Recent vulnerabilities

Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
ID CVSS Description Vendor Product Published Updated
CVE-1999-0609
N/A
An incorrect configuration of the SoftCart CGI pr… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.678Z
CVE-1999-0610
N/A
An incorrect configuration of the Webcart CGI pro… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.691Z
CVE-1999-0611
N/A
A system-critical Windows NT registry key has an … n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.691Z
CVE-1999-0613
N/A
The rpc.sprayd service is running. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.783Z
CVE-1999-0614
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FTP service is running. N/A N/A 2000-02-04T05:00:00.000Z 2003-03-21T10:00:00.000Z
CVE-1999-0615
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SNMP service is running. N/A N/A 2000-02-04T05:00:00.000Z 2002-05-09T09:00:00.000Z
CVE-1999-0616
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The TFTP service is running. N/A N/A 2000-02-04T05:00:00.000Z 2003-03-21T10:00:00.000Z
CVE-1999-0617
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SMTP service is running. N/A N/A 2000-02-04T05:00:00.000Z 2003-03-21T10:00:00.000Z
CVE-1999-0618
N/A
The rexec service is running. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.715Z
CVE-1999-0619
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The Telnet service is running. N/A N/A 2000-02-04T05:00:00.000Z 2003-03-21T10:00:00.000Z
CVE-1999-0620
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NIS is running. N/A N/A 2000-02-04T05:00:00.000Z 2003-03-21T10:00:00.000Z
CVE-1999-0621
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NETBIOS is running. N/A N/A 2000-02-04T05:00:00.000Z 2002-02-02T10:00:00.000Z
CVE-1999-0622
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to DNS service is running. N/A N/A 2000-02-04T05:00:00.000Z 2003-03-21T10:00:00.000Z
CVE-1999-0623
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X Windows service is running. N/A N/A 2000-02-04T05:00:00.000Z 2003-03-21T10:00:00.000Z
CVE-1999-0624
N/A
The rstat/rstatd service is running. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.709Z
CVE-1999-0625
N/A
The rpc.rquotad service is running. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.710Z
CVE-1999-0629
N/A
The ident/identd service is running. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.674Z
CVE-1999-0630
N/A
The NT Alerter and Messenger services are running. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.690Z
CVE-1999-0631
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NFS service is running. N/A N/A 2000-02-04T05:00:00.000Z 2003-03-21T10:00:00.000Z
CVE-1999-0632
N/A
The RPC portmapper service is running. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.686Z
CVE-1999-0633
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The HTTP/WWW service is running. N/A N/A 2000-02-04T05:00:00.000Z 2003-03-21T10:00:00.000Z
CVE-1999-0634
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SSH service is running. N/A N/A 2000-02-04T05:00:00.000Z 2003-03-21T10:00:00.000Z
CVE-1999-0635
N/A
The echo service is running. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.728Z
CVE-1999-0636
N/A
The discard service is running. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.728Z
CVE-1999-0637
N/A
The systat service is running. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.734Z
CVE-1999-0638
N/A
The daytime service is running. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.690Z
CVE-1999-0639
N/A
The chargen service is running. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:48:36.981Z
CVE-1999-0640
N/A
The Gopher service is running. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:48:37.588Z
CVE-1999-0641
N/A
The UUCP service is running. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:48:37.607Z
CVE-1999-0642
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A POP service is running. N/A N/A 2000-02-04T05:00:00.000Z 2003-03-21T10:00:00.000Z
ID CVSS Description Vendor Product Published Updated
CVE-1999-0495
N/A
A remote attacker can gain access to a file syste… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.327Z
CVE-1999-0497
N/A
Anonymous FTP is enabled. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.555Z
CVE-1999-0512
N/A
A mail server is explicitly configured to allow S… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.455Z
CVE-1999-0515
N/A
An unrestricted remote trust relationship for Uni… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.464Z
CVE-1999-0520
N/A
A system-critical NETBIOS/SMB share has inappropr… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.463Z
CVE-1999-0523
N/A
ICMP echo (ping) is allowed from arbitrary hosts. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.453Z
CVE-1999-0527
N/A
The permissions for system-critical data in an an… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.606Z
CVE-1999-0528
N/A
A router or firewall forwards external packets th… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.438Z
CVE-1999-0529
N/A
A router or firewall forwards packets that claim … n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.227Z
CVE-1999-0530
N/A
A system is operating in "promiscuous" mode which… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.688Z
CVE-1999-0531
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "An SMTP service supports EXPN, VRFY, HELP, ESMTP, and/or EHLO. N/A N/A 2000-02-04T05:00:00.000Z 2005-11-02T10:00:00.000Z
CVE-1999-0539
N/A
A trust relationship exists between two Unix hosts. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.533Z
CVE-1999-0547
N/A
An SSH server allows authentication through the .… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.708Z
CVE-1999-0548
N/A
A superfluous NFS server is running, but it is no… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.685Z
CVE-1999-0549
N/A
Windows NT automatically logs in an administrator… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.554Z
CVE-1999-0554
N/A
NFS exports system-critical data to the world, e.… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.685Z
CVE-1999-0555
N/A
A Unix account with a name other than "root" has … n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.566Z
CVE-1999-0556
N/A
Two or more Unix accounts have the same UID. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.487Z
CVE-1999-0559
N/A
A system-critical Unix file or directory has inap… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.643Z
CVE-1999-0560
N/A
A system-critical Windows NT file or directory ha… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.462Z
CVE-1999-0561
N/A
IIS has the #exec function enabled for Server Sid… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.516Z
CVE-1999-0564
N/A
An attacker can force a printer to print arbitrar… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.562Z
CVE-1999-0565
N/A
A Sendmail alias allows input to be piped to a program. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.585Z
CVE-1999-0568
N/A
rpc.admind in Solaris is not running in a secure mode. n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.611Z
CVE-1999-0569
N/A
A URL for a WWW directory allows auto-indexing, w… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.540Z
CVE-1999-0570
N/A
Windows NT is not using a password filter utility… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.711Z
CVE-1999-0571
N/A
A router's configuration service or management in… n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.638Z
CVE-1999-0577
N/A
A Windows NT system's file audit policy does not … n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.676Z
CVE-1999-0578
N/A
A Windows NT system's registry audit policy does … n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.691Z
CVE-1999-0579
N/A
A Windows NT system's registry audit policy does … n/a
n/a
2000-02-04T05:00:00.000Z 2024-08-01T16:41:45.675Z
ID Severity Description Published Updated
ghsa-vvjc-q5vr-52q6
9.8 (3.1)
Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Executi… 2018-10-16T23:13:00Z 2023-12-19T23:04:54Z
ghsa-vq9j-jh62-5hmp
7.4 (3.1)
Apache Camel's Validation Component is vulnerable against SSRF via remote DTDs and XXE. 2018-10-16T23:13:11Z 2023-12-19T22:22:28Z
ghsa-2fw5-rvf2-jq56
Apache Camel's XSLT component allows remote attackers to read arbitrary files 2018-10-16T23:13:26Z 2023-02-15T22:19:10Z
ghsa-h6rp-8v4j-hwph
Apache Camel's XSLT component allows remote attackers to execute arbitrary Java methods 2018-10-16T23:13:49Z 2023-02-15T22:19:51Z
ghsa-5xqr-grq4-qwgx
5.5 (3.1)
Junrar vulnerable to Infinite Loop 2018-10-17T00:04:05Z 2022-11-17T18:39:50Z
ghsa-cvj4-g3gx-8vqq
7.5 (3.1)
Restlet Framework allows remote attackers to access arbitrary files via a crafted REST API HTTP request 2018-10-17T00:04:18Z 2022-04-26T21:37:05Z
ghsa-2mp8-qvqm-3xwq
7.5 (3.1)
Restlet Framework Ja-rs extension is vulnerable to XXE when using SimpleXMLProvider 2018-10-17T00:04:31Z 2023-09-26T11:23:36Z
ghsa-73cq-fhp3-8rpw
Moderate severity vulnerability that affects org.restlet.jse:org.restlet 2018-10-17T00:04:53Z 2021-09-02T19:18:12Z
ghsa-cfh5-3ghh-wfjx
Improper Verification of Cryptographic Signature in org.apache.httpcomponents:httpclient 2018-10-17T00:05:06Z 2024-04-12T22:05:35Z
ghsa-2x83-r56g-cv47
Improper certificate validation in org.apache.httpcomponents:httpclient 2018-10-17T00:05:15Z 2024-03-05T18:49:27Z
ghsa-fmj5-wv96-r2ch
Denial of service vulnerability in org.apache.httpcomponents:httpclient 2018-10-17T00:05:29Z 2023-02-13T18:20:06Z
ghsa-h8q5-g2cj-qr5h
7.5 (3.1)
Apache Tika is vulnerable to entity expansions which can lead to a denial of service attack 2018-10-17T15:43:25Z 2022-04-26T21:46:04Z
ghsa-9r24-gp44-h3pm
8.1 (3.1)
Command injection in org.apache.tika:tika-core 2018-10-17T15:43:43Z 2024-04-19T19:47:15Z
ghsa-p699-3wgc-7h72
5.5 (3.1)
org.apache.tika:tika-parsers has an Infinite Loop vulnerability 2018-10-17T15:43:59Z 2023-02-28T22:57:51Z
ghsa-ccjp-w723-2jf2
5.3 (3.1)
Apache Tika Server exposes sensitive information 2018-10-17T15:44:10Z 2023-09-12T15:51:03Z
ghsa-4xr4-4c65-hj7f
7.8 (3.1)
Apache Tika does not properly initialize the XML parser or choose handlers 2018-10-17T15:44:22Z 2022-04-26T21:46:36Z
ghsa-j8g6-2wh7-6439
9.8 (3.1)
Apache Tika allows Java code execution for serialized objects embedded in MATLAB files 2018-10-17T15:44:36Z 2024-04-12T21:33:27Z
ghsa-6jq2-789q-fff2
7.5 (3.1)
High severity vulnerability that affects org.apache.tika:tika-core 2018-10-17T15:49:36Z 2021-09-02T16:41:17Z
ghsa-w6g3-v46q-5p28
5.9 (3.1)
Moderate severity vulnerability that affects org.apache.tika:tika-core 2018-10-17T15:49:58Z 2021-09-21T17:58:38Z
ghsa-j53j-gmr9-h8g3
5.5 (3.1)
Comparison errorr in org.apache.tika:tika-core 2018-10-17T15:50:31Z 2024-03-04T23:27:07Z
ghsa-5mf7-26mw-3rqr
5.5 (3.1)
Moderate severity vulnerability that affects org.apache.tika:tika-core 2018-10-17T15:50:45Z 2021-09-01T22:17:57Z
ghsa-rvgg-f8qm-6h7j
High severity vulnerability that affects io.vertx:vertx-web 2018-10-17T16:19:43Z 2024-04-12T21:17:45Z
ghsa-45xm-v8gq-7jqx
6.5 (3.1)
Excessive memory allocation 2018-10-17T16:19:59Z 2022-04-25T20:23:45Z
ghsa-qh3m-qw6v-qvhg
Moderate severity vulnerability that affects io.vertx:vertx-core 2018-10-17T16:20:32Z 2024-03-04T20:46:26Z
ghsa-h39x-m55c-v55h
9.8 (3.1)
Eclipse Vert.x does not properly neutralize '' (forward slashes) sequences that can resolve to an e… 2018-10-17T16:20:45Z 2022-04-26T21:49:59Z
ghsa-4446-656p-f54g
9.8 (3.1)
Deserialization of Untrusted Data in Bouncy castle 2018-10-17T16:23:12Z 2025-05-12T21:40:33Z
ghsa-4vhj-98r6-424h
7.5 (3.1)
In Bouncy Castle JCE Provider it is possible to inject extra elements in the sequence making up the… 2018-10-17T16:23:26Z 2025-09-12T19:27:36Z
ghsa-c8xf-m4ff-jcxj
5.3 (3.1)
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcp… 2018-10-17T16:23:38Z 2025-09-12T19:12:44Z
ghsa-r97x-3g8f-gx3m
7.5 (3.1)
The Bouncy Castle JCE Provider carry a propagation bug 2018-10-17T16:23:50Z 2025-09-12T19:28:32Z
ghsa-r9ch-m4fh-fc7q
5.9 (3.1)
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcp… 2018-10-17T16:24:00Z 2025-09-12T19:13:38Z
ID Severity Description Package Published Updated
pysec-2019-78
A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposu… ceilometer 2019-03-26T18:29:00Z 2020-10-22T14:44:00Z
pysec-2019-5
Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerabi… ansible 2019-03-27T13:29:00Z 2020-05-21T14:55:00Z
pysec-2019-166
The Serialize.deserialize() method in CoAPthon3 1.0 and 1.0.1 mishandles certain exceptio… coapthon3 2019-04-02T19:29:00Z 2021-08-25T04:57:20.904496Z
pysec-2019-165
The Serialize.deserialize() method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles ce… coapthon 2019-04-02T20:29:00Z 2021-08-25T04:57:20.831477Z
pysec-2019-107
nbla/logger.cpp in libnnabla.a in Sony Neural Network Libraries (aka nnabla) through v1.0… nnabla 2019-04-04T05:29:00Z 2019-04-05T20:09:00Z
pysec-2019-158
In Jupyter Notebook before 5.7.8, an open redirect can occur via an empty netloc. This is… notebook 2019-04-04T16:29:00Z 2021-07-15T02:22:16.309397Z
pysec-2019-127
In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 befo… trytond 2019-04-05T01:29:00Z 2020-08-26T12:45:00Z
pysec-2019-189
An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and … neutron 2019-04-05T05:29:00Z 2021-08-27T03:22:08.705789Z
pysec-2019-201
Roundup 1.6 allows XSS via the URI because frontends/roundup.cgi and roundup/cgi/wsgi_han… roundup 2019-04-06T20:29:00Z 2021-09-02T01:11:35.189013Z
pysec-2019-217
In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape. jinja2 2019-04-07T00:29:00Z 2021-11-22T04:57:52.862665Z
pysec-2019-220
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape. jinja2 2019-04-08T13:29:00Z 2021-11-22T04:57:52.929678Z
pysec-2019-214
A malicious admin user could edit the state of objects in the Airflow metadata database t… apache-airflow 2019-04-10T20:29:00Z 2021-11-16T03:58:43.132049Z
pysec-2019-215
A number of HTTP endpoints in the Airflow webserver (both RBAC and classic) did not have … apache-airflow 2019-04-10T20:29:00Z 2021-11-16T03:58:43.176949Z
pysec-2019-132
In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attac… urllib3 2019-04-15T15:29:00Z 2019-06-13T04:29:00Z
pysec-2019-198
OneLogin PythonSAML 2.3.0 and earlier may incorrectly utilize the results of XML DOM trav… python-saml 2019-04-17T14:29:00Z 2021-08-27T03:22:18.581552Z
pysec-2019-133
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired s… urllib3 2019-04-18T21:29:00Z 2019-09-14T18:15:00Z
pysec-2019-155
python-dbusmock before version 0.15.1 AddTemplate() D-Bus method call or DBusTestCase.spa… python-dbusmock 2019-04-22T16:29:00Z 2021-07-05T00:01:25.330872Z
pysec-2019-188
A flaw was found in Mercurial before 4.9. It was possible to use symlinks and subreposito… mercurial 2019-04-22T16:29:00Z 2021-08-27T03:22:07.409198Z
pysec-2019-206
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of… tensorflow 2019-04-23T21:29:00Z 2021-08-27T03:22:22.321158Z
pysec-2019-208
Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute a… tensorflow 2019-04-23T21:29:00Z 2021-08-27T03:22:22.407658Z
pysec-2019-224
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of… tensorflow-cpu 2019-04-23T21:29:00Z 2021-08-27T03:22:22.321158Z
pysec-2019-226
Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute a… tensorflow-cpu 2019-04-23T21:29:00Z 2021-08-27T03:22:22.407658Z
pysec-2019-231
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of… tensorflow-gpu 2019-04-23T21:29:00Z 2021-12-09T06:35:11.756170Z
pysec-2019-233
Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute a… tensorflow-gpu 2019-04-23T21:29:00Z 2021-12-09T06:35:11.845396Z
pysec-2019-204
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Goo… tensorflow 2019-04-24T17:29:00Z 2021-08-27T03:22:22.150023Z
pysec-2019-207
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow bef… tensorflow 2019-04-24T17:29:00Z 2021-08-27T03:22:22.362937Z
pysec-2019-210
NULL pointer dereference in Google TensorFlow before 1.12.2 could cause a denial of servi… tensorflow 2019-04-24T17:29:00Z 2021-08-27T03:22:22.500832Z
pysec-2019-222
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Goo… tensorflow-cpu 2019-04-24T17:29:00Z 2021-08-27T03:22:22.150023Z
pysec-2019-225
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow bef… tensorflow-cpu 2019-04-24T17:29:00Z 2021-08-27T03:22:22.362937Z
pysec-2019-228
NULL pointer dereference in Google TensorFlow before 1.12.2 could cause a denial of servi… tensorflow-cpu 2019-04-24T17:29:00Z 2021-08-27T03:22:22.500832Z
ID Description Updated
ID Description Published Updated
mal-2022-534 Malicious code in @protiviti/fetlife-assets (npm) 2022-06-20T18:20:31Z 2022-06-20T18:20:32Z
mal-2022-556 Malicious code in @realcommerce-dpm/fetlife-assets (npm) 2022-06-20T18:20:32Z 2022-06-20T18:20:32Z
mal-2022-557 Malicious code in @rebelliondefense/fetlife-assets (npm) 2022-06-20T18:20:32Z 2022-06-20T18:20:33Z
mal-2022-560 Malicious code in @replyify/fetlife-assets (npm) 2022-06-20T18:20:32Z 2022-06-20T18:20:33Z
mal-2022-561 Malicious code in @rezserver/fetlife-assets (npm) 2022-06-20T18:20:32Z 2022-06-20T18:20:33Z
mal-2022-568 Malicious code in @rwbaird/fetlife-assets (npm) 2022-06-20T18:20:33Z 2022-06-20T18:20:33Z
mal-2022-570 Malicious code in @saltstack/fetlife-assets (npm) 2022-06-20T18:20:33Z 2022-06-20T18:20:34Z
mal-2022-581 Malicious code in @serenityos/fetlife-assets (npm) 2022-06-20T18:20:33Z 2022-06-20T18:20:34Z
mal-2022-591 Malicious code in @simplepoll/fetlife-assets (npm) 2022-06-20T18:20:33Z 2022-06-20T18:20:34Z
mal-2022-608 Malicious code in @sport5/fetlife-assets (npm) 2022-06-20T18:20:34Z 2022-06-20T18:20:34Z
mal-2022-611 Malicious code in @staked/fetlife-assets (npm) 2022-06-20T18:20:34Z 2022-06-20T18:20:34Z
mal-2022-614 Malicious code in @steampowered/fetlife-assets (npm) 2022-06-20T18:20:34Z 2022-06-20T18:20:35Z
mal-2022-615 Malicious code in @storspiller/fetlife-assets (npm) 2022-06-20T18:20:34Z 2022-06-20T18:20:35Z
mal-2022-632 Malicious code in @tel-avive/fetlife-assets (npm) 2022-06-20T18:20:35Z 2022-06-20T18:20:35Z
mal-2022-633 Malicious code in @telavive/fetlife-assets (npm) 2022-06-20T18:20:35Z 2022-06-20T18:20:35Z
mal-2022-635 Malicious code in @texashealth/fetlife-assets (npm) 2022-06-20T18:20:35Z 2022-06-20T18:20:36Z
mal-2022-636 Malicious code in @thealgorithms/fetlife-assets (npm) 2022-06-20T18:20:35Z 2022-06-20T18:20:36Z
mal-2022-637 Malicious code in @thecheesecakefactory/fetlife-assets (npm) 2022-06-20T18:20:36Z 2022-06-20T18:20:36Z
mal-2022-638 Malicious code in @themarker/fetlife-assets (npm) 2022-06-20T18:20:36Z 2022-06-20T18:20:36Z
mal-2022-665 Malicious code in @toyota/fetlife-assets (npm) 2022-06-20T18:20:36Z 2022-06-20T18:20:37Z
mal-2022-690 Malicious code in @unibet/fetlife-assets (npm) 2022-06-20T18:20:36Z 2022-06-20T18:20:37Z
mal-2022-693 Malicious code in @unitedhealthgroup/fetlife-assets (npm) 2022-06-20T18:20:37Z 2022-06-20T18:20:37Z
mal-2022-699 Malicious code in @usabilityhub/fetlife-assets (npm) 2022-06-20T18:20:37Z 2022-06-20T18:20:37Z
mal-2022-703 Malicious code in @veracrypt/fetlife-assets (npm) 2022-06-20T18:20:37Z 2022-06-20T18:20:38Z
mal-2022-707 Malicious code in @vladcazino/fetlife-assets (npm) 2022-06-20T18:20:37Z 2022-06-20T18:20:38Z
mal-2022-708 Malicious code in @volkswagen/fetlife-assets (npm) 2022-06-20T18:20:38Z 2022-06-20T18:20:38Z
mal-2022-709 Malicious code in @vpnarea/fetlife-assets (npm) 2022-06-20T18:20:38Z 2022-06-20T18:20:38Z
mal-2022-711 Malicious code in @vwcredit/fetlife-assets (npm) 2022-06-20T18:20:38Z 2022-06-20T18:20:38Z
mal-2022-722 Malicious code in @wegmans/fetlife-assets (npm) 2022-06-20T18:20:38Z 2022-06-20T18:20:39Z
mal-2022-723 Malicious code in @wellsfargo/fetlife-assets (npm) 2022-06-20T18:20:38Z 2022-06-20T18:20:39Z
ID Description Published Updated
wid-sec-w-2025-1860 Nvidia Treiber: Mehrere Schwachstellen 2020-06-24T22:00:00.000+00:00 2025-08-18T22:00:00.000+00:00
wid-sec-w-2025-1693 Net-SNMP: Schwachstelle ermΓΆglicht Denial of Service 2020-06-25T22:00:00.000+00:00 2025-07-31T22:00:00.000+00:00
wid-sec-w-2023-0068 OpenSSH: Schwachstelle ermΓΆglicht Umgehen von Sicherheitsvorkehrungen 2020-06-29T22:00:00.000+00:00 2025-12-17T23:00:00.000+00:00
wid-sec-w-2023-0664 OpenJPEG: Schwachstelle ermΓΆglicht nicht spezifizierten Angriff 2020-06-29T22:00:00.000+00:00 2023-03-15T23:00:00.000+00:00
wid-sec-w-2024-0975 PuTTY: Schwachstelle ermΓΆglicht Umgehen von Sicherheitsvorkehrungen 2020-06-29T22:00:00.000+00:00 2024-04-25T22:00:00.000+00:00
wid-sec-w-2025-0288 Sophos XG Firewall: Schwachstelle ermΓΆglicht CodeausfΓΌhrung 2020-06-29T22:00:00.000+00:00 2025-02-06T23:00:00.000+00:00
wid-sec-w-2023-0457 Mozilla Firefox/Thunderbird: Mehrere Schwachstellen 2020-06-30T22:00:00.000+00:00 2025-05-01T22:00:00.000+00:00
wid-sec-w-2022-1268 QEMU: Schwachstelle ermΓΆglicht Denial of Service 2020-07-01T22:00:00.000+00:00 2024-09-02T22:00:00.000+00:00
wid-sec-w-2023-1919 Wireshark: Schwachstelle ermΓΆglicht Denial of Service 2020-07-01T22:00:00.000+00:00 2023-07-30T22:00:00.000+00:00
wid-sec-w-2024-1480 PowerDNS: Schwachstelle ermΓΆglicht Umgehen von Sicherheitsvorkehrungen 2020-07-01T22:00:00.000+00:00 2024-06-30T22:00:00.000+00:00
wid-sec-w-2022-0960 Linux Kernel: Schwachstelle ermΓΆglicht Denial of Service 2020-07-02T22:00:00.000+00:00 2023-02-15T23:00:00.000+00:00
wid-sec-w-2023-1220 Python: Schwachstelle ermΓΆglicht Denial of Service 2020-07-06T22:00:00.000+00:00 2024-07-11T22:00:00.000+00:00
wid-sec-w-2023-1298 Python: Schwachstelle ermΓΆglicht Denial of Service 2020-07-13T22:00:00.000+00:00 2025-11-09T23:00:00.000+00:00
wid-sec-w-2022-0519 Apache Tomcat: Mehrere Schwachstellen ermΓΆglichen Denial of Service 2020-07-14T22:00:00.000+00:00 2026-03-26T23:00:00.000+00:00
wid-sec-w-2022-1522 Oracle Java SE: Mehrere Schwachstellen 2020-07-14T22:00:00.000+00:00 2025-05-13T22:00:00.000+00:00
wid-sec-w-2023-0582 Oracle Berkeley DB: Mehrere Schwachstellen 2020-07-14T22:00:00.000+00:00 2023-03-07T23:00:00.000+00:00
wid-sec-w-2024-2181 Oracle Fusion Middleware: Mehrere Schwachstellen 2020-07-14T22:00:00.000+00:00 2024-09-18T22:00:00.000+00:00
wid-sec-w-2023-2221 OTRS: Schwachstelle ermΓΆglicht Offenlegung von Informationen 2020-07-19T22:00:00.000+00:00 2023-08-30T22:00:00.000+00:00
wid-sec-w-2023-2731 Red Hat Ceph Storage: Mehrere Schwachstellen 2020-07-20T22:00:00.000+00:00 2023-10-23T22:00:00.000+00:00
wid-sec-w-2025-1235 Python: Schwachstelle ermΓΆglicht Umgehen von Sicherheitsvorkehrungen 2020-07-20T22:00:00.000+00:00 2025-11-09T23:00:00.000+00:00
wid-sec-w-2025-2930 Red Hat Enterprise Linux: Schwachstelle ermΓΆglicht Umgehen von Sicherheitsvorkehrungen 2020-07-21T22:00:00.000+00:00 2025-12-29T23:00:00.000+00:00
wid-sec-w-2022-1091 QEMU: Schwachstelle ermΓΆglicht Denial of Service 2020-07-22T22:00:00.000+00:00 2024-09-02T22:00:00.000+00:00
wid-sec-w-2022-1831 Mozilla NSS: Schwachstelle ermΓΆglicht nicht spezifizierten Angriff 2020-07-27T22:00:00.000+00:00 2025-06-02T22:00:00.000+00:00
wid-sec-w-2026-0726 TYPO3 Core: Mehrere Schwachstellen 2020-07-27T22:00:00.000+00:00 2026-03-15T23:00:00.000+00:00
wid-sec-w-2022-0553 Grub2: Mehrere Schwachstellen ermΓΆglichen Umgehen von Sicherheitsvorkehrungen 2020-07-29T22:00:00.000+00:00 2025-04-09T22:00:00.000+00:00
wid-sec-w-2022-2413 OpenSSH: Schwachstelle ermΓΆglicht AusfΓΌhren von beliebigem Programmcode mit den Rechten des Dienstes 2020-07-29T22:00:00.000+00:00 2025-05-22T22:00:00.000+00:00
wid-sec-w-2024-0438 libssh: Schwachstelle ermΓΆglicht Denial of Service 2020-07-29T22:00:00.000+00:00 2024-05-07T22:00:00.000+00:00
wid-sec-w-2023-1274 Red Hat OpenShift: Schwachstelle ermΓΆglicht Denial of Service 2020-07-30T22:00:00.000+00:00 2023-05-22T22:00:00.000+00:00
wid-sec-w-2022-1995 Google Android: Mehrere Schwachstellen 2020-08-03T22:00:00.000+00:00 2024-05-30T22:00:00.000+00:00
wid-sec-w-2023-2981 Red Hat OpenShift: Mehrere Schwachstellen 2020-08-06T22:00:00.000+00:00 2023-11-21T23:00:00.000+00:00
ID Description Published Updated
icsa-17-283-01 LAVA Computer MFG Inc. Ether-Serial Link 2017-10-10T00:00:00.000000Z 2017-10-10T00:00:00.000000Z
icsa-17-283-02 JanTek JTC-200 2017-10-10T00:00:00.000000Z 2017-10-10T00:00:00.000000Z
icsa-17-285-01 ProMinent MultiFLEX M10a Controller 2017-10-12T00:00:00.000000Z 2017-10-12T00:00:00.000000Z
icsa-17-285-02 WECON Technology Co., Ltd. LeviStudio HMI Editor 2017-10-12T00:00:00.000000Z 2017-10-12T00:00:00.000000Z
icsa-17-285-03 Envitech Ltd. EnviDAS Ultimate 2017-10-12T00:00:00.000000Z 2017-10-12T00:00:00.000000Z
icsa-17-285-04a NXP Semiconductors MQX RTOS (Update A) 2017-10-12T00:00:00.000000Z 2018-02-01T00:00:00.000000Z
icsa-17-285-05 Siemens BACnet Field Panels (Update A) 2017-10-12T00:00:00.000000Z 2022-06-14T00:00:00.000000Z
icsa-17-290-01 Progea Movicon SCADA/HMI 2017-10-17T00:00:00.000000Z 2017-10-17T00:00:00.000000Z
icsa-17-306-01 ICSA-17-306-01 Siemens SIMATIC PCS 7 (Update A) 2017-10-18T00:00:00.000000Z 2018-06-12T00:00:00.000000Z
icsa-17-292-01 SpiderControl MicroBrowser 2017-10-19T00:00:00.000000Z 2017-10-19T00:00:00.000000Z
icsma-17-292-01 ICSMA-17-292-01_Boston Scientific ZOOM LATITUDE PRM Vulnerabilities 2017-10-19T00:00:00.000000Z 2017-10-19T00:00:00.000000Z
icsa-17-299-01 Korenix JetNet 2017-10-26T00:00:00.000000Z 2017-10-26T00:00:00.000000Z
icsa-17-299-02 Rockwell Automation Stratix 5100 (Update A) 2017-10-26T00:00:00.000000Z 2018-11-01T00:00:00.000000Z
icsa-17-304-01 ABB FOX515T 2017-10-31T00:00:00.000000Z 2017-10-31T00:00:00.000000Z
icsa-17-304-02 Trihedral Engineering Limited VTScada 2017-10-31T00:00:00.000000Z 2017-10-31T00:00:00.000000Z
icsa-17-306-02 Advantech WebAccess 2017-11-02T00:00:00.000000Z 2017-11-02T00:00:00.000000Z
icsa-17-313-01 AutomationDirect CLICK, C-More, C-More Micro, Do-more Designer, GS Drives, SL-Soft SOLO, DirectSOFT (Update B) 2017-11-09T00:00:00.000000Z 2018-07-24T00:00:00.000000Z
icsa-17-313-02 Schneider Electric InduSoft Web Studio and InTouch Machine Edition 2017-11-09T00:00:00.000000Z 2017-11-09T00:00:00.000000Z
icsa-17-318-01 ICSA-17-318-01_Siemens SCALANCE, SIMATIC, RUGGEDCOM, and SINAMICS Products (Update F) 2017-11-14T00:00:00.000000Z 2019-04-09T00:00:00.000000Z
icsa-17-318-02a ABB TropOS (Update A) 2017-11-14T00:00:00.000000Z 2018-02-15T00:00:00.000000Z
icsma-17-318-01 Philips IntelliSpace Cardiovascular System and Xcelera System Vulnerability 2017-11-14T00:00:00.000000Z 2017-11-14T00:00:00.000000Z
icsa-17-320-01 Moxa NPort 5110, 5130, and 5150 2017-11-16T00:00:00.000000Z 2017-11-16T00:00:00.000000Z
icsa-17-320-02 Siemens SICAM 2017-11-16T00:00:00.000000Z 2017-11-16T00:00:00.000000Z
icsa-17-332-01 Siemens SCALANCE W1750D, M800, S615, and RUGGEDCOM RM1224 (Update C) 2017-11-17T00:00:00.000000Z 2018-05-09T00:00:00.000000Z
icsa-17-325-01 PHOENIX CONTACT WLAN Capable Devices using the WPA2 Protocol 2017-11-21T00:00:00.000000Z 2017-11-21T00:00:00.000000Z
icsa-17-339-01 Siemens Industrial Products (Update S) 2017-11-23T00:00:00.000000Z 2024-07-09T00:00:00.000000Z
icsma-17-332-01 Ethicon Endo-Surgery Generator G11 Vulnerability 2017-11-28T00:00:00.000000Z 2017-11-28T00:00:00.000000Z
icsa-17-334-01 Siemens SWT3000 2017-11-30T00:00:00.000000Z 2017-11-30T00:00:00.000000Z
icsa-17-334-02 GEOVAP Reliance SCADA 2017-11-30T00:00:00.000000Z 2017-11-30T00:00:00.000000Z
icsa-17-341-01 Xiongmai Technology IP Cameras and DVRs 2017-12-07T00:00:00.000000Z 2017-12-07T00:00:00.000000Z
ID Description Published Updated
cisco-sa-20190515-sb300sms-dhcp Cisco Small Business 300 Series Managed Switches DHCP Denial of Service Vulnerability 2019-05-15T16:00:00+00:00 2019-05-15T16:00:00+00:00
cisco-sa-20190515-webex-player Cisco Webex Network Recording Player Arbitrary Code Execution Vulnerabilities 2019-05-15T16:00:00+00:00 2019-05-15T16:00:00+00:00
cisco-sa-20190515-nxos-cli-bypass Cisco NX-OS Software CLI Bypass to Internal Service Vulnerability 2019-05-16T16:00:00+00:00 2021-05-19T20:31:16+00:00
cisco-sa-20190605-cucm-imp-dos Cisco Unified Communications Manager IM&P Service, Cisco TelePresence VCS, and Cisco Expressway Series Denial of Service Vulnerability 2019-06-05T16:00:00+00:00 2019-06-24T13:49:49+00:00
cisco-sa-20190605-ece-xss Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability 2019-06-05T16:00:00+00:00 2019-06-05T16:00:00+00:00
cisco-sa-20190605-ind-csrf Cisco Industrial Network Director Cross-Site Request Forgery Vulnerability 2019-06-05T16:00:00+00:00 2019-06-11T19:14:15+00:00
cisco-sa-20190605-ind-rce Cisco Industrial Network Director Remote Code Execution Vulnerability 2019-06-05T16:00:00+00:00 2019-06-05T16:00:00+00:00
cisco-sa-20190605-ind-xss Cisco Industrial Network Director Stored Cross-Site Scripting Vulnerability 2019-06-05T16:00:00+00:00 2019-06-05T16:00:00+00:00
cisco-sa-20190605-iosxr-ssh Cisco IOS XR Software Secure Shell Authentication Vulnerability 2019-06-05T16:00:00+00:00 2019-06-05T16:00:00+00:00
cisco-sa-20190605-vcs Cisco TelePresence Video Communication Server and Cisco Expressway Series Server-Side Request Forgery Vulnerability 2019-06-05T16:00:00+00:00 2019-06-05T16:00:00+00:00
cisco-sa-20190605-webexmeetings-id Cisco Webex Meetings Server Information Disclosure Vulnerability 2019-06-05T16:00:00+00:00 2019-06-05T16:00:00+00:00
cisco-sa-20190612-iosxe-csrf Cisco IOS XE Software Web UI Cross-Site Request Forgery Vulnerability 2019-06-12T16:00:00+00:00 2019-07-16T15:51:20+00:00
cisco-sa-20190619-cimc-cli-cmdinj Cisco Integrated Management Controller CLI Command Injection Vulnerability 2019-06-19T16:00:00+00:00 2019-06-19T16:00:00+00:00
cisco-sa-20190619-cms-codex Cisco Meeting Server CLI Command Injection Vulnerability 2019-06-19T16:00:00+00:00 2019-06-19T16:00:00+00:00
cisco-sa-20190619-csm-xml Cisco Security Manager XML Entity Expansion Vulnerability 2019-06-19T16:00:00+00:00 2019-06-19T16:00:00+00:00
cisco-sa-20190619-dnac-bypass Cisco DNA Center Authentication Bypass Vulnerability 2019-06-19T16:00:00+00:00 2019-06-27T17:34:37+00:00
cisco-sa-20190619-ecea-dwnload Cisco Enterprise Chat and Email Attachment Download Vulnerability 2019-06-19T16:00:00+00:00 2019-06-19T16:00:00+00:00
cisco-sa-20190619-esa-bypass Cisco Email Security Appliance GZIP Content Filter Bypass Vulnerability 2019-06-19T16:00:00+00:00 2019-06-19T16:00:00+00:00
cisco-sa-20190619-imc-csrf Cisco Integrated Management Controller Cross-Site Request Forgery Vulnerability 2019-06-19T16:00:00+00:00 2019-06-19T16:00:00+00:00
cisco-sa-20190619-imc-dos Cisco Integrated Management Controller Denial of Service Vulnerability 2019-06-19T16:00:00+00:00 2019-06-19T16:00:00+00:00
cisco-sa-20190619-imc-filewrite Cisco Integrated Management Controller Arbitrary File Write Vulnerability 2019-06-19T16:00:00+00:00 2019-06-19T16:00:00+00:00
cisco-sa-20190619-imc-frmwr-dos Cisco Integrated Management Controller Denial of Service Vulnerability 2019-06-19T16:00:00+00:00 2019-06-19T16:00:00+00:00
cisco-sa-20190619-imc-infodiscl Cisco Integrated Management Controller Information Disclosure Vulnerability 2019-06-19T16:00:00+00:00 2019-06-19T16:00:00+00:00
cisco-sa-20190619-imc-infodisclos Cisco Integrated Management Controller Information Disclosure Vulnerability 2019-06-19T16:00:00+00:00 2019-06-19T16:00:00+00:00
cisco-sa-20190619-prime-privescal Cisco Prime Infrastructure and Evolved Programmable Network Manager Virtual Domain Privilege Escalation Vulnerability 2019-06-19T16:00:00+00:00 2019-07-03T15:48:44+00:00
cisco-sa-20190619-psc-csrf Cisco Prime Service Catalog Cross-Site Request Forgery Vulnerability 2019-06-19T16:00:00+00:00 2019-06-20T15:37:52+00:00
cisco-sa-20190619-psc-xss Cisco Prime Service Catalog Cross-Site Scripting Vulnerability 2019-06-19T16:00:00+00:00 2019-06-20T15:39:29+00:00
cisco-sa-20190619-rv-dos Cisco RV110W, RV130W, and RV215W Routers Denial of Service Vulnerability 2019-06-19T16:00:00+00:00 2019-06-19T16:00:00+00:00
cisco-sa-20190619-rv-fileaccess Cisco RV110W, RV130W, and RV215W Routers Unauthenticated syslog File Access Vulnerability 2019-06-19T16:00:00+00:00 2019-06-19T16:00:00+00:00
cisco-sa-20190619-rv-infodis Cisco RV110W, RV130W, and RV215W Routers Information Disclosure Vulnerability 2019-06-19T16:00:00+00:00 2019-06-19T16:00:00+00:00
ID Description Published Updated
msrc_cve-2020-26154 url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled as demonstrated by a large PAC file that is delivered without a Content-length header. 2020-09-02T00:00:00.000Z 2022-01-19T00:00:00.000Z
msrc_cve-2020-26159 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Further investigation showed that it was not a security issue. Notes: none 2020-09-02T00:00:00.000Z 2025-10-01T23:11:05.000Z
msrc_cve-2020-26160 jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. 2020-09-02T00:00:00.000Z 2026-02-18T01:18:04.000Z
msrc_cve-2020-11979 As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process. 2020-10-02T00:00:00.000Z 2020-10-14T00:00:00.000Z
msrc_cve-2020-14323 A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15 before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service. 2020-10-02T00:00:00.000Z 2024-10-15T00:00:00.000Z
msrc_cve-2020-14765 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.6.49 and prior 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14769 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.49 and prior 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14771 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14773 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14775 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14776 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14777 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14785 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14786 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-23T00:00:00.000Z
msrc_cve-2020-14789 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-23T00:00:00.000Z
msrc_cve-2020-14790 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14791 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14793 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.49 and prior 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14794 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14800 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14804 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14809 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14812 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 5.6.49 and prior 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14814 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14821 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-23T00:00:00.000Z
msrc_cve-2020-14827 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). 2020-10-02T00:00:00.000Z 2020-10-23T00:00:00.000Z
msrc_cve-2020-14828 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14829 Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14830 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
msrc_cve-2020-14836 Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). 2020-10-02T00:00:00.000Z 2020-10-27T00:00:00.000Z
ID Description Published Updated
ncsc-2026-0032 Kwetsbaarheden verholpen in Oracle MySQL 2026-01-21T10:12:24.844869Z 2026-01-21T10:12:24.844869Z
ncsc-2026-0033 Kwetsbaarheid verholpen in GNU Inetutils telnetd 2026-01-21T14:15:46.424529Z 2026-01-21T14:15:46.424529Z
ncsc-2026-0034 Kwetsbaarheden verholpen in Atlassian producten 2026-01-22T09:03:42.667958Z 2026-01-22T09:03:42.667958Z
ncsc-2026-0035 Kwetsbaarheid verholpen in Palo Alto Networks PAN-OS 2026-01-22T09:22:36.433609Z 2026-01-22T09:22:36.433609Z
ncsc-2026-0036 Kwetsbaarheden verholpen in Cisco Unified Communications producten 2026-01-22T09:49:39.156365Z 2026-01-22T09:49:39.156365Z
ncsc-2026-0037 Kwetsbaarheden verholpen in GitLab Community Edition en Enterprise Edition 2026-01-22T12:35:30.505659Z 2026-01-22T12:35:30.505659Z
ncsc-2026-0038 Kwetsbaarheid verholpen in BIND 9 2026-01-23T08:54:43.506215Z 2026-01-23T08:54:43.506215Z
ncsc-2026-0039 ZeroDay kwetsbaarheid verholpen in Microsoft Office 2026-01-27T07:27:52.867415Z 2026-01-27T07:27:52.867415Z
ncsc-2026-0040 Kwetsbaarheid verholpen in SmarterTools SmarterMail 2026-01-27T10:51:39.476320Z 2026-02-06T09:25:57.008166Z
ncsc-2026-0041 Kwetsbaarheid verholpen in Fortinet producten 2026-01-28T09:32:41.752905Z 2026-01-28T09:32:41.752905Z
ncsc-2026-0042 Kwetsbaarheden verholpen in SolarWinds Web Help Desk 2026-01-28T16:37:21.114054Z 2026-02-02T09:47:54.857445Z
ncsc-2026-0043 Zeroday-kwetsbaarheden verholpen in Ivanti Endpoint Manager Mobile 2026-01-29T19:15:04.575371Z 2026-02-20T14:47:02.047999Z
ncsc-2026-0044 Kwetsbaarheid verholpen in Cisco TelePresence Collaboration Endpoint 2026-02-06T09:20:11.629058Z 2026-02-06T09:20:11.629058Z
ncsc-2026-0045 Kwetsbaarheid verholpen in Cisco Meeting Management 2026-02-06T09:22:16.831778Z 2026-02-06T09:22:16.831778Z
ncsc-2026-0046 Kwetsbaarheden verholpen in Samsung mobile 2026-02-09T07:48:28.751473Z 2026-02-09T07:48:28.751473Z
ncsc-2026-0047 Kwetsbaarheid verholpen in Fortinet FortiClient EMS 2026-02-09T10:16:18.048622Z 2026-03-30T11:36:22.656910Z
ncsc-2026-0048 Kwetsbaarheid verholpen in BeyondTrust Remote Support 2026-02-09T10:27:57.867529Z 2026-02-13T12:54:32.614217Z
ncsc-2026-0049 Kwetsbaarheden verholpen in n8n 2026-02-09T10:39:40.792744Z 2026-02-09T10:39:40.792744Z
ncsc-2026-0050 Kwetsbaarheid verholpen in PEAR 2026-02-09T10:41:43.856342Z 2026-02-09T10:41:43.856342Z
ncsc-2026-0051 Kwetsbaarheden verholpen in Siemens producten 2026-02-10T12:27:40.637581Z 2026-02-10T12:27:40.637581Z
ncsc-2026-0052 Kwetsbaarheden verholpen in SAP producten 2026-02-10T12:28:40.531069Z 2026-02-10T12:28:40.531069Z
ncsc-2026-0053 Kwetsbaarheden verholpen in Microsoft Windows 2026-02-10T19:01:45.561771Z 2026-02-10T19:01:45.561771Z
ncsc-2026-0054 Kwetsbaarheid verholpen in Microsoft Exchange 2026-02-10T19:04:51.366294Z 2026-02-10T19:04:51.366294Z
ncsc-2026-0055 Kwetsbaarheid verholpen in Microsoft SQL Server 2026-02-10T19:05:45.729972Z 2026-02-10T19:05:45.729972Z
ncsc-2026-0056 Kwetsbaarheden verholpen in Microsoft Developer Tools 2026-02-10T19:07:16.028511Z 2026-02-10T19:07:16.028511Z
ncsc-2026-0057 Kwetsbaarheden verholpen in Microsoft Azure 2026-02-10T19:08:27.878305Z 2026-02-10T19:08:27.878305Z
ncsc-2026-0058 Kwetsbaarheden verholpen in Microsoft Office 2026-02-10T19:11:42.825147Z 2026-02-10T19:11:42.825147Z
ncsc-2026-0059 Kwetsbaarheden verholpen in Ivanti Endpoint Manager 2026-02-11T08:16:27.583936Z 2026-03-10T14:20:48.176282Z
ncsc-2026-0060 Kwetsbaarheden verholpen in Fortinet FortiSandbox, FortiAuthenticator en FortiClient 2026-02-11T11:34:36.684955Z 2026-02-11T11:34:36.684955Z
ncsc-2026-0061 Kwetsbaarheden verholpen in Fortinet FortiOS 2026-02-11T11:34:50.888067Z 2026-02-11T11:34:50.888067Z
ID Description Published Updated
opensuse-su-2019:2203-1 Security update for rust 2019-09-27T07:40:16Z 2019-09-27T07:40:16Z
opensuse-su-2019:2204-1 Security update for expat 2019-09-28T10:20:58Z 2019-09-28T10:20:58Z
opensuse-su-2019:2205-1 Security update for expat 2019-09-28T10:21:05Z 2019-09-28T10:21:05Z
opensuse-su-2019:2206-1 Security update for mosquitto 2019-09-28T10:21:13Z 2019-09-28T10:21:13Z
opensuse-su-2019:2207-1 Security update for webkit2gtk3 2019-09-28T12:20:53Z 2019-09-28T12:20:53Z
opensuse-su-2019:2208-1 Security update for webkit2gtk3 2019-09-28T12:21:01Z 2019-09-28T12:21:01Z
opensuse-su-2019:2211-1 Security update for phpMyAdmin 2019-09-28T12:21:38Z 2019-09-28T12:21:38Z
opensuse-su-2019:2212-1 Security update for libopenmpt 2019-09-28T16:19:54Z 2019-09-28T16:19:54Z
opensuse-su-2019:2213-1 Security update for libopenmpt 2019-09-28T16:20:05Z 2019-09-28T16:20:05Z
opensuse-su-2019:2217-1 Security update for djvulibre 2019-09-30T04:19:41Z 2019-09-30T04:19:41Z
opensuse-su-2019:2219-1 Security update for djvulibre 2019-09-30T10:20:29Z 2019-09-30T10:20:29Z
opensuse-su-2019:2221-1 Security update for varnish 2019-09-30T14:22:47Z 2019-09-30T14:22:47Z
opensuse-su-2019:2222-1 Security update for ghostscript 2019-09-30T14:22:56Z 2019-09-30T14:22:56Z
opensuse-su-2019:2223-1 Security update for ghostscript 2019-09-30T14:23:09Z 2019-09-30T14:23:09Z
opensuse-su-2019:2224-1 Security update for SDL2 2019-09-30T16:21:38Z 2019-09-30T16:21:38Z
opensuse-su-2019:2225-1 Security update for python-numpy 2019-09-30T18:21:36Z 2019-09-30T18:21:36Z
opensuse-su-2019:2226-1 Security update for SDL2 2019-09-30T18:21:43Z 2019-09-30T18:21:43Z
opensuse-su-2019:2227-1 Security update for python-numpy 2019-09-30T18:21:50Z 2019-09-30T18:21:50Z
opensuse-su-2019:2228-1 Security update for chromium 2019-10-01T08:20:14Z 2019-10-01T08:20:14Z
opensuse-su-2019:2229-1 Security update for chromium 2019-10-01T08:20:36Z 2019-10-01T08:20:36Z
opensuse-su-2019:2232-1 Security update for nghttp2 2019-10-01T10:23:24Z 2019-10-01T10:23:24Z
opensuse-su-2019:2233-1 Security update for u-boot 2019-10-01T12:23:07Z 2019-10-01T12:23:07Z
opensuse-su-2019:2234-1 Security update for nghttp2 2019-10-01T14:21:00Z 2019-10-01T14:21:00Z
opensuse-su-2019:2235-1 Security update for u-boot 2019-10-01T14:23:37Z 2019-10-01T14:23:37Z
opensuse-su-2019:2244-1 Security update for rust 2019-10-03T09:22:00Z 2019-10-03T09:22:00Z
opensuse-su-2019:2245-1 Security update for lxc 2019-10-03T10:23:09Z 2019-10-03T10:23:09Z
opensuse-su-2019:2247-1 Security update for mosquitto 2019-10-03T16:21:06Z 2019-10-03T16:21:06Z
opensuse-su-2019:2248-1 Security update for MozillaThunderbird 2019-10-04T10:23:43Z 2019-10-04T10:23:43Z
opensuse-su-2019:2249-1 Security update for MozillaThunderbird 2019-10-04T10:24:16Z 2019-10-04T10:24:16Z
opensuse-su-2019:2251-1 Security update for MozillaFirefox 2019-10-04T22:24:43Z 2019-10-04T22:24:43Z
ID Description Published Updated
rhsa-2005:748 Red Hat Security Advisory: php security update 2005-08-19T17:19:00+00:00 2025-11-21T17:29:31+00:00
rhsa-2005:743 Red Hat Security Advisory: netpbm security update 2005-08-22T13:55:00+00:00 2025-11-21T17:29:29+00:00
rhsa-2005:747 Red Hat Security Advisory: slocate security update 2005-08-22T14:00:00+00:00 2025-11-21T17:29:30+00:00
rhsa-2005:745 Red Hat Security Advisory: vim security update 2005-08-22T14:12:00+00:00 2025-11-21T17:29:30+00:00
rhsa-2005:755 Red Hat Security Advisory: elm security update 2005-08-23T18:16:00+00:00 2025-11-21T17:29:31+00:00
rhsa-2005:551 Red Hat Security Advisory: kernel security update 2005-08-25T13:17:00+00:00 2026-01-13T22:14:37+00:00
rhsa-2005:529 Red Hat Security Advisory: kernel security update 2005-08-25T13:29:00+00:00 2026-01-13T22:34:47+00:00
rhsa-2005:267 Red Hat Security Advisory: Evolution security update 2005-08-29T18:30:00+00:00 2025-11-21T17:28:45+00:00
rhsa-2005:608 Red Hat Security Advisory: httpd security update 2005-09-06T13:37:00+00:00 2025-11-21T17:29:24+00:00
rhsa-2005:756 Red Hat Security Advisory: cvs security update 2005-09-06T13:42:00+00:00 2025-11-21T17:29:32+00:00
rhsa-2005:761 Red Hat Security Advisory: pcre security update 2005-09-08T17:19:00+00:00 2025-11-21T17:29:32+00:00
rhsa-2005:358 Red Hat Security Advisory: exim security update 2005-09-08T19:02:00+00:00 2025-11-21T17:28:54+00:00
rhsa-2005:768 Red Hat Security Advisory: firefox security update 2005-09-09T23:28:00+00:00 2026-02-17T02:19:41+00:00
rhsa-2005:329 Red Hat Security Advisory: XFree86 security update 2005-09-12T21:38:00+00:00 2025-11-21T17:28:47+00:00
rhsa-2005:396 Red Hat Security Advisory: xorg-x11 security update 2005-09-13T17:07:00+00:00 2025-11-21T17:29:01+00:00
rhsa-2005:501 Red Hat Security Advisory: XFree86 security update 2005-09-15T08:47:00+00:00 2025-11-21T17:29:11+00:00
rhsa-2005:766 Red Hat Security Advisory: squid security update 2005-09-15T08:58:00+00:00 2025-11-21T17:29:33+00:00
rhsa-2005:773 Red Hat Security Advisory: mod_ssl security update 2005-09-15T18:16:00+00:00 2025-11-21T17:29:36+00:00
rhsa-2005:785 Red Hat Security Advisory: firefox security update 2005-09-22T20:16:00+00:00 2025-11-21T17:29:36+00:00
rhsa-2005:789 Red Hat Security Advisory: mozilla security update 2005-09-22T20:36:00+00:00 2025-11-21T17:29:37+00:00
rhsa-2005:788 Red Hat Security Advisory: HelixPlayer security update 2005-09-27T11:50:00+00:00 2025-11-21T17:29:37+00:00
rhsa-2005:772 Red Hat Security Advisory: cups security update 2005-09-27T11:53:00+00:00 2025-11-21T17:29:35+00:00
rhsa-2005:762 Red Hat Security Advisory: RealPlayer security update 2005-09-27T15:49:00+00:00 2025-11-21T17:29:33+00:00
rhsa-2005:771 Red Hat Security Advisory: wget security update 2005-09-27T16:10:00+00:00 2025-11-21T17:29:35+00:00
rhba-2005:675 Red Hat Bug Fix Advisory: gdb bug fix update 2005-09-28T00:00:00+00:00 2026-01-13T22:17:22+00:00
rhsa-2005:659 Red Hat Security Advisory: binutils security update 2005-09-28T14:04:00+00:00 2026-01-13T22:12:28+00:00
rhsa-2005:663 Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 6 2005-09-28T14:17:00+00:00 2026-01-13T22:07:52+00:00
rhsa-2005:081 Red Hat Security Advisory: ghostscript security update 2005-09-28T14:21:00+00:00 2025-11-21T17:28:25+00:00
rhsa-2005:373 Red Hat Security Advisory: net-snmp security update 2005-09-28T14:26:00+00:00 2026-01-13T22:12:14+00:00
rhsa-2005:550 Red Hat Security Advisory: openssh security update 2005-09-28T14:32:00+00:00 2025-11-21T17:29:16+00:00
ID Description Published Updated
suse-su-2016:0747-1 Security update for kernel live patch 9 2016-03-14T13:30:34Z 2016-03-14T13:30:34Z
suse-su-2016:0749-1 Security update for kernel live patch 10 2016-03-14T13:30:41Z 2016-03-14T13:30:41Z
suse-su-2016:0754-1 Security update for kernel live patch 11 2016-03-14T13:30:48Z 2016-03-14T13:30:48Z
suse-su-2016:0751-1 Security update for kernel live patch 0 2016-03-14T13:30:56Z 2016-03-14T13:30:56Z
suse-su-2016:0748-1 Security update for sles12sp1-docker-image 2016-03-14T13:31:02Z 2016-03-14T13:31:02Z
suse-su-2016:0755-1 Security update for kernel live patch 1 2016-03-14T13:31:04Z 2016-03-14T13:31:04Z
suse-su-2016:0752-1 Security update for kernel live patch 2 2016-03-14T13:31:11Z 2016-03-14T13:31:11Z
suse-su-2016:0759-1 Security update for bind 2016-03-14T14:32:56Z 2016-03-14T14:32:56Z
suse-su-2016:0769-1 Security update for tomcat 2016-03-15T10:19:01Z 2016-03-15T10:19:01Z
suse-su-2016:0770-1 Security update for java-1_6_0-ibm 2016-03-15T12:58:15Z 2016-03-15T12:58:15Z
suse-su-2016:0777-1 Security update for MozillaFirefox, mozilla-nspr, mozilla-nss 2016-03-15T14:32:56Z 2016-03-15T14:32:56Z
suse-su-2016:0779-1 Security update for graphite2 2016-03-15T17:01:26Z 2016-03-15T17:01:26Z
suse-su-2016:0778-1 Security update for sles11sp4-docker-image 2016-03-15T17:01:49Z 2016-03-15T17:01:49Z
suse-su-2016:0780-1 Security update for bind 2016-03-15T17:02:25Z 2016-03-15T17:02:25Z
suse-su-2016:0786-1 Security update for sles12-docker-image 2016-03-16T10:28:25Z 2016-03-16T10:28:25Z
suse-su-2016:0785-1 Security update for the Linux Kernel 2016-03-16T10:39:32Z 2016-03-16T10:39:32Z
suse-su-2016:0796-1 Security update for git 2016-03-16T18:14:57Z 2016-03-16T18:14:57Z
suse-su-2016:0798-1 Security update for git 2016-03-16T20:11:17Z 2016-03-16T20:11:17Z
suse-su-2016:0807-1 Security update for clamsap 2016-03-17T14:38:46Z 2016-03-17T14:38:46Z
suse-su-2016:0805-1 Security update for clamsap 2016-03-17T14:38:56Z 2016-03-17T14:38:56Z
suse-su-2016:0806-1 Security update for ceph 2016-03-17T14:39:05Z 2016-03-17T14:39:05Z
suse-su-2016:0816-1 Security update for samba 2016-03-18T09:44:24Z 2016-03-18T09:44:24Z
suse-su-2016:0814-1 Security update for samba 2016-03-18T09:54:41Z 2016-03-18T09:54:41Z
suse-su-2016:0822-1 Security update for tomcat 2016-03-18T14:14:17Z 2016-03-18T14:14:17Z
suse-su-2016:0825-1 Security update for bind 2016-03-18T15:33:02Z 2016-03-18T15:33:02Z
suse-su-2016:0839-1 Security update for tomcat6 2016-03-21T09:27:05Z 2016-03-21T09:27:05Z
suse-su-2016:0837-1 Security update for samba 2016-03-21T10:05:53Z 2016-03-21T10:05:53Z
suse-su-2016:0854-1 Security update for rubygem-actionview-4_1 2016-03-22T13:34:50Z 2016-03-22T13:34:50Z
suse-su-2016:0858-1 Security update for rubygem-actionpack-4_1 2016-03-22T16:21:44Z 2016-03-22T16:21:44Z
suse-su-2016:0857-1 Security update for rubygem-activesupport-4_1 2016-03-22T16:21:53Z 2016-03-22T16:21:53Z
ID Description Published Updated
alsa-2023:0016 Important: webkit2gtk3 security update 2023-01-04T00:00:00Z 2023-03-13T16:36:24Z
alsa-2023:0021 Important: webkit2gtk3 security update 2023-01-04T00:00:00Z 2023-03-13T16:36:26Z
alsa-2023:0049 Moderate: grub2 security update 2023-01-09T00:00:00Z 2023-01-10T10:17:57Z
alsa-2023:0050 Moderate: nodejs:14 security, bug fix, and enhancement update 2023-01-09T00:00:00Z 2023-01-10T10:25:19Z
alsa-2023:0077 Moderate: .NET 6.0 security, bug fix, and enhancement update 2023-01-11T00:00:00Z 2023-01-12T19:37:42Z
alsa-2023:0079 Moderate: .NET 6.0 security, bug fix, and enhancement update 2023-01-11T00:00:00Z 2023-01-12T19:43:07Z
alsa-2023:0087 Moderate: usbguard security update 2023-01-12T00:00:00Z 2023-03-13T16:36:27Z
alsa-2023:0089 Moderate: libreoffice security update 2023-01-12T00:00:00Z 2023-01-13T18:11:38Z
alsa-2023:0095 Moderate: libtiff security update 2023-01-12T00:00:00Z 2023-03-13T16:36:27Z
alsa-2023:0096 Moderate: dbus security update 2023-01-12T00:00:00Z 2023-03-13T16:36:30Z
alsa-2023:0099 Moderate: virt:rhel and virt-devel:rhel security and bug fix update 2023-01-12T00:00:00Z 2023-03-13T16:36:36Z
alsa-2023:0100 Moderate: systemd security and bug fix update 2023-01-12T00:00:00Z 2023-03-13T16:36:38Z
alsa-2023:0101 Important: kernel security and bug fix update 2023-01-12T00:00:00Z 2023-01-16T11:10:17Z
alsa-2023:0103 Moderate: expat security update 2023-01-12T00:00:00Z 2023-03-08T11:40:15Z
alsa-2023:0110 Moderate: sqlite security update 2023-01-12T00:00:00Z 2023-03-08T11:32:38Z
alsa-2023:0113 Moderate: postgresql:10 security update 2023-01-12T00:00:00Z 2023-01-16T11:57:43Z
alsa-2023:0114 Important: kernel-rt security and bug fix update 2023-01-12T00:00:00Z 2023-01-16T11:45:22Z
alsa-2023:0116 Moderate: libtasn1 security update 2023-01-12T00:00:00Z 2023-03-08T11:21:43Z
alsa-2023:0171 Important: dpdk security update 2023-01-16T00:00:00Z 2023-01-16T12:28:07Z
alsa-2023:0173 Moderate: libxml2 security update 2023-01-16T00:00:00Z 2023-03-08T11:17:51Z
alsa-2023:0192 Moderate: java-17-openjdk security and bug fix update 2023-01-18T00:00:00Z 2023-09-15T13:41:48Z
alsa-2023:0200 Moderate: java-11-openjdk security and bug fix update 2023-01-18T00:00:00Z 2023-09-15T13:41:48Z
alsa-2023:0202 Moderate: java-11-openjdk security and bug fix update 2023-01-18T00:00:00Z 2023-09-15T13:41:48Z
alsa-2023:0194 Moderate: java-17-openjdk security and bug fix update 2023-01-23T00:00:00Z 2023-09-15T13:41:48Z
alsa-2023:0282 Important: sudo security update 2023-01-23T00:00:00Z 2023-01-24T07:20:47Z
alsa-2023:0284 Important: sudo security update 2023-01-23T00:00:00Z 2023-01-24T07:25:59Z
alsa-2023:0285 Important: firefox security update 2023-01-23T00:00:00Z 2023-01-24T07:32:24Z
alsa-2023:0288 Important: firefox security update 2023-01-23T00:00:00Z 2023-01-24T07:35:30Z
alsa-2023:0300 Important: kernel-rt security and bug fix update 2023-01-23T00:00:00Z 2023-01-24T14:46:25Z
alsa-2023:0302 Moderate: libtiff security update 2023-01-23T00:00:00Z 2023-03-13T16:36:47Z
ID Description Published Updated
osv-2020-1301 Heap-buffer-overflow in hts_md5_update 2020-07-22T21:50:04.440116Z 2022-04-13T03:04:32.327879Z
osv-2020-1306 Use-of-uninitialized-value in TIFFYCbCrtoRGB 2020-07-22T21:50:04.734490Z 2022-04-13T03:04:31.082150Z
osv-2020-1307 Heap-buffer-overflow in pcpp::IPv6Extension::getExtensionLen 2020-07-22T21:50:04.807754Z 2022-04-13T03:04:38.510475Z
osv-2020-1310 Use-of-uninitialized-value in pcpp::SSLCertificateRequestMessage::SSLCertificateRequestMessage 2020-07-22T21:50:05.088004Z 2022-04-13T03:04:38.691127Z
osv-2020-1312 Use-of-uninitialized-value in FilterInput8bitWithStride_c 2020-07-22T21:50:05.402144Z 2022-04-13T03:04:37.494474Z
osv-2020-1314 Use-of-uninitialized-value in ndpi_strdup 2020-07-22T21:50:05.778993Z 2022-04-13T03:04:36.259727Z
osv-2020-1315 Heap-buffer-overflow in pcpp::IPv4Layer::getFragmentFlags 2020-07-22T21:50:05.807755Z 2022-04-13T03:04:38.719461Z
osv-2020-1321 UNKNOWN READ in FlowGetHash 2020-07-22T21:50:06.291563Z 2022-04-13T03:04:32.748792Z
osv-2020-1325 Global-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short 2020-07-22T21:50:06.762604Z 2022-04-13T03:04:33.044825Z
osv-2020-1326 Heap-buffer-overflow in ihevcd_parse_slice_data 2020-07-22T21:50:06.811741Z 2022-04-13T03:04:30.983191Z
osv-2020-1327 UNKNOWN READ in arrow::Status arrow::VisitArrayInline<arrow::internal::ValidateArrayDataVisitor> 2020-07-22T21:50:06.904891Z 2022-04-13T03:04:31.904776Z
osv-2020-1328 UNKNOWN READ in std::__1::__tree<std::__1::__value_type<std::__1::basic_string<char, std::__1::c 2020-07-22T21:50:06.975630Z 2022-04-13T03:04:42.691141Z
osv-2020-1330 Heap-buffer-overflow in mu::ParserBase::ParseCmdCodeBulk 2020-07-22T21:50:07.104906Z 2022-04-13T03:04:30.741147Z
osv-2020-1331 Heap-buffer-overflow in pcpp::GtpV1Layer::GtpExtension::getNextExtensionHeaderType 2020-07-22T21:50:07.132825Z 2022-04-13T03:04:38.628878Z
osv-2020-1332 Index-out-of-bounds in xsltSetAttrVTsegment 2020-07-22T21:50:07.164634Z 2022-04-13T03:04:33.752444Z
osv-2020-1340 Use-of-uninitialized-value in Gfx::fillPatch 2020-07-22T21:50:07.878108Z 2022-04-13T03:04:37.268795Z
osv-2020-1346 UNKNOWN WRITE in StatsIncr 2020-07-22T21:50:08.261306Z 2022-04-13T03:04:32.737543Z
osv-2020-1347 Negative-size-param in fuzz_tlv_to_string 2020-07-22T21:50:08.310638Z 2022-04-13T03:04:42.837836Z
osv-2020-1349 Heap-buffer-overflow in mu::ParserBase::ParseCmdCodeBulk 2020-07-22T21:50:08.481816Z 2022-04-13T03:04:30.730045Z
osv-2020-1351 Heap-use-after-free in sc_pkcs15_free_object 2020-07-22T21:50:08.637276Z 2022-04-13T03:04:41.575360Z
osv-2020-1352 Heap-buffer-overflow in arrow::Status arrow::internal::ValidateArrayVisitor::ValidateListArray<arrow::Li 2020-07-22T21:50:08.733370Z 2022-04-13T03:04:31.948799Z
osv-2020-1356 Segv on unknown address in vips_XYZ2Lab_line 2020-07-24T00:00:05.678188Z 2022-04-13T03:04:38.042963Z
osv-2020-1362 Use-of-uninitialized-value in LibRaw::init_fuji_block 2020-07-28T00:00:01.793422Z 2022-04-15T00:05:54.082034Z
osv-2020-1365 UNKNOWN READ in cli_vba_readdir_new 2020-07-28T00:00:02.964345Z 2022-04-13T03:04:39.436925Z
osv-2020-1366 Heap-use-after-free in RDKit::SubstanceGroup::addParentAtomWithBookmark 2020-07-28T00:00:03.076252Z 2022-04-13T03:29:38.667934Z
osv-2020-1371 Bad-cast to pcpp::IDnsResource from invalid vptr 2020-07-28T00:00:04.081926Z 2022-04-13T03:04:38.585223Z
osv-2020-1372 Index-out-of-bounds in stbi__build_huffman 2020-07-28T00:00:04.120846Z 2022-04-13T03:04:40.796838Z
osv-2020-1373 Segv on unknown address in helper_uc_tracecode 2020-07-28T00:00:04.707812Z 2023-02-24T01:56:33.315977Z
osv-2020-1379 Heap-buffer-overflow in dotnet_parse_com 2020-07-28T00:00:05.738705Z 2022-07-01T00:04:10.449501Z
osv-2020-1380 Use-of-uninitialized-value in stbi__jpeg_decode_block_prog_ac 2020-07-28T00:00:05.816594Z 2022-04-13T03:04:40.806471Z
ID Description Published Updated
rustsec-2024-0370 proc-macro-error is unmaintained 2024-09-01T12:00:00Z 2024-09-09T12:08:37Z
rustsec-2024-0384 `instant` is unmaintained 2024-09-01T12:00:00Z 2024-11-10T13:10:28Z
rustsec-2024-0368 olm-sys: wrapped library unmaintained, potentially vulnerable 2024-09-02T12:00:00Z 2025-10-28T06:02:18Z
rustsec-2024-0373 `Endpoint::retry()` calls can lead to panicking 2024-09-02T12:00:00Z 2024-09-08T01:47:13Z
rustsec-2024-0382 hwloc is unmaintained 2024-09-04T12:00:00Z 2024-11-10T12:52:40Z
rustsec-2024-0383 bcc is unmaintained 2024-09-04T12:00:00Z 2024-11-10T12:53:21Z
rustsec-2024-0386 strason is unmaintained 2024-09-04T12:00:00Z 2024-11-10T13:16:48Z
rustsec-2024-0372 Memory leak when calling a canister method via `ic_cdk::call` 2024-09-05T12:00:00Z 2024-09-07T18:23:36Z
rustsec-2024-0371 gix-path improperly resolves configuration path reported by Git 2024-09-06T12:00:00Z 2024-09-07T01:48:33Z
rustsec-2024-0443 webp crate may expose memory contents when encoding an image 2024-09-06T12:00:00Z 2025-10-28T06:02:18Z
rustsec-2024-0404 Unsoundness in anstream 2024-09-08T12:00:00Z 2025-10-28T06:02:18Z
rustsec-2024-0425 get-size is unmaintained 2024-09-15T12:00:00Z 2024-12-22T09:01:06Z
rustsec-2024-0427 get-size-derive is unmaintained 2024-09-15T12:00:00Z 2024-12-22T09:01:06Z
rustsec-2024-0374 Segmentation fault due to use of uninitialized memory 2024-09-22T12:00:00Z 2025-10-28T06:02:18Z
rustsec-2024-0375 `atty` is unmaintained 2024-09-25T12:00:00Z 2024-09-26T12:26:22Z
rustsec-2024-0376 Remotely exploitable Denial of Service in Tonic 2024-10-01T12:00:00Z 2025-09-11T07:02:22Z
rustsec-2024-0440 Runtime crash when combining tail calls with stack traces 2024-10-02T12:00:00Z 2025-05-02T08:23:27Z
rustsec-2024-0439 Race condition could lead to WebAssembly control-flow integrity and type safety violations 2024-10-03T12:00:00Z 2025-05-02T08:23:27Z
rustsec-2024-0377 Heap Buffer overflow using c_chars_to_str function 2024-10-07T12:00:00Z 2025-10-28T06:02:18Z
rustsec-2024-0436 paste - no longer maintained 2024-10-07T12:00:00Z 2026-01-27T21:51:15Z
rustsec-2024-0402 Borsh serialization of HashMap is non-canonical 2024-10-11T12:00:00Z 2025-10-28T06:02:18Z
rustsec-2024-0378 Risk of use-after-free in `borrowed` reads from Python weak references 2024-10-12T12:00:00Z 2025-10-28T06:02:18Z
rustsec-2024-0380 Replaced by `pqcrypto-mldsa` 2024-10-24T12:00:00Z 2024-11-10T12:05:32Z
rustsec-2024-0381 Replaced by `pqcrypto-mlkem` 2024-10-24T12:00:00Z 2024-11-10T12:05:32Z
rustsec-2024-0379 Multiple soundness issues 2024-10-31T12:00:00Z 2025-10-28T06:02:18Z
rustsec-2024-0438 Wasmtime doesn't fully sandbox all the Windows device filenames 2024-11-02T12:00:00Z 2025-05-02T08:23:27Z
rustsec-2024-0445 cap-primitives doesn't fully sandbox all the Windows device filenames 2024-11-05T12:00:00Z 2025-12-19T21:01:24Z
rustsec-2024-0401 Denial of service because of stack overflow with malicious decompression input 2024-11-14T12:00:00Z 2024-12-04T12:13:35Z
rustsec-2024-0398 Bias of Polynomial Coefficients in Secret Sharing 2024-11-16T12:00:00Z 2025-10-28T06:02:18Z
rustsec-2024-0399 rustls network-reachable panic in `Acceptor::accept` 2024-11-22T12:00:00Z 2025-10-28T06:02:18Z
ID Description Published Updated
bit-jenkins-2022-20612 2024-03-06T10:58:16.486Z 2025-04-03T14:40:37.652Z
bit-mlflow-2023-43472 2024-03-06T10:58:17.282Z 2025-04-03T14:40:37.652Z
bit-airflow-2022-27949 Apache Airflow prior to 2.3.1 may include sensitive values in rendered template 2024-03-06T10:58:17.378Z 2025-05-20T10:02:07.006Z
bit-golang-2022-41717 Excessive memory growth in net/http and golang.org/x/net/http2 2024-03-06T10:58:17.486Z 2025-05-20T10:02:07.006Z
bit-moodle-2023-5541 Moodle: xss risk when using csv grade import method 2024-03-06T10:58:18.062Z 2025-05-20T10:02:07.006Z
bit-gitlab-2023-4895 Missing Authorization in GitLab 2024-03-06T10:58:18.268Z 2025-05-20T10:02:07.006Z
bit-discourse-2023-28112 Discourse's SSRF protection missing for some FastImage requests 2024-03-06T10:58:19.088Z 2026-03-25T18:30:22.404Z
bit-nats-2022-24450 2024-03-06T10:58:21.477Z 2025-04-03T14:40:37.652Z
bit-mariadb-2022-27458 2024-03-06T10:58:21.495Z 2024-03-06T11:25:28.861Z
bit-minio-2021-21287 Server-Side Request Forgery in MinIO Browser API 2024-03-06T10:58:22.370Z 2025-05-20T10:02:07.006Z
bit-dotnet-2022-24512 .NET and Visual Studio Remote Code Execution Vulnerability 2024-03-06T10:58:23.161Z 2025-05-20T10:02:07.006Z
bit-magento-2021-28583 Magento Commerce insecure storage of sensitive documentation 2024-03-06T10:58:23.464Z 2026-03-20T09:47:33.381Z
bit-mongodb-2020-7929 Specially crafted regex query can cause DoS 2024-03-06T10:58:23.672Z 2025-05-20T10:02:07.006Z
bit-drupal-2020-13665 2024-03-06T10:58:25.802Z 2025-04-03T14:40:37.652Z
bit-grafana-2022-21702 Cross site scripting in Grafana proxy 2024-03-06T10:58:26.283Z 2025-05-20T10:02:07.006Z
bit-envoy-2021-32777 Incorrect concatenation of multiple value request headers in ext-authz extension 2024-03-06T10:58:27.361Z 2025-05-20T10:02:07.006Z
bit-airflow-2022-24288 Apache Airflow: RCE in example DAGs 2024-03-06T10:58:27.613Z 2025-05-20T10:02:07.006Z
bit-moodle-2023-5540 Moodle: authenticated remote code execution risk in imscp 2024-03-06T10:58:27.676Z 2025-05-20T10:02:07.006Z
bit-mlflow-2023-4033 OS Command Injection in mlflow/mlflow 2024-03-06T10:58:27.677Z 2025-05-20T10:02:07.006Z
bit-jenkins-2022-2048 2024-03-06T10:58:27.765Z 2025-04-03T14:40:37.652Z
bit-golang-2022-41716 Unsanitized NUL in environment variables on Windows in syscall and os/exec 2024-03-06T10:58:28.267Z 2025-05-20T10:02:07.006Z
bit-discourse-2023-28111 Discourse vulnerable to SSRF protection bypass possible with IPv4-mapped IPv6 addresses 2024-03-06T10:58:28.677Z 2025-05-20T10:02:07.006Z
bit-mariadb-2022-27457 2024-03-06T10:58:30.164Z 2025-04-03T14:40:37.652Z
bit-gitlab-2023-4812 Incorrect Authorization in GitLab 2024-03-06T10:58:30.571Z 2025-05-20T10:02:07.006Z
bit-minio-2020-11012 Authentication bypass MinIO Admin API 2024-03-06T10:58:32.002Z 2025-05-20T10:02:07.006Z
bit-mongodb-2020-7928 Improper neutralization of null byte leads to read overrun 2024-03-06T10:58:33.099Z 2025-05-20T10:02:07.006Z
bit-dotnet-2022-24464 .NET and Visual Studio Denial of Service Vulnerability 2024-03-06T10:58:33.275Z 2025-05-20T10:02:07.006Z
bit-nats-2021-3127 2024-03-06T10:58:33.708Z 2025-04-03T14:40:37.652Z
bit-drupal-2020-13664 2024-03-06T10:58:34.293Z 2025-04-03T14:40:37.652Z
bit-mlflow-2023-3765 Absolute Path Traversal in mlflow/mlflow 2024-03-06T10:58:35.367Z 2025-05-20T10:02:07.006Z
ID Description Published Updated
cleanstart-2026-bm53321 attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing 2026-04-10T00:51:58.426076Z 2026-04-09T11:53:35Z
cleanstart-2026-in87004 In libexpat before 2 2026-04-10T00:52:28.484967Z 2026-04-09T11:45:48Z
cleanstart-2026-ng75665 During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions 2026-04-10T00:56:28.527348Z 2026-04-09T11:53:35Z
cleanstart-2026-mu81308 gRPC-Go is the Go language implementation of gRPC 2026-04-10T00:56:28.601214Z 2026-04-09T11:29:32Z
cleanstart-2026-nz97711 gRPC-Go is the Go language implementation of gRPC 2026-04-10T01:00:58.666965Z 2026-04-09T09:33:10Z
cleanstart-2026-hm40094 filippo 2026-04-10T01:03:28.912174Z 2026-04-09T09:27:45Z
cleanstart-2026-nx54250 During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions 2026-04-10T01:03:29.003448Z 2026-04-09T09:59:33Z
cleanstart-2026-kl76732 attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing 2026-04-10T01:03:58.949308Z 2026-04-09T09:05:28Z
cleanstart-2026-ac01087 During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions 2026-04-10T01:03:59.042951Z 2026-04-09T09:55:12Z
cleanstart-2026-dp55969 Security fixes for ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4cx2-fc23-5wg6, ghsa-4g8c-wm8x-jfhw, ghsa-735f-pc8j-v9w8, ghsa-fghv-69vj-qj49, ghsa-prj3-ccx8-p6x4, ghsa-xq3w-v528-46rv applied in versions: 0.12.0-r16 2026-04-10T01:04:00.139766Z 2026-04-09T09:00:58Z
cleanstart-2026-aa51484 Security fixes for ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4cx2-fc23-5wg6, ghsa-4g8c-wm8x-jfhw, ghsa-735f-pc8j-v9w8, ghsa-fghv-69vj-qj49, ghsa-prj3-ccx8-p6x4, ghsa-xq3w-v528-46rv applied in versions: 0.12.0-r16 2026-04-10T01:04:01.115500Z 2026-04-09T08:58:26Z
cleanstart-2026-jm69747 Security fixes for ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 25.10.0-r1 2026-04-10T01:04:01.248430Z 2026-04-09T08:55:52Z
cleanstart-2026-av56399 Security fixes for ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 25.10.0-r1 2026-04-10T01:04:01.910374Z 2026-04-09T08:54:48Z
cleanstart-2026-oc72960 attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing 2026-04-10T01:04:28.955253Z 2026-04-09T08:54:07Z
cleanstart-2026-dm93480 During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions 2026-04-10T01:06:00.088585Z 2026-04-09T09:11:04Z
cleanstart-2026-ei21238 Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 2026-04-11T00:37:54.711613Z 2026-04-10T10:45:58Z
cleanstart-2026-lb69194 In libexpat before 2 2026-04-11T00:39:42.680532Z 2026-04-10T05:48:24Z
cleanstart-2026-jt73156 protojson 2026-04-11T00:42:17.168521Z 2026-04-10T12:27:18Z
cleanstart-2026-hu81793 Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 2026-04-12T00:36:09.840766Z 2026-04-11T06:04:40Z
cleanstart-2026-mz25894 Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 2026-04-12T00:36:10.207025Z 2026-04-11T06:04:40Z
cleanstart-2026-ne70100 Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 2026-04-12T00:36:10.440964Z 2026-04-11T06:04:40Z
cleanstart-2026-nh62318 Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 2026-04-14T00:38:02.309746Z 2026-04-13T11:37:38Z
cleanstart-2026-ka64649 Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 2026-04-14T00:38:03.199310Z 2026-04-13T11:37:38Z
cleanstart-2026-nj21771 png_image_free in png 2026-04-14T00:41:12.278705Z 2026-04-13T10:08:55Z
cleanstart-2026-jh41080 In libexpat before 2 2026-04-14T00:41:12.662437Z 2026-04-13T11:37:38Z
cleanstart-2026-lk73694 During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions 2026-04-14T00:43:42.897096Z 2026-04-13T05:21:32Z
cleanstart-2026-fh63386 When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint 2026-04-14T00:44:12.807187Z 2026-04-13T10:06:48Z
cleanstart-2026-ec57959 protojson 2026-04-15T00:38:38.411296Z 2026-04-14T11:35:55Z
cleanstart-2026-mp87020 If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources 2026-04-15T00:39:08.262212Z 2026-04-14T11:37:13Z
cleanstart-2026-bz28794 Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service 2026-04-15T00:41:09.072733Z 2026-04-14T10:03:45Z
ID Description Updated
ID Description Published Updated
certa-2003-avi-178 Vulnérabilité de la bibliothèque Libnids 2003-11-03T00:00:00.000000 2004-01-06T00:00:00.000000
certa-2003-avi-179 Faille dans l'implΓ©mentation d'OpenSSL sous Microsoft Windows 2003-11-05T00:00:00.000000 2003-11-06T00:00:00.000000
certa-2003-avi-180 VulnΓ©rabilitΓ© de la commande ls sous Linux 2003-11-07T00:00:00.000000 2005-10-06T00:00:00.000000
certa-2003-avi-181 VulnΓ©rabilitΓ© de l'application Terminal sous Apple MacOS X 2003-11-07T00:00:00.000000 2003-11-07T00:00:00.000000
certa-2005-avi-440 Multiples vulnérabilités dans la bibliothèque libungif/giflib 2003-11-10T00:00:00.000000 2005-11-09T00:00:00.000000
certa-2003-avi-182 Multiples vulnΓ©rabilitΓ©s d'Ethereal 2003-11-12T00:00:00.000000 2003-12-15T00:00:00.000000
certa-2003-avi-183 VulnΓ©rabilitΓ© de libDtHelp (CDE) 2003-11-12T00:00:00.000000 2004-08-05T00:00:00.000000
certa-2003-avi-184 Correctif cumulatif pour Internet Explorer 2003-11-12T00:00:00.000000 2003-11-12T00:00:00.000000
certa-2003-avi-185 VulnΓ©rabilitΓ© dans Windows Workstation Service 2003-11-12T00:00:00.000000 2003-11-12T00:00:00.000000
certa-2003-avi-186 VulnΓ©rabilitΓ©s dans Microsoft Word et Microsoft Excel 2003-11-12T00:00:00.000000 2003-11-12T00:00:00.000000
certa-2003-avi-187 VulnΓ©rabilitΓ©s dans Microsoft FrontPage Server Extensions 2003-11-12T00:00:00.000000 2003-11-12T00:00:00.000000
certa-2003-avi-188 VulnΓ©rabilitΓ© sur Postgresql 2003-11-12T00:00:00.000000 2003-11-14T00:00:00.000000
certa-2003-avi-189 VulnΓ©rabilitΓ© sur Oracle Database Server 2003-11-12T00:00:00.000000 2003-11-12T00:00:00.000000
certa-2003-avi-190 VulnΓ©rabilitΓ© dans HylaFAX 2003-11-12T00:00:00.000000 2003-11-21T00:00:00.000000
certa-2003-avi-191 VulnΓ©rabilitΓ© sur Oracle Files 2003-11-12T00:00:00.000000 2003-11-12T00:00:00.000000
certa-2003-avi-192 VulnΓ©rabilitΓ© sur Oracle9i Application Server Portal 2003-11-14T00:00:00.000000 2003-11-14T00:00:00.000000
certa-2003-avi-193 VulnΓ©rabilitΓ© dans Opera 2003-11-14T00:00:00.000000 2003-11-14T00:00:00.000000
certa-2003-avi-194 VulnΓ©rabilitΓ© dans pcAnywhere de Symantec 2003-11-14T00:00:00.000000 2003-11-14T00:00:00.000000
certa-2003-avi-195 Multiples vulnΓ©rabilitΓ©s dans Eudora 2003-11-14T00:00:00.000000 2003-11-14T00:00:00.000000
certa-2003-avi-196 VulnΓ©rabilitΓ©s sur HP-UX 2003-11-14T00:00:00.000000 2003-11-14T00:00:00.000000
certa-2003-avi-197 Multiples vulnΓ©rabilitΓ©s dans SAP DB 2003-11-20T00:00:00.000000 2003-11-20T00:00:00.000000
certa-2003-avi-198 Multiples vulnΓ©rabilitΓ©s du noyau OpenBSD 2003-11-24T00:00:00.000000 2003-11-24T00:00:00.000000
certa-2003-avi-199 VulnΓ©rabilitΓ© dans Opera 2003-11-25T00:00:00.000000 2003-11-25T00:00:00.000000
certa-2003-avi-200 VulnΓ©rabilitΓ© dans Pan 2003-11-25T00:00:00.000000 2003-11-25T00:00:00.000000
certa-2003-avi-201 VulnΓ©rabilitΓ© du moteur de recherche SPIRIT de la sociΓ©tΓ© Technologie 2003-11-25T00:00:00.000000 2004-06-28T00:00:00.000000
certa-2003-avi-202 VulnΓ©rabilitΓ© du serveur FreeRadius 2003-11-25T00:00:00.000000 2003-12-16T00:00:00.000000
certa-2003-avi-203 VulnΓ©rabilitΓ© dans Stunnel 2003-12-01T00:00:00.000000 2003-12-01T00:00:00.000000
certa-2003-avi-204 VulnΓ©rabilitΓ© du noyau Linux 2003-12-02T00:00:00.000000 2003-12-05T00:00:00.000000
certa-2003-avi-205 Mauvaise gestion du cache dans BIND 8 2003-12-02T00:00:00.000000 2004-01-21T00:00:00.000000
certa-2003-avi-206 VulnΓ©rabilitΓ© de rsync 2003-12-04T00:00:00.000000 2004-03-10T00:00:00.000000
ID Description Published Updated
jvndb-2011-003295 JP1/Cm2/Network Node Manager i Denial of Service (DoS) Vulnerability 2012-01-06T19:51+09:00 2012-01-06T19:51+09:00
jvndb-2011-002122 An authentication information Exposure Vulnerability in JP1/IT Resource Management - Manager 2012-01-06T19:53+09:00 2012-01-06T19:53+09:00
jvndb-2012-000003 Wibu-Systems CodeMeter Runtime vulnerable to denial-of-service 2012-01-11T15:02+09:00 2012-01-11T15:02+09:00
jvndb-2012-000002 Cogent DataHub vulnerable to HTTP header injection 2012-01-11T15:12+09:00 2012-01-13T16:08+09:00
jvndb-2012-000001 Cogent DataHub vulnerable to cross-site scripting 2012-01-11T15:22+09:00 2012-01-13T15:57+09:00
jvndb-2012-000007 Oracle WebLogic Server vulnerable to cross-site scripting 2012-01-20T15:37+09:00 2012-01-20T15:37+09:00
jvndb-2012-000006 osCommerce vulnerable to directory traversal 2012-01-20T16:09+09:00 2012-01-20T16:09+09:00
jvndb-2012-000005 osCommerce vulnerable to cross-site scripting 2012-01-20T16:15+09:00 2012-04-26T16:58+09:00
jvndb-2012-000004 osCommerce Japanese version vulnerable to cross-site scripting 2012-01-20T16:23+09:00 2012-01-20T16:23+09:00
jvndb-2012-000008 glucose 2 vulnerable to arbitrary script execution 2012-01-23T18:27+09:00 2012-01-23T18:27+09:00
jvndb-2012-001189 Hitachi IT Operations Analyzer Cross-Site Scripting Vulnerability 2012-01-27T10:37+09:00 2012-01-27T10:37+09:00
jvndb-2012-001190 Hitachi IT Operations Director Cross-Site Scripting Vulnerability 2012-01-27T10:38+09:00 2012-01-27T10:38+09:00
jvndb-2012-001191 Arbitrary Code Execution Vulnerability in Hitachi COBOL2002 2012-01-27T10:44+09:00 2012-01-27T10:44+09:00
jvndb-2012-000010 Pocket WiFi (GP02) vulnerable to cross-site request forgery 2012-02-01T14:12+09:00 2012-02-01T14:12+09:00
jvndb-2012-000012 Apache Struts 2 vulnerable to an arbitrary Java method execution 2012-02-10T14:29+09:00 2012-02-10T14:29+09:00
jvndb-2012-000011 ALFTP may insecurely load executable files 2012-02-13T15:58+09:00 2012-02-13T15:58+09:00
jvndb-2012-000013 cforms II vulnerable to cross-site scripting 2012-02-15T17:14+09:00 2012-02-15T17:14+09:00
jvndb-2012-000014 Multiple COOKPAD applications for Android vulnerable in WebView class 2012-02-22T14:44+09:00 2012-02-29T10:56+09:00
jvndb-2012-000015 Movable Type vulnerable to cross-site request forgery 2012-02-23T14:19+09:00 2012-02-23T14:19+09:00
jvndb-2012-000016 Movable Type vulnerable to cross-site scripting 2012-02-23T14:20+09:00 2012-02-23T14:20+09:00
jvndb-2012-000017 Movable Type vulnerable to OS command injection 2012-02-23T14:21+09:00 2012-02-23T14:21+09:00
jvndb-2012-000018 Movable Type vulnerable to session hijacking 2012-02-23T14:28+09:00 2012-02-23T14:28+09:00
jvndb-2012-000019 Kingsoft Internet Security 2011 vulnerable to denial-of-service 2012-03-01T14:03+09:00 2012-03-01T14:03+09:00
jvndb-2012-000020 ES File Explorer fails to restrict access permissions 2012-03-05T15:50+09:00 2012-03-05T15:50+09:00
jvndb-2012-000021 SquirrelMail plugin Autocomplete vulnerable to cross-site scripting 2012-03-09T14:18+09:00 2012-03-09T14:18+09:00
jvndb-2012-000022 Jenkins vulnerable to cross-site scripting 2012-03-09T14:28+09:00 2012-03-09T14:28+09:00
jvndb-2012-000023 Jenkins vulnerable to cross-site scripting 2012-03-09T14:35+09:00 2012-03-09T14:35+09:00
jvndb-2012-000024 twicca fails to restrict access permissions 2012-03-13T13:36+09:00 2012-03-13T13:36+09:00
jvndb-2012-000025 Redmine vulnerable to cross-site scripting 2012-03-13T13:39+09:00 2012-03-13T13:39+09:00
jvndb-2012-001793 JP1/Cm2/Network Node Manager i Denial of Service (DoS) Vulnerability 2012-03-19T12:04+09:00 2012-03-19T12:04+09:00
ID Description Published Updated
cnvd-2015-00664 Google Chrome V8ε†…ε­˜η ΄εζΌζ΄ž 2015-01-26 2015-01-27
cnvd-2015-00665 Google Chrome DOMε†…ε­˜ι”™θ――εΌ•η”¨δ»£η ζ‰§θ‘ŒζΌζ΄ž 2015-01-26 2015-01-27
cnvd-2015-00666 Google Chrome DOMε†…ε­˜ι”™θ――εΌ•η”¨ζΌζ΄žοΌˆCNVD-2015-00666οΌ‰ 2015-01-26 2015-01-27
cnvd-2015-00667 Google Chromeζ‹’η»ζœεŠ‘ζΌζ΄žοΌˆCNVD-2015-00667οΌ‰ 2015-01-26 2015-01-27
cnvd-2015-00668 Google Chromeζ‹’η»ζœεŠ‘ζΌζ΄žοΌˆCNVD-2015-00668οΌ‰ 2015-01-26 2015-01-27
cnvd-2015-00669 Google Chromeζ‹’η»ζœεŠ‘ζΌζ΄žοΌˆCNVD-2015-00669οΌ‰ 2015-01-26 2015-01-27
cnvd-2015-00670 Google Chrome WebAudioε†…ε­˜ι”™θ――εΌ•η”¨δ»»ζ„δ»£η ζ‰§θ‘ŒζΌζ΄ž 2015-01-26 2015-01-27
cnvd-2015-00671 Google Chromeε†…ε­˜ι”™θ――εΌ•η”¨ζΌζ΄žοΌˆCNVD-2015-00671οΌ‰ 2015-01-26 2015-01-27
cnvd-2015-00672 Google Chromeζ‹’η»ζœεŠ‘ζΌζ΄žοΌˆCNVD-2015-00672οΌ‰ 2015-01-26 2015-01-27
cnvd-2015-00688 SAP ERP Dealer Portalζƒι™ζε‡ζΌζ΄ž 2015-01-26 2015-01-27
cnvd-2015-00689 OpenStack Glanceζ‹’η»ζœεŠ‘ζΌζ΄ž 2015-01-26 2015-01-27
cnvd-2015-00690 WordPress插仢Pie Register存在ζœͺ明漏洞 2015-01-26 2015-01-27
cnvd-2015-00701 Google Chrome DOMε†…ε­˜ι”™θ――εΌ•η”¨ζΌζ΄žοΌˆCNVD-2015-00701οΌ‰ 2015-01-26 2015-01-28
cnvd-2015-00702 Google Chrome DOMε†…ε­˜ι”™θ――εΌ•η”¨ζΌζ΄žοΌˆCNVD-2015-00702οΌ‰ 2015-01-26 2015-01-28
cnvd-2015-00703 Google Chrome FFmpegε†…ε­˜ι”™θ――εΌ•η”¨ζΌζ΄žοΌˆCNVD-2015-00703οΌ‰ 2015-01-26 2015-01-28
cnvd-2015-00704 Google Chrome Speechε†…ε­˜ι”™θ――εΌ•η”¨ζΌζ΄ž 2015-01-26 2015-01-28
cnvd-2015-00705 GNU patch 'set_hunkmax()'ε‡½ζ•°ζ‹’η»ζœεŠ‘ζΌζ΄ž 2015-01-26 2015-01-28
cnvd-2015-00706 Google Chrome FFmpegε†…ε­˜ι”™θ――εΌ•η”¨ζΌζ΄ž 2015-01-26 2015-01-28
cnvd-2015-00707 Google Chrome Viewsε†…ε­˜ι”™θ――εΌ•η”¨ζΌζ΄ž 2015-01-26 2015-01-28
cnvd-2015-00708 Google Chrome SkiaθΆŠη•Œθ―»ζΌζ΄ž 2015-01-26 2015-01-28
cnvd-2015-00710 Google Chrome PDFiumθΆŠη•Œθ―»ζΌζ΄žοΌˆCNVD-2015-00710οΌ‰ 2015-01-26 2015-01-28
cnvd-2015-00711 Google Chrome PDFiumθΆŠη•Œθ―»ζΌζ΄žοΌˆCNVD-2015-00711οΌ‰ 2015-01-26 2015-01-28
cnvd-2015-00712 Google Chrome UIθΆŠη•Œθ―»ε–ζΌζ΄ž 2015-01-26 2015-01-28
cnvd-2015-00713 Google Chrome字体ζœͺεˆε§‹εŒ–ζΌζ΄ž 2015-01-26 2015-01-28
cnvd-2015-00714 FerretCMS存在倚δΈͺSQL注ε…₯漏洞 2015-01-26 2015-01-28
cnvd-2015-00715 Google Chrome ICUζœͺεˆε§‹εŒ–ζΌζ΄ž 2015-01-26 2015-01-28
cnvd-2015-00716 Google Chrome V8εŒζΊη»•θΏ‡ζΌζ΄ž 2015-01-26 2015-01-28
cnvd-2015-00717 Google Chromeε­—δ½“ε†…ε­˜η ΄εζΌζ΄ž 2015-01-26 2015-01-28
cnvd-2015-00691 QPR Portal HTML注ε…₯漏洞 2015-01-27 2015-01-28
cnvd-2015-00692 QPR Portal 'RID'ε‚ζ•°θ·¨η«™θ„šζœ¬ζΌζ΄ž 2015-01-27 2015-01-28
ID Description Published Updated
bdu:2015-03111 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03112 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 28.11.2016
bdu:2015-03113 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03114 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡŒΠ½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03115 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03116 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03117 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡŒΠ½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03118 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡŒΠ½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03119 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡŒΠ½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03120 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡŒΠ½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 28.11.2016
bdu:2015-03121 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡŒΠ½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 28.11.2016
bdu:2015-03122 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы Debian GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03123 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03124 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 28.11.2016
bdu:2015-03125 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 28.11.2016
bdu:2015-03126 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 28.11.2016
bdu:2015-03127 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 28.11.2016
bdu:2015-03128 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡŒΠ½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03129 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡŒΠ½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 28.11.2016
bdu:2015-03130 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡŒΠ½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 28.11.2016
bdu:2015-03131 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03132 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03133 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 28.11.2016
bdu:2015-03134 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03135 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03136 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03137 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 05.07.2024
bdu:2015-03138 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 28.11.2016
bdu:2015-03139 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 28.11.2016
bdu:2015-03140 Уязвимости ΠΎΠΏΠ΅Ρ€Π°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ систСмы DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡŽΡ‰ΠΈΠ΅ ΡƒΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡƒ Π·Π»ΠΎΡƒΠΌΡ‹ΡˆΠ»Π΅Π½Π½ΠΈΠΊΡƒ н… 28.04.2015 28.11.2016
ID Description Updated
var-202107-1702 Chengdu Zhifeng Technology Co., Ltd. was established in October 2016. It is an emerging h… 2022-05-04T09:15:23.384000Z
var-202106-2323 Yongbo (Xiamen) Electrical Technology Co., Ltd. was founded in 2010, focusing on overall … 2022-05-04T09:15:24.156000Z
var-202106-2302 TL-IPC223, etc. are all network camera products of Prolink Technology Co., Ltd. Many … 2022-05-04T09:15:24.166000Z
var-202106-2281 MOBOTIX is a world-renowned network camera technology leader. It has been producing pure … 2022-05-04T09:15:24.177000Z
var-202106-2260 Shanghai Aitai Technology Co., Ltd. is a small and medium-sized network solution provider… 2022-05-04T09:15:24.189000Z
var-202106-2239 TP-LINK Technology Co., Ltd. (hereinafter referred to as "TP-LINK") is the world's leadin… 2022-05-04T09:15:24.205000Z
var-202106-2218 Prolink Technology Co., Ltd. is the world's leading supplier of network communication equ… 2022-05-04T09:15:24.216000Z
var-202106-2197 H3C SecPath U200-M is a new generation of UTM (United Threat Management) equipment design… 2022-05-04T09:15:24.228000Z
var-202106-2176 EA6300 is a router product of Belkin Company. Belkin's EA6300 has a weak password vul… 2022-05-04T09:15:24.238000Z
var-202106-2155 NETGEAR WNR2000v4 router is a wireless router device. The NETGEAR WNR2000v4 router ha… 2022-05-04T09:15:24.249000Z
var-202106-2134 Established in 2005, UTEPO is an industrial communication and intelligent Internet of Thi… 2022-05-04T09:15:24.265000Z
var-202106-2113 Ruckus 7781CM is a wireless access point product of Ruckus Wireless. Ruckus Wireless … 2022-05-04T09:15:24.276000Z
var-202106-2092 ENS202EXT is an outdoor wireless bridge made by EnGenius. EnGenius ENS202EXT has a we… 2022-05-04T09:15:24.287000Z
var-202106-2071 Henan Pangu Technology Development Co., Ltd. is a professional enterprise organization th… 2022-05-04T09:15:24.299000Z
var-202106-2050 Tenda AC11 is a wireless router that uses RTOS operating system. Shenzhen Jixiang Ten… 2022-05-04T09:15:24.308000Z
var-202106-2029 D-Link DIR-809 is a wireless router using RTOS. D-Link DIR-809 has a binary vulnerabi… 2022-05-04T09:15:24.320000Z
var-202106-2008 Committed to the development and application of network communication products and IoT se… 2022-05-04T09:15:24.331000Z
var-202106-1805 SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22… 2022-05-04T09:15:24.597000Z
var-202106-1807 SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22… 2022-05-04T09:15:24.660000Z
var-202106-1820 SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22… 2022-05-04T09:15:24.690000Z
var-202106-1806 SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22… 2022-05-04T09:15:24.719000Z
var-202106-1132 SAP NetWeaver ABAP Server and ABAP Platform, versions - 700, 701, 702, 731, 740, 750, 751… 2022-05-04T09:15:24.803000Z
var-202105-1706 Ruijie Networks is a professional network manufacturer with a full range of network equip… 2022-05-04T09:15:25.136000Z
var-202105-1685 Shenzhen Baoruiming Technology Co., Ltd. is a high-tech camera manufacturer integrating R… 2022-05-04T09:15:25.146000Z
var-202105-1664 NR235P is a type of broadband router for small business equipment. Shenzhen Leike Ind… 2022-05-04T09:15:25.157000Z
var-202105-1643 Founded in 1987, Huawei is the world's leading provider of ICT (information and communica… 2022-05-04T09:15:25.168000Z
var-202105-1622 TL-WR1043ND is an 11n wireless router designed for small and medium enterprises, SOHO and… 2022-05-04T09:15:25.179000Z
var-202105-1601 Founded in 1987, Huawei is the world's leading provider of ICT (information and communica… 2022-05-04T09:15:25.191000Z
var-202105-1580 S9306 is a routing switch, POE switch. Huawei S9306 has a weak password vulnerability… 2022-05-04T09:15:25.202000Z
var-202105-1559 Tianxin Instrument Group Co., Ltd. is a professional service provider of domestic flow me… 2022-05-04T09:15:25.216000Z
ID CVSS Description Vendor Product Published Updated
ID CVSS Description Vendor Product Published Updated