Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0777 |
N/A
|
The password protection feature of Microsoft Mone… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:28:41.489Z |
| CVE-2000-0778 |
N/A
|
IIS 5.0 allows remote attackers to obtain source … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:28:41.478Z |
| CVE-2000-0779 |
N/A
|
Checkpoint Firewall-1 with the RSH/REXEC setting … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:28:41.461Z |
| CVE-2000-0780 |
N/A
|
The web server in IPSWITCH IMail 6.04 and earlier… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:28:41.571Z |
| CVE-2000-0782 |
N/A
|
netauth.cgi program in Netwin Netauth 4.2e and ea… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:28:41.575Z |
| CVE-2000-0786 |
N/A
|
GNU userv 1.0.0 and earlier does not properly per… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:28:41.568Z |
| CVE-2000-0787 |
N/A
|
IRC Xchat client versions 1.4.2 and earlier allow… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:28:41.567Z |
| CVE-2000-0792 |
N/A
|
Gnome Lokkit firewall package before 0.41 does no… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:28:41.559Z |
| CVE-2000-0812 |
N/A
|
The administration module in Sun Java web server … |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:28:41.652Z |
| CVE-2000-0826 |
N/A
|
Buffer overflow in ddicgi.exe program in Mobius D… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:28:41.618Z |
| CVE-2000-0827 |
N/A
|
Buffer overflow in the web authorization form of … |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:28:41.530Z |
| CVE-2000-0828 |
N/A
|
Buffer overflow in ddicgi.exe in Mobius DocumentD… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:28:41.595Z |
| CVE-2000-0831 |
N/A
|
Buffer overflow in Fastream FTP++ 2.0 allows remo… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:28:41.654Z |
| CVE-2000-0832 |
N/A
|
Htgrep CGI program allows remote attackers to rea… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:28:41.574Z |
| CVE-2000-0833 |
N/A
|
Buffer overflow in WinSMTP 1.06f and 2.X allows r… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:28:41.642Z |
| CVE-2000-0835 |
N/A
|
search.dll Sambar ISAPI Search utility in Sambar … |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:28:41.591Z |
| CVE-2000-0836 |
N/A
|
Buffer overflow in CamShot WebCam Trial2.6 allows… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:28:41.637Z |
| CVE-2000-0840 |
N/A
|
Buffer overflow in XMail POP3 server before versi… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:28:41.577Z |
| CVE-2000-0841 |
N/A
|
Buffer overflow in XMail POP3 server before versi… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:37:30.487Z |
| CVE-2000-0842 |
N/A
|
The search97cgi/vtopic" in the UnixWare 7 scohelp… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:37:30.483Z |
| CVE-2000-0843 |
N/A
|
Buffer overflow in pam_smb and pam_ntdom pluggabl… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:37:30.518Z |
| CVE-2000-0845 |
N/A
|
kdebug daemon (kdebugd) in Digital Unix 4.0F allo… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:37:30.460Z |
| CVE-2000-0855 |
N/A
|
SunFTP build 9(1) allows remote attackers to caus… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:37:31.219Z |
| CVE-2000-0857 |
N/A
|
The logging capability in muh 2.05d IRC server do… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:37:31.301Z |
| CVE-2000-0866 |
N/A
|
Interbase 6 SuperServer for Linux allows an attac… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:37:31.467Z |
| CVE-2000-0872 |
N/A
|
explorer.php in PhotoAlbum 0.9.9 allows remote at… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:37:30.632Z |
| CVE-2000-0879 |
N/A
|
LPPlus programs dccsched, dcclpdser, dccbkst, dcc… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:37:30.698Z |
| CVE-2000-0880 |
N/A
|
LPPlus creates the lpdprocess file with world-wri… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:37:31.727Z |
| CVE-2000-0881 |
N/A
|
The dccscan setuid program in LPPlus does not pro… |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:37:30.626Z |
| CVE-2000-0882 |
N/A
|
Intel Express 500 series switches allow a remote … |
n/a |
n/a |
2000-10-18T04:00:00 | 2024-08-08T05:37:31.273Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0072 |
N/A
|
Visual Casel (Vcasel) does not properly prevent u… |
n/a |
n/a |
2002-06-25T04:00:00 | 2024-08-08T05:05:52.766Z |
| CVE-2000-0090 |
N/A
|
VMWare 1.1.2 allows local users to cause a denial… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.623Z |
| CVE-1999-0992 |
N/A
|
HP VirtualVault with the PHSS_17692 patch allows … |
n/a |
n/a |
2000-01-18T05:00:00 | 2024-08-01T16:55:29.306Z |
| CVE-2000-0079 |
N/A
|
The W3C CERN httpd HTTP server allows remote atta… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-08T05:05:53.929Z |
| CVE-2000-0086 |
N/A
|
Netopia Timbuktu Pro sends user IDs and passwords… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-08T05:05:53.632Z |
| CVE-2000-0099 |
N/A
|
Buffer overflow in UnixWare ppptalk command allow… |
n/a |
n/a |
2000-04-18T04:00:00 | 2024-08-08T05:05:54.083Z |
| CVE-2000-0092 |
N/A
|
The BSD make program allows local users to modify… |
n/a |
n/a |
2000-07-12T04:00:00 | 2024-08-08T05:05:53.971Z |
| CVE-1999-0595 |
N/A
|
A Windows NT system does not clear the system pag… |
n/a |
n/a |
2000-02-04T05:00:00 | 2024-08-01T16:41:45.689Z |
| CVE-2000-0088 |
N/A
|
Buffer overflow in the conversion utilities for J… |
n/a |
n/a |
2000-03-22T05:00:00 | 2024-08-08T05:05:52.943Z |
| CVE-2000-0091 |
N/A
|
Buffer overflow in vchkpw/vpopmail POP authentica… |
n/a |
n/a |
2000-04-18T04:00:00 | 2024-08-08T05:05:53.915Z |
| CVE-2000-0093 |
N/A
|
An installation of Red Hat uses DES password encr… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:53.998Z |
| CVE-2000-0115 |
N/A
|
IIS allows local users to cause a denial of servi… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:54.104Z |
| CVE-2000-0095 |
N/A
|
The PMTU discovery procedure used by HP-UX 10.30 … |
n/a |
n/a |
2000-04-18T04:00:00 | 2024-08-08T05:05:53.855Z |
| CVE-2000-0096 |
N/A
|
Buffer overflow in qpopper 3.0 beta versions allo… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:54.011Z |
| CVE-2000-0097 |
N/A
|
The WebHits ISAPI filter in Microsoft Index Serve… |
n/a |
n/a |
2000-03-22T05:00:00 | 2024-08-08T05:05:54.165Z |
| CVE-2000-0098 |
N/A
|
Microsoft Index Server allows remote attackers to… |
n/a |
n/a |
2000-03-22T05:00:00 | 2024-08-08T05:05:53.896Z |
| CVE-2000-0126 |
N/A
|
Sample Internet Data Query (IDQ) scripts in IIS 3… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:54.275Z |
| CVE-2000-0113 |
N/A
|
The SyGate Remote Management program does not pro… |
n/a |
n/a |
2000-06-02T04:00:00 | 2024-08-08T05:05:53.972Z |
| CVE-2000-0130 |
N/A
|
Buffer overflow in SCO scohelp program allows rem… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.888Z |
| CVE-2000-1216 |
N/A
|
Buffer overflow in portmir for AIX 4.3.0 allows l… |
n/a |
n/a |
2005-04-21T04:00:00 | 2024-08-08T05:45:37.412Z |
| CVE-2000-0111 |
N/A
|
The RightFax web client uses predictable session … |
n/a |
n/a |
2001-01-22T05:00:00 | 2024-08-08T05:05:53.833Z |
| CVE-2000-0116 |
N/A
|
Firewall-1 does not properly filter script tags, … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.921Z |
| CVE-2000-0117 |
N/A
|
The siteUserMod.cgi program in Cobalt RaQ2 server… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.941Z |
| CVE-2000-0109 |
N/A
|
The mcsp Client Site Processor system (MultiCSP) … |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:53.999Z |
| CVE-2000-0132 |
N/A
|
Microsoft Java Virtual Machine allows remote atta… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:53.799Z |
| CVE-2000-0101 |
N/A
|
The Make-a-Store OrderPage shopping cart applicat… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:53.951Z |
| CVE-2000-0102 |
N/A
|
The SalesCart shopping cart application allows re… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:53.707Z |
| CVE-2000-0103 |
N/A
|
The SmartCart shopping cart application allows re… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:53.909Z |
| CVE-2000-0104 |
N/A
|
The Shoptron shopping cart application allows rem… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:53.979Z |
| CVE-2000-0105 |
N/A
|
Outlook Express 5.01 and Internet Explorer 5.01 a… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:54.070Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-rc75-cf5c-mxvh |
4.9 (3.1)
|
Use of Cryptographically Weak Pseudo-Random Number Generator in org.pac4j:pac4j-saml | 2019-11-06T17:06:28Z | 2021-08-18T22:08:17Z |
| ghsa-j9xp-92vc-559j |
9.8 (3.1)
|
SQL Injection in sequelize | 2019-11-06T17:11:10Z | 2021-08-18T22:09:33Z |
| ghsa-cj8p-53v9-2c26 |
6.1 (3.1)
|
Cross-site Scripting in Bolt | 2019-11-08T15:28:11Z | 2023-09-11T14:59:52Z |
| ghsa-2598-2f59-rmhq |
9.8 (3.1)
|
SQL Injection in sequelize | 2019-11-08T17:05:17Z | 2021-08-18T22:10:20Z |
| ghsa-jqwc-jm56-wcwj |
5.3 (3.1)
6.9 (4.0)
|
Cross-site scripting in Jupyter Notebook | 2019-11-08T17:07:42Z | 2024-10-07T14:48:27Z |
| ghsa-cw6w-q88j-6mqf |
9.8 (3.1)
|
Potential session hijack in Apache CXF | 2019-11-08T17:12:59Z | 2021-06-15T17:21:24Z |
| ghsa-58p8-9g59-q2hr |
6.5 (3.1)
|
Potential DOS attack due to unrestricted attachment count in messages | 2019-11-08T17:15:11Z | 2021-06-15T17:20:53Z |
| ghsa-4j6x-w426-6rc6 |
|
Default Express middleware security check is ignored in production | 2019-11-08T17:31:17Z | 2020-06-16T20:58:26Z |
| ghsa-m553-9wmx-533h |
6.1 (3.1)
|
Cross-site scripting in Dolibarr | 2019-11-08T20:05:31Z | 2022-11-17T20:00:22Z |
| ghsa-852q-xxj4-x2rx |
9.8 (3.1)
|
SQL Injection in SimpleSAMLphp | 2019-11-08T20:05:45Z | 2021-08-17T22:41:38Z |
| ghsa-6268-v434-45m5 |
6.1 (3.1)
|
Cross-site Scripting in Grav | 2019-11-08T20:06:08Z | 2021-08-17T22:39:50Z |
| ghsa-pwrf-q7h8-jjr7 |
8.8 (3.1)
|
Authorization Bypass Through User-Controlled Key in Bagisto | 2019-11-08T20:06:24Z | 2021-05-10T17:22:09Z |
| ghsa-pqm6-cgwr-x6pf |
8.8 (3.1)
|
Signature validation bypass in XmlSecLibs | 2019-11-08T20:06:46Z | 2021-08-18T22:14:37Z |
| ghsa-fxp8-7h5w-h235 |
6.1 (3.1)
|
XSS in search engine | 2019-11-12T22:58:11Z | 2021-08-18T22:27:14Z |
| ghsa-36hf-6hp2-9g4c |
4.3 (3.1)
|
Local file inclusion allows unauthorized access to internal resources in Alkacon OpenCms | 2019-11-12T22:58:14Z | 2022-04-19T20:07:03Z |
| ghsa-2p6p-v69p-9mm9 |
6.1 (3.1)
|
XSS in login form | 2019-11-12T22:58:16Z | 2021-08-18T22:26:42Z |
| ghsa-7qqr-3pj3-q2f5 |
6.1 (3.1)
|
XSS issues in the management interface | 2019-11-12T22:58:21Z | 2021-08-18T22:25:15Z |
| ghsa-427g-2r83-3ccm |
4.9 (3.1)
|
Information disclosure through processing of external XML entities | 2019-11-12T22:59:24Z | 2024-02-12T11:49:40Z |
| ghsa-89ch-hqf9-rgp3 |
|
Using JS libraries with known security vulnerabilities | 2019-11-12T22:59:28Z | 2019-11-15T20:11:29Z |
| ghsa-3q5x-7mxp-rp6j |
9.8 (3.1)
|
Remote code execution via vulnerable Symphony dependecy injection | 2019-11-12T22:59:32Z | 2024-02-12T11:59:17Z |
| ghsa-62fx-3v4f-mwxm |
6.5 (3.1)
|
Bypass of sitemp access restrictions | 2019-11-12T22:59:40Z | 2024-02-12T11:58:51Z |
| ghsa-xv69-f7x5-r4qw |
5.4 (3.1)
|
Magento Cross-Site Scripting via Attribute Set Name | 2019-11-12T22:59:43Z | 2024-02-02T18:12:48Z |
| ghsa-fm68-89m8-4gjj |
6.1 (3.1)
|
Composer JavaScript injection possible via html comments | 2019-11-12T22:59:47Z | 2023-09-06T13:49:44Z |
| ghsa-g996-q5r8-w7g2 |
5.4 (3.1)
|
Symfony Cross-site Scripting (XSS) vulnerability | 2019-11-12T23:00:53Z | 2024-02-14T15:22:38Z |
| ghsa-xm6j-x342-gwq9 |
5.3 (3.1)
|
SilverStripe Versioned Files module Unpublished files are exposed publicly | 2019-11-12T23:01:05Z | 2024-02-07T18:26:10Z |
| ghsa-cg8j-8w52-735v |
9.8 (3.1)
|
Missing warning can lead to unauthenticated admin access in SilverStripe | 2019-11-12T23:01:25Z | 2024-02-05T10:39:45Z |
| ghsa-w7r7-r8r9-vrg2 |
6.3 (3.1)
|
Session fixation in change password form | 2019-11-12T23:01:39Z | 2021-08-18T22:28:15Z |
| ghsa-jvx5-rm6q-gx7p |
5.3 (3.1)
|
Lack of access control on upoaded files | 2019-11-12T23:01:50Z | 2021-08-18T22:29:09Z |
| ghsa-6r58-4xgr-gm6m |
2.7 (3.1)
|
SilverStripe Priviledge escalation through cache pollution | 2019-11-12T23:01:59Z | 2023-09-20T09:57:17Z |
| ghsa-fmmc-742q-jg75 |
9.8 (3.1)
|
jackson-databind polymorphic typing issue | 2019-11-13T00:32:27Z | 2023-09-14T14:55:20Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-337 |
|
This affects all versions of package Flask-User. When using the make_safe_url function, i… | flask-user | 2021-07-05T11:15:00Z | 2021-09-26T23:32:30.327481Z |
| pysec-2021-112 |
|
An integer overflow exists in pywin32 prior to version b301 when adding an access control… | pywin32 | 2021-07-06T12:15:00Z | 2021-07-08T03:14:30.948663Z |
| pysec-2021-331 |
|
Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker… | pillow | 2021-07-13T17:15:00Z | 2021-09-23T00:11:05.797411Z |
| pysec-2021-886 |
6.5 (3.1)
|
A buffer overflow vulnerability in the Databuf function in types.cpp of Exiv2 v0.27.1 lea… | exiv2 | 2021-07-13T22:15:00Z | 2024-11-21T14:22:50.153222Z |
| pysec-2021-888 |
7.8 (3.1)
|
netCDF in GDAL 2.4.2 through 3.0.4 has a stack-based buffer overflow in nc4_get_att (call… | gdal | 2021-07-20T07:15:00+00:00 | 2024-11-21T14:22:50.934313+00:00 |
| pysec-2021-877 |
7.5 (3.1)
|
An integer overflow in CrwMap::encode0x1810 of Exiv2 0.27.3 allows attackers to trigger a… | exiv2 | 2021-07-26T17:15:00Z | 2024-01-02T15:20:59.375619Z |
| pysec-2021-115 |
|
The package glances before 3.2.1 are vulnerable to XML External Entity (XXE) Injection vi… | glances | 2021-07-29T18:15:00Z | 2021-07-29T20:29:05.800424Z |
| pysec-2021-335 |
|
The module `AccessControl` defines security policies for Python code used in restricted c… | accesscontrol | 2021-07-30T22:15:00Z | 2021-09-26T23:32:08.989778Z |
| pysec-2021-875 |
|
The module `AccessControl` defines security policies for Python code used in restricted c… | zope | 2021-07-30T22:15:00Z | 2023-05-04T04:29:31.501472Z |
| pysec-2021-323 |
|
Products.isurlinportal is a replacement for isURLInPortal method in Plone. Versions of Pr… | products-isurlinportal | 2021-08-02T19:15:00Z | 2021-09-20T14:26:43.785985Z |
| pysec-2021-368 |
|
Zope is an open-source web application server. Zope versions prior to versions 4.6.3 and … | zope | 2021-08-02T22:15:00Z | 2021-10-12T02:55:36.218662Z |
| pysec-2021-370 |
|
Zope is an open-source web application server. Zope versions prior to versions 4.6.3 and … | accesscontrol | 2021-08-02T22:15:00Z | 2021-10-12T02:55:32.357329Z |
| pysec-2021-118 |
|
The Jupyter notebook is a web-based notebook environment for interactive computing. In af… | notebook | 2021-08-09T21:15:00Z | 2021-08-17T18:40:19.674164Z |
| pysec-2021-119 |
|
23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a craft… | yamale | 2021-08-09T21:15:00Z | 2021-08-17T20:30:12.776802Z |
| pysec-2021-130 |
|
JupyterLab is a user interface for Project Jupyter which will eventually replace the clas… | jupyterlab | 2021-08-09T21:15:00Z | 2021-08-27T03:22:05.377903Z |
| pysec-2021-258 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T18:15:00Z | 2021-08-27T03:22:42.737707Z |
| pysec-2021-262 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T18:15:00Z | 2021-08-27T03:22:43.107664Z |
| pysec-2021-264 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T18:15:00Z | 2021-08-27T03:22:43.277267Z |
| pysec-2021-275 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T18:15:00Z | 2021-08-27T03:22:44.260808Z |
| pysec-2021-282 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T18:15:00Z | 2021-08-27T03:22:44.908068Z |
| pysec-2021-549 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:02.050023Z |
| pysec-2021-553 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:02.412159Z |
| pysec-2021-555 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:02.576943Z |
| pysec-2021-566 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:03.512666Z |
| pysec-2021-573 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-cpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:04.091418Z |
| pysec-2021-747 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:35.406311Z |
| pysec-2021-751 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:35.756075Z |
| pysec-2021-753 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:35.943696Z |
| pysec-2021-764 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:36.903192Z |
| pysec-2021-771 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T18:15:00Z | 2021-12-09T06:35:37.526889Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-2796 | Malicious code in eslint-config-ffe-base (npm) | 2022-06-20T20:13:01Z | 2022-06-20T20:13:02Z |
| mal-2022-4838 | Malicious code in nfe-splunk-analytics (npm) | 2022-06-20T20:13:01Z | 2022-06-20T20:13:02Z |
| mal-2022-5795 | Malicious code in ride-mode-selector (npm) | 2022-06-20T20:13:01Z | 2022-06-20T20:13:01Z |
| mal-2022-6942 | Malicious code in virtual-npm-lyft (npm) | 2022-06-20T20:13:01Z | 2022-06-20T20:13:01Z |
| mal-2022-1025 | Malicious code in antisvindel (npm) | 2022-06-20T20:13:02Z | 2022-06-20T20:13:03Z |
| mal-2022-2795 | Malicious code in eslint-config-ffe (npm) | 2022-06-20T20:13:02Z | 2022-06-20T20:13:02Z |
| mal-2022-4650 | Malicious code in mobilbank-communication (npm) | 2022-06-20T20:13:02Z | 2022-06-20T20:13:03Z |
| mal-2022-4837 | Malicious code in nfe-kampanje-react (npm) | 2022-06-20T20:13:02Z | 2022-06-20T20:13:02Z |
| mal-2022-2486 | Malicious code in discord-protection (npm) | 2022-06-20T20:13:03Z | 2022-06-20T20:13:04Z |
| mal-2022-4050 | Malicious code in jquery-lh (npm) | 2022-06-20T20:13:03Z | 2022-06-20T20:13:03Z |
| mal-2022-4880 | Malicious code in node-colors-sync (npm) | 2022-06-20T20:13:03Z | 2022-06-20T20:13:03Z |
| mal-2022-6695 | Malicious code in twilio-voice-notification-app (npm) | 2022-06-20T20:13:03Z | 2022-06-20T20:13:04Z |
| mal-2022-6906 | Malicious code in vera.js (npm) | 2022-06-20T20:13:03Z | 2022-06-20T20:13:04Z |
| mal-2022-5493 | Malicious code in protractor-skeleton (npm) | 2022-06-20T20:13:04Z | 2022-06-20T20:13:04Z |
| mal-2022-6113 | Malicious code in shubholic-test (npm) | 2022-06-20T20:13:04Z | 2022-06-20T20:13:05Z |
| mal-2022-6114 | Malicious code in shubholic-test.json (npm) | 2022-06-20T20:13:04Z | 2022-06-20T20:13:05Z |
| mal-2022-6693 | Malicious code in twilio-video-app-react (npm) | 2022-06-20T20:13:04Z | 2022-06-20T20:13:04Z |
| mal-2022-6400 | Malicious code in syzzfpmkizkljkiibpgb (npm) | 2022-06-20T20:13:05Z | 2022-06-20T20:13:06Z |
| mal-2022-6407 | Malicious code in tableau-iframe (npm) | 2022-06-20T20:13:05Z | 2022-06-20T20:13:06Z |
| mal-2022-6596 | Malicious code in tlvfobkwlssmirkwrtta (npm) | 2022-06-20T20:13:05Z | 2022-06-20T20:13:06Z |
| mal-2022-6694 | Malicious code in twilio-video-diagnostics-react-app (npm) | 2022-06-20T20:13:05Z | 2022-06-20T20:13:05Z |
| mal-2022-2453 | Malicious code in dev.socrata.com (npm) | 2022-06-20T20:13:06Z | 2022-06-20T20:13:07Z |
| mal-2022-4225 | Malicious code in kriswuqian (npm) | 2022-06-20T20:13:06Z | 2022-06-20T20:13:07Z |
| mal-2022-5025 | Malicious code in odn-backend (npm) | 2022-06-20T20:13:06Z | 2022-06-20T20:13:07Z |
| mal-2022-6609 | Malicious code in tools-for-discord (npm) | 2022-06-20T20:13:06Z | 2022-06-20T20:13:06Z |
| mal-2022-2489 | Malicious code in discord-selfbot-tools (npm) | 2022-06-20T20:13:07Z | 2022-06-20T20:13:08Z |
| mal-2022-4277 | Malicious code in legendary-noodle (npm) | 2022-06-20T20:13:07Z | 2022-06-20T20:13:08Z |
| mal-2022-5095 | Malicious code in opendatanetwork.com (npm) | 2022-06-20T20:13:07Z | 2022-06-20T20:13:07Z |
| mal-2022-6751 | Malicious code in ui-experiments (npm) | 2022-06-20T20:13:07Z | 2022-06-20T20:13:08Z |
| mal-2022-4251 | Malicious code in lakki-lib (npm) | 2022-06-20T20:13:08Z | 2022-06-20T20:13:09Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-0879 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2022-08-01T22:00:00.000+00:00 | 2025-12-17T23:00:00.000+00:00 |
| wid-sec-w-2022-0887 | Android Patchday August 2022 | 2022-08-02T22:00:00.000+00:00 | 2024-09-29T22:00:00.000+00:00 |
| wid-sec-w-2022-0890 | libTIFF: Schwachstelle ermöglicht Denial of Service | 2022-08-02T22:00:00.000+00:00 | 2023-01-29T23:00:00.000+00:00 |
| wid-sec-w-2022-0891 | Rsync: Schwachstelle ermöglicht Manipulation von Dateien | 2022-08-02T22:00:00.000+00:00 | 2024-05-07T22:00:00.000+00:00 |
| wid-sec-w-2022-0894 | Nvidia GPU Treiber und NVIDIA vGPU software: Mehrere Schwachstellen | 2022-08-02T22:00:00.000+00:00 | 2023-10-03T22:00:00.000+00:00 |
| wid-sec-w-2022-0901 | Red Hat JBoss Enterprise Application Platform: Mehrere Schwachstellen | 2022-08-03T22:00:00.000+00:00 | 2025-05-04T22:00:00.000+00:00 |
| wid-sec-w-2022-0909 | IBM DB2: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-08-03T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0910 | PostgreSQL JDBC Treiber: Schwachstelle ermöglicht SQL Injection | 2022-08-03T22:00:00.000+00:00 | 2025-11-09T23:00:00.000+00:00 |
| wid-sec-w-2022-0926 | vim: Schwachstelle ermöglicht Codeausführung | 2022-08-04T22:00:00.000+00:00 | 2023-04-03T22:00:00.000+00:00 |
| wid-sec-w-2022-0929 | zlib: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-08-04T22:00:00.000+00:00 | 2025-06-11T22:00:00.000+00:00 |
| wid-sec-w-2022-0934 | Exim: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2022-08-07T22:00:00.000+00:00 | 2023-06-06T22:00:00.000+00:00 |
| wid-sec-w-2022-0938 | Linux Kernel: Schwachstelle ermöglicht Manipulation von Dateien | 2022-08-07T22:00:00.000+00:00 | 2023-05-10T22:00:00.000+00:00 |
| wid-sec-w-2022-0944 | Red Hat OpenShift Service Mesh: Schwachstelle ermöglicht Denial of Service | 2022-08-08T22:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2022-0946 | ImageMagick: Schwachstelle ermöglicht Denial of Service | 2022-08-08T22:00:00.000+00:00 | 2024-05-05T22:00:00.000+00:00 |
| wid-sec-w-2022-0974 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-08-09T22:00:00.000+00:00 | 2024-07-31T22:00:00.000+00:00 |
| wid-sec-w-2022-0978 | Intel Ethernet Controller: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-08-09T22:00:00.000+00:00 | 2023-04-10T22:00:00.000+00:00 |
| wid-sec-w-2022-0986 | Intel Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2022-08-09T22:00:00.000+00:00 | 2024-06-26T22:00:00.000+00:00 |
| wid-sec-w-2022-0991 | Intel Chipset Firmware: Schwachstelle ermöglicht Denial of Service | 2022-08-09T22:00:00.000+00:00 | 2024-06-26T22:00:00.000+00:00 |
| wid-sec-w-2022-0992 | Apache Traffic Server: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2022-08-09T22:00:00.000+00:00 | 2023-04-05T22:00:00.000+00:00 |
| wid-sec-w-2022-0994 | Intel BIOS-Firmware für Intel Prozessoren: Schwachstelle ermöglicht Privilegieneskalation | 2022-08-09T22:00:00.000+00:00 | 2024-06-26T22:00:00.000+00:00 |
| wid-sec-w-2022-0997 | Linux Kernel: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2022-08-09T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2022-1008 | Red Hat OpenStack: Schwachstelle ermöglicht Denial of Service | 2022-08-10T22:00:00.000+00:00 | 2023-04-26T22:00:00.000+00:00 |
| wid-sec-w-2022-1013 | PostgreSQL: Schwachstelle ermöglicht Codeausführung | 2022-08-11T22:00:00.000+00:00 | 2025-11-16T23:00:00.000+00:00 |
| wid-sec-w-2022-1048 | vim: Mehrere Schwachstellen | 2022-08-15T22:00:00.000+00:00 | 2023-08-20T22:00:00.000+00:00 |
| wid-sec-w-2022-1059 | vim: Schwachstelle ermöglicht Codeausführung | 2022-08-16T22:00:00.000+00:00 | 2023-08-20T22:00:00.000+00:00 |
| wid-sec-w-2022-1061 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-08-16T22:00:00.000+00:00 | 2025-11-09T23:00:00.000+00:00 |
| wid-sec-w-2022-1069 | Apache ActiveMQ Artemis: Schwachstelle ermöglicht Darstellen falscher Informationen | 2022-08-17T22:00:00.000+00:00 | 2022-12-11T23:00:00.000+00:00 |
| wid-sec-w-2022-1073 | vim: Mehrere Schwachstellen | 2022-08-17T22:00:00.000+00:00 | 2023-08-20T22:00:00.000+00:00 |
| wid-sec-w-2022-1074 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-08-17T22:00:00.000+00:00 | 2023-10-10T22:00:00.000+00:00 |
| wid-sec-w-2022-1076 | vim: Mehrere Schwachstellen | 2022-08-18T22:00:00.000+00:00 | 2023-08-20T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2009:1038 | Red Hat Security Advisory: java-1.5.0-ibm security update | 2009-05-18T20:28:00+00:00 | 2025-11-21T17:34:39+00:00 |
| rhsa-2009:1039 | Red Hat Security Advisory: ntp security update | 2009-05-18T20:33:00+00:00 | 2025-11-21T17:34:39+00:00 |
| rhsa-2009:1040 | Red Hat Security Advisory: ntp security update | 2009-05-18T20:51:00+00:00 | 2025-11-21T17:34:39+00:00 |
| rhsa-2009:1055 | Red Hat Security Advisory: kernel security and bug fix update | 2009-05-20T01:05:00+00:00 | 2025-11-21T17:34:39+00:00 |
| rhsa-2009:1058 | Red Hat Security Advisory: httpd security update | 2009-05-20T18:30:00+00:00 | 2025-11-21T17:34:39+00:00 |
| rhsa-2009:1059 | Red Hat Security Advisory: pidgin security update | 2009-05-22T11:49:00+00:00 | 2025-11-21T17:34:39+00:00 |
| rhsa-2009:1060 | Red Hat Security Advisory: pidgin security update | 2009-05-22T12:00:00+00:00 | 2025-11-21T17:34:39+00:00 |
| rhsa-2009:1061 | Red Hat Security Advisory: freetype security update | 2009-05-22T12:06:00+00:00 | 2025-11-21T17:34:40+00:00 |
| rhsa-2009:1062 | Red Hat Security Advisory: freetype security update | 2009-05-22T12:06:00+00:00 | 2025-11-21T17:34:41+00:00 |
| rhsa-2009:0329 | Red Hat Security Advisory: freetype security update | 2009-05-22T12:21:00+00:00 | 2025-11-21T17:34:18+00:00 |
| rhsa-2009:1067 | Red Hat Security Advisory: Red Hat Application Stack v2.3 security and enhancement update | 2009-05-26T17:06:00+00:00 | 2025-11-21T17:34:41+00:00 |
| rhsa-2009:1065 | Red Hat Security Advisory: rhpki-ra security update | 2009-05-26T17:13:00+00:00 | 2025-11-21T17:34:41+00:00 |
| rhsa-2009:1066 | Red Hat Security Advisory: squirrelmail security update | 2009-05-26T17:26:00+00:00 | 2025-11-21T17:34:41+00:00 |
| rhsa-2009:1075 | Red Hat Security Advisory: httpd security update | 2009-05-27T14:19:00+00:00 | 2025-11-21T17:34:41+00:00 |
| rhsa-2009:1076 | Red Hat Security Advisory: Red Hat Enterprise Linux 2.1 - End Of Life | 2009-06-01T08:20:00+00:00 | 2025-11-21T17:34:42+00:00 |
| rhsa-2009:1077 | Red Hat Security Advisory: kernel security and bug fix update | 2009-06-02T16:05:00+00:00 | 2025-11-21T17:34:42+00:00 |
| rhsa-2009:1082 | Red Hat Security Advisory: cups security update | 2009-06-03T15:34:00+00:00 | 2025-11-21T17:34:42+00:00 |
| rhsa-2009:1081 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2009-06-03T15:36:00+00:00 | 2025-11-21T17:34:42+00:00 |
| rhsa-2009:1083 | Red Hat Security Advisory: cups security update | 2009-06-03T15:48:00+00:00 | 2025-11-21T17:34:43+00:00 |
| rhsa-2009:1087 | Red Hat Security Advisory: mod_jk security update | 2009-06-09T14:31:00+00:00 | 2025-11-21T17:34:43+00:00 |
| rhsa-2009:1095 | Red Hat Security Advisory: firefox security update | 2009-06-11T22:41:00+00:00 | 2025-11-21T17:34:45+00:00 |
| rhsa-2009:1096 | Red Hat Security Advisory: seamonkey security update | 2009-06-11T23:13:00+00:00 | 2025-11-21T17:34:43+00:00 |
| rhsa-2009:1100 | Red Hat Security Advisory: wireshark security update | 2009-06-15T20:37:00+00:00 | 2025-11-21T17:34:44+00:00 |
| rhsa-2009:1101 | Red Hat Security Advisory: cscope security update | 2009-06-15T21:04:00+00:00 | 2025-11-21T17:34:44+00:00 |
| rhsa-2009:1102 | Red Hat Security Advisory: cscope security update | 2009-06-15T21:10:00+00:00 | 2025-11-21T17:34:44+00:00 |
| rhsa-2009:1106 | Red Hat Security Advisory: kernel security and bug fix update | 2009-06-16T21:21:00+00:00 | 2025-11-21T17:34:45+00:00 |
| rhsa-2009:1107 | Red Hat Security Advisory: apr-util security update | 2009-06-16T21:49:00+00:00 | 2025-11-21T17:34:45+00:00 |
| rhsa-2009:1108 | Red Hat Security Advisory: httpd security update | 2009-06-16T22:03:00+00:00 | 2025-11-21T17:34:45+00:00 |
| rhsa-2009:1109 | Red Hat Security Advisory: acroread security update | 2009-06-17T09:16:00+00:00 | 2025-11-21T17:34:45+00:00 |
| rhsa-2009:1116 | Red Hat Security Advisory: cyrus-imapd security update | 2009-06-18T17:26:00+00:00 | 2025-11-21T17:34:46+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-21-194-03 | Siemens PROFINET Devices | 2021-07-13T00:00:00.000000Z | 2024-12-10T00:00:00.000000Z |
| icsa-21-194-04 | Siemens SINUMERIK Integrate Operate Client | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-05 | Siemens SIMATIC Software Products | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-06 | Siemens SIMATIC Software Products (Update B) | 2021-07-13T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-21-194-07 | Siemens Industrial Products LLDP (Update D) | 2021-07-13T00:00:00.000000Z | 2023-03-14T00:00:00.000000Z |
| icsa-21-194-08 | Siemens Solid Edge | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-09 | Siemens JT Utilities | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-10 | Siemens RUGGEDCOM ROS | 2021-07-13T00:00:00.000000Z | 2025-05-13T00:00:00.000000Z |
| icsa-21-194-11 | Siemens Teamcenter Active Workspace | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-12 | Siemens VxWorks-based Industrial Products (Update C) | 2021-07-13T00:00:00.000000Z | 2022-05-12T00:00:00.000000Z |
| icsa-21-194-13 | Siemens SINAMICS PERFECT HARMONY GH180 (Update A) | 2021-07-13T00:00:00.000000Z | 2021-09-14T00:00:00.000000Z |
| icsa-21-194-14 | Siemens RWG Universal Controllers | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-15 | ICSA-21-194-15_Siemens JT2Go and Teamcenter Visualization | 2021-07-13T00:00:00.000000Z | 2021-07-13T00:00:00.000000Z |
| icsa-21-194-16 | Siemens Mendix | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-194-17 | Siemens SINUMERIK ONE and SINUMERIK MC (Update A) | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-210-02 | Wibu-Systems CodeMeter Runtime | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-04 | Siemens SCALANCE FragAttacks | 2021-07-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-22-104-05 | Siemens OpenSSL Vulnerabilities in Industrial Products | 2021-07-13T00:00:00.000000Z | 2024-01-09T00:00:00.000000Z |
| icsma-21-196-01 | ICSMA-21-196-01_Ypsomed mylife | 2021-07-15T00:00:00.000000Z | 2021-07-15T00:00:00.000000Z |
| icsa-21-201-01 | Mitsubishi Electric MELSEC-F Series | 2021-07-20T00:00:00.000000Z | 2021-07-20T00:00:00.000000Z |
| icsa-21-208-01 | KUKA KR C4 | 2021-07-27T00:00:00.000000Z | 2021-07-27T00:00:00.000000Z |
| icsa-21-208-02 | Mitsubishi Electric GOT2000 series and GT SoftGOT2000 | 2021-07-27T00:00:00.000000Z | 2021-07-27T00:00:00.000000Z |
| icsa-21-208-03 | Geutebrück G-Cam E2 and G-Code | 2021-07-27T00:00:00.000000Z | 2021-07-27T00:00:00.000000Z |
| icsa-21-208-04 | LCDS LAquis SCADA | 2021-07-27T00:00:00.000000Z | 2021-07-27T00:00:00.000000Z |
| icsa-21-208-05 | Delta Electronics DIAScreen | 2021-07-27T00:00:00.000000Z | 2021-07-27T00:00:00.000000Z |
| icsa-21-210-01 | Hitachi ABB Power Grids eSOMS | 2021-07-29T00:00:00.000000Z | 2021-07-29T00:00:00.000000Z |
| icsma-21-215-01 | Swisslog Healthcare Translogic PTS | 2021-08-03T00:00:00.000000Z | 2021-08-03T00:00:00.000000Z |
| icsa-21-217-01 | HCC Embedded InterNiche TCP/IP stack, NicheLite (Update B) | 2021-08-05T00:00:00.000000Z | 2021-12-16T00:00:00.000000Z |
| icsa-21-217-02 | FATEK Automation FvDesigner | 2021-08-05T00:00:00.000000Z | 2021-08-05T00:00:00.000000Z |
| icsa-21-217-03 | ICSA-21-217-03_mySCADA myPRO | 2021-08-05T00:00:00.000000Z | 2021-08-05T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-bwms-xxe-uslrzgks | Cisco BroadWorks Messaging Server XML External Entity Injection Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-esa-wsa-sma-info-gy2aez2h | Cisco Content Security Management Appliance, Email Security Appliance, and Web Security Appliance Information Disclosure Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-hyperflex-rce-tjjnrkpr | Cisco HyperFlex HX Command Injection Vulnerabilities | 2021-05-05T16:00:00+00:00 | 2022-12-15T22:19:48+00:00 |
| cisco-sa-hyperflex-upload-ktck8ugz | Cisco HyperFlex HX Data Platform File Upload Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-07T13:44:21+00:00 |
| cisco-sa-imc-openred-zayru6d2 | Cisco Integrated Management Controller Open Redirect Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-07-16T17:37:29+00:00 |
| cisco-sa-imp-inj-erecokjr | Cisco Unified Communications Manager IM & Presence Service SQL Injection Vulnerabilities | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-ipcameras-dos-fc3f6lzt | Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Denial of Service Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-nfvis-cmdinj-dkfjqg2j | Cisco Enterprise NFV Infrastructure Software Command Injection Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-rv-34x-privesc-gln8zaqe | Cisco RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Local Privilege Escalation Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sb-wap-multi-zafkgxhf | Cisco Small Business 100, 300, and 500 Series Wireless Access Points Vulnerabilities | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sd-wan-vmanage-4tbynnhz | Cisco SD-WAN vManage Software Vulnerabilities | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sd-wan-vmanage-9vzo4gfu | Cisco SD-WAN vManage Information Disclosure Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sdw-auth-bypass-65ayqcs2 | Cisco SD-WAN vManage Software Authentication Bypass Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sdwan-arbfile-7qhd9mcn | Cisco SD-WAN Software Arbitrary File Corruption Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sdwan-buffover-mwgucjto | Cisco SD-WAN vEdge Software Buffer Overflow Vulnerabilities | 2021-05-05T16:00:00+00:00 | 2021-09-24T21:36:50+00:00 |
| cisco-sa-sdwan-dos-ckn5cvqw | Cisco SD-WAN Software vDaemon Denial of Service Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sdwan-privesc-qvszvupy | Cisco SD-WAN Software Privilege Escalation Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sdwan-vmanageinfdis-lkrfpbv | Cisco SD-WAN vManage Information Disclosure Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-sdwan-vmaninfdis3-ovdr6uu8 | Cisco SD-WAN vManage Software Information Disclosure Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-07-07T19:45:23+00:00 |
| cisco-sa-sma-priv-esc-jj8zxqsc | Cisco Content Security Management Appliance Privilege Escalation Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-tp-rmos-fileread-pe9sl3g | Cisco TelePresence Collaboration Endpoint and RoomOS Software Arbitrary File Read Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-ucm-dos-oo4sryef | Cisco Hosted Collaboration Mediation Fulfillment Denial of Service Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-13T14:42:31+00:00 |
| cisco-sa-vmanage-enumeration-64enndky | Cisco SD-WAN vManage HTTP Authentication User Enumeration Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-vmanage-xss-en75jxtw | Cisco SD-WAN vManage API Stored Cross-Site Scripting Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-waas-infdisc-twb4eypk | Cisco Wide Area Application Services Software Information Disclosure Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-wsa-xss-mvjowchb | Cisco Web Security Appliance Cross-Site Scripting Vulnerability | 2021-05-05T16:00:00+00:00 | 2021-05-05T16:00:00+00:00 |
| cisco-sa-wifi-faf-22epcewu | Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021 | 2021-05-11T18:00:00+00:00 | 2021-12-15T15:47:26+00:00 |
| cisco-sa-ade-xcvaqeoz | Cisco ADE-OS Local File Inclusion Vulnerability | 2021-05-19T16:00:00+00:00 | 2021-06-24T14:24:36+00:00 |
| cisco-sa-cml-cmd-inject-n4vyeqxb | Cisco Modeling Labs Web UI Command Injection Vulnerability | 2021-05-19T16:00:00+00:00 | 2021-05-19T16:00:00+00:00 |
| cisco-sa-dnasp-conn-cmdinj-hoj4yv5n | Cisco DNA Spaces Connector Command Injection Vulnerabilities | 2021-05-19T16:00:00+00:00 | 2021-05-19T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-21291 | Vulnerability in the Oracle Java SE Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u321 8u311 11.0.13 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of Oracle Java SE Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments typically in clients running sandboxed Java Web Start applications or sandboxed Java applets that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component e.g. through a web service which supplies data to | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21293 | Vulnerability in the Oracle Java SE Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321 8u311 11.0.13 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments typically in clients running sandboxed Java Web Start applications or sandboxed Java applets that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component e.g. through a web service which supplies da | 2022-01-02T00:00:00.000Z | 2022-01-26T00:00:00.000Z |
| msrc_cve-2022-21294 | Vulnerability in the Oracle Java SE Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321 8u311 11.0.13 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments typically in clients running sandboxed Java Web Start applications or sandboxed Java applets that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component e.g. through a web service which supplies da | 2022-01-02T00:00:00.000Z | 2022-01-26T00:00:00.000Z |
| msrc_cve-2022-21296 | Vulnerability in the Oracle Java SE Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321 8u311 11.0.13 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments typically in clients running sandboxed Java Web Start applications or sandboxed Java applets that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component e.g. through a web service which supplies data to the APIs. CVSS 3.1 | 2022-01-02T00:00:00.000Z | 2022-01-26T00:00:00.000Z |
| msrc_cve-2022-21297 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-22T00:00:00.000Z |
| msrc_cve-2022-21299 | Vulnerability in the Oracle Java SE Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u321 8u311 11.0.13 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments typically in clients running sandboxed Java Web Start applications or sandboxed Java applets that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component e.g. through a web service which supplies data to | 2022-01-02T00:00:00.000Z | 2022-01-26T00:00:00.000Z |
| msrc_cve-2022-21301 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-22T00:00:00.000Z |
| msrc_cve-2022-21302 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-22T00:00:00.000Z |
| msrc_cve-2022-21303 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21304 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-22T00:00:00.000Z |
| msrc_cve-2022-21305 | Vulnerability in the Oracle Java SE Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u321 8u311 11.0.13 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of Oracle Java SE Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments typically in clients running sandboxed Java Web Start applications or sandboxed Java applets that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component e.g. through a web service which supplies data to | 2022-01-02T00:00:00.000Z | 2022-01-26T00:00:00.000Z |
| msrc_cve-2022-21307 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21308 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21309 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21310 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21311 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21312 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21313 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21314 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21315 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21316 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21317 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21318 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21319 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21320 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21321 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21322 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-26T00:00:00.000Z |
| msrc_cve-2022-21323 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21324 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21325 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202006-1892 | AC9V3.0 upgrade software is a Gigabit Ethernet wireless router of Shenzhen Jixiang Tengda… | 2022-05-04T09:46:21.380000Z |
| var-202005-1115 | DCCE HMIware configuration editing software is a special man-machine interface configurat… | 2022-05-04T09:46:25.815000Z |
| var-202005-1094 | Guangzhou Jiu'an Intelligent Technology Co., Ltd. (Jiu'an JUAN) is the world's leading pr… | 2022-05-04T09:46:25.832000Z |
| var-202004-2258 | Shanghai Zhenghang Electronic Technology Co., Ltd. is a high-tech enterprise dedicated to… | 2022-05-04T09:46:27.107000Z |
| var-202004-2237 | NA-VIEW is a touch screen configuration software. NA-VIEW V1.02.4 has a denial of ser… | 2022-05-04T09:46:27.119000Z |
| var-202002-1698 | FameView configuration software is a high-performance configuration monitoring software i… | 2022-05-04T09:46:33.920000Z |
| var-202002-1696 | WECON PLC Editor is a programming software for Programmable Logic Controllers (PLC) from … | 2022-05-04T09:46:33.932000Z |
| var-202001-1991 | ZXR10 1800-2S is a router product of ZTE Corporation of China. ZTE ZXR10 1800-2S has fil… | 2022-05-04T09:46:35.389000Z |
| var-202001-1970 | ZTE ZXR10 1800-2S router is a multi-service intelligent router produced by ZTE Corporatio… | 2022-05-04T09:46:35.401000Z |
| var-201912-2014 | ER8300 is a full-gigabit Internet cafe dedicated router launched by H3C company, which us… | 2022-05-04T09:46:37.060000Z |
| var-201910-1870 | Baidu Tiangong Intelligent Platform is a cloud service platform for the Internet of Thing… | 2022-05-04T09:46:43.069000Z |
| var-201908-2208 | Dlink DIR-816 is a wireless router. Dlink DIR-816 has a buffer overflow vulnerability. A… | 2022-05-04T09:46:46.055000Z |
| var-201904-1633 | Xiaoai MINI Smart Speaker is an artificial intelligence-based speaker that can be network… | 2022-05-04T09:46:54.969000Z |
| var-201903-1641 | ZTE Video Conference MCU Device weak password, allowing initial password login | 2022-05-04T09:46:56.504000Z |
| var-201901-1698 | D-Link Central WiFiManager is D-Link's centralized wireless management software. The D-l… | 2022-05-04T09:47:01.489000Z |
| var-201812-1300 | H3C ER2100n is an enterprise-class router. H3C ER2100n has a denial of service vulnerabi… | 2022-05-04T09:47:02.592000Z |
| var-201810-1606 | Both the TP-LinkTL-WR841N and TL-WR841ND are wireless router devices. TP-LinkTL-WR841N an… | 2022-05-04T09:47:04.745000Z |
| var-201807-2270 | TP-LINK WAR302 is an enterprise-class 300M wireless VPN router that supports multiple VPN… | 2022-05-04T09:47:10.797000Z |
| var-201806-1895 | Shenzhen Ruilian Digital Technology Co., Ltd. is committed to developing leading Internet… | 2022-05-04T09:47:13.083000Z |
| var-201803-2353 | HyperIP is a WAN optimized virtual device. Data replication, backup, recovery, and data c… | 2022-05-04T09:47:19.930000Z |
| var-201801-1833 | pelco Sarix Professional is a video camera. An information disclosure vulnerability exis… | 2022-05-04T09:47:23.051000Z |
| var-201712-1129 | Dahua Player Library SDK is a supporting product for all equipment of Zhejiang Dahua Tech… | 2022-05-04T09:47:27.751000Z |
| var-201711-1241 | ZXV10 H108B is a wireless broadband router cat. The ZRF ZXV10 H108B wireless cat has a C… | 2022-05-04T09:47:28.990000Z |
| var-201710-1442 | ZTE E8810 is a dual-band 11ac intelligent cloud router. CSRF vulnerability exists in ZTE… | 2022-05-04T09:47:30.314000Z |
| var-201708-1637 | D-LinkDVG-5402SPVoIP is a wireless router product from D-Link. The D-Link DVG-5402 SPVoIP… | 2022-05-04T09:47:35.154000Z |
| var-201707-1360 | The TP-LinkPTWR841NV8 is a wireless router. There is a logic vulnerability in the TP-Link… | 2022-05-04T09:47:36.532000Z |
| var-201706-1140 | Foscamcamera is a webcam that can push messages to mobile phones and directly implement v… | 2022-05-04T09:47:37.862000Z |
| var-201706-1119 | Foscamcamera is a webcam that can push messages to mobile phones and directly implement v… | 2022-05-04T09:47:37.873000Z |
| var-201705-4194 | Hikvision is a video-centric IoT solution and data operation service provider. Hikvision… | 2022-05-04T09:47:39.351000Z |
| var-201703-1379 | WirelessIPCamera (P2P) WIFICAM is a wireless IP camera. The WirelessIPCamera (P2P) WIFICA… | 2022-05-04T09:47:45.885000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2017-000070 | WN-AC1167GR vulnerable to cross-site scripting | 2017-04-14T13:55+09:00 | 2017-06-01T13:53+09:00 |
| jvndb-2017-000069 | Multiple installers of Toshiba memory card related software may insecurely load Dynamic Link Libraries | 2017-04-14T14:09+09:00 | 2017-12-21T17:50+09:00 |
| jvndb-2017-000055 | NETGEAR ProSAFE Plus Configuration Utility vulnerable to improper access control | 2017-04-18T13:42+09:00 | 2017-06-01T15:24+09:00 |
| jvndb-2017-000071 | SEIL Series routers vulnerable to denial-of-service (DoS) | 2017-04-19T14:43+09:00 | 2017-06-06T14:50+09:00 |
| jvndb-2017-000075 | Hoozin Viewer vulnerable to buffer overflow | 2017-04-20T14:48+09:00 | 2017-06-01T13:40+09:00 |
| jvndb-2017-000073 | WordPress plugin "Booking Calendar" vulnerable to directory traversal | 2017-04-20T15:11+09:00 | 2017-06-01T13:53+09:00 |
| jvndb-2017-000074 | WordPress plugin "Booking Calendar" vulnerable to cross-site scripting | 2017-04-20T15:11+09:00 | 2017-06-01T13:53+09:00 |
| jvndb-2017-000076 | Multiple JustSystems products including Hanako may insecurely load Dynamic Link Libraries | 2017-04-20T15:11+09:00 | 2017-06-01T13:40+09:00 |
| jvndb-2017-000072 | WNC01WH vulnerable to OS command injection | 2017-04-21T13:44+09:00 | 2017-06-01T13:53+09:00 |
| jvndb-2017-000077 | Installer of Vivaldi for Windows may insecurely load executable files | 2017-04-25T13:36+09:00 | 2017-06-06T15:04+09:00 |
| jvndb-2017-000082 | Nessus vulnerable to cross-site scripting | 2017-05-09T13:52+09:00 | 2017-11-27T16:55+09:00 |
| jvndb-2017-000083 | The installer of The Public Certification Service for Individuals "The JPKI user's software" may insecurely load Dynamic Link Libraries | 2017-05-09T13:52+09:00 | 2017-11-27T17:23+09:00 |
| jvndb-2017-000078 | SOY CMS vulnerable to directory traversal | 2017-05-11T13:36+09:00 | 2017-11-27T17:23+09:00 |
| jvndb-2017-000079 | The installer of SOY CMS vulnerable to cross-site scripting | 2017-05-11T13:37+09:00 | 2017-11-27T17:23+09:00 |
| jvndb-2017-000080 | PrimeDrive Desktop Application Installer may insecurely load executable files | 2017-05-12T13:36+09:00 | 2017-11-27T16:55+09:00 |
| jvndb-2017-000092 | WordPress plugin "WP Booking System" vulnerable to cross-site scripting | 2017-05-16T13:58+09:00 | 2018-01-17T11:46+09:00 |
| jvndb-2017-000093 | WordPress plugin "MaxButtons" vulnerable to cross-site scripting | 2017-05-16T13:59+09:00 | 2018-01-17T12:28+09:00 |
| jvndb-2017-000094 | Multiple BestWebSoft WordPress plugins vulnerable to cross-site scripting | 2017-05-16T14:00+09:00 | 2017-11-27T17:04+09:00 |
| jvndb-2017-000090 | FlashAir fails to restrict access permissions in PhotoShare | 2017-05-16T15:34+09:00 | 2017-12-21T19:13+09:00 |
| jvndb-2017-000091 | FlashAir do not set credential information in PhotoShare | 2017-05-16T15:46+09:00 | 2017-12-21T19:16+09:00 |
| jvndb-2017-000096 | Empirical Project Monitor - eXtended vulnerable to cross-site scripting | 2017-05-19T14:53+09:00 | 2017-11-27T18:01+09:00 |
| jvndb-2017-000097 | Empirical Project Monitor - eXtended vulnerable to cross-site scripting | 2017-05-19T14:55+09:00 | 2017-11-27T18:01+09:00 |
| jvndb-2017-000098 | The installer of Empirical Project Monitor - eXtended may insecurely load Dynamic Link Libraries | 2017-05-19T14:57+09:00 | 2017-11-27T18:01+09:00 |
| jvndb-2017-000099 | SSL Visibility Appliance may generate illegal RST packets | 2017-05-24T14:41+09:00 | 2017-05-31T19:27+09:00 |
| jvndb-2017-000089 | GroupSession fails to restrict access permissions | 2017-05-25T14:14+09:00 | 2018-01-24T11:59+09:00 |
| jvndb-2017-000100 | Installer of electronic tendering and bid opening system provided by Acquisition, Technology & Logistics Agency may insecurely load Dynamic Link Libraries | 2017-05-25T14:14+09:00 | 2018-01-17T13:58+09:00 |
| jvndb-2017-000101 | Installers of the screensavers provided by JAPAN AIR SELF DEFENSE FORCE, MINISTRY OF DEFENSE may insecurely load Dynamic Link Libraries | 2017-05-25T14:14+09:00 | 2018-02-15T15:30+09:00 |
| jvndb-2017-000103 | WordPress plugin "WP Live Chat Support" vulnerable to cross-site scripting | 2017-06-01T14:06+09:00 | 2017-11-27T16:47+09:00 |
| jvndb-2017-000108 | Installer of Tera Term may insecurely load Dynamic Link Libraries | 2017-06-01T14:42+09:00 | 2018-01-24T14:20+09:00 |
| jvndb-2017-000104 | RW-4040 driver installer may insecurely load Dynamic Link Libraries | 2017-06-01T16:25+09:00 | 2018-01-24T13:57+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2017:1301-1 | Security update for the Linux Kernel | 2017-05-15T15:06:35Z | 2017-05-15T15:06:35Z |
| suse-su-2017:1281-1 | Security update for Linux Kernel Live Patch 20 for SLE 12 | 2017-05-15T15:58:36Z | 2017-05-15T15:58:36Z |
| suse-su-2017:1302-1 | Security update for Linux Kernel Live Patch 19 for SLE 12 | 2017-05-15T15:58:45Z | 2017-05-15T15:58:45Z |
| suse-su-2017:1287-1 | Security update for Linux Kernel Live Patch 18 for SLE 12 | 2017-05-15T15:58:54Z | 2017-05-15T15:58:54Z |
| suse-su-2017:1278-1 | Security update for Linux Kernel Live Patch 17 for SLE 12 | 2017-05-15T15:59:03Z | 2017-05-15T15:59:03Z |
| suse-su-2017:1291-1 | Security update for Linux Kernel Live Patch 16 for SLE 12 | 2017-05-15T15:59:12Z | 2017-05-15T15:59:12Z |
| suse-su-2017:1300-1 | Security update for Linux Kernel Live Patch 15 for SLE 12 | 2017-05-15T15:59:21Z | 2017-05-15T15:59:21Z |
| suse-su-2017:1283-1 | Security update for Linux Kernel Live Patch 5 for SLE 12 SP2 | 2017-05-15T15:59:29Z | 2017-05-15T15:59:29Z |
| suse-su-2017:1295-1 | Security update for Linux Kernel Live Patch 4 for SLE 12 SP2 | 2017-05-15T15:59:37Z | 2017-05-15T15:59:37Z |
| suse-su-2017:1277-1 | Security update for Linux Kernel Live Patch 2 for SLE 12 SP2 | 2017-05-15T15:59:45Z | 2017-05-15T15:59:45Z |
| suse-su-2017:1279-1 | Security update for Linux Kernel Live Patch 1 for SLE 12 SP2 | 2017-05-15T15:59:53Z | 2017-05-15T15:59:53Z |
| suse-su-2017:1280-1 | Security update for Linux Kernel Live Patch 13 for SLE 12 SP1 | 2017-05-15T16:00:00Z | 2017-05-15T16:00:00Z |
| suse-su-2017:1294-1 | Security update for Linux Kernel Live Patch 12 for SLE 12 SP1 | 2017-05-15T16:00:10Z | 2017-05-15T16:00:10Z |
| suse-su-2017:1290-1 | Security update for Linux Kernel Live Patch 11 for SLE 12 SP1 | 2017-05-15T16:00:19Z | 2017-05-15T16:00:19Z |
| suse-su-2017:1289-1 | Security update for Linux Kernel Live Patch 10 for SLE 12 SP1 | 2017-05-15T16:00:27Z | 2017-05-15T16:00:27Z |
| suse-su-2017:1297-1 | Security update for Linux Kernel Live Patch 9 for SLE 12 SP1 | 2017-05-15T16:00:35Z | 2017-05-15T16:00:35Z |
| suse-su-2017:1288-1 | Security update for Linux Kernel Live Patch 8 for SLE 12 SP1 | 2017-05-15T16:00:45Z | 2017-05-15T16:00:45Z |
| suse-su-2017:1284-1 | Security update for Linux Kernel Live Patch 7 for SLE 12 SP1 | 2017-05-15T16:00:53Z | 2017-05-15T16:00:53Z |
| suse-su-2017:1293-1 | Security update for Linux Kernel Live Patch 6 for SLE 12 SP1 | 2017-05-15T16:01:02Z | 2017-05-15T16:01:02Z |
| suse-su-2017:1285-1 | Security update for Linux Kernel Live Patch 14 for SLE 12 | 2017-05-15T16:01:12Z | 2017-05-15T16:01:12Z |
| suse-su-2017:1299-1 | Security update for Linux Kernel Live Patch 13 for SLE 12 | 2017-05-15T16:01:22Z | 2017-05-15T16:01:22Z |
| suse-su-2017:1303-1 | Security update for Linux Kernel Live Patch 0 for SLE 12 SP2 | 2017-05-15T16:52:23Z | 2017-05-15T16:52:23Z |
| suse-su-2017:1308-1 | Security update for Linux Kernel Live Patch 6 for SLE 12 SP2 | 2017-05-16T10:42:44Z | 2017-05-16T10:42:44Z |
| suse-su-2017:1305-1 | Security update for Botan | 2017-05-16T11:18:13Z | 2017-05-16T11:18:13Z |
| suse-su-2017:1306-1 | Security update for libtirpc | 2017-05-16T11:18:55Z | 2017-05-16T11:18:55Z |
| suse-su-2017:1311-1 | Security update for mariadb | 2017-05-16T13:40:28Z | 2017-05-16T13:40:28Z |
| suse-su-2017:1313-1 | Security update for libxslt | 2017-05-16T13:41:07Z | 2017-05-16T13:41:07Z |
| suse-su-2017:1317-1 | Security update for bash | 2017-05-16T13:41:26Z | 2017-05-16T13:41:26Z |
| suse-su-2017:1315-1 | Security update for mariadb | 2017-05-16T13:41:55Z | 2017-05-16T13:41:55Z |
| suse-su-2017:1314-1 | Security update for libtirpc | 2017-05-16T13:42:11Z | 2017-05-16T13:42:11Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2020:1893-1 | Security update for java-1_8_0-openj9 | 2020-11-10T08:37:50Z | 2020-11-10T08:37:50Z |
| opensuse-su-2020:1899-1 | Security update for sddm | 2020-11-11T09:30:41Z | 2020-11-11T09:30:41Z |
| opensuse-su-2020:1907-1 | Security update for zeromq | 2020-11-13T13:26:15Z | 2020-11-13T13:26:15Z |
| opensuse-su-2020:1909-1 | Security update for MozillaFirefox | 2020-11-13T23:34:14Z | 2020-11-13T23:34:14Z |
| opensuse-su-2020:1910-1 | Security update for zeromq | 2020-11-14T05:25:43Z | 2020-11-14T05:25:43Z |
| opensuse-su-2020:1911-1 | Security update for python-waitress | 2020-11-14T05:25:51Z | 2020-11-14T05:25:51Z |
| opensuse-su-2020:1906-1 | Security update for the Linux Kernel | 2020-11-14T08:15:18Z | 2020-11-14T08:15:18Z |
| opensuse-su-2020:1916-1 | Security update for SDL | 2020-11-14T09:26:36Z | 2020-11-14T09:26:36Z |
| opensuse-su-2020:1918-1 | Security update for openldap2 | 2020-11-14T15:52:48Z | 2020-11-14T15:52:48Z |
| opensuse-su-2020:1919-1 | Security update for MozillaFirefox | 2020-11-14T15:53:13Z | 2020-11-14T15:53:13Z |
| opensuse-su-2020:1920-1 | Security update for openldap2 | 2020-11-14T17:13:25Z | 2020-11-14T17:13:25Z |
| opensuse-su-2020:1922-1 | Security update for python-waitress | 2020-11-14T17:27:37Z | 2020-11-14T17:27:37Z |
| opensuse-su-2020:1927-1 | Security update for ImageMagick | 2020-11-15T05:24:50Z | 2020-11-15T05:24:50Z |
| opensuse-su-2020:1929-1 | Security update for chromium | 2020-11-15T15:14:47Z | 2020-11-15T15:14:47Z |
| opensuse-su-2020:1930-1 | Security update for u-boot | 2020-11-15T15:18:54Z | 2020-11-15T15:18:54Z |
| opensuse-su-2020:1937-1 | Security update for chromium | 2020-11-15T19:26:30Z | 2020-11-15T19:26:30Z |
| opensuse-su-2020:1943-1 | Security update for chromium | 2020-11-16T09:27:03Z | 2020-11-16T09:27:03Z |
| opensuse-su-2020:1949-1 | Security update for raptor | 2020-11-17T08:12:58Z | 2020-11-17T08:12:58Z |
| opensuse-su-2020:1952-1 | Security update for opera | 2020-11-17T11:28:00Z | 2020-11-17T11:28:00Z |
| opensuse-su-2020:1959-1 | Security update for raptor | 2020-11-18T06:51:35Z | 2020-11-18T06:51:35Z |
| opensuse-su-2020:1960-1 | Security update for kernel-firmware | 2020-11-18T10:42:34Z | 2020-11-18T10:42:34Z |
| opensuse-su-2020:1961-1 | Security update for gdm | 2020-11-18T22:58:49Z | 2020-11-18T22:58:49Z |
| opensuse-su-2020:1962-1 | Security update for kernel-firmware | 2020-11-18T22:59:43Z | 2020-11-18T22:59:43Z |
| opensuse-su-2020:1966-1 | Security update for moinmoin-wiki | 2020-11-19T07:33:28Z | 2020-11-19T07:33:28Z |
| opensuse-su-2020:1969-1 | Security update for slurm_18_08 | 2020-11-19T15:25:01Z | 2020-11-19T15:25:01Z |
| opensuse-su-2020:1970-1 | Security update for tor | 2020-11-19T15:25:33Z | 2020-11-19T15:25:33Z |
| opensuse-su-2020:1983-1 | Security update for tcpdump | 2020-11-20T17:24:10Z | 2020-11-20T17:24:10Z |
| opensuse-su-2020:1984-1 | Security update for java-11-openjdk | 2020-11-20T23:23:29Z | 2020-11-20T23:23:29Z |
| opensuse-su-2020:1986-1 | Security update for tcpdump | 2020-11-21T05:23:29Z | 2020-11-21T05:23:29Z |
| opensuse-su-2020:1988-1 | Security update for python | 2020-11-21T09:23:37Z | 2020-11-21T09:23:37Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-01652 | WebGate eDVR Manager WESPPTZ.WESPPTZCtrl.1 ActiveX控件堆缓冲区溢出漏洞 | 2015-03-11 | 2015-03-13 |
| cnvd-2015-01653 | WebGate WinRDS WESPPlayback.WESPPlaybackCtrl.1控件栈缓冲区溢出漏洞 | 2015-03-11 | 2015-03-13 |
| cnvd-2015-01654 | WebGate WebEyeAudio ActiveX控件栈缓冲区溢出漏洞 | 2015-03-11 | 2015-03-13 |
| cnvd-2015-01655 | Agilent Technologies Feature Extraction AnnotationX.AnnList.1 ActiveX控件任意代码执行漏洞 | 2015-03-11 | 2015-03-13 |
| cnvd-2015-01656 | Drupal Campaign Monitor模块跨站请求伪造漏洞 | 2015-03-11 | 2015-03-13 |
| cnvd-2015-01657 | Drupal Simple Subscription模块跨站脚本漏洞 | 2015-03-11 | 2015-03-13 |
| cnvd-2016-06816 | 北京安宁创新网络科技股份有限公司邮件投递网关系统存在SQL注入漏洞 | 2015-03-11 | 2015-06-11 |
| cnvd-2015-01603 | Siemens多款产品存在搜索路径漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01604 | 多款Apple产品存在信息泄露漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01605 | WordPress插件All In One WP Security & Firewall跨站请求伪造漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01606 | Siemens SIMATIC拒绝服务漏洞(CNVD-2015-01606) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01607 | WordPress插件All In One WP Security & Firewall SQL注入漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01608 | OpenKM跨站脚本漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01609 | ZOHO ManageEngine ADManager Plus存在多个跨站脚本漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01610 | Elastix 'a2billing/customer/iridium_threed.php' SQL注入漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01611 | IBM SDK Java Technology存在未明漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01612 | Microsoft Office内存破坏漏洞(CNVD-2015-01612) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01613 | Ruby on Rails ActiveModel::Name远程拒绝服务漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01614 | Microsoft windows内核模式驱动空指针引用漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01615 | Microsoft windows内核模式驱动内核信息泄露漏洞(CNVD-2015-01615) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01616 | Microsoft windows PNG解析远程信息泄露漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01617 | Microsoft windows内核模式驱动内核信息泄露漏洞(CNVD-2015-01617) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01618 | Microsoft windows内核模式驱动内核信息泄露漏洞(CNVD-2015-01618) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01619 | Microsoft windows kernel本地权限提升漏洞(CNVD-2015-01619) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01620 | Microsoft windows kernel本地权限提升漏洞(CNVD-2015-01620) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01621 | Microsoft windows Adobe字体驱动缓冲区溢出漏洞(CNVD-2015-01621) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01622 | Microsoft windows Adobe字体驱动缓冲区溢出漏洞(CNVD-2015-01622) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01623 | Microsoft windows Adobe字体驱动缓冲区溢出漏洞(CNVD-2015-01623) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01624 | Microsoft windows Adobe字体驱动缓冲区溢出漏洞(CNVD-2015-01624) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01625 | Microsoft windows Adobe字体驱动缓冲区溢出漏洞 | 2015-03-12 | 2015-03-13 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2005-avi-479 | Vulnérabilité dans DotClear | 2005-12-02T00:00:00.000000 | 2005-12-02T00:00:00.000000 |
| certa-2005-avi-480 | Vulnérabilité dans Helix Player | 2005-12-02T00:00:00.000000 | 2005-12-02T00:00:00.000000 |
| certa-2005-avi-481 | Vulnérabilité du serveur HTTP de CISCO IOS | 2005-12-02T00:00:00.000000 | 2005-12-02T00:00:00.000000 |
| certa-2005-avi-482 | Vulnérabilité de cURL/libcURL | 2005-12-08T00:00:00.000000 | 2005-12-21T00:00:00.000000 |
| certa-2005-avi-483 | Multiples vulnérabilités dans Xpdf et les bibliothèques dérivées | 2005-12-08T00:00:00.000000 | 2006-02-01T00:00:00.000000 |
| certa-2005-avi-484 | Vulnérabilité dans phpMyAdmin | 2005-12-08T00:00:00.000000 | 2006-01-26T00:00:00.000000 |
| certa-2005-avi-485 | Vulnérabilité sur AIX | 2005-12-09T00:00:00.000000 | 2005-12-09T00:00:00.000000 |
| certa-2005-avi-486 | Vulnérabilité de Perl | 2005-12-09T00:00:00.000000 | 2006-03-02T00:00:00.000000 |
| certa-2005-avi-487 | Vulnérabilité de Ethereal | 2005-12-13T00:00:00.000000 | 2006-02-27T00:00:00.000000 |
| certa-2005-avi-488 | Vulnérabilité du noyau Microsoft Windows | 2005-12-14T00:00:00.000000 | 2005-12-14T00:00:00.000000 |
| certa-2005-avi-489 | Multiples vulnérabilités dans Internet Explorer | 2005-12-14T00:00:00.000000 | 2005-12-14T00:00:00.000000 |
| certa-2005-avi-490 | Vulnérabilité sur le module mod_imap d'Apache | 2005-12-15T00:00:00.000000 | 2006-06-22T00:00:00.000000 |
| certa-2005-avi-491 | Vulnérabilité de Trend Micro ServerProtect | 2005-12-16T00:00:00.000000 | 2005-12-16T00:00:00.000000 |
| certa-2005-avi-492 | Multiples vulnérabilités dans JRun de Macromedia | 2005-12-19T00:00:00.000000 | 2005-12-19T00:00:00.000000 |
| certa-2005-avi-493 | Multiples vulnérabilités dans ColdFusion de Macromedia | 2005-12-19T00:00:00.000000 | 2005-12-19T00:00:00.000000 |
| certa-2005-avi-494 | Vulnérabilité de Courier | 2005-12-19T00:00:00.000000 | 2005-12-19T00:00:00.000000 |
| certa-2005-avi-495 | Vulnérabilité de Sudo | 2005-12-21T00:00:00.000000 | 2006-01-23T00:00:00.000000 |
| certa-2005-avi-496 | Vulnérabilité de Xmail | 2005-12-21T00:00:00.000000 | 2005-12-21T00:00:00.000000 |
| certa-2005-avi-497 | Mise à jour des noyaux des distributions Linux | 2005-12-22T00:00:00.000000 | 2006-03-16T00:00:00.000000 |
| certa-2005-avi-498 | Vulnérabilité dans Cisco Clean Access | 2005-12-22T00:00:00.000000 | 2005-12-22T00:00:00.000000 |
| certa-2005-avi-499 | Vulnérabilité dans la bibliothèque libavcodec | 2005-12-22T00:00:00.000000 | 2006-03-17T00:00:00.000000 |
| certa-2005-avi-500 | Vulnérabilité dans VMware | 2005-12-22T00:00:00.000000 | 2006-01-16T00:00:00.000000 |
| certa-2005-avi-501 | Vulnérabilité dans McAfee Security Center | 2005-12-22T00:00:00.000000 | 2005-12-22T00:00:00.000000 |
| certa-2005-avi-502 | Vulnérabilité dans le client Progam Neighborhood de Citrix | 2005-12-22T00:00:00.000000 | 2005-12-22T00:00:00.000000 |
| certa-2005-avi-503 | Multiples vulnérabilités des systèmes AIX d'IBM | 2005-12-22T00:00:00.000000 | 2005-12-22T00:00:00.000000 |
| certa-2005-avi-504 | Vulnérabilité du paquetage ipsec-tools | 2005-12-22T00:00:00.000000 | 2006-02-08T00:00:00.000000 |
| certa-2005-avi-505 | Multiples vulnérabilités dans HP-UX | 2005-12-23T00:00:00.000000 | 2005-12-23T00:00:00.000000 |
| certa-2005-avi-506 | Multiples vulnérabilités dans Cisco IOS | 2005-12-28T00:00:00.000000 | 2005-12-28T00:00:00.000000 |
| certa-2005-avi-507 | Vulnérabilité sur Bugzilla | 2005-12-28T00:00:00.000000 | 2005-12-28T00:00:00.000000 |
| certa-2005-avi-508 | Vulnérabilité sur Sun Solaris Netlink | 2005-12-28T00:00:00.000000 | 2005-12-28T00:00:00.000000 |