Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0643 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The IMAP service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0644 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NNTP news service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0645 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The IRC service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0646 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The LDAP service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0647 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The bootparam (bootparamd) service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-05-08T09:00:00 |
| CVE-1999-0648 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X25 service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0649 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FSP service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2005-11-02T10:00:00 |
| CVE-1999-0650 |
N/A
|
The netstat service is running, which provides se… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.577Z |
| CVE-1999-0651 |
N/A
|
The rsh/rlogin service is running. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.528Z |
| CVE-1999-0652 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A database service is running, e.g. a SQL server, Oracle, or mySQL. | N/A | N/A | 2000-02-04T05:00:00 | 2005-11-02T10:00:00 |
| CVE-1999-0653 |
N/A
|
A component service related to NIS+ is running. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.499Z |
| CVE-1999-0654 |
N/A
|
The OS/2 or POSIX subsystem in NT is enabled. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.952Z |
| CVE-1999-0655 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. Notes: the former description is: "A service may include useful information in its banner or help function (such as the name and version), making it useful for information gathering activities. | N/A | N/A | 2000-02-04T05:00:00 | 2001-12-09T10:00:00 |
| CVE-1999-0656 |
N/A
|
The ugidd RPC interface, by design, allows remote… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.159Z |
| CVE-1999-0657 |
N/A
|
WinGate is being used. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:36.982Z |
| CVE-1999-0658 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "DCOM is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0659 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A Windows NT Primary Domain Controller (PDC) or Backup Domain Controller (BDC) is present. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0660 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. It might be more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A hacker utility, back door, or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0661 |
N/A
|
A system is running a version of software that wa… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.297Z |
| CVE-1999-0662 |
N/A
|
A system-critical program or library does not hav… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.804Z |
| CVE-1999-0663 |
N/A
|
A system-critical program, library, or file has a… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.505Z |
| CVE-1999-0664 |
N/A
|
An application-critical Windows NT registry key h… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.583Z |
| CVE-1999-0665 |
N/A
|
An application-critical Windows NT registry key h… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.576Z |
| CVE-1999-0667 |
N/A
|
The ARP protocol allows any host to spoof ARP rep… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.039Z |
| CVE-1999-0669 |
N/A
|
The Eyedog ActiveX control is marked as "safe for… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.535Z |
| CVE-1999-0670 |
N/A
|
Buffer overflow in the Eyedog ActiveX control all… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.621Z |
| CVE-1999-0673 |
N/A
|
Buffer overflow in ALMail32 POP3 client via From:… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.651Z |
| CVE-1999-0677 |
N/A
|
The WebRamp web administration utility has a defa… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.038Z |
| CVE-1999-0684 |
N/A
|
Denial of service in Sendmail 8.8.6 in HPUX. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.040Z |
| CVE-1999-0698 |
N/A
|
Denial of service in IP protocol logger (ippl) on… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:37.337Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0580 |
N/A
|
The HKEY_LOCAL_MACHINE key in a Windows NT system… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.690Z |
| CVE-1999-0581 |
N/A
|
The HKEY_CLASSES_ROOT key in a Windows NT system … |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.670Z |
| CVE-1999-0583 |
N/A
|
There is a one-way or two-way trust relationship … |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.688Z |
| CVE-1999-0584 |
N/A
|
A Windows NT file system is not NTFS. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.647Z |
| CVE-1999-0586 |
N/A
|
A network service is running on a nonstandard port. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.665Z |
| CVE-1999-0587 |
N/A
|
A WWW server is not running in a restricted file … |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.687Z |
| CVE-1999-0588 |
N/A
|
A filter in a router or firewall allows unusual f… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.716Z |
| CVE-1999-0589 |
N/A
|
A system-critical Windows NT registry key has ina… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.688Z |
| CVE-1999-0591 |
N/A
|
An event log in Windows NT has inappropriate acce… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.649Z |
| CVE-1999-0592 |
N/A
|
The Logon box of a Windows NT system displays the… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.675Z |
| CVE-1999-0593 |
N/A
|
The default setting for the Winlogon key entry Sh… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.690Z |
| CVE-1999-0594 |
N/A
|
A Windows NT system does not restrict access to r… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.685Z |
| CVE-1999-0596 |
N/A
|
A Windows NT log file has an inappropriate maximu… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.679Z |
| CVE-1999-0597 |
N/A
|
A Windows NT account policy does not forcibly dis… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.686Z |
| CVE-1999-0598 |
N/A
|
A network intrusion detection system (IDS) does n… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.644Z |
| CVE-1999-0599 |
N/A
|
A network intrusion detection system (IDS) does n… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.665Z |
| CVE-1999-0600 |
N/A
|
A network intrusion detection system (IDS) does n… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.710Z |
| CVE-1999-0601 |
N/A
|
A network intrusion detection system (IDS) does n… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.687Z |
| CVE-1999-0602 |
N/A
|
A network intrusion detection system (IDS) does n… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.654Z |
| CVE-1999-0603 |
N/A
|
In Windows NT, an inappropriate user is a member … |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.692Z |
| CVE-1999-0611 |
N/A
|
A system-critical Windows NT registry key has an … |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.691Z |
| CVE-1999-0613 |
N/A
|
The rpc.sprayd service is running. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.783Z |
| CVE-1999-0614 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FTP service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0615 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SNMP service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2002-05-09T09:00:00 |
| CVE-1999-0616 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The TFTP service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0617 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SMTP service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0618 |
N/A
|
The rexec service is running. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.715Z |
| CVE-1999-0619 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The Telnet service is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0620 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NIS is running. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-0621 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NETBIOS is running. | N/A | N/A | 2000-02-04T05:00:00 | 2002-02-02T10:00:00 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-qcj7-g2j5-g7r3 |
7.5 (3.1)
|
In Bouncy Castle JCE Provider ECDSA does not fully validate ASN.1 encoding of signature on verification | 2018-10-17T16:24:12Z | 2025-09-02T20:27:34Z |
| ghsa-rrvx-pwf8-p59p |
7.5 (3.1)
|
In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with … | 2018-10-17T16:24:22Z | 2025-09-12T19:14:22Z |
| ghsa-fjqm-246c-mwqg |
3.7 (3.1)
|
In Bouncy Castle JCE Provider the other party DH public key is not fully validated | 2018-10-17T16:27:28Z | 2025-09-12T19:16:49Z |
| ghsa-w285-wf9q-5w69 |
7.4 (3.1)
|
In Bouncy Castle JCE Provider the ECIES implementation allowed the use of ECB mode | 2018-10-17T16:27:38Z | 2025-09-12T19:17:28Z |
| ghsa-4mv7-cq75-3qjm |
|
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcp… | 2018-10-17T16:27:50Z | 2025-09-12T19:30:13Z |
| ghsa-pjfr-qf3p-3q25 |
8.1 (3.1)
|
When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file t… | 2018-10-17T16:30:31Z | 2025-10-22T17:31:15Z |
| ghsa-5q99-f34m-67gc |
4.3 (3.1)
|
Apache Tomcat Open Redirect vulnerability | 2018-10-17T16:31:02Z | 2024-02-22T22:43:50Z |
| ghsa-6rxj-58jh-436r |
5.9 (3.1)
|
Apache Tomcat unauthorized access vulnerability | 2018-10-17T16:31:17Z | 2024-02-23T17:46:56Z |
| ghsa-jx6h-3fjx-cgv5 |
6.5 (3.1)
|
Apache Tomcat information exposure vulnerability | 2018-10-17T16:31:48Z | 2024-02-23T17:54:01Z |
| ghsa-m59c-jpc8-m2x4 |
7.5 (3.1)
|
In Apache Tomcat there is an improper handing of overflow in the UTF-8 decoder | 2018-10-17T16:32:18Z | 2024-02-23T17:57:09Z |
| ghsa-r4x2-3cq5-hqvp |
9.8 (3.1)
|
The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'suppor… | 2018-10-17T16:32:32Z | 2024-02-23T18:01:23Z |
| ghsa-46j3-r4pj-4835 |
7.5 (3.1)
|
The host name verification missing in Apache Tomcat | 2018-10-17T16:32:43Z | 2024-10-21T19:06:46Z |
| ghsa-6v52-mj5r-7j2m |
5.9 (3.1)
|
Apache Tomcat Race Condition vulnerability | 2018-10-17T16:33:02Z | 2024-02-22T21:06:50Z |
| ghsa-j84c-j8qm-g47r |
9.8 (3.1)
|
The Admin UI in Apache Ranger before 0.5.1 does not properly handle authentication requests that la… | 2018-10-17T17:21:11Z | 2022-04-27T13:41:39Z |
| ghsa-4rjf-mxfm-98h5 |
7.2 (3.1)
|
SQL injection vulnerability in the policy admin tool in Apache Ranger | 2018-10-17T17:21:29Z | 2022-04-27T13:48:01Z |
| ghsa-rf7q-xqm3-6923 |
4.8 (3.1)
|
Apache Ranger allows remote authenticated administrators to inject arbitrary web script or HTML | 2018-10-17T17:21:37Z | 2022-04-27T13:48:55Z |
| ghsa-vhxc-8jjq-859j |
6.5 (3.1)
|
Moderate severity vulnerability that affects org.apache.ranger:ranger | 2018-10-17T17:21:44Z | 2021-09-20T22:05:45Z |
| ghsa-v7mf-qgxf-qmvf |
4.8 (3.1)
|
Apache Ranger admin users can store some arbitrary javascript code to be executed when normal users… | 2018-10-17T17:21:54Z | 2022-04-27T13:49:46Z |
| ghsa-xv7x-x6wr-xx7g |
5.9 (3.1)
|
Apache Ranger policy engine incorrectly matches paths in certain conditions | 2018-10-17T17:22:05Z | 2023-11-21T11:56:13Z |
| ghsa-c99h-fgqm-6679 |
8.8 (3.1)
|
UnixAuthenticationService in Apache Ranger was updated to correctly handle user input to avoid Stac… | 2018-10-17T17:22:23Z | 2022-04-27T13:52:10Z |
| ghsa-758m-6g3q-g3hh |
9.8 (3.1)
|
Policy resource matcher in Apache Ranger before 0.7.1 ignores characters after '' wildcard character | 2018-10-17T17:22:38Z | 2022-04-27T13:54:27Z |
| ghsa-ffjh-fjgg-mfpq |
5.9 (3.1)
|
Moderate severity vulnerability that affects org.apache.ranger:ranger | 2018-10-17T17:22:49Z | 2021-09-10T18:07:43Z |
| ghsa-4fq3-mr56-cg6r |
9.8 (3.1)
|
Spring Data Commons remote code injection vulnerability | 2018-10-17T17:23:24Z | 2024-03-20T14:20:41Z |
| ghsa-m929-7fr6-cvjg |
7.5 (3.1)
|
Spring Data Commons, used in combination with XMLBeam, contains a property binder vulnerability cau… | 2018-10-17T17:23:36Z | 2022-04-27T13:58:00Z |
| ghsa-5q8m-mqmx-pxp9 |
7.5 (3.1)
|
Spring Data Commons contain a property path parser vulnerability caused by unlimited resource allocation | 2018-10-17T17:23:44Z | 2024-03-04T20:01:15Z |
| ghsa-h5f5-rj4r-42f6 |
9.8 (3.1)
|
Incorrect access control in Neo4j Enterprise Database Server via LDAP authentication | 2018-10-17T17:31:26Z | 2022-04-27T14:23:03Z |
| ghsa-4c32-xmgj-2g98 |
7.8 (3.1)
|
High severity vulnerability that affects org.apache.pdfbox:pdfbox | 2018-10-17T18:22:15Z | 2021-09-01T14:11:59Z |
| ghsa-gx96-vgf7-hwfg |
5.5 (3.1)
|
In Apache PDFBox a carefully crafted PDF file can trigger an extremely long running computation | 2018-10-17T18:22:29Z | 2022-04-27T14:23:39Z |
| ghsa-6fvx-r7hx-3vh6 |
9.8 (3.1)
|
JavaMelody has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java. | 2018-10-17T18:28:00Z | 2022-04-27T14:25:05Z |
| ghsa-x825-rjww-2245 |
8.8 (3.1)
|
Apache Storm it is possible for the owner of a topology to trick the supervisor to launch a worker … | 2018-10-17T18:30:01Z | 2022-04-27T14:25:41Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2019-229 |
|
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Goo… | tensorflow-gpu | 2019-04-24T17:29:00Z | 2021-12-09T06:35:11.612649Z |
| pysec-2019-232 |
|
Memcpy parameter overlap in Google Snappy library 1.1.4, as used in Google TensorFlow bef… | tensorflow-gpu | 2019-04-24T17:29:00Z | 2021-12-09T06:35:11.800944Z |
| pysec-2019-235 |
|
NULL pointer dereference in Google TensorFlow before 1.12.2 could cause a denial of servi… | tensorflow-gpu | 2019-04-24T17:29:00Z | 2021-12-09T06:35:11.945126Z |
| pysec-2019-205 |
|
Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The t… | tensorflow | 2019-04-24T21:29:00Z | 2021-08-27T03:22:22.242054Z |
| pysec-2019-223 |
|
Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The t… | tensorflow-cpu | 2019-04-24T21:29:00Z | 2021-08-27T03:22:22.242054Z |
| pysec-2019-230 |
|
Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The t… | tensorflow-gpu | 2019-04-24T21:29:00Z | 2021-12-09T06:35:11.711453Z |
| pysec-2019-185 |
|
An issue was discovered in Matrix Sydent before 1.0.3 and Synapse before 0.99.3.1. Random… | matrix-synapse | 2019-05-09T18:29:00Z | 2021-08-27T03:22:06.320363Z |
| pysec-2019-242 |
5.5 (3.1)
|
Capstone 3.0.4 has an out-of-bounds vulnerability (SEGV caused by a read memory access) i… | capstone | 2019-05-15T14:29:00Z | 2025-01-28T17:34:08.578134Z |
| pysec-2019-6 |
|
Buildbot before 1.8.2 and 2.x before 2.3.1 accepts a user-submitted authorization token f… | buildbot | 2019-05-23T15:30:00Z | 2019-06-07T18:29:00Z |
| pysec-2019-256 |
7.5 (3.1)
|
In libwebp 0.5.1, there is a double free bug in libwebpmux. | webp | 2019-05-23T18:29:00Z | 2024-11-21T14:23:03.194401Z |
| pysec-2019-79 |
|
An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2… | django | 2019-06-03T17:29:00Z | 2019-06-12T17:29:00Z |
| pysec-2019-194 |
|
An access-control flaw was found in the Octavia service when the cloud platform was deplo… | octavia | 2019-06-03T19:29:00Z | 2021-08-27T03:22:09.805726Z |
| pysec-2019-109 |
|
** DISPUTED ** A deserialization vulnerability exists in the way parso through 0.4.0 hand… | parso | 2019-06-06T19:29:00Z | 2019-07-05T11:15:00Z |
| pysec-2019-199 |
|
A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a C… | pyxdg | 2019-06-06T19:29:00Z | 2021-08-27T03:22:18.878765Z |
| pysec-2019-162 |
|
aubio v0.4.0 to v0.4.8 has a Buffer Overflow in new_aubio_tempo. | aubio | 2019-06-07T17:29:00Z | 2021-08-25T04:29:55.885441Z |
| pysec-2019-163 |
|
aubio v0.4.0 to v0.4.8 has a NULL pointer dereference in new_aubio_filterbank via invalid… | aubio | 2019-06-07T17:29:00Z | 2021-08-25T04:29:55.933107Z |
| pysec-2019-164 |
|
aubio v0.4.0 to v0.4.8 has a new_aubio_onset NULL pointer dereference. | aubio | 2019-06-07T17:29:00Z | 2021-08-25T04:29:55.989477Z |
| pysec-2019-128 |
|
In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, … | twisted | 2019-06-10T12:29:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-129 |
|
In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verif… | twisted | 2019-06-16T12:29:00Z | 2019-08-14T03:15:00Z |
| pysec-2019-103 |
|
KeyIdentity LinOTP before 2.10.5.3 has Incorrect Access Control (issue 1 of 2). | linotp | 2019-06-27T14:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-10 |
|
An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before … | django | 2019-07-01T14:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-20 |
|
verification.py in django-rest-registration (aka Django REST Registration library) before… | django-rest-registration | 2019-07-02T22:15:00Z | 2019-07-12T13:52:00Z |
| pysec-2019-218 |
|
libnmap < v0.6.3 is affected by: XML Injection. The impact is: Denial of service (DoS) by… | python-libnmap | 2019-07-15T03:15:00Z | 2021-11-16T03:58:45.118185Z |
| pysec-2019-170 |
|
An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket… | python-engineio | 2019-07-16T00:15:00Z | 2021-08-25T04:30:27.861588Z |
| pysec-2019-179 |
|
The Pallets Project Flask before 1.0 is affected by: unexpected memory usage. The impact … | flask | 2019-07-17T14:15:00Z | 2021-08-27T03:22:03.986184Z |
| pysec-2019-119 |
|
SaltStack Salt 2018.3, 2019.2 is affected by: SQL Injection. The impact is: An attacker c… | salt | 2019-07-18T17:15:00Z | 2019-08-13T18:15:00Z |
| pysec-2019-184 |
|
Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML Ex… | ladon | 2019-07-18T17:15:00Z | 2021-08-27T03:22:05.932908Z |
| pysec-2019-120 |
|
scapy 2.4.0 is affected by: Denial of Service. The impact is: infinite loop, resource con… | scapy | 2019-07-19T16:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-244 |
7.8 (3.1)
|
Exiv2 0.27.99.0 has a heap-based buffer over-read in Exiv2::RafImage::readMetadata() in r… | exiv2 | 2019-07-28T19:15:00Z | 2024-11-21T14:22:49.479201Z |
| pysec-2019-245 |
6.5 (3.1)
|
Exiv2::PngImage::readMetadata() in pngimage.cpp in Exiv2 0.27.99.0 allows attackers to ca… | exiv2 | 2019-07-28T19:15:00Z | 2024-11-21T14:22:49.538663Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-724 | Malicious code in @westerndigital/fetlife-assets (npm) | 2022-06-20T18:20:39Z | 2022-06-20T18:20:39Z |
| mal-2022-738 | Malicious code in @xfinity/fetlife-assets (npm) | 2022-06-20T18:20:39Z | 2022-06-20T18:20:39Z |
| mal-2022-790 | Malicious code in @youporn/fetlife-assets (npm) | 2022-06-20T18:20:39Z | 2022-06-20T18:20:40Z |
| mal-2022-795 | Malicious code in @zivver/fetlife-assets (npm) | 2022-06-20T18:20:39Z | 2022-06-20T18:20:40Z |
| mal-2022-1832 | Malicious code in cart-bucketing (npm) | 2022-06-20T18:20:40Z | 2022-06-20T18:20:40Z |
| mal-2022-2282 | Malicious code in custom-event-names (npm) | 2022-06-20T18:20:40Z | 2022-06-20T18:20:40Z |
| mal-2022-2297 | Malicious code in cxd-npm-releases (npm) | 2022-06-20T18:20:40Z | 2022-06-20T18:20:41Z |
| mal-2022-2447 | Malicious code in design-system-base (npm) | 2022-06-20T18:20:40Z | 2022-06-20T18:20:41Z |
| mal-2022-2636 | Malicious code in dynamic-load-sticky-polyfill (npm) | 2022-06-20T18:20:41Z | 2022-06-20T18:20:41Z |
| mal-2022-2852 | Malicious code in espn-critical (npm) | 2022-06-20T18:20:41Z | 2022-06-20T18:20:41Z |
| mal-2022-2853 | Malicious code in espn-lazysizes (npm) | 2022-06-20T18:20:41Z | 2022-06-20T18:20:42Z |
| mal-2022-2940 | Malicious code in external-js-css (npm) | 2022-06-20T18:20:41Z | 2022-06-20T18:20:42Z |
| mal-2022-3017 | Malicious code in fetlife-assets (npm) | 2022-06-20T18:20:42Z | 2022-06-20T18:20:42Z |
| mal-2022-3446 | Malicious code in grand-whitelisted-hashes (npm) | 2022-06-20T18:20:42Z | 2022-06-20T18:20:42Z |
| mal-2022-3748 | Malicious code in ibm-plex (npm) | 2022-06-20T18:20:42Z | 2022-06-20T18:20:43Z |
| mal-2022-5246 | Malicious code in paypal-ui (npm) | 2022-06-20T18:20:42Z | 2022-06-20T18:20:43Z |
| mal-2022-5247 | Malicious code in paypalcorp (npm) | 2022-06-20T18:20:43Z | 2022-06-20T18:20:43Z |
| mal-2022-5580 | Malicious code in rancher-website-theme (npm) | 2022-06-20T18:20:43Z | 2022-06-20T18:20:43Z |
| mal-2022-5932 | Malicious code in sap-theming (npm) | 2022-06-20T18:20:43Z | 2022-06-20T18:20:44Z |
| mal-2022-5960 | Malicious code in sch-frontend-integration (npm) | 2022-06-20T18:20:43Z | 2022-06-20T18:20:44Z |
| mal-2022-5968 | Malicious code in scox-npm-group (npm) | 2022-06-20T18:20:44Z | 2022-06-20T18:20:44Z |
| mal-2022-6241 | Malicious code in sportsbook-components (npm) | 2022-06-20T18:20:44Z | 2022-06-20T18:20:44Z |
| mal-2022-6242 | Malicious code in sportsbook-frontend (npm) | 2022-06-20T18:20:44Z | 2022-06-20T18:20:45Z |
| mal-2022-6688 | Malicious code in twenty-eightteen (npm) | 2022-06-20T18:20:44Z | 2022-06-20T18:20:45Z |
| mal-2022-432 | Malicious code in @medv/codejar (npm) | 2022-06-20T18:20:45Z | 2022-06-20T18:20:46Z |
| mal-2022-6880 | Malicious code in ux-tread-crc-code (npm) | 2022-06-20T18:20:45Z | 2022-06-20T18:20:45Z |
| mal-2022-6881 | Malicious code in ux-tread-dotcom-utils (npm) | 2022-06-20T18:20:45Z | 2022-06-20T18:20:45Z |
| mal-2022-7012 | Malicious code in vxpattern-lib-paypal (npm) | 2022-06-20T18:20:45Z | 2022-06-20T18:20:45Z |
| mal-2022-1170 | Malicious code in audit-logging (npm) | 2022-06-20T18:20:46Z | 2022-06-20T18:20:46Z |
| mal-2022-2279 | Malicious code in custdev-sapui5 (npm) | 2022-06-20T18:20:46Z | 2022-06-20T18:20:46Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-2405 | Ghostscript: Mehrere Schwachstellen | 2020-08-12T22:00:00.000+00:00 | 2023-11-14T23:00:00.000+00:00 |
| wid-sec-w-2025-0235 | Dovecot: Mehrere Schwachstellen ermöglichen Denial of Service | 2020-08-12T22:00:00.000+00:00 | 2025-02-02T23:00:00.000+00:00 |
| wid-sec-w-2023-2045 | Net-SNMP: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2020-08-16T22:00:00.000+00:00 | 2025-07-31T22:00:00.000+00:00 |
| wid-sec-w-2022-1912 | Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen | 2020-08-17T22:00:00.000+00:00 | 2025-02-23T23:00:00.000+00:00 |
| wid-sec-w-2023-1635 | libcurl: Schwachstelle ermöglicht Offenlegung von Informationen | 2020-08-18T22:00:00.000+00:00 | 2023-07-04T22:00:00.000+00:00 |
| wid-sec-w-2023-2470 | Squid: Mehrere Schwachstellen | 2020-08-23T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2024-1973 | QEMU, Xen und Citrix Hypervisor: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2020-08-24T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2022-1722 | QEMU und libvirt: Mehrere Schwachstellen | 2020-08-31T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2023-2469 | Ansible: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-09-01T22:00:00.000+00:00 | 2024-05-06T22:00:00.000+00:00 |
| wid-sec-w-2025-1087 | GitLab: Mehrere Schwachstellen | 2020-09-02T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2023-1153 | libxml2: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2020-09-03T22:00:00.000+00:00 | 2024-07-31T22:00:00.000+00:00 |
| wid-sec-w-2022-1723 | TLS: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2020-09-09T22:00:00.000+00:00 | 2025-10-20T22:00:00.000+00:00 |
| wid-sec-w-2023-0342 | Red Hat OpenStack: Schwachstelle ermöglicht Offenlegung von Informationen | 2020-09-09T22:00:00.000+00:00 | 2023-02-12T23:00:00.000+00:00 |
| wid-sec-w-2023-1092 | Ruby on Rails: Schwachstelle ermöglicht Cross-Site Scripting | 2020-09-09T22:00:00.000+00:00 | 2023-04-27T22:00:00.000+00:00 |
| wid-sec-w-2023-2970 | Apache ActiveMQ: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-09-09T22:00:00.000+00:00 | 2024-07-23T22:00:00.000+00:00 |
| wid-sec-w-2024-3162 | OpenLDAP: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-09-09T22:00:00.000+00:00 | 2024-10-14T22:00:00.000+00:00 |
| wid-sec-w-2023-2468 | Ansible: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2020-09-13T22:00:00.000+00:00 | 2025-11-23T23:00:00.000+00:00 |
| wid-sec-w-2023-1579 | Trustwave ModSecurity: Schwachstelle ermöglicht Denial of Service | 2020-09-14T22:00:00.000+00:00 | 2023-06-27T22:00:00.000+00:00 |
| wid-sec-w-2022-1615 | Linux Kernel: Mehrere Schwachstellen | 2020-09-15T22:00:00.000+00:00 | 2023-06-22T22:00:00.000+00:00 |
| wid-sec-w-2023-0486 | Node.js: Mehrere Schwachstellen | 2020-09-15T22:00:00.000+00:00 | 2023-02-27T23:00:00.000+00:00 |
| wid-sec-w-2022-1269 | QEMU: Mehrere Schwachstellen ermöglichen Denial of Service | 2020-09-16T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2025-0058 | PowerDNS: Mehrere Schwachstellen | 2020-09-22T22:00:00.000+00:00 | 2025-01-14T23:00:00.000+00:00 |
| wid-sec-w-2023-1917 | Wireshark: Mehrere Schwachstellen ermöglichen Denial of Service | 2020-09-23T22:00:00.000+00:00 | 2023-07-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0492 | Python: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-09-27T22:00:00.000+00:00 | 2024-07-11T22:00:00.000+00:00 |
| wid-sec-w-2023-1109 | Ruby: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-09-28T22:00:00.000+00:00 | 2024-01-23T23:00:00.000+00:00 |
| wid-sec-w-2024-1479 | Red Hat Enterprise Linux/WebKitGTK: Mehrere Schwachstellen ermöglichen Ausführen von beliebigem Programmcode mit Benutzerrechten | 2020-09-29T22:00:00.000+00:00 | 2024-06-30T22:00:00.000+00:00 |
| wid-sec-w-2026-0012 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2020-09-29T22:00:00.000+00:00 | 2026-01-05T23:00:00.000+00:00 |
| wid-sec-w-2022-1724 | libvirt: Schwachstelle ermöglicht Denial of Service | 2020-10-01T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2022-0340 | Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-10-04T22:00:00.000+00:00 | 2022-12-26T23:00:00.000+00:00 |
| wid-sec-w-2023-2404 | OpenSC: Mehrere Schwachstellen ermöglichen Denial of Service | 2020-10-05T22:00:00.000+00:00 | 2023-09-20T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2005:345 | Red Hat Security Advisory: slocate security update | 2005-09-28T14:39:00+00:00 | 2025-11-21T17:28:54+00:00 |
| rhsa-2005:674 | Red Hat Security Advisory: perl security update | 2005-10-05T11:48:00+00:00 | 2025-11-21T17:29:27+00:00 |
| rhsa-2005:361 | Red Hat Security Advisory: vixie-cron security update | 2005-10-05T11:49:00+00:00 | 2026-01-08T09:18:12+00:00 |
| rhsa-2005:346 | Red Hat Security Advisory: slocate security update | 2005-10-05T11:51:00+00:00 | 2025-11-21T17:28:52+00:00 |
| rhsa-2005:395 | Red Hat Security Advisory: net-snmp security update | 2005-10-05T11:52:00+00:00 | 2026-01-08T09:18:20+00:00 |
| rhsa-2005:527 | Red Hat Security Advisory: openssh security update | 2005-10-05T11:54:00+00:00 | 2025-11-21T17:29:15+00:00 |
| rhsa-2005:709 | Red Hat Security Advisory: gdb security update | 2005-10-05T11:55:00+00:00 | 2026-01-08T09:19:13+00:00 |
| rhsa-2005:673 | Red Hat Security Advisory: binutils security update | 2005-10-05T11:56:00+00:00 | 2026-01-08T09:19:12+00:00 |
| rhsa-2005:514 | Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 2 | 2005-10-05T12:02:00+00:00 | 2026-01-08T09:18:36+00:00 |
| rhsa-2005:685 | Red Hat Security Advisory: mysql security update | 2005-10-05T12:04:00+00:00 | 2025-11-21T17:29:27+00:00 |
| rhsa-2005:791 | Red Hat Security Advisory: thunderbird security update | 2005-10-06T19:46:00+00:00 | 2025-11-21T17:29:37+00:00 |
| rhsa-2005:763 | Red Hat Security Advisory: binutils security update | 2005-10-11T15:24:00+00:00 | 2026-01-08T09:19:14+00:00 |
| rhsa-2005:770 | Red Hat Security Advisory: libuser security update | 2005-10-11T15:26:00+00:00 | 2025-11-21T17:29:35+00:00 |
| rhsa-2005:800 | Red Hat Security Advisory: openssl security update | 2005-10-11T15:36:00+00:00 | 2025-11-21T17:29:38+00:00 |
| rhsa-2005:782 | Red Hat Security Advisory: util-linux and mount security update | 2005-10-11T15:49:00+00:00 | 2026-01-08T09:19:15+00:00 |
| rhsa-2005:799 | Red Hat Security Advisory: ruby security update | 2005-10-11T16:03:00+00:00 | 2025-11-21T17:29:38+00:00 |
| rhsa-2005:751 | Red Hat Security Advisory: openldap and nss_ldap security update | 2005-10-17T07:38:00+00:00 | 2025-11-21T17:29:31+00:00 |
| rhsa-2005:803 | Red Hat Security Advisory: lynx security update | 2005-10-17T07:46:00+00:00 | 2025-11-21T17:29:39+00:00 |
| rhsa-2005:767 | Red Hat Security Advisory: openldap and nss_ldap security update | 2005-10-17T07:52:00+00:00 | 2025-11-21T17:29:34+00:00 |
| rhsa-2005:801 | Red Hat Security Advisory: gdb security update | 2005-10-18T15:38:00+00:00 | 2026-01-08T09:19:16+00:00 |
| rhsa-2005:793 | Red Hat Security Advisory: netpbm security update | 2005-10-18T15:43:00+00:00 | 2025-11-21T17:29:37+00:00 |
| rhsa-2005:802 | Red Hat Security Advisory: xloadimage security update | 2005-10-18T15:52:00+00:00 | 2025-11-21T17:29:38+00:00 |
| rhsa-2005:809 | Red Hat Security Advisory: ethereal security update | 2005-10-25T16:42:00+00:00 | 2025-11-21T17:29:40+00:00 |
| rhsa-2005:805 | Red Hat Security Advisory: pam security update | 2005-10-26T15:58:00+00:00 | 2025-11-21T17:29:39+00:00 |
| rhsa-2005:823 | Red Hat Security Advisory: fetchmail security update | 2005-10-26T16:02:00+00:00 | 2025-11-21T17:29:41+00:00 |
| rhsa-2005:808 | Red Hat Security Advisory: kernel security update | 2005-10-27T15:09:00+00:00 | 2025-11-21T17:29:40+00:00 |
| rhsa-2005:812 | Red Hat Security Advisory: wget security update | 2005-11-02T12:59:00+00:00 | 2025-11-21T17:29:41+00:00 |
| rhsa-2005:828 | Red Hat Security Advisory: libungif security update | 2005-11-03T18:28:00+00:00 | 2025-11-21T17:29:42+00:00 |
| rhsa-2005:806 | Red Hat Security Advisory: cpio security update | 2005-11-10T19:01:00+00:00 | 2025-11-21T17:29:40+00:00 |
| rhsa-2005:831 | Red Hat Security Advisory: php security update | 2005-11-10T19:09:00+00:00 | 2025-11-21T17:29:43+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-17-341-02 | Rockwell Automation FactoryTalk Alarms and Events | 2017-12-07T00:00:00.000000Z | 2017-12-07T00:00:00.000000Z |
| icsa-17-341-03 | PHOENIX CONTACT FL COMSERVER, FL COM SERVER, and PSI-MODEM/ETH | 2017-12-07T00:00:00.000000Z | 2017-12-07T00:00:00.000000Z |
| icsa-17-353-01 | ABB Ellipse | 2017-12-19T00:00:00.000000Z | 2017-12-19T00:00:00.000000Z |
| icsa-17-353-02 | PEPPERL+FUCHS/ecom instruments WLAN Capable Devices using the WPA2 Protocol | 2017-12-19T00:00:00.000000Z | 2017-12-19T00:00:00.000000Z |
| icsa-17-353-03 | Ecava IntegraXor | 2017-12-19T00:00:00.000000Z | 2017-12-19T00:00:00.000000Z |
| icsa-17-353-04 | Siemens LOGO! Soft Comfort | 2017-12-19T00:00:00.000000Z | 2017-12-19T00:00:00.000000Z |
| icsa-17-353-05 | WECON Technology Co., Ltd. LeviStudio HMI Editor | 2017-12-19T00:00:00.000000Z | 2017-12-19T00:00:00.000000Z |
| icsa-17-355-01 | ICSA-17-355-01_Moxa NPort W2150A and W2250A | 2017-12-21T00:00:00.000000Z | 2017-12-21T00:00:00.000000Z |
| icsa-17-355-02 | Schneider Electric Pelco VideoXpert Enterprise | 2017-12-21T00:00:00.000000Z | 2017-12-21T00:00:00.000000Z |
| icsa-18-004-01 | Delta Electronics Delta Industrial Automation Screen Editor | 2018-01-04T00:00:00.000000Z | 2018-01-04T00:00:00.000000Z |
| icsa-18-004-02a | Advantech WebAccess (Update A) | 2018-01-04T00:00:00.000000Z | 2018-01-11T00:00:00.000000Z |
| icsa-18-009-01 | Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers | 2018-01-09T00:00:00.000000Z | 2018-01-09T00:00:00.000000Z |
| icsa-18-011-01 | WECON Technology Co., Ltd. LeviStudio HMI Editor | 2018-01-11T00:00:00.000000Z | 2018-01-11T00:00:00.000000Z |
| icsa-18-011-02 | Moxa MXview | 2018-01-11T00:00:00.000000Z | 2018-01-11T00:00:00.000000Z |
| icsa-18-011-03 | PHOENIX CONTACT FL SWITCH | 2018-01-11T00:00:00.000000Z | 2018-01-11T00:00:00.000000Z |
| icsa-18-018-01a | ICSA-18-018-01A Siemens SIMATIC WinCC Add-On (Update A) | 2018-01-18T00:00:00.000000Z | 2018-02-22T00:00:00.000000Z |
| icsa-18-023-02 | ICSA-18-023-02 Siemens Industrial Products (Update A) | 2018-01-18T00:00:00.000000Z | 2019-02-12T00:00:00.000000Z |
| icsa-18-023-01 | Advantech WebAccess/SCADA | 2018-01-23T00:00:00.000000Z | 2018-01-23T00:00:00.000000Z |
| icsa-18-025-02b | Siemens Desigo PXC (Update C) | 2018-01-24T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-18-025-01 | Nari PCS-9611 (Update A) | 2018-01-25T00:00:00.000000Z | 2018-05-03T00:00:00.000000Z |
| icsma-18-025-01 | Philips IntelliSpace Cardiovascular System Vulnerability | 2018-01-25T00:00:00.000000Z | 2018-01-25T00:00:00.000000Z |
| icsa-18-030-01 | PHOENIX CONTACT mGuard | 2018-01-30T00:00:00.000000Z | 2018-01-30T00:00:00.000000Z |
| icsa-18-030-02 | Siemens TeleControl Server Basic | 2018-01-30T00:00:00.000000Z | 2018-01-30T00:00:00.000000Z |
| icsa-18-032-01 | Fuji Electric V-Server VPR | 2018-02-01T00:00:00.000000Z | 2018-02-01T00:00:00.000000Z |
| icsa-18-032-02 | 3S-Smart Software Solutions GmbH CODESYS Web Server | 2018-02-01T00:00:00.000000Z | 2018-02-01T00:00:00.000000Z |
| icsa-18-032-03 | Gemalto Sentinel License Manager | 2018-02-01T00:00:00.000000Z | 2018-02-01T00:00:00.000000Z |
| icsma-18-037-01 | Vyaire Medical CareFusion Upgrade Utility Vulnerability | 2018-02-06T00:00:00.000000Z | 2018-02-06T00:00:00.000000Z |
| icsma-18-037-02 | GE Medical Devices Vulnerability | 2018-02-06T00:00:00.000000Z | 2018-03-13T00:00:00.000000Z |
| icsa-18-044-01 | WAGO PFC200 Series | 2018-02-13T00:00:00.000000Z | 2018-02-13T00:00:00.000000Z |
| icsa-18-044-02 | Schneider Electric IGSS SCADA Software | 2018-02-13T00:00:00.000000Z | 2018-02-13T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20190619-rvrouters-dos | Cisco RV110W, RV130W, and RV215W Routers Management Interface Denial of Service Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-sdwan-cmdinj | Cisco SD-WAN Solution Command Injection Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-sdwan-privesca | Cisco SD-WAN Solution Privilege Escalation Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-sdwan-privilescal | Cisco SD-WAN Solution Privilege Escalation Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-staros-asr-dos | Cisco StarOS Denial of Service Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190619-tele-shell-inj | Cisco TelePresence Endpoint Command Shell Injection Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-25T13:24:12+00:00 |
| cisco-sa-20190619-waas-authbypass | Cisco Wide Area Application Services Software HTTPS Proxy Authentication Bypass Vulnerability | 2019-06-19T16:00:00+00:00 | 2019-06-19T16:00:00+00:00 |
| cisco-sa-20190626-dcnm-bypass | Cisco Data Center Network Manager Authentication Bypass Vulnerability | 2019-06-26T16:00:00+00:00 | 2019-09-19T16:08:37+00:00 |
| cisco-sa-20190626-dcnm-codex | Cisco Data Center Network Manager Arbitrary File Upload and Remote Code Execution Vulnerability | 2019-06-26T16:00:00+00:00 | 2019-09-19T16:08:38+00:00 |
| cisco-sa-20190626-dcnm-file-dwnld | Cisco Data Center Network Manager Arbitrary File Download Vulnerability | 2019-06-26T16:00:00+00:00 | 2019-09-19T16:08:38+00:00 |
| cisco-sa-20190626-dcnm-infodiscl | Cisco Data Center Network Manager Information Disclosure Vulnerability | 2019-06-26T16:00:00+00:00 | 2019-09-19T16:08:39+00:00 |
| cisco-sa-20190703-amp-commandinj | Cisco Advanced Malware Protection for Endpoints Windows Command Injection Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-asyncos-wsa | Cisco Web Security Appliance Web Proxy Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-ccapic-restapi | Cisco Application Policy Infrastructure Controller REST API Privilege Escalation Vulnerability | 2019-07-03T16:00:00+00:00 | 2020-01-16T15:25:04+00:00 |
| cisco-sa-20190703-cucdm-rsh | Cisco Unified Communications Domain Manager Restricted Shell Escape Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-cucm-dos | Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-08T22:30:23+00:00 |
| cisco-sa-20190703-esa-bypass | Cisco Email Security Appliance Content Filter Bypass Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-esa-filterpass | Cisco Email Security Appliance Content Filter Bypass Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-fmc-xss | Cisco Firepower Management Center RSS Cross-Site Scripting Vulnerabilities | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-iosxr-bgp-dos | Cisco IOS XR Software Border Gateway Protocol Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2020-01-22T16:01:55+00:00 |
| cisco-sa-20190703-ip-phone-sip-dos | Cisco IP Phone 7800 and 8800 Series Session Initiation Protocol Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-08T16:16:46+00:00 |
| cisco-sa-20190703-jabber-dll | Cisco Jabber for Windows DLL Preloading Vulnerability | 2019-07-03T16:00:00+00:00 | 2021-04-01T22:11:38+00:00 |
| cisco-sa-20190703-n9kaci-bypass | Cisco Nexus 9000 Series Fabric Switches ACI Mode Fabric Infrastructure VLAN Unauthorized Access Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-nfvis-commandinj | Cisco Enterprise NFV Infrastructure Software Command Injection Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-nfvis-file-readwrite | Cisco Enterprise NFV Infrastructure Software Arbitrary File Read and Write Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-sbss-dos | Cisco Small Business Series Switches HTTP Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-sbss-memcorrupt | Cisco Small Business Series Switches Memory Corruption Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190703-wsa-dos | Cisco Web Security Appliance HTTPS Certificate Denial of Service Vulnerability | 2019-07-03T16:00:00+00:00 | 2019-07-03T16:00:00+00:00 |
| cisco-sa-20190710-asa-ftd-dos | Cisco ASA and FTD Software Cryptographic TLS and SSL Driver Denial of Service Vulnerability | 2019-07-10T16:00:00+00:00 | 2019-07-11T21:11:00+00:00 |
| cisco-sa-20190717-aironet-dos | Cisco IOS Access Points Software 802.11r Fast Transition Denial of Service Vulnerability | 2019-07-17T16:00:00+00:00 | 2019-07-17T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2020-14838 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14839 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14844 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14845 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14846 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14848 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14852 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Charsets). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14860 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14861 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14866 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14867 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 5.6.49 and prior 5.7.31 and prior and 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14868 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-14869 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14870 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: X Plugin). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14873 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 8.0.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14878 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 8.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14888 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-23T00:00:00.000Z |
| msrc_cve-2020-14891 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-14893 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-10-02T00:00:00.000Z | 2020-10-27T00:00:00.000Z |
| msrc_cve-2020-15250 | Information disclosure in JUnit4 | 2020-10-02T00:00:00.000Z | 2025-02-20T00:00:00.000Z |
| msrc_cve-2020-15254 | Undefined Behavior in bounded Crossbeam channel | 2020-10-02T00:00:00.000Z | 2025-09-03T22:22:18.000Z |
| msrc_cve-2020-24352 | An issue was discovered in QEMU through 5.1.0. An out-of-bounds memory access was found in the ATI VGA device implementation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati_2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could use this flaw to crash the QEMU process on the host resulting in a denial of service. | 2020-10-02T00:00:00.000Z | 2020-11-02T00:00:00.000Z |
| msrc_cve-2020-25613 | An issue was discovered in Ruby through 2.5.8 2.6.x through 2.6.6 and 2.7.x through 2.7.1. WEBrick a simple HTTP server bundled with Ruby had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check) which may lead to an HTTP Request Smuggling attack. | 2020-10-02T00:00:00.000Z | 2020-10-21T00:00:00.000Z |
| msrc_cve-2020-25637 | A double free memory issue was found to occur in the libvirt API in versions before 6.8.0 responsible for requesting information about network interfaces of a running QEMU domain. This flaw affects the polkit access control driver. Specifically clients connecting to the read-write socket with limited ACL permissions could use this flaw to crash the libvirt daemon resulting in a denial of service or potentially escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2020-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2020-25641 | A flaw was found in the Linux kernel's implementation of biovecs in versions before 5.9-rc7. A zero-length biovec request issued by the block subsystem could cause the kernel to enter an infinite loop causing a denial of service. This flaw allows a local attacker with basic privileges to issue requests to a block device resulting in a denial of service. The highest threat from this vulnerability is to system availability. | 2020-10-02T00:00:00.000Z | 2020-10-09T00:00:00.000Z |
| msrc_cve-2020-25643 | A flaw was found in the HDLC_PPP module of the Linux kernel in versions before 5.9-rc7. Memory corruption and a read overflow is caused by improper input validation in the ppp_cp_parse_cr function which can cause the system to crash or cause a denial of service. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | 2020-10-02T00:00:00.000Z | 2020-10-17T00:00:00.000Z |
| msrc_cve-2020-25645 | A flaw was found in the Linux kernel in versions before 5.9-rc7. Traffic between two Geneve endpoints may be unencrypted when IPsec is configured to encrypt traffic for the specific UDP port used by the GENEVE tunnel allowing anyone between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality. | 2020-10-02T00:00:00.000Z | 2020-10-17T00:00:00.000Z |
| msrc_cve-2020-25742 | pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer. | 2020-10-02T00:00:00.000Z | 2020-10-08T00:00:00.000Z |
| msrc_cve-2020-25743 | hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call. | 2020-10-02T00:00:00.000Z | 2020-10-08T00:00:00.000Z |
| msrc_cve-2020-26541 | The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c. | 2020-10-02T00:00:00.000Z | 2020-10-05T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202104-2081 | Ruijie Networks Co., Ltd. is a professional network manufacturer with a full range of net… | 2022-05-04T09:15:25.755000Z |
| var-202104-2060 | Tangshan Liulin Automation Equipment Co., Ltd. is a high-tech enterprise specializing in … | 2022-05-04T09:15:25.766000Z |
| var-202104-2039 | Shenzhen Jixiang Tengda Technology Co., Ltd. is a high-tech enterprise integrating indepe… | 2022-05-04T09:15:25.777000Z |
| var-202104-2018 | TOTOLINK is a high-end wireless router brand in the Asia-Pacific region, with a market sh… | 2022-05-04T09:15:25.793000Z |
| var-202104-1997 | Ruijie Networks Co., Ltd. is a company mainly engaged in information system integration s… | 2022-05-04T09:15:25.806000Z |
| var-202104-1976 | Quick control configuration software is a monitoring software used in industrial power an… | 2022-05-04T09:15:25.817000Z |
| var-202104-1029 | An RFC enabled function module SPI_WAIT_MILLIS in SAP NetWeaver AS ABAP, versions - 731, … | 2022-05-04T09:15:26.320000Z |
| var-202103-1799 | Tianxing Mini is a configuration software product launched by Beijing Tianxing Configurat… | 2022-05-04T09:15:27.362000Z |
| var-202103-1778 | The 360 smart camera PTZ AI version standard AP2C is a device under the 360 smart home pl… | 2022-05-04T09:15:27.371000Z |
| var-202103-1757 | Cisco is the world's leading provider of network solutions. Cisco rv130w has a binary… | 2022-05-04T09:15:27.382000Z |
| var-202103-1735 | Tenda AC9 is a wireless router product. Tenda AC9 has a denial of service vulnerabili… | 2022-05-04T09:15:27.393000Z |
| var-202103-1714 | TL-R479GPE-AC is a router. TP-Link TL-R479GPE-AC has a denial of service vulnerabilit… | 2022-05-04T09:15:27.404000Z |
| var-202103-1693 | Inhantong InRouter900 series industrial routers are 4G industrial routers. Inhantong … | 2022-05-04T09:15:27.415000Z |
| var-202103-1672 | RT-AX86U is a WiFi6 gaming router. ASUS RT-AX86U has a buffer overflow vulnerability.… | 2022-05-04T09:15:27.432000Z |
| var-202103-1650 | ZTE Corporation is the world's leading provider of integrated communications solutions. … | 2022-05-04T09:15:27.442000Z |
| var-202102-1625 | Gargoyle OS is a web management interface for small router devices. Gargoyle OS has a… | 2022-05-04T09:15:31.663000Z |
| var-202102-1604 | CMCC R3S-3 is a router. China Mobile Internet of Things Co., Ltd. CMCC R3S-3 has logi… | 2022-05-04T09:15:31.674000Z |
| var-202102-1583 | TL-ER5110G is a gigabit commercial router. TP-Link router TL-ER5110G has a denial of … | 2022-05-04T09:15:31.685000Z |
| var-202102-1562 | Shenzhen Jixiang Tengda Technology Co., Ltd. was founded in 1999. It is a professional su… | 2022-05-04T09:15:31.696000Z |
| var-202102-1541 | Cisco RV110W Wireless-N VPN Firewall is an enterprise-level router of Cisco (Cisco). … | 2022-05-04T09:15:31.707000Z |
| var-202102-1520 | China Mobile Communications Group is affiliated to China Mobile Communications Co., Ltd. … | 2022-05-04T09:15:31.717000Z |
| var-202101-2022 | Shanghai Buke Automation Co., Ltd. has been focusing on the R&D, production, sales and re… | 2022-05-04T09:15:33.366000Z |
| var-202101-2001 | TP-LINK TL-WR740N adopts advanced 11N wireless technology, with a wireless transmission r… | 2022-05-04T09:15:33.376000Z |
| var-202101-1977 | As a leading enterprise in China's information security industry, Beijing Top Rongxin Tec… | 2022-05-04T09:15:33.388000Z |
| var-202012-1624 | Chengdu Feiyuxing Technology Co., Ltd. is a company dedicated to providing intelligent an… | 2022-05-04T09:15:35.511000Z |
| var-202012-1622 | Microsoft (Chinese name Microsoft Corporation or American Microsoft Corporation) is an Am… | 2022-05-04T09:15:35.523000Z |
| var-202012-1601 | Rockwell Automation Co., Ltd. is one of the world's largest automation and information co… | 2022-05-04T09:15:35.534000Z |
| var-202012-1579 | Tenda AC9, AC15, and AC18 are wireless routers. Tenda router has a denial of service … | 2022-05-04T09:15:35.546000Z |
| var-202011-1590 | HGW RL821GWV-D is a router. Excitel HGW RL821GWV-D has an information disclosure vuln… | 2022-05-04T09:15:37.381000Z |
| var-202011-1568 | Advantech WebAccess/HMI Designer is a man-machine interface integrated development tool. … | 2022-05-04T09:15:37.393000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2012-000026 | Janetter vulnerable to information disclosure | 2012-03-19T14:27+09:00 | 2012-03-19T14:27+09:00 |
| jvndb-2012-000027 | Janetter vulnerable to cross-site request forgery | 2012-03-19T14:31+09:00 | 2012-03-19T14:31+09:00 |
| jvndb-2012-000028 | TOSHIBA TEC e-Studio series vulnerable to authentication bypass | 2012-04-05T16:40+09:00 | 2012-04-05T16:40+09:00 |
| jvndb-2012-000029 | SENCHA SNS vulnerable to cross-site request forgery | 2012-04-05T16:41+09:00 | 2012-04-05T16:41+09:00 |
| jvndb-2012-000030 | SENCHA SNS vulnerable to session fixation | 2012-04-05T16:41+09:00 | 2012-04-05T16:41+09:00 |
| jvndb-2012-001932 | Vulnerability in Fujitsu Interstage List Works Where Permissions Cannot Be Denied | 2012-04-11T11:45+09:00 | 2012-04-11T11:45+09:00 |
| jvndb-2012-000032 | Dokodemo Rikunabi 2013 vulnerable to cross-site scripting | 2012-04-13T14:03+09:00 | 2012-04-13T14:03+09:00 |
| jvndb-2012-000031 | ActiveScriptRuby vulnerable to arbitrary Ruby script execution | 2012-04-13T14:08+09:00 | 2012-04-13T14:08+09:00 |
| jvndb-2012-000033 | TwitRocker2 (Android version) vulnerable in the WebView class | 2012-04-20T12:21+09:00 | 2012-04-20T12:21+09:00 |
| jvndb-2012-000034 | Multiple JustSystems products may insecurely load dynamic libraries | 2012-04-24T13:36+09:00 | 2012-04-24T13:36+09:00 |
| jvndb-2012-000035 | Multiple JustSystems products vulnerable to buffer overflow | 2012-04-24T13:37+09:00 | 2012-05-09T19:49+09:00 |
| jvndb-2012-000036 | OSQA vulnerable to cross-site scripting | 2012-04-26T14:15+09:00 | 2012-04-26T14:15+09:00 |
| jvndb-2012-000037 | sp mode mail issue in the verification of SSL certificates | 2012-04-26T14:21+09:00 | 2012-04-26T14:21+09:00 |
| jvndb-2012-002377 | Arbitrary Code Execution Vulnerability in Hitachi COBOL GUI Option on Windows | 2012-05-15T15:14+09:00 | 2012-05-15T15:14+09:00 |
| jvndb-2012-000041 | WEB MART from KENT-WEB vulnerable to cross-site scripting | 2012-05-15T16:44+09:00 | 2012-05-15T16:44+09:00 |
| jvndb-2012-000042 | WEB MART from KENT-WEB vulnerable to cross-site scripting | 2012-05-15T16:53+09:00 | 2012-05-15T16:53+09:00 |
| jvndb-2012-000043 | baserCMS vulnerable to session management | 2012-05-15T16:56+09:00 | 2012-05-15T16:56+09:00 |
| jvndb-2012-000045 | Drupal Form API fails to validate the redirect URL | 2012-05-17T13:55+09:00 | 2012-05-17T13:55+09:00 |
| jvndb-2012-000044 | iLunascape for Android vulnerable in the WebView class | 2012-05-21T13:56+09:00 | 2012-05-21T13:56+09:00 |
| jvndb-2012-000047 | Sybase EAServer vulnerable to cross-site scripting | 2012-05-25T15:34+09:00 | 2012-05-25T15:34+09:00 |
| jvndb-2012-000048 | RSSOwl vulnerable to arbitrary script execution | 2012-05-25T15:37+09:00 | 2012-05-25T15:37+09:00 |
| jvndb-2012-000049 | Opera fails to verify SSL server certificates | 2012-05-25T15:40+09:00 | 2012-07-26T17:31+09:00 |
| jvndb-2012-000050 | Roundcube Webmail vulnerable to cross-site scripting | 2012-05-25T15:43+09:00 | 2012-05-25T15:43+09:00 |
| jvndb-2012-000051 | Logitec LAN-W300N/R series fails to restrict access permissions | 2012-05-25T15:50+09:00 | 2012-05-25T15:50+09:00 |
| jvndb-2012-000052 | Segue vulnerable to cross-site scripting | 2012-06-01T14:03+09:00 | 2012-06-01T14:03+09:00 |
| jvndb-2012-000053 | Segue vulnerable to SQL injection | 2012-06-01T14:06+09:00 | 2012-06-01T14:06+09:00 |
| jvndb-2012-000054 | Puella Magi Madoka Magica iP for Android vulnerable to information disclosure | 2012-06-01T14:09+09:00 | 2012-06-01T14:09+09:00 |
| jvndb-2012-000055 | @WEB ShoppingCart vulnerable to cross-site scripting | 2012-06-05T14:04+09:00 | 2012-06-05T14:04+09:00 |
| jvndb-2012-000058 | WordPress plugin WassUp vulnerable to cross-site scripting | 2012-06-06T12:29+09:00 | 2012-06-06T12:29+09:00 |
| jvndb-2012-000059 | SEIL series fail to restrict access permissions | 2012-06-06T12:39+09:00 | 2012-06-06T12:39+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2016:0867-1 | Security update for rubygem-actionview-4_2 | 2016-03-23T14:29:01Z | 2016-03-23T14:29:01Z |
| suse-su-2016:0872-1 | Security update for fetchmail | 2016-03-24T07:55:46Z | 2016-03-24T07:55:46Z |
| suse-su-2016:0873-1 | Security update for xen | 2016-03-24T08:10:03Z | 2016-03-24T08:10:03Z |
| suse-su-2016:0884-1 | Security update for ghostscript | 2016-03-24T11:41:17Z | 2016-03-24T11:41:17Z |
| suse-su-2016:0905-1 | Security update for samba | 2016-03-29T11:30:33Z | 2016-03-29T11:30:33Z |
| suse-su-2016:0911-1 | Security update for the Linux Kernel | 2016-03-30T09:59:17Z | 2016-03-30T09:59:17Z |
| suse-su-2016:0909-1 | Security update for MozillaFirefox, mozilla-nspr, mozilla-nss | 2016-03-30T10:06:02Z | 2016-03-30T10:06:02Z |
| suse-su-2016:0912-1 | Security update for pidgin-otr | 2016-03-30T14:31:27Z | 2016-03-30T14:31:27Z |
| suse-su-2016:0908-2 | Security update for gcc5 | 2016-03-30T15:05:30Z | 2016-03-30T15:05:30Z |
| suse-su-2016:0924-1 | Security update for python-Pillow | 2016-03-31T12:18:26Z | 2016-03-31T12:18:26Z |
| suse-su-2016:0923-1 | Security update for libvirt | 2016-03-31T12:19:00Z | 2016-03-31T12:19:00Z |
| suse-su-2016:0931-1 | Security update for libvirt | 2016-04-01T08:28:33Z | 2016-04-01T08:28:33Z |
| suse-su-2016:0935-1 | Security update for python-Pillow | 2016-04-01T13:29:16Z | 2016-04-01T13:29:16Z |
| suse-su-2016:0936-1 | Security update for quagga | 2016-04-01T14:16:54Z | 2016-04-01T14:16:54Z |
| suse-su-2016:0946-1 | Security update for quagga | 2016-04-04T08:33:47Z | 2016-04-04T08:33:47Z |
| suse-su-2016:0954-1 | Security update for quagga | 2016-04-05T10:26:47Z | 2016-04-05T10:26:47Z |
| suse-su-2016:0953-1 | Security update for quagga | 2016-04-05T10:28:10Z | 2016-04-05T10:28:10Z |
| suse-su-2016:0955-1 | Security update for xen | 2016-04-05T11:27:02Z | 2016-04-05T11:27:02Z |
| suse-su-2016:0956-1 | Security update for java-1_7_0-openjdk | 2016-04-05T12:38:17Z | 2016-04-05T12:38:17Z |
| suse-su-2016:0957-1 | Security update for java-1_8_0-openjdk | 2016-04-05T12:38:30Z | 2016-04-05T12:38:30Z |
| suse-su-2016:0959-1 | Security update for java-1_7_0-openjdk | 2016-04-05T12:38:37Z | 2016-04-05T12:38:37Z |
| suse-su-2016:0963-1 | Security update for gcc5 | 2016-04-06T14:26:59Z | 2016-04-06T14:26:59Z |
| suse-su-2016:0967-1 | Security update for rubygem-actionpack-3_2 | 2016-04-07T07:10:35Z | 2016-04-07T07:10:35Z |
| suse-su-2016:0968-1 | Security update for rubygem-activesupport-3_2 | 2016-04-07T07:11:26Z | 2016-04-07T07:11:26Z |
| suse-su-2016:0970-1 | Security update for salt | 2016-04-07T09:27:45Z | 2016-04-07T09:27:45Z |
| suse-su-2016:0972-1 | Security update for salt | 2016-04-07T09:27:50Z | 2016-04-07T09:27:50Z |
| suse-su-2016:0990-1 | Security update for flash-player | 2016-04-08T11:31:41Z | 2016-04-08T11:31:41Z |
| suse-su-2016:0994-1 | Security update for krb5 | 2016-04-08T13:36:44Z | 2016-04-08T13:36:44Z |
| suse-su-2016:1010-1 | Security update for mercurial | 2016-04-12T08:38:59Z | 2016-04-12T08:38:59Z |
| suse-su-2016:1011-1 | Security update for mercurial | 2016-04-12T08:39:57Z | 2016-04-12T08:39:57Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2019:2259-1 | Security update for python-numpy | 2019-10-06T08:20:28Z | 2019-10-06T08:20:28Z |
| opensuse-su-2019:2260-1 | Security update for MozillaFirefox | 2019-10-06T09:57:06Z | 2019-10-06T09:57:06Z |
| opensuse-su-2019:2263-1 | Security update for bind | 2019-10-06T09:57:35Z | 2019-10-06T09:57:35Z |
| opensuse-su-2019:2264-1 | Security update for nginx | 2019-10-06T09:57:45Z | 2019-10-06T09:57:45Z |
| opensuse-su-2019:2265-1 | Security update for bind | 2019-10-06T09:57:56Z | 2019-10-06T09:57:56Z |
| opensuse-su-2019:2268-1 | Security update for openssl-1_0_0 | 2019-10-06T09:58:17Z | 2019-10-06T09:58:17Z |
| opensuse-su-2019:2269-1 | Security update for openssl-1_0_0 | 2019-10-06T09:58:29Z | 2019-10-06T09:58:29Z |
| opensuse-su-2019:2271-1 | Security update for php7 | 2019-10-06T16:19:36Z | 2019-10-06T16:19:36Z |
| opensuse-su-2019:2276-1 | Security update for putty | 2019-10-07T12:22:30Z | 2019-10-07T12:22:30Z |
| opensuse-su-2019:2277-1 | Security update for putty | 2019-10-07T12:22:43Z | 2019-10-07T12:22:43Z |
| opensuse-su-2019:2278-1 | Security update for dovecot23 | 2019-10-07T14:20:52Z | 2019-10-07T14:20:52Z |
| opensuse-su-2019:2279-1 | Security update for jasper | 2019-10-07T14:20:59Z | 2019-10-07T14:20:59Z |
| opensuse-su-2019:2280-1 | Security update for libseccomp | 2019-10-07T14:21:04Z | 2019-10-07T14:21:04Z |
| opensuse-su-2019:2281-1 | Security update for dovecot23 | 2019-10-07T14:21:10Z | 2019-10-07T14:21:10Z |
| opensuse-su-2019:2282-1 | Security update for jasper | 2019-10-07T14:21:19Z | 2019-10-07T14:21:19Z |
| opensuse-su-2019:2283-1 | Security update for libseccomp | 2019-10-07T14:21:24Z | 2019-10-07T14:21:24Z |
| opensuse-su-2019:2286-1 | Security update for lxc | 2019-10-07T15:30:53Z | 2019-10-07T15:30:53Z |
| opensuse-su-2019:2288-1 | Security update for singularity | 2019-10-07T15:31:24Z | 2019-10-07T15:31:24Z |
| opensuse-su-2019:2292-1 | Security update for putty | 2019-10-07T22:22:03Z | 2019-10-07T22:22:03Z |
| opensuse-su-2019:2294-1 | Security update for rust | 2019-10-08T12:19:04Z | 2019-10-08T12:19:04Z |
| opensuse-su-2019:2298-1 | Security update for sqlite3 | 2019-10-08T16:24:16Z | 2019-10-08T16:24:16Z |
| opensuse-su-2019:2300-1 | Security update for sqlite3 | 2019-10-08T16:24:35Z | 2019-10-08T16:24:35Z |
| opensuse-su-2019:2306-1 | Security update for libopenmpt | 2019-10-10T14:20:04Z | 2019-10-10T14:20:04Z |
| opensuse-su-2019:2307-1 | Security update for the Linux Kernel | 2019-10-10T18:21:01Z | 2019-10-10T18:21:01Z |
| opensuse-su-2019:2308-1 | Security update for the Linux Kernel | 2019-10-10T18:22:11Z | 2019-10-10T18:22:11Z |
| opensuse-su-2019:2311-1 | Security update for chromium | 2019-10-12T15:00:14Z | 2019-10-12T15:00:14Z |
| opensuse-su-2019:2312-1 | Security update for chromium | 2019-10-12T15:00:34Z | 2019-10-12T15:00:34Z |
| opensuse-su-2019:2313-1 | Security update for chromium | 2019-10-14T04:19:47Z | 2019-10-14T04:19:47Z |
| opensuse-su-2019:2314-1 | Security update for chromium | 2019-10-14T04:20:09Z | 2019-10-14T04:20:09Z |
| opensuse-su-2019:2316-1 | Security update for sudo | 2019-10-15T04:53:54Z | 2019-10-15T04:53:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00693 | QPR Portal验证绕过漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00694 | iPass Open Mobile Windows Client远程代码执行漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00695 | PolarSSL 'asn1parse.c'远程代码执行漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00696 | ManageEngine ServiceDesk Plus权限提升漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00697 | ManageEngine ServiceDesk Plus 'search' 参数用户枚举漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00698 | SAP Adaptive Server Enterprise SQL注入漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00699 | SAP NetWeaver AS ABAP XML外部实体漏洞 | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00700 | PrestaShop跨站脚本漏洞(CNVD-2015-00700) | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00709 | Google Chrome Blink拒绝服务漏洞(CNVD-2015-00709) | 2015-01-27 | 2015-01-28 |
| cnvd-2015-00719 | GNU glibc远程堆缓冲区溢出漏洞 | 2015-01-28 | 2015-01-28 |
| cnvd-2015-00721 | Apache Qpid不完整修复拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00722 | Apache Qpid安全绕过漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00723 | Marked模块跨站脚本漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00724 | IBM i Access for Windows本地缓冲区溢出漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00725 | IBM Tivoli Monitoring远程命令执行漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00726 | Bugzilla存在多个漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00727 | Apple MAC OS X Yosemite任意代码执行漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00728 | 多个Android Devices存在拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00729 | Vala 'Gst.MapInfo()'函数拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00730 | Free Reprintables ArticleFR SQL注入漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00731 | Free Reprintables ArticleFR跨站脚本漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00732 | Two Pilots Exif Pilot缓冲区溢出漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00733 | WordPress插件Pixabay Images跨站脚本漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00734 | WordPress插件Pixabay Images目录遍历漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00735 | CatBot SQL注入漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00736 | Joyent Node.js Sequelize SQL注入漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00737 | Joyent Node.js marked不完整黑名单漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00738 | LibTIFF除零错误拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00739 | LibTIFF越界读写拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| cnvd-2015-00740 | Cisco 2900 Series Integrated Services Router拒绝服务漏洞 | 2015-01-28 | 2015-01-29 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2003-avi-207 | Vulnérabilité sur le navigateur Apple Safari | 2003-12-12T00:00:00.000000 | 2003-12-12T00:00:00.000000 |
| certa-2003-avi-208 | Multiples vulnérabilités du garde-barrière PIX de Cisco | 2003-12-16T00:00:00.000000 | 2003-12-16T00:00:00.000000 |
| certa-2003-avi-209 | Multiples vulnérabilités du module Cisco Firewall Services (FWSM) | 2003-12-16T00:00:00.000000 | 2003-12-16T00:00:00.000000 |
| certa-2003-avi-210 | Vulnérabilité de lftp | 2003-12-16T00:00:00.000000 | 2004-01-06T00:00:00.000000 |
| certa-2003-avi-211 | Multiples vulnérabilités sous Solaris | 2003-12-16T00:00:00.000000 | 2003-12-16T00:00:00.000000 |
| certa-2003-avi-212 | Vulnérabilité de Net-SNMP | 2003-12-16T00:00:00.000000 | 2003-12-16T00:00:00.000000 |
| certa-2003-avi-213 | Vulnérabilité de Cisco ACNS | 2003-12-16T00:00:00.000000 | 2003-12-16T00:00:00.000000 |
| certa-2003-avi-214 | Vulnérabilité de DameWare Mini Remote Control | 2003-12-16T00:00:00.000000 | 2003-12-16T00:00:00.000000 |
| certa-2003-avi-215 | Vulnérabilité des interpréteurs XML de serveurs WEB (SOAP) | 2003-12-18T00:00:00.000000 | 2003-12-18T00:00:00.000000 |
| certa-2003-avi-216 | Faille dans le serveur CVS | 2003-12-22T00:00:00.000000 | 2004-01-14T00:00:00.000000 |
| certa-2003-avi-217 | Vulnérabilité sur Macromedia FlashPlayer | 2003-12-29T00:00:00.000000 | 2003-12-29T00:00:00.000000 |
| certa-2004-avi-409 | Nombreuses failles du noyau Linux | 2004-01-04T00:00:00.000000 | 2005-01-20T00:00:00.000000 |
| certa-2004-avi-001 | Multiples vulnérabilités dans Apple MacOS X | 2004-01-05T00:00:00.000000 | 2004-01-05T00:00:00.000000 |
| certa-2004-avi-002 | Vulnérabilité du noyau linux | 2004-01-07T00:00:00.000000 | 2004-01-09T00:00:00.000000 |
| certa-2004-avi-003 | Vulnérabilités dans Ethereal | 2004-01-08T00:00:00.000000 | 2004-01-14T00:00:00.000000 |
| certa-2004-avi-004 | Vulnérabilité de Microsoft Internet Security and Acceleration Server 2000 | 2004-01-14T00:00:00.000000 | 2004-01-14T00:00:00.000000 |
| certa-2004-avi-005 | Vulnérabilité de Microsoft Exchange Server 2003 | 2004-01-14T00:00:00.000000 | 2004-01-14T00:00:00.000000 |
| certa-2004-avi-006 | Vulnérabilité de Microsoft Data Access Components | 2004-01-14T00:00:00.000000 | 2004-01-14T00:00:00.000000 |
| certa-2004-avi-007 | Vulnérabilité dans kdepim | 2004-01-15T00:00:00.000000 | 2004-05-12T00:00:00.000000 |
| certa-2004-avi-008 | Failles dans l'analyseur réseau tcpdump | 2004-01-15T00:00:00.000000 | 2004-05-12T00:00:00.000000 |
| certa-2004-avi-009 | Vulnérabilité dans l'utilitaire LiveUpdate de Symantec | 2004-01-15T00:00:00.000000 | 2004-01-15T00:00:00.000000 |
| certa-2004-avi-010 | Vulnérabilité de isakmpd | 2004-01-15T00:00:00.000000 | 2004-02-20T00:00:00.000000 |
| certa-2004-avi-011 | Vulnérabilité du serveur de news INN d'ISC | 2004-01-16T00:00:00.000000 | 2004-01-16T00:00:00.000000 |
| certa-2004-avi-012 | Faille dans la commande enq sous AIX | 2004-01-20T00:00:00.000000 | 2004-01-20T00:00:00.000000 |
| certa-2004-avi-013 | Vulnérabilité de la commande diag sous AIX | 2004-01-20T00:00:00.000000 | 2004-01-20T00:00:00.000000 |
| certa-2004-avi-014 | Vulnérabilité du service in.iked sous Solaris | 2004-01-22T00:00:00.000000 | 2004-01-22T00:00:00.000000 |
| certa-2004-avi-015 | Vulnérabilité dans NetScreen-Security Manager 2004 | 2004-01-22T00:00:00.000000 | 2004-01-22T00:00:00.000000 |
| certa-2004-avi-016 | Multiples vulnérabilités sous HP-UX | 2004-01-23T00:00:00.000000 | 2004-01-23T00:00:00.000000 |
| certa-2004-avi-017 | Multiples vulnérabilités de GAIM | 2004-01-29T00:00:00.000000 | 2004-05-13T00:00:00.000000 |
| certa-2004-avi-018 | Multiples vulnérabilités sous Mac OS X | 2004-01-29T00:00:00.000000 | 2004-01-29T00:00:00.000000 |