Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0643 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The IMAP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0644 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NNTP news service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0645 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The IRC service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0646 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The LDAP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0647 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The bootparam (bootparamd) service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-05-08T09:00:00.000Z |
| CVE-1999-0648 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X25 service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0649 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FSP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2005-11-02T10:00:00.000Z |
| CVE-1999-0650 |
N/A
|
The netstat service is running, which provides se… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.577Z |
| CVE-1999-0651 |
N/A
|
The rsh/rlogin service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.528Z |
| CVE-1999-0652 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A database service is running, e.g. a SQL server, Oracle, or mySQL. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2005-11-02T10:00:00.000Z |
| CVE-1999-0653 |
N/A
|
A component service related to NIS+ is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.499Z |
| CVE-1999-0654 |
N/A
|
The OS/2 or POSIX subsystem in NT is enabled. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.952Z |
| CVE-1999-0655 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. Notes: the former description is: "A service may include useful information in its banner or help function (such as the name and version), making it useful for information gathering activities. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2001-12-09T10:00:00.000Z |
| CVE-1999-0656 |
N/A
|
The ugidd RPC interface, by design, allows remote… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.159Z |
| CVE-1999-0657 |
N/A
|
WinGate is being used. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:36.982Z |
| CVE-1999-0658 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "DCOM is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0659 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A Windows NT Primary Domain Controller (PDC) or Backup Domain Controller (BDC) is present. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0660 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. It might be more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A hacker utility, back door, or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0661 |
N/A
|
A system is running a version of software that wa… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.297Z |
| CVE-1999-0662 |
N/A
|
A system-critical program or library does not hav… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.804Z |
| CVE-1999-0663 |
N/A
|
A system-critical program, library, or file has a… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.505Z |
| CVE-1999-0664 |
N/A
|
An application-critical Windows NT registry key h… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.583Z |
| CVE-1999-0665 |
N/A
|
An application-critical Windows NT registry key h… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.576Z |
| CVE-1999-0667 |
N/A
|
The ARP protocol allows any host to spoof ARP rep… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.039Z |
| CVE-1999-0669 |
N/A
|
The Eyedog ActiveX control is marked as "safe for… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.535Z |
| CVE-1999-0670 |
N/A
|
Buffer overflow in the Eyedog ActiveX control all… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.621Z |
| CVE-1999-0673 |
N/A
|
Buffer overflow in ALMail32 POP3 client via From:… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.651Z |
| CVE-1999-0677 |
N/A
|
The WebRamp web administration utility has a defa… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.038Z |
| CVE-1999-0684 |
N/A
|
Denial of service in Sendmail 8.8.6 in HPUX. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.040Z |
| CVE-1999-0698 |
N/A
|
Denial of service in IP protocol logger (ippl) on… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:48:37.337Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0580 |
N/A
|
The HKEY_LOCAL_MACHINE key in a Windows NT system… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.690Z |
| CVE-1999-0581 |
N/A
|
The HKEY_CLASSES_ROOT key in a Windows NT system … |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.670Z |
| CVE-1999-0583 |
N/A
|
There is a one-way or two-way trust relationship … |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.688Z |
| CVE-1999-0584 |
N/A
|
A Windows NT file system is not NTFS. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.647Z |
| CVE-1999-0586 |
N/A
|
A network service is running on a nonstandard port. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.665Z |
| CVE-1999-0587 |
N/A
|
A WWW server is not running in a restricted file … |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.687Z |
| CVE-1999-0588 |
N/A
|
A filter in a router or firewall allows unusual f… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.716Z |
| CVE-1999-0589 |
N/A
|
A system-critical Windows NT registry key has ina… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.688Z |
| CVE-1999-0591 |
N/A
|
An event log in Windows NT has inappropriate acce… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.649Z |
| CVE-1999-0592 |
N/A
|
The Logon box of a Windows NT system displays the… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.675Z |
| CVE-1999-0593 |
N/A
|
The default setting for the Winlogon key entry Sh… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.690Z |
| CVE-1999-0594 |
N/A
|
A Windows NT system does not restrict access to r… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.685Z |
| CVE-1999-0596 |
N/A
|
A Windows NT log file has an inappropriate maximu… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.679Z |
| CVE-1999-0597 |
N/A
|
A Windows NT account policy does not forcibly dis… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.686Z |
| CVE-1999-0598 |
N/A
|
A network intrusion detection system (IDS) does n… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.644Z |
| CVE-1999-0599 |
N/A
|
A network intrusion detection system (IDS) does n… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.665Z |
| CVE-1999-0600 |
N/A
|
A network intrusion detection system (IDS) does n… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.710Z |
| CVE-1999-0601 |
N/A
|
A network intrusion detection system (IDS) does n… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.687Z |
| CVE-1999-0602 |
N/A
|
A network intrusion detection system (IDS) does n… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.654Z |
| CVE-1999-0603 |
N/A
|
In Windows NT, an inappropriate user is a member … |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.692Z |
| CVE-1999-0611 |
N/A
|
A system-critical Windows NT registry key has an … |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.691Z |
| CVE-1999-0613 |
N/A
|
The rpc.sprayd service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.783Z |
| CVE-1999-0614 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FTP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0615 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SNMP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2002-05-09T09:00:00.000Z |
| CVE-1999-0616 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The TFTP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0617 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SMTP service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0618 |
N/A
|
The rexec service is running. |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:41:45.715Z |
| CVE-1999-0619 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The Telnet service is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0620 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NIS is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2003-03-21T10:00:00.000Z |
| CVE-1999-0621 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NETBIOS is running. | N/A | N/A | 2000-02-04T05:00:00.000Z | 2002-02-02T10:00:00.000Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-qcj7-g2j5-g7r3 |
7.5 (3.1)
|
In Bouncy Castle JCE Provider ECDSA does not fully validate ASN.1 encoding of signature on verification | 2018-10-17T16:24:12Z | 2025-09-02T20:27:34Z |
| ghsa-rrvx-pwf8-p59p |
7.5 (3.1)
|
In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with … | 2018-10-17T16:24:22Z | 2025-09-12T19:14:22Z |
| ghsa-fjqm-246c-mwqg |
3.7 (3.1)
|
In Bouncy Castle JCE Provider the other party DH public key is not fully validated | 2018-10-17T16:27:28Z | 2025-09-12T19:16:49Z |
| ghsa-w285-wf9q-5w69 |
7.4 (3.1)
|
In Bouncy Castle JCE Provider the ECIES implementation allowed the use of ECB mode | 2018-10-17T16:27:38Z | 2025-09-12T19:17:28Z |
| ghsa-4mv7-cq75-3qjm |
|
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcp… | 2018-10-17T16:27:50Z | 2025-09-12T19:30:13Z |
| ghsa-pjfr-qf3p-3q25 |
8.1 (3.1)
|
When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file t… | 2018-10-17T16:30:31Z | 2025-10-22T17:31:15Z |
| ghsa-5q99-f34m-67gc |
4.3 (3.1)
|
Apache Tomcat Open Redirect vulnerability | 2018-10-17T16:31:02Z | 2024-02-22T22:43:50Z |
| ghsa-6rxj-58jh-436r |
5.9 (3.1)
|
Apache Tomcat unauthorized access vulnerability | 2018-10-17T16:31:17Z | 2024-02-23T17:46:56Z |
| ghsa-jx6h-3fjx-cgv5 |
6.5 (3.1)
|
Apache Tomcat information exposure vulnerability | 2018-10-17T16:31:48Z | 2024-02-23T17:54:01Z |
| ghsa-m59c-jpc8-m2x4 |
7.5 (3.1)
|
In Apache Tomcat there is an improper handing of overflow in the UTF-8 decoder | 2018-10-17T16:32:18Z | 2024-02-23T17:57:09Z |
| ghsa-r4x2-3cq5-hqvp |
9.8 (3.1)
|
The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'suppor… | 2018-10-17T16:32:32Z | 2024-02-23T18:01:23Z |
| ghsa-46j3-r4pj-4835 |
7.5 (3.1)
|
The host name verification missing in Apache Tomcat | 2018-10-17T16:32:43Z | 2024-10-21T19:06:46Z |
| ghsa-6v52-mj5r-7j2m |
5.9 (3.1)
|
Apache Tomcat Race Condition vulnerability | 2018-10-17T16:33:02Z | 2024-02-22T21:06:50Z |
| ghsa-j84c-j8qm-g47r |
9.8 (3.1)
|
The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that la… | 2018-10-17T17:21:11Z | 2022-04-27T13:41:39Z |
| ghsa-4rjf-mxfm-98h5 |
7.2 (3.1)
|
SQL injection vulnerability in the policy admin tool in Apache Ranger | 2018-10-17T17:21:29Z | 2022-04-27T13:48:01Z |
| ghsa-rf7q-xqm3-6923 |
4.8 (3.1)
|
Apache Ranger allows remote authenticated administrators to inject arbitrary web script or HTML | 2018-10-17T17:21:37Z | 2022-04-27T13:48:55Z |
| ghsa-vhxc-8jjq-859j |
6.5 (3.1)
|
Moderate severity vulnerability that affects org.apache.ranger:ranger | 2018-10-17T17:21:44Z | 2021-09-20T22:05:45Z |
| ghsa-v7mf-qgxf-qmvf |
4.8 (3.1)
|
Apache Ranger admin users can store some arbitrary javascript code to be executed when normal users… | 2018-10-17T17:21:54Z | 2022-04-27T13:49:46Z |
| ghsa-xv7x-x6wr-xx7g |
5.9 (3.1)
|
Apache Ranger policy engine incorrectly matches paths in certain conditions | 2018-10-17T17:22:05Z | 2023-11-21T11:56:13Z |
| ghsa-c99h-fgqm-6679 |
8.8 (3.1)
|
UnixAuthenticationService in Apache Ranger was updated to correctly handle user input to avoid Stac… | 2018-10-17T17:22:23Z | 2022-04-27T13:52:10Z |
| ghsa-758m-6g3q-g3hh |
9.8 (3.1)
|
Policy resource matcher in Apache Ranger before 0.7.1 ignores characters after '' wildcard character | 2018-10-17T17:22:38Z | 2022-04-27T13:54:27Z |
| ghsa-ffjh-fjgg-mfpq |
5.9 (3.1)
|
Moderate severity vulnerability that affects org.apache.ranger:ranger | 2018-10-17T17:22:49Z | 2021-09-10T18:07:43Z |
| ghsa-4fq3-mr56-cg6r |
9.8 (3.1)
|
Spring Data Commons remote code injection vulnerability | 2018-10-17T17:23:24Z | 2024-03-20T14:20:41Z |
| ghsa-m929-7fr6-cvjg |
7.5 (3.1)
|
Spring Data Commons, used in combination with XMLBeam, contains a property binder vulnerability cau… | 2018-10-17T17:23:36Z | 2022-04-27T13:58:00Z |
| ghsa-5q8m-mqmx-pxp9 |
7.5 (3.1)
|
Spring Data Commons contain a property path parser vulnerability caused by unlimited resource allocation | 2018-10-17T17:23:44Z | 2024-03-04T20:01:15Z |
| ghsa-h5f5-rj4r-42f6 |
9.8 (3.1)
|
Incorrect access control in Neo4j Enterprise Database Server via LDAP authentication | 2018-10-17T17:31:26Z | 2022-04-27T14:23:03Z |
| ghsa-4c32-xmgj-2g98 |
7.8 (3.1)
|
High severity vulnerability that affects org.apache.pdfbox:pdfbox | 2018-10-17T18:22:15Z | 2021-09-01T14:11:59Z |
| ghsa-gx96-vgf7-hwfg |
5.5 (3.1)
|
In Apache PDFBox a carefully crafted PDF file can trigger an extremely long running computation | 2018-10-17T18:22:29Z | 2022-04-27T14:23:39Z |
| ghsa-6fvx-r7hx-3vh6 |
9.8 (3.1)
|
JavaMelody has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java. | 2018-10-17T18:28:00Z | 2022-04-27T14:25:05Z |
| ghsa-x825-rjww-2245 |
8.8 (3.1)
|
Apache Storm it is possible for the owner of a topology to trick the supervisor to launch a worker … | 2018-10-17T18:30:01Z | 2022-04-27T14:25:41Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2019-229 |
|
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Goo… | tensorflow-gpu | 2019-04-24T17:29:00Z | 2021-12-09T06:35:11.612649Z |
| pysec-2019-232 |
|
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow bef… | tensorflow-gpu | 2019-04-24T17:29:00Z | 2021-12-09T06:35:11.800944Z |
| pysec-2019-235 |
|
NULL pointer dereference in Google TensorFlow before 1.12.2 could cause a denial of servi… | tensorflow-gpu | 2019-04-24T17:29:00Z | 2021-12-09T06:35:11.945126Z |
| pysec-2019-205 |
|
Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The t… | tensorflow | 2019-04-24T21:29:00Z | 2021-08-27T03:22:22.242054Z |
| pysec-2019-223 |
|
Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The t… | tensorflow-cpu | 2019-04-24T21:29:00Z | 2021-08-27T03:22:22.242054Z |
| pysec-2019-230 |
|
Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The t… | tensorflow-gpu | 2019-04-24T21:29:00Z | 2021-12-09T06:35:11.711453Z |
| pysec-2019-185 |
|
An issue was discovered in Matrix Sydent before 1.0.3 and Synapse before 0.99.3.1. Random… | matrix-synapse | 2019-05-09T18:29:00Z | 2021-08-27T03:22:06.320363Z |
| pysec-2019-242 |
5.5 (3.1)
|
Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) i… | capstone | 2019-05-15T14:29:00Z | 2025-01-28T17:34:08.578134Z |
| pysec-2019-6 |
|
Buildbot before 1.8.2 and 2.x before 2.3.1 accepts a user-submitted authorization token f… | buildbot | 2019-05-23T15:30:00Z | 2019-06-07T18:29:00Z |
| pysec-2019-256 |
7.5 (3.1)
|
In libwebp 0.5.1, there is a double free bug in libwebpmux. | webp | 2019-05-23T18:29:00Z | 2024-11-21T14:23:03.194401Z |
| pysec-2019-79 |
|
An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2… | django | 2019-06-03T17:29:00Z | 2019-06-12T17:29:00Z |
| pysec-2019-194 |
|
An access-control flaw was found in the Octavia service when the cloud platform was deplo… | octavia | 2019-06-03T19:29:00Z | 2021-08-27T03:22:09.805726Z |
| pysec-2019-109 |
|
** DISPUTED ** A deserialization vulnerability exists in the way parso through 0.4.0 hand… | parso | 2019-06-06T19:29:00Z | 2019-07-05T11:15:00Z |
| pysec-2019-199 |
|
A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a C… | pyxdg | 2019-06-06T19:29:00Z | 2021-08-27T03:22:18.878765Z |
| pysec-2019-162 |
|
aubio v0.4.0 to v0.4.8 has a Buffer Overflow in new_aubio_tempo. | aubio | 2019-06-07T17:29:00Z | 2021-08-25T04:29:55.885441Z |
| pysec-2019-163 |
|
aubio v0.4.0 to v0.4.8 has a NULL pointer dereference in new_aubio_filterbank via invalid… | aubio | 2019-06-07T17:29:00Z | 2021-08-25T04:29:55.933107Z |
| pysec-2019-164 |
|
aubio v0.4.0 to v0.4.8 has a new_aubio_onset NULL pointer dereference. | aubio | 2019-06-07T17:29:00Z | 2021-08-25T04:29:55.989477Z |
| pysec-2019-128 |
|
In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, … | twisted | 2019-06-10T12:29:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-129 |
|
In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verif… | twisted | 2019-06-16T12:29:00Z | 2019-08-14T03:15:00Z |
| pysec-2019-103 |
|
KeyIdentity LinOTP before 2.10.5.3 has Incorrect Access Control (issue 1 of 2). | linotp | 2019-06-27T14:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-10 |
|
An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before … | django | 2019-07-01T14:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-20 |
|
verification.py in django-rest-registration (aka Django REST Registration library) before… | django-rest-registration | 2019-07-02T22:15:00Z | 2019-07-12T13:52:00Z |
| pysec-2019-218 |
|
libnmap < v0.6.3 is affected by: XML Injection. The impact is: Denial of service (DoS) by… | python-libnmap | 2019-07-15T03:15:00Z | 2021-11-16T03:58:45.118185Z |
| pysec-2019-170 |
|
An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket… | python-engineio | 2019-07-16T00:15:00Z | 2021-08-25T04:30:27.861588Z |
| pysec-2019-179 |
|
The Pallets Project Flask before 1.0 is affected by: unexpected memory usage. The impact … | flask | 2019-07-17T14:15:00Z | 2021-08-27T03:22:03.986184Z |
| pysec-2019-119 |
|
SaltStack Salt 2018.3, 2019.2 is affected by: SQL Injection. The impact is: An attacker c… | salt | 2019-07-18T17:15:00Z | 2019-08-13T18:15:00Z |
| pysec-2019-184 |
|
Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML Ex… | ladon | 2019-07-18T17:15:00Z | 2021-08-27T03:22:05.932908Z |
| pysec-2019-120 |
|
scapy 2.4.0 is affected by: Denial of Service. The impact is: infinite loop, resource con… | scapy | 2019-07-19T16:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-244 |
7.8 (3.1)
|
Exiv2 0.27.99.0 has a heap-based buffer over-read in Exiv2::RafImage::readMetadata() in r… | exiv2 | 2019-07-28T19:15:00Z | 2024-11-21T14:22:49.479201Z |
| pysec-2019-245 |
6.5 (3.1)
|
Exiv2::PngImage::readMetadata() in pngimage.cpp in Exiv2 0.27.99.0 allows attackers to ca… | exiv2 | 2019-07-28T19:15:00Z | 2024-11-21T14:22:49.538663Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-724 | Malicious code in @westerndigital/fetlife-assets (npm) | 2022-06-20T18:20:39Z | 2022-06-20T18:20:39Z |
| mal-2022-738 | Malicious code in @xfinity/fetlife-assets (npm) | 2022-06-20T18:20:39Z | 2022-06-20T18:20:39Z |
| mal-2022-790 | Malicious code in @youporn/fetlife-assets (npm) | 2022-06-20T18:20:39Z | 2022-06-20T18:20:40Z |
| mal-2022-795 | Malicious code in @zivver/fetlife-assets (npm) | 2022-06-20T18:20:39Z | 2022-06-20T18:20:40Z |
| mal-2022-1832 | Malicious code in cart-bucketing (npm) | 2022-06-20T18:20:40Z | 2022-06-20T18:20:40Z |
| mal-2022-2282 | Malicious code in custom-event-names (npm) | 2022-06-20T18:20:40Z | 2022-06-20T18:20:40Z |
| mal-2022-2297 | Malicious code in cxd-npm-releases (npm) | 2022-06-20T18:20:40Z | 2022-06-20T18:20:41Z |
| mal-2022-2447 | Malicious code in design-system-base (npm) | 2022-06-20T18:20:40Z | 2022-06-20T18:20:41Z |
| mal-2022-2636 | Malicious code in dynamic-load-sticky-polyfill (npm) | 2022-06-20T18:20:41Z | 2022-06-20T18:20:41Z |
| mal-2022-2852 | Malicious code in espn-critical (npm) | 2022-06-20T18:20:41Z | 2022-06-20T18:20:41Z |
| mal-2022-2853 | Malicious code in espn-lazysizes (npm) | 2022-06-20T18:20:41Z | 2022-06-20T18:20:42Z |
| mal-2022-2940 | Malicious code in external-js-css (npm) | 2022-06-20T18:20:41Z | 2022-06-20T18:20:42Z |
| mal-2022-3017 | Malicious code in fetlife-assets (npm) | 2022-06-20T18:20:42Z | 2022-06-20T18:20:42Z |
| mal-2022-3446 | Malicious code in grand-whitelisted-hashes (npm) | 2022-06-20T18:20:42Z | 2022-06-20T18:20:42Z |
| mal-2022-3748 | Malicious code in ibm-plex (npm) | 2022-06-20T18:20:42Z | 2022-06-20T18:20:43Z |
| mal-2022-5246 | Malicious code in paypal-ui (npm) | 2022-06-20T18:20:42Z | 2022-06-20T18:20:43Z |
| mal-2022-5247 | Malicious code in paypalcorp (npm) | 2022-06-20T18:20:43Z | 2022-06-20T18:20:43Z |
| mal-2022-5580 | Malicious code in rancher-website-theme (npm) | 2022-06-20T18:20:43Z | 2022-06-20T18:20:43Z |
| mal-2022-5932 | Malicious code in sap-theming (npm) | 2022-06-20T18:20:43Z | 2022-06-20T18:20:44Z |
| mal-2022-5960 | Malicious code in sch-frontend-integration (npm) | 2022-06-20T18:20:43Z | 2022-06-20T18:20:44Z |
| mal-2022-5968 | Malicious code in scox-npm-group (npm) | 2022-06-20T18:20:44Z | 2022-06-20T18:20:44Z |
| mal-2022-6241 | Malicious code in sportsbook-components (npm) | 2022-06-20T18:20:44Z | 2022-06-20T18:20:44Z |
| mal-2022-6242 | Malicious code in sportsbook-frontend (npm) | 2022-06-20T18:20:44Z | 2022-06-20T18:20:45Z |
| mal-2022-6688 | Malicious code in twenty-eightteen (npm) | 2022-06-20T18:20:44Z | 2022-06-20T18:20:45Z |
| mal-2022-432 | Malicious code in @medv/codejar (npm) | 2022-06-20T18:20:45Z | 2022-06-20T18:20:46Z |
| mal-2022-6880 | Malicious code in ux-tread-crc-code (npm) | 2022-06-20T18:20:45Z | 2022-06-20T18:20:45Z |
| mal-2022-6881 | Malicious code in ux-tread-dotcom-utils (npm) | 2022-06-20T18:20:45Z | 2022-06-20T18:20:45Z |
| mal-2022-7012 | Malicious code in vxpattern-lib-paypal (npm) | 2022-06-20T18:20:45Z | 2022-06-20T18:20:45Z |
| mal-2022-1170 | Malicious code in audit-logging (npm) | 2022-06-20T18:20:46Z | 2022-06-20T18:20:46Z |
| mal-2022-2279 | Malicious code in custdev-sapui5 (npm) | 2022-06-20T18:20:46Z | 2022-06-20T18:20:46Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-1092 | QEMU: Schwachstelle ermöglicht Denial of Service | 2020-08-09T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2024-3319 | Apache HTTP Server: Mehrere Schwachstellen | 2020-08-09T22:00:00.000+00:00 | 2024-10-31T23:00:00.000+00:00 |
| wid-sec-w-2026-1068 | Adobe Acrobat und Acrobat Reader: Mehrere Schwachstellen | 2020-08-11T22:00:00.000+00:00 | 2026-04-13T22:00:00.000+00:00 |
| wid-sec-w-2023-1918 | Wireshark: Schwachstelle ermöglicht Denial of Service | 2020-08-12T22:00:00.000+00:00 | 2023-07-30T22:00:00.000+00:00 |
| wid-sec-w-2023-2405 | Ghostscript: Mehrere Schwachstellen | 2020-08-12T22:00:00.000+00:00 | 2023-11-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0235 | Dovecot: Mehrere Schwachstellen ermöglichen Denial of Service | 2020-08-12T22:00:00.000+00:00 | 2025-02-02T23:00:00.000+00:00 |
| wid-sec-w-2026-0617 | QT: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2020-08-12T22:00:00.000+00:00 | 2026-03-05T23:00:00.000+00:00 |
| wid-sec-w-2023-2045 | Net-SNMP: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2020-08-16T22:00:00.000+00:00 | 2025-07-31T22:00:00.000+00:00 |
| wid-sec-w-2022-1912 | Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen | 2020-08-17T22:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2023-1635 | libcurl: Schwachstelle ermöglicht Offenlegung von Informationen | 2020-08-18T22:00:00.000+00:00 | 2023-07-04T22:00:00.000+00:00 |
| wid-sec-w-2023-2470 | Squid: Mehrere Schwachstellen | 2020-08-23T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2024-1973 | QEMU, Xen und Citrix Hypervisor: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2020-08-24T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2022-1722 | QEMU und libvirt: Mehrere Schwachstellen | 2020-08-31T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2023-2469 | Ansible: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-09-01T22:00:00.000+00:00 | 2024-05-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1087 | GitLab: Mehrere Schwachstellen | 2020-09-02T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2023-1153 | libxml2: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2020-09-03T22:00:00.000+00:00 | 2024-07-31T22:00:00.000+00:00 |
| wid-sec-w-2022-1723 | TLS: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2020-09-09T22:00:00.000+00:00 | 2025-10-20T22:00:00.000+00:00 |
| wid-sec-w-2023-0342 | Red Hat OpenStack: Schwachstelle ermöglicht Offenlegung von Informationen | 2020-09-09T22:00:00.000+00:00 | 2023-02-12T23:00:00.000+00:00 |
| wid-sec-w-2023-1092 | Ruby on Rails: Schwachstelle ermöglicht Cross-Site Scripting | 2020-09-09T22:00:00.000+00:00 | 2023-04-27T22:00:00.000+00:00 |
| wid-sec-w-2023-2970 | Apache ActiveMQ: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-09-09T22:00:00.000+00:00 | 2024-07-23T22:00:00.000+00:00 |
| wid-sec-w-2024-3162 | OpenLDAP: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-09-09T22:00:00.000+00:00 | 2024-10-14T22:00:00.000+00:00 |
| wid-sec-w-2023-2468 | Ansible: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2020-09-13T22:00:00.000+00:00 | 2025-11-23T23:00:00.000+00:00 |
| wid-sec-w-2023-1579 | Trustwave ModSecurity: Schwachstelle ermöglicht Denial of Service | 2020-09-14T22:00:00.000+00:00 | 2023-06-27T22:00:00.000+00:00 |
| wid-sec-w-2022-1615 | Linux Kernel: Mehrere Schwachstellen | 2020-09-15T22:00:00.000+00:00 | 2023-06-22T22:00:00.000+00:00 |
| wid-sec-w-2023-0486 | Node.js: Mehrere Schwachstellen | 2020-09-15T22:00:00.000+00:00 | 2023-02-27T23:00:00.000+00:00 |
| wid-sec-w-2022-1269 | QEMU: Mehrere Schwachstellen ermöglichen Denial of Service | 2020-09-16T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0058 | PowerDNS: Mehrere Schwachstellen | 2020-09-22T22:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2023-1917 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2020-09-23T22:00:00.000+00:00 | 2023-07-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0492 | Python: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-09-27T22:00:00.000+00:00 | 2024-07-11T22:00:00.000+00:00 |
| wid-sec-w-2023-1109 | Ruby: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-09-28T22:00:00.000+00:00 | 2024-01-23T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-17-341-02 | Rockwell Automation FactoryTalk Alarms and Events | 2017-12-07T00:00:00.000000Z | 2017-12-07T00:00:00.000000Z |
| icsa-17-341-03 | PHOENIX CONTACT FL COMSERVER, FL COM SERVER, and PSI-MODEM/ETH | 2017-12-07T00:00:00.000000Z | 2017-12-07T00:00:00.000000Z |
| icsa-17-353-01 | ABB Ellipse | 2017-12-19T00:00:00.000000Z | 2017-12-19T00:00:00.000000Z |
| icsa-17-353-02 | PEPPERL+FUCHS/ecom instruments WLAN Capable Devices using the WPA2 Protocol | 2017-12-19T00:00:00.000000Z | 2017-12-19T00:00:00.000000Z |
| icsa-17-353-03 | Ecava IntegraXor | 2017-12-19T00:00:00.000000Z | 2017-12-19T00:00:00.000000Z |
| icsa-17-353-04 | Siemens LOGO! Soft Comfort | 2017-12-19T00:00:00.000000Z | 2017-12-19T00:00:00.000000Z |
| icsa-17-353-05 | WECON Technology Co., Ltd. LeviStudio HMI Editor | 2017-12-19T00:00:00.000000Z | 2017-12-19T00:00:00.000000Z |
| icsa-17-355-01 | ICSA-17-355-01_Moxa NPort W2150A and W2250A | 2017-12-21T00:00:00.000000Z | 2017-12-21T00:00:00.000000Z |
| icsa-17-355-02 | Schneider Electric Pelco VideoXpert Enterprise | 2017-12-21T00:00:00.000000Z | 2017-12-21T00:00:00.000000Z |
| icsa-18-004-01 | Delta Electronics Delta Industrial Automation Screen Editor | 2018-01-04T00:00:00.000000Z | 2018-01-04T00:00:00.000000Z |
| icsa-18-004-02a | Advantech WebAccess (Update A) | 2018-01-04T00:00:00.000000Z | 2018-01-11T00:00:00.000000Z |
| icsa-18-009-01 | Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers | 2018-01-09T00:00:00.000000Z | 2018-01-09T00:00:00.000000Z |
| icsa-18-011-01 | WECON Technology Co., Ltd. LeviStudio HMI Editor | 2018-01-11T00:00:00.000000Z | 2018-01-11T00:00:00.000000Z |
| icsa-18-011-02 | Moxa MXview | 2018-01-11T00:00:00.000000Z | 2018-01-11T00:00:00.000000Z |
| icsa-18-011-03 | PHOENIX CONTACT FL SWITCH | 2018-01-11T00:00:00.000000Z | 2018-01-11T00:00:00.000000Z |
| icsa-18-018-01a | ICSA-18-018-01A Siemens SIMATIC WinCC Add-On (Update A) | 2018-01-18T00:00:00.000000Z | 2018-02-22T00:00:00.000000Z |
| icsa-18-023-02 | ICSA-18-023-02 Siemens Industrial Products (Update A) | 2018-01-18T00:00:00.000000Z | 2019-02-12T00:00:00.000000Z |
| icsa-18-023-01 | Advantech WebAccess/SCADA | 2018-01-23T00:00:00.000000Z | 2018-01-23T00:00:00.000000Z |
| icsa-18-025-02b | Siemens Desigo PXC (Update C) | 2018-01-24T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-18-025-01 | Nari PCS-9611 (Update A) | 2018-01-25T00:00:00.000000Z | 2018-05-03T00:00:00.000000Z |
| icsma-18-025-01 | Philips IntelliSpace Cardiovascular System Vulnerability | 2018-01-25T00:00:00.000000Z | 2018-01-25T00:00:00.000000Z |
| icsa-18-030-01 | PHOENIX CONTACT mGuard | 2018-01-30T00:00:00.000000Z | 2018-01-30T00:00:00.000000Z |
| icsa-18-030-02 | Siemens TeleControl Server Basic | 2018-01-30T00:00:00.000000Z | 2018-01-30T00:00:00.000000Z |
| icsa-18-032-01 | Fuji Electric V-Server VPR | 2018-02-01T00:00:00.000000Z | 2018-02-01T00:00:00.000000Z |
| icsa-18-032-02 | 3S-Smart Software Solutions GmbH CODESYS Web Server | 2018-02-01T00:00:00.000000Z | 2018-02-01T00:00:00.000000Z |
| icsa-18-032-03 | Gemalto Sentinel License Manager | 2018-02-01T00:00:00.000000Z | 2018-02-01T00:00:00.000000Z |
| icsma-18-037-01 | Vyaire Medical CareFusion Upgrade Utility Vulnerability | 2018-02-06T00:00:00.000000Z | 2018-02-06T00:00:00.000000Z |
| icsma-18-037-02 | GE Medical Devices Vulnerability | 2018-02-06T00:00:00.000000Z | 2018-03-13T00:00:00.000000Z |
| icsa-18-044-01 | WAGO PFC200 Series | 2018-02-13T00:00:00.000000Z | 2018-02-13T00:00:00.000000Z |
| icsa-18-044-02 | Schneider Electric IGSS SCADA Software | 2018-02-13T00:00:00.000000Z | 2018-02-13T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20190619-rvrouters-dos | Cisco RV110W, RV130W, and RV215W Routers Management Interface Denial of Service Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-sdwan-cmdinj | Cisco SD-WAN Solution Command Injection Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-sdwan-privesca | Cisco SD-WAN Solution Privilege Escalation Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-sdwan-privilescal | Cisco SD-WAN Solution Privilege Escalation Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-staros-asr-dos | Cisco StarOS Denial of Service Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-tele-shell-inj | Cisco TelePresence Endpoint Command Shell Injection Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-25T13:24:12+00:00 |
| cisco-sa-20190619-waas-authbypass | Cisco Wide Area Application Services Software HTTPS Proxy Authentication Bypass Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190626-dcnm-bypass | Cisco Data Center Network Manager Authentication Bypass Vulnerability | 2019-06-26T16:00:00+00:00 | 2019-09-19T16:08:37+00:00 |
| cisco-sa-20190626-dcnm-codex | Cisco Data Center Network Manager Arbitrary File Upload and Remote Code Execution Vulnerability | 2019-06-26T16:00:00+00:00 | 2019-09-19T16:08:38+00:00 |
| cisco-sa-20190626-dcnm-file-dwnld | Cisco Data Center Network Manager Arbitrary File Download Vulnerability | 2019-06-26T16:00:00+00:00 | 2019-09-19T16:08:38+00:00 |
| cisco-sa-20190626-dcnm-infodiscl | Cisco Data Center Network Manager Information Disclosure Vulnerability | 2019-06-26T16:00:00+00:00 | 2019-09-19T16:08:39+00:00 |
| cisco-sa-20190703-amp-commandinj | Cisco Advanced Malware Protection for Endpoints Windows Command Injection Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-asyncos-wsa | Cisco Web Security Appliance Web Proxy Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-ccapic-restapi | Cisco Application Policy Infrastructure Controller REST API Privilege Escalation Vulnerability | 2019-07-03T16:00:00+00:00 | 2020-01-16T15:25:04+00:00 |
| cisco-sa-20190703-cucdm-rsh | Cisco Unified Communications Domain Manager Restricted Shell Escape Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-cucm-dos | Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-08T22:30:23+00:00 |
| cisco-sa-20190703-esa-bypass | Cisco Email Security Appliance Content Filter Bypass Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-esa-filterpass | Cisco Email Security Appliance Content Filter Bypass Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-fmc-xss | Cisco Firepower Management Center RSS Cross-Site Scripting Vulnerabilities | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-iosxr-bgp-dos | Cisco IOS XR Software Border Gateway Protocol Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2020-01-22T16:01:55+00:00 |
| cisco-sa-20190703-ip-phone-sip-dos | Cisco IP Phone 7800 and 8800 Series Session Initiation Protocol Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-08T16:16:46+00:00 |
| cisco-sa-20190703-jabber-dll | Cisco Jabber for Windows DLL Preloading Vulnerability | 2019-07-03T16:00:00+00:00 | 2021-04-01T22:11:38+00:00 |
| cisco-sa-20190703-n9kaci-bypass | Cisco Nexus 9000 Series Fabric Switches ACI Mode Fabric Infrastructure VLAN Unauthorized Access Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-nfvis-commandinj | Cisco Enterprise NFV Infrastructure Software Command Injection Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-nfvis-file-readwrite | Cisco Enterprise NFV Infrastructure Software Arbitrary File Read and Write Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-sbss-dos | Cisco Small Business Series Switches HTTP Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-sbss-memcorrupt | Cisco Small Business Series Switches Memory Corruption Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-wsa-dos | Cisco Web Security Appliance HTTPS Certificate Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190710-asa-ftd-dos | Cisco ASA and FTD Software Cryptographic TLS and SSL Driver Denial of Service Vulnerability | 2019-07-10T16:00:00+00:00 | 2019-07-11T21:11:00+00:00 |
| cisco-sa-20190717-aironet-dos | Cisco IOS Access Points Software 802.11r Fast Transition Denial of Service Vulnerability | 2019-07-17T16:00:00+00:00 | 2019-07-17T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2020-14837 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14838 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14839 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14844 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14845 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14846 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14848 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14852 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Charsets). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14860 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14861 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14866 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14867 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 5.6.49 and prior 5.7.31 and prior and 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14868 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14869 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14870 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14873 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14878 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 8.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14888 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14891 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14893 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-15250 | Information disclosure in JUnit4 | 2020-10-02T00:00:00.000Z | 2025-02-20T00:00:00.000Z |
| msrc_cve-2020-15254 | Undefined Behavior in bounded Crossbeam channel | 2020-10-02T00:00:00.000Z | 2026-02-18T14:41:24.000Z |
| msrc_cve-2020-24352 | An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati_2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could use this flaw to crash the QEMU process on the host resulting in a denial of service. | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-25613 | An issue was discovered in Ruby through 2.5.8 2.6.x through 2.6.6 and 2.7.x through 2.7.1. WEBrick a simple HTTP server bundled with Ruby had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check) which may lead to an HTTP Request Smuggling attack. | 2020-10-02T00:00:00.000Z | 2020-10-21T00:00:00.000Z |
| msrc_cve-2020-25637 | A double free memory issue was found to occur in the libvirt API in versions before 6.8.0 responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon resulting in a denial of service or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2020-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-25641 | A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device resulting in a denial of service. The highest threat from this vulnerability is to system availability. | 2020-10-02T00:00:00.000Z | 2020-10-09T00:00:00.000Z |
| msrc_cve-2020-25643 | A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2020-10-02T00:00:00.000Z | 2020-10-17T00:00:00.000Z |
| msrc_cve-2020-25645 | A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality. | 2020-10-02T00:00:00.000Z | 2020-10-17T00:00:00.000Z |
| msrc_cve-2020-25742 | pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer. | 2020-10-02T00:00:00.000Z | 2020-10-08T00:00:00.000Z |
| msrc_cve-2020-25743 | hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call. | 2020-10-02T00:00:00.000Z | 2020-10-08T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2026-0062 | Kwetsbaarheden verholpen in GitLab CE/EE | 2026-02-11T11:45:05.986313Z | 2026-02-11T11:45:05.986313Z |
| ncsc-2026-0063 | Kwetsbaarheden verholpen in Apple macOS | 2026-02-13T13:24:06.433550Z | 2026-02-13T13:24:06.433550Z |
| ncsc-2026-0064 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2026-02-13T13:35:03.870920Z | 2026-02-13T13:35:03.870920Z |
| ncsc-2026-0065 | Kwetsbaarheid verholpen in Dell RecoverPoint for Virtual Machines | 2026-02-18T13:18:23.815384Z | 2026-02-18T13:18:23.815384Z |
| ncsc-2026-0066 | Kwetsbaarheid verholpen in Google Chrome | 2026-02-19T08:29:30.712590Z | 2026-02-19T08:29:30.712590Z |
| ncsc-2026-0067 | Kwetsbaarheden verholpen in GitHub Enterprise Server | 2026-02-20T10:13:39.540778Z | 2026-02-20T10:13:39.540778Z |
| ncsc-2026-0068 | Kwetsbaarheden verholpen in Splunk Enterprise en Splunk Cloud Platform | 2026-02-23T14:27:28.865278Z | 2026-02-23T14:27:28.865278Z |
| ncsc-2026-0069 | Kwetsbaarheden verholpen in SolarWinds Serv-U | 2026-02-25T10:39:38.154815Z | 2026-02-25T10:39:38.154815Z |
| ncsc-2026-0070 | Kwetsbaarheden verholpen in VMware Aria Operations | 2026-02-25T11:24:46.807867Z | 2026-03-04T08:54:08.940512Z |
| ncsc-2026-0071 | Kwetsbaarheden verholpen in Cisco Catalyst SD-WAN Manager | 2026-02-25T17:11:09.013125Z | 2026-03-06T12:07:02.595940Z |
| ncsc-2026-0072 | Kwetsbaarheden verholpen in GitLab | 2026-02-27T07:15:18.318821Z | 2026-02-27T07:15:18.318821Z |
| ncsc-2026-0073 | Kwetsbaarheid verholpen in Juniper Junos OS Evolved | 2026-02-27T09:48:51.845864Z | 2026-02-27T09:48:51.845864Z |
| ncsc-2026-0074 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2026-03-03T09:07:09.279353Z | 2026-03-03T09:07:09.279353Z |
| ncsc-2026-0075 | Kwetsbaarheid verholpen in n8n Automation Platform | 2026-03-04T14:03:54.207583Z | 2026-03-04T14:03:54.207583Z |
| ncsc-2026-0076 | Kwetsbaarheden verholpen in Cisco Secure Firewall Management Center | 2026-03-04T20:49:12.211658Z | 2026-03-19T11:48:18.917205Z |
| ncsc-2026-0077 | Kwetsbaarheden verholpen in Cisco Secure Firewall systemen | 2026-03-05T09:05:21.646499Z | 2026-03-05T09:05:21.646499Z |
| ncsc-2026-0078 | Kwetsbaarheden verholpen in Kibana | 2026-03-05T09:36:49.056247Z | 2026-03-05T09:36:49.056247Z |
| ncsc-2026-0079 | Kwetsbaarheden verholpen in Siemens producten | 2026-03-10T12:39:14.474522Z | 2026-03-10T12:39:14.474522Z |
| ncsc-2026-0080 | Kwetsbaarheden verholpen in Microsoft Windows | 2026-03-10T20:07:55.976638Z | 2026-03-10T20:07:55.976638Z |
| ncsc-2026-0081 | Kwetsbaarheden verholpen in Microsoft SQL Server | 2026-03-10T20:12:56.032261Z | 2026-03-10T20:12:56.032261Z |
| ncsc-2026-0082 | Kwetsbaarheden verholpen in Microsoft Azure | 2026-03-10T20:15:41.528951Z | 2026-03-10T20:15:41.528951Z |
| ncsc-2026-0083 | Kwetsbaarheid verholpen in Microsoft Authenticator app | 2026-03-10T20:18:35.792755Z | 2026-03-10T20:18:35.792755Z |
| ncsc-2026-0084 | Kwetsbaarheden verholpen in Microsoft Office | 2026-03-10T20:20:08.157658Z | 2026-03-10T20:20:08.157658Z |
| ncsc-2026-0085 | Kwetsbaarheden verholpen in Microsoft Developer tools | 2026-03-10T20:35:10.478398Z | 2026-03-10T20:35:10.478398Z |
| ncsc-2026-0086 | Kwetsbaarheden verholpen in Fortinet FortiManager en FortiAnalyzer | 2026-03-11T09:19:38.777277Z | 2026-03-11T09:19:38.777277Z |
| ncsc-2026-0087 | Kwetsbaarheden verholpen in Adobe Commerce | 2026-03-12T06:49:56.459199Z | 2026-03-12T06:49:56.459199Z |
| ncsc-2026-0088 | Kwetsbaarheden verholpen in Adobe Illustrator | 2026-03-12T06:55:39.712240Z | 2026-03-12T06:55:39.712240Z |
| ncsc-2026-0089 | Kwetsbaarheden verholpen in Adobe Acrobat Reader | 2026-03-12T07:03:24.148324Z | 2026-03-12T07:03:24.148324Z |
| ncsc-2026-0090 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2026-03-12T07:12:51.952931Z | 2026-03-12T07:12:51.952931Z |
| ncsc-2026-0091 | Kwetsbaarheden verholpen in SAP-producten | 2026-03-12T07:24:16.575638Z | 2026-03-12T07:24:16.575638Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2019:2259-1 | Security update for python-numpy | 2019-10-06T08:20:28Z | 2019-10-06T08:20:28Z |
| opensuse-su-2019:2260-1 | Security update for MozillaFirefox | 2019-10-06T09:57:06Z | 2019-10-06T09:57:06Z |
| opensuse-su-2019:2263-1 | Security update for bind | 2019-10-06T09:57:35Z | 2019-10-06T09:57:35Z |
| opensuse-su-2019:2264-1 | Security update for nginx | 2019-10-06T09:57:45Z | 2019-10-06T09:57:45Z |
| opensuse-su-2019:2265-1 | Security update for bind | 2019-10-06T09:57:56Z | 2019-10-06T09:57:56Z |
| opensuse-su-2019:2268-1 | Security update for openssl-1_0_0 | 2019-10-06T09:58:17Z | 2019-10-06T09:58:17Z |
| opensuse-su-2019:2269-1 | Security update for openssl-1_0_0 | 2019-10-06T09:58:29Z | 2019-10-06T09:58:29Z |
| opensuse-su-2019:2271-1 | Security update for php7 | 2019-10-06T16:19:36Z | 2019-10-06T16:19:36Z |
| opensuse-su-2019:2276-1 | Security update for putty | 2019-10-07T12:22:30Z | 2019-10-07T12:22:30Z |
| opensuse-su-2019:2277-1 | Security update for putty | 2019-10-07T12:22:43Z | 2019-10-07T12:22:43Z |
| opensuse-su-2019:2278-1 | Security update for dovecot23 | 2019-10-07T14:20:52Z | 2019-10-07T14:20:52Z |
| opensuse-su-2019:2279-1 | Security update for jasper | 2019-10-07T14:20:59Z | 2019-10-07T14:20:59Z |
| opensuse-su-2019:2280-1 | Security update for libseccomp | 2019-10-07T14:21:04Z | 2019-10-07T14:21:04Z |
| opensuse-su-2019:2281-1 | Security update for dovecot23 | 2019-10-07T14:21:10Z | 2019-10-07T14:21:10Z |
| opensuse-su-2019:2282-1 | Security update for jasper | 2019-10-07T14:21:19Z | 2019-10-07T14:21:19Z |
| opensuse-su-2019:2283-1 | Security update for libseccomp | 2019-10-07T14:21:24Z | 2019-10-07T14:21:24Z |
| opensuse-su-2019:2286-1 | Security update for lxc | 2019-10-07T15:30:53Z | 2019-10-07T15:30:53Z |
| opensuse-su-2019:2288-1 | Security update for singularity | 2019-10-07T15:31:24Z | 2019-10-07T15:31:24Z |
| opensuse-su-2019:2292-1 | Security update for putty | 2019-10-07T22:22:03Z | 2019-10-07T22:22:03Z |
| opensuse-su-2019:2294-1 | Security update for rust | 2019-10-08T12:19:04Z | 2019-10-08T12:19:04Z |
| opensuse-su-2019:2298-1 | Security update for sqlite3 | 2019-10-08T16:24:16Z | 2019-10-08T16:24:16Z |
| opensuse-su-2019:2300-1 | Security update for sqlite3 | 2019-10-08T16:24:35Z | 2019-10-08T16:24:35Z |
| opensuse-su-2019:2306-1 | Security update for libopenmpt | 2019-10-10T14:20:04Z | 2019-10-10T14:20:04Z |
| opensuse-su-2019:2307-1 | Security update for the Linux Kernel | 2019-10-10T18:21:01Z | 2019-10-10T18:21:01Z |
| opensuse-su-2019:2308-1 | Security update for the Linux Kernel | 2019-10-10T18:22:11Z | 2019-10-10T18:22:11Z |
| opensuse-su-2019:2311-1 | Security update for chromium | 2019-10-12T15:00:14Z | 2019-10-12T15:00:14Z |
| opensuse-su-2019:2312-1 | Security update for chromium | 2019-10-12T15:00:34Z | 2019-10-12T15:00:34Z |
| opensuse-su-2019:2313-1 | Security update for chromium | 2019-10-14T04:19:47Z | 2019-10-14T04:19:47Z |
| opensuse-su-2019:2314-1 | Security update for chromium | 2019-10-14T04:20:09Z | 2019-10-14T04:20:09Z |
| opensuse-su-2019:2316-1 | Security update for sudo | 2019-10-15T04:53:54Z | 2019-10-15T04:53:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2005:345 | Red Hat Security Advisory: slocate security update | 2005-09-28T14:39:00+00:00 | 2025-11-21T17:28:54+00:00 |
| rhsa-2005:674 | Red Hat Security Advisory: perl security update | 2005-10-05T11:48:00+00:00 | 2025-11-21T17:29:27+00:00 |
| rhsa-2005:361 | Red Hat Security Advisory: vixie-cron security update | 2005-10-05T11:49:00+00:00 | 2026-01-13T22:36:38+00:00 |
| rhsa-2005:346 | Red Hat Security Advisory: slocate security update | 2005-10-05T11:51:00+00:00 | 2025-11-21T17:28:52+00:00 |
| rhsa-2005:395 | Red Hat Security Advisory: net-snmp security update | 2005-10-05T11:52:00+00:00 | 2026-01-13T22:33:25+00:00 |
| rhsa-2005:527 | Red Hat Security Advisory: openssh security update | 2005-10-05T11:54:00+00:00 | 2025-11-21T17:29:15+00:00 |
| rhsa-2005:709 | Red Hat Security Advisory: gdb security update | 2005-10-05T11:55:00+00:00 | 2026-01-13T22:33:20+00:00 |
| rhsa-2005:673 | Red Hat Security Advisory: binutils security update | 2005-10-05T11:56:00+00:00 | 2026-01-13T22:35:35+00:00 |
| rhsa-2005:514 | Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 2 | 2005-10-05T12:02:00+00:00 | 2026-01-13T22:35:35+00:00 |
| rhsa-2005:685 | Red Hat Security Advisory: mysql security update | 2005-10-05T12:04:00+00:00 | 2025-11-21T17:29:27+00:00 |
| rhsa-2005:791 | Red Hat Security Advisory: thunderbird security update | 2005-10-06T19:46:00+00:00 | 2026-02-17T02:19:42+00:00 |
| rhsa-2005:763 | Red Hat Security Advisory: binutils security update | 2005-10-11T15:24:00+00:00 | 2026-01-13T22:04:22+00:00 |
| rhsa-2005:770 | Red Hat Security Advisory: libuser security update | 2005-10-11T15:26:00+00:00 | 2025-11-21T17:29:35+00:00 |
| rhsa-2005:800 | Red Hat Security Advisory: openssl security update | 2005-10-11T15:36:00+00:00 | 2025-11-21T17:29:38+00:00 |
| rhsa-2005:782 | Red Hat Security Advisory: util-linux and mount security update | 2005-10-11T15:49:00+00:00 | 2026-01-13T22:31:15+00:00 |
| rhsa-2005:799 | Red Hat Security Advisory: ruby security update | 2005-10-11T16:03:00+00:00 | 2025-11-21T17:29:38+00:00 |
| rhsa-2005:751 | Red Hat Security Advisory: openldap and nss_ldap security update | 2005-10-17T07:38:00+00:00 | 2025-11-21T17:29:31+00:00 |
| rhsa-2005:803 | Red Hat Security Advisory: lynx security update | 2005-10-17T07:46:00+00:00 | 2025-11-21T17:29:39+00:00 |
| rhsa-2005:767 | Red Hat Security Advisory: openldap and nss_ldap security update | 2005-10-17T07:52:00+00:00 | 2025-11-21T17:29:34+00:00 |
| rhsa-2005:801 | Red Hat Security Advisory: gdb security update | 2005-10-18T15:38:00+00:00 | 2026-01-13T22:15:44+00:00 |
| rhsa-2005:793 | Red Hat Security Advisory: netpbm security update | 2005-10-18T15:43:00+00:00 | 2025-11-21T17:29:37+00:00 |
| rhsa-2005:802 | Red Hat Security Advisory: xloadimage security update | 2005-10-18T15:52:00+00:00 | 2025-11-21T17:29:38+00:00 |
| rhsa-2005:809 | Red Hat Security Advisory: ethereal security update | 2005-10-25T16:42:00+00:00 | 2025-11-21T17:29:40+00:00 |
| rhsa-2005:805 | Red Hat Security Advisory: pam security update | 2005-10-26T15:58:00+00:00 | 2025-11-21T17:29:39+00:00 |
| rhsa-2005:823 | Red Hat Security Advisory: fetchmail security update | 2005-10-26T16:02:00+00:00 | 2025-11-21T17:29:41+00:00 |
| rhsa-2005:808 | Red Hat Security Advisory: kernel security update | 2005-10-27T15:09:00+00:00 | 2025-11-21T17:29:40+00:00 |
| rhsa-2005:812 | Red Hat Security Advisory: wget security update | 2005-11-02T12:59:00+00:00 | 2025-11-21T17:29:41+00:00 |
| rhsa-2005:828 | Red Hat Security Advisory: libungif security update | 2005-11-03T18:28:00+00:00 | 2025-11-21T17:29:42+00:00 |
| rhsa-2005:806 | Red Hat Security Advisory: cpio security update | 2005-11-10T19:01:00+00:00 | 2025-11-21T17:29:40+00:00 |
| rhsa-2005:831 | Red Hat Security Advisory: php security update | 2005-11-10T19:09:00+00:00 | 2025-11-21T17:29:43+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2016:0867-1 | Security update for rubygem-actionview-4_2 | 2016-03-23T14:29:01Z | 2016-03-23T14:29:01Z |
| suse-su-2016:0872-1 | Security update for fetchmail | 2016-03-24T07:55:46Z | 2016-03-24T07:55:46Z |
| suse-su-2016:0873-1 | Security update for xen | 2016-03-24T08:10:03Z | 2016-03-24T08:10:03Z |
| suse-su-2016:0884-1 | Security update for ghostscript | 2016-03-24T11:41:17Z | 2016-03-24T11:41:17Z |
| suse-su-2016:0905-1 | Security update for samba | 2016-03-29T11:30:33Z | 2016-03-29T11:30:33Z |
| suse-su-2016:0911-1 | Security update for the Linux Kernel | 2016-03-30T09:59:17Z | 2016-03-30T09:59:17Z |
| suse-su-2016:0909-1 | Security update for MozillaFirefox, mozilla-nspr, mozilla-nss | 2016-03-30T10:06:02Z | 2016-03-30T10:06:02Z |
| suse-su-2016:0912-1 | Security update for pidgin-otr | 2016-03-30T14:31:27Z | 2016-03-30T14:31:27Z |
| suse-su-2016:0908-2 | Security update for gcc5 | 2016-03-30T15:05:30Z | 2016-03-30T15:05:30Z |
| suse-su-2016:0924-1 | Security update for python-Pillow | 2016-03-31T12:18:26Z | 2016-03-31T12:18:26Z |
| suse-su-2016:0923-1 | Security update for libvirt | 2016-03-31T12:19:00Z | 2016-03-31T12:19:00Z |
| suse-su-2016:0931-1 | Security update for libvirt | 2016-04-01T08:28:33Z | 2016-04-01T08:28:33Z |
| suse-su-2016:0935-1 | Security update for python-Pillow | 2016-04-01T13:29:16Z | 2016-04-01T13:29:16Z |
| suse-su-2016:0936-1 | Security update for quagga | 2016-04-01T14:16:54Z | 2016-04-01T14:16:54Z |
| suse-su-2016:0946-1 | Security update for quagga | 2016-04-04T08:33:47Z | 2016-04-04T08:33:47Z |
| suse-su-2016:0954-1 | Security update for quagga | 2016-04-05T10:26:47Z | 2016-04-05T10:26:47Z |
| suse-su-2016:0953-1 | Security update for quagga | 2016-04-05T10:28:10Z | 2016-04-05T10:28:10Z |
| suse-su-2016:0955-1 | Security update for xen | 2016-04-05T11:27:02Z | 2016-04-05T11:27:02Z |
| suse-su-2016:0956-1 | Security update for java-1_7_0-openjdk | 2016-04-05T12:38:17Z | 2016-04-05T12:38:17Z |
| suse-su-2016:0957-1 | Security update for java-1_8_0-openjdk | 2016-04-05T12:38:30Z | 2016-04-05T12:38:30Z |
| suse-su-2016:0959-1 | Security update for java-1_7_0-openjdk | 2016-04-05T12:38:37Z | 2016-04-05T12:38:37Z |
| suse-su-2016:0963-1 | Security update for gcc5 | 2016-04-06T14:26:59Z | 2016-04-06T14:26:59Z |
| suse-su-2016:0967-1 | Security update for rubygem-actionpack-3_2 | 2016-04-07T07:10:35Z | 2016-04-07T07:10:35Z |
| suse-su-2016:0968-1 | Security update for rubygem-activesupport-3_2 | 2016-04-07T07:11:26Z | 2016-04-07T07:11:26Z |
| suse-su-2016:0970-1 | Security update for salt | 2016-04-07T09:27:45Z | 2016-04-07T09:27:45Z |
| suse-su-2016:0972-1 | Security update for salt | 2016-04-07T09:27:50Z | 2016-04-07T09:27:50Z |
| suse-su-2016:0990-1 | Security update for flash-player | 2016-04-08T11:31:41Z | 2016-04-08T11:31:41Z |
| suse-su-2016:0994-1 | Security update for krb5 | 2016-04-08T13:36:44Z | 2016-04-08T13:36:44Z |
| suse-su-2016:1010-1 | Security update for mercurial | 2016-04-12T08:38:59Z | 2016-04-12T08:38:59Z |
| suse-su-2016:1011-1 | Security update for mercurial | 2016-04-12T08:39:57Z | 2016-04-12T08:39:57Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2023:0303 | Moderate: usbguard security update | 2023-01-23T00:00:00Z | 2023-03-13T16:36:39Z |
| alsa-2023:0304 | Moderate: libreoffice security update | 2023-01-23T00:00:00Z | 2023-01-24T20:33:58Z |
| alsa-2023:0318 | Moderate: postgresql-jdbc security update | 2023-01-23T00:00:00Z | 2023-01-24T11:45:41Z |
| alsa-2023:0321 | Moderate: nodejs and nodejs-nodemon security, bug fix, and enhancement update | 2023-01-23T00:00:00Z | 2023-09-15T13:41:48Z |
| alsa-2023:0328 | Moderate: go-toolset and golang security and bug fix update | 2023-01-23T00:00:00Z | 2023-09-15T13:41:48Z |
| alsa-2023:0333 | Moderate: curl security update | 2023-01-23T00:00:00Z | 2023-03-13T16:36:41Z |
| alsa-2023:0334 | Important: kernel security and bug fix update | 2023-01-23T00:00:00Z | 2023-01-24T16:35:50Z |
| alsa-2023:0335 | Moderate: dbus security update | 2023-01-23T00:00:00Z | 2023-01-24T17:21:12Z |
| alsa-2023:0336 | Moderate: systemd security update | 2023-01-23T00:00:00Z | 2023-03-13T16:36:45Z |
| alsa-2023:0337 | Moderate: expat security update | 2023-01-23T00:00:00Z | 2023-01-24T11:01:47Z |
| alsa-2023:0338 | Moderate: libxml2 security update | 2023-01-23T00:00:00Z | 2023-03-08T11:12:32Z |
| alsa-2023:0339 | Moderate: sqlite security update | 2023-01-23T00:00:00Z | 2023-03-08T11:29:02Z |
| alsa-2023:0340 | Moderate: bash security update | 2023-01-23T00:00:00Z | 2023-01-24T10:46:39Z |
| alsa-2023:0343 | Moderate: libtasn1 security update | 2023-01-23T00:00:00Z | 2023-01-24T10:52:07Z |
| alsa-2023:0379 | Important: libXpm security update | 2023-01-23T00:00:00Z | 2023-03-13T16:36:45Z |
| alsa-2023:0383 | Important: libXpm security update | 2023-01-23T00:00:00Z | 2023-03-13T16:36:46Z |
| alsa-2023:0446 | Moderate: go-toolset:rhel8 security and bug fix update | 2023-01-25T00:00:00Z | 2023-01-27T06:22:01Z |
| alsa-2023:0463 | Important: thunderbird security update | 2023-01-25T00:00:00Z | 2023-01-27T06:16:14Z |
| alsa-2023:0208 | Moderate: java-1.8.0-openjdk security and bug fix update | 2023-01-26T00:00:00Z | 2023-09-15T13:41:48Z |
| alsa-2023:0210 | Moderate: java-1.8.0-openjdk security and bug fix update | 2023-01-26T00:00:00Z | 2023-09-15T13:41:48Z |
| alsa-2023:0476 | Important: thunderbird security update | 2023-01-26T00:00:00Z | 2023-01-31T16:03:16Z |
| alsa-2023:0606 | Important: thunderbird security update | 2023-02-06T00:00:00Z | 2023-02-07T19:47:11Z |
| alsa-2023:0608 | Important: thunderbird security update | 2023-02-06T00:00:00Z | 2023-02-07T17:39:59Z |
| alsa-2023:0610 | Important: git security update | 2023-02-06T00:00:00Z | 2023-02-07T20:41:09Z |
| alsa-2023:0611 | Important: git security update | 2023-02-06T00:00:00Z | 2023-02-07T21:03:26Z |
| alsa-2023:0622 | Important: tigervnc security update | 2023-02-07T00:00:00Z | 2023-02-09T15:47:26Z |
| alsa-2023:0625 | Important: libksba security update | 2023-02-07T00:00:00Z | 2023-03-07T11:46:59Z |
| alsa-2023:0626 | Important: libksba security update | 2023-02-07T00:00:00Z | 2023-03-07T11:50:16Z |
| alsa-2023:0662 | Important: tigervnc security update | 2023-02-08T00:00:00Z | 2023-02-09T21:01:27Z |
| alsa-2023:0752 | Moderate: grub2 security update | 2023-02-14T00:00:00Z | 2023-02-14T18:51:15Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-1382 | Use-of-uninitialized-value in nl_attr_is_valid | 2020-07-28T00:00:06.837707Z | 2023-02-24T01:43:04.741020Z |
| osv-2020-1386 | Heap-buffer-overflow in parse_relocation_info | 2020-07-28T00:00:08.332887Z | 2022-04-15T00:08:37.592330Z |
| osv-2020-1407 | Use-of-uninitialized-value in QPDFWriter::unparseObject | 2020-07-28T00:00:11.620686Z | 2022-04-13T03:04:31.567917Z |
| osv-2020-1409 | UNKNOWN READ in cpu_arm_exec_armeb | 2020-07-28T00:00:12.058612Z | 2022-04-13T03:31:39.936779Z |
| osv-2020-1410 | Use-of-uninitialized-value in float64_squash_input_denormal_aarch64eb | 2020-07-28T00:00:12.342145Z | 2023-02-24T01:22:46.281541Z |
| osv-2020-1414 | Heap-buffer-overflow in format_generic_odp_key | 2020-07-28T00:00:13.378550Z | 2023-04-20T22:40:34.629186Z |
| osv-2020-1417 | Index-out-of-bounds in DHT::get_hv_rbg | 2020-07-28T00:00:14.188786Z | 2022-04-13T03:35:45.416317Z |
| osv-2020-1420 | Bad-cast to Sass::PreValue from Sass::Unary_Expression | 2020-07-28T00:00:14.887375Z | 2023-12-22T14:07:59.765838Z |
| osv-2020-1423 | Use-of-uninitialized-value in txt2sd | 2020-07-28T00:00:16.191970Z | 2023-02-24T01:38:47.975346Z |
| osv-2020-1427 | Use-of-uninitialized-value in TextEndsWithNewline | 2020-07-28T00:00:17.183105Z | 2022-04-13T03:04:32.578765Z |
| osv-2020-1440 | Use-of-uninitialized-value in PPrintText | 2020-07-28T00:00:19.153741Z | 2022-04-13T03:04:32.584249Z |
| osv-2020-1448 | Global-buffer-overflow in vte_write_debug | 2020-07-28T00:00:21.964189Z | 2022-04-13T03:04:40.043504Z |
| osv-2020-1453 | UNKNOWN READ in RDKit::labelRecursivePatterns | 2020-07-28T00:00:23.047374Z | 2022-04-13T03:23:47.354489Z |
| osv-2020-1472 | Heap-buffer-overflow in stbi__YCbCr_to_RGB_simd | 2020-07-28T00:00:27.093869Z | 2022-04-13T03:04:40.821778Z |
| osv-2020-1478 | Heap-buffer-overflow in load_jpeg_image | 2020-07-28T00:00:27.954104Z | 2022-04-13T03:04:40.801582Z |
| osv-2020-1489 | Segv on unknown address in H5O_chunk_deserialize | 2020-07-28T00:00:30.132221Z | 2022-04-13T03:04:43.054788Z |
| osv-2020-1491 | Use-of-uninitialized-value in UA_Array_copy | 2020-07-28T00:00:30.302361Z | 2023-02-24T02:04:17.077819Z |
| osv-2020-1506 | Invalid-free in llvm_ks::SmallVectorImpl<llvm_ks::MCFixup>::~SmallVectorImpl | 2020-07-28T00:00:34.572692Z | 2022-04-13T03:34:19.930523Z |
| osv-2020-1507 | Index-out-of-bounds in MemoryRemoveTrailingZeros | 2020-07-28T00:00:34.623899Z | 2023-02-24T01:39:07.720489Z |
| osv-2020-1510 | UNKNOWN WRITE in FLAC__bitwriter_write_raw_uint32_nocheck | 2020-07-28T00:00:35.146104Z | 2022-04-13T03:04:40.529820Z |
| osv-2020-1519 | Index-out-of-bounds in DHT::hide_hots | 2020-07-28T00:00:36.268160Z | 2022-04-15T00:06:08.963961Z |
| osv-2020-1521 | Use-of-uninitialized-value in stbi__jpeg_huff_decode | 2020-07-28T00:00:36.454613Z | 2022-04-13T03:04:40.831746Z |
| osv-2020-1525 | UNKNOWN in zend_ast_export_ex | 2020-07-28T00:00:36.992692Z | 2022-04-13T03:04:33.427807Z |
| osv-2020-1540 | UNKNOWN READ in eval_expr | 2020-07-29T00:00:39.727472Z | 2023-07-15T14:10:54.665039Z |
| osv-2020-1547 | Heap-use-after-free in destroy_op_array | 2020-07-30T00:00:22.757167Z | 2022-04-13T03:04:33.628250Z |
| osv-2020-1549 | UNKNOWN WRITE in hb_vector_t<CFF::op_str_t>::resize | 2020-07-31T00:00:39.916125Z | 2022-04-13T03:04:32.864310Z |
| osv-2020-1550 | UNKNOWN WRITE in hb_vector_t<CFF::dict_val_t>::resize | 2020-07-31T00:00:44.183338Z | 2022-04-13T03:04:33.028373Z |
| osv-2020-1551 | UNKNOWN WRITE in CFF::parsed_cs_op_t::set_skip | 2020-07-31T00:00:53.218119Z | 2022-04-13T03:04:33.191902Z |
| osv-2020-1553 | UNKNOWN READ in hb_realloc_impl | 2020-07-31T00:00:55.823679Z | 2022-04-13T03:04:33.180680Z |
| osv-2020-1554 | Object-size in void hb_ot_map_t::apply<GPOSProxy> | 2020-07-31T00:01:20.122854Z | 2022-04-13T03:31:33.522Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2024-0400 | `ruzstd` uninit and out-of-bounds memory reads | 2024-11-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0408 | Unsound usages of `std::slice::from_raw_parts` | 2024-12-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0409 | Build corruption when using `PYO3_CONFIG_FILE` environment variable | 2024-12-04T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0428 | Undefined behaviour in `kvm_ioctls::ioctls::vm::VmFd::create_device` | 2024-12-05T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0447 | Panics on Malformed Untrusted Input | 2024-12-05T12:00:00Z | 2025-12-24T14:48:25Z |
| rustsec-2024-0421 | `idna` accepts Punycode labels that do not produce any non-ASCII when decoded | 2024-12-09T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0422 | gtk-layer-shell GTK3 bindings - no longer maintained | 2024-12-09T12:00:00Z | 2024-12-09T13:12:34Z |
| rustsec-2024-0423 | gtk-layer-shell-sys GTK3 bindings - no longer maintained | 2024-12-09T12:00:00Z | 2024-12-09T13:12:34Z |
| rustsec-2024-0437 | Crash due to uncontrolled recursion in protobuf crate | 2024-12-12T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0432 | Malicious plugin names, recipients, or identities can cause arbitrary binary execution | 2024-12-18T12:00:00Z | 2025-01-03T18:23:54Z |
| rustsec-2024-0433 | Malicious plugin names, recipients, or identities can cause arbitrary binary execution | 2024-12-18T12:00:00Z | 2025-01-03T18:23:54Z |
| rustsec-2024-0424 | Unsound usages of `core::slice::from_raw_parts_mut` | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0426 | Unsound usages of `u8` type casting | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0435 | Unsound usages of `Vec::from_raw_parts` | 2024-12-19T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0431 | Unsound usages of `core::slice::from_raw_parts` | 2024-12-23T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2024-0430 | Use of insecure cryptographic algorithms | 2024-12-28T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0002 | Segmentation fault due to lack of bound check | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0003 | Segmentation fault due to lack of bound check | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0005 | Out of bounds write triggered by crafted coverage data | 2025-01-13T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0026 | registry is unmaintained | 2025-01-13T12:00:00Z | 2025-04-29T08:11:21Z |
| rustsec-2025-0161 | libsecp256k1 is unmaintained | 2025-01-14T12:00:00Z | 2026-04-14T11:24:03Z |
| rustsec-2025-0040 | `root` appended to group listings | 2025-01-15T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0001 | gix-worktree-state nonexclusive checkout sets executable files world-writable | 2025-01-18T12:00:00Z | 2025-01-22T17:11:51Z |
| rustsec-2025-0158 | `jfrog_quotes` was removed from crates.io for malicious code | 2025-01-30T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0160 | `custom-req-on-workers` was removed from crates.io for malicious code | 2025-01-30T12:00:00Z | 2026-03-30T21:40:18Z |
| rustsec-2025-0004 | ssl::select_next_proto use after free | 2025-02-02T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0006 | Hickory DNS failure to verify self-signed RRSIG for DNSKEYs | 2025-02-07T12:00:00Z | 2025-10-28T06:02:18Z |
| rustsec-2025-0028 | cve-rs introduces memory vulnerabilities in safe Rust | 2025-02-10T12:00:00Z | 2025-05-06T21:08:48Z |
| rustsec-2025-0029 | totally-safe introduces memory vulnerabilities in safe Rust | 2025-02-10T12:00:00Z | 2025-05-05T18:31:28Z |
| rustsec-2025-0030 | totally-safe-transmute allows transmuting any type to any other type in safe Rust | 2025-02-10T12:00:00Z | 2025-05-06T20:14:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-grafana-2022-21673 | OAuth Identity Token exposure in Grafana | 2024-03-06T10:58:36.383Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2021-28567 | Magento Commerce improper authorization allows an authenticated user to perform certain functions without permission | 2024-03-06T10:58:36.807Z | 2026-03-20T09:47:33.381Z |
| bit-airflow-2021-45230 | Apache Airflow: Creating DagRuns didn't respect Dag-level permissions in the Webserver | 2024-03-06T10:58:36.898Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2023-5539 | Moodle: authenticated remote code execution risk in lesson | 2024-03-06T10:58:37.093Z | 2025-05-20T10:02:07.006Z |
| bit-jenkins-2022-0538 | 2024-03-06T10:58:37.875Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2022-41715 | Memory exhaustion when compiling regular expressions in regexp/syntax | 2024-03-06T10:58:39.087Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2021-29492 | Bypass of path matching rules using escaped slash characters | 2024-03-06T10:58:39.469Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2023-28107 | Discourse vulnerable to multisite DoS by spamming backups | 2024-03-06T10:58:39.576Z | 2025-05-20T10:02:07.006Z |
| bit-mariadb-2022-27456 | 2024-03-06T10:58:39.672Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2023-4700 | Missing Authorization in GitLab | 2024-03-06T10:58:41.071Z | 2025-05-20T10:02:07.006Z |
| bit-drupal-2020-13663 | 2024-03-06T10:58:43.895Z | 2025-04-03T14:40:37.652Z | |
| bit-mlflow-2023-30172 | 2024-03-06T10:58:44.563Z | 2025-04-03T14:40:37.652Z | |
| bit-mongodb-2020-7926 | Specific query can cause a DoS against MongoDB Server | 2024-03-06T10:58:44.575Z | 2025-05-20T10:02:07.006Z |
| bit-nats-2020-28466 | Denial of Service (DoS) | 2024-03-06T10:58:44.583Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2022-23267 | .NET and Visual Studio Denial of Service Vulnerability | 2024-03-06T10:58:45.671Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2021-43815 | Grafana directory traversal for `.cvs` files | 2024-03-06T10:58:46.373Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2021-45229 | Apache Airflow: Reflected XSS via Origin Query Argument in URL | 2024-03-06T10:58:46.760Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2023-46858 | 2024-03-06T10:58:47.260Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2022-27455 | 2024-03-06T10:58:47.313Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2021-28566 | Magento Commerce information disclosure during upload action leveraging a specially crafted file | 2024-03-06T10:58:48.484Z | 2026-03-20T09:47:33.381Z |
| bit-nginx-2023-44487 | 2024-03-06T10:58:49.980Z | 2026-02-11T09:09:18.507Z | |
| bit-jenkins-2021-28165 | 2024-03-06T10:58:50.070Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2022-32190 | Failure to strip relative path components in net/url | 2024-03-06T10:58:50.479Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2021-29258 | 2024-03-06T10:58:52.386Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2023-4658 | Incorrect Authorization in GitLab | 2024-03-06T10:58:54.200Z | 2025-05-20T10:02:07.006Z |
| bit-drupal-2020-13662 | 2024-03-06T10:58:54.899Z | 2025-04-03T14:40:37.652Z | |
| bit-mlflow-2023-2780 | Path Traversal: '\..\filename' in mlflow/mlflow | 2024-03-06T10:58:54.968Z | 2025-05-20T10:02:07.006Z |
| bit-mongodb-2020-7925 | Denial of Service when processing malformed Role names | 2024-03-06T10:58:54.976Z | 2026-03-20T09:47:33.381Z |
| bit-airflow-2021-38540 | Apache Airflow: Variable Import endpoint missed authentication check | 2024-03-06T10:58:56.460Z | 2025-05-20T10:02:07.006Z |
| bit-mariadb-2022-27452 | 2024-03-06T10:58:56.494Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-fa60324 | It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session | 2026-04-15T00:42:39.375533Z | 2026-04-14T09:27:59Z |
| cleanstart-2026-fd98843 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.6.4-r4 | 2026-04-15T00:43:03.053896Z | 2026-04-14T08:58:37Z |
| cleanstart-2026-fz27876 | Security fixes for ghsa-72hv-8253-57qq applied in versions: 3.8.6-r0 | 2026-04-15T00:44:39.850466Z | 2026-04-14T08:58:37Z |
| cleanstart-2026-fb07695 | When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint | 2026-04-15T00:45:38.848496Z | 2026-04-14T11:38:13Z |
| cleanstart-2026-eo57061 | In libexpat before 2 | 2026-04-15T00:45:38.991412Z | 2026-04-14T08:58:37Z |
| cleanstart-2026-mw52599 | OpenVPN version 2 | 2026-04-15T00:50:39.610141Z | 2026-04-14T06:07:21Z |
| cleanstart-2026-kc83705 | During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions | 2026-04-15T00:53:10.163760Z | 2026-04-14T09:04:57Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2003-avi-207 | Vulnérabilité sur le navigateur Apple Safari | 2003-12-12T00:00:00.000000 | 2003-12-12T00:00:00.000000 |
| certa-2003-avi-208 | Multiples vulnérabilités du garde-barrière PIX de Cisco | 2003-12-16T00:00:00.000000 | 2003-12-16T00:00:00.000000 |
| certa-2003-avi-209 | Multiples vulnérabilités du module Cisco Firewall Services (FWSM) | 2003-12-16T00:00:00.000000 | 2003-12-16T00:00:00.000000 |
| certa-2003-avi-210 | Vulnérabilité de lftp | 2003-12-16T00:00:00.000000 | 2004-01-06T00:00:00.000000 |
| certa-2003-avi-211 | Multiples vulnérabilités sous Solaris | 2003-12-16T00:00:00.000000 | 2003-12-16T00:00:00.000000 |
| certa-2003-avi-212 | Vulnérabilité de Net-SNMP | 2003-12-16T00:00:00.000000 | 2003-12-16T00:00:00.000000 |
| certa-2003-avi-213 | Vulnérabilité de Cisco ACNS | 2003-12-16T00:00:00.000000 | 2003-12-16T00:00:00.000000 |
| certa-2003-avi-214 | Vulnérabilité de DameWare Mini Remote Control | 2003-12-16T00:00:00.000000 | 2003-12-16T00:00:00.000000 |
| certa-2003-avi-215 | Vulnérabilité des interpréteurs XML de serveurs WEB (SOAP) | 2003-12-18T00:00:00.000000 | 2003-12-18T00:00:00.000000 |
| certa-2003-avi-216 | Faille dans le serveur CVS | 2003-12-22T00:00:00.000000 | 2004-01-14T00:00:00.000000 |
| certa-2003-avi-217 | Vulnérabilité sur Macromedia FlashPlayer | 2003-12-29T00:00:00.000000 | 2003-12-29T00:00:00.000000 |
| certa-2004-avi-409 | Nombreuses failles du noyau Linux | 2004-01-04T00:00:00.000000 | 2005-01-20T00:00:00.000000 |
| certa-2004-avi-001 | Multiples vulnérabilités dans Apple MacOS X | 2004-01-05T00:00:00.000000 | 2004-01-05T00:00:00.000000 |
| certa-2004-avi-002 | Vulnérabilité du noyau linux | 2004-01-07T00:00:00.000000 | 2004-01-09T00:00:00.000000 |
| certa-2004-avi-003 | Vulnérabilités dans Ethereal | 2004-01-08T00:00:00.000000 | 2004-01-14T00:00:00.000000 |
| certa-2004-avi-004 | Vulnérabilité de Microsoft Internet Security and Acceleration Server 2000 | 2004-01-14T00:00:00.000000 | 2004-01-14T00:00:00.000000 |
| certa-2004-avi-005 | Vulnérabilité de Microsoft Exchange Server 2003 | 2004-01-14T00:00:00.000000 | 2004-01-14T00:00:00.000000 |
| certa-2004-avi-006 | Vulnérabilité de Microsoft Data Access Components | 2004-01-14T00:00:00.000000 | 2004-01-14T00:00:00.000000 |
| certa-2004-avi-007 | Vulnérabilité dans kdepim | 2004-01-15T00:00:00.000000 | 2004-05-12T00:00:00.000000 |
| certa-2004-avi-008 | Failles dans l'analyseur réseau tcpdump | 2004-01-15T00:00:00.000000 | 2004-05-12T00:00:00.000000 |
| certa-2004-avi-009 | Vulnérabilité dans l'utilitaire LiveUpdate de Symantec | 2004-01-15T00:00:00.000000 | 2004-01-15T00:00:00.000000 |
| certa-2004-avi-010 | Vulnérabilité de isakmpd | 2004-01-15T00:00:00.000000 | 2004-02-20T00:00:00.000000 |
| certa-2004-avi-011 | Vulnérabilité du serveur de news INN d'ISC | 2004-01-16T00:00:00.000000 | 2004-01-16T00:00:00.000000 |
| certa-2004-avi-012 | Faille dans la commande enq sous AIX | 2004-01-20T00:00:00.000000 | 2004-01-20T00:00:00.000000 |
| certa-2004-avi-013 | Vulnérabilité de la commande diag sous AIX | 2004-01-20T00:00:00.000000 | 2004-01-20T00:00:00.000000 |
| certa-2004-avi-014 | Vulnérabilité du service in.iked sous Solaris | 2004-01-22T00:00:00.000000 | 2004-01-22T00:00:00.000000 |
| certa-2004-avi-015 | Vulnérabilité dans NetScreen-Security Manager 2004 | 2004-01-22T00:00:00.000000 | 2004-01-22T00:00:00.000000 |
| certa-2004-avi-016 | Multiples vulnérabilités sous HP-UX | 2004-01-23T00:00:00.000000 | 2004-01-23T00:00:00.000000 |
| certa-2004-avi-017 | Multiples vulnérabilités de GAIM | 2004-01-29T00:00:00.000000 | 2004-05-13T00:00:00.000000 |
| certa-2004-avi-018 | Multiples vulnérabilités sous Mac OS X | 2004-01-29T00:00:00.000000 | 2004-01-29T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2012-000026 | Janetter vulnerable to information disclosure | 2012-03-19T14:27+09:00 | 2012-03-19T14:27+09:00 |
| jvndb-2012-000027 | Janetter vulnerable to cross-site request forgery | 2012-03-19T14:31+09:00 | 2012-03-19T14:31+09:00 |
| jvndb-2012-000028 | TOSHIBA TEC e-Studio series vulnerable to authentication bypass | 2012-04-05T16:40+09:00 | 2012-04-05T16:40+09:00 |
| jvndb-2012-000029 | SENCHA SNS vulnerable to cross-site request forgery | 2012-04-05T16:41+09:00 | 2012-04-05T16:41+09:00 |
| jvndb-2012-000030 | SENCHA SNS vulnerable to session fixation | 2012-04-05T16:41+09:00 | 2012-04-05T16:41+09:00 |
| jvndb-2012-001932 | Vulnerability in Fujitsu Interstage List Works Where Permissions Cannot Be Denied | 2012-04-11T11:45+09:00 | 2012-04-11T11:45+09:00 |
| jvndb-2012-000032 | Dokodemo Rikunabi 2013 vulnerable to cross-site scripting | 2012-04-13T14:03+09:00 | 2012-04-13T14:03+09:00 |
| jvndb-2012-000031 | ActiveScriptRuby vulnerable to arbitrary Ruby script execution | 2012-04-13T14:08+09:00 | 2012-04-13T14:08+09:00 |
| jvndb-2012-000033 | TwitRocker2 (Android version) vulnerable in the WebView class | 2012-04-20T12:21+09:00 | 2012-04-20T12:21+09:00 |
| jvndb-2012-000034 | Multiple JustSystems products may insecurely load dynamic libraries | 2012-04-24T13:36+09:00 | 2012-04-24T13:36+09:00 |
| jvndb-2012-000035 | Multiple JustSystems products vulnerable to buffer overflow | 2012-04-24T13:37+09:00 | 2012-05-09T19:49+09:00 |
| jvndb-2012-000036 | OSQA vulnerable to cross-site scripting | 2012-04-26T14:15+09:00 | 2012-04-26T14:15+09:00 |
| jvndb-2012-000037 | sp mode mail issue in the verification of SSL certificates | 2012-04-26T14:21+09:00 | 2012-04-26T14:21+09:00 |
| jvndb-2012-002377 | Arbitrary Code Execution Vulnerability in Hitachi COBOL GUI Option on Windows | 2012-05-15T15:14+09:00 | 2012-05-15T15:14+09:00 |
| jvndb-2012-000041 | WEB MART from KENT-WEB vulnerable to cross-site scripting | 2012-05-15T16:44+09:00 | 2012-05-15T16:44+09:00 |
| jvndb-2012-000042 | WEB MART from KENT-WEB vulnerable to cross-site scripting | 2012-05-15T16:53+09:00 | 2012-05-15T16:53+09:00 |
| jvndb-2012-000043 | baserCMS vulnerable to session management | 2012-05-15T16:56+09:00 | 2012-05-15T16:56+09:00 |
| jvndb-2012-000045 | Drupal Form API fails to validate the redirect URL | 2012-05-17T13:55+09:00 | 2012-05-17T13:55+09:00 |
| jvndb-2012-000044 | iLunascape for Android vulnerable in the WebView class | 2012-05-21T13:56+09:00 | 2012-05-21T13:56+09:00 |
| jvndb-2012-000047 | Sybase EAServer vulnerable to cross-site scripting | 2012-05-25T15:34+09:00 | 2012-05-25T15:34+09:00 |
| jvndb-2012-000048 | RSSOwl vulnerable to arbitrary script execution | 2012-05-25T15:37+09:00 | 2012-05-25T15:37+09:00 |
| jvndb-2012-000049 | Opera fails to verify SSL server certificates | 2012-05-25T15:40+09:00 | 2012-07-26T17:31+09:00 |
| jvndb-2012-000050 | Roundcube Webmail vulnerable to cross-site scripting | 2012-05-25T15:43+09:00 | 2012-05-25T15:43+09:00 |
| jvndb-2012-000051 | Logitec LAN-W300N/R series fails to restrict access permissions | 2012-05-25T15:50+09:00 | 2012-05-25T15:50+09:00 |
| jvndb-2012-000052 | Segue vulnerable to cross-site scripting | 2012-06-01T14:03+09:00 | 2012-06-01T14:03+09:00 |
| jvndb-2012-000053 | Segue vulnerable to SQL injection | 2012-06-01T14:06+09:00 | 2012-06-01T14:06+09:00 |
| jvndb-2012-000054 | Puella Magi Madoka Magica iP for Android vulnerable to information disclosure | 2012-06-01T14:09+09:00 | 2012-06-01T14:09+09:00 |
| jvndb-2012-000055 | @WEB ShoppingCart vulnerable to cross-site scripting | 2012-06-05T14:04+09:00 | 2012-06-05T14:04+09:00 |
| jvndb-2012-000058 | WordPress plugin WassUp vulnerable to cross-site scripting | 2012-06-06T12:29+09:00 | 2012-06-06T12:29+09:00 |
| jvndb-2012-000059 | SEIL series fail to restrict access permissions | 2012-06-06T12:39+09:00 | 2012-06-06T12:39+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00693 | QPR Portal验证绕过漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00694 | iPass Open Mobile Windows Client远程代码执行漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00695 | PolarSSL 'asn1parse.c'远程代码执行漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00696 | ManageEngine ServiceDesk Plus权限提升漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00697 | ManageEngine ServiceDesk Plus 'search' 参数用户枚举漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00698 | SAP Adaptive Server Enterprise SQL注入漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00699 | SAP NetWeaver AS ABAP XML外部实体漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00700 | PrestaShop跨站脚本漏洞(CNVD-2015-00700) | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00709 | Google Chrome Blink拒绝服务漏洞(CNVD-2015-00709) | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00719 | GNU glibc远程堆缓冲区溢出漏洞 | 2015-01-28 | 2015-01-28 |
| cnvd-2015-00721 | Apache Qpid不完整修复拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00722 | Apache Qpid安全绕过漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00723 | Marked模块跨站脚本漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00724 | IBM i Access for Windows本地缓冲区溢出漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00725 | IBM Tivoli Monitoring远程命令执行漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00726 | Bugzilla存在多个漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00727 | Apple MAC OS X Yosemite任意代码执行漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00728 | 多个Android Devices存在拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00729 | Vala 'Gst.MapInfo()'函数拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00730 | Free Reprintables ArticleFR SQL注入漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00731 | Free Reprintables ArticleFR跨站脚本漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00732 | Two Pilots Exif Pilot缓冲区溢出漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00733 | WordPress插件Pixabay Images跨站脚本漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00734 | WordPress插件Pixabay Images目录遍历漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00735 | CatBot SQL注入漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00736 | Joyent Node.js Sequelize SQL注入漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00737 | Joyent Node.js marked不完整黑名单漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00738 | LibTIFF除零错误拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00739 | LibTIFF越界读写拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00740 | Cisco 2900 Series Integrated Services Router拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-03141 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03142 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03143 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03144 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03145 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03146 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03147 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03148 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03149 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03150 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03151 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03152 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03153 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03154 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03155 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03156 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03157 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03158 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03159 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03160 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03161 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03162 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03163 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03164 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03165 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03166 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-03167 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03168 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03169 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03170 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| ID | Description | Updated |
|---|---|---|
| var-202104-2081 | Ruijie Networks Co., Ltd. is a professional network manufacturer with a full range of net… | 2022-05-04T09:15:25.755000Z |
| var-202104-2060 | Tangshan Liulin Automation Equipment Co., Ltd. is a high-tech enterprise specializing in … | 2022-05-04T09:15:25.766000Z |
| var-202104-2039 | Shenzhen Jixiang Tengda Technology Co., Ltd. is a high-tech enterprise integrating indepe… | 2022-05-04T09:15:25.777000Z |
| var-202104-2018 | TOTOLINK is a high-end wireless router brand in the Asia-Pacific region, with a market sh… | 2022-05-04T09:15:25.793000Z |
| var-202104-1997 | Ruijie Networks Co., Ltd. is a company mainly engaged in information system integration s… | 2022-05-04T09:15:25.806000Z |
| var-202104-1976 | Quick control configuration software is a monitoring software used in industrial power an… | 2022-05-04T09:15:25.817000Z |
| var-202104-1029 | An RFC enabled function module SPI_WAIT_MILLIS in SAP NetWeaver AS ABAP, versions - 731, … | 2022-05-04T09:15:26.320000Z |
| var-202103-1799 | Tianxing Mini is a configuration software product launched by Beijing Tianxing Configurat… | 2022-05-04T09:15:27.362000Z |
| var-202103-1778 | The 360 smart camera PTZ AI version standard AP2C is a device under the 360 smart home pl… | 2022-05-04T09:15:27.371000Z |
| var-202103-1757 | Cisco is the world's leading provider of network solutions. Cisco rv130w has a binary… | 2022-05-04T09:15:27.382000Z |
| var-202103-1735 | Tenda AC9 is a wireless router product. Tenda AC9 has a denial of service vulnerabili… | 2022-05-04T09:15:27.393000Z |
| var-202103-1714 | TL-R479GPE-AC is a router. TP-Link TL-R479GPE-AC has a denial of service vulnerabilit… | 2022-05-04T09:15:27.404000Z |
| var-202103-1693 | Inhantong InRouter900 series industrial routers are 4G industrial routers. Inhantong … | 2022-05-04T09:15:27.415000Z |
| var-202103-1672 | RT-AX86U is a WiFi6 gaming router. ASUS RT-AX86U has a buffer overflow vulnerability.… | 2022-05-04T09:15:27.432000Z |
| var-202103-1650 | ZTE Corporation is the world's leading provider of integrated communications solutions. … | 2022-05-04T09:15:27.442000Z |
| var-202102-1625 | Gargoyle OS is a web management interface for small router devices. Gargoyle OS has a… | 2022-05-04T09:15:31.663000Z |
| var-202102-1604 | CMCC R3S-3 is a router. China Mobile Internet of Things Co., Ltd. CMCC R3S-3 has logi… | 2022-05-04T09:15:31.674000Z |
| var-202102-1583 | TL-ER5110G is a gigabit commercial router. TP-Link router TL-ER5110G has a denial of … | 2022-05-04T09:15:31.685000Z |
| var-202102-1562 | Shenzhen Jixiang Tengda Technology Co., Ltd. was founded in 1999. It is a professional su… | 2022-05-04T09:15:31.696000Z |
| var-202102-1541 | Cisco RV110W Wireless-N VPN Firewall is an enterprise-level router of Cisco (Cisco). … | 2022-05-04T09:15:31.707000Z |
| var-202102-1520 | China Mobile Communications Group is affiliated to China Mobile Communications Co., Ltd. … | 2022-05-04T09:15:31.717000Z |
| var-202101-2022 | Shanghai Buke Automation Co., Ltd. has been focusing on the R&D, production, sales and re… | 2022-05-04T09:15:33.366000Z |
| var-202101-2001 | TP-LINK TL-WR740N adopts advanced 11N wireless technology, with a wireless transmission r… | 2022-05-04T09:15:33.376000Z |
| var-202101-1977 | As a leading enterprise in China's information security industry, Beijing Top Rongxin Tec… | 2022-05-04T09:15:33.388000Z |
| var-202012-1624 | Chengdu Feiyuxing Technology Co., Ltd. is a company dedicated to providing intelligent an… | 2022-05-04T09:15:35.511000Z |
| var-202012-1622 | Microsoft (Chinese name Microsoft Corporation or American Microsoft Corporation) is an Am… | 2022-05-04T09:15:35.523000Z |
| var-202012-1601 | Rockwell Automation Co., Ltd. is one of the world's largest automation and information co… | 2022-05-04T09:15:35.534000Z |
| var-202012-1579 | Tenda AC9, AC15, and AC18 are wireless routers. Tenda router has a denial of service … | 2022-05-04T09:15:35.546000Z |
| var-202011-1590 | HGW RL821GWV-D is a router. Excitel HGW RL821GWV-D has an information disclosure vuln… | 2022-05-04T09:15:37.381000Z |
| var-202011-1568 | Advantech WebAccess/HMI Designer is a man-machine interface integrated development tool. … | 2022-05-04T09:15:37.393000Z |