Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0497 |
N/A
|
Anonymous FTP is enabled. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.555Z |
| CVE-1999-0498 |
N/A
|
TFTP is not running in a restricted directory, al… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.502Z |
| CVE-1999-0499 |
N/A
|
NETBIOS share information may be published throug… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.538Z |
| CVE-1999-0501 |
N/A
|
A Unix account has a guessable password. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.228Z |
| CVE-1999-0502 |
N/A
|
A Unix account has a default, null, blank, or mis… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.416Z |
| CVE-1999-0503 |
N/A
|
A Windows NT local user or administrator account … |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.236Z |
| CVE-1999-0504 |
N/A
|
A Windows NT local user or administrator account … |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.503Z |
| CVE-1999-0505 |
N/A
|
A Windows NT domain user or administrator account… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.441Z |
| CVE-1999-0506 |
N/A
|
A Windows NT domain user or administrator account… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.560Z |
| CVE-1999-0507 |
N/A
|
An account on a router, firewall, or other networ… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.391Z |
| CVE-1999-0508 |
N/A
|
An account on a router, firewall, or other networ… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.536Z |
| CVE-1999-0509 |
N/A
|
Perl, sh, csh, or other shell interpreters are in… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.219Z |
| CVE-1999-0510 |
N/A
|
A router or firewall allows source routed packets… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.450Z |
| CVE-1999-0511 |
N/A
|
IP forwarding is enabled on a machine which is no… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.609Z |
| CVE-1999-0512 |
N/A
|
A mail server is explicitly configured to allow S… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.455Z |
| CVE-1999-0515 |
N/A
|
An unrestricted remote trust relationship for Uni… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.464Z |
| CVE-1999-0516 |
N/A
|
An SNMP community name is guessable. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2025-03-17T15:03:20.678Z |
| CVE-1999-0517 |
N/A
|
An SNMP community name is the default (e.g. publi… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2025-03-17T15:03:23.650Z |
| CVE-1999-0518 |
N/A
|
A NETBIOS/SMB share password is guessable. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.137Z |
| CVE-1999-0519 |
N/A
|
A NETBIOS/SMB share password is the default, null… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.441Z |
| CVE-1999-0520 |
N/A
|
A system-critical NETBIOS/SMB share has inappropr… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.463Z |
| CVE-1999-0521 |
N/A
|
An NIS domain name is easily guessable. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.511Z |
| CVE-1999-0522 |
N/A
|
The permissions for a system-critical NIS+ table … |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.603Z |
| CVE-1999-0523 |
N/A
|
ICMP echo (ping) is allowed from arbitrary hosts. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.453Z |
| CVE-1999-0524 |
N/A
|
ICMP information such as (1) netmask and (2) time… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2025-03-17T15:03:25.141Z |
| CVE-1999-0525 |
N/A
|
IP traceroute is allowed from arbitrary hosts. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.266Z |
| CVE-1999-0527 |
N/A
|
The permissions for system-critical data in an an… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.606Z |
| CVE-1999-0528 |
N/A
|
A router or firewall forwards external packets th… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.438Z |
| CVE-1999-0529 |
N/A
|
A router or firewall forwards packets that claim … |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.227Z |
| CVE-1999-0530 |
N/A
|
A system is operating in "promiscuous" mode which… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.688Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-1185 |
N/A
|
Buffer overflow in SCO mscreen allows local users… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:02:53.797Z |
| CVE-1999-1381 |
N/A
|
Buffer overflow in dbadmin CGI program 1.0.1 on L… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.241Z |
| CVE-1999-0002 |
N/A
|
Buffer overflow in NFS mountd gives root access t… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:07:57.748Z |
| CVE-1999-0053 |
N/A
|
TCP RST denial of service in FreeBSD. |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.548Z |
| CVE-1999-0088 |
N/A
|
IRIX and AIX automountd services (autofsd) allow … |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:27:57.435Z |
| CVE-1999-0215 |
N/A
|
Routed allows attackers to append data to files. |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:34:51.766Z |
| CVE-1999-0118 |
N/A
|
AIX infod allows local users to gain root access … |
n/a |
n/a |
2000-06-02T04:00:00.000Z | 2024-08-01T16:27:57.742Z |
| CVE-1999-0254 |
N/A
|
A hidden SNMP community string in HP OpenView all… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2025-03-17T15:03:14.648Z |
| CVE-1999-1459 |
N/A
|
BMC PATROL Agent before 3.2.07 allows local users… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:18:07.212Z |
| CVE-1999-0052 |
7.5 (3.1)
|
IP fragmentation denial of service in FreeBSD all… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T20:32:09.970Z |
| CVE-1999-1284 |
N/A
|
NukeNabber allows remote attackers to cause a den… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:01.482Z |
| CVE-1999-1321 |
N/A
|
Buffer overflow in ssh 1.2.26 client with Kerbero… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:02.751Z |
| CVE-1999-1153 |
N/A
|
HAMcards Postcard CGI script 1.0 allows remote at… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:02:53.793Z |
| CVE-1999-1154 |
N/A
|
LakeWeb Filemail CGI script allows remote attacke… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:02:53.760Z |
| CVE-1999-1155 |
N/A
|
LakeWeb Mail List CGI script allows remote attack… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:02:53.788Z |
| CVE-1999-1289 |
N/A
|
ICQ 98 beta on Windows NT leaks the internal IP a… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:02.694Z |
| CVE-1999-1025 |
N/A
|
CDE screen lock program (screenlock) on Solaris 2… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T16:55:29.447Z |
| CVE-1999-1322 |
N/A
|
The installation of 1ArcServe Backup and Inoculan… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:01.676Z |
| CVE-1999-0057 |
N/A
|
Vacation program allows command execution by remo… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.213Z |
| CVE-1999-0780 |
N/A
|
KDE klock allows local users to kill arbitrary pr… |
n/a |
n/a |
2000-04-25T04:00:00.000Z | 2024-08-01T16:48:37.971Z |
| CVE-1999-0781 |
N/A
|
KDE allows local users to execute arbitrary comma… |
n/a |
n/a |
2000-04-25T04:00:00.000Z | 2024-08-01T16:48:38.136Z |
| CVE-1999-0782 |
N/A
|
KDE kppp allows local users to create a directory… |
n/a |
n/a |
2000-04-25T04:00:00.000Z | 2024-08-01T16:48:37.807Z |
| CVE-1999-1107 |
N/A
|
Buffer overflow in kppp in KDE allows local users… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:02:53.704Z |
| CVE-1999-1108 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1107. Reason: This candidate is a duplicate of CVE-1999-1107. Notes: All CVE users should reference CVE-1999-1107 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2001-09-12T04:00:00.000Z | 2005-02-04T00:00:00.000Z |
| CVE-1999-1288 |
N/A
|
Samba 1.9.18 inadvertently includes a prototype a… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:02.749Z |
| CVE-1999-1411 |
N/A
|
The installation of the fsp package 2.71-10 in De… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:03.283Z |
| CVE-1999-1071 |
N/A
|
Excite for Web Servers (EWS) 1.1 installs the Arc… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:02:53.571Z |
| CVE-1999-1072 |
N/A
|
Excite for Web Servers (EWS) 1.1 allows local use… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:02:53.513Z |
| CVE-1999-1073 |
N/A
|
Excite for Web Servers (EWS) 1.1 records the firs… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:02:53.681Z |
| CVE-1999-0321 |
N/A
|
Buffer overflow in Solaris kcms_configure command… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:34:51.884Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-g6f4-j6c2-w3p3 |
|
High severity vulnerability that affects uglify-js | 2018-10-09T00:39:43Z | 2020-06-17T15:14:46Z |
| ghsa-hxm2-r34f-qmc5 |
7.5 (3.1)
|
Regular Expression Denial of Service in minimatch | 2018-10-09T00:40:41Z | 2023-09-11T22:02:05Z |
| ghsa-crvj-3gj9-gm2p |
|
High severity vulnerability that affects qs | 2018-10-09T00:44:29Z | 2020-06-16T21:43:40Z |
| ghsa-hr2v-3952-633q |
9.8 (3.1)
|
Prototype Pollution in deep-extend | 2018-10-09T00:44:59Z | 2021-09-14T17:26:45Z |
| ghsa-8w4h-3cm3-2pm2 |
9.1 (3.1)
|
Out-of-bounds Read in atob | 2018-10-09T00:56:26Z | 2023-03-01T01:22:59Z |
| ghsa-6g33-f262-xjp4 |
5.3 (3.1)
|
Cryptographically Weak PRNG in randomatic | 2018-10-09T00:57:21Z | 2023-09-08T20:56:26Z |
| ghsa-cqjg-whmm-8gv6 |
7.5 (3.1)
|
Denial of Service via malformed accept-encoding header in hapi | 2018-10-09T00:57:28Z | 2023-09-07T20:33:05Z |
| ghsa-wgmx-52ph-qqcw |
8.8 (3.1)
|
Qutebrowser CSRF Vulnerability | 2018-10-10T16:05:23Z | 2024-10-16T20:50:08Z |
| ghsa-f2j6-wrhh-v25m |
8.8 (3.1)
8.7 (4.0)
|
Paramiko Authentication Bypass vulnerability | 2018-10-10T16:10:10Z | 2024-10-09T20:55:50Z |
| ghsa-2rcm-phc9-3945 |
5.9 (3.1)
8.2 (4.0)
|
Pyopenssl Incorrect Memory Management | 2018-10-10T16:10:23Z | 2024-10-21T21:06:54Z |
| ghsa-p28m-34f6-967q |
8.1 (3.1)
|
PyOpenSSL Use-After-Free vulnerability | 2018-10-10T16:10:38Z | 2024-10-15T16:03:16Z |
| ghsa-9q2p-fj49-vpxj |
5.3 (3.1)
6.9 (4.0)
|
In marshmallow library the schema "only" option treats an empty list as implying no "only" option | 2018-10-10T16:10:46Z | 2024-09-24T20:09:28Z |
| ghsa-m956-frf4-m2wr |
8.1 (3.1)
9.2 (4.0)
|
Ansible is vulnerable to an improper input validation in Ansible's handling of data sent from clien… | 2018-10-10T17:22:53Z | 2024-11-18T16:26:08Z |
| ghsa-jg4f-jqm5-4mgq |
9.1 (3.1)
9.4 (4.0)
|
Ansible fails to properly sanitize fact variables sent from the Ansible controller | 2018-10-10T17:23:14Z | 2024-09-04T19:00:55Z |
| ghsa-jwcc-j78w-j73w |
5.9 (3.1)
8.2 (4.0)
|
Ansible exposes sensitive data in log files and on the terminal | 2018-10-10T17:23:20Z | 2024-11-18T16:26:08Z |
| ghsa-cmwx-9m2h-x7v4 |
7.5 (3.1)
8.7 (4.0)
|
Ansible apt_key module does not properly verify key fingerprint | 2018-10-10T17:23:26Z | 2024-09-03T21:31:19Z |
| ghsa-x4cm-m36h-c6qj |
4.9 (3.1)
6.9 (4.0)
|
Improper Input Validation in ansible | 2018-10-10T17:23:33Z | 2024-09-03T21:00:20Z |
| ghsa-9x6q-5423-w5v9 |
7.4 (3.1)
9.1 (4.0)
|
Ansible fails to cache SSH host keys | 2018-10-10T17:23:39Z | 2024-11-18T16:26:07Z |
| ghsa-rh6x-qvg7-rrmj |
7.8 (3.1)
8.5 (4.0)
|
Link Following in ansible | 2018-10-10T17:23:45Z | 2024-09-04T18:55:10Z |
| ghsa-w64c-pxjj-h866 |
7.5 (3.1)
8.7 (4.0)
|
Ansible does not verify that the server hostname matches a domain name in certificates | 2018-10-10T17:23:51Z | 2024-09-04T18:42:22Z |
| ghsa-cx8m-8xmx-q8v3 |
9.1 (3.1)
|
Denial of Service in memjs | 2018-10-10T17:25:12Z | 2023-09-12T18:51:51Z |
| ghsa-8p5p-ff7x-hw7q |
6.1 (3.1)
|
Cross-Site Scripting in public | 2018-10-10T17:27:58Z | 2021-09-07T20:23:14Z |
| ghsa-j68r-23hj-xf9c |
7.5 (3.1)
|
node-openssl is malware | 2018-10-10T17:28:14Z | 2023-09-07T20:36:05Z |
| ghsa-894f-rw44-qrw5 |
7.5 (3.1)
|
mongose is malware | 2018-10-10T17:28:21Z | 2023-09-12T18:47:59Z |
| ghsa-fxwv-953p-7qpf |
3.7 (3.1)
|
Phusion Passenger allows remote attackers to spoof headers | 2018-10-10T17:29:13Z | 2023-07-05T18:39:02Z |
| ghsa-c7j7-p5jq-26ff |
|
Insecure use of temporary files in passenger | 2018-10-10T17:29:20Z | 2023-07-05T18:49:05Z |
| ghsa-qw8w-2xcp-xg59 |
|
Insecure use of temporary files in Phusion passenger | 2018-10-10T17:29:27Z | 2023-07-04T00:07:36Z |
| ghsa-r4x3-g983-9g48 |
|
Moderate severity vulnerability that affects sprockets | 2018-10-10T17:29:34Z | 2021-12-03T14:21:10Z |
| ghsa-qhv9-728r-6jqg |
5.3 (3.1)
|
ReDoS via long string of semicolons in tough-cookie | 2018-10-10T18:57:02Z | 2021-09-16T19:58:53Z |
| ghsa-qw96-mm2g-c8m7 |
6.1 (3.1)
|
Next.js has cross site scripting (XSS) vulnerability via the 404 or 500 /_error page | 2018-10-15T21:43:12Z | 2022-04-26T18:43:28Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2018-21 |
|
PyCryptodome before 3.6.6 has an integer overflow in the data_len variable in AESNI.c, re… | pycryptodome | 2018-08-20T00:29:00Z | 2021-06-10T06:52:01.279206Z |
| pysec-2018-99 |
|
pyro before 3.15 unsafely handles pid files in temporary directory locations and opening … | pyro | 2018-08-20T13:29:00Z | 2021-08-27T03:22:17.581707Z |
| pysec-2018-66 |
|
The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validat… | flask | 2018-08-20T19:31:00Z | 2021-08-25T04:30:09.712538Z |
| pysec-2018-64 |
|
In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers … | conference-scheduler-cli | 2018-08-28T19:29:00Z | 2021-08-25T04:29:57.468517Z |
| pysec-2018-135 |
6.5 (3.1)
|
Exiv2::Internal::PngChunk::parseTXTChunk in Exiv2 v0.26 allows remote attackers to cause … | exiv2 | 2018-09-02T03:29:00Z | 2024-11-21T14:22:48.611777Z |
| pysec-2018-106 |
|
An issue was discovered in Mayan EDMS before 3.0.2. The Appearance app sets window.locati… | mayan-edms | 2018-09-03T19:29:00Z | 2021-11-24T22:47:09.222926Z |
| pysec-2018-14 |
|
An issue was discovered in Mayan EDMS before 3.0.2. The Cabinets app has XSS via a crafte… | mayan-edms | 2018-09-03T19:29:00Z | 2021-06-16T00:03:23.733638Z |
| pysec-2018-15 |
|
An issue was discovered in Mayan EDMS before 3.0.3. The Tags app has XSS because tag labe… | mayan-edms | 2018-09-03T19:29:00Z | 2021-06-10T06:51:46.544830Z |
| pysec-2018-16 |
|
An issue was discovered in Mayan EDMS before 3.0.2. The Appearance app sets window.locati… | mayan-edms-ng | 2018-09-03T19:29:00Z | 2021-06-16T00:03:23.682256Z |
| pysec-2018-54 |
|
helpers.py in Flask-Admin 1.5.2 has Reflected XSS via a crafted URL. | flask-admin | 2018-09-05T14:29:00Z | 2021-07-15T02:22:14.431955Z |
| pysec-2018-65 |
|
MicroPyramid Django-CRM 0.2 allows CSRF for /users/create/, /users/##/edit/, and /account… | django-crm | 2018-09-05T22:29:00Z | 2021-08-25T04:29:58.134898Z |
| pysec-2018-93 |
|
When using the Linux bridge ml2 driver, non-privileged tenants are able to create and att… | neutron | 2018-09-10T19:29:00Z | 2021-08-27T03:22:08.555558Z |
| pysec-2018-94 |
|
Live-migrated instances are briefly able to inspect traffic for other instances on the sa… | neutron | 2018-09-10T19:29:00Z | 2021-08-27T03:22:08.615958Z |
| pysec-2018-153 |
5.5 (3.1)
|
Open Chinese Convert (OpenCC) 1.0.5 allows attackers to cause a denial of service (segmen… | opencc-py | 2018-09-13T02:29:00Z | 2024-11-21T14:22:57.249534Z |
| pysec-2018-67 |
|
In the marshmallow library before 2.15.1 and 3.x before 3.0.0b9 for Python, the schema "o… | marshmallow | 2018-09-18T17:29:00Z | 2021-09-01T08:44:17.759030Z |
| pysec-2018-136 |
6.5 (3.1)
|
Exiv2::d2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of se… | exiv2 | 2018-09-19T22:29:00Z | 2024-11-21T14:22:48.67141Z |
| pysec-2018-137 |
6.5 (3.1)
|
Exiv2::ul2Data in types.cpp in Exiv2 v0.26 allows remote attackers to cause a denial of s… | exiv2 | 2018-09-19T22:29:00Z | 2024-11-21T14:22:48.732242Z |
| pysec-2018-138 |
6.5 (3.1)
|
An issue was discovered in Exiv2 v0.26. The function Exiv2::DataValue::copy in value.cpp … | exiv2 | 2018-09-20T20:29:00Z | 2024-11-21T14:22:48.791028Z |
| pysec-2018-139 |
6.5 (3.1)
|
CiffDirectory::readDirectory() at crwimage_int.cpp in Exiv2 0.26 has excessive stack cons… | exiv2 | 2018-09-28T09:29:00Z | 2024-11-21T14:22:48.850406Z |
| pysec-2018-3 |
|
An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read … | django | 2018-10-02T18:29:00Z | 2021-06-10T06:50:43.349902Z |
| pysec-2018-91 |
|
cext/manifest.c in Mercurial before 4.7.2 has an out-of-bounds read during parsing of a m… | mercurial | 2018-10-04T23:29:00Z | 2021-08-27T03:22:07.367975Z |
| pysec-2018-20 |
|
privacyIDEA version 2.23.1 and earlier contains a Improper Input Validation vulnerability… | privacyidea | 2018-10-08T15:29:00Z | 2021-06-10T06:51:13.416740Z |
| pysec-2018-23 |
|
Python Cryptographic Authority pyopenssl version prior to version 17.5.0 contains a CWE-4… | pyopenssl | 2018-10-08T15:29:00Z | 2021-06-10T06:50:39.370732Z |
| pysec-2018-24 |
|
Python Cryptographic Authority pyopenssl version Before 17.5.0 contains a CWE - 401 : Fai… | pyopenssl | 2018-10-08T15:29:00Z | 2021-06-10T06:50:57.188381Z |
| pysec-2018-69 |
|
Paramiko version 2.4.1, 2.3.2, 2.2.3, 2.1.5, 2.0.8, 1.18.5, 1.17.6 contains a Incorrect A… | paramiko | 2018-10-08T15:29:00Z | 2021-08-25T04:30:15.170380Z |
| pysec-2018-28 |
|
The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an ht… | requests | 2018-10-09T17:29:00Z | 2021-06-16T00:03:24.800813Z |
| pysec-2018-47 |
|
Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin b… | moin | 2018-10-15T19:29:00Z | 2021-07-05T00:01:23.080305Z |
| pysec-2018-154 |
6.5 (3.1)
|
An issue was discovered in libpg_query 10-1.0.2. There is a memory leak in pg_query_raw_p… | pg-query | 2018-10-18T18:29:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2018-44 |
|
Ansible "User" module leaks any data which is passed on as a parameter to ssh-keygen. Thi… | ansible | 2018-10-23T15:29:00Z | 2021-07-02T02:41:34.271290Z |
| pysec-2018-107 |
|
ajenticp (aka Ajenti Docker control panel) for Ajenti through v1.2.23.13 has XSS via a fi… | ajenti | 2018-10-24T21:29:00Z | 2021-12-13T06:35:03.125488Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-171 | Malicious code in @clalit/fetlife-assets (npm) | 2022-06-20T18:20:00Z | 2022-06-20T18:20:01Z |
| mal-2022-172 | Malicious code in @clenergy/fetlife-assets (npm) | 2022-06-20T18:20:00Z | 2022-06-20T18:20:01Z |
| mal-2022-176 | Malicious code in @codacontent/fetlife-assets (npm) | 2022-06-20T18:20:01Z | 2022-06-20T18:20:03Z |
| mal-2022-177 | Malicious code in @codahosted/fetlife-assets (npm) | 2022-06-20T18:20:01Z | 2022-06-20T18:20:03Z |
| mal-2022-179 | Malicious code in @coinalpha/fetlife-assets (npm) | 2022-06-20T18:20:03Z | 2022-06-20T18:20:04Z |
| mal-2022-182 | Malicious code in @cooley/fetlife-assets (npm) | 2022-06-20T18:20:03Z | 2022-06-20T18:20:04Z |
| mal-2022-190 | Malicious code in @cvshealth/fetlife-assets (npm) | 2022-06-20T18:20:04Z | 2022-06-20T18:20:05Z |
| mal-2022-197 | Malicious code in @defectdojo/fetlife-assets (npm) | 2022-06-20T18:20:04Z | 2022-06-20T18:20:10Z |
| mal-2022-198 | Malicious code in @dentrix/fetlife-assets (npm) | 2022-06-20T18:20:05Z | 2022-06-20T18:20:06Z |
| mal-2022-205 | Malicious code in @dozuki/fetlife-assets (npm) | 2022-06-20T18:20:05Z | 2022-06-20T18:20:06Z |
| mal-2022-208 | Malicious code in @drive2/fetlife-assets (npm) | 2022-06-20T18:20:06Z | 2022-06-20T18:20:06Z |
| mal-2022-209 | Malicious code in @dropbox/fetlife-assets (npm) | 2022-06-20T18:20:06Z | 2022-06-20T18:20:06Z |
| mal-2022-210 | Malicious code in @dropcontact/fetlife-assets (npm) | 2022-06-20T18:20:06Z | 2022-06-20T18:20:07Z |
| mal-2022-226 | Malicious code in @edwardjones/fetlife-assets (npm) | 2022-06-20T18:20:06Z | 2022-06-20T18:20:07Z |
| mal-2022-252 | Malicious code in @eset/fetlife-assets (npm) | 2022-06-20T18:20:07Z | 2022-06-20T18:20:07Z |
| mal-2022-253 | Malicious code in @espn/fetlife-assets (npm) | 2022-06-20T18:20:07Z | 2022-06-20T18:20:07Z |
| mal-2022-254 | Malicious code in @espn-lazysizes/fetlife-assets (npm) | 2022-06-20T18:20:07Z | 2022-06-20T18:20:07Z |
| mal-2022-256 | Malicious code in @exeloncorp/fetlife-assets (npm) | 2022-06-20T18:20:07Z | 2022-06-20T18:20:08Z |
| mal-2022-260 | Malicious code in @exor/fetlife-assets (npm) | 2022-06-20T18:20:08Z | 2022-06-20T18:20:09Z |
| mal-2022-261 | Malicious code in @exxonmobil/fetlife-assets (npm) | 2022-06-20T18:20:08Z | 2022-06-20T18:20:09Z |
| mal-2022-273 | Malicious code in @fetlife/fetlife-assets (npm) | 2022-06-20T18:20:09Z | 2022-06-20T18:20:10Z |
| mal-2022-274 | Malicious code in @firecracker-microvm/fetlife-assets (npm) | 2022-06-20T18:20:09Z | 2022-06-20T18:20:10Z |
| mal-2022-276 | Malicious code in @flameshot-org/fetlife-assets (npm) | 2022-06-20T18:20:10Z | 2022-06-20T18:20:12Z |
| mal-2022-275 | Malicious code in @flameshot/fetlife-assets (npm) | 2022-06-20T18:20:12Z | 2022-06-20T18:20:13Z |
| mal-2022-278 | Malicious code in @freqtrade/fetlife-assets (npm) | 2022-06-20T18:20:13Z | 2022-06-20T18:20:13Z |
| mal-2022-281 | Malicious code in @gapinc/fetlife-assets (npm) | 2022-06-20T18:20:13Z | 2022-06-20T18:20:14Z |
| mal-2022-282 | Malicious code in @gartner/fetlife-assets (npm) | 2022-06-20T18:20:14Z | 2022-06-20T18:20:14Z |
| mal-2022-286 | Malicious code in @gener8/fetlife-assets (npm) | 2022-06-20T18:20:14Z | 2022-06-20T18:20:15Z |
| mal-2022-289 | Malicious code in @glencore/fetlife-assets (npm) | 2022-06-20T18:20:14Z | 2022-06-20T18:20:15Z |
| mal-2022-290 | Malicious code in @globes/fetlife-assets (npm) | 2022-06-20T18:20:15Z | 2022-06-20T18:20:15Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-1980 | libvirt: Schwachstelle ermöglicht Denial of Service | 2020-03-18T23:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-3231 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Codeausführung | 2020-03-18T23:00:00.000+00:00 | 2024-10-17T22:00:00.000+00:00 |
| wid-sec-w-2024-3589 | Red Hat Single Sign On: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-03-23T23:00:00.000+00:00 | 2025-11-23T23:00:00.000+00:00 |
| wid-sec-w-2023-2477 | Ansible: Schwachstelle ermöglicht Privilegieneskalation | 2020-03-24T23:00:00.000+00:00 | 2025-11-23T23:00:00.000+00:00 |
| wid-sec-w-2023-2759 | Squid: Schwachstelle ermöglicht Manipulation von Dateien | 2020-03-25T23:00:00.000+00:00 | 2023-10-26T22:00:00.000+00:00 |
| wid-sec-w-2023-2223 | OTRS: Mehrere Schwachstellen | 2020-03-26T23:00:00.000+00:00 | 2023-08-30T22:00:00.000+00:00 |
| wid-sec-w-2023-2476 | Ruby: Mehrere Schwachstellen | 2020-03-31T22:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| wid-sec-w-2025-2548 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2020-03-31T22:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2023-2475 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2020-04-02T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2024-0539 | Red Hat OpenStack: Mehrere Schwachstellen | 2020-04-05T22:00:00.000+00:00 | 2024-03-03T23:00:00.000+00:00 |
| wid-sec-w-2024-1979 | QEMU: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2020-04-05T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2022-1748 | GNU libc: Schwachstelle ermöglicht Privilegieneskalation | 2020-04-06T22:00:00.000+00:00 | 2023-08-23T22:00:00.000+00:00 |
| wid-sec-w-2024-0439 | libssh: Schwachstelle ermöglicht Denial of Service | 2020-04-08T22:00:00.000+00:00 | 2024-05-07T22:00:00.000+00:00 |
| wid-sec-w-2022-1639 | Oracle Java SE: Mehrere Schwachstellen | 2020-04-14T22:00:00.000+00:00 | 2025-04-29T22:00:00.000+00:00 |
| wid-sec-w-2023-1049 | Oracle MySQL: Mehrere Schwachstellen | 2020-04-14T22:00:00.000+00:00 | 2023-04-20T22:00:00.000+00:00 |
| wid-sec-w-2024-1450 | Aruba ClearPass Policy Manager: Mehrere Schwachstellen | 2020-04-14T22:00:00.000+00:00 | 2024-11-11T23:00:00.000+00:00 |
| wid-sec-w-2025-0189 | git: Schwachstelle ermöglicht Offenlegung von Informationen | 2020-04-14T22:00:00.000+00:00 | 2025-07-21T22:00:00.000+00:00 |
| wid-sec-w-2022-1593 | Squid: Mehrere Schwachstellen | 2020-04-15T22:00:00.000+00:00 | 2023-10-05T22:00:00.000+00:00 |
| wid-sec-w-2023-1825 | IBM MQ: Mehrere Schwachstellen | 2020-04-16T22:00:00.000+00:00 | 2023-07-19T22:00:00.000+00:00 |
| wid-sec-w-2022-1594 | Squid: Mehrere Schwachstellen | 2020-04-19T22:00:00.000+00:00 | 2023-10-26T22:00:00.000+00:00 |
| wid-sec-w-2025-1951 | Kmail: Schwachstelle ermöglicht Offenlegung von Informationen | 2020-04-19T22:00:00.000+00:00 | 2025-09-03T22:00:00.000+00:00 |
| wid-sec-w-2022-1925 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2020-04-21T22:00:00.000+00:00 | 2025-12-09T23:00:00.000+00:00 |
| wid-sec-w-2023-3080 | OpenSSL: Schwachstelle ermöglicht Denial of Service | 2020-04-21T22:00:00.000+00:00 | 2024-11-25T23:00:00.000+00:00 |
| wid-sec-w-2023-2474 | Squid: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode | 2020-04-22T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2022-0770 | IBM DB2: Mehrere Schwachstellen | 2020-04-23T22:00:00.000+00:00 | 2026-01-08T23:00:00.000+00:00 |
| wid-sec-w-2023-2222 | OTRS: Schwachstelle ermöglicht Offenlegung von Informationen | 2020-04-26T22:00:00.000+00:00 | 2023-08-30T22:00:00.000+00:00 |
| wid-sec-w-2024-1978 | QEMU: Schwachstelle ermöglicht Denial of Service | 2020-04-26T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2023-0270 | libTIFF: Schwachstelle ermöglicht Denial of Service | 2020-04-28T22:00:00.000+00:00 | 2025-11-09T23:00:00.000+00:00 |
| wid-sec-w-2023-0458 | Red Hat Liblouis: Mehrere Schwachstellen | 2020-04-28T22:00:00.000+00:00 | 2024-02-19T23:00:00.000+00:00 |
| wid-sec-w-2023-2406 | OpenSC: Schwachstelle ermöglicht Codeausführung | 2020-04-28T22:00:00.000+00:00 | 2023-09-20T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-17-124-03 | Advantech WebAccess | 2017-05-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-129-01 | ICSA-17-129-01 Siemens devices using the PROFINET Discovery and Configuration Protocol (Update K) | 2017-05-08T00:00:00.000000Z | 2019-10-08T00:00:00.000000Z |
| icsa-17-129-02 | Siemens PROFINET DCP (Update V) | 2017-05-08T00:00:00.000000Z | 2024-09-10T00:00:00.000000Z |
| icsa-17-129-03 | Siemens SIMATIC WinCC and SIMATIC WinCC Runtime Professional | 2017-05-09T00:00:00.000000Z | 2017-05-09T00:00:00.000000Z |
| icsa-17-131-01 | PHOENIX CONTACT mGuard | 2017-05-11T00:00:00.000000Z | 2017-05-11T00:00:00.000000Z |
| icsa-17-131-02 | Satel Iberia SenNet Data Logger and Electricity Meters | 2017-05-11T00:00:00.000000Z | 2017-05-11T00:00:00.000000Z |
| icsa-17-136-01 | Detcon SiteWatch Gateway | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-136-02 | Schneider Electric SoMachine HVAC | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-136-03 | Hanwha Techwin SRN-4000 | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-136-04 | Schneider Electric VAMPSET | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-138-01 | ICSA-17-138-01_Miele Professional PG 85 Series | 2017-05-18T00:00:00.000000Z | 2017-05-18T00:00:00.000000Z |
| icsa-17-138-02 | Schneider Electric Wonderware InduSoft Web Studio | 2017-05-18T00:00:00.000000Z | 2017-05-18T00:00:00.000000Z |
| icsa-17-138-03 | Rockwell Automation MicroLogix 1100 Controllers | 2017-05-18T00:00:00.000000Z | 2017-07-18T00:00:00.000000Z |
| icsa-17-143-01 | Moxa OnCell | 2017-05-23T00:00:00.000000Z | 2017-05-23T00:00:00.000000Z |
| icsa-17-150-01 | Automated Logic Corporation ALC WebCTRL, Liebert SiteScan, Carrier i-VU | 2017-05-30T00:00:00.000000Z | 2017-08-31T00:00:00.000000Z |
| icsa-17-152-01 | Phoenix Broadband Technologies LLC PowerAgent SC3 Site Controller | 2017-06-01T00:00:00.000000Z | 2017-06-01T00:00:00.000000Z |
| icsa-17-152-02 | NXP i.MX Product Family | 2017-06-01T00:00:00.000000Z | 2017-07-25T00:00:00.000000Z |
| icsa-17-157-01 | Rockwell Automation PanelView Plus 6 700-1500 | 2017-06-06T00:00:00.000000Z | 2017-06-06T00:00:00.000000Z |
| icsa-17-157-02 | Digital Canal Structural Wind Analysis | 2017-06-06T00:00:00.000000Z | 2017-06-06T00:00:00.000000Z |
| icsa-17-164-01 | Trihedral Engineering Limited VTScada | 2017-06-13T00:00:00.000000Z | 2017-06-13T00:00:00.000000Z |
| icsa-17-164-02 | OSIsoft PI Server 2017 | 2017-06-13T00:00:00.000000Z | 2017-06-13T00:00:00.000000Z |
| icsa-17-164-03 | OSIsoft PI Web API 2017 | 2017-06-13T00:00:00.000000Z | 2017-06-13T00:00:00.000000Z |
| icsa-17-166-01 | Cambium Networks ePMP | 2017-06-15T00:00:00.000000Z | 2017-06-15T00:00:00.000000Z |
| icsa-17-171-01 | Ecava IntegraXor | 2017-06-20T00:00:00.000000Z | 2017-06-20T00:00:00.000000Z |
| icsa-17-173-01 | Siemens SIMATIC CP 44x-1 Redundant Network Access Modules | 2017-06-22T00:00:00.000000Z | 2017-06-22T00:00:00.000000Z |
| icsa-17-173-02 | Siemens XHQ | 2017-06-22T00:00:00.000000Z | 2017-06-22T00:00:00.000000Z |
| icsa-17-178-01 | Newport XPS-Cx, XPS-Qx | 2017-06-27T00:00:00.000000Z | 2017-06-27T00:00:00.000000Z |
| icsa-17-180-01a | ICSA-17-180-01A_Siemens SIMATIC Industrial PCs, SINUMERIK Panel Control Unit, and SIMOTION P320 (Update A) | 2017-06-29T00:00:00.000000Z | 2017-07-11T00:00:00.000000Z |
| icsa-17-180-02 | Schneider Electric U.motion Builder (Update A) | 2017-06-29T00:00:00.000000Z | 2019-01-08T00:00:00.000000Z |
| icsa-17-180-03 | Siemens Viewport for Web Office Portal | 2017-06-29T00:00:00.000000Z | 2017-06-29T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20190417-wlc-cert-dos | Cisco Wireless LAN Controller Locally Significant Certificate Denial of Service Vulnerability | 2019-04-17T16:00:00+00:00 | 2019-04-17T16:00:00+00:00 |
| cisco-sa-20190417-wlc-csrf | Cisco Wireless LAN Controller Software Cross-Site Request Forgery Vulnerability | 2019-04-17T16:00:00+00:00 | 2019-04-17T16:00:00+00:00 |
| cisco-sa-20190417-wlc-gui | Cisco Wireless LAN Controller Software GUI Configuration Denial of Service Vulnerabilities | 2019-04-17T16:00:00+00:00 | 2019-04-18T18:04:38+00:00 |
| cisco-sa-20190417-wlc-iapp | Cisco Wireless LAN Controller Software IAPP Message Handling Denial of Service Vulnerabilities | 2019-04-17T16:00:00+00:00 | 2019-04-17T16:00:00+00:00 |
| cisco-sa-20190417-wlc-ssh | Cisco Wireless LAN Controller Secure Shell Unauthorized Access Vulnerability | 2019-04-17T16:00:00+00:00 | 2019-04-17T16:00:00+00:00 |
| cisco-sa-20190501-aci-filter-query | Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Filter Query Information Disclosure Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-aci-hw-clock-util | Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Privilege Escalation Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-09T15:55:09+00:00 |
| cisco-sa-20190501-aci-insecure-fabric | Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Insecure Fabric Authentication Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-13T19:30:32+00:00 |
| cisco-sa-20190501-aci-unmeasured-boot | Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Unmeasured Boot Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-apic-encrypt | Cisco Application Policy Infrastructure Controller Recoverable Encryption Key Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-apic-info-disc | Cisco Application Policy Infrastructure Controller Web-Based Management Interface Usage Information Disclosure Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-apic-priv-escalation | Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-09T16:00:10+00:00 |
| cisco-sa-20190501-apic-xss | Cisco Application Policy Infrastructure Controller Web-Based Management Interface Cross-Site Scripting Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-asa-csrf | Cisco Adaptive Security Appliance Software Cross-Site Request Forgery Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-asa-frpwrtd-dos | Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software TCP Timer Handling Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-03T19:45:16+00:00 |
| cisco-sa-20190501-asa-ftd-bypass | Cisco Adaptive Security Appliance and Firepower Threat Defense Software Layer 2 Filtering Bypass Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:44:22+00:00 |
| cisco-sa-20190501-asa-ftd-dos | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:47:03+00:00 |
| cisco-sa-20190501-asa-ftd-entropy | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Low-Entropy Keys Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:49:48+00:00 |
| cisco-sa-20190501-asa-ftd-ike-dos | Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software MOBIKE Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:37:28+00:00 |
| cisco-sa-20190501-asa-ftd-xss | Cisco Adaptive Security Appliance and Firepower Threat Defense Software WebVPN Cross-Site Scripting Vulnerabilities | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:42:58+00:00 |
| cisco-sa-20190501-asa-ftds-ldapdos | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Lightweight Directory Access Protocol Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:53:03+00:00 |
| cisco-sa-20190501-asa-ftdtcp-dos | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software TCP Proxy Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:48:07+00:00 |
| cisco-sa-20190501-asa-ipsec-dos | Cisco Adaptive Security Appliance Software IPsec Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-asa-vpn-dos | Cisco Adaptive Security Appliance Software VPN Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:12:08+00:00 |
| cisco-sa-20190501-asaftd-saml-vpn | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software VPN SAML Authentication Bypass Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:39:02+00:00 |
| cisco-sa-20190501-esa-bypass | Cisco Email Security Appliance Filter Bypass Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-03T20:26:28+00:00 |
| cisco-sa-20190501-expressway-traversal | Cisco Expressway Series Directory Traversal Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-fabric-traversal | Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Symbolic Link Path Traversal Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| cisco-sa-20190501-firepower-dos | Cisco Firepower Threat Defense Software TCP Ingress Handler Denial of Service Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-02T17:55:55+00:00 |
| cisco-sa-20190501-frpwr-cmd-inj | Cisco Firepower Threat Defense Software Command Injection Vulnerability | 2019-05-01T16:00:00+00:00 | 2019-05-01T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2020-14678 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14680 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14697 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14702 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14725 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15469 | In QEMU 4.2.0 a MemoryRegionOps object may lack read/write callback methods leading to a NULL pointer dereference. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15503 | LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp postprocessing/mem_image.cpp and utils/thumb_utils.cpp. For example malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength. | 2020-07-02T00:00:00.000Z | 2024-07-23T00:00:00.000Z |
| msrc_cve-2020-15586 | Go before 1.13.13 and 1.14.x before 1.14.5 has a data race in some net/http servers as demonstrated by the httputil.ReverseProxy Handler because it reads a request body and writes a response at the same time. | 2020-07-02T00:00:00.000Z | 2026-02-18T03:11:41.000Z |
| msrc_cve-2020-15705 | GRUB2: avoid loading unsigned kernels when GRUB is booted directly under secureboot without shim | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15706 | GRUB2 contains a race condition leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15707 | GRUB2 contained integer overflows when handling the initrd command leading to a heap-based buffer overflow. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15778 | scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of "anomalous argument transfers" because that could "stand a great chance of breaking existing workflows." | 2020-07-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-15780 | An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions aka CID-75b0cea7bf30. | 2020-07-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-15859 | QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15863 | hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15888 | Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection leading to a heap-based buffer overflow heap-based buffer over-read or use-after-free. | 2020-07-02T00:00:00.000Z | 2026-02-18T14:22:47.000Z |
| msrc_cve-2020-15889 | Lua 5.4.0 has a getobjname heap-based buffer over-read because youngcollection in lgc.c uses markold for an insufficient number of list members. | 2020-07-02T00:00:00.000Z | 2026-02-18T14:04:58.000Z |
| msrc_cve-2020-15945 | Lua through 5.4.0 has a segmentation fault in changedline in ldebug.c (e.g. when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function. | 2020-07-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-16166 | The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-2981 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 18.1.40. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.1 Base Score 7.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | 2020-07-02T00:00:00.000Z | 2026-02-19T01:16:12.000Z |
| msrc_cve-2020-8174 | napi_get_value_string_*() allows various kinds of memory corruption in node < 10.21.0 12.18.0 and < 14.4.0. | 2020-07-02T00:00:00.000Z | 2021-06-06T00:00:00.000Z |
| msrc_cve-2020-11984 | Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE | 2020-08-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11993 | Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns logging statements were made on the wrong connection causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | 2020-08-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-12829 | In QEMU through 5.0.0 an integer overflow was found in the SM501 display driver implementation. This flaw occurs in the COPY_AREA macro while handling MMIO write operations through the sm501_2d_engine_write() callback. A local attacker could abuse this flaw to crash the QEMU process in sm501_2d_operation() in hw/display/sm501.c on the host resulting in a denial of service. | 2020-08-02T00:00:00.000Z | 2020-09-09T00:00:00.000Z |
| msrc_cve-2020-14349 | It was found that PostgreSQL versions before 12.4 before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058 in order to execute arbitrary SQL command in the context of the user used for replication. | 2020-08-02T00:00:00.000Z | 2020-08-27T00:00:00.000Z |
| msrc_cve-2020-14350 | It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script during the installation or update of such extension. This affects PostgreSQL versions before 12.4 before 11.9 before 10.14 before 9.6.19 and before 9.5.23. | 2020-08-02T00:00:00.000Z | 2020-08-28T00:00:00.000Z |
| msrc_cve-2020-14352 | A flaw was found in librepo in versions before 1.12.1. A directory traversal vulnerability was found where it failed to sanitize paths in remote repository metadata. An attacker controlling a remote repository may be able to copy files outside of the destination directory on the targeted system via path traversal. This flaw could potentially result in system compromise via the overwriting of critical system files. The highest threat from this flaw is to users that make use of untrusted third-party repositories. | 2020-08-02T00:00:00.000Z | 2020-11-10T00:00:00.000Z |
| msrc_cve-2020-14356 | A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system. | 2020-08-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2020-14364 | An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in do_token_out routines. This flaw allows a guest user to crash the QEMU process resulting in a denial of service or the potential execution of arbitrary code with the privileges of the QEMU process on the host. | 2020-08-02T00:00:00.000Z | 2020-09-04T00:00:00.000Z |
| msrc_cve-2020-14415 | oss_write in audio/ossaudio.c in QEMU before 5.0.0 mishandles a buffer position. | 2020-08-02T00:00:00.000Z | 2020-09-02T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2025-0347 | Kwetsbaarheden verholpen in IBM QRadar SIEM | 2025-11-03T08:17:18.981494Z | 2025-11-03T08:17:18.981494Z |
| ncsc-2025-0348 | Kwetsbaarheden verholpen in Arista Networks producten | 2025-11-03T08:26:39.905306Z | 2025-11-03T08:26:39.905306Z |
| ncsc-2025-0349 | Kwetsbaarheden verholpen in Nagios XI | 2025-11-03T08:27:42.052256Z | 2025-11-03T08:27:42.052256Z |
| ncsc-2025-0350 | Kwetsbaarheid verholpen in CFMOTO Ride voertuigdatabeheer systemen | 2025-11-04T10:27:59.187171Z | 2025-11-04T10:27:59.187171Z |
| ncsc-2025-0351 | Kwetsbaarheden verholpen in Apple MacOS | 2025-11-04T12:44:25.439757Z | 2025-11-04T12:44:25.439757Z |
| ncsc-2025-0352 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2025-11-04T12:53:15.358078Z | 2025-11-04T12:53:15.358078Z |
| ncsc-2025-0353 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2025-11-04T15:03:48.630084Z | 2025-11-04T15:03:48.630084Z |
| ncsc-2025-0354 | Kwetsbaarheid verholpen in Cisco Identity Services Engine | 2025-11-06T12:36:51.591695Z | 2025-11-06T12:36:51.591695Z |
| ncsc-2025-0355 | Kwetsbaarheden verholpen in Fortinet FortiOS en FortiProxy | 2025-11-07T10:07:28.475542Z | 2025-11-07T10:07:28.475542Z |
| ncsc-2025-0356 | Kwetsbaarheden verholpen in SAP-producten | 2025-11-11T12:15:53.615720Z | 2025-11-11T12:15:53.615720Z |
| ncsc-2025-0357 | Kwetsbaarheden verholpen in Siemens producten | 2025-11-11T18:14:44.487803Z | 2025-11-11T18:14:44.487803Z |
| ncsc-2025-0358 | Kwetsbaartheden verholpen in Microsoft Windows | 2025-11-11T18:29:38.918562Z | 2025-11-11T18:29:38.918562Z |
| ncsc-2025-0359 | Kwetsbaarheden verholpen in Microsoft Office | 2025-11-11T18:31:27.092072Z | 2025-11-11T18:31:27.092072Z |
| ncsc-2025-0360 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2025-11-11T18:33:13.936830Z | 2025-11-11T18:33:13.936830Z |
| ncsc-2025-0361 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2025-11-11T18:34:39.453615Z | 2025-11-11T18:34:39.453615Z |
| ncsc-2025-0362 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2025-11-11T18:35:40.376220Z | 2025-11-11T18:35:40.376220Z |
| ncsc-2025-0363 | Kwetsbaarheden verholpen in Adobe Illustrator | 2025-11-12T11:52:08.634593Z | 2025-11-12T11:56:09.924799Z |
| ncsc-2025-0364 | Kwetsbaarheid verholpen in Adobe Photoshop | 2025-11-12T12:17:16.207233Z | 2025-11-12T12:17:16.207233Z |
| ncsc-2025-0365 | Kwetsbaarheden verholpen in Cisco Catalyst Center | 2025-11-14T12:55:27.227262Z | 2025-11-14T12:55:27.227262Z |
| ncsc-2025-0366 | Kwetsbaarheid verholpen in Fortinet FortiWeb | 2025-11-15T14:57:33.774388Z | 2025-11-15T14:57:33.774388Z |
| ncsc-2025-0367 | Kwetsbaarheden verholpen in GitLab | 2025-11-18T07:01:35.502522Z | 2025-11-18T07:01:35.502522Z |
| ncsc-2025-0368 | Kwetsbaarheden verholpen in Zoom Workplace en Zoom Clients | 2025-11-18T07:02:36.696426Z | 2025-11-18T07:02:36.696426Z |
| ncsc-2025-0369 | Kwetsbaarheden verholpen in IBM AIX | 2025-11-18T07:03:55.766335Z | 2025-11-18T07:03:55.766335Z |
| ncsc-2025-0370 | Kwetsbaarheden verholpen in Cisco Unified Contact Center Express | 2025-11-18T07:04:55.173157Z | 2025-11-18T07:04:55.173157Z |
| ncsc-2025-0371 | Kwetsbaarheden verholpen in Google Chrome | 2025-11-18T09:01:31.984222Z | 2025-11-18T09:01:31.984222Z |
| ncsc-2025-0372 | Kwetsbaarheid verholpen in Fortinet FortiWeb | 2025-11-19T08:34:59.616354Z | 2025-11-19T08:34:59.616354Z |
| ncsc-2025-0373 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2025-11-19T08:35:31.999400Z | 2025-11-19T08:35:31.999400Z |
| ncsc-2025-0374 | Kwetsbaarheden verholpen in Arista EOS | 2025-11-20T11:48:20.126141Z | 2025-11-20T11:48:20.126141Z |
| ncsc-2025-0375 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2025-11-21T16:06:14.387571Z | 2025-11-21T16:06:14.387571Z |
| ncsc-2025-0376 | Kwetsbaarheden verholpen in SonicWall Email Security appliances | 2025-11-21T16:06:33.949861Z | 2025-11-21T16:06:33.949861Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2019:2000-1 | Security update for go1.12 | 2019-08-24T12:18:42Z | 2019-08-24T12:18:42Z |
| opensuse-su-2019:2005-1 | Security update for qbittorrent | 2019-08-24T16:19:50Z | 2019-08-24T16:19:50Z |
| opensuse-su-2019:2007-1 | Recommended update for dkgpg, libTMCG | 2019-08-24T16:20:14Z | 2019-08-24T16:20:14Z |
| opensuse-su-2019:2008-1 | Security update for zstd | 2019-08-24T16:20:28Z | 2019-08-24T16:20:28Z |
| opensuse-su-2019:2015-1 | Security update for vlc | 2019-08-26T14:22:46Z | 2019-08-26T14:22:46Z |
| opensuse-su-2019:2017-1 | Recommended update for putty | 2019-08-26T18:19:50Z | 2019-08-26T18:19:50Z |
| opensuse-su-2019:2019-1 | Security update for schismtracker | 2019-08-28T22:20:58Z | 2019-08-28T22:20:58Z |
| opensuse-su-2019:2021-1 | Security update for containerd, docker, docker-runc, golang-github-docker-libnetwork | 2019-08-29T16:21:56Z | 2019-08-29T16:21:56Z |
| opensuse-su-2019:2024-1 | Security update for qbittorrent | 2019-08-30T04:21:20Z | 2019-08-30T04:21:20Z |
| opensuse-su-2019:2033-1 | Security update for libmirage | 2019-08-31T14:21:27Z | 2019-08-31T14:21:27Z |
| opensuse-su-2019:2038-1 | Security update for flatpak | 2019-08-31T18:20:21Z | 2019-08-31T18:20:21Z |
| opensuse-su-2019:2039-1 | Security update for python-SQLAlchemy | 2019-08-31T18:20:26Z | 2019-08-31T18:20:26Z |
| opensuse-su-2019:2040-1 | Security update for libmirage | 2019-08-31T18:20:33Z | 2019-08-31T18:20:33Z |
| opensuse-su-2019:2041-1 | Security update for qemu | 2019-09-01T12:18:24Z | 2019-09-01T12:18:24Z |
| opensuse-su-2019:2044-1 | Security update for podman, slirp4netns and libcontainers-common | 2019-09-01T18:18:38Z | 2019-09-01T18:18:38Z |
| opensuse-su-2019:2050-1 | Security update for httpie | 2019-09-02T10:32:39Z | 2019-09-02T10:32:39Z |
| opensuse-su-2019:2051-1 | Security update for apache2 | 2019-09-02T10:33:13Z | 2019-09-02T10:33:13Z |
| opensuse-su-2019:2052-1 | Security update for slurm | 2019-09-02T10:33:52Z | 2019-09-02T10:33:52Z |
| opensuse-su-2019:2056-1 | Security update for go1.12 | 2019-09-02T12:21:15Z | 2019-09-02T12:21:15Z |
| opensuse-su-2019:2057-1 | Security update for libreoffice | 2019-09-02T16:20:04Z | 2019-09-02T16:20:04Z |
| opensuse-su-2019:2058-1 | Security update for apache-commons-beanutils | 2019-09-02T18:18:58Z | 2019-09-02T18:18:58Z |
| opensuse-su-2019:2059-1 | Security update for qemu | 2019-09-03T04:19:16Z | 2019-09-03T04:19:16Z |
| opensuse-su-2019:2062-1 | Security update for postgresql10 | 2019-09-03T18:18:55Z | 2019-09-03T18:18:55Z |
| opensuse-su-2019:2064-1 | Security update for python-SQLAlchemy | 2019-09-04T04:20:02Z | 2019-09-04T04:20:02Z |
| opensuse-su-2019:2067-1 | Security update for wavpack | 2019-09-05T08:22:57Z | 2019-09-05T08:22:57Z |
| opensuse-su-2019:2068-1 | Security update for python-Twisted | 2019-09-05T08:23:19Z | 2019-09-05T08:23:19Z |
| opensuse-su-2019:2070-1 | Security update for SDL2_image | 2019-09-05T08:23:48Z | 2019-09-05T08:23:48Z |
| opensuse-su-2019:2071-1 | Security update for SDL_image | 2019-09-05T08:23:59Z | 2019-09-05T08:23:59Z |
| opensuse-su-2019:2072-1 | Security update for go1.11 | 2019-09-05T08:24:15Z | 2019-09-05T08:24:15Z |
| opensuse-su-2019:2077-1 | Security update for libmirage | 2019-09-06T08:21:33Z | 2019-09-06T08:21:33Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2005:363 | Red Hat Security Advisory: RealPlayer security update | 2005-04-20T17:24:00+00:00 | 2025-11-21T17:28:55+00:00 |
| rhsa-2005:392 | Red Hat Security Advisory: HelixPlayer security update | 2005-04-20T17:26:00+00:00 | 2025-11-21T17:28:59+00:00 |
| rhsa-2005:394 | Red Hat Security Advisory: RealPlayer security update | 2005-04-20T22:08:00+00:00 | 2025-11-21T17:29:00+00:00 |
| rhsa-2005:383 | Red Hat Security Advisory: firefox security update | 2005-04-21T09:11:00+00:00 | 2026-01-13T22:35:43+00:00 |
| rhsa-2005:293 | Red Hat Security Advisory: kernel security update | 2005-04-22T20:17:00+00:00 | 2025-11-21T17:28:43+00:00 |
| rhsa-2005:387 | Red Hat Security Advisory: cvs security update | 2005-04-25T19:28:00+00:00 | 2025-11-21T17:28:59+00:00 |
| rhsa-2005:375 | Red Hat Security Advisory: openoffice.org security update | 2005-04-25T20:35:00+00:00 | 2025-11-21T17:28:57+00:00 |
| rhsa-2005:386 | Red Hat Security Advisory: Mozilla security update | 2005-04-26T16:27:00+00:00 | 2026-01-13T20:53:05+00:00 |
| rhsa-2005:377 | Red Hat Security Advisory: sharutils security update | 2005-04-26T16:31:00+00:00 | 2025-11-21T17:28:57+00:00 |
| rhsa-2005:283 | Red Hat Security Advisory: kernel security update | 2005-04-28T15:05:00+00:00 | 2025-11-21T17:28:42+00:00 |
| rhsa-2005:284 | Red Hat Security Advisory: kernel security update | 2005-04-28T15:10:00+00:00 | 2025-11-21T17:28:42+00:00 |
| rhsa-2005:261 | Red Hat Security Advisory: glibc security update | 2005-04-28T15:16:00+00:00 | 2025-11-21T17:28:41+00:00 |
| rhsa-2005:405 | Red Hat Security Advisory: PHP security update | 2005-04-28T18:53:00+00:00 | 2026-01-13T22:34:23+00:00 |
| rhsa-2005:381 | Red Hat Security Advisory: nasm security update | 2005-05-04T15:01:00+00:00 | 2026-01-13T22:07:22+00:00 |
| rhsa-2005:397 | Red Hat Security Advisory: evolution security update | 2005-05-04T15:05:00+00:00 | 2025-11-21T17:29:01+00:00 |
| rhsa-2005:406 | Red Hat Security Advisory: PHP security update | 2005-05-04T15:09:00+00:00 | 2026-01-13T22:39:41+00:00 |
| rhsa-2005:432 | Red Hat Security Advisory: gaim security update | 2005-05-11T08:24:00+00:00 | 2026-01-13T20:53:11+00:00 |
| rhsa-2005:421 | Red Hat Security Advisory: tcpdump security update | 2005-05-11T08:37:00+00:00 | 2026-01-13T20:57:26+00:00 |
| rhsa-2005:417 | Red Hat Security Advisory: tcpdump security update | 2005-05-11T08:40:00+00:00 | 2026-01-13T20:57:23+00:00 |
| rhsa-2005:412 | Red Hat Security Advisory: openmotif security update | 2005-05-11T15:25:00+00:00 | 2025-11-21T17:29:04+00:00 |
| rhsa-2005:408 | Red Hat Security Advisory: cyrus-imapd security update | 2005-05-17T14:25:00+00:00 | 2025-11-21T17:29:02+00:00 |
| rhsa-2005:393 | Red Hat Security Advisory: kdelibs security update | 2005-05-17T14:33:00+00:00 | 2026-01-13T22:15:13+00:00 |
| rhsa-2005:371 | Red Hat Security Advisory: ncpfs security update | 2005-05-17T14:34:00+00:00 | 2025-11-21T17:28:56+00:00 |
| rhsa-2005:275 | Red Hat Security Advisory: ia32el security update | 2005-05-18T13:00:00+00:00 | 2025-11-21T17:28:42+00:00 |
| rhsa-2005:074 | Red Hat Security Advisory: rsh security update | 2005-05-18T13:03:00+00:00 | 2025-11-21T17:28:24+00:00 |
| rhsa-2005:294 | Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 5 | 2005-05-18T13:27:00+00:00 | 2025-11-21T17:28:44+00:00 |
| rhsa-2005:106 | Red Hat Security Advisory: openssh security update | 2005-05-18T13:48:00+00:00 | 2025-11-21T17:28:28+00:00 |
| rhsa-2005:256 | Red Hat Security Advisory: glibc security update | 2005-05-18T13:59:00+00:00 | 2025-11-21T17:28:40+00:00 |
| rhba-2005:447 | Red Hat Bug Fix Advisory: Updated cdrtools packages | 2005-05-19T00:00:00+00:00 | 2025-11-21T17:20:47+00:00 |
| rhsa-2005:238 | Red Hat Security Advisory: evolution security update | 2005-05-19T12:17:00+00:00 | 2025-11-21T17:28:40+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-014678 | SSA-014678: Authorization Bypass Vulnerability in Industrial Edge Device Kit | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-192617 | SSA-192617: Local Privilege Escalation Vulnerability in TeleControl Server Basic Before V3.1.2.4 | 2026-01-13T00:00:00Z | 2026-01-13T00:00:00Z |
| ssa-674753 | SSA-674753: Denial-of-Service Vulnerability in ET 200 Devices | 2026-01-13T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-827968 | SSA-827968: Vulnerability in Nozomi Guardian/CMC on RUGGEDCOM APE1808 Devices | 2026-01-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-089022 | SSA-089022: Multiple Vulnerabilities in Third-Party Components in SINEC OS before V3.3 | 2026-01-28T00:00:00Z | 2026-02-24T00:00:00Z |
| ssa-035571 | SSA-035571: Cross Site Scripting Vulnerability in Polarion Before V2506 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-311973 | SSA-311973: Multiple Local Privilege Escalation Vulnerabilities in SINEC NMS and User Management Component (UMC) | 2026-02-10T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-445819 | SSA-445819: Out of Bounds Read in PS/IGES Parasolid Translator Component in Solid Edge | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-507364 | SSA-507364: Heap Based Buffer Overflow Vulnerability in WIBU CodeMeter Runtime Affecting the Desigo CC Product Family and SENTRON Powermanager | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-535115 | SSA-535115: Data Validation Vulnerability in NX Before V2512 | 2026-02-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-625934 | SSA-625934: Improper Access Control Vulnerability in the Webhooks Implementation of Siveillance Video Management Servers | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-965753 | SSA-965753: Multiple File Parsing Vulnerabilities in Simcenter Femap and Nastran Before V2512 | 2026-02-10T00:00:00Z | 2026-02-10T00:00:00Z |
| ssa-126399 | SSA-126399: Improper Access Control Vulnerability in Heliox EV Chargers | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-452276 | SSA-452276: Eval Injection Vulnerability in SIMATIC S7-1500 | 2026-03-10T00:00:00.000Z | 2026-03-19T00:00:00.000Z |
| ssa-485750 | SSA-485750: Multiple Vulnerabilities in SIDIS Prime Before V4.0.800 | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-903736 | SSA-903736: Multiple vulnerabilities in SICAM SIAPP SDK before V2.1.7 | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-975644 | SSA-975644: Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808 Devices | 2026-03-10T00:00:00.000Z | 2026-03-10T00:00:00.000Z |
| ssa-246443 | SSA-246443: Multiple Vulnerabilities in SICAM 8 Products | 2026-03-26T00:00:00.000Z | 2026-03-26T00:00:00.000Z |
| ssa-019200 | SSA-019200: Multiple Vulnerabilities in SCALANCE W-700 IEEE 802.11n Devices Before V6.6.0 | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-225816 | SSA-225816: Memory Corruption Vulnerability in RUGGEDCOM CROSSBOW Station Access Controller Before V5.8 | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-605717 | SSA-605717: Authorization Bypass Vulnerability in SINEC NMS Before V4.0 SP3 | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-609469 | SSA-609469: Authorization Bypass Vulnerability in Industrial Edge Management | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-628843 | SSA-628843: Out of Bound Read Vulnerability in TPM 2.0 | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-741509 | SSA-741509: Privilege Escalation Vulnerability in RUGGEDCOM CROSSBOW Secure Access Manager Primary Before V5.8 | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-801704 | SSA-801704: Authentication Bypass Vulnerability in SINEC NMS | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-981622 | SSA-981622: Improper Certificate Validation Vulnerability in Siemens Analytics Toolkit | 2026-04-14T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2016:0303-1 | Security update for kdebase4-workspace | 2016-02-01T15:44:40Z | 2016-02-01T15:44:40Z |
| suse-su-2016:0304-1 | Security update for libvirt | 2016-02-01T15:46:51Z | 2016-02-01T15:46:51Z |
| suse-su-2016:0338-1 | Security update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss | 2016-02-04T14:48:21Z | 2016-02-04T14:48:21Z |
| suse-su-2016:0334-1 | Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nss | 2016-02-04T14:50:52Z | 2016-02-04T14:50:52Z |
| suse-su-2016:0340-1 | Security update for curl | 2016-02-04T14:51:34Z | 2016-02-04T14:51:34Z |
| suse-su-2016:0341-1 | Security update for Kernel live patch 10 | 2016-02-04T15:01:12Z | 2016-02-04T15:01:12Z |
| suse-su-2016:0335-1 | Security update for kernel live patch SP1 0 | 2016-02-04T15:01:21Z | 2016-02-04T15:01:21Z |
| suse-su-2016:0336-1 | Security update for kernel live patch 9 | 2016-02-04T15:01:31Z | 2016-02-04T15:01:31Z |
| suse-su-2016:0339-1 | Security update for kernel live patch SP1 1 | 2016-02-04T15:01:40Z | 2016-02-04T15:01:40Z |
| suse-su-2016:0337-1 | Security update for kernel live patch 8 | 2016-02-04T15:01:47Z | 2016-02-04T15:01:47Z |
| suse-su-2016:0343-1 | Security update for socat | 2016-02-05T09:11:34Z | 2016-02-05T09:11:34Z |
| suse-su-2016:0344-1 | Security update for socat | 2016-02-05T09:11:54Z | 2016-02-05T09:11:54Z |
| suse-su-2016:0347-1 | Security update for curl | 2016-02-05T13:51:50Z | 2016-02-05T13:51:50Z |
| suse-su-2016:0348-1 | Security update for mysql | 2016-02-05T13:54:00Z | 2016-02-05T13:54:00Z |
| suse-su-2016:0353-1 | Security update for tiff | 2016-02-05T16:42:21Z | 2016-02-05T16:42:21Z |
| suse-su-2016:0354-1 | Security update for the Linux Kernel | 2016-02-05T16:47:26Z | 2016-02-05T16:47:26Z |
| suse-su-2016:0383-1 | Security update for kernel live patch 5 | 2016-02-08T13:45:42Z | 2016-02-08T13:45:42Z |
| suse-su-2016:0381-1 | Security update for kernel live patch 4 | 2016-02-08T13:45:50Z | 2016-02-08T13:45:50Z |
| suse-su-2016:0380-1 | Security update for kernel live patch 3 | 2016-02-08T13:45:58Z | 2016-02-08T13:45:58Z |
| suse-su-2016:0386-1 | Security update for kernel live patch 6 | 2016-02-08T13:46:05Z | 2016-02-08T13:46:05Z |
| suse-su-2016:0387-1 | Security update for kernel live patch 7 | 2016-02-08T13:46:12Z | 2016-02-08T13:46:12Z |
| suse-su-2016:0384-1 | Security update for kernel live patch 2 | 2016-02-08T13:46:19Z | 2016-02-08T13:46:19Z |
| suse-su-2016:0390-1 | Security update for java-1_8_0-ibm | 2016-02-09T10:02:25Z | 2016-02-09T10:02:25Z |
| suse-su-2016:0391-1 | Security update for rubygem-rails-html-sanitizer | 2016-02-09T10:02:32Z | 2016-02-09T10:02:32Z |
| suse-su-2016:0389-1 | Security update for postgresql91 | 2016-02-09T10:03:51Z | 2016-02-09T10:03:51Z |
| suse-su-2016:0400-1 | Security update for flash-player | 2016-02-10T09:08:28Z | 2016-02-10T09:08:28Z |
| suse-su-2016:0398-1 | Security update for flash-player | 2016-02-10T09:08:38Z | 2016-02-10T09:08:38Z |
| suse-su-2016:0399-1 | Security update for java-1_7_1-ibm | 2016-02-10T09:08:59Z | 2016-02-10T09:08:59Z |
| suse-su-2016:0401-1 | Security update for java-1_7_1-ibm | 2016-02-10T09:09:28Z | 2016-02-10T09:09:28Z |
| suse-su-2016:0430-1 | Security update for krb5 | 2016-02-11T10:51:01Z | 2016-02-11T10:51:01Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2022:7790 | Moderate: bind security update | 2022-11-08T00:00:00Z | 2022-11-12T14:17:33Z |
| alsa-2022:7793 | Moderate: rsync security and enhancement update | 2022-11-08T00:00:00Z | 2022-11-11T19:39:56Z |
| alsa-2022:7811 | Important: mingw-expat security update | 2022-11-08T00:00:00Z | 2022-11-11T19:37:34Z |
| alsa-2022:7813 | Important: mingw-zlib security update | 2022-11-08T00:00:00Z | 2022-11-11T19:35:27Z |
| alsa-2022:7821 | Important: nodejs:18 security update | 2022-11-08T00:00:00Z | 2022-11-11T19:27:35Z |
| alsa-2022:7822 | Low: container-tools:rhel8 security, bug fix, and enhancement update | 2022-11-08T00:00:00Z | 2023-01-03T12:15:28Z |
| alsa-2022:7826 | Moderate: dotnet7.0 security, bug fix, and enhancement update | 2022-11-08T00:00:00Z | 2022-11-11T16:57:03Z |
| alsa-2022:7830 | Moderate: nodejs:14 security update | 2022-11-08T00:00:00Z | 2022-11-23T22:19:30Z |
| alsa-2022:7928 | Important: device-mapper-multipath security update | 2022-11-14T00:00:00Z | 2022-11-14T14:38:49Z |
| alsa-2022:7933 | Moderate: kernel-rt security and bug fix update | 2022-11-15T00:00:00Z | 2022-11-18T08:38:28Z |
| alsa-2022:7935 | Moderate: pcs security, bug fix, and enhancement update | 2022-11-15T00:00:00Z | 2022-11-18T08:35:40Z |
| alsa-2022:7950 | Low: Image Builder security, bug fix, and enhancement update | 2022-11-15T00:00:00Z | 2022-11-18T08:32:07Z |
| alsa-2022:7954 | Moderate: podman security and bug fix update | 2022-11-15T00:00:00Z | 2022-11-18T05:46:54Z |
| alsa-2022:7955 | Moderate: skopeo security and bug fix update | 2022-11-15T00:00:00Z | 2022-11-18T05:44:13Z |
| alsa-2022:7958 | Low: libguestfs security, bug fix, and enhancement update | 2022-11-15T00:00:00Z | 2022-11-18T05:40:56Z |
| alsa-2022:7959 | Low: guestfs-tools security, bug fix, and enhancement update | 2022-11-15T00:00:00Z | 2022-11-18T05:38:04Z |
| alsa-2022:7967 | Moderate: qemu-kvm security, bug fix, and enhancement update | 2022-11-15T00:00:00Z | 2022-11-18T05:35:34Z |
| alsa-2022:7968 | Low: virt-v2v security, bug fix, and enhancement update | 2022-11-15T00:00:00Z | 2022-11-18T05:33:14Z |
| alsa-2022:7970 | Moderate: protobuf security update | 2022-11-15T00:00:00Z | 2022-11-18T12:58:30Z |
| alsa-2022:7978 | Moderate: gimp security and enhancement update | 2022-11-15T00:00:00Z | 2022-11-18T12:58:50Z |
| alsa-2022:7979 | Low: speex security update | 2022-11-15T00:00:00Z | 2022-11-18T12:59:08Z |
| alsa-2022:8003 | Low: libvirt security, bug fix, and enhancement update | 2022-11-15T00:00:00Z | 2022-11-18T05:14:56Z |
| alsa-2022:8008 | Moderate: buildah security and bug fix update | 2022-11-15T00:00:00Z | 2022-11-18T05:11:27Z |
| alsa-2022:8011 | Moderate: fribidi security update | 2022-11-15T00:00:00Z | 2022-11-18T13:00:34Z |
| alsa-2022:8022 | Moderate: qt5 security and bug fix update | 2022-11-15T00:00:00Z | 2022-11-18T05:02:24Z |
| alsa-2022:8054 | Moderate: webkit2gtk3 security and bug fix update | 2022-11-15T00:00:00Z | 2023-03-13T16:36:16Z |
| alsa-2022:8057 | Important: grafana security, bug fix, and enhancement update | 2022-11-15T00:00:00Z | 2022-11-18T04:52:36Z |
| alsa-2022:8062 | Moderate: unbound security, bug fix, and enhancement update | 2022-11-15T00:00:00Z | 2022-11-18T13:02:51Z |
| alsa-2022:8067 | Moderate: httpd security, bug fix, and enhancement update | 2022-11-15T00:00:00Z | 2022-11-18T04:40:41Z |
| alsa-2022:8068 | Moderate: bind security update | 2022-11-15T00:00:00Z | 2022-11-18T13:05:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-1137 | Heap-use-after-free in ihevcd_jobq_lock | 2020-07-22T21:49:49.953088Z | 2022-04-13T03:04:31.054120Z |
| osv-2020-1138 | Heap-buffer-overflow in void apply_sao_internal<unsigned short> | 2020-07-22T21:49:50.071384Z | 2022-04-13T03:04:32.419159Z |
| osv-2020-1141 | Heap-buffer-overflow in ff_hevc_put_hevc_epel_pixels_8_sse | 2020-07-22T21:49:50.461909Z | 2022-04-13T03:04:32.413194Z |
| osv-2020-1142 | UNKNOWN WRITE in ideint_weave_blk | 2020-07-22T21:49:50.570005Z | 2022-04-13T03:04:33.848741Z |
| osv-2020-1143 | UNKNOWN WRITE in mips_release_mips | 2020-07-22T21:49:50.620818Z | 2022-04-13T03:04:39.204639Z |
| osv-2020-1145 | Heap-buffer-overflow in ihevcd_sao_shift_ctb | 2020-07-22T21:49:50.700750Z | 2022-04-13T03:04:30.923161Z |
| osv-2020-1146 | Heap-buffer-overflow in dex_parse_debug_item | 2020-07-22T21:49:50.759227Z | 2022-04-13T03:04:36.733363Z |
| osv-2020-1148 | Heap-buffer-overflow in asn1_item_ex_d2i | 2020-07-22T21:49:51.151710Z | 2022-04-13T03:04:38.778921Z |
| osv-2020-1150 | Global-buffer-overflow in ssl_sigalg | 2020-07-22T21:49:51.343194Z | 2022-04-13T03:04:38.802234Z |
| osv-2020-1151 | Heap-buffer-overflow in sas_read2 | 2020-07-22T21:49:51.461370Z | 2022-04-13T03:04:40.640564Z |
| osv-2020-1152 | Heap-buffer-overflow in pcpp::tbp_my_own_strnlen | 2020-07-22T21:49:51.614814Z | 2022-04-13T03:04:38.623396Z |
| osv-2020-1153 | Heap-buffer-overflow in ih264d_cavlc_4x4res_block_totalcoeff_11to16 | 2020-07-22T21:49:51.644958Z | 2022-04-13T03:04:35.548197Z |
| osv-2020-1154 | Use-of-uninitialized-value in xmlStrlen | 2020-07-22T21:49:51.684969Z | 2022-04-13T03:04:33.746967Z |
| osv-2020-1155 | Heap-buffer-overflow in FLAC__bitreader_read_rice_signed_block | 2020-07-22T21:49:51.797478Z | 2022-04-13T03:04:40.535378Z |
| osv-2020-1156 | Heap-buffer-overflow in mu::Parser::Sum | 2020-07-22T21:49:51.826984Z | 2022-04-13T03:04:30.735555Z |
| osv-2020-1158 | Use-of-uninitialized-value in JBIG2HuffmanDecoder::buildTable | 2020-07-22T21:49:52.056163Z | 2022-04-13T03:04:37.349808Z |
| osv-2020-1159 | Segv on unknown address in arrow::ipc::ReadMessage | 2020-07-22T21:49:52.147608Z | 2022-04-13T03:04:31.845158Z |
| osv-2020-1161 | Heap-buffer-overflow in impeg2_fmt_conv_yuv420p_to_yuv420sp_uv | 2020-07-22T21:49:52.257088Z | 2022-04-13T03:04:33.814502Z |
| osv-2020-1163 | Heap-buffer-overflow in readstat_convert | 2020-07-22T21:49:52.343920Z | 2022-04-13T03:04:40.619015Z |
| osv-2020-1165 | Global-buffer-overflow in parse_headers | 2020-07-22T21:49:52.512552Z | 2022-04-13T03:04:31.772806Z |
| osv-2020-1167 | Heap-buffer-overflow in tiffReadCallback | 2020-07-22T21:49:52.626033Z | 2022-04-13T03:04:32.693612Z |
| osv-2020-1168 | Use-of-uninitialized-value in gbNUMBER_mbc_enc_len | 2020-07-22T21:49:52.801225Z | 2022-04-13T03:04:40.925429Z |
| osv-2020-1170 | Heap-buffer-overflow in arrow::internal::CountSetBits | 2020-07-22T21:49:52.928701Z | 2022-04-13T03:04:32.014023Z |
| osv-2020-1171 | Heap-use-after-free in JS_ReadObjectRec | 2020-07-22T21:49:53.004112Z | 2022-04-13T03:04:41.243346Z |
| osv-2020-1172 | Global-buffer-overflow in WelsDec::ParseInterBInfo | 2020-07-22T21:49:53.034421Z | 2022-04-13T03:04:37.467751Z |
| osv-2020-1173 | Use-of-uninitialized-value in psscan | 2020-07-22T21:49:53.355449Z | 2022-04-13T03:04:34.976757Z |
| osv-2020-1175 | Use-of-uninitialized-value in readline | 2020-07-22T21:49:53.794926Z | 2022-04-13T03:04:34.999032Z |
| osv-2020-1176 | Use-of-uninitialized-value in put4bitbwtile | 2020-07-22T21:49:53.886180Z | 2022-04-13T03:04:32.628091Z |
| osv-2020-1178 | Global-buffer-overflow in arrow::Status arrow::VisitArrayInline<arrow::internal::ValidateArrayDataVisitor> | 2020-07-22T21:49:53.967051Z | 2022-04-13T03:04:32.040534Z |
| osv-2020-1180 | UNKNOWN WRITE in ideint_process | 2020-07-22T21:49:54.155583Z | 2022-04-13T03:04:33.841097Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0001 | Unsound use of str::from_utf8_unchecked on bytes which are not UTF-8 | 2024-01-13T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2024-0003 | Resource exhaustion vulnerability in h2 may lead to Denial of Service (DoS) | 2024-01-17T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2024-0007 | Use-after-free when setting the locale | 2024-01-19T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2024-0004 | `cosmwasm` is unmaintained | 2024-01-20T12:00:00Z | 2024-01-21T14:51:38Z |
| rustsec-2024-0006 | Multiple issues involving quote API | 2024-01-21T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0008 | Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') | 2024-01-23T12:00:00Z | 2024-01-24T17:00:49Z |
| rustsec-2024-0009 | Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') | 2024-01-23T12:00:00Z | 2024-01-24T17:00:49Z |
| rustsec-2024-0011 | Unauthenticated Nonce Increment in snow | 2024-01-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0012 | Stack overflow during recursive JSON parsing | 2024-01-24T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0015 | filesystem-rs may be implicitly unmaintained | 2024-01-25T12:00:00Z | 2024-02-18T04:23:45Z |
| rustsec-2024-0396 | `conrod_core` is unmaintained | 2024-01-26T12:00:00Z | 2024-11-10T14:25:35Z |
| rustsec-2024-0397 | `conrod` is unmaintained | 2024-01-26T12:00:00Z | 2024-11-10T14:25:35Z |
| rustsec-2024-0010 | Improper comparison of different-length signatures | 2024-02-06T12:00:00Z | 2024-02-15T01:22:49Z |
| rustsec-2024-0013 | Memory corruption, denial of service, and arbitrary code execution in libgit2 | 2024-02-06T12:00:00Z | 2024-02-15T01:22:49Z |
| rustsec-2024-0014 | `generational-arena` is unmaintained | 2024-02-11T12:00:00Z | 2024-02-18T04:06:15Z |
| rustsec-2024-0016 | dav1d AV1 decoder integer overflow | 2024-02-19T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0018 | ObjectPool creates uninitialized memory when freeing objects | 2024-02-27T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0017 | Non-idiomatic use of iterators leads to use after free | 2024-02-28T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0020 | Stack buffer overflow with whoami on several Unix platforms | 2024-02-28T12:00:00Z | 2024-04-11T16:16:20Z |
| rustsec-2024-0019 | Tokens for named pipes may be delivered after deregistration | 2024-03-04T12:00:00Z | 2024-03-04T17:51:31Z |
| rustsec-2024-0410 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0411 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0412 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0413 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0414 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0415 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0416 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0417 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0418 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| rustsec-2024-0419 | gtk-rs GTK3 bindings - no longer maintained | 2024-03-04T12:00:00Z | 2024-12-09T12:29:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-jenkins-2022-34174 | 2024-03-06T10:57:20.409Z | 2025-04-03T14:40:37.652Z | |
| bit-mongodb-2021-32039 | MongoDB Extension for VS Code may unexpectedly store credentials locally in clear text | 2024-03-06T10:57:20.477Z | 2025-05-20T10:02:07.006Z |
| bit-drupal-2020-13671 | 2024-03-06T10:57:20.872Z | 2025-10-22T09:08:25.162Z | |
| bit-moodle-2023-5547 | Moodle: xss risk when previewing data in course upload tool | 2024-03-06T10:57:21.193Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2021-39204 | Excessive CPU usage in Pomerium | 2024-03-06T10:57:21.991Z | 2025-05-20T10:02:07.006Z |
| bit-modsecurity2-2020-15598 | 2024-03-06T10:57:22.693Z | 2025-04-03T14:40:37.652Z | |
| bit-discourse-2023-31142 | Discourse's general category permissions could be set back to default | 2024-03-06T10:57:22.997Z | 2025-05-20T10:02:07.006Z |
| bit-mastodon-2022-31263 | 2024-03-06T10:57:23.480Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2021-36036 | Magento Commerce Media Gallery Upload Improper Access Control Could Lead To Remote Code Execution | 2024-03-06T10:57:23.602Z | 2026-03-20T09:47:33.381Z |
| bit-dotnet-2022-38013 | .NET Core and Visual Studio Denial of Service Vulnerability | 2024-03-06T10:57:24.899Z | 2025-05-20T10:02:07.006Z |
| bit-mariadb-2022-32082 | 2024-03-06T10:57:25.107Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2022-40189 | Apache Airlfow Pig Provider RCE | 2024-03-06T10:57:25.694Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5198 | Incorrect Authorization in GitLab | 2024-03-06T10:57:26.166Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2022-41725 | Excessive resource consumption in mime/multipart | 2024-03-06T10:57:26.992Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2022-24842 | Improper Privilege Management in MinIO | 2024-03-06T10:57:27.260Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2020-13938 | Improper Handling of Insufficient Privileges | 2024-03-06T10:57:27.697Z | 2025-05-20T10:02:07.006Z |
| bit-mlflow-2023-6709 | Improper Neutralization of Special Elements Used in a Template Engine in mlflow/mlflow | 2024-03-06T10:57:27.805Z | 2025-05-20T10:02:07.006Z |
| bit-lua-2020-15889 | 2024-03-06T10:57:28.905Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13670 | 2024-03-06T10:57:29.673Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2023-5546 | Moodle: stored xss in quiz grading report via user id number | 2024-03-06T10:57:30.894Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2022-24812 | FGAC API Key privilege escalation in Grafana | 2024-03-06T10:57:31.076Z | 2026-03-20T09:47:33.381Z |
| bit-mongodb-2021-32037 | User may trigger invariant when allowed to send commands directly to shards | 2024-03-06T10:57:31.261Z | 2025-05-20T10:02:07.006Z |
| bit-jenkins-2022-34173 | 2024-03-06T10:57:32.200Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2021-39162 | Incorrect handling of H2 GOAWAY + SETTINGS frames | 2024-03-06T10:57:33.498Z | 2025-05-20T10:02:07.006Z |
| bit-mastodon-2022-24307 | 2024-03-06T10:57:34.286Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2022-32081 | 2024-03-06T10:57:34.386Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2021-36023 | Magento Commerce Widgets Update Layout XML Injection Vulnerability Could Lead To Remote Code Execution | 2024-03-06T10:57:34.606Z | 2026-03-20T09:47:33.381Z |
| bit-discourse-2023-30606 | Multisite denial of service through unsanitized dynamic dispatch to SiteSetting in Discourse | 2024-03-06T10:57:34.776Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-40127 | Apache Airflow <2.4.0 has an RCE in a bash example | 2024-03-06T10:57:35.470Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-5106 | Incorrect Authorization in GitLab | 2024-03-06T10:57:36.783Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-lu31244 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:46.726872Z | 2026-03-07T09:10:59Z |
| cleanstart-2026-pr27884 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:05:52.407214Z | 2026-03-07T09:10:08Z |
| cleanstart-2026-qx99194 | Security fixes for CVE-2015-8080, CVE-2019-10192, CVE-2019-10193, CVE-2020-14147, CVE-2021-32625, CVE-2021-32626, CVE-2021-32627, CVE-2021-32628, CVE-2021-32672, CVE-2021-32675, CVE-2021-32687, CVE-2021-32762, CVE-2021-41099, CVE-2022-24736, CVE-2022-24834, CVE-2022-35977, CVE-2022-3647, CVE-2023-36824, CVE-2023-41053, CVE-2023-41056, CVE-2023-45145, CVE-2024-31227, CVE-2024-31228, CVE-2024-31449, CVE-2025-46817, CVE-2025-46818, CVE-2025-46819, CVE-2025-49844 applied in versions: 5.0.4-r0, 5.0.8-r0, 6.0.3-r0, 6.2.0-r0, 6.2.4-r0, 6.2.5-r0, 6.2.6-r0, 6.2.7-r0, 7.0.12-r0, 7.0.4-r0, 7.0.5-r0, 7.0.6-r0, 7.0.8-r0, 7.2.1-r0, 7.2.2-r0, 7.2.4-r0, 7.2.5-r1, 8.2.2-r0 | 2026-04-01T10:06:00.100216Z | 2026-03-07T09:08:53Z |
| cleanstart-2026-fn55648 | Security fixes for CVE-2025-25285, CVE-2026-21637, ghsa-23c5-xmqv-rm74, ghsa-72xf-g2v4-qvf3, ghsa-7r86-cg39-jmmj, ghsa-fj3w-jwp8-x2g3, ghsa-pfrx-2q88-qq97, ghsa-rc47-6667-2j5j, ghsa-rmvr-2pp2-xj38 applied in versions: 2.6.0-r1, 2.7.0-r0 | 2026-04-01T10:06:10.961683Z | 2026-03-06T13:00:09Z |
| cleanstart-2026-ck64127 | Security fixes for ghsa-6rw7-vpxm-498p, ghsa-73rr-hh4g-fpgx, ghsa-8qq5-rm4j-mr97, ghsa-wqch-xfxh-vrr4 applied in versions: 4.2.1.1-r1 | 2026-04-01T10:06:15.177169Z | 2026-03-06T11:36:37Z |
| cleanstart-2026-hd58055 | Security fixes for CVE-2025-25285, CVE-2026-21637, ghsa-23c5-xmqv-rm74, ghsa-3ppc-4f35-3m26, ghsa-72xf-g2v4-qvf3, ghsa-7r86-cg39-jmmj, ghsa-pfrx-2q88-qq97, ghsa-rc47-6667-2j5j, ghsa-rmvr-2pp2-xj38 applied in versions: 2.6.0-r1, 2.6.0-r2 | 2026-04-01T10:06:17.030926Z | 2026-03-06T12:59:45Z |
| cleanstart-2026-cy45415 | Security fixes for CVE-2025-15558, CVE-2025-61729, CVE-2025-68121, CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, ghsa-2464-8j7c-4cjm, ghsa-2x5j-vhc8-9cwm, ghsa-fv92-fjc5-jj9h applied in versions: 3.6.16-r0, 3.7.4-r0, 3.7.7-r0 | 2026-04-01T10:06:30.444629Z | 2026-03-06T11:37:07Z |
| cleanstart-2026-eu58098 | Security fixes for CVE-2025-61732, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.8.4-r0, 0.8.7-r0 | 2026-04-01T10:06:48.673123Z | 2026-03-05T12:22:12Z |
| cleanstart-2026-fq05951 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-27141, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-p436-gjf2-799p, ghsa-p84v-gxvw-73pf applied in versions: 3.6.13-r0, 3.6.15-r1, 3.6.18-r0, 3.6.19-r0, 3.6.19-r1, 3.7.0-r0, 3.7.3-r0 | 2026-04-01T10:07:02.415559Z | 2026-03-06T07:23:30Z |
| cleanstart-2026-fx27781 | Security fixes for CVE-2025-0913, CVE-2025-15558, CVE-2025-4673, CVE-2025-47907, CVE-2025-47914, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-27141, ghsa-37cx-329c-33x3, ghsa-9h8m-3fm2-qjrq, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-fw7p-63qq-7hpr, ghsa-p84v-gxvw-73pf applied in versions: 3.7.0-r0, 3.7.10-r0, 3.7.10-r1, 3.7.10-r2, 3.7.3-r0, 3.7.4-r0, 3.7.6-r0, 3.7.9-r0 | 2026-04-01T10:07:09.669593Z | 2026-03-06T06:49:13Z |
| cleanstart-2026-pf41398 | Security fixes for CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61727, CVE-2025-61729, CVE-2025-61732, CVE-2025-68121 applied in versions: 3.19.0-r0, 3.19.5-r0, 4.0.1-r0 | 2026-04-01T10:07:15.004853Z | 2026-03-06T05:33:23Z |
| cleanstart-2026-mk40719 | Security fixes for CVE-2025-0913, CVE-2025-4673, CVE-2025-47907, CVE-2025-58181, CVE-2025-62156, CVE-2025-62157, CVE-2026-24051, CVE-2026-25934, CVE-2026-27141, ghsa-2x5j-vhc8-9cwm, ghsa-37cx-329c-33x3, ghsa-c2hv-4pfj-mm2r, ghsa-cfpf-hrx2-8rv6, ghsa-p84v-gxvw-73pf applied in versions: 3.6.13-r0, 3.6.15-r1, 3.6.18 r0, 3.6.18-r0, 3.7.0-r0, 3.7.3-r0 | 2026-04-01T10:07:36.130294Z | 2026-03-05T10:29:59Z |
| cleanstart-2026-pm79547 | Security fixes for CVE-2018-20969, CVE-2018-6952, CVE-2019-13636, CVE-2019-13638, CVE-2019-20633 applied in versions: 2.7.6-r2, 2.7.6-r4, 2.7.6-r5, 2.7.6-r6, 2.7.6-r7 | 2026-04-01T10:07:37.644781Z | 2026-03-03T12:11:07Z |
| cleanstart-2026-ja70776 | Security fixes for CVE-2023-5870, CVE-2024-7348, CVE-2025-8713, CVE-2025-8714, CVE-2025-8715 applied in versions: 16.1-r0, 16.2-r0, 16.4-r0, 17.6-r0 | 2026-04-01T10:07:46.020645Z | 2026-03-03T12:09:34Z |
| cleanstart-2026-eq51133 | Security fixes for CVE-2023-5870, CVE-2024-7348, CVE-2025-8713, CVE-2025-8714, CVE-2025-8715 applied in versions: 16.1-r0, 16.2-r0, 16.4-r0, 17.6-r0 | 2026-04-01T10:07:46.021346Z | 2026-03-03T12:09:34Z |
| cleanstart-2026-nr51277 | Security fixes for ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.8.4-r0 | 2026-04-01T10:07:57.467759Z | 2026-03-02T11:41:08Z |
| cleanstart-2026-qf85840 | Security fixes for CVE-2025-55190, CVE-2025-55191, CVE-2025-58183, CVE-2025-58185, CVE-2025-58187, CVE-2025-58188, CVE-2025-58189, CVE-2025-59537, CVE-2025-59538, CVE-2025-61723, CVE-2025-61724, CVE-2025-61725, CVE-2025-61732, CVE-2025-68121, CVE-2026-1229, CVE-2026-25934, ghsa-2v5j-vhc3-9cwm, ghsa-2vgg-9h3w-qbr4, ghsa-2x5j-vhc8-9cwm, ghsa-2xsj-vh29-9cwm, ghsa-3wgm-2mw2-vh5m, ghsa-4x4m-3c2p-qppc, ghsa-6v2p-p543-phr9, ghsa-92cp-5422-2m47, ghsa-93mq-9ffx-83m2, ghsa-f6x5-jh6r-wrfv, ghsa-hj2p-8wj8-pfq4, ghsa-j5w8-q4qc-rx2x, ghsa-mh63-6h87-95cp, ghsa-mw99-9chc-xw7r, ghsa-r6j8-c6r2-37rr applied in versions: 2.13.9-r0, 2.14.20-r0, 3.0.16-r0, 3.0.19-r0, 3.0.22-r0, 3.0.22-r1, 3.1.4-r0, 3.1.8.-r0, 3.1.9-r4 | 2026-04-01T10:09:04.049698Z | 2026-03-02T11:48:00Z |
| cleanstart-2026-nu19941 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 5.19.3-r1 | 2026-04-06T02:44:20.354882Z | 2026-04-03T13:09:27Z |
| cleanstart-2026-kt07616 | Security fixes for CVE-2026-22735, CVE-2026-22737 applied in versions: 6.2.3-r0 | 2026-04-06T02:44:27.120329Z | 2026-04-03T13:09:27Z |
| cleanstart-2026-kt25851 | Security fixes for CVE-2025-61727, CVE-2025-61729, CVE-2025-61732, CVE-2025-68121, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 0.87.0-r0, 0.87.0-r1, 0.88.0-r1 | 2026-04-06T02:44:54.790204Z | 2026-04-03T08:04:33Z |
| cleanstart-2026-dq17669 | Security fixes for CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-32287, CVE-2026-33186, CVE-2026-33762, CVE-2026-34165, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-fw7p-63qq-7hpr applied in versions: 1.13.2-r0, 1.14.1-r0, 1.14.1-r1 | 2026-04-06T02:45:34.659600Z | 2026-04-03T07:13:53Z |
| cleanstart-2026-ml41879 | Security fixes for CVE-2026-1229, CVE-2026-24051, CVE-2026-25934, CVE-2026-26958, CVE-2026-32287, CVE-2026-33186, CVE-2026-33762, CVE-2026-34165, ghsa-37cx-329c-33x3, ghsa-6g7g-w4f8-9c9x, ghsa-fw7p-63qq-7hpr applied in versions: 1.13.2-r0, 1.14.0-r0, 1.14.0-r1, 1.14.1-r0 | 2026-04-06T02:45:36.057138Z | 2026-04-03T07:11:16Z |
| cleanstart-2026-nd57973 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-06T02:45:57.693609Z | 2026-04-03T07:10:19Z |
| cleanstart-2026-li54613 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:45:58.881296Z | 2026-04-03T07:10:19Z |
| cleanstart-2026-lr09759 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-06T02:46:06.138686Z | 2026-04-03T07:10:19Z |
| cleanstart-2026-dm62512 | Security fixes for CVE-2026-25679, CVE-2026-27139, CVE-2026-27142 applied in versions: 0.35.0-r0 | 2026-04-06T02:48:21.440386Z | 2026-04-03T06:57:54Z |
| cleanstart-2026-gm09342 | Security fixes for CVE-2025-68121, CVE-2026-26958, ghsa-fw7p-63qq-7hpr, ghsa-mqqf-5wvp-8fh8 applied in versions: 0.29.0-r0, 0.29.0-r1 | 2026-04-06T02:48:25.848581Z | 2026-04-03T06:51:44Z |
| cleanstart-2026-dm25112 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-06T02:48:32.316783Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-hl08143 | Security fixes for CVE-2025-13151, CVE-2026-22695, CVE-2026-22801, CVE-2026-24515, CVE-2026-25210, ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r5, 3.9.4-r6, 3.9.5-r0 | 2026-04-06T02:48:38.996528Z | 2026-04-03T06:50:37Z |
| cleanstart-2026-lc01167 | Security fixes for CVE-2025-61726, CVE-2025-61728, CVE-2025-61730, CVE-2025-68121, CVE-2026-24051, CVE-2026-25679, CVE-2026-27139, CVE-2026-27142, CVE-2026-33186, ghsa-9h8m-3fm2-qjrq, ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x, ghsa-p77j-4mvh-x3m3 applied in versions: 8.4.0-r0, 8.4.0-r1, 8.4.0-r2 | 2026-04-06T02:48:42.431061Z | 2026-04-03T06:52:41Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2003-avi-088 | Vulnérabilité du Java Media Framework | 2003-05-19T00:00:00.000000 | 2003-05-19T00:00:00.000000 |
| certa-2003-avi-089 | Vulnérabilité dans cdrecord | 2003-05-19T00:00:00.000000 | 2003-05-19T00:00:00.000000 |
| certa-2003-avi-090 | Multiples vulnérabilités sous HP-UX | 2003-05-23T00:00:00.000000 | 2003-05-30T00:00:00.000000 |
| certa-2003-avi-091 | Vulnérabilité de IPSec sous MacOS X | 2003-05-27T00:00:00.000000 | 2003-05-27T00:00:00.000000 |
| certa-2003-avi-092 | Correctif cumulatif pour Internet Information Server | 2003-05-30T00:00:00.000000 | 2003-05-30T00:00:00.000000 |
| certa-2003-avi-093 | Vulnérabilité de Microsoft Windows Media Services Extension | 2003-05-30T00:00:00.000000 | 2003-05-30T00:00:00.000000 |
| certa-2003-avi-094 | Vulnérabilité du service d'impression CUPS | 2003-05-30T00:00:00.000000 | 2003-06-12T00:00:00.000000 |
| certa-2003-avi-095 | Multiples vulnérabilités du serveur HTTP Apache | 2003-06-02T00:00:00.000000 | 2003-06-02T00:00:00.000000 |
| certa-2003-avi-096 | Vulnérabilité dans SunMC Change Manager | 2003-06-04T00:00:00.000000 | 2003-06-04T00:00:00.000000 |
| certa-2003-avi-097 | Multiples vulnérabilités dans Microsoft Internet Explorer | 2003-06-05T00:00:00.000000 | 2003-06-05T00:00:00.000000 |
| certa-2003-avi-098 | Multiples vulnérabilités de CDE sur les plate-formes HP Tru64 UNIX et HP-UX | 2003-06-05T00:00:00.000000 | 2003-06-05T00:00:00.000000 |
| certa-2003-avi-099 | Multiples vulnérabilités sous Solaris | 2003-06-23T00:00:00.000000 | 2003-06-23T00:00:00.000000 |
| certa-2003-avi-100 | Multiples vulnérabilités d'Ethereal | 2003-06-24T00:00:00.000000 | 2003-07-15T00:00:00.000000 |
| certa-2003-avi-101 | Vulnérabilité dans Windows Media Player 9 | 2003-06-27T00:00:00.000000 | 2003-06-27T00:00:00.000000 |
| certa-2003-avi-102 | Vulnérabilités dans Windows 2000 | 2003-07-04T00:00:00.000000 | 2003-11-13T00:00:00.000000 |
| certa-2003-avi-103 | Vulnérabilité dans CISCO CatOS | 2003-07-10T00:00:00.000000 | 2003-07-10T00:00:00.000000 |
| certa-2003-avi-104 | Vulnérabilité dans le convertisseur HTML de Microsoft | 2003-07-10T00:00:00.000000 | 2003-07-15T00:00:00.000000 |
| certa-2003-avi-105 | Vulnérabilité de SMB dans Microsoft Windows | 2003-07-10T00:00:00.000000 | 2003-07-10T00:00:00.000000 |
| certa-2003-avi-106 | Vulnérabilité dans Utility Manager sous Windows | 2003-07-10T00:00:00.000000 | 2003-07-10T00:00:00.000000 |
| certa-2003-avi-107 | Vulnérabilité de Macromedia ColdFusion MX et Macromedia JRun 4.0 | 2003-07-11T00:00:00.000000 | 2003-07-11T00:00:00.000000 |
| certa-2003-avi-108 | Vulnérabilité dans ScreenOS | 2003-07-15T00:00:00.000000 | 2003-07-15T00:00:00.000000 |
| certa-2003-avi-109 | Vulnérabilité dans nfs-utils | 2003-07-15T00:00:00.000000 | 2003-07-24T00:00:00.000000 |
| certa-2003-avi-110 | Vulnérabilité des pilotes de carte réseau Ethernet | 2003-07-15T00:00:00.000000 | 2004-04-06T00:00:00.000000 |
| certa-2003-avi-111 | Vulnérabilité dans l'interface RPC Windows | 2003-07-17T00:00:00.000000 | 2003-07-17T00:00:00.000000 |
| certa-2003-avi-112 | Vulnérabilité dans le Shell Windows | 2003-07-17T00:00:00.000000 | 2003-07-17T00:00:00.000000 |
| certa-2003-avi-113 | Vulnérabilité dans ISA Server | 2003-07-17T00:00:00.000000 | 2003-07-17T00:00:00.000000 |
| certa-2003-avi-114 | Vulnérabilité dans CISCO IOS | 2003-07-17T00:00:00.000000 | 2003-07-17T00:00:00.000000 |
| certa-2003-avi-115 | Vulnérabilité dans une fonction de gestion de fichiers sous Windows NT 4.0 Server | 2003-07-24T00:00:00.000000 | 2003-07-24T00:00:00.000000 |
| certa-2003-avi-116 | Vulnérabilité dans DirectX | 2003-07-24T00:00:00.000000 | 2003-07-24T00:00:00.000000 |
| certa-2003-avi-117 | Vulnérabilités dans MS-SQL Server | 2003-07-24T00:00:00.000000 | 2003-07-24T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2011-000030 | iVIEW Suite vulnerable to SQL injection | 2011-05-19T16:49+09:00 | 2011-05-19T16:49+09:00 |
| jvndb-2011-000031 | Movable Type vulnerable to cross-site scripting | 2011-05-25T17:37+09:00 | 2011-05-25T17:37+09:00 |
| jvndb-2011-000032 | WalRack upload file handilng vulnerability | 2011-05-26T13:37+09:00 | 2011-05-26T13:37+09:00 |
| jvndb-2011-000033 | Java Web Start may insecurely load policy files | 2011-06-10T16:22+09:00 | 2013-03-29T14:50+09:00 |
| jvndb-2011-000034 | Java Web Start may insecurely load settings files | 2011-06-10T16:23+09:00 | 2013-03-26T14:46+09:00 |
| jvndb-2011-000035 | Java Web Start may insecurely load dynamic libraries | 2011-06-10T16:23+09:00 | 2013-03-26T15:14+09:00 |
| jvndb-2011-000036 | Microsoft Windows VBScript implementation file name disclosure vulnerability | 2011-06-16T12:11+09:00 | 2011-06-16T12:11+09:00 |
| jvndb-2011-000037 | Clipboard contents alteration vulnerability in Internet Explorer | 2011-06-16T12:18+09:00 | 2011-06-16T12:18+09:00 |
| jvndb-2011-000038 | Internet Explorer vulnerable to cross-site scripting | 2011-06-16T12:21+09:00 | 2011-06-16T12:21+09:00 |
| jvndb-2011-000039 | ASP.NET vulnerable to cross-site scripting | 2011-06-16T12:23+09:00 | 2011-06-16T12:23+09:00 |
| jvndb-2011-000040 | Microsoft Outlook read receipt function vulnerability | 2011-06-16T12:25+09:00 | 2011-06-16T12:25+09:00 |
| jvndb-2011-000041 | Microsoft MSXML vulnerability in HTTP request processing | 2011-06-16T12:28+09:00 | 2011-06-16T12:28+09:00 |
| jvndb-2011-000043 | Ichitaro series vulnerable to arbitrary code execution | 2011-06-16T19:04+09:00 | 2011-06-16T19:04+09:00 |
| jvndb-2011-000042 | WeblyGo vulnerable to cross-site scripting | 2011-06-20T15:37+09:00 | 2011-06-20T15:37+09:00 |
| jvndb-2011-000044 | Cybozu Garoon vulnerable to cross-site scripting | 2011-06-24T19:15+09:00 | 2011-06-24T19:15+09:00 |
| jvndb-2011-000045 | Multiple Cybozu products vulnerable to cross-site scripting | 2011-06-24T19:18+09:00 | 2011-06-24T19:18+09:00 |
| jvndb-2011-000046 | Multiple Cybozu products vulnerable to cross-site scripting | 2011-06-24T19:21+09:00 | 2011-06-24T19:21+09:00 |
| jvndb-2011-000047 | Cybozu Office vulnerable to cross-site scripting | 2011-06-24T19:23+09:00 | 2011-06-24T19:23+09:00 |
| jvndb-2011-001633 | Header Customization by Hitachi Web Server RequetHeader Directive Could Allow Attacker to Access Data Deleted from Memory | 2011-06-29T17:54+09:00 | 2014-05-21T18:21+09:00 |
| jvndb-2010-002808 | Accela BizSearch Standard Search Page Cross-Site Scripting Vulnerability | 2011-06-29T17:55+09:00 | 2011-06-29T17:55+09:00 |
| jvndb-2010-002809 | Accela BizSearch Standard Search Page Cross-Site Scripting Vulnerability | 2011-06-29T17:55+09:00 | 2011-06-29T17:55+09:00 |
| jvndb-2011-001632 | Arbitrary Data Insertion Vulnerability in Hitachi Web Server SSL/TLS Protocol | 2011-06-29T17:55+09:00 | 2016-09-08T17:05+09:00 |
| jvndb-2010-002807 | Accela BizSearch Standard Search Page Cross-Site Scripting Vulnerability | 2011-06-29T17:57+09:00 | 2011-06-29T17:57+09:00 |
| jvndb-2011-000048 | ALZip vulnerable to buffer overflow | 2011-06-29T18:20+09:00 | 2011-06-29T18:20+09:00 |
| jvndb-2011-000049 | Opera vulnerable to denial-of-service (DoS) | 2011-07-05T16:54+09:00 | 2011-07-05T16:54+09:00 |
| jvndb-2011-000050 | XnView may insecurely load executable files | 2011-07-05T16:56+09:00 | 2011-07-05T16:56+09:00 |
| jvndb-2011-000052 | Internet Explorer vulnerable to cross-site scripting | 2011-07-08T18:29+09:00 | 2011-07-08T18:29+09:00 |
| jvndb-2011-000054 | Google Search Appliance vulnerable to cross-site scripting | 2011-07-15T16:27+09:00 | 2011-07-15T16:27+09:00 |
| jvndb-2011-000051 | ASP.NET vulnerable to cross-site scripting | 2011-07-15T16:32+09:00 | 2011-07-15T16:32+09:00 |
| jvndb-2009-002069 | Oracle iPlanet Web Server information disclosure vulnerability | 2011-07-25T18:06+09:00 | 2011-07-25T18:06+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00589 | File拒绝服务漏洞(CNVD-2015-00589) | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00590 | File拒绝服务漏洞(CNVD-2015-00590) | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00591 | Oracle VM VirtualBox存在未明漏洞(CNVD-2015-00591) | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00592 | Oracle VM VirtualBox存在未明漏洞(CNVD-2015-00592) | 2015-01-22 | 2015-01-23 |
| cnvd-2015-00593 | Oracle VM VirtualBox存在未明漏洞(CNVD-2015-00593) | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00594 | Oracle VM VirtualBox存在未明漏洞(CNVD-2015-00594) | 2015-01-22 | 2015-01-23 |
| cnvd-2015-00595 | Oracle VM VirtualBox存在未明漏洞(CNVD-2015-00595) | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00596 | Oracle VM VirtualBox存在未明漏洞(CNVD-2015-00596) | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00597 | Oracle VM VirtualBox存在未明漏洞(CNVD-2015-00597) | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00598 | Oracle Supply Chain Oracle Agile PLM for Process组件存在未明漏洞 | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00620 | Oracle Solaris Cluster存在未明任意代码执行漏洞(CNVD-2015-00620) | 2015-01-22 | 2015-01-23 |
| cnvd-2015-00621 | Oracle MySQL Server存在未明漏洞(CNVD-2015-00621) | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00622 | Oracle MySQL Server存在未明漏洞(CNVD-2015-00622) | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00623 | Oracle MySQL Server存在未明漏洞(CNVD-2015-00623) | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00624 | Oracle MySQL Server存在未明漏洞(CNVD-2015-00624) | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00625 | Oracle MySQL Server存在未明漏洞(CNVD-2015-00625) | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00626 | Oracle MySQL Server存在未明漏洞(CNVD-2015-00626) | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00627 | Oracle MySQL Server存在未明漏洞(CNVD-2015-00627) | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00628 | Oracle MySQL Server存在未明漏洞(CNVD-2015-00628) | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00629 | Oracle MySQL Server存在未明漏洞(CNVD-2015-00629) | 2015-01-22 | 2015-01-26 |
| cnvd-2015-00642 | Attachmate Reflection FTP客户端栈缓冲区溢出漏洞 | 2015-01-22 | 2015-01-27 |
| cnvd-2015-00643 | EMC M&R/ViPR SRM目录遍历漏洞 | 2015-01-22 | 2015-01-27 |
| cnvd-2015-00644 | EMC M&R/ViPR SRM文件上传漏洞 | 2015-01-22 | 2015-01-27 |
| cnvd-2015-00645 | EMC M&R/ViPR SRM信息泄露漏洞 | 2015-01-22 | 2015-01-27 |
| cnvd-2015-00646 | EMC M&R/ViPR SRM存在多个跨站脚本漏洞 | 2015-01-22 | 2015-01-27 |
| cnvd-2015-00647 | Schneider Electric ETG3000 FactoryCast HMI Gateway验证绕过漏洞 | 2015-01-22 | 2015-01-27 |
| cnvd-2015-00648 | Schneider Electric ETG3000 FactoryCast HMI Gateway未授权访问漏洞 | 2015-01-22 | 2015-01-27 |
| cnvd-2015-00649 | WebGUI存在未明跨站脚本漏洞 | 2015-01-22 | 2015-01-27 |
| cnvd-2015-00656 | Siemens Scalance X Switches拒绝服务漏洞 | 2015-01-22 | 2015-01-23 |
| cnvd-2015-00663 | Siemens Scalance X Switches 'HTTP'请求拒绝服务漏洞 | 2015-01-22 | 2015-01-27 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-03021 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03022 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03023 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03024 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03025 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 01.04.2025 |
| bdu:2015-03026 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03027 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03028 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03029 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03030 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03031 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03032 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03033 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03034 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03035 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03036 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03037 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03038 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03039 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03040 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03041 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03042 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03043 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03044 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03045 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03046 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03047 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03048 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03049 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03050 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| ID | Description | Updated |
|---|---|---|
| var-202010-1614 | Shenzhen Jingyang Technology Co., Ltd. is a leading provider of smart video products and … | 2022-05-04T09:08:52.699000Z |
| var-202010-1593 | TEWA-600NGM is a telecom optical modem. TEWA-600NGM has an unauthorized access vulner… | 2022-05-04T09:08:52.710000Z |
| var-202009-1719 | Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaom… | 2022-05-04T09:08:54.227000Z |
| var-202009-1677 | The intelligent instrument collection management system is an industrial control manageme… | 2022-05-04T09:08:54.253000Z |
| var-202008-1289 | AC6 is a 11AC dual-band wireless router dedicated to 1200M optical fiber. Tenda AC6 R… | 2022-05-04T09:08:59.427000Z |
| var-202008-1268 | Advantech WebAccess/SCADA is a browser-based SCADA software package for supervisory contr… | 2022-05-04T09:08:59.438000Z |
| var-202007-1500 | Hangzhou Yishixing Information Technology Co., Ltd. is a high-tech enterprise entity spec… | 2022-05-04T09:09:00.768000Z |
| var-202007-1479 | Suzhou Tianxiao Network Technology Co., Ltd. is a company engaged in software development… | 2022-05-04T09:09:00.780000Z |
| var-202007-0442 | IBM MQ Appliance 9.1.4.CD could allow a local attacker to obtain highly sensitive informa… | 2022-05-04T09:09:01.851000Z |
| var-202006-1922 | AC9V3.0 upgrade software is a Gigabit Ethernet wireless router of Shenzhen Jixiang Tengda… | 2022-05-04T09:09:02.462000Z |
| var-202006-1901 | Ruijie RG-RSR20-14E is a multi-service router. The RG-RSR20-14E router has a denial o… | 2022-05-04T09:09:02.477000Z |
| var-202006-1351 | SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 75… | 2022-05-04T09:09:02.626000Z |
| var-202005-1108 | Control Expert (formerly known as Unity Pro) is a PLC configuration software launched by … | 2022-05-04T09:09:06.708000Z |
| var-202005-1087 | KUNBUS-GW Modbus TCP is a programmable logic controller (PLC) that provides an integrated… | 2022-05-04T09:09:06.720000Z |
| var-202005-1066 | D-Link Dir-816 is a wireless router. D-Link DIR-816 has a command execution vulnerabi… | 2022-05-04T09:09:06.730000Z |
| var-202005-1003 | SAP NetWeaver AS ABAP (Web Dynpro ABAP), versions (SAP_UI 750, 752, 753, 754 and SAP_BASI… | 2022-05-04T09:09:06.772000Z |
| var-202004-2272 | The main function of the SIP routing distribution server is to route SIP signaling, inclu… | 2022-05-04T09:09:08.013000Z |
| var-202004-2251 | D-Link DIR-823G is a wireless router. There is a remote command execution vulnerabili… | 2022-05-04T09:09:08.025000Z |
| var-202004-2249 | Established in October 2016, Chengdu Zhifengwang Technology Co., Ltd. is an emerging high… | 2022-05-04T09:09:08.036000Z |
| var-202002-1700 | MOXA MB3180 / MB3280 / MB3480 series is an advanced Ethernet gateway device produced by T… | 2022-05-04T09:09:46.627000Z |
| var-202001-1997 | ZXR10 1800-2S is a router product of ZTE Corporation of China. ZTE ZXR10 1800-2S has … | 2022-05-04T09:09:48.244000Z |
| var-202001-1976 | ZXR10 1800-2S is a router product of ZTE Corporation of China. ZTE ZXR10 1800-2S has fil… | 2022-05-04T09:09:48.255000Z |
| var-201912-2011 | ZLAN5103 can realize transparent data forwarding between RS232 / 485/422 and TCP / IP. Co… | 2022-05-04T09:09:54.360000Z |
| var-201911-1957 | ER5200 is a high-performance Gigabit downlink router launched by H3C. It is mainly positi… | 2022-05-04T09:09:55.976000Z |
| var-201910-1871 | Zhejiang Dahua Technology Co., Ltd. is a smart IoT solution provider and operation servic… | 2022-05-04T09:10:00.684000Z |
| var-201908-2196 | Shenzhen Aolian Technology Co., Ltd. is a high-tech enterprise and a double-soft enterpri… | 2022-05-04T09:10:07.817000Z |
| var-201907-0067 | A Use After Free: CWE-416 vulnerability exists in Zelio Soft 2, V5.2 and earlier, which c… | 2022-05-04T09:10:15.048000Z |
| var-201906-1352 | Xiaomi ai speaker is a smart speaker product produced by Xiaomi. There is an unauthorize… | 2022-05-04T09:10:15.448000Z |
| var-201905-1432 | Xiaomi Xiaoai MINI smart speaker and Xiaomi Xiaoai AI smart speaker are both smart speake… | 2022-05-04T09:10:17.197000Z |
| var-201904-1630 | FANUC CNC products are the core components of CNC machine tools. FANUC CNC has a denial … | 2022-05-04T09:10:19.075000Z |