Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0759 |
N/A
|
Buffer overflow in FuseMAIL POP service via long … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:37.653Z |
| CVE-1999-0787 |
N/A
|
The SSH authentication agent follows symlinks via… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.126Z |
| CVE-1999-0788 |
N/A
|
Arkiea nlservd allows remote attackers to conduct… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.020Z |
| CVE-1999-0791 |
N/A
|
Hybrid Network cable modems do not include an aut… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.074Z |
| CVE-1999-0823 |
N/A
|
Buffer overflow in FreeBSD xmindpath allows local… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.126Z |
| CVE-1999-0826 |
N/A
|
Buffer overflow in FreeBSD angband allows local u… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.225Z |
| CVE-1999-0873 |
N/A
|
Buffer overflow in Skyfull mail server via MAIL F… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:28.820Z |
| CVE-1999-0904 |
N/A
|
Buffer overflow in BFTelnet allows remote attacke… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.075Z |
| CVE-1999-0912 |
N/A
|
FreeBSD VFS cache (vfs_cache) allows local users … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.308Z |
| CVE-1999-0927 |
N/A
|
NTMail allows remote attackers to read arbitrary … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.410Z |
| CVE-1999-0928 |
N/A
|
Buffer overflow in SmartDesk WebSuite allows remo… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.498Z |
| CVE-1999-0932 |
N/A
|
Mediahouse Statistics Server allows remote attack… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.378Z |
| CVE-1999-0942 |
N/A
|
UnixWare dos7utils allows a local user to gain ro… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.614Z |
| CVE-1999-0946 |
N/A
|
Buffer overflow in Yamaha MidiPlug via a Text var… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.425Z |
| CVE-1999-0954 |
N/A
|
WWWBoard has a default username and default password. |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.379Z |
| CVE-1999-0971 |
N/A
|
Buffer overflow in Exim allows local users to gai… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.296Z |
| CVE-1999-1004 |
N/A
|
Buffer overflow in the POP server POProxy for the… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.347Z |
| CVE-2000-0002 |
N/A
|
Buffer overflow in ZBServer Pro 1.50 allows remot… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T04:58:11.447Z |
| CVE-2000-0009 |
N/A
|
The bna_pass program in Optivity NETarchitect use… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T04:58:11.888Z |
| CVE-2000-0056 |
N/A
|
IMail IMONITOR status.cgi CGI script allows remot… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.944Z |
| CVE-2000-0063 |
N/A
|
cgiproc CGI script in Nortel Contivity HTTP serve… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.526Z |
| CVE-2000-0064 |
N/A
|
cgiproc CGI script in Nortel Contivity HTTP serve… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.982Z |
| CVE-2000-0065 |
N/A
|
Buffer overflow in InetServ 3.0 allows remote att… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.909Z |
| CVE-2000-0075 |
N/A
|
Super Mail Transfer Package (SMTP), later called … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.968Z |
| CVE-2000-0076 |
N/A
|
nviboot boot script in the Debian nvi package all… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.920Z |
| CVE-2000-0090 |
N/A
|
VMWare 1.1.2 allows local users to cause a denial… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.623Z |
| CVE-2000-0094 |
N/A
|
procfs in BSD systems allows local users to gain … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.945Z |
| CVE-2000-0116 |
N/A
|
Firewall-1 does not properly filter script tags, … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.921Z |
| CVE-2000-0117 |
N/A
|
The siteUserMod.cgi program in Cobalt RaQ2 server… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.941Z |
| CVE-2000-0127 |
N/A
|
The Webspeed configuration program does not prope… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:54.007Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0834 |
N/A
|
Buffer overflow in RSAREF2 via the encryption and… |
n/a |
n/a |
2000-01-18T05:00:00 | 2024-08-01T16:48:38.231Z |
| CVE-1999-0838 |
N/A
|
Buffer overflow in Serv-U FTP 2.5 allows remote u… |
n/a |
n/a |
2000-06-02T04:00:00 | 2024-08-01T16:48:38.212Z |
| CVE-1999-0846 |
N/A
|
Denial of service in MDaemon 2.7 via a large numb… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:38.021Z |
| CVE-1999-0853 |
N/A
|
Buffer overflow in Netscape Enterprise Server and… |
n/a |
n/a |
2000-01-18T05:00:00 | 2024-08-01T16:48:38.293Z |
| CVE-1999-0855 |
N/A
|
Buffer overflow in FreeBSD gdc program. |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:55:27.880Z |
| CVE-1999-0856 |
N/A
|
login in Slackware 7.0 allows remote attackers to… |
n/a |
n/a |
2000-06-02T04:00:00 | 2024-08-01T16:55:27.892Z |
| CVE-1999-0857 |
N/A
|
FreeBSD gdc program allows local users to modify … |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:55:29.013Z |
| CVE-1999-0859 |
N/A
|
Solaris arp allows local users to read files via … |
n/a |
n/a |
2000-06-02T04:00:00 | 2024-08-01T16:55:27.903Z |
| CVE-1999-0860 |
N/A
|
Solaris chkperm allows local users to read files … |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:55:29.081Z |
| CVE-1999-0963 |
N/A
|
FreeBSD mount_union command allows local users to… |
n/a |
n/a |
2000-01-04T05:00:00 | 2024-08-01T16:55:29.415Z |
| CVE-2000-0004 |
N/A
|
ZBServer Pro allows remote attackers to read sour… |
n/a |
n/a |
2000-06-02T04:00:00 | 2024-08-08T04:58:11.539Z |
| CVE-2000-0021 |
N/A
|
Lotus Domino HTTP server allows remote attackers … |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-08T04:58:11.587Z |
| CVE-1999-0828 |
N/A
|
UnixWare pkg commands such as pkginfo, pkgcat, an… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:38.080Z |
| CVE-1999-0850 |
N/A
|
The default permissions for Endymion MailMan allo… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:38.086Z |
| CVE-1999-0852 |
N/A
|
IBM WebSphere sets permissions that allow a local… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:38.295Z |
| CVE-1999-0858 |
N/A
|
Internet Explorer 5 allows a remote attacker to m… |
n/a |
n/a |
2000-01-04T05:00:00 | 2024-08-01T16:55:27.892Z |
| CVE-1999-0862 |
N/A
|
Insecure directory permissions in RPM distributio… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:55:28.690Z |
| CVE-2000-0366 |
N/A
|
dump in Debian GNU/Linux 2.1 does not properly re… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:14:21.448Z |
| CVE-1999-0825 |
N/A
|
The default permissions for UnixWare /var/mail al… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:48:38.105Z |
| CVE-1999-0864 |
N/A
|
UnixWare programs that dump core allow a local us… |
n/a |
n/a |
2000-06-02T04:00:00 | 2024-08-01T16:55:27.897Z |
| CVE-1999-0865 |
N/A
|
Buffer overflow in CommuniGatePro via a long stri… |
n/a |
n/a |
2000-06-02T04:00:00 | 2024-08-01T16:55:27.890Z |
| CVE-1999-0866 |
N/A
|
Buffer overflow in UnixWare xauto program allows … |
n/a |
n/a |
2000-06-02T04:00:00 | 2024-08-01T16:55:28.964Z |
| CVE-2000-0139 |
N/A
|
Internet Anywhere POP3 Mail Server allows local u… |
n/a |
n/a |
2000-03-22T05:00:00 | 2024-08-08T05:05:53.930Z |
| CVE-2000-0357 |
N/A
|
ORBit and esound in Red Hat Linux 6.1 do not use … |
n/a |
n/a |
2000-05-24T04:00:00 | 2024-08-08T05:14:21.468Z |
| CVE-2000-0358 |
N/A
|
ORBit and gnome-session in Red Hat Linux 6.1 allo… |
n/a |
n/a |
2000-05-24T04:00:00 | 2024-08-08T05:14:21.419Z |
| CVE-1999-0988 |
N/A
|
UnixWare pkgtrans allows local users to read arbi… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:55:29.416Z |
| CVE-1999-0982 |
N/A
|
The Sun Web-Based Enterprise Management (WBEM) in… |
n/a |
n/a |
2000-01-04T05:00:00 | 2024-08-01T16:55:29.323Z |
| CVE-1999-0990 |
N/A
|
Error messages generated by gdm with the VerboseA… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:55:29.404Z |
| CVE-1999-0989 |
N/A
|
Buffer overflow in Internet Explorer 5 directshow… |
n/a |
n/a |
2000-01-04T05:00:00 | 2024-08-01T16:55:29.350Z |
| CVE-1999-0991 |
N/A
|
Buffer overflow in GoodTech Telnet Server NT allo… |
n/a |
n/a |
2000-01-04T05:00:00 | 2024-08-01T16:55:29.339Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-8948-ffc6-jg52 |
4.2 (3.1)
|
Insecure Default Configuration in redbird | 2019-06-06T15:32:21Z | 2021-08-04T20:58:53Z |
| ghsa-gm9g-2g8v-fvxj |
7.5 (3.1)
|
Prototype Pollution in upmerge | 2019-06-06T15:32:28Z | 2021-09-16T20:59:20Z |
| ghsa-c35v-qwqg-87jc |
3.1 (3.1)
|
express-basic-auth Timing Attack due to native string comparison instead of constant time string co… | 2019-06-06T15:32:32Z | 2022-08-03T16:27:53Z |
| ghsa-r6v3-hpxj-r8rv |
7.5 (3.1)
|
Code Injection in PyXDG | 2019-06-07T20:56:27Z | 2024-10-15T16:41:13Z |
| ghsa-g45g-g52h-39rg |
4.7 (3.1)
|
Cross-site Scripting in Chartkick | 2019-06-07T20:56:42Z | 2023-01-23T20:02:18Z |
| ghsa-52mh-p2m2-w625 |
6.1 (3.1)
|
Cross-site Scripting in HAPI FHIR | 2019-06-07T20:56:59Z | 2021-08-04T21:01:39Z |
| ghsa-984p-xq9m-4rjw |
5.6 (3.1)
|
Rate Limiting Bypass in express-brute | 2019-06-07T21:01:53Z | 2021-08-04T21:03:16Z |
| ghsa-6394-6h9h-cfjg |
|
Regular Expression Denial of Service | 2019-06-07T21:12:35Z | 2021-02-25T17:23:12Z |
| ghsa-hxcm-v35h-mg2x |
|
Prototype Pollution in querystringify | 2019-06-07T21:12:50Z | 2023-11-29T22:16:43Z |
| ghsa-6cc5-2vg4-cc7m |
6.1 (3.1)
5.3 (4.0)
|
Twisted CRLF Injection | 2019-06-10T18:05:06Z | 2024-11-25T18:33:21Z |
| ghsa-7rp2-fm2h-wchj |
6.1 (3.1)
5.3 (4.0)
|
Django Cross-site Scripting in AdminURLFieldWidget | 2019-06-10T18:43:25Z | 2024-09-20T16:03:27Z |
| ghsa-8w57-jfpm-945m |
|
Denial of Service in http-proxy-agent | 2019-06-11T16:16:07Z | 2023-04-11T00:26:58Z |
| ghsa-vc6r-4x6g-mmqc |
|
Path Traversal in m-server | 2019-06-11T16:16:23Z | 2020-08-31T18:33:45Z |
| ghsa-j9f8-8h89-j69x |
7.3 (3.1)
|
Remote Code Execution in node-os-utils | 2019-06-11T16:16:34Z | 2021-08-04T21:06:49Z |
| ghsa-73cw-jxmm-qpgh |
|
Path Traversal in localhost-now | 2019-06-11T16:40:48Z | 2020-08-31T18:31:31Z |
| ghsa-8f93-rv4p-x4jw |
|
SQL Injection in sql | 2019-06-12T16:36:52Z | 2020-08-31T18:31:48Z |
| ghsa-57cf-349j-352g |
|
Out-of-bounds Read in npmconf | 2019-06-12T16:37:00Z | 2020-08-31T18:31:27Z |
| ghsa-gc94-6w89-hpqr |
|
Command Injection in fs-path | 2019-06-12T16:37:07Z | 2021-09-16T20:59:56Z |
| ghsa-46hv-7769-j7rx |
5.3 (3.1)
|
Unauthorized File Access in harp | 2019-06-13T16:12:22Z | 2023-09-07T21:43:42Z |
| ghsa-6fmm-47qc-p4m4 |
5.3 (3.1)
|
Unauthorized File Access in harp | 2019-06-13T16:12:26Z | 2023-09-07T21:41:55Z |
| ghsa-22mf-97vh-x8rw |
7.5 (3.1)
7.2 (4.0)
|
Deserialization vulnerability exists in parso | 2019-06-13T16:12:57Z | 2024-10-09T20:52:02Z |
| ghsa-fqfj-cmh6-hj49 |
9.8 (3.1)
|
ruby-openid SSRF via claimed_id request | 2019-06-13T16:15:56Z | 2023-07-05T19:06:46Z |
| ghsa-2479-qvv7-47qq |
7.5 (3.1)
|
Parse Server before v3.4.1 vulnerable to Denial of Service | 2019-06-13T16:22:13Z | 2022-09-13T22:16:02Z |
| ghsa-f7qw-5pvg-mmwp |
7.3 (3.1)
|
Prototype Pollution in lutils-merge | 2019-06-13T18:58:44Z | 2021-08-16T14:36:47Z |
| ghsa-h6ch-v84p-w6p9 |
|
Regular Expression Denial of Service (ReDoS) | 2019-06-13T18:58:54Z | 2021-02-24T19:27:02Z |
| ghsa-pm52-wwrw-c282 |
6.5 (3.1)
|
Command Injection in wiki-plugin-datalog | 2019-06-13T18:59:06Z | 2021-08-16T14:32:10Z |
| ghsa-crfx-5phg-hmw9 |
|
Cross-Site Scripting in ids-enterprise | 2019-06-13T18:59:12Z | 2020-08-31T18:41:52Z |
| ghsa-hpfq-8wx8-cgqw |
|
Cross-Site Scripting in ids-enterprise | 2019-06-13T18:59:18Z | 2020-08-31T18:41:56Z |
| ghsa-49r3-3h96-rwj6 |
|
Cross-Site Scripting in ids-enterprise | 2019-06-13T19:09:31Z | 2020-08-31T18:41:54Z |
| ghsa-jwgx-9mmh-684w |
9.8 (3.1)
|
Credential exposure through log files in Undertow | 2019-06-13T20:02:56Z | 2022-02-11T21:13:16Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-453 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.241877Z |
| pysec-2021-454 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.426864Z |
| pysec-2021-455 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.577181Z |
| pysec-2021-456 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.721328Z |
| pysec-2021-457 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.879310Z |
| pysec-2021-458 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.047849Z |
| pysec-2021-459 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.199089Z |
| pysec-2021-460 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can fo… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.349137Z |
| pysec-2021-461 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.500169Z |
| pysec-2021-462 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.648836Z |
| pysec-2021-463 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.800365Z |
| pysec-2021-464 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.953620Z |
| pysec-2021-465 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.104886Z |
| pysec-2021-466 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.257791Z |
| pysec-2021-467 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_op… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.452107Z |
| pysec-2021-468 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.596439Z |
| pysec-2021-469 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.747683Z |
| pysec-2021-470 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.894355Z |
| pysec-2021-471 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.046503Z |
| pysec-2021-472 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.195889Z |
| pysec-2021-473 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.345149Z |
| pysec-2021-474 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.495115Z |
| pysec-2021-475 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.647185Z |
| pysec-2021-476 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.800401Z |
| pysec-2021-477 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.949292Z |
| pysec-2021-478 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.099370Z |
| pysec-2021-479 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.250544Z |
| pysec-2021-480 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.420468Z |
| pysec-2021-481 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can re… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.614588Z |
| pysec-2021-483 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.920437Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-2510 | Malicious code in discord.js-selfbot-cloner (npm) | 2022-06-20T20:11:42Z | 2022-06-20T20:11:43Z |
| mal-2022-4249 | Malicious code in labrujha-cadas (npm) | 2022-06-20T20:11:42Z | 2022-06-20T20:11:42Z |
| mal-2022-950 | Malicious code in alprazolamdiv (npm) | 2022-06-20T20:11:42Z | 2022-06-20T20:11:43Z |
| mal-2022-2514 | Malicious code in discord.js-selfbot-v32 (npm) | 2022-06-20T20:11:43Z | 2022-06-20T20:11:44Z |
| mal-2022-2515 | Malicious code in discord.js-selfbot-v7 (npm) | 2022-06-20T20:11:43Z | 2022-06-20T20:11:43Z |
| mal-2022-3273 | Malicious code in gapminder-offline (npm) | 2022-06-20T20:11:43Z | 2022-06-20T20:11:44Z |
| mal-2022-6946 | Malicious code in visualization-raphael-chart (npm) | 2022-06-20T20:11:43Z | 2022-06-20T20:11:44Z |
| mal-2022-20 | Malicious code in 1forge-adapter (npm) | 2022-06-20T20:11:44Z | 2022-06-20T20:11:45Z |
| mal-2022-5919 | Malicious code in sample-npm-balu (npm) | 2022-06-20T20:11:44Z | 2022-06-20T20:11:44Z |
| mal-2022-7264 | Malicious code in xbto-adapter (npm) | 2022-06-20T20:11:44Z | 2022-06-20T20:11:45Z |
| mal-2022-823 | Malicious code in accuweather-adapter (npm) | 2022-06-20T20:11:44Z | 2022-06-20T20:11:45Z |
| mal-2022-844 | Malicious code in ada-balance-adapter (npm) | 2022-06-20T20:11:45Z | 2022-06-20T20:11:45Z |
| mal-2022-947 | Malicious code in alphachain-adapter (npm) | 2022-06-20T20:11:45Z | 2022-06-20T20:11:46Z |
| mal-2022-948 | Malicious code in alphavantage-adapter (npm) | 2022-06-20T20:11:45Z | 2022-06-20T20:11:46Z |
| mal-2022-1026 | Malicious code in anyblock-adapter (npm) | 2022-06-20T20:11:46Z | 2022-06-20T20:11:46Z |
| mal-2022-1033 | Malicious code in ap-election-adapter (npm) | 2022-06-20T20:11:46Z | 2022-06-20T20:11:47Z |
| mal-2022-1489 | Malicious code in bea-adapter (npm) | 2022-06-20T20:11:46Z | 2022-06-20T20:11:47Z |
| mal-2022-949 | Malicious code in alpine-adapter (npm) | 2022-06-20T20:11:46Z | 2022-06-20T20:11:46Z |
| mal-2022-962 | Malicious code in amberdata-adapter (npm) | 2022-06-20T20:11:46Z | 2022-06-20T20:11:46Z |
| mal-2022-1576 | Malicious code in binance-adapter (npm) | 2022-06-20T20:11:47Z | 2022-06-20T20:11:47Z |
| mal-2022-1578 | Malicious code in binance-dex-adapter (npm) | 2022-06-20T20:11:47Z | 2022-06-20T20:11:47Z |
| mal-2022-1585 | Malicious code in bitcoin-json-rpc-adapter (npm) | 2022-06-20T20:11:47Z | 2022-06-20T20:11:48Z |
| mal-2022-1590 | Malicious code in bitex-adapter (npm) | 2022-06-20T20:11:47Z | 2022-06-20T20:11:48Z |
| mal-2022-1598 | Malicious code in bitso-adapter (npm) | 2022-06-20T20:11:48Z | 2022-06-20T20:11:48Z |
| mal-2022-1616 | Malicious code in blockchain.com-adapter (npm) | 2022-06-20T20:11:48Z | 2022-06-20T20:11:49Z |
| mal-2022-1617 | Malicious code in blockchair-adapter (npm) | 2022-06-20T20:11:48Z | 2022-06-20T20:11:49Z |
| mal-2022-1618 | Malicious code in blockcypher-adapter (npm) | 2022-06-20T20:11:48Z | 2022-06-20T20:11:49Z |
| mal-2022-1624 | Malicious code in blockstream-adapter (npm) | 2022-06-20T20:11:49Z | 2022-06-20T20:11:49Z |
| mal-2022-1676 | Malicious code in bravenewcoin-adapter (npm) | 2022-06-20T20:11:49Z | 2022-06-20T20:11:49Z |
| mal-2022-1709 | Malicious code in btc.com-adapter (npm) | 2022-06-20T20:11:49Z | 2022-06-20T20:11:49Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-0252 | git: Schwachstelle ermöglicht Privilegieneskalation | 2022-04-12T22:00:00.000+00:00 | 2024-01-25T23:00:00.000+00:00 |
| wid-sec-w-2022-0265 | Jenkins: Mehrere Schwachstellen | 2022-04-12T22:00:00.000+00:00 | 2023-03-06T23:00:00.000+00:00 |
| wid-sec-w-2022-0574 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-04-12T22:00:00.000+00:00 | 2023-06-20T22:00:00.000+00:00 |
| wid-sec-w-2022-0815 | Apache Struts: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2022-04-12T22:00:00.000+00:00 | 2023-02-06T23:00:00.000+00:00 |
| wid-sec-w-2022-0856 | Adobe Acrobat DC: Mehrere Schwachstellen | 2022-04-12T22:00:00.000+00:00 | 2023-05-25T22:00:00.000+00:00 |
| wid-sec-w-2022-0068 | VMware Tanzu Spring Framework: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-04-13T22:00:00.000+00:00 | 2025-11-30T23:00:00.000+00:00 |
| wid-sec-w-2022-0253 | Python: Schwachstelle ermöglicht Codeausführung | 2022-04-13T22:00:00.000+00:00 | 2024-12-01T23:00:00.000+00:00 |
| wid-sec-w-2022-0359 | MariaDB: Schwachstellen ermöglichen Denial of Service | 2022-04-13T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1407 | McAfee Agent: Mehrere Schwachstellen | 2022-04-13T22:00:00.000+00:00 | 2025-06-26T22:00:00.000+00:00 |
| wid-sec-w-2022-0167 | vim: Schwachstelle ermöglicht Codeausführung | 2022-04-18T22:00:00.000+00:00 | 2022-12-26T23:00:00.000+00:00 |
| wid-sec-w-2022-0168 | MariaDB: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-04-18T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2022-0633 | mutt: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-04-18T22:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2022-1138 | Google Chrome: Schwachstelle ermöglicht Codeausführung | 2022-04-18T22:00:00.000+00:00 | 2022-12-11T23:00:00.000+00:00 |
| wid-sec-w-2022-2107 | Asterisk: Mehrere Schwachstellen | 2022-04-18T22:00:00.000+00:00 | 2024-12-08T23:00:00.000+00:00 |
| wid-sec-w-2024-1393 | Rückruf: 7-Zip: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode | 2022-04-18T22:00:00.000+00:00 | 2024-06-17T22:00:00.000+00:00 |
| wid-sec-w-2022-0169 | Oracle MySQL: Mehrere Schwachstellen | 2022-04-19T22:00:00.000+00:00 | 2024-05-28T22:00:00.000+00:00 |
| wid-sec-w-2022-0200 | Oracle Java SE und OpenJDK: Mehrere Schwachstellen | 2022-04-19T22:00:00.000+00:00 | 2025-02-18T23:00:00.000+00:00 |
| wid-sec-w-2022-0240 | ffmpeg: Schwachstelle ermöglicht Denial of Service | 2022-04-19T22:00:00.000+00:00 | 2025-07-17T22:00:00.000+00:00 |
| wid-sec-w-2024-2180 | Oracle Fusion Middleware: Mehrere Schwachstellen | 2022-04-19T22:00:00.000+00:00 | 2024-09-18T22:00:00.000+00:00 |
| wid-sec-w-2022-0170 | MariaDB: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-04-20T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2022-0069 | Red Hat OpenShift Logging Subsystem: Mehrere Schwachstellen | 2022-04-21T22:00:00.000+00:00 | 2025-12-03T23:00:00.000+00:00 |
| wid-sec-w-2022-0171 | vim: Schwachstelle ermöglicht Denial of Service | 2022-04-21T22:00:00.000+00:00 | 2023-02-28T23:00:00.000+00:00 |
| wid-sec-w-2022-0254 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-04-24T22:00:00.000+00:00 | 2023-07-13T22:00:00.000+00:00 |
| wid-sec-w-2022-0775 | FreeType: Mehrere Schwachstellen | 2022-04-24T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2022-2366 | HCL BigFix: Mehrere Schwachstellen | 2022-04-24T22:00:00.000+00:00 | 2022-12-19T23:00:00.000+00:00 |
| wid-sec-w-2022-2411 | FreeRADIUS: Mehrere Schwachstellen | 2022-04-24T22:00:00.000+00:00 | 2025-06-29T22:00:00.000+00:00 |
| wid-sec-w-2022-1310 | OpenSC: Schwachstelle ermöglicht Denial of Service | 2022-04-25T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2023-1484 | Grafana: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-04-25T22:00:00.000+00:00 | 2023-06-15T22:00:00.000+00:00 |
| wid-sec-w-2024-1033 | xpdf: Schwachstelle ermöglicht Denial of Service | 2022-04-25T22:00:00.000+00:00 | 2024-05-06T22:00:00.000+00:00 |
| wid-sec-w-2022-0007 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Codeausführung | 2022-04-26T22:00:00.000+00:00 | 2024-02-11T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2008:0577 | Red Hat Security Advisory: rhpki-common security update | 2008-07-02T17:50:00+00:00 | 2025-11-21T17:33:32+00:00 |
| rhsa-2008:0533 | Red Hat Security Advisory: bind security update | 2008-07-08T18:12:00+00:00 | 2025-11-21T17:33:25+00:00 |
| rhsa-2008:0584 | Red Hat Security Advisory: pidgin security and bug fix update | 2008-07-09T08:32:00+00:00 | 2025-11-21T17:33:34+00:00 |
| rhsa-2008:0583 | Red Hat Security Advisory: openldap security update | 2008-07-09T14:44:00+00:00 | 2025-11-21T17:33:34+00:00 |
| rhsa-2008:0555 | Red Hat Security Advisory: java-1.4.2-ibm security update | 2008-07-14T13:08:00+00:00 | 2025-11-21T17:33:28+00:00 |
| rhsa-2008:0561 | Red Hat Security Advisory: ruby security update | 2008-07-14T13:26:00+00:00 | 2025-11-21T17:33:30+00:00 |
| rhsa-2008:0562 | Red Hat Security Advisory: ruby security update | 2008-07-14T13:38:00+00:00 | 2025-11-21T17:33:30+00:00 |
| rhsa-2008:0581 | Red Hat Security Advisory: bluez-libs and bluez-utils security update | 2008-07-14T13:55:00+00:00 | 2025-11-21T17:33:32+00:00 |
| rhsa-2008:0594 | Red Hat Security Advisory: java-1.6.0-sun security update | 2008-07-14T15:32:00+00:00 | 2025-11-21T17:33:34+00:00 |
| rhsa-2008:0595 | Red Hat Security Advisory: java-1.5.0-sun security update | 2008-07-14T15:37:00+00:00 | 2025-11-21T17:33:34+00:00 |
| rhsa-2008:0544 | Red Hat Security Advisory: php security update | 2008-07-16T09:36:00+00:00 | 2026-01-08T09:21:09+00:00 |
| rhsa-2008:0545 | Red Hat Security Advisory: php security and bug fix update | 2008-07-16T09:55:00+00:00 | 2026-01-13T22:10:10+00:00 |
| rhsa-2008:0546 | Red Hat Security Advisory: php security update | 2008-07-16T09:57:00+00:00 | 2025-11-21T17:33:30+00:00 |
| rhsa-2008:0598 | Red Hat Security Advisory: firefox security update | 2008-07-16T12:53:00+00:00 | 2025-11-21T17:33:34+00:00 |
| rhsa-2008:0597 | Red Hat Security Advisory: firefox security update | 2008-07-16T12:57:00+00:00 | 2025-11-21T17:33:34+00:00 |
| rhsa-2008:0599 | Red Hat Security Advisory: seamonkey security update | 2008-07-16T13:00:00+00:00 | 2025-11-21T17:33:35+00:00 |
| rhsa-2008:0641 | Red Hat Security Advisory: acroread security update | 2008-07-21T13:44:00+00:00 | 2025-11-21T17:33:39+00:00 |
| rhsa-2008:0566 | Red Hat Security Advisory: rhpki-util, rhpki-common, and rhpki-ca security and bug fix update | 2008-07-21T19:16:00+00:00 | 2026-01-13T22:35:17+00:00 |
| rhsa-2008:0582 | Red Hat Security Advisory: php security update | 2008-07-22T12:30:00+00:00 | 2026-01-08T09:21:14+00:00 |
| rhsa-2008:0607 | Red Hat Security Advisory: kernel security and bug fix update | 2008-07-23T13:28:00+00:00 | 2025-11-21T17:33:39+00:00 |
| rhsa-2008:0616 | Red Hat Security Advisory: thunderbird security update | 2008-07-23T23:59:00+00:00 | 2025-11-21T17:33:36+00:00 |
| rhsa-2008:0665 | Red Hat Security Advisory: Updated kernel packages for Red Hat Enterprise Linux 4.7 | 2008-07-24T16:19:00+00:00 | 2025-11-21T17:33:39+00:00 |
| rhsa-2008:0680 | Red Hat Security Advisory: vsftpd security and bug fix update | 2008-07-24T16:38:00+00:00 | 2025-11-21T17:33:40+00:00 |
| rhsa-2008:0725 | Red Hat Security Advisory: rdesktop security and bug fix update | 2008-07-24T16:44:00+00:00 | 2025-11-21T17:33:40+00:00 |
| rhsa-2008:0715 | Red Hat Security Advisory: nss_ldap security and bug fix update | 2008-07-24T16:53:00+00:00 | 2025-11-21T17:33:40+00:00 |
| rhsa-2008:0780 | Red Hat Security Advisory: coreutils security update | 2008-07-24T17:02:00+00:00 | 2025-11-21T17:33:41+00:00 |
| rhsa-2008:0768 | Red Hat Security Advisory: mysql security, bug fix, and enhancement update | 2008-07-24T17:09:00+00:00 | 2026-01-06T20:20:34+00:00 |
| rhsa-2008:0575 | Red Hat Security Advisory: rdesktop security update | 2008-07-24T17:15:00+00:00 | 2025-11-21T17:33:32+00:00 |
| rhsa-2008:0576 | Red Hat Security Advisory: rdesktop security update | 2008-07-24T17:23:00+00:00 | 2025-11-21T17:33:32+00:00 |
| rhsa-2008:0579 | Red Hat Security Advisory: vsftpd security update | 2008-07-24T17:28:00+00:00 | 2025-11-21T17:33:32+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsma-20-296-01 | B. Braun OnlineSuite | 2020-10-22T00:00:00.000000Z | 2020-10-22T00:00:00.000000Z |
| icsma-20-296-02 | B. Braun SpaceCom, Battery Pack SP with Wi-Fi, and Data module compactplus | 2020-10-22T00:00:00.000000Z | 2020-10-22T00:00:00.000000Z |
| icsa-20-301-01 | SHUN HU Technology JUUKO Industrial Radio Remote Control | 2020-10-27T00:00:00.000000Z | 2020-10-27T00:00:00.000000Z |
| icsa-20-303-02 | Mitsubishi Electric MELSEC iQ-R | 2020-10-29T00:00:00.000000Z | 2020-10-29T00:00:00.000000Z |
| icsa-20-303-01 | Mitsubishi Electric MELSEC iQ-R, Q, and L Series (Update E) | 2020-10-29T06:00:00.000000Z | 2024-09-05T06:00:00.000000Z |
| icsa-20-308-01 | WAGO Series 750-88x and 750-352 (Update A) | 2020-11-03T00:00:00.000000Z | 2020-12-15T00:00:00.000000Z |
| icsa-20-308-02 | NEXCOM NIO50 | 2020-11-03T00:00:00.000000Z | 2020-11-03T00:00:00.000000Z |
| icsa-20-308-03 | ARC Informatique PcVue (Update A) | 2020-11-03T00:00:00.000000Z | 2021-01-05T00:00:00.000000Z |
| icsa-20-310-01 | WECON PLC Editor | 2020-11-05T00:00:00.000000Z | 2020-11-05T00:00:00.000000Z |
| icsa-20-310-02 | Mitsubishi Electric GT14 Model of GOT1000 Series | 2020-11-05T00:00:00.000000Z | 2020-11-05T00:00:00.000000Z |
| icsa-20-315-01 | ICSA-20-315-01_OSIsoft PI Interface for OPC XML-DA | 2020-11-10T00:00:00.000000Z | 2020-11-10T00:00:00.000000Z |
| icsa-20-315-02 | OSIsoft PI Vision | 2020-11-10T00:00:00.000000Z | 2020-11-10T00:00:00.000000Z |
| icsa-20-315-03 | Schneider Electric PLC Simulator for EcoStruxure Control Expert | 2020-11-10T00:00:00.000000Z | 2020-11-10T00:00:00.000000Z |
| icsa-20-315-04 | Siemens SIMATIC S7-300 CPUs and SINUMERIK Controller (Update A) | 2020-11-10T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-20-315-05 | Siemens SCALANCE W 1750D | 2020-11-10T00:00:00.000000Z | 2020-11-10T00:00:00.000000Z |
| icsa-20-317-01 | Mitsubishi Electric MELSEC iQ-R Series | 2020-11-12T00:00:00.000000Z | 2020-11-12T00:00:00.000000Z |
| icsma-20-317-01 | BD Alaris 8015 PC Unit and BD Alaris Systems Manager | 2020-11-12T00:00:00.000000Z | 2020-11-12T00:00:00.000000Z |
| icsa-20-324-01 | Johnson Controls Sensormatic Electronics American Dynamics victor Web Client | 2020-11-17T00:00:00.000000Z | 2020-11-17T00:00:00.000000Z |
| icsa-20-324-02 | Paradox IP150 (Update A) | 2020-11-17T00:00:00.000000Z | 2022-09-19T00:00:00.000000Z |
| icsa-20-324-03 | Real Time Automation EtherNet/IP | 2020-11-17T00:00:00.000000Z | 2020-11-17T00:00:00.000000Z |
| icsa-20-324-04 | Schneider Electric Interactive Graphical SCADA System (IGSS) | 2020-11-17T00:00:00.000000Z | 2020-11-17T00:00:00.000000Z |
| icsa-20-324-05 | Mitsubishi Electric MELSEC iQ-R Series (Update C) | 2020-11-19T00:00:00.000000Z | 2021-12-16T00:00:00.000000Z |
| icsa-20-282-02 | Mitsubishi Electric MELSEC iQ-R Series (Update D) | 2020-11-19T07:00:00.000000Z | 2024-08-22T06:00:00.000000Z |
| icsa-20-329-01 | Rockwell Automation FactoryTalk Linx | 2020-11-24T00:00:00.000000Z | 2020-11-24T00:00:00.000000Z |
| icsa-20-329-02 | Fuji Electric V-Server Lite | 2020-11-24T00:00:00.000000Z | 2020-11-24T00:00:00.000000Z |
| icsa-20-336-01 | Schneider Electric EcoStruxure Operator Terminal Expert runtime (Vijeo XD) | 2020-12-01T00:00:00.000000Z | 2020-12-01T00:00:00.000000Z |
| icsa-20-338-01 | National Instruments CompactRIO | 2020-12-03T00:00:00.000000Z | 2020-12-03T00:00:00.000000Z |
| icsa-20-343-01 | Multiple Embedded TCP/IP Stacks | 2020-12-08T00:00:00.000000Z | 2020-12-08T00:00:00.000000Z |
| icsa-20-343-02 | Mitsubishi Electric GOT and Tension Controller (Update B) | 2020-12-08T00:00:00.000000Z | 2022-01-20T00:00:00.000000Z |
| icsa-20-343-03 | Schneider Electric Easergy T300 | 2020-12-08T00:00:00.000000Z | 2020-12-08T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-fxos-cmdinj-b63rwkpm | Cisco FXOS Software for Firepower 4100/9300 Series Command Injection Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-fxos-cmdinj-pqzvmxcr | Cisco FXOS Software Command Injection Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T13:21:04+00:00 |
| cisco-sa-fxos-sbbp-xtupkytn | Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-fxos-sbbyp-kqp6ngre | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities | 2020-10-21T16:00:00+00:00 | 2020-10-23T13:31:44+00:00 |
| cisco-sa-fxosfcm-csrf-uho4e5bz | Cisco FXOS Software Firepower Chassis Manager Cross-Site Request Forgery Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-tcp-intercept-bypass-xg9m3pby | Cisco Firepower Threat Defense Software TCP Intercept Bypass Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-asa-ssl-dos-7uzwwsey | Cisco Adaptive Security Appliance Software SSL/TLS Denial of Service Vulnerability | 2020-10-22T16:00:00+00:00 | 2020-10-27T20:31:40+00:00 |
| cisco-sa-anyconnect-file-read-lsvdd6uh | Cisco AnyConnect Secure Mobility Client for Windows Arbitrary File Read Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-anyconnect-ipc-kfqo9qhk | Cisco AnyConnect Secure Mobility Client Arbitrary Code Execution Vulnerability | 2020-11-04T16:00:00+00:00 | 2021-05-21T18:06:37+00:00 |
| cisco-sa-cedge-filt-bypass-y6wzmqm4 | Cisco SD-WAN Software Packet Filtering Bypass Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-12-14T21:43:02+00:00 |
| cisco-sa-cimc-auth-zwkppjxl | Cisco Integrated Management Controller Authorization Bypass Vulnerability | 2020-11-04T16:00:00+00:00 | 2021-02-26T15:37:04+00:00 |
| cisco-sa-cimc-civ-pkdbe9x5 | Cisco Integrated Management Controller Command Injection Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-cimc-enum-cyhep3b7 | Cisco Integrated Management Controller Username Enumeration Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-eff-incperm-9e6h4ybz | Cisco Edge Fog Fabric Resource Exposure Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-esa-zip-bypass-gbu4gttg | Cisco Email Security Appliance Zip Content Filter Bypass Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-imp-dos-utx2dqu2 | Cisco Unified Communications Manager IM and Presence Service Denial of Service Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-iosxr-pxe-unsign-code-exec-qaa78fd2 | Cisco IOS XR Software Enhanced Preboot eXecution Environment Unsigned Code Execution Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-12-01T17:50:58+00:00 |
| cisco-sa-ise-priv-esc-fnzx8hhj | Cisco Identity Services Engine Privilege Escalation Vulnerability | 2020-11-04T16:00:00+00:00 | 2021-05-03T20:17:53+00:00 |
| cisco-sa-ise-xss-eurcwx9 | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2020-11-04T16:00:00+00:00 | 2021-02-26T18:56:49+00:00 |
| cisco-sa-ise-xxs-pkjcmq9d | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-tele-info-dreglpdq | Cisco TelePresence Collaboration Endpoint Software Information Disclosure Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vepegr-4xynyluj | Cisco SD-WAN Software Privilege Escalation Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vepescm-bjgqm4vj | Cisco SD-WAN Software Privilege Escalation Vulnerability | 2020-11-04T16:00:00+00:00 | 2021-02-16T13:52:13+00:00 |
| cisco-sa-vepeshlg-tjghoqca | Cisco SD-WAN Software Privilege Escalation Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vepestd-8c3j9vc | Cisco SD-WAN Software Privilege Escalation Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vman-traversal-hqh24tmk | Cisco SD-WAN vManage Software Directory Traversal Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanage-escalation-jhqs5skf | Cisco SD-WAN vManage Software Privilege Escalation Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanage-file-y2jsrnrb | Cisco SD-WAN vManage Software Arbitrary File Creation Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanage-privilege-zpmmf73k | Cisco SD-WAN vManage Software Command Injection Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanpt2-fqluefss | Cisco SD-WAN vManage Software Path Traversal Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-35625 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35626 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35627 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35628 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35629 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35630 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation deletion or modification access to critical data or all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35631 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: GIS). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35632 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Data Dictionary). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35633 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35634 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35635 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35636 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35637 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35638 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35640 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35641 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35642 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35643 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35644 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35645 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35646 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35647 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35648 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-3671 | A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server. | 2021-10-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2021-38297 | Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module when GOARCH=wasm GOOS=js is used. | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-3872 | Heap-based Buffer Overflow in vim/vim | 2021-10-02T00:00:00.000Z | 2021-10-22T00:00:00.000Z |
| msrc_cve-2021-3875 | Heap-based Buffer Overflow in vim/vim | 2021-10-02T00:00:00.000Z | 2021-10-21T00:00:00.000Z |
| msrc_cve-2021-3903 | Heap-based Buffer Overflow in vim/vim | 2021-10-02T00:00:00.000Z | 2021-11-03T00:00:00.000Z |
| msrc_cve-2021-41099 | Integer overflow issue with strings in Redis | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-41103 | Insufficiently restricted permissions on plugin directories | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201701-1165 | Samsung Smartcam is Samsung's smart webcam. There is a remote command execution vulnerabi… | 2022-05-04T09:39:41.669000Z |
| var-201612-0643 | The D-LinkDAR-8000-X series and the DAR-7000-x series of online behavior auditing gateway… | 2022-05-04T09:39:42.305000Z |
| var-201611-0413 | TP-LINKTDDP is a device debugging protocol. TP-LINKTDDP has an information disclosure vul… | 2022-05-04T09:39:42.635000Z |
| var-201608-0491 | CIMCO is the DNC system with the largest installed capacity in the world. It is mainly us… | 2022-05-04T09:39:46.993000Z |
| var-201606-0554 | Netgear is the world's leading enterprise network solution and advocate for digital home … | 2022-05-04T09:39:47.379000Z |
| var-201605-0620 | Weak password on Yushi camera, allowing initial password login | 2022-05-04T09:39:47.726000Z |
| var-201601-0678 | Telnet Weak password vulnerability, allowing weak password login | 2022-05-04T09:39:49.232000Z |
| var-201402-0575 | OpenVox VoxStack is a family of Asterisk-based analog voice gateways designed for small a… | 2022-05-04T09:40:10.053000Z |
| var-201401-0726 | Huawei B593u-12 / T-Mobile HOME NET Router is an LTE wireless router series. Huawei B593u… | 2022-05-04T09:40:10.288000Z |
| var-201307-0613 | Cisco WebEx is a web conferencing solution. The Cisco WebEx One-Click Client handles pass… | 2022-05-04T09:40:14.164000Z |
| var-201303-0573 | Rosewill RSVA11001/RSVA12001 is a camera device. Rosewill RSVA11001/RSVA12001 has a secur… | 2022-05-04T09:40:18.596000Z |
| var-201106-0295 | Siemens SIMATIC S7 series PLC Used in various industrial fields, including energy, water … | 2022-05-04T09:40:29.076000Z |
| var-201103-0385 | The TP-LINK TL-WR740N is a wireless router device. The TP-LINK TL-WR740N device has an un… | 2022-05-04T09:40:29.645000Z |
| var-201005-0430 | IncrediMail is an email mail client. The ImShExtU.dll ActiveX control included with Incre… | 2022-05-04T09:40:35.307000Z |
| var-201003-0520 | Cisco Unified Communications Manager is a call processing component in the Cisco IP Telep… | 2022-05-04T09:40:36.284000Z |
| var-200612-0787 | D-LINK DWL-2000AP + is a popular wireless access router. DWL-2000AP + has a vulnerabili… | 2022-05-04T09:41:08.155000Z |
| var-202112-2272 | Certain NETGEAR devices are affected by stored XSS. This affects GS108Tv2 before 5.4.2.36… | 2022-05-04T09:41:49.404000Z |
| var-202112-0753 | Internally used text extraction reports allow an attacker to inject code that can be exec… | 2022-05-04T09:41:50.287000Z |
| var-202110-0177 | A possible buffer overflow vulnerability in maetd_cpy_slice of libSPenBase library of Sam… | 2022-05-04T09:41:56.512000Z |
| var-202109-1969 | Ruijie Networks Co., Ltd. is a professional network manufacturer with a full range of net… | 2022-05-04T09:41:56.652000Z |
| var-202108-2565 | Huawei AR2240 is an enterprise-level router product developed by Huawei. Huawei Techn… | 2022-05-04T09:41:58.091000Z |
| var-202108-2544 | Axis is an IT company that specializes in providing network video solutions. Axis P14… | 2022-05-04T09:41:58.104000Z |
| var-202108-2523 | Sapido GR-1733 is a gigabit wireless router. Sapido GR-1733 has a command execution v… | 2022-05-04T09:41:58.114000Z |
| var-202108-2502 | C3765dnf Color MFP is a color laser printer from Dell. Dell C3765dnf Color MFP has an… | 2022-05-04T09:41:58.127000Z |
| var-202108-2481 | Lexmark CX410de is a printer product of Lexmark. Lexmark CX410de has an unauthorized … | 2022-05-04T09:41:58.138000Z |
| var-202108-2460 | MX-2310F is a printer of Sharp Trading (China) Co., Ltd. Sharp Trading (China) Co., L… | 2022-05-04T09:41:58.153000Z |
| var-202108-2439 | Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of… | 2022-05-04T09:41:58.163000Z |
| var-202108-2418 | Fuji Xerox (China) Co., Ltd. was established on January 3, 1995. It is a wholly-owned hol… | 2022-05-04T09:41:58.174000Z |
| var-202108-2397 | Matsushita Electric (China) Co., Ltd. is a manufacturer mainly responsible for the sales … | 2022-05-04T09:41:58.185000Z |
| var-202108-2376 | Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. Twent… | 2022-05-04T09:41:58.196000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000091 | H2O use-after-free vulnerability | 2016-05-27T13:46+09:00 | 2016-06-23T17:23+09:00 |
| jvndb-2016-000076 | Japan Connected-free Wi-Fi vulnerable to API execution | 2016-05-27T13:51+09:00 | 2016-06-23T17:38+09:00 |
| jvndb-2016-000086 | Multiple Buffalo wireless LAN routers vulnerable to directory traversal | 2016-05-27T13:53+09:00 | 2016-06-27T14:58+09:00 |
| jvndb-2016-000087 | Multiple Buffalo wireless LAN routers vulnerable to information disclosure | 2016-05-27T13:53+09:00 | 2016-06-27T14:59+09:00 |
| jvndb-2016-000072 | WebARENA formmail vulnerable to cross-site scripting | 2016-05-27T13:54+09:00 | 2016-06-08T17:47+09:00 |
| jvndb-2016-000090 | Source code of Old_GSI_Maps prior to January, 2015 vulnerable to directory traversal | 2016-05-30T14:07+09:00 | 2016-06-23T15:13+09:00 |
| jvndb-2016-000092 | DMM.com Securities FX Apps for Android fail to verify SSL server certificates | 2016-05-30T14:21+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000077 | Cybozu Garoon mail function vulnerable to access restriction bypass | 2016-05-30T16:18+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000078 | Cybozu Garoon function "Files" vulnerable to directory traversal | 2016-05-30T16:18+09:00 | 2016-06-23T17:40+09:00 |
| jvndb-2016-000079 | Cybozu Garoon vulnerable to information disclosure | 2016-05-30T16:18+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000080 | Cybozu Garoon vulnerable to denial-of-service (DoS) | 2016-05-30T16:18+09:00 | 2017-05-23T16:23+09:00 |
| jvndb-2016-000081 | Cybozu Garoon vulnerable to open redirect | 2016-05-30T16:18+09:00 | 2016-06-23T17:06+09:00 |
| jvndb-2016-000082 | Cybozu Garoon fails to restrict access permissions | 2016-05-30T16:18+09:00 | 2016-06-23T17:35+09:00 |
| jvndb-2016-000083 | Cybozu Garoon vulnerable to cross-site scripting | 2016-05-30T16:18+09:00 | 2016-06-23T17:05+09:00 |
| jvndb-2016-000084 | Cybozu Garoon vulnerable to cross-site scripting | 2016-05-30T16:18+09:00 | 2016-06-23T17:09+09:00 |
| jvndb-2016-000085 | Cybozu Garoon fails to restrict access permissions | 2016-05-30T16:18+09:00 | 2016-06-23T17:43+09:00 |
| jvndb-2016-000093 | Cybozu Garoon function "Portlets" vulnerable to access restriction bypass | 2016-05-30T16:18+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000094 | Cybozu Garoon function "MultiReport" vulnerable to access restriction bypass | 2016-05-30T16:18+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000095 | Cybozu Garoon logging function vulnerable to directory traversal | 2016-05-30T16:18+09:00 | 2016-06-23T17:49+09:00 |
| jvndb-2016-000073 | Trend Micro Internet Security access restriction flaw | 2016-06-02T16:18+09:00 | 2016-06-22T18:12+09:00 |
| jvndb-2016-000074 | Trend Micro enterprise products directory traversal vulnerability | 2016-06-02T16:18+09:00 | 2016-06-22T17:56+09:00 |
| jvndb-2016-000088 | Trend Micro Internet Security vulnerable to arbitrary script execution | 2016-06-02T16:18+09:00 | 2016-06-22T18:08+09:00 |
| jvndb-2016-000089 | Trend Micro enterprise products HTTP header injection vulnerability | 2016-06-02T16:18+09:00 | 2016-06-22T17:58+09:00 |
| jvndb-2016-000096 | Apache Struts 1 vulnerability that allows unintended remote operations against components on memory | 2016-06-07T16:26+09:00 | 2017-02-20T15:42+09:00 |
| jvndb-2016-000097 | Apache Struts 1 vulnerable to input validation bypass | 2016-06-07T16:26+09:00 | 2016-12-05T16:59+09:00 |
| jvndb-2016-000098 | TERASOLUNA Server Framework for Java(WEB) access restriction bypass vulnerability in the file extention filter | 2016-06-07T16:26+09:00 | 2016-06-27T11:32+09:00 |
| jvndb-2016-000099 | DX Library vulnerable to remote code execution | 2016-06-08T14:30+09:00 | 2016-06-27T11:32+09:00 |
| jvndb-2016-000100 | ETX-R vulnerable to cross-site request forgery | 2016-06-14T13:55+09:00 | 2016-06-23T17:12+09:00 |
| jvndb-2016-000101 | ETX-R vulnerable to denial-of-service (DoS) | 2016-06-14T14:00+09:00 | 2016-06-23T12:20+09:00 |
| jvndb-2016-000103 | Deep Discovery Inspector vulnerable to remote code execution | 2016-06-16T14:03+09:00 | 2016-07-12T15:03+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2017:0407-1 | Security update for the Linux Kernel | 2017-02-06T14:41:53Z | 2017-02-06T14:41:53Z |
| suse-su-2017:0408-1 | Security update for mysql | 2017-02-06T19:59:59Z | 2017-02-06T19:59:59Z |
| suse-su-2017:0411-1 | Security update for mariadb | 2017-02-07T12:16:05Z | 2017-02-07T12:16:05Z |
| suse-su-2017:0415-1 | Security update for expat | 2017-02-07T12:17:55Z | 2017-02-07T12:17:55Z |
| suse-su-2017:0412-1 | Security update for mariadb | 2017-02-07T12:33:36Z | 2017-02-07T12:33:36Z |
| suse-su-2017:0424-1 | Security update for expat | 2017-02-08T12:07:52Z | 2017-02-08T12:07:52Z |
| suse-su-2017:0426-1 | Security update for MozillaFirefox | 2017-02-08T12:11:42Z | 2017-02-08T12:11:42Z |
| suse-su-2017:0427-1 | Security update for MozillaFirefox | 2017-02-08T21:51:54Z | 2017-02-08T21:51:54Z |
| suse-su-2017:0433-1 | Security update for libgit2 | 2017-02-09T10:17:43Z | 2017-02-09T10:17:43Z |
| suse-su-2017:0431-1 | Security update for nodejs6 | 2017-02-09T10:18:00Z | 2017-02-09T10:18:00Z |
| suse-su-2017:0436-1 | Security update for opus | 2017-02-09T15:25:22Z | 2017-02-09T15:25:22Z |
| suse-su-2017:0437-1 | Security update for the Linux Kernel | 2017-02-09T15:37:43Z | 2017-02-09T15:37:43Z |
| suse-su-2017:0441-1 | Security update for openssl | 2017-02-10T14:39:46Z | 2017-02-10T14:39:46Z |
| suse-su-2017:0453-1 | Security update for tiff | 2017-02-13T10:40:44Z | 2017-02-13T10:40:44Z |
| suse-su-2017:0459-1 | Security update for gd | 2017-02-14T13:08:25Z | 2017-02-14T13:08:25Z |
| suse-su-2017:0461-1 | Security update for openssl | 2017-02-14T14:18:29Z | 2017-02-14T14:18:29Z |
| suse-su-2017:0460-1 | Security update for java-1_8_0-ibm | 2017-02-14T15:30:23Z | 2017-02-14T15:30:23Z |
| suse-su-2017:0464-1 | Security update for the Linux Kernel | 2017-02-14T19:07:43Z | 2017-02-14T19:07:43Z |
| suse-su-2017:0467-1 | Security update for libXpm | 2017-02-15T06:29:52Z | 2017-02-15T06:29:52Z |
| suse-su-2017:0468-1 | Security update for gd | 2017-02-15T06:31:22Z | 2017-02-15T06:31:22Z |
| suse-su-2017:0470-1 | Security update for xorg-x11-libXpm | 2017-02-15T11:12:34Z | 2017-02-15T11:12:34Z |
| suse-su-2017:0473-1 | Security update for ppp | 2017-02-15T15:28:14Z | 2017-02-15T15:28:14Z |
| suse-su-2017:0474-1 | Security update for ppp | 2017-02-15T15:29:42Z | 2017-02-15T15:29:42Z |
| suse-su-2017:0471-1 | Security update for the Linux Kernel | 2017-02-15T16:20:32Z | 2017-02-15T16:20:32Z |
| suse-su-2017:0475-1 | Security update for susestudio | 2017-02-16T00:19:16Z | 2017-02-16T00:19:16Z |
| suse-su-2017:0490-1 | Security update for java-1_7_0-openjdk | 2017-02-17T09:59:41Z | 2017-02-17T09:59:41Z |
| suse-su-2017:0495-1 | Security update for openssl1 | 2017-02-17T13:29:39Z | 2017-02-17T13:29:39Z |
| suse-su-2017:0494-1 | Security update for the Linux Kernel | 2017-02-17T13:56:58Z | 2017-02-17T13:56:58Z |
| suse-su-2017:0519-1 | Security update for tigervnc | 2017-02-20T10:05:40Z | 2017-02-20T10:05:40Z |
| suse-su-2017:0518-1 | Security update for GraphicsMagick | 2017-02-20T10:12:32Z | 2017-02-20T10:12:32Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2020:1256-1 | Security update for webkit2gtk3 | 2020-08-24T18:19:46Z | 2020-08-24T18:19:46Z |
| opensuse-su-2020:1257-1 | Security update for python | 2020-08-24T18:19:59Z | 2020-08-24T18:19:59Z |
| opensuse-su-2020:1258-1 | Security update for python3 | 2020-08-24T18:20:11Z | 2020-08-24T18:20:11Z |
| opensuse-su-2020:1260-1 | Security update for chromium | 2020-08-26T12:21:41Z | 2020-08-26T12:21:41Z |
| opensuse-su-2020:1261-1 | Security update for libreoffice | 2020-08-26T18:21:44Z | 2020-08-26T18:21:44Z |
| opensuse-su-2020:1262-1 | Security update for dovecot23 | 2020-08-26T18:21:50Z | 2020-08-26T18:21:50Z |
| opensuse-su-2020:1263-1 | Security update for chromium | 2020-08-26T18:22:10Z | 2020-08-26T18:22:10Z |
| opensuse-su-2020:1265-1 | Security update for python3 | 2020-08-26T18:22:31Z | 2020-08-26T18:22:31Z |
| opensuse-su-2020:1269-1 | Security update for claws-mail | 2020-08-27T04:21:24Z | 2020-08-27T04:21:24Z |
| opensuse-su-2020:1270-1 | Security update for gettext-runtime | 2020-08-27T14:21:31Z | 2020-08-27T14:21:31Z |
| opensuse-su-2020:1271-1 | Security update for inn | 2020-08-27T16:22:11Z | 2020-08-27T16:22:11Z |
| opensuse-su-2020:1272-1 | Security update for inn | 2020-08-27T16:22:19Z | 2020-08-27T16:22:19Z |
| opensuse-su-2020:1275-1 | Security update for webkit2gtk3 | 2020-08-27T16:22:43Z | 2020-08-27T16:22:43Z |
| opensuse-su-2020:1278-1 | Security update for gettext-runtime | 2020-08-27T22:21:48Z | 2020-08-27T22:21:48Z |
| opensuse-su-2020:1279-1 | Security update for xorg-x11-server | 2020-08-29T08:24:57Z | 2020-08-29T08:24:57Z |
| opensuse-su-2020:1280-1 | Security update for grub2 | 2020-08-29T10:23:37Z | 2020-08-29T10:23:37Z |
| opensuse-su-2020:1282-1 | Security update for grub2 | 2020-08-29T10:23:49Z | 2020-08-29T10:23:49Z |
| opensuse-su-2020:1285-1 | Security update for apache2 | 2020-08-29T10:24:11Z | 2020-08-29T10:24:11Z |
| opensuse-su-2020:1289-1 | Security update for librepo | 2020-08-30T04:22:38Z | 2020-08-30T04:22:38Z |
| opensuse-su-2020:1293-1 | Security update for apache2 | 2020-08-30T04:23:10Z | 2020-08-30T04:23:10Z |
| opensuse-su-2020:1294-1 | Security update for graphviz | 2020-08-30T04:23:20Z | 2020-08-30T04:23:20Z |
| opensuse-su-2020:1302-1 | Security update for xorg-x11-server | 2020-08-30T22:22:14Z | 2020-08-30T22:22:14Z |
| opensuse-su-2020:1303-1 | Security update for graphviz | 2020-08-30T22:22:21Z | 2020-08-30T22:22:21Z |
| opensuse-su-2020:1304-1 | Security update for inn | 2020-08-30T22:22:35Z | 2020-08-30T22:22:35Z |
| opensuse-su-2020:1306-1 | Security update for chromium | 2020-08-31T16:23:00Z | 2020-08-31T16:23:00Z |
| opensuse-su-2020:1309-1 | Security update for chromium | 2020-09-01T04:22:18Z | 2020-09-01T04:22:18Z |
| opensuse-su-2020:1310-1 | Security update for ark | 2020-09-01T04:22:36Z | 2020-09-01T04:22:36Z |
| opensuse-su-2020:1310-2 | Security update for ark | 2020-09-01T04:22:36Z | 2020-09-01T04:22:36Z |
| opensuse-su-2020:1312-1 | Security update for postgresql10 | 2020-09-01T10:29:34Z | 2020-09-01T10:29:34Z |
| opensuse-su-2020:1313-1 | Security update for ldb, samba | 2020-09-01T10:31:13Z | 2020-09-01T10:31:13Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-01367 | Visualware MyConnection Server跨站脚本漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01368 | UNIT4 Prosoft HRMS跨站脚本漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01369 | Ilch CMS跨站请求伪造漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01370 | WordPress插件Easy Social Icons跨站请求伪造漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01371 | Wordpress插件WordPress Survey and Poll SQL注入漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01372 | WordPress插件CrossSlide jQuery跨站请求伪造漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01373 | D-Link DIR-645 Wired/Wireless Router操作系统命令注入漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01374 | D-Link DAP-1320代码注入漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01375 | D-Link DCS-931L跨站请求伪造漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01376 | D-Link DIR-645 Wired/Wireless Router栈缓冲区溢出漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01377 | Zhone GPON 2520输入验证漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01378 | DLGuard跨站脚本漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01379 | DLGuard SQL注入漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01380 | Magento Server MAGMI插件目录遍历漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01381 | Magento Server MAGMI插件跨站脚本漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01382 | IBM Rational Insight信息泄露漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01383 | Komodia SDK for Komodia Redirector with SSL Digestor信息泄露漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01384 | Komodia SDK for Komodia Redirector with SSL Digestor加密问题漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01398 | Drupal Spider Video Player模块存在多个漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01400 | GNU glibc 'fnmatch_loop.c'远程缓冲区溢出漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01401 | GNU C Library拒绝服务漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01404 | WordPress插件WP Slimstat 'wp-admin/admin.php'跨站脚本漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01405 | Zope 'manage_tabs_message'参数跨站脚本漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01406 | Cisco Security Manager存在多个跨站脚本漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01407 | Cisco IOS Software安全绕过漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01408 | Network Vision IntraVue存在未明远程命令注入漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01409 | Cisco Application Networking Manager跨站请求伪造漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01410 | Cisco IOS/IOS XE Software拒绝服务漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01411 | Drupal Spider Catalog模块跨站请求伪造漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01412 | Joomla! Googlemaps Plugin路径泄露漏洞 | 2015-02-28 | 2015-03-04 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2005-avi-234 | Vulnérabilité de ClamAV | 2005-06-28T00:00:00.000000 | 2005-07-12T00:00:00.000000 |
| certa-2005-avi-235 | Multiples vulnérabilités des produits Adobe pour Mac OS X | 2005-06-28T00:00:00.000000 | 2005-06-28T00:00:00.000000 |
| certa-2005-avi-236 | Vulnérabilité du chargeur ld.so sous Solaris | 2005-06-29T00:00:00.000000 | 2005-06-29T00:00:00.000000 |
| certa-2005-avi-237 | Vulnérabilité dans phpBB | 2005-06-29T00:00:00.000000 | 2005-07-05T00:00:00.000000 |
| certa-2005-avi-238 | Vulnérabilité de RADIUS Authentication sous CISCO IOS | 2005-06-30T00:00:00.000000 | 2005-06-30T00:00:00.000000 |
| certa-2005-avi-239 | Multiples vulnérabilité dans heimdal telnetd server | 2005-06-30T00:00:00.000000 | 2005-07-18T00:00:00.000000 |
| certa-2005-avi-240 | Vulnérabilités FreeBSD (ipfw) | 2005-07-01T00:00:00.000000 | 2005-07-01T00:00:00.000000 |
| certa-2005-avi-241 | Vulnérabilités dans la pile <TT>TCP</TT> de FreeBSD | 2005-07-01T00:00:00.000000 | 2005-07-01T00:00:00.000000 |
| certa-2005-avi-242 | Vulnérabilités dans PHP PEAR | 2005-07-01T00:00:00.000000 | 2005-07-18T00:00:00.000000 |
| certa-2005-avi-243 | Multiples vulnérabilités de Cacti | 2005-07-04T00:00:00.000000 | 2005-07-21T00:00:00.000000 |
| certa-2005-avi-244 | Vulnérabilité dans les produits Nortel | 2005-07-06T00:00:00.000000 | 2005-07-06T00:00:00.000000 |
| certa-2005-avi-245 | Vulnérabilités dans OpenLDAP, nss_ldap et pam_ldap | 2005-07-06T00:00:00.000000 | 2005-07-19T00:00:00.000000 |
| certa-2005-avi-246 | Vulnérabilité de la bibliothèque zlib | 2005-07-06T00:00:00.000000 | 2005-08-01T00:00:00.000000 |
| certa-2005-avi-247 | Vulnérabilités dans Adobe Reader | 2005-07-06T00:00:00.000000 | 2005-07-15T00:00:00.000000 |
| certa-2005-avi-248 | Vulnérabilité d'Internet Explorer | 2005-07-07T00:00:00.000000 | 2005-07-07T00:00:00.000000 |
| certa-2005-avi-249 | Vulnérabilité de Ruby | 2005-07-12T00:00:00.000000 | 2005-07-13T00:00:00.000000 |
| certa-2005-avi-250 | Vulnérabilité de dhcpcd | 2005-07-12T00:00:00.000000 | 2005-07-28T00:00:00.000000 |
| certa-2005-avi-251 | Vulnérabilité de cpio | 2005-07-12T00:00:00.000000 | 2005-10-10T00:00:00.000000 |
| certa-2005-avi-252 | Vulnérabilité de IBM Tivoli | 2005-07-12T00:00:00.000000 | 2005-07-12T00:00:00.000000 |
| certa-2005-avi-253 | Vulnérabilité dans Microsoft Word | 2005-07-13T00:00:00.000000 | 2005-07-13T00:00:00.000000 |
| certa-2005-avi-254 | Vulnérabilité dans le module de gestion des couleurs de Microsoft | 2005-07-13T00:00:00.000000 | 2005-07-13T00:00:00.000000 |
| certa-2005-avi-255 | Multiples vulnérabilités dans les produits Oracle | 2005-07-13T00:00:00.000000 | 2005-07-25T00:00:00.000000 |
| certa-2005-avi-256 | Multiples vulnérabilité dans les produits Mozilla | 2005-07-13T00:00:00.000000 | 2005-07-29T00:00:00.000000 |
| certa-2005-avi-257 | Vulnérabilité de MIT Kerberos 5 | 2005-07-13T00:00:00.000000 | 2006-10-03T00:00:00.000000 |
| certa-2005-avi-258 | Multiples vulnérabilités dans Mac OS X | 2005-07-13T00:00:00.000000 | 2005-07-13T00:00:00.000000 |
| certa-2005-avi-259 | Vulnérabilités dans CISCO Call Manager | 2005-07-13T00:00:00.000000 | 2005-07-13T00:00:00.000000 |
| certa-2005-avi-260 | Vulnérabilités dans IBM AIX ftpd | 2005-07-13T00:00:00.000000 | 2005-07-13T00:00:00.000000 |
| certa-2005-avi-261 | Multiples vulnérabilités dans Bugzilla | 2005-07-15T00:00:00.000000 | 2005-07-15T00:00:00.000000 |
| certa-2005-avi-262 | Vulnérabilité de SquirrelMail | 2005-07-15T00:00:00.000000 | 2005-09-19T00:00:00.000000 |
| certa-2005-avi-263 | Vulnérabilité dans Cisco Security Agent (CSA) | 2005-07-15T00:00:00.000000 | 2005-07-15T00:00:00.000000 |