uses weaker than expected cryptographi⦠| 2023-12-18T11:18:52.856000Z |
| var-202306-0899 | A vulnerability has been identified in JT2Go (All versions < V14.2.0.3), Teamcenter Visua⦠| 2023-12-18T11:19:29.115000Z |
| var-202202-0102 | An issue was discovered in SdHostDriver in the kernel 5.0 through 5.5 in Insyde InsydeH2O⦠| 2023-12-18T11:19:40.640000Z |
| var-202107-1422 | A vulnerability has been identified in JT2Go (All versions < V13.2), Solid Edge SE2021 (A⦠| 2023-12-18T11:19:44.083000Z |
| var-202212-1165 | A vulnerability has been identified in JT2Go (All versions < V14.1.0.6), Teamcenter Visua⦠| 2023-12-18T11:19:48.623000Z |
| var-202106-0972 | A vulnerability has been identified in JT2Go (All versions < V13.1.0.3), Teamcenter Visua⦠| 2023-12-18T11:20:25.636000Z |
| var-202107-1380 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza⦠| 2023-12-18T11:20:52.093000Z |
| var-202112-0805 | A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visua⦠| 2023-12-18T11:21:33.702000Z |
| var-202112-0800 | A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visua⦠| 2023-12-18T11:21:46.831000Z |
| var-202107-1375 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza⦠| 2023-12-18T11:23:08.300000Z |
| var-202203-0249 | A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i801, RUGGEDCOM i802, RU⦠| 2023-12-18T11:23:20.114000Z |
| var-202112-0796 | A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visua⦠| 2023-12-18T11:24:10.994000Z |
| var-202212-1728 | The APDFL.dll contains a memory corruption vulnerability while parsing specially craft⦠| 2023-12-18T11:24:35.332000Z |
| var-202306-0898 | A vulnerability has been identified in JT2Go (All versions < V14.2.0.3), Teamcenter Visua⦠| 2023-12-18T11:24:48.250000Z |
| var-202202-0108 | An issue was discovered in AhciBusDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. ⦠| 2023-12-18T11:25:14.275000Z |