Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2002-1161 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1380. Reason: This candidate is a reservation duplicate of CVE-2002-1380. Notes: none | N/A | N/A | 2002-12-18T05:00:00 | 2004-01-26T10:00:00 |
| CVE-2004-0585 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0589. Reason: This candidate is a duplicate of CVE-2004-0589. Notes: All CVE users should reference CVE-2004-0589 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-06-23T04:00:00 | 2004-06-24T09:00:00 |
| CVE-2003-0351 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0306. Reason: This candidate is a reservation duplicate of CVE-2003-0306. Notes: All CVE users should reference CVE-2003-0306 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-08-20T04:00:00 | 2004-08-20T09:00:00 |
| CVE-2003-0598 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0657. Reason: This candidate is a reservation duplicate of CVE-2003-0657. Notes: All CVE users should reference CVE-2003-0657 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-08-14T04:00:00 | 2004-08-20T09:00:00 |
| CVE-2004-1159 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1122, CVE-2004-1314. Reason: this was an out-of-band assignment duplicate intended for one issue, but the description and references inadvertently combined multiple issues. Notes: All CVE users should consult CVE-2004-1122 and CVE-2004-1314 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-12-10T05:00:00 | 2004-12-22T10:00:00 |
| CVE-1999-0020 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0032. Reason: This candidate is a duplicate of CVE-1999-0032. Notes: All CVE users should reference CVE-1999-0032 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2000-02-04T05:00:00 | 2005-02-04T00:00:00 |
| CVE-1999-0110 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0315. Reason: This candidate's original description had a typo that delayed it from being detected as a duplicate of CVE-1999-0315. Notes: All CVE users should reference CVE-1999-0315 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2000-02-04T05:00:00 | 2005-02-04T00:00:00 |
| CVE-1999-0187 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0022. Reason: This candidate is a duplicate of CVE-1999-0022. Notes: All CVE users should reference CVE-1999-0022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2000-02-04T05:00:00 | 2005-02-04T00:00:00 |
| CVE-1999-1056 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1395. Reason: This candidate is a duplicate of CVE-1999-1395. Notes: All CVE users should reference CVE-1999-1395 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| CVE-1999-1108 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1107. Reason: This candidate is a duplicate of CVE-1999-1107. Notes: All CVE users should reference CVE-1999-1107 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| CVE-1999-1310 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1022. Reason: This candidate is a duplicate of CVE-1999-1022. Notes: All CVE users should reference CVE-1999-1022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| CVE-2002-0192 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0193, CVE-2002-1564. Reason: This candidate was published with a description that identified a different vulnerability than what was identified in the original authoritative reference. Notes: Consult CVE-2002-0193 or CVE-2002-1564 to find the identifier for the proper issue | N/A | N/A | 2002-05-17T04:00:00 | 2005-02-04T00:00:00 |
| CVE-2002-0828 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0862. Reason: This is a duplicate of CVE-2002-0862. Notes: All CVE users should reference CVE-2002-0862 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-08-07T04:00:00 | 2005-02-04T00:00:00 |
| CVE-2002-0646 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0371. Reason: This candidate is a reservation duplicate of CVE-2002-0371. Notes: CVE-2002-0371 should be used instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-10-15T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2002-1259 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1286. Reason: This candidate is a reservation duplicate of CVE-2002-1286. Notes: All CVE users should reference CVE-2002-1286 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-12-18T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2002-1263 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1295. Reason: This candidate is a reservation duplicate of CVE-2002-1295. Notes: All CVE users should reference CVE-2002-1295 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-01-03T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0157 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0138. Reason: This candidate is a reservation duplicate of CVE-2003-0138 due to incomplete coordination. Notes: All CVE users should reference CVE-2003-0138 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-03-21T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0158 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0139. Reason: This candidate is a reservation duplicate of CVE-2003-0139 due to incomplete coordination. Notes: All CVE users should reference CVE-2003-0139 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-03-21T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0591 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is a duplicate number that was created during the refinement phase. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-07-25T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0687 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has been revoked by its Candidate Numbering Authority (CNA) because it was internally assigned to a problem that was not reachable (the affected routine was not used by the software). Notes: none | N/A | N/A | 2004-06-03T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0790 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: the reported issue is not a vulnerability or exposure. Notes: This candidate was assigned to a "head-reading" bug in a component of fetchmail 6.2.4 and earlier, which was claimed to allow a denial of service. However, the bug is in a broken component of fetchmail that is not "reachable" by any execution path, so it cannot be triggered by any sort of attack and is not exploitable | N/A | N/A | 2003-10-25T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0862 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0813. Reason: This candidate is a duplicate of CVE-2003-0813. Notes: All CVE users should reference CVE-2003-0813 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-10-15T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0867 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0662. Reason: This candidate is a duplicate of CVE-2003-0662. Notes: All CVE users should reference CVE-2003-0662 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-10-17T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0879 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0518. Reason: This candidate is a reservation duplicate of CVE-2003-0518. Notes: All CVE users should reference CVE-2003-0518 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-10-28T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-0964 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: N/A. Notes: none | N/A | N/A | 2003-10-01T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-1047 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0540. Reason: This candidate is a duplicate of CVE-2004-0540. Notes: All CVE users should reference CVE-2004-0540 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-06-08T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2003-1565 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1565. Reason: This candidate is a duplicate of CVE-2002-1565. Notes: All CVE users should reference CVE-2002-1565 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-08-05T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0076 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was removed from consideration by its Candidate Numbering Authority. Notes: none | N/A | N/A | 2004-06-03T04:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0187 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0185. Reason: This candidate is a reservation duplicate of CVE-2004-0185. Notes: All CVE users should reference CVE-2004-0185 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-03-04T05:00:00 | 2005-02-06T10:00:00 |
| CVE-2004-0472 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is a reservation duplicate of CVE-2004-0434. Notes: All CVE users should reference CVE-2004-0434 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-05-20T04:00:00 | 2005-02-06T10:00:00 |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0660 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. It might be more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A hacker utility, back door, or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc. | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| CVE-1999-1056 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1395. Reason: This candidate is a duplicate of CVE-1999-1395. Notes: All CVE users should reference CVE-1999-1395 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| CVE-1999-1108 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1107. Reason: This candidate is a duplicate of CVE-1999-1107. Notes: All CVE users should reference CVE-1999-1107 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| CVE-1999-1310 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1022. Reason: This candidate is a duplicate of CVE-1999-1022. Notes: All CVE users should reference CVE-1999-1022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| CVE-1999-1594 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:41:36 | 2020-11-05T19:41:36 |
| CVE-1999-1595 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:42:07 | 2020-11-05T19:42:07 |
| CVE-1999-1596 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:42:39 | 2020-11-05T19:42:39 |
| CVE-1999-1597 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:43:12 | 2020-11-05T19:43:12 |
| CVE-1999-1598 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:43:30 | 2020-11-05T19:43:30 |
| CVE-2000-0744 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2000-0743. Reason: This candidate is a duplicate of CVE-2000-0743. Notes: All CVE users should reference CVE-2000-0743 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2000-10-13T04:00:00 | 2022-08-17T02:58:08 |
| CVE-2000-1248 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:44:14 | 2020-11-05T19:44:14 |
| CVE-2000-1249 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:44:37 | 2020-11-05T19:44:37 |
| CVE-2000-1250 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:45:01 | 2020-11-05T19:45:01 |
| CVE-2000-1251 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:45:28 | 2020-11-05T19:45:28 |
| CVE-2000-1252 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:46:12 | 2020-11-05T19:46:12 |
| CVE-2001-0654 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0655 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0656 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0657 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0798 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0802 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0810 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0811 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0812 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0813 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-0814 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| CVE-2001-1121 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-1084. Reason: This candidate is a duplicate of CVE-2001-1084. Notes: All CVE users should reference CVE-2001-1084 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-06-25T04:00:00 | 2022-08-17T03:00:22 |
| CVE-2001-1167 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-0976. Reason: This candidate is a duplicate of CVE-2001-0976. Notes: CVE-2001-0976 should be used instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-03-15T05:00:00 | 2002-03-22T10:00:00 |
| CVE-2001-1492 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-1460. Reason: This candidate is a refinement duplicate of CVE-2001-1460. Notes: All CVE users should reference CVE-2001-1460 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-06-21T04:00:00 | 2005-07-12T09:00:00 |
| CVE-2001-1588 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2020-11-05T19:46:42 | 2020-11-05T19:46:42 |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-1999-0660 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is no… | 1999-01-01T05:00:00.000 | 2023-11-07T01:55:00.443 |
| fkie_cve-1999-1056 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1395. Reason: This candid… | 1992-12-31T05:00:00.000 | 2023-11-07T01:55:06.290 |
| fkie_cve-1999-1108 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1107. Reason: This candid… | 1998-11-18T05:00:00.000 | 2023-11-07T01:55:06.680 |
| fkie_cve-1999-1310 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1022. Reason: This candid… | 1994-11-04T05:00:00.000 | 2023-11-07T01:55:08.250 |
| fkie_cve-1999-1594 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.613 | 2023-11-07T01:55:10.620 |
| fkie_cve-1999-1595 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.693 | 2023-11-07T01:55:10.873 |
| fkie_cve-1999-1596 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.753 | 2023-11-07T01:55:11.093 |
| fkie_cve-1999-1597 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.817 | 2023-11-07T01:55:11.307 |
| fkie_cve-1999-1598 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.897 | 2023-11-07T01:55:11.520 |
| fkie_cve-2000-0744 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2000-0743. Reason: This candidat… | 2000-10-20T04:00:00.000 | 2023-11-07T01:55:23.877 |
| fkie_cve-2000-1248 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.973 | 2023-11-07T01:55:29.043 |
| fkie_cve-2000-1249 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.037 | 2023-11-07T01:55:29.257 |
| fkie_cve-2000-1250 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.097 | 2023-11-07T01:55:29.467 |
| fkie_cve-2000-1251 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.177 | 2023-11-07T01:55:29.743 |
| fkie_cve-2000-1252 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.240 | 2023-11-07T01:55:29.953 |
| fkie_cve-2001-0654 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.167 | 2023-11-07T01:55:35.133 |
| fkie_cve-2001-0655 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.197 | 2023-11-07T01:55:35.370 |
| fkie_cve-2001-0656 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.230 | 2023-11-07T01:55:35.600 |
| fkie_cve-2001-0657 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.243 | 2023-11-07T01:55:35.810 |
| fkie_cve-2001-0798 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.277 | 2023-11-07T01:55:37.277 |
| fkie_cve-2001-0802 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.290 | 2023-11-07T01:55:37.520 |
| fkie_cve-2001-0810 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.323 | 2023-11-07T01:55:37.937 |
| fkie_cve-2001-0811 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.353 | 2023-11-07T01:55:38.150 |
| fkie_cve-2001-0812 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.387 | 2023-11-07T01:55:38.367 |
| fkie_cve-2001-0813 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.417 | 2023-11-07T01:55:38.583 |
| fkie_cve-2001-0814 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.433 | 2023-11-07T01:55:38.803 |
| fkie_cve-2001-1121 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-1084. Reason: This candidat… | 2001-07-02T04:00:00.000 | 2023-11-07T01:55:41.453 |
| fkie_cve-2001-1167 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-0976. Reason: This candid… | 2001-08-28T04:00:00.000 | 2023-11-07T01:55:41.797 |
| fkie_cve-2001-1492 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-1460. Reason: This candid… | 2001-12-31T05:00:00.000 | 2023-11-07T01:55:44.577 |
| fkie_cve-2001-1588 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.300 | 2023-11-07T01:55:45.377 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-995j-587r-259w |
|
Moderate severity vulnerability that affects rack-mini-profiler | 2018-08-13T20:46:58Z | 2020-06-16T21:42:03Z |
| ghsa-35c4-f3rq-f9g3 |
|
Moderate severity vulnerability that affects activesupport | 2018-09-17T21:57:23Z | 2020-06-16T21:42:52Z |
| ghsa-crvj-3gj9-gm2p |
|
High severity vulnerability that affects qs | 2018-10-09T00:44:29Z | 2020-06-16T21:43:40Z |
| ghsa-qpwj-mvv7-v3m9 |
|
High severity vulnerability that affects org.apache.cxf.fediz:fediz-spring and org.apache.cxf.fediz… | 2018-10-18T16:57:10Z | 2020-06-16T21:52:31Z |
| ghsa-mrhj-2g4v-39qx |
|
Moderate severity vulnerability that affects rails-html-sanitizer | 2018-09-17T21:58:19Z | 2020-06-16T21:54:12Z |
| ghsa-9vc2-p34x-jhxh |
|
Moderate severity vulnerability that affects rack | 2018-09-17T21:56:30Z | 2020-06-16T21:54:47Z |
| ghsa-v76m-f5cx-8rg4 |
|
Moderate severity vulnerability that affects DotNetNuke.Core | 2018-10-16T19:33:25Z | 2020-06-16T21:57:07Z |
| ghsa-v7q8-wvvh-c97p |
|
Moderate severity vulnerability that affects Zope2 | 2018-07-23T19:51:28Z | 2020-06-16T21:57:13Z |
| ghsa-w3gh-g32m-cvhr |
|
High severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fediz:fe… | 2018-10-18T16:56:47Z | 2020-06-16T21:59:21Z |
| ghsa-3233-rgx3-c2wh |
|
Moderate severity vulnerability that affects mustache | 2018-10-09T00:38:09Z | 2020-06-16T21:59:24Z |
| ghsa-w4x9-4f5x-8jj8 |
|
Low severity vulnerability that affects org.apache.hive:hive-exec, org.apache.hive:hive, and o… | 2018-11-21T22:23:29Z | 2020-06-16T21:59:37Z |
| ghsa-whw7-h25v-9qvx |
|
Moderate severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fedi… | 2018-10-18T16:56:38Z | 2020-06-16T22:00:38Z |
| ghsa-xpwp-rq3x-x6v7 |
|
Critical severity vulnerability that affects recurly-api-client | 2018-10-16T17:35:04Z | 2020-06-16T22:03:58Z |
| ghsa-xv6v-72hh-g6g2 |
|
Moderate severity vulnerability that affects org.owasp.antisamy:antisamy | 2018-10-18T17:22:26Z | 2020-06-16T22:04:31Z |
| ghsa-pgv6-jrvv-75jp |
|
Moderate severity vulnerability that affects send | 2018-10-09T00:34:30Z | 2020-06-16T22:04:41Z |
| ghsa-32f7-cmr3-vpjv |
|
Moderate severity vulnerability that affects aioxmpp | 2019-02-07T18:18:30Z | 2020-06-17T15:14:32Z |
| ghsa-5p9f-55j8-922m |
|
Moderate severity vulnerability that affects doorkeeper | 2018-08-13T20:49:10Z | 2020-06-17T15:14:35Z |
| ghsa-82x2-g7vr-39wq |
|
Moderate severity vulnerability that affects web-console | 2018-08-13T20:48:09Z | 2020-06-17T15:14:38Z |
| ghsa-8474-rc7c-wrhp |
|
High severity vulnerability that affects safemode | 2018-08-08T22:29:10Z | 2020-06-17T15:14:40Z |
| ghsa-9wcm-rrvh-qjc8 |
|
High severity vulnerability that affects colorscore | 2018-08-15T20:03:53Z | 2020-06-17T15:14:43Z |
| ghsa-g6f4-j6c2-w3p3 |
|
High severity vulnerability that affects uglify-js | 2018-10-09T00:39:43Z | 2020-06-17T15:14:46Z |
| ghsa-hm48-76wh-q86v |
|
High severity vulnerability that affects activerecord | 2018-08-21T19:03:17Z | 2020-06-17T15:14:48Z |
| ghsa-hxf5-mg84-pj4m |
|
Moderate severity vulnerability that affects moment | 2018-07-31T23:03:17Z | 2020-06-17T15:14:53Z |
| ghsa-qc8j-m8j3-rjq6 |
|
Moderate severity vulnerability that affects rails-html-sanitizer | 2018-09-17T21:57:58Z | 2020-06-17T15:15:01Z |
| ghsa-qf5x-qgx7-437h |
|
Moderate severity vulnerability that affects actionpack | 2018-09-17T21:54:11Z | 2020-06-17T15:15:04Z |
| ghsa-r53m-pfr5-7v87 |
|
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core | 2019-04-18T14:50:19Z | 2020-06-17T15:15:06Z |
| ghsa-vxp4-25qp-86qh |
|
Moderate severity vulnerability that affects ember | 2017-10-24T18:33:36Z | 2020-06-17T15:15:14Z |
| ghsa-w655-w578-99pq |
|
High severity vulnerability that affects espeak-ruby | 2018-08-21T17:09:08Z | 2020-06-17T15:15:17Z |
| ghsa-wxvm-fh75-mpgr |
|
Critical severity vulnerability that affects dns-sync | 2018-07-26T16:24:34Z | 2020-06-17T15:15:19Z |
| ghsa-9959-c6q6-6qp3 |
|
Moderate severity vulnerability that affects validator | 2017-10-24T18:33:36Z | 2020-06-17T16:30:41Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2019-13 |
|
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x b… | django | 2019-08-09T13:15:00Z | 2019-08-28T13:15:00Z |
| pysec-2019-104 |
|
** DISPUTED ** core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-r… | mitogen | 2019-08-18T20:15:00Z | 2019-08-30T11:38:00Z |
| pysec-2019-23 |
|
All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect… | httpie | 2019-08-23T17:15:00Z | 2019-09-02T18:15:00Z |
| pysec-2019-140 |
|
Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN rand… | werkzeug | 2019-08-09T15:15:00Z | 2019-09-11T00:15:00Z |
| pysec-2019-133 |
|
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired s… | urllib3 | 2019-04-18T21:29:00Z | 2019-09-14T18:15:00Z |
| pysec-2019-126 |
|
** DISPUTED ** In Supervisor through 4.0.2, an unauthenticated user can read log files or… | supervisor | 2019-09-10T17:15:00Z | 2019-09-17T22:15:00Z |
| pysec-2019-108 |
|
** DISPUTED ** An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle … | numpy | 2019-01-16T05:29:00Z | 2019-10-01T00:15:00Z |
| pysec-2019-41 |
|
psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of r… | psutil | 2019-11-12T02:15:00Z | 2019-11-18T21:15:00Z |
| pysec-2019-116 |
|
Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper … | rediswrapper | 2019-10-05T23:15:00Z | 2019-12-09T19:06:00Z |
| pysec-2017-50 |
|
Lemur 0.1.4 does not use sufficient entropy in its IV when encrypting AES in CBC mode. | lemur | 2017-08-09T16:29:00Z | 2019-12-11T21:22:00Z |
| pysec-2019-105 |
|
The modoboa-dmarc plugin 1.1.0 for Modoboa is vulnerable to an XML External Entity Inject… | modoboa-dmarc | 2019-12-10T20:15:00Z | 2019-12-19T15:11:00Z |
| pysec-2019-173 |
|
In Apache Incubator Superset before 0.32, a user can view database names that he has no a… | apache-superset | 2019-12-16T22:15:00Z | 2019-12-19T18:24:00Z |
| pysec-2019-29 |
|
OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials … | keystone | 2019-12-09T18:15:00Z | 2019-12-20T00:15:00Z |
| pysec-2019-112 |
|
In Archery before 1.3, inserting an XSS payload into a project name (either by creating a… | pyarchery | 2019-12-26T23:15:00Z | 2020-01-02T14:27:00Z |
| pysec-2019-16 |
|
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A … | django | 2019-12-18T19:15:00Z | 2020-01-08T04:15:00Z |
| pysec-2019-125 |
|
Valve Steam Client before 2019-09-12 allows placing or appending partially controlled fil… | steam | 2019-10-04T20:15:00Z | 2020-01-16T13:15:00Z |
| pysec-2020-162 |
|
In Apache Airflow before 1.10.5 when running with the "classic" UI, a malicious admin use… | apache-airflow | 2020-01-14T17:15:00Z | 2020-01-21T16:21:00Z |
| pysec-2020-146 |
|
TUF (aka The Update Framework) 0.7.2 through 0.12.1 allows Uncontrolled Resource Consumption. | tuf | 2020-01-14T19:15:00Z | 2020-01-21T19:55:00Z |
| pysec-2020-85 |
|
An open redirect on the login form (and possibly other places) in Plone 4.0 through 5.2.1… | plone | 2020-01-23T21:15:00Z | 2020-01-24T21:32:00Z |
| pysec-2020-90 |
|
A privilege escalation issue in plone.app.contenttypes in Plone 4.3 through 5.2.1 allows … | plone | 2020-01-23T21:15:00Z | 2020-01-24T22:44:00Z |
| pysec-2020-89 |
|
Missing password strength checks on some forms in Plone 4.3 through 5.2.0 allow users to … | plone | 2020-01-23T21:15:00Z | 2020-01-24T22:52:00Z |
| pysec-2020-88 |
|
SQL Injection in DTML or in connection objects in Plone 4.0 through 5.2.1 allows users to… | plone | 2020-01-23T21:15:00Z | 2020-01-24T23:00:00Z |
| pysec-2020-87 |
|
plone.restapi in Plone 5.2.0 through 5.2.1 allows users with a certain privilege level to… | plone | 2020-01-23T21:15:00Z | 2020-01-24T23:03:00Z |
| pysec-2020-86 |
|
An XSS issue in the title field in Plone 5.0 through 5.2.1 allows users with a certain pr… | plone | 2020-01-23T21:15:00Z | 2020-01-24T23:07:00Z |
| pysec-2020-94 |
|
PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped an… | pysaml2 | 2020-01-13T19:15:00Z | 2020-01-27T18:15:00Z |
| pysec-2020-178 |
|
Waitress through version 1.3.1 allows request smuggling by sending the Content-Length hea… | waitress | 2020-01-22T19:15:00Z | 2020-01-30T17:07:00Z |
| pysec-2020-81 |
|
libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, rela… | pillow | 2020-01-03T01:15:00Z | 2020-01-31T04:15:00Z |
| pysec-2020-156 |
|
flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is… | webargs | 2020-01-29T15:15:00Z | 2020-02-03T16:36:00Z |
| pysec-2019-22 |
|
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4… | freeipa | 2019-11-27T08:15:00Z | 2020-02-05T00:15:00Z |
| pysec-2019-28 |
|
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4… | ipa | 2019-11-27T09:15:00Z | 2020-02-05T00:15:00Z |
| ID | Description | Type |
|---|---|---|
| tid-215 | If the firmware/software update is not encrypted at rest in storage it can be reverse eng… | system-software |
| tid-216 | Firmware updates will oftentimes include fixes to security vulnerabilities, meaning that … | system-software |
| tid-217 | When firmware/software update process is initiated on a device, it may enter a different … | system-software |
| tid-218 | A threat actor may be able to install a rootkit that can manipulate the operating system … | system-software |
| tid-219 | Operating Systems and Kernels frequently run at the highest levels of permissions. If pro… | system-software |
| tid-220 | Hardware roots of trust can be used to support many desirable device security functions, … | system-software |
| tid-221 | Some devices will allow for authentication over the network, but do not implement mechani… | system-software |
| tid-222 | Various devices and associated services are necessary to support communications and conne… | system-software |
| tid-223 | If the threat actor can obtain sufficient privileges on the devices, they may be able to … | system-software |
| tid-224 | If a device has debugging capabilities (e.g., diagnostic tools, debug logs, etc.) that ar… | system-software |
| tid-225 | Threat actors may try to manipulate logs on the device to evade defenses, confuse inciden… | system-software |
| tid-226 | Some devise will login information that can be exploited by attackers to further their at… | system-software |
| tid-301 | A threat actor could modify application-level binaries or libraries on the device to intr… | application-software |
| tid-302 | A threat actor can install a malicious program to the device to manipulate its operations… | application-software |
| tid-303 | If device management is intended to be performed by a dedicated engineering software plat… | application-software |
| tid-304 | A threat actor can manipulate the runtime environments on a device to maintain persistenc… | application-software |
| tid-305 | If the device allows the downloading and execution of native binaries on the device, a th… | application-software |
| tid-306 | While restricting the execution of external programs within a sandboxed execution environ… | application-software |
| tid-307 | Many devices that allow the execution of custom application programs, such as IEC 61131 b… | application-software |
| tid-308 | The threat actor can overwrite a previously deployed/installed malicious program with a d… | application-software |
| tid-309 | If the integrated development environment (IDE) or vendor software that is used to manage… | application-software |
| tid-310 | If an application does not authenticate all connections from a remote device or system, a… | application-software |
| tid-311 | Devices often include default credentials from the vendor. Default credentials can be cha… | application-software |
| tid-312 | A device’s credential change mechanisms can be abused to lock out users from their own de… | application-software |
| tid-313 | A threat actor can change or reset a password or credential without being authenticated. … | application-software |
| tid-314 | A threat actor could gain unauthorized access by continually guessing passwords. This cou… | application-software |
| tid-315 | If the device includes a password retrieval mechanism, a threat actor could use that mech… | application-software |
| tid-316 | Certificate-based authentication depends on the correct parsing and validation of an X.50… | application-software |
| tid-317 | If the device does not generate sufficiently random cryptographic primitives, a threat ac… | application-software |
| tid-318 | The device uses a cryptographic library or implementation that either introduces an addit… | application-software |
| ID | Description | Updated |
|---|---|---|
| gsd-2012-6497 | Ruby on Rails contains a flaw in the Authlogic gem. The issue is triggered when the progr… | 2012-12-21T00:00:00.000Z |
| gsd-2012-6496 | Due to the way dynamic finders in Active Record extract options from method parameters, a… | 2012-12-22T00:00:00.000Z |
| gsd-2013-0183 | multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attac… | 2013-01-07T00:00:00.000Z |
| gsd-2013-0155 | Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not … | 2013-01-08T00:00:00.000Z |
| gsd-2013-0156 | active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before … | 2013-01-08T00:00:00.000Z |
| gsd-2013-1802 | extlib Gem for Ruby contains a flaw that is triggered when a type casting error occurs du… | 2013-01-08T00:00:00.000Z |
| gsd-2013-1800 | The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string value… | 2013-01-09T00:00:00.000Z |
| gsd-2013-0285 | The Ruby Gem nori has a parameter parsing error that may allow an attacker to execute arb… | 2013-01-10T00:00:00.000Z |
| gsd-2013-0175 | The multi_xml Gem for Ruby contains a flaw that is triggered when an error occurs during … | 2013-01-11T00:00:00.000Z |
| gsd-2013-0184 | Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x before 1.1.5, 1.2.… | 2013-01-13T00:00:00.000Z |
| gsd-2013-1801 | httparty Gem for Ruby contains a flaw that is triggered when a type casting error occurs … | 2013-01-14T00:00:00.000Z |
| gsd-2013-0233 | Devise contains a flaw that is triggered during when a type conversion error occurs durin… | 2013-01-28T00:00:00.000Z |
| gsd-2013-0333 | lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x b… | 2013-01-28T00:00:00.000Z |
| gsd-2013-0256 | darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, … | 2013-02-06T00:00:00.000Z |
| gsd-2013-0262 | rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attack… | 2013-02-07T00:00:00.000Z |
| gsd-2013-0263 | Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10… | 2013-02-07T00:00:00.000Z |
| gsd-2013-0276 | ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12… | 2013-02-11T00:00:00.000Z |
| gsd-2013-0277 | ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers … | 2013-02-11T00:00:00.000Z |
| gsd-2013-0269 | The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows rem… | 2013-02-12T00:00:00.000Z |
| gsd-2013-1756 | Dragonfly Gem for Ruby contains a flaw that is triggered during the parsing of a speciall… | 2013-02-19T00:00:00.000Z |
| gsd-2013-0162 | The diff_pp function in lib/gauntlet_rubyparser.rb in the ruby_parser gem 3.1.1 and earli… | 2013-02-21T00:00:00.000Z |
| gsd-2013-1607 | PDFKit Gem for Ruby contains a flaw that is due to the program failing to properly valida… | 2013-02-21T00:00:00.000Z |
| gsd-2013-1656 | Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instanti… | 2013-02-21T00:00:00.000Z |
| gsd-2013-2506 | Spree contains a flaw that leads to unauthorized privileges being gained. The issue is tr… | 2013-02-21T00:00:00.000Z |
| gsd-2013-2512 | ftpd Gem for Ruby contains a flaw that is triggered when handling a specially crafted opt… | 2013-02-28T00:00:00.000Z |
| gsd-2013-2516 | fileutils Gem for Ruby contains a flaw in file_utils.rb. The issue is triggered when hand… | 2013-02-28T00:00:00.000Z |
| gsd-2013-2513 | flash_tool Gem for Ruby contains a flaw that is triggered during the handling of download… | 2013-03-04T00:00:00.000Z |
| gsd-2013-2616 | MiniMagick Gem for Ruby contains a flaw that is triggered during the handling of speciall… | 2013-03-12T00:00:00.000Z |
| gsd-2013-2617 | lib/curl.rb in the Curl Gem for Ruby allows remote attackers to execute arbitrary command… | 2013-03-12T00:00:00.000Z |
| gsd-2013-2615 | fastreader Gem for Ruby contains a flaw that is triggered during the handling of speciall… | 2013-03-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-231 | Malicious code in @epc-apps/api-generic-plan (npm) | 2022-05-16T07:13:13Z | 2022-05-16T07:13:14Z |
| mal-2022-238 | Malicious code in @epc-infra/clinstestpackage (npm) | 2022-05-16T07:13:13Z | 2022-05-16T07:13:14Z |
| mal-2022-239 | Malicious code in @epc-infra/dns-stack (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-240 | Malicious code in @epc-infra/dynamo-stack (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-241 | Malicious code in @epc-infra/region-only-policy (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-242 | Malicious code in @epc-infra/stack-config (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-244 | Malicious code in @epc-libraries/cdk-custom-resources (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-233 | Malicious code in @epc-apps/api-management-plan (npm) | 2022-05-16T07:13:34Z | 2022-05-16T07:13:35Z |
| mal-2022-245 | Malicious code in @epc-libraries/data-api-versions (npm) | 2022-05-16T07:14:57Z | 2022-05-16T07:14:57Z |
| mal-2022-237 | Malicious code in @epc-infra/aurora-stack (npm) | 2022-05-16T07:15:02Z | 2022-05-16T07:15:02Z |
| mal-2022-246 | Malicious code in @epc-libraries/driver-outage-db (npm) | 2022-05-16T07:15:02Z | 2022-05-16T07:15:02Z |
| mal-2022-1929 | Malicious code in clinstestpackage (npm) | 2022-05-16T07:17:21Z | 2022-05-16T07:17:28Z |
| mal-2022-247 | Malicious code in @epc-libraries/kinesis-service (npm) | 2022-05-16T07:19:35Z | 2022-05-16T07:19:35Z |
| mal-2022-248 | Malicious code in @epc-libraries/utils (npm) | 2022-05-16T07:19:45Z | 2022-05-16T07:19:45Z |
| mal-2022-236 | Malicious code in @epc-infra/app-lookup-stack (npm) | 2022-05-16T07:19:51Z | 2022-05-16T07:19:51Z |
| mal-2022-1040 | Malicious code in api-extractor-test-01 (npm) | 2022-05-16T07:27:01Z | 2022-05-16T07:27:01Z |
| mal-2022-5577 | Malicious code in rainbow-bridge-testing (npm) | 2022-05-16T07:27:01Z | 2022-05-16T07:27:02Z |
| mal-2022-4264 | Malicious code in lbc-git (npm) | 2022-05-16T07:31:48Z | 2022-05-16T07:31:49Z |
| mal-2022-1823 | Malicious code in cap-common-pages (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| mal-2022-1824 | Malicious code in cap-products (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| mal-2022-1990 | Malicious code in coldstone-helpers (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| mal-2022-1991 | Malicious code in coldstone-sls (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| mal-2022-1645 | Malicious code in bolt-styles (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:41:01Z |
| mal-2022-1142 | Malicious code in assets-common (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:41:02Z |
| mal-2022-4291 | Malicious code in lexical-website-new (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:41:02Z |
| mal-2022-2826 | Malicious code in eslint-plugin-seller-ui-eslint-plugin (npm) | 2022-05-17T05:53:39Z | 2022-05-17T05:53:49Z |
| mal-2022-579 | Malicious code in @seller-ui/products (npm) | 2022-05-17T05:53:38Z | 2022-05-17T05:53:49Z |
| mal-2022-580 | Malicious code in @seller-ui/settings (npm) | 2022-05-17T05:53:39Z | 2022-05-17T05:53:49Z |
| mal-2022-7036 | Malicious code in wakakaa (npm) | 2022-05-17T06:28:02Z | 2022-05-17T06:28:03Z |
| mal-2022-7278 | Malicious code in xiawaa (npm) | 2022-05-17T06:28:02Z | 2022-05-17T06:28:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-2216 | Camunda: Schwachstelle ermöglicht Redirect-Angriff | 2022-12-01T23:00:00.000+00:00 | 2022-12-01T23:00:00.000+00:00 |
| wid-sec-w-2022-1683 | Microsoft Developer Tools: Mehrere Schwachstellen | 2022-10-11T22:00:00.000+00:00 | 2022-12-04T23:00:00.000+00:00 |
| wid-sec-w-2022-1788 | WordPress: Mehrere Schwachstellen | 2022-10-18T22:00:00.000+00:00 | 2022-12-04T23:00:00.000+00:00 |
| wid-sec-w-2022-2223 | Veritas NetBackup Flex Scale und Access Appliance: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2022-12-04T23:00:00.000+00:00 | 2022-12-04T23:00:00.000+00:00 |
| wid-sec-w-2022-2172 | ILIAS: Mehrere Schwachstellen | 2022-11-24T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-2221 | Google Chrome und Microsoft Edge: Schwachstelle ermöglicht Codeausführung | 2022-12-04T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-2225 | Intel BIOS: Mehrere Schwachstellen | 2022-02-08T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-2231 | Intel Server Boards BMC Firmware: Mehrere Schwachstellen | 2022-12-05T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-2232 | IBM InfoSphere Information Server: Schwachstelle ermöglicht Codeausführung | 2022-12-05T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-2233 | Zyxel Firewall: Schwachstelle ermöglicht Cross-Site Scripting | 2022-12-05T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-2235 | Veeam Backup & Replication: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-12-05T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-2237 | Ivanti Endpoint Manager: Schwachstelle ermöglicht Privilegieneskalation | 2022-12-05T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-2239 | Microsoft Edge: Mehrere Schwachstellen | 2022-12-05T23:00:00.000+00:00 | 2022-12-05T23:00:00.000+00:00 |
| wid-sec-w-2022-1589 | Mozilla Thunderbird: Mehrere Schwachstellen | 2022-09-29T22:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2230 | Avast und AVG Antivirus: Schwachstelle ermöglicht Privilegieneskalation | 2022-12-05T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2240 | mutt: Schwachstelle ermöglicht Denial of Service | 2021-01-19T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2244 | mutt: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-06-15T22:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2245 | mutt: Schwachstelle ermöglicht Umgehung von Sicherheitsvorkehrungen | 2020-06-14T22:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2249 | IBM Spectrum Scale: Schwachstelle ermöglicht Codeausführung | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2251 | Aruba ClearPass Policy Manager: Mehrere Schwachstellen | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2252 | Redmine.org Redmine: Mehrere Schwachstellen | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2253 | Fortinet FortiSandbox: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2254 | Fortinet FortiOS: Schwachstelle ermöglicht Cross-Site Scripting | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2255 | Fortinet FortiOS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-0311 | Linux Kernel: Mehrere Schwachstellen | 2019-12-01T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0315 | Linux Kernel: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2021-05-30T22:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0439 | Red Hat OpenStack: Mehrere Schwachstellen | 2022-06-22T22:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0456 | tribe29 checkmk: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2022-06-23T22:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0817 | Red Hat OpenStack: Schwachstelle ermöglicht Manipulation von Dateien | 2022-07-24T22:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-1991 | QT: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-02-16T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0249 | Kwetsbaarheden verholpen in Microsoft Azure | 2024-06-11T18:15:29.806897Z | 2024-06-11T18:15:29.806897Z |
| ncsc-2024-0250 | Kwetsbaarheden verholpen in Microsoft Visual Studio | 2024-06-11T18:18:10.131111Z | 2024-06-11T18:18:10.131111Z |
| ncsc-2024-0251 | Kwetsbaarheden verholpen in Microsoft Office | 2024-06-11T18:20:51.628241Z | 2024-06-11T18:20:51.628241Z |
| ncsc-2024-0252 | Kwetsbaarheden verholpen in Microsoft Dynamics | 2024-06-11T18:23:19.082621Z | 2024-06-11T18:23:19.082621Z |
| ncsc-2024-0253 | Kwetsbaarheid verholpen in Adobe Photoshop | 2024-06-13T13:31:15.643260Z | 2024-06-13T13:31:15.643260Z |
| ncsc-2024-0254 | Kwetsbaarheden verholpen in Adobe FrameMaker Publishing Server | 2024-06-13T13:34:41.831468Z | 2024-06-13T13:34:41.831468Z |
| ncsc-2024-0256 | Kwetsbaarheden verholpen in Adobe ColdFusion | 2024-06-13T13:37:57.490381Z | 2024-06-13T13:37:57.490381Z |
| ncsc-2024-0257 | Kwetsbaarheid verholpen in Adobe Creative Cloud Desktop Application | 2024-06-14T06:27:08.002611Z | 2024-06-14T06:27:08.002611Z |
| ncsc-2024-0258 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-06-14T06:28:31.318295Z | 2024-06-14T06:28:31.318295Z |
| ncsc-2024-0259 | Kwetsbaarheden verholpen in Adobe Experience Manager | 2024-06-14T06:30:30.926535Z | 2024-06-14T06:30:30.926535Z |
| ncsc-2024-0260 | Kwetsbaarheden verholpen in Nvidia GPU Drivers | 2024-06-14T06:34:54.620125Z | 2024-06-14T06:34:54.620125Z |
| ncsc-2024-0261 | Kwetsbaarheid verholpen in Fortinet FortiOS | 2024-06-14T09:59:56.652183Z | 2024-06-14T09:59:56.652183Z |
| ncsc-2024-0262 | Kwetsbaarheden verholpen in VMware vCenter | 2024-06-18T11:46:03.858476Z | 2024-06-18T11:46:03.858476Z |
| ncsc-2024-0264 | Kwetsbaarheden verholpen in Avaya IP Office | 2024-06-25T10:17:16.686897Z | 2024-06-25T10:17:16.686897Z |
| ncsc-2024-0265 | Kwetsbaarheid verholpen in XWiki | 2024-06-25T10:17:56.645201Z | 2024-06-25T10:17:56.645201Z |
| ncsc-2024-0266 | Kwetsbaarheden verholpen in WordPress | 2024-06-25T12:19:50.298884Z | 2024-06-25T12:19:50.298884Z |
| ncsc-2024-0267 | Kwetsbaarheden verholpen in Progress MOVEit | 2024-06-26T07:27:55.195431Z | 2024-06-26T08:58:01.371553Z |
| ncsc-2024-0271 | Kwetsbaarheid verholpen in Juniper Session Smart Router | 2024-06-28T09:55:17.082602Z | 2024-06-28T09:55:17.082602Z |
| ncsc-2024-0255 | Kwetsbaarheden verholpen in Adobe Commerce | 2024-06-13T13:36:13.246216Z | 2024-07-01T07:10:59.549847Z |
| ncsc-2024-0272 | Kwetsbaarheid verholpen in OpenSSH | 2024-07-01T12:21:57.127505Z | 2024-07-01T15:37:23.231069Z |
| ncsc-2024-0273 | Kwetsbaarheden ontdekt in Kiloview P1 4G Video Encoder en P2 4G Video Encoder | 2024-07-02T07:04:39.395441Z | 2024-07-02T07:04:39.395441Z |
| ncsc-2024-0275 | Kwetsbaarheden verholpen in Apache HHTP-server | 2024-07-02T11:44:22.653047Z | 2024-07-02T11:44:22.653047Z |
| ncsc-2024-0276 | Kwetsbaarheden verholpen in Splunk | 2024-07-02T13:15:06.374293Z | 2024-07-02T13:15:06.374293Z |
| ncsc-2024-0277 | Kwetsbaarheid verholpen in Juniper JunOS | 2024-07-03T07:16:21.498075Z | 2024-07-03T07:16:21.498075Z |
| ncsc-2024-0278 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-07-03T07:21:50.013074Z | 2024-07-03T07:21:50.013074Z |
| ncsc-2024-0270 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-06-27T13:09:06.950898Z | 2024-07-04T06:45:26.935999Z |
| ncsc-2024-0274 | Kwetsbaarheid verholpen in GeoServer | 2024-07-02T11:40:34.048090Z | 2024-07-05T09:41:10.197056Z |
| ncsc-2024-0279 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-07-09T18:40:21.043319Z | 2024-07-09T18:40:21.043319Z |
| ncsc-2024-0280 | Kwetsbaarheid verholpen in Microsoft Dynamics | 2024-07-09T18:40:31.321704Z | 2024-07-09T18:40:31.321704Z |
| ncsc-2024-0281 | Kwetsbaarheden verholpen in Microsoft Windows SQL Server | 2024-07-09T18:40:47.989197Z | 2024-07-09T18:40:47.989197Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-301229 | SSA-301229: Client-Side Enforcement of Server-Side Security Vulnerabilities in RUGGEDCOM ROX II | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-322980 | SSA-322980: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2023-04-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-339694 | SSA-339694: Multiple Vulnerabilities in Spectrum Power 4 Before v4.70 SP12 Security Patch 2 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-365596 | SSA-365596: DLL Hijacking Vulnerability in Siemens Software Center and Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-514895 | SSA-514895: Multiple Vulnerabilities in Altair Grid Engine V2025.1.0 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-522291 | SSA-522291: Improper Certificate Validation Vulnerability in Solid Edge | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-552874 | SSA-552874: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-631336 | SSA-631336: Multiple Web Server Vulnerabilities in SICAM GridEdge Before V2.6.6 | 2022-06-14T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-682326 | SSA-682326: Multiple Vulnerabilities in COMOS before V10.4.5 | 2025-11-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-687955 | SSA-687955: Accessible Development Shell via Physical Interface in SIPROTEC 5 | 2025-02-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-698820 | SSA-698820: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.4 on RUGGEDCOM APE1808 Devices | 2024-07-09T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-711309 | SSA-711309: Denial of Service Vulnerability in the OPC UA Implementations of SIMATIC Products | 2023-09-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-726617 | SSA-726617: Incorrect Privilege Assignment Vulnerability in Mendix OIDC SSO Module | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-750499 | SSA-750499: Weak Encryption Vulnerability in SIPROTEC 5 Devices | 2024-07-09T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-770770 | SSA-770770: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.7 on RUGGEDCOM APE1808 Devices | 2025-02-11T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-794185 | SSA-794185: RADIUS Protocol Susceptible to Forgery Attacks (CVE-2024-3596) - Impact to SIPROTEC, SICAM and Related Products | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-832273 | SSA-832273: Multiple Vulnerabilities in Fortigate NGFW Before V7.4.3 on RUGGEDCOM APE1808 Devices | 2024-03-12T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-864900 | SSA-864900: Multiple Vulnerabilities in Fortigate NGFW on RUGGEDCOM APE1808 Devices | 2025-05-13T00:00:00Z | 2025-11-11T00:00:00Z |
| ssa-190588 | SSA-190588: Cross-Site Scripting Vulnerability in Mendix Rich Text Widget | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-241605 | SSA-241605: Out of Bounds Read in PS/IGES Parasolid Translator Component Before V29.0.258 | 2025-11-17T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-978177 | SSA-978177: Vulnerability in Nozomi Guardian/CMC Before 25.4.0 on RUGGEDCOM APE1808 Devices | 2025-08-12T00:00:00Z | 2025-11-17T00:00:00Z |
| ssa-202008 | SSA-202008: Multiple Vulnerabilities in Ruggedcom Rox Before V2.17.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-212953 | SSA-212953: Multiple Vulnerabilities in COMOS | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-282044 | SSA-282044: DLL Hijacking Vulnerability in Siemens Web Installer used by the Online Software Delivery | 2025-08-12T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-356310 | SSA-356310: Multiple Vulnerabilities in Gridscale X Prepay | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-392859 | SSA-392859: Local Arbitrary Code Execution Vulnerability in Siemens Engineering Platforms before V20 | 2024-12-10T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-408105 | SSA-408105: Buffer Overflow Vulnerabilities in OpenSSL 3.0 Affecting Siemens Products | 2022-12-13T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-416652 | SSA-416652: Multiple Vulnerabilities in SIMATIC CN 4100 Before V4.0.1 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-420375 | SSA-420375: Improper Integrity Check of Firmware Updates in Building X - Security Manager Edge Controller (ACC-AP) | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ssa-471761 | SSA-471761: Multiple Vulnerabilities in SICAM T Before V3.0 | 2025-12-09T00:00:00Z | 2025-12-09T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhba-2013:0386 | Red Hat Bug Fix Advisory: tuned bug fix update | 2013-02-20T15:51:55+00:00 | 2025-11-21T17:20:56+00:00 |
| rhba-2013:0571 | Red Hat Bug Fix Advisory: Red Hat Update Infrastructure 2.1.1 bug fix update | 2013-02-27T16:58:22+00:00 | 2025-11-21T17:20:57+00:00 |
| rhba-2013:1150 | Red Hat Bug Fix Advisory: net-snmp bug fix update | 2013-08-12T14:21:43+00:00 | 2025-11-21T17:20:58+00:00 |
| rhba-2013:1647 | Red Hat Bug Fix Advisory: mysql bug fix update | 2013-11-20T16:53:26+00:00 | 2025-11-21T17:20:58+00:00 |
| rhba-2014:0487 | Red Hat Bug Fix Advisory: Red Hat OpenShift Enterprise 2.1 Release Advisory | 2014-05-14T00:00:00+00:00 | 2025-11-21T17:20:59+00:00 |
| rhba-2014:1200 | Red Hat Bug Fix Advisory: sos bug fix update | 2014-09-16T00:17:05+00:00 | 2025-11-21T17:21:00+00:00 |
| rhba-2014:1375 | Red Hat Bug Fix Advisory: sssd bug fix and enhancement update | 2014-10-13T21:06:25+00:00 | 2025-11-21T17:21:01+00:00 |
| rhba-2014:1376 | Red Hat Bug Fix Advisory: xcb-util, xorg-x11-drivers, and mesa bug fix and enhancement update | 2014-10-13T21:11:03+00:00 | 2025-11-21T17:21:01+00:00 |
| rhba-2014:1396 | Red Hat Bug Fix Advisory: redhat-upgrade-tool bug fix update | 2014-10-14T10:18:35+00:00 | 2025-11-21T17:21:01+00:00 |
| rhba-2014:1206 | Red Hat Bug Fix Advisory: virt-who bug fix and enhancement update | 2014-09-16T00:16:42+00:00 | 2025-11-21T17:21:02+00:00 |
| rhba-2014:1513 | Red Hat Bug Fix Advisory: virt-who bug fix and enhancement update | 2014-10-13T21:22:23+00:00 | 2025-11-21T17:21:03+00:00 |
| rhba-2014:1630 | Red Hat Bug Fix Advisory: Red Hat OpenShift Enterprise 2.1 jenkins-plugin-openshift bug fix update | 2014-10-14T13:01:14+00:00 | 2025-11-21T17:21:05+00:00 |
| rhba-2014:1857 | Red Hat Bug Fix Advisory: Red Hat Satellite 6 server bug fix update | 2014-11-13T22:28:23+00:00 | 2025-11-21T17:21:05+00:00 |
| rhba-2014:1977 | Red Hat Bug Fix Advisory: docker bug fix and enhancement update | 2014-12-10T11:38:14+00:00 | 2025-11-21T17:21:05+00:00 |
| rhba-2015:0038 | Red Hat Bug Fix Advisory: Red Hat Storage 3.0 enhancement and bug fix update #3 | 2015-01-15T13:35:28+00:00 | 2025-11-21T17:21:05+00:00 |
| rhba-2015:0040 | Red Hat Bug Fix Advisory: glusterfs enhancement update | 2015-01-15T13:47:02+00:00 | 2025-11-21T17:21:07+00:00 |
| rhba-2015:0054 | Red Hat Bug Fix Advisory: Red Hat Satellite 6 server bug fix update | 2015-01-16T21:04:44+00:00 | 2025-11-21T17:21:08+00:00 |
| rhba-2015:0230 | Red Hat Bug Fix Advisory: Red Hat Enterprise Virtualization Manager 3.5.0-1 ASYNC | 2015-02-16T14:50:27+00:00 | 2025-11-21T17:21:08+00:00 |
| rhba-2015:0364 | Red Hat Bug Fix Advisory: nss, nss-softokn, nss-util, and nspr bug fix and enhancement update | 2015-03-05T07:51:43+00:00 | 2025-11-21T17:21:08+00:00 |
| rhba-2015:0386 | Red Hat Bug Fix Advisory: cups bug fix and enhancement update | 2015-03-05T09:06:04+00:00 | 2025-11-21T17:21:08+00:00 |
| rhba-2015:0441 | Red Hat Bug Fix Advisory: sssd bug fix and enhancement update | 2015-03-05T10:05:27+00:00 | 2025-11-21T17:21:09+00:00 |
| rhba-2015:0584 | Red Hat Bug Fix Advisory: tboot bug fix and enhancement update | 2015-03-05T12:07:16+00:00 | 2025-11-21T17:21:09+00:00 |
| rhba-2015:0925 | Red Hat Bug Fix Advisory: nss and nspr bug fix and enhancement update | 2015-05-05T06:36:01+00:00 | 2025-11-21T17:21:11+00:00 |
| rhba-2015:0926 | Red Hat Bug Fix Advisory: nss, nss-util, and nspr bug fix and enhancement update | 2015-05-05T06:46:06+00:00 | 2025-11-21T17:21:11+00:00 |
| rhba-2015:0965 | Red Hat Bug Fix Advisory: nss, nss-util, and nspr bug fix and enhancement update | 2015-05-12T17:56:52+00:00 | 2025-11-21T17:21:13+00:00 |
| rhba-2015:1073 | Red Hat Bug Fix Advisory: jboss-ec2-eap enhancement update for EAP 6.4.1 | 2015-06-04T18:42:11+00:00 | 2025-11-21T17:21:14+00:00 |
| rhba-2015:1100 | Red Hat Bug Fix Advisory: CFME 5.4.0 bug fixes, and enhancement update | 2015-06-16T12:28:42+00:00 | 2025-11-21T17:21:14+00:00 |
| rhba-2015:1167 | Red Hat Bug Fix Advisory: docker bug fix update | 2015-06-23T09:29:05+00:00 | 2025-11-21T17:21:14+00:00 |
| rhba-2015:1292 | Red Hat Bug Fix Advisory: openldap bug fix and enhancement update | 2015-07-22T00:00:00+00:00 | 2025-11-21T17:21:15+00:00 |
| rhba-2015:1307 | Red Hat Bug Fix Advisory: netcf bug fix update | 2015-07-22T00:00:00+00:00 | 2025-11-21T17:21:15+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-17-087-02 | 3S-Smart Software Solutions GmbH CODESYS Web Server | 2017-03-28T00:00:00.000000Z | 2017-03-28T00:00:00.000000Z |
| icsa-17-089-01 | Schneider Electric Wonderware InTouch Access Anywhere | 2017-03-30T00:00:00.000000Z | 2017-03-30T00:00:00.000000Z |
| icsa-17-089-02 | Schneider Electric Modicon PLCs | 2017-03-30T00:00:00.000000Z | 2017-03-30T00:00:00.000000Z |
| icsa-17-094-01 | Schneider Electric Interactive Graphical SCADA System Software | 2017-04-04T00:00:00.000000Z | 2017-04-04T00:00:00.000000Z |
| icsa-17-094-03 | Rockwell Automation Allen-Bradley Stratix and Allen-Bradley ArmorStratix | 2017-04-04T00:00:00.000000Z | 2017-04-04T00:00:00.000000Z |
| icsa-17-101-01 | Schneider Electric Modicon Modbus Protocol | 2017-04-11T00:00:00.000000Z | 2017-04-11T00:00:00.000000Z |
| icsa-17-019-01a | Schneider Electric homeLYnk Controller (Update A) | 2017-01-19T00:00:00.000000Z | 2017-04-13T00:00:00.000000Z |
| icsa-17-103-01 | Wecon Technologies LEVI Studio HMI Editor | 2017-04-13T00:00:00.000000Z | 2017-04-13T00:00:00.000000Z |
| icsa-17-026-02a | Belden Hirschmann GECKO (Update A) | 2017-01-26T00:00:00.000000Z | 2017-04-18T00:00:00.000000Z |
| icsa-17-115-01 | BLF-Tech LLC VisualView HMI | 2017-04-25T00:00:00.000000Z | 2017-04-25T00:00:00.000000Z |
| icsa-17-115-02 | Sierra Wireless AirLink Raven XE and XT | 2017-04-25T00:00:00.000000Z | 2017-04-25T00:00:00.000000Z |
| icsa-17-115-03 | Hyundai Motor America Blue Link | 2017-04-25T00:00:00.000000Z | 2017-04-25T00:00:00.000000Z |
| icsa-17-096-01a | Certec EDV GmbH atvise scada (Update A) | 2017-04-06T00:00:00.000000Z | 2017-04-27T00:00:00.000000Z |
| icsa-17-122-01 | Schneider Electric Wonderware Historian Client | 2017-05-02T00:00:00.000000Z | 2017-05-02T00:00:00.000000Z |
| icsa-17-122-02 | CyberVision Kaa IoT Platform | 2017-05-02T00:00:00.000000Z | 2017-05-02T00:00:00.000000Z |
| icsa-17-122-03 | Advantech B+B SmartWorx MESR901 | 2017-05-02T00:00:00.000000Z | 2017-05-02T00:00:00.000000Z |
| icsa-17-094-05 | Rockwell Automation ControlLogix 5580 and CompactLogix 5380 | 2017-04-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-124-01 | Hikvision Cameras | 2017-05-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-124-02 | Dahua Technology Co., Ltd Digital Video Recorders and IP Cameras | 2017-05-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-124-03 | Advantech WebAccess | 2017-05-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-129-03 | Siemens SIMATIC WinCC and SIMATIC WinCC Runtime Professional | 2017-05-09T00:00:00.000000Z | 2017-05-09T00:00:00.000000Z |
| icsa-17-131-01 | PHOENIX CONTACT mGuard | 2017-05-11T00:00:00.000000Z | 2017-05-11T00:00:00.000000Z |
| icsa-17-131-02 | Satel Iberia SenNet Data Logger and Electricity Meters | 2017-05-11T00:00:00.000000Z | 2017-05-11T00:00:00.000000Z |
| icsa-17-136-01 | Detcon SiteWatch Gateway | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-136-02 | Schneider Electric SoMachine HVAC | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-136-03 | Hanwha Techwin SRN-4000 | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-136-04 | Schneider Electric VAMPSET | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-138-01 | ICSA-17-138-01_Miele Professional PG 85 Series | 2017-05-18T00:00:00.000000Z | 2017-05-18T00:00:00.000000Z |
| icsa-17-138-02 | Schneider Electric Wonderware InduSoft Web Studio | 2017-05-18T00:00:00.000000Z | 2017-05-18T00:00:00.000000Z |
| icsa-17-115-04 | Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 | 2017-04-25T00:00:00.000000Z | 2017-05-23T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20171129-nxos1 | Cisco NX-OS System Software Patch Installation Arbitrary File Write Vulnerability | 2017-11-29T16:00:00+00:00 | 2017-11-29T16:00:00+00:00 |
| cisco-sa-20171129-nxos2 | Cisco NX-OS System Software Image Signature Bypass Vulnerability | 2017-11-29T16:00:00+00:00 | 2017-11-29T16:00:00+00:00 |
| cisco-sa-20180103-warfp | Cisco WebEx Advanced Recording Format Player Remote Code Execution Vulnerability | 2018-01-03T16:00:00+00:00 | 2018-01-03T16:00:00+00:00 |
| cisco-sa-20180103-wnrp | Cisco WebEx Network Recording Player Buffer Overflow Vulnerability | 2018-01-03T16:00:00+00:00 | 2018-01-03T16:00:00+00:00 |
| cisco-sa-20180110-ucm | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2018-01-10T16:00:00+00:00 | 2018-01-10T16:00:00+00:00 |
| cisco-sa-20171129-fxnx | Cisco FXOS and NX-OS System Software CLI Command Injection Vulnerability | 2017-11-29T16:00:00+00:00 | 2018-01-11T18:32:00+00:00 |
| cisco-sa-20171129-nss | Cisco Nexus Series Switches CLI Command Injection Vulnerability | 2017-11-29T16:00:00+00:00 | 2018-01-11T18:32:00+00:00 |
| cisco-sa-20180117-300-500-smb1 | Cisco Small Business 300 and 500 Series Managed Switches Cross-Site Scripting Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-300-500-smb2 | Cisco Small Business 300 and 500 Series Managed Switches HTTP Response Splitting Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-acpe | Cisco AnyConnect Profile Editor XML External Entity Injection Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-cpi | Cisco Prime Infrastructure Privilege Escalation Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-cps | Cisco Policy Suite Unauthenticated Information Disclosure Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-esc | Cisco Elastic Services Controller Information Disclosure Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-iess | Cisco IOS Software for Industrial Ethernet 4010 Series Switches Test Command Arbitrary Code Execution and Denial of Service Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-ise | Cisco Identity Services Engine DOM Cross-Site Scripting Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-ntr | Cisco D9800 Network Transport Receiver OS Command Injection Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-nx-os | Cisco NX-OS Software Pong Packet Denial of Service Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-nxos1 | Cisco NX-OS System Software Unauthorized User Account Deletion Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-prime-infrastructure | Cisco Prime Infrastructure Open Redirect Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-psc | Cisco Prime Service Catalog Cross-Site Request Forgery Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-staros | Cisco StarOS CLI Command Injection Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-ucs | Cisco UCS Central Software IPv6 Denial of Service Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wap | Cisco WAP150 Wireless Cross-Site Scripting Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wms | Cisco WebEx Meetings Server Information Disclosure Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wms1 | Cisco WebEx Meetings Server Information Disclosure Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wms2 | Cisco WebEx Meetings Server Remote Account Disabling Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wms3 | Cisco WebEx Meetings Server Information Disclosure Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wsa1 | Cisco Web Security Appliance Reflected Cross-Site Scripting Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-nxos | Cisco NX-OS System Software Management Interface Denial of Service Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-19T21:29:00+00:00 |
| cisco-sa-20180117-esasma | Cisco Email Security and Content Security Management Appliance Privilege Escalation Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-23T16:28:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2023-0005 | Vulnerabilities in SICK EventCam App | 2023-06-19T11:00:00.000Z | 2023-06-19T11:00:00.000Z |
| sca-2023-0006 | Vulnerabilities in SICK ICR890-4 | 2023-07-10T13:00:00.000Z | 2023-07-10T13:00:00.000Z |
| sca-2023-0007 | Vulnerabilities in SICK LMS5xx | 2023-08-25T11:00:00.000Z | 2023-08-25T11:00:00.000Z |
| sca-2023-0009 | Vulnerability in Wibu-Systems CodeMeter Runtime affects multiple SICK products | 2023-09-29T10:00:00.000Z | 2023-09-29T10:00:00.000Z |
| sca-2023-0008 | Vulnerability in SICK SIM1012 | 2023-09-29T13:00:00.000Z | 2023-09-29T13:00:00.000Z |
| sca-2023-0010 | Vulnerabilities in SICK Application Processing Unit | 2023-10-09T11:00:00.000Z | 2023-10-09T11:00:00.000Z |
| sca-2023-0011 | Vulnerability in multiple SICK Flexi Soft Gateways | 2023-10-23T11:00:00.000Z | 2023-10-23T11:00:00.000Z |
| sca-2024-0001 | Vulnerability in SICK Logistics Analytics Products and SICK Field Analytics | 2024-01-29T00:00:00.000Z | 2024-01-29T00:00:00.000Z |
| sca-2024-0002 | Vulnerability in SICK MSC800 | 2024-09-11T23:00:00.000Z | 2024-09-11T23:00:00.000Z |
| sca-2024-0003 | Critical vulnerability in multiple SICK products | 2024-10-17T13:00:00.000Z | 2024-10-17T13:00:00.000Z |
| sca-2024-0004 | Third party vulnerabilities in SICK CDE-100 | 2024-11-07T12:00:00.000Z | 2024-11-07T12:00:00.000Z |
| sca-2024-0005 | Vulnerability in SICK Incoming Goods Suite | 2024-11-19T00:00:00.000Z | 2024-11-19T00:00:00.000Z |
| sca-2024-0006 | Critical vulnerabilities in SICK InspectorP61x, InspectorP62x and TiM3xx | 2024-12-06T00:00:00.000Z | 2024-12-06T00:00:00.000Z |
| sca-2024-0007 | Vulnerability in SICK OLM | 2024-12-31T00:00:00.000Z | 2024-12-31T00:00:00.000Z |
| sca-2025-0002 | Vulnerability in SICK Lector8xx and SICK InspectorP8xx | 2025-02-14T10:19:00.000Z | 2025-02-14T10:19:00.000Z |
| sca-2025-0001 | Multiple vulnerabilities in SICK MEAC300 | 2025-02-14T14:00:00.000Z | 2025-02-21T14:00:00.000Z |
| sca-2025-0004 | Critical vulnerabilities in SICK DL100-2xxxxxxx | 2025-03-14T11:00:00.000Z | 2025-03-14T11:00:00.000Z |
| sca-2025-0005 | Vulnerabilities in SICK Flexi Compact | 2025-04-28T10:00:00.000Z | 2025-04-28T10:00:00.000Z |
| sca-2025-0006 | Vulnerability affecting picoScan and multiScan | 2025-04-28T13:00:00.000Z | 2025-04-28T13:00:00.000Z |
| sca-2025-0003 | FreeRTOS Vulnerabilities have no impact on SICK Products | 2025-02-28T00:00:00.000Z | 2025-05-20T11:00:00.000Z |
| sca-2025-0007 | Multiple vulnerabilities in SICK Field Analytics and SICK Media Server | 2025-06-12T13:00:00.000Z | 2025-06-12T13:00:00.000Z |
| sca-2025-0008 | Multiple vulnerabilities in Endress+Hauser MEAC300-FNADE4 | 2025-07-03T13:00:00.000Z | 2025-07-03T13:00:00.000Z |
| sca-2025-0009 | Vulnerabilities affecting SICK TDC-E210GC | 2025-08-01T13:00:00.000Z | 2025-08-01T13:00:00.000Z |
| sca-2025-0010 | Multiple vulnerabilities in SICK Enterprise Analytics and SICK Logistic Analytics Products | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0011 | Vulnerabilities affecting Endress+Hauser SSG-E210GC | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0012 | Sudo vulnerability affects SICK SID products | 2025-10-27T11:00:00.000Z | 2025-10-27T14:00:00.000Z |
| sca-2025-0014 | CodeMeter vulnerablity affects SICK CODE-LOC and SICK LIDAR-LOC | 2025-11-03T11:00:00.000Z | 2025-11-03T14:00:00.000Z |
| sca-2025-0013 | Vulnerabilities affecting SICK TLOC100-100 | 2025-10-27T14:00:00.000Z | 2025-11-11T14:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2025:10-01 | Authenticated SQL Injection on CLI functionality in Guardian/CMC before 25.3.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:4-01 | Client-side path traversal in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:5-01 | Incorrect authorization for CLI in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:6-01 | Authenticated SQL Injection on Smart Polling functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:7-01 | Authenticated SQL Injection on Alert functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:8-01 | Authenticated SQL Injection on Alert functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:9-01 | Path traversal in Time Machine functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| nn-2025:11-01 | Stored Cross-Site Scripting (XSS) in Dashboards in Guardian/CMC before 25.4.0 | 2025-11-25T11:00:00.000Z | 2025-11-26T11:00:00.000Z |
| nn-2025:12-01 | HTML injection in in Time Machine functionality in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:13-01 | Stored Cross-Site Scripting (XSS) in Reports in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:14-01 | HTML injection in Asset List in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| nn-2025:15-01 | Path traversal in Import Arc data archive functionality in Guardian/CMC before 25.5.0 | 2025-12-18T11:00:00.000Z | 2025-12-18T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2019-20838 | libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled and \X or \R has more than one fixed quantifier a related issue to CVE-2019-20454. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-20892 | net-snmp before 5.8.1.pre1 has a double free in usm_free_usmStateReference in snmplib/snmpusm.c via an SNMPv3 GetBulk request. NOTE: this affects net-snmp packages shipped to end users by multiple Linux distributions but might not affect an upstream release. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-3842 | In systemd before v242-rc4 it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker in some particular configurations to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any". | 2019-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-3843 | It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future when the UID/GID will be recycled. | 2019-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-3844 | It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future when the GID will be recycled. | 2019-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-6454 | An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1 causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic). | 2019-03-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-6461 | An issue was discovered in cairo 1.16.0. There is an assertion problem in the function _cairo_arc_in_direction in the file cairo-arc.c. | 2019-01-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-6462 | An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c related to _arc_max_angle_for_tolerance_normalized. | 2019-01-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-7309 | In the GNU C Library (aka glibc or libc6) through 2.29 the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9071 | An issue was discovered in GNU libiberty as distributed in GNU Binutils 2.32. It is a stack consumption issue in d_count_templates_scopes in cp-demangle.c after many recursive calls. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9072 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in setup_group in elf.c. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9073 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in _bfd_elf_slurp_version_tables in elf.c. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9074 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c when called from pex64_get_runtime_function in pei-x86_64.c. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9075 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9076 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in elf_read_notes in elf.c. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9077 | An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9169 | In the GNU C Library (aka glibc or libc6) through 2.29 proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-10029 | The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c. | 2020-03-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-10702 | A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-10744 | An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18 2.8.12 and 2.9.9 as well as previous versions are affected and Ansible Tower 3.4.5 3.5.6 and 3.6.4 as well as previous versions are affected. | 2020-05-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-10761 | An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11080 | Denial of service in nghttp2 | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11102 | hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length. | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11494 | An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data potentially containing sensitive information from kernel stack memory if the configuration lacks CONFIG_INIT_STACK_ALL aka CID-b9258a2cece4. | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11565 | An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing aka CID-aa9f7d5172fa. NOTE: Someone in the security community disagrees that this is a vulnerability because the issue “is a bug in parsing mount options which can only be specified by a privileged user so triggering the bug does not grant any powers not already held.” | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11725 | snd_ctl_elem_add in sound/core/control.c in the Linux kernel through 5.6.3 has a count=info->owner line which later affects a private_size*count multiplication for unspecified "interesting side effects." NOTE: kernel engineers dispute this finding because it could be relevant only if new callers were added that were unfamiliar with the misuse of the info->owner field to represent data unrelated to the "owner" concept. The existing callers SNDRV_CTL_IOCTL_ELEM_ADD and SNDRV_CTL_IOCTL_ELEM_REPLACE have been designed to misuse the info->owner field in a safe way | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11869 | An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process resulting in a denial of service. | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11984 | Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE | 2020-08-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11993 | Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns logging statements were made on the wrong connection causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | 2020-08-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-12655 | An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata aka CID-d0c7feaf8767. | 2020-05-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| 3kxg200000r4801 | CoreSense™ HM and CoreSense™ M10 File Path Traversal Vulnerability | 2025-04-16T00:30:00.000Z | 2025-10-20T00:30:00.000Z |
| 9akk108471a8948 | Terra AC wallbox Heap Memory Corruption Vulnerability | 2025-10-20T00:30:00.000Z | 2025-10-21T00:30:00.000Z |
| 4tz00000006007 | ALS-mini-S4/S8 IP Missing Authentication Vulnerability and its Mitigations | 2025-10-20T00:30:00.000Z | 2025-10-23T00:30:00.000Z |
| 2nga002813 | PCM600 SharpZip library vulnerability | 2025-11-03T00:30:00.000Z | 2025-11-03T00:30:00.000Z |
| 7paa022088 | Edgenius Management Portal Authentication Bypass | 2025-11-20T00:30:00.000Z | 2025-11-20T00:30:00.000Z |
| 4hzm000603 | ABB Ability Camera Connect Vulnerabilities in outdated 3rd party component (VLC) | 2025-11-27T00:30:00.000Z | 2025-11-28T00:30:00.000Z |
| 9akk108471a8107 | Terra AC wallbox Heap Memory Corruption Vulnerability | 2025-09-16T00:30:00.000Z | 2025-11-28T08:00:00.000Z |
| 2crt000009 | WebPro SNMP Card PowerValue Multiple Vulnerabilities | 2026-01-07T00:30:00.000Z | 2026-01-07T00:30:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201005-0064 | Cisco Mediator Framework 1.5.1 before 1.5.1.build.14-eng, 2.2 before 2.2.1.dev.1, and 3.0… | 2021-12-18T17:28:24.032000Z |
| var-200412-0263 | The DSS verification code in Dropbear SSH Server before 0.43 frees uninitialized variable… | 2021-12-18T17:51:52.131000Z |
| var-201001-0029 | Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to … | 2021-12-18T17:56:06.278000Z |
| var-201001-0163 | The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.32.4, wh… | 2021-12-18T21:59:59.281000Z |
| var-201805-0613 | procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a … | 2021-12-18T22:07:19.455000Z |
| var-201004-0267 | The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware … | 2021-12-18T23:56:55.293000Z |
| var-201804-1619 | Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Install). Support… | 2021-12-19T00:57:05.378000Z |
| var-202104-2088 | 2022-01-01T21:43:54.006000Z | |
| var-201012-0429 | 2022-01-17T14:43:53.884000Z | |
| var-201008-0396 | 2022-01-17T15:13:57.932000Z | |
| var-201005-0441 | 2022-01-17T15:35:01.886000Z | |
| var-201005-0440 | 2022-01-17T15:35:03.822000Z | |
| var-202101-1992 | 2022-03-28T13:10:14.160000Z | |
| var-202012-1590 | 2022-03-28T13:10:48.663000Z | |
| var-202011-1582 | 2022-03-28T13:11:18.983000Z | |
| var-201302-0422 | 2022-03-28T13:18:10.496000Z | |
| var-201712-0384 | 2022-03-28T13:39:01.352000Z | |
| var-201204-0234 | 2022-03-28T14:09:38.006000Z | |
| var-202110-1907 | 2022-03-28T15:24:27.396000Z | |
| var-202109-1968 | 2022-03-28T15:24:42.425000Z | |
| var-202103-1752 | 2022-03-28T15:26:17.351000Z | |
| var-202103-1651 | 2022-03-28T15:26:17.893000Z | |
| var-202101-2000 | 2022-03-28T15:26:59.562000Z | |
| var-202101-1994 | 2022-03-28T15:26:59.656000Z | |
| var-202008-0729 | 2022-03-28T15:28:42.740000Z | |
| var-201109-0401 | 2022-03-28T15:47:17.677000Z | |
| var-202012-1631 | 2022-03-28T16:00:29.378000Z | |
| var-202112-1881 | DIAEnergie Version 1.7.5 and prior is vulnerable to a reflected cross-site scripting atta… | 2022-03-29T07:27:46.293000Z |
| var-202112-1878 | DIAEnergie Version 1.7.5 and prior is vulnerable to multiple cross-site scripting vulnera… | 2022-03-29T07:33:48.880000Z |
| var-202112-1879 | DIAEnergie Version 1.7.5 and prior is vulnerable to stored cross-site scripting when an u… | 2022-03-29T07:41:37.597000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2005-000343 | DeleGate DNS Message Decompression Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000396 | Ruby XMLRPC Arbitrary Command Execution Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000530 | Vulnerability in multiple web browsers allowing request spoofing attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000537 | Webmin and Usermin authentication bypass vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000538 | Ruby vulnerability allowing to bypass safe level 4 as a sandbox | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000695 | Ruby XMLRPC Server Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000705 | Fujitsu Java Runtime Environment reflection API vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000706 | Fujitsu Java Runtime Environment reflection API vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000707 | Fujitsu Java Runtime Environment reflection API vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000756 | Tsuru-Kame Mail vulnerable in S/MIME signature verification | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000757 | Cybozu Office browser script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000758 | msearch directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000759 | McAfee VirusScan Engine buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000760 | McAfee VirusScan Engine buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000761 | Norton AntiVirus causes abnormal OS termination when a user edits a shared network file | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000762 | Norton AntiVirus causes abnormal OS termination when scanning illegal files | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000763 | ppBlog cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000764 | Website connection problem when a mobile phone terminal uses specific QR code | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000765 | Buffalo router configuration management interface vulnerable to remote access and password leakage | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000766 | w3ml cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000767 | WebUD arbitrary program execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000768 | Movable Type session management vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000769 | Virus Security heap overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000770 | Virus Security memory leak vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000771 | Wiki clone cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000772 | Inappropriate interpretation of mailto URL scheme by mail client software | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000773 | desknet's cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000774 | SFS cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000776 | Java Cryptography Extension 1.2.1 (JCE 1.2.1) will no longer function properly after July 28, 2005 due to the expiration of its digital certificate | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000777 | tDiary cross-site request forgery vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|---|---|
| ts-2025-004 | TS-2025-004 | 2025-05-27T00:00 |
| ts-2025-005 | TS-2025-005 | 2025-08-07T00:00 |
| ts-2025-006 | TS-2025-006 | 2025-10-28T00:00 |
| ts-2025-007 | TS-2025-007 | 2025-11-07T00:00 |
| ts-2025-008 | TS-2025-008 | 2025-11-19T00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2015:0758-1 | Security update for mutt | 2014-03-17T16:14:56Z | 2014-03-17T16:14:56Z |
| suse-su-2015:0985-1 | Security update for sudo | 2014-03-20T16:16:51Z | 2014-03-20T16:16:51Z |
| suse-ru-2015:0992-1 | Security update for lxc | 2014-04-01T09:58:11Z | 2014-04-01T09:58:11Z |
| suse-su-2015:0841-1 | Recommended update for mono-core | 2014-04-10T23:19:27Z | 2014-04-10T23:19:27Z |
| suse-su-2015:0962-1 | Security update for curl | 2014-04-15T15:50:15Z | 2014-04-15T15:50:15Z |
| suse-su-2015:1227-1 | Security update for strongswan | 2014-05-14T09:26:44Z | 2014-05-14T09:26:44Z |
| suse-su-2015:0674-1 | Security update for xorg-x11-libs | 2014-05-15T16:30:57Z | 2014-05-15T16:30:57Z |
| suse-su-2015:0298-1 | Recommended update for clamav | 2014-05-28T15:49:37Z | 2014-05-28T15:49:37Z |
| suse-su-2015:0871-1 | Recommended update for clamav | 2014-05-28T15:49:37Z | 2014-05-28T15:49:37Z |
| suse-su-2015:0675-1 | Security update for gnutls | 2014-06-03T20:02:07Z | 2014-06-03T20:02:07Z |
| suse-su-2015:0580-1 | Recommended update for util-linux | 2014-06-04T09:10:15Z | 2014-06-04T09:10:15Z |
| suse-su-2015:0886-1 | Security update for struts | 2014-06-20T20:43:07Z | 2014-06-20T20:43:07Z |
| suse-su-2015:0427-1 | Recommended update for xorg-x11-server | 2014-06-27T12:01:01Z | 2014-06-27T12:01:01Z |
| suse-su-2015:1025-1 | Recommended update for xorg-x11-server | 2014-06-27T12:01:01Z | 2014-06-27T12:01:01Z |
| suse-ru-2015:0696-1 | Security update for puppet | 2014-06-30T15:48:55Z | 2014-06-30T15:48:55Z |
| suse-su-2015:1015-1 | Recommended update for dnsmasq | 2014-07-01T23:04:51Z | 2014-07-01T23:04:51Z |
| suse-su-2015:0901-1 | Security update for libtasn1 | 2014-07-17T14:16:08Z | 2014-07-17T14:16:08Z |
| suse-su-2015:0498-1 | Security update for oracle-update | 2014-07-18T09:38:45Z | 2014-07-18T09:38:45Z |
| suse-su-2015:0498-2 | Security update for oracle-update | 2014-07-18T13:49:14Z | 2014-07-18T13:49:14Z |
| suse-su-2015:0907-1 | Security update for oracle-update | 2014-07-18T13:49:14Z | 2014-07-18T13:49:14Z |
| suse-su-2015:0259-3 | Security update for ntp | 2014-07-21T14:05:24Z | 2014-07-21T14:05:24Z |
| suse-su-2015:0575-1 | Security update for CUPS | 2014-07-29T16:37:43Z | 2014-07-29T16:37:43Z |
| suse-su-2015:1011-1 | Security update for CUPS | 2014-07-29T16:37:43Z | 2014-07-29T16:37:43Z |
| suse-su-2015:0620-1 | Security update for MySQL | 2014-08-19T23:56:10Z | 2014-08-19T23:56:10Z |
| suse-su-2015:0946-1 | Security update for MySQL | 2014-08-19T23:56:10Z | 2014-08-19T23:56:10Z |
| suse-su-2015:1177-1 | Security update for MySQL | 2014-08-19T23:56:10Z | 2014-08-19T23:56:10Z |
| suse-su-2015:0709-1 | Security update for subversion | 2014-08-19T23:56:28Z | 2014-08-19T23:56:28Z |
| suse-ru-2015:0591-1 | Recommended update for apache2-mod_nss | 2014-08-22T11:39:07Z | 2014-08-22T11:39:07Z |
| suse-ru-2015:0410-1 | Security update for openstack-dashboard | 2014-08-28T12:06:29Z | 2014-08-28T12:06:29Z |
| suse-ru-2015:0794-1 | Security update for glibc | 2014-08-29T01:15:58Z | 2014-08-29T01:15:58Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2016:2556-1 | Security update for ffmpeg | 2016-10-18T08:52:34Z | 2016-10-18T08:52:34Z |
| opensuse-su-2016:2560-1 | Security update for ffmpeg | 2016-10-18T08:52:34Z | 2016-10-18T08:52:34Z |
| opensuse-su-2016:2597-1 | Security update for Chromium | 2016-10-19T15:50:17Z | 2016-10-19T15:50:17Z |
| opensuse-su-2016:2732-1 | Security update for chromium | 2016-11-04T16:43:12Z | 2016-11-04T16:43:12Z |
| opensuse-su-2016:2733-1 | Security update for chromium | 2016-11-04T16:43:12Z | 2016-11-04T16:43:12Z |
| opensuse-su-2016:3019-1 | Security update for MozillaThunderbird | 2016-12-06T09:05:20Z | 2016-12-06T09:05:20Z |
| opensuse-su-2017:0563-1 | Security update for Chromium | 2016-12-16T22:45:25Z | 2016-12-16T22:45:25Z |
| opensuse-su-2016:3307-1 | Security update for MozillaThunderbird | 2016-12-30T17:01:32Z | 2016-12-30T17:01:32Z |
| opensuse-su-2016:3308-1 | Security update for MozillaThunderbird | 2016-12-30T17:01:32Z | 2016-12-30T17:01:32Z |
| opensuse-su-2017:0034-1 | Security update for kopete | 2017-01-05T13:34:36Z | 2017-01-05T13:34:36Z |
| opensuse-su-2017:0035-1 | Security update for kopete | 2017-01-05T13:34:36Z | 2017-01-05T13:34:36Z |
| opensuse-su-2017:0093-1 | Security update for irssi | 2017-01-09T16:14:54Z | 2017-01-09T16:14:54Z |
| opensuse-su-2017:0094-1 | Security update for irssi | 2017-01-09T16:14:54Z | 2017-01-09T16:14:54Z |
| opensuse-su-2017:0140-1 | Security update for ark | 2017-01-16T14:46:13Z | 2017-01-16T14:46:13Z |
| opensuse-su-2017:0150-1 | Security update for ark | 2017-01-16T14:46:13Z | 2017-01-16T14:46:13Z |
| opensuse-su-2017:0195-1 | Security update for libgit2 | 2017-01-18T13:51:54Z | 2017-01-18T13:51:54Z |
| opensuse-su-2017:0354-1 | Security update for MozillaThunderbird | 2017-02-01T17:54:52Z | 2017-02-01T17:54:52Z |
| opensuse-su-2017:0357-1 | Security update for MozillaThunderbird | 2017-02-01T17:54:52Z | 2017-02-01T17:54:52Z |
| opensuse-su-2017:0361-1 | Security update for nginx | 2017-02-01T21:19:46Z | 2017-02-01T21:19:46Z |
| opensuse-su-2017:0362-1 | Security update for nginx | 2017-02-01T21:19:46Z | 2017-02-01T21:19:46Z |
| opensuse-su-2017:0405-1 | Security update for libgit2 | 2017-02-06T12:58:42Z | 2017-02-06T12:58:42Z |
| opensuse-su-2017:0413-1 | Security update for irssi | 2017-02-07T12:14:55Z | 2017-02-07T12:14:55Z |
| opensuse-su-2017:0565-1 | Security update of chromium | 2017-02-18T10:40:17Z | 2017-02-18T10:40:17Z |
| opensuse-su-2017:0677-1 | Security update for kdelibs4, kio | 2017-03-13T09:55:34Z | 2017-03-13T09:55:34Z |
| opensuse-su-2017:0680-1 | Security update for kdelibs4, kio | 2017-03-13T09:55:34Z | 2017-03-13T09:55:34Z |
| opensuse-su-2017:0687-1 | Security update for MozillaThunderbird | 2017-03-14T14:03:02Z | 2017-03-14T14:03:02Z |
| opensuse-su-2017:0688-1 | Security update for MozillaThunderbird | 2017-03-14T14:03:02Z | 2017-03-14T14:03:02Z |
| opensuse-su-2017:0737-1 | Security update for irssi | 2017-03-17T19:52:10Z | 2017-03-17T19:52:10Z |
| opensuse-su-2017:0739-1 | Security update for irssi | 2017-03-17T19:52:10Z | 2017-03-17T19:52:10Z |
| opensuse-su-2017:0738-1 | Security update for Chromium | 2017-03-17T20:07:47Z | 2017-03-17T20:07:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2014-09208 | Ettercap堆缓冲区溢出漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09209 | IBM WebSphere Portal XML注入漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09210 | IBM Business Process Manager跨站脚本漏洞(CNVD-2014-09210) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09211 | IBM WebSphere Portal跨站脚本漏洞(CNVD-2014-09211) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09212 | IBM WebSphere Portal跨站脚本漏洞(CNVD-2014-09212) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09213 | IBM Rational Quality Manager跨站脚本漏洞(CNVD-2014-09213) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09214 | WordPress插件SPNbabble存在多个跨站请求伪造漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09215 | WordPress插件O2Tweet存在多个跨站请求伪造漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09216 | WordPress插件Mikiurl Wordpress Eklentisi存在多个跨站请求伪造漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09217 | WordPress插件DandyID Services存在多个跨站请求伪造漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09218 | Ricksoft WBS Gantt-Chart add-on跨站脚本漏洞(CNVD-2014-09218) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09219 | Ricksoft WBS Gantt-Chart add-on跨站脚本漏洞(CNVD-2014-09219) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09220 | TSUTAYA application任意命令执行漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09221 | IBM DB2拒绝服务漏洞(CNVD-2014-09221) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09222 | OTRS Help Desk安全机制绕过漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09223 | Info-ZIP UnZip远程堆缓冲区溢出漏洞 | 2014-12-29 | 2014-12-30 |
| cnvd-2014-09224 | Huawei USG9560/9520/9580 Main Processing Unit (MPU)内存泄露漏洞 | 2014-12-29 | 2014-12-30 |
| cnvd-2014-09225 | Huawei WS318预测随机数发生器漏洞 | 2014-12-29 | 2014-12-30 |
| cnvd-2014-09226 | Huawei Tecal E9000 Chassis IPMICommand处理权限提升漏洞 | 2014-12-29 | 2014-12-30 |
| cnvd-2014-09227 | Huawei Tecal RH Series存在多个漏洞 | 2014-12-28 | 2014-12-30 |
| cnvd-2014-09228 | WordPress WP Symposium插件'tray' SQL注入漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09229 | WordPress WP Symposium插件存在多个跨站脚本漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09230 | Linux Kernel本地信息泄露漏洞(CNVD-2014-09230) | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09231 | libsndfile 'file_io.c' Divide-By-Zero拒绝服务漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09232 | libsndfile 'src/sd2.c'存在多个缓冲区溢出漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09233 | OpenStack Neutron存在多个安全绕过漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09234 | Koha存在多个跨站脚本漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09235 | elfutils '/libelf/elf_begin.c'目录遍历漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09236 | PHP Double Free拒绝服务漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09237 | IDA Pro存在多个漏洞(CNVD-2014-09237) | 2014-12-28 | 2014-12-31 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2000-avi-031 | Faille dans la commande newgrp sous HP-UX | 2000-08-17T00:00:00.000000 | 2000-08-17T00:00:00.000000 |
| certa-2000-avi-032 | Vulnérabilité dans la machine virtuelle Java de Microsoft | 2000-08-22T00:00:00.000000 | 2000-08-22T00:00:00.000000 |
| certa-2000-avi-033 | Vulnérabilité dans GNOME Updater | 2000-08-22T00:00:00.000000 | 2000-08-22T00:00:00.000000 |
| certa-2000-avi-034 | Faille dans le serveur Internet Java de SUN | 2000-08-23T00:00:00.000000 | 2000-08-23T00:00:00.000000 |
| certa-2000-avi-035 | Vulnérabilité dans Microsoft Information Server | 2000-08-28T00:00:00.000000 | 2000-08-28T00:00:00.000000 |
| certa-2000-avi-036 | Cheval de Troie : Troj/qaz | 2000-08-29T00:00:00.000000 | 2000-08-29T00:00:00.000000 |
| certa-2000-avi-037 | Vulnérabilité sous Windows 2000 dans la politique de sécurité locale | 2000-08-29T00:00:00.000000 | 2000-08-29T00:00:00.000000 |
| certa-2000-avi-038 | Vulnérabilité sous ISS REAL SECURE | 2000-08-30T00:00:00.000000 | 2000-08-30T00:00:00.000000 |
| certa-2000-avi-039 | vulnérabilités de RPC.statd sous Unix | 2000-08-30T00:00:00.000000 | 2000-08-30T00:00:00.000000 |
| certa-2000-avi-040 | Vulnérabilité sous PGP 5.5.x à 6.5.3 | 2000-08-31T00:00:00.000000 | 2000-08-31T00:00:00.000000 |
| certa-2000-avi-041 | Ver sous Windows : W32/Apology | 2000-08-31T00:00:00.000000 | 2000-08-31T00:00:00.000000 |
| certa-2000-avi-042 | Vulnérabilité dans les extensions de fichiers sous Windows | 2000-09-04T00:00:00.000000 | 2000-09-04T00:00:00.000000 |
| certa-2000-avi-043 | Vulnérabilité dans mgetty sous Unix | 2000-09-04T00:00:00.000000 | 2000-09-04T00:00:00.000000 |
| certa-2000-avi-044 | Vulnérabilité de Windows NT4.0 affectant Internet Information Server | 2000-09-07T00:00:00.000000 | 2000-09-07T00:00:00.000000 |
| certa-2000-avi-045 | Note concernant les correctifs ou mises à jour | 2000-09-07T00:00:00.000000 | 2000-09-07T00:00:00.000000 |
| certa-2000-avi-046 | vulnérabilité du service imagerie sous Windows 2000 | 2000-09-11T00:00:00.000000 | 2000-09-11T00:00:00.000000 |
| certa-2000-avi-047 | Vulnérabilité de RPC sous Windows2000 | 2000-09-12T00:00:00.000000 | 2000-09-12T00:00:00.000000 |
| certa-2000-avi-048 | Vulnérabilité du client telnet sous Windows 2000 | 2000-09-15T00:00:00.000000 | 2000-09-15T00:00:00.000000 |
| certa-2000-avi-049 | Virus FunnyStory | 2000-09-19T00:00:00.000000 | 2000-09-19T00:00:00.000000 |
| certa-2000-avi-050 | Vulnérabilité dans le démon klogd sous Linux | 2000-09-20T00:00:00.000000 | 2000-09-20T00:00:00.000000 |
| certa-2000-avi-051 | Vulnérabilités dans CISCOSecure sous Windows NT Server | 2000-09-22T00:00:00.000000 | 2000-09-22T00:00:00.000000 |
| certa-2000-avi-052 | Vulnérabilité sous Windows liée à l'ouverture d'un Document Office | 2000-09-25T00:00:00.000000 | 2000-09-25T00:00:00.000000 |
| certa-2000-avi-053 | Vulnérabilité dans HP OpenView | 2000-09-28T00:00:00.000000 | 2000-09-28T00:00:00.000000 |
| certa-2000-avi-054 | Vulnérabilité dans le garde barrière PIX de CISCO | 2000-09-29T00:00:00.000000 | 2000-09-29T00:00:00.000000 |
| certa-2000-avi-055 | Vulnérabilités des LPC sous Windows 2000 et NT | 2000-10-04T00:00:00.000000 | 2000-10-04T00:00:00.000000 |
| certa-2000-avi-056 | Vulnérabilité dans la fonction de « fusion-publipostage » sous Word 97 et 2000 | 2000-10-09T00:00:00.000000 | 2000-10-09T00:00:00.000000 |
| certa-2000-avi-057 | Vulnérabilité dans les protections de fichiers sous Windows 9x et Me | 2000-10-11T00:00:00.000000 | 2000-10-11T00:00:00.000000 |
| certa-2000-avi-058 | Vulnérabilité dans IPX/SPX de Microsoft sous Windows 9x/ME | 2000-10-12T00:00:00.000000 | 2000-10-12T00:00:00.000000 |
| certa-2000-avi-059 | Vulnérabilité dans la machine virtuelle Java de Microsoft | 2000-10-13T00:00:00.000000 | 2000-10-13T00:00:00.000000 |
| certa-2000-avi-060 | Vulnérabilité dans le cache d'authentification d'Internet Explorer | 2000-10-13T00:00:00.000000 | 2000-10-13T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2001-ale-016 | Propagation du ver badtrans - variante B | 2001-11-27T00:00:00.000000 | 2001-11-27T00:00:00.000000 |
| certa-2001-ale-012 | Rappels concernant les virus | 2001-09-13T00:00:00.000000 | 2002-01-09T00:00:00.000000 |
| certa-2002-ale-001 | Exploitation massive d'une faille de CDE | 2002-01-24T00:00:00.000000 | 2002-01-24T00:00:00.000000 |
| certa-2002-ale-002 | Exploitation d'une faille de wu-ftpd | 2002-01-28T00:00:00.000000 | 2002-01-28T00:00:00.000000 |
| certa-2002-ale-003 | Propagation importante du virus « W32.Myparty@mm » | 2002-01-29T00:00:00.000000 | 2002-01-29T00:00:00.000000 |
| certa-2002-ale-004 | Multiples implémentations de SNMP V1 vulnérables | 2002-02-13T00:00:00.000000 | 2002-02-13T00:00:00.000000 |
| certa-2002-ale-005 | Risque de compromission des auto-commutateurs (PABX) ALCATEL 4400 | 2002-02-20T00:00:00.000000 | 2002-02-20T00:00:00.000000 |
| certa-2002-ale-006 | Propagation du ver Spida (Microsoft SQL Server) | 2002-05-22T00:00:00.000000 | 2002-06-04T00:00:00.000000 |
| certa-2002-ale-007 | Cédérom Pages Pro | 2002-09-04T00:00:00.000000 | 2002-09-04T00:00:00.000000 |
| certa-2003-ale-001 | Vulnérabilité dans l'implémentation des logiciels de lecture des documents PDF | 2003-06-23T00:00:00.000000 | 2003-07-04T00:00:00.000000 |
| certa-2003-ale-002 | Exploitation d'une faille de Windows RPC | 2003-08-01T00:00:00.000000 | 2003-08-19T00:00:00.000000 |
| certa-2003-ale-003 | Exploitation massive de la vulnérabilité « include PHP » | 2003-09-09T00:00:00.000000 | 2003-09-09T00:00:00.000000 |
| certa-2003-ale-005 | Vulnérabilité de sadmind sur Solaris | 2003-09-19T00:00:00.000000 | 2003-09-19T00:00:00.000000 |
| certa-2003-ale-004 | Vulnérabilité d'Internet Explorer | 2003-09-10T00:00:00.000000 | 2003-10-06T00:00:00.000000 |
| certa-2004-ale-001 | Obstacles à la résolution d'incidents | 2004-01-30T00:00:00.000000 | 2004-01-30T00:00:00.000000 |
| certa-2003-ale-006 | Vulnérabilité dans l'affichage des adresses réticulaires | 2003-12-19T00:00:00.000000 | 2004-02-03T00:00:00.000000 |
| certa-2004-ale-002 | Propagation du virux Bizex | 2004-02-26T00:00:00.000000 | 2004-02-26T00:00:00.000000 |
| certa-2004-ale-003 | Propagation du ver Phatbot | 2004-03-19T00:00:00.000000 | 2004-03-19T00:00:00.000000 |
| certa-2004-ale-005 | Vulnérabilité d'Internet Explorer | 2004-04-09T00:00:00.000000 | 2004-04-15T00:00:00.000000 |
| certa-2004-ale-006 | Vulnérabilité SMB sous Windows | 2004-04-28T00:00:00.000000 | 2004-04-28T00:00:00.000000 |
| certa-2004-ale-007 | Exploitation de la vulnérabilité LSASS sous Windows : appration du ver Sasser | 2004-05-02T00:00:00.000000 | 2004-05-02T00:00:00.000000 |
| certa-2004-ale-008 | Vulnérabilité de Safari | 2004-05-19T00:00:00.000000 | 2004-05-24T00:00:00.000000 |
| certa-2004-ale-009 | Vulnérabilités d'Internet Explorer | 2004-06-09T00:00:00.000000 | 2004-08-03T00:00:00.000000 |
| certa-2004-ale-004 | Vulnérabilité du composant dtlogin de CDE | 2004-03-26T00:00:00.000000 | 2004-08-05T00:00:00.000000 |
| certa-2004-ale-010 | Vulnérabilité du service Telnet de Cisco IOS | 2004-08-30T00:00:00.000000 | 2004-08-30T00:00:00.000000 |
| certa-2004-ale-011 | Diffusion de programmes exploitant la faille GDI+ | 2004-09-23T00:00:00.000000 | 2004-09-23T00:00:00.000000 |
| certa-2004-ale-012 | Vulnérabilité d'Internet Explorer | 2004-11-09T00:00:00.000000 | 2004-12-02T00:00:00.000000 |
| certa-2004-ale-013 | Vulnérabilité dans le composant ActiveX DHTML Edit d'Internet Explorer | 2004-12-20T00:00:00.000000 | 2004-12-20T00:00:00.000000 |
| certa-2004-ale-014 | Exploitation massive d'une faille du forum phpBB | 2004-12-22T00:00:00.000000 | 2004-12-22T00:00:00.000000 |
| certa-2005-ale-001 | Vulnérabilité d'Internet Explorer | 2005-01-03T00:00:00.000000 | 2005-01-11T00:00:00.000000 |