Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0112 |
N/A
|
Buffer overflow in AIX dtterm program for the CDE. |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.522Z |
| CVE-1999-0113 |
N/A
|
Some implementations of rlogin allow root access … |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.663Z |
| CVE-1999-0116 |
N/A
|
Denial of service when an attacker sends many SYN… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.689Z |
| CVE-1999-0117 |
N/A
|
AIX passwd allows local users to gain root access. |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.677Z |
| CVE-1999-0120 |
N/A
|
Sun/Solaris utmp file allows local users to gain … |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.712Z |
| CVE-1999-0122 |
N/A
|
Buffer overflow in AIX lchangelv gives root access. |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.543Z |
| CVE-1999-0125 |
N/A
|
Buffer overflow in SGI IRIX mailx program. |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.706Z |
| CVE-1999-0126 |
N/A
|
SGI IRIX buffer overflow in xterm and Xaw allows … |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.710Z |
| CVE-1999-0128 |
N/A
|
Oversized ICMP ping packets can result in a denia… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.581Z |
| CVE-1999-0129 |
N/A
|
Sendmail allows local users to write to a file an… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.692Z |
| CVE-1999-0130 |
N/A
|
Local users can start Sendmail in daemon mode and… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.542Z |
| CVE-1999-0131 |
N/A
|
Buffer overflow and denial of service in Sendmail… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.691Z |
| CVE-1999-0132 |
N/A
|
Expreserve, as used in vi and ex, allows local us… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.644Z |
| CVE-1999-0133 |
N/A
|
fm_fls license server for Adobe Framemaker allows… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.751Z |
| CVE-1999-0134 |
N/A
|
vold in Solaris 2.x allows local users to gain ro… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.599Z |
| CVE-1999-0135 |
N/A
|
admintool in Solaris allows a local user to write… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.690Z |
| CVE-1999-0136 |
N/A
|
Kodak Color Management System (KCMS) on Solaris a… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.706Z |
| CVE-1999-0137 |
N/A
|
The dip program on many Linux systems allows loca… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.658Z |
| CVE-1999-0138 |
N/A
|
The suidperl and sperl program do not give up roo… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.547Z |
| CVE-1999-0139 |
N/A
|
Buffer overflow in Solaris x86 mkcookie allows lo… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.550Z |
| CVE-1999-0141 |
N/A
|
Java Bytecode Verifier allows malicious applets t… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.867Z |
| CVE-1999-0143 |
N/A
|
Kerberos 4 key servers allow a user to masquerade… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.749Z |
| CVE-1999-0146 |
N/A
|
The campas CGI program provided with some NCSA we… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.934Z |
| CVE-1999-0147 |
N/A
|
The aglimpse CGI program of the Glimpse package a… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.928Z |
| CVE-1999-0148 |
N/A
|
The handler CGI program in IRIX allows arbitrary … |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.814Z |
| CVE-1999-0149 |
N/A
|
The wrap CGI program in IRIX allows remote attack… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.767Z |
| CVE-1999-0150 |
N/A
|
The Perl fingerd program allows arbitrary command… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.679Z |
| CVE-1999-0152 |
N/A
|
The DG/UX finger daemon allows remote command exe… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.691Z |
| CVE-1999-0153 |
N/A
|
Windows 95/NT out of band (OOB) data denial of se… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.671Z |
| CVE-1999-0155 |
N/A
|
The ghostscript command with the -dSAFER option a… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.844Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0151 |
N/A
|
The SATAN session key may be disclosed if the use… |
n/a |
n/a |
2000-01-04T05:00:00.000Z | 2024-08-01T16:27:57.696Z |
| CVE-1999-1080 |
N/A
|
rmmount in SunOS 5.7 may mount file systems witho… |
n/a |
n/a |
2002-06-25T04:00:00.000Z | 2024-08-01T17:02:53.682Z |
| CVE-1999-0066 |
9.8 (3.1)
|
AnyForm CGI remote execution. |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T20:50:29.555Z |
| CVE-1999-0161 |
N/A
|
In Cisco IOS 10.3, with the tacacs-ds or tacacs k… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.691Z |
| CVE-1999-0172 |
N/A
|
FormMail CGI program allows remote execution of c… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.720Z |
| CVE-1999-0203 |
N/A
|
In Sendmail, attackers can gain root privileges v… |
n/a |
n/a |
2000-04-25T04:00:00.000Z | 2024-08-01T16:27:57.940Z |
| CVE-1999-1580 |
N/A
|
SunOS sendmail 5.59 through 5.65 uses popen to pr… |
n/a |
n/a |
2005-04-21T04:00:00.000Z | 2024-08-01T17:18:07.526Z |
| CVE-1999-0164 |
N/A
|
A race condition in the Solaris ps command allows… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.761Z |
| CVE-1999-0155 |
N/A
|
The ghostscript command with the -dSAFER option a… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.844Z |
| CVE-1999-0245 |
N/A
|
Some configurations of NIS+ in Linux allowed atta… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:34:51.874Z |
| CVE-1999-0218 |
N/A
|
Livingston portmaster machines could be rebooted … |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:34:50.895Z |
| CVE-1999-0073 |
N/A
|
Telnet allows a remote client to specify environm… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2026-03-08T09:06:54.428Z |
| CVE-1999-0099 |
N/A
|
Buffer overflow in syslog utility allows local or… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.521Z |
| CVE-1999-0241 |
N/A
|
Guessable magic cookies in X Windows allows remot… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:34:51.868Z |
| CVE-1999-0080 |
N/A
|
Certain configurations of wu-ftp FTP server 2.4 u… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.629Z |
| CVE-1999-0123 |
N/A
|
Race condition in Linux mailx command allows loca… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:27:57.685Z |
| CVE-1999-0316 |
N/A
|
Buffer overflow in Linux splitvt command gives ro… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:34:51.899Z |
| CVE-1999-0325 |
N/A
|
vhe_u_mnt program in HP-UX allows local users to … |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:34:51.870Z |
| CVE-1999-0208 |
N/A
|
rpc.ypupdated (NIS) allows remote users to execut… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:34:50.915Z |
| CVE-1999-1186 |
N/A
|
rxvt, when compiled with the PRINT_PIPE option in… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:02:53.866Z |
| CVE-1999-1319 |
N/A
|
Vulnerability in object server program in SGI IRI… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:01.787Z |
| CVE-1999-1491 |
N/A
|
abuse.console in Red Hat 2.1 uses relative pathna… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:18:07.449Z |
| CVE-1999-0103 |
N/A
|
Echo and chargen, or other combinations of UDP se… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2025-03-17T15:03:10.094Z |
| CVE-1999-0143 |
N/A
|
Kerberos 4 key servers allow a user to masquerade… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.749Z |
| CVE-1999-0233 |
N/A
|
IIS 1.0 allows users to execute arbitrary command… |
n/a |
n/a |
2000-01-18T05:00:00.000Z | 2024-08-01T16:34:51.769Z |
| CVE-1999-0142 |
N/A
|
The Java Applet Security Manager implementation i… |
n/a |
n/a |
2000-06-02T04:00:00.000Z | 2024-08-01T16:27:57.727Z |
| CVE-1999-0067 |
N/A
|
phf CGI program allows remote command execution t… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.471Z |
| CVE-1999-0141 |
N/A
|
Java Bytecode Verifier allows malicious applets t… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.867Z |
| CVE-1999-0070 |
N/A
|
test-cgi program allows an attacker to list files… |
n/a |
n/a |
1999-09-29T04:00:00.000Z | 2024-08-01T16:27:57.060Z |
| CVE-1999-1103 |
N/A
|
dxconsole in DEC OSF/1 3.2C and earlier allows lo… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:53.680Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-4936-rj25-6wm6 |
|
nori contains Improper Input Validation | 2017-10-24T18:33:37Z | 2023-01-20T22:08:42Z |
| ghsa-574q-fxfj-wv6h |
|
Puppet Improper Input Validation vulnerability | 2017-10-24T18:33:37Z | 2023-05-12T17:26:05Z |
| ghsa-699m-mcjm-9cw8 |
|
actionpack vulnerable to Cross-site Scripting | 2017-10-24T18:33:37Z | 2023-08-25T19:05:47Z |
| ghsa-6c8p-qphv-668v |
|
Denial of service in ruby-openid | 2017-10-24T18:33:37Z | 2023-06-09T20:18:48Z |
| ghsa-78j3-7wpm-qhvp |
|
Shell Metacharacter Injection in kelredd-pruview | 2017-10-24T18:33:37Z | 2023-07-05T19:12:35Z |
| ghsa-7fqj-cg79-f2pv |
|
Thumbshooter vulnerable to Code Injection | 2017-10-24T18:33:37Z | 2023-08-28T13:54:43Z |
| ghsa-7g65-ghrg-hpf5 |
|
actionpack Cross-site Scripting vulnerability | 2017-10-24T18:33:37Z | 2025-01-21T15:21:13Z |
| ghsa-85r7-w5mv-c849 |
|
Rack Vulnerable to Path Traversal | 2017-10-24T18:33:37Z | 2023-08-25T23:30:15Z |
| ghsa-8jxj-9r5f-w3m2 |
|
Puppet allows local users to obtain sensitive configuration information | 2017-10-24T18:33:37Z | 2023-05-12T17:05:34Z |
| ghsa-98mf-8f57-64qf |
|
actionpack Cross-site Scripting vulnerability | 2017-10-24T18:33:37Z | 2023-01-23T16:34:24Z |
| ghsa-99ch-8mvp-g7m5 |
|
md2pdf allows context-dependent attackers to execute arbitrary commands via shell metacharacters in… | 2017-10-24T18:33:37Z | 2023-01-23T16:37:19Z |
| ghsa-9c2j-593q-3g82 |
|
activesupport Improper Input Validation vulnerability | 2017-10-24T18:33:37Z | 2023-06-01T19:51:36Z |
| ghsa-9h36-4jf2-hx53 |
|
extlib does not properly restrict casts of string values | 2017-10-24T18:33:37Z | 2023-01-23T20:56:41Z |
| ghsa-9hx9-w2j6-rw76 |
|
Script Injection in Show In Browser gem | 2017-10-24T18:33:37Z | 2025-04-13T23:26:43Z |
| ghsa-9qj7-jvg4-qr2x |
|
Phusion Passenger Denial of Service | 2017-10-24T18:33:37Z | 2023-07-05T18:50:18Z |
| ghsa-c43v-hrmg-56r4 |
|
Cocaine Gem OS Command Injection vulnerability | 2017-10-24T18:33:37Z | 2023-09-05T21:12:28Z |
| ghsa-cf36-985g-v73c |
|
omniauth-facebook Cross-Site Request Forgery vulnerability | 2017-10-24T18:33:37Z | 2023-01-23T21:12:18Z |
| ghsa-cj43-9h3w-v976 |
|
Puppet allows remote attackers to execute arbitrary Ruby programs from the master via the resource_… | 2017-10-24T18:33:37Z | 2022-10-04T21:44:45Z |
| ghsa-f7p5-w2cr-7cp7 |
|
Puppet Improper Input Validation vulnerability | 2017-10-24T18:33:37Z | 2023-05-12T17:27:38Z |
| ghsa-fgmx-8h93-26fh |
|
omniauth-oauth2 Cross-Site Request Forgery vulnerability | 2017-10-24T18:33:37Z | 2023-01-25T23:20:49Z |
| ghsa-fhj9-cjjh-27vm |
|
Active Record contains deserialization of arbitrary YAML | 2017-10-24T18:33:37Z | 2023-03-14T22:15:51Z |
| ghsa-g266-3crh-h7gj |
|
ldoce Gem Arbitrary Command Execution | 2017-10-24T18:33:37Z | 2023-08-29T16:28:48Z |
| ghsa-g89m-3wjw-h857 |
|
Puppet vulnerable to Path Traversal | 2017-10-24T18:33:37Z | 2023-05-12T17:09:48Z |
| ghsa-gh2w-j7cx-2664 |
|
Active Record contains SQL Injection | 2017-10-24T18:33:37Z | 2025-01-21T16:47:32Z |
| ghsa-gppp-5xc5-wfpx |
|
Active Record allows bypassing of database-query restrictions | 2017-10-24T18:33:37Z | 2023-08-25T23:11:25Z |
| ghsa-gr44-7grc-37vq |
|
ActiveRecord vulnerable to modification of protected model attributes | 2017-10-24T18:33:37Z | 2023-01-23T17:23:13Z |
| ghsa-h77x-m5q8-c29h |
|
Rack vulnerable to REDoS | 2017-10-24T18:33:37Z | 2023-08-25T23:23:23Z |
| ghsa-h835-75hw-pj89 |
|
activesupport Cross-site Scripting vulnerability | 2017-10-24T18:33:37Z | 2025-01-21T16:46:59Z |
| ghsa-hxx6-p24v-wg8c |
|
Curl Gem insufficient URL escaping command injection | 2017-10-24T18:33:37Z | 2023-08-29T10:57:50Z |
| ghsa-j838-vfpq-fmf2 |
|
actionpack Cross-site Scripting vulnerability | 2017-10-24T18:33:37Z | 2023-01-23T17:47:24Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2011-26 |
|
Unspecified vulnerability in Zope 2.12.x and 2.13.x, as used in Plone 4.0.x through 4.0.9… | products-plonehotfix20110928 | 2011-10-10T10:55:00Z | 2024-11-21T14:22:59.154748Z |
| pysec-2011-27 |
|
The CMFEditions component 2.x in Plone 4.0.x through 4.0.9, 4.1, and 4.2 through 4.2a2 do… | products-plonehotfix20110928 | 2011-10-10T10:55:00Z | 2024-11-21T14:22:59.206417Z |
| pysec-2011-1 |
|
django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data … | django | 2011-10-19T10:55:00Z | 2021-07-05T00:01:17.786807Z |
| pysec-2011-2 |
|
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and… | django | 2011-10-19T10:55:00Z | 2021-07-05T00:01:17.875375Z |
| pysec-2011-3 |
|
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and… | django | 2011-10-19T10:55:00Z | 2021-07-05T00:01:17.957407Z |
| pysec-2011-4 |
|
Django before 1.2.7 and 1.3.x before 1.3.1 uses a request's HTTP Host header to construct… | django | 2011-10-19T10:55:00Z | 2021-07-05T00:01:18.041571Z |
| pysec-2011-5 |
|
The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not pr… | django | 2011-10-19T10:55:00Z | 2021-07-05T00:01:18.129041Z |
| pysec-2011-17 |
|
Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effec… | celery | 2011-12-05T11:55:00Z | 2021-08-27T03:21:56.662825Z |
| pysec-2011-22 |
|
Plone 4.1.3 and earlier computes hash values for form parameters without restricting the … | plone | 2011-12-30T01:55:00Z | 2021-08-27T03:22:11.387960Z |
| pysec-2011-23 |
|
virtualenv.py in virtualenv before 1.5 allows local users to overwrite arbitrary files vi… | virtualenv | 2011-12-31T01:55:00Z | 2021-08-27T03:22:49.873439Z |
| pysec-2012-31 |
|
libs/updater.py in GoLismero 0.6.3, and other versions before Git revision 2b3bb43d6867, … | golismero | 2012-03-19T19:55:00Z | 2024-11-21T14:22:51.617446Z |
| pysec-2012-22 |
|
The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Secure A… | bitdefender | 2012-03-21T10:11:00Z | 2024-11-21T14:22:41.00719Z |
| pysec-2012-23 |
|
The ELF file parser in Bitdefender 7.2, Command Antivirus 5.2.11.5, Comodo Antivirus 7424… | bitdefender | 2012-03-21T10:11:00Z | 2024-11-21T14:22:41.056758Z |
| pysec-2012-24 |
|
The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat Q… | bitdefender | 2012-03-21T10:11:00Z | 2024-11-21T14:22:41.111226Z |
| pysec-2012-25 |
|
The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antiv… | bitdefender | 2012-03-21T10:11:00Z | 2024-11-21T14:22:41.165409Z |
| pysec-2012-26 |
|
The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.16… | bitdefender | 2012-03-21T10:11:00Z | 2024-11-21T14:22:41.220887Z |
| pysec-2012-27 |
|
The Gzip file parser in AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Command Antivirus 5.… | bitdefender | 2012-03-21T10:11:00Z | 2024-11-21T14:22:41.276629Z |
| pysec-2012-28 |
|
The ELF file parser in AhnLab V3 Internet Security 2011.01.18.00, Bitdefender 7.2, Quick … | bitdefender | 2012-03-21T10:11:00Z | 2024-11-21T14:22:41.328571Z |
| pysec-2012-15 |
|
Paste Script 1.7.5 and earlier does not properly set group memberships during execution w… | paste | 2012-05-01T19:55:00Z | 2021-08-27T03:22:10.166915Z |
| pysec-2012-14 |
|
Universal Feed Parser (aka feedparser or python-feedparser) before 5.1.2 allows remote at… | feedparser | 2012-05-21T22:55:00Z | 2021-08-27T03:22:03.863933Z |
| pysec-2012-5 |
|
CRLF injection vulnerability in the tornado.web.RequestHandler.set_header function in Tor… | tornado | 2012-05-23T20:55:00Z | 2021-07-05T00:01:27.298545Z |
| pysec-2012-32 |
|
Cross-site scripting (XSS) vulnerability in the refresh mechanism in the log viewer in ho… | horizon | 2012-06-05T22:55:00Z | 2024-11-21T14:22:51.729618Z |
| pysec-2012-33 |
|
Session fixation vulnerability in OpenStack Dashboard (Horizon) folsom-1 and 2012.1 allow… | horizon | 2012-06-05T22:55:00Z | 2024-11-21T14:22:51.786908Z |
| pysec-2012-9 |
|
Multiple SQL injection vulnerabilities in SQLAlchemy before 0.7.0b4, as used in Keystone,… | sqlalchemy | 2012-06-05T22:55:00Z | 2021-07-15T02:22:20.378135Z |
| pysec-2012-36 |
|
Openstack Compute (Nova) Folsom, 2012.1, and 2011.3 does not limit the number of security… | nova | 2012-06-07T19:55:00Z | 2024-11-21T14:22:55.825436Z |
| pysec-2012-16 |
|
PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal sche… | pycrypto | 2012-06-17T03:41:00Z | 2021-08-27T03:22:16.601238Z |
| pysec-2012-37 |
|
The (1) EC2 and (2) OS APIs in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), … | nova | 2012-06-21T15:55:00Z | 2024-11-21T14:22:55.891133Z |
| pysec-2012-6 |
|
model/modelstorage.py in the Tryton application framework (trytond) before 2.4.0 for Pyth… | trytond | 2012-07-12T20:55:00Z | 2021-07-05T00:01:27.407587Z |
| pysec-2012-40 |
|
The Nova scheduler in OpenStack Compute (Nova) Folsom (2012.2) and Essex (2012.1), when D… | nova | 2012-07-17T21:55:00Z | 2024-11-21T14:22:56.558714Z |
| pysec-2012-38 |
|
Directory traversal vulnerability in virt/disk/api.py in OpenStack Compute (Nova) Folsom … | nova | 2012-07-22T16:55:00Z | 2024-11-21T14:22:56.434839Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-2768 | Malicious code in epic-games-self-service-portal (npm) | 2022-05-18T06:29:44Z | 2022-05-18T06:29:54Z |
| mal-2022-2769 | Malicious code in epic-support-prettier-config (npm) | 2022-05-18T06:29:44Z | 2022-05-18T06:29:44Z |
| mal-2022-5243 | Malicious code in paypal-rest-sample (npm) | 2022-05-18T06:29:44Z | 2022-05-18T06:29:44Z |
| mal-2022-5433 | Malicious code in pp-mp-connected-path (npm) | 2022-05-18T06:29:44Z | 2022-05-18T06:29:44Z |
| mal-2022-5434 | Malicious code in pp-react-buttons (npm) | 2022-05-18T06:29:44Z | 2022-05-18T06:29:54Z |
| mal-2022-6296 | Malicious code in starter-theme (npm) | 2022-05-18T06:29:44Z | 2022-05-18T06:29:54Z |
| mal-2022-7106 | Malicious code in website-404-error-page (npm) | 2022-05-19T08:37:21Z | 2022-05-19T08:37:22Z |
| mal-2022-1212 | Malicious code in axp-base (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:27Z |
| mal-2022-1213 | Malicious code in axp-shared-scripts (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:27Z |
| mal-2022-1214 | Malicious code in axp-utility-belt (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:22Z |
| mal-2022-2377 | Malicious code in ddc-classnames-js (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| mal-2022-2378 | Malicious code in ddc-new-relic (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| mal-2022-2464 | Malicious code in dgse-tools-mgm-elf-helper (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| mal-2022-4669 | Malicious code in mollie-design-system (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:22Z |
| mal-2022-377 | Malicious code in @kibt/operation-track (npm) | 2022-05-23T10:22:10Z | 2022-05-23T10:22:10Z |
| mal-2022-378 | Malicious code in @kibt/weblogger (npm) | 2022-05-23T10:22:10Z | 2022-05-23T10:22:10Z |
| mal-2022-7433 | Malicious code in equests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7434 | Malicious code in reequests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7435 | Malicious code in reqquests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7436 | Malicious code in requeests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7437 | Malicious code in requess (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7438 | Malicious code in requessts (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7439 | Malicious code in requestts (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7440 | Malicious code in requuests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7441 | Malicious code in reuests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7442 | Malicious code in rrequests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-2022 | Malicious code in colors_express (npm) | 2022-05-31T11:55:20Z | 2022-05-31T11:55:21Z |
| mal-2022-2590 | Malicious code in dragox-utilities (npm) | 2022-05-31T12:53:57Z | 2022-05-31T12:53:57Z |
| mal-2022-390 | Malicious code in @logistics-frontend/blocks (npm) | 2022-05-31T12:55:54Z | 2022-05-31T12:55:58Z |
| mal-2022-391 | Malicious code in @logistics-frontend/client-core (npm) | 2022-05-31T12:55:54Z | 2022-05-31T12:55:55Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2024-3390 | libxml2: Mehrere Schwachstellen | 2015-11-18T23:00:00.000+00:00 | 2025-06-30T22:00:00.000+00:00 |
| wid-sec-w-2024-3166 | OpenLDAP: Schwachstelle ermöglicht Manipulation von Daten | 2015-11-19T23:00:00.000+00:00 | 2024-10-14T22:00:00.000+00:00 |
| wid-sec-w-2024-3389 | libxml2: Mehrere Schwachstellen | 2015-11-22T23:00:00.000+00:00 | 2025-06-30T22:00:00.000+00:00 |
| wid-sec-w-2025-2440 | Red Hat JBoss Enterprise Application Platform: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2015-11-22T23:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2023-1320 | Xen: Schwachstelle ermöglicht Privilegieneskalation | 2015-11-30T23:00:00.000+00:00 | 2023-05-30T22:00:00.000+00:00 |
| wid-sec-w-2023-1392 | PCRE (Perl Compatible Regular Expressions): Mehrere Schwachstellen | 2015-12-02T23:00:00.000+00:00 | 2024-01-24T23:00:00.000+00:00 |
| wid-sec-w-2023-0175 | libpng: Schwachstelle ermöglicht Denial of Service | 2015-12-13T23:00:00.000+00:00 | 2025-06-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1183 | Internet Systems Consortium BIND: Mehrere Schwachstellen ermöglichen Denial of Service | 2015-12-15T23:00:00.000+00:00 | 2025-05-29T22:00:00.000+00:00 |
| wid-sec-w-2024-0655 | libTIFF: Mehrere Schwachstellen ermöglichen Ausführen von beliebigem Programmcode mit Benutzerrechten | 2015-12-27T23:00:00.000+00:00 | 2024-05-07T22:00:00.000+00:00 |
| wid-sec-w-2023-0428 | Verschiedene TLS-Implementierungen: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2016-01-06T23:00:00.000+00:00 | 2024-09-01T22:00:00.000+00:00 |
| wid-sec-w-2024-1055 | OpenSSH: Mehrere Schwachstellen | 2016-01-14T23:00:00.000+00:00 | 2024-05-13T22:00:00.000+00:00 |
| wid-sec-w-2023-0974 | GNU libc: Mehrere Schwachstellen | 2016-01-19T23:00:00.000+00:00 | 2023-04-16T22:00:00.000+00:00 |
| wid-sec-w-2024-0153 | Linux Kernel: Mehrere Schwachstellen | 2016-01-19T23:00:00.000+00:00 | 2024-01-17T23:00:00.000+00:00 |
| wid-sec-w-2024-1482 | Oracle MySQL: Mehrere Schwachstellen gefährden die Integrität, Vertraulichkeit und Verfügbarkeit | 2016-01-19T23:00:00.000+00:00 | 2024-06-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1184 | Internet Systems Consortium BIND: Mehrere Schwachstellen | 2016-01-19T23:00:00.000+00:00 | 2025-05-29T22:00:00.000+00:00 |
| wid-sec-w-2024-3388 | libxml2: Schwachstelle ermöglicht Denial of Service | 2016-01-21T23:00:00.000+00:00 | 2025-06-30T22:00:00.000+00:00 |
| wid-sec-w-2024-1481 | cpio: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes | 2016-01-24T23:00:00.000+00:00 | 2024-06-30T22:00:00.000+00:00 |
| wid-sec-w-2024-3387 | libxml2: Schwachstelle ermöglicht Denial of Service | 2016-01-25T23:00:00.000+00:00 | 2025-06-30T22:00:00.000+00:00 |
| wid-sec-w-2025-1085 | Ruby on Rails: Mehrere Schwachstellen | 2016-01-25T23:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2024-0152 | Linux Kernel: Mehrere Schwachstellen | 2016-02-14T23:00:00.000+00:00 | 2024-01-17T23:00:00.000+00:00 |
| wid-sec-w-2023-0973 | GNU libc: Mehrere Schwachstellen | 2016-02-16T23:00:00.000+00:00 | 2023-04-16T22:00:00.000+00:00 |
| wid-sec-w-2024-0151 | Linux Kernel: Mehrere Schwachstellen | 2016-02-23T23:00:00.000+00:00 | 2024-01-17T23:00:00.000+00:00 |
| wid-sec-w-2024-1054 | libssh: Mehrere Schwachstellen | 2016-02-23T23:00:00.000+00:00 | 2024-05-07T22:00:00.000+00:00 |
| wid-sec-w-2024-0150 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2016-02-28T23:00:00.000+00:00 | 2024-01-17T23:00:00.000+00:00 |
| wid-sec-w-2023-0427 | OpenSSL: Mehrere Schwachstellen | 2016-03-01T23:00:00.000+00:00 | 2025-11-02T23:00:00.000+00:00 |
| wid-sec-w-2025-1185 | Internet Systems Consortium BIND: Mehrere Schwachstellen ermöglichen Denial of Service | 2016-03-09T23:00:00.000+00:00 | 2025-05-29T22:00:00.000+00:00 |
| wid-sec-w-2024-0149 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2016-03-13T23:00:00.000+00:00 | 2024-01-17T23:00:00.000+00:00 |
| wid-sec-w-2024-3386 | libxml2: Schwachstelle ermöglicht Denial of Service | 2016-03-21T23:00:00.000+00:00 | 2025-08-25T22:00:00.000+00:00 |
| wid-sec-w-2023-2489 | PostgreSQL: Mehrere Schwachstellen | 2016-04-03T22:00:00.000+00:00 | 2025-02-03T23:00:00.000+00:00 |
| wid-sec-w-2024-1053 | OpenSSH: Schwachstelle ermöglicht Privilegieneskalation | 2016-04-17T22:00:00.000+00:00 | 2024-05-07T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-12-256-01 | Siemens WinCC WebNavigator Multiple Vulnerabilities | 2012-06-16T06:00:00.000000Z | 2025-06-25T18:57:28.717208Z |
| icsa-12-258-01 | IOServer OPC Server Multiple Vulnerabilities | 2012-06-18T06:00:00.000000Z | 2025-06-19T22:40:41.973320Z |
| icsa-12-262-01 | Fultek WinTr Directory Traversal | 2012-06-22T06:00:00.000000Z | 2025-06-05T21:54:06.142288Z |
| icsa-12-263-01 | Siemens S7-1200 Insecure Storage of HTTPS CA Certificate | 2012-06-23T06:00:00.000000Z | 2025-06-05T21:57:07.520195Z |
| icsa-12-263-02 | ORing Industrial Networking IDS-5042/5042+ Hard-Coded Credential Vulnerability | 2012-06-23T06:00:00.000000Z | 2025-06-05T21:55:20.894201Z |
| icsa-12-265-01 | Emerson DeltaV Buffer Overflow | 2012-06-25T06:00:00.000000Z | 2025-06-19T22:40:48.319564Z |
| icsa-12-271-01 | C3-ilex EOScada Multiple Vulnerabilities | 2012-07-01T06:00:00.000000Z | 2025-06-05T21:52:50.997308Z |
| icsa-12-271-02 | Optimalog Optima PLC Multiple Vulnerabilities | 2012-07-01T06:00:00.000000Z | 2025-06-05T21:58:28.836669Z |
| icsa-12-283-01 | Siemens S7-1200 Web Application Cross Site Scripting | 2012-07-13T06:00:00.000000Z | 2025-06-05T21:58:41.272530Z |
| icsa-12-283-02 | WellinTech KingView User Credentials Not Securely Hashed | 2012-07-13T06:00:00.000000Z | 2025-06-05T21:57:13.809905Z |
| icsa-12-297-01 | Tropos Wireless Mesh Routers | 2012-07-27T06:00:00.000000Z | 2025-06-06T16:02:32.102905Z |
| icsa-12-297-02 | Korenix Jetport 5600 Series Hard-coded Credentials | 2012-07-27T06:00:00.000000Z | 2025-06-06T15:59:49.132209Z |
| icsa-12-305-01 | Siemens SiPass Server Buffer Overflow | 2012-08-04T06:00:00.000000Z | 2025-06-06T16:02:38.548497Z |
| icsa-12-320-01 | ABB AC500 PLC Webserver CoDeSys Vulnerability | 2012-08-19T06:00:00.000000Z | 2025-06-06T15:59:36.140401Z |
| icsa-12-325-01 | Sinapsi Devices Vulnerabilities | 2012-08-24T06:00:00.000000Z | 2025-06-06T16:02:45.000511Z |
| icsa-12-335-01 | Post Oak Bluetooth Traffic Systems Insufficient Entropy Vulnerability | 2012-09-03T06:00:00.000000Z | 2025-06-06T15:59:55.615986Z |
| icsa-12-341-01 | GE Proficy HMI/SCADA Cimplicity Integer Overflow | 2012-09-09T06:00:00.000000Z | 2025-06-06T16:00:08.620714Z |
| icsa-12-342-01b | Rockwell Allen-Bradley MicroLogix, SLC 500, and PLC-5 Fault Generation Vulnerability | 2012-09-10T06:00:00.000000Z | 2025-06-18T19:24:55.231514Z |
| icsa-12-348-01 | Siemens ProcessSuite and Invensys Intouch Poorly Encrypted Password File | 2012-09-16T06:00:00.000000Z | 2025-06-06T16:00:15.589980Z |
| icsa-12-354-01a | Ruggedcom ROS Hard-Coded RSA SSL Private Key | 2012-09-22T06:00:00.000000Z | 2025-06-18T19:25:01.798871Z |
| icsa-12-354-02 | Carlo Gavazzi EOS Box Multiple Vulnerabilities | 2012-09-22T06:00:00.000000Z | 2025-06-06T16:03:17.342676Z |
| icsa-12-362-01 | I-GEN opLYNX Central Authentication Bypass | 2012-09-30T06:00:00.000000Z | 2025-06-06T16:00:02.057238Z |
| icsa-12-006-01 | 3S CoDeSys Vulnerabilities | 2012-10-09T06:00:00.000000Z | 2025-06-09T16:34:06.000552Z |
| icsa-12-012-01a | Open Automation Software OPC Systems.NET Vulnerability | 2012-10-15T06:00:00.000000Z | 2025-06-09T16:34:24.700109Z |
| icsa-12-013-01 | ING. Punzenberger COPA-DATA GMBH DoS Vulnerabilities | 2012-10-16T06:00:00.000000Z | 2025-06-09T16:34:37.147014Z |
| icsa-12-016-01 | Cogent DataHub XSS and CRLF | 2012-10-19T06:00:00.000000Z | 2025-06-09T16:34:49.600837Z |
| icsa-12-018-01b | Schneider Electric Quantum Ethernet Module Hard-Coded Credentials | 2012-10-21T06:00:00.000000Z | 2025-06-09T16:35:02.023038Z |
| icsa-12-024-01 | Ocean Data Systems Dream Reports XSS and Write Access Violation Vulnerabilities | 2012-10-27T06:00:00.000000Z | 2025-06-09T16:35:08.232133Z |
| icsa-12-024-02 | MICROSYS PROMOTIC Vulnerabilities | 2012-10-27T06:00:00.000000Z | 2025-06-09T16:35:20.987121Z |
| icsa-12-025-02a | 7-Technologies Termis DLL Hijacking | 2012-10-28T06:00:00.000000Z | 2025-06-05T21:58:10.182246Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20180207-ucm | Cisco Unified Communications Manager Information Disclosure Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-ucm1 | Cisco Unified Communications Manager Information Disclosure Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-ucsc | Cisco UCS Central Arbitrary Command Execution Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180207-vpcdi | Cisco Virtualized Packet Core-Distributed Instance Denial of Service Vulnerability | 2018-02-07T16:00:00+00:00 | 2018-02-07T16:00:00+00:00 |
| cisco-sa-20180221-cuc | Cisco Unity Connection Mail Relay Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-cvp | Cisco Unified Customer Voice Portal Interactive Voice Response Connection Denial of Service Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-dcaf | Cisco Data Center Analytics Framework Cross-Site Scripting Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-dcaf1 | Cisco Data Center Analytics Framework Cross-Site Request Forgery Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-esc | Cisco Elastic Services Controller Service Portal Authentication Bypass Vulnerability | 2018-02-21T16:00:00+00:00 | 2019-02-08T14:17:00+00:00 |
| cisco-sa-20180221-esc1 | Cisco Elastic Services Controller Service Portal Unauthorized Access Vulnerability | 2018-02-21T16:00:00+00:00 | 2019-02-08T14:15:00+00:00 |
| cisco-sa-20180221-jcf | Cisco Jabber Client Framework for Windows and Mac Cross-Site Scripting Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-jcf1 | Cisco Jabber Client Framework for Windows and Mac Cross-Site Scripting Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-pcpt | Cisco Prime Collaboration Provisioning Tool Web Portal Repeated Bad Login Attempts Denial of Service Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-pcpt1 | Cisco Prime Collaboration Provisioning Tool User Provisioning Tab Cross-Site Scripting Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-psc | Cisco Prime Service Catalog Cross-Site Scripting Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180221-ucdm | Cisco Unified Communications Domain Manager Remote Code Execution Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-03-09T14:47:00+00:00 |
| cisco-sa-20180221-ucm | Multiple Cisco Unified Communications Products Reflected Cross-Site Scripting Vulnerability | 2018-02-21T16:00:00+00:00 | 2019-02-01T16:42:00+00:00 |
| cisco-sa-20180221-ucsd | Cisco UCS Director and Cisco Integrated Management Controller Supervisor Cross-Site Request Forgery Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-02-21T16:00:00+00:00 |
| cisco-sa-20180307-550x | Cisco 550X Series Stackable Managed Switches SNMP Denial of Service Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-acs | Cisco Secure Access Control Server XML External Entity Injection Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-27T16:15:00+00:00 |
| cisco-sa-20180307-acs1 | Cisco Secure Access Control Server XML External Entity Injection Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-27T16:11:00+00:00 |
| cisco-sa-20180307-acs2 | Cisco Secure Access Control System Java Deserialization Vulnerability | 2018-03-07T16:00:00+00:00 | 2022-12-15T19:32:31+00:00 |
| cisco-sa-20180307-cpcp | Cisco Prime Collaboration Provisioning Hard-Coded Password Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-dcnm | Cisco Data Center Network Manager Cross-Site Request Forgery Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise | Cisco Identity Services Engine Authenticated CLI Denial of Service Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise1 | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise2 | Cisco Identity Services Engine Authenticated Privilege Escalation Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise3 | Cisco Identity Services Engine Local Command Injection Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise4 | Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise5 | Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2014-5277 | Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic. | 2014-11-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2014-8991 | pip 1.3 through 1.5.6 allows local users to cause a denial of service (prevention of package installation) by creating a /tmp/pip-build-* file for another user. | 2014-11-02T00:00:00.000Z | 2026-02-18T01:44:50.000Z |
| msrc_cve-2004-2771 | The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address. | 2014-12-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2014-6407 | Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation. | 2014-12-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2014-9358 | Docker before 1.3.3 does not properly validate image IDs which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications." | 2014-12-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2014-9638 | oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero. | 2015-01-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2014-9639 | Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file which triggers an out-of-bounds memory access. | 2015-01-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2015-1029 | The puppetlabs-stdlib module 2.1 through 3.0 and 4.1.0 through 4.5.x before 4.5.1 for Puppet 2.8.8 and earlier allows remote authenticated users to gain privileges or obtain sensitive information by prepopulating the fact cache. | 2015-01-02T00:00:00.000Z | 2025-02-11T00:00:00.000Z |
| msrc_cve-2012-6687 | FastCGI (aka fcgi and libfcgi) 2.4.0 allows remote attackers to cause a denial of service (segmentation fault and crash) via a large number of connections. | 2015-02-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2014-9636 | unzip 6.0 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via an extra field with an uncompressed size smaller than the compressed field size in a zip archive that advertises STORED method compression. | 2015-02-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2015-1473 | The GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service | 2015-04-02T00:00:00.000Z | 2025-04-12T00:00:00.000Z |
| msrc_cve-2015-3416 | The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement. | 2015-04-02T00:00:00.000Z | 2026-02-18T14:56:51.000Z |
| msrc_cve-2015-2704 | realmd allows remote attackers to inject arbitrary configurations in to sssd.conf and smb.conf | 2015-05-02T00:00:00.000Z | 2025-10-01T23:10:53.000Z |
| msrc_cve-2015-3627 | Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot which allows local users to gain privileges via a symlink attack in an image. | 2015-05-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2015-3630 | Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound (2) /proc/timer_stats (3) /proc/latency_stats and (4) /proc/fs which allows local users to modify the host obtain sensitive information and perform protocol downgrade attacks via a crafted image. | 2015-05-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2015-3631 | Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc. | 2015-05-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2015-3717 | Multiple buffer overflows in the printf functionality in SQLite as used in Apple iOS before 8.4 and OS X before 10.10.4 allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors. | 2015-07-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2015-2987 | Type74 ED before 4.0 misuses 128-bit ECB encryption for small files which makes it easier for attackers to obtain plaintext data via differential cryptanalysis of a file with an original length smaller than 128 bits. | 2015-08-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2015-5157 | arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution which might allow local users to gain privileges by triggering an NMI. | 2015-08-02T00:00:00.000Z | 2026-02-18T14:35:38.000Z |
| msrc_cve-2015-6749 | Buffer overflow in the aiff_open function in oggenc/audio.c in vorbis-tools 1.4.0 and earlier allows remote attackers to cause a denial of service (crash) via a crafted AIFF file. | 2015-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2015-7309 | The theme editor in Bolt allows remote authenticated users to execute arbitrary code by renaming a crafted file | 2015-09-02T00:00:00.000Z | 2025-10-01T23:10:53.000Z |
| msrc_cve-2015-7696 | Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly execute arbitrary code via a crafted password-protected ZIP archive possibly related to an Extra-Field size value. | 2015-11-02T00:00:00.000Z | 2026-02-20T22:50:36.000Z |
| msrc_cve-2015-7697 | Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (infinite loop) via empty bzip2 data in a ZIP archive. | 2015-11-02T00:00:00.000Z | 2026-02-20T22:51:02.000Z |
| msrc_cve-2015-7981 | The png_convert_to_rfc1123 function in png.c allows remote attackers to obtain sensitive process memory information | 2015-11-02T00:00:00.000Z | 2025-04-16T00:00:00.000Z |
| msrc_cve-2015-8100 | The net-snmp package in OpenBSD through 5.8 uses 0644 permissions for snmpd.conf which allows local users to obtain sensitive community information by reading this file. | 2015-11-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2015-8126 | Multiple buffer overflows in libpng allow remote attackers to cause a denial of service | 2015-11-02T00:00:00.000Z | 2026-02-18T14:57:19.000Z |
| msrc_cve-2015-3276 | The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors. | 2015-12-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2015-8370 | Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication obtain sensitive information or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c which trigger an "Off-by-two" or "Out of bounds overwrite" memory error. | 2015-12-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2015-8472 | Buffer overflow in libpng allows remote attackers to cause a denial of service | 2016-01-02T00:00:00.000Z | 2026-02-18T01:02:08.000Z |
| msrc_cve-2016-1494 | The verify function in the RSA package for Python (Python-RSA) before 3.3 allows attackers to spoof signatures with a small public exponent via crafted signature padding, aka a BERserk attack. | 2016-01-02T00:00:00.000Z | 2025-09-03T22:43:53.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ncsc-2024-0307 | Kwetsbaarheden verholpen in Oracle Systems | 2024-07-17T13:55:53.343378Z | 2024-07-17T13:55:53.343378Z |
| ncsc-2024-0308 | Kwetsbaarheden verholpen in Oracle Virtualization | 2024-07-17T13:55:57.768494Z | 2024-07-17T13:55:57.768494Z |
| ncsc-2024-0309 | Kwetsbaarheid gevonden in Ivanti Endpoint Manager | 2024-07-18T12:00:25.689314Z | 2024-07-18T12:00:25.689314Z |
| ncsc-2024-0310 | Kwetsbaarheid verholpen in SonicOS | 2024-07-18T12:25:06.813302Z | 2024-07-18T12:25:06.813302Z |
| ncsc-2024-0311 | Kwetsbaarheden verholpen in Cisco Secure Email Gateway | 2024-07-18T12:46:34.019785Z | 2024-07-18T12:46:34.019785Z |
| ncsc-2024-0312 | Kwetsbaarheden verholpen in Solarwinds Platform | 2024-07-18T13:23:55.561789Z | 2024-07-18T13:23:55.561789Z |
| ncsc-2024-0313 | Kwetsbaarheid verholpen in HPE 3PAR Service Processor | 2024-07-18T13:58:07.127103Z | 2024-07-18T13:58:07.127103Z |
| ncsc-2024-0314 | Kwetsbaarheden verholpen in Apache HTTP Server | 2024-07-19T07:34:12.997118Z | 2024-07-19T07:34:12.997118Z |
| ncsc-2024-0315 | Kwetsbaarheid verholpen in Cisco Smart Software Manager On-Prem | 2024-07-19T13:06:00.004663Z | 2024-07-19T13:06:00.004663Z |
| ncsc-2024-0316 | Kwetsbaarheid verholpen in Broadcom Symantec Privileged Access Management | 2024-07-22T09:17:29.853486Z | 2024-07-22T09:17:29.853486Z |
| ncsc-2024-0317 | Kwetsbaarheid gevonden in Ivanti Endpoint Manager | 2024-07-24T14:37:09.864241Z | 2024-07-24T14:37:09.864241Z |
| ncsc-2024-0318 | Kwetsbaarheden verholpen in Docker Moby | 2024-07-25T11:28:37.900721Z | 2024-07-25T11:28:37.900721Z |
| ncsc-2024-0319 | Kwetsbaarheden verholpen in Apple iOS en iPadOS | 2024-07-30T08:39:16.399394Z | 2024-07-30T08:39:16.399394Z |
| ncsc-2024-0320 | Kwetsbaarheden verholpen in Apple MacOS | 2024-07-30T08:42:07.365674Z | 2024-07-30T08:42:07.365674Z |
| ncsc-2024-0321 | Kwetsbaarheid verholpen in Progress MOVEit Transfer | 2024-07-30T08:45:50.286085Z | 2024-07-30T08:45:50.286085Z |
| ncsc-2024-0322 | Kwetsbaarheden verholpen in Google Android en Samsung Mobile | 2024-08-06T09:25:08.253832Z | 2024-08-06T09:25:08.253832Z |
| ncsc-2024-0323 | Kwetsbaarheden verholpen in Siemens Omnivise | 2024-08-06T09:29:53.292433Z | 2024-08-06T09:29:53.292433Z |
| ncsc-2024-0324 | Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird | 2024-08-07T08:58:12.457235Z | 2024-08-07T08:58:12.457235Z |
| ncsc-2024-0325 | Kwetsbaarheden verholpen in Aruba Networks ArubaOS en InstantOS | 2024-08-07T09:04:14.955844Z | 2024-08-07T09:04:14.955844Z |
| ncsc-2024-0326 | Kwetsbaarheden verholpen in RoundCube Webmail | 2024-08-08T07:45:42.674316Z | 2024-08-08T07:45:42.674316Z |
| ncsc-2024-0327 | Kwetsbaarheden verholpen in Cisco Small Business IP Phones | 2024-08-08T08:01:30.827296Z | 2024-08-08T08:01:30.827296Z |
| ncsc-2024-0328 | Kwetsbaarheden verholpen in IBM InfoSphere | 2024-08-12T08:22:38.701674Z | 2024-08-12T08:22:38.701674Z |
| ncsc-2024-0329 | Kwetsbaarheden verholpen in GitLab Enterprise Edition en Community Edition | 2024-08-12T08:24:49.808846Z | 2024-08-12T08:24:49.808846Z |
| ncsc-2024-0330 | Kwetsbaarheid verholpen in Asterisk | 2024-08-12T10:31:33.788930Z | 2024-08-12T10:31:33.788930Z |
| ncsc-2024-0331 | Kwetsbaarheden verholpen in Zabbix | 2024-08-12T10:34:15.273912Z | 2024-08-12T10:34:15.273912Z |
| ncsc-2024-0332 | Kwetsbaarheden verholpen in Siemens producten | 2024-08-13T09:21:28.381575Z | 2024-08-13T09:21:28.381575Z |
| ncsc-2024-0333 | Kwetsbaarheden verholpen in SAP producten | 2024-08-13T13:47:02.764070Z | 2024-08-13T13:47:02.764070Z |
| ncsc-2024-0334 | Kwetsbaarheden verholpen in Microsoft Windows | 2024-08-13T18:19:27.728322Z | 2024-08-27T07:59:08.391850Z |
| ncsc-2024-0335 | Kwetsbaarheden verholpen in Microsoft Azure componenten | 2024-08-13T18:20:23.647785Z | 2024-08-13T18:20:23.647785Z |
| ncsc-2024-0336 | Kwetsbaarheden verholpen in Microsoft Developer Tools | 2024-08-13T18:21:06.220640Z | 2024-08-13T18:21:06.220640Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2017:1823-1 | Security update for irssi | 2017-07-07T23:03:39Z | 2017-07-07T23:03:39Z |
| opensuse-su-2017:1824-1 | Security update for irssi | 2017-07-07T23:03:39Z | 2017-07-07T23:03:39Z |
| opensuse-su-2017:1993-1 | Security update for chromium | 2017-07-28T12:59:09Z | 2017-07-28T12:59:09Z |
| opensuse-su-2017:1994-1 | Security update for chromium | 2017-07-28T12:59:09Z | 2017-07-28T12:59:09Z |
| opensuse-su-2017:2209-1 | Security update for MozillaThunderbird | 2017-08-18T09:46:47Z | 2017-08-18T09:46:47Z |
| opensuse-su-2017:2482-1 | Security update for chromium | 2017-09-15T05:01:20Z | 2017-09-15T05:01:20Z |
| opensuse-su-2017:2491-1 | Security update for chromium | 2017-09-15T05:01:20Z | 2017-09-15T05:01:20Z |
| opensuse-su-2017:2537-1 | Security update for freexl | 2017-09-21T06:52:21Z | 2017-09-21T06:52:21Z |
| opensuse-su-2017:2539-1 | Security update for freexl | 2017-09-21T06:52:21Z | 2017-09-21T06:52:21Z |
| opensuse-su-2017:2557-1 | Security update for Chromium | 2017-09-23T06:52:44Z | 2017-09-23T06:52:44Z |
| opensuse-su-2017:2558-1 | Security update for Chromium | 2017-09-23T06:52:44Z | 2017-09-23T06:52:44Z |
| opensuse-su-2017:2567-1 | Security update for openjpeg2 | 2017-09-25T21:34:20Z | 2017-09-25T21:34:20Z |
| opensuse-su-2017:2568-1 | Recommended update for openjpeg | 2017-09-25T21:35:07Z | 2017-09-25T21:35:07Z |
| opensuse-su-2017:2594-1 | Security update for fmpeg | 2017-09-28T21:13:29Z | 2017-09-28T21:13:29Z |
| opensuse-su-2017:2685-1 | Security update for openjpeg2 | 2017-10-10T07:16:40Z | 2017-10-10T07:16:40Z |
| opensuse-su-2017:2686-1 | Security update for openjpeg2 | 2017-10-10T07:16:40Z | 2017-10-10T07:16:40Z |
| opensuse-su-2017:2707-1 | Security update for MozillaThunderbird | 2017-10-11T17:57:43Z | 2017-10-11T17:57:43Z |
| opensuse-su-2017:2710-1 | Security update for MozillaThunderbird | 2017-10-11T17:57:43Z | 2017-10-11T17:57:43Z |
| opensuse-su-2017:2731-1 | Security update for mbedtls | 2017-10-16T18:55:23Z | 2017-10-16T18:55:23Z |
| opensuse-su-2017:2736-1 | Security update for mbedtls | 2017-10-16T18:55:23Z | 2017-10-16T18:55:23Z |
| opensuse-su-2017:2832-1 | Security update for irssi | 2017-10-23T07:58:14Z | 2017-10-23T07:58:14Z |
| opensuse-su-2017:2835-1 | Security update for irssi | 2017-10-23T07:58:14Z | 2017-10-23T07:58:14Z |
| opensuse-su-2017:2833-1 | Security update for jq | 2017-10-23T07:58:55Z | 2017-10-23T07:58:55Z |
| opensuse-su-2017:2834-1 | Security update for jq | 2017-10-23T07:58:55Z | 2017-10-23T07:58:55Z |
| opensuse-su-2017:2893-1 | Security update for SDL2 | 2017-10-27T19:17:03Z | 2017-10-27T19:17:03Z |
| opensuse-su-2017:2895-1 | Security update for SDL2 | 2017-10-27T19:17:03Z | 2017-10-27T19:17:03Z |
| opensuse-su-2017:2984-1 | Security update for redis | 2017-11-10T13:02:13Z | 2017-11-10T13:02:13Z |
| opensuse-su-2017:2994-1 | Security update for redis | 2017-11-10T13:02:13Z | 2017-11-10T13:02:13Z |
| opensuse-su-2017:2976-1 | Security update for ansible | 2017-11-10T13:03:17Z | 2017-11-10T13:03:17Z |
| opensuse-su-2017:2978-1 | Security update for ansible | 2017-11-10T13:03:17Z | 2017-11-10T13:03:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2002:211 | Red Hat Security Advisory: ggv security update | 2002-10-10T20:23:00+00:00 | 2025-11-21T17:25:07+00:00 |
| rhsa-2002:195 | Red Hat Security Advisory: tetex security update | 2002-10-14T13:36:00+00:00 | 2025-11-21T17:25:06+00:00 |
| rhsa-2002:196 | Red Hat Security Advisory: : Updated xinetd packages fix denial of service vulnerability | 2002-10-15T17:07:00+00:00 | 2025-11-21T17:25:06+00:00 |
| rhsa-2002:192 | Red Hat Security Advisory: : Updated Mozilla packages fix security vulnerabilities | 2002-10-18T09:15:00+00:00 | 2025-11-21T17:25:05+00:00 |
| rhsa-2002:223 | Red Hat Security Advisory: : Updated ypserv packages fixes memory leak | 2002-10-24T12:13:00+00:00 | 2025-11-21T17:25:09+00:00 |
| rhsa-2002:224 | Red Hat Security Advisory: ypserv security update | 2002-10-25T12:24:00+00:00 | 2025-11-21T17:25:10+00:00 |
| rhsa-2002:227 | Red Hat Security Advisory: kernel security update | 2002-10-28T22:32:00+00:00 | 2025-11-21T17:25:10+00:00 |
| rhsa-2002:218 | Red Hat Security Advisory: tomcat security update for Stronghold | 2002-11-05T00:00:00+00:00 | 2025-11-21T17:25:08+00:00 |
| rhsa-2002:242 | Red Hat Security Advisory: : Updated kerberos packages available | 2002-11-07T16:26:00+00:00 | 2025-11-21T17:25:10+00:00 |
| rhsa-2002:250 | Red Hat Security Advisory: krb5 security update | 2002-11-07T17:35:00+00:00 | 2025-11-21T17:25:12+00:00 |
| rhsa-2002:248 | Red Hat Security Advisory: apache, mod_ssl, php security update for Stronghold | 2002-11-07T17:42:00+00:00 | 2025-11-21T17:25:12+00:00 |
| rhsa-2002:243 | Red Hat Security Advisory: apache, mod_ssl, php security update for Stronghold | 2002-11-08T11:15:00+00:00 | 2025-11-21T17:25:11+00:00 |
| rhsa-2002:244 | Red Hat Security Advisory: apache, mod_ssl, php security update for Stronghold | 2002-11-08T11:15:00+00:00 | 2025-11-21T17:25:12+00:00 |
| rhsa-2002:217 | Red Hat Security Advisory: tomcat security update for Stronghold | 2002-11-08T11:16:00+00:00 | 2025-11-21T17:25:08+00:00 |
| rhsa-2002:263 | Red Hat Security Advisory: kernel security update | 2002-11-22T16:39:00+00:00 | 2025-11-21T17:25:15+00:00 |
| rhsa-2002:254 | Red Hat Security Advisory: : Updated Webalizer packages fix vulnerability | 2002-12-04T08:33:00+00:00 | 2025-11-21T17:25:13+00:00 |
| rhsa-2002:255 | Red Hat Security Advisory: webalizer security update | 2002-12-04T15:21:00+00:00 | 2025-11-21T17:25:13+00:00 |
| rhsa-2002:261 | Red Hat Security Advisory: Canna security update | 2002-12-10T15:15:00+00:00 | 2025-11-21T17:25:14+00:00 |
| rhsa-2002:256 | Red Hat Security Advisory: wget security update | 2002-12-10T15:16:00+00:00 | 2025-11-21T17:25:13+00:00 |
| rhsa-2002:229 | Red Hat Security Advisory: : : : Updated wget packages fix directory traversal bug | 2002-12-10T15:23:00+00:00 | 2025-11-21T17:25:10+00:00 |
| rhsa-2002:293 | Red Hat Security Advisory: : Updated Fetchmail packages fix security vulnerability | 2002-12-17T09:20:00+00:00 | 2025-11-21T17:25:17+00:00 |
| rhsa-2002:294 | Red Hat Security Advisory: fetchmail security update | 2002-12-17T19:04:00+00:00 | 2025-11-21T17:25:18+00:00 |
| rhsa-2002:271 | Red Hat Security Advisory: pine security update | 2003-01-03T19:15:00+00:00 | 2025-11-21T17:25:18+00:00 |
| rhsa-2002:270 | Red Hat Security Advisory: : : : Updated pine packages available | 2003-01-03T19:33:00+00:00 | 2025-11-21T17:25:15+00:00 |
| rhsa-2002:289 | Red Hat Security Advisory: mysql security update | 2003-01-06T15:27:00+00:00 | 2025-11-21T17:25:16+00:00 |
| rhsa-2002:290 | Red Hat Security Advisory: : Updated Ethereal packages are available | 2003-01-09T16:15:00+00:00 | 2025-11-21T17:25:16+00:00 |
| rhsa-2002:251 | Red Hat Security Advisory: apache security update | 2003-01-09T20:10:00+00:00 | 2025-11-21T17:25:13+00:00 |
| rhsa-2003:006 | Red Hat Security Advisory: : : : Updated libpng packages fix buffer overflow | 2003-01-13T15:28:00+00:00 | 2025-11-21T17:25:21+00:00 |
| rhsa-2002:295 | Red Hat Security Advisory: : Updated CUPS packages fix various vulnerabilities | 2003-01-13T15:34:00+00:00 | 2025-11-21T17:25:18+00:00 |
| rhsa-2003:009 | Red Hat Security Advisory: WindowMaker security update | 2003-01-14T13:43:00+00:00 | 2025-11-21T17:25:22+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sevd-2021-313-05 | BadAlloc Vulnerabilities | 2021-11-09T05:00:00.000Z | 2025-09-09T04:00:00.000Z |
| sevd-2021-313-03 | APC by Schneider Electric Network Management Cards (NMC) and NMC Embedded Devices | 2021-11-09T06:30:00.000Z | 2022-05-10T00:00:00.00Z |
| sevd-2021-313-04 | Windows Print Spooler embedded in EcoStruxure™ Process Expert | 2021-11-09T08:45:48.000Z | 2022-03-08T08:45:48.000Z |
| sesb-2021-347-01 | Apache Log4j Vulnerabilities (Log4Shell) | 2021-12-13T09:22:58.000Z | 2022-08-09T09:22:58.000Z |
| sevd-2021-348-01 | IGSS (Interactive Graphical SCADA System) | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-348-02 | EVlink City / Parking / Smart Wallbox Charging Stations | 2021-12-14T00:00:00.000Z | 2021-12-14T00:00:00.000Z |
| sevd-2021-348-04 | APC by Schneider Electric Rack PDU | 2021-12-14T00:00:00.000Z | 2021-12-21T00:00:00.000Z |
| sevd-2022-011-06 | CODESYS V3 Runtime, Development System, and Gateway Vulnerabilities | 2022-01-11T07:08:13.000Z | 2023-04-11T11:30:00.000Z |
| sevd-2022-011-01 | Ethernet and Web server on Modicon M340 controller and Communication Modules | 2022-01-11T07:53:07.000Z | 2022-01-11T07:53:07.000Z |
| sevd-2022-011-02 | Easergy T300 | 2022-01-11T10:48:02.000Z | 2022-01-11T10:48:02.000Z |
| sevd-2022-011-03 | Easergy P5 | 2022-01-11T11:05:25.000Z | 2022-03-02T11:05:25.000Z |
| sevd-2022-011-04 | Easergy P3 | 2022-01-11T11:28:56.000Z | 2022-01-11T11:28:56.000Z |
| sevd-2022-011-05 | ConneXium Tofino Firewall and Loadable Security Modules | 2022-01-11T12:53:54.000Z | 2022-01-11T12:53:54.000Z |
| sevd-2022-011-07 | EcoStruxure™ Power Monitoring Expert | 2022-01-11T13:20:28.000Z | 2022-01-11T13:20:28.000Z |
| sevd-2022-039-01 | IGSS (Interactive Graphical SCADA System) | 2022-02-08T07:29:58.000Z | 2022-02-08T07:29:58.000Z |
| sevd-2022-039-02 | EcoStruxure EV Charging Expert | 2022-02-08T12:36:59.000Z | 2022-02-08T12:36:59.000Z |
| sevd-2022-039-05 | EcoStruxure Geo SCADA Expert | 2022-02-08T17:33:44.000Z | 2022-02-08T17:33:44.000Z |
| sevd-2022-039-03 | Easergy P40 | 2022-02-08T17:58:55.000Z | 2022-02-08T17:58:55.000Z |
| sevd-2022-039-04 | spaceLYnk, Wiser For KNX, fellerLYnk | 2022-02-08T20:32:52.000Z | 2022-03-08T20:32:52.000Z |
| sevd-2022-039-06 | Harmony/Magelis iPC Series HMI, Vijeo Designer and Vijeo Designer Basic | 2022-02-08T23:25:23.000Z | 2022-02-08T23:25:23.000Z |
| sevd-2022-067-02 | APC Smart-UPS SMT, SMC, SMX, SCL, SRC, XU, XP, CSH2, SURTD, SMTL, SRT, and select SRTL Series | 2022-03-08T06:30:00.000Z | 2022-06-16T18:30:00.000Z |
| sevd-2022-067-03 | Ritto Wiser™ Door | 2022-03-08T10:12:35.000Z | 2022-03-08T10:12:35.000Z |
| sevd-2022-067-01 | EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, SCADAPack RemoteConnect™ for x70 | 2022-03-08T18:30:00.000Z | 2022-06-14T18:30:00.000Z |
| sevd-2022-087-01 | SCADAPack Workbench | 2022-03-28T13:51:11.000Z | 2023-04-11T13:51:11.000Z |
| sevd-2022-102-02 | Modicon M340 Controller and Communication Modules | 2022-04-12T00:00:00.000Z | 2024-10-08T00:00:00.000Z |
| sevd-2022-102-01 | IGSS (Interactive Graphical SCADA System) | 2022-04-12T08:47:25.000Z | 2022-07-12T08:47:25.000Z |
| sevd-2022-130-01 | PowerLogic ION Setup | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-02 | Saitel DP RTU | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-130-03 | Wiser Smart | 2022-05-10T00:00:00.00Z | 2022-05-10T00:00:00.00Z |
| sevd-2022-165-01 | IGSS (Interactive Graphical SCADA System) | 2022-06-14T18:30:00.000Z | 2023-03-13T18:30:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ssa-211752 | SSA-211752: Multiple NTP-Client Related Vulnerabilities in SIMATIC CP 443-1 OPC UA | 2021-06-08T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-419820 | SSA-419820: Denial-of-Service Vulnerability in TIM 1531 IRC | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-522654 | SSA-522654: Privilege Escalation Vulnerability in Mendix SAML Module | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-645530 | SSA-645530: TIFF File Parsing Vulnerability in JT2Go and Teamcenter Visualization before V13.1.0.3 | 2021-06-08T00:00:00Z | 2021-06-08T00:00:00Z |
| ssa-787292 | SSA-787292: Denial of Service Vulnerability in SIMATIC RFID Readers | 2021-06-08T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-173615 | SSA-173615: Multiple PAR and ASM File Parsing Vulnerabilities in Solid Edge | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-209268 | SSA-209268: Multiple JT File Parsing Vulnerabilities in JT Utilities before V13.0.2.0 | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-352521 | SSA-352521: Access Check Bypass Vulnerability in Mendix | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-373591 | SSA-373591: Buffer Overflow Vulnerability in RUGGEDCOM ROS Devices | 2021-07-13T00:00:00Z | 2025-10-14T00:00:00Z |
| ssa-434535 | SSA-434535: Memory Protection Bypass Vulnerability in SINAMICS PERFECT HARMONY GH180 Drives | 2021-07-13T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-434536 | SSA-434536: Memory Protection Bypass Vulnerability in SINUMERIK ONE and SINUMERIK MC | 2021-07-13T00:00:00Z | 2021-09-14T00:00:00Z |
| ssa-448291 | SSA-448291: Denial-of-Service Vulnerability in ARP Protocol of RWG Universal Controllers | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-483182 | SSA-483182: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2 | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-560465 | SSA-560465: DHCP Client Vulnerability in VxWorks-based Industrial Products | 2021-07-13T00:00:00Z | 2022-05-10T00:00:00Z |
| ssa-599968 | SSA-599968: Denial of Service Vulnerability in Profinet Devices | 2021-07-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-622535 | SSA-622535: Multiple Vulnerabilities in Teamcenter Active Workspace | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-641963 | SSA-641963: Remote Code Execution Vulnerability in Multiple SIMATIC Software Products | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-661034 | SSA-661034: Incorrect Permission Assignment in Multiple SIMATIC Software Products | 2021-07-13T00:00:00Z | 2022-08-09T00:00:00Z |
| ssa-675303 | SSA-675303: WIBU Systems CodeMeter Runtime Vulnerabilities in Siemens Products | 2021-07-13T00:00:00Z | 2022-02-08T00:00:00Z |
| ssa-729965 | SSA-729965: TLS Certificate Validation Vulnerability in SINUMERIK Integrate Operate Client | 2021-07-13T00:00:00Z | 2021-07-13T00:00:00Z |
| ssa-772220 | SSA-772220: OpenSSL Vulnerabilities in Industrial Products | 2021-07-13T00:00:00Z | 2024-01-09T00:00:00Z |
| ssa-913875 | SSA-913875: Frame Aggregation and Fragmentation Vulnerabilities in 802.11 | 2021-07-13T00:00:00.000Z | 2026-04-14T00:00:00.000Z |
| ssa-941426 | SSA-941426: Multiple LLDP Vulnerabilities in Industrial Products | 2021-07-13T00:00:00Z | 2023-03-14T00:00:00Z |
| ssa-789208 | SSA-789208: Multiple Vulnerabilities (INFRA:HALT) in Interniche IP-Stack based Low Voltage Devices | 2021-08-04T00:00:00Z | 2022-01-11T00:00:00Z |
| ssa-158827 | SSA-158827: Denial-of-Service Vulnerability in Automation License Manager | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-309571 | SSA-309571: IPU 2021.1 Vulnerabilities in Siemens Industrial Products using Intel CPUs (June 2021) | 2021-08-10T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-365397 | SSA-365397: Multiple File Parsing Vulnerabilities in JT2Go and Teamcenter Visualization before V13.2.0.1 | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-553445 | SSA-553445: DNS "Name:Wreck" Vulnerabilities in Multiple Siemens Energy AGT and SGT solutions | 2021-08-10T00:00:00Z | 2021-08-10T00:00:00Z |
| ssa-679335 | SSA-679335: Multiple Vulnerabilities in Embedded FTP Server of SIMATIC CP Modules | 2021-08-10T00:00:00Z | 2022-06-14T00:00:00Z |
| ssa-756744 | SSA-756744: OS Command Injection Vulnerability in SINEC NMS | 2021-08-10T00:00:00Z | 2021-09-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2015:1018-1 | Security update for php53 | 2014-10-28T10:05:33Z | 2014-10-28T10:05:33Z |
| suse-su-2015:1265-1 | Security update for php53 | 2014-10-28T10:05:33Z | 2014-10-28T10:05:33Z |
| suse-su-2015:0239-1 | Security update for flash-player | 2014-11-14T12:52:02Z | 2014-11-14T12:52:02Z |
| suse-su-2015:0493-1 | Security update for flash-player | 2014-11-14T12:52:02Z | 2014-11-14T12:52:02Z |
| suse-su-2015:0723-1 | Security update for flash-player | 2014-11-14T12:52:02Z | 2014-11-14T12:52:02Z |
| suse-su-2015:0880-1 | Security update for flash-player | 2014-11-14T12:52:02Z | 2014-11-14T12:52:02Z |
| suse-su-2015:1064-1 | Security update for flash-player | 2014-11-14T12:52:02Z | 2014-11-14T12:52:02Z |
| suse-su-2015:1137-1 | Security update for flash-player | 2014-11-14T12:52:02Z | 2014-11-14T12:52:02Z |
| suse-su-2015:0426-1 | Security update for wireshark | 2014-11-14T12:53:20Z | 2014-11-14T12:53:20Z |
| suse-su-2015:0653-1 | Security update for wireshark | 2014-11-14T12:53:20Z | 2014-11-14T12:53:20Z |
| suse-su-2015:1098-1 | Security update for wireshark | 2014-11-14T12:53:20Z | 2014-11-14T12:53:20Z |
| suse-su-2015:0259-1 | Recommended update for ntp | 2014-11-18T12:31:05Z | 2014-11-18T12:31:05Z |
| suse-su-2015:1173-1 | Recommended update for ntp | 2014-11-18T12:31:05Z | 2014-11-18T12:31:05Z |
| suse-su-2015:0343-2 | Security update for IBM Java | 2014-11-19T10:21:52Z | 2014-11-19T10:21:52Z |
| suse-su-2015:1086-2 | Security update for IBM Java | 2014-11-19T10:21:52Z | 2014-11-19T10:21:52Z |
| suse-su-2015:0343-1 | Security update for IBM Java | 2014-11-21T16:40:20Z | 2014-11-21T16:40:20Z |
| suse-su-2015:1086-4 | Security update for IBM Java | 2014-11-21T16:40:20Z | 2014-11-21T16:40:20Z |
| suse-su-2015:0232-1 | Security update for powerpc-utils | 2015-01-07T17:50:01Z | 2015-01-07T17:50:01Z |
| suse-su-2015:0241-1 | Security update for libvirt | 2015-01-08T09:48:42Z | 2015-01-08T09:48:42Z |
| suse-su-2015:0324-1 | Security update for openstack-nova | 2015-01-19T16:34:28Z | 2015-01-19T16:34:28Z |
| suse-su-2015:0290-1 | Security update for krb5 | 2015-01-21T10:07:55Z | 2015-01-21T10:07:55Z |
| suse-su-2015:0290-2 | Security update for krb5 | 2015-01-21T10:07:55Z | 2015-01-21T10:07:55Z |
| suse-su-2015:0307-1 | Security update for wireshark | 2015-01-22T08:55:12Z | 2015-01-22T08:55:12Z |
| suse-su-2015:0357-1 | Security update for kvm and libvirt | 2015-01-23T01:22:37Z | 2015-01-23T01:22:37Z |
| suse-su-2015:0271-1 | Security update for xdg-utils | 2015-01-24T11:13:05Z | 2015-01-24T11:13:05Z |
| suse-su-2015:0320-1 | Security update for hivex | 2015-01-26T09:47:11Z | 2015-01-26T09:47:11Z |
| suse-su-2015:0281-1 | Security update for strongswan | 2015-01-28T11:41:44Z | 2015-01-28T11:41:44Z |
| suse-su-2015:0367-1 | Security update for vorbis-tools | 2015-01-29T09:42:46Z | 2015-01-29T09:42:46Z |
| suse-su-2015:0292-1 | Security update for elfutils | 2015-01-30T13:46:33Z | 2015-01-30T13:46:33Z |
| suse-su-2015:0355-1 | Security update for unzip | 2015-01-30T13:46:36Z | 2015-01-30T13:46:36Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2020:4659 | Moderate: gd security update | 2020-11-03T12:24:40Z | 2021-11-12T10:20:55Z |
| alsa-2020:4670 | Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update | 2020-11-03T12:25:36Z | 2022-04-29T15:25:47Z |
| alsa-2020:4676 | Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update | 2020-11-03T12:26:07Z | 2021-12-23T15:15:25Z |
| alsa-2020:4682 | Moderate: grafana security, bug fix, and enhancement update | 2020-11-03T12:26:41Z | 2021-11-12T10:20:56Z |
| alsa-2020:4689 | Moderate: openwsman security update | 2020-11-03T12:27:08Z | 2021-11-12T10:20:56Z |
| alsa-2020:4690 | Moderate: qt5-qtbase and qt5-qtwebsockets security and bug fix update | 2020-11-03T12:27:18Z | 2021-08-11T08:54:00Z |
| alsa-2020:4694 | Moderate: container-tools:rhel8 security, bug fix, and enhancement update | 2020-11-03T12:27:37Z | 2020-11-03T19:50:37Z |
| alsa-2020:4709 | Moderate: librsvg2 security update | 2020-11-03T12:29:09Z | 2021-11-12T10:20:56Z |
| alsa-2020:4712 | Moderate: subversion:1.10 security update | 2020-11-03T12:29:29Z | 2020-11-03T19:51:49Z |
| alsa-2020:4743 | Moderate: squid:4 security, bug fix, and enhancement update | 2020-11-03T12:32:17Z | 2020-11-03T19:54:15Z |
| alsa-2020:4751 | Moderate: httpd:2.4 security, bug fix, and enhancement update | 2020-11-03T12:33:02Z | 2022-01-26T07:27:23Z |
| alsa-2020:4763 | Moderate: dovecot security update | 2020-11-03T12:33:59Z | 2021-08-11T08:54:00Z |
| alsa-2020:4807 | Moderate: prometheus-jmx-exporter security update | 2020-11-03T12:37:53Z | 2021-11-12T10:20:56Z |
| alsa-2020:4827 | Moderate: oniguruma security update | 2020-11-03T12:39:14Z | 2021-11-12T10:20:56Z |
| alsa-2020:4844 | Moderate: fontforge security update | 2020-11-03T12:40:50Z | 2021-08-11T08:54:00Z |
| alsa-2020:4846 | Moderate: mingw-expat security update | 2020-11-03T12:41:03Z | 2021-08-11T08:54:00Z |
| alsa-2020:4952 | Important: freetype security update | 2020-11-05T08:26:43Z | 2020-11-05T08:26:43Z |
| alsa-2020:5393 | Important: libexif security update | 2020-12-14T11:19:49Z | 2021-11-12T10:20:56Z |
| alsa-2020:5487 | Moderate: pacemaker security update | 2020-12-15T16:01:26Z | 2021-08-11T11:18:28Z |
| alsa-2020:5499 | Moderate: nodejs:12 security and bug fix update | 2020-12-15T16:03:21Z | 2020-12-15T16:03:05Z |
| alsa-2020:5500 | Important: mariadb:10.3 security, bug fix, and enhancement update | 2020-12-15T16:03:43Z | 2022-04-28T12:47:02Z |
| alsa-2020:5503 | Moderate: mariadb-connector-c security, bug fix, and enhancement update | 2020-12-15T16:04:12Z | 2021-11-12T10:20:56Z |
| alsa-2020:5620 | Important: postgresql:12 security update | 2020-12-17T15:30:10Z | 2020-12-17T15:30:10Z |
| alsa-2021:0507 | Important: subversion:1.10 security update | 2021-02-15T07:04:31Z | 2021-02-15T07:04:31Z |
| alsa-2021:0531 | Moderate: container-tools:rhel8 security, bug fix, and enhancement update | 2021-02-16T07:31:27Z | 2021-02-16T13:02:13Z |
| alsa-2021:0548 | Moderate: nodejs:10 security update | 2021-02-16T07:34:15Z | 2021-02-16T13:03:03Z |
| alsa-2021:0549 | Moderate: nodejs:12 security update | 2021-02-16T07:34:29Z | 2021-02-16T13:03:05Z |
| alsa-2021:0551 | Moderate: nodejs:14 security and bug fix update | 2021-02-16T07:34:42Z | 2021-02-16T13:03:09Z |
| alsa-2021:0558 | Important: kernel security, bug fix, and enhancement update | 2021-02-16T07:36:08Z | 2023-09-15T13:41:48Z |
| alsa-2021:0611 | Important: xterm security update | 2021-02-18T14:32:15Z | 2021-11-12T10:20:56Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-138 | Heap-buffer-overflow in org::apache::arrow::flatbuf::Message::Verify | 2020-06-24T01:51:15.842848Z | 2022-04-13T03:04:31.834108Z |
| osv-2020-141 | Heap-use-after-free in pixcmapDestroy | 2020-06-24T01:51:15.964708Z | 2022-04-13T03:04:32.654972Z |
| osv-2020-142 | Heap-use-after-free in ndpi_strncasestr | 2020-06-24T01:51:16.020859Z | 2022-04-13T03:04:36.178485Z |
| osv-2020-143 | Heap-buffer-overflow in QSpecialInteger<QBigEndianStorageType<unsigned int> >::operator unsigned int | 2020-06-24T01:51:16.055970Z | 2023-02-24T02:09:45.849924Z |
| osv-2020-144 | Heap-use-after-free in int arrow::BitUtil::BitReader::GetBatch<short> | 2020-06-24T01:51:16.108113Z | 2022-04-13T03:04:31.872314Z |
| osv-2020-146 | Heap-buffer-overflow in Json::OurReader::parse | 2020-06-24T01:51:16.175015Z | 2022-04-13T03:04:36.739790Z |
| osv-2020-147 | Heap-buffer-overflow in BEInt<short, 2>::operator short | 2020-06-24T01:51:16.229267Z | 2022-04-13T03:04:32.995941Z |
| osv-2020-148 | Use-of-uninitialized-value in AES_encrypt | 2020-06-24T01:51:16.262503Z | 2022-04-13T03:04:35.093996Z |
| osv-2020-149 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator= | 2020-06-24T01:51:16.320307Z | 2022-04-13T03:04:32.979769Z |
| osv-2020-150 | Segv on unknown address in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<ch | 2020-06-24T01:51:16.354141Z | 2022-04-13T03:04:37.943567Z |
| osv-2020-153 | UNKNOWN WRITE in Variant_encodeJson | 2020-06-24T01:51:16.477749Z | 2022-04-13T03:31:44.364576Z |
| osv-2020-154 | Heap-buffer-overflow in search_valid_dns | 2020-06-24T01:51:16.532133Z | 2022-04-13T03:04:36.204911Z |
| osv-2020-156 | Heap-buffer-overflow in flb_unescape_string_utf8 | 2020-06-24T01:51:16.609624Z | 2022-04-13T03:04:38.397174Z |
| osv-2020-160 | Heap-buffer-overflow in populate_relocs_record | 2020-06-24T01:51:16.763715Z | 2022-04-13T03:04:36.589376Z |
| osv-2020-161 | Heap-use-after-free in jbig2_release_huffman_table | 2020-06-24T01:51:16.820995Z | 2022-04-13T03:04:40.575919Z |
| osv-2020-164 | Stack-buffer-overflow in ot::NetworkData::NetworkData::FindService | 2020-06-24T01:51:16.938442Z | 2022-04-13T03:04:38.836598Z |
| osv-2020-165 | UNKNOWN READ in apache::thrift::protocol::TCompactProtocolT<apache::thrift::transport::TMemoryBu | 2020-06-24T01:51:16.975519Z | 2022-04-13T03:04:32.066459Z |
| osv-2020-166 | Heap-buffer-overflow in ndpi_parse_packet_line_info | 2020-06-24T01:51:17.034632Z | 2022-04-13T03:04:35.907890Z |
| osv-2020-170 | Heap-buffer-overflow in populate_relocs_record | 2020-06-24T01:51:17.217363Z | 2022-04-13T03:04:36.522943Z |
| osv-2020-171 | Heap-buffer-overflow in ndpi_parse_packet_line_info | 2020-06-24T01:51:17.251380Z | 2022-04-13T03:04:36.008919Z |
| osv-2020-173 | Use-of-uninitialized-value in BaseCryptStream::BaseCryptStream | 2020-06-24T01:51:17.351460Z | 2022-04-13T03:04:37.242270Z |
| osv-2020-174 | Heap-buffer-overflow in int arrow::BitUtil::BitReader::GetBatch<short> | 2020-06-24T01:51:17.409834Z | 2022-04-13T03:04:31.932877Z |
| osv-2020-176 | UNKNOWN READ in OT::SBIXGlyph::copy | 2020-06-24T01:51:17.508470Z | 2022-04-13T03:04:33.055752Z |
| osv-2020-177 | UNKNOWN in get_ndpi_flow_info6 | 2020-06-24T01:51:17.542041Z | 2022-04-13T03:04:36.058542Z |
| osv-2020-178 | Heap-buffer-overflow in concat_hash_string | 2020-06-24T01:51:17.576965Z | 2022-04-13T03:04:36.265194Z |
| osv-2020-179 | Heap-buffer-overflow in get16 | 2020-06-24T01:51:17.643208Z | 2022-04-13T03:04:36.237311Z |
| osv-2020-180 | Heap-buffer-overflow in parquet::PlainByteArrayDecoder::DecodeArrowDense | 2020-06-24T01:51:17.681643Z | 2022-04-13T03:04:31.927524Z |
| osv-2020-181 | Heap-buffer-overflow in get_ndpi_flow_info | 2020-06-24T01:51:17.721072Z | 2022-04-13T03:04:36.286917Z |
| osv-2020-182 | Heap-buffer-overflow in hb_array_t<OT::IntType<unsigned char, 1u> const> hb_array_t<OT::IntType<unsigned | 2020-06-24T01:51:17.758402Z | 2022-04-13T03:04:33.017765Z |
| osv-2020-183 | Global-buffer-overflow in hb_array_t<OT::IntType<unsigned char, 1u> const> hb_array_t<OT::IntType<unsigned | 2020-06-24T01:51:17.808376Z | 2022-04-13T03:04:33.236636Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2020-0144 | lzw is unmaintained | 2020-02-10T12:00:00Z | 2021-02-10T18:27:15Z |
| rustsec-2020-0158 | slice-deque is unmaintained | 2020-02-10T12:00:00Z | 2021-11-18T14:04:01Z |
| rustsec-2020-0023 | Lifetime boundary for `raw_slice` and `raw_slice_mut` are incorrect | 2020-02-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0147 | rulinalg is unmaintained, use nalgebra instead | 2020-02-11T12:00:00Z | 2021-03-04T13:58:02Z |
| rustsec-2020-0010 | tiberius is unmaintained | 2020-02-28T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0005 | CBox API allows to de-reference raw pointers without `unsafe` code | 2020-03-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0008 | Flaw in hyper allows request smuggling by sending a body in GET requests | 2020-03-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0006 | Flaw in `realloc` allows reading unknown memory | 2020-03-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0007 | use-after or double free of allocated memory | 2020-03-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0146 | arr! macro erases lifetimes | 2020-04-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0009 | `read_scalar` and `read_scalar_at` allow transmuting values without `unsafe` blocks | 2020-04-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0020 | `stb_truetype` crate has been deprecated; use `ttf-parser` instead | 2020-04-18T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0011 | Library exclusively intended to obfuscate code. | 2020-04-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0014 | Various memory safety issues | 2020-04-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0012 | Relies on undefined behavior of `char::from_u32_unchecked` | 2020-04-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0013 | fake-static allows converting any reference into a `'static` reference | 2020-04-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0015 | Crash causing Denial of Service attack | 2020-04-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0016 | `net2` crate has been deprecated; use `socket2` instead | 2020-05-01T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0036 | failure is officially deprecated/unmaintained | 2020-05-02T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2020-0061 | futures_task::noop_waker_ref can segfault due to dereferencing a NULL pointer | 2020-05-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0056 | stdweb is unmaintained | 2020-05-04T12:00:00Z | 2020-10-25T18:57:46Z |
| rustsec-2020-0025 | bigint is unmaintained, use uint instead | 2020-05-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0161 | `array!` macro is unsound in presence of traits that implement methods it calls internally | 2020-05-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0021 | rio allows a use-after-free buffer access when a future is leaked | 2020-05-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0019 | tokio-rustls reads may cause excessive memory usage | 2020-05-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0018 | crate has been renamed to `block-cipher` | 2020-05-26T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0028 | `LocalRequest::clone` creates multiple mutable references to the same object | 2020-05-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0017 | Use after free in ArcIntern::drop | 2020-05-28T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0100 | Double free when calling `sys_info::disk_info` from multiple threads | 2020-05-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0027 | traitobject assumes the layout of fat pointers | 2020-06-01T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-drupal-2022-39261 | Twig may load a template outside a configured directory when using the filesystem loader | 2024-03-06T10:51:53.277Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2023-47121 | Discourse SSRF vulnerability in Embedding | 2024-03-06T10:51:53.707Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-23324 | Envoy ext auth can be bypassed when Proxy protocol filter sets invalid UTF-8 metadata | 2024-03-06T10:51:54.396Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2024-0056 | Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability | 2024-03-06T10:51:56.566Z | 2025-07-09T15:43:42.864Z |
| bit-flink-2020-17519 | Apache Flink directory traversal attack: reading remote files through the REST API | 2024-03-06T10:51:56.799Z | 2025-10-22T09:08:25.162Z |
| bit-elasticsearch-2023-31418 | Elasticsearch uncontrolled resource consumption | 2024-03-06T10:51:58.187Z | 2025-05-20T10:02:07.006Z |
| bit-etcd-2022-34038 | 2024-03-06T10:51:58.470Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2023-46288 | Apache Airflow: Sensitive parameters exposed in API when "non-sensitive-only" configuration is set | 2024-03-06T10:52:00.977Z | 2025-05-20T10:02:07.006Z |
| bit-ghost-2024-23725 | 2024-03-06T10:52:01.089Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2022-3920 | Consul Peering Imported Nodes/Services Leak | 2024-03-06T10:52:02.181Z | 2025-05-20T10:02:07.006Z |
| bit-gdal-2021-45943 | 2024-03-06T10:52:03.078Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2023-24580 | 2024-03-06T10:52:03.082Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-31043 | Fix failure to strip Authorization header on HTTP downgrade in Guzzle | 2024-03-06T10:52:03.100Z | 2025-05-20T10:02:07.006Z |
| bit-fluentd-2021-41186 | ReDoS vulnerability in parser_apache2 | 2024-03-06T10:52:03.183Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-23323 | Excessive CPU usage when URI template matcher is configured using regex in Envoy | 2024-03-06T10:52:03.196Z | 2025-05-20T10:02:07.006Z |
| bit-git-2022-25648 | Command Injection | 2024-03-06T10:52:03.704Z | 2025-05-20T10:02:07.006Z |
| bit-ejbca-2021-40087 | 2024-03-06T10:52:04.494Z | 2025-04-03T14:40:37.652Z | |
| bit-discourse-2023-47120 | Discourse DoS through Onebox favicon URL | 2024-03-06T10:52:05.069Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2022-30556 | Information Disclosure in mod_lua with websockets | 2024-03-06T10:52:05.387Z | 2025-05-20T10:02:07.006Z |
| bit-elasticsearch-2023-31417 | Elasticsearch Insertion of sensitive information in audit logs | 2024-03-06T10:52:07.793Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2023-44487 | 2024-03-06T10:52:07.879Z | 2026-02-11T09:09:18.507Z | |
| bit-flink-2020-17518 | Apache Flink directory traversal attack: remote file writing through the REST API | 2024-03-06T10:52:08.186Z | 2025-05-20T10:02:07.006Z |
| bit-gitea-2023-3515 | Open Redirect in go-gitea/gitea | 2024-03-06T10:52:08.603Z | 2025-05-20T10:02:07.006Z |
| bit-ghost-2023-40028 | Arbitrary file read via symlinks in Ghost | 2024-03-06T10:52:08.986Z | 2025-05-20T10:02:07.006Z |
| bit-etcd-2021-28235 | 2024-03-06T10:52:10.197Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2022-29153 | 2024-03-06T10:52:10.905Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2023-46215 | Apache Airflow Celery provider, Apache Airflow: Sensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend | 2024-03-06T10:52:11.268Z | 2025-05-20T10:02:07.006Z |
| bit-django-2023-23969 | 2024-03-06T10:52:12.389Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2024-23322 | Envoy crashes when idle and request per try timeout occur within the backoff interval | 2024-03-06T10:52:13.860Z | 2025-05-20T10:02:07.006Z |
| bit-fluentd-2020-21514 | 2024-03-06T10:52:13.870Z | 2025-06-10T07:53:49.719Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-vl83369 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:53.758258Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bh03809 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:04:53.009971Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sh75345 | Cancelling a query (e | 2026-01-30T15:05:23.442396Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jx43631 | Within HostnameError | 2026-01-30T15:06:23.337190Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kk41938 | Within HostnameError | 2026-01-30T15:06:23.375949Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ib05679 | Within HostnameError | 2026-01-30T15:06:23.436295Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ni96678 | Within HostnameError | 2026-01-30T15:06:52.947220Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-su64392 | Cancelling a query (e | 2026-01-30T15:07:22.975031Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ck72347 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:07:23.436298Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-iw06531 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:07:23.455235Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hh74302 | Cancelling a query (e | 2026-01-30T15:07:53.076603Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fm00685 | Cancelling a query (e | 2026-01-30T15:07:53.091254Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tf52804 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:08:23.107112Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bl06950 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:08:23.121647Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yu60015 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:08:53.316314Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gc72145 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:09:23.061580Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yd51202 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:09:23.124967Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-il25782 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:09:53.055759Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pw33232 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:09:53.441606Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fn26367 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:10:23.074072Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kc06686 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:10:53.141957Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cr41732 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:12:53.150833Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mu17611 | tar | 2026-01-30T15:13:23.048582Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oj41940 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:13:53.428815Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ly33846 | Within HostnameError | 2026-01-30T15:16:23.051630Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uu56048 | Within HostnameError | 2026-01-30T15:16:53.077326Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rd08428 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:17:23.554517Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rq53330 | Within HostnameError | 2026-01-30T15:17:53.658995Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ts12850 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:17:53.937628Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ns41924 | Within HostnameError | 2026-01-30T15:18:53.115636Z | 2026-01-29T18:58:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2020-032 | 2020-08-05T15:47:56.000Z | 2023-08-11T17:31:20.000Z | |
| drupal-contrib-2020-033 | 2020-08-05T20:05:36.000Z | 2023-08-11T17:31:14.000Z | |
| drupal-contrib-2020-034 | 2020-10-14T14:38:16.000Z | 2023-08-11T17:32:53.000Z | |
| drupal-contrib-2020-035 | 2020-11-18T17:15:24.000Z | 2023-08-11T17:43:11.000Z | |
| drupal-contrib-2020-038 | 2020-11-18T17:27:58.000Z | 2023-08-11T17:45:32.000Z | |
| drupal-contrib-2021-001 | 2021-01-27T17:17:43.000Z | 2023-08-11T17:24:49.000Z | |
| drupal-contrib-2021-002 | 2021-01-27T17:27:57.000Z | 2023-08-11T17:25:36.000Z | |
| drupal-contrib-2021-003 | 2021-01-27T17:53:09.000Z | 2023-08-11T17:13:06.000Z | |
| drupal-contrib-2021-004 | 2021-03-03T16:49:33.000Z | 2023-08-11T17:15:22.000Z | |
| drupal-contrib-2021-005 | 2021-03-17T18:36:07.000Z | 2023-08-11T17:15:48.000Z | |
| drupal-contrib-2021-006 | 2021-04-28T16:47:09.000Z | 2023-08-11T17:16:38.000Z | |
| drupal-contrib-2021-007 | 2021-05-12T16:08:34.000Z | 2023-08-11T17:17:34.000Z | |
| drupal-contrib-2021-008 | 2021-05-12T16:14:35.000Z | 2023-08-11T17:17:58.000Z | |
| drupal-contrib-2021-009 | 2021-05-12T16:23:23.000Z | 2023-08-11T17:18:42.000Z | |
| drupal-contrib-2021-010 | 2021-06-02T16:49:49.000Z | 2023-08-11T17:21:33.000Z | |
| drupal-contrib-2021-011 | 2021-06-02T16:51:10.000Z | 2023-08-11T17:22:44.000Z | |
| drupal-contrib-2021-013 | 2021-06-02T16:56:19.000Z | 2023-08-11T17:07:00.000Z | |
| drupal-contrib-2021-014 | 2021-06-02T16:59:12.000Z | 2023-08-11T17:07:36.000Z | |
| drupal-contrib-2021-015 | 2021-06-16T15:58:47.000Z | 2023-08-11T17:08:06.000Z | |
| drupal-contrib-2021-016 | 2021-06-16T16:05:14.000Z | 2023-08-11T17:08:37.000Z | |
| drupal-contrib-2021-017 | 2021-06-16T16:15:21.000Z | 2023-08-11T17:09:04.000Z | |
| drupal-contrib-2021-018 | 2021-06-23T16:47:59.000Z | 2023-08-11T17:09:57.000Z | |
| drupal-contrib-2021-019 | 2021-06-23T16:51:26.000Z | 2023-08-11T17:10:31.000Z | |
| drupal-contrib-2021-020 | 2021-06-30T16:39:06.000Z | 2023-08-11T17:11:13.000Z | |
| drupal-contrib-2021-021 | 2021-06-30T16:43:19.000Z | 2023-08-11T17:11:42.000Z | |
| drupal-contrib-2021-022 | 2021-06-30T16:46:21.000Z | 2023-08-11T17:12:21.000Z | |
| drupal-contrib-2021-023 | 2021-07-21T16:51:57.000Z | 2023-08-11T16:57:55.000Z | |
| drupal-contrib-2021-024 | 2021-07-28T16:39:17.000Z | 2023-08-11T16:58:13.000Z | |
| drupal-contrib-2021-025 | 2021-08-25T14:36:25.000Z | 2023-08-11T16:59:37.000Z | |
| drupal-contrib-2021-026 | 2021-08-25T15:27:54.000Z | 2023-08-11T17:01:51.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2006-ale-014 | Vulnérabilités dans Microsoft Word | 2006-12-06T00:00:00.000000 | 2007-02-14T00:00:00.000000 |
| certa-2007-ale-001 | Vulnérablité dans Apple Quicktime | 2007-01-04T00:00:00.000000 | 2007-01-24T00:00:00.000000 |
| certa-2007-ale-002 | Vulnérabilité dans Windows | 2007-01-12T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2007-ale-003 | Filoutage contre le site voyages-sncf.com | 2007-01-15T00:00:00.000000 | 2007-01-15T00:00:00.000000 |
| certa-2007-ale-004 | Vulnérabilité dans Microsoft Office | 2007-02-03T00:00:00.000000 | 2007-02-13T00:00:00.000000 |
| certa-2007-ale-005 | Vulnérabilité de Sun Solaris | 2007-02-12T00:00:00.000000 | 2008-09-18T00:00:00.000000 |
| certa-2007-ale-006 | Vulnérabilité dans le logiciel Microsoft Word | 2007-02-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| certa-2007-ale-007 | Vulnérabilité de Microsoft Windows Explorer | 2007-03-09T00:00:00.000000 | 2008-10-09T00:00:00.000000 |
| certa-2007-ale-008 | Vulnérabilité dans Mirosoft Windows | 2007-03-29T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2007-ale-009 | Vulnérabilité dans BrightStor ARCServe Backup | 2007-03-30T00:00:00.000000 | 2007-04-27T00:00:00.000000 |
| certa-2007-ale-010 | Vulnérabilité de Microsoft DNS Server | 2007-04-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| certa-2007-ale-011 | Vulnérabilité du composant d'indexation des serveurs Microsoft IIS | 2007-06-06T00:00:00.000000 | 2013-02-19T00:00:00.000000 |
| certa-2007-ale-012 | Multiples vulnérabilités dans Mozilla Firefox | 2007-06-06T00:00:00.000000 | 2007-07-18T00:00:00.000000 |
| certa-2007-ale-013 | Vulnérabilité dans Mozilla Firefox | 2007-07-27T00:00:00.000000 | 2007-07-31T00:00:00.000000 |
| certa-2007-ale-014 | Vulnérabilité dans Apple QuickTime | 2007-09-13T00:00:00.000000 | 2007-10-12T00:00:00.000000 |
| certa-2007-ale-015 | Vulnérabilité dans le traitement des URI sous Windows | 2007-10-10T00:00:00.000000 | 2007-11-14T00:00:00.000000 |
| certa-2007-ale-016 | Vulnérabilité d'Oracle 10g | 2007-11-16T00:00:00.000000 | 2007-11-16T00:00:00.000000 |
| certa-2007-ale-017 | Vulnérabilité dans la gestion RTSP d'Apple QuickTime | 2007-11-27T00:00:00.000000 | 2007-12-14T00:00:00.000000 |
| certa-2008-ale-001 | Vulnérabilité dans Apple QuickTime | 2008-01-11T00:00:00.000000 | 2008-02-07T00:00:00.000000 |
| certa-2008-ale-002 | Vulnérabilité dans Joomla! | 2008-01-14T00:00:00.000000 | 2008-02-25T00:00:00.000000 |
| certa-2008-ale-003 | Vulnérabilité dans Excel | 2008-01-16T00:00:00.000000 | 2008-03-12T00:00:00.000000 |
| certa-2008-ale-004 | Vulnérabilité dans VMware | 2008-02-27T00:00:00.000000 | 2008-04-16T00:00:00.000000 |
| certa-2008-ale-005 | Vulnérabilité dans Microsoft Jet Database Engine | 2008-03-25T00:00:00.000000 | 2008-05-14T00:00:00.000000 |
| certa-2008-ale-006 | Vulnérabilités dans HP OpenView NNM | 2008-04-18T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| certa-2008-ale-007 | Multiples vulnérabilités dans Apple iCal | 2008-05-23T00:00:00.000000 | 2008-05-29T00:00:00.000000 |
| certa-2008-ale-008 | Vulnérabilité du navigateur Safari | 2008-06-02T00:00:00.000000 | 2008-06-20T00:00:00.000000 |
| certa-2008-ale-009 | Vulnérabilité dans Microsoft Access Snapshot Viewer | 2008-07-08T00:00:00.000000 | 2008-08-13T00:00:00.000000 |
| certa-2008-ale-010 | Vulnérabilité dans Microsoft Word | 2008-07-09T00:00:00.000000 | 2008-08-13T00:00:00.000000 |
| certa-2008-ale-011 | Vulnérabilité dans Oracle BEA WebLogic Server | 2008-07-24T00:00:00.000000 | 2008-08-08T00:00:00.000000 |
| certa-2008-ale-012 | Vulnérabilité dans Microsoft Windows | 2008-10-10T00:00:00.000000 | 2009-04-15T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2000-avi-091 | Vulnérabilité de « Fast Mode » sous Firewall-1 | 2000-12-20T00:00:00.000000 | 2000-12-20T00:00:00.000000 |
| certa-2000-avi-092 | Vulnérabilités de Solaris | 2000-12-20T00:00:00.000000 | 2000-12-20T00:00:00.000000 |
| certa-2000-avi-093 | Vulnérabilité sous Microsoft IIS (Extensions FrontPage) | 2000-12-28T00:00:00.000000 | 2000-12-28T00:00:00.000000 |
| certa-2011-avi-005 | Multiples vulnérabilités dans evince | 2001-01-11T00:00:00.000000 | 2011-01-07T00:00:00.000000 |
| certa-2001-avi-001 | Vulnérabilité de Lotus Domino 5 | 2001-01-12T00:00:00.000000 | 2001-01-12T00:00:00.000000 |
| certa-2001-avi-002 | Vulnérabilité de l'authentification NTLM sous Windows | 2001-01-12T00:00:00.000000 | 2001-01-12T00:00:00.000000 |
| certa-2001-avi-003 | Accès privilégié oublié dans le code de Interbase Server de Borland | 2001-01-12T00:00:00.000000 | 2001-01-12T00:00:00.000000 |
| certa-2001-avi-004 | Vulnérabilité dans ARP sous SunOS | 2001-01-15T00:00:00.000000 | 2001-01-15T00:00:00.000000 |
| certa-2001-avi-005 | Vulnérabilité du système d'internationalisation sous SGI Irix. | 2001-01-19T00:00:00.000000 | 2001-01-19T00:00:00.000000 |
| certa-2001-avi-006 | Vulnérabilité sous Microsoft Power Point 2000 | 2001-01-24T00:00:00.000000 | 2001-01-24T00:00:00.000000 |
| certa-2001-avi-007 | Mise à jour de Wu-FTPd | 2001-01-24T00:00:00.000000 | 2001-01-24T00:00:00.000000 |
| certa-2001-avi-008 | Vulnérabilité sous Lotus Notes (Domino 5) | 2001-01-25T00:00:00.000000 | 2001-01-25T00:00:00.000000 |
| certa-2001-avi-009 | Vulnérabilité dans les permissions d'accès sous Windows NT 4 | 2001-01-30T00:00:00.000000 | 2001-01-30T00:00:00.000000 |
| certa-2001-avi-010 | Multiples vulnérabilités dans le serveur DNS BIND | 2001-01-30T00:00:00.000000 | 2001-11-30T00:00:00.000000 |
| certa-2001-avi-011 | Vulnérabilités de MySQL 3.23.31 et du module PHP d'apache sous Linux | 2001-01-31T00:00:00.000000 | 2001-01-31T00:00:00.000000 |
| certa-2001-avi-012 | Vulnérabilité dans le protocole RDP sous Windows 2000 | 2001-02-01T00:00:00.000000 | 2001-02-01T00:00:00.000000 |
| certa-2001-avi-013 | Vulnérabilités sur les commutateurs CISCO série CSS | 2001-02-05T00:00:00.000000 | 2001-02-05T00:00:00.000000 |
| certa-2001-avi-014 | Vulnérabilité de l'agent NDDE de Microsoft Windows | 2001-02-07T00:00:00.000000 | 2001-02-07T00:00:00.000000 |
| certa-2001-avi-015 | Vulnérabilité de Windows NT 4 dans l'authentification NTLM | 2001-02-08T00:00:00.000000 | 2001-02-08T00:00:00.000000 |
| certa-2001-avi-016 | Vulnérabilité des logiciels d'administration à distance de Compaq | 2001-02-12T00:00:00.000000 | 2001-02-12T00:00:00.000000 |
| certa-2001-avi-017 | Vulnérabilité de SSH | 2001-02-12T00:00:00.000000 | 2001-02-12T00:00:00.000000 |
| certa-2001-avi-018 | Vulnérabilité sous Windows NT 4 dans le protocole PPTP | 2001-02-14T00:00:00.000000 | 2001-02-14T00:00:00.000000 |
| certa-2001-avi-019 | Vulnérabilité de Vixie-cron sous Unix | 2001-02-21T00:00:00.000000 | 2001-02-21T00:00:00.000000 |
| certa-2001-avi-020 | Vulnérabilité dans le contrôleur de domaine de Windows 2000 Server | 2001-02-21T00:00:00.000000 | 2001-02-21T00:00:00.000000 |
| certa-2001-avi-021 | Vulnérabilité sous Microsoft Outlook et Outlook Express | 2001-02-23T00:00:00.000000 | 2001-02-23T00:00:00.000000 |
| certa-2001-avi-022 | Vulnérabilité dans le <SPAN class= "textit">Java Runtime Environment</SPAN> (JRE) de Sun | 2001-02-27T00:00:00.000000 | 2001-02-27T00:00:00.000000 |
| certa-2001-avi-023 | Dépassement de mémoire dans l'observateur d'événements de Windows 2000 | 2001-02-28T00:00:00.000000 | 2001-02-28T00:00:00.000000 |
| certa-2001-avi-024 | Vulnérabilité dans la gestion des clients sous Lotus Notes | 2001-03-01T00:00:00.000000 | 2001-03-01T00:00:00.000000 |
| certa-2001-avi-025 | Vulnérabilité d'Internet Information Server 5.0 et Exchange 2000 | 2001-03-02T00:00:00.000000 | 2001-03-02T00:00:00.000000 |
| certa-2001-avi-026 | Vulnérabilités dans les commutateurs CISCO IOS | 2001-03-05T00:00:00.000000 | 2001-03-05T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2006-000251 | SquirrelMail cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000293 | Sun Java System Web Server cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000326 | Mozilla Firefox vulnerable to HTTP response splitting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000345 | Microsoft Internet Explorer address bar spoofing vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000392 | Ruby contains a vulnerability that prevents safe level 4 from functioning as a sandbox. | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000540 | Microsoft Windows Indexing Service cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000599 | Nagasaki Electronic Prefectural Office System vulnerable to bypass authentication | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000600 | Nagasaki Electronic Prefectural Office System authentication information vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000601 | Eudora Japanese version stops working after the application crashes | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000602 | Multiple email clients vulnerable in handling an attachement inapropriately | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000603 | Hatena Toolbar sends URL information unecnrypted | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000604 | Nagasaki Electronic Prefectural Office System SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000605 | Hyper NIKKI System allows unauthorized email submission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000606 | Minnu's filer2 vulnerable in allowing arbitrary Ruby script execution | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000609 | CAFEMILK Shopping Cart CGI cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000610 | QUICK CART OS command injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000611 | QUICK CART cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000612 | FreeStyleWiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000613 | Trac cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000614 | Winny buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000615 | Apache Struts Validator allows to bypass input data validation | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000616 | DonutP and UnDonut confirmation dialog display vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000617 | Multiple email clients vulnerable to directory traversal due to inappropriate unicode handling | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000619 | MyWeb SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000620 | RWiki arbitrary Ruby script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000621 | RWiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000622 | dotProject cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000623 | Joomla! cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000624 | CGI RESCUE WebFORM allows unauthorized email transmission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000625 | CGI RESCUE WebFORM allows unauthorized email transmission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00014 | libpng 'png_combine_row()'缓冲区溢出漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00015 | WordPress插件cformsII 'lib_nonajax.php'任意文件上传漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00016 | Gnupg2 'sm/gpgsm.c' Double Free拒绝服务漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00017 | Gnupg2 'dirmngr/ldapserver.c' Double Free拒绝服务漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00018 | Gnupg2 '/sm/minip12.c' Double Free拒绝服务漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00019 | Gnupg2 '/scd/command.c' Double Free拒绝服务漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00020 | WordPress插件Frontend Uploader 'errors'参数跨站脚本漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00021 | Notepad++存在未明缓冲区溢出漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00298 | EnterCMR系统命令执行漏洞 | 2014-12-31 | 2015-02-07 |
| cnvd-2015-00002 | ManageEngine Desktop Central远程安全绕过漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00003 | Linux Kernel 'fragmentation.c'拒绝服务漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00004 | GetSimple CMS 'api.php' XML外部实体信息泄露漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00006 | Osclass 'contact.php'任意文件上传漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00007 | Osclass 'ajax.php'本地文件包含漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00008 | Osclass 'alert'参数SQL注入漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00022 | Google Chrome拒绝服务漏洞(CNVD-2015-00022) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00023 | Google Chrome拒绝服务漏洞(CNVD-2015-00023) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00024 | Telerik UI for ASP.NET AJAX Q3绝对路径遍历漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00025 | Maxthon Cloud Browser application 地址栏欺骗漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00026 | WordPress插件IP Ban存在多个跨站请求伪造漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00027 | Huawei eSpace Desktop V100R001C03拒绝服务漏洞(CNVD-2015-00027) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00028 | Huawei eSpace Desktop V200R003C00存在多个不可信搜索路径漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00029 | Huawei eSpace Desktop V100R001C03拒绝服务漏洞(CNVD-2015-00029) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00030 | Huawei eSpace Desktop V200R001C03拒绝服务漏洞(CNVD-2015-00030) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00031 | LibreSSL双重释放漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00032 | IBM Rational AppScan Source信息泄露漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00033 | IBM WebSphere Service Registry and Repository预期访问限制绕过漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00034 | IBM Security Identity Manager跨站请求伪造漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00035 | Tribal Tribiq CMS路径泄露漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00036 | WhatsApp Non-Printable字符串处理拒绝服务漏洞 | 2015-01-04 | 2015-01-05 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-02481 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02482 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02483 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02484 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02485 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02486 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02487 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02488 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02489 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02490 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02491 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02492 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02493 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02494 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02495 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02496 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02497 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02498 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02499 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02500 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02501 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02502 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02503 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02504 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02505 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02506 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02507 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02508 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02509 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02510 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| ID | Description | Updated |
|---|---|---|
| var-202103-0230 | A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Sol… | 2022-05-04T08:13:28.253000Z |
| var-202109-1793 | A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge … | 2022-05-04T08:13:30.769000Z |
| var-202103-1346 | A remote arbitrary file read vulnerability was discovered in some Aruba Instant Access Po… | 2022-05-04T08:14:15.277000Z |
| var-202109-1974 | A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal) v… | 2022-05-04T08:16:26.089000Z |
| var-202103-1333 | A remote arbitrary file modification vulnerability was discovered in some Aruba Instant A… | 2022-05-04T08:21:39.419000Z |
| var-202106-0696 | Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86,… | 2022-05-04T08:21:47.847000Z |
| var-202109-0234 | A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconn… | 2022-05-04T08:24:39.300000Z |
| var-202109-1826 | A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge … | 2022-05-04T08:28:05.251000Z |
| var-202112-2536 | Huawei AR1220F-S is a new generation enterprise-class gigabit router. Huawei AR1220F-… | 2022-05-04T08:32:36.056000Z |
| var-202112-2273 | Certain NETGEAR devices are affected by stored XSS. This affects RAX200 before 1.0.5.126,… | 2022-05-04T08:32:36.348000Z |
| var-202111-1111 | Dell BIOS contains an improper input validation vulnerability. A local authenticated mali… | 2022-05-04T08:32:44.162000Z |
| var-202111-0183 | IBM MQ 9.1 LTS, 9.1 CD, 9.2 LTS, and 9.2CD is vulnerable to a denial of service attack ca… | 2022-05-04T08:32:45.325000Z |
| var-202110-1910 | Huawei Technologies Co., Ltd. is the world's leading provider of information and communic… | 2022-05-04T08:32:45.818000Z |
| var-202108-2575 | X463de is a printer of Lexmark International Inc. Lexmark X463de has an unauthorized … | 2022-05-04T08:32:53.156000Z |
| var-202108-2554 | Huawei HG659 is a home gateway. Huawei HG659 has an information disclosure vulnerabil… | 2022-05-04T08:32:53.166000Z |
| var-202108-2533 | Ricoh (China) Investment Co., Ltd. provides office image processing equipment (such as MF… | 2022-05-04T08:32:53.181000Z |
| var-202108-2512 | Hong Kong Broadband Network Limited is a leading provider of integrated telecommunication… | 2022-05-04T08:32:53.193000Z |
| var-202108-2491 | DocuPrint CM305 df is a printer. DocuPrint CM305 df has an unauthorized access vulner… | 2022-05-04T08:32:53.204000Z |
| var-202108-2470 | The HP Photosmart 5520 series is a mid-range inkjet printer. The HP Photosmart 5520 s… | 2022-05-04T08:32:53.216000Z |
| var-202108-2449 | Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of… | 2022-05-04T08:32:53.231000Z |
| var-202108-2428 | Lexmark MS610dn is a printer product of Lexmark. Lexmark MS610dn has an unauthorized … | 2022-05-04T08:32:53.242000Z |
| var-202108-2407 | Fuji Xerox (China) Co., Ltd. was established on January 3, 1995. It is a wholly-owned hol… | 2022-05-04T08:32:53.253000Z |
| var-202108-2386 | Fuji Xerox (China) Co., Ltd. was established on January 3, 1995. It is a wholly-owned hol… | 2022-05-04T08:32:53.264000Z |
| var-202108-2365 | MOBOTIX M26 is a camera of MOBOTIX. MOBOTIX M26 has an unauthorized access vulnerabil… | 2022-05-04T08:32:53.274000Z |
| var-202108-2344 | MP C3004ex is a color digital copier. Ricoh (China) Investment Co., Ltd. MP C3004ex h… | 2022-05-04T08:32:53.285000Z |
| var-202108-2323 | Fuji Xerox (China) Co., Ltd. was established on January 3, 1995. It is a wholly-owned hol… | 2022-05-04T08:32:53.296000Z |
| var-202108-2302 | Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of… | 2022-05-04T08:32:53.307000Z |
| var-202107-1894 | Axis is an IT company that specializes in providing network video solutions. AXIS P13… | 2022-05-04T08:32:54.844000Z |
| var-202107-1873 | Axis is an IT company that specializes in providing network video solutions. AXIS M31… | 2022-05-04T08:32:54.854000Z |
| var-202107-1852 | Matsushita Electric (China) was established in 1994 and is mainly responsible for the sal… | 2022-05-04T08:32:54.864000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| vde-2024-070 | Phoenix Contact: Security Advisory for CHARX-SEC3xxx Charge controllers | 2025-01-14T11:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2025-005 | Phoenix Contact: Security Advisory for ESL Stick USB-A | 2025-01-14T11:00:00.000Z | 2025-05-14T13:00:14.000Z |
| vde-2025-029 | Phoenix Contact: Security Advisory for AXL F BK and IL BK bus couplers | 2025-05-13T09:00:00.000Z | 2025-05-14T12:28:19.000Z |
| vde-2025-014 | Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers | 2025-07-08T10:00:00.000Z | 2025-07-08T10:00:00.000Z |
| vde-2025-019 | Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers | 2025-07-08T10:00:00.000Z | 2025-07-22T08:00:00.000Z |
| vde-2025-053 | Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware | 2025-07-08T10:00:00.000Z | 2025-07-08T10:00:00.000Z |
| vde-2025-054 | Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware | 2025-07-08T10:00:00.000Z | 2025-07-08T10:00:00.000Z |
| vde-2025-063 | Phoenix Contact: Device and Update Management Windows Installer Privilege Escalation | 2025-08-12T10:00:00.000Z | 2025-08-12T10:00:00.000Z |
| vde-2025-064 | Phoenix Contact: Products utilizing WIBU-SYSTEMS CodeMeter Runtime Windows Installer have a privilege escalation | 2025-09-09T07:00:00.000Z | 2025-09-09T07:00:00.000Z |
| vde-2025-077 | Phoenix Contact: Two vulnerabilities in the jq JSON processor utilized by FL MGUARD 110x devices | 2025-09-09T10:00:00.000Z | 2025-09-09T10:00:00.000Z |
| vde-2025-072 | Phoenix Contact: Security Advisory for QUINT4-UPS EIP | 2025-10-14T06:00:00.000Z | 2025-10-14T06:00:00.000Z |
| vde-2025-074 | Phoenix Contact: Security Advisory for CHARX SEC-3xxx charging controllers | 2025-10-14T10:00:00.000Z | 2025-10-15T10:00:00.000Z |
| vde-2025-071 | Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx Firmware | 2025-12-09T08:00:00.000Z | 2026-01-12T08:00:00.000Z |
| vde-2025-073 | Phoenix Contact: Security Advisory for TC ROUTER and CLOUD CLIENT Industrial mobile network routers | 2026-01-13T08:00:00.000Z | 2026-01-13T08:00:00.000Z |
| vde-2025-109 | Phoenix Contact: Unbounded growth of the session cache in TCP encapsulation service in FL MGUARD 2xxx and 4xxx firmware | 2026-02-10T08:00:00.000Z | 2026-02-23T14:00:00.000Z |
| vde-2025-104 | Phoenix Contact: Multiple Vulnerabilities in FL SWITCH 2xxx, FL SWITCH TSN 23xx and FL SWITCH 59xx Firmware | 2026-03-18T08:00:00.000Z | 2026-03-18T08:00:00.000Z |