Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0587 |
N/A
|
The privpath directive in glftpd 1.18 allows remo… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.318Z |
| CVE-2000-0588 |
N/A
|
SawMill 5.0.21 CGI program allows remote attacker… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.286Z |
| CVE-2000-0591 |
N/A
|
Novell BorderManager 3.0 and 3.5 allows remote at… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.295Z |
| CVE-2000-0594 |
N/A
|
BitchX IRC client does not properly cleanse an un… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.570Z |
| CVE-2000-0595 |
N/A
|
libedit searches for the .editrc file in the curr… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.453Z |
| CVE-2000-0596 |
N/A
|
Internet Explorer 5.x does not warn a user before… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.205Z |
| CVE-2000-0597 |
N/A
|
Microsoft Office 2000 (Excel and PowerPoint) and … |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.243Z |
| CVE-2000-0598 |
N/A
|
Fortech Proxy+ allows remote attackers to bypass … |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.288Z |
| CVE-2000-0599 |
N/A
|
Buffer overflow in iMesh 1.02 allows remote attac… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.264Z |
| CVE-2000-0601 |
N/A
|
LeafChat 1.7 IRC client allows a remote IRC serve… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.337Z |
| CVE-2000-0602 |
N/A
|
Secure Locate (slocate) in Red Hat Linux allows l… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.298Z |
| CVE-2000-0603 |
N/A
|
Microsoft SQL Server 7.0 allows a local user to b… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.290Z |
| CVE-2000-0604 |
N/A
|
gkermit in Red Hat Linux is improperly installed … |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.249Z |
| CVE-2000-0610 |
N/A
|
NetWin dMailWeb and cwMail 2.6g and earlier allow… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.271Z |
| CVE-2000-0611 |
N/A
|
The default configuration of NetWin dMailWeb and … |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.252Z |
| CVE-2000-0613 |
N/A
|
Cisco Secure PIX Firewall does not properly ident… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.253Z |
| CVE-2000-0616 |
N/A
|
Vulnerability in HP TurboIMAGE DBUTIL allows loca… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.248Z |
| CVE-2000-0621 |
N/A
|
Microsoft Outlook 98 and 2000, and Outlook Expres… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.528Z |
| CVE-2000-0624 |
N/A
|
Buffer overflow in Winamp 2.64 and earlier allows… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.534Z |
| CVE-2000-0627 |
N/A
|
BlackBoard CourseInfo 4.0 does not properly authe… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.328Z |
| CVE-2000-0628 |
N/A
|
The source.asp example script in the Apache ASP m… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.521Z |
| CVE-2000-0630 |
N/A
|
IIS 4.0 and 5.0 allows remote attackers to obtain… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.320Z |
| CVE-2000-0631 |
N/A
|
An administrative script from IIS 3.0, later incl… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.319Z |
| CVE-2000-0632 |
N/A
|
Buffer overflow in the web archive component of L… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.338Z |
| CVE-2000-0633 |
N/A
|
Vulnerability in Mandrake Linux usermode package … |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:28:40.443Z |
| CVE-2000-0634 |
N/A
|
The web administration interface for CommuniGate … |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:28:40.440Z |
| CVE-2000-0635 |
N/A
|
The view_page.html sample page in the MiniVend sh… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:28:40.651Z |
| CVE-2000-0636 |
N/A
|
HP JetDirect printers versions G.08.20 and H.08.2… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:28:40.761Z |
| CVE-2000-0637 |
N/A
|
Microsoft Excel 97 and 2000 allows an attacker to… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:28:40.803Z |
| CVE-2000-0638 |
N/A
|
bb-hostsvc.sh in Big Brother 1.4h1 and earlier al… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:28:40.511Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-1327 |
N/A
|
Buffer overflow in linuxconf 1.11r11-rh2 on Red H… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:03.125Z |
| CVE-1999-1328 |
N/A
|
linuxconf before 1.11.r11-rh3 on Red Hat Linux 5.… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:02.947Z |
| CVE-1999-1329 |
N/A
|
Buffer overflow in SysVInit in Red Hat Linux 5.1 … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:02.759Z |
| CVE-1999-1330 |
N/A
|
The snprintf function in the db library 1.85.4 ig… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:02.989Z |
| CVE-1999-1331 |
N/A
|
netcfg 2.16-1 in Red Hat Linux 4.2 allows the Eth… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:02.977Z |
| CVE-1999-1332 |
N/A
|
gzexe in the gzip package on Red Hat Linux 5.0 an… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:02.927Z |
| CVE-1999-1333 |
N/A
|
automatic download option in ncftp 2.4.2 FTP clie… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:02.854Z |
| CVE-1999-1334 |
N/A
|
Multiple buffer overflows in filter command in El… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:02.876Z |
| CVE-1999-1335 |
N/A
|
snmpd server in cmu-snmp SNMP package before 3.3-… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:02.973Z |
| CVE-1999-1339 |
N/A
|
Vulnerability when Network Address Translation (N… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:03.233Z |
| CVE-1999-1355 |
N/A
|
BMC Patrol component, when installed with Compaq … |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.156Z |
| CVE-1999-1358 |
N/A
|
When an administrator in Windows NT or Windows 20… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:02.951Z |
| CVE-1999-1359 |
N/A
|
When the Ntconfig.pol file is used on a server wh… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:03.177Z |
| CVE-1999-1360 |
N/A
|
Windows NT 4.0 allows local users to cause a deni… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:03.175Z |
| CVE-1999-1362 |
N/A
|
Win32k.sys in Windows NT 4.0 before SP2 allows lo… |
n/a |
n/a |
2002-06-25T04:00:00.000Z | 2024-08-01T17:11:03.287Z |
| CVE-1999-1363 |
N/A
|
Windows NT 3.51 and 4.0 allow local users to caus… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:02.923Z |
| CVE-1999-1364 |
N/A
|
Windows NT 4.0 allows local users to cause a deni… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.195Z |
| CVE-1999-1379 |
N/A
|
DNS allows remote attackers to use DNS name serve… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:02.922Z |
| CVE-1999-1382 |
N/A
|
NetWare NFS mode 1 and 2 implements the "Read Onl… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:03.221Z |
| CVE-1999-1386 |
N/A
|
Perl 5.004_04 and earlier follows symbolic links … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:02.970Z |
| CVE-1999-1444 |
N/A
|
genkey utility in Alibaba 2.0 generates RSA key p… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.230Z |
| CVE-1999-1451 |
N/A
|
The Winmsdp.exe sample file in IIS 4.0 and Site S… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.399Z |
| CVE-1999-1452 |
N/A
|
GINA in Windows NT 4.0 allows attackers with phys… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:03.388Z |
| CVE-1999-1455 |
N/A
|
RSH service utility RSHSVC in Windows NT 3.5 thro… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:03.319Z |
| CVE-1999-1456 |
N/A
|
thttpd HTTP server 2.03 and earlier allows remote… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:11:03.463Z |
| CVE-1999-1462 |
N/A
|
Vulnerability in bb-hist.sh CGI History module in… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:18:07.463Z |
| CVE-1999-1464 |
N/A
|
Vulnerability in Cisco IOS 11.1CC and 11.1CT with… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:18:07.449Z |
| CVE-1999-1465 |
N/A
|
Vulnerability in Cisco IOS 11.1 through 11.3 with… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:18:06.981Z |
| CVE-1999-1472 |
N/A
|
Internet Explorer 4.0 allows remote attackers to … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:18:07.213Z |
| CVE-1999-1473 |
N/A
|
When a Web site redirects the browser to another … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-01T17:18:07.466Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-5qfv-rr79-chx5 |
6.1 (3.1)
|
Cross-site Scripting in Ignite Realtime Openfire | 2019-08-27T17:37:33Z | 2022-11-17T18:22:53Z |
| ghsa-8cpw-73f2-w58m |
6.1 (3.1)
|
Cross-Site Scripting in selectize-plugin-a11y | 2019-08-27T17:38:33Z | 2021-08-17T22:13:00Z |
| ghsa-vx6v-2rg6-865h |
6.1 (3.1)
5.3 (4.0)
|
Cross-site Scripting in django-js-reverse | 2019-08-27T17:39:33Z | 2024-09-16T21:48:51Z |
| ghsa-f5f4-m7qp-w6gc |
6.1 (3.1)
|
Cross-site Scripting in Jooby | 2019-08-27T17:40:33Z | 2023-09-11T20:37:33Z |
| ghsa-4q98-wr72-h35w |
5.5 (3.1)
|
Improper input validation in Apache Santuario XML Security for Java | 2019-08-27T17:41:33Z | 2021-08-17T22:16:39Z |
| ghsa-fhjf-83wg-r2j9 |
9.8 (3.1)
|
Prototype Pollution in mixin-deep | 2019-08-27T17:42:33Z | 2023-11-29T20:55:21Z |
| ghsa-4g88-fppr-53pp |
9.8 (3.1)
|
Prototype Pollution in set-value | 2019-08-27T17:43:33Z | 2021-08-17T22:17:11Z |
| ghsa-xjjg-vmw6-c2p9 |
8.8 (3.1)
8.7 (4.0)
|
Open Redirect in httpie | 2019-08-27T17:44:33Z | 2024-09-20T21:26:30Z |
| ghsa-8j4w-5fw4-rm27 |
9.8 (3.1)
|
Prototype Pollution in deeply | 2019-08-27T17:45:33Z | 2021-08-17T22:18:25Z |
| ghsa-2j5x-56p6-hj6x |
5.3 (3.1)
|
Path Traversal in statichttpserver | 2019-09-04T10:02:14Z | 2023-09-12T19:30:43Z |
| ghsa-gjh4-fcv3-whpq |
6.1 (3.1)
|
Cross-Site Scripting in webtorrent | 2019-09-04T10:02:50Z | 2021-08-17T22:20:20Z |
| ghsa-pg2f-r7pc-6fxx |
8.8 (3.1)
8.6 (4.0)
|
Cross-Site Request Forgery in MicroPyramid Django CRM | 2019-09-11T22:57:57Z | 2024-09-16T13:44:56Z |
| ghsa-fxh6-w476-hgr4 |
5.5 (3.1)
|
Directory Traversal in SharpCompress | 2019-09-11T22:59:57Z | 2021-08-17T22:21:47Z |
| ghsa-cgjv-rghq-qhgp |
8.6 (3.1)
|
Path Traversal in algo-httpserv | 2019-09-11T23:00:57Z | 2021-08-17T22:22:48Z |
| ghsa-5w65-6875-rhq8 |
|
Undefined Behavior in sailsjs-cacheman | 2019-09-11T23:01:57Z | 2020-08-31T18:34:32Z |
| ghsa-536q-8gxx-m782 |
|
Cross-Site Scripting in dojo | 2019-09-11T23:02:57Z | 2020-08-31T18:42:32Z |
| ghsa-xf27-jqwv-gf3r |
7.5 (3.1)
|
Unintended Require in larvitbase-api | 2019-09-11T23:03:57Z | 2023-09-11T18:33:46Z |
| ghsa-g5m7-57ph-j6p8 |
8.8 (3.1)
|
OS Command Injection in Nexus Yum Repository Plugin | 2019-09-11T23:04:57Z | 2021-08-17T22:25:20Z |
| ghsa-2p82-v77v-mppr |
9.8 (3.1)
|
Airbrake keys not being filtered | 2019-09-11T23:05:57Z | 2023-06-09T20:03:44Z |
| ghsa-fcjw-8rhj-gwwc |
5.3 (3.1)
|
Authentication Bypass in Devise | 2019-09-11T23:06:57Z | 2023-01-23T20:12:32Z |
| ghsa-2xwv-3cc9-fp7c |
|
Sensitive Data Exposure in seneca | 2019-09-11T23:07:57Z | 2020-08-31T18:49:15Z |
| ghsa-gvxv-5fp2-358q |
5.9 (3.1)
|
Incorrect Resource Transfer Between Spheres in eclipse-wtp | 2019-09-11T23:08:57Z | 2022-11-17T18:24:26Z |
| ghsa-9mrq-cjgh-32g2 |
2.7 (4.0)
|
smartbanner.js rel noopener vulnerability | 2019-09-13T13:22:33Z | 2025-02-18T18:27:07Z |
| ghsa-62gw-3rmj-wmp2 |
7.5 (3.1)
|
High severity vulnerability that affects System.Management.Automation | 2019-09-13T13:25:47Z | 2025-04-02T22:32:31Z |
| ghsa-mwp6-j9wf-968c |
9.8 (3.1)
|
Critical severity vulnerability that affects generator-jhipster | 2019-09-13T21:33:25Z | 2021-10-11T21:10:33Z |
| ghsa-549f-73hh-mj38 |
10.0 (3.1)
|
Command Injection in gitlabhook | 2019-09-16T22:24:02Z | 2023-06-01T19:46:39Z |
| ghsa-63qc-p2x4-9fgf |
7.5 (3.1)
|
Improper Handling of Exceptional Conditions and Origin Validation Error in Eclipse Paho Java client… | 2019-09-17T22:47:11Z | 2021-04-27T19:46:40Z |
| ghsa-3v43-877x-qgmq |
6.1 (3.1)
|
Moderate severity vulnerability that affects league/commonmark | 2019-09-17T22:47:47Z | 2021-08-31T21:29:59Z |
| ghsa-p6mr-pxg4-68hx |
7.5 (3.1)
|
Symlink Arbitrary File Overwrite in bower | 2019-09-17T23:21:34Z | 2023-03-01T01:53:44Z |
| ghsa-mc84-xr9p-938r |
8.1 (3.1)
|
High severity vulnerability that affects generator-jhipster | 2019-09-23T18:31:05Z | 2021-09-15T18:50:22Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-696 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:26.840571Z |
| pysec-2021-697 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.008570Z |
| pysec-2021-698 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.168452Z |
| pysec-2021-699 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.365628Z |
| pysec-2021-700 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.544548Z |
| pysec-2021-701 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.716876Z |
| pysec-2021-702 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:27.875893Z |
| pysec-2021-703 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.044558Z |
| pysec-2021-704 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.203971Z |
| pysec-2021-705 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.365362Z |
| pysec-2021-706 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.532911Z |
| pysec-2021-707 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.711775Z |
| pysec-2021-708 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:28.875018Z |
| pysec-2021-709 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:29.040868Z |
| pysec-2021-710 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:29.199701Z |
| pysec-2021-711 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite computa… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:29.363788Z |
| pysec-2021-712 |
|
TensorFlow is an end-to-end open source platform for machine learning. Optimized pooling … | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:29.712146Z |
| pysec-2021-713 |
|
TensorFlow is an end-to-end open source platform for machine learning. The `Prepare` step… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:29.871064Z |
| pysec-2021-714 |
|
TensorFlow is an end-to-end open source platform for machine learning. The optimized impl… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.034082Z |
| pysec-2021-715 |
|
TensorFlow is an end-to-end open source platform for machine learning. The reference impl… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.233507Z |
| pysec-2021-716 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.403366Z |
| pysec-2021-717 |
|
TensorFlow is an end-to-end open source platform for machine learning. TFlite graphs must… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.563708Z |
| pysec-2021-718 |
|
TensorFlow is an end-to-end open source platform for machine learning. The fix for CVE-20… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.746202Z |
| pysec-2021-719 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:30.927051Z |
| pysec-2021-720 |
|
TensorFlow is an end-to-end open source platform for machine learning. TFLite's convoluti… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.088691Z |
| pysec-2021-721 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.250576Z |
| pysec-2021-722 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.406437Z |
| pysec-2021-723 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.566408Z |
| pysec-2021-724 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.724950Z |
| pysec-2021-725 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-gpu | 2021-05-14T20:15:00Z | 2021-12-09T06:35:31.883346Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-4480 | Malicious code in maps-theme (npm) | 2022-06-20T20:12:29Z | 2022-06-20T20:12:30Z |
| mal-2022-491 | Malicious code in @ozon-bx/ui-components (npm) | 2022-06-20T20:12:29Z | 2022-06-20T20:12:29Z |
| mal-2022-610 | Malicious code in @sravni/oh-my-got (npm) | 2022-06-20T20:12:29Z | 2022-06-20T20:12:29Z |
| mal-2022-6149 | Malicious code in skfb-viewer-protocol (npm) | 2022-06-20T20:12:29Z | 2022-06-20T20:12:30Z |
| mal-2022-2214 | Malicious code in coupa-common-js (npm) | 2022-06-20T20:12:30Z | 2022-06-20T20:12:36Z |
| mal-2022-2583 | Malicious code in dpgs (npm) | 2022-06-20T20:12:30Z | 2022-06-20T20:12:30Z |
| mal-2022-3598 | Malicious code in helloadmin (npm) | 2022-06-20T20:12:30Z | 2022-06-20T20:12:30Z |
| mal-2022-6229 | Malicious code in spark-pr-board (npm) | 2022-06-20T20:12:30Z | 2022-06-20T20:12:31Z |
| mal-2022-4283 | Malicious code in lenovo-js-sdk (npm) | 2022-06-20T20:12:36Z | 2022-06-20T20:12:37Z |
| mal-2022-5336 | Malicious code in pingan-js-sdk (npm) | 2022-06-20T20:12:36Z | 2022-06-20T20:12:37Z |
| mal-2022-5489 | Malicious code in protobufjs-databricks (npm) | 2022-06-20T20:12:36Z | 2022-06-20T20:12:36Z |
| mal-2022-6456 | Malicious code in tencent-js-sdk (npm) | 2022-06-20T20:12:36Z | 2022-06-20T20:12:37Z |
| mal-2022-7111 | Malicious code in wechat-mobile (npm) | 2022-06-20T20:12:37Z | 2022-06-20T20:12:38Z |
| mal-2022-7112 | Malicious code in wechat-rn (npm) | 2022-06-20T20:12:37Z | 2022-06-20T20:12:37Z |
| mal-2022-937 | Malicious code in alicloud-js-sdk (npm) | 2022-06-20T20:12:37Z | 2022-06-20T20:12:37Z |
| mal-2022-942 | Malicious code in aliyun-js-sdk (npm) | 2022-06-20T20:12:37Z | 2022-06-20T20:12:38Z |
| mal-2022-3709 | Malicious code in huawei-js-sdk (npm) | 2022-06-20T20:12:38Z | 2022-06-20T20:12:38Z |
| mal-2022-5556 | Malicious code in qq-qrcode-login (npm) | 2022-06-20T20:12:38Z | 2022-06-20T20:12:38Z |
| mal-2022-5557 | Malicious code in qq-web-login (npm) | 2022-06-20T20:12:38Z | 2022-06-20T20:12:38Z |
| mal-2022-7115 | Malicious code in wechat-web-login (npm) | 2022-06-20T20:12:38Z | 2022-06-20T20:12:39Z |
| mal-2022-941 | Malicious code in alipay-js-jdk (npm) | 2022-06-20T20:12:38Z | 2022-06-20T20:12:39Z |
| mal-2022-1746 | Malicious code in bytedance-js-jdk (npm) | 2022-06-20T20:12:39Z | 2022-06-20T20:12:40Z |
| mal-2022-2575 | Malicious code in douyin-js-jdk (npm) | 2022-06-20T20:12:39Z | 2022-06-20T20:12:40Z |
| mal-2022-4544 | Malicious code in meituan-js-jdk (npm) | 2022-06-20T20:12:39Z | 2022-06-20T20:12:39Z |
| mal-2022-7114 | Malicious code in wechat-user (npm) | 2022-06-20T20:12:39Z | 2022-06-20T20:12:39Z |
| mal-2022-3006 | Malicious code in feishu-js-jdk (npm) | 2022-06-20T20:12:40Z | 2022-06-20T20:12:40Z |
| mal-2022-7109 | Malicious code in wechat-base (npm) | 2022-06-20T20:12:40Z | 2022-06-20T20:12:40Z |
| mal-2022-7113 | Malicious code in wechat-service (npm) | 2022-06-20T20:12:40Z | 2022-06-20T20:12:46Z |
| mal-2022-934 | Malicious code in alicloud-common (npm) | 2022-06-20T20:12:45Z | 2022-06-20T20:12:46Z |
| mal-2022-3007 | Malicious code in feishu-qrcode-login (npm) | 2022-06-20T20:12:46Z | 2022-06-20T20:12:47Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-0381 | ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-06-16T22:00:00.000+00:00 | 2024-08-05T22:00:00.000+00:00 |
| wid-sec-w-2022-0383 | Ghostscript: Schwachstelle ermöglicht Denial of Service | 2022-06-16T22:00:00.000+00:00 | 2023-09-17T22:00:00.000+00:00 |
| wid-sec-w-2022-0385 | Squid: Schwachstelle ermöglicht Denial of Service | 2022-06-19T22:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2022-0397 | vim: Mehrere Schwachstellen | 2022-06-19T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0412 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-06-20T22:00:00.000+00:00 | 2023-02-15T23:00:00.000+00:00 |
| wid-sec-w-2022-0415 | vim: Schwachstelle ermöglicht Codeausführung | 2022-06-20T22:00:00.000+00:00 | 2023-04-03T22:00:00.000+00:00 |
| wid-sec-w-2022-0425 | OpenSSL: Schwachstelle ermöglicht Codeausführung | 2022-06-21T22:00:00.000+00:00 | 2025-10-20T22:00:00.000+00:00 |
| wid-sec-w-2022-0429 | QEMU: Schwachstelle ermöglicht Codeausführung | 2022-06-21T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2022-0432 | Xerox FreeFlow Print Server: Mehrere Schwachstellen | 2022-06-21T22:00:00.000+00:00 | 2025-10-06T22:00:00.000+00:00 |
| wid-sec-w-2022-0436 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-06-21T22:00:00.000+00:00 | 2022-12-26T23:00:00.000+00:00 |
| wid-sec-w-2022-0439 | Red Hat OpenStack: Mehrere Schwachstellen | 2022-06-22T22:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0440 | vim: Schwachstelle ermöglicht Codeausführung | 2022-06-22T22:00:00.000+00:00 | 2023-04-03T22:00:00.000+00:00 |
| wid-sec-w-2022-0444 | SaltStack Salt: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-06-22T22:00:00.000+00:00 | 2023-11-06T23:00:00.000+00:00 |
| wid-sec-w-2022-0445 | Jenkins: Mehrere Schwachstellen | 2022-06-22T22:00:00.000+00:00 | 2023-02-22T23:00:00.000+00:00 |
| wid-sec-w-2022-0449 | Apache Tomcat: Schwachstelle ermöglicht Cross-Site Scripting | 2022-06-22T22:00:00.000+00:00 | 2023-10-31T23:00:00.000+00:00 |
| wid-sec-w-2022-0456 | tribe29 checkmk: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2022-06-23T22:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0457 | IBM DB2: Mehrere Schwachstellen | 2022-06-23T22:00:00.000+00:00 | 2023-02-28T23:00:00.000+00:00 |
| wid-sec-w-2022-0459 | vim: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-06-23T22:00:00.000+00:00 | 2023-08-02T22:00:00.000+00:00 |
| wid-sec-w-2022-0461 | CoreDNS: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-06-23T22:00:00.000+00:00 | 2025-10-12T22:00:00.000+00:00 |
| wid-sec-w-2022-0473 | vim: Schwachstelle ermöglicht Codeausführung | 2022-06-26T22:00:00.000+00:00 | 2023-04-03T22:00:00.000+00:00 |
| wid-sec-w-2022-0479 | cURL: Mehrere Schwachstellen | 2022-06-26T22:00:00.000+00:00 | 2025-11-06T23:00:00.000+00:00 |
| wid-sec-w-2022-0485 | vim: Schwachstelle ermöglicht Codeausführung | 2022-06-27T22:00:00.000+00:00 | 2023-08-02T22:00:00.000+00:00 |
| wid-sec-w-2022-0500 | Red Hat Directory Server: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-06-28T22:00:00.000+00:00 | 2022-12-13T23:00:00.000+00:00 |
| wid-sec-w-2022-0501 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-06-28T22:00:00.000+00:00 | 2023-02-21T23:00:00.000+00:00 |
| wid-sec-w-2022-0504 | OpenSSL: Schwachstelle ermöglicht Denial of Service und Codeausführung | 2022-06-28T22:00:00.000+00:00 | 2024-11-25T23:00:00.000+00:00 |
| wid-sec-w-2022-0505 | Mozilla Produkte: Mehrere Schwachstellen | 2022-06-28T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2022-0508 | IBM Tivoli Netcool/OMNIbus: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-06-29T22:00:00.000+00:00 | 2023-09-07T22:00:00.000+00:00 |
| wid-sec-w-2022-0511 | GnuPGP: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-06-29T22:00:00.000+00:00 | 2024-08-11T22:00:00.000+00:00 |
| wid-sec-w-2022-0515 | IBM Spectrum Protect: Mehrere Schwachstellen | 2022-06-29T22:00:00.000+00:00 | 2023-06-08T22:00:00.000+00:00 |
| wid-sec-w-2022-0516 | Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-06-29T22:00:00.000+00:00 | 2023-01-30T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-21-110-03 | Delta Industrial Automation COMMGR | 2021-04-20T00:00:00.000000Z | 2021-04-20T00:00:00.000000Z |
| icsa-21-110-04 | Delta Electronics CNCSoft ScreenEditor | 2021-04-20T00:00:00.000000Z | 2021-04-20T00:00:00.000000Z |
| icsa-21-110-05 | Delta Electronics CNCSoft-B | 2021-04-20T00:00:00.000000Z | 2021-04-20T00:00:00.000000Z |
| icsa-21-110-06 | Eaton Intelligent Power Manager | 2021-04-20T00:00:00.000000Z | 2021-04-20T00:00:00.000000Z |
| icsa-21-112-01 | Horner Automation Cscape | 2021-04-22T00:00:00.000000Z | 2021-04-22T00:00:00.000000Z |
| icsa-21-112-02 | Mitsubishi Electric GOT (Update A) | 2021-04-22T00:00:00.000000Z | 2021-07-27T00:00:00.000000Z |
| icsa-21-119-01 | Texas Instruments SimpleLink | 2021-04-29T00:00:00.000000Z | 2021-04-29T00:00:00.000000Z |
| icsa-21-119-02 | Cassia Networks Access Controller | 2021-04-29T00:00:00.000000Z | 2021-04-29T00:00:00.000000Z |
| icsa-21-119-03 | Johnson Controls Exacq Technologies exacqVision | 2021-04-29T00:00:00.000000Z | 2021-04-29T00:00:00.000000Z |
| icsa-21-119-04 | Multiple RTOS (Update E) | 2021-04-29T00:00:00.000000Z | 2022-04-19T00:00:00.000000Z |
| icsa-21-124-01 | Advantech WISE-PaaS RMM | 2021-05-04T00:00:00.000000Z | 2021-05-04T00:00:00.000000Z |
| icsa-21-124-02 | Delta Electronics CNCSoft ScreenEditor | 2021-05-04T00:00:00.000000Z | 2021-05-04T00:00:00.000000Z |
| icsa-21-131-01 | Omron CX-One | 2021-05-11T00:00:00.000000Z | 2021-05-11T00:00:00.000000Z |
| icsa-21-131-02 | Mitsubishi Electric GOT and Tension Controller (Update A) | 2021-05-11T00:00:00.000000Z | 2022-01-20T00:00:00.000000Z |
| icsa-21-131-03 | Siemens Linux-based Products (Update J) | 2021-05-11T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-21-131-04 | Siemens SINAMICS Medium Voltage Products Remote Access (Update B) | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-05 | Siemens Mendix Database Replication Module | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-06 | Siemens SNMP Implementation of WinCC Runtime | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-07 | Siemens SIMATIC NET CP343-1 | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-08 | Siemens Tecnomatix Plant Simulation | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-09 | Siemens Mendix Excel Importer Module | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-10 | Siemens SCALANCE XM-400 and XR-500 Devices | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-11 | Siemens SIMATIC UltraVNC HMI WinCC Products | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-12 | Siemens SIMATIC SmartVNC HMI WinCC Products (Update B) | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-13 | Siemens SINAMICS Medium Voltage Products Telnet (Update A) | 2021-05-11T00:00:00.000000Z | 2021-08-10T00:00:00.000000Z |
| icsa-21-131-14 | Siemens SCALANCE W1750D (Update B) | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-131-15 | Siemens SIMATIC S7-1500 | 2021-05-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-132-05 | Siemens Industrial PCs and CNC devices | 2021-05-11T00:00:00.000000Z | 2022-12-13T00:00:00.000000Z |
| icsa-21-133-01 | Rockwell Automation Connected Components Workbench | 2021-05-13T00:00:00.000000Z | 2021-05-13T00:00:00.000000Z |
| icsa-21-133-02 | Johnson Controls Sensormatic Tyco AI | 2021-05-13T00:00:00.000000Z | 2021-05-13T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-nxos-ipv6-netstack-edxpgv7k | Cisco NX-OS Software IPv6 Netstack Denial of Service Vulnerability | 2021-02-24T16:00:00+00:00 | 2021-02-24T16:00:00+00:00 |
| cisco-sa-nxos-nxapi-csrf-wrmzwl9z | Cisco NX-OS Software NX-API Cross-Site Request Forgery Vulnerability | 2021-02-24T16:00:00+00:00 | 2021-02-24T16:00:00+00:00 |
| cisco-sa-nxos-pim-dos-y8sjmz4 | Cisco NX-OS Software Protocol Independent Multicast Denial of Service Vulnerability | 2021-02-24T16:00:00+00:00 | 2021-02-24T16:00:00+00:00 |
| cisco-sa-nxos-udld-rce-xeth6w35 | Cisco FXOS and NX-OS Software Unidirectional Link Detection Denial of Service and Arbitrary Code Execution Vulnerability | 2021-02-24T16:00:00+00:00 | 2021-02-24T16:00:00+00:00 |
| cisco-sa-esa-sma-info-disclo-vou2ghbz | Cisco Content Security Management Appliance Information Disclosure Vulnerability | 2021-03-03T16:00:00+00:00 | 2021-04-12T12:54:51+00:00 |
| cisco-sa-ipphone-rce-dos-u2psskz3 | Cisco IP Phones Buffer Overflow and Denial of Service Vulnerabilities | 2021-03-03T16:00:00+00:00 | 2021-03-03T16:00:00+00:00 |
| cisco-sa-nso-path-trvsl-dzrqe8lc | Cisco Network Services Orchestrator Path Traversal Vulnerability | 2021-03-03T16:00:00+00:00 | 2021-03-03T16:00:00+00:00 |
| cisco-sa-sdw-sqlinj-hdjueeax | Cisco SD-WAN vManage SQL Injection Vulnerability | 2021-03-03T16:00:00+00:00 | 2021-03-03T16:00:00+00:00 |
| cisco-sa-sdwan-privesc-vman-kth3c82b | Cisco SD-WAN vManage Software Privilege Escalation Vulnerability | 2021-03-03T16:00:00+00:00 | 2021-03-03T16:00:00+00:00 |
| cisco-sa-sdwan-sigverbypass-gpyxd6mk | Cisco SD-WAN Software Signature Verification Bypass Vulnerability | 2021-03-03T16:00:00+00:00 | 2021-03-03T16:00:00+00:00 |
| cisco-sa-sdwan-vdaemon-bo-ruzzea2 | Cisco SD-WAN vDaemon Buffer Overflow Vulnerability | 2021-03-03T16:00:00+00:00 | 2021-03-03T16:00:00+00:00 |
| cisco-sa-sdwanvman-infodis1-yuqschb | Cisco SD-WAN vManage Information Disclosure Vulnerability | 2021-03-03T16:00:00+00:00 | 2021-03-03T16:00:00+00:00 |
| cisco-sa-snort-ethernet-dos-hgxgjh8n | Multiple Cisco Products Snort Ethernet Frame Decoder Denial of Service Vulnerability | 2021-03-03T16:00:00+00:00 | 2021-03-03T16:00:00+00:00 |
| cisco-sa-staros-ipsecmgr-dos-3gkhxwvs | Cisco ASR 5000 Series Software (StarOS) ipsecmgr Process Denial of Service Vulnerability | 2021-03-03T16:00:00+00:00 | 2021-03-03T16:00:00+00:00 |
| cisco-sa-vman-authorization-b-guepslk | Cisco SD-WAN vManage Authorization Bypass Vulnerability | 2021-03-03T16:00:00+00:00 | 2021-03-03T16:00:00+00:00 |
| cisco-sa-vman-dir-trav-bpwc5gtm | Cisco SD-WAN vManage Directory Traversal Vulnerability | 2021-03-03T16:00:00+00:00 | 2021-03-03T16:00:00+00:00 |
| cisco-sa-webex-distupd-n87eb6z3 | Cisco Webex Meetings Unauthorized Distribution List Update Vulnerability | 2021-03-03T16:00:00+00:00 | 2021-03-03T16:00:00+00:00 |
| cisco-sa-rv-132w134w-overflow-pptt4h2p | Cisco Small Business RV132W and RV134W Routers Management Interface Remote Command Execution and Denial of Service Vulnerability | 2021-03-17T16:00:00+00:00 | 2021-03-17T16:00:00+00:00 |
| cisco-sa-aironet-info-disc-bfwqghj | Cisco Aironet Access Points FlexConnect Upgrade Information Disclosure Vulnerability | 2021-03-24T16:00:00+00:00 | 2021-03-24T16:00:00+00:00 |
| cisco-sa-aironet-mdns-dos-e6kwyumx | Cisco Aironet Access Points FlexConnect Multicast DNS Denial of Service Vulnerability | 2021-03-24T16:00:00+00:00 | 2021-03-24T16:00:00+00:00 |
| cisco-sa-alg-dos-hbbs7sze | Cisco IOS XE Software DNS NAT Protocol Application Layer Gateway Denial of Service Vulnerability | 2021-03-24T16:00:00+00:00 | 2021-03-24T16:00:00+00:00 |
| cisco-sa-ap-foverwrt-hyvxvrtb | Cisco Aironet Access Points Arbitrary File Overwrite Vulnerability | 2021-03-24T16:00:00+00:00 | 2021-03-24T16:00:00+00:00 |
| cisco-sa-ap-privesc-wevfp8ud | Cisco Access Point Software Arbitrary Code Execution Vulnerability | 2021-03-24T16:00:00+00:00 | 2021-03-24T16:00:00+00:00 |
| cisco-sa-arp-mtfhbfje | Cisco IOS and IOS XE Software ARP Resource Management Exhaustion Denial of Service Vulnerability | 2021-03-24T16:00:00+00:00 | 2021-03-24T16:00:00+00:00 |
| cisco-sa-cisco-jabber-pwrtattc | Cisco Jabber Desktop and Mobile Client Software Vulnerabilities | 2021-03-24T16:00:00+00:00 | 2021-03-25T13:44:34+00:00 |
| cisco-sa-ewlc-capwap-dos-2oa3jgks | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerability | 2021-03-24T16:00:00+00:00 | 2021-03-24T16:00:00+00:00 |
| cisco-sa-ewlc-xss-cafmtczv | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family Stored Cross-Site Scripting Vulnerability | 2021-03-24T16:00:00+00:00 | 2021-03-24T16:00:00+00:00 |
| cisco-sa-fast-zqr6dd5 | Cisco IOS XE Software Fast Reload Vulnerabilities | 2021-03-24T16:00:00+00:00 | 2021-03-31T18:40:34+00:00 |
| cisco-sa-ios-xe-cat-verify-bq5hrxgh | Cisco IOS XE Software for the Catalyst 9000 Family Arbitrary Code Execution Vulnerability | 2021-03-24T16:00:00+00:00 | 2021-03-24T16:00:00+00:00 |
| cisco-sa-ios-xe-evss-code-exe-8cw5vsvw | Cisco IOS XE Software Easy Virtual Switching System Arbitrary Code Execution Vulnerability | 2021-03-24T16:00:00+00:00 | 2021-03-24T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-41495 | Null Pointer Dereference vulnerability exists in numpy.sort in NumPy < and 1.19 in the PyArray_DescrNew function due to missing return-value validation which allows attackers to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing an error can only occur due to an exhaustion of memory. If the user can exhaust memory they are already privileged. Further it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place | 2021-12-02T00:00:00.000Z | 2021-12-23T00:00:00.000Z |
| msrc_cve-2021-41496 | Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19 which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. NOTE: The vendor does not agree this is a vulnerability; the negative dimensions can only be created by an already privileged user (or internally) | 2021-12-02T00:00:00.000Z | 2021-12-28T00:00:00.000Z |
| msrc_cve-2021-41500 | Incomplete string comparison vulnerability exits in cvxopt.org cvxop <= 1.2.6 in APIs (cvxopt.cholmod.diag, cvxopt.cholmod.getfactor, cvxopt.cholmod.solve, cvxopt.cholmod.spsolve), which allows attackers to conduct Denial of Service attacks by construct fake Capsule objects. | 2021-12-02T00:00:00.000Z | 2025-09-03T21:33:36.000Z |
| msrc_cve-2021-4166 | Out-of-bounds Read in vim/vim | 2021-12-02T00:00:00.000Z | 2022-01-05T00:00:00.000Z |
| msrc_cve-2021-4173 | Use After Free in vim/vim | 2021-12-02T00:00:00.000Z | 2022-01-08T00:00:00.000Z |
| msrc_cve-2021-4181 | Crash in the Sysdig Event dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file | 2021-12-02T00:00:00.000Z | 2022-01-19T00:00:00.000Z |
| msrc_cve-2021-4182 | Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file | 2021-12-02T00:00:00.000Z | 2022-01-19T00:00:00.000Z |
| msrc_cve-2021-4184 | Infinite loop in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file | 2021-12-02T00:00:00.000Z | 2022-01-19T00:00:00.000Z |
| msrc_cve-2021-4185 | Infinite loop in the RTMPT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file | 2021-12-02T00:00:00.000Z | 2022-01-19T00:00:00.000Z |
| msrc_cve-2021-4186 | Crash in the Gryphon dissector in Wireshark 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file | 2021-12-02T00:00:00.000Z | 2022-01-19T00:00:00.000Z |
| msrc_cve-2021-4187 | Use After Free in vim/vim | 2021-12-02T00:00:00.000Z | 2022-01-12T00:00:00.000Z |
| msrc_cve-2021-4190 | Large loop in the Kafka dissector in Wireshark 3.6.0 allows denial of service via packet injection or crafted capture file | 2021-12-02T00:00:00.000Z | 2022-03-26T00:00:00.000Z |
| msrc_cve-2021-4192 | Use After Free in vim/vim | 2021-12-02T00:00:00.000Z | 2022-01-08T00:00:00.000Z |
| msrc_cve-2021-4193 | Out-of-bounds Read in vim/vim | 2021-12-02T00:00:00.000Z | 2022-01-08T00:00:00.000Z |
| msrc_cve-2021-43527 | NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS S/MIME PKCS \#7 or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS X.509 OCSP or CRL functionality may be impacted depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However email clients and PDF viewers that use NSS for signature verification such as Thunderbird LibreOffice Evolution and Evince are believed to be impacted. This vulnerability affects NSS < 3.73 and NSS < 3.68.1. | 2021-12-02T00:00:00.000Z | 2021-12-17T00:00:00.000Z |
| msrc_cve-2021-43784 | Overflow in netlink bytemsg length field allows attacker to override netlink-based container configuration | 2021-12-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-43818 | HTML Cleaner allows crafted and SVG embedded scripts to pass through | 2021-12-02T00:00:00.000Z | 2021-12-17T00:00:00.000Z |
| msrc_cve-2021-44224 | Possible NULL dereference or SSRF in forward proxy configurations in Apache HTTP Server 2.4.51 and earlier | 2021-12-02T00:00:00.000Z | 2021-12-23T00:00:00.000Z |
| msrc_cve-2021-44732 | Mbed TLS before 3.0.1 has a double free in certain out-of-memory conditions, as demonstrated by an mbedtls_ssl_set_session() failure. | 2021-12-02T00:00:00.000Z | 2026-02-18T02:45:56.000Z |
| msrc_cve-2021-44733 | A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object. | 2021-12-02T00:00:00.000Z | 2022-01-04T00:00:00.000Z |
| msrc_cve-2021-44790 | Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier | 2021-12-02T00:00:00.000Z | 2021-12-23T00:00:00.000Z |
| msrc_cve-2021-45078 | stab_xcoff_builtin_type in stabs.c in GNU Binutils through 2.37 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact as demonstrated by an out-of-bounds write. NOTE: this issue exists because of an incorrect fix for CVE-2018-12699. | 2021-12-02T00:00:00.000Z | 2021-12-21T00:00:00.000Z |
| msrc_cve-2021-45095 | pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak. | 2021-12-02T00:00:00.000Z | 2021-12-21T00:00:00.000Z |
| msrc_cve-2021-45469 | In __f2fs_setxattr in fs/f2fs/xattr.c in the Linux kernel through 5.15.11 there is an out-of-bounds memory access when an inode has an invalid last xattr entry. | 2021-12-02T00:00:00.000Z | 2022-01-05T00:00:00.000Z |
| msrc_cve-2021-45480 | An issue was discovered in the Linux kernel before 5.15.11. There is a memory leak in the __rds_conn_create() function in net/rds/connection.c in a certain combination of circumstances. | 2021-12-02T00:00:00.000Z | 2026-02-18T01:30:51.000Z |
| msrc_cve-2021-45485 | In the IPv6 implementation in the Linux kernel before 5.13.3 net/ipv6/output_core.c has an information leak because of certain use of a hash table which although big doesn't properly consider that IPv6-based attackers can typically choose among many IPv6 source addresses. | 2021-12-02T00:00:00.000Z | 2022-01-12T00:00:00.000Z |
| msrc_cve-2021-45486 | In the IPv4 implementation in the Linux kernel before 5.12.4 net/ipv4/route.c has an information leak because the hash table is very small. | 2021-12-02T00:00:00.000Z | 2022-01-11T00:00:00.000Z |
| msrc_cve-2021-45707 | An issue was discovered in the nix crate 0.16.0 and later before 0.20.2 0.21.x before 0.21.2 and 0.22.x before 0.22.2 for Rust. unistd::getgrouplist has an out-of-bounds write if a user is in more than 16 /etc/groups groups. | 2021-12-02T00:00:00.000Z | 2026-02-18T02:09:27.000Z |
| msrc_cve-2021-45952 | Dnsmasq 2.86 has a heap-based buffer overflow in dhcp_reply (called from dhcp_packet and FuzzDhcp). NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 "do not represent real vulnerabilities to the best of our knowledge. | 2021-12-02T00:00:00.000Z | 2023-03-25T00:00:00.000Z |
| msrc_cve-2021-45953 | Dnsmasq 2.86 has a heap-based buffer overflow in extract_name (called from hash_questions and fuzz_util.c). NOTE: the vendor's position is that CVE-2021-45951 through CVE-2021-45957 "do not represent real vulnerabilities to the best of our knowledge. | 2021-12-02T00:00:00.000Z | 2023-03-25T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2020:1660-1 | Security update for nodejs10 | 2020-10-12T08:24:04Z | 2020-10-12T08:24:04Z |
| opensuse-su-2020:1664-1 | Security update for qemu | 2020-10-12T22:21:35Z | 2020-10-12T22:21:35Z |
| opensuse-su-2020:1666-1 | Security update for tigervnc | 2020-10-13T08:25:36Z | 2020-10-13T08:25:36Z |
| opensuse-su-2020:1674-1 | Security update for icingaweb2 | 2020-10-16T12:22:34Z | 2020-10-16T12:22:34Z |
| opensuse-su-2020:1675-1 | Security update for phpMyAdmin | 2020-10-16T12:23:05Z | 2020-10-16T12:23:05Z |
| opensuse-su-2020:1676-1 | Security update for libproxy | 2020-10-16T18:23:16Z | 2020-10-16T18:23:16Z |
| opensuse-su-2020:1677-1 | Security update for rubygem-activesupport-5_1 | 2020-10-16T18:23:27Z | 2020-10-16T18:23:27Z |
| opensuse-su-2020:1678-1 | Security update for crmsh | 2020-10-17T04:22:27Z | 2020-10-17T04:22:27Z |
| opensuse-su-2020:1679-1 | Security update for rubygem-activesupport-5_1 | 2020-10-17T04:22:35Z | 2020-10-17T04:22:35Z |
| opensuse-su-2020:1680-1 | Security update for libproxy | 2020-10-17T04:22:46Z | 2020-10-17T04:22:46Z |
| opensuse-su-2020:1682-1 | Security update for the Linux Kernel | 2020-10-17T08:06:42Z | 2020-10-17T08:06:42Z |
| opensuse-su-2020:1687-1 | Security update for pdns-recursor | 2020-10-17T14:22:35Z | 2020-10-17T14:22:35Z |
| opensuse-su-2020:1688-1 | Security update for crmsh | 2020-10-17T18:21:45Z | 2020-10-17T18:21:45Z |
| opensuse-su-2020:1692-1 | Security update for gcc10, nvptx-tools | 2020-10-18T15:37:03Z | 2020-10-18T15:37:03Z |
| opensuse-su-2020:1693-1 | Security update for gcc10, nvptx-tools | 2020-10-18T15:38:42Z | 2020-10-18T15:38:42Z |
| opensuse-su-2020:1698-1 | Security update for the Linux Kernel | 2020-10-19T16:23:34Z | 2020-10-19T16:23:34Z |
| opensuse-su-2020:1699-1 | Security update for bind | 2020-10-19T18:22:55Z | 2020-10-19T18:22:55Z |
| opensuse-su-2020:1701-1 | Security update for bind | 2020-10-20T04:20:51Z | 2020-10-20T04:20:51Z |
| opensuse-su-2020:1702-1 | Security update for transfig | 2020-10-20T04:20:58Z | 2020-10-20T04:20:58Z |
| opensuse-su-2020:1703-1 | Security update for php7 | 2020-10-20T08:23:51Z | 2020-10-20T08:23:51Z |
| opensuse-su-2020:1705-1 | Security update for chromium | 2020-10-22T05:51:33Z | 2020-10-22T05:51:33Z |
| opensuse-su-2020:1707-1 | Recommended update for mailman | 2020-10-22T12:27:35Z | 2020-10-22T12:27:35Z |
| opensuse-su-2020:1713-1 | Security update for opera | 2020-10-23T10:27:55Z | 2020-10-23T10:27:55Z |
| opensuse-su-2020:1715-1 | Security update for chromium | 2020-10-23T12:21:50Z | 2020-10-23T12:21:50Z |
| opensuse-su-2020:1717-1 | Security update for hunspell | 2020-10-23T18:21:56Z | 2020-10-23T18:21:56Z |
| opensuse-su-2020:1718-1 | Security update for chromium | 2020-10-23T23:16:52Z | 2020-10-23T23:16:52Z |
| opensuse-su-2020:1719-1 | Security update for hunspell | 2020-10-24T08:21:43Z | 2020-10-24T08:21:43Z |
| opensuse-su-2020:1723-1 | Security update for kleopatra | 2020-10-24T18:20:55Z | 2020-10-24T18:20:55Z |
| opensuse-su-2020:1724-1 | Security update for gnutls | 2020-10-24T22:22:04Z | 2020-10-24T22:22:04Z |
| opensuse-su-2020:1731-1 | Security update for chromium | 2020-10-25T11:21:44Z | 2020-10-25T11:21:44Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2009:0007 | Red Hat Security Advisory: rhpki security and bug fix update | 2009-01-29T09:31:00+00:00 | 2025-11-21T17:34:07+00:00 |
| rhsa-2009:0046 | Red Hat Security Advisory: ntp security update | 2009-01-29T09:45:00+00:00 | 2025-11-21T17:34:13+00:00 |
| rhsa-2009:0256 | Red Hat Security Advisory: firefox security update | 2009-02-04T08:59:00+00:00 | 2025-11-21T17:34:13+00:00 |
| rhsa-2009:0257 | Red Hat Security Advisory: seamonkey security update | 2009-02-04T09:39:00+00:00 | 2025-11-21T17:34:13+00:00 |
| rhsa-2009:0053 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2009-02-04T15:05:00+00:00 | 2025-11-21T17:34:11+00:00 |
| rhsa-2009:0267 | Red Hat Security Advisory: sudo security update | 2009-02-05T15:59:00+00:00 | 2025-11-21T17:34:14+00:00 |
| rhsa-2009:0271 | Red Hat Security Advisory: gstreamer-plugins-good security update | 2009-02-06T12:42:00+00:00 | 2025-11-21T17:34:15+00:00 |
| rhsa-2009:0269 | Red Hat Security Advisory: gstreamer-plugins security update | 2009-02-06T12:45:00+00:00 | 2025-11-21T17:34:15+00:00 |
| rhsa-2009:0270 | Red Hat Security Advisory: gstreamer-plugins security update | 2009-02-06T12:48:00+00:00 | 2025-11-21T17:34:15+00:00 |
| rhsa-2009:0264 | Red Hat Security Advisory: kernel security update | 2009-02-10T15:50:00+00:00 | 2025-11-21T17:34:14+00:00 |
| rhsa-2009:0012 | Red Hat Security Advisory: netpbm security update | 2009-02-11T16:51:00+00:00 | 2025-11-21T17:34:08+00:00 |
| rhsa-2009:0259 | Red Hat Security Advisory: mod_auth_mysql security update | 2009-02-11T16:58:00+00:00 | 2025-11-21T17:34:13+00:00 |
| rhsa-2009:0261 | Red Hat Security Advisory: vnc security update | 2009-02-11T17:52:00+00:00 | 2025-11-21T17:34:13+00:00 |
| rhsa-2009:0308 | Red Hat Security Advisory: cups security update | 2009-02-19T17:41:00+00:00 | 2025-11-21T17:34:16+00:00 |
| rhsa-2009:0275 | Red Hat Security Advisory: imap security update | 2009-02-19T17:48:00+00:00 | 2025-11-21T17:34:16+00:00 |
| rhsa-2009:0021 | Red Hat Security Advisory: kernel security update | 2009-02-25T01:02:00+00:00 | 2025-11-21T17:34:10+00:00 |
| rhsa-2009:0332 | Red Hat Security Advisory: flash-plugin security update | 2009-02-25T23:56:00+00:00 | 2025-11-21T17:34:18+00:00 |
| rhsa-2009:0334 | Red Hat Security Advisory: flash-plugin security update | 2009-02-25T23:57:00+00:00 | 2025-11-21T17:34:18+00:00 |
| rhsa-2009:0297 | Red Hat Security Advisory: Red Hat Enterprise Linux 2.1 - 3 Month End Of Life Notice | 2009-03-02T17:33:00+00:00 | 2025-11-21T17:34:16+00:00 |
| rhsa-2009:0313 | Red Hat Security Advisory: wireshark security update | 2009-03-04T19:23:00+00:00 | 2026-01-13T22:02:32+00:00 |
| rhsa-2009:0333 | Red Hat Security Advisory: libpng security update | 2009-03-04T19:58:00+00:00 | 2025-11-21T17:34:18+00:00 |
| rhsa-2009:0340 | Red Hat Security Advisory: libpng security update | 2009-03-04T20:20:00+00:00 | 2025-11-21T17:34:23+00:00 |
| rhsa-2009:0315 | Red Hat Security Advisory: firefox security update | 2009-03-05T00:10:00+00:00 | 2025-11-21T17:34:17+00:00 |
| rhsa-2009:0325 | Red Hat Security Advisory: seamonkey security update | 2009-03-05T00:48:00+00:00 | 2025-11-21T17:34:17+00:00 |
| rhsa-2009:0349 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP04 update | 2009-03-06T16:58:00+00:00 | 2025-11-21T17:34:25+00:00 |
| rhsa-2009:0346 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP06 update | 2009-03-06T17:15:00+00:00 | 2025-11-21T17:34:21+00:00 |
| rhsa-2009:0348 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0CP06 update | 2009-03-06T17:35:00+00:00 | 2025-11-21T17:34:21+00:00 |
| rhsa-2009:0347 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0CP04 update | 2009-03-06T17:49:00+00:00 | 2025-11-21T17:34:21+00:00 |
| rhsa-2009:0296 | Red Hat Security Advisory: icu security update | 2009-03-12T14:13:00+00:00 | 2025-11-21T17:34:16+00:00 |
| rhsa-2009:0331 | Red Hat Security Advisory: kernel security and bug fix update | 2009-03-12T14:30:00+00:00 | 2025-11-21T17:34:18+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2017:0880-1 | Security update for Linux Kernel Live Patch 15 for SLE 12 | 2017-03-30T04:53:40Z | 2017-03-30T04:53:40Z |
| suse-su-2017:0881-1 | Security update for Linux Kernel Live Patch 14 for SLE 12 | 2017-03-30T04:53:53Z | 2017-03-30T04:53:53Z |
| suse-su-2017:0873-1 | Security update for Linux Kernel Live Patch 13 for SLE 12 | 2017-03-30T04:54:03Z | 2017-03-30T04:54:03Z |
| suse-su-2017:0899-1 | Security update for php7 | 2017-03-31T09:46:31Z | 2017-03-31T09:46:31Z |
| suse-su-2017:0901-1 | Security update for libpng12-0 | 2017-03-31T09:47:51Z | 2017-03-31T09:47:51Z |
| suse-su-2017:0914-1 | Security update for ruby19 | 2017-04-03T15:26:04Z | 2017-04-03T15:26:04Z |
| suse-su-2017:0912-1 | Security update for the Linux Kernel | 2017-04-03T15:44:07Z | 2017-04-03T15:44:07Z |
| suse-su-2017:0913-1 | Security update for the Linux Kernel | 2017-04-03T15:46:57Z | 2017-04-03T15:46:57Z |
| suse-su-2017:0918-1 | Security update for GraphicsMagick | 2017-04-04T09:26:48Z | 2017-04-04T09:26:48Z |
| suse-su-2017:0940-1 | Security update for audiofile | 2017-04-05T12:26:41Z | 2017-04-05T12:26:41Z |
| suse-su-2017:0946-1 | Security update for jasper | 2017-04-05T13:26:51Z | 2017-04-05T13:26:51Z |
| suse-su-2017:0945-1 | Security update for gimp | 2017-04-05T15:25:39Z | 2017-04-05T15:25:39Z |
| suse-su-2017:0951-1 | Security update for dracut | 2017-04-06T07:31:33Z | 2017-04-06T07:31:33Z |
| suse-su-2017:0950-1 | Security update for libpng15 | 2017-04-06T09:36:47Z | 2017-04-06T09:36:47Z |
| suse-su-2017:0948-1 | Security update for ruby | 2017-04-06T09:39:44Z | 2017-04-06T09:39:44Z |
| suse-su-2017:0953-1 | Security update for jasper | 2017-04-06T12:28:24Z | 2017-04-06T12:28:24Z |
| suse-su-2017:0962-1 | Security update for gstreamer-plugins-bad | 2017-04-07T08:50:05Z | 2017-04-07T08:50:05Z |
| suse-su-2017:0966-1 | Security update for gstreamer | 2017-04-07T15:25:59Z | 2017-04-07T15:25:59Z |
| suse-su-2017:0967-1 | Security update for gstreamer | 2017-04-07T15:26:33Z | 2017-04-07T15:26:33Z |
| suse-su-2017:0983-1 | Security update for xen | 2017-04-11T14:35:30Z | 2017-04-11T14:35:30Z |
| suse-su-2017:0990-1 | Security update for flash-player | 2017-04-12T11:53:51Z | 2017-04-12T11:53:51Z |
| suse-su-2017:0999-1 | Security update for bind | 2017-04-13T00:32:22Z | 2017-04-13T00:32:22Z |
| suse-su-2017:0998-1 | Security update for bind | 2017-04-13T00:33:44Z | 2017-04-13T00:33:44Z |
| suse-su-2017:1000-1 | Security update for bind | 2017-04-13T00:37:13Z | 2017-04-13T00:37:13Z |
| suse-su-2017:1008-1 | Security update for sblim-sfcb | 2017-04-13T08:59:41Z | 2017-04-13T08:59:41Z |
| suse-su-2017:1012-1 | Security update for gstreamer-0_10-plugins-base | 2017-04-13T09:58:30Z | 2017-04-13T09:58:30Z |
| suse-su-2017:1003-1 | Security update for gstreamer-0_10-plugins-base | 2017-04-13T09:59:05Z | 2017-04-13T09:59:05Z |
| suse-su-2017:1010-1 | Security update for gstreamer-plugins-good | 2017-04-13T09:59:27Z | 2017-04-13T09:59:27Z |
| suse-su-2017:1004-1 | Security update for gstreamer-plugins-good | 2017-04-13T09:59:48Z | 2017-04-13T09:59:48Z |
| suse-su-2017:1027-1 | Security update for bind | 2017-04-18T00:54:37Z | 2017-04-18T00:54:37Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:2213 | Moderate: pcp security update | 2024-04-30T00:00:00Z | 2024-05-07T15:18:49Z |
| alsa-2024:2217 | Moderate: motif security update | 2024-04-30T00:00:00Z | 2024-05-07T15:00:33Z |
| alsa-2024:2228 | Moderate: perl security update | 2024-04-30T00:00:00Z | 2024-05-07T15:17:42Z |
| alsa-2024:2236 | Moderate: libvirt security update | 2024-04-30T00:00:00Z | 2024-05-07T15:10:52Z |
| alsa-2024:2239 | Moderate: skopeo security update | 2024-04-30T00:00:00Z | 2024-05-07T15:19:43Z |
| alsa-2024:2245 | Moderate: buildah security update | 2024-04-30T00:00:00Z | 2024-05-07T15:07:48Z |
| alsa-2024:2246 | Moderate: ansible-core bug fix, enhancement, and security update | 2024-04-30T00:00:00Z | 2024-05-07T14:54:31Z |
| alsa-2024:2264 | Important: edk2 security update | 2024-04-30T00:00:00Z | 2024-05-07T15:04:08Z |
| alsa-2024:2272 | Moderate: containernetworking-plugins security update | 2024-04-30T00:00:00Z | 2024-05-07T14:54:07Z |
| alsa-2024:2276 | Moderate: qt5-qtbase security update | 2024-04-30T00:00:00Z | 2024-05-07T15:06:41Z |
| alsa-2024:2278 | Moderate: httpd security update | 2024-04-30T00:00:00Z | 2024-05-07T15:06:56Z |
| alsa-2024:2287 | Moderate: gstreamer1-plugins-bad-free security update | 2024-04-30T00:00:00Z | 2024-05-07T14:55:39Z |
| alsa-2024:2289 | Moderate: libtiff security update | 2024-04-30T00:00:00Z | 2024-05-07T15:00:37Z |
| alsa-2024:2290 | Moderate: mutt security update | 2024-04-30T00:00:00Z | 2024-05-07T14:54:09Z |
| alsa-2024:2292 | Moderate: python3.11 security update | 2024-04-30T00:00:00Z | 2024-05-07T15:03:21Z |
| alsa-2024:2295 | Moderate: libjpeg-turbo security update | 2024-04-30T00:00:00Z | 2024-05-07T15:01:13Z |
| alsa-2024:2298 | Important: tigervnc security update | 2024-04-30T00:00:00Z | 2024-05-07T15:14:40Z |
| alsa-2024:2302 | Moderate: gstreamer1-plugins-base security update | 2024-04-30T00:00:00Z | 2024-05-07T15:01:13Z |
| alsa-2024:2303 | Moderate: gstreamer1-plugins-good security update | 2024-04-30T00:00:00Z | 2024-05-07T15:00:41Z |
| alsa-2024:2337 | Moderate: python3.11-cryptography security update | 2024-04-30T00:00:00Z | 2024-05-07T14:54:11Z |
| alsa-2024:2348 | Moderate: python-jinja2 security update | 2024-04-30T00:00:00Z | 2024-05-07T15:04:38Z |
| alsa-2024:2353 | Moderate: mingw components security update | 2024-04-30T00:00:00Z | 2024-05-07T14:55:53Z |
| alsa-2024:2366 | Moderate: freeglut security update | 2024-04-30T00:00:00Z | 2024-05-07T15:00:42Z |
| alsa-2024:2368 | Moderate: mod_http2 security update | 2024-04-30T00:00:00Z | 2024-05-07T15:03:54Z |
| alsa-2024:2377 | Moderate: zziplib security update | 2024-04-30T00:00:00Z | 2024-05-07T14:55:54Z |
| alsa-2024:2387 | Moderate: mod_jk and mod_proxy_cluster security update | 2024-04-30T00:00:00Z | 2024-05-07T14:54:40Z |
| alsa-2024:2394 | Important: kernel security, bug fix, and enhancement update | 2024-04-30T00:00:00Z | 2024-11-03T22:05:30Z |
| alsa-2024:2396 | Moderate: squashfs-tools security update | 2024-04-30T00:00:00Z | 2024-05-07T14:54:12Z |
| alsa-2024:2410 | Moderate: harfbuzz security update | 2024-04-30T00:00:00Z | 2024-05-07T15:00:44Z |
| alsa-2024:2433 | Moderate: avahi security update | 2024-04-30T00:00:00Z | 2024-05-07T15:04:20Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2021-731 | Heap-use-after-free in cleanup_live_vars | 2021-05-05T00:01:09.411211Z | 2022-04-13T03:04:33.400422Z |
| osv-2021-732 | Heap-buffer-overflow in readstat_convert | 2021-05-06T00:00:30.987446Z | 2023-02-21T00:31:59.857368Z |
| osv-2021-735 | Use-of-uninitialized-value in decode_CABAC_FL_bypass | 2021-05-08T00:00:14.355747Z | 2026-04-10T14:06:44.826192Z |
| osv-2021-736 | Stack-use-after-return in zend_fiber_suspend_context | 2021-05-08T00:00:26.963755Z | 2023-02-24T04:50:30.323847Z |
| osv-2021-739 | Stack-buffer-overflow in flb_sds_cat | 2021-05-08T00:01:15.452663Z | 2022-04-13T03:04:38.249988Z |
| osv-2021-745 | Heap-buffer-overflow in skip_to_next_entry | 2021-05-11T00:00:17.714291Z | 2022-04-13T03:04:42.392317Z |
| osv-2021-750 | Heap-double-free in flb_free | 2021-05-11T00:01:09.150660Z | 2022-04-13T03:04:38.361302Z |
| osv-2021-757 | Use-of-uninitialized-value in nn_check_initialized | 2021-05-12T00:01:05.638739Z | 2022-04-13T03:04:31.416903Z |
| osv-2021-760 | Heap-buffer-overflow in std::__1::char_traits<char>::length | 2021-05-14T00:00:07.433655Z | 2022-04-13T03:04:42.685258Z |
| osv-2021-764 | Stack-buffer-overflow in TranslateNumber_1 | 2021-05-15T00:00:11.841899Z | 2022-04-13T03:04:34.216007Z |
| osv-2021-765 | Heap-use-after-free in LookupDict2 | 2021-05-15T00:00:28.613673Z | 2022-07-03T00:04:22.085948Z |
| osv-2021-766 | Negative-size-param in frame_get_vlmetalayers | 2021-05-15T00:00:29.863946Z | 2022-04-13T03:04:40.477958Z |
| osv-2021-767 | Heap-buffer-overflow in string_decoder_getc_utf_8 | 2021-05-15T00:00:57.570193Z | 2022-04-13T03:04:34.243487Z |
| osv-2021-769 | Stack-buffer-overflow in TranslateClause | 2021-05-16T00:01:06.642521Z | 2022-04-13T03:04:34.260811Z |
| osv-2021-771 | Heap-use-after-free in dwg_free_TABLEGEOMETRY_private | 2021-05-18T00:00:05.875957Z | 2022-04-18T00:08:44.068985Z |
| osv-2021-775 | Heap-buffer-overflow in _m3d_safestr | 2021-05-19T00:00:10.101287Z | 2022-04-13T03:28:49.058628Z |
| osv-2021-776 | UNKNOWN READ in std::__1::__tree<std::__1::__value_type<Json::Value::CZString, Json::Value>, std | 2021-05-20T00:00:22.503762Z | 2022-04-13T03:25:16.788837Z |
| osv-2021-777 | Heap-use-after-free in xmlAddNextSibling | 2021-05-20T00:00:30.166614Z | 2026-04-16T14:20:10.040296Z |
| osv-2021-778 | UNKNOWN READ in helper_uc_tracecode | 2021-05-20T00:01:16.313104Z | 2022-04-13T03:04:39.136627Z |
| osv-2021-779 | Heap-buffer-overflow in _blosc_getitem | 2021-05-20T00:01:22.816013Z | 2023-02-04T00:11:26.383592Z |
| osv-2021-781 | UNKNOWN READ in Json::decodePrefixedString | 2021-05-21T00:00:06.420076Z | 2022-04-13T03:04:41.926901Z |
| osv-2021-782 | Global-buffer-overflow in IsLetterGroup | 2021-05-21T00:00:07.675695Z | 2022-04-13T03:04:34.238119Z |
| osv-2021-784 | Heap-buffer-overflow in processClientServerHello | 2021-05-22T00:00:27.949231Z | 2022-04-13T03:22:27.975956Z |
| osv-2021-786 | Heap-buffer-overflow in jxl::PerformAlphaWeightedAdd | 2021-05-23T00:00:28.775952Z | 2022-04-13T03:04:38.113052Z |
| osv-2021-787 | Heap-buffer-overflow in string_decoder_getc_utf_8 | 2021-05-23T00:00:32.013206Z | 2022-07-02T00:18:43.075583Z |
| osv-2021-789 | UNKNOWN READ in [heap] | 2021-05-24T00:00:10.431079Z | 2022-04-13T03:33:01.513253Z |
| osv-2021-791 | UNKNOWN READ in std::__1::__tree<std::__1::__value_type<Json::Value::CZString, Json::Value>, std | 2021-05-24T00:00:15.793602Z | 2022-04-13T03:04:42.014016Z |
| osv-2021-793 | Heap-use-after-free in AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr | 2021-05-24T00:01:24.097636Z | 2022-04-13T03:04:32.108972Z |
| osv-2021-794 | Heap-buffer-overflow in mrb_format_float | 2021-05-25T23:49:50.285850Z | 2022-04-13T03:04:39.693249Z |
| osv-2021-795 | Uncaught exception | 2021-05-25T23:50:45.528753Z | 2023-02-24T01:59:56.280376Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-tomcat-2024-21733 | Apache Tomcat: Leaking of unrelated request bodies in default error page | 2024-03-06T11:07:26.980Z | 2026-03-20T12:05:40.000Z |
| bit-pillow-2020-10177 | 2024-03-06T11:07:28.107Z | 2025-04-03T14:40:37.652Z | |
| bit-solr-2020-13941 | 2024-03-06T11:07:28.309Z | 2025-04-03T14:40:37.652Z | |
| bit-redis-2021-41099 | Integer overflow issue with strings in Redis | 2024-03-06T11:07:29.099Z | 2025-05-20T10:02:07.006Z |
| bit-magento-2020-24406 | Document root path disclosure on Maintenance page | 2024-03-06T11:07:30.889Z | 2025-05-20T10:02:07.006Z |
| bit-sqlite-2020-13871 | 2024-03-06T11:07:31.077Z | 2025-04-03T14:40:37.652Z | |
| bit-mariadb-2021-2022 | 2024-03-06T11:07:31.801Z | 2025-04-03T14:40:37.652Z | |
| bit-discourse-2022-23546 | Discourse vulnerable to private topic leak via email#send_digest | 2024-03-06T11:07:32.199Z | 2025-05-20T10:02:07.006Z |
| bit-node-2020-8277 | 2024-03-06T11:07:32.380Z | 2025-04-03T14:40:37.652Z | |
| bit-golang-2020-28367 | Arbitrary code execution via the go command with cgo in cmd/go | 2024-03-06T11:07:32.402Z | 2025-05-20T10:02:07.006Z |
| bit-php-2020-7061 | heap-buffer-overflow in phar_extract_file | 2024-03-06T11:07:32.612Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-2576 | Incorrect Authorization in GitLab | 2024-03-06T11:07:34.407Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2021-40692 | 2024-03-06T11:07:34.596Z | 2025-04-03T14:40:37.652Z | |
| bit-tomcat-2023-46589 | Apache Tomcat: HTTP request smuggling via malformed trailer headers | 2024-03-06T11:07:35.204Z | 2026-03-20T12:05:40.000Z |
| bit-python-2020-26116 | 2024-03-06T11:07:36.585Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2023-25674 | TensorFlow has Null Pointer Error in RandomShuffle with XLA enable | 2024-03-06T11:07:36.773Z | 2025-05-20T10:02:07.006Z |
| bit-redis-2021-32762 | Integer overflow that can lead to heap overflow in redis-cli, redis-sentinel on some platforms | 2024-03-06T11:07:37.308Z | 2025-05-20T10:02:07.006Z |
| bit-mariadb-2021-2011 | 2024-03-06T11:07:40.785Z | 2025-04-03T14:40:37.652Z | |
| bit-sqlite-2020-13632 | 2024-03-06T11:07:41.267Z | 2025-04-03T14:40:37.652Z | |
| bit-node-2020-8265 | 2024-03-06T11:07:41.583Z | 2025-04-03T14:40:37.652Z | |
| bit-magento-2020-24405 | Incorrect permissions in Inventory module could lead to unauthorized modification of inventory stock data | 2024-03-06T11:07:41.661Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2020-28366 | Arbitrary code execution in go command with cgo in cmd/go and cmd/cgo | 2024-03-06T11:07:42.467Z | 2025-05-20T10:02:07.006Z |
| bit-tomcat-2023-45648 | Apache Tomcat: Trailer header parsing too lenient | 2024-03-06T11:07:43.292Z | 2026-03-20T12:05:40.000Z |
| bit-varnish-2023-44487 | 2024-03-06T11:07:44.095Z | 2026-02-11T09:09:18.507Z | |
| bit-php-2020-7060 | global buffer-overflow in mbfl_filt_conv_big5_wchar | 2024-03-06T11:07:44.182Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2021-40691 | 2024-03-06T11:07:44.502Z | 2025-04-03T14:40:37.652Z | |
| bit-redis-2021-32687 | Integer overflow issue with intsets in Redis | 2024-03-06T11:07:45.008Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-2485 | Incorrect Privilege Assignment in GitLab | 2024-03-06T11:07:45.289Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2022-21684 | User can bypass approval when invited to Discourse | 2024-03-06T11:07:45.309Z | 2025-05-20T10:02:07.006Z |
| bit-tensorflow-2023-25673 | TensorFlow has Floating Point Exception in TensorListSplit with XLA | 2024-03-06T11:07:45.593Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2005-avi-386 | Vulnérabilité dans sysreport | 2005-10-10T00:00:00.000000 | 2005-10-10T00:00:00.000000 |
| certa-2005-avi-387 | Vulnérabilité dans Dia | 2005-10-10T00:00:00.000000 | 2005-10-10T00:00:00.000000 |
| certa-2005-avi-388 | Vulnérabilité de la bibliothèque multimedia xine-lib | 2005-10-10T00:00:00.000000 | 2005-10-12T00:00:00.000000 |
| certa-2005-avi-389 | Vulnérabilité de SUN Java System Directory Server | 2005-10-10T00:00:00.000000 | 2005-10-10T00:00:00.000000 |
| certa-2005-avi-391 | Vulnérabilité des antivirus Kaspersky et F-Secure | 2005-10-11T00:00:00.000000 | 2005-10-11T00:00:00.000000 |
| certa-2005-avi-392 | Vulnérabilité de xli | 2005-10-11T00:00:00.000000 | 2005-10-12T00:00:00.000000 |
| certa-2005-avi-393 | Multiples vulnérabilités de WinRAR | 2005-10-11T00:00:00.000000 | 2005-11-21T00:00:00.000000 |
| certa-2005-avi-394 | Vulnérabilité dans Microsoft DirectX | 2005-10-12T00:00:00.000000 | 2005-10-24T00:00:00.000000 |
| certa-2005-avi-395 | Vulnérabilité dans le client FTP Microsoft | 2005-10-12T00:00:00.000000 | 2005-10-12T00:00:00.000000 |
| certa-2005-avi-396 | Vulnérabilité de Microsoft Internet Explorer | 2005-10-12T00:00:00.000000 | 2005-10-12T00:00:00.000000 |
| certa-2005-avi-397 | Vulnérabilité dans le service client pour Netware de Microsoft | 2005-10-12T00:00:00.000000 | 2005-10-12T00:00:00.000000 |
| certa-2005-avi-398 | Vulnérabilité dans le module Plug and Play (PnP) de Microsoft Windows. | 2005-10-12T00:00:00.000000 | 2005-10-12T00:00:00.000000 |
| certa-2005-avi-399 | Vulnérabilité d'un composant Microsoft Windows et Exchange Server | 2005-10-12T00:00:00.000000 | 2005-10-12T00:00:00.000000 |
| certa-2005-avi-400 | Faiblesse dans OpenSSL 0.9.x | 2005-10-12T00:00:00.000000 | 2006-01-04T00:00:00.000000 |
| certa-2005-avi-401 | Multiples vulnérabilités dans Microsoft Windows Shell et Web View | 2005-10-12T00:00:00.000000 | 2005-10-12T00:00:00.000000 |
| certa-2005-avi-402 | Vulnérabilité dans SGI IRIX | 2005-10-12T00:00:00.000000 | 2005-10-12T00:00:00.000000 |
| certa-2005-avi-403 | Multiples vulnérabilités dans Microsoft Windows MSDTC et COM+ | 2005-10-12T00:00:00.000000 | 2005-10-24T00:00:00.000000 |
| certa-2005-avi-404 | Vulnérabilité dans VERITAS NetBackup | 2005-10-13T00:00:00.000000 | 2005-10-13T00:00:00.000000 |
| certa-2005-avi-405 | Multiples vulnérabilités dans Sun Solaris | 2005-10-14T00:00:00.000000 | 2005-10-14T00:00:00.000000 |
| certa-2005-avi-406 | Vulnérabilité de Microsoft Network Connection Manager | 2005-10-14T00:00:00.000000 | 2005-10-14T00:00:00.000000 |
| certa-2005-avi-407 | Vulnérabilité dans la bibliothèque libcURL | 2005-10-14T00:00:00.000000 | 2005-12-13T00:00:00.000000 |
| certa-2005-avi-409 | Vulnérabilité dans TotalStorage SAN Volume Controller | 2005-10-18T00:00:00.000000 | 2005-10-18T00:00:00.000000 |
| certa-2005-avi-410 | Vulnérbilité d'AIX LSCFG | 2005-10-18T00:00:00.000000 | 2005-10-18T00:00:00.000000 |
| certa-2005-avi-408 | Vulnérabilité de Snort | 2005-10-19T00:00:00.000000 | 2005-10-19T00:00:00.000000 |
| certa-2005-avi-411 | Vulnérabilité du système de fichiers proc sous Solaris 10 | 2005-10-19T00:00:00.000000 | 2005-10-19T00:00:00.000000 |
| certa-2005-avi-412 | Multiples vulnérabilités dans Nortel Centrex IP CLient Manager | 2005-10-19T00:00:00.000000 | 2005-10-19T00:00:00.000000 |
| certa-2005-avi-413 | Multiples vulnérabilités dans IBM DB2 | 2005-10-19T00:00:00.000000 | 2005-10-19T00:00:00.000000 |
| certa-2005-avi-414 | Multiples vulnérabilités d'Oracle | 2005-10-19T00:00:00.000000 | 2005-10-19T00:00:00.000000 |
| certa-2005-avi-415 | Vulnérabilité de NetPBM | 2005-10-19T00:00:00.000000 | 2005-10-19T00:00:00.000000 |
| certa-2005-avi-416 | Vulnérabilité sur phpMyAdmin | 2005-10-20T00:00:00.000000 | 2005-10-20T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000238 | WNC01WH vulnerable to stored cross-site scripting | 2016-12-02T14:43+09:00 | 2017-11-27T16:27+09:00 |
| jvndb-2016-000239 | WNC01WH vulnerable to enabling debug option | 2016-12-02T14:44+09:00 | 2017-11-27T16:27+09:00 |
| jvndb-2016-000240 | WNC01WH vulnerable to directory traversal due to an issue in processing commands | 2016-12-02T14:45+09:00 | 2017-11-27T16:27+09:00 |
| jvndb-2016-000241 | WNC01WH vulnerable to directory traversal due to an issue in processing POST request | 2016-12-02T14:46+09:00 | 2017-11-27T17:11+09:00 |
| jvndb-2016-002299 | SaAT Netizen fails to properly verify downloaded installation and update files | 2016-12-05T13:52+09:00 | 2024-06-27T13:59+09:00 |
| jvndb-2016-003380 | ManageEngine Password Manager Pro vulnerable to cross-site request forgery | 2016-12-05T14:32+09:00 | 2017-05-23T16:23+09:00 |
| jvndb-2016-006038 | Multiple SONY network cameras vulnerable to sensitive information disclosure | 2016-12-05T14:33+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-002298 | Keitai Kit for Movable Type vulnerable to OS command injection | 2016-12-05T15:02+09:00 | 2016-12-05T15:02+09:00 |
| jvndb-2016-002331 | ManageEngine Password Manager Pro fails to restrict access permissions | 2016-12-05T15:02+09:00 | 2016-12-05T15:02+09:00 |
| jvndb-2016-000242 | Sleipnir for Mac vulnerable to URL spoofing | 2016-12-07T14:44+09:00 | 2018-01-17T11:48+09:00 |
| jvndb-2016-006114 | The Bank of Tokyo-Mitsubishi UFJ for Android vulnerable to SSL/TLS downgrade attack | 2016-12-08T11:33+09:00 | 2018-02-28T11:47+09:00 |
| jvndb-2016-000243 | Access restriction bypass to download DBM files in Cybozu Dezie | 2016-12-12T14:49+09:00 | 2017-11-27T17:12+09:00 |
| jvndb-2016-000244 | Access restriction bypass to delete DBM files in Cybozu Dezie | 2016-12-12T14:49+09:00 | 2017-11-27T17:12+09:00 |
| jvndb-2016-000245 | Apache ActiveMQ vulnerable to cross-site scripting | 2016-12-13T14:00+09:00 | 2018-04-04T12:25+09:00 |
| jvndb-2016-000246 | Mutiple SONY Videoconference Systems do not properly perform authentication | 2016-12-16T14:11+09:00 | 2018-01-17T14:03+09:00 |
| jvndb-2016-000222 | Cybozu Garoon vulnerable to cross-site scripting | 2016-12-19T12:22+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000223 | Cybozu Garoon vulnerable to information disclosure | 2016-12-19T12:29+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000227 | Cybozu Garoon vulnerable to cross-site request forgery | 2016-12-19T13:36+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000228 | Cybozu Garoon vulnerable to directory traversal | 2016-12-19T13:44+09:00 | 2017-11-27T17:11+09:00 |
| jvndb-2016-000229 | Cybozu Garoon vulnerable to SQL injection | 2016-12-19T14:19+09:00 | 2017-11-27T17:11+09:00 |
| jvndb-2016-000224 | Cybozu Garoon fails to restrict access permission in the RSS settings | 2016-12-19T14:29+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000225 | Cybozu Garoon fails to restrict access permission in MultiReport filters | 2016-12-19T14:32+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000226 | Cybozu Garoon fails to restrict access permission in To-Dos of Space function | 2016-12-19T14:38+09:00 | 2017-11-27T16:58+09:00 |
| jvndb-2016-000247 | BlueZ userland utilities vulnerable to buffer overflow | 2016-12-22T14:26+09:00 | 2017-11-27T16:47+09:00 |
| jvndb-2016-000248 | H2O use-after-free vulnerability | 2016-12-22T14:26+09:00 | 2017-11-27T16:53+09:00 |
| jvndb-2016-000249 | SKYSEA Client View vulnerable to arbitrary code execution | 2016-12-22T14:26+09:00 | 2017-11-27T16:53+09:00 |
| jvndb-2016-000250 | Wireshark for Windows issue where an arbitrary file may be deleted | 2016-12-26T14:45+09:00 | 2018-02-16T16:00+09:00 |
| jvndb-2016-000251 | WinSparkle issue where registry value is not validated | 2016-12-26T14:45+09:00 | 2018-02-16T16:00+09:00 |
| jvndb-2017-000001 | Olive Blog vulnerable to cross-site scripting | 2017-01-06T13:56+09:00 | 2017-06-01T15:58+09:00 |
| jvndb-2017-000002 | WEB SCHEDULE vulnerable to cross-site scripting | 2017-01-06T14:01+09:00 | 2017-06-01T15:58+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-01508 | Google Chrome Skia拒绝服务漏洞(CNVD-2015-01508) | 2015-03-09 | 2015-03-10 |
| cnvd-2015-01509 | Google Chrome Skia拒绝服务漏洞(CNVD-2015-01509) | 2015-03-09 | 2015-03-10 |
| cnvd-2015-01510 | Google Chrome Blink拒绝服务漏洞(CNVD-2015-01510) | 2015-03-09 | 2015-03-10 |
| cnvd-2015-01511 | Google Chrome Blink内存错误引用漏洞(CNVD-2015-01511) | 2015-03-09 | 2015-03-10 |
| cnvd-2015-01512 | Google Chrome Blink内存错误引用漏洞(CNVD-2015-01512) | 2015-03-09 | 2015-03-10 |
| cnvd-2015-01513 | Google Chrome内存错误引用漏洞(CNVD-2015-01513) | 2015-03-09 | 2015-03-10 |
| cnvd-2015-01514 | Google Chrome Skia整数溢出漏洞 | 2015-03-09 | 2015-03-10 |
| cnvd-2015-01515 | Google Chrome Blink内存错误引用漏洞(CNVD-2015-01515) | 2015-03-09 | 2015-03-10 |
| cnvd-2015-01516 | Google Chrome Blink内存错误引用漏洞(CNVD-2015-01516) | 2015-03-09 | 2015-03-10 |
| cnvd-2015-01517 | libFLAC 'src/flac/encode.c'缓冲区溢出漏洞 | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01534 | SPCanywhere SSL证书验证安全限制绕过漏洞 | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01535 | SPCanywhere本地信息泄露漏洞 | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01536 | SPCanywhere身份验证绕过漏洞 | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01537 | SPCanywhere信息泄露漏洞 | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01538 | WebGate eDVR Manager ActiveX Controls存在多个缓冲区溢出漏洞 | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01539 | Google V8存在多个未明漏洞(CNVD-2015-01539) | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01540 | Google Chrome跨站脚本漏洞(CNVD-2015-01540) | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01541 | xterm 'main.c'本地缓冲区溢出漏洞 | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01542 | Ubuntu Vivid Logrotation Script本地权限提升漏洞 | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01543 | ShareLaTeX远程命令注入漏洞 | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01544 | MICROSYS PROMOTIC缓冲区溢出漏洞 | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01545 | Evergreen信息泄露漏洞 | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01546 | phpMyAdmin信息泄露漏洞 | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01547 | Google Chrome Blink内存错误引用漏洞(CNVD-2015-01547) | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01548 | Google Chrome vpxdecoder拒绝服务漏洞 | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01549 | Google Chrome PDFium拒绝服务漏洞(CNVD-2015-01549) | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01550 | Google Chrome访问绕过漏洞 | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01551 | Google Chrome Blink任意代码执行漏洞 | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01552 | Google Chrome存在多个未明漏洞(CNVD-2015-01552) | 2015-03-09 | 2015-03-11 |
| cnvd-2015-01787 | Destoon后台任意代码执行漏洞 | 2015-03-09 | 2015-04-23 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-03952 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03953 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03954 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03955 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03956 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03957 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03958 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03959 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03960 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03961 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03962 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03963 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03964 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03965 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03966 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03967 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03968 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03969 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03970 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03971 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03972 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03973 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03974 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03975 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03976 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03977 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03978 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03979 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03980 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-03981 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| ID | Description | Updated |
|---|---|---|
| var-202108-2522 | ZTE is the world's leading provider of integrated communications and information solution… | 2022-05-04T09:45:54.826000Z |
| var-202108-2501 | TP-LINK TL-R406 is a SOHO router that provides three access methods: dynamic IP, static I… | 2022-05-04T09:45:54.838000Z |
| var-202108-2499 | Cisco IP Phone CP-7970G is an IP phone. The Cisco IP Phone CP-7970G has an unauthoriz… | 2022-05-04T09:45:54.848000Z |
| var-202108-2478 | Hangzhou Hikvision Digital Technology Co., Ltd. is a video-centric IoT solution provider,… | 2022-05-04T09:45:54.861000Z |
| var-202108-2457 | X4220RX is a printer of Samsung (China) Investment Co., Ltd. Samsung (China) Investme… | 2022-05-04T09:45:54.872000Z |
| var-202108-2436 | Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of… | 2022-05-04T09:45:54.883000Z |
| var-202108-2415 | Fuji Xerox (China) Co., Ltd. was established on January 3, 1995. It is a wholly-owned hol… | 2022-05-04T09:45:54.896000Z |
| var-202108-2394 | Schneider Electric (China) Co., Ltd. is a leader in the field of global energy efficiency… | 2022-05-04T09:45:54.907000Z |
| var-202108-2373 | Hewlett-Packard (Hewlett-Packard, referred to as HP) is one of the information technology… | 2022-05-04T09:45:54.916000Z |
| var-202108-2352 | TASKalfa 2552ci is a printer of Kyocera Corporation. Kyocera Corporation TASKalfa 255… | 2022-05-04T09:45:54.927000Z |
| var-202108-2331 | Shenzhen Jixiang Tengda Technology Co., Ltd. is a high-tech enterprise integrating indepe… | 2022-05-04T09:45:54.938000Z |
| var-202108-2310 | Shenzhen Jixiang Tengda Technology Co., Ltd. (hereinafter referred to as "Tengda") is a p… | 2022-05-04T09:45:54.948000Z |
| var-202107-1901 | The property integrated billing management system is based on cloud computing, the Intern… | 2022-05-04T09:45:56.203000Z |
| var-202107-1880 | Axis is an IT company that specializes in providing network video solutions. AXIS M70… | 2022-05-04T09:45:56.218000Z |
| var-202107-1859 | Teledyne FLIR is a company specializing in the design, development, production, marketing… | 2022-05-04T09:45:56.229000Z |
| var-202107-1838 | Axis is an IT company that specializes in providing network video solutions. Axis M10… | 2022-05-04T09:45:56.240000Z |
| var-202107-1817 | ASUS Zenfone Live (L1) is a smartphone launched by ASUS in 2018. Asus Zenfone Live (L… | 2022-05-04T09:45:56.251000Z |
| var-202107-1796 | Shenzhen Jixiang Tengda Technology Co., Ltd. is a high-tech enterprise integrating indepe… | 2022-05-04T09:45:56.261000Z |
| var-202107-1775 | ZXR10 6800 series routers are a new generation of high-performance multi-service router p… | 2022-05-04T09:45:56.272000Z |
| var-202107-1754 | Matsushita Electric (China) Co., Ltd. was established in 1994 and is mainly responsible f… | 2022-05-04T09:45:56.282000Z |
| var-202107-1733 | TOTOLINK is a brand owned by Zeon Electronics (Shenzhen) Co., Ltd. Founded in 1999, it is… | 2022-05-04T09:45:56.298000Z |
| var-202107-1712 | Hangzhou Hikvision Digital Technology Co., Ltd. is a leading provider of security product… | 2022-05-04T09:45:56.310000Z |
| var-202107-1691 | MFC-L2700DW series, etc. are all printer products of Brother Company. Many Brother pr… | 2022-05-04T09:45:56.322000Z |
| var-202106-2320 | The Lexmark M series is a product of Lexmark. Lexmark M is an M series printer. Lexma… | 2022-05-04T09:45:59.775000Z |
| var-202106-2299 | The HP ENVY 5530 e-All-in-One Printer series printer is an all-in-one printer from HP Tra… | 2022-05-04T09:45:59.786000Z |
| var-202106-2278 | TV-IP121W is a wireless network camera of TRENDnet. TRENDnet TV-IP121W has an unautho… | 2022-05-04T09:45:59.798000Z |
| var-202106-2257 | H3C-ICG1800 is a router of New H3C Technology Co., Ltd. H3C-ICG1800 has a weak passwo… | 2022-05-04T09:45:59.814000Z |
| var-202106-2236 | TP-LINK Technology Co., Ltd. (hereinafter referred to as "TP-LINK") is the world's leadin… | 2022-05-04T09:45:59.826000Z |
| var-202106-2215 | Shenzhen Zhibotong Electronics Co., Ltd. (hereinafter referred to as Zhibotong) was found… | 2022-05-04T09:45:59.838000Z |
| var-202106-2194 | Axis is an IT company that specializes in providing network video solutions. AXIS M11… | 2022-05-04T09:45:59.854000Z |