Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2003-0744 |
N/A
|
The fetchnews NNTP client in leafnode 1.9.3 to 1.⦠|
n/a |
n/a |
2003-09-06T04:00:00.000Z | 2024-08-08T02:05:12.566Z |
| CVE-2003-0745 |
N/A
|
SNMPc 6.0.8 and earlier performs authentication t⦠|
n/a |
n/a |
2003-09-06T04:00:00.000Z | 2024-09-16T16:28:55.732Z |
| CVE-2003-0746 |
N/A
|
Various Distributed Computing Environment (DCE) i⦠|
n/a |
n/a |
2003-09-06T04:00:00.000Z | 2024-08-08T02:05:12.558Z |
| CVE-2003-0747 |
N/A
|
wgate.dll in SAP Internet Transaction Server (ITS⦠|
n/a |
n/a |
2003-09-06T04:00:00.000Z | 2024-08-08T02:05:12.542Z |
| CVE-2003-0748 |
N/A
|
Directory traversal vulnerability in wgate.dll fo⦠|
n/a |
n/a |
2003-09-06T04:00:00.000Z | 2024-08-08T02:05:12.549Z |
| CVE-2003-0749 |
N/A
|
Cross-site scripting (XSS) vulnerability in wgate⦠|
n/a |
n/a |
2003-09-06T04:00:00.000Z | 2024-08-08T02:05:12.366Z |
| CVE-2003-0750 |
N/A
|
secure.php in PY-Membres 4.2 and earlier allows r⦠|
n/a |
n/a |
2003-09-06T04:00:00.000Z | 2024-09-17T04:25:25.200Z |
| CVE-2003-0751 |
N/A
|
SQL injection vulnerability in pass_done.php for ⦠|
n/a |
n/a |
2003-09-06T04:00:00.000Z | 2024-09-16T22:41:22.242Z |
| CVE-2003-0752 |
N/A
|
SQL injection vulnerability in global.php3 of Att⦠|
n/a |
n/a |
2003-09-06T04:00:00.000Z | 2024-09-17T03:47:36.035Z |
| CVE-2003-0753 |
N/A
|
nphpd.php in newsPHP 216 and earlier allows remot⦠|
n/a |
n/a |
2003-09-06T04:00:00.000Z | 2024-09-16T19:00:33.612Z |
| CVE-2003-0754 |
N/A
|
nphpd.php in newsPHP 216 and earlier allows remot⦠|
n/a |
n/a |
2003-09-06T04:00:00.000Z | 2024-09-16T17:23:11.199Z |
| CVE-2003-0755 |
N/A
|
Buffer overflow in sys_cmd.c for gtkftpd 1.0.4 an⦠|
n/a |
n/a |
2003-09-06T04:00:00.000Z | 2024-09-17T02:31:24.425Z |
| CVE-2003-0756 |
N/A
|
Directory traversal vulnerability in sitebuilder.⦠|
n/a |
n/a |
2003-09-06T04:00:00.000Z | 2024-09-16T19:41:59.177Z |
| CVE-2003-0757 |
N/A
|
Check Point FireWall-1 4.0 and 4.1 before SP5 all⦠|
n/a |
n/a |
2003-09-06T04:00:00.000Z | 2024-09-16T19:36:35.423Z |
| CVE-2002-1352 |
N/A
|
Per Magne Knutsen's CartMan shopping cart (cartma⦠|
n/a |
n/a |
2003-09-12T04:00:00.000Z | 2024-08-08T03:19:28.820Z |
| CVE-2003-0528 |
N/A
|
Heap-based buffer overflow in the Distributed Com⦠|
n/a |
n/a |
2003-09-12T04:00:00.000Z | 2024-08-08T01:58:11.011Z |
| CVE-2003-0541 |
N/A
|
gtkhtml before 1.1.10, as used in Evolution, allo⦠|
n/a |
n/a |
2003-09-12T04:00:00.000Z | 2024-08-08T01:58:11.058Z |
| CVE-2003-0703 |
N/A
|
KisMAC before 0.05d trusts user-supplied variable⦠|
n/a |
n/a |
2003-09-12T04:00:00.000Z | 2024-08-08T02:05:11.778Z |
| CVE-2003-0704 |
N/A
|
KisMAC before 0.05d trusts user-supplied variable⦠|
n/a |
n/a |
2003-09-12T04:00:00.000Z | 2024-08-08T02:05:12.424Z |
| CVE-2003-0705 |
N/A
|
Buffer overflow in mah-jong 1.5.6 and earlier all⦠|
n/a |
n/a |
2003-09-12T04:00:00.000Z | 2024-09-17T03:28:42.303Z |
| CVE-2003-0706 |
N/A
|
Unknown vulnerability in mah-jong 1.5.6 and earli⦠|
n/a |
n/a |
2003-09-12T04:00:00.000Z | 2024-09-17T00:16:09.366Z |
| CVE-2003-0715 |
N/A
|
Heap-based buffer overflow in the Distributed Com⦠|
n/a |
n/a |
2003-09-12T04:00:00.000Z | 2024-08-08T02:05:12.522Z |
| CVE-2003-0720 |
N/A
|
Buffer overflow in PINE before 4.58 allows remote⦠|
n/a |
n/a |
2003-09-12T04:00:00.000Z | 2024-08-08T02:05:12.459Z |
| CVE-2003-0721 |
N/A
|
Integer signedness error in rfc2231_get_param fro⦠|
n/a |
n/a |
2003-09-12T04:00:00.000Z | 2024-08-08T02:05:12.624Z |
| CVE-2003-0760 |
N/A
|
Blubster 2.5 allows remote attackers to cause a d⦠|
n/a |
n/a |
2003-09-12T04:00:00.000Z | 2024-08-08T02:05:12.532Z |
| CVE-2003-0761 |
N/A
|
Buffer overflow in the get_msg_text of chan_sip.c⦠|
n/a |
n/a |
2003-09-12T04:00:00.000Z | 2024-09-17T03:23:08.374Z |
| CVE-2003-0762 |
N/A
|
Buffer overflow in (1) foxweb.dll and (2) foxweb.⦠|
n/a |
n/a |
2003-09-12T04:00:00.000Z | 2024-09-16T21:57:13.238Z |
| CVE-2003-0763 |
N/A
|
Cross-site scripting (XSS) vulnerability in Escap⦠|
n/a |
n/a |
2003-09-12T04:00:00.000Z | 2024-08-08T02:05:12.540Z |
| CVE-2003-0764 |
N/A
|
Escapade Scripting Engine (ESP) allows remote att⦠|
n/a |
n/a |
2003-09-12T04:00:00.000Z | 2024-08-08T02:05:12.553Z |
| CVE-2003-0765 |
N/A
|
The IN_MIDI.DLL plugin 3.01 and earlier, as used ⦠|
n/a |
n/a |
2003-09-12T04:00:00.000Z | 2024-08-08T02:05:12.554Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2002-1771 |
N/A
|
Matt Wright FormMail 1.9 and earlier allows remot⦠|
n/a |
n/a |
2005-06-21T04:00:00.000Z | 2024-08-08T03:34:56.226Z |
| CVE-2002-1772 |
N/A
|
Novell Netware 5.0 through 5.1 may allow local us⦠|
n/a |
n/a |
2005-06-21T04:00:00.000Z | 2024-08-08T03:34:56.167Z |
| CVE-2002-1773 |
N/A
|
Buffer overflow in ICQ 2.6x for MacOS X 10.0 thro⦠|
n/a |
n/a |
2005-06-21T04:00:00.000Z | 2024-08-08T03:34:56.210Z |
| CVE-2002-1774 |
N/A
|
NOTE: this issue has been disputed by the vendor.⦠|
n/a |
n/a |
2005-06-21T04:00:00.000Z | 2024-08-08T03:34:56.219Z |
| CVE-2002-1775 |
N/A
|
NOTE: this issue has been disputed by the vendor.⦠|
n/a |
n/a |
2005-06-21T04:00:00.000Z | 2024-08-08T03:34:56.375Z |
| CVE-2002-1776 |
N/A
|
NOTE: this issue has been disputed by the vendor.⦠|
n/a |
n/a |
2005-06-21T04:00:00.000Z | 2024-08-08T03:34:56.363Z |
| CVE-2002-1777 |
N/A
|
NOTE: this issue has been disputed by the vendor.⦠|
n/a |
n/a |
2005-06-21T04:00:00.000Z | 2024-08-08T03:34:56.173Z |
| CVE-2002-1778 |
N/A
|
Symantec Norton Personal Firewall 2002 allows rem⦠|
n/a |
n/a |
2005-06-21T04:00:00.000Z | 2024-08-08T03:34:56.368Z |
| CVE-2002-1779 |
N/A
|
The "block fragmented IP Packets" option in Syman⦠|
n/a |
n/a |
2005-06-21T04:00:00.000Z | 2024-09-17T03:22:56.922Z |
| CVE-2002-1780 |
N/A
|
BPM Studio Pro 4.2 by ALCATech GmbH includes a we⦠|
n/a |
n/a |
2005-06-21T04:00:00.000Z | 2024-08-08T03:34:56.151Z |
| CVE-2002-1781 |
N/A
|
Multiple buffer overflows in DeleGate 7.7.0 throu⦠|
n/a |
n/a |
2005-06-21T04:00:00.000Z | 2024-08-08T03:34:56.367Z |
| CVE-2002-1782 |
N/A
|
The default configuration of University of Washin⦠|
n/a |
n/a |
2005-06-21T04:00:00.000Z | 2024-08-08T03:34:56.156Z |
| CVE-2002-1783 |
N/A
|
CRLF injection vulnerability in PHP 4.2.1 through⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-08-08T03:34:56.169Z |
| CVE-2002-1784 |
N/A
|
Unknown vulnerability in inetd in HP Tru64 Unix 4⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-09-17T01:00:46.362Z |
| CVE-2002-1785 |
N/A
|
Cross-site scripting (XSS) vulnerability in Zeus ⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-09-16T17:23:07.206Z |
| CVE-2002-1786 |
N/A
|
SGI IRIX 6.5 through 6.5.14 applies a umask of 02⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-09-17T00:25:47.643Z |
| CVE-2002-1787 |
N/A
|
Buffer overflow in uux in eoe.sw.uucp package of ⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-09-16T17:43:10.312Z |
| CVE-2002-1788 |
N/A
|
Format string vulnerability in the nn_exitmsg fun⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-08-08T03:34:56.374Z |
| CVE-2002-1789 |
N/A
|
Format string vulnerability in newsx NNTP client ⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-09-17T00:46:02.007Z |
| CVE-2002-1790 |
N/A
|
The SMTP service in Microsoft Internet Informatio⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-09-17T01:40:52.287Z |
| CVE-2002-1791 |
N/A
|
SGI IRIX 6.5 through 6.5.17 creates temporary des⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-09-16T23:01:46.431Z |
| CVE-2002-1792 |
N/A
|
Buffer overflow in Fake Identd 0.9 through 1.4 al⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-08-08T03:34:56.252Z |
| CVE-2002-1793 |
N/A
|
HTTP Server mod_ssl module running on HP-UX 11.04⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-09-17T03:23:22.705Z |
| CVE-2002-1794 |
N/A
|
Unknown vulnerability in pam_authz in the LDAP-UX⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-08-08T03:34:56.385Z |
| CVE-2002-1795 |
N/A
|
Cross-site scripting (XSS) vulnerability in conne⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-09-16T20:06:27.986Z |
| CVE-2002-1796 |
7.8 (3.1)
|
ChaiVM EZloader for HP color LaserJet 4500 and 45⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2025-01-16T19:24:39.019Z |
| CVE-2002-1797 |
N/A
|
ChaiVM for HP color LaserJet 4500 and 4550 or HP ⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-08-08T03:34:56.255Z |
| CVE-2002-1798 |
N/A
|
MidiCart PHP, PHP Plus, and PHP Maxi allows remot⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-08-08T03:34:56.238Z |
| CVE-2002-1799 |
N/A
|
Cross-site scripting (XSS) vulnerability in phpRa⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-09-17T01:21:08.621Z |
| CVE-2002-1800 |
N/A
|
phpRank 1.8 stores the administrative password in⦠|
n/a |
n/a |
2005-06-28T04:00:00.000Z | 2024-09-16T17:28:13.721Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-mqvw-2h8p-cf8g |
|
An insufficient session expiration vulnerability exists in Business-DNA Solutions GmbHās TopEaseĀ® P⦠| 2021-12-01T00:00:41Z | 2021-12-07T00:01:04Z |
| ghsa-qjch-qr2h-mw52 |
|
Persistent Cross Site Scripting in Web Applications operating on Business-DNA Solutions GmbHĆ¢ā¬ā¢s To⦠| 2021-12-01T00:00:41Z | 2021-12-01T00:00:41Z |
| ghsa-ww6f-vp8m-358f |
7.8 (3.1)
|
Trend Micro Antivirus for Mac 2021 v11 (Consumer) is vulnerable to an improper access control privi⦠| 2021-12-01T00:00:41Z | 2022-07-13T00:01:48Z |
| ghsa-3jcx-v57w-c6rq |
8.8 (3.1)
|
Vulnerability in dirhistory plugin Description: the widgets that go back and forward in the directo⦠| 2021-12-01T00:00:42Z | 2022-08-10T00:00:23Z |
| ghsa-8jcw-2h4x-29pq |
|
# Vulnerability in `title` function **Description**: the `title` function defined in `lib/termsuppo⦠| 2021-12-01T00:00:42Z | 2021-12-01T00:00:42Z |
| ghsa-hf8m-4ppx-hx3q |
|
Missing HTTPOnly flag in Web Applications operating on Business-DNA Solutions GmbHĆ¢ā¬ā¢s TopEaseĆĀ® Pl⦠| 2021-12-01T00:00:42Z | 2021-12-01T00:00:42Z |
| ghsa-jxgv-3jv5-8mh9 |
|
Missing Rate Limiting in Web Applications operating on Business-DNA Solutions GmbHĆ¢ā¬ā¢s TopEaseĆĀ® Pl⦠| 2021-12-01T00:00:42Z | 2021-12-01T00:00:42Z |
| ghsa-m95m-2xc3-p525 |
4.3 (3.1)
|
Incorrect Access Control in Web Applications operating on Business-DNA Solutions GmbHĆ¢ā¬ā¢s TopEaseĆ®⦠| 2021-12-01T00:00:42Z | 2022-08-10T00:00:23Z |
| ghsa-rwxx-gm8c-232p |
|
Pinkie 2.15 allows remote attackers to cause a denial of service (daemon crash) via a TFTP read (RR⦠| 2021-12-01T00:00:42Z | 2021-12-01T00:00:42Z |
| ghsa-vg23-f593-6r27 |
|
# Vulnerability in `rand-quote` and `hitokoto` plugins **Description**: the `rand-quote` and `hitok⦠| 2021-12-01T00:00:42Z | 2021-12-02T00:01:08Z |
| ghsa-vj55-m9gh-hjm2 |
|
Serva 4.4.0 allows remote attackers to cause a denial of service (daemon crash) via a TFTP read (RR⦠| 2021-12-01T00:00:42Z | 2021-12-01T00:00:42Z |
| ghsa-f8r6-c3hp-ccv4 |
|
# Vulnerability in `pygmalion`, `pygmalion-virtualenv` and `refined` themes **Description**: these ⦠| 2021-12-01T00:00:43Z | 2021-12-02T00:01:08Z |
| ghsa-jm6p-wfjg-xm7x |
4.3 (3.1)
|
bookstack is vulnerable to Improper Access Control | 2021-12-01T18:26:48Z | 2021-12-02T15:29:37Z |
| ghsa-q54r-r9pr-w7qv |
4.6 (3.1)
|
Hexo Vulnerable to XSS | 2021-12-01T18:27:44Z | 2023-09-13T19:55:33Z |
| ghsa-fxwm-rx68-p5vx |
|
XSS in richtext custom tag attributes in ezsystems/ezplatform-richtext | 2021-12-01T18:28:29Z | 2021-11-29T20:55:04Z |
| ghsa-9jp8-cwwx-p64q |
|
XSS in richtext custom tag attributes in ezsystems/ezplatform-richtext | 2021-12-01T18:28:38Z | 2021-11-29T20:55:01Z |
| ghsa-mg3m-f475-28hv |
8.5 (3.1)
|
Path Traversal in @backstage/plugin-scaffolder-backend | 2021-12-01T18:28:51Z | 2021-11-29T20:22:25Z |
| ghsa-f34m-x9pj-62vq |
7.6 (3.1)
|
Cross-Site Scripting Vulnerability in @joeattardi/emoji-button | 2021-12-01T18:29:02Z | 2021-12-01T14:34:05Z |
| ghsa-2g8g-63j4-9w3r |
|
RCE vulnerability affecting v1beta3 templates in @backstage/plugin-scaffolder-backend | 2021-12-01T18:29:12Z | 2021-11-29T19:39:57Z |
| ghsa-w7fj-336r-vw49 |
7.4 (3.1)
|
Cross-Site Scripting vulnerability in @backstage/plugin-auth-backend | 2021-12-01T18:29:21Z | 2021-12-01T14:35:30Z |
| ghsa-4x2f-54wr-4hjg |
7.7 (3.1)
|
Potential Zip Slip Vulnerability in baserCMS | 2021-12-01T18:29:32Z | 2021-11-29T19:15:58Z |
| ghsa-7rpc-9m88-cf9w |
9.1 (3.1)
|
OS Command Injection Vulnerability and Potential Zip Slip Vulnerability in baserCMS | 2021-12-01T18:29:42Z | 2021-12-01T14:32:13Z |
| ghsa-gwwm-ppmm-xxq6 |
|
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to cont⦠| 2021-12-02T00:00:33Z | 2021-12-04T00:01:19Z |
| ghsa-r334-g882-8c3g |
|
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to cont⦠| 2021-12-02T00:00:34Z | 2021-12-04T00:01:21Z |
| ghsa-3rm9-3r67-x775 |
|
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to cont⦠| 2021-12-02T00:00:35Z | 2021-12-04T00:01:20Z |
| ghsa-52rq-pjr4-f69g |
|
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to cont⦠| 2021-12-02T00:00:35Z | 2021-12-04T00:01:23Z |
| ghsa-c725-jmgq-pg3j |
|
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to cont⦠| 2021-12-02T00:00:35Z | 2021-12-04T00:01:23Z |
| ghsa-rppf-8vfg-phcr |
|
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to cont⦠| 2021-12-02T00:00:35Z | 2021-12-04T00:01:20Z |
| ghsa-rx3j-3jjp-4j5v |
|
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to cont⦠| 2021-12-02T00:00:35Z | 2021-12-04T00:01:24Z |
| ghsa-wc7g-34rw-m7hc |
|
D-Link DIR-809 devices with firmware through DIR-809Ax_FW1.12WWB03_20190410 were discovered to cont⦠| 2021-12-02T00:00:35Z | 2021-12-03T00:00:31Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-3957 | Malicious code in iron-collapse (npm) | 2022-07-21T11:11:13Z | 2022-07-21T11:11:14Z |
| mal-2022-5209 | Malicious code in paper-toolbar (npm) | 2022-07-21T11:11:13Z | 2022-07-21T11:11:14Z |
| mal-2022-1042 | Malicious code in api-routes-rest (npm) | 2022-07-21T11:11:14Z | 2022-07-21T11:11:14Z |
| mal-2022-4886 | Malicious code in node-hawk-search (npm) | 2022-07-21T11:12:04Z | 2022-07-21T11:12:04Z |
| mal-2022-3850 | Malicious code in insomnia-plugin-simple-hmac-auth (npm) | 2022-07-21T11:12:37Z | 2022-07-21T11:12:42Z |
| mal-2022-838 | Malicious code in activity-iframe-sdk (npm) | 2022-07-21T11:14:02Z | 2022-07-21T11:14:03Z |
| mal-2022-6475 | Malicious code in test-dep-conf-my (npm) | 2022-07-21T11:14:34Z | 2022-07-21T11:14:34Z |
| mal-2022-6940 | Malicious code in virtru-typography (npm) | 2022-07-21T11:15:08Z | 2022-07-21T11:15:08Z |
| mal-2022-6626 | Malicious code in tradeview (npm) | 2022-07-21T11:15:43Z | 2022-07-21T11:15:43Z |
| mal-2022-6321 | Malicious code in strangegyokuro (npm) | 2022-07-21T11:16:48Z | 2022-07-21T11:16:53Z |
| mal-2022-6367 | Malicious code in suspicious-react-scripts (npm) | 2022-07-21T11:17:23Z | 2022-07-21T11:17:23Z |
| mal-2022-6615 | Malicious code in totally-legit-package (npm) | 2022-07-21T11:17:23Z | 2022-07-21T11:17:23Z |
| mal-2022-5775 | Malicious code in revshell (npm) | 2022-07-21T11:18:28Z | 2022-07-21T11:18:33Z |
| mal-2022-2400 | Malicious code in deere-map-features (npm) | 2022-07-21T16:51:05Z | 2022-07-21T16:51:06Z |
| mal-2022-2401 | Malicious code in deere-ui-asset-events (npm) | 2022-07-21T16:51:05Z | 2022-07-21T16:51:05Z |
| mal-2022-2404 | Malicious code in deere-ui-domain-framework (npm) | 2022-07-21T16:51:05Z | 2022-07-21T16:51:06Z |
| mal-2022-2405 | Malicious code in deere-ui-domain-framework-mixins (npm) | 2022-07-21T16:51:05Z | 2022-07-21T16:51:06Z |
| mal-2022-2407 | Malicious code in deere-ui-icons (npm) | 2022-07-21T16:51:05Z | 2022-07-21T16:51:06Z |
| mal-2022-2776 | Malicious code in equipment-color (npm) | 2022-07-21T16:51:05Z | 2022-07-21T16:51:06Z |
| mal-2022-2142 | Malicious code in competitive-equipment-icon (npm) | 2022-07-21T16:51:06Z | 2022-07-21T16:51:06Z |
| mal-2022-2402 | Malicious code in deere-ui-basic-dialog (npm) | 2022-07-21T16:51:06Z | 2022-07-21T16:51:13Z |
| mal-2022-2403 | Malicious code in deere-ui-branding-ag (npm) | 2022-07-21T16:51:06Z | 2022-07-21T16:51:06Z |
| mal-2022-2406 | Malicious code in deere-ui-framework (npm) | 2022-07-21T16:51:06Z | 2022-07-21T16:51:13Z |
| mal-2022-2408 | Malicious code in deere-ui-loader (npm) | 2022-07-21T16:51:06Z | 2022-07-21T16:51:06Z |
| mal-2022-2409 | Malicious code in deere-ui-modal-core (npm) | 2022-07-21T16:51:06Z | 2022-07-21T16:51:06Z |
| mal-2022-2410 | Malicious code in deere-ui-multiselect (npm) | 2022-07-21T16:51:06Z | 2022-07-21T16:51:06Z |
| mal-2022-2411 | Malicious code in deere-ui-toggle-group (npm) | 2022-07-21T16:51:06Z | 2022-07-21T16:51:06Z |
| mal-2022-2792 | Malicious code in eslint-config-cap-it-ui (npm) | 2022-07-21T16:51:06Z | 2022-07-21T16:51:06Z |
| mal-2022-4444 | Malicious code in machine-mapper (npm) | 2022-07-21T16:51:06Z | 2022-07-21T16:51:06Z |
| mal-2022-6071 | Malicious code in shaikh-test (npm) | 2022-07-21T16:51:06Z | 2022-07-21T16:51:06Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-1177 | Tenable Security Nessus Agent: Mehrere Schwachstellen ermƶglichen Privilegieneskalation | 2024-05-16T22:00:00.000+00:00 | 2024-05-16T22:00:00.000+00:00 |
| wid-sec-w-2024-1178 | Tenable Security Nessus: Mehrere Schwachstellen | 2024-05-16T22:00:00.000+00:00 | 2024-05-16T22:00:00.000+00:00 |
| wid-sec-w-2024-1183 | KeePass: Mehrere Schwachstellen ermƶglichen die Offenlegung von Informationen | 2024-05-20T22:00:00.000+00:00 | 2024-05-20T22:00:00.000+00:00 |
| wid-sec-w-2024-1184 | Fluent Bit: Schwachstelle ermöglicht Codeausführung, Offenlegung von Informationen und DoS | 2024-05-20T22:00:00.000+00:00 | 2024-07-11T22:00:00.000+00:00 |
| wid-sec-w-2024-1185 | Micro Focus ArcSight: Schwachstelle ermƶglicht Cross-Site Scripting | 2024-05-20T22:00:00.000+00:00 | 2024-05-20T22:00:00.000+00:00 |
| wid-sec-w-2024-1186 | IBM DB2 REST: Mehrere Schwachstellen | 2024-05-20T22:00:00.000+00:00 | 2024-05-20T22:00:00.000+00:00 |
| wid-sec-w-2024-1187 | Asterisk: Schwachstelle ermƶglicht Umgehen von Sicherheitsvorkehrungen | 2024-05-20T22:00:00.000+00:00 | 2024-06-04T22:00:00.000+00:00 |
| wid-sec-w-2024-1188 | Linux Kernel: Mehrere Schwachstellen ermƶglichen Denial of Service | 2024-05-20T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2024-1189 | ILIAS: Mehrere Schwachstellen | 2024-05-20T22:00:00.000+00:00 | 2024-05-23T22:00:00.000+00:00 |
| wid-sec-w-2024-1190 | D-LINK Eagle Pro AI M18 Router: Schwachstelle ermƶglicht Umgehung von Sicherheitsmechanismen | 2024-05-20T22:00:00.000+00:00 | 2024-05-20T22:00:00.000+00:00 |
| wid-sec-w-2024-1191 | HCL BigFix: Mehrere Schwachstellen | 2024-05-20T22:00:00.000+00:00 | 2024-05-20T22:00:00.000+00:00 |
| wid-sec-w-2024-1192 | Zabbix: Schwachstelle ermöglicht Codeausführung | 2024-05-20T22:00:00.000+00:00 | 2024-05-20T22:00:00.000+00:00 |
| wid-sec-w-2024-1193 | Roundcube: Mehrere Schwachstellen | 2024-05-20T22:00:00.000+00:00 | 2024-10-21T22:00:00.000+00:00 |
| wid-sec-w-2024-1194 | Mattermost: Mehrere Schwachstellen ermƶglichen nicht spezifizierten Angriff | 2024-05-20T22:00:00.000+00:00 | 2024-06-16T22:00:00.000+00:00 |
| wid-sec-w-2024-1195 | QNAP NAS: Mehrere Schwachstellen | 2024-05-20T22:00:00.000+00:00 | 2024-05-21T22:00:00.000+00:00 |
| wid-sec-w-2024-1196 | Atlassian Bamboo: Schwachstelle ermöglicht Codeausführung | 2024-05-21T22:00:00.000+00:00 | 2024-05-21T22:00:00.000+00:00 |
| wid-sec-w-2024-1197 | Linux Kernel: Mehrere Schwachstellen ermƶglichen Denial of Service und unspezifische Angriffe | 2024-05-21T22:00:00.000+00:00 | 2026-02-12T23:00:00.000+00:00 |
| wid-sec-w-2024-1198 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen | 2024-05-21T22:00:00.000+00:00 | 2024-06-17T22:00:00.000+00:00 |
| wid-sec-w-2024-1199 | Ivanti Endpoint Manager: Mehrere Schwachstellen ermöglichen Codeausführung | 2024-05-21T22:00:00.000+00:00 | 2024-06-16T22:00:00.000+00:00 |
| wid-sec-w-2024-1200 | Ivanti Avalanche: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit SYSTEM-Rechten | 2024-05-21T22:00:00.000+00:00 | 2024-05-21T22:00:00.000+00:00 |
| wid-sec-w-2024-1201 | Ivanti Connect Secure: Schwachstelle ermƶglicht Cross-Site Scripting | 2024-05-21T22:00:00.000+00:00 | 2024-05-21T22:00:00.000+00:00 |
| wid-sec-w-2024-1204 | Veeam Backup Enterprise Manager: Mehrere Schwachstellen | 2024-05-21T22:00:00.000+00:00 | 2024-06-09T22:00:00.000+00:00 |
| wid-sec-w-2024-1205 | Arista EOS: Schwachstelle ermƶglicht Umgehen von Sicherheitsvorkehrungen | 2024-05-21T22:00:00.000+00:00 | 2024-05-21T22:00:00.000+00:00 |
| wid-sec-w-2024-1206 | VMware Produkte: Mehrere Schwachstellen | 2024-05-21T22:00:00.000+00:00 | 2024-05-21T22:00:00.000+00:00 |
| wid-sec-w-2024-1207 | Atlassian Bitbucket: Mehrere Schwachstellen | 2024-05-21T22:00:00.000+00:00 | 2024-05-21T22:00:00.000+00:00 |
| wid-sec-w-2024-1208 | Red Hat Enterprise Linux (traceroute): Schwachstelle ermƶglicht Denial of Service | 2024-05-21T22:00:00.000+00:00 | 2025-01-29T23:00:00.000+00:00 |
| wid-sec-w-2024-1209 | GStreamer: Schwachstelle ermöglicht Codeausführung | 2024-05-21T22:00:00.000+00:00 | 2025-10-20T22:00:00.000+00:00 |
| wid-sec-w-2024-1210 | Atlassian Confluence: Mehrere Schwachstellen | 2024-05-21T22:00:00.000+00:00 | 2024-06-03T22:00:00.000+00:00 |
| wid-sec-w-2024-1211 | Microsoft GitHub Enterprise: Schwachstelle ermƶglicht Erlangen von Administratorrechten | 2024-05-21T22:00:00.000+00:00 | 2024-05-21T22:00:00.000+00:00 |
| wid-sec-w-2024-1212 | SolarWinds Platform: Mehrere Schwachstellen | 2024-05-21T22:00:00.000+00:00 | 2024-05-21T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2024-30203 | In Emacs before 29.3 Gnus treats inline MIME contents as trusted. | 2024-03-02T08:00:00.000Z | 2024-11-08T00:00:00.000Z |
| msrc_cve-2024-30204 | In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments. | 2024-03-02T08:00:00.000Z | 2026-02-18T02:05:03.000Z |
| msrc_cve-2024-30205 | In Emacs before 29.3 Org mode considers contents of remote files to be trusted. This affects Org Mode before 9.6.23. | 2024-03-02T08:00:00.000Z | 2024-12-07T00:00:00.000Z |
| msrc_cve-2024-20671 | Microsoft Defender Security Feature Bypass Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21330 | Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability | 2024-03-12T07:00:00.000Z | 2024-04-09T07:00:00.000Z |
| msrc_cve-2024-21334 | Open Management Infrastructure (OMI) Remote Code Execution Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21390 | Microsoft Authenticator Elevation of Privilege Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21392 | .NET and Visual Studio Denial of Service Vulnerability | 2024-03-12T07:00:00.000Z | 2024-04-16T07:00:00.000Z |
| msrc_cve-2024-21400 | Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21407 | Windows Hyper-V Remote Code Execution Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21408 | Windows Hyper-V Denial of Service Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21411 | Skype for Consumer Remote Code Execution Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21418 | Software for Open Networking in the Cloud (SONiC) Elevation of Privilege Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21419 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-13T07:00:00.000Z |
| msrc_cve-2024-21421 | Azure SDK Spoofing Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21426 | Microsoft SharePoint Server Remote Code Execution Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21427 | Windows Kerberos Security Feature Bypass Vulnerability | 2024-03-12T07:00:00.000Z | 2024-04-25T07:00:00.000Z |
| msrc_cve-2024-21429 | Windows USB Hub Driver Remote Code Execution Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21430 | Windows USB Attached SCSI (UAS) Protocol Remote Code Execution Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21431 | Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21432 | Windows Update Stack Elevation of Privilege Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21433 | Windows Print Spooler Elevation of Privilege Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21434 | Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21435 | Windows OLE Remote Code Execution Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21436 | Windows Installer Elevation of Privilege Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21437 | Windows Graphics Component Elevation of Privilege Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21438 | Microsoft AllJoyn API Denial of Service Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21439 | Windows Telephony Server Elevation of Privilege Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21440 | Microsoft ODBC Driver Remote Code Execution Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| msrc_cve-2024-21441 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | 2024-03-12T07:00:00.000Z | 2024-03-12T07:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2024:12437-1 | kernel-devel-6.0.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12438-1 | dfu-tool-1.8.6-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12439-1 | MozillaThunderbird-102.4.0-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12440-1 | exiv2-0.27.5-6.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12441-1 | java-13-openjdk-13.0.13.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12442-1 | java-15-openjdk-15.0.9.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12443-1 | kpartx-0.9.2+57+suse.cf3c1e9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12444-1 | python310-ecdsa-0.18.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12445-1 | libtpms-devel-0.9.3-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12446-1 | bluez-5.65-4.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12447-1 | curl-7.86.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12448-1 | dbus-1-1.14.4-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12449-1 | expat-2.5.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12450-1 | hsqldb-2.7.1-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12451-1 | gdk-pixbuf-loader-libheif-1.12.0-5.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12452-1 | libreoffice-7.4.2.3-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12453-1 | python311-3.11.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12454-1 | ctdb-4.17.2+git.273.a55a83528b9-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12455-1 | xmlbeans-2.6.0-12.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12456-1 | kernel-devel-6.0.5-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12457-1 | libldap-data-2.6.3-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12458-1 | python310-3.10.8-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12459-1 | python39-3.9.15-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12460-1 | chromedriver-107.0.5304.87-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12461-1 | python38-3.8.15-3.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12462-1 | ganglia-web-3.7.5-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12463-1 | java-11-openj9-11.0.17.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12464-1 | java-17-openj9-17.0.5.0-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12465-1 | java-1_8_0-openj9-1.8.0.352-1.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| opensuse-su-2024:12466-1 | jhead-3.06.0.1-2.1 on GA media | 2024-06-15T00:00:00Z | 2024-06-15T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2017:0936 | Red Hat Security Advisory: python-defusedxml and python-pysaml2 security update | 2017-04-12T13:51:05+00:00 | 2025-11-21T18:00:12+00:00 |
| rhsa-2017:0898 | Red Hat Security Advisory: cfme, cfme-appliance, and cfme-gemset security, bug fix, and enhancement update | 2017-04-12T14:31:08+00:00 | 2026-02-19T22:34:23+00:00 |
| rhsa-2017:0935 | Red Hat Security Advisory: tomcat security update | 2017-04-12T15:02:18+00:00 | 2026-02-25T17:10:26+00:00 |
| rhsa-2017:0984 | Red Hat Security Advisory: qemu-kvm-rhev security update | 2017-04-18T04:56:01+00:00 | 2025-11-21T18:00:15+00:00 |
| rhsa-2017:0983 | Red Hat Security Advisory: qemu-kvm-rhev security update | 2017-04-18T04:56:14+00:00 | 2025-11-21T18:00:15+00:00 |
| rhsa-2017:0982 | Red Hat Security Advisory: qemu-kvm-rhev security update | 2017-04-18T04:56:28+00:00 | 2025-11-21T18:00:15+00:00 |
| rhsa-2017:0981 | Red Hat Security Advisory: qemu-kvm-rhev security update | 2017-04-18T04:56:42+00:00 | 2025-11-21T18:00:14+00:00 |
| rhsa-2017:0980 | Red Hat Security Advisory: qemu-kvm-rhev security update | 2017-04-18T04:56:54+00:00 | 2025-11-21T18:00:14+00:00 |
| rhsa-2017:0979 | Red Hat Security Advisory: libreoffice security update | 2017-04-18T05:06:07+00:00 | 2025-11-21T18:00:14+00:00 |
| rhsa-2017:0985 | Red Hat Security Advisory: qemu-kvm-rhev security, bug fix, and enhancement update | 2017-04-18T06:06:24+00:00 | 2025-11-21T18:00:15+00:00 |
| rhsa-2017:0986 | Red Hat Security Advisory: kernel security update | 2017-04-18T09:49:52+00:00 | 2025-11-21T18:00:16+00:00 |
| rhsa-2017:0987 | Red Hat Security Advisory: qemu-kvm security update | 2017-04-18T12:32:47+00:00 | 2025-11-21T18:00:20+00:00 |
| rhsa-2017:0988 | Red Hat Security Advisory: qemu-kvm-rhev security update | 2017-04-18T13:55:36+00:00 | 2025-11-21T18:00:17+00:00 |
| rhsa-2017:1095 | Red Hat Security Advisory: bind security update | 2017-04-19T06:28:30+00:00 | 2025-11-21T18:00:17+00:00 |
| rhsa-2017:1097 | Red Hat Security Advisory: Red Hat JBoss Data Grid 7.1 | 2017-04-19T16:23:10+00:00 | 2026-03-18T01:44:20+00:00 |
| rhsa-2017:1103 | Red Hat Security Advisory: nss security update | 2017-04-20T02:16:57+00:00 | 2025-11-21T18:00:19+00:00 |
| rhsa-2017:1101 | Red Hat Security Advisory: nss security update | 2017-04-20T02:17:09+00:00 | 2025-11-21T18:00:19+00:00 |
| rhsa-2017:1102 | Red Hat Security Advisory: nss-util security update | 2017-04-20T02:37:04+00:00 | 2025-11-21T18:00:19+00:00 |
| rhsa-2017:1100 | Red Hat Security Advisory: nss and nss-util security update | 2017-04-20T05:00:06+00:00 | 2025-11-21T18:00:17+00:00 |
| rhsa-2017:1104 | Red Hat Security Advisory: firefox security update | 2017-04-20T08:21:32+00:00 | 2026-04-21T19:46:40+00:00 |
| rhsa-2017:1105 | Red Hat Security Advisory: bind security update | 2017-04-20T12:54:03+00:00 | 2025-11-21T18:00:21+00:00 |
| rhsa-2017:1109 | Red Hat Security Advisory: java-1.8.0-openjdk security update | 2017-04-20T19:27:18+00:00 | 2025-11-21T18:00:22+00:00 |
| rhsa-2017:1106 | Red Hat Security Advisory: firefox security update | 2017-04-21T00:49:25+00:00 | 2026-04-21T19:46:40+00:00 |
| rhsa-2017:1108 | Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update | 2017-04-21T02:10:52+00:00 | 2025-11-21T18:00:21+00:00 |
| rhsa-2017:1118 | Red Hat Security Advisory: java-1.7.0-oracle security update | 2017-04-24T11:16:12+00:00 | 2025-11-21T18:00:23+00:00 |
| rhsa-2017:1117 | Red Hat Security Advisory: java-1.8.0-oracle security update | 2017-04-24T11:16:34+00:00 | 2025-11-21T18:00:23+00:00 |
| rhsa-2017:1119 | Red Hat Security Advisory: java-1.6.0-sun security update | 2017-04-24T11:16:48+00:00 | 2025-11-21T18:00:23+00:00 |
| rhsa-2017:1124 | Red Hat Security Advisory: chromium-browser security update | 2017-04-25T08:46:49+00:00 | 2025-11-21T18:00:24+00:00 |
| rhsa-2017:1126 | Red Hat Security Advisory: kernel security update | 2017-04-25T09:57:12+00:00 | 2025-11-21T18:00:25+00:00 |
| rhsa-2017:1125 | Red Hat Security Advisory: kernel security and bug fix update | 2017-04-25T09:57:26+00:00 | 2025-11-21T18:00:25+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2020:2269-1 | Security update for libvirt | 2020-08-18T13:53:53Z | 2020-08-18T13:53:53Z |
| suse-su-2020:2271-1 | Security update for postgresql12 | 2020-08-18T14:44:43Z | 2020-08-18T14:44:43Z |
| suse-su-2020:2272-1 | Security update for freerdp | 2020-08-18T14:44:51Z | 2020-08-18T14:44:51Z |
| suse-su-2020:2274-1 | Security update for dovecot22 | 2020-08-19T07:56:53Z | 2020-08-19T07:56:53Z |
| suse-su-2020:2275-1 | Security update for python | 2020-08-19T11:21:37Z | 2020-08-19T11:21:37Z |
| suse-su-2020:2276-1 | Security update for python | 2020-08-19T11:23:21Z | 2020-08-19T11:23:21Z |
| suse-su-2020:2277-1 | Security update for python3 | 2020-08-19T11:24:25Z | 2020-08-19T11:24:25Z |
| suse-su-2020:2283-1 | Security update for libreoffice | 2020-08-20T13:11:14Z | 2020-08-20T13:11:14Z |
| suse-su-2020:2292-1 | Security update for SUSE Manager Server 3.2 | 2020-08-21T12:32:10Z | 2020-08-21T12:32:10Z |
| suse-su-2020:2296-1 | Security update for gettext-runtime | 2020-08-24T08:34:50Z | 2020-08-24T08:34:50Z |
| suse-su-2020:14460-1 | Security update for squid3 | 2020-08-24T12:06:51Z | 2020-08-24T12:06:51Z |
| suse-su-2020:2303-1 | Security update for grub2 | 2020-08-25T12:46:45Z | 2020-08-25T12:46:45Z |
| suse-su-2020:2304-1 | Security update for grub2 | 2020-08-25T12:47:20Z | 2020-08-25T12:47:20Z |
| suse-su-2020:2305-1 | Security update for grub2 | 2020-08-25T12:47:51Z | 2020-08-25T12:47:51Z |
| suse-su-2020:2306-1 | Security update for grub2 | 2020-08-25T12:48:25Z | 2020-08-25T12:48:25Z |
| suse-su-2020:2307-1 | Security update for grub2 | 2020-08-25T12:48:48Z | 2020-08-25T12:48:48Z |
| suse-su-2020:2308-1 | Security update for grub2 | 2020-08-25T12:49:05Z | 2020-08-25T12:49:05Z |
| suse-su-2020:14461-1 | Security update for grub2 | 2020-08-25T12:49:25Z | 2020-08-25T12:49:25Z |
| suse-su-2020:2311-1 | Security update for apache2 | 2020-08-25T12:50:06Z | 2020-08-25T12:50:06Z |
| suse-su-2020:2312-1 | Security update for samba | 2020-08-25T12:50:32Z | 2020-08-25T12:50:32Z |
| suse-su-2020:2241-1 | Security update for xorg-x11-server | 2020-08-25T17:02:38Z | 2020-08-25T17:02:38Z |
| suse-su-2020:2242-1 | Security update for xorg-x11-server | 2020-08-25T17:02:56Z | 2020-08-25T17:02:56Z |
| suse-su-2020:2240-1 | Security update for xorg-x11-server | 2020-08-25T17:03:23Z | 2020-08-25T17:03:23Z |
| suse-su-2020:14463-1 | Security update for xorg-x11-server | 2020-08-25T17:03:56Z | 2020-08-25T17:03:56Z |
| suse-su-2020:2325-1 | Security update for xorg-x11-server | 2020-08-25T17:04:18Z | 2020-08-25T17:04:18Z |
| suse-su-2020:2326-1 | Security update for xorg-x11-server | 2020-08-25T17:04:40Z | 2020-08-25T17:04:40Z |
| suse-su-2020:2331-1 | Security update for xorg-x11-server | 2020-08-26T07:52:54Z | 2020-08-26T07:52:54Z |
| suse-su-2020:0920-2 | Security update for libxslt | 2020-08-26T15:01:04Z | 2020-08-26T15:01:04Z |
| suse-su-2020:2344-1 | Security update for apache2 | 2020-08-26T15:02:04Z | 2020-08-26T15:02:04Z |
| suse-su-2020:2346-1 | Security update for graphviz | 2020-08-26T15:03:31Z | 2020-08-26T15:03:31Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2012-avi-456 | VulnƩrabilitƩ dans Apple Remote Desktop | 2012-08-22T00:00:00.000000 | 2012-08-22T00:00:00.000000 |
| certa-2012-avi-457 | Multiples vulnƩrabilitƩs dans Wireshark | 2012-08-22T00:00:00.000000 | 2012-08-22T00:00:00.000000 |
| certa-2012-avi-458 | VulnƩrabilitƩs dans Xen | 2012-08-22T00:00:00.000000 | 2012-08-22T00:00:00.000000 |
| certa-2012-avi-459 | Multiples vulnƩrabilitƩs dans Adobe Flash Player | 2012-08-22T00:00:00.000000 | 2012-08-22T00:00:00.000000 |
| certa-2012-avi-460 | Multiples vulnƩrabilitƩs dans Apache Web Server | 2012-08-23T00:00:00.000000 | 2012-08-23T00:00:00.000000 |
| certa-2012-avi-461 | Multiples vulnƩrabilitƩs dans Lotus Domino | 2012-08-23T00:00:00.000000 | 2012-08-23T00:00:00.000000 |
| certa-2012-avi-462 | VulnƩrabilitƩ dans HP Serviceguard | 2012-08-23T00:00:00.000000 | 2012-08-23T00:00:00.000000 |
| certa-2012-avi-463 | VulnƩrabilitƩ dans certains produits Avaya | 2012-08-23T00:00:00.000000 | 2012-08-23T00:00:00.000000 |
| certa-2012-avi-464 | VulnƩrabilitƩ dans IBM Power Hardware Management Console | 2012-08-23T00:00:00.000000 | 2012-08-23T00:00:00.000000 |
| certa-2012-avi-465 | Vulnérabilité dans le système SCADA RUGGEDCOM Rugged Operating System | 2012-08-28T00:00:00.000000 | 2012-08-28T00:00:00.000000 |
| certa-2012-avi-466 | VulnƩrabilitƩ dans les produits EMC ApplicationXtender | 2012-08-28T00:00:00.000000 | 2012-08-28T00:00:00.000000 |
| certa-2012-avi-467 | Multiples vulnƩrabilitƩs dans les produits Mozilla et Icedove | 2012-08-29T00:00:00.000000 | 2012-10-09T00:00:00.000000 |
| certa-2012-avi-468 | Multiples vulnƩrabilitƩs dans Symantec Messaging Gateway | 2012-08-29T00:00:00.000000 | 2012-08-29T00:00:00.000000 |
| certa-2012-avi-469 | VulnƩrabilitƩ dans HP iNode Management Center | 2012-08-30T00:00:00.000000 | 2012-08-30T00:00:00.000000 |
| certa-2012-avi-470 | VulnƩrabilitƩ dans HP Intelligent Management Center | 2012-08-30T00:00:00.000000 | 2012-08-30T00:00:00.000000 |
| certa-2012-avi-471 | VulnƩrabilitƩ dans EMC Cloud Tiering Appliance | 2012-08-30T00:00:00.000000 | 2012-08-30T00:00:00.000000 |
| certa-2012-avi-472 | VulnƩrabilitƩs dans IBM Infosphere Guardium | 2012-08-30T00:00:00.000000 | 2012-08-30T00:00:00.000000 |
| certa-2012-avi-473 | VulnƩrabilitƩ dans Oracle Java | 2012-08-31T00:00:00.000000 | 2012-08-31T00:00:00.000000 |
| certa-2012-avi-474 | Multiples vulnƩrabilitƩs dans IBM AppScan Enterprise and Policy Tester | 2012-08-31T00:00:00.000000 | 2012-08-31T00:00:00.000000 |
| certa-2012-avi-475 | VulnƩrabilitƩ dans IBM WebSphere Application Server | 2012-08-31T00:00:00.000000 | 2012-08-31T00:00:00.000000 |
| certa-2012-avi-476 | Multiples vulnƩrabilitƩs dans Google Chrome | 2012-08-31T00:00:00.000000 | 2012-08-31T00:00:00.000000 |
| certa-2012-avi-477 | Vulnérabilité dans le système SCADA GarrettCom Magnum | 2012-08-31T00:00:00.000000 | 2012-08-31T00:00:00.000000 |
| certa-2012-avi-478 | VulnƩrabilitƩs dans Asterisk | 2012-08-31T00:00:00.000000 | 2012-08-31T00:00:00.000000 |
| certa-2012-avi-479 | Multiples vulnƩrabilitƩs dans VMware | 2012-09-03T00:00:00.000000 | 2012-09-03T00:00:00.000000 |
| certa-2012-avi-480 | Multiples vulnƩrabilitƩs dans MediaWiki | 2012-09-03T00:00:00.000000 | 2012-09-03T00:00:00.000000 |
| certa-2012-avi-481 | VulnƩrabilitƩ dans EMC NetWorker | 2012-09-03T00:00:00.000000 | 2012-09-03T00:00:00.000000 |
| certa-2012-avi-482 | VulnƩrabilitƩs dans Adobe Photoshop CS6 | 2012-09-03T00:00:00.000000 | 2012-09-03T00:00:00.000000 |
| certa-2012-avi-483 | VulnƩrabilitƩ dans PGP Universal Server | 2012-09-03T00:00:00.000000 | 2012-09-03T00:00:00.000000 |
| certa-2012-avi-484 | Multiples vulnƩrabilitƩs dans Typo3 | 2012-09-04T00:00:00.000000 | 2012-09-04T00:00:00.000000 |
| certa-2012-avi-485 | Multiples vulnƩrabilitƩs dans Xen | 2012-09-06T00:00:00.000000 | 2012-09-06T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-05929 | Microsoft Windows Journalę“ę°ęŗ¢åŗčæēØä»£ē ę§č”ę¼ę“ | 2015-09-09 | 2015-09-10 |
| cnvd-2015-05930 | FFmpeg ff_frame_thread_initęē»ęå”ę¼ę“ | 2015-09-09 | 2015-09-10 |
| cnvd-2015-05931 | FFmpeg sws_init_contextęē»ęå”ę¼ę“ | 2015-09-09 | 2015-09-10 |
| cnvd-2015-05932 | FFmpeg destroy_buffersęē»ęå”ę¼ę“ | 2015-09-09 | 2015-09-10 |
| cnvd-2015-05933 | Microsoft Windows Kernel Mode Driveręéęåę¼ę“ | 2015-09-09 | 2015-09-10 |
| cnvd-2015-05934 | Microsoft Windows Kernelę¬å°å®å Øē»čæę¼ę“ | 2015-09-09 | 2015-09-10 |
| cnvd-2015-05935 | FFmpeg allocate_buffersęē»ęå”ę¼ę“ | 2015-09-09 | 2015-09-10 |
| cnvd-2015-05936 | FFmpeg ff_mpv_common_initęē»ęå”ę¼ę“ | 2015-09-09 | 2015-09-10 |
| cnvd-2015-05937 | FFmpeg ff_sbr_applyęē»ęå”ę¼ę“ | 2015-09-09 | 2015-09-10 |
| cnvd-2015-05938 | FFmpeg ff_mjpeg_decode_frameęē»ęå”ę¼ę“ | 2015-09-09 | 2015-09-10 |
| cnvd-2016-06743 | ę·±å³ē½ä¼ęŗē§ęsewiseē“ęęå”åØååØSQLę³Øå „ę¼ę“ | 2015-09-09 | 2016-03-09 |
| cnvd-2016-06744 | åäŗ¬äøę¹ē½ęÆPIWå 容箔ēē³»ē»ååØå¤å¤SQLę³Øå „ę¼ę“ | 2015-09-09 | 2016-03-09 |
| cnvd-2016-06836 | å京翰åå°äæ”ęÆęęÆęéå ¬åøäŗå½ęå¹³å°ååØSQLę³Øå „ę¼ę“ | 2015-09-09 | 2016-03-09 |
| cnvd-2016-06837 | ē§čæRASē³»ē»ååØSQLę³Øå „ę¼ę“ | 2015-09-09 | 2016-03-09 |
| cnvd-2016-06838 | ę·±å³åøę°ę ¼ęčē¹éäæ”ęęÆęéå ¬åøęå±č·Æē±åØååØęŖęęäøč½½é ē½®ęä»¶ę¼ę“ | 2015-09-09 | 2016-03-09 |
| cnvd-2016-06881 | ę³å¾®åååå”ē³»ē»ååØSQLę³Øå „ę¼ę“ | 2015-09-09 | 2016-03-09 |
| cnvd-2016-06882 | 广å·äøęµ·č¾¾å«ę导čŖęęÆč”份ęéå ¬åøVNetē³»å WEBē®”ēē³»ē»ååØéēØåSQLę³Øå „ę¼ę“ | 2015-09-09 | 2016-03-09 |
| cnvd-2016-06883 | ęå·åē«äæ”ęÆéē¼åē³»ē»ååØSQLę³Øå „ę¼ę“ | 2015-09-09 | 2016-03-09 |
| cnvd-2015-05941 | Microsoft Lync Serverč·Øē«čę¬ę¼ę“ļ¼CNVD-2015-05941ļ¼ | 2015-09-10 | 2015-09-11 |
| cnvd-2015-05942 | Microsoft Lync Serverč·Øē«čę¬ę¼ę“ļ¼CNVD-2015-05942ļ¼ | 2015-09-10 | 2015-09-11 |
| cnvd-2015-05943 | Advantech WebAccessē¼å²åŗęŗ¢åŗę¼ę“ļ¼CNVD-2015-05943ļ¼ | 2015-09-10 | 2015-09-11 |
| cnvd-2015-05944 | HP UCMDBę¬å°äæ”ęÆę³é²ę¼ę“ | 2015-09-10 | 2015-09-11 |
| cnvd-2015-05945 | EMC RSA Identity Management & GovernanceååØå¤äøŖååØåč·Øē«čę¬ę¼ę“ | 2015-09-10 | 2015-09-11 |
| cnvd-2015-05946 | Cisco Email Security Applianceę ¼å¼å符串ę¼ę“ | 2015-09-10 | 2015-09-11 |
| cnvd-2015-05947 | EMC RSA Identity Management & GovernanceååØå¤äøŖåå°åč·Øē«čę¬ę¼ę“ | 2015-09-10 | 2015-09-11 |
| cnvd-2015-05948 | Microsoft Windowsåä½é©±åØēØåŗęéęåę¼ę“ļ¼CNVD-2015-05948ļ¼ | 2015-09-10 | 2015-09-14 |
| cnvd-2015-05949 | Microsoft Windowsåä½é©±åØēØåŗęéęåę¼ę“ļ¼CNVD-2015-05949ļ¼ | 2015-09-10 | 2015-09-14 |
| cnvd-2015-05950 | Microsoft Windowsåä½é©±åØēØåŗęéęåę¼ę“ | 2015-09-10 | 2015-09-14 |
| cnvd-2015-05951 | Microsoft Windows OpenTypeåä½åęę¼ę“ | 2015-09-10 | 2015-09-14 |
| cnvd-2015-05952 | Microsoft Exchange Serveräæ”ęÆę³é²ę¼ę“ | 2015-09-10 | 2015-09-14 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-08379 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08380 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08381 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08382 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08383 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08384 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08385 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08386 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08387 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08388 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08389 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08390 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08391 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08392 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08393 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08394 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08395 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08396 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08397 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08398 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08399 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08400 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08401 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08402 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08403 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08404 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08405 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08406 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08407 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŠø Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠøŠµ ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-08408 | Š£ŃŠ·Š²ŠøŠ¼Š¾ŃŃŃ Š¾ŠæŠµŃŠ°Ńионной ŃŠøŃŃŠµŠ¼Ń CentOS, позволŃŃŃŠ°Ń ŃŠ“Š°Š»ŠµŠ½Š½Š¾Š¼Ń Š·Š»Š¾ŃŠ¼ŃŃŠ»ŠµŠ½Š½ŠøŠŗŃ наŃŃŃŠøŃŃ ŠŗŠ¾ā¦ | 28.04.2015 | 28.11.2016 |
| ID | Description | Updated |
|---|---|---|
| var-202106-0166 | Possible buffer overflow while updating ikev2 parameters for delete payloads received dur⦠| 2024-08-14T12:30:12.185000Z |
| var-202302-1397 | Insufficient control flow management in the Intel(R) Quartus Prime Pro and Standard editi⦠| 2024-08-14T12:30:13.603000Z |
| var-202109-1340 | A memory corruption issue was addressed with improved state management. This issue is fix⦠| 2024-08-14T12:30:31.767000Z |
| var-202108-1135 | A buffer overflow was addressed with improved bounds checking. This issue is fixed in mac⦠| 2024-08-14T12:30:32.944000Z |
| var-202105-0645 | On versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2, 14.1.x before 14.1.3.1, 13.1.x ⦠| 2024-08-14T12:30:43.302000Z |
| var-202108-2160 | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in⦠| 2024-08-14T12:30:46.995000Z |
| var-202106-1082 | Invalid values in the Content-Length header sent to Apache Traffic Server allows an attac⦠| 2024-08-14T12:30:49.609000Z |
| var-202108-0676 | A use of one-way hash with a predictable salt vulnerability in the password storing mecha⦠| 2024-08-14T12:30:56.418000Z |
| var-202104-1960 | ARM mbed product Version 6.3.0 is vulnerable to integer wrap-around in malloc_wrapper fun⦠| 2024-08-14T12:30:57.601000Z |
| var-202109-1642 | There is an improper authorization vulnerability in AIS-BW50-00 9.0.6.2(H100SP10C00) and ⦠| 2024-08-14T12:30:58.004000Z |
| var-202110-1631 | A remote unauthorized read access to files vulnerability was discovered in Aruba Instant ⦠| 2024-08-14T12:31:00.848000Z |
| var-202106-1670 | The Trend Micro Maximum Security 2021 (v17) consumer product is vulnerable to an improper⦠| 2024-08-14T12:31:01.927000Z |
| var-202109-0362 | An out-of-bounds read was addressed with improved input validation. This issue is fixed i⦠| 2024-08-14T12:31:10.571000Z |
| var-202207-0317 | In Bluetooth, there is a possible out of bounds write due to a missing bounds check. This⦠| 2024-08-14T12:31:13.138000Z |
| var-202107-1598 | A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate usi⦠| 2024-08-14T12:31:14.406000Z |
| var-202302-1265 | Out-of-bounds write in the Intel(R) Trace Analyzer and Collector software before version ⦠| 2024-08-14T12:31:14.496000Z |
| var-202109-0846 | A vulnerability has been identified in SIMATIC CP 1543-1 (incl. SIPLUS variants) (All ver⦠| 2024-08-14T12:31:15.414000Z |
| var-202108-1144 | A logic issue was addressed with improved validation. This issue is fixed in macOS Monter⦠| 2024-08-14T12:31:22.810000Z |
| var-202109-1355 | A memory consumption issue was addressed with improved memory handling. This issue is fix⦠| 2024-08-14T12:31:27.034000Z |
| var-202109-0288 | A permissions issue existed in DiskArbitration. This was addressed with additional owners⦠| 2024-08-14T12:31:34.317000Z |
| var-202105-0499 | Multiple vulnerabilities in the install, uninstall, and upgrade processes of Cisco AnyCon⦠| 2024-08-14T12:31:35.901000Z |
| var-202105-1195 | On BIG-IP APM versions 15.1.x before 15.1.3, 14.1.x before 14.1.4.1, 13.1.x before 13.1.4⦠| 2024-08-14T12:31:39.858000Z |
| var-202111-1619 | Improper access control in the installer Intel(R)Administrative Tools for Intel(R) Networ⦠| 2024-08-14T12:31:42.450000Z |
| var-202108-1275 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed ⦠| 2024-08-14T12:31:48.097000Z |
| var-202210-0385 | A vulnerability has been identified in Desigo PXM30-1 (All versions < V02.20.126.11-41), ⦠| 2024-08-14T12:31:52.563000Z |
| var-202003-1810 | A use after free issue was addressed with improved memory management. This issue is fixed⦠| 2024-08-14T12:32:06.618000Z |
| var-202402-1322 | A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < ⦠| 2024-08-14T12:32:06.878000Z |
| var-202108-1892 | A buffer overflow issue was discovered in HMI3 Control Panel in Swisslog Healthcare Nexus⦠| 2024-08-14T12:32:08.900000Z |
| var-202107-1233 | A vulnerability in the handling of exceptional conditions in Juniper Networks Junos OS Ev⦠| 2024-08-14T12:32:09.994000Z |
| var-202109-0619 | A vulnerability in the CLI of Cisco Prime Infrastructure and Cisco Evolved Programmable N⦠| 2024-08-14T12:32:15.170000Z |