Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0759 |
N/A
|
Jakarta Tomcat 3.1 under Apache reveals physical … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.525Z |
| CVE-2000-0760 |
N/A
|
The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 u… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.518Z |
| CVE-2000-0769 |
N/A
|
O'Reilly WebSite Pro 2.3.7 installs the uploader.… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.536Z |
| CVE-2000-0772 |
N/A
|
The installation of Tumbleweed Messaging Manageme… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.531Z |
| CVE-2000-0774 |
N/A
|
The sample Java servlet "test" in Bajie HTTP web … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.494Z |
| CVE-2000-0775 |
N/A
|
Buffer overflow in RobTex Viking server earlier t… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.532Z |
| CVE-2000-0784 |
N/A
|
sshd program in the Rapidstream 2.1 Beta VPN appl… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.622Z |
| CVE-2000-0785 |
N/A
|
WircSrv IRC Server 5.07s allows IRC operators to … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.620Z |
| CVE-2000-0789 |
N/A
|
WinU 5.x and earlier uses weak encryption to stor… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.594Z |
| CVE-2000-0791 |
N/A
|
Trustix installs the httpsd program for Apache-SS… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.613Z |
| CVE-2000-0793 |
N/A
|
Norton AntiVirus 5.00.01C with the Novell Netware… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.486Z |
| CVE-2000-0794 |
N/A
|
Buffer overflow in IRIX libgl.so library allows l… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.619Z |
| CVE-2000-0798 |
N/A
|
The truncate function in IRIX 6.x does not proper… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.515Z |
| CVE-2000-0800 |
N/A
|
String parsing error in rpc.kstatd in the linuxnf… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.530Z |
| CVE-2000-0801 |
N/A
|
Buffer overflow in bdf program in HP-UX 11.00 may… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.519Z |
| CVE-2000-0802 |
N/A
|
The BAIR program does not properly restrict acces… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.560Z |
| CVE-1999-0145 |
N/A
|
Sendmail WIZ command enabled, allowing root access. |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:27:57.695Z |
| CVE-1999-0247 |
N/A
|
Buffer overflow in nnrpd program in INN up to ver… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:51.632Z |
| CVE-1999-0248 |
N/A
|
A race condition in the authentication agent mech… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:51.869Z |
| CVE-1999-0358 |
N/A
|
Digital Unix 4.0 has a buffer overflow in the inc… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:52.011Z |
| CVE-1999-0393 |
N/A
|
Remote attackers can cause a denial of service in… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:51.979Z |
| CVE-1999-0395 |
N/A
|
A race condition in the BackWeb Polite Agent Prot… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:51.863Z |
| CVE-1999-0403 |
N/A
|
A bug in Cyrix CPUs on Linux allows local users t… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:52.126Z |
| CVE-1999-0429 |
N/A
|
The Lotus Notes 4.5 client may send a copy of enc… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:41:44.230Z |
| CVE-1999-0440 |
N/A
|
The byte code verifier component of the Java Virt… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:41:44.840Z |
| CVE-1999-0671 |
N/A
|
Buffer overflow in ToxSoft NextFTP client through… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:37.346Z |
| CVE-1999-0672 |
N/A
|
Buffer overflow in Fujitsu Chocoa IRC client via … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:37.566Z |
| CVE-1999-0675 |
N/A
|
Check Point FireWall-1 can be subjected to a deni… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:37.041Z |
| CVE-1999-0679 |
N/A
|
Buffer overflow in hybrid-6 IRC server commonly u… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:36.965Z |
| CVE-1999-0697 |
N/A
|
SCO Doctor allows local users to gain root privil… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:37.340Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-1519 |
N/A
|
Gene6 G6 FTP Server 2.0 allows a remote attacker … |
n/a |
n/a |
2001-09-12T04:00:00 | 2024-08-01T17:18:07.665Z |
| CVE-2000-0073 |
N/A
|
Buffer overflow in Microsoft Rich Text Format (RT… |
n/a |
n/a |
2000-04-18T04:00:00 | 2024-08-08T05:05:54.004Z |
| CVE-1999-0987 |
N/A
|
Windows NT does not properly download a system po… |
n/a |
n/a |
2000-01-04T05:00:00 | 2024-08-01T16:55:29.377Z |
| CVE-2000-0352 |
N/A
|
Pine before version 4.21 does not properly filter… |
n/a |
n/a |
2000-07-12T04:00:00 | 2024-08-08T05:14:21.497Z |
| CVE-1999-0831 |
N/A
|
Denial of service in Linux syslogd via a large nu… |
n/a |
n/a |
2000-01-18T05:00:00 | 2024-08-01T16:48:38.085Z |
| CVE-1999-0999 |
N/A
|
Microsoft SQL 7.0 server allows a remote attacker… |
n/a |
n/a |
2000-01-18T05:00:00 | 2024-08-01T16:55:29.358Z |
| CVE-1999-1475 |
N/A
|
ProFTPd 1.2 compiled with the mod_sqlpw module re… |
n/a |
n/a |
2001-09-12T04:00:00 | 2024-08-01T17:18:07.455Z |
| CVE-1999-0818 |
N/A
|
Buffer overflow in Solaris kcms_configure via a l… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:38.206Z |
| CVE-1999-1058 |
N/A
|
Buffer overflow in Vermillion FTP Daemon VFTPD 1.… |
n/a |
n/a |
2001-09-12T04:00:00 | 2024-08-01T17:02:52.969Z |
| CVE-1999-1527 |
N/A
|
Internal HTTP server in Sun Netbeans Java IDE in … |
n/a |
n/a |
2001-09-12T04:00:00 | 2024-08-01T17:18:07.566Z |
| CVE-2000-0531 |
N/A
|
Linux gpm program allows local users to cause a d… |
n/a |
n/a |
2000-07-12T04:00:00 | 2024-08-08T05:21:31.163Z |
| CVE-1999-0844 |
N/A
|
Denial of service in MDaemon WorldClient and WebC… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:38.124Z |
| CVE-1999-1163 |
N/A
|
Vulnerability in HP Series 800 S/X/V Class server… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:02:53.788Z |
| CVE-1999-1189 |
N/A
|
Buffer overflow in Netscape Navigator/Communicato… |
n/a |
n/a |
2004-09-01T04:00:00 | 2024-08-01T17:02:53.765Z |
| CVE-1999-1548 |
N/A
|
Cabletron SmartSwitch Router (SSR) 8000 firmware … |
n/a |
n/a |
2001-09-12T04:00:00 | 2024-08-01T17:18:07.518Z |
| CVE-1999-0317 |
N/A
|
Buffer overflow in Linux su command gives root ac… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:34:52.036Z |
| CVE-1999-0845 |
N/A
|
Buffer overflow in SCO su program allows local us… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:38.063Z |
| CVE-1999-1547 |
N/A
|
Oracle Web Listener 2.1 allows remote attackers t… |
n/a |
n/a |
2001-09-12T04:00:00 | 2024-08-01T17:18:07.562Z |
| CVE-1999-0387 |
N/A
|
A legacy credential caching mechanism used in Win… |
n/a |
n/a |
2000-07-12T04:00:00 | 2024-08-01T16:34:51.930Z |
| CVE-1999-0839 |
N/A
|
Windows NT Task Scheduler installed with Internet… |
n/a |
n/a |
2000-01-04T05:00:00 | 2024-08-01T16:48:38.088Z |
| CVE-1999-0842 |
N/A
|
Symantec Mail-Gear 1.0 web interface server allow… |
n/a |
n/a |
2000-06-02T04:00:00 | 2024-08-01T16:48:38.108Z |
| CVE-1999-0847 |
N/A
|
Buffer overflow in free internet chess server (FI… |
n/a |
n/a |
2000-01-18T05:00:00 | 2024-08-01T16:48:38.122Z |
| CVE-1999-0822 |
N/A
|
Buffer overflow in Qpopper (qpop) 3.0 allows remo… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:38.127Z |
| CVE-1999-0824 |
N/A
|
A Windows NT user can use SUBST to map a drive le… |
n/a |
n/a |
2000-04-25T04:00:00 | 2024-08-01T16:48:38.105Z |
| CVE-1999-0840 |
N/A
|
Buffer overflow in CDE dtmail and dtmailpr progra… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:38.121Z |
| CVE-1999-0841 |
N/A
|
Buffer overflow in CDE mailtool allows local user… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:38.125Z |
| CVE-1999-0819 |
N/A
|
NTMail does not disable the VRFY command, even if… |
n/a |
n/a |
2000-06-02T04:00:00 | 2024-08-01T16:48:38.264Z |
| CVE-1999-0820 |
N/A
|
FreeBSD seyon allows users to gain privileges via… |
n/a |
n/a |
2000-07-12T04:00:00 | 2024-08-01T16:48:38.226Z |
| CVE-1999-0823 |
N/A
|
Buffer overflow in FreeBSD xmindpath allows local… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.126Z |
| CVE-1999-0826 |
N/A
|
Buffer overflow in FreeBSD angband allows local u… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.225Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-3fc5-9x9m-vqc4 |
9.8 (3.1)
|
Privilege Escalation in express-cart | 2019-06-03T17:31:32Z | 2021-08-04T21:25:59Z |
| ghsa-xggx-fx6w-v7ch |
5.3 (3.1)
|
Improper Neutralization of Wildcards or Matching Symbols | 2019-06-04T15:42:15Z | 2021-08-04T20:41:46Z |
| ghsa-3p92-886g-qxpq |
5.1 (3.1)
|
Remote Memory Exposure in floody | 2019-06-04T15:42:32Z | 2021-08-04T21:27:04Z |
| ghsa-pgcr-7wm4-mcv6 |
7.5 (3.1)
|
Sensitive Data Exposure in pem | 2019-06-04T15:42:45Z | 2021-08-04T21:28:00Z |
| ghsa-m8fw-534v-xm85 |
|
Cross-Site Scripting (XSS) in cloudcmd | 2019-06-04T15:43:29Z | 2020-08-31T18:31:00Z |
| ghsa-xm7f-x4wx-wmgv |
|
Out-of-bounds Read in byte | 2019-06-04T15:47:43Z | 2020-08-31T18:31:36Z |
| ghsa-m734-r4g6-34f9 |
|
NoSQL Injection in loopback-connector-mongodb | 2019-06-04T19:36:17Z | 2021-08-04T20:47:58Z |
| ghsa-5v72-xg48-5rpm |
7.5 (3.1)
|
Denial of Service in ws | 2019-06-04T19:37:52Z | 2021-08-04T21:29:05Z |
| ghsa-wfp9-vr4j-f49j |
|
NoSQL Injection in sequelize | 2019-06-04T20:04:27Z | 2023-04-21T19:34:39Z |
| ghsa-f698-m2v9-5fh3 |
|
Command Injection in opencv | 2019-06-04T20:11:44Z | 2020-08-31T18:35:50Z |
| ghsa-8j8c-7jfh-h6hx |
|
Code Injection in js-yaml | 2019-06-04T20:14:07Z | 2020-08-31T18:36:43Z |
| ghsa-886v-mm6p-4m66 |
|
High severity vulnerability that affects gun | 2019-06-05T09:48:02Z | 2021-09-07T15:24:35Z |
| ghsa-q42p-pg8m-cqh6 |
7.3 (3.1)
|
Prototype Pollution in handlebars | 2019-06-05T14:07:48Z | 2021-08-04T20:54:05Z |
| ghsa-xf5p-87ch-gxw2 |
5.3 (3.1)
|
Marked ReDoS due to email addresses being evaluated in quadratic time | 2019-06-05T14:10:03Z | 2022-08-02T17:43:57Z |
| ghsa-74cp-qw7f-7hpw |
|
Path Traversal in statics-server | 2019-06-05T14:10:23Z | 2020-08-31T18:36:24Z |
| ghsa-86p3-4gfq-38f2 |
5.9 (3.1)
|
Denial of Service in url-relative | 2019-06-05T14:10:34Z | 2021-08-04T21:31:03Z |
| ghsa-vpq5-4rc8-c222 |
|
Denial of Service in canvas | 2019-06-05T14:10:45Z | 2020-08-31T18:36:22Z |
| ghsa-2pr6-76vf-7546 |
5.9 (3.1)
|
Denial of Service in js-yaml | 2019-06-05T14:35:29Z | 2021-08-04T21:32:56Z |
| ghsa-3xc7-xg67-pw99 |
3.5 (3.1)
|
Sensitive Data Exposure in sequelize-cli | 2019-06-05T20:43:10Z | 2021-08-04T20:54:45Z |
| ghsa-83rx-c8cr-6j8q |
5.9 (3.1)
|
Insecure Default Configuration in tesseract.js | 2019-06-05T20:48:55Z | 2021-08-04T21:33:58Z |
| ghsa-wxhq-pm8v-cw75 |
|
Regular Expression Denial of Service in clean-css | 2019-06-05T20:50:16Z | 2020-08-31T18:35:40Z |
| ghsa-4859-gpc7-4j66 |
|
Command Injection in dot | 2019-06-05T21:24:29Z | 2021-08-04T20:55:57Z |
| ghsa-cxx2-fp39-rf3r |
6.1 (3.1)
|
Cross-Site Scripting in JSPWiki | 2019-06-06T15:29:22Z | 2021-08-04T19:53:10Z |
| ghsa-cj6j-32rg-45r2 |
6.1 (3.1)
|
Cross-site Scripting in JSPWiki | 2019-06-06T15:29:25Z | 2021-08-04T19:54:08Z |
| ghsa-hp5r-mhgp-56c9 |
6.1 (3.1)
|
Cross-site Scriptin in JSPWiki | 2019-06-06T15:29:29Z | 2021-08-04T20:00:07Z |
| ghsa-w7q7-vjp8-7jv4 |
|
SQL Injection in typeorm | 2019-06-06T15:30:16Z | 2020-08-31T18:36:13Z |
| ghsa-rv49-54qp-fw42 |
|
Path Traversal in servey | 2019-06-06T15:30:20Z | 2020-08-31T18:36:18Z |
| ghsa-g95f-p29q-9xw4 |
3.7 (3.1)
|
Regular Expression Denial of Service in braces | 2019-06-06T15:30:30Z | 2021-08-04T21:35:07Z |
| ghsa-8v5f-hp78-jgxq |
|
Signature Verification Bypass in jwt-simple | 2019-06-06T15:30:33Z | 2020-08-31T18:37:26Z |
| ghsa-q22g-8fr4-qpj4 |
7.5 (3.1)
|
Regular Expression Denial of Service in remarkable | 2019-06-06T15:32:15Z | 2024-04-22T19:45:28Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-239 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.570829Z |
| pysec-2021-240 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.733041Z |
| pysec-2021-241 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.893665Z |
| pysec-2021-242 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite code fo… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.058012Z |
| pysec-2021-243 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.241160Z |
| pysec-2021-244 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.417025Z |
| pysec-2021-245 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.610515Z |
| pysec-2021-246 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.807777Z |
| pysec-2021-247 |
|
TensorFlow is an end-to-end open source platform for machine learning. The validation in … | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.001819Z |
| pysec-2021-248 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.176381Z |
| pysec-2021-249 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.356902Z |
| pysec-2021-250 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.522961Z |
| pysec-2021-251 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.712204Z |
| pysec-2021-252 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.882183Z |
| pysec-2021-253 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.041590Z |
| pysec-2021-254 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.200654Z |
| pysec-2021-255 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing a complex … | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.358462Z |
| pysec-2021-256 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing invalid ar… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.523296Z |
| pysec-2021-441 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling TF operati… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:45.368024Z |
| pysec-2021-442 |
|
TensorFlow is an end-to-end open source platform for machine learning. If the `splits` ar… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:45.524725Z |
| pysec-2021-443 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:45.694528Z |
| pysec-2021-444 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_op… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:45.869282Z |
| pysec-2021-445 |
|
TensorFlow is an end-to-end open source platform for machine learning. A malicious user c… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.030158Z |
| pysec-2021-446 |
|
TensorFlow is an end-to-end open source platform for machine learning. In eager mode (def… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.214930Z |
| pysec-2021-447 |
|
TensorFlow is an end-to-end open source platform for machine learning. The API of `tf.raw… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.373650Z |
| pysec-2021-448 |
|
TensorFlow is an end-to-end open source platform for machine learning. Missing validation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.522398Z |
| pysec-2021-449 |
|
TensorFlow is an end-to-end open source platform for machine learning. Specifying a negat… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.609278Z |
| pysec-2021-450 |
|
TensorFlow is an end-to-end open source platform for machine learning. The `tf.raw_ops.Co… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.764419Z |
| pysec-2021-451 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.920888Z |
| pysec-2021-452 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.095784Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-2803 | Malicious code in eslint-config-pagseguro (npm) | 2022-06-20T20:11:35Z | 2022-06-20T20:11:36Z |
| mal-2022-5501 | Malicious code in ps-crypt (npm) | 2022-06-20T20:11:35Z | 2022-06-20T20:11:35Z |
| mal-2022-5504 | Malicious code in ps-validations (npm) | 2022-06-20T20:11:35Z | 2022-06-20T20:11:35Z |
| mal-2022-6339 | Malicious code in stylelint-bem-validator (npm) | 2022-06-20T20:11:35Z | 2022-06-20T20:11:36Z |
| mal-2022-5497 | Malicious code in ps-asymmetric-crypts (npm) | 2022-06-20T20:11:36Z | 2022-06-20T20:11:37Z |
| mal-2022-5498 | Malicious code in ps-bootstrap (npm) | 2022-06-20T20:11:36Z | 2022-06-20T20:11:36Z |
| mal-2022-5502 | Malicious code in ps-react-bootstrap (npm) | 2022-06-20T20:11:36Z | 2022-06-20T20:11:41Z |
| mal-2022-5503 | Malicious code in ps-request-ws (npm) | 2022-06-20T20:11:36Z | 2022-06-20T20:11:36Z |
| mal-2022-6341 | Malicious code in stylelint-config-pagseguro (npm) | 2022-06-20T20:11:36Z | 2022-06-20T20:11:37Z |
| mal-2022-3746 | Malicious code in ibanking-shell (npm) | 2022-06-20T20:11:37Z | 2022-06-20T20:11:37Z |
| mal-2022-4696 | Malicious code in moralis-websocket (npm) | 2022-06-20T20:11:37Z | 2022-06-20T20:11:38Z |
| mal-2022-5499 | Malicious code in ps-brands-assets (npm) | 2022-06-20T20:11:37Z | 2022-06-20T20:11:37Z |
| mal-2022-6525 | Malicious code in testmatrix (npm) | 2022-06-20T20:11:37Z | 2022-06-20T20:11:38Z |
| mal-2022-2580 | Malicious code in dp-testing (npm) | 2022-06-20T20:11:38Z | 2022-06-20T20:11:39Z |
| mal-2022-4255 | Malicious code in lambda-common (npm) | 2022-06-20T20:11:38Z | 2022-06-20T20:11:38Z |
| mal-2022-4695 | Malicious code in moralis-web3-providers-ws (npm) | 2022-06-20T20:11:38Z | 2022-06-20T20:11:38Z |
| mal-2022-6882 | Malicious code in uxp-documentation (npm) | 2022-06-20T20:11:38Z | 2022-06-20T20:11:39Z |
| mal-2022-3438 | Malicious code in gradient-stringn (npm) | 2022-06-20T20:11:39Z | 2022-06-20T20:11:40Z |
| mal-2022-3440 | Malicious code in gradient-strings (npm) | 2022-06-20T20:11:39Z | 2022-06-20T20:11:39Z |
| mal-2022-3441 | Malicious code in gradient-stringss (npm) | 2022-06-20T20:11:39Z | 2022-06-20T20:11:40Z |
| mal-2022-5836 | Malicious code in rocky_testing_confusion (npm) | 2022-06-20T20:11:39Z | 2022-06-20T20:11:39Z |
| mal-2022-3439 | Malicious code in gradient-stringnnnn (npm) | 2022-06-20T20:11:40Z | 2022-06-20T20:11:40Z |
| mal-2022-5264 | Malicious code in pedrito (npm) | 2022-06-20T20:11:40Z | 2022-06-20T20:11:40Z |
| mal-2022-5265 | Malicious code in pedrolinsisi (npm) | 2022-06-20T20:11:40Z | 2022-06-20T20:11:41Z |
| mal-2022-5271 | Malicious code in pepinole (npm) | 2022-06-20T20:11:40Z | 2022-06-20T20:11:46Z |
| mal-2022-3268 | Malicious code in galaxyy-lib (npm) | 2022-06-20T20:11:41Z | 2022-06-20T20:11:41Z |
| mal-2022-4022 | Malicious code in jetpack-api (npm) | 2022-06-20T20:11:41Z | 2022-06-20T20:11:42Z |
| mal-2022-4023 | Malicious code in jetpack-components (npm) | 2022-06-20T20:11:41Z | 2022-06-20T20:11:42Z |
| mal-2022-4024 | Malicious code in jetpack-config (npm) | 2022-06-20T20:11:41Z | 2022-06-20T20:11:41Z |
| mal-2022-4025 | Malicious code in jetpack-connection (npm) | 2022-06-20T20:11:41Z | 2022-06-20T20:11:42Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-0004 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-03-29T22:00:00.000+00:00 | 2024-03-06T23:00:00.000+00:00 |
| wid-sec-w-2022-0923 | OpenJPEG: Schwachstelle ermöglicht Denial of Service | 2022-03-29T22:00:00.000+00:00 | 2025-04-01T22:00:00.000+00:00 |
| wid-sec-w-2023-1449 | VMware vCenter Server und VMware Cloud Foundation: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-03-29T22:00:00.000+00:00 | 2023-06-15T22:00:00.000+00:00 |
| wid-sec-w-2023-2843 | SaltStack Salt: Mehrere Schwachstellen | 2022-03-29T22:00:00.000+00:00 | 2023-11-06T23:00:00.000+00:00 |
| wid-sec-w-2022-0032 | vim: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-03-30T22:00:00.000+00:00 | 2025-10-09T22:00:00.000+00:00 |
| wid-sec-w-2022-0033 | VMware Tanzu Spring Framework: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode | 2022-03-30T22:00:00.000+00:00 | 2024-12-18T23:00:00.000+00:00 |
| wid-sec-w-2022-0161 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-03-31T22:00:00.000+00:00 | 2022-12-28T23:00:00.000+00:00 |
| wid-sec-w-2022-0005 | zlib: Schwachstelle ermöglicht Codeausführung | 2022-04-03T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2022-0162 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-04-03T22:00:00.000+00:00 | 2023-07-13T22:00:00.000+00:00 |
| wid-sec-w-2022-0163 | Linux Kernel: Mehrere Schwachstellen | 2022-04-03T22:00:00.000+00:00 | 2024-03-20T23:00:00.000+00:00 |
| wid-sec-w-2022-0612 | BusyBox: Schwachstelle ermöglicht Codeausführung | 2022-04-03T22:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| wid-sec-w-2022-1988 | dnsmasq: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-04-03T22:00:00.000+00:00 | 2024-12-08T23:00:00.000+00:00 |
| wid-sec-w-2023-2715 | libTIFF: Schwachstelle ermöglicht Denial of Service | 2022-04-03T22:00:00.000+00:00 | 2025-09-10T22:00:00.000+00:00 |
| wid-sec-w-2022-1052 | Red Hat Storage: Mehrere Schwachstellen | 2022-04-04T22:00:00.000+00:00 | 2025-09-25T22:00:00.000+00:00 |
| wid-sec-w-2022-0281 | Xen: Mehrere Schwachstellen | 2022-04-05T22:00:00.000+00:00 | 2024-02-04T23:00:00.000+00:00 |
| wid-sec-w-2022-0453 | XEN / Citrix Hypervisor: Mehrere Schwachstellen | 2022-04-05T22:00:00.000+00:00 | 2024-02-04T23:00:00.000+00:00 |
| wid-sec-w-2022-0482 | Mozilla Firefox, Mozilla Firefox ESR und Thunderbird: Mehrere Schwachstellen | 2022-04-05T22:00:00.000+00:00 | 2025-11-02T23:00:00.000+00:00 |
| wid-sec-w-2022-0632 | VMware Tanzu Spring Boot: Schwachstelle ermöglicht Privilegieneskalation | 2022-04-05T22:00:00.000+00:00 | 2024-03-20T23:00:00.000+00:00 |
| wid-sec-w-2022-1036 | IBM WebSphere Application Server: Mehrere Schwachstellen | 2022-04-05T22:00:00.000+00:00 | 2023-02-15T23:00:00.000+00:00 |
| wid-sec-w-2023-2556 | Red Hat OpenStack: Schwachstelle ermöglicht Request Smuggling | 2022-04-05T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2022-0034 | gzip: Schwachstelle ermöglicht Manipulation von Dateien | 2022-04-07T22:00:00.000+00:00 | 2024-07-18T22:00:00.000+00:00 |
| wid-sec-w-2022-0118 | libvirt: Schwachstelle ermöglicht Denial of Service | 2022-04-07T22:00:00.000+00:00 | 2024-04-01T22:00:00.000+00:00 |
| wid-sec-w-2022-0164 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-04-07T22:00:00.000+00:00 | 2024-07-31T22:00:00.000+00:00 |
| wid-sec-w-2022-0239 | Linux Kernel: Mehrere Schwachstellen | 2022-04-07T22:00:00.000+00:00 | 2023-05-18T22:00:00.000+00:00 |
| wid-sec-w-2022-0970 | Red Hat OpenShift: Mehrere Schwachstellen | 2022-04-07T22:00:00.000+00:00 | 2024-05-21T22:00:00.000+00:00 |
| wid-sec-w-2022-1581 | GraphicsMagick: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-04-07T22:00:00.000+00:00 | 2024-01-22T23:00:00.000+00:00 |
| wid-sec-w-2022-0165 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-04-10T22:00:00.000+00:00 | 2023-07-13T22:00:00.000+00:00 |
| wid-sec-w-2022-0251 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2022-04-10T22:00:00.000+00:00 | 2024-02-07T23:00:00.000+00:00 |
| wid-sec-w-2023-2455 | Red Hat OpenShift: Schwachstelle ermöglicht Denial of Service | 2022-04-11T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2022-0119 | Ruby: Mehrere Schwachstellen | 2022-04-12T22:00:00.000+00:00 | 2025-01-08T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2008:0514 | Red Hat Security Advisory: evolution security update | 2008-06-04T10:46:00+00:00 | 2025-11-21T17:33:22+00:00 |
| rhsa-2008:0516 | Red Hat Security Advisory: evolution security update | 2008-06-04T11:00:00+00:00 | 2025-11-21T17:33:25+00:00 |
| rhsa-2008:0517 | Red Hat Security Advisory: evolution security update | 2008-06-04T11:04:00+00:00 | 2025-11-21T17:33:23+00:00 |
| rhsa-2008:0515 | Red Hat Security Advisory: evolution28 security update | 2008-06-04T12:49:00+00:00 | 2025-11-21T17:33:22+00:00 |
| rhsa-2008:0498 | Red Hat Security Advisory: cups security update | 2008-06-04T14:33:00+00:00 | 2025-11-21T17:33:18+00:00 |
| rhsa-2008:0528 | Red Hat Security Advisory: ucd-snmp security update | 2008-06-10T07:01:00+00:00 | 2025-11-21T17:33:25+00:00 |
| rhsa-2008:0529 | Red Hat Security Advisory: net-snmp security update | 2008-06-10T14:07:00+00:00 | 2025-11-21T17:33:25+00:00 |
| rhsa-2008:0503 | Red Hat Security Advisory: xorg-x11 security update | 2008-06-11T18:43:00+00:00 | 2025-11-21T17:33:19+00:00 |
| rhsa-2008:0522 | Red Hat Security Advisory: perl security update | 2008-06-11T19:12:00+00:00 | 2025-11-21T17:33:23+00:00 |
| rhsa-2008:0502 | Red Hat Security Advisory: XFree86 security update | 2008-06-11T19:23:00+00:00 | 2025-11-21T17:33:18+00:00 |
| rhsa-2008:0504 | Red Hat Security Advisory: xorg-x11-server security update | 2008-06-11T19:34:00+00:00 | 2025-11-21T17:33:20+00:00 |
| rhsa-2008:0512 | Red Hat Security Advisory: XFree86 security update | 2008-06-11T19:49:00+00:00 | 2025-11-21T17:33:21+00:00 |
| rhsa-2008:0537 | Red Hat Security Advisory: openoffice.org security update | 2008-06-13T02:25:00+00:00 | 2025-11-21T17:33:25+00:00 |
| rhsa-2008:0538 | Red Hat Security Advisory: openoffice.org security update | 2008-06-13T02:57:00+00:00 | 2025-11-21T17:33:25+00:00 |
| rhsa-2008:0532 | Red Hat Security Advisory: perl security update | 2008-06-17T16:08:00+00:00 | 2025-11-21T17:33:25+00:00 |
| rhsa-2008:0558 | Red Hat Security Advisory: freetype security update | 2008-06-20T11:58:00+00:00 | 2025-11-21T17:33:30+00:00 |
| rhsa-2008:0556 | Red Hat Security Advisory: freetype security update | 2008-06-20T14:03:00+00:00 | 2025-11-21T17:33:29+00:00 |
| rhsa-2008:0133 | Red Hat Security Advisory: IBMJava2 security update | 2008-06-24T09:07:00+00:00 | 2025-11-21T17:32:54+00:00 |
| rhsa-2008:0497 | Red Hat Security Advisory: sblim security update | 2008-06-24T09:19:00+00:00 | 2025-11-21T17:33:18+00:00 |
| rhsa-2008:0508 | Red Hat Security Advisory: kernel security and bug fix update | 2008-06-25T15:13:00+00:00 | 2025-11-21T17:33:21+00:00 |
| rhsa-2008:0519 | Red Hat Security Advisory: kernel security and bug fix update | 2008-06-25T15:43:00+00:00 | 2025-11-21T17:33:23+00:00 |
| rhsa-2008:0523 | Red Hat Security Advisory: Red Hat Network Proxy Server security update | 2008-06-30T15:29:00+00:00 | 2026-01-13T22:36:33+00:00 |
| rhsa-2008:0524 | Red Hat Security Advisory: Red Hat Network Satellite Server security update | 2008-06-30T15:33:00+00:00 | 2026-01-13T22:40:17+00:00 |
| rhsa-2008:0525 | Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update | 2008-06-30T15:36:00+00:00 | 2026-01-13T20:58:39+00:00 |
| rhsa-2008:0547 | Red Hat Security Advisory: seamonkey security update | 2008-07-02T12:21:00+00:00 | 2025-11-21T17:33:27+00:00 |
| rhsa-2008:0569 | Red Hat Security Advisory: firefox security update | 2008-07-02T12:37:00+00:00 | 2025-11-21T17:33:31+00:00 |
| rhsa-2008:0549 | Red Hat Security Advisory: firefox security update | 2008-07-02T12:48:00+00:00 | 2025-11-21T17:33:28+00:00 |
| rhsa-2008:0510 | Red Hat Security Advisory: Red Hat Application Stack v1.3 security and enhancement update | 2008-07-02T13:05:00+00:00 | 2025-11-21T17:33:21+00:00 |
| rhsa-2008:0505 | Red Hat Security Advisory: Red Hat Application Stack v2.1 security and enhancement update | 2008-07-02T13:15:00+00:00 | 2026-01-13T22:29:04+00:00 |
| rhsa-2008:0500 | Red Hat Security Advisory: rhpki-common security update | 2008-07-02T17:49:00+00:00 | 2025-11-21T17:33:18+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-20-252-02 | Siemens SIMATIC S7-300 and S7-400 CPUs (Update C) | 2020-09-08T00:00:00.000000Z | 2020-12-08T00:00:00.000000Z |
| icsa-20-252-03 | Siemens License Management Utility | 2020-09-08T00:00:00.000000Z | 2020-09-08T00:00:00.000000Z |
| icsa-20-252-04 | Siemens Spectrum Power | 2020-09-08T00:00:00.000000Z | 2020-09-08T00:00:00.000000Z |
| icsa-20-252-05 | Siemens Siveillance Video Client | 2020-09-08T00:00:00.000000Z | 2020-09-08T00:00:00.000000Z |
| icsa-20-252-06 | Siemens SIMATIC HMI Products (Update A) | 2020-09-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-252-07 | Siemens Industrial Products (Update F) | 2020-09-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-252-08 | Siemens Polarion Subversion Webclient | 2020-09-08T00:00:00.000000Z | 2020-09-08T00:00:00.000000Z |
| icsa-20-254-01 | AVEVA Enterprise Data Management Web | 2020-09-10T00:00:00.000000Z | 2020-09-10T00:00:00.000000Z |
| icsa-20-254-02 | FATEK Automation PLC WinProladder | 2020-09-10T00:00:00.000000Z | 2020-09-10T00:00:00.000000Z |
| icsa-20-254-03 | HMS Networks Ewon Flexy and Cosy | 2020-09-10T00:00:00.000000Z | 2020-09-10T00:00:00.000000Z |
| icsma-20-254-01 | Philips Patient Monitoring Devices (Update C) | 2020-09-10T06:00:00.000000Z | 2023-12-14T07:00:00.000000Z |
| icsa-20-261-01 | Advantech WebAccess Node | 2020-09-17T00:00:00.000000Z | 2020-09-17T00:00:00.000000Z |
| icsma-20-261-01 | ICSMA-20-261-01_Philips Clinical Collaboration Platform | 2020-09-17T00:00:00.000000Z | 2020-09-17T00:00:00.000000Z |
| icsa-20-266-01 | GE Digital APM Classic | 2020-09-22T00:00:00.000000Z | 2020-09-22T00:00:00.000000Z |
| icsa-20-266-02 | GE Reason S20 Ethernet Switch | 2020-09-22T00:00:00.000000Z | 2020-09-22T00:00:00.000000Z |
| icsa-20-273-01 | ICSA-20-273-01_MB Connect line mbCONNECT24, mymbCONNECT24 | 2020-09-29T00:00:00.000000Z | 2020-09-29T00:00:00.000000Z |
| icsa-20-273-02 | Yokogawa WideField3 | 2020-09-29T00:00:00.000000Z | 2020-09-29T00:00:00.000000Z |
| icsa-20-273-03 | B&R Automation SiteManager and GateManager | 2020-09-29T00:00:00.000000Z | 2020-09-29T00:00:00.000000Z |
| icsa-20-280-01 | Rockwell Automation ISaGRAF5 Runtime (Update A) | 2020-10-06T00:00:00.000000Z | 2021-06-17T00:00:00.000000Z |
| icsa-20-282-01 | Johnson Controls Sensormatic Electronics American Dynamics victor Web Client and Software House C•CURE Web Client (Update A) | 2020-10-08T00:00:00.000000Z | 2021-01-05T00:00:00.000000Z |
| icsa-20-287-01 | MOXA NPort IAW5000A-I/O Series | 2020-10-13T00:00:00.000000Z | 2020-10-13T00:00:00.000000Z |
| icsa-20-287-02 | LCDS LAquis SCADA | 2020-10-13T00:00:00.000000Z | 2020-10-13T00:00:00.000000Z |
| icsa-20-287-03 | Flexera InstallShield | 2020-10-13T00:00:00.000000Z | 2020-10-13T00:00:00.000000Z |
| icsa-20-287-04 | Fieldcomm Group HART-IP and hipserver | 2020-10-13T00:00:00.000000Z | 2020-10-13T00:00:00.000000Z |
| icsa-20-287-05 | Siemens Desigo Insight | 2020-10-13T00:00:00.000000Z | 2020-10-13T00:00:00.000000Z |
| icsa-20-287-06 | Siemens SIPORT MP | 2020-10-13T00:00:00.000000Z | 2020-10-13T00:00:00.000000Z |
| icsa-20-289-01 | Advantech WebAccess/SCADA | 2020-10-15T00:00:00.000000Z | 2020-10-15T00:00:00.000000Z |
| icsa-20-289-02 | Advantech R-SeeNet | 2020-10-15T00:00:00.000000Z | 2020-10-15T00:00:00.000000Z |
| icsa-20-294-01 | Rockwell Automation 1794-AENT Flex I/O Series B | 2020-10-20T00:00:00.000000Z | 2020-10-20T00:00:00.000000Z |
| icsa-20-294-02 | Hitachi ABB Power Grids XMC20 Multiservice-Multiplexer | 2020-10-20T00:00:00.000000Z | 2020-10-20T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-asa-ftd-crlf-inj-bx9urwsn | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN CRLF Injection Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:24+00:00 |
| cisco-sa-asa-ftd-tcp-dos-n3dmnu4t | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL/TLS Session Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-22T23:49:39+00:00 |
| cisco-sa-asa-rxss-l54htxp | Cisco Adaptive Security Appliance Software Web-Based Management Interface Reflected Cross-Site Scripting Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:19+00:00 |
| cisco-sa-asaftd-dos-qfcnepfx | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T13:16:34+00:00 |
| cisco-sa-asaftd-fileup-dos-zvc7wtys | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services File Upload Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:04+00:00 |
| cisco-sa-asaftd-frag-memleak-mctqdp9n | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IP Fragment Memory Leak Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:05+00:00 |
| cisco-sa-asaftd-ftpbypass-hy3utxyu | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software FTP Inspection Bypass Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:09+00:00 |
| cisco-sa-asaftd-ospflls-37xy2q6r | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software OSPFv2 Link-Local Signaling Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:06:55+00:00 |
| cisco-sa-asaftd-rule-bypass-p73abnwq | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN Portal Access Rule Bypass Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:06:54+00:00 |
| cisco-sa-asaftd-sipdos-3dgvdjvg | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SIP Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:14+00:00 |
| cisco-sa-asaftd-sslvpndma-dos-hrrqb9yx | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL VPN Direct Memory Access Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:06:59+00:00 |
| cisco-sa-asaftd-tls-bb-2g9uwkp | Cisco Firepower 1000 Series Bleichenbacher Attack Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-asaftd-webdos-fbzm5ynw | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:06:59+00:00 |
| cisco-sa-asaftd-xss-multiple-fcb3vpze | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Cross-Site Scripting Vulnerabilities | 2020-10-21T16:00:00+00:00 | 2021-06-28T15:14:27+00:00 |
| cisco-sa-fmc-cacauthbyp-nclgzm3q | Cisco Firepower Management Center Software Common Access Card Authentication Bypass Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-fmc-dos-3wymywkh | Cisco Firepower Management Center Software Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-fmc-redirect-nyduseqn | Cisco Firepower Management Center Software Open Redirect Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-fmc-xss-6vqh4rpz | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-bypass-3ecfd24j | Multiple Cisco Products SNORT HTTP Detection Engine File Policy Bypass Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-container-esc-fmyqfbqv | Cisco Firepower Threat Defense Software Multi-Instance Container Escape Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-hidcmd-pfdewvbd | Cisco Firepower Threat Defense Software Hidden Commands Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-icmp-dos-hxxcycm | Cisco Firepower 4110 ICMP Flood Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-inline-dos-nxquyeqm | Cisco Firepower Threat Defense Software Inline Pair/Passive Mode Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-snmp-dos-r8enpbos | Cisco Firepower Threat Defense Software SNMP Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-ssl-dcrpt-dos-ryekx4yy | Cisco Firepower 2100 Series SSL/TLS Inspection Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-ssl-mf3822z | Cisco Firepower Threat Defense Software SSL Input Validation Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-tcp-dos-gdczdqaf | Cisco Firepower Threat Defense Software TCP Flood Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftdfmc-dirtrav-nw8xcusb | Cisco Firepower Management Center Software and Firepower Threat Defense Software Directory Traversal Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftdfmc-dos-njyvdcla | Cisco Firepower Management Center Software Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftdfmc-sft-mitm-tc8azfs2 | Cisco Firepower Management Center Software and Firepower Threat Defense Software sftunnel Pass the Hash Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-22930 | Node.js before 16.6.0 14.17.4 and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption to change process behavior. | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-2471 | Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Connectors accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. CVSS 3.1 Base Score 5.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-10-27T00:00:00.000Z |
| msrc_cve-2021-2478 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-2479 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-2481 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-25219 | Lame cache can be abused to severely degrade resolver performance | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-32626 | Lua scripts can overflow the heap-based Lua stack in Redis | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-32627 | Integer overflow issue with Streams in Redis | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-32628 | Vulnerability in handling large ziplists | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-32672 | Vulnerability in Lua Debugger in Redis | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-32675 | DoS vulnerability in Redis | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-32687 | Integer overflow issue with intsets in Redis | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-32762 | Integer overflow that can lead to heap overflow in redis-cli redis-sentinel on some platforms | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35537 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35546 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35575 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35577 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via MySQL Protcol to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35591 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35596 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Error Handling). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35597 | Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35602 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35607 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35608 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35610 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35612 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35618 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 1.8 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L). | 2021-10-02T00:00:00.000Z | 2021-10-26T00:00:00.000Z |
| msrc_cve-2021-35621 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior 7.5.23 and prior 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2021-10-02T00:00:00.000Z | 2021-10-26T00:00:00.000Z |
| msrc_cve-2021-35622 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35623 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35624 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation deletion or modification access to critical data or all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202004-2235 | NA-VIEW is a touch screen configuration software. NA-VIEW V2.0 (only for 15-inch touc… | 2022-05-04T09:38:10.928000Z |
| var-202002-1691 | Schneider Electric Modicon M580 is an Ethernet programmable controller. Schneider Ele… | 2022-05-04T09:38:18.216000Z |
| var-202001-1990 | ZXR10 1800-2S is a router product of ZTE Corporation of China. ZTE ZXR10 1800-2S has fil… | 2022-05-04T09:38:22.607000Z |
| var-202001-1969 | Beijing Wenwang Yilian Information Technology Co., Ltd. is a long-term research, developm… | 2022-05-04T09:38:22.620000Z |
| var-201912-2015 | Netcom WAN Optimization Gateway NS-WOG is the latest technology innovation product of Net… | 2022-05-04T09:38:24.641000Z |
| var-201911-1959 | Amazon Ring Video Doorbell is a smart wireless home security doorbell camera that allows … | 2022-05-04T09:38:26.426000Z |
| var-201910-1863 | Intelbras Router WRN150 is a wireless router from Brazil's Intelbras. Intelbras Router W… | 2022-05-04T09:38:31.640000Z |
| var-201908-2209 | Longsun Technology (Shanghai) Co., Ltd. is a supplier of IoT modules and solutions. Long… | 2022-05-04T09:38:35.040000Z |
| var-201907-1759 | Hangzhou Magic Point Technology Co., Ltd. is a technology-based enterprise combining arti… | 2022-05-04T09:38:40.103000Z |
| var-201907-1422 | A CWE-119 Buffer Errors vulnerability exists in Modicon M580 CPU - BMEP582040, all versio… | 2022-05-04T09:38:40.369000Z |
| var-201906-1346 | DeviceViewer is a Windows-based IP camera viewing application. DeviceViewer has a passwo… | 2022-05-04T09:38:42.119000Z |
| var-201905-1431 | Sony LF-S80D wireless speaker is a smart speaker product produced by Sony Corporation. T… | 2022-05-04T09:38:43.102000Z |
| var-201903-1643 | ZTE Video Conference MCU Device exists XML File Information Disclosure Vulnerability in M… | 2022-05-04T09:38:48.838000Z |
| var-201901-1700 | Maipu switches generally have weak passwords. After entering, they can perform arbitrary … | 2022-05-04T09:38:51.071000Z |
| var-201810-1617 | Hangzhou DPtech Co., Ltd. (referred to as DPtech) is a high-tech enterprise integrating R… | 2022-05-04T09:38:57.743000Z |
| var-201810-1596 | Pelco Sarix Pro is a video surveillance device from Schneider Electric. Schneider Pelco … | 2022-05-04T09:38:57.756000Z |
| var-201809-1337 | Calamp is a pioneer in M2M telematics, managing more than 1.5M IoT devices. CalAmp l… | 2022-05-04T09:38:59.249000Z |
| var-201807-2272 | MikroTikRouterOS is a routing operating system based on Linux kernel development, compati… | 2022-05-04T09:39:04.468000Z |
| var-201803-2360 | The Play Library SDK is developed based on Dahua's proprietary stream encapsulation proto… | 2022-05-04T09:39:12.862000Z |
| var-201801-1847 | SOC8000 IP-PBX is a new generation carrier-grade unified communications system. There is… | 2022-05-04T09:39:19.196000Z |
| var-201801-1826 | pelco Sarix Professional is a video camera. A code execution vulnerability exists in the… | 2022-05-04T09:39:19.207000Z |
| var-201712-0784 | IBM WebSphere MQ 8.0 and 9.0 could allow, under special circumstances, an unauthorized us… | 2022-05-04T09:39:21.241000Z |
| var-201711-1236 | Sichuan Telecom Tianyi Broadband Home Gateway TEWA-500E is a home version router. Sichua… | 2022-05-04T09:39:21.883000Z |
| var-201711-0753 | IBM WebSphere MQ 8.0 and 9.0 could allow an authenticated user to cause a shared memory l… | 2022-05-04T09:39:22.550000Z |
| var-201709-1240 | Arris Modems is a modem produced by telecommunications equipment manufacturer Arris, a ne… | 2022-05-04T09:39:24.245000Z |
| var-201707-1349 | Lenovo PowerV Firewall is a comprehensive UTM that integrates firewall, IPSec VPN, SSL VP… | 2022-05-04T09:39:29.149000Z |
| var-201706-1135 | Foscamcamera is a webcam that can push messages to mobile phones and directly implement v… | 2022-05-04T09:39:30.448000Z |
| var-201706-1114 | DSS (Digital Surveillance System) is a highly integrated and powerful digital monitoring … | 2022-05-04T09:39:30.459000Z |
| var-201705-4197 | Beijing Weifangtong Information Technology Co., Ltd. bunker fortress is a single point fu… | 2022-05-04T09:39:32.369000Z |
| var-201703-1394 | WirelessIPCamera (P2P) WIFICAM is a wireless IP camera. WirelessIPCamera (P2P) WIFICAM is… | 2022-05-04T09:39:39.561000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000045 | baserCMS plugin "Casebook Plugin" vulnerable to cross-site request forgery | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000048 | EC-CUBE plugin "Social-button Plugin Premium" and "Social-button Plugin" vulnerable to cross-site scripting | 2016-04-08T12:31+09:00 | 2016-05-06T16:13+09:00 |
| jvndb-2016-000049 | Tokyo Star bank App fails to verify SSL server certificates | 2016-04-13T14:30+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000050 | Photopt App fails to verify SSL server certificates | 2016-04-19T13:44+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000054 | Electron may insecurely load Node modules | 2016-04-22T13:49+09:00 | 2016-06-01T15:56+09:00 |
| jvndb-2016-000055 | kintone mobile for Android information management vulnerability | 2016-04-25T15:35+09:00 | 2016-06-01T16:21+09:00 |
| jvndb-2016-000056 | kintone mobile for Android fails to verify SSL server certificates | 2016-04-25T15:36+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000051 | EC-CUBE fails to restrict access permissions | 2016-04-26T13:56+09:00 | 2016-05-31T17:41+09:00 |
| jvndb-2016-000052 | EC-CUBE fails to restrict access permissions | 2016-04-26T13:56+09:00 | 2016-05-31T17:41+09:00 |
| jvndb-2016-000057 | Multiple shiro8 Co., Ltd. freearea_ addition_plugins for EC-CUBE vulnerable to cross-site scripting | 2016-04-26T14:18+09:00 | 2016-05-25T17:48+09:00 |
| jvndb-2016-000053 | EC-CUBE vulnerable to cross-site request forgery | 2016-04-26T14:24+09:00 | 2016-05-31T17:40+09:00 |
| jvndb-2016-000058 | Apache Cordova fails to restrict access permissions | 2016-05-11T14:16+09:00 | 2016-06-02T17:49+09:00 |
| jvndb-2016-000059 | Apache Cordova vulnerable to arbitrary plugin execution | 2016-05-11T14:16+09:00 | 2016-06-01T16:30+09:00 |
| jvndb-2016-000061 | WN-GDN/R3 Series does not limit authentication attempts | 2016-05-12T14:34+09:00 | 2016-06-01T16:52+09:00 |
| jvndb-2016-000062 | WN-G300R Series vulnerable to cross-site scripting | 2016-05-12T14:34+09:00 | 2016-06-01T16:48+09:00 |
| jvndb-2016-000063 | FileMaker server issue where PHP source code may be viewable | 2016-05-13T14:27+09:00 | 2016-06-02T09:43+09:00 |
| jvndb-2016-000064 | WordPress plugin "Ninja Forms" vulnerable to PHP object injection | 2016-05-13T14:27+09:00 | 2016-06-01T17:00+09:00 |
| jvndb-2016-000046 | a-blog cms vulnerable to cross-site scripting | 2016-05-16T14:48+09:00 | 2017-05-23T13:44+09:00 |
| jvndb-2016-000047 | a-blog cms vulnerable to session management | 2016-05-16T14:48+09:00 | 2017-05-23T13:44+09:00 |
| jvndb-2016-000060 | Cybozu KUNAI App fails to verify SSL server certificates | 2016-05-16T16:14+09:00 | 2017-05-23T16:23+09:00 |
| jvndb-2016-000065 | 105 BANK App fails to verify SSL server certificates | 2016-05-18T15:26+09:00 | 2017-05-29T11:45+09:00 |
| jvndb-2016-000066 | Web Mailing List vulnerable to cross-site scripting | 2016-05-19T13:37+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000069 | MP Form Mail CGI Professional Edition vulnerable to directory traversal | 2016-05-20T14:22+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000068 | HumHub vulnerable to cross-site scripting | 2016-05-24T12:24+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000070 | php-contact-form vulnerable to cross-site scripting | 2016-05-24T12:27+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000067 | Jetstar App for iOS fails to verify SSL server certificates | 2016-05-24T13:36+09:00 | 2017-05-29T11:45+09:00 |
| jvndb-2016-002715 | Information Disclosure Vulnerability in Hitachi Command Suite | 2016-05-24T16:43+09:00 | 2016-08-03T16:09+09:00 |
| jvndb-2016-002716 | Cross-site Scripting Vulnerability in Hitachi Tuning Manager | 2016-05-24T16:43+09:00 | 2016-08-03T16:09+09:00 |
| jvndb-2016-000071 | WordPress plugin "Markdown on Save Improved" vulnerable to cross-site scripting | 2016-05-25T14:37+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000075 | NetCommons vulnerable to privilege escalation | 2016-05-26T14:30+09:00 | 2016-06-23T15:13+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2017:0279-1 | Security update for systemd | 2017-01-25T08:17:29Z | 2017-01-25T08:17:29Z |
| suse-su-2017:0286-1 | Security update for pcsc-lite | 2017-01-25T14:30:03Z | 2017-01-25T14:30:03Z |
| suse-su-2017:0289-1 | Security update for gstreamer-0_10-plugins-base | 2017-01-25T21:52:25Z | 2017-01-25T21:52:25Z |
| suse-su-2017:0292-1 | Security update for dbus-1 | 2017-01-26T11:34:18Z | 2017-01-26T11:34:18Z |
| suse-su-2017:0293-1 | Security update for Linux Kernel Live Patch 2 for SLE 12 SP2 | 2017-01-26T16:02:57Z | 2017-01-26T16:02:57Z |
| suse-su-2017:0294-1 | Security update for Linux Kernel Live Patch 10 for SLE 12 SP1 | 2017-01-26T16:03:25Z | 2017-01-26T16:03:25Z |
| suse-su-2017:0304-1 | Security update for gnutls | 2017-01-27T17:23:55Z | 2017-01-27T17:23:55Z |
| suse-su-2017:0305-1 | Security update for GraphicsMagick | 2017-01-27T17:25:07Z | 2017-01-27T17:25:07Z |
| suse-su-2017:0302-1 | Security update for bash | 2017-01-27T17:26:26Z | 2017-01-27T17:26:26Z |
| suse-su-2017:0303-1 | Security update for Linux Kernel Live Patch 18 for SLE 12 | 2017-01-27T17:26:40Z | 2017-01-27T17:26:40Z |
| suse-su-2017:0307-1 | Security update for Linux Kernel Live Patch 4 for SLE 12 SP2 | 2017-01-27T20:10:23Z | 2017-01-27T20:10:23Z |
| suse-su-2017:0331-1 | Security update for gstreamer-0_10-plugins-bad | 2017-01-30T12:27:16Z | 2017-01-30T12:27:16Z |
| suse-su-2017:0330-1 | Security update for gstreamer-0_10-plugins-bad | 2017-01-30T12:27:46Z | 2017-01-30T12:27:46Z |
| suse-su-2017:0333-1 | Security update for the Linux Kernel | 2017-01-30T16:03:00Z | 2017-01-30T16:03:00Z |
| suse-su-2017:0338-1 | Security update for policycoreutils | 2017-01-31T12:04:24Z | 2017-01-31T12:04:24Z |
| suse-su-2017:0340-1 | Security update for policycoreutils | 2017-01-31T12:04:39Z | 2017-01-31T12:04:39Z |
| suse-su-2017:0339-1 | Security update for policycoreutils | 2017-01-31T12:05:52Z | 2017-01-31T12:05:52Z |
| suse-su-2017:0346-1 | Security update for java-1_8_0-openjdk | 2017-01-31T16:25:20Z | 2017-01-31T16:25:20Z |
| suse-su-2017:0348-1 | Security update for gnutls | 2017-02-01T07:19:39Z | 2017-02-01T07:19:39Z |
| suse-su-2017:0366-1 | Security update for cpio | 2017-02-02T17:22:49Z | 2017-02-02T17:22:49Z |
| suse-su-2017:0375-1 | Security update for libcap-ng | 2017-02-03T07:07:26Z | 2017-02-03T07:07:26Z |
| suse-su-2017:0380-1 | Security update for libxml2 | 2017-02-03T17:46:15Z | 2017-02-03T17:46:15Z |
| suse-su-2017:0379-1 | Security update for gcc48 | 2017-02-03T17:46:46Z | 2017-02-03T17:46:46Z |
| suse-su-2017:0394-1 | Security update for guile | 2017-02-06T10:52:11Z | 2017-02-06T10:52:11Z |
| suse-su-2017:0398-1 | Security update for guile | 2017-02-06T10:53:21Z | 2017-02-06T10:53:21Z |
| suse-su-2017:0396-1 | Security update for spice | 2017-02-06T10:55:00Z | 2017-02-06T10:55:00Z |
| suse-su-2017:0400-1 | Security update for spice | 2017-02-06T10:55:25Z | 2017-02-06T10:55:25Z |
| suse-su-2017:0393-1 | Security update for spice | 2017-02-06T10:56:07Z | 2017-02-06T10:56:07Z |
| suse-su-2017:0392-1 | Security update for spice | 2017-02-06T11:09:42Z | 2017-02-06T11:09:42Z |
| suse-su-2017:1964-1 | Security update for containerd, docker, runc | 2017-02-06T14:38:53Z | 2017-02-06T14:38:53Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2020:1183-2 | Security update for ark | 2020-08-12T08:29:36Z | 2020-08-12T08:29:36Z |
| opensuse-su-2020:1188-1 | Security update for wireshark | 2020-08-12T10:21:52Z | 2020-08-12T10:21:52Z |
| opensuse-su-2020:1189-1 | Security update for MozillaFirefox | 2020-08-12T10:23:21Z | 2020-08-12T10:23:21Z |
| opensuse-su-2020:1190-1 | Security update for xen | 2020-08-12T10:23:43Z | 2020-08-12T10:23:43Z |
| opensuse-su-2020:1191-1 | Security update for java-11-openjdk | 2020-08-12T10:24:14Z | 2020-08-12T10:24:14Z |
| opensuse-su-2020:1192-1 | Security update for claws-mail | 2020-08-12T10:24:31Z | 2020-08-12T10:24:31Z |
| opensuse-su-2020:1194-1 | Security update for go1.13 | 2020-08-12T12:23:01Z | 2020-08-12T12:23:01Z |
| opensuse-su-2020:1196-1 | Security update for xen | 2020-08-13T08:33:25Z | 2020-08-13T08:33:25Z |
| opensuse-su-2020:1198-1 | Security update for libX11 | 2020-08-14T08:15:59Z | 2020-08-14T08:15:59Z |
| opensuse-su-2020:1199-1 | Security update for wireshark | 2020-08-14T15:28:24Z | 2020-08-14T15:28:24Z |
| opensuse-su-2020:1200-1 | Security update for xrdp | 2020-08-14T15:28:29Z | 2020-08-14T15:28:29Z |
| opensuse-su-2020:1204-1 | Security update for perl-XML-Twig | 2020-08-14T15:28:57Z | 2020-08-14T15:28:57Z |
| opensuse-su-2020:1205-1 | Security update for MozillaThunderbird | 2020-08-14T15:29:10Z | 2020-08-14T15:29:10Z |
| opensuse-su-2020:1206-1 | Security update for chromium | 2020-08-14T15:29:45Z | 2020-08-14T15:29:45Z |
| opensuse-su-2020:1207-1 | Security update for balsa | 2020-08-14T16:20:43Z | 2020-08-14T16:20:43Z |
| opensuse-su-2020:1208-1 | Security update for firejail | 2020-08-14T16:20:51Z | 2020-08-14T16:20:51Z |
| opensuse-su-2020:1209-1 | Security update for hylafax+ | 2020-08-14T18:18:53Z | 2020-08-14T18:18:53Z |
| opensuse-su-2020:1210-1 | Security update for hylafax+ | 2020-08-14T18:19:00Z | 2020-08-14T18:19:00Z |
| opensuse-su-2020:1214-1 | Security update for chromium | 2020-08-15T12:18:31Z | 2020-08-15T12:18:31Z |
| opensuse-su-2020:1215-1 | Security update for chromium | 2020-08-15T12:18:48Z | 2020-08-15T12:18:48Z |
| opensuse-su-2020:1222-1 | Security update for libreoffice | 2020-08-16T10:18:43Z | 2020-08-16T10:18:43Z |
| opensuse-su-2020:1227-1 | Security update for postgresql96, postgresql10 and postgresql12 | 2020-08-17T10:30:27Z | 2020-08-17T10:30:27Z |
| opensuse-su-2020:1228-1 | Security update for postgresql, postgresql96, postgresql10, postgresql12 | 2020-08-17T14:19:12Z | 2020-08-17T14:19:12Z |
| opensuse-su-2020:1230-1 | Security update for balsa | 2020-08-18T04:18:25Z | 2020-08-18T04:18:25Z |
| opensuse-su-2020:1231-1 | Security update for hylafax+ | 2020-08-18T08:18:28Z | 2020-08-18T08:18:28Z |
| opensuse-su-2020:1232-1 | Security update for knot | 2020-08-18T12:21:35Z | 2020-08-18T12:21:35Z |
| opensuse-su-2020:1241-1 | Security update for dovecot23 | 2020-08-21T14:22:15Z | 2020-08-21T14:22:15Z |
| opensuse-su-2020:1243-1 | Security update for postgresql12 | 2020-08-21T22:20:45Z | 2020-08-21T22:20:45Z |
| opensuse-su-2020:1244-1 | Security update for postgresql12 | 2020-08-21T22:20:51Z | 2020-08-21T22:20:51Z |
| opensuse-su-2020:1254-1 | Security update for python | 2020-08-24T08:20:54Z | 2020-08-24T08:20:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-01357 | WESP SDK 'WESPConfig' ActiveX存在多个缓冲区溢出漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01358 | UnAce缓冲区溢出漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01359 | SYNCK GRAPHICA Mailform Pro远程代码执行漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01360 | Squid HTTP头注入漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01361 | Speed Software Root Explorer目录遍历漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01362 | RubyGems xaviershay-dm-rails 'storage.rb' MySQL信息泄露漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01363 | phpBugTracker存在多个漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01364 | Cisco Unified Computing System C-Series DHCP报文处理拒绝服务漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01365 | Kony Enterprise Mobile Management存在多个信息泄露漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01386 | ADPlugg 'Access Code'字段HTML注入漏洞 | 2015-02-26 | 2015-03-03 |
| cnvd-2015-01387 | Adtrustmedia PrivDog SSL证书安全绕过漏洞 | 2015-02-26 | 2015-03-03 |
| cnvd-2015-01388 | AL-Mail32附件名缓冲区溢出漏洞 | 2015-02-26 | 2015-03-03 |
| cnvd-2015-01389 | Linux Kernel 'llc/sysctl_net_llc.c'本地信息泄露漏洞 | 2015-02-26 | 2015-03-03 |
| cnvd-2015-01560 | ILAS II图书管理系统SQL注入漏洞 | 2015-02-26 | 2015-04-01 |
| cnvd-2015-01339 | UberFire Framework存在多个漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01340 | textAngular跨站脚本漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01341 | Drupal Webform prepopulate block模块跨站脚本漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01342 | Samsung iPOLiS Device Manager缓冲区溢出漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01343 | GNU C Library代码注入漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01344 | McAfee Managed Agent输入验证漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01345 | Puppet Labs Facter信息泄露漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01346 | IBM Tivoli Storage Manager栈缓冲区溢出漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01347 | Cisco AsyncOS Web框架输入验证漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01348 | WordPress插件Contact Form DB跨站脚本漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01385 | Microsoft Virtual PC Hypervisor Virtual Machine Monitor安全绕过漏洞 | 2015-02-27 | 2015-03-03 |
| cnvd-2015-01399 | GNU glibc 'getaddrinfo.c'远程代码执行漏洞 | 2015-02-27 | 2015-03-04 |
| cnvd-2015-01402 | e2fsprogs本地缓冲区溢出漏洞 | 2015-02-27 | 2015-03-04 |
| cnvd-2015-01403 | CreA8social 'Add Game'字段HTML注入漏洞 | 2015-02-27 | 2015-03-04 |
| cnvd-2015-01350 | Joomla! Googlemaps插件安全绕过漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01366 | Vanilla Forums跨站脚本漏洞 | 2015-02-28 | 2015-03-02 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2005-avi-203 | Vulnérabilité d'ImageMagick et GraphicsMagick | 2005-06-13T00:00:00.000000 | 2005-06-29T00:00:00.000000 |
| certa-2005-avi-204 | Vulnérabilité dans Symantec pcAnywhere | 2005-06-13T00:00:00.000000 | 2005-06-13T00:00:00.000000 |
| certa-2005-avi-206 | Vulnérabilité de produits Adobe | 2005-06-13T00:00:00.000000 | 2005-06-13T00:00:00.000000 |
| certa-2005-avi-207 | Vulnérabilité de GNU wget | 2005-06-13T00:00:00.000000 | 2005-09-29T00:00:00.000000 |
| certa-2005-avi-208 | Vulnérabilités de Novell iManager et Novell eDirectory | 2005-06-13T00:00:00.000000 | 2005-06-13T00:00:00.000000 |
| certa-2005-avi-209 | Vulnérabilités des versions Sun de Java 2 Standard Edition | 2005-06-14T00:00:00.000000 | 2005-06-23T00:00:00.000000 |
| certa-2005-avi-210 | Vulnérabilité dans Microsoft Outlook Express | 2005-06-15T00:00:00.000000 | 2005-06-15T00:00:00.000000 |
| certa-2005-avi-211 | Vulnérabilité de Outlook Web Access pour Microsoft Exchange Serveur 5.5 | 2005-06-15T00:00:00.000000 | 2005-06-15T00:00:00.000000 |
| certa-2005-avi-212 | Vulnérabilité dans l'aide HTML de Windows | 2005-06-15T00:00:00.000000 | 2005-06-17T00:00:00.000000 |
| certa-2005-avi-213 | Vulnérabilité dans SMB de Microsoft | 2005-06-15T00:00:00.000000 | 2005-06-17T00:00:00.000000 |
| certa-2005-avi-214 | Vulnérabilité du client Telnet Microsoft | 2005-06-15T00:00:00.000000 | 2005-10-06T00:00:00.000000 |
| certa-2005-avi-215 | Vulnérabilité de Microsoft ISA Server 2000 | 2005-06-15T00:00:00.000000 | 2005-06-15T00:00:00.000000 |
| certa-2005-avi-216 | Vulnérabilité des systèmes Microsoft Windows | 2005-06-15T00:00:00.000000 | 2005-06-15T00:00:00.000000 |
| certa-2005-avi-217 | Vulnérabilité des systèmes Microsoft Windows | 2005-06-15T00:00:00.000000 | 2005-06-15T00:00:00.000000 |
| certa-2005-avi-218 | Vulnérabilités dans Internet Explorer | 2005-06-15T00:00:00.000000 | 2005-06-15T00:00:00.000000 |
| certa-2005-avi-219 | Vulnérabilité dans le service WebClient de Microsoft | 2005-06-15T00:00:00.000000 | 2005-06-15T00:00:00.000000 |
| certa-2005-avi-220 | Vulnérabilité dans des produits Adobe | 2005-06-15T00:00:00.000000 | 2005-06-20T00:00:00.000000 |
| certa-2005-avi-221 | Vulnérabilité de gedit | 2005-06-16T00:00:00.000000 | 2006-02-24T00:00:00.000000 |
| certa-2005-avi-222 | Vulnérabilité de lpadmin sous Solaris | 2005-06-17T00:00:00.000000 | 2005-06-17T00:00:00.000000 |
| certa-2005-avi-223 | Vulnérabilité de Opera | 2005-06-17T00:00:00.000000 | 2005-06-23T00:00:00.000000 |
| certa-2005-avi-224 | Vulnérabilité de SquirrelMail | 2005-06-17T00:00:00.000000 | 2005-07-29T00:00:00.000000 |
| certa-2005-avi-225 | Vulnérabilité dans SpamAssassin | 2005-06-17T00:00:00.000000 | 2005-07-11T00:00:00.000000 |
| certa-2005-avi-226 | Vulnérabilité dans l'utilitaire sudo | 2005-06-21T00:00:00.000000 | 2005-07-01T00:00:00.000000 |
| certa-2005-avi-227 | Multiples vulnérabilités de Cacti | 2005-06-23T00:00:00.000000 | 2005-07-21T00:00:00.000000 |
| certa-2005-avi-228 | Vulnérabilité des produits webmail de SUN | 2005-06-23T00:00:00.000000 | 2005-06-23T00:00:00.000000 |
| certa-2005-avi-229 | Multiples vulnérabilités de Veritas Backup Exec | 2005-06-23T00:00:00.000000 | 2005-06-23T00:00:00.000000 |
| certa-2005-avi-230 | Multiples vulnérabilités des lecteurs RealPlayer | 2005-06-24T00:00:00.000000 | 2005-07-06T00:00:00.000000 |
| certa-2005-avi-231 | Multiples vulnérabilités dans le noyau Linux | 2005-06-27T00:00:00.000000 | 2005-06-27T00:00:00.000000 |
| certa-2005-avi-232 | Vulnérabilité dans SGI IRIX | 2005-06-27T00:00:00.000000 | 2005-06-27T00:00:00.000000 |
| certa-2005-avi-233 | Vulnérabilité dans la base de données DB2 | 2005-06-28T00:00:00.000000 | 2005-06-28T00:00:00.000000 |