Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0483 |
N/A
|
The DocumentTemplate package in Zope 2.2 and earl… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:30.650Z |
| CVE-2000-0484 |
N/A
|
Small HTTP Server ver 3.06 contains a memory corr… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:31.038Z |
| CVE-2000-0485 |
N/A
|
Microsoft SQL Server allows local users to obtain… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:30.940Z |
| CVE-2000-0486 |
N/A
|
Buffer overflow in Cisco TACACS+ tac_plus server … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:31.294Z |
| CVE-2000-0489 |
N/A
|
FreeBSD, NetBSD, and OpenBSD allow an attacker to… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:31.195Z |
| CVE-2000-0490 |
N/A
|
Buffer overflow in the NetWin DSMTP 2.7q in the N… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:30.850Z |
| CVE-2000-0493 |
N/A
|
Buffer overflow in Simple Network Time Sync (SMTS… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:30.869Z |
| CVE-2000-0494 |
N/A
|
Veritas Volume Manager creates a world writable .… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:30.587Z |
| CVE-2000-0495 |
N/A
|
Microsoft Windows Media Encoder allows remote att… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:31.067Z |
| CVE-2000-0497 |
N/A
|
IBM WebSphere server 3.0.2 allows a remote attack… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:30.891Z |
| CVE-2000-0499 |
N/A
|
The default configuration of BEA WebLogic 3.1.8 t… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:30.906Z |
| CVE-2000-0500 |
N/A
|
The default configuration of BEA WebLogic 5.1.0 a… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:31.241Z |
| CVE-2000-0501 |
N/A
|
Race condition in MDaemon 2.8.5.0 POP server allo… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:31.095Z |
| CVE-2000-0505 |
N/A
|
The Apache 1.3.x HTTP server for Windows platform… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:31.259Z |
| CVE-2000-0506 |
N/A
|
The "capabilities" feature in Linux before 2.2.16… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:31.163Z |
| CVE-2000-0507 |
N/A
|
Imate Webmail Server 2.5 allows remote attackers … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:30.970Z |
| CVE-2000-0508 |
N/A
|
rpc.lockd in Red Hat Linux 6.1 and 6.2 allows rem… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:31.106Z |
| CVE-2000-0510 |
N/A
|
CUPS (Common Unix Printing System) 1.04 and earli… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:30.919Z |
| CVE-2000-0511 |
N/A
|
CUPS (Common Unix Printing System) 1.04 and earli… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:30.827Z |
| CVE-2000-0512 |
N/A
|
CUPS (Common Unix Printing System) 1.04 and earli… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:31.095Z |
| CVE-2000-0513 |
N/A
|
CUPS (Common Unix Printing System) 1.04 and earli… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:31.175Z |
| CVE-2000-0514 |
N/A
|
GSSFTP FTP daemon in Kerberos 5 1.1.x does not pr… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:31.086Z |
| CVE-2000-0515 |
N/A
|
The snmpd.conf configuration file for the SNMP da… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:30.480Z |
| CVE-2000-0516 |
N/A
|
When configured to store configuration informatio… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:30.774Z |
| CVE-2000-0517 |
N/A
|
Netscape 4.73 and earlier does not properly warn … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:30.563Z |
| CVE-2000-0518 |
N/A
|
Internet Explorer 4.x and 5.x does not properly v… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:31.406Z |
| CVE-2000-0519 |
N/A
|
Internet Explorer 4.x and 5.x does not properly r… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:30.994Z |
| CVE-2000-0521 |
N/A
|
Savant web server allows remote attackers to read… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:31.336Z |
| CVE-2000-0522 |
N/A
|
RSA ACE/Server allows remote attackers to cause a… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:30.916Z |
| CVE-2000-0525 |
N/A
|
OpenSSH does not properly drop privileges when th… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:30.917Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0060 |
N/A
|
Buffer overflow in aVirt Rover POP3 server 1.1 al… |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T05:05:53.827Z |
| CVE-1999-1573 |
N/A
|
Multiple unknown vulnerabilities in the "r-cmnds"… |
n/a |
n/a |
2005-04-21T04:00:00 | 2024-08-01T17:18:07.562Z |
| CVE-2000-0014 |
N/A
|
Denial of service in Savant web server via a null… |
n/a |
n/a |
2000-04-25T04:00:00 | 2024-08-08T04:58:11.760Z |
| CVE-2000-0035 |
N/A
|
resend command in Majordomo allows local users to… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-08T05:05:53.647Z |
| CVE-2000-0037 |
N/A
|
Majordomo wrapper allows local users to gain priv… |
n/a |
n/a |
2000-03-22T05:00:00 | 2024-08-08T05:05:52.985Z |
| CVE-2000-0041 |
N/A
|
Macintosh systems generate large ICMP datagrams i… |
n/a |
n/a |
2000-03-22T05:00:00 | 2024-08-08T05:05:52.750Z |
| CVE-2000-0007 |
N/A
|
Trend Micro PC-Cillin does not restrict access to… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-08T04:58:11.434Z |
| CVE-2000-0009 |
N/A
|
The bna_pass program in Optivity NETarchitect use… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T04:58:11.888Z |
| CVE-2000-0039 |
N/A
|
AltaVista search engine allows remote attackers t… |
n/a |
n/a |
2000-03-22T05:00:00 | 2024-08-08T05:05:52.985Z |
| CVE-2000-0042 |
N/A
|
Buffer overflow in CSM mail server allows remote … |
n/a |
n/a |
2000-04-25T04:00:00 | 2024-08-08T05:05:53.972Z |
| CVE-2000-0100 |
N/A
|
The SMS Remote Control program is installed with … |
n/a |
n/a |
2000-04-18T04:00:00 | 2024-08-08T05:05:53.732Z |
| CVE-1999-0001 |
N/A
|
ip_input.c in BSD-derived TCP/IP implementations … |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:03:04.917Z |
| CVE-2000-0003 |
N/A
|
Buffer overflow in UnixWare rtpm program allows l… |
n/a |
n/a |
2000-03-22T05:00:00 | 2024-08-08T04:58:11.525Z |
| CVE-2000-0043 |
N/A
|
Buffer overflow in CamShot WebCam HTTP server all… |
n/a |
n/a |
2000-04-25T04:00:00 | 2024-08-08T05:05:53.904Z |
| CVE-2000-0076 |
N/A
|
nviboot boot script in the Debian nvi package all… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.920Z |
| CVE-1999-0154 |
N/A
|
IIS 2.0 and 3.0 allows remote attackers to read t… |
n/a |
n/a |
2001-09-12T04:00:00 | 2024-08-01T16:27:57.752Z |
| CVE-1999-0808 |
N/A
|
Multiple buffer overflows in ISC DHCP Distributio… |
n/a |
n/a |
2001-09-12T04:00:00 | 2024-08-01T16:48:38.035Z |
| CVE-1999-0815 |
N/A
|
Memory leak in SNMP agent in Windows NT 4.0 befor… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T16:48:38.123Z |
| CVE-1999-1035 |
N/A
|
IIS 3.0 and 4.0 on x86 and Alpha allows remote at… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T16:55:29.402Z |
| CVE-1999-1042 |
N/A
|
Cisco Resource Manager (CRM) 1.0 and 1.1 creates … |
n/a |
n/a |
2001-09-12T04:00:00 | 2024-08-01T16:55:29.409Z |
| CVE-1999-1043 |
N/A
|
Microsoft Exchange Server 5.5 and 5.0 does not pr… |
n/a |
n/a |
2001-09-12T04:00:00 | 2024-08-01T16:55:29.473Z |
| CVE-1999-1055 |
N/A
|
Microsoft Excel 97 does not warn the user before … |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:02:53.080Z |
| CVE-1999-1074 |
N/A
|
Webmin before 0.5 does not restrict the number of… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:02:53.696Z |
| CVE-1999-1084 |
N/A
|
The "AEDebug" registry key is installed with inse… |
n/a |
n/a |
2001-09-12T04:00:00 | 2024-08-01T17:02:53.650Z |
| CVE-1999-1087 |
N/A
|
Internet Explorer 4 treats a 32-bit number ("dotl… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:02:53.775Z |
| CVE-1999-1093 |
N/A
|
Buffer overflow in the Window.External function i… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:02:53.660Z |
| CVE-1999-1094 |
N/A
|
Buffer overflow in Internet Explorer 4.01 and ear… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:02:53.450Z |
| CVE-1999-1100 |
N/A
|
Cisco PIX Private Link 4.1.6 and earlier does not… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:02:53.610Z |
| CVE-1999-1102 |
N/A
|
lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and othe… |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:02:53.617Z |
| CVE-1999-1104 |
N/A
|
Windows 95 uses weak encryption for the password … |
n/a |
n/a |
2002-03-09T05:00:00 | 2024-08-01T17:02:53.647Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-qr7j-h6gg-jmgc |
9.8 (3.1)
|
Deserialization of Untrusted Data in jackson-databind | 2019-07-16T17:42:21Z | 2024-03-01T21:46:19Z |
| ghsa-cmfg-87vq-g5g4 |
5.9 (3.1)
|
Deserialization of untrusted data in FasterXML jackson-databind | 2019-07-17T15:26:12Z | 2024-03-15T01:01:07Z |
| ghsa-5frh-8cmj-gc59 |
4.1 (3.1)
|
System.Management.Automation subject to bypass via script debugging | 2019-07-17T19:14:18Z | 2022-09-17T01:02:30Z |
| ghsa-r7j3-vvh2-xrpj |
7.8 (3.1)
|
OS Command Injection in MiniMagick | 2019-07-18T13:19:22Z | 2023-01-25T20:10:32Z |
| ghsa-9ccv-p7fg-m73x |
7.5 (3.1)
|
XML Injection in python-libnmap | 2019-07-18T15:38:41Z | 2024-10-15T16:43:37Z |
| ghsa-5wv5-4vpf-pj6m |
7.5 (3.1)
8.7 (4.0)
|
Pallets Project Flask is vulnerable to Denial of Service via Unexpected memory usage | 2019-07-19T16:12:46Z | 2024-09-20T21:04:58Z |
| ghsa-x5rq-j2xg-h7qm |
6.5 (3.1)
|
Regular Expression Denial of Service (ReDoS) in lodash | 2019-07-19T16:13:07Z | 2025-09-29T20:19:28Z |
| ghsa-mpf2-q34c-fc6j |
7.5 (3.1)
|
Infinite Loop in scapy | 2019-07-22T14:53:58Z | 2024-10-22T16:40:01Z |
| ghsa-hf23-9pf7-388p |
9.8 (3.1)
|
Deserialization of Untrusted Data and Code Injection in xstream | 2019-07-26T16:09:47Z | 2025-04-01T16:33:05Z |
| ghsa-vg35-vc9f-q7x2 |
9.8 (3.1)
9.3 (4.0)
|
Improper Restriction of XML External Entity Reference in ladon | 2019-07-26T16:09:54Z | 2024-09-27T18:25:35Z |
| ghsa-hh56-x62g-gvhc |
6.1 (3.1)
|
Cross-site scripting in CLEditor | 2019-07-26T16:10:06Z | 2021-08-17T19:04:59Z |
| ghsa-hrj5-qp7x-rpg6 |
9.8 (3.1)
|
SQL Injection in marginalia | 2019-07-26T16:10:15Z | 2023-01-25T22:46:17Z |
| ghsa-7vvr-h4p5-m7fh |
7.5 (3.1)
8.7 (4.0)
|
Aubio is vulnerable to a NULL pointer dereference in new_aubio_filterbank | 2019-07-26T16:10:20Z | 2024-09-13T14:19:43Z |
| ghsa-c6jq-h4jp-72pr |
7.5 (3.1)
8.7 (4.0)
|
Aubio is vulnerable to a NULL pointer dereference in new_aubio_notes function | 2019-07-26T16:10:25Z | 2024-09-04T20:26:30Z |
| ghsa-grmf-4fq6-2r79 |
9.8 (3.1)
9.3 (4.0)
|
aubio Buffer Overflow vulnerability | 2019-07-26T16:10:28Z | 2024-09-04T20:29:30Z |
| ghsa-hf4p-jm7r-vjjj |
9.8 (3.1)
|
Deserialization of Untrusted Data in EthereumJ | 2019-07-26T16:10:39Z | 2021-08-17T19:40:00Z |
| ghsa-j3jp-gvr5-7hwq |
8.8 (3.1)
8.7 (4.0)
|
python-engineio vulnerable to Cross-Site Request Forgery (CSRF) | 2019-07-30T20:47:25Z | 2024-10-25T20:48:05Z |
| ghsa-wg6j-r28m-7293 |
9.8 (3.1)
|
Code backdoor in simple_captcha2 | 2019-07-31T04:21:19Z | 2023-08-28T13:34:04Z |
| ghsa-rqp5-pg7w-832p |
9.8 (3.1)
|
datagrid contains code Injection backdoor | 2019-07-31T04:21:27Z | 2023-08-25T21:06:23Z |
| ghsa-qpxp-5j56-gg3x |
7.5 (3.1)
|
samlr XML nodes comment attack | 2019-07-31T04:22:03Z | 2023-08-08T16:12:35Z |
| ghsa-wqfc-cr59-h64p |
8.1 (3.1)
|
Missing Encryption of Sensitive Data in yarn | 2019-07-31T04:22:15Z | 2021-08-17T19:40:44Z |
| ghsa-j657-59rv-qwm6 |
5.4 (3.1)
|
Cross-Site Scripting in min-http-server | 2019-07-31T04:22:27Z | 2022-12-03T04:03:29Z |
| ghsa-7j93-2h6r-hm49 |
5.4 (3.1)
|
Cross-Site Scripting in http-file-server | 2019-07-31T04:22:36Z | 2023-02-01T09:19:41Z |
| ghsa-grgm-pph5-j5h7 |
5.4 (3.1)
5.3 (4.0)
|
Exposure of Sensitive Information to an Unauthorized Actor in ansible | 2019-07-31T04:22:49Z | 2024-09-04T20:45:43Z |
| ghsa-3gm7-v7vw-866c |
7.2 (3.1)
|
XML External Entity (XXE) Injection in Apache Solr | 2019-08-01T19:17:35Z | 2025-10-22T17:44:24Z |
| ghsa-jvpp-hxjj-5ccc |
4.9 (3.1)
|
Improper Input Validation and Missing Authentication for Critical Function in Apache ActiveMQ | 2019-08-01T19:17:45Z | 2023-12-20T20:40:44Z |
| ghsa-25pc-85qf-6j69 |
9.8 (3.1)
|
Deserialization of Untrusted Data in Apache Storm | 2019-08-01T19:17:53Z | 2021-08-17T20:24:21Z |
| ghsa-6fpp-rgj9-8rwc |
9.8 (3.1)
|
Deserialization of untrusted data in FasterXML jackson-databind | 2019-08-01T19:18:00Z | 2023-09-13T17:18:23Z |
| ghsa-gwp4-hfv6-p7hw |
7.5 (3.1)
|
Deserialization of untrusted data in FasterXML jackson-databind | 2019-08-01T19:18:06Z | 2023-11-27T23:03:26Z |
| ghsa-w69w-jvc7-wjgv |
7.5 (3.1)
|
Undertow Missing Authorization when requesting a protected directory without trailing slash | 2019-08-01T19:18:16Z | 2023-09-25T10:52:27Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-544 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.440204Z |
| pysec-2021-545 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.587221Z |
| pysec-2021-546 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing a complex … | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.733982Z |
| pysec-2021-547 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing invalid ar… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.886365Z |
| pysec-2021-639 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling TF operati… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:17.206359Z |
| pysec-2021-640 |
|
TensorFlow is an end-to-end open source platform for machine learning. If the `splits` ar… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:17.368785Z |
| pysec-2021-641 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:17.530281Z |
| pysec-2021-642 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_op… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:17.688674Z |
| pysec-2021-643 |
|
TensorFlow is an end-to-end open source platform for machine learning. A malicious user c… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:17.852782Z |
| pysec-2021-644 |
|
TensorFlow is an end-to-end open source platform for machine learning. In eager mode (def… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.016615Z |
| pysec-2021-645 |
|
TensorFlow is an end-to-end open source platform for machine learning. The API of `tf.raw… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.174701Z |
| pysec-2021-646 |
|
TensorFlow is an end-to-end open source platform for machine learning. Missing validation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.334867Z |
| pysec-2021-647 |
|
TensorFlow is an end-to-end open source platform for machine learning. Specifying a negat… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.423070Z |
| pysec-2021-648 |
|
TensorFlow is an end-to-end open source platform for machine learning. The `tf.raw_ops.Co… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.591146Z |
| pysec-2021-649 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.759879Z |
| pysec-2021-650 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.930076Z |
| pysec-2021-651 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.088447Z |
| pysec-2021-652 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.249421Z |
| pysec-2021-653 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.411969Z |
| pysec-2021-654 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.582800Z |
| pysec-2021-655 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.746209Z |
| pysec-2021-656 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.918878Z |
| pysec-2021-657 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.083523Z |
| pysec-2021-658 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can fo… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.263925Z |
| pysec-2021-659 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.437161Z |
| pysec-2021-660 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.598497Z |
| pysec-2021-661 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.792Z |
| pysec-2021-662 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.961529Z |
| pysec-2021-663 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:21.193841Z |
| pysec-2021-664 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:21.353144Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-4401 | Malicious code in lotus-adapter (npm) | 2022-06-20T20:12:04Z | 2022-06-20T20:12:05Z |
| mal-2022-4486 | Malicious code in marketstack-adapter (npm) | 2022-06-20T20:12:04Z | 2022-06-20T20:12:05Z |
| mal-2022-4566 | Malicious code in messari-adapter (npm) | 2022-06-20T20:12:05Z | 2022-06-20T20:12:05Z |
| mal-2022-4570 | Malicious code in metalsapi-adapter (npm) | 2022-06-20T20:12:05Z | 2022-06-20T20:12:06Z |
| mal-2022-4657 | Malicious code in mock-ea-adapter (npm) | 2022-06-20T20:12:05Z | 2022-06-20T20:12:06Z |
| mal-2022-4759 | Malicious code in mycryptoapi-adapter (npm) | 2022-06-20T20:12:05Z | 2022-06-20T20:12:06Z |
| mal-2022-4789 | Malicious code in ncfx-adapter (npm) | 2022-06-20T20:12:06Z | 2022-06-20T20:12:06Z |
| mal-2022-4853 | Malicious code in nikkei-adapter (npm) | 2022-06-20T20:12:06Z | 2022-06-20T20:12:06Z |
| mal-2022-4914 | Malicious code in nomics-adapter (npm) | 2022-06-20T20:12:06Z | 2022-06-20T20:12:07Z |
| mal-2022-5040 | Malicious code in oilpriceapi-adapter (npm) | 2022-06-20T20:12:06Z | 2022-06-20T20:12:07Z |
| mal-2022-5074 | Malicious code in onchain-gas-adapter (npm) | 2022-06-20T20:12:07Z | 2022-06-20T20:12:07Z |
| mal-2022-5097 | Malicious code in openexchangerates-adapter (npm) | 2022-06-20T20:12:07Z | 2022-06-20T20:12:07Z |
| mal-2022-5119 | Malicious code in orchid-bandwidth-adapter (npm) | 2022-06-20T20:12:07Z | 2022-06-20T20:12:08Z |
| mal-2022-5232 | Malicious code in paxos-adapter (npm) | 2022-06-20T20:12:07Z | 2022-06-20T20:12:08Z |
| mal-2022-5240 | Malicious code in paypal-adapter (npm) | 2022-06-20T20:12:07Z | 2022-06-20T20:12:08Z |
| mal-2022-5387 | Malicious code in poa-adapter (npm) | 2022-06-20T20:12:08Z | 2022-06-20T20:12:08Z |
| mal-2022-5408 | Malicious code in polygon-adapter (npm) | 2022-06-20T20:12:08Z | 2022-06-20T20:12:08Z |
| mal-2022-5417 | Malicious code in por-indexer-adapter (npm) | 2022-06-20T20:12:08Z | 2022-06-20T20:12:09Z |
| mal-2022-5486 | Malicious code in proof-of-reserves-adapter (npm) | 2022-06-20T20:12:08Z | 2022-06-20T20:12:09Z |
| mal-2022-5726 | Malicious code in reduce-adapter (npm) | 2022-06-20T20:12:09Z | 2022-06-20T20:12:09Z |
| mal-2022-5750 | Malicious code in renvm-address-set-adapter (npm) | 2022-06-20T20:12:09Z | 2022-06-20T20:12:10Z |
| mal-2022-5936 | Malicious code in satoshitango-adapter (npm) | 2022-06-20T20:12:09Z | 2022-06-20T20:12:10Z |
| mal-2022-6193 | Malicious code in snowflake-adapter (npm) | 2022-06-20T20:12:09Z | 2022-06-20T20:12:10Z |
| mal-2022-6197 | Malicious code in sochain-adapter (npm) | 2022-06-20T20:12:10Z | 2022-06-20T20:12:10Z |
| mal-2022-6205 | Malicious code in solana-view-function-adapter (npm) | 2022-06-20T20:12:10Z | 2022-06-20T20:12:10Z |
| mal-2022-6231 | Malicious code in spectral-macro-score-adapter (npm) | 2022-06-20T20:12:10Z | 2022-06-20T20:12:11Z |
| mal-2022-6244 | Malicious code in sportsdataio-adapter (npm) | 2022-06-20T20:12:10Z | 2022-06-20T20:12:17Z |
| mal-2022-6297 | Malicious code in stasis-adapter (npm) | 2022-06-20T20:12:11Z | 2022-06-20T20:12:17Z |
| mal-2022-6396 | Malicious code in synthetix-debt-pool-adapter (npm) | 2022-06-20T20:12:16Z | 2022-06-20T20:12:17Z |
| mal-2022-6405 | Malicious code in taapi-adapter (npm) | 2022-06-20T20:12:17Z | 2022-06-20T20:12:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-0014 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-05-17T22:00:00.000+00:00 | 2024-02-20T23:00:00.000+00:00 |
| wid-sec-w-2022-0202 | Nvidia Treiber: Mehrere Schwachstellen | 2022-05-17T22:00:00.000+00:00 | 2023-10-03T22:00:00.000+00:00 |
| wid-sec-w-2022-0283 | GIMP: Schwachstelle ermöglicht Denial of Service | 2022-05-17T22:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2022-0362 | vim: Schwachstelle ermöglicht Denial of Service, Manipulation und Codeausführung | 2022-05-17T22:00:00.000+00:00 | 2023-04-03T22:00:00.000+00:00 |
| wid-sec-w-2023-0090 | Jenkins: Mehrere Schwachstellen | 2022-05-17T22:00:00.000+00:00 | 2023-06-15T22:00:00.000+00:00 |
| wid-sec-w-2022-0363 | vim: Mehrere Schwachstellen | 2022-05-18T22:00:00.000+00:00 | 2023-12-14T23:00:00.000+00:00 |
| wid-sec-w-2022-2211 | BusyBox: Schwachstelle ermöglicht Denial of Service | 2022-05-18T22:00:00.000+00:00 | 2024-05-13T22:00:00.000+00:00 |
| wid-sec-w-2024-1032 | xpdf: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-05-18T22:00:00.000+00:00 | 2024-05-06T22:00:00.000+00:00 |
| wid-sec-w-2022-0364 | vim: Mehrere Schwachstellen | 2022-05-19T22:00:00.000+00:00 | 2025-10-09T22:00:00.000+00:00 |
| wid-sec-w-2022-1907 | Grafana: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-05-19T22:00:00.000+00:00 | 2024-01-23T23:00:00.000+00:00 |
| wid-sec-w-2022-0180 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-05-22T22:00:00.000+00:00 | 2023-07-13T22:00:00.000+00:00 |
| wid-sec-w-2022-0016 | Linux Kernel: Mehrere Schwachstellen | 2022-05-24T22:00:00.000+00:00 | 2024-04-24T22:00:00.000+00:00 |
| wid-sec-w-2023-0857 | IBM QRadar SIEM: Mehrere Schwachstellen | 2022-05-24T22:00:00.000+00:00 | 2023-04-04T22:00:00.000+00:00 |
| wid-sec-w-2022-0268 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-05-26T22:00:00.000+00:00 | 2024-07-09T22:00:00.000+00:00 |
| wid-sec-w-2022-0284 | logrotate: Schwachstelle ermöglicht Denial of Service | 2022-05-26T22:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| wid-sec-w-2022-0365 | CUPS: Schwachstelle ermöglicht Privilegieneskalation | 2022-05-26T22:00:00.000+00:00 | 2024-02-20T23:00:00.000+00:00 |
| wid-sec-w-2022-0932 | dpkg: Schwachstelle ermöglicht Manipulation von Dateien | 2022-05-26T22:00:00.000+00:00 | 2024-08-11T22:00:00.000+00:00 |
| wid-sec-w-2022-1661 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-05-26T22:00:00.000+00:00 | 2023-06-28T22:00:00.000+00:00 |
| wid-sec-w-2022-2256 | Red Hat Enterprise Linux und Virtualization: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-05-26T22:00:00.000+00:00 | 2025-12-15T23:00:00.000+00:00 |
| wid-sec-w-2022-0017 | MariaDB: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-05-29T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2022-0130 | vim: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-05-29T22:00:00.000+00:00 | 2025-10-09T22:00:00.000+00:00 |
| wid-sec-w-2022-0796 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-05-29T22:00:00.000+00:00 | 2024-02-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0131 | vim: Mehrere Schwachstellen | 2022-05-30T22:00:00.000+00:00 | 2025-10-09T22:00:00.000+00:00 |
| wid-sec-w-2022-0019 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-05-31T22:00:00.000+00:00 | 2024-07-10T22:00:00.000+00:00 |
| wid-sec-w-2022-0132 | vim: Schwachstelle ermöglicht Codeausführung | 2022-05-31T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0269 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-05-31T22:00:00.000+00:00 | 2024-04-17T22:00:00.000+00:00 |
| wid-sec-w-2023-0856 | IBM QRadar SIEM: Mehrere Schwachstellen | 2022-05-31T22:00:00.000+00:00 | 2023-04-04T22:00:00.000+00:00 |
| wid-sec-w-2022-0023 | Red Hat OpenShift: Mehrere Schwachstellen | 2022-06-01T22:00:00.000+00:00 | 2024-08-28T22:00:00.000+00:00 |
| wid-sec-w-2022-0028 | IBM Java: Mehrere Schwachstellen | 2022-06-01T22:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2022-0078 | vim: Schwachstelle ermöglicht Codeausführung | 2022-06-02T22:00:00.000+00:00 | 2023-12-14T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2008:0906 | Red Hat Security Advisory: java-1.6.0-ibm security update | 2008-10-24T14:44:00+00:00 | 2025-11-21T17:33:53+00:00 |
| rhsa-2008:0965 | Red Hat Security Advisory: lynx security update | 2008-10-27T17:08:00+00:00 | 2025-11-21T17:33:56+00:00 |
| rhsa-2008:0945 | Red Hat Security Advisory: flash-plugin security update | 2008-10-28T14:29:00+00:00 | 2026-01-13T20:58:43+00:00 |
| rhsa-2008:0971 | Red Hat Security Advisory: net-snmp security update | 2008-11-03T14:53:00+00:00 | 2025-11-21T17:33:57+00:00 |
| rhsa-2008:0957 | Red Hat Security Advisory: kernel security and bug fix update | 2008-11-04T10:11:00+00:00 | 2025-11-21T17:33:55+00:00 |
| rhsa-2008:0939 | Red Hat Security Advisory: openoffice.org security update | 2008-11-05T10:16:00+00:00 | 2025-11-21T17:33:55+00:00 |
| rhsa-2008:0967 | Red Hat Security Advisory: httpd security and bug fix update | 2008-11-11T18:24:00+00:00 | 2025-11-21T17:33:56+00:00 |
| rhsa-2008:0982 | Red Hat Security Advisory: gnutls security update | 2008-11-11T18:26:00+00:00 | 2025-11-21T17:34:00+00:00 |
| rhsa-2008:0980 | Red Hat Security Advisory: flash-plugin security update | 2008-11-12T17:23:00+00:00 | 2026-01-13T22:34:29+00:00 |
| rhsa-2008:0974 | Red Hat Security Advisory: acroread security update | 2008-11-12T17:26:00+00:00 | 2025-11-21T17:33:57+00:00 |
| rhsa-2008:0977 | Red Hat Security Advisory: seamonkey security update | 2008-11-13T02:04:00+00:00 | 2025-11-21T17:33:58+00:00 |
| rhsa-2008:0978 | Red Hat Security Advisory: firefox security update | 2008-11-13T02:18:00+00:00 | 2025-11-21T17:33:58+00:00 |
| rhsa-2008:0988 | Red Hat Security Advisory: libxml2 security update | 2008-11-17T16:15:00+00:00 | 2025-11-21T17:34:00+00:00 |
| rhsa-2008:0972 | Red Hat Security Advisory: kernel security and bug fix update | 2008-11-19T13:43:00+00:00 | 2025-11-21T17:33:59+00:00 |
| rhsa-2008:0976 | Red Hat Security Advisory: thunderbird security update | 2008-11-20T01:07:00+00:00 | 2025-11-21T17:33:58+00:00 |
| rhsa-2008:0580 | Red Hat Security Advisory: vim security update | 2008-11-25T08:41:00+00:00 | 2026-01-13T20:58:40+00:00 |
| rhsa-2008:0617 | Red Hat Security Advisory: vim security update | 2008-11-25T08:57:00+00:00 | 2025-11-21T17:33:36+00:00 |
| rhsa-2008:0618 | Red Hat Security Advisory: vim security update | 2008-11-25T09:00:00+00:00 | 2025-11-21T17:33:41+00:00 |
| rhsa-2008:1001 | Red Hat Security Advisory: tog-pegasus security update | 2008-11-25T09:05:00+00:00 | 2025-11-21T17:34:01+00:00 |
| rhsa-2008:0955 | Red Hat Security Advisory: java-1.4.2-ibm security update | 2008-11-25T09:45:00+00:00 | 2025-11-21T17:33:58+00:00 |
| rhsa-2008:0966 | Red Hat Security Advisory: Red Hat Application Stack v2.2 security and enhancement update | 2008-12-04T15:41:00+00:00 | 2025-11-21T17:33:56+00:00 |
| rhsa-2008:1018 | Red Hat Security Advisory: java-1.6.0-sun security update | 2008-12-04T15:45:00+00:00 | 2025-11-21T17:34:02+00:00 |
| rhsa-2008:1025 | Red Hat Security Advisory: java-1.5.0-sun security update | 2008-12-04T15:45:00+00:00 | 2025-11-21T17:34:03+00:00 |
| rhsa-2008:0981 | Red Hat Security Advisory: ruby security update | 2008-12-04T15:56:00+00:00 | 2025-11-21T17:34:00+00:00 |
| rhsa-2008:1007 | Red Hat Security Advisory: tomcat security update for Red Hat Network Satellite Server | 2008-12-08T09:02:00+00:00 | 2025-11-21T17:34:01+00:00 |
| rhsa-2008:1016 | Red Hat Security Advisory: enscript security update | 2008-12-15T12:51:00+00:00 | 2025-11-21T17:34:01+00:00 |
| rhsa-2008:1023 | Red Hat Security Advisory: pidgin security and bug fix update | 2008-12-15T13:10:00+00:00 | 2025-11-21T17:34:03+00:00 |
| rhsa-2008:1028 | Red Hat Security Advisory: cups security update | 2008-12-15T13:20:00+00:00 | 2025-11-21T17:34:03+00:00 |
| rhsa-2008:1029 | Red Hat Security Advisory: cups security update | 2008-12-15T13:25:00+00:00 | 2025-11-21T17:34:03+00:00 |
| rhsa-2008:1021 | Red Hat Security Advisory: enscript security update | 2008-12-15T15:01:00+00:00 | 2025-11-21T17:34:02+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsma-21-047-01 | Hamilton-T1 | 2021-02-16T00:00:00.000000Z | 2021-02-16T00:00:00.000000Z |
| icsa-21-049-01 | Johnson Controls Metasys Reporting Engine (MRE) Web Services | 2021-02-18T00:00:00.000000Z | 2021-02-18T00:00:00.000000Z |
| icsa-21-049-02 | Mitsubishi Electric FA Engineering Software Products (Update H) | 2021-02-18T07:00:00.000000Z | 2025-06-05T06:00:00.000000Z |
| icsa-21-054-01 | Rockwell Automation FactoryTalk Services Platform | 2021-02-23T00:00:00.000000Z | 2021-02-23T00:00:00.000000Z |
| icsa-21-054-02 | Advantech BB-ESWGP506-2SFP-T | 2021-02-23T00:00:00.000000Z | 2021-02-23T00:00:00.000000Z |
| icsa-21-054-03 | Advantech Spectre RT Industrial Routers | 2021-02-23T00:00:00.000000Z | 2021-02-23T00:00:00.000000Z |
| icsa-21-054-04 | Ovarro TBox (Update A) | 2021-02-23T00:00:00.000000Z | 2021-09-23T00:00:00.000000Z |
| icsa-21-056-01 | PerFact OpenVPN-Client | 2021-02-25T00:00:00.000000Z | 2021-02-25T00:00:00.000000Z |
| icsa-21-056-02 | FATEK Automation FvDesigner | 2021-02-25T00:00:00.000000Z | 2021-02-25T00:00:00.000000Z |
| icsa-21-056-03 | Rockwell Automation Logix Controllers (Update A) | 2021-02-25T00:00:00.000000Z | 2021-03-18T00:00:00.000000Z |
| icsa-21-056-04 | ProSoft Technology ICX35 | 2021-02-25T00:00:00.000000Z | 2021-02-25T00:00:00.000000Z |
| icsa-21-061-01 | Hitachi ABB Power Grids Ellipse EAM | 2021-03-02T00:00:00.000000Z | 2021-03-02T00:00:00.000000Z |
| icsa-21-061-02 | Rockwell Automation CompactLogix 5370 and ControlLogix 5570 Controllers (Update A) | 2021-03-02T00:00:00.000000Z | 2021-03-23T00:00:00.000000Z |
| icsa-21-061-03 | MB connect line mbCONNECT24, mymbCONNECT24 | 2021-03-02T00:00:00.000000Z | 2021-03-02T00:00:00.000000Z |
| icsa-21-063-01 | Rockwell Automation 1734-AENTR Series B and Series C | 2021-03-04T00:00:00.000000Z | 2021-03-04T00:00:00.000000Z |
| icsa-21-063-02 | ICSA-21-063-02_Schneider Electric EcoStruxure Building Operation (EBO) | 2021-03-04T00:00:00.000000Z | 2021-03-04T00:00:00.000000Z |
| icsa-21-068-01 | Siemens SIMATIC S7-PLCSIM | 2021-03-09T00:00:00.000000Z | 2021-03-09T00:00:00.000000Z |
| icsa-21-068-02 | Siemens SCALANCE and RUGGEDCOM Devices SSH (Update A) | 2021-03-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-068-03 | Siemens SCALANCE and RUGGEDCOM Devices (Update A) | 2021-03-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-068-04 | Siemens SINEMA Remote Connect Server | 2021-03-09T00:00:00.000000Z | 2021-03-09T00:00:00.000000Z |
| icsa-21-068-05 | Siemens LOGO! 8 BM | 2021-03-09T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-21-068-06 | Siemens TCP/IP Stack Vulnerabilities-AMNESIA:33 in SENTRON PAC / 3VA Devices (Update C) | 2021-03-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-068-07 | Siemens TCP Stack of SIMATIC MV400 | 2021-03-09T00:00:00.000000Z | 2021-03-09T00:00:00.000000Z |
| icsa-21-068-08 | Siemens Energy PLUSCONTROL 1st Gen | 2021-03-09T00:00:00.000000Z | 2021-03-09T00:00:00.000000Z |
| icsa-21-068-09 | Siemens Solid Edge File Parsing | 2021-03-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-070-01 | Schneider Electric IGSS SCADA Software | 2021-03-11T00:00:00.000000Z | 2021-03-11T00:00:00.000000Z |
| icsa-21-075-01 | Advantech WebAccess/SCADA | 2021-03-16T00:00:00.000000Z | 2021-03-16T00:00:00.000000Z |
| icsa-21-075-02 | GE UR family | 2021-03-16T00:00:00.000000Z | 2021-03-16T00:00:00.000000Z |
| icsa-21-075-03 | Hitachi ABB Power Grids AFS Series | 2021-03-16T00:00:00.000000Z | 2021-03-16T00:00:00.000000Z |
| icsa-21-077-01 | Johnson Controls Exacq Technologies exacqVision | 2021-03-18T00:00:00.000000Z | 2021-03-18T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-amp-imm-dll-5paz3hrv | Cisco Advanced Malware Protection for Endpoints and Immunet for Windows DLL Hijacking Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-asr-mem-leak-dos-mtwghkk3 | Cisco StarOS IPv4 Denial of Service Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssm-multici-pgg5wm5a | Cisco Smart Software Manager Satellite Web UI Command Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssm-sc-jd42d4tq | Cisco Smart Software Manager Satellite Static Credential Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssm-sqi-h5fdvzwp | Cisco Smart Software Manager Satellite SQL Injection Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssmor-mdcwkt2x | Cisco Smart Software Manager Satellite Open Redirect Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-api-path-tptapx2p | Cisco Data Center Network Manager REST API Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-authbypass-ohbpbxu | Cisco Data Center Network Manager Authorization Bypass Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-cert-check-bdzzv9t3 | Cisco Data Center Network Manager Certificate Validation Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-info-disc-qcsjb6yg | Cisco Data Center Network Manager Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-sql-inj-oaqoobp | Cisco Data Center Network Manager SQL Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-ssrf-f2vx6q5p | Cisco Data Center Network Manager Server-Side Request Forgery Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-xss-vulns-guuj39gh | Cisco Data Center Network Manager Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dnac-cmdinj-erumswh9 | Cisco DNA Center Command Runner Command Injection Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dnac-csrf-dc83cmcv | Cisco DNA Center Cross-Site Request Forgery Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-25T14:01:28+00:00 |
| cisco-sa-dnac-privesc-6qja3hvh | Cisco DNA Center Privilege Escalation Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-02-02T17:55:38+00:00 |
| cisco-sa-dnacid-ofeerjcn | Cisco DNA Center Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-26T14:34:33+00:00 |
| cisco-sa-esa-wsa-sma-info-rhp44vac | Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-esc-dos-4gw6d527 | Cisco Elastic Services Controller Denial of Service Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-imp-trav-inj-dm687zd6 | Cisco Unified Communications Products Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-sdwan-abyp-tngfhrs | Cisco SD-WAN vManage Authorization Bypass Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-02-02T22:20:48+00:00 |
| cisco-sa-sdwan-bufovulns-b5nrshbj | Cisco SD-WAN Buffer Overflow Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-sdwan-cmdinjm-9qmsmgcn | Cisco SD-WAN Command Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-02-02T22:17:18+00:00 |
| cisco-sa-sdwan-dosmulti-48jjueup | Cisco SD-WAN Denial of Service Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-02-02T22:21:54+00:00 |
| cisco-sa-sdwan-infodis-2-upo232dg | Cisco SD-WAN Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-sdwan-vinfdis-mc8l58dj | Cisco SD-WAN vManage Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-umb-dos-dgkzdebp | Cisco Umbrella Dashboard Packet Flood Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-vman-pathtrav-z5mcvsjf | Cisco SD-WAN vManage Software Path Traversal Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-vman-sqlinjm-xv8dsjq5 | Cisco SD-WAN vManage SQL Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-vmanage-cql-inject-72ehnuc | Cisco SD-WAN vManage Cypher Query Language Injection Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-40442 | Microsoft Excel Remote Code Execution Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-16T08:00:00.000Z |
| msrc_cve-2021-41349 | Microsoft Exchange Server Spoofing Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-11T08:00:00.000Z |
| msrc_cve-2021-41351 | Microsoft Edge (Chrome based) Spoofing on IE Mode | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41356 | Windows Denial of Service Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41366 | Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41367 | NTFS Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41368 | Microsoft Access Remote Code Execution Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41370 | NTFS Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41371 | Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41372 | Power BI Report Server Spoofing Vulnerability | 2021-11-09T08:00:00.000Z | 2022-04-15T07:00:00.000Z |
| msrc_cve-2021-41373 | FSLogix Information Disclosure Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41374 | Azure Sphere Information Disclosure Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41375 | Azure Sphere Information Disclosure Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41376 | Azure Sphere Information Disclosure Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41377 | Windows Fast FAT File System Driver Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-15T08:00:00.000Z |
| msrc_cve-2021-41378 | Windows NTFS Remote Code Execution Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41379 | Windows Installer Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42274 | Windows Hyper-V Discrete Device Assignment (DDA) Denial of Service Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42275 | Microsoft COM for Windows Remote Code Execution Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42276 | Microsoft Windows Media Foundation Remote Code Execution Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42277 | Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42278 | Active Directory Domain Services Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42279 | Chakra Scripting Engine Memory Corruption Vulnerability | 2021-11-09T08:00:00.000Z | 2022-08-03T07:00:00.000Z |
| msrc_cve-2021-42280 | Windows Feedback Hub Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42282 | Active Directory Domain Services Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42283 | NTFS Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42284 | Windows Hyper-V Denial of Service Vulnerability | 2021-11-09T08:00:00.000Z | 2022-01-14T08:00:00.000Z |
| msrc_cve-2021-42285 | Windows Kernel Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42286 | Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42287 | Active Directory Domain Services Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202101-1967 | C2000-B2-SFE0101-BB1 serial port server provides serial port to network function, which c… | 2022-05-04T09:42:09.151000Z |
| var-202012-1626 | Beijing Wanwei Yingchuang Technology Development Co., Ltd. is committed to the R&D and ap… | 2022-05-04T09:42:11.078000Z |
| var-202012-1605 | Forcecontrol is a monitoring configuration software, mainly used for data acquisition and… | 2022-05-04T09:42:11.088000Z |
| var-202012-1583 | ER3260 is a router of New H3C Technology Co., Ltd. New H3C Technology Co., Ltd. H3C-E… | 2022-05-04T09:42:11.100000Z |
| var-202011-1596 | M580 is a PLC in Schneider's Modicon PLC series. It is the first high-end integrated cont… | 2022-05-04T09:42:15.491000Z |
| var-202011-1574 | Tianqing Security Isolation and Information Exchange System is an access control switch d… | 2022-05-04T09:42:15.502000Z |
| var-202011-1553 | CP1L is an Omron small PLC series, integrated PLC with built-in pulse output, analog inpu… | 2022-05-04T09:42:15.514000Z |
| var-202011-1532 | FPWIN GR is a PLC programming software developed by Panasonic. It is used for PLC design,… | 2022-05-04T09:42:15.524000Z |
| var-202010-1659 | Shanghai ZLAN Information Technology Co., Ltd. is a high-tech enterprise that provides in… | 2022-05-04T09:42:16.694000Z |
| var-202010-1638 | WebAccess Node is an HMI/SCADA monitoring software completely based on IE browser from Ad… | 2022-05-04T09:42:16.706000Z |
| var-202010-1617 | Sangfor Technology Co., Ltd. is a provider of products, services and solutions focusing o… | 2022-05-04T09:42:16.722000Z |
| var-202010-1596 | Hangzhou Hikvision System Technology Co., Ltd. is a provider of security products and ind… | 2022-05-04T09:42:16.732000Z |
| var-202009-1714 | Weak passwords refer to passwords that only contain simple numbers and letters, such as "… | 2022-05-04T09:42:18.519000Z |
| var-202009-1672 | AM600-PS2 is a medium-sized programmable logic controller (PLC) designed with a modular s… | 2022-05-04T09:42:18.540000Z |
| var-202008-1318 | Hollysys was founded in 1993 and is a leading supplier of automation and information tech… | 2022-05-04T09:42:19.856000Z |
| var-202008-1297 | Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. A… | 2022-05-04T09:42:19.867000Z |
| var-202007-1506 | The AC15 upgrade software is produced by Shenzhen Jixiang Tengda Technology Co., Ltd. It … | 2022-05-04T09:42:23.999000Z |
| var-202006-1924 | Zhejiang Yushi Technology Co., Ltd. (abbreviation: Yushi) was founded in 2011 and is a gl… | 2022-05-04T09:42:25.755000Z |
| var-202006-1903 | Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chi… | 2022-05-04T09:42:25.766000Z |
| var-202005-1092 | FameView configuration software is a high-performance configuration monitoring software b… | 2022-05-04T09:42:27.212000Z |
| var-202005-1071 | Prolink Technology Co., Ltd. (hereinafter referred to as "TP-LINK") is the world's leadin… | 2022-05-04T09:42:27.223000Z |
| var-202004-2236 | NA-VIEW is a touch screen configuration software. NA-VIEW V2.0 (only for 15-inch touc… | 2022-05-04T09:42:28.417000Z |
| var-202003-1138 | Some Huawei products have a security vulnerability due to improper authentication. A remo… | 2022-05-04T09:42:34.110000Z |
| var-202002-1693 | Siemens is the world's leading technology company. With innovations in the fields of elec… | 2022-05-04T09:42:35.275000Z |
| var-202001-1992 | JCG Q9PRO is a home wireless router that supports WPS one-key encryption, etc., and has h… | 2022-05-04T09:42:36.891000Z |
| var-202001-1971 | JCG JHR-N835R, with USB shared storage, shared printer and other functions. It still cont… | 2022-05-04T09:42:36.901000Z |
| var-201912-2009 | Xiaomi AI speaker is a smart speaker product produced by Xiaomi. There is a heap corrupt… | 2022-05-04T09:42:42.047000Z |
| var-201911-1953 | TP-LINK TL-WR703N is a mini wireless router of China TP-Link. The TP-LINK TL-WR703N rout… | 2022-05-04T09:42:43.357000Z |
| var-201910-1865 | EDS-405A / 408A series are 5-port and 8-port entry-level managed Ethernet switches design… | 2022-05-04T09:42:45.337000Z |
| var-201908-2204 | Jinan Youren Internet Technology Co., Ltd. is a technology company that makes serial netw… | 2022-05-04T09:42:51.050000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000167 | Multiple plugins for Geeklog IVYWE edition vulnerable to cross-site scripting | 2016-09-23T14:15+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000169 | ManageEngine ServiceDesk Plus vulnerable to cross-site scripting | 2016-09-29T14:39+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000170 | ManageEngine ServiceDesk Plus fails to restrict access permissions | 2016-09-29T14:39+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000171 | ManageEngine ServiceDesk Plus uses an insecure method for cookie generation | 2016-09-29T14:39+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000172 | baserCMS vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:36+09:00 |
| jvndb-2016-000173 | baserCMS plugin Mail vulnerable to cross-site scripting | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000174 | baserCMS plugin Mail vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000175 | baserCMS plugin Blog vulnerable to cross-site scripting | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000176 | baserCMS plugin Blog vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000177 | baserCMS vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000178 | baserCMS vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000179 | baserCMS vulnerable to cross-site scripting | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000180 | baserCMS plugin Blog vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000181 | baserCMS plugin Feed vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000182 | baserCMS plugin Mail vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000183 | baserCMS plugin Uploader vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000194 | Docomo L-04D mobile WiFi router vulnerable to cross-site request forgery | 2016-10-03T15:17+09:00 | 2018-01-17T11:53+09:00 |
| jvndb-2016-000184 | "Customapp" function in Cybozu Office vulnerable to cross-site scripting | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000185 | "Project" function in Cybozu Office vulnerable to cross-site scripting | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000186 | "Schedule" function in Cybozu Office vulnerable to cross-site scripting | 2016-10-03T15:43+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000187 | "Project" function in Cybozu Office vulnerable vulnerable to access restriction bypass | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000188 | Breadcrumb trail in Cybozu Office vulnerable vulnerable to browse restriction bypass | 2016-10-03T15:43+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000189 | "Project" function in Cybozu Office vulnerable vulnerable to operation restriction bypass | 2016-10-03T15:43+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000190 | Cybozu Office vulnerable to mail header injection | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000191 | Cybozu Office vulnerable to information disclosure | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000192 | Cybozu Office vulnerable to denial-of-service (DoS) | 2016-10-03T15:46+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000193 | Cybozu Office vulnerable to Reflected File Download (RFD) | 2016-10-03T15:47+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000202 | Usermin cross-site scripting vulnerabilties | 2016-10-07T13:50+09:00 | 2017-05-16T17:52+09:00 |
| jvndb-2016-000195 | Cryptography API: Next Generation (CNG) vulnerable to denial-of-service (DoS) | 2016-10-07T14:11+09:00 | 2016-10-07T14:11+09:00 |
| jvndb-2016-000196 | SetucoCMS vulnerable to cross-site request forgery | 2016-10-07T15:04+09:00 | 2017-05-17T14:44+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2017:0759-1 | Security update for Linux Kernel Live Patch 13 for SLE 12 | 2017-03-20T19:48:11Z | 2017-03-20T19:48:11Z |
| suse-su-2017:0769-1 | Security update for Linux Kernel Live Patch 14 for SLE 12 | 2017-03-20T19:48:20Z | 2017-03-20T19:48:20Z |
| suse-su-2017:0767-1 | Security update for Linux Kernel Live Patch 15 for SLE 12 | 2017-03-20T19:48:28Z | 2017-03-20T19:48:28Z |
| suse-su-2017:0770-1 | Security update for Linux Kernel Live Patch 16 for SLE 12 | 2017-03-20T19:48:36Z | 2017-03-20T19:48:36Z |
| suse-su-2017:0772-1 | Security update for Linux Kernel Live Patch 17 for SLE 12 | 2017-03-20T19:48:46Z | 2017-03-20T19:48:46Z |
| suse-su-2017:0766-1 | Security update for Linux Kernel Live Patch 18 for SLE 12 | 2017-03-20T19:48:55Z | 2017-03-20T19:48:55Z |
| suse-su-2017:0774-1 | Security update for Linux Kernel Live Patch 4 for SLE 12 SP1 | 2017-03-20T19:49:02Z | 2017-03-20T19:49:02Z |
| suse-su-2017:0762-1 | Security update for Linux Kernel Live Patch 5 for SLE 12 SP1 | 2017-03-20T19:49:09Z | 2017-03-20T19:49:09Z |
| suse-su-2017:0775-1 | Security update for Linux Kernel Live Patch 6 for SLE 12 SP1 | 2017-03-20T19:49:16Z | 2017-03-20T19:49:16Z |
| suse-su-2017:0760-1 | Security update for Linux Kernel Live Patch 7 for SLE 12 SP1 | 2017-03-20T19:49:24Z | 2017-03-20T19:49:24Z |
| suse-su-2017:0763-1 | Security update for Linux Kernel Live Patch 8 for SLE 12 SP1 | 2017-03-20T19:49:31Z | 2017-03-20T19:49:31Z |
| suse-su-2017:0773-1 | Security update for Linux Kernel Live Patch 9 for SLE 12 SP1 | 2017-03-20T19:50:38Z | 2017-03-20T19:50:38Z |
| suse-su-2017:0764-1 | Security update for Linux Kernel Live Patch 10 for SLE 12 SP1 | 2017-03-20T19:50:49Z | 2017-03-20T19:50:49Z |
| suse-su-2017:0768-1 | Security update for Linux Kernel Live Patch 0 for SLE 12 SP2 | 2017-03-20T19:50:56Z | 2017-03-20T19:50:56Z |
| suse-su-2017:0781-1 | Security update for Linux Kernel Live Patch 3 for SLE 12 SP2 | 2017-03-20T20:25:48Z | 2017-03-20T20:25:48Z |
| suse-su-2017:0778-1 | Security update for Linux Kernel Live Patch 2 for SLE 12 SP2 | 2017-03-20T20:25:56Z | 2017-03-20T20:25:56Z |
| suse-su-2017:0777-1 | Security update for Linux Kernel Live Patch 1 for SLE 12 SP2 | 2017-03-20T20:26:05Z | 2017-03-20T20:26:05Z |
| suse-su-2017:0776-1 | Security update for Linux Kernel Live Patch 11 for SLE 12 SP1 | 2017-03-20T20:26:14Z | 2017-03-20T20:26:14Z |
| suse-su-2017:0780-1 | Security update for Linux Kernel Live Patch 19 for SLE 12 | 2017-03-20T20:26:24Z | 2017-03-20T20:26:24Z |
| suse-su-2017:0779-1 | Security update for Linux Kernel Live Patch 4 for SLE 12 SP2 | 2017-03-20T20:57:41Z | 2017-03-20T20:57:41Z |
| suse-su-2017:0786-1 | Security update for Linux Kernel Live Patch 12 for SLE 12 SP1 | 2017-03-21T14:13:57Z | 2017-03-21T14:13:57Z |
| suse-su-2017:0801-1 | Security update for apache2 | 2017-03-22T14:52:52Z | 2017-03-22T14:52:52Z |
| suse-su-2017:0797-1 | Security update for apache2 | 2017-03-22T14:54:19Z | 2017-03-22T14:54:19Z |
| suse-su-2017:0800-1 | Security update for wget | 2017-03-22T14:55:50Z | 2017-03-22T14:55:50Z |
| suse-su-2017:0798-1 | Security update for virglrenderer | 2017-03-22T14:57:19Z | 2017-03-22T14:57:19Z |
| suse-su-2017:0799-1 | Security update for wget | 2017-03-22T14:59:33Z | 2017-03-22T14:59:33Z |
| suse-su-2017:0841-1 | Security update for samba | 2017-03-28T14:34:02Z | 2017-03-28T14:34:02Z |
| suse-su-2017:0367-1 | Security update for ceph | 2017-03-28T14:34:35Z | 2017-03-28T14:34:35Z |
| suse-su-2017:0839-1 | Security update for java-1_8_0-ibm | 2017-03-28T14:35:23Z | 2017-03-28T14:35:23Z |
| suse-ru-2017:0843-1 | Recommended update for ImageMagick | 2017-03-29T00:38:37Z | 2017-03-29T00:38:37Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2020:1505-1 | Security update for libetpan | 2020-09-22T16:22:35Z | 2020-09-22T16:22:35Z |
| opensuse-su-2020:1506-1 | Security update for lilypond | 2020-09-22T16:22:41Z | 2020-09-22T16:22:41Z |
| opensuse-su-2020:1509-1 | Recommended update for otrs | 2020-09-23T08:23:03Z | 2020-09-23T08:23:03Z |
| opensuse-su-2020:1510-1 | Security update for chromium | 2020-09-23T10:23:34Z | 2020-09-23T10:23:34Z |
| opensuse-su-2020:1511-1 | Security update for virtualbox | 2020-09-23T22:20:49Z | 2020-09-23T22:20:49Z |
| opensuse-su-2020:1513-1 | Security update for samba | 2020-09-24T07:17:10Z | 2020-09-24T07:17:10Z |
| opensuse-su-2020:1514-1 | Security update for chromium | 2020-09-24T07:26:44Z | 2020-09-24T07:26:44Z |
| opensuse-su-2020:1516-1 | Security update for roundcubemail | 2020-09-24T12:21:24Z | 2020-09-24T12:21:24Z |
| opensuse-su-2020:1517-1 | Security update for jasper | 2020-09-24T12:21:31Z | 2020-09-24T12:21:31Z |
| opensuse-su-2020:1523-1 | Security update for jasper | 2020-09-25T04:22:30Z | 2020-09-25T04:22:30Z |
| opensuse-su-2020:1525-1 | Security update for ovmf | 2020-09-25T04:22:43Z | 2020-09-25T04:22:43Z |
| opensuse-su-2020:1526-1 | Security update for samba | 2020-09-25T08:28:35Z | 2020-09-25T08:28:35Z |
| opensuse-su-2020:1527-1 | Security update for chromium | 2020-09-25T08:43:00Z | 2020-09-25T08:43:00Z |
| opensuse-su-2020:1529-1 | Security update for singularity | 2020-09-25T10:22:50Z | 2020-09-25T10:22:50Z |
| opensuse-su-2020:1530-1 | Security update for libqt4 | 2020-09-25T16:21:06Z | 2020-09-25T16:21:06Z |
| opensuse-su-2020:1533-1 | Security update for rubygem-actionpack-5_1 | 2020-09-25T18:21:50Z | 2020-09-25T18:21:50Z |
| opensuse-su-2020:1534-1 | Security update for openldap2 | 2020-09-25T22:21:20Z | 2020-09-25T22:21:20Z |
| opensuse-su-2020:1535-1 | Security update for ovmf | 2020-09-25T22:21:27Z | 2020-09-25T22:21:27Z |
| opensuse-su-2020:1536-1 | Security update for rubygem-actionpack-5_1 | 2020-09-26T04:20:41Z | 2020-09-26T04:20:41Z |
| opensuse-su-2020:1539-1 | Security update for openldap2 | 2020-09-26T04:20:56Z | 2020-09-26T04:20:56Z |
| opensuse-su-2020:1542-1 | Security update for chromium | 2020-09-26T12:21:27Z | 2020-09-26T12:21:27Z |
| opensuse-su-2020:1550-1 | Security update for chromium | 2020-09-27T04:22:07Z | 2020-09-27T04:22:07Z |
| opensuse-su-2020:1552-1 | Security update for conmon, fuse-overlayfs, libcontainers-common, podman | 2020-09-27T10:22:27Z | 2020-09-27T10:22:27Z |
| opensuse-su-2020:1555-1 | Security update for MozillaFirefox | 2020-09-27T19:47:11Z | 2020-09-27T19:47:11Z |
| opensuse-su-2020:1556-1 | Security update for pdns | 2020-09-27T22:21:46Z | 2020-09-27T22:21:46Z |
| opensuse-su-2020:1559-1 | Security update for conmon, fuse-overlayfs, libcontainers-common, podman | 2020-09-28T08:21:39Z | 2020-09-28T08:21:39Z |
| opensuse-su-2020:1560-1 | Security update for bcm43xx-firmware | 2020-09-28T08:21:47Z | 2020-09-28T08:21:47Z |
| opensuse-su-2020:1561-1 | Security update for tiff | 2020-09-28T08:21:53Z | 2020-09-28T08:21:53Z |
| opensuse-su-2020:1564-1 | Security update for libqt5-qtbase | 2020-09-28T10:20:30Z | 2020-09-28T10:20:30Z |
| opensuse-su-2020:1568-1 | Security update for libqt5-qtbase | 2020-09-28T16:21:01Z | 2020-09-28T16:21:01Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-01465 | Drupal Feature Set模块跨站请求伪造漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01466 | Drupal Node basket Payments模块存在多个漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01467 | Drupal Commerce Balanced Payments模块存在多个漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01468 | HP XP P9000 Command View Advanced Edition Software Online Help跨站脚本漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01469 | PTC Creo View任意代码执行漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01470 | DLGuard 'index.php'信息泄露漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01471 | Maroyaka CGI Maroyaka Simple Board跨站脚本漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01472 | Maroyaka CGI Maroyaka Image Album跨站脚本漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01473 | Maroyaka CGI Maroyaka Relay Novel跨站脚本漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01474 | Drupal Global Redirect模块开放式转向功能漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01475 | PHP地址簿存在多个SQL注入和多个跨站脚本漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01477 | Loxone Smart Home拒绝服务漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01478 | Loxone Smart Home HTML注入漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01479 | Loxone Smart Home多个跨站脚本漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01480 | Loxone Smart Home HTTP应答拆分漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01481 | Loxone Smart Home跨站点请求伪造漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01482 | Drupal Spider Contacts模块存在多个跨站请求伪造漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01483 | WordPress Newsletter Plug-in URL重定向漏洞 | 2015-03-05 | 2015-03-09 |
| cnvd-2015-01484 | WordPress 'Max Banner Ads'插件跨站脚本漏洞 | 2015-03-05 | 2015-03-09 |
| cnvd-2015-01485 | Webshop hun跨站脚本漏洞 | 2015-03-05 | 2015-03-09 |
| cnvd-2015-01486 | Webshop hun目录遍历漏洞 | 2015-03-05 | 2015-03-09 |
| cnvd-2015-01487 | Webshop hun SQL注入漏洞 | 2015-03-05 | 2015-03-09 |
| cnvd-2015-01488 | 多个Solarwinds产品core Orion存在多个SQL注入漏洞 | 2015-03-05 | 2015-03-09 |
| cnvd-2015-01489 | D-Link DIR-636L存在多个漏洞 | 2015-03-05 | 2015-03-09 |
| cnvd-2015-01504 | Xen外部X86系统设备模拟信息泄露漏洞 | 2015-03-05 | 2015-03-10 |
| cnvd-2015-01505 | Xen版本信息hypercall信息泄露漏洞 | 2015-03-05 | 2015-03-10 |
| cnvd-2015-01559 | SSL/TLS加密降级中间人劫持漏洞 | 2015-03-05 | 2015-03-11 |
| cnvd-2016-00954 | Ashampoo Photo Commander内存破坏漏洞 | 2015-03-05 | 2015-04-20 |
| cnvd-2016-06795 | 广州市问途信息技术有限公司酒店在线直销平台存在SQL注入漏洞 | 2015-03-05 | 2015-06-05 |
| cnvd-2016-06796 | 广州市问途信息技术有限公司酒店在线直销平台存在越权访问漏洞 | 2015-03-05 | 2015-06-05 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2005-avi-324 | Vulnérabilité sur Novell Netware | 2005-08-31T00:00:00.000000 | 2005-08-31T00:00:00.000000 |
| certa-2005-avi-325 | Vulnérabilité des clients DHCP sous Solaris 10 | 2005-08-31T00:00:00.000000 | 2005-08-31T00:00:00.000000 |
| certa-2005-avi-326 | Vulnérabilité de DameWare Mini Remote Control | 2005-09-01T00:00:00.000000 | 2005-09-01T00:00:00.000000 |
| certa-2005-avi-327 | Vulnérabilité de l'interface utilisateur du Firewall de Microsoft Windows | 2005-09-02T00:00:00.000000 | 2005-09-02T00:00:00.000000 |
| certa-2005-avi-328 | Vulnérabilité sur Phorum | 2005-09-05T00:00:00.000000 | 2005-09-05T00:00:00.000000 |
| certa-2005-avi-329 | Vulnérabilité de OpenSSH | 2005-09-05T00:00:00.000000 | 2005-10-07T00:00:00.000000 |
| certa-2005-avi-330 | Vulnérabilité de 3Com Network Supervisor | 2005-09-05T00:00:00.000000 | 2005-09-05T00:00:00.000000 |
| certa-2005-avi-331 | Vulnérabilité dans mod_ssl | 2005-09-05T00:00:00.000000 | 2005-09-19T00:00:00.000000 |
| certa-2005-avi-332 | Vulnérabilité du client LiveUpdate de Symantec | 2005-09-05T00:00:00.000000 | 2005-09-05T00:00:00.000000 |
| certa-2005-avi-333 | Vulnérabilité dans KDE | 2005-09-06T00:00:00.000000 | 2005-09-06T00:00:00.000000 |
| certa-2005-avi-334 | Vulnérabilité dans NTP | 2005-09-06T00:00:00.000000 | 2005-09-06T00:00:00.000000 |
| certa-2005-avi-335 | Vulnérabilité de OpenVPN | 2005-09-06T00:00:00.000000 | 2005-10-10T00:00:00.000000 |
| certa-2005-avi-336 | Vulnérabilité du moteur d'expressions régulières PCRE | 2005-09-07T00:00:00.000000 | 2006-03-10T00:00:00.000000 |
| certa-2005-avi-337 | Multiples vulnérabilités dans Squid | 2005-09-07T00:00:00.000000 | 2005-10-03T00:00:00.000000 |
| certa-2005-avi-338 | Vulnérabilité dans Cisco IOS | 2005-09-08T00:00:00.000000 | 2005-09-08T00:00:00.000000 |
| certa-2005-avi-340 | Vulnérabilités dans la plate-forme Java de HP-UX | 2005-09-08T00:00:00.000000 | 2005-09-08T00:00:00.000000 |
| certa-2005-avi-339 | Vulnérabilités dans le serveur <TT>Java Web Proxy</TT> de Sun | 2005-09-09T00:00:00.000000 | 2005-09-09T00:00:00.000000 |
| certa-2005-avi-341 | Vulnérabilité de l'outil de développement CVS | 2005-09-09T00:00:00.000000 | 2005-09-09T00:00:00.000000 |
| certa-2005-avi-342 | Vulnérabilité dans Microsft Exchange Server 2003 | 2005-09-09T00:00:00.000000 | 2005-09-09T00:00:00.000000 |
| certa-2005-avi-343 | Vulnérabilité de Snort | 2005-09-14T00:00:00.000000 | 2005-09-14T00:00:00.000000 |
| certa-2005-avi-344 | Multiples vulnérabilités de la plateforme Java sous MacOS X | 2005-09-14T00:00:00.000000 | 2005-09-14T00:00:00.000000 |
| certa-2005-avi-345 | Vulnérabilité dans Xfree86/X11/Xorg | 2005-09-15T00:00:00.000000 | 2005-09-26T00:00:00.000000 |
| certa-2005-avi-346 | Vulnérabilité des clients web Mozilla, Firefox, Thunderbird et Netscape | 2005-09-15T00:00:00.000000 | 2005-10-05T00:00:00.000000 |
| certa-2005-avi-347 | Vulnérabilité des équipements Lynksys | 2005-09-15T00:00:00.000000 | 2005-09-15T00:00:00.000000 |
| certa-2005-avi-348 | Multiples vulnérabilités dans ClamAV | 2005-09-19T00:00:00.000000 | 2005-09-29T00:00:00.000000 |
| certa-2005-avi-349 | Vulnérabilité dans TWiki | 2005-09-19T00:00:00.000000 | 2005-09-19T00:00:00.000000 |
| certa-2005-avi-350 | Vulnérabilité de GNU mailutils | 2005-09-19T00:00:00.000000 | 2005-10-10T00:00:00.000000 |
| certa-2005-avi-351 | Multiples vulnérabilités de FreeRADIUS | 2005-09-19T00:00:00.000000 | 2005-09-19T00:00:00.000000 |
| certa-2005-avi-352 | Vulnérabilité de SQUID | 2005-09-19T00:00:00.000000 | 2005-09-19T00:00:00.000000 |
| certa-2005-avi-353 | Vulnérabilité dans MySQL | 2005-09-19T00:00:00.000000 | 2005-10-10T00:00:00.000000 |