Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0609 |
N/A
|
An incorrect configuration of the SoftCart CGI pr⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.678Z |
| CVE-1999-0610 |
N/A
|
An incorrect configuration of the Webcart CGI pro⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.691Z |
| CVE-1999-0611 |
N/A
|
A system-critical Windows NT registry key has an β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.691Z |
| CVE-1999-0613 |
N/A
|
The rpc.sprayd service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.783Z |
| CVE-1999-0614 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FTP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0615 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SNMP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2002-05-09T09:00:00.000Z |
| CVE-1999-0616 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The TFTP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0617 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SMTP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0618 |
N/A
|
The rexec service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.715Z |
| CVE-1999-0619 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The Telnet service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0620 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NIS is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0621 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NETBIOS is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2002-02-02T10:00:00.000Z |
| CVE-1999-0622 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to DNS service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0623 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X Windows service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0624 |
N/A
|
The rstat/rstatd service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.709Z |
| CVE-1999-0625 |
N/A
|
The rpc.rquotad service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.710Z |
| CVE-1999-0629 |
N/A
|
The ident/identd service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.674Z |
| CVE-1999-0630 |
N/A
|
The NT Alerter and Messenger services are running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.690Z |
| CVE-1999-0631 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NFS service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0632 |
N/A
|
The RPC portmapper service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.686Z |
| CVE-1999-0633 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The HTTP/WWW service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0634 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SSH service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0635 |
N/A
|
The echo service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.728Z |
| CVE-1999-0636 |
N/A
|
The discard service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.728Z |
| CVE-1999-0637 |
N/A
|
The systat service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.734Z |
| CVE-1999-0638 |
N/A
|
The daytime service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.690Z |
| CVE-1999-0639 |
N/A
|
The chargen service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:36.981Z |
| CVE-1999-0640 |
N/A
|
The Gopher service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.588Z |
| CVE-1999-0641 |
N/A
|
The UUCP service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.607Z |
| CVE-1999-0642 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A POP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0495 |
N/A
|
A remote attacker can gain access to a file syste⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.327Z |
| CVE-1999-0497 |
N/A
|
Anonymous FTP is enabled. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.555Z |
| CVE-1999-0512 |
N/A
|
A mail server is explicitly configured to allow S⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.455Z |
| CVE-1999-0515 |
N/A
|
An unrestricted remote trust relationship for Uni⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.464Z |
| CVE-1999-0520 |
N/A
|
A system-critical NETBIOS/SMB share has inappropr⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.463Z |
| CVE-1999-0523 |
N/A
|
ICMP echo (ping) is allowed from arbitrary hosts. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.453Z |
| CVE-1999-0527 |
N/A
|
The permissions for system-critical data in an an⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.606Z |
| CVE-1999-0528 |
N/A
|
A router or firewall forwards external packets th⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.438Z |
| CVE-1999-0529 |
N/A
|
A router or firewall forwards packets that claim β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.227Z |
| CVE-1999-0530 |
N/A
|
A system is operating in "promiscuous" mode which⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.688Z |
| CVE-1999-0531 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "An SMTP service supports EXPN, VRFY, HELP, ESMTP, and/or EHLO. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2005-11-02T10:00:00.000Z |
| CVE-1999-0539 |
N/A
|
A trust relationship exists between two Unix hosts. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.533Z |
| CVE-1999-0547 |
N/A
|
An SSH server allows authentication through the .β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.708Z |
| CVE-1999-0548 |
N/A
|
A superfluous NFS server is running, but it is no⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.685Z |
| CVE-1999-0549 |
N/A
|
Windows NT automatically logs in an administrator⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.554Z |
| CVE-1999-0554 |
N/A
|
NFS exports system-critical data to the world, e.β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.685Z |
| CVE-1999-0555 |
N/A
|
A Unix account with a name other than "root" has β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.566Z |
| CVE-1999-0556 |
N/A
|
Two or more Unix accounts have the same UID. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.487Z |
| CVE-1999-0559 |
N/A
|
A system-critical Unix file or directory has inap⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.643Z |
| CVE-1999-0560 |
N/A
|
A system-critical Windows NT file or directory ha⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.462Z |
| CVE-1999-0561 |
N/A
|
IIS has the #exec function enabled for Server Sid⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.516Z |
| CVE-1999-0564 |
N/A
|
An attacker can force a printer to print arbitrar⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.562Z |
| CVE-1999-0565 |
N/A
|
A Sendmail alias allows input to be piped to a program. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.585Z |
| CVE-1999-0568 |
N/A
|
rpc.admind in Solaris is not running in a secure mode. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.611Z |
| CVE-1999-0569 |
N/A
|
A URL for a WWW directory allows auto-indexing, w⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.540Z |
| CVE-1999-0570 |
N/A
|
Windows NT is not using a password filter utility⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.711Z |
| CVE-1999-0571 |
N/A
|
A router's configuration service or management in⦠|
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.638Z |
| CVE-1999-0577 |
N/A
|
A Windows NT system's file audit policy does not β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.676Z |
| CVE-1999-0578 |
N/A
|
A Windows NT system's registry audit policy does β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.691Z |
| CVE-1999-0579 |
N/A
|
A Windows NT system's registry audit policy does β¦ |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.675Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-vvjc-q5vr-52q6 |
9.8 (3.1)
|
Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Executi⦠| 2018-10-16T23:13:00Z | 2023-12-19T23:04:54Z |
| ghsa-vq9j-jh62-5hmp |
7.4 (3.1)
|
Apache Camel's Validation Component is vulnerable against SSRF via remote DTDs and XXE. | 2018-10-16T23:13:11Z | 2023-12-19T22:22:28Z |
| ghsa-2fw5-rvf2-jq56 |
|
Apache Camel's XSLT component allows remote attackers to read arbitrary files | 2018-10-16T23:13:26Z | 2023-02-15T22:19:10Z |
| ghsa-h6rp-8v4j-hwph |
|
Apache Camel's XSLT component allows remote attackers to execute arbitrary Java methods | 2018-10-16T23:13:49Z | 2023-02-15T22:19:51Z |
| ghsa-5xqr-grq4-qwgx |
5.5 (3.1)
|
Junrar vulnerable to Infinite Loop | 2018-10-17T00:04:05Z | 2022-11-17T18:39:50Z |
| ghsa-cvj4-g3gx-8vqq |
7.5 (3.1)
|
Restlet Framework allows remote attackers to access arbitrary files via a crafted REST API HTTP request | 2018-10-17T00:04:18Z | 2022-04-26T21:37:05Z |
| ghsa-2mp8-qvqm-3xwq |
7.5 (3.1)
|
Restlet Framework Ja-rs extension is vulnerable to XXE when using SimpleXMLProvider | 2018-10-17T00:04:31Z | 2023-09-26T11:23:36Z |
| ghsa-73cq-fhp3-8rpw |
|
Moderate severity vulnerability that affects org.restlet.jse:org.restlet | 2018-10-17T00:04:53Z | 2021-09-02T19:18:12Z |
| ghsa-cfh5-3ghh-wfjx |
|
Improper Verification of Cryptographic Signature in org.apache.httpcomponents:httpclient | 2018-10-17T00:05:06Z | 2024-04-12T22:05:35Z |
| ghsa-2x83-r56g-cv47 |
|
Improper certificate validation in org.apache.httpcomponents:httpclient | 2018-10-17T00:05:15Z | 2024-03-05T18:49:27Z |
| ghsa-fmj5-wv96-r2ch |
|
Denial of service vulnerability in org.apache.httpcomponents:httpclient | 2018-10-17T00:05:29Z | 2023-02-13T18:20:06Z |
| ghsa-h8q5-g2cj-qr5h |
7.5 (3.1)
|
Apache Tika is vulnerable to entity expansions which can lead to a denial of service attack | 2018-10-17T15:43:25Z | 2022-04-26T21:46:04Z |
| ghsa-9r24-gp44-h3pm |
8.1 (3.1)
|
Command injection in org.apache.tika:tika-core | 2018-10-17T15:43:43Z | 2024-04-19T19:47:15Z |
| ghsa-p699-3wgc-7h72 |
5.5 (3.1)
|
org.apache.tika:tika-parsers has an Infinite Loop vulnerability | 2018-10-17T15:43:59Z | 2023-02-28T22:57:51Z |
| ghsa-ccjp-w723-2jf2 |
5.3 (3.1)
|
Apache Tika Server exposes sensitive information | 2018-10-17T15:44:10Z | 2023-09-12T15:51:03Z |
| ghsa-4xr4-4c65-hj7f |
7.8 (3.1)
|
Apache Tika does not properly initialize the XML parser or choose handlers | 2018-10-17T15:44:22Z | 2022-04-26T21:46:36Z |
| ghsa-j8g6-2wh7-6439 |
9.8 (3.1)
|
Apache Tika allows Java code execution for serialized objects embedded in MATLAB files | 2018-10-17T15:44:36Z | 2024-04-12T21:33:27Z |
| ghsa-6jq2-789q-fff2 |
7.5 (3.1)
|
High severity vulnerability that affects org.apache.tika:tika-core | 2018-10-17T15:49:36Z | 2021-09-02T16:41:17Z |
| ghsa-w6g3-v46q-5p28 |
5.9 (3.1)
|
Moderate severity vulnerability that affects org.apache.tika:tika-core | 2018-10-17T15:49:58Z | 2021-09-21T17:58:38Z |
| ghsa-j53j-gmr9-h8g3 |
5.5 (3.1)
|
Comparison errorr in org.apache.tika:tika-core | 2018-10-17T15:50:31Z | 2024-03-04T23:27:07Z |
| ghsa-5mf7-26mw-3rqr |
5.5 (3.1)
|
Moderate severity vulnerability that affects org.apache.tika:tika-core | 2018-10-17T15:50:45Z | 2021-09-01T22:17:57Z |
| ghsa-rvgg-f8qm-6h7j |
|
High severity vulnerability that affects io.vertx:vertx-web | 2018-10-17T16:19:43Z | 2024-04-12T21:17:45Z |
| ghsa-45xm-v8gq-7jqx |
6.5 (3.1)
|
Excessive memory allocation | 2018-10-17T16:19:59Z | 2022-04-25T20:23:45Z |
| ghsa-qh3m-qw6v-qvhg |
|
Moderate severity vulnerability that affects io.vertx:vertx-core | 2018-10-17T16:20:32Z | 2024-03-04T20:46:26Z |
| ghsa-h39x-m55c-v55h |
9.8 (3.1)
|
Eclipse Vert.x does not properly neutralize '' (forward slashes) sequences that can resolve to an e⦠| 2018-10-17T16:20:45Z | 2022-04-26T21:49:59Z |
| ghsa-4446-656p-f54g |
9.8 (3.1)
|
Deserialization of Untrusted Data in Bouncy castle | 2018-10-17T16:23:12Z | 2025-05-12T21:40:33Z |
| ghsa-4vhj-98r6-424h |
7.5 (3.1)
|
In Bouncy Castle JCE Provider it is possible to inject extra elements in the sequence making up the⦠| 2018-10-17T16:23:26Z | 2025-09-12T19:27:36Z |
| ghsa-c8xf-m4ff-jcxj |
5.3 (3.1)
|
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcp⦠| 2018-10-17T16:23:38Z | 2025-09-12T19:12:44Z |
| ghsa-r97x-3g8f-gx3m |
7.5 (3.1)
|
The Bouncy Castle JCE Provider carry a propagation bug | 2018-10-17T16:23:50Z | 2025-09-12T19:28:32Z |
| ghsa-r9ch-m4fh-fc7q |
5.9 (3.1)
|
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcp⦠| 2018-10-17T16:24:00Z | 2025-09-12T19:13:38Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2019-78 |
|
A vulnerability was found in ceilometer before version 12.0.0.0rc1. An Information Exposu⦠| ceilometer | 2019-03-26T18:29:00Z | 2020-10-22T14:44:00Z |
| pysec-2019-5 |
|
Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerabi⦠| ansible | 2019-03-27T13:29:00Z | 2020-05-21T14:55:00Z |
| pysec-2019-166 |
|
The Serialize.deserialize() method in CoAPthon3 1.0 and 1.0.1 mishandles certain exceptio⦠| coapthon3 | 2019-04-02T19:29:00Z | 2021-08-25T04:57:20.904496Z |
| pysec-2019-165 |
|
The Serialize.deserialize() method in CoAPthon 3.1, 4.0.0, 4.0.1, and 4.0.2 mishandles ce⦠| coapthon | 2019-04-02T20:29:00Z | 2021-08-25T04:57:20.831477Z |
| pysec-2019-107 |
|
nbla/logger.cpp in libnnabla.a in Sony Neural Network Libraries (aka nnabla) through v1.0β¦ | nnabla | 2019-04-04T05:29:00Z | 2019-04-05T20:09:00Z |
| pysec-2019-158 |
|
In Jupyter Notebook before 5.7.8, an open redirect can occur via an empty netloc. This is⦠| notebook | 2019-04-04T16:29:00Z | 2021-07-15T02:22:16.309397Z |
| pysec-2019-127 |
|
In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 befo⦠| trytond | 2019-04-05T01:29:00Z | 2020-08-26T12:45:00Z |
| pysec-2019-189 |
|
An issue was discovered in OpenStack Neutron 11.x before 11.0.7, 12.x before 12.0.6, and β¦ | neutron | 2019-04-05T05:29:00Z | 2021-08-27T03:22:08.705789Z |
| pysec-2019-201 |
|
Roundup 1.6 allows XSS via the URI because frontends/roundup.cgi and roundup/cgi/wsgi_han⦠| roundup | 2019-04-06T20:29:00Z | 2021-09-02T01:11:35.189013Z |
| pysec-2019-217 |
|
In Pallets Jinja before 2.10.1, str.format_map allows a sandbox escape. | jinja2 | 2019-04-07T00:29:00Z | 2021-11-22T04:57:52.862665Z |
| pysec-2019-220 |
|
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape. | jinja2 | 2019-04-08T13:29:00Z | 2021-11-22T04:57:52.929678Z |
| pysec-2019-214 |
|
A malicious admin user could edit the state of objects in the Airflow metadata database t⦠| apache-airflow | 2019-04-10T20:29:00Z | 2021-11-16T03:58:43.132049Z |
| pysec-2019-215 |
|
A number of HTTP endpoints in the Airflow webserver (both RBAC and classic) did not have β¦ | apache-airflow | 2019-04-10T20:29:00Z | 2021-11-16T03:58:43.176949Z |
| pysec-2019-132 |
|
In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attac⦠| urllib3 | 2019-04-15T15:29:00Z | 2019-06-13T04:29:00Z |
| pysec-2019-198 |
|
OneLogin PythonSAML 2.3.0 and earlier may incorrectly utilize the results of XML DOM trav⦠| python-saml | 2019-04-17T14:29:00Z | 2021-08-27T03:22:18.581552Z |
| pysec-2019-133 |
|
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired s⦠| urllib3 | 2019-04-18T21:29:00Z | 2019-09-14T18:15:00Z |
| pysec-2019-155 |
|
python-dbusmock before version 0.15.1 AddTemplate() D-Bus method call or DBusTestCase.spa⦠| python-dbusmock | 2019-04-22T16:29:00Z | 2021-07-05T00:01:25.330872Z |
| pysec-2019-188 |
|
A flaw was found in Mercurial before 4.9. It was possible to use symlinks and subreposito⦠| mercurial | 2019-04-22T16:29:00Z | 2021-08-27T03:22:07.409198Z |
| pysec-2019-206 |
|
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of⦠| tensorflow | 2019-04-23T21:29:00Z | 2021-08-27T03:22:22.321158Z |
| pysec-2019-208 |
|
Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute a⦠| tensorflow | 2019-04-23T21:29:00Z | 2021-08-27T03:22:22.407658Z |
| pysec-2019-224 |
|
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of⦠| tensorflow-cpu | 2019-04-23T21:29:00Z | 2021-08-27T03:22:22.321158Z |
| pysec-2019-226 |
|
Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute a⦠| tensorflow-cpu | 2019-04-23T21:29:00Z | 2021-08-27T03:22:22.407658Z |
| pysec-2019-231 |
|
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of⦠| tensorflow-gpu | 2019-04-23T21:29:00Z | 2021-12-09T06:35:11.756170Z |
| pysec-2019-233 |
|
Google TensorFlow 1.7 and below is affected by: Buffer Overflow. The impact is: execute a⦠| tensorflow-gpu | 2019-04-23T21:29:00Z | 2021-12-09T06:35:11.845396Z |
| pysec-2019-204 |
|
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Goo⦠| tensorflow | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.150023Z |
| pysec-2019-207 |
|
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow bef⦠| tensorflow | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.362937Z |
| pysec-2019-210 |
|
NULL pointer dereference in Google TensorFlow before 1.12.2 could cause a denial of servi⦠| tensorflow | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.500832Z |
| pysec-2019-222 |
|
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Goo⦠| tensorflow-cpu | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.150023Z |
| pysec-2019-225 |
|
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow bef⦠| tensorflow-cpu | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.362937Z |
| pysec-2019-228 |
|
NULL pointer dereference in Google TensorFlow before 1.12.2 could cause a denial of servi⦠| tensorflow-cpu | 2019-04-24T17:29:00Z | 2021-08-27T03:22:22.500832Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-534 | Malicious code in @protiviti/fetlife-assets (npm) | 2022-06-20T18:20:31Z | 2022-06-20T18:20:32Z |
| mal-2022-556 | Malicious code in @realcommerce-dpm/fetlife-assets (npm) | 2022-06-20T18:20:32Z | 2022-06-20T18:20:32Z |
| mal-2022-557 | Malicious code in @rebelliondefense/fetlife-assets (npm) | 2022-06-20T18:20:32Z | 2022-06-20T18:20:33Z |
| mal-2022-560 | Malicious code in @replyify/fetlife-assets (npm) | 2022-06-20T18:20:32Z | 2022-06-20T18:20:33Z |
| mal-2022-561 | Malicious code in @rezserver/fetlife-assets (npm) | 2022-06-20T18:20:32Z | 2022-06-20T18:20:33Z |
| mal-2022-568 | Malicious code in @rwbaird/fetlife-assets (npm) | 2022-06-20T18:20:33Z | 2022-06-20T18:20:33Z |
| mal-2022-570 | Malicious code in @saltstack/fetlife-assets (npm) | 2022-06-20T18:20:33Z | 2022-06-20T18:20:34Z |
| mal-2022-581 | Malicious code in @serenityos/fetlife-assets (npm) | 2022-06-20T18:20:33Z | 2022-06-20T18:20:34Z |
| mal-2022-591 | Malicious code in @simplepoll/fetlife-assets (npm) | 2022-06-20T18:20:33Z | 2022-06-20T18:20:34Z |
| mal-2022-608 | Malicious code in @sport5/fetlife-assets (npm) | 2022-06-20T18:20:34Z | 2022-06-20T18:20:34Z |
| mal-2022-611 | Malicious code in @staked/fetlife-assets (npm) | 2022-06-20T18:20:34Z | 2022-06-20T18:20:34Z |
| mal-2022-614 | Malicious code in @steampowered/fetlife-assets (npm) | 2022-06-20T18:20:34Z | 2022-06-20T18:20:35Z |
| mal-2022-615 | Malicious code in @storspiller/fetlife-assets (npm) | 2022-06-20T18:20:34Z | 2022-06-20T18:20:35Z |
| mal-2022-632 | Malicious code in @tel-avive/fetlife-assets (npm) | 2022-06-20T18:20:35Z | 2022-06-20T18:20:35Z |
| mal-2022-633 | Malicious code in @telavive/fetlife-assets (npm) | 2022-06-20T18:20:35Z | 2022-06-20T18:20:35Z |
| mal-2022-635 | Malicious code in @texashealth/fetlife-assets (npm) | 2022-06-20T18:20:35Z | 2022-06-20T18:20:36Z |
| mal-2022-636 | Malicious code in @thealgorithms/fetlife-assets (npm) | 2022-06-20T18:20:35Z | 2022-06-20T18:20:36Z |
| mal-2022-637 | Malicious code in @thecheesecakefactory/fetlife-assets (npm) | 2022-06-20T18:20:36Z | 2022-06-20T18:20:36Z |
| mal-2022-638 | Malicious code in @themarker/fetlife-assets (npm) | 2022-06-20T18:20:36Z | 2022-06-20T18:20:36Z |
| mal-2022-665 | Malicious code in @toyota/fetlife-assets (npm) | 2022-06-20T18:20:36Z | 2022-06-20T18:20:37Z |
| mal-2022-690 | Malicious code in @unibet/fetlife-assets (npm) | 2022-06-20T18:20:36Z | 2022-06-20T18:20:37Z |
| mal-2022-693 | Malicious code in @unitedhealthgroup/fetlife-assets (npm) | 2022-06-20T18:20:37Z | 2022-06-20T18:20:37Z |
| mal-2022-699 | Malicious code in @usabilityhub/fetlife-assets (npm) | 2022-06-20T18:20:37Z | 2022-06-20T18:20:37Z |
| mal-2022-703 | Malicious code in @veracrypt/fetlife-assets (npm) | 2022-06-20T18:20:37Z | 2022-06-20T18:20:38Z |
| mal-2022-707 | Malicious code in @vladcazino/fetlife-assets (npm) | 2022-06-20T18:20:37Z | 2022-06-20T18:20:38Z |
| mal-2022-708 | Malicious code in @volkswagen/fetlife-assets (npm) | 2022-06-20T18:20:38Z | 2022-06-20T18:20:38Z |
| mal-2022-709 | Malicious code in @vpnarea/fetlife-assets (npm) | 2022-06-20T18:20:38Z | 2022-06-20T18:20:38Z |
| mal-2022-711 | Malicious code in @vwcredit/fetlife-assets (npm) | 2022-06-20T18:20:38Z | 2022-06-20T18:20:38Z |
| mal-2022-722 | Malicious code in @wegmans/fetlife-assets (npm) | 2022-06-20T18:20:38Z | 2022-06-20T18:20:39Z |
| mal-2022-723 | Malicious code in @wellsfargo/fetlife-assets (npm) | 2022-06-20T18:20:38Z | 2022-06-20T18:20:39Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-1860 | Nvidia Treiber: Mehrere Schwachstellen | 2020-06-24T22:00:00.000+00:00 | 2025-08-18T22:00:00.000+00:00 |
| wid-sec-w-2025-1693 | Net-SNMP: Schwachstelle ermΓΆglicht Denial of Service | 2020-06-25T22:00:00.000+00:00 | 2025-07-31T22:00:00.000+00:00 |
| wid-sec-w-2023-0068 | OpenSSH: Schwachstelle ermΓΆglicht Umgehen von Sicherheitsvorkehrungen | 2020-06-29T22:00:00.000+00:00 | 2025-12-17T23:00:00.000+00:00 |
| wid-sec-w-2023-0664 | OpenJPEG: Schwachstelle ermΓΆglicht nicht spezifizierten Angriff | 2020-06-29T22:00:00.000+00:00 | 2023-03-15T23:00:00.000+00:00 |
| wid-sec-w-2024-0975 | PuTTY: Schwachstelle ermΓΆglicht Umgehen von Sicherheitsvorkehrungen | 2020-06-29T22:00:00.000+00:00 | 2024-04-25T22:00:00.000+00:00 |
| wid-sec-w-2025-0288 | Sophos XG Firewall: Schwachstelle ermΓΆglicht CodeausfΓΌhrung | 2020-06-29T22:00:00.000+00:00 | 2025-02-06T23:00:00.000+00:00 |
| wid-sec-w-2023-0457 | Mozilla Firefox/Thunderbird: Mehrere Schwachstellen | 2020-06-30T22:00:00.000+00:00 | 2025-05-01T22:00:00.000+00:00 |
| wid-sec-w-2022-1268 | QEMU: Schwachstelle ermΓΆglicht Denial of Service | 2020-07-01T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2023-1919 | Wireshark: Schwachstelle ermΓΆglicht Denial of Service | 2020-07-01T22:00:00.000+00:00 | 2023-07-30T22:00:00.000+00:00 |
| wid-sec-w-2024-1480 | PowerDNS: Schwachstelle ermΓΆglicht Umgehen von Sicherheitsvorkehrungen | 2020-07-01T22:00:00.000+00:00 | 2024-06-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0960 | Linux Kernel: Schwachstelle ermΓΆglicht Denial of Service | 2020-07-02T22:00:00.000+00:00 | 2023-02-15T23:00:00.000+00:00 |
| wid-sec-w-2023-1220 | Python: Schwachstelle ermΓΆglicht Denial of Service | 2020-07-06T22:00:00.000+00:00 | 2024-07-11T22:00:00.000+00:00 |
| wid-sec-w-2023-1298 | Python: Schwachstelle ermΓΆglicht Denial of Service | 2020-07-13T22:00:00.000+00:00 | 2025-11-09T23:00:00.000+00:00 |
| wid-sec-w-2022-0519 | Apache Tomcat: Mehrere Schwachstellen ermΓΆglichen Denial of Service | 2020-07-14T22:00:00.000+00:00 | 2026-03-26T23:00:00.000+00:00 |
| wid-sec-w-2022-1522 | Oracle Java SE: Mehrere Schwachstellen | 2020-07-14T22:00:00.000+00:00 | 2025-05-13T22:00:00.000+00:00 |
| wid-sec-w-2023-0582 | Oracle Berkeley DB: Mehrere Schwachstellen | 2020-07-14T22:00:00.000+00:00 | 2023-03-07T23:00:00.000+00:00 |
| wid-sec-w-2024-2181 | Oracle Fusion Middleware: Mehrere Schwachstellen | 2020-07-14T22:00:00.000+00:00 | 2024-09-18T22:00:00.000+00:00 |
| wid-sec-w-2023-2221 | OTRS: Schwachstelle ermΓΆglicht Offenlegung von Informationen | 2020-07-19T22:00:00.000+00:00 | 2023-08-30T22:00:00.000+00:00 |
| wid-sec-w-2023-2731 | Red Hat Ceph Storage: Mehrere Schwachstellen | 2020-07-20T22:00:00.000+00:00 | 2023-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-1235 | Python: Schwachstelle ermΓΆglicht Umgehen von Sicherheitsvorkehrungen | 2020-07-20T22:00:00.000+00:00 | 2025-11-09T23:00:00.000+00:00 |
| wid-sec-w-2025-2930 | Red Hat Enterprise Linux: Schwachstelle ermΓΆglicht Umgehen von Sicherheitsvorkehrungen | 2020-07-21T22:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2022-1091 | QEMU: Schwachstelle ermΓΆglicht Denial of Service | 2020-07-22T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2022-1831 | Mozilla NSS: Schwachstelle ermΓΆglicht nicht spezifizierten Angriff | 2020-07-27T22:00:00.000+00:00 | 2025-06-02T22:00:00.000+00:00 |
| wid-sec-w-2026-0726 | TYPO3 Core: Mehrere Schwachstellen | 2020-07-27T22:00:00.000+00:00 | 2026-03-15T23:00:00.000+00:00 |
| wid-sec-w-2022-0553 | Grub2: Mehrere Schwachstellen ermΓΆglichen Umgehen von Sicherheitsvorkehrungen | 2020-07-29T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2022-2413 | OpenSSH: Schwachstelle ermΓΆglicht AusfΓΌhren von beliebigem Programmcode mit den Rechten des Dienstes | 2020-07-29T22:00:00.000+00:00 | 2025-05-22T22:00:00.000+00:00 |
| wid-sec-w-2024-0438 | libssh: Schwachstelle ermΓΆglicht Denial of Service | 2020-07-29T22:00:00.000+00:00 | 2024-05-07T22:00:00.000+00:00 |
| wid-sec-w-2023-1274 | Red Hat OpenShift: Schwachstelle ermΓΆglicht Denial of Service | 2020-07-30T22:00:00.000+00:00 | 2023-05-22T22:00:00.000+00:00 |
| wid-sec-w-2022-1995 | Google Android: Mehrere Schwachstellen | 2020-08-03T22:00:00.000+00:00 | 2024-05-30T22:00:00.000+00:00 |
| wid-sec-w-2023-2981 | Red Hat OpenShift: Mehrere Schwachstellen | 2020-08-06T22:00:00.000+00:00 | 2023-11-21T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-17-283-01 | LAVA Computer MFG Inc. Ether-Serial Link | 2017-10-10T00:00:00.000000Z | 2017-10-10T00:00:00.000000Z |
| icsa-17-283-02 | JanTek JTC-200 | 2017-10-10T00:00:00.000000Z | 2017-10-10T00:00:00.000000Z |
| icsa-17-285-01 | ProMinent MultiFLEX M10a Controller | 2017-10-12T00:00:00.000000Z | 2017-10-12T00:00:00.000000Z |
| icsa-17-285-02 | WECON Technology Co., Ltd. LeviStudio HMI Editor | 2017-10-12T00:00:00.000000Z | 2017-10-12T00:00:00.000000Z |
| icsa-17-285-03 | Envitech Ltd. EnviDAS Ultimate | 2017-10-12T00:00:00.000000Z | 2017-10-12T00:00:00.000000Z |
| icsa-17-285-04a | NXP Semiconductors MQX RTOS (Update A) | 2017-10-12T00:00:00.000000Z | 2018-02-01T00:00:00.000000Z |
| icsa-17-285-05 | Siemens BACnet Field Panels (Update A) | 2017-10-12T00:00:00.000000Z | 2022-06-14T00:00:00.000000Z |
| icsa-17-290-01 | Progea Movicon SCADA/HMI | 2017-10-17T00:00:00.000000Z | 2017-10-17T00:00:00.000000Z |
| icsa-17-306-01 | ICSA-17-306-01 Siemens SIMATIC PCS 7 (Update A) | 2017-10-18T00:00:00.000000Z | 2018-06-12T00:00:00.000000Z |
| icsa-17-292-01 | SpiderControl MicroBrowser | 2017-10-19T00:00:00.000000Z | 2017-10-19T00:00:00.000000Z |
| icsma-17-292-01 | ICSMA-17-292-01_Boston Scientific ZOOM LATITUDE PRM Vulnerabilities | 2017-10-19T00:00:00.000000Z | 2017-10-19T00:00:00.000000Z |
| icsa-17-299-01 | Korenix JetNet | 2017-10-26T00:00:00.000000Z | 2017-10-26T00:00:00.000000Z |
| icsa-17-299-02 | Rockwell Automation Stratix 5100 (Update A) | 2017-10-26T00:00:00.000000Z | 2018-11-01T00:00:00.000000Z |
| icsa-17-304-01 | ABB FOX515T | 2017-10-31T00:00:00.000000Z | 2017-10-31T00:00:00.000000Z |
| icsa-17-304-02 | Trihedral Engineering Limited VTScada | 2017-10-31T00:00:00.000000Z | 2017-10-31T00:00:00.000000Z |
| icsa-17-306-02 | Advantech WebAccess | 2017-11-02T00:00:00.000000Z | 2017-11-02T00:00:00.000000Z |
| icsa-17-313-01 | AutomationDirect CLICK, C-More, C-More Micro, Do-more Designer, GS Drives, SL-Soft SOLO, DirectSOFT (Update B) | 2017-11-09T00:00:00.000000Z | 2018-07-24T00:00:00.000000Z |
| icsa-17-313-02 | Schneider Electric InduSoft Web Studio and InTouch Machine Edition | 2017-11-09T00:00:00.000000Z | 2017-11-09T00:00:00.000000Z |
| icsa-17-318-01 | ICSA-17-318-01_Siemens SCALANCE, SIMATIC, RUGGEDCOM, and SINAMICS Products (Update F) | 2017-11-14T00:00:00.000000Z | 2019-04-09T00:00:00.000000Z |
| icsa-17-318-02a | ABB TropOS (Update A) | 2017-11-14T00:00:00.000000Z | 2018-02-15T00:00:00.000000Z |
| icsma-17-318-01 | Philips IntelliSpace Cardiovascular System and Xcelera System Vulnerability | 2017-11-14T00:00:00.000000Z | 2017-11-14T00:00:00.000000Z |
| icsa-17-320-01 | Moxa NPort 5110, 5130, and 5150 | 2017-11-16T00:00:00.000000Z | 2017-11-16T00:00:00.000000Z |
| icsa-17-320-02 | Siemens SICAM | 2017-11-16T00:00:00.000000Z | 2017-11-16T00:00:00.000000Z |
| icsa-17-332-01 | Siemens SCALANCE W1750D, M800, S615, and RUGGEDCOM RM1224 (Update C) | 2017-11-17T00:00:00.000000Z | 2018-05-09T00:00:00.000000Z |
| icsa-17-325-01 | PHOENIX CONTACT WLAN Capable Devices using the WPA2 Protocol | 2017-11-21T00:00:00.000000Z | 2017-11-21T00:00:00.000000Z |
| icsa-17-339-01 | Siemens Industrial Products (Update S) | 2017-11-23T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsma-17-332-01 | Ethicon Endo-Surgery Generator G11 Vulnerability | 2017-11-28T00:00:00.000000Z | 2017-11-28T00:00:00.000000Z |
| icsa-17-334-01 | Siemens SWT3000 | 2017-11-30T00:00:00.000000Z | 2017-11-30T00:00:00.000000Z |
| icsa-17-334-02 | GEOVAP Reliance SCADA | 2017-11-30T00:00:00.000000Z | 2017-11-30T00:00:00.000000Z |
| icsa-17-341-01 | Xiongmai Technology IP Cameras and DVRs | 2017-12-07T00:00:00.000000Z | 2017-12-07T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20190515-sb300sms-dhcp | Cisco Small Business 300 Series Managed Switches DHCP Denial of Service Vulnerability | 2019-05-15T16:00:00+00:00 | 2019-05-15T16:00:00+00:00 |
| cisco-sa-20190515-webex-player | Cisco Webex Network Recording Player Arbitrary Code Execution Vulnerabilities | 2019-05-15T16:00:00+00:00 | 2019-05-15T16:00:00+00:00 |
| cisco-sa-20190515-nxos-cli-bypass | Cisco NX-OS Software CLI Bypass to Internal Service Vulnerability | 2019-05-16T16:00:00+00:00 | 2021-05-19T20:31:16+00:00 |
| cisco-sa-20190605-cucm-imp-dos | Cisco Unified Communications Manager IM&P Service, Cisco TelePresence VCS, and Cisco Expressway Series Denial of Service Vulnerability | 2019-06-05T16:00:00+00:00 | 2019-06-24T13:49:49+00:00 |
| cisco-sa-20190605-ece-xss | Cisco Enterprise Chat and Email Cross-Site Scripting Vulnerability | 2019-06-05T16:00:00+00:00 | 2019-06-05T16:00:00+00:00 |
| cisco-sa-20190605-ind-csrf | Cisco Industrial Network Director Cross-Site Request Forgery Vulnerability | 2019-06-05T16:00:00+00:00 | 2019-06-11T19:14:15+00:00 |
| cisco-sa-20190605-ind-rce | Cisco Industrial Network Director Remote Code Execution Vulnerability | 2019-06-05T16:00:00+00:00 | 2019-06-05T16:00:00+00:00 |
| cisco-sa-20190605-ind-xss | Cisco Industrial Network Director Stored Cross-Site Scripting Vulnerability | 2019-06-05T16:00:00+00:00 | 2019-06-05T16:00:00+00:00 |
| cisco-sa-20190605-iosxr-ssh | Cisco IOS XR Software Secure Shell Authentication Vulnerability | 2019-06-05T16:00:00+00:00 | 2019-06-05T16:00:00+00:00 |
| cisco-sa-20190605-vcs | Cisco TelePresence Video Communication Server and Cisco Expressway Series Server-Side Request Forgery Vulnerability | 2019-06-05T16:00:00+00:00 | 2019-06-05T16:00:00+00:00 |
| cisco-sa-20190605-webexmeetings-id | Cisco Webex Meetings Server Information Disclosure Vulnerability | 2019-06-05T16:00:00+00:00 | 2019-06-05T16:00:00+00:00 |
| cisco-sa-20190612-iosxe-csrf | Cisco IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2019-06-12T16:00:00+00:00 | 2019-07-16T15:51:20+00:00 |
| cisco-sa-20190619-cimc-cli-cmdinj | Cisco Integrated Management Controller CLI Command Injection Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-cms-codex | Cisco Meeting Server CLI Command Injection Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-csm-xml | Cisco Security Manager XML Entity Expansion Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-dnac-bypass | Cisco DNA Center Authentication Bypass Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-27T17:34:37+00:00 |
| cisco-sa-20190619-ecea-dwnload | Cisco Enterprise Chat and Email Attachment Download Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-esa-bypass | Cisco Email Security Appliance GZIP Content Filter Bypass Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-imc-csrf | Cisco Integrated Management Controller Cross-Site Request Forgery Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-imc-dos | Cisco Integrated Management Controller Denial of Service Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-imc-filewrite | Cisco Integrated Management Controller Arbitrary File Write Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-imc-frmwr-dos | Cisco Integrated Management Controller Denial of Service Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-imc-infodiscl | Cisco Integrated Management Controller Information Disclosure Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-imc-infodisclos | Cisco Integrated Management Controller Information Disclosure Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-prime-privescal | Cisco Prime Infrastructure and Evolved Programmable Network Manager Virtual Domain Privilege Escalation Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-07-03T15:48:44+00:00 |
| cisco-sa-20190619-psc-csrf | Cisco Prime Service Catalog Cross-Site Request Forgery Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-20T15:37:52+00:00 |
| cisco-sa-20190619-psc-xss | Cisco Prime Service Catalog Cross-Site Scripting Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-20T15:39:29+00:00 |
| cisco-sa-20190619-rv-dos | Cisco RV110W, RV130W, and RV215W Routers Denial of Service Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-rv-fileaccess | Cisco RV110W, RV130W, and RV215W Routers Unauthenticated syslog File Access Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-rv-infodis | Cisco RV110W, RV130W, and RV215W Routers Information Disclosure Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2020-26154 | url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled as demonstrated by a large PAC file that is delivered without a Content-length header. | 2020-09-02T00:00:00.000Z | 2022-01-19T00:00:00.000Z |
| msrc_cve-2020-26159 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Further investigation showed that it was not a security issue. Notes: none | 2020-09-02T00:00:00.000Z | 2025-10-01T23:11:05.000Z |
| msrc_cve-2020-26160 | jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. | 2020-09-02T00:00:00.000Z | 2026-02-18T01:18:04.000Z |
| msrc_cve-2020-11979 | As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process. | 2020-10-02T00:00:00.000Z | 2020-10-14T00:00:00.000Z |
| msrc_cve-2020-14323 | A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15 before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service. | 2020-10-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2020-14765 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.6.49 and prior 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14769 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.49 and prior 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14771 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14773 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14775 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14776 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14777 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14785 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14786 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14789 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14790 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14791 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14793 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.49 and prior 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14794 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14800 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14804 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14809 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14812 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 5.6.49 and prior 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14814 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14821 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14827 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14828 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14829 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14830 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14836 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0032 | Kwetsbaarheden verholpen in Oracle MySQL | 2026-01-21T10:12:24.844869Z | 2026-01-21T10:12:24.844869Z |
| ncsc-2026-0033 | Kwetsbaarheid verholpen in GNU Inetutils telnetd | 2026-01-21T14:15:46.424529Z | 2026-01-21T14:15:46.424529Z |
| ncsc-2026-0034 | Kwetsbaarheden verholpen in Atlassian producten | 2026-01-22T09:03:42.667958Z | 2026-01-22T09:03:42.667958Z |
| ncsc-2026-0035 | Kwetsbaarheid verholpen in Palo Alto Networks PAN-OS | 2026-01-22T09:22:36.433609Z | 2026-01-22T09:22:36.433609Z |
| ncsc-2026-0036 | Kwetsbaarheden verholpen in Cisco Unified Communications producten | 2026-01-22T09:49:39.156365Z | 2026-01-22T09:49:39.156365Z |
| ncsc-2026-0037 | Kwetsbaarheden verholpen in GitLab Community Edition en Enterprise Edition | 2026-01-22T12:35:30.505659Z | 2026-01-22T12:35:30.505659Z |
| ncsc-2026-0038 | Kwetsbaarheid verholpen in BIND 9 | 2026-01-23T08:54:43.506215Z | 2026-01-23T08:54:43.506215Z |
| ncsc-2026-0039 | ZeroDay kwetsbaarheid verholpen in Microsoft Office | 2026-01-27T07:27:52.867415Z | 2026-01-27T07:27:52.867415Z |
| ncsc-2026-0040 | Kwetsbaarheid verholpen in SmarterTools SmarterMail | 2026-01-27T10:51:39.476320Z | 2026-02-06T09:25:57.008166Z |
| ncsc-2026-0041 | Kwetsbaarheid verholpen in Fortinet producten | 2026-01-28T09:32:41.752905Z | 2026-01-28T09:32:41.752905Z |
| ncsc-2026-0042 | Kwetsbaarheden verholpen in SolarWinds Web Help Desk | 2026-01-28T16:37:21.114054Z | 2026-02-02T09:47:54.857445Z |
| ncsc-2026-0043 | Zeroday-kwetsbaarheden verholpen in Ivanti Endpoint Manager Mobile | 2026-01-29T19:15:04.575371Z | 2026-02-20T14:47:02.047999Z |
| ncsc-2026-0044 | Kwetsbaarheid verholpen in Cisco TelePresence Collaboration Endpoint | 2026-02-06T09:20:11.629058Z | 2026-02-06T09:20:11.629058Z |
| ncsc-2026-0045 | Kwetsbaarheid verholpen in Cisco Meeting Management | 2026-02-06T09:22:16.831778Z | 2026-02-06T09:22:16.831778Z |
| ncsc-2026-0046 | Kwetsbaarheden verholpen in Samsung mobile | 2026-02-09T07:48:28.751473Z | 2026-02-09T07:48:28.751473Z |
| ncsc-2026-0047 | Kwetsbaarheid verholpen in Fortinet FortiClient EMS | 2026-02-09T10:16:18.048622Z | 2026-03-30T11:36:22.656910Z |
| ncsc-2026-0048 | Kwetsbaarheid verholpen in BeyondTrust Remote Support | 2026-02-09T10:27:57.867529Z | 2026-02-13T12:54:32.614217Z |
| ncsc-2026-0049 | Kwetsbaarheden verholpen in n8n | 2026-02-09T10:39:40.792744Z | 2026-02-09T10:39:40.792744Z |
| ncsc-2026-0050 | Kwetsbaarheid verholpen in PEAR | 2026-02-09T10:41:43.856342Z | 2026-02-09T10:41:43.856342Z |
| ncsc-2026-0051 | Kwetsbaarheden verholpen in Siemens producten | 2026-02-10T12:27:40.637581Z | 2026-02-10T12:27:40.637581Z |
| ncsc-2026-0052 | Kwetsbaarheden verholpen in SAP producten | 2026-02-10T12:28:40.531069Z | 2026-02-10T12:28:40.531069Z |
| ncsc-2026-0053 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-02-10T19:01:45.561771Z | 2026-02-10T19:01:45.561771Z |
| ncsc-2026-0054 | Kwetsbaarheid verholpen in Microsoft Exchange | 2026-02-10T19:04:51.366294Z | 2026-02-10T19:04:51.366294Z |
| ncsc-2026-0055 | Kwetsbaarheid verholpen in Microsoft SQL Server | 2026-02-10T19:05:45.729972Z | 2026-02-10T19:05:45.729972Z |
| ncsc-2026-0056 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2026-02-10T19:07:16.028511Z | 2026-02-10T19:07:16.028511Z |
| ncsc-2026-0057 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-02-10T19:08:27.878305Z | 2026-02-10T19:08:27.878305Z |
| ncsc-2026-0058 | Kwetsbaarheden verholpen in Microsoft Office | 2026-02-10T19:11:42.825147Z | 2026-02-10T19:11:42.825147Z |
| ncsc-2026-0059 | Kwetsbaarheden verholpen in Ivanti Endpoint Manager | 2026-02-11T08:16:27.583936Z | 2026-03-10T14:20:48.176282Z |
| ncsc-2026-0060 | Kwetsbaarheden verholpen in Fortinet FortiSandbox, FortiAuthenticator en FortiClient | 2026-02-11T11:34:36.684955Z | 2026-02-11T11:34:36.684955Z |
| ncsc-2026-0061 | Kwetsbaarheden verholpen in Fortinet FortiOS | 2026-02-11T11:34:50.888067Z | 2026-02-11T11:34:50.888067Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2019:2203-1 | Security update for rust | 2019-09-27T07:40:16Z | 2019-09-27T07:40:16Z |
| opensuse-su-2019:2204-1 | Security update for expat | 2019-09-28T10:20:58Z | 2019-09-28T10:20:58Z |
| opensuse-su-2019:2205-1 | Security update for expat | 2019-09-28T10:21:05Z | 2019-09-28T10:21:05Z |
| opensuse-su-2019:2206-1 | Security update for mosquitto | 2019-09-28T10:21:13Z | 2019-09-28T10:21:13Z |
| opensuse-su-2019:2207-1 | Security update for webkit2gtk3 | 2019-09-28T12:20:53Z | 2019-09-28T12:20:53Z |
| opensuse-su-2019:2208-1 | Security update for webkit2gtk3 | 2019-09-28T12:21:01Z | 2019-09-28T12:21:01Z |
| opensuse-su-2019:2211-1 | Security update for phpMyAdmin | 2019-09-28T12:21:38Z | 2019-09-28T12:21:38Z |
| opensuse-su-2019:2212-1 | Security update for libopenmpt | 2019-09-28T16:19:54Z | 2019-09-28T16:19:54Z |
| opensuse-su-2019:2213-1 | Security update for libopenmpt | 2019-09-28T16:20:05Z | 2019-09-28T16:20:05Z |
| opensuse-su-2019:2217-1 | Security update for djvulibre | 2019-09-30T04:19:41Z | 2019-09-30T04:19:41Z |
| opensuse-su-2019:2219-1 | Security update for djvulibre | 2019-09-30T10:20:29Z | 2019-09-30T10:20:29Z |
| opensuse-su-2019:2221-1 | Security update for varnish | 2019-09-30T14:22:47Z | 2019-09-30T14:22:47Z |
| opensuse-su-2019:2222-1 | Security update for ghostscript | 2019-09-30T14:22:56Z | 2019-09-30T14:22:56Z |
| opensuse-su-2019:2223-1 | Security update for ghostscript | 2019-09-30T14:23:09Z | 2019-09-30T14:23:09Z |
| opensuse-su-2019:2224-1 | Security update for SDL2 | 2019-09-30T16:21:38Z | 2019-09-30T16:21:38Z |
| opensuse-su-2019:2225-1 | Security update for python-numpy | 2019-09-30T18:21:36Z | 2019-09-30T18:21:36Z |
| opensuse-su-2019:2226-1 | Security update for SDL2 | 2019-09-30T18:21:43Z | 2019-09-30T18:21:43Z |
| opensuse-su-2019:2227-1 | Security update for python-numpy | 2019-09-30T18:21:50Z | 2019-09-30T18:21:50Z |
| opensuse-su-2019:2228-1 | Security update for chromium | 2019-10-01T08:20:14Z | 2019-10-01T08:20:14Z |
| opensuse-su-2019:2229-1 | Security update for chromium | 2019-10-01T08:20:36Z | 2019-10-01T08:20:36Z |
| opensuse-su-2019:2232-1 | Security update for nghttp2 | 2019-10-01T10:23:24Z | 2019-10-01T10:23:24Z |
| opensuse-su-2019:2233-1 | Security update for u-boot | 2019-10-01T12:23:07Z | 2019-10-01T12:23:07Z |
| opensuse-su-2019:2234-1 | Security update for nghttp2 | 2019-10-01T14:21:00Z | 2019-10-01T14:21:00Z |
| opensuse-su-2019:2235-1 | Security update for u-boot | 2019-10-01T14:23:37Z | 2019-10-01T14:23:37Z |
| opensuse-su-2019:2244-1 | Security update for rust | 2019-10-03T09:22:00Z | 2019-10-03T09:22:00Z |
| opensuse-su-2019:2245-1 | Security update for lxc | 2019-10-03T10:23:09Z | 2019-10-03T10:23:09Z |
| opensuse-su-2019:2247-1 | Security update for mosquitto | 2019-10-03T16:21:06Z | 2019-10-03T16:21:06Z |
| opensuse-su-2019:2248-1 | Security update for MozillaThunderbird | 2019-10-04T10:23:43Z | 2019-10-04T10:23:43Z |
| opensuse-su-2019:2249-1 | Security update for MozillaThunderbird | 2019-10-04T10:24:16Z | 2019-10-04T10:24:16Z |
| opensuse-su-2019:2251-1 | Security update for MozillaFirefox | 2019-10-04T22:24:43Z | 2019-10-04T22:24:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2005:748 | Red Hat Security Advisory: php security update | 2005-08-19T17:19:00+00:00 | 2025-11-21T17:29:31+00:00 |
| rhsa-2005:743 | Red Hat Security Advisory: netpbm security update | 2005-08-22T13:55:00+00:00 | 2025-11-21T17:29:29+00:00 |
| rhsa-2005:747 | Red Hat Security Advisory: slocate security update | 2005-08-22T14:00:00+00:00 | 2025-11-21T17:29:30+00:00 |
| rhsa-2005:745 | Red Hat Security Advisory: vim security update | 2005-08-22T14:12:00+00:00 | 2025-11-21T17:29:30+00:00 |
| rhsa-2005:755 | Red Hat Security Advisory: elm security update | 2005-08-23T18:16:00+00:00 | 2025-11-21T17:29:31+00:00 |
| rhsa-2005:551 | Red Hat Security Advisory: kernel security update | 2005-08-25T13:17:00+00:00 | 2026-01-13T22:14:37+00:00 |
| rhsa-2005:529 | Red Hat Security Advisory: kernel security update | 2005-08-25T13:29:00+00:00 | 2026-01-13T22:34:47+00:00 |
| rhsa-2005:267 | Red Hat Security Advisory: Evolution security update | 2005-08-29T18:30:00+00:00 | 2025-11-21T17:28:45+00:00 |
| rhsa-2005:608 | Red Hat Security Advisory: httpd security update | 2005-09-06T13:37:00+00:00 | 2025-11-21T17:29:24+00:00 |
| rhsa-2005:756 | Red Hat Security Advisory: cvs security update | 2005-09-06T13:42:00+00:00 | 2025-11-21T17:29:32+00:00 |
| rhsa-2005:761 | Red Hat Security Advisory: pcre security update | 2005-09-08T17:19:00+00:00 | 2025-11-21T17:29:32+00:00 |
| rhsa-2005:358 | Red Hat Security Advisory: exim security update | 2005-09-08T19:02:00+00:00 | 2025-11-21T17:28:54+00:00 |
| rhsa-2005:768 | Red Hat Security Advisory: firefox security update | 2005-09-09T23:28:00+00:00 | 2026-02-17T02:19:41+00:00 |
| rhsa-2005:329 | Red Hat Security Advisory: XFree86 security update | 2005-09-12T21:38:00+00:00 | 2025-11-21T17:28:47+00:00 |
| rhsa-2005:396 | Red Hat Security Advisory: xorg-x11 security update | 2005-09-13T17:07:00+00:00 | 2025-11-21T17:29:01+00:00 |
| rhsa-2005:501 | Red Hat Security Advisory: XFree86 security update | 2005-09-15T08:47:00+00:00 | 2025-11-21T17:29:11+00:00 |
| rhsa-2005:766 | Red Hat Security Advisory: squid security update | 2005-09-15T08:58:00+00:00 | 2025-11-21T17:29:33+00:00 |
| rhsa-2005:773 | Red Hat Security Advisory: mod_ssl security update | 2005-09-15T18:16:00+00:00 | 2025-11-21T17:29:36+00:00 |
| rhsa-2005:785 | Red Hat Security Advisory: firefox security update | 2005-09-22T20:16:00+00:00 | 2025-11-21T17:29:36+00:00 |
| rhsa-2005:789 | Red Hat Security Advisory: mozilla security update | 2005-09-22T20:36:00+00:00 | 2025-11-21T17:29:37+00:00 |
| rhsa-2005:788 | Red Hat Security Advisory: HelixPlayer security update | 2005-09-27T11:50:00+00:00 | 2025-11-21T17:29:37+00:00 |
| rhsa-2005:772 | Red Hat Security Advisory: cups security update | 2005-09-27T11:53:00+00:00 | 2025-11-21T17:29:35+00:00 |
| rhsa-2005:762 | Red Hat Security Advisory: RealPlayer security update | 2005-09-27T15:49:00+00:00 | 2025-11-21T17:29:33+00:00 |
| rhsa-2005:771 | Red Hat Security Advisory: wget security update | 2005-09-27T16:10:00+00:00 | 2025-11-21T17:29:35+00:00 |
| rhba-2005:675 | Red Hat Bug Fix Advisory: gdb bug fix update | 2005-09-28T00:00:00+00:00 | 2026-01-13T22:17:22+00:00 |
| rhsa-2005:659 | Red Hat Security Advisory: binutils security update | 2005-09-28T14:04:00+00:00 | 2026-01-13T22:12:28+00:00 |
| rhsa-2005:663 | Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 6 | 2005-09-28T14:17:00+00:00 | 2026-01-13T22:07:52+00:00 |
| rhsa-2005:081 | Red Hat Security Advisory: ghostscript security update | 2005-09-28T14:21:00+00:00 | 2025-11-21T17:28:25+00:00 |
| rhsa-2005:373 | Red Hat Security Advisory: net-snmp security update | 2005-09-28T14:26:00+00:00 | 2026-01-13T22:12:14+00:00 |
| rhsa-2005:550 | Red Hat Security Advisory: openssh security update | 2005-09-28T14:32:00+00:00 | 2025-11-21T17:29:16+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2016:0747-1 | Security update for kernel live patch 9 | 2016-03-14T13:30:34Z | 2016-03-14T13:30:34Z |
| suse-su-2016:0749-1 | Security update for kernel live patch 10 | 2016-03-14T13:30:41Z | 2016-03-14T13:30:41Z |
| suse-su-2016:0754-1 | Security update for kernel live patch 11 | 2016-03-14T13:30:48Z | 2016-03-14T13:30:48Z |
| suse-su-2016:0751-1 | Security update for kernel live patch 0 | 2016-03-14T13:30:56Z | 2016-03-14T13:30:56Z |
| suse-su-2016:0748-1 | Security update for sles12sp1-docker-image | 2016-03-14T13:31:02Z | 2016-03-14T13:31:02Z |
| suse-su-2016:0755-1 | Security update for kernel live patch 1 | 2016-03-14T13:31:04Z | 2016-03-14T13:31:04Z |
| suse-su-2016:0752-1 | Security update for kernel live patch 2 | 2016-03-14T13:31:11Z | 2016-03-14T13:31:11Z |
| suse-su-2016:0759-1 | Security update for bind | 2016-03-14T14:32:56Z | 2016-03-14T14:32:56Z |
| suse-su-2016:0769-1 | Security update for tomcat | 2016-03-15T10:19:01Z | 2016-03-15T10:19:01Z |
| suse-su-2016:0770-1 | Security update for java-1_6_0-ibm | 2016-03-15T12:58:15Z | 2016-03-15T12:58:15Z |
| suse-su-2016:0777-1 | Security update for MozillaFirefox, mozilla-nspr, mozilla-nss | 2016-03-15T14:32:56Z | 2016-03-15T14:32:56Z |
| suse-su-2016:0779-1 | Security update for graphite2 | 2016-03-15T17:01:26Z | 2016-03-15T17:01:26Z |
| suse-su-2016:0778-1 | Security update for sles11sp4-docker-image | 2016-03-15T17:01:49Z | 2016-03-15T17:01:49Z |
| suse-su-2016:0780-1 | Security update for bind | 2016-03-15T17:02:25Z | 2016-03-15T17:02:25Z |
| suse-su-2016:0786-1 | Security update for sles12-docker-image | 2016-03-16T10:28:25Z | 2016-03-16T10:28:25Z |
| suse-su-2016:0785-1 | Security update for the Linux Kernel | 2016-03-16T10:39:32Z | 2016-03-16T10:39:32Z |
| suse-su-2016:0796-1 | Security update for git | 2016-03-16T18:14:57Z | 2016-03-16T18:14:57Z |
| suse-su-2016:0798-1 | Security update for git | 2016-03-16T20:11:17Z | 2016-03-16T20:11:17Z |
| suse-su-2016:0807-1 | Security update for clamsap | 2016-03-17T14:38:46Z | 2016-03-17T14:38:46Z |
| suse-su-2016:0805-1 | Security update for clamsap | 2016-03-17T14:38:56Z | 2016-03-17T14:38:56Z |
| suse-su-2016:0806-1 | Security update for ceph | 2016-03-17T14:39:05Z | 2016-03-17T14:39:05Z |
| suse-su-2016:0816-1 | Security update for samba | 2016-03-18T09:44:24Z | 2016-03-18T09:44:24Z |
| suse-su-2016:0814-1 | Security update for samba | 2016-03-18T09:54:41Z | 2016-03-18T09:54:41Z |
| suse-su-2016:0822-1 | Security update for tomcat | 2016-03-18T14:14:17Z | 2016-03-18T14:14:17Z |
| suse-su-2016:0825-1 | Security update for bind | 2016-03-18T15:33:02Z | 2016-03-18T15:33:02Z |
| suse-su-2016:0839-1 | Security update for tomcat6 | 2016-03-21T09:27:05Z | 2016-03-21T09:27:05Z |
| suse-su-2016:0837-1 | Security update for samba | 2016-03-21T10:05:53Z | 2016-03-21T10:05:53Z |
| suse-su-2016:0854-1 | Security update for rubygem-actionview-4_1 | 2016-03-22T13:34:50Z | 2016-03-22T13:34:50Z |
| suse-su-2016:0858-1 | Security update for rubygem-actionpack-4_1 | 2016-03-22T16:21:44Z | 2016-03-22T16:21:44Z |
| suse-su-2016:0857-1 | Security update for rubygem-activesupport-4_1 | 2016-03-22T16:21:53Z | 2016-03-22T16:21:53Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2023:0016 | Important: webkit2gtk3 security update | 2023-01-04T00:00:00Z | 2023-03-13T16:36:24Z |
| alsa-2023:0021 | Important: webkit2gtk3 security update | 2023-01-04T00:00:00Z | 2023-03-13T16:36:26Z |
| alsa-2023:0049 | Moderate: grub2 security update | 2023-01-09T00:00:00Z | 2023-01-10T10:17:57Z |
| alsa-2023:0050 | Moderate: nodejs:14 security, bug fix, and enhancement update | 2023-01-09T00:00:00Z | 2023-01-10T10:25:19Z |
| alsa-2023:0077 | Moderate: .NET 6.0 security, bug fix, and enhancement update | 2023-01-11T00:00:00Z | 2023-01-12T19:37:42Z |
| alsa-2023:0079 | Moderate: .NET 6.0 security, bug fix, and enhancement update | 2023-01-11T00:00:00Z | 2023-01-12T19:43:07Z |
| alsa-2023:0087 | Moderate: usbguard security update | 2023-01-12T00:00:00Z | 2023-03-13T16:36:27Z |
| alsa-2023:0089 | Moderate: libreoffice security update | 2023-01-12T00:00:00Z | 2023-01-13T18:11:38Z |
| alsa-2023:0095 | Moderate: libtiff security update | 2023-01-12T00:00:00Z | 2023-03-13T16:36:27Z |
| alsa-2023:0096 | Moderate: dbus security update | 2023-01-12T00:00:00Z | 2023-03-13T16:36:30Z |
| alsa-2023:0099 | Moderate: virt:rhel and virt-devel:rhel security and bug fix update | 2023-01-12T00:00:00Z | 2023-03-13T16:36:36Z |
| alsa-2023:0100 | Moderate: systemd security and bug fix update | 2023-01-12T00:00:00Z | 2023-03-13T16:36:38Z |
| alsa-2023:0101 | Important: kernel security and bug fix update | 2023-01-12T00:00:00Z | 2023-01-16T11:10:17Z |
| alsa-2023:0103 | Moderate: expat security update | 2023-01-12T00:00:00Z | 2023-03-08T11:40:15Z |
| alsa-2023:0110 | Moderate: sqlite security update | 2023-01-12T00:00:00Z | 2023-03-08T11:32:38Z |
| alsa-2023:0113 | Moderate: postgresql:10 security update | 2023-01-12T00:00:00Z | 2023-01-16T11:57:43Z |
| alsa-2023:0114 | Important: kernel-rt security and bug fix update | 2023-01-12T00:00:00Z | 2023-01-16T11:45:22Z |
| alsa-2023:0116 | Moderate: libtasn1 security update | 2023-01-12T00:00:00Z | 2023-03-08T11:21:43Z |
| alsa-2023:0171 | Important: dpdk security update | 2023-01-16T00:00:00Z | 2023-01-16T12:28:07Z |
| alsa-2023:0173 | Moderate: libxml2 security update | 2023-01-16T00:00:00Z | 2023-03-08T11:17:51Z |
| alsa-2023:0192 | Moderate: java-17-openjdk security and bug fix update | 2023-01-18T00:00:00Z | 2023-09-15T13:41:48Z |
| alsa-2023:0200 | Moderate: java-11-openjdk security and bug fix update | 2023-01-18T00:00:00Z | 2023-09-15T13:41:48Z |
| alsa-2023:0202 | Moderate: java-11-openjdk security and bug fix update | 2023-01-18T00:00:00Z | 2023-09-15T13:41:48Z |
| alsa-2023:0194 | Moderate: java-17-openjdk security and bug fix update | 2023-01-23T00:00:00Z | 2023-09-15T13:41:48Z |
| alsa-2023:0282 | Important: sudo security update | 2023-01-23T00:00:00Z | 2023-01-24T07:20:47Z |
| alsa-2023:0284 | Important: sudo security update | 2023-01-23T00:00:00Z | 2023-01-24T07:25:59Z |
| alsa-2023:0285 | Important: firefox security update | 2023-01-23T00:00:00Z | 2023-01-24T07:32:24Z |
| alsa-2023:0288 | Important: firefox security update | 2023-01-23T00:00:00Z | 2023-01-24T07:35:30Z |
| alsa-2023:0300 | Important: kernel-rt security and bug fix update | 2023-01-23T00:00:00Z | 2023-01-24T14:46:25Z |
| alsa-2023:0302 | Moderate: libtiff security update | 2023-01-23T00:00:00Z | 2023-03-13T16:36:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-1301 | Heap-buffer-overflow in hts_md5_update | 2020-07-22T21:50:04.440116Z | 2022-04-13T03:04:32.327879Z |
| osv-2020-1306 | Use-of-uninitialized-value in TIFFYCbCrtoRGB | 2020-07-22T21:50:04.734490Z | 2022-04-13T03:04:31.082150Z |
| osv-2020-1307 | Heap-buffer-overflow in pcpp::IPv6Extension::getExtensionLen | 2020-07-22T21:50:04.807754Z | 2022-04-13T03:04:38.510475Z |
| osv-2020-1310 | Use-of-uninitialized-value in pcpp::SSLCertificateRequestMessage::SSLCertificateRequestMessage | 2020-07-22T21:50:05.088004Z | 2022-04-13T03:04:38.691127Z |
| osv-2020-1312 | Use-of-uninitialized-value in FilterInput8bitWithStride_c | 2020-07-22T21:50:05.402144Z | 2022-04-13T03:04:37.494474Z |
| osv-2020-1314 | Use-of-uninitialized-value in ndpi_strdup | 2020-07-22T21:50:05.778993Z | 2022-04-13T03:04:36.259727Z |
| osv-2020-1315 | Heap-buffer-overflow in pcpp::IPv4Layer::getFragmentFlags | 2020-07-22T21:50:05.807755Z | 2022-04-13T03:04:38.719461Z |
| osv-2020-1321 | UNKNOWN READ in FlowGetHash | 2020-07-22T21:50:06.291563Z | 2022-04-13T03:04:32.748792Z |
| osv-2020-1325 | Global-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2020-07-22T21:50:06.762604Z | 2022-04-13T03:04:33.044825Z |
| osv-2020-1326 | Heap-buffer-overflow in ihevcd_parse_slice_data | 2020-07-22T21:50:06.811741Z | 2022-04-13T03:04:30.983191Z |
| osv-2020-1327 | UNKNOWN READ in arrow::Status arrow::VisitArrayInline<arrow::internal::ValidateArrayDataVisitor> | 2020-07-22T21:50:06.904891Z | 2022-04-13T03:04:31.904776Z |
| osv-2020-1328 | UNKNOWN READ in std::__1::__tree<std::__1::__value_type<std::__1::basic_string<char, std::__1::c | 2020-07-22T21:50:06.975630Z | 2022-04-13T03:04:42.691141Z |
| osv-2020-1330 | Heap-buffer-overflow in mu::ParserBase::ParseCmdCodeBulk | 2020-07-22T21:50:07.104906Z | 2022-04-13T03:04:30.741147Z |
| osv-2020-1331 | Heap-buffer-overflow in pcpp::GtpV1Layer::GtpExtension::getNextExtensionHeaderType | 2020-07-22T21:50:07.132825Z | 2022-04-13T03:04:38.628878Z |
| osv-2020-1332 | Index-out-of-bounds in xsltSetAttrVTsegment | 2020-07-22T21:50:07.164634Z | 2022-04-13T03:04:33.752444Z |
| osv-2020-1340 | Use-of-uninitialized-value in Gfx::fillPatch | 2020-07-22T21:50:07.878108Z | 2022-04-13T03:04:37.268795Z |
| osv-2020-1346 | UNKNOWN WRITE in StatsIncr | 2020-07-22T21:50:08.261306Z | 2022-04-13T03:04:32.737543Z |
| osv-2020-1347 | Negative-size-param in fuzz_tlv_to_string | 2020-07-22T21:50:08.310638Z | 2022-04-13T03:04:42.837836Z |
| osv-2020-1349 | Heap-buffer-overflow in mu::ParserBase::ParseCmdCodeBulk | 2020-07-22T21:50:08.481816Z | 2022-04-13T03:04:30.730045Z |
| osv-2020-1351 | Heap-use-after-free in sc_pkcs15_free_object | 2020-07-22T21:50:08.637276Z | 2022-04-13T03:04:41.575360Z |
| osv-2020-1352 | Heap-buffer-overflow in arrow::Status arrow::internal::ValidateArrayVisitor::ValidateListArray<arrow::Li | 2020-07-22T21:50:08.733370Z | 2022-04-13T03:04:31.948799Z |
| osv-2020-1356 | Segv on unknown address in vips_XYZ2Lab_line | 2020-07-24T00:00:05.678188Z | 2022-04-13T03:04:38.042963Z |
| osv-2020-1362 | Use-of-uninitialized-value in LibRaw::init_fuji_block | 2020-07-28T00:00:01.793422Z | 2022-04-15T00:05:54.082034Z |
| osv-2020-1365 | UNKNOWN READ in cli_vba_readdir_new | 2020-07-28T00:00:02.964345Z | 2022-04-13T03:04:39.436925Z |
| osv-2020-1366 | Heap-use-after-free in RDKit::SubstanceGroup::addParentAtomWithBookmark | 2020-07-28T00:00:03.076252Z | 2022-04-13T03:29:38.667934Z |
| osv-2020-1371 | Bad-cast to pcpp::IDnsResource from invalid vptr | 2020-07-28T00:00:04.081926Z | 2022-04-13T03:04:38.585223Z |
| osv-2020-1372 | Index-out-of-bounds in stbi__build_huffman | 2020-07-28T00:00:04.120846Z | 2022-04-13T03:04:40.796838Z |
| osv-2020-1373 | Segv on unknown address in helper_uc_tracecode | 2020-07-28T00:00:04.707812Z | 2023-02-24T01:56:33.315977Z |
| osv-2020-1379 | Heap-buffer-overflow in dotnet_parse_com | 2020-07-28T00:00:05.738705Z | 2022-07-01T00:04:10.449501Z |
| osv-2020-1380 | Use-of-uninitialized-value in stbi__jpeg_decode_block_prog_ac | 2020-07-28T00:00:05.816594Z | 2022-04-13T03:04:40.806471Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0370 | proc-macro-error is unmaintained | 2024-09-01T12:00:00Z | 2024-09-09T12:08:37Z |
| rustsec-2024-0384 | `instant` is unmaintained | 2024-09-01T12:00:00Z | 2024-11-10T13:10:28Z |
| rustsec-2024-0368 | olm-sys: wrapped library unmaintained, potentially vulnerable | 2024-09-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0373 | `Endpoint::retry()` calls can lead to panicking | 2024-09-02T12:00:00Z | 2024-09-08T01:47:13Z |
| rustsec-2024-0382 | hwloc is unmaintained | 2024-09-04T12:00:00Z | 2024-11-10T12:52:40Z |
| rustsec-2024-0383 | bcc is unmaintained | 2024-09-04T12:00:00Z | 2024-11-10T12:53:21Z |
| rustsec-2024-0386 | strason is unmaintained | 2024-09-04T12:00:00Z | 2024-11-10T13:16:48Z |
| rustsec-2024-0372 | Memory leak when calling a canister method via `ic_cdk::call` | 2024-09-05T12:00:00Z | 2024-09-07T18:23:36Z |
| rustsec-2024-0371 | gix-path improperly resolves configuration path reported by Git | 2024-09-06T12:00:00Z | 2024-09-07T01:48:33Z |
| rustsec-2024-0443 | webp crate may expose memory contents when encoding an image | 2024-09-06T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0404 | Unsoundness in anstream | 2024-09-08T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0425 | get-size is unmaintained | 2024-09-15T12:00:00Z | 2024-12-22T09:01:06Z |
| rustsec-2024-0427 | get-size-derive is unmaintained | 2024-09-15T12:00:00Z | 2024-12-22T09:01:06Z |
| rustsec-2024-0374 | Segmentation fault due to use of uninitialized memory | 2024-09-22T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0375 | `atty` is unmaintained | 2024-09-25T12:00:00Z | 2024-09-26T12:26:22Z |
| rustsec-2024-0376 | Remotely exploitable Denial of Service in Tonic | 2024-10-01T12:00:00Z | 2025-09-11T07:02:22Z |
| rustsec-2024-0440 | Runtime crash when combining tail calls with stack traces | 2024-10-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0439 | Race condition could lead to WebAssembly control-flow integrity and type safety violations | 2024-10-03T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0377 | Heap Buffer overflow using c_chars_to_str function | 2024-10-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0436 | paste - no longer maintained | 2024-10-07T12:00:00Z | 2026-01-27T21:51:15Z |
| rustsec-2024-0402 | Borsh serialization of HashMap is non-canonical | 2024-10-11T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0378 | Risk of use-after-free in `borrowed` reads from Python weak references | 2024-10-12T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0380 | Replaced by `pqcrypto-mldsa` | 2024-10-24T12:00:00Z | 2024-11-10T12:05:32Z |
| rustsec-2024-0381 | Replaced by `pqcrypto-mlkem` | 2024-10-24T12:00:00Z | 2024-11-10T12:05:32Z |
| rustsec-2024-0379 | Multiple soundness issues | 2024-10-31T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0438 | Wasmtime doesn't fully sandbox all the Windows device filenames | 2024-11-02T12:00:00Z | 2025-05-02T08:23:27Z |
| rustsec-2024-0445 | cap-primitives doesn't fully sandbox all the Windows device filenames | 2024-11-05T12:00:00Z | 2025-12-19T21:01:24Z |
| rustsec-2024-0401 | Denial of service because of stack overflow with malicious decompression input | 2024-11-14T12:00:00Z | 2024-12-04T12:13:35Z |
| rustsec-2024-0398 | Bias of Polynomial Coefficients in Secret Sharing | 2024-11-16T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0399 | rustls network-reachable panic in `Acceptor::accept` | 2024-11-22T12:00:00Z | 2025-10-28T06:02:18Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-jenkins-2022-20612 | 2024-03-06T10:58:16.486Z | 2025-04-03T14:40:37.652Z | |
| bit-mlflow-2023-43472 | 2024-03-06T10:58:17.282Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2022-27949 | Apache Airflow prior to 2.3.1 may include sensitive values in rendered template | 2024-03-06T10:58:17.378Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2022-41717 | Excessive memory growth in net/http and golang.org/x/net/http2 | 2024-03-06T10:58:17.486Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2023-5541 | Moodle: xss risk when using csv grade import method | 2024-03-06T10:58:18.062Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-4895 | Missing Authorization in GitLab | 2024-03-06T10:58:18.268Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2023-28112 | Discourse's SSRF protection missing for some FastImage requests | 2024-03-06T10:58:19.088Z | 2026-03-25T18:30:22.404Z |
| bit-nats-2022-24450 | 2024-03-06T10:58:21.477Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2022-27458 | 2024-03-06T10:58:21.495Z | 2024-03-06T11:25:28.861Z | |
| bit-minio-2021-21287 | Server-Side Request Forgery in MinIO Browser API | 2024-03-06T10:58:22.370Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2022-24512 | .NET and Visual Studio Remote Code Execution Vulnerability | 2024-03-06T10:58:23.161Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2021-28583 | Magento Commerce insecure storage of sensitive documentation | 2024-03-06T10:58:23.464Z | 2026-03-20T09:47:33.381Z |
| bit-mongodb-2020-7929 | Specially crafted regex query can cause DoS | 2024-03-06T10:58:23.672Z | 2025-05-20T10:02:07.006Z |
| bit-drupal-2020-13665 | 2024-03-06T10:58:25.802Z | 2025-04-03T14:40:37.652Z | |
| bit-grafana-2022-21702 | Cross site scripting in Grafana proxy | 2024-03-06T10:58:26.283Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2021-32777 | Incorrect concatenation of multiple value request headers in ext-authz extension | 2024-03-06T10:58:27.361Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2022-24288 | Apache Airflow: RCE in example DAGs | 2024-03-06T10:58:27.613Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2023-5540 | Moodle: authenticated remote code execution risk in imscp | 2024-03-06T10:58:27.676Z | 2025-05-20T10:02:07.006Z |
| bit-mlflow-2023-4033 | OS Command Injection in mlflow/mlflow | 2024-03-06T10:58:27.677Z | 2025-05-20T10:02:07.006Z |
| bit-jenkins-2022-2048 | 2024-03-06T10:58:27.765Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2022-41716 | Unsanitized NUL in environment variables on Windows in syscall and os/exec | 2024-03-06T10:58:28.267Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2023-28111 | Discourse vulnerable to SSRF protection bypass possible with IPv4-mapped IPv6 addresses | 2024-03-06T10:58:28.677Z | 2025-05-20T10:02:07.006Z |
| bit-mariadb-2022-27457 | 2024-03-06T10:58:30.164Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2023-4812 | Incorrect Authorization in GitLab | 2024-03-06T10:58:30.571Z | 2025-05-20T10:02:07.006Z |
| bit-minio-2020-11012 | Authentication bypass MinIO Admin API | 2024-03-06T10:58:32.002Z | 2025-05-20T10:02:07.006Z |
| bit-mongodb-2020-7928 | Improper neutralization of null byte leads to read overrun | 2024-03-06T10:58:33.099Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2022-24464 | .NET and Visual Studio Denial of Service Vulnerability | 2024-03-06T10:58:33.275Z | 2025-05-20T10:02:07.006Z |
| bit-nats-2021-3127 | 2024-03-06T10:58:33.708Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13664 | 2024-03-06T10:58:34.293Z | 2025-04-03T14:40:37.652Z | |
| bit-mlflow-2023-3765 | Absolute Path Traversal in mlflow/mlflow | 2024-03-06T10:58:35.367Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-bm53321 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-10T00:51:58.426076Z | 2026-04-09T11:53:35Z |
| cleanstart-2026-in87004 | In libexpat before 2 | 2026-04-10T00:52:28.484967Z | 2026-04-09T11:45:48Z |
| cleanstart-2026-ng75665 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T00:56:28.527348Z | 2026-04-09T11:53:35Z |
| cleanstart-2026-mu81308 | gRPC-Go is the Go language implementation of gRPC | 2026-04-10T00:56:28.601214Z | 2026-04-09T11:29:32Z |
| cleanstart-2026-nz97711 | gRPC-Go is the Go language implementation of gRPC | 2026-04-10T01:00:58.666965Z | 2026-04-09T09:33:10Z |
| cleanstart-2026-hm40094 | filippo | 2026-04-10T01:03:28.912174Z | 2026-04-09T09:27:45Z |
| cleanstart-2026-nx54250 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T01:03:29.003448Z | 2026-04-09T09:59:33Z |
| cleanstart-2026-kl76732 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-10T01:03:58.949308Z | 2026-04-09T09:05:28Z |
| cleanstart-2026-ac01087 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T01:03:59.042951Z | 2026-04-09T09:55:12Z |
| cleanstart-2026-dp55969 | Security fixes for ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4cx2-fc23-5wg6, ghsa-4g8c-wm8x-jfhw, ghsa-735f-pc8j-v9w8, ghsa-fghv-69vj-qj49, ghsa-prj3-ccx8-p6x4, ghsa-xq3w-v528-46rv applied in versions: 0.12.0-r16 | 2026-04-10T01:04:00.139766Z | 2026-04-09T09:00:58Z |
| cleanstart-2026-aa51484 | Security fixes for ghsa-389x-839f-4rhx, ghsa-3p8m-j85q-pgmj, ghsa-4cx2-fc23-5wg6, ghsa-4g8c-wm8x-jfhw, ghsa-735f-pc8j-v9w8, ghsa-fghv-69vj-qj49, ghsa-prj3-ccx8-p6x4, ghsa-xq3w-v528-46rv applied in versions: 0.12.0-r16 | 2026-04-10T01:04:01.115500Z | 2026-04-09T08:58:26Z |
| cleanstart-2026-jm69747 | Security fixes for ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 25.10.0-r1 | 2026-04-10T01:04:01.248430Z | 2026-04-09T08:55:52Z |
| cleanstart-2026-av56399 | Security fixes for ghsa-f6x5-jh6r-wrfv, ghsa-j5w8-q4qc-rx2x applied in versions: 25.10.0-r1 | 2026-04-10T01:04:01.910374Z | 2026-04-09T08:54:48Z |
| cleanstart-2026-oc72960 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-04-10T01:04:28.955253Z | 2026-04-09T08:54:07Z |
| cleanstart-2026-dm93480 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-10T01:06:00.088585Z | 2026-04-09T09:11:04Z |
| cleanstart-2026-ei21238 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-11T00:37:54.711613Z | 2026-04-10T10:45:58Z |
| cleanstart-2026-lb69194 | In libexpat before 2 | 2026-04-11T00:39:42.680532Z | 2026-04-10T05:48:24Z |
| cleanstart-2026-jt73156 | protojson | 2026-04-11T00:42:17.168521Z | 2026-04-10T12:27:18Z |
| cleanstart-2026-hu81793 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-12T00:36:09.840766Z | 2026-04-11T06:04:40Z |
| cleanstart-2026-mz25894 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-12T00:36:10.207025Z | 2026-04-11T06:04:40Z |
| cleanstart-2026-ne70100 | Security fixes for ghsa-72hv-8253-57qq, ghsa-qqpg-mvqg-649v applied in versions: 3.9.4-r0, 3.9.4-r6 | 2026-04-12T00:36:10.440964Z | 2026-04-11T06:04:40Z |
| cleanstart-2026-nh62318 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-14T00:38:02.309746Z | 2026-04-13T11:37:38Z |
| cleanstart-2026-ka64649 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-14T00:38:03.199310Z | 2026-04-13T11:37:38Z |
| cleanstart-2026-nj21771 | png_image_free in png | 2026-04-14T00:41:12.278705Z | 2026-04-13T10:08:55Z |
| cleanstart-2026-jh41080 | In libexpat before 2 | 2026-04-14T00:41:12.662437Z | 2026-04-13T11:37:38Z |
| cleanstart-2026-lk73694 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-14T00:43:42.897096Z | 2026-04-13T05:21:32Z |
| cleanstart-2026-fh63386 | When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint | 2026-04-14T00:44:12.807187Z | 2026-04-13T10:06:48Z |
| cleanstart-2026-ec57959 | protojson | 2026-04-15T00:38:38.411296Z | 2026-04-14T11:35:55Z |
| cleanstart-2026-mp87020 | If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources | 2026-04-15T00:39:08.262212Z | 2026-04-14T11:37:13Z |
| cleanstart-2026-bz28794 | Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service | 2026-04-15T00:41:09.072733Z | 2026-04-14T10:03:45Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2003-avi-178 | Vulnérabilité de la bibliothèque Libnids | 2003-11-03T00:00:00.000000 | 2004-01-06T00:00:00.000000 |
| certa-2003-avi-179 | Faille dans l'implΓ©mentation d'OpenSSL sous Microsoft Windows | 2003-11-05T00:00:00.000000 | 2003-11-06T00:00:00.000000 |
| certa-2003-avi-180 | VulnΓ©rabilitΓ© de la commande ls sous Linux | 2003-11-07T00:00:00.000000 | 2005-10-06T00:00:00.000000 |
| certa-2003-avi-181 | VulnΓ©rabilitΓ© de l'application Terminal sous Apple MacOS X | 2003-11-07T00:00:00.000000 | 2003-11-07T00:00:00.000000 |
| certa-2005-avi-440 | Multiples vulnérabilités dans la bibliothèque libungif/giflib | 2003-11-10T00:00:00.000000 | 2005-11-09T00:00:00.000000 |
| certa-2003-avi-182 | Multiples vulnΓ©rabilitΓ©s d'Ethereal | 2003-11-12T00:00:00.000000 | 2003-12-15T00:00:00.000000 |
| certa-2003-avi-183 | VulnΓ©rabilitΓ© de libDtHelp (CDE) | 2003-11-12T00:00:00.000000 | 2004-08-05T00:00:00.000000 |
| certa-2003-avi-184 | Correctif cumulatif pour Internet Explorer | 2003-11-12T00:00:00.000000 | 2003-11-12T00:00:00.000000 |
| certa-2003-avi-185 | VulnΓ©rabilitΓ© dans Windows Workstation Service | 2003-11-12T00:00:00.000000 | 2003-11-12T00:00:00.000000 |
| certa-2003-avi-186 | VulnΓ©rabilitΓ©s dans Microsoft Word et Microsoft Excel | 2003-11-12T00:00:00.000000 | 2003-11-12T00:00:00.000000 |
| certa-2003-avi-187 | VulnΓ©rabilitΓ©s dans Microsoft FrontPage Server Extensions | 2003-11-12T00:00:00.000000 | 2003-11-12T00:00:00.000000 |
| certa-2003-avi-188 | VulnΓ©rabilitΓ© sur Postgresql | 2003-11-12T00:00:00.000000 | 2003-11-14T00:00:00.000000 |
| certa-2003-avi-189 | VulnΓ©rabilitΓ© sur Oracle Database Server | 2003-11-12T00:00:00.000000 | 2003-11-12T00:00:00.000000 |
| certa-2003-avi-190 | VulnΓ©rabilitΓ© dans HylaFAX | 2003-11-12T00:00:00.000000 | 2003-11-21T00:00:00.000000 |
| certa-2003-avi-191 | VulnΓ©rabilitΓ© sur Oracle Files | 2003-11-12T00:00:00.000000 | 2003-11-12T00:00:00.000000 |
| certa-2003-avi-192 | VulnΓ©rabilitΓ© sur Oracle9i Application Server Portal | 2003-11-14T00:00:00.000000 | 2003-11-14T00:00:00.000000 |
| certa-2003-avi-193 | VulnΓ©rabilitΓ© dans Opera | 2003-11-14T00:00:00.000000 | 2003-11-14T00:00:00.000000 |
| certa-2003-avi-194 | VulnΓ©rabilitΓ© dans pcAnywhere de Symantec | 2003-11-14T00:00:00.000000 | 2003-11-14T00:00:00.000000 |
| certa-2003-avi-195 | Multiples vulnΓ©rabilitΓ©s dans Eudora | 2003-11-14T00:00:00.000000 | 2003-11-14T00:00:00.000000 |
| certa-2003-avi-196 | VulnΓ©rabilitΓ©s sur HP-UX | 2003-11-14T00:00:00.000000 | 2003-11-14T00:00:00.000000 |
| certa-2003-avi-197 | Multiples vulnΓ©rabilitΓ©s dans SAP DB | 2003-11-20T00:00:00.000000 | 2003-11-20T00:00:00.000000 |
| certa-2003-avi-198 | Multiples vulnΓ©rabilitΓ©s du noyau OpenBSD | 2003-11-24T00:00:00.000000 | 2003-11-24T00:00:00.000000 |
| certa-2003-avi-199 | VulnΓ©rabilitΓ© dans Opera | 2003-11-25T00:00:00.000000 | 2003-11-25T00:00:00.000000 |
| certa-2003-avi-200 | VulnΓ©rabilitΓ© dans Pan | 2003-11-25T00:00:00.000000 | 2003-11-25T00:00:00.000000 |
| certa-2003-avi-201 | VulnΓ©rabilitΓ© du moteur de recherche SPIRIT de la sociΓ©tΓ© Technologie | 2003-11-25T00:00:00.000000 | 2004-06-28T00:00:00.000000 |
| certa-2003-avi-202 | VulnΓ©rabilitΓ© du serveur FreeRadius | 2003-11-25T00:00:00.000000 | 2003-12-16T00:00:00.000000 |
| certa-2003-avi-203 | VulnΓ©rabilitΓ© dans Stunnel | 2003-12-01T00:00:00.000000 | 2003-12-01T00:00:00.000000 |
| certa-2003-avi-204 | VulnΓ©rabilitΓ© du noyau Linux | 2003-12-02T00:00:00.000000 | 2003-12-05T00:00:00.000000 |
| certa-2003-avi-205 | Mauvaise gestion du cache dans BIND 8 | 2003-12-02T00:00:00.000000 | 2004-01-21T00:00:00.000000 |
| certa-2003-avi-206 | VulnΓ©rabilitΓ© de rsync | 2003-12-04T00:00:00.000000 | 2004-03-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2011-003295 | JP1/Cm2/Network Node Manager i Denial of Service (DoS) Vulnerability | 2012-01-06T19:51+09:00 | 2012-01-06T19:51+09:00 |
| jvndb-2011-002122 | An authentication information Exposure Vulnerability in JP1/IT Resource Management - Manager | 2012-01-06T19:53+09:00 | 2012-01-06T19:53+09:00 |
| jvndb-2012-000003 | Wibu-Systems CodeMeter Runtime vulnerable to denial-of-service | 2012-01-11T15:02+09:00 | 2012-01-11T15:02+09:00 |
| jvndb-2012-000002 | Cogent DataHub vulnerable to HTTP header injection | 2012-01-11T15:12+09:00 | 2012-01-13T16:08+09:00 |
| jvndb-2012-000001 | Cogent DataHub vulnerable to cross-site scripting | 2012-01-11T15:22+09:00 | 2012-01-13T15:57+09:00 |
| jvndb-2012-000007 | Oracle WebLogic Server vulnerable to cross-site scripting | 2012-01-20T15:37+09:00 | 2012-01-20T15:37+09:00 |
| jvndb-2012-000006 | osCommerce vulnerable to directory traversal | 2012-01-20T16:09+09:00 | 2012-01-20T16:09+09:00 |
| jvndb-2012-000005 | osCommerce vulnerable to cross-site scripting | 2012-01-20T16:15+09:00 | 2012-04-26T16:58+09:00 |
| jvndb-2012-000004 | osCommerce Japanese version vulnerable to cross-site scripting | 2012-01-20T16:23+09:00 | 2012-01-20T16:23+09:00 |
| jvndb-2012-000008 | glucose 2 vulnerable to arbitrary script execution | 2012-01-23T18:27+09:00 | 2012-01-23T18:27+09:00 |
| jvndb-2012-001189 | Hitachi IT Operations Analyzer Cross-Site Scripting Vulnerability | 2012-01-27T10:37+09:00 | 2012-01-27T10:37+09:00 |
| jvndb-2012-001190 | Hitachi IT Operations Director Cross-Site Scripting Vulnerability | 2012-01-27T10:38+09:00 | 2012-01-27T10:38+09:00 |
| jvndb-2012-001191 | Arbitrary Code Execution Vulnerability in Hitachi COBOL2002 | 2012-01-27T10:44+09:00 | 2012-01-27T10:44+09:00 |
| jvndb-2012-000010 | Pocket WiFi (GP02) vulnerable to cross-site request forgery | 2012-02-01T14:12+09:00 | 2012-02-01T14:12+09:00 |
| jvndb-2012-000012 | Apache Struts 2 vulnerable to an arbitrary Java method execution | 2012-02-10T14:29+09:00 | 2012-02-10T14:29+09:00 |
| jvndb-2012-000011 | ALFTP may insecurely load executable files | 2012-02-13T15:58+09:00 | 2012-02-13T15:58+09:00 |
| jvndb-2012-000013 | cforms II vulnerable to cross-site scripting | 2012-02-15T17:14+09:00 | 2012-02-15T17:14+09:00 |
| jvndb-2012-000014 | Multiple COOKPAD applications for Android vulnerable in WebView class | 2012-02-22T14:44+09:00 | 2012-02-29T10:56+09:00 |
| jvndb-2012-000015 | Movable Type vulnerable to cross-site request forgery | 2012-02-23T14:19+09:00 | 2012-02-23T14:19+09:00 |
| jvndb-2012-000016 | Movable Type vulnerable to cross-site scripting | 2012-02-23T14:20+09:00 | 2012-02-23T14:20+09:00 |
| jvndb-2012-000017 | Movable Type vulnerable to OS command injection | 2012-02-23T14:21+09:00 | 2012-02-23T14:21+09:00 |
| jvndb-2012-000018 | Movable Type vulnerable to session hijacking | 2012-02-23T14:28+09:00 | 2012-02-23T14:28+09:00 |
| jvndb-2012-000019 | Kingsoft Internet Security 2011 vulnerable to denial-of-service | 2012-03-01T14:03+09:00 | 2012-03-01T14:03+09:00 |
| jvndb-2012-000020 | ES File Explorer fails to restrict access permissions | 2012-03-05T15:50+09:00 | 2012-03-05T15:50+09:00 |
| jvndb-2012-000021 | SquirrelMail plugin Autocomplete vulnerable to cross-site scripting | 2012-03-09T14:18+09:00 | 2012-03-09T14:18+09:00 |
| jvndb-2012-000022 | Jenkins vulnerable to cross-site scripting | 2012-03-09T14:28+09:00 | 2012-03-09T14:28+09:00 |
| jvndb-2012-000023 | Jenkins vulnerable to cross-site scripting | 2012-03-09T14:35+09:00 | 2012-03-09T14:35+09:00 |
| jvndb-2012-000024 | twicca fails to restrict access permissions | 2012-03-13T13:36+09:00 | 2012-03-13T13:36+09:00 |
| jvndb-2012-000025 | Redmine vulnerable to cross-site scripting | 2012-03-13T13:39+09:00 | 2012-03-13T13:39+09:00 |
| jvndb-2012-001793 | JP1/Cm2/Network Node Manager i Denial of Service (DoS) Vulnerability | 2012-03-19T12:04+09:00 | 2012-03-19T12:04+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00664 | Google Chrome V8ε εη ΄εζΌζ΄ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00665 | Google Chrome DOMε ειθ――εΌη¨δ»£η ζ§θ‘ζΌζ΄ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00666 | Google Chrome DOMε ειθ――εΌη¨ζΌζ΄οΌCNVD-2015-00666οΌ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00667 | Google Chromeζη»ζε‘ζΌζ΄οΌCNVD-2015-00667οΌ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00668 | Google Chromeζη»ζε‘ζΌζ΄οΌCNVD-2015-00668οΌ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00669 | Google Chromeζη»ζε‘ζΌζ΄οΌCNVD-2015-00669οΌ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00670 | Google Chrome WebAudioε ειθ――εΌη¨δ»»ζ代η ζ§θ‘ζΌζ΄ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00671 | Google Chromeε ειθ――εΌη¨ζΌζ΄οΌCNVD-2015-00671οΌ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00672 | Google Chromeζη»ζε‘ζΌζ΄οΌCNVD-2015-00672οΌ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00688 | SAP ERP Dealer PortalζιζεζΌζ΄ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00689 | OpenStack Glanceζη»ζε‘ζΌζ΄ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00690 | WordPressζδ»ΆPie Registerεε¨ζͺζζΌζ΄ | 2015-01-26 | 2015-01-27 |
| cnvd-2015-00701 | Google Chrome DOMε ειθ――εΌη¨ζΌζ΄οΌCNVD-2015-00701οΌ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00702 | Google Chrome DOMε ειθ――εΌη¨ζΌζ΄οΌCNVD-2015-00702οΌ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00703 | Google Chrome FFmpegε ειθ――εΌη¨ζΌζ΄οΌCNVD-2015-00703οΌ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00704 | Google Chrome Speechε ειθ――εΌη¨ζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00705 | GNU patch 'set_hunkmax()'ε½ζ°ζη»ζε‘ζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00706 | Google Chrome FFmpegε ειθ――εΌη¨ζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00707 | Google Chrome Viewsε ειθ――εΌη¨ζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00708 | Google Chrome SkiaθΆηθ―»ζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00710 | Google Chrome PDFiumθΆηθ―»ζΌζ΄οΌCNVD-2015-00710οΌ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00711 | Google Chrome PDFiumθΆηθ―»ζΌζ΄οΌCNVD-2015-00711οΌ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00712 | Google Chrome UIθΆηθ―»εζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00713 | Google Chromeεδ½ζͺεε§εζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00714 | FerretCMSεε¨ε€δΈͺSQL注ε ₯ζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00715 | Google Chrome ICUζͺεε§εζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00716 | Google Chrome V8εζΊη»θΏζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00717 | Google Chromeεδ½ε εη ΄εζΌζ΄ | 2015-01-26 | 2015-01-28 |
| cnvd-2015-00691 | QPR Portal HTML注ε ₯ζΌζ΄ | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00692 | QPR Portal 'RID'εζ°θ·¨η«θζ¬ζΌζ΄ | 2015-01-27 | 2015-01-28 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-03111 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03112 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03113 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03114 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03115 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03116 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03117 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03118 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03119 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03120 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03121 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03122 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ Debian GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03123 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03124 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03125 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03126 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03127 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03128 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03129 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03130 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ Π»ΠΎΠΊΠ°Π»ΡΠ½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03131 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03132 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03133 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03134 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03135 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03136 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03137 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 05.07.2024 |
| bdu:2015-03138 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03139 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| bdu:2015-03140 | Π£ΡΠ·Π²ΠΈΠΌΠΎΡΡΠΈ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΠΈΡΡΠ΅ΠΌΡ DebianΒ GNU/Linux, ΠΏΠΎΠ·Π²ΠΎΠ»ΡΡΡΠΈΠ΅ ΡΠ΄Π°Π»Π΅Π½Π½ΠΎΠΌΡ Π·Π»ΠΎΡΠΌΡΡΠ»Π΅Π½Π½ΠΈΠΊΡ Π½β¦ | 28.04.2015 | 28.11.2016 |
| ID | Description | Updated |
|---|---|---|
| var-202107-1702 | Chengdu Zhifeng Technology Co., Ltd. was established in October 2016. It is an emerging h⦠| 2022-05-04T09:15:23.384000Z |
| var-202106-2323 | Yongbo (Xiamen) Electrical Technology Co., Ltd. was founded in 2010, focusing on overall β¦ | 2022-05-04T09:15:24.156000Z |
| var-202106-2302 | TL-IPC223, etc. are all network camera products of Prolink Technology Co., Ltd. Many β¦ | 2022-05-04T09:15:24.166000Z |
| var-202106-2281 | MOBOTIX is a world-renowned network camera technology leader. It has been producing pure β¦ | 2022-05-04T09:15:24.177000Z |
| var-202106-2260 | Shanghai Aitai Technology Co., Ltd. is a small and medium-sized network solution provider⦠| 2022-05-04T09:15:24.189000Z |
| var-202106-2239 | TP-LINK Technology Co., Ltd. (hereinafter referred to as "TP-LINK") is the world's leadin⦠| 2022-05-04T09:15:24.205000Z |
| var-202106-2218 | Prolink Technology Co., Ltd. is the world's leading supplier of network communication equ⦠| 2022-05-04T09:15:24.216000Z |
| var-202106-2197 | H3C SecPath U200-M is a new generation of UTM (United Threat Management) equipment design⦠| 2022-05-04T09:15:24.228000Z |
| var-202106-2176 | EA6300 is a router product of Belkin Company. Belkin's EA6300 has a weak password vul⦠| 2022-05-04T09:15:24.238000Z |
| var-202106-2155 | NETGEAR WNR2000v4 router is a wireless router device. The NETGEAR WNR2000v4 router ha⦠| 2022-05-04T09:15:24.249000Z |
| var-202106-2134 | Established in 2005, UTEPO is an industrial communication and intelligent Internet of Thi⦠| 2022-05-04T09:15:24.265000Z |
| var-202106-2113 | Ruckus 7781CM is a wireless access point product of Ruckus Wireless. Ruckus Wireless β¦ | 2022-05-04T09:15:24.276000Z |
| var-202106-2092 | ENS202EXT is an outdoor wireless bridge made by EnGenius. EnGenius ENS202EXT has a we⦠| 2022-05-04T09:15:24.287000Z |
| var-202106-2071 | Henan Pangu Technology Development Co., Ltd. is a professional enterprise organization th⦠| 2022-05-04T09:15:24.299000Z |
| var-202106-2050 | Tenda AC11 is a wireless router that uses RTOS operating system. Shenzhen Jixiang Ten⦠| 2022-05-04T09:15:24.308000Z |
| var-202106-2029 | D-Link DIR-809 is a wireless router using RTOS. D-Link DIR-809 has a binary vulnerabi⦠| 2022-05-04T09:15:24.320000Z |
| var-202106-2008 | Committed to the development and application of network communication products and IoT se⦠| 2022-05-04T09:15:24.331000Z |
| var-202106-1805 | SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22β¦ | 2022-05-04T09:15:24.597000Z |
| var-202106-1807 | SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22β¦ | 2022-05-04T09:15:24.660000Z |
| var-202106-1820 | SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22β¦ | 2022-05-04T09:15:24.690000Z |
| var-202106-1806 | SAP NetWeaver ABAP Server and ABAP Platform (Enqueue Server), versions - KRNL32NUC - 7.22β¦ | 2022-05-04T09:15:24.719000Z |
| var-202106-1132 | SAP NetWeaver ABAP Server and ABAP Platform, versions - 700, 701, 702, 731, 740, 750, 751β¦ | 2022-05-04T09:15:24.803000Z |
| var-202105-1706 | Ruijie Networks is a professional network manufacturer with a full range of network equip⦠| 2022-05-04T09:15:25.136000Z |
| var-202105-1685 | Shenzhen Baoruiming Technology Co., Ltd. is a high-tech camera manufacturer integrating R⦠| 2022-05-04T09:15:25.146000Z |
| var-202105-1664 | NR235P is a type of broadband router for small business equipment. Shenzhen Leike Ind⦠| 2022-05-04T09:15:25.157000Z |
| var-202105-1643 | Founded in 1987, Huawei is the world's leading provider of ICT (information and communica⦠| 2022-05-04T09:15:25.168000Z |
| var-202105-1622 | TL-WR1043ND is an 11n wireless router designed for small and medium enterprises, SOHO and⦠| 2022-05-04T09:15:25.179000Z |
| var-202105-1601 | Founded in 1987, Huawei is the world's leading provider of ICT (information and communica⦠| 2022-05-04T09:15:25.191000Z |
| var-202105-1580 | S9306 is a routing switch, POE switch. Huawei S9306 has a weak password vulnerability⦠| 2022-05-04T09:15:25.202000Z |
| var-202105-1559 | Tianxin Instrument Group Co., Ltd. is a professional service provider of domestic flow me⦠| 2022-05-04T09:15:25.216000Z |