Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2001-1383 |
N/A
|
initscript in setserial 2.17-4 and earlier uses p… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.387Z |
| CVE-2001-1385 |
N/A
|
The Apache module for PHP 4.0.0 through PHP 4.0.4… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.293Z |
| CVE-2001-1406 |
N/A
|
process_bug.cgi in Bugzilla before 2.14 does not … |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.375Z |
| CVE-2001-1407 |
N/A
|
Bugzilla before 2.14 allows Bugzilla users to byp… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T04:51:08.276Z |
| CVE-2002-0006 |
N/A
|
XChat 1.8.7 and earlier, including default config… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.591Z |
| CVE-2002-0009 |
N/A
|
show_bug.cgi in Bugzilla before 2.14.1 allows a u… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.052Z |
| CVE-2002-0011 |
N/A
|
Information leak in doeditvotes.cgi in Bugzilla b… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.453Z |
| CVE-2002-0014 |
N/A
|
URL-handling code in Pine 4.43 and earlier allows… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.470Z |
| CVE-2002-0017 |
N/A
|
Buffer overflow in SNMP daemon (snmpd) on SGI IRI… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.459Z |
| CVE-2002-0024 |
N/A
|
File Download box in Internet Explorer 5.01, 5.5 … |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.386Z |
| CVE-2002-0032 |
N/A
|
Yahoo! Messenger 5,0,0,1064 and earlier allows re… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.488Z |
| CVE-2002-0033 |
N/A
|
Heap-based buffer overflow in cfsd_calloc functio… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.404Z |
| CVE-2002-0042 |
N/A
|
Vulnerability in the XFS file system for SGI IRIX… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.586Z |
| CVE-2002-0054 |
N/A
|
SMTP service in (1) Microsoft Windows 2000 and (2… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.425Z |
| CVE-2002-0061 |
N/A
|
Apache for Win32 before 1.3.24, and 2.0.x before … |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.574Z |
| CVE-2002-0062 |
N/A
|
Buffer overflow in ncurses 5.0, and the ncurses4 … |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.349Z |
| CVE-2002-0067 |
N/A
|
Squid 2.4 STABLE3 and earlier does not properly d… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.437Z |
| CVE-2002-0068 |
N/A
|
Squid 2.4 STABLE3 and earlier allows remote attac… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.488Z |
| CVE-2002-0069 |
N/A
|
Memory leak in SNMP in Squid 2.4 STABLE3 and earl… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.385Z |
| CVE-2002-0071 |
N/A
|
Buffer overflow in the ism.dll ISAPI extension th… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.436Z |
| CVE-2002-0072 |
N/A
|
The w3svc.dll ISAPI filter in Front Page Server E… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.469Z |
| CVE-2002-0073 |
N/A
|
The FTP service in Internet Information Server (I… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.441Z |
| CVE-2002-0074 |
N/A
|
Cross-site scripting vulnerability in Help File s… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.487Z |
| CVE-2002-0075 |
N/A
|
Cross-site scripting vulnerability for Internet I… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.577Z |
| CVE-2002-0076 |
N/A
|
Java Runtime Environment (JRE) Bytecode Verifier … |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.438Z |
| CVE-2002-0079 |
N/A
|
Buffer overflow in the chunked encoding transfer … |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.581Z |
| CVE-2002-0094 |
N/A
|
config_converters.py in BSCW (Basic Support for C… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.465Z |
| CVE-2002-0095 |
N/A
|
The default configuration of BSCW (Basic Support … |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.441Z |
| CVE-2002-0120 |
N/A
|
Apple Palm Desktop 4.0b76 and 4.0b77 creates worl… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.559Z |
| CVE-2002-0123 |
N/A
|
MDG Computer Services Web Server 4D WS4D/eCommerc… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T02:35:17.789Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2002-0752 |
N/A
|
CGIscript.net csMailto.cgi program exports feedba… |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:47.945Z |
| CVE-2002-0753 |
N/A
|
Buffer overflow in Talentsoft Web+ 5.0 allows rem… |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:47.923Z |
| CVE-2002-0754 |
N/A
|
Kerberos 5 su (k5su) in FreeBSD 4.4 and earlier r… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T03:03:47.923Z |
| CVE-2002-0755 |
N/A
|
Kerberos 5 su (k5su) in FreeBSD 4.5 and earlier d… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T03:03:47.928Z |
| CVE-2002-0756 |
N/A
|
Cross-site scripting vulnerability in the authent… |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:47.965Z |
| CVE-2002-0757 |
N/A
|
(1) Webmin 0.96 and (2) Usermin 0.90 with passwor… |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:47.946Z |
| CVE-2002-0758 |
N/A
|
ifup-dhcp script in the sysconfig package for SuS… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T03:03:48.839Z |
| CVE-2002-0759 |
N/A
|
bzip2 before 1.0.2 in FreeBSD 4.5 and earlier, Op… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T03:03:48.640Z |
| CVE-2002-0760 |
N/A
|
Race condition in bzip2 before 1.0.2 in FreeBSD 4… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T03:03:47.936Z |
| CVE-2002-0761 |
N/A
|
bzip2 before 1.0.2 in FreeBSD 4.5 and earlier, Op… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T03:03:49.251Z |
| CVE-2002-0762 |
N/A
|
shadow package in SuSE 8.0 allows local users to … |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T03:03:48.808Z |
| CVE-2002-0763 |
N/A
|
Vulnerability in administration server for HP Vir… |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:47.929Z |
| CVE-2002-0764 |
N/A
|
Phorum 3.3.2a allows remote attackers to execute … |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:48.602Z |
| CVE-2002-0765 |
N/A
|
sshd in OpenSSH 3.2.2, when using YP with netgrou… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T03:03:48.763Z |
| CVE-2002-0766 |
N/A
|
OpenBSD 2.9 through 3.1 allows local users to cau… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T03:03:48.644Z |
| CVE-2002-0767 |
N/A
|
simpleinit on Linux systems does not close a read… |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:48.747Z |
| CVE-2002-0768 |
N/A
|
Buffer overflow in lukemftp FTP client in SuSE 6.… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T03:03:48.860Z |
| CVE-2002-0769 |
N/A
|
The web-based configuration interface for the Cis… |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:49.265Z |
| CVE-2002-0770 |
N/A
|
Quake 2 (Q2) server 3.20 and 3.21 allows remote a… |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:48.587Z |
| CVE-2002-0771 |
N/A
|
Cross-site scripting vulnerability in viewcvs.cgi… |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:47.928Z |
| CVE-2002-0772 |
N/A
|
Directory traversal vulnerability in dsnmanager.a… |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:49.274Z |
| CVE-2002-0773 |
N/A
|
imp_rootdir.asp for Hosting Controller allows rem… |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:49.093Z |
| CVE-2002-0774 |
N/A
|
Hosting Controller creates a default user AdvWeba… |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:49.052Z |
| CVE-2002-0775 |
N/A
|
browse.asp in Hosting Controller allows remote at… |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:49.303Z |
| CVE-2002-0776 |
N/A
|
getuserdesc.asp in Hosting Controller 2002 allows… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T03:03:47.936Z |
| CVE-2002-0777 |
N/A
|
Buffer overflow in the LDAP component of Ipswitch… |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T03:03:47.929Z |
| CVE-2002-0778 |
N/A
|
The default configuration of the proxy for Cisco … |
n/a |
n/a |
2003-04-02T05:00:00.000Z | 2024-08-08T03:03:47.948Z |
| CVE-2002-0779 |
N/A
|
FTP proxy server for Novell BorderManager 3.6 SP … |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:49.157Z |
| CVE-2002-0780 |
N/A
|
IP/IPX gateway for Novell BorderManager 3.6 SP 1a… |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:49.275Z |
| CVE-2002-0781 |
N/A
|
RTSP proxy for Novell BorderManager 3.6 SP 1a all… |
n/a |
n/a |
2002-07-26T04:00:00.000Z | 2024-08-08T03:03:49.258Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-33f9-j839-rf8h |
9.8 (3.1)
|
Prototype Pollution in immer | 2021-09-02T17:17:37Z | 2024-04-25T22:16:53Z |
| ghsa-jphm-g89m-v42p |
|
Path traversal in Grafana Cortex | 2021-09-02T21:59:50Z | 2021-08-30T23:21:48Z |
| ghsa-7h6j-2268-fhcm |
5.3 (3.1)
|
Traefik has an Improper Certificate Handling issue | 2021-09-02T22:00:01Z | 2026-03-06T22:05:57Z |
| ghsa-q9mp-79cp-9g8j |
7.5 (3.1)
|
Improper Authentication | 2021-09-02T22:00:09Z | 2021-08-02T22:18:22Z |
| ghsa-fgxq-p49f-qw99 |
5.3 (3.1)
|
Directory Traversal in isomorphic-git | 2021-09-02T22:00:20Z | 2021-08-31T21:02:23Z |
| ghsa-grj5-8x6q-hc9q |
5.3 (3.1)
|
Path traversal in Grafana Loki | 2021-09-02T22:00:40Z | 2021-09-08T18:11:29Z |
| ghsa-58g2-9fqr-36q2 |
7.5 (3.1)
|
Prototype Pollution in Proto | 2021-09-02T22:01:01Z | 2021-09-10T17:08:40Z |
| ghsa-p92x-r36w-9395 |
5.6 (3.1)
|
Type confusion in mpath | 2021-09-02T22:02:25Z | 2023-09-07T18:41:16Z |
| ghsa-v9w2-v7j9-rjpr |
8.8 (3.1)
|
Remote code execution in Eclipse Theia | 2021-09-02T22:02:36Z | 2021-09-13T20:27:30Z |
| ghsa-wmpm-fq7r-jq56 |
9.8 (3.1)
|
Imporoper path validation in elFinder.NetCore | 2021-09-02T22:05:17Z | 2022-07-13T19:09:43Z |
| ghsa-9rjp-r58j-fxgq |
8.6 (3.1)
|
Path traversal in elFinder.NetCore | 2021-09-02T22:05:26Z | 2021-09-02T18:03:47Z |
| ghsa-jpwx-ffjq-wr4w |
|
Content object state fetch functions open to SQL injection | 2021-09-07T22:54:23Z | 2021-09-03T20:10:38Z |
| ghsa-mf7q-gw5f-q8jj |
6.1 (3.1)
|
Cross-site Scripting in Apache Zeppelin | 2021-09-07T22:55:56Z | 2021-09-10T16:49:52Z |
| ghsa-4qw8-pgpr-p9mq |
9.8 (3.1)
|
Bash command injection in Apache Zeppelin | 2021-09-07T22:56:43Z | 2023-11-27T21:44:31Z |
| ghsa-87p2-cvhq-q4mv |
7.5 (3.1)
|
Authentication bypass in Apache Zeppelin | 2021-09-07T22:56:56Z | 2021-09-13T20:32:55Z |
| ghsa-c36v-fmgq-m8hx |
7.5 (3.1)
|
Prototype Pollution in immer | 2021-09-07T22:57:14Z | 2024-04-25T22:09:12Z |
| ghsa-593v-wcqx-hq2w |
|
Incorrect version tags linked to external repository | 2021-09-07T22:57:58Z | 2021-09-03T21:34:00Z |
| ghsa-c8xp-8mf3-62h9 |
7.5 (3.1)
|
OctoRPKI lacks contextual out-of-bounds check when validating RPKI ROA maxLength values | 2021-09-07T23:02:18Z | 2021-09-03T21:40:39Z |
| ghsa-h77f-xxx7-4858 |
7.4 (3.1)
|
User impersonation due to incorrect handling of the login JWT | 2021-09-07T23:04:04Z | 2021-09-07T14:04:02Z |
| ghsa-2c83-wfv3-q25f |
|
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ZMarkdown | 2021-09-07T23:07:56Z | 2021-09-07T14:04:47Z |
| ghsa-98vv-pw6r-q6q4 |
7.5 (3.1)
8.7 (4.0)
|
Uncontrolled Resource Consumption in pillow | 2021-09-07T23:08:10Z | 2024-10-09T21:02:05Z |
| ghsa-w3j4-76qw-wwjm |
6.3 (3.1)
|
Older releases of better_errors open to Cross-Site Request Forgery attack | 2021-09-07T23:08:24Z | 2021-09-08T14:47:05Z |
| ghsa-fmm9-3gv8-58f4 |
4.3 (3.1)
|
Improper Handling of Missing Values in kaml | 2021-09-07T23:08:40Z | 2021-09-08T14:47:32Z |
| ghsa-97pv-4338-r5vp |
4.2 (3.1)
|
Cross-site Scripting in file-upload-with-preview | 2021-09-07T23:08:54Z | 2021-09-07T18:05:06Z |
| ghsa-mfv7-gq43-w965 |
4.8 (3.1)
|
Incomplete List of Disallowed Inputs in Kubernetes | 2021-09-07T23:09:24Z | 2021-09-14T18:47:27Z |
| ghsa-r659-8xfp-j327 |
9.8 (3.1)
|
objection.js Prototype Pollution vulnerability | 2021-09-07T23:09:43Z | 2023-09-07T18:40:01Z |
| ghsa-9q5w-79cv-947m |
10.0 (3.1)
|
Unsafe defaults in `remark-html` | 2021-09-07T23:10:56Z | 2021-09-07T19:05:40Z |
| ghsa-3q6g-vf58-7m4g |
7.5 (3.1)
8.7 (4.0)
|
Regular Expression Denial of Service in flask-restx | 2021-09-08T15:41:15Z | 2024-09-20T17:57:56Z |
| ghsa-592v-7frm-h44q |
4.8 (3.1)
|
Cross-site scripting in LavaLite-CMS | 2021-09-08T17:25:36Z | 2021-07-13T15:53:43Z |
| ghsa-748f-wv76-x9hg |
8.8 (3.1)
|
Arbitrary file upload in Fork CMS | 2021-09-08T17:26:26Z | 2021-07-13T15:53:15Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-7194 | Malicious code in wm-grunt-module-validate (npm) | 2022-06-20T21:13:29Z | 2022-06-20T21:13:29Z |
| mal-2022-7195 | Malicious code in wm-jquery (npm) | 2022-06-20T21:13:29Z | 2022-06-20T21:13:30Z |
| mal-2022-7199 | Malicious code in wm-package-json-validate (npm) | 2022-06-20T21:13:29Z | 2022-06-20T21:13:30Z |
| mal-2022-2151 | Malicious code in config-monorepo (npm) | 2022-06-20T21:13:30Z | 2022-06-20T21:13:31Z |
| mal-2022-4349 | Malicious code in loblaws-mkt (npm) | 2022-06-20T21:13:30Z | 2022-06-20T21:13:31Z |
| mal-2022-4350 | Malicious code in loblaws-mkt-bundle (npm) | 2022-06-20T21:13:30Z | 2022-06-20T21:13:31Z |
| mal-2022-7201 | Malicious code in wm-prelib-builder (npm) | 2022-06-20T21:13:30Z | 2022-06-20T21:13:30Z |
| mal-2022-2998 | Malicious code in fed-challenge-starter (npm) | 2022-06-20T21:13:31Z | 2022-06-20T21:13:32Z |
| mal-2022-3399 | Malicious code in gme-loblawsinc (npm) | 2022-06-20T21:13:31Z | 2022-06-20T21:13:31Z |
| mal-2022-3786 | Malicious code in ifit-actions (npm) | 2022-06-20T21:13:31Z | 2022-06-20T21:13:32Z |
| mal-2022-4348 | Malicious code in loblaw_common (npm) | 2022-06-20T21:13:31Z | 2022-06-20T21:13:31Z |
| mal-2022-1448 | Malicious code in backbone-typescripts-accessor-generator (npm) | 2022-06-20T21:13:32Z | 2022-06-20T21:13:32Z |
| mal-2022-3039 | Malicious code in finastra-design-system (npm) | 2022-06-20T21:13:32Z | 2022-06-20T21:13:33Z |
| mal-2022-3040 | Malicious code in finastra-nodejs-libs (npm) | 2022-06-20T21:13:32Z | 2022-06-20T21:13:33Z |
| mal-2022-3504 | Malicious code in gulp-csslint-lesss-reporter (npm) | 2022-06-20T21:13:32Z | 2022-06-20T21:13:32Z |
| mal-2022-2986 | Malicious code in fds-test (npm) | 2022-06-20T21:13:33Z | 2022-06-20T21:13:34Z |
| mal-2022-3038 | Malicious code in finastra (npm) | 2022-06-20T21:13:33Z | 2022-06-20T21:13:34Z |
| mal-2022-3041 | Malicious code in finastra.design (npm) | 2022-06-20T21:13:33Z | 2022-06-20T21:13:33Z |
| mal-2022-2562 | Malicious code in donate-backend (npm) | 2022-06-20T21:13:34Z | 2022-06-20T21:13:35Z |
| mal-2022-3019 | Malicious code in ffdc-api-security (npm) | 2022-06-20T21:13:34Z | 2022-06-20T21:13:34Z |
| mal-2022-3020 | Malicious code in ffdc-corporate-banking-sample (npm) | 2022-06-20T21:13:34Z | 2022-06-20T21:13:34Z |
| mal-2022-4351 | Malicious code in loblaws-product-listing (npm) | 2022-06-20T21:13:34Z | 2022-06-20T21:13:35Z |
| mal-2022-4802 | Malicious code in nestjs-proxy (npm) | 2022-06-20T21:13:34Z | 2022-06-20T21:13:34Z |
| mal-2022-4903 | Malicious code in nodejs-docs-samples-iot-mqtt-example (npm) | 2022-06-20T21:13:34Z | 2022-06-20T21:13:35Z |
| mal-2022-1176 | Malicious code in auth0-react-03-calling-an-api (npm) | 2022-06-20T21:13:35Z | 2022-06-20T21:13:35Z |
| mal-2022-4833 | Malicious code in nextjs-accelerator (npm) | 2022-06-20T21:13:35Z | 2022-06-20T21:13:35Z |
| mal-2022-4835 | Malicious code in nf-data-explorer-2 (npm) | 2022-06-20T21:13:35Z | 2022-06-20T21:13:36Z |
| mal-2022-2982 | Malicious code in fckez.fckez (npm) | 2022-06-20T21:13:36Z | 2022-06-20T21:13:37Z |
| mal-2022-4352 | Malicious code in loblawsdigitalflyer (npm) | 2022-06-20T21:13:36Z | 2022-06-20T21:13:36Z |
| mal-2022-4563 | Malicious code in merlin-ui (npm) | 2022-06-20T21:13:36Z | 2022-06-20T21:13:36Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-0343 | Fortinet FortiOS: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-02-11T23:00:00.000+00:00 | 2024-02-11T23:00:00.000+00:00 |
| wid-sec-w-2024-0344 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-02-11T23:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2024-0345 | Linux Kernel: Mehrere Schwachstellen | 2024-02-11T23:00:00.000+00:00 | 2025-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-0346 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2024-02-11T23:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2024-0347 | Microsoft Windows Defender: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-02-11T23:00:00.000+00:00 | 2024-02-11T23:00:00.000+00:00 |
| wid-sec-w-2024-0348 | Dell BSAFE SSL-J: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-02-11T23:00:00.000+00:00 | 2024-02-11T23:00:00.000+00:00 |
| wid-sec-w-2024-0349 | Autodesk AutoCAD: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-02-12T23:00:00.000+00:00 | 2024-06-02T22:00:00.000+00:00 |
| wid-sec-w-2024-0350 | Moodle: Schwachstelle ermöglicht Manipulation von Dateien | 2024-02-12T23:00:00.000+00:00 | 2024-02-12T23:00:00.000+00:00 |
| wid-sec-w-2024-0351 | Red Hat OpenShift und Apache Camel: Schwachstelle ermöglicht Denial of Service | 2024-02-12T23:00:00.000+00:00 | 2024-05-30T22:00:00.000+00:00 |
| wid-sec-w-2024-0353 | QNAP NAS: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-02-12T23:00:00.000+00:00 | 2024-02-22T23:00:00.000+00:00 |
| wid-sec-w-2024-0354 | OpenSC: Schwachstelle ermöglicht Manipulation von Dateien | 2024-02-12T23:00:00.000+00:00 | 2024-12-29T23:00:00.000+00:00 |
| wid-sec-w-2024-0355 | SAP Software: Mehrere Schwachstellen | 2024-02-12T23:00:00.000+00:00 | 2024-02-12T23:00:00.000+00:00 |
| wid-sec-w-2024-0356 | Siemens SIMATIC WinCC: Mehrere Schwachstellen ermöglichen Denial of Service | 2024-02-12T23:00:00.000+00:00 | 2024-02-12T23:00:00.000+00:00 |
| wid-sec-w-2024-0357 | TYPO3 Core und TYPO3 Extension: Mehrere Schwachstellen | 2024-02-12T23:00:00.000+00:00 | 2024-02-12T23:00:00.000+00:00 |
| wid-sec-w-2024-0358 | Grafana: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-02-13T23:00:00.000+00:00 | 2025-02-13T23:00:00.000+00:00 |
| wid-sec-w-2024-0359 | Microsoft Exchange Server: Schwachstelle ermöglicht Privilegieneskalation | 2024-02-13T23:00:00.000+00:00 | 2024-02-14T23:00:00.000+00:00 |
| wid-sec-w-2024-0360 | Dell BIOS: Schwachstelle ermöglicht Denial of Service | 2024-02-13T23:00:00.000+00:00 | 2024-02-13T23:00:00.000+00:00 |
| wid-sec-w-2024-0361 | Adobe FrameMaker: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2024-02-13T23:00:00.000+00:00 | 2024-02-13T23:00:00.000+00:00 |
| wid-sec-w-2024-0362 | Microsoft Azure: Mehrere Schwachstellen | 2024-02-13T23:00:00.000+00:00 | 2024-02-13T23:00:00.000+00:00 |
| wid-sec-w-2024-0363 | HP BIOS für Workstation: Schwachstelle ermöglicht Privilegieneskalation | 2024-02-13T23:00:00.000+00:00 | 2024-02-13T23:00:00.000+00:00 |
| wid-sec-w-2024-0364 | FreeBSD Project FreeBSD OS: Schwachstelle ermöglicht Offenlegung von Informationen | 2024-02-13T23:00:00.000+00:00 | 2024-02-13T23:00:00.000+00:00 |
| wid-sec-w-2024-0365 | Microsoft Developer Tools: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-02-13T23:00:00.000+00:00 | 2024-04-02T22:00:00.000+00:00 |
| wid-sec-w-2024-0366 | Intel Thunderbolt DCH Drivers: Mehrere Schwachstellen | 2024-02-13T23:00:00.000+00:00 | 2024-02-13T23:00:00.000+00:00 |
| wid-sec-w-2024-0367 | Microsoft GitHub Enterprise: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2024-02-13T23:00:00.000+00:00 | 2024-02-14T23:00:00.000+00:00 |
| wid-sec-w-2024-0368 | HP BIOS: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2024-02-13T23:00:00.000+00:00 | 2024-02-13T23:00:00.000+00:00 |
| wid-sec-w-2024-0369 | AMD Prozessor: Mehrere Schwachstellen | 2024-02-13T23:00:00.000+00:00 | 2024-07-03T22:00:00.000+00:00 |
| wid-sec-w-2024-0370 | Google Chrome: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2024-02-13T23:00:00.000+00:00 | 2024-02-13T23:00:00.000+00:00 |
| wid-sec-w-2024-0371 | AMD SEV-SNP Firmware für Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2024-02-13T23:00:00.000+00:00 | 2024-12-15T23:00:00.000+00:00 |
| wid-sec-w-2024-0372 | Intel OpenBMC Firmware: Mehrere Schwachstellen | 2024-02-13T23:00:00.000+00:00 | 2024-02-13T23:00:00.000+00:00 |
| wid-sec-w-2024-0373 | Intel Extreme Tuning Utility (XTU): Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2024-02-13T23:00:00.000+00:00 | 2024-02-13T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2023-43786 | Libx11: stack exhaustion from infinite recursion in putsubimage() | 2023-10-01T00:00:00.000Z | 2023-10-16T00:00:00.000Z |
| msrc_cve-2023-43787 | Libx11: integer overflow in xcreateimage() leading to a heap overflow | 2023-10-01T00:00:00.000Z | 2023-10-16T00:00:00.000Z |
| msrc_cve-2023-43788 | Libxpm: out of bounds read in xpmcreatexpmimagefrombuffer() | 2023-10-01T00:00:00.000Z | 2023-10-17T00:00:00.000Z |
| msrc_cve-2023-43789 | Libxpm: out of bounds read on xpm with corrupted colormap | 2023-10-01T00:00:00.000Z | 2023-10-17T00:00:00.000Z |
| msrc_cve-2023-43804 | `Cookie` HTTP header isn't stripped on cross-origin redirects | 2023-10-01T00:00:00.000Z | 2026-02-20T23:12:56.000Z |
| msrc_cve-2023-43907 | OptiPNG v0.7.7 was discovered to contain a global buffer overflow via the 'buffer' variable at gifread.c. | 2023-10-01T00:00:00.000Z | 2025-05-15T00:00:00.000Z |
| msrc_cve-2023-45133 | Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code | 2023-10-01T00:00:00.000Z | 2026-02-18T15:01:49.000Z |
| msrc_cve-2023-45142 | OpenTelemetry-Go Contrib has DoS vulnerability in otelhttp due to unbound cardinality metrics | 2023-10-01T00:00:00.000Z | 2026-02-18T02:55:42.000Z |
| msrc_cve-2023-45143 | Undici's cookie header not cleared on cross-origin redirect in fetch | 2023-10-01T00:00:00.000Z | 2023-10-16T00:00:00.000Z |
| msrc_cve-2023-45145 | Redis Unix-domain socket may have be exposed with the wrong permissions for a short time window. | 2023-10-01T00:00:00.000Z | 2025-10-01T23:11:32.000Z |
| msrc_cve-2023-45322 | libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor's position is "I don't think these issues are critical enough to warrant a CVE ID ... because an attacker typically can't control when memory allocations fail." | 2023-10-01T00:00:00.000Z | 2026-02-18T01:01:48.000Z |
| msrc_cve-2023-45802 | Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST | 2023-10-01T00:00:00.000Z | 2025-05-15T00:00:00.000Z |
| msrc_cve-2023-45803 | Request body not stripped after redirect in urllib3 | 2023-10-01T00:00:00.000Z | 2026-02-20T23:15:38.000Z |
| msrc_cve-2023-45853 | MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename comment or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version and exposes the applicable MiniZip code through its compress API. | 2023-10-01T00:00:00.000Z | 2026-02-18T03:02:45.000Z |
| msrc_cve-2023-45862 | An issue was discovered in drivers/usb/storage/ene_ub6250.c for the ENE UB6250 reader driver in the Linux kernel before 6.2.5. An object could potentially extend beyond the end of an allocation. | 2023-10-01T00:00:00.000Z | 2023-10-20T00:00:00.000Z |
| msrc_cve-2023-45863 | An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write. | 2023-10-01T00:00:00.000Z | 2023-10-20T00:00:00.000Z |
| msrc_cve-2023-45871 | An issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the IGB driver in the Linux kernel before 6.5.3. A buffer size may not be adequate for frames larger than the MTU. | 2023-10-01T00:00:00.000Z | 2023-10-20T00:00:00.000Z |
| msrc_cve-2023-45898 | The Linux kernel before 6.5.4 has an es1 use-after-free in fs/ext4/extents_status.c related to ext4_es_insert_extent. | 2023-10-01T00:00:00.000Z | 2023-10-20T00:00:00.000Z |
| msrc_cve-2023-46118 | Denial of Service by publishing large messages over the HTTP API | 2023-10-01T00:00:00.000Z | 2026-02-18T01:48:29.000Z |
| msrc_cve-2023-46129 | xkeys Seal encryption used fixed key for all encryption | 2023-10-01T00:00:00.000Z | 2026-02-18T02:09:47.000Z |
| msrc_cve-2023-46136 | Werkzeug vulnerable to high resource usage when parsing multipart/form-data containing a large part with CR/LF character at the beginning | 2023-10-01T00:00:00.000Z | 2026-02-18T01:32:43.000Z |
| msrc_cve-2023-46137 | twisted.web has disordered HTTP pipeline response | 2023-10-01T00:00:00.000Z | 2025-03-27T00:00:00.000Z |
| msrc_cve-2023-46228 | zchunk before 1.3.2 has multiple integer overflows via malformed zchunk files to lib/comp/comp.c lib/comp/zstd/zstd.c lib/dl/multipart.c or lib/header.c. | 2023-10-01T00:00:00.000Z | 2023-10-23T00:00:00.000Z |
| msrc_cve-2023-46234 | browserify-sign vulnerable via an upper bound check issue in `dsaVerify` that leads to a signature forgery attack | 2023-10-01T00:00:00.000Z | 2023-10-31T00:00:00.000Z |
| msrc_cve-2023-46246 | Integer Overflow in :history command in Vim | 2023-10-01T00:00:00.000Z | 2023-10-30T00:00:00.000Z |
| msrc_cve-2023-46316 | In buc Traceroute 2.0.12 through 2.1.2 before 2.1.3 the wrapper scripts do not properly parse command lines. | 2023-10-01T00:00:00.000Z | 2023-11-02T00:00:00.000Z |
| msrc_cve-2023-46752 | An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data leading to a crash. | 2023-10-01T00:00:00.000Z | 2026-02-18T02:14:23.000Z |
| msrc_cve-2023-46753 | An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur for a crafted BGP UPDATE message without mandatory attributes e.g. one with only an unknown transit attribute. | 2023-10-01T00:00:00.000Z | 2026-02-18T02:11:25.000Z |
| msrc_cve-2023-46813 | An issue was discovered in the Linux kernel before 6.5.9 exploitable by local users with userspace access to MMIO registers. Incorrect access checking in the #VC handler and instruction emulation of the SEV-ES emulation of MMIO accesses could lead to arbitrary write access to kernel memory (and thus privilege escalation). This depends on a race condition through which userspace can replace an instruction before the #VC handler reads it. | 2023-10-01T00:00:00.000Z | 2026-02-19T01:03:52.000Z |
| msrc_cve-2023-46852 | In Memcached before 1.6.22 a buffer overflow exists when processing multiget requests in proxy mode if there are many spaces after the "get" substring. | 2023-10-01T00:00:00.000Z | 2026-02-18T01:07:52.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:11657-1 | libruby2_7-2_7-2.7.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11658-1 | libruby3_0-3_0-3.0.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11659-1 | singularity-3.8.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11660-1 | bind-9.16.20-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11661-1 | Botan-2.18.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11662-1 | kernel-devel-5.15.6-1.3 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11663-1 | libfreebl3-3.73-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11664-1 | runc-1.0.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11665-1 | parsec-0.8.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11666-1 | log4j-2.13.2-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11667-1 | velero-1.7.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11668-1 | velero-plugin-for-microsoft-azure-1.3.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11669-1 | MozillaFirefox-95.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11670-1 | MozillaThunderbird-91.4.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11671-1 | go1.16-1.16.12-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11672-1 | go1.17-1.17.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11673-1 | libmysofa-devel-1.2.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11674-1 | podman-3.4.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11675-1 | janus-gateway-0.11.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11676-1 | junit-4.13.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11677-1 | privoxy-3.0.33-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11678-1 | velocity-custom-parser-example-2.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11679-1 | kubernetes1.22-apiserver-1.22.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11680-1 | libvpx-devel-1.11.0-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11681-1 | log4j-2.16.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11682-1 | chainsaw-1.2.17-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11683-1 | logback-1.2.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11684-1 | libmruby3-3.0.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11685-1 | xorg-x11-server-21.1.2-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:11686-1 | libZXing1-1.2.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2016:0328 | Red Hat Security Advisory: openstack-swift security update | 2016-03-01T07:02:03+00:00 | 2025-11-21T17:55:09+00:00 |
| rhsa-2016:0306 | Red Hat Security Advisory: openssl security update | 2016-03-01T14:44:56+00:00 | 2025-11-21T17:55:07+00:00 |
| rhsa-2016:0304 | Red Hat Security Advisory: openssl security update | 2016-03-01T14:45:06+00:00 | 2025-11-21T17:55:06+00:00 |
| rhsa-2016:0303 | Red Hat Security Advisory: openssl security update | 2016-03-01T14:45:41+00:00 | 2025-11-21T17:55:06+00:00 |
| rhsa-2016:0302 | Red Hat Security Advisory: openssl security update | 2016-03-01T14:45:53+00:00 | 2025-11-21T17:55:06+00:00 |
| rhsa-2016:0305 | Red Hat Security Advisory: openssl security update | 2016-03-01T15:09:45+00:00 | 2025-11-21T17:55:07+00:00 |
| rhsa-2016:0301 | Red Hat Security Advisory: openssl security update | 2016-03-01T16:07:25+00:00 | 2025-11-21T17:55:05+00:00 |
| rhsa-2016:0347 | Red Hat Security Advisory: postgresql security update | 2016-03-02T16:21:51+00:00 | 2025-11-21T17:55:10+00:00 |
| rhsa-2016:0348 | Red Hat Security Advisory: rh-postgresql94-postgresql security update | 2016-03-02T16:46:27+00:00 | 2025-11-21T17:55:10+00:00 |
| rhsa-2016:0349 | Red Hat Security Advisory: postgresql92-postgresql security update | 2016-03-02T17:02:03+00:00 | 2025-11-21T17:55:11+00:00 |
| rhsa-2016:0346 | Red Hat Security Advisory: postgresql security update | 2016-03-02T17:16:40+00:00 | 2025-11-21T17:55:09+00:00 |
| rhsa-2016:0351 | Red Hat Security Advisory: kubernetes security update | 2016-03-03T16:22:22+00:00 | 2026-03-23T00:57:48+00:00 |
| rhsa-2016:0352 | Red Hat Security Advisory: openstack-glance security update | 2016-03-03T19:31:00+00:00 | 2025-11-21T17:55:13+00:00 |
| rhsa-2016:0354 | Red Hat Security Advisory: openstack-glance security update | 2016-03-03T19:45:25+00:00 | 2025-11-21T17:55:12+00:00 |
| rhsa-2016:0358 | Red Hat Security Advisory: openstack-glance security update | 2016-03-07T00:58:40+00:00 | 2025-11-21T17:55:12+00:00 |
| rhsa-2016:0359 | Red Hat Security Advisory: chromium-browser security update | 2016-03-07T03:22:13+00:00 | 2026-01-13T21:10:28+00:00 |
| rhsa-2016:0360 | Red Hat Security Advisory: python-django security update | 2016-03-08T06:35:15+00:00 | 2025-11-21T17:55:13+00:00 |
| rhsa-2016:0369 | Red Hat Security Advisory: rabbitmq-server security and bug fix update | 2016-03-08T22:52:44+00:00 | 2025-11-21T17:55:15+00:00 |
| rhsa-2016:0368 | Red Hat Security Advisory: rabbitmq-server security update | 2016-03-08T22:52:54+00:00 | 2025-11-21T17:55:15+00:00 |
| rhsa-2016:0367 | Red Hat Security Advisory: rabbitmq-server security and bugfix update | 2016-03-08T22:53:02+00:00 | 2025-11-21T17:55:14+00:00 |
| rhsa-2016:0366 | Red Hat Security Advisory: openstack-nova security update | 2016-03-08T22:53:10+00:00 | 2025-11-21T17:55:19+00:00 |
| rhsa-2016:0365 | Red Hat Security Advisory: openstack-nova security update | 2016-03-08T22:53:17+00:00 | 2025-11-21T17:55:19+00:00 |
| rhsa-2016:0364 | Red Hat Security Advisory: openstack-nova security update | 2016-03-08T22:53:25+00:00 | 2025-11-21T17:55:17+00:00 |
| rhsa-2016:0363 | Red Hat Security Advisory: openstack-nova security update | 2016-03-08T22:53:35+00:00 | 2025-11-21T17:55:13+00:00 |
| rhsa-2016:0371 | Red Hat Security Advisory: nss security update | 2016-03-09T03:40:03+00:00 | 2025-11-21T17:55:16+00:00 |
| rhsa-2016:0370 | Red Hat Security Advisory: nss-util security update | 2016-03-09T03:54:33+00:00 | 2025-11-21T17:55:15+00:00 |
| rhsa-2016:0372 | Red Hat Security Advisory: openssl098e security update | 2016-03-09T04:08:29+00:00 | 2025-11-21T17:55:16+00:00 |
| rhsa-2016:0373 | Red Hat Security Advisory: firefox security update | 2016-03-09T05:11:19+00:00 | 2026-01-13T22:15:05+00:00 |
| rhsa-2016:0379 | Red Hat Security Advisory: rhev-hypervisor security, bug fix and enhancement update | 2016-03-09T14:10:28+00:00 | 2025-11-21T17:55:18+00:00 |
| rhsa-2016:0426 | Red Hat Security Advisory: redhat-support-plugin-rhev security, bug fix and enhancement update | 2016-03-09T20:20:37+00:00 | 2025-11-21T17:55:18+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2019:3379-1 | Security update for the Linux Kernel | 2019-12-21T10:51:50Z | 2019-12-21T10:51:50Z |
| suse-su-2019:3381-1 | Security update for the Linux Kernel | 2019-12-23T09:53:14Z | 2019-12-23T09:53:14Z |
| suse-su-2019:3385-1 | Security update for slurm | 2019-12-23T15:57:32Z | 2019-12-23T15:57:32Z |
| suse-su-2019:3386-1 | Security update for shibboleth-sp | 2019-12-23T15:57:56Z | 2019-12-23T15:57:56Z |
| suse-su-2019:3389-1 | Security update for the Linux Kernel | 2019-12-27T12:32:44Z | 2019-12-27T12:32:44Z |
| suse-su-2019:3390-1 | Security update for dia | 2019-12-27T12:33:09Z | 2019-12-27T12:33:09Z |
| suse-su-2019:3391-1 | Security update for dia | 2019-12-27T12:33:18Z | 2019-12-27T12:33:18Z |
| suse-su-2019:3392-1 | Security update for libgcrypt | 2019-12-27T12:33:32Z | 2019-12-27T12:33:32Z |
| suse-su-2019:3393-1 | Security update for python-azure-agent | 2019-12-30T13:04:35Z | 2019-12-30T13:04:35Z |
| suse-su-2019:3394-1 | Security update for python-azure-agent | 2019-12-30T13:04:45Z | 2019-12-30T13:04:45Z |
| suse-su-2019:3395-1 | Security update for mozilla-nspr, mozilla-nss | 2019-12-30T13:05:21Z | 2019-12-30T13:05:21Z |
| suse-su-2020:0001-1 | Security update for java-1_8_0-ibm | 2020-01-02T08:47:13Z | 2020-01-02T08:47:13Z |
| suse-su-2020:0002-1 | Security update for openssl-1_1 | 2020-01-02T08:50:08Z | 2020-01-02T08:50:08Z |
| suse-su-2020:0016-1 | Security update for virglrenderer | 2020-01-07T10:18:41Z | 2020-01-07T10:18:41Z |
| suse-su-2020:0017-1 | Security update for virglrenderer | 2020-01-07T10:19:27Z | 2020-01-07T10:19:27Z |
| suse-su-2020:0024-1 | Security update for java-1_8_0-ibm | 2020-01-07T12:53:18Z | 2020-01-07T12:53:18Z |
| suse-su-2020:0025-1 | Security update for java-1_8_0-openjdk | 2020-01-07T12:53:58Z | 2020-01-07T12:53:58Z |
| suse-su-2020:0026-1 | Security update for sysstat | 2020-01-07T12:54:07Z | 2020-01-07T12:54:07Z |
| suse-su-2020:0028-1 | Security update for openssl-1_0_0 | 2020-01-07T14:11:19Z | 2020-01-07T14:11:19Z |
| suse-su-2020:0029-1 | Security update for tomcat | 2020-01-07T14:44:20Z | 2020-01-07T14:44:20Z |
| suse-su-2020:0035-1 | Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork | 2020-01-08T08:06:36Z | 2020-01-08T08:06:36Z |
| suse-su-2020:14263-1 | Security update for java-1_7_1-ibm | 2020-01-08T12:06:07Z | 2020-01-08T12:06:07Z |
| suse-su-2020:0043-1 | Security update for nodejs8 | 2020-01-08T13:55:19Z | 2020-01-08T13:55:19Z |
| suse-su-2020:0045-1 | Security update for git | 2020-01-08T13:57:05Z | 2020-01-08T13:57:05Z |
| suse-su-2020:14265-1 | Security update for java-1_7_0-ibm | 2020-01-08T15:15:20Z | 2020-01-08T15:15:20Z |
| suse-su-2020:0050-1 | Security update for mariadb | 2020-01-09T08:34:59Z | 2020-01-09T08:34:59Z |
| suse-su-2020:0051-1 | Security update for java-1_7_1-ibm | 2020-01-09T08:36:52Z | 2020-01-09T08:36:52Z |
| suse-su-2020:0053-1 | Security update for log4j | 2020-01-09T10:16:33Z | 2020-01-09T10:16:33Z |
| suse-su-2020:0054-1 | Security update for log4j | 2020-01-09T10:17:47Z | 2020-01-09T10:17:47Z |
| suse-su-2020:14266-1 | Security update for apache2-mod_perl | 2020-01-09T10:18:03Z | 2020-01-09T10:18:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tomcat-2026-34483 | Apache Tomcat: Incomplete escaping of JSON access logs | 2026-04-13T10:19:58.030Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-34487 | Apache Tomcat: Cloud membership for clustering component exposed the Kubernetes bearer token | 2026-04-13T10:20:00.791Z | 2026-04-13T10:42:00.723Z |
| bit-tomcat-2026-34500 | Apache Tomcat: OCSP checks sometimes soft-fail with FFM even when soft-fail is disabled | 2026-04-13T10:20:02.205Z | 2026-04-13T10:42:00.723Z |
| bit-wiremock-2023-50069 | 2026-04-13T11:50:15.583Z | 2026-04-13T12:09:46.643Z | |
| bit-nifi-2024-45477 | Apache NiFi: Improper Neutralization of Input in Parameter Description | 2026-04-13T14:17:18.796Z | 2026-04-13T14:44:23.860Z |
| bit-wiremock-2023-41327 | Controlled SSRF through URL in the WireMock | 2026-04-13T15:59:58.176Z | 2026-04-13T16:23:32.396Z |
| bit-wiremock-2023-41329 | Domain restrictions bypass via DNS Rebinding in WireMock and WireMock Studio | 2026-04-13T16:00:00.480Z | 2026-04-13T16:23:32.396Z |
| bit-tomcat-2026-29146 | Apache Tomcat: EncryptInterceptor vulnerable to padding oracle attack by default | 2026-04-13T16:01:34.700Z | 2026-04-13T16:23:32.396Z |
| bit-authentik-2022-23555 | authentik vulnerable to Improper Authentication via invitation URL token reuse | 2026-04-16T23:35:57.484Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2022-46145 | authentik vulnerable to unauthorized user creation and potential account takeover | 2026-04-16T23:35:59.036Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2022-46172 | authentik allows existing authenticated users to create arbitrary accounts | 2026-04-16T23:36:00.542Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2023-26481 | Insufficient user check in FlowTokens by Email stage | 2026-04-16T23:36:01.864Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2023-36456 | Authentik lacks Proxy IP headers validation | 2026-04-16T23:36:03.215Z | 2026-04-17T00:10:47.507Z |
| bit-apisix-2026-31908 | Apache APISIX: forward auth plugin allows header injection | 2026-04-16T23:36:03.898Z | 2026-04-17T09:12:55.244Z |
| bit-authentik-2023-39522 | Username enumeration attack in goauthentik | 2026-04-16T23:36:04.816Z | 2026-04-17T00:10:47.507Z |
| bit-apisix-2026-31923 | Apache APISIX: Openid-connect `tls_verify` field is disabled by default | 2026-04-16T23:36:05.480Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2023-46249 | authentik potential installation takeover when default admin user is deleted | 2026-04-16T23:36:06.215Z | 2026-04-17T00:10:47.507Z |
| bit-apisix-2026-31924 | Apache APISIX: Plugin tencent-cloud-cls log export uses plaintext HTTP | 2026-04-16T23:36:06.924Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2023-48228 | OAuth2: PKCE can be fully circumvented | 2026-04-16T23:36:07.745Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-11623 | Stored XSS in authentik | 2026-04-16T23:36:09.282Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-21637 | XSS in Authentik via JavaScript-URI as Redirect URI and form_post Response Mode | 2026-04-16T23:36:10.878Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-23647 | PKCE downgrade attack in Authentik | 2026-04-16T23:36:12.438Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-37905 | Improper Access Control and Incorrect Authorization in github.com/goauthentik/authentik | 2026-04-16T23:36:13.946Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-38371 | Insufficient access control for OAuth2 Device Code flow in authentik | 2026-04-16T23:36:15.228Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-42490 | authentik has Insufficient Authorization for several API endpoints | 2026-04-16T23:36:16.647Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-47070 | authentik vulnerable to password authentication bypass via X-Forwarded-For HTTP header | 2026-04-16T23:36:17.967Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-47077 | authentik cross-provider token validation problems | 2026-04-16T23:36:19.464Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-52287 | authentik performs insufficient validation of OAuth scopes | 2026-04-16T23:36:20.916Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-52289 | authentik has an insecure default configuration for OAuth2 Redirect URIs | 2026-04-16T23:36:22.514Z | 2026-04-17T00:10:47.507Z |
| bit-authentik-2024-52307 | authentik allows a timing attack due to missing constant time comparison for metrics view | 2026-04-16T23:36:24.031Z | 2026-04-17T00:10:47.507Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2011-avi-404 | Vulnérabilités dans les produits Cisco SA 500 Series Security Appliances | 2011-07-21T00:00:00.000000 | 2011-07-21T00:00:00.000000 |
| certa-2011-avi-405 | Vulnérabilité dans Joomla! | 2011-07-21T00:00:00.000000 | 2011-07-29T00:00:00.000000 |
| certa-2011-avi-406 | Vulnérabilité dans Cisco ASR 9000 Series Routers | 2011-07-21T00:00:00.000000 | 2011-07-21T00:00:00.000000 |
| certa-2011-avi-408 | Vulnérabilité dans Google Picasa | 2011-07-21T00:00:00.000000 | 2011-07-21T00:00:00.000000 |
| certa-2011-avi-409 | Vulnérabilités dans Foxit Reader | 2011-07-22T00:00:00.000000 | 2011-07-22T00:00:00.000000 |
| certa-2011-avi-410 | Vulnérabilités dans SquirrelMail | 2011-07-25T00:00:00.000000 | 2011-07-25T00:00:00.000000 |
| certa-2011-avi-411 | Vulnérabilités dans phpMyAdmin | 2011-07-26T00:00:00.000000 | 2011-07-26T00:00:00.000000 |
| certa-2011-avi-412 | Vulnérabilité dans Apple iOS | 2011-07-26T00:00:00.000000 | 2011-07-26T00:00:00.000000 |
| certa-2011-avi-413 | Vulnérabilités dans iWork | 2011-07-26T00:00:00.000000 | 2011-07-26T00:00:00.000000 |
| certa-2011-avi-414 | Vulnérabilités dans Nagios | 2011-07-27T00:00:00.000000 | 2011-07-27T00:00:00.000000 |
| certa-2011-avi-415 | Vulnérabilité dans ClamAV | 2011-07-27T00:00:00.000000 | 2011-07-27T00:00:00.000000 |
| certa-2011-avi-416 | Vulnérabilités dans Samba (SWAT) | 2011-07-28T00:00:00.000000 | 2011-08-23T00:00:00.000000 |
| certa-2011-avi-417 | Vulnérabilité dans EMC Data Protection Advisor | 2011-07-29T00:00:00.000000 | 2011-07-29T00:00:00.000000 |
| certa-2011-avi-418 | Multiples vulnérabilités dans EMC Captiva eInput | 2011-07-29T00:00:00.000000 | 2011-07-29T00:00:00.000000 |
| certa-2011-avi-419 | Vulnérabilité dans des produits Citrix | 2011-07-29T00:00:00.000000 | 2011-07-29T00:00:00.000000 |
| certa-2011-avi-420 | Vulnérabilités dans IBM Lotus Symphony | 2011-07-29T00:00:00.000000 | 2011-07-29T00:00:00.000000 |
| certa-2011-avi-421 | Vulnérabilité dans Drupal | 2011-07-29T00:00:00.000000 | 2011-07-29T00:00:00.000000 |
| certa-2011-avi-422 | Vulnérabilité dans Cisco TelePresence | 2011-08-01T00:00:00.000000 | 2011-08-01T00:00:00.000000 |
| certa-2011-avi-423 | Multiples vulnérabilités dans VMware ESX | 2011-08-01T00:00:00.000000 | 2011-08-01T00:00:00.000000 |
| certa-2011-avi-424 | Vulnérabilité dans Citrix XenApp et XenDesktop | 2011-08-01T00:00:00.000000 | 2011-08-01T00:00:00.000000 |
| certa-2011-avi-425 | Vulnérabilités dans HP Network Automation | 2011-08-01T00:00:00.000000 | 2011-08-01T00:00:00.000000 |
| certa-2011-avi-426 | Multiples vulnérabilités dans SAP NetWeaver | 2011-08-01T00:00:00.000000 | 2011-08-01T00:00:00.000000 |
| certa-2011-avi-427 | Multiples vulnérabilités dans HP SiteScope | 2011-08-01T00:00:00.000000 | 2011-08-01T00:00:00.000000 |
| certa-2011-avi-428 | Multiples vulnérabilités dans Google Chrome | 2011-08-03T00:00:00.000000 | 2011-08-03T00:00:00.000000 |
| certa-2011-avi-429 | Vulnérabilités dans Apple QuickTime | 2011-08-04T00:00:00.000000 | 2011-08-18T00:00:00.000000 |
| certa-2011-avi-430 | Multiples vulnérabilités dans Bugzilla | 2011-08-05T00:00:00.000000 | 2011-08-05T00:00:00.000000 |
| certa-2011-avi-431 | Vulnérabilités dans Moodle | 2011-08-09T00:00:00.000000 | 2011-08-09T00:00:00.000000 |
| certa-2011-avi-432 | Multiples vulnérabilités dans TYPO3 | 2011-08-09T00:00:00.000000 | 2011-08-09T00:00:00.000000 |
| certa-2011-avi-433 | Multiples vulnérabilités dans Internet Explorer | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| certa-2011-avi-434 | Vulnérabilités dans le serveur Windows DNS | 2011-08-10T00:00:00.000000 | 2011-08-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-05160 | WordPress SQL注入漏洞(CNVD-2015-05160) | 2015-08-08 | 2015-08-10 |
| cnvd-2015-05161 | Linux UDF文件系统拒绝服务漏洞 | 2015-08-08 | 2015-08-10 |
| cnvd-2015-05162 | Linux MD驱动初始化内存泄露漏洞 | 2015-08-08 | 2015-08-10 |
| cnvd-2015-05163 | FreeBSD routed(8) RIP查询处理拒绝服务漏洞 | 2015-08-08 | 2015-08-10 |
| cnvd-2015-05164 | Apache Subversion敏感信息泄露漏洞 | 2015-08-08 | 2015-08-10 |
| cnvd-2015-05165 | Apache Subversion路径名敏感信息泄露漏洞 | 2015-08-08 | 2015-08-10 |
| cnvd-2015-05166 | Apple OS X DYLD_PRINT_TO_FILE环境变量校验本地ROOT权限获取漏洞 | 2015-08-08 | 2015-08-10 |
| cnvd-2015-05167 | GE Healthcare Discovery 530C内置账户漏洞 | 2015-08-08 | 2015-08-10 |
| cnvd-2015-05168 | GE Healthcare Centricity PACS Server内置账户漏洞 | 2015-08-08 | 2015-08-10 |
| cnvd-2015-05169 | GE Healthcare Optima内置账户漏洞 | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05170 | GE Healthcare Centricity PACS Workstation内置账户漏洞 | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05171 | GE Healthcare CADStream Server内置账户漏洞 | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05172 | GE Healthcare Optima MR360内置账户漏洞 | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05173 | GE Healthcare Optima MR360 HIPAA配置接口内置账户漏洞 | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05174 | GE Healthcare Centricity PACS-IW内置账户漏洞(CNVD-2015-05174) | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05175 | GE Healthcare Centricity Analytics Server内置账户漏洞 | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05176 | GE Healthcare Revolution XQ/i内置账户漏洞 | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05177 | GE Healthcare Precision MPi内置账户漏洞 | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05178 | GE Healthcare Centricity PACS-IW内置账户漏洞 | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05179 | Foxit Reader XFA Form处理目标时拒绝服务漏洞 | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05180 | Foxit Reader PDF Creator插件远程代码执行漏洞 | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05181 | Dell NetVault Backup拒绝服务漏洞 | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05182 | Red Hat JBoss Operations Network HTTP错误页跨站脚本漏洞 | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05183 | Juniper Pulse Secure TCP Hardware Acceleration用户数据访问漏洞 | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05184 | OpenBSD TCP资源错误拒绝服务漏洞 | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05185 | OpenBSD patch任意命令执行漏洞 | 2015-08-08 | 2015-08-11 |
| cnvd-2015-05188 | Mozilla Firefox OS访问限制绕过漏洞 | 2015-08-10 | 2015-08-11 |
| cnvd-2015-05189 | Mozilla Firefox OS拒绝服务漏洞 | 2015-08-10 | 2015-08-11 |
| cnvd-2015-05190 | Mozilla Firefox OS跨站脚本漏洞(CNVD-2015-05190) | 2015-08-10 | 2015-08-11 |
| cnvd-2015-05191 | Mozilla Firefox OS安全机制绕过漏洞 | 2015-08-10 | 2015-08-11 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-07599 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07600 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07601 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07602 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07603 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07604 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07605 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07606 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07607 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07608 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07609 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07610 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07611 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07612 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07613 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07614 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07615 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07616 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07617 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07618 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07619 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07620 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07621 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07622 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07623 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07624 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07625 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07626 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07627 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| bdu:2015-07628 | Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышл… | 28.04.2015 | 28.11.2016 |
| ID | Description | Updated |
|---|---|---|
| var-202212-1729 | The APDFL.dll contains an out-of-bounds write past the fixed-length heap-based buffer w… | 2023-12-18T11:25:22.240000Z |
| var-202202-0153 | A vulnerability has been identified in JT2Go (All versions < V13.2.0.7), Solid Edge SE202… | 2023-12-18T11:26:01.358000Z |
| var-202102-0321 | A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visua… | 2023-12-18T11:27:24.516000Z |
| var-202112-0799 | A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visua… | 2023-12-18T11:27:24.638000Z |
| var-202102-0329 | A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visua… | 2023-12-18T11:27:42.503000Z |
| var-202209-0664 | Affected devices improperly handle partial HTTP requests which makes them vulnerable to s… | 2023-12-18T11:27:43.168000Z |
| var-202107-1428 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza… | 2023-12-18T11:28:12.295000Z |
| var-202112-0806 | A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visua… | 2023-12-18T11:28:55.669000Z |
| var-202211-0307 | A vulnerability has been identified in JT2Go (All versions < V14.1.0.4), Teamcenter Visu… | 2023-12-18T11:29:39.580000Z |
| var-202107-1408 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza… | 2023-12-18T11:29:43.797000Z |
| var-202102-0319 | A vulnerability has been identified in JT2Go (All versions < V13.1.0.2), Teamcenter Visua… | 2023-12-18T11:30:16.566000Z |
| var-202109-1705 | A vulnerability has been identified in Teamcenter V12.4 (All versions < V12.4.0.8), Teamc… | 2023-12-18T11:30:52.938000Z |
| var-202112-0798 | A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visua… | 2023-12-18T11:30:54.285000Z |
| var-202211-0308 | A vulnerability has been identified in JT2Go (All versions < V14.1.0.4), Teamcenter Visu… | 2023-12-18T11:32:53.926000Z |
| var-202203-0250 | A vulnerability has been identified in Climatix POL909 (AWB module) (All versions < V11.4… | 2023-12-18T11:33:08.140000Z |
| var-202107-1414 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza… | 2023-12-18T11:33:21.323000Z |
| var-202107-1416 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza… | 2023-12-18T11:33:27.861000Z |
| var-202212-1169 | A vulnerability has been identified in JT2Go (All versions < V14.1.0.6), Teamcenter Visua… | 2023-12-18T11:34:50.642000Z |
| var-202112-0476 | A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visua… | 2023-12-18T11:35:39.411000Z |
| var-202107-1426 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza… | 2023-12-18T11:36:02.863000Z |
| var-202107-1424 | A vulnerability has been identified in JT2Go (All versions < V13.2), Solid Edge SE2021 (A… | 2023-12-18T11:37:14.093000Z |
| var-202112-0808 | A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visua… | 2023-12-18T11:37:21.530000Z |
| var-202106-0358 | In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the… | 2023-12-18T11:38:07.442000Z |
| var-202107-1405 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza… | 2023-12-18T11:39:54.506000Z |
| var-202212-1171 | A vulnerability has been identified in JT2Go (All versions < V14.1.0.6), Teamcenter Visua… | 2023-12-18T11:42:21.939000Z |
| var-202107-1399 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza… | 2023-12-18T11:42:32.717000Z |
| var-202107-1412 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza… | 2023-12-18T11:43:00.050000Z |
| var-202112-0804 | A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visua… | 2023-12-18T11:43:41.519000Z |
| var-202203-0244 | A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, … | 2023-12-18T11:46:14.004000Z |
| var-202107-1407 | A vulnerability has been identified in JT2Go (All versions < V13.2), Teamcenter Visualiza… | 2023-12-18T11:47:10.474000Z |