Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0483 |
N/A
|
The DocumentTemplate package in Zope 2.2 and earl… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:30.650Z |
| CVE-2000-0484 |
N/A
|
Small HTTP Server ver 3.06 contains a memory corr… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.038Z |
| CVE-2000-0485 |
N/A
|
Microsoft SQL Server allows local users to obtain… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:30.940Z |
| CVE-2000-0486 |
N/A
|
Buffer overflow in Cisco TACACS+ tac_plus server … |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.294Z |
| CVE-2000-0489 |
N/A
|
FreeBSD, NetBSD, and OpenBSD allow an attacker to… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.195Z |
| CVE-2000-0490 |
N/A
|
Buffer overflow in the NetWin DSMTP 2.7q in the N… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:30.850Z |
| CVE-2000-0493 |
N/A
|
Buffer overflow in Simple Network Time Sync (SMTS… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:30.869Z |
| CVE-2000-0494 |
N/A
|
Veritas Volume Manager creates a world writable .… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:30.587Z |
| CVE-2000-0495 |
N/A
|
Microsoft Windows Media Encoder allows remote att… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.067Z |
| CVE-2000-0497 |
N/A
|
IBM WebSphere server 3.0.2 allows a remote attack… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:30.891Z |
| CVE-2000-0499 |
N/A
|
The default configuration of BEA WebLogic 3.1.8 t… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:30.906Z |
| CVE-2000-0500 |
N/A
|
The default configuration of BEA WebLogic 5.1.0 a… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.241Z |
| CVE-2000-0501 |
N/A
|
Race condition in MDaemon 2.8.5.0 POP server allo… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.095Z |
| CVE-2000-0505 |
N/A
|
The Apache 1.3.x HTTP server for Windows platform… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.259Z |
| CVE-2000-0506 |
N/A
|
The "capabilities" feature in Linux before 2.2.16… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.163Z |
| CVE-2000-0507 |
N/A
|
Imate Webmail Server 2.5 allows remote attackers … |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:30.970Z |
| CVE-2000-0508 |
N/A
|
rpc.lockd in Red Hat Linux 6.1 and 6.2 allows rem… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.106Z |
| CVE-2000-0510 |
N/A
|
CUPS (Common Unix Printing System) 1.04 and earli… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:30.919Z |
| CVE-2000-0511 |
N/A
|
CUPS (Common Unix Printing System) 1.04 and earli… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:30.827Z |
| CVE-2000-0512 |
N/A
|
CUPS (Common Unix Printing System) 1.04 and earli… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.095Z |
| CVE-2000-0513 |
N/A
|
CUPS (Common Unix Printing System) 1.04 and earli… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.175Z |
| CVE-2000-0514 |
N/A
|
GSSFTP FTP daemon in Kerberos 5 1.1.x does not pr… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.086Z |
| CVE-2000-0515 |
N/A
|
The snmpd.conf configuration file for the SNMP da… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:30.480Z |
| CVE-2000-0516 |
N/A
|
When configured to store configuration informatio… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:30.774Z |
| CVE-2000-0517 |
N/A
|
Netscape 4.73 and earlier does not properly warn … |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:30.563Z |
| CVE-2000-0518 |
N/A
|
Internet Explorer 4.x and 5.x does not properly v… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.406Z |
| CVE-2000-0519 |
N/A
|
Internet Explorer 4.x and 5.x does not properly r… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:30.994Z |
| CVE-2000-0521 |
N/A
|
Savant web server allows remote attackers to read… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.336Z |
| CVE-2000-0522 |
N/A
|
RSA ACE/Server allows remote attackers to cause a… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:30.916Z |
| CVE-2000-0525 |
N/A
|
OpenSSH does not properly drop privileges when th… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:30.917Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0060 |
N/A
|
Buffer overflow in aVirt Rover POP3 server 1.1 al… |
n/a |
n/a |
2002-06-25T04:00:00.000Z | 2024-08-08T05:05:53.827Z |
| CVE-1999-1573 |
N/A
|
Multiple unknown vulnerabilities in the "r-cmnds"… |
n/a |
n/a |
2005-04-21T04:00:00.000Z | 2024-08-01T17:18:07.562Z |
| CVE-2000-0014 |
N/A
|
Denial of service in Savant web server via a null… |
n/a |
n/a |
2000-04-25T04:00:00.000Z | 2024-08-08T04:58:11.760Z |
| CVE-2000-0035 |
N/A
|
resend command in Majordomo allows local users to… |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-08T05:05:53.647Z |
| CVE-2000-0037 |
N/A
|
Majordomo wrapper allows local users to gain priv… |
n/a |
n/a |
2000-03-22T05:00:00.000Z | 2024-08-08T05:05:52.985Z |
| CVE-2000-0041 |
N/A
|
Macintosh systems generate large ICMP datagrams i… |
n/a |
n/a |
2000-03-22T05:00:00.000Z | 2024-08-08T05:05:52.750Z |
| CVE-2000-0007 |
N/A
|
Trend Micro PC-Cillin does not restrict access to… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:58:11.434Z |
| CVE-2000-0009 |
N/A
|
The bna_pass program in Optivity NETarchitect use… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T04:58:11.888Z |
| CVE-2000-0039 |
N/A
|
AltaVista search engine allows remote attackers t… |
n/a |
n/a |
2000-03-22T05:00:00.000Z | 2024-08-08T05:05:52.985Z |
| CVE-2000-0042 |
N/A
|
Buffer overflow in CSM mail server allows remote … |
n/a |
n/a |
2000-04-25T04:00:00.000Z | 2024-08-08T05:05:53.972Z |
| CVE-2000-0100 |
N/A
|
The SMS Remote Control program is installed with … |
n/a |
n/a |
2000-04-18T04:00:00.000Z | 2024-08-08T05:05:53.732Z |
| CVE-1999-0001 |
N/A
|
ip_input.c in BSD-derived TCP/IP implementations … |
n/a |
n/a |
2000-02-04T05:00:00.000Z | 2024-08-01T16:03:04.917Z |
| CVE-2000-0003 |
N/A
|
Buffer overflow in UnixWare rtpm program allows l… |
n/a |
n/a |
2000-03-22T05:00:00.000Z | 2024-08-08T04:58:11.525Z |
| CVE-2000-0043 |
N/A
|
Buffer overflow in CamShot WebCam HTTP server all… |
n/a |
n/a |
2000-04-25T04:00:00.000Z | 2024-08-08T05:05:53.904Z |
| CVE-2000-0076 |
N/A
|
nviboot boot script in the Debian nvi package all… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:05:53.920Z |
| CVE-1999-0154 |
N/A
|
IIS 2.0 and 3.0 allows remote attackers to read t… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T16:27:57.752Z |
| CVE-1999-0808 |
N/A
|
Multiple buffer overflows in ISC DHCP Distributio… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T16:48:38.035Z |
| CVE-1999-0815 |
N/A
|
Memory leak in SNMP agent in Windows NT 4.0 befor… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:48:38.123Z |
| CVE-1999-1035 |
N/A
|
IIS 3.0 and 4.0 on x86 and Alpha allows remote at… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T16:55:29.402Z |
| CVE-1999-1042 |
N/A
|
Cisco Resource Manager (CRM) 1.0 and 1.1 creates … |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T16:55:29.409Z |
| CVE-1999-1043 |
N/A
|
Microsoft Exchange Server 5.5 and 5.0 does not pr… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T16:55:29.473Z |
| CVE-1999-1055 |
N/A
|
Microsoft Excel 97 does not warn the user before … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:53.080Z |
| CVE-1999-1074 |
N/A
|
Webmin before 0.5 does not restrict the number of… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:53.696Z |
| CVE-1999-1084 |
N/A
|
The "AEDebug" registry key is installed with inse… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:02:53.650Z |
| CVE-1999-1087 |
N/A
|
Internet Explorer 4 treats a 32-bit number ("dotl… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:53.775Z |
| CVE-1999-1093 |
N/A
|
Buffer overflow in the Window.External function i… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:53.660Z |
| CVE-1999-1094 |
N/A
|
Buffer overflow in Internet Explorer 4.01 and ear… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:53.450Z |
| CVE-1999-1100 |
N/A
|
Cisco PIX Private Link 4.1.6 and earlier does not… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:53.610Z |
| CVE-1999-1102 |
N/A
|
lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and othe… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:53.617Z |
| CVE-1999-1104 |
N/A
|
Windows 95 uses weak encryption for the password … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:02:53.647Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-qr7j-h6gg-jmgc |
9.8 (3.1)
|
Deserialization of Untrusted Data in jackson-databind | 2019-07-16T17:42:21Z | 2024-03-01T21:46:19Z |
| ghsa-cmfg-87vq-g5g4 |
5.9 (3.1)
|
Deserialization of untrusted data in FasterXML jackson-databind | 2019-07-17T15:26:12Z | 2024-03-15T01:01:07Z |
| ghsa-5frh-8cmj-gc59 |
4.1 (3.1)
|
System.Management.Automation subject to bypass via script debugging | 2019-07-17T19:14:18Z | 2022-09-17T01:02:30Z |
| ghsa-r7j3-vvh2-xrpj |
7.8 (3.1)
|
OS Command Injection in MiniMagick | 2019-07-18T13:19:22Z | 2023-01-25T20:10:32Z |
| ghsa-9ccv-p7fg-m73x |
7.5 (3.1)
|
XML Injection in python-libnmap | 2019-07-18T15:38:41Z | 2024-10-15T16:43:37Z |
| ghsa-5wv5-4vpf-pj6m |
7.5 (3.1)
8.7 (4.0)
|
Pallets Project Flask is vulnerable to Denial of Service via Unexpected memory usage | 2019-07-19T16:12:46Z | 2024-09-20T21:04:58Z |
| ghsa-x5rq-j2xg-h7qm |
6.5 (3.1)
|
Regular Expression Denial of Service (ReDoS) in lodash | 2019-07-19T16:13:07Z | 2025-09-29T20:19:28Z |
| ghsa-mpf2-q34c-fc6j |
7.5 (3.1)
|
Infinite Loop in scapy | 2019-07-22T14:53:58Z | 2024-10-22T16:40:01Z |
| ghsa-hf23-9pf7-388p |
9.8 (3.1)
|
Deserialization of Untrusted Data and Code Injection in xstream | 2019-07-26T16:09:47Z | 2026-02-24T15:32:32Z |
| ghsa-vg35-vc9f-q7x2 |
9.8 (3.1)
9.3 (4.0)
|
Improper Restriction of XML External Entity Reference in ladon | 2019-07-26T16:09:54Z | 2024-09-27T18:25:35Z |
| ghsa-hh56-x62g-gvhc |
6.1 (3.1)
|
Cross-site scripting in CLEditor | 2019-07-26T16:10:06Z | 2021-08-17T19:04:59Z |
| ghsa-hrj5-qp7x-rpg6 |
9.8 (3.1)
|
SQL Injection in marginalia | 2019-07-26T16:10:15Z | 2023-01-25T22:46:17Z |
| ghsa-7vvr-h4p5-m7fh |
7.5 (3.1)
8.7 (4.0)
|
Aubio is vulnerable to a NULL pointer dereference in new_aubio_filterbank | 2019-07-26T16:10:20Z | 2024-09-13T14:19:43Z |
| ghsa-c6jq-h4jp-72pr |
7.5 (3.1)
8.7 (4.0)
|
Aubio is vulnerable to a NULL pointer dereference in new_aubio_notes function | 2019-07-26T16:10:25Z | 2024-09-04T20:26:30Z |
| ghsa-grmf-4fq6-2r79 |
9.8 (3.1)
9.3 (4.0)
|
aubio Buffer Overflow vulnerability | 2019-07-26T16:10:28Z | 2024-09-04T20:29:30Z |
| ghsa-hf4p-jm7r-vjjj |
9.8 (3.1)
|
Deserialization of Untrusted Data in EthereumJ | 2019-07-26T16:10:39Z | 2021-08-17T19:40:00Z |
| ghsa-j3jp-gvr5-7hwq |
8.8 (3.1)
8.7 (4.0)
|
python-engineio vulnerable to Cross-Site Request Forgery (CSRF) | 2019-07-30T20:47:25Z | 2024-10-25T20:48:05Z |
| ghsa-wg6j-r28m-7293 |
9.8 (3.1)
|
Code backdoor in simple_captcha2 | 2019-07-31T04:21:19Z | 2023-08-28T13:34:04Z |
| ghsa-rqp5-pg7w-832p |
9.8 (3.1)
|
datagrid contains code Injection backdoor | 2019-07-31T04:21:27Z | 2023-08-25T21:06:23Z |
| ghsa-qpxp-5j56-gg3x |
7.5 (3.1)
|
samlr XML nodes comment attack | 2019-07-31T04:22:03Z | 2023-08-08T16:12:35Z |
| ghsa-wqfc-cr59-h64p |
8.1 (3.1)
|
Missing Encryption of Sensitive Data in yarn | 2019-07-31T04:22:15Z | 2021-08-17T19:40:44Z |
| ghsa-j657-59rv-qwm6 |
5.4 (3.1)
|
Cross-Site Scripting in min-http-server | 2019-07-31T04:22:27Z | 2022-12-03T04:03:29Z |
| ghsa-7j93-2h6r-hm49 |
5.4 (3.1)
|
Cross-Site Scripting in http-file-server | 2019-07-31T04:22:36Z | 2023-02-01T09:19:41Z |
| ghsa-grgm-pph5-j5h7 |
5.4 (3.1)
5.3 (4.0)
|
Exposure of Sensitive Information to an Unauthorized Actor in ansible | 2019-07-31T04:22:49Z | 2024-09-04T20:45:43Z |
| ghsa-3gm7-v7vw-866c |
7.2 (3.1)
|
XML External Entity (XXE) Injection in Apache Solr | 2019-08-01T19:17:35Z | 2025-10-22T17:44:24Z |
| ghsa-jvpp-hxjj-5ccc |
4.9 (3.1)
|
Improper Input Validation and Missing Authentication for Critical Function in Apache ActiveMQ | 2019-08-01T19:17:45Z | 2023-12-20T20:40:44Z |
| ghsa-25pc-85qf-6j69 |
9.8 (3.1)
|
Deserialization of Untrusted Data in Apache Storm | 2019-08-01T19:17:53Z | 2021-08-17T20:24:21Z |
| ghsa-6fpp-rgj9-8rwc |
9.8 (3.1)
|
Deserialization of untrusted data in FasterXML jackson-databind | 2019-08-01T19:18:00Z | 2023-09-13T17:18:23Z |
| ghsa-gwp4-hfv6-p7hw |
7.5 (3.1)
|
Deserialization of untrusted data in FasterXML jackson-databind | 2019-08-01T19:18:06Z | 2023-11-27T23:03:26Z |
| ghsa-w69w-jvc7-wjgv |
7.5 (3.1)
|
Undertow Missing Authorization when requesting a protected directory without trailing slash | 2019-08-01T19:18:16Z | 2023-09-25T10:52:27Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-544 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.440204Z |
| pysec-2021-545 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.587221Z |
| pysec-2021-546 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing a complex … | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.733982Z |
| pysec-2021-547 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing invalid ar… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:01.886365Z |
| pysec-2021-639 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling TF operati… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:17.206359Z |
| pysec-2021-640 |
|
TensorFlow is an end-to-end open source platform for machine learning. If the `splits` ar… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:17.368785Z |
| pysec-2021-641 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:17.530281Z |
| pysec-2021-642 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_op… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:17.688674Z |
| pysec-2021-643 |
|
TensorFlow is an end-to-end open source platform for machine learning. A malicious user c… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:17.852782Z |
| pysec-2021-644 |
|
TensorFlow is an end-to-end open source platform for machine learning. In eager mode (def… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.016615Z |
| pysec-2021-645 |
|
TensorFlow is an end-to-end open source platform for machine learning. The API of `tf.raw… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.174701Z |
| pysec-2021-646 |
|
TensorFlow is an end-to-end open source platform for machine learning. Missing validation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.334867Z |
| pysec-2021-647 |
|
TensorFlow is an end-to-end open source platform for machine learning. Specifying a negat… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.423070Z |
| pysec-2021-648 |
|
TensorFlow is an end-to-end open source platform for machine learning. The `tf.raw_ops.Co… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.591146Z |
| pysec-2021-649 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.759879Z |
| pysec-2021-650 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:18.930076Z |
| pysec-2021-651 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.088447Z |
| pysec-2021-652 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.249421Z |
| pysec-2021-653 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.411969Z |
| pysec-2021-654 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.582800Z |
| pysec-2021-655 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.746209Z |
| pysec-2021-656 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:19.918878Z |
| pysec-2021-657 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.083523Z |
| pysec-2021-658 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can fo… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.263925Z |
| pysec-2021-659 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.437161Z |
| pysec-2021-660 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.598497Z |
| pysec-2021-661 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.792Z |
| pysec-2021-662 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:20.961529Z |
| pysec-2021-663 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:21.193841Z |
| pysec-2021-664 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:21.353144Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-4401 | Malicious code in lotus-adapter (npm) | 2022-06-20T20:12:04Z | 2022-06-20T20:12:05Z |
| mal-2022-4486 | Malicious code in marketstack-adapter (npm) | 2022-06-20T20:12:04Z | 2022-06-20T20:12:05Z |
| mal-2022-4566 | Malicious code in messari-adapter (npm) | 2022-06-20T20:12:05Z | 2022-06-20T20:12:05Z |
| mal-2022-4570 | Malicious code in metalsapi-adapter (npm) | 2022-06-20T20:12:05Z | 2022-06-20T20:12:06Z |
| mal-2022-4657 | Malicious code in mock-ea-adapter (npm) | 2022-06-20T20:12:05Z | 2022-06-20T20:12:06Z |
| mal-2022-4759 | Malicious code in mycryptoapi-adapter (npm) | 2022-06-20T20:12:05Z | 2022-06-20T20:12:06Z |
| mal-2022-4789 | Malicious code in ncfx-adapter (npm) | 2022-06-20T20:12:06Z | 2022-06-20T20:12:06Z |
| mal-2022-4853 | Malicious code in nikkei-adapter (npm) | 2022-06-20T20:12:06Z | 2022-06-20T20:12:06Z |
| mal-2022-4914 | Malicious code in nomics-adapter (npm) | 2022-06-20T20:12:06Z | 2022-06-20T20:12:07Z |
| mal-2022-5040 | Malicious code in oilpriceapi-adapter (npm) | 2022-06-20T20:12:06Z | 2022-06-20T20:12:07Z |
| mal-2022-5074 | Malicious code in onchain-gas-adapter (npm) | 2022-06-20T20:12:07Z | 2022-06-20T20:12:07Z |
| mal-2022-5097 | Malicious code in openexchangerates-adapter (npm) | 2022-06-20T20:12:07Z | 2022-06-20T20:12:07Z |
| mal-2022-5119 | Malicious code in orchid-bandwidth-adapter (npm) | 2022-06-20T20:12:07Z | 2022-06-20T20:12:08Z |
| mal-2022-5232 | Malicious code in paxos-adapter (npm) | 2022-06-20T20:12:07Z | 2022-06-20T20:12:08Z |
| mal-2022-5240 | Malicious code in paypal-adapter (npm) | 2022-06-20T20:12:07Z | 2022-06-20T20:12:08Z |
| mal-2022-5387 | Malicious code in poa-adapter (npm) | 2022-06-20T20:12:08Z | 2022-06-20T20:12:08Z |
| mal-2022-5408 | Malicious code in polygon-adapter (npm) | 2022-06-20T20:12:08Z | 2022-06-20T20:12:08Z |
| mal-2022-5417 | Malicious code in por-indexer-adapter (npm) | 2022-06-20T20:12:08Z | 2022-06-20T20:12:09Z |
| mal-2022-5486 | Malicious code in proof-of-reserves-adapter (npm) | 2022-06-20T20:12:08Z | 2022-06-20T20:12:09Z |
| mal-2022-5726 | Malicious code in reduce-adapter (npm) | 2022-06-20T20:12:09Z | 2022-06-20T20:12:09Z |
| mal-2022-5750 | Malicious code in renvm-address-set-adapter (npm) | 2022-06-20T20:12:09Z | 2022-06-20T20:12:10Z |
| mal-2022-5936 | Malicious code in satoshitango-adapter (npm) | 2022-06-20T20:12:09Z | 2022-06-20T20:12:10Z |
| mal-2022-6193 | Malicious code in snowflake-adapter (npm) | 2022-06-20T20:12:09Z | 2022-06-20T20:12:10Z |
| mal-2022-6197 | Malicious code in sochain-adapter (npm) | 2022-06-20T20:12:10Z | 2022-06-20T20:12:10Z |
| mal-2022-6205 | Malicious code in solana-view-function-adapter (npm) | 2022-06-20T20:12:10Z | 2022-06-20T20:12:10Z |
| mal-2022-6231 | Malicious code in spectral-macro-score-adapter (npm) | 2022-06-20T20:12:10Z | 2022-06-20T20:12:11Z |
| mal-2022-6244 | Malicious code in sportsdataio-adapter (npm) | 2022-06-20T20:12:10Z | 2022-06-20T20:12:17Z |
| mal-2022-6297 | Malicious code in stasis-adapter (npm) | 2022-06-20T20:12:11Z | 2022-06-20T20:12:17Z |
| mal-2022-6396 | Malicious code in synthetix-debt-pool-adapter (npm) | 2022-06-20T20:12:16Z | 2022-06-20T20:12:17Z |
| mal-2022-6405 | Malicious code in taapi-adapter (npm) | 2022-06-20T20:12:17Z | 2022-06-20T20:12:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-0013 | PostgreSQL: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2022-05-12T22:00:00.000+00:00 | 2025-09-28T22:00:00.000+00:00 |
| wid-sec-w-2022-0523 | PCRE2: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-05-12T22:00:00.000+00:00 | 2023-03-15T23:00:00.000+00:00 |
| wid-sec-w-2022-0776 | vim: Schwachstelle ermöglicht Denial of Service | 2022-05-12T22:00:00.000+00:00 | 2023-04-03T22:00:00.000+00:00 |
| wid-sec-w-2022-0899 | Apache Tomcat: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-05-12T22:00:00.000+00:00 | 2024-03-20T23:00:00.000+00:00 |
| wid-sec-w-2022-0267 | Red Hat Enterprise Linux (pcs): Schwachstelle ermöglicht Offenlegung von Informationen | 2022-05-15T22:00:00.000+00:00 | 2025-07-22T22:00:00.000+00:00 |
| wid-sec-w-2023-0320 | tribe29 checkmk: Schwachstelle ermöglicht Privilegieneskalation | 2022-05-15T22:00:00.000+00:00 | 2023-02-09T23:00:00.000+00:00 |
| wid-sec-w-2024-2210 | xpdf: Schwachstelle ermöglicht Denial of Service | 2022-05-15T22:00:00.000+00:00 | 2024-09-24T22:00:00.000+00:00 |
| wid-sec-w-2022-0179 | E2FSProgs: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-05-16T22:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0692 | IBM WebSphere Application Server: Schwachstelle ermöglicht Darstellen falscher Informationen | 2022-05-16T22:00:00.000+00:00 | 2023-05-09T22:00:00.000+00:00 |
| wid-sec-w-2022-1057 | Apple macOS: Mehrere Schwachstellen | 2022-05-16T22:00:00.000+00:00 | 2023-06-21T22:00:00.000+00:00 |
| wid-sec-w-2022-1141 | QEMU: Schwachstelle ermöglicht Denial of Service und Codeausführung | 2022-05-16T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2022-0014 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-05-17T22:00:00.000+00:00 | 2024-02-20T23:00:00.000+00:00 |
| wid-sec-w-2022-0202 | Nvidia Treiber: Mehrere Schwachstellen | 2022-05-17T22:00:00.000+00:00 | 2023-10-03T22:00:00.000+00:00 |
| wid-sec-w-2022-0283 | GIMP: Schwachstelle ermöglicht Denial of Service | 2022-05-17T22:00:00.000+00:00 | 2026-01-04T23:00:00.000+00:00 |
| wid-sec-w-2022-0362 | vim: Schwachstelle ermöglicht Denial of Service, Manipulation und Codeausführung | 2022-05-17T22:00:00.000+00:00 | 2023-04-03T22:00:00.000+00:00 |
| wid-sec-w-2023-0090 | Jenkins: Mehrere Schwachstellen | 2022-05-17T22:00:00.000+00:00 | 2023-06-15T22:00:00.000+00:00 |
| wid-sec-w-2022-0363 | vim: Mehrere Schwachstellen | 2022-05-18T22:00:00.000+00:00 | 2023-12-14T23:00:00.000+00:00 |
| wid-sec-w-2022-2211 | BusyBox: Schwachstelle ermöglicht Denial of Service | 2022-05-18T22:00:00.000+00:00 | 2024-05-13T22:00:00.000+00:00 |
| wid-sec-w-2024-1032 | xpdf: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-05-18T22:00:00.000+00:00 | 2024-05-06T22:00:00.000+00:00 |
| wid-sec-w-2022-0364 | vim: Mehrere Schwachstellen | 2022-05-19T22:00:00.000+00:00 | 2025-10-09T22:00:00.000+00:00 |
| wid-sec-w-2022-1907 | Grafana: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-05-19T22:00:00.000+00:00 | 2024-01-23T23:00:00.000+00:00 |
| wid-sec-w-2022-0180 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-05-22T22:00:00.000+00:00 | 2023-07-13T22:00:00.000+00:00 |
| wid-sec-w-2022-0016 | Linux Kernel: Mehrere Schwachstellen | 2022-05-24T22:00:00.000+00:00 | 2024-04-24T22:00:00.000+00:00 |
| wid-sec-w-2023-0857 | IBM QRadar SIEM: Mehrere Schwachstellen | 2022-05-24T22:00:00.000+00:00 | 2023-04-04T22:00:00.000+00:00 |
| wid-sec-w-2022-0268 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-05-26T22:00:00.000+00:00 | 2024-07-09T22:00:00.000+00:00 |
| wid-sec-w-2022-0284 | logrotate: Schwachstelle ermöglicht Denial of Service | 2022-05-26T22:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| wid-sec-w-2022-0365 | CUPS: Schwachstelle ermöglicht Privilegieneskalation | 2022-05-26T22:00:00.000+00:00 | 2024-02-20T23:00:00.000+00:00 |
| wid-sec-w-2022-0932 | dpkg: Schwachstelle ermöglicht Manipulation von Dateien | 2022-05-26T22:00:00.000+00:00 | 2024-08-11T22:00:00.000+00:00 |
| wid-sec-w-2022-1661 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-05-26T22:00:00.000+00:00 | 2023-06-28T22:00:00.000+00:00 |
| wid-sec-w-2022-2256 | Red Hat Enterprise Linux und Virtualization: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-05-26T22:00:00.000+00:00 | 2025-12-15T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsma-21-047-01 | Hamilton-T1 | 2021-02-16T00:00:00.000000Z | 2021-02-16T00:00:00.000000Z |
| icsa-21-049-01 | Johnson Controls Metasys Reporting Engine (MRE) Web Services | 2021-02-18T00:00:00.000000Z | 2021-02-18T00:00:00.000000Z |
| icsa-21-049-02 | Mitsubishi Electric FA Engineering Software Products (Update H) | 2021-02-18T07:00:00.000000Z | 2025-06-05T06:00:00.000000Z |
| icsa-21-054-01 | Rockwell Automation FactoryTalk Services Platform | 2021-02-23T00:00:00.000000Z | 2021-02-23T00:00:00.000000Z |
| icsa-21-054-02 | Advantech BB-ESWGP506-2SFP-T | 2021-02-23T00:00:00.000000Z | 2021-02-23T00:00:00.000000Z |
| icsa-21-054-03 | Advantech Spectre RT Industrial Routers | 2021-02-23T00:00:00.000000Z | 2021-02-23T00:00:00.000000Z |
| icsa-21-054-04 | Ovarro TBox (Update A) | 2021-02-23T00:00:00.000000Z | 2021-09-23T00:00:00.000000Z |
| icsa-21-056-01 | PerFact OpenVPN-Client | 2021-02-25T00:00:00.000000Z | 2021-02-25T00:00:00.000000Z |
| icsa-21-056-02 | FATEK Automation FvDesigner | 2021-02-25T00:00:00.000000Z | 2021-02-25T00:00:00.000000Z |
| icsa-21-056-03 | Rockwell Automation Logix Controllers (Update A) | 2021-02-25T00:00:00.000000Z | 2021-03-18T00:00:00.000000Z |
| icsa-21-056-04 | ProSoft Technology ICX35 | 2021-02-25T00:00:00.000000Z | 2021-02-25T00:00:00.000000Z |
| icsa-21-061-01 | Hitachi ABB Power Grids Ellipse EAM | 2021-03-02T00:00:00.000000Z | 2021-03-02T00:00:00.000000Z |
| icsa-21-061-02 | Rockwell Automation CompactLogix 5370 and ControlLogix 5570 Controllers (Update A) | 2021-03-02T00:00:00.000000Z | 2021-03-23T00:00:00.000000Z |
| icsa-21-061-03 | MB connect line mbCONNECT24, mymbCONNECT24 | 2021-03-02T00:00:00.000000Z | 2021-03-02T00:00:00.000000Z |
| icsa-21-063-01 | Rockwell Automation 1734-AENTR Series B and Series C | 2021-03-04T00:00:00.000000Z | 2021-03-04T00:00:00.000000Z |
| icsa-21-063-02 | ICSA-21-063-02_Schneider Electric EcoStruxure Building Operation (EBO) | 2021-03-04T00:00:00.000000Z | 2021-03-04T00:00:00.000000Z |
| icsa-21-068-01 | Siemens SIMATIC S7-PLCSIM | 2021-03-09T00:00:00.000000Z | 2021-03-09T00:00:00.000000Z |
| icsa-21-068-02 | Siemens SCALANCE and RUGGEDCOM Devices SSH (Update A) | 2021-03-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-068-03 | Siemens SCALANCE and RUGGEDCOM Devices (Update A) | 2021-03-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-068-04 | Siemens SINEMA Remote Connect Server | 2021-03-09T00:00:00.000000Z | 2021-03-09T00:00:00.000000Z |
| icsa-21-068-05 | Siemens LOGO! 8 BM | 2021-03-09T00:00:00.000000Z | 2024-10-08T00:00:00.000000Z |
| icsa-21-068-06 | Siemens TCP/IP Stack Vulnerabilities-AMNESIA:33 in SENTRON PAC / 3VA Devices (Update C) | 2021-03-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-068-07 | Siemens TCP Stack of SIMATIC MV400 | 2021-03-09T00:00:00.000000Z | 2021-03-09T00:00:00.000000Z |
| icsa-21-068-08 | Siemens Energy PLUSCONTROL 1st Gen | 2021-03-09T00:00:00.000000Z | 2021-03-09T00:00:00.000000Z |
| icsa-21-068-09 | Siemens Solid Edge File Parsing | 2021-03-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-070-01 | Schneider Electric IGSS SCADA Software | 2021-03-11T00:00:00.000000Z | 2021-03-11T00:00:00.000000Z |
| icsa-21-075-01 | Advantech WebAccess/SCADA | 2021-03-16T00:00:00.000000Z | 2021-03-16T00:00:00.000000Z |
| icsa-21-075-03 | Hitachi ABB Power Grids AFS Series | 2021-03-16T00:00:00.000000Z | 2021-03-16T00:00:00.000000Z |
| icsa-21-075-02 | GE UR Family (Update A) | 2021-03-16T06:00:00.000000Z | 2026-04-16T06:00:00.000000Z |
| icsa-21-077-01 | Johnson Controls Exacq Technologies exacqVision | 2021-03-18T00:00:00.000000Z | 2021-03-18T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-dnsmasq-dns-2021-c5mrdf3g | Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021 | 2021-01-19T12:15:00+00:00 | 2021-08-30T17:24:42+00:00 |
| cisco-sa-amp-imm-dll-5paz3hrv | Cisco Advanced Malware Protection for Endpoints and Immunet for Windows DLL Hijacking Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-asr-mem-leak-dos-mtwghkk3 | Cisco StarOS IPv4 Denial of Service Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssm-multici-pgg5wm5a | Cisco Smart Software Manager Satellite Web UI Command Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssm-sc-jd42d4tq | Cisco Smart Software Manager Satellite Static Credential Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssm-sqi-h5fdvzwp | Cisco Smart Software Manager Satellite SQL Injection Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-cssmor-mdcwkt2x | Cisco Smart Software Manager Satellite Open Redirect Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-api-path-tptapx2p | Cisco Data Center Network Manager REST API Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-authbypass-ohbpbxu | Cisco Data Center Network Manager Authorization Bypass Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-cert-check-bdzzv9t3 | Cisco Data Center Network Manager Certificate Validation Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-info-disc-qcsjb6yg | Cisco Data Center Network Manager Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-sql-inj-oaqoobp | Cisco Data Center Network Manager SQL Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-ssrf-f2vx6q5p | Cisco Data Center Network Manager Server-Side Request Forgery Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dcnm-xss-vulns-guuj39gh | Cisco Data Center Network Manager Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dnac-cmdinj-erumswh9 | Cisco DNA Center Command Runner Command Injection Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-dnac-csrf-dc83cmcv | Cisco DNA Center Cross-Site Request Forgery Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-25T14:01:28+00:00 |
| cisco-sa-dnac-privesc-6qja3hvh | Cisco DNA Center Privilege Escalation Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-02-02T17:55:38+00:00 |
| cisco-sa-dnacid-ofeerjcn | Cisco DNA Center Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-26T14:34:33+00:00 |
| cisco-sa-esa-wsa-sma-info-rhp44vac | Cisco Email Security Appliance, Cisco Content Security Management Appliance, and Cisco Web Security Appliance Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-esc-dos-4gw6d527 | Cisco Elastic Services Controller Denial of Service Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-imp-trav-inj-dm687zd6 | Cisco Unified Communications Products Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-sdwan-abyp-tngfhrs | Cisco SD-WAN vManage Authorization Bypass Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-02-02T22:20:48+00:00 |
| cisco-sa-sdwan-bufovulns-b5nrshbj | Cisco SD-WAN Buffer Overflow Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-sdwan-cmdinjm-9qmsmgcn | Cisco SD-WAN Command Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-02-02T22:17:18+00:00 |
| cisco-sa-sdwan-dosmulti-48jjueup | Cisco SD-WAN Denial of Service Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-02-02T22:21:54+00:00 |
| cisco-sa-sdwan-infodis-2-upo232dg | Cisco SD-WAN Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-sdwan-vinfdis-mc8l58dj | Cisco SD-WAN vManage Information Disclosure Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-umb-dos-dgkzdebp | Cisco Umbrella Dashboard Packet Flood Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-vman-pathtrav-z5mcvsjf | Cisco SD-WAN vManage Software Path Traversal Vulnerability | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| cisco-sa-vman-sqlinjm-xv8dsjq5 | Cisco SD-WAN vManage SQL Injection Vulnerabilities | 2021-01-20T16:00:00+00:00 | 2021-01-20T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-38666 | Remote Desktop Client Remote Code Execution Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-40442 | Microsoft Excel Remote Code Execution Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-16T08:00:00.000Z |
| msrc_cve-2021-41349 | Microsoft Exchange Server Spoofing Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-11T08:00:00.000Z |
| msrc_cve-2021-41351 | Microsoft Edge (Chrome based) Spoofing on IE Mode | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41356 | Windows Denial of Service Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41366 | Credential Security Support Provider Protocol (CredSSP) Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41367 | NTFS Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41368 | Microsoft Access Remote Code Execution Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41370 | NTFS Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41371 | Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41372 | Power BI Report Server Spoofing Vulnerability | 2021-11-09T08:00:00.000Z | 2022-04-15T07:00:00.000Z |
| msrc_cve-2021-41373 | FSLogix Information Disclosure Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41374 | Azure Sphere Information Disclosure Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41375 | Azure Sphere Information Disclosure Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41376 | Azure Sphere Information Disclosure Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41377 | Windows Fast FAT File System Driver Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-15T08:00:00.000Z |
| msrc_cve-2021-41378 | Windows NTFS Remote Code Execution Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-41379 | Windows Installer Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42274 | Windows Hyper-V Discrete Device Assignment (DDA) Denial of Service Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42275 | Microsoft COM for Windows Remote Code Execution Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42276 | Microsoft Windows Media Foundation Remote Code Execution Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42277 | Diagnostics Hub Standard Collector Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42278 | Active Directory Domain Services Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42279 | Chakra Scripting Engine Memory Corruption Vulnerability | 2021-11-09T08:00:00.000Z | 2022-08-03T07:00:00.000Z |
| msrc_cve-2021-42280 | Windows Feedback Hub Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42282 | Active Directory Domain Services Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42283 | NTFS Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42284 | Windows Hyper-V Denial of Service Vulnerability | 2021-11-09T08:00:00.000Z | 2022-01-14T08:00:00.000Z |
| msrc_cve-2021-42285 | Windows Kernel Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| msrc_cve-2021-42286 | Windows Core Shell SI Host Extension Framework for Composable Shell Elevation of Privilege Vulnerability | 2021-11-09T08:00:00.000Z | 2021-11-09T08:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2020:1499-1 | Security update for chromium | 2020-09-22T08:22:47Z | 2020-09-22T08:22:47Z |
| opensuse-su-2020:1500-1 | Security update for libqt4 | 2020-09-22T08:23:10Z | 2020-09-22T08:23:10Z |
| opensuse-su-2020:1501-1 | Security update for libqt4 | 2020-09-22T10:22:45Z | 2020-09-22T10:22:45Z |
| opensuse-su-2020:1502-1 | Security update for perl-DBI | 2020-09-22T16:22:20Z | 2020-09-22T16:22:20Z |
| opensuse-su-2020:1505-1 | Security update for libetpan | 2020-09-22T16:22:35Z | 2020-09-22T16:22:35Z |
| opensuse-su-2020:1506-1 | Security update for lilypond | 2020-09-22T16:22:41Z | 2020-09-22T16:22:41Z |
| opensuse-su-2020:1509-1 | Recommended update for otrs | 2020-09-23T08:23:03Z | 2020-09-23T08:23:03Z |
| opensuse-su-2020:1510-1 | Security update for chromium | 2020-09-23T10:23:34Z | 2020-09-23T10:23:34Z |
| opensuse-su-2020:1511-1 | Security update for virtualbox | 2020-09-23T22:20:49Z | 2020-09-23T22:20:49Z |
| opensuse-su-2020:1513-1 | Security update for samba | 2020-09-24T07:17:10Z | 2020-09-24T07:17:10Z |
| opensuse-su-2020:1514-1 | Security update for chromium | 2020-09-24T07:26:44Z | 2020-09-24T07:26:44Z |
| opensuse-su-2020:1516-1 | Security update for roundcubemail | 2020-09-24T12:21:24Z | 2020-09-24T12:21:24Z |
| opensuse-su-2020:1517-1 | Security update for jasper | 2020-09-24T12:21:31Z | 2020-09-24T12:21:31Z |
| opensuse-su-2020:1523-1 | Security update for jasper | 2020-09-25T04:22:30Z | 2020-09-25T04:22:30Z |
| opensuse-su-2020:1525-1 | Security update for ovmf | 2020-09-25T04:22:43Z | 2020-09-25T04:22:43Z |
| opensuse-su-2020:1526-1 | Security update for samba | 2020-09-25T08:28:35Z | 2020-09-25T08:28:35Z |
| opensuse-su-2020:1527-1 | Security update for chromium | 2020-09-25T08:43:00Z | 2020-09-25T08:43:00Z |
| opensuse-su-2020:1529-1 | Security update for singularity | 2020-09-25T10:22:50Z | 2020-09-25T10:22:50Z |
| opensuse-su-2020:1530-1 | Security update for libqt4 | 2020-09-25T16:21:06Z | 2020-09-25T16:21:06Z |
| opensuse-su-2020:1533-1 | Security update for rubygem-actionpack-5_1 | 2020-09-25T18:21:50Z | 2020-09-25T18:21:50Z |
| opensuse-su-2020:1534-1 | Security update for openldap2 | 2020-09-25T22:21:20Z | 2020-09-25T22:21:20Z |
| opensuse-su-2020:1535-1 | Security update for ovmf | 2020-09-25T22:21:27Z | 2020-09-25T22:21:27Z |
| opensuse-su-2020:1536-1 | Security update for rubygem-actionpack-5_1 | 2020-09-26T04:20:41Z | 2020-09-26T04:20:41Z |
| opensuse-su-2020:1539-1 | Security update for openldap2 | 2020-09-26T04:20:56Z | 2020-09-26T04:20:56Z |
| opensuse-su-2020:1542-1 | Security update for chromium | 2020-09-26T12:21:27Z | 2020-09-26T12:21:27Z |
| opensuse-su-2020:1550-1 | Security update for chromium | 2020-09-27T04:22:07Z | 2020-09-27T04:22:07Z |
| opensuse-su-2020:1552-1 | Security update for conmon, fuse-overlayfs, libcontainers-common, podman | 2020-09-27T10:22:27Z | 2020-09-27T10:22:27Z |
| opensuse-su-2020:1555-1 | Security update for MozillaFirefox | 2020-09-27T19:47:11Z | 2020-09-27T19:47:11Z |
| opensuse-su-2020:1556-1 | Security update for pdns | 2020-09-27T22:21:46Z | 2020-09-27T22:21:46Z |
| opensuse-su-2020:1559-1 | Security update for conmon, fuse-overlayfs, libcontainers-common, podman | 2020-09-28T08:21:39Z | 2020-09-28T08:21:39Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2008:0906 | Red Hat Security Advisory: java-1.6.0-ibm security update | 2008-10-24T14:44:00+00:00 | 2025-11-21T17:33:53+00:00 |
| rhsa-2008:0965 | Red Hat Security Advisory: lynx security update | 2008-10-27T17:08:00+00:00 | 2025-11-21T17:33:56+00:00 |
| rhsa-2008:0945 | Red Hat Security Advisory: flash-plugin security update | 2008-10-28T14:29:00+00:00 | 2026-01-13T20:58:43+00:00 |
| rhsa-2008:0971 | Red Hat Security Advisory: net-snmp security update | 2008-11-03T14:53:00+00:00 | 2025-11-21T17:33:57+00:00 |
| rhsa-2008:0957 | Red Hat Security Advisory: kernel security and bug fix update | 2008-11-04T10:11:00+00:00 | 2025-11-21T17:33:55+00:00 |
| rhsa-2008:0939 | Red Hat Security Advisory: openoffice.org security update | 2008-11-05T10:16:00+00:00 | 2025-11-21T17:33:55+00:00 |
| rhsa-2008:0967 | Red Hat Security Advisory: httpd security and bug fix update | 2008-11-11T18:24:00+00:00 | 2025-11-21T17:33:56+00:00 |
| rhsa-2008:0982 | Red Hat Security Advisory: gnutls security update | 2008-11-11T18:26:00+00:00 | 2025-11-21T17:34:00+00:00 |
| rhsa-2008:0980 | Red Hat Security Advisory: flash-plugin security update | 2008-11-12T17:23:00+00:00 | 2026-01-13T22:34:29+00:00 |
| rhsa-2008:0974 | Red Hat Security Advisory: acroread security update | 2008-11-12T17:26:00+00:00 | 2025-11-21T17:33:57+00:00 |
| rhsa-2008:0977 | Red Hat Security Advisory: seamonkey security update | 2008-11-13T02:04:00+00:00 | 2025-11-21T17:33:58+00:00 |
| rhsa-2008:0978 | Red Hat Security Advisory: firefox security update | 2008-11-13T02:18:00+00:00 | 2025-11-21T17:33:58+00:00 |
| rhsa-2008:0988 | Red Hat Security Advisory: libxml2 security update | 2008-11-17T16:15:00+00:00 | 2025-11-21T17:34:00+00:00 |
| rhsa-2008:0972 | Red Hat Security Advisory: kernel security and bug fix update | 2008-11-19T13:43:00+00:00 | 2025-11-21T17:33:59+00:00 |
| rhsa-2008:0976 | Red Hat Security Advisory: thunderbird security update | 2008-11-20T01:07:00+00:00 | 2025-11-21T17:33:58+00:00 |
| rhsa-2008:0580 | Red Hat Security Advisory: vim security update | 2008-11-25T08:41:00+00:00 | 2026-01-13T20:58:40+00:00 |
| rhsa-2008:0617 | Red Hat Security Advisory: vim security update | 2008-11-25T08:57:00+00:00 | 2025-11-21T17:33:36+00:00 |
| rhsa-2008:0618 | Red Hat Security Advisory: vim security update | 2008-11-25T09:00:00+00:00 | 2025-11-21T17:33:41+00:00 |
| rhsa-2008:1001 | Red Hat Security Advisory: tog-pegasus security update | 2008-11-25T09:05:00+00:00 | 2025-11-21T17:34:01+00:00 |
| rhsa-2008:0955 | Red Hat Security Advisory: java-1.4.2-ibm security update | 2008-11-25T09:45:00+00:00 | 2025-11-21T17:33:58+00:00 |
| rhsa-2008:0966 | Red Hat Security Advisory: Red Hat Application Stack v2.2 security and enhancement update | 2008-12-04T15:41:00+00:00 | 2026-03-27T09:42:17+00:00 |
| rhsa-2008:1018 | Red Hat Security Advisory: java-1.6.0-sun security update | 2008-12-04T15:45:00+00:00 | 2026-01-28T22:33:50+00:00 |
| rhsa-2008:1025 | Red Hat Security Advisory: java-1.5.0-sun security update | 2008-12-04T15:45:00+00:00 | 2026-01-28T22:33:56+00:00 |
| rhsa-2008:0981 | Red Hat Security Advisory: ruby security update | 2008-12-04T15:56:00+00:00 | 2025-11-21T17:34:00+00:00 |
| rhsa-2008:1007 | Red Hat Security Advisory: tomcat security update for Red Hat Network Satellite Server | 2008-12-08T09:02:00+00:00 | 2025-11-21T17:34:01+00:00 |
| rhsa-2008:1016 | Red Hat Security Advisory: enscript security update | 2008-12-15T12:51:00+00:00 | 2025-11-21T17:34:01+00:00 |
| rhsa-2008:1023 | Red Hat Security Advisory: pidgin security and bug fix update | 2008-12-15T13:10:00+00:00 | 2025-11-21T17:34:03+00:00 |
| rhsa-2008:1028 | Red Hat Security Advisory: cups security update | 2008-12-15T13:20:00+00:00 | 2025-11-21T17:34:03+00:00 |
| rhsa-2008:1029 | Red Hat Security Advisory: cups security update | 2008-12-15T13:25:00+00:00 | 2025-11-21T17:34:03+00:00 |
| rhsa-2008:1021 | Red Hat Security Advisory: enscript security update | 2008-12-15T15:01:00+00:00 | 2025-11-21T17:34:02+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2017:0759-1 | Security update for Linux Kernel Live Patch 13 for SLE 12 | 2017-03-20T19:48:11Z | 2017-03-20T19:48:11Z |
| suse-su-2017:0769-1 | Security update for Linux Kernel Live Patch 14 for SLE 12 | 2017-03-20T19:48:20Z | 2017-03-20T19:48:20Z |
| suse-su-2017:0767-1 | Security update for Linux Kernel Live Patch 15 for SLE 12 | 2017-03-20T19:48:28Z | 2017-03-20T19:48:28Z |
| suse-su-2017:0770-1 | Security update for Linux Kernel Live Patch 16 for SLE 12 | 2017-03-20T19:48:36Z | 2017-03-20T19:48:36Z |
| suse-su-2017:0772-1 | Security update for Linux Kernel Live Patch 17 for SLE 12 | 2017-03-20T19:48:46Z | 2017-03-20T19:48:46Z |
| suse-su-2017:0766-1 | Security update for Linux Kernel Live Patch 18 for SLE 12 | 2017-03-20T19:48:55Z | 2017-03-20T19:48:55Z |
| suse-su-2017:0774-1 | Security update for Linux Kernel Live Patch 4 for SLE 12 SP1 | 2017-03-20T19:49:02Z | 2017-03-20T19:49:02Z |
| suse-su-2017:0762-1 | Security update for Linux Kernel Live Patch 5 for SLE 12 SP1 | 2017-03-20T19:49:09Z | 2017-03-20T19:49:09Z |
| suse-su-2017:0775-1 | Security update for Linux Kernel Live Patch 6 for SLE 12 SP1 | 2017-03-20T19:49:16Z | 2017-03-20T19:49:16Z |
| suse-su-2017:0760-1 | Security update for Linux Kernel Live Patch 7 for SLE 12 SP1 | 2017-03-20T19:49:24Z | 2017-03-20T19:49:24Z |
| suse-su-2017:0763-1 | Security update for Linux Kernel Live Patch 8 for SLE 12 SP1 | 2017-03-20T19:49:31Z | 2017-03-20T19:49:31Z |
| suse-su-2017:0773-1 | Security update for Linux Kernel Live Patch 9 for SLE 12 SP1 | 2017-03-20T19:50:38Z | 2017-03-20T19:50:38Z |
| suse-su-2017:0764-1 | Security update for Linux Kernel Live Patch 10 for SLE 12 SP1 | 2017-03-20T19:50:49Z | 2017-03-20T19:50:49Z |
| suse-su-2017:0768-1 | Security update for Linux Kernel Live Patch 0 for SLE 12 SP2 | 2017-03-20T19:50:56Z | 2017-03-20T19:50:56Z |
| suse-su-2017:0781-1 | Security update for Linux Kernel Live Patch 3 for SLE 12 SP2 | 2017-03-20T20:25:48Z | 2017-03-20T20:25:48Z |
| suse-su-2017:0778-1 | Security update for Linux Kernel Live Patch 2 for SLE 12 SP2 | 2017-03-20T20:25:56Z | 2017-03-20T20:25:56Z |
| suse-su-2017:0777-1 | Security update for Linux Kernel Live Patch 1 for SLE 12 SP2 | 2017-03-20T20:26:05Z | 2017-03-20T20:26:05Z |
| suse-su-2017:0776-1 | Security update for Linux Kernel Live Patch 11 for SLE 12 SP1 | 2017-03-20T20:26:14Z | 2017-03-20T20:26:14Z |
| suse-su-2017:0780-1 | Security update for Linux Kernel Live Patch 19 for SLE 12 | 2017-03-20T20:26:24Z | 2017-03-20T20:26:24Z |
| suse-su-2017:0779-1 | Security update for Linux Kernel Live Patch 4 for SLE 12 SP2 | 2017-03-20T20:57:41Z | 2017-03-20T20:57:41Z |
| suse-su-2017:0786-1 | Security update for Linux Kernel Live Patch 12 for SLE 12 SP1 | 2017-03-21T14:13:57Z | 2017-03-21T14:13:57Z |
| suse-su-2017:0801-1 | Security update for apache2 | 2017-03-22T14:52:52Z | 2017-03-22T14:52:52Z |
| suse-su-2017:0797-1 | Security update for apache2 | 2017-03-22T14:54:19Z | 2017-03-22T14:54:19Z |
| suse-su-2017:0800-1 | Security update for wget | 2017-03-22T14:55:50Z | 2017-03-22T14:55:50Z |
| suse-su-2017:0798-1 | Security update for virglrenderer | 2017-03-22T14:57:19Z | 2017-03-22T14:57:19Z |
| suse-su-2017:0799-1 | Security update for wget | 2017-03-22T14:59:33Z | 2017-03-22T14:59:33Z |
| suse-su-2017:0841-1 | Security update for samba | 2017-03-28T14:34:02Z | 2017-03-28T14:34:02Z |
| suse-su-2017:0367-1 | Security update for ceph | 2017-03-28T14:34:35Z | 2017-03-28T14:34:35Z |
| suse-su-2017:0839-1 | Security update for java-1_8_0-ibm | 2017-03-28T14:35:23Z | 2017-03-28T14:35:23Z |
| suse-ru-2017:0843-1 | Recommended update for ImageMagick | 2017-03-29T00:38:37Z | 2017-03-29T00:38:37Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:1608 | Moderate: opencryptoki security update | 2024-04-02T00:00:00Z | 2024-04-03T18:46:18Z |
| alsa-2024:1610 | Moderate: less security update | 2024-04-02T00:00:00Z | 2024-04-02T22:26:38Z |
| alsa-2024:1615 | Moderate: expat security update | 2024-04-02T00:00:00Z | 2024-04-03T08:51:24Z |
| alsa-2024:1644 | Important: grafana-pcp security and bug fix update | 2024-04-02T00:00:00Z | 2024-04-03T14:02:46Z |
| alsa-2024:1646 | Important: grafana security and bug fix update | 2024-04-02T00:00:00Z | 2024-04-03T15:14:05Z |
| alsa-2024:1687 | Important: nodejs:20 security update | 2024-04-08T00:00:00Z | 2024-04-09T14:54:02Z |
| alsa-2024:1688 | Important: nodejs:20 security update | 2024-04-08T00:00:00Z | 2024-04-09T14:51:34Z |
| alsa-2024:1690 | Important: varnish security update | 2024-04-08T00:00:00Z | 2024-04-10T14:16:19Z |
| alsa-2024:1691 | Important: varnish security update | 2024-04-08T00:00:00Z | 2024-04-09T06:48:30Z |
| alsa-2024:1692 | Moderate: less security update | 2024-04-08T00:00:00Z | 2024-04-09T06:49:32Z |
| alsa-2024:1719 | Moderate: rear security update | 2024-04-09T00:00:00Z | 2024-04-10T08:54:24Z |
| alsa-2024:1750 | Important: unbound security update | 2024-04-10T00:00:00Z | 2024-04-12T11:51:36Z |
| alsa-2024:1751 | Important: unbound security update | 2024-04-11T00:00:00Z | 2024-04-12T11:50:26Z |
| alsa-2024:1781 | Important: bind9.16 security update | 2024-04-11T00:00:00Z | 2024-04-12T18:44:24Z |
| alsa-2024:1784 | Moderate: gnutls security update | 2024-04-11T00:00:00Z | 2024-04-12T11:48:24Z |
| alsa-2024:1786 | Important: httpd:2.4/mod_http2 security update | 2024-04-11T00:00:00Z | 2024-04-12T13:00:18Z |
| alsa-2024:1789 | Important: bind security update | 2024-04-11T00:00:00Z | 2024-04-12T12:58:56Z |
| alsa-2024:1782 | Important: bind and dhcp security update | 2024-04-12T00:00:00Z | 2024-04-12T17:11:23Z |
| alsa-2024:1818 | Moderate: java-1.8.0-openjdk security update | 2024-04-18T00:00:00Z | 2024-04-19T13:00:41Z |
| alsa-2024:1825 | Moderate: java-17-openjdk security update | 2024-04-18T00:00:00Z | 2024-04-18T13:44:08Z |
| alsa-2024:1828 | Moderate: java-21-openjdk security update | 2024-04-18T00:00:00Z | 2024-04-29T11:04:54Z |
| alsa-2024:1872 | Important: mod_http2 security update | 2024-04-18T00:00:00Z | 2024-04-18T10:28:16Z |
| alsa-2024:1879 | Moderate: gnutls security update | 2024-04-18T00:00:00Z | 2024-04-18T10:27:16Z |
| alsa-2024:1902 | Important: shim security update | 2024-04-18T00:00:00Z | 2024-05-10T20:36:43Z |
| alsa-2024:1903 | Important: shim bug fix update | 2024-04-18T00:00:00Z | 2024-05-10T18:01:28Z |
| alsa-2024:1908 | Important: firefox security update | 2024-04-18T00:00:00Z | 2024-04-22T08:24:12Z |
| alsa-2024:1912 | Important: firefox security update | 2024-04-18T00:00:00Z | 2024-04-22T08:21:39Z |
| alsa-2024:1822 | Moderate: java-11-openjdk security update | 2024-04-22T00:00:00Z | 2024-04-29T11:02:41Z |
| alsa-2024:1939 | Low: thunderbird security update | 2024-04-22T00:00:00Z | 2024-04-29T07:46:06Z |
| alsa-2024:1940 | Low: thunderbird security update | 2024-04-22T00:00:00Z | 2024-04-29T07:48:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2021-585 | Heap-buffer-overflow in ebitmap_match_any | 2021-03-31T00:00:26.273923Z | 2022-04-13T03:04:42.321301Z |
| osv-2021-586 | Use-of-uninitialized-value in void intra_prediction_angular<unsigned short> | 2021-03-31T00:01:03.787831Z | 2026-04-10T14:06:19.649878Z |
| osv-2021-591 | Segv on unknown address | 2021-04-02T00:01:01.958406Z | 2022-04-13T03:04:31.448881Z |
| osv-2021-593 | Heap-use-after-free in std::__1::vector<char, std::__1::allocator<char> >::size | 2021-04-03T00:00:08.237159Z | 2022-04-13T03:04:42.650966Z |
| osv-2021-594 | Global-buffer-overflow in read_coding_unit | 2021-04-03T00:00:33.651641Z | 2023-05-05T14:02:59.779815Z |
| osv-2021-597 | Stack-buffer-overflow in read_mft_common | 2021-04-04T00:00:06.122996Z | 2022-04-13T03:04:31.454013Z |
| osv-2021-600 | Heap-buffer-overflow in gif_internal_decode_frame | 2021-04-04T00:00:13.289894Z | 2022-04-13T03:04:38.118602Z |
| osv-2021-602 | Heap-buffer-overflow in read_paint | 2021-04-06T00:00:07.623862Z | 2022-04-13T03:04:34.927118Z |
| osv-2021-607 | Heap-buffer-overflow in TextPool::getPool | 2021-04-07T00:01:06.549627Z | 2023-02-24T01:54:54.326509Z |
| osv-2021-609 | Heap-buffer-overflow in get_word_rgb_row | 2021-04-07T00:01:13.031934Z | 2022-04-13T03:04:37.694188Z |
| osv-2021-614 | Heap-buffer-overflow in ossl_aria_set_encrypt_key | 2021-04-09T00:00:06.878364Z | 2022-04-13T03:04:35.099519Z |
| osv-2021-615 | Use-of-uninitialized-value in DES_set_key_unchecked | 2021-04-09T00:00:08.677803Z | 2022-04-13T03:04:35.021981Z |
| osv-2021-616 | Heap-buffer-overflow in Camellia_Ekeygen | 2021-04-09T00:00:12.734210Z | 2022-04-13T03:04:35.010440Z |
| osv-2021-617 | Stack-use-after-return in v9fs_setattr | 2021-04-09T00:00:27.093027Z | 2022-07-09T00:38:04.296171Z |
| osv-2021-618 | Heap-buffer-overflow in OT::AnchorFormat1* hb_serialize_context_t::embed<OT::AnchorFormat1> | 2021-04-09T00:01:00.954975Z | 2022-04-13T03:04:32.798219Z |
| osv-2021-619 | UNKNOWN READ in helper_uc_tracecode | 2021-04-09T00:01:10.727127Z | 2022-04-13T03:04:39.119311Z |
| osv-2021-620 | Segv on unknown address in dwg_free_summaryinfo | 2021-04-10T00:00:11.142635Z | 2022-07-30T00:10:55.679606Z |
| osv-2021-622 | Heap-buffer-overflow in frame_get_vlmetalayers | 2021-04-10T00:00:30.009687Z | 2022-04-13T03:04:40.179875Z |
| osv-2021-623 | Null-dereference READ | 2021-04-10T00:01:03.265801Z | 2022-04-13T03:04:35.060559Z |
| osv-2021-624 | Heap-buffer-overflow in load_u32_be | 2021-04-10T00:01:08.368776Z | 2022-04-13T03:04:35.082679Z |
| osv-2021-631 | Heap-buffer-overflow in ih264d_decode_slice_thread | 2021-04-13T00:00:57.946Z | 2022-04-13T03:04:35.482215Z |
| osv-2021-635 | Heap-use-after-free in std::__1::__tree_iterator<std::__1::__value_type<std::__1::basic_string<char, st | 2021-04-15T00:00:23.567516Z | 2022-04-13T03:04:42.803279Z |
| osv-2021-639 | Heap-buffer-overflow in blosc_d | 2021-04-16T00:00:26.662778Z | 2022-04-13T03:04:40.190058Z |
| osv-2021-640 | Heap-buffer-overflow in frame_get_metalayers | 2021-04-16T00:00:28.044116Z | 2022-04-13T03:04:40.227924Z |
| osv-2021-642 | Heap-buffer-overflow in op_Const64 | 2021-04-17T00:00:10.657238Z | 2022-04-13T03:04:30.656599Z |
| osv-2021-644 | UNKNOWN READ in blosc_d | 2021-04-17T00:00:14.337746Z | 2022-04-13T03:33:26.944758Z |
| osv-2021-646 | Heap-use-after-free in std::__1::__tree_iterator<std::__1::__value_type<std::__1::basic_string<char, st | 2021-04-17T00:00:31.031765Z | 2022-04-13T03:04:42.791429Z |
| osv-2021-651 | Heap-use-after-free in zend_gc_delref | 2021-04-18T00:00:25.691271Z | 2022-04-13T03:04:33.417391Z |
| osv-2021-652 | Heap-use-after-free in ZSTD_freeDDict | 2021-04-18T00:01:00.614418Z | 2023-02-04T00:11:28.495734Z |
| osv-2021-654 | Heap-buffer-overflow in decode_mcu_fast | 2021-04-18T00:01:02.873828Z | 2022-04-13T03:04:37.704903Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2023-3115 | Incorrect User Management in GitLab | 2024-03-06T11:06:45.275Z | 2025-05-20T10:02:07.006Z |
| bit-sqlite-2021-20227 | 2024-03-06T11:06:45.672Z | 2025-04-03T14:40:37.652Z | |
| bit-pillow-2020-11538 | 2024-03-06T11:06:47.992Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-43558 | 2024-03-06T11:06:48.379Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-3716 | 2024-03-06T11:06:48.386Z | 2025-04-03T14:40:37.652Z | |
| bit-discourse-2022-24782 | Secure category names leaked via user activity export in Discourse | 2024-03-06T11:06:48.469Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2021-27905 | SSRF vulnerability with the Replication handler | 2024-03-06T11:06:49.094Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2020-29511 | 2024-03-06T11:06:49.171Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2023-27579 | TensorFlow has Floating Point Exception in TFLite in conv kernel | 2024-03-06T11:06:50.569Z | 2025-05-20T10:02:07.006Z |
| bit-jenkins-2020-2101 | 2024-03-06T11:06:51.359Z | 2025-04-03T14:40:37.652Z | |
| bit-postgresql-2020-14349 | 2024-03-06T11:06:51.679Z | 2025-04-03T14:40:37.652Z | |
| bit-python-2021-28861 | 2024-03-06T11:06:51.991Z | 2025-11-06T13:25:46.476Z | |
| bit-php-2020-7065 | mb_strtolower (UTF-32LE): stack-buffer-overflow at php_unicode_tolower_full | 2024-03-06T11:06:52.660Z | 2025-05-20T10:02:07.006Z |
| bit-sqlite-2020-9327 | 2024-03-06T11:06:54.207Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2023-3102 | Insertion of Sensitive Information Into Sent Data in GitLab | 2024-03-06T11:06:54.694Z | 2025-05-20T10:02:07.006Z |
| bit-node-2021-22918 | 2024-03-06T11:06:55.582Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-2166 | 2024-03-06T11:06:56.186Z | 2025-04-03T14:40:37.652Z | |
| bit-pillow-2020-10994 | 2024-03-06T11:06:57.797Z | 2025-04-03T14:40:37.652Z | |
| bit-discourse-2022-23641 | Denial of Service in Discourse | 2024-03-06T11:06:58.961Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2020-3715 | 2024-03-06T11:06:59.179Z | 2025-04-03T14:40:37.652Z | |
| bit-jenkins-2020-2100 | 2024-03-06T11:06:59.472Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-40695 | 2024-03-06T11:06:59.583Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2020-29510 | 2024-03-06T11:07:00.167Z | 2025-04-03T14:40:37.652Z | |
| bit-postgresql-2020-10733 | 2024-03-06T11:07:00.207Z | 2025-04-03T14:40:37.652Z | |
| bit-python-2021-23336 | Web Cache Poisoning | 2024-03-06T11:07:00.308Z | 2025-05-20T10:02:07.006Z |
| bit-solr-2020-9492 | 2024-03-06T11:07:01.582Z | 2026-03-20T09:47:33.381Z | |
| bit-php-2020-7064 | Use-of-uninitialized-value in exif | 2024-03-06T11:07:02.697Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2023-25801 | TensorFlow has double free in Fractional(Max/Avg)Pool | 2024-03-06T11:07:03.074Z | 2025-05-20T10:02:07.006Z |
| bit-node-2021-22884 | 2024-03-06T11:07:03.702Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-2154 | 2024-03-06T11:07:04.370Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2005-avi-324 | Vulnérabilité sur Novell Netware | 2005-08-31T00:00:00.000000 | 2005-08-31T00:00:00.000000 |
| certa-2005-avi-325 | Vulnérabilité des clients DHCP sous Solaris 10 | 2005-08-31T00:00:00.000000 | 2005-08-31T00:00:00.000000 |
| certa-2005-avi-326 | Vulnérabilité de DameWare Mini Remote Control | 2005-09-01T00:00:00.000000 | 2005-09-01T00:00:00.000000 |
| certa-2005-avi-327 | Vulnérabilité de l'interface utilisateur du Firewall de Microsoft Windows | 2005-09-02T00:00:00.000000 | 2005-09-02T00:00:00.000000 |
| certa-2005-avi-328 | Vulnérabilité sur Phorum | 2005-09-05T00:00:00.000000 | 2005-09-05T00:00:00.000000 |
| certa-2005-avi-329 | Vulnérabilité de OpenSSH | 2005-09-05T00:00:00.000000 | 2005-10-07T00:00:00.000000 |
| certa-2005-avi-330 | Vulnérabilité de 3Com Network Supervisor | 2005-09-05T00:00:00.000000 | 2005-09-05T00:00:00.000000 |
| certa-2005-avi-331 | Vulnérabilité dans mod_ssl | 2005-09-05T00:00:00.000000 | 2005-09-19T00:00:00.000000 |
| certa-2005-avi-332 | Vulnérabilité du client LiveUpdate de Symantec | 2005-09-05T00:00:00.000000 | 2005-09-05T00:00:00.000000 |
| certa-2005-avi-333 | Vulnérabilité dans KDE | 2005-09-06T00:00:00.000000 | 2005-09-06T00:00:00.000000 |
| certa-2005-avi-334 | Vulnérabilité dans NTP | 2005-09-06T00:00:00.000000 | 2005-09-06T00:00:00.000000 |
| certa-2005-avi-335 | Vulnérabilité de OpenVPN | 2005-09-06T00:00:00.000000 | 2005-10-10T00:00:00.000000 |
| certa-2005-avi-336 | Vulnérabilité du moteur d'expressions régulières PCRE | 2005-09-07T00:00:00.000000 | 2006-03-10T00:00:00.000000 |
| certa-2005-avi-337 | Multiples vulnérabilités dans Squid | 2005-09-07T00:00:00.000000 | 2005-10-03T00:00:00.000000 |
| certa-2005-avi-338 | Vulnérabilité dans Cisco IOS | 2005-09-08T00:00:00.000000 | 2005-09-08T00:00:00.000000 |
| certa-2005-avi-340 | Vulnérabilités dans la plate-forme Java de HP-UX | 2005-09-08T00:00:00.000000 | 2005-09-08T00:00:00.000000 |
| certa-2005-avi-339 | Vulnérabilités dans le serveur <TT>Java Web Proxy</TT> de Sun | 2005-09-09T00:00:00.000000 | 2005-09-09T00:00:00.000000 |
| certa-2005-avi-341 | Vulnérabilité de l'outil de développement CVS | 2005-09-09T00:00:00.000000 | 2005-09-09T00:00:00.000000 |
| certa-2005-avi-342 | Vulnérabilité dans Microsft Exchange Server 2003 | 2005-09-09T00:00:00.000000 | 2005-09-09T00:00:00.000000 |
| certa-2005-avi-343 | Vulnérabilité de Snort | 2005-09-14T00:00:00.000000 | 2005-09-14T00:00:00.000000 |
| certa-2005-avi-344 | Multiples vulnérabilités de la plateforme Java sous MacOS X | 2005-09-14T00:00:00.000000 | 2005-09-14T00:00:00.000000 |
| certa-2005-avi-345 | Vulnérabilité dans Xfree86/X11/Xorg | 2005-09-15T00:00:00.000000 | 2005-09-26T00:00:00.000000 |
| certa-2005-avi-346 | Vulnérabilité des clients web Mozilla, Firefox, Thunderbird et Netscape | 2005-09-15T00:00:00.000000 | 2005-10-05T00:00:00.000000 |
| certa-2005-avi-347 | Vulnérabilité des équipements Lynksys | 2005-09-15T00:00:00.000000 | 2005-09-15T00:00:00.000000 |
| certa-2005-avi-348 | Multiples vulnérabilités dans ClamAV | 2005-09-19T00:00:00.000000 | 2005-09-29T00:00:00.000000 |
| certa-2005-avi-349 | Vulnérabilité dans TWiki | 2005-09-19T00:00:00.000000 | 2005-09-19T00:00:00.000000 |
| certa-2005-avi-350 | Vulnérabilité de GNU mailutils | 2005-09-19T00:00:00.000000 | 2005-10-10T00:00:00.000000 |
| certa-2005-avi-351 | Multiples vulnérabilités de FreeRADIUS | 2005-09-19T00:00:00.000000 | 2005-09-19T00:00:00.000000 |
| certa-2005-avi-352 | Vulnérabilité de SQUID | 2005-09-19T00:00:00.000000 | 2005-09-19T00:00:00.000000 |
| certa-2005-avi-353 | Vulnérabilité dans MySQL | 2005-09-19T00:00:00.000000 | 2005-10-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000167 | Multiple plugins for Geeklog IVYWE edition vulnerable to cross-site scripting | 2016-09-23T14:15+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000169 | ManageEngine ServiceDesk Plus vulnerable to cross-site scripting | 2016-09-29T14:39+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000170 | ManageEngine ServiceDesk Plus fails to restrict access permissions | 2016-09-29T14:39+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000171 | ManageEngine ServiceDesk Plus uses an insecure method for cookie generation | 2016-09-29T14:39+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000172 | baserCMS vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:36+09:00 |
| jvndb-2016-000173 | baserCMS plugin Mail vulnerable to cross-site scripting | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000174 | baserCMS plugin Mail vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000175 | baserCMS plugin Blog vulnerable to cross-site scripting | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000176 | baserCMS plugin Blog vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000177 | baserCMS vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000178 | baserCMS vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000179 | baserCMS vulnerable to cross-site scripting | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000180 | baserCMS plugin Blog vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000181 | baserCMS plugin Feed vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000182 | baserCMS plugin Mail vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000183 | baserCMS plugin Uploader vulnerable to cross-site request forgery | 2016-09-29T16:04+09:00 | 2017-11-27T16:37+09:00 |
| jvndb-2016-000194 | Docomo L-04D mobile WiFi router vulnerable to cross-site request forgery | 2016-10-03T15:17+09:00 | 2018-01-17T11:53+09:00 |
| jvndb-2016-000184 | "Customapp" function in Cybozu Office vulnerable to cross-site scripting | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000185 | "Project" function in Cybozu Office vulnerable to cross-site scripting | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000186 | "Schedule" function in Cybozu Office vulnerable to cross-site scripting | 2016-10-03T15:43+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000187 | "Project" function in Cybozu Office vulnerable vulnerable to access restriction bypass | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000188 | Breadcrumb trail in Cybozu Office vulnerable vulnerable to browse restriction bypass | 2016-10-03T15:43+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000189 | "Project" function in Cybozu Office vulnerable vulnerable to operation restriction bypass | 2016-10-03T15:43+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000190 | Cybozu Office vulnerable to mail header injection | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000191 | Cybozu Office vulnerable to information disclosure | 2016-10-03T15:43+09:00 | 2017-04-24T15:05+09:00 |
| jvndb-2016-000192 | Cybozu Office vulnerable to denial-of-service (DoS) | 2016-10-03T15:46+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000193 | Cybozu Office vulnerable to Reflected File Download (RFD) | 2016-10-03T15:47+09:00 | 2017-04-24T15:10+09:00 |
| jvndb-2016-000202 | Usermin cross-site scripting vulnerabilties | 2016-10-07T13:50+09:00 | 2017-05-16T17:52+09:00 |
| jvndb-2016-000195 | Cryptography API: Next Generation (CNG) vulnerable to denial-of-service (DoS) | 2016-10-07T14:11+09:00 | 2016-10-07T14:11+09:00 |
| jvndb-2016-000196 | SetucoCMS vulnerable to cross-site request forgery | 2016-10-07T15:04+09:00 | 2017-05-17T14:44+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-01465 | Drupal Feature Set模块跨站请求伪造漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01466 | Drupal Node basket Payments模块存在多个漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01467 | Drupal Commerce Balanced Payments模块存在多个漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01468 | HP XP P9000 Command View Advanced Edition Software Online Help跨站脚本漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01469 | PTC Creo View任意代码执行漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01470 | DLGuard 'index.php'信息泄露漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01471 | Maroyaka CGI Maroyaka Simple Board跨站脚本漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01472 | Maroyaka CGI Maroyaka Image Album跨站脚本漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01473 | Maroyaka CGI Maroyaka Relay Novel跨站脚本漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01474 | Drupal Global Redirect模块开放式转向功能漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01475 | PHP地址簿存在多个SQL注入和多个跨站脚本漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01477 | Loxone Smart Home拒绝服务漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01478 | Loxone Smart Home HTML注入漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01479 | Loxone Smart Home多个跨站脚本漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01480 | Loxone Smart Home HTTP应答拆分漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01481 | Loxone Smart Home跨站点请求伪造漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01482 | Drupal Spider Contacts模块存在多个跨站请求伪造漏洞 | 2015-03-05 | 2015-03-06 |
| cnvd-2015-01483 | WordPress Newsletter Plug-in URL重定向漏洞 | 2015-03-05 | 2015-03-09 |
| cnvd-2015-01484 | WordPress 'Max Banner Ads'插件跨站脚本漏洞 | 2015-03-05 | 2015-03-09 |
| cnvd-2015-01485 | Webshop hun跨站脚本漏洞 | 2015-03-05 | 2015-03-09 |
| cnvd-2015-01486 | Webshop hun目录遍历漏洞 | 2015-03-05 | 2015-03-09 |
| cnvd-2015-01487 | Webshop hun SQL注入漏洞 | 2015-03-05 | 2015-03-09 |
| cnvd-2015-01488 | 多个Solarwinds产品core Orion存在多个SQL注入漏洞 | 2015-03-05 | 2015-03-09 |
| cnvd-2015-01489 | D-Link DIR-636L存在多个漏洞 | 2015-03-05 | 2015-03-09 |
| cnvd-2015-01504 | Xen外部X86系统设备模拟信息泄露漏洞 | 2015-03-05 | 2015-03-10 |
| cnvd-2015-01505 | Xen版本信息hypercall信息泄露漏洞 | 2015-03-05 | 2015-03-10 |
| cnvd-2015-01559 | SSL/TLS加密降级中间人劫持漏洞 | 2015-03-05 | 2015-03-11 |
| cnvd-2016-00954 | Ashampoo Photo Commander内存破坏漏洞 | 2015-03-05 | 2015-04-20 |
| cnvd-2016-06795 | 广州市问途信息技术有限公司酒店在线直销平台存在SQL注入漏洞 | 2015-03-05 | 2015-06-05 |
| cnvd-2016-06796 | 广州市问途信息技术有限公司酒店在线直销平台存在越权访问漏洞 | 2015-03-05 | 2015-06-05 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-03892 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03893 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03894 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03895 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03896 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03897 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03898 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03899 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03900 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03901 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03902 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03903 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03904 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03905 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03906 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03907 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03908 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03909 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03910 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03911 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03912 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03913 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03914 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03915 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03916 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03917 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03918 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03919 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03920 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03921 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| ID | Description | Updated |
|---|---|---|
| var-202101-1967 | C2000-B2-SFE0101-BB1 serial port server provides serial port to network function, which c… | 2022-05-04T09:42:09.151000Z |
| var-202012-1626 | Beijing Wanwei Yingchuang Technology Development Co., Ltd. is committed to the R&D and ap… | 2022-05-04T09:42:11.078000Z |
| var-202012-1605 | Forcecontrol is a monitoring configuration software, mainly used for data acquisition and… | 2022-05-04T09:42:11.088000Z |
| var-202012-1583 | ER3260 is a router of New H3C Technology Co., Ltd. New H3C Technology Co., Ltd. H3C-E… | 2022-05-04T09:42:11.100000Z |
| var-202011-1596 | M580 is a PLC in Schneider's Modicon PLC series. It is the first high-end integrated cont… | 2022-05-04T09:42:15.491000Z |
| var-202011-1574 | Tianqing Security Isolation and Information Exchange System is an access control switch d… | 2022-05-04T09:42:15.502000Z |
| var-202011-1553 | CP1L is an Omron small PLC series, integrated PLC with built-in pulse output, analog inpu… | 2022-05-04T09:42:15.514000Z |
| var-202011-1532 | FPWIN GR is a PLC programming software developed by Panasonic. It is used for PLC design,… | 2022-05-04T09:42:15.524000Z |
| var-202010-1659 | Shanghai ZLAN Information Technology Co., Ltd. is a high-tech enterprise that provides in… | 2022-05-04T09:42:16.694000Z |
| var-202010-1638 | WebAccess Node is an HMI/SCADA monitoring software completely based on IE browser from Ad… | 2022-05-04T09:42:16.706000Z |
| var-202010-1617 | Sangfor Technology Co., Ltd. is a provider of products, services and solutions focusing o… | 2022-05-04T09:42:16.722000Z |
| var-202010-1596 | Hangzhou Hikvision System Technology Co., Ltd. is a provider of security products and ind… | 2022-05-04T09:42:16.732000Z |
| var-202009-1714 | Weak passwords refer to passwords that only contain simple numbers and letters, such as "… | 2022-05-04T09:42:18.519000Z |
| var-202009-1672 | AM600-PS2 is a medium-sized programmable logic controller (PLC) designed with a modular s… | 2022-05-04T09:42:18.540000Z |
| var-202008-1318 | Hollysys was founded in 1993 and is a leading supplier of automation and information tech… | 2022-05-04T09:42:19.856000Z |
| var-202008-1297 | Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. A… | 2022-05-04T09:42:19.867000Z |
| var-202007-1506 | The AC15 upgrade software is produced by Shenzhen Jixiang Tengda Technology Co., Ltd. It … | 2022-05-04T09:42:23.999000Z |
| var-202006-1924 | Zhejiang Yushi Technology Co., Ltd. (abbreviation: Yushi) was founded in 2011 and is a gl… | 2022-05-04T09:42:25.755000Z |
| var-202006-1903 | Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chi… | 2022-05-04T09:42:25.766000Z |
| var-202005-1092 | FameView configuration software is a high-performance configuration monitoring software b… | 2022-05-04T09:42:27.212000Z |
| var-202005-1071 | Prolink Technology Co., Ltd. (hereinafter referred to as "TP-LINK") is the world's leadin… | 2022-05-04T09:42:27.223000Z |
| var-202004-2236 | NA-VIEW is a touch screen configuration software. NA-VIEW V2.0 (only for 15-inch touc… | 2022-05-04T09:42:28.417000Z |
| var-202003-1138 | Some Huawei products have a security vulnerability due to improper authentication. A remo… | 2022-05-04T09:42:34.110000Z |
| var-202002-1693 | Siemens is the world's leading technology company. With innovations in the fields of elec… | 2022-05-04T09:42:35.275000Z |
| var-202001-1992 | JCG Q9PRO is a home wireless router that supports WPS one-key encryption, etc., and has h… | 2022-05-04T09:42:36.891000Z |
| var-202001-1971 | JCG JHR-N835R, with USB shared storage, shared printer and other functions. It still cont… | 2022-05-04T09:42:36.901000Z |
| var-201912-2009 | Xiaomi AI speaker is a smart speaker product produced by Xiaomi. There is a heap corrupt… | 2022-05-04T09:42:42.047000Z |
| var-201911-1953 | TP-LINK TL-WR703N is a mini wireless router of China TP-Link. The TP-LINK TL-WR703N rout… | 2022-05-04T09:42:43.357000Z |
| var-201910-1865 | EDS-405A / 408A series are 5-port and 8-port entry-level managed Ethernet switches design… | 2022-05-04T09:42:45.337000Z |
| var-201908-2204 | Jinan Youren Internet Technology Co., Ltd. is a technology company that makes serial netw… | 2022-05-04T09:42:51.050000Z |