Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0817 |
N/A
|
Buffer overflow in the HTTP protocol parser for M… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:28:41.538Z |
| CVE-2000-0885 |
N/A
|
Buffer overflows in Microsoft Network Monitor (Ne… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:31.515Z |
| CVE-2000-0902 |
N/A
|
getalbum.php in PhotoAlbum before 0.9.9 allows re… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:30.719Z |
| CVE-2000-0903 |
N/A
|
Directory traversal vulnerability in Voyager web … |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:30.748Z |
| CVE-2000-0904 |
N/A
|
Voyager web server 2.01B in the demo disks for QN… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:31.697Z |
| CVE-2000-0905 |
N/A
|
QNX Embedded Resource Manager in Voyager web serv… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:31.610Z |
| CVE-2000-0906 |
N/A
|
Directory traversal vulnerability in Moreover.com… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:31.568Z |
| CVE-2000-0907 |
N/A
|
EServ 2.92 Build 2982 allows remote attackers to … |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:31.614Z |
| CVE-2000-0916 |
N/A
|
FreeBSD 4.1.1 and earlier, and possibly other BSD… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:31.476Z |
| CVE-2000-0918 |
N/A
|
Format string vulnerability in kvt in KDE 1.1.2 m… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:31.679Z |
| CVE-2000-0931 |
N/A
|
Buffer overflow in Pegasus Mail 3.11 allows remot… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:31.488Z |
| CVE-2000-0939 |
N/A
|
Samba Web Administration Tool (SWAT) in Samba 2.0… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:31.769Z |
| CVE-2000-0940 |
N/A
|
Directory traversal vulnerability in Metertek pag… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:31.517Z |
| CVE-2000-0950 |
N/A
|
Format string vulnerability in x-gw in TIS Firewa… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:32.137Z |
| CVE-2000-0954 |
N/A
|
Shambala Server 4.5 stores passwords in plaintext… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:32.008Z |
| CVE-2000-0955 |
N/A
|
Cisco Virtual Central Office 4000 (VCO/4K) uses w… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:31.639Z |
| CVE-2000-0963 |
N/A
|
Buffer overflow in ncurses library allows local u… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:31.675Z |
| CVE-2000-0971 |
N/A
|
Avirt Mail 4.0 and 4.2 allows remote attackers to… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:32.187Z |
| CVE-2000-0985 |
N/A
|
Buffer overflow in All-Mail 1.1 allows remote att… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:32.148Z |
| CVE-2000-0986 |
N/A
|
Buffer overflow in Oracle 8.1.5 applications such… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:32.105Z |
| CVE-2000-0987 |
N/A
|
Buffer overflow in oidldapd in Oracle 8.1.6 allow… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:32.210Z |
| CVE-2000-0988 |
N/A
|
WinU 1.0 through 5.1 has a backdoor password that… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:32.353Z |
| CVE-2000-0997 |
N/A
|
Format string vulnerabilities in eeprom program i… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:32.116Z |
| CVE-2000-0998 |
N/A
|
Format string vulnerability in top program allows… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:32.193Z |
| CVE-2000-0999 |
N/A
|
Format string vulnerabilities in OpenBSD ssh prog… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:32.152Z |
| CVE-2000-1008 |
N/A
|
PalmOS 3.5.2 and earlier uses weak encryption to … |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:32.199Z |
| CVE-2000-1009 |
N/A
|
dump in Red Hat Linux 6.2 trusts the pathname spe… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:32.263Z |
| CVE-2000-1012 |
N/A
|
The catopen function in FreeBSD 5.0 and earlier, … |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:32.194Z |
| CVE-2000-1013 |
N/A
|
The setlocale function in FreeBSD 5.0 and earlier… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:32.192Z |
| CVE-2000-1015 |
N/A
|
The default configuration of Slashcode before ver… |
n/a |
n/a |
2000-11-29T05:00:00 | 2024-08-08T05:37:32.390Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0106 |
N/A
|
The EasyCart shopping cart application allows rem… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:53.989Z |
| CVE-2000-0107 |
N/A
|
Linux apcd program allows local attackers to modi… |
n/a |
n/a |
2000-04-18T04:00:00 | 2024-08-08T05:05:53.579Z |
| CVE-2000-0108 |
N/A
|
The Intellivend shopping cart application allows … |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:54.012Z |
| CVE-2000-0110 |
N/A
|
The WebSiteTool shopping cart application allows … |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:52.721Z |
| CVE-2000-0121 |
N/A
|
The Recycle Bin utility in Windows NT and Windows… |
n/a |
n/a |
2000-03-22T05:00:00 | 2024-08-08T05:05:53.937Z |
| CVE-2000-0123 |
N/A
|
The shopping cart application provided with Filem… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:53.970Z |
| CVE-2000-0131 |
N/A
|
Buffer overflow in War FTPd 1.6x allows users to … |
n/a |
n/a |
2000-04-18T04:00:00 | 2024-08-08T05:05:53.912Z |
| CVE-2000-0133 |
N/A
|
Buffer overflows in Tiny FTPd 0.52 beta3 FTP serv… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:53.982Z |
| CVE-2000-0134 |
N/A
|
The Check It Out shopping cart application allows… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:53.947Z |
| CVE-2000-0135 |
N/A
|
The @Retail shopping cart application allows remo… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:53.948Z |
| CVE-2000-0136 |
N/A
|
The Cart32 shopping cart application allows remot… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:53.971Z |
| CVE-2000-0137 |
N/A
|
The CartIt shopping cart application allows remot… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:54.072Z |
| CVE-2000-0151 |
N/A
|
GNU make follows symlinks when it reads a Makefil… |
n/a |
n/a |
2000-02-16T05:00:00 | 2024-08-08T05:05:54.100Z |
| CVE-2000-0157 |
N/A
|
NetBSD ptrace call on VAX allows local users to g… |
n/a |
n/a |
2000-07-12T04:00:00 | 2024-08-08T05:05:53.944Z |
| CVE-2000-1205 |
N/A
|
Cross site scripting vulnerabilities in Apache 1.… |
n/a |
n/a |
2002-08-31T04:00:00 | 2024-08-08T05:45:37.424Z |
| CVE-2000-0112 |
N/A
|
The default installation of Debian GNU/Linux uses… |
n/a |
n/a |
2000-04-25T04:00:00 | 2024-08-08T05:05:53.969Z |
| CVE-2000-0114 |
N/A
|
Frontpage Server Extensions allows remote attacke… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:53.950Z |
| CVE-2000-0469 |
N/A
|
Selena Sol WebBanner 4.0 allows remote attackers … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:31.162Z |
| CVE-2000-0122 |
N/A
|
Frontpage Server Extensions allows remote attacke… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:54.027Z |
| CVE-2000-0124 |
N/A
|
surfCONTROL SuperScout does not properly asign a … |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:53.907Z |
| CVE-2000-0125 |
N/A
|
wwwthreads does not properly cleanse numeric data… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:54.126Z |
| CVE-2000-0127 |
N/A
|
The Webspeed configuration program does not prope… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:54.007Z |
| CVE-2000-0218 |
N/A
|
Buffer overflow in Linux mount and umount allows … |
n/a |
n/a |
2000-04-10T04:00:00 | 2024-08-08T05:05:54.208Z |
| CVE-2000-0089 |
N/A
|
The rdisk utility in Microsoft Terminal Server Ed… |
n/a |
n/a |
2000-03-22T05:00:00 | 2024-08-08T05:05:53.813Z |
| CVE-2000-0128 |
N/A
|
The Finger Server 0.82 allows remote attackers to… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.973Z |
| CVE-2000-0129 |
N/A
|
Buffer overflow in the SHGetPathFromIDList functi… |
n/a |
n/a |
2000-02-08T05:00:00 | 2024-08-08T05:05:53.966Z |
| CVE-2000-0145 |
N/A
|
The libguile.so library file used by gnucash in D… |
n/a |
n/a |
2000-03-22T05:00:00 | 2024-08-08T05:05:53.983Z |
| CVE-2000-0472 |
N/A
|
Buffer overflow in innd 2.2.2 allows remote attac… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:21:31.177Z |
| CVE-2000-0144 |
N/A
|
Axis 700 Network Scanner does not properly restri… |
n/a |
n/a |
2000-04-18T04:00:00 | 2024-08-08T05:05:54.004Z |
| CVE-2000-0146 |
N/A
|
The Java Server in the Novell GroupWise Web Acces… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.964Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-gjmw-vf9h-g25v |
9.8 (3.1)
|
jackson-databind polymorphic typing issue | 2019-11-13T00:32:38Z | 2023-09-14T14:55:23Z |
| ghsa-cff7-6h4q-q5pj |
7.5 (3.1)
|
JSON-jwt Gem lacked element count during splitting of JWE string | 2019-11-14T15:25:51Z | 2023-08-25T23:33:30Z |
| ghsa-pf8f-w267-mq2h |
5.3 (3.1)
|
The rack-cors rubygem may allow directory traveral | 2019-11-15T20:26:59Z | 2023-01-23T20:22:08Z |
| ghsa-wmx6-vxcf-c3gr |
5.7 (3.1)
|
Validation Bypass in slp-validate | 2019-11-15T23:10:19Z | 2021-01-08T20:11:31Z |
| ghsa-425c-ccf3-3jrr |
5.7 (3.1)
|
Critical severity vulnerability that affects slpjs | 2019-11-15T23:10:35Z | 2021-01-08T19:57:59Z |
| ghsa-5whq-j5qg-wjvp |
6.1 (3.1)
|
Stored Cross-Site Scripting vulnerability in admin component of DotNetNuke | 2019-11-18T17:16:06Z | 2021-08-18T22:33:30Z |
| ghsa-89r3-rcpj-h7w6 |
7.5 (3.1)
|
Path traversal attack on Windows platforms | 2019-11-18T17:19:03Z | 2023-03-06T20:46:38Z |
| ghsa-pgwj-prpq-jpc2 |
9.8 (3.1)
|
Symfony Service IDs Allow Injection | 2019-11-18T17:27:31Z | 2025-05-29T22:51:16Z |
| ghsa-6g88-vr3v-76mf |
9.8 (3.1)
9.3 (4.0)
|
Eval injection in Supybot/Limnoria | 2019-11-20T01:31:31Z | 2024-09-30T16:22:02Z |
| ghsa-h7qw-mxrm-c6h2 |
7.5 (3.1)
|
Unauthenticated crypto and weak IV in Magento\Framework\Encryption | 2019-11-20T01:33:05Z | 2025-02-10T20:07:38Z |
| ghsa-8vh8-vc28-m2hf |
9.8 (3.1)
|
Potential to access user credentials from the log files when debug logging enabled | 2019-11-20T01:33:54Z | 2022-02-11T21:12:59Z |
| ghsa-mr6r-82x4-f4jj |
7.4 (3.1)
|
Timing attacks might allow practical recovery of the long-term private key | 2019-11-20T01:34:50Z | 2021-08-18T22:40:49Z |
| ghsa-9ggp-4jpr-7ppj |
|
Duplicate Advisory: Possible remote code execution via a remote procedure call | 2019-11-20T01:35:53Z | 2024-10-26T22:38:04Z |
| ghsa-vrcf-g539-x6h3 |
9.8 (3.1)
9.3 (4.0)
|
Uncontrolled deserialization of a pickled object in rediswrapper allows attackers to execute arbitr… | 2019-11-20T01:37:13Z | 2024-10-26T18:41:43Z |
| ghsa-hx83-rpqf-m267 |
7.5 (3.1)
|
user/group information can be corrupted across storing in fsimage and reading back from fsimage | 2019-11-20T01:38:00Z | 2021-08-18T22:42:32Z |
| ghsa-xcrg-29h7-h4cj |
8.8 (3.1)
|
XXE in PHPSpreadsheet due to encoding issue | 2019-11-20T01:38:52Z | 2025-03-06T18:08:03Z |
| ghsa-vvwv-h69m-wg6f |
8.8 (3.1)
|
XXE in PHPSpreadsheet due to incomplete fix for previous encoding issue | 2019-11-20T01:39:57Z | 2025-03-06T18:02:26Z |
| ghsa-89mq-4x47-5v83 |
7.5 (3.1)
|
angular Prototype Pollution vulnerability | 2019-11-20T15:29:43Z | 2025-11-20T19:29:58Z |
| ghsa-68wg-qv6r-j4vp |
9.8 (3.1)
|
SQL Injection in usmanhalalit/pixie | 2019-11-20T17:44:54Z | 2021-08-18T22:44:59Z |
| ghsa-q3p4-gw7r-wqjc |
4.8 (3.1)
4.8 (4.0)
|
Apache Airflow vulnerable to XSS and local file disclosure | 2019-11-22T13:45:22Z | 2024-09-11T17:09:15Z |
| ghsa-9xr8-8hmc-389f |
9.1 (3.1)
|
Cross-Site Scripting in vant | 2019-11-22T13:45:33Z | 2021-08-18T22:47:15Z |
| ghsa-m52x-29pq-w3vv |
4.8 (3.1)
|
Pannellum Cross-Site Scripting due to data not being sanitized for URIs or vbscript | 2019-11-22T18:18:03Z | 2022-08-03T13:00:22Z |
| ghsa-89px-ww3j-g2mm |
8.7 (3.1)
6.3 (4.0)
|
2FA bypass in Wagtail through new device path | 2019-11-29T17:05:59Z | 2024-11-19T15:48:33Z |
| ghsa-m3jw-62m7-jjcm |
7.5 (3.1)
|
typed-ast Out-of-bounds Read | 2019-12-02T18:02:02Z | 2024-09-09T21:35:17Z |
| ghsa-7xxv-wpxj-mx5v |
7.5 (3.1)
8.7 (4.0)
|
typed-ast Out-of-bounds Read | 2019-12-02T18:03:09Z | 2024-11-18T22:15:43Z |
| ghsa-5pm8-492c-92p5 |
7.3 (3.1)
|
Prototype Pollution in chartkick | 2019-12-02T18:04:11Z | 2023-01-26T20:23:44Z |
| ghsa-fpff-384j-vxq7 |
6.5 (3.1)
|
Data leakage via SQL Injection in Pimcore | 2019-12-02T18:05:13Z | 2021-08-19T15:10:08Z |
| ghsa-cmch-296j-wfvw |
7.5 (3.1)
|
Arbitrary File Write in iobroker.js-controller | 2019-12-02T18:06:14Z | 2021-08-19T15:11:15Z |
| ghsa-79gr-58r3-pwm3 |
9.8 (3.1)
|
Symfony Unsafe Cache Serialization Could Enable RCE | 2019-12-02T18:07:16Z | 2024-02-01T15:48:28Z |
| ghsa-xhh6-956q-4q69 |
7.5 (3.1)
|
Argument injection in a MimeTypeGuesser in Symfony | 2019-12-02T18:08:19Z | 2021-07-28T16:28:00Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-259 |
|
TensorFlow is an end-to-end open source platform for machine learning. It is possible to … | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:42.844418Z |
| pysec-2021-260 |
|
TensorFlow is an end-to-end open source platform for machine learning. Sending invalid ar… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:42.935785Z |
| pysec-2021-261 |
|
TensorFlow is an end-to-end open source platform for machine learning. When restoring ten… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.020795Z |
| pysec-2021-265 |
|
TensorFlow is an end-to-end open source platform for machine learning. If a user does not… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.365129Z |
| pysec-2021-269 |
|
TensorFlow is an end-to-end open source platform for machine learning. When a user does n… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.708163Z |
| pysec-2021-271 |
|
TensorFlow is an end-to-end open source platform for machine learning. The code for `tf.r… | tensorflow | 2021-08-12T19:15:00Z | 2021-08-27T03:22:43.879548Z |
| pysec-2021-550 |
|
TensorFlow is an end-to-end open source platform for machine learning. It is possible to … | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:02.145086Z |
| pysec-2021-551 |
|
TensorFlow is an end-to-end open source platform for machine learning. Sending invalid ar… | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:02.233432Z |
| pysec-2021-552 |
|
TensorFlow is an end-to-end open source platform for machine learning. When restoring ten… | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:02.331501Z |
| pysec-2021-556 |
|
TensorFlow is an end-to-end open source platform for machine learning. If a user does not… | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:02.665889Z |
| pysec-2021-560 |
|
TensorFlow is an end-to-end open source platform for machine learning. When a user does n… | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:03.005830Z |
| pysec-2021-562 |
|
TensorFlow is an end-to-end open source platform for machine learning. The code for `tf.r… | tensorflow-cpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:03.183506Z |
| pysec-2021-748 |
|
TensorFlow is an end-to-end open source platform for machine learning. It is possible to … | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:35.492639Z |
| pysec-2021-749 |
|
TensorFlow is an end-to-end open source platform for machine learning. Sending invalid ar… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:35.577694Z |
| pysec-2021-750 |
|
TensorFlow is an end-to-end open source platform for machine learning. When restoring ten… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:35.665255Z |
| pysec-2021-754 |
|
TensorFlow is an end-to-end open source platform for machine learning. If a user does not… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:36.031970Z |
| pysec-2021-758 |
|
TensorFlow is an end-to-end open source platform for machine learning. When a user does n… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:36.390179Z |
| pysec-2021-760 |
|
TensorFlow is an end-to-end open source platform for machine learning. The code for `tf.r… | tensorflow-gpu | 2021-08-12T19:15:00Z | 2021-12-09T06:35:36.563048Z |
| pysec-2021-257 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:42.637508Z |
| pysec-2021-263 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.190554Z |
| pysec-2021-266 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.455188Z |
| pysec-2021-267 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.539250Z |
| pysec-2021-268 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.623027Z |
| pysec-2021-272 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:43.967494Z |
| pysec-2021-273 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:44.051773Z |
| pysec-2021-276 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:44.348474Z |
| pysec-2021-277 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:44.439225Z |
| pysec-2021-278 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:44.528249Z |
| pysec-2021-279 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:44.622008Z |
| pysec-2021-280 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T21:15:00Z | 2021-08-27T03:22:44.725554Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-4288 | Malicious code in letmeflyaadd (npm) | 2022-06-20T20:13:08Z | 2022-06-20T20:13:09Z |
| mal-2022-4438 | Malicious code in lyte-dom (npm) | 2022-06-20T20:13:08Z | 2022-06-20T20:13:08Z |
| mal-2022-4777 | Malicious code in mz-server (npm) | 2022-06-20T20:13:08Z | 2022-06-20T20:13:08Z |
| mal-2022-2384 | Malicious code in dds-client-side-logger (npm) | 2022-06-20T20:13:09Z | 2022-06-20T20:13:10Z |
| mal-2022-2750 | Malicious code in ent-unified-logon-template (npm) | 2022-06-20T20:13:09Z | 2022-06-20T20:13:10Z |
| mal-2022-3337 | Malicious code in genesys-frontend-facade (npm) | 2022-06-20T20:13:09Z | 2022-06-20T20:13:09Z |
| mal-2022-3810 | Malicious code in inf-build-module-prefixer (npm) | 2022-06-20T20:13:09Z | 2022-06-20T20:13:09Z |
| mal-2022-1695 | Malicious code in browser-wurfl (npm) | 2022-06-20T20:13:10Z | 2022-06-20T20:13:11Z |
| mal-2022-1822 | Malicious code in cap-brand (npm) | 2022-06-20T20:13:10Z | 2022-06-20T20:13:11Z |
| mal-2022-2222 | Malicious code in cpg-nordic (npm) | 2022-06-20T20:13:10Z | 2022-06-20T20:13:10Z |
| mal-2022-2314 | Malicious code in dabu-pixel-handler (npm) | 2022-06-20T20:13:10Z | 2022-06-20T20:13:10Z |
| mal-2022-1069 | Malicious code in apparel-sizechart-web-lib (npm) | 2022-06-20T20:13:11Z | 2022-06-20T20:13:11Z |
| mal-2022-1657 | Malicious code in botbait (npm) | 2022-06-20T20:13:11Z | 2022-06-20T20:13:11Z |
| mal-2022-2244 | Malicious code in cross.project.dnd (npm) | 2022-06-20T20:13:11Z | 2022-06-20T20:13:12Z |
| mal-2022-5432 | Malicious code in pp-amount-field (npm) | 2022-06-20T20:13:11Z | 2022-06-20T20:13:12Z |
| mal-2022-910 | Malicious code in airbnb-fejax (npm) | 2022-06-20T20:13:11Z | 2022-06-20T20:13:12Z |
| mal-2022-3305 | Malicious code in gd-eslint (npm) | 2022-06-20T20:13:12Z | 2022-06-20T20:13:13Z |
| mal-2022-3317 | Malicious code in gd-seo-central (npm) | 2022-06-20T20:13:12Z | 2022-06-20T20:13:13Z |
| mal-2022-4459 | Malicious code in mailru-toolkit-lego-bundle (npm) | 2022-06-20T20:13:12Z | 2022-06-20T20:13:12Z |
| mal-2022-6748 | Malicious code in ui-component-icon (npm) | 2022-06-20T20:13:12Z | 2022-06-20T20:13:13Z |
| mal-2022-2012 | Malicious code in colors-beta (npm) | 2022-06-20T20:13:13Z | 2022-06-20T20:13:13Z |
| mal-2022-2501 | Malicious code in discord.js-discord-selfbot-v4 (npm) | 2022-06-20T20:13:13Z | 2022-06-20T20:13:14Z |
| mal-2022-3303 | Malicious code in gd-apm (npm) | 2022-06-20T20:13:13Z | 2022-06-20T20:13:13Z |
| mal-2022-4808 | Malicious code in netlify-testing-stuff (npm) | 2022-06-20T20:13:13Z | 2022-06-20T20:13:13Z |
| mal-2022-227 | Malicious code in @eg-maps/commons (npm) | 2022-06-20T20:13:14Z | 2022-06-20T20:13:15Z |
| mal-2022-2933 | Malicious code in ext-iconv-test (npm) | 2022-06-20T20:13:14Z | 2022-06-20T20:13:14Z |
| mal-2022-2934 | Malicious code in ext-iconv-test-3 (npm) | 2022-06-20T20:13:14Z | 2022-06-20T20:13:15Z |
| mal-2022-2935 | Malicious code in ext-iconv-test1 (npm) | 2022-06-20T20:13:14Z | 2022-06-20T20:13:14Z |
| mal-2022-3243 | Malicious code in full-stack-recruitment-test (npm) | 2022-06-20T20:13:15Z | 2022-06-20T20:13:16Z |
| mal-2022-3270 | Malicious code in ganache-core-coverage (npm) | 2022-06-20T20:13:15Z | 2022-06-20T20:13:15Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-1085 | vim: Schwachstelle ermöglicht Codeausführung | 2022-08-21T22:00:00.000+00:00 | 2023-08-20T22:00:00.000+00:00 |
| wid-sec-w-2022-1144 | xpdf: Schwachstelle ermöglicht Codeausführung | 2022-08-22T22:00:00.000+00:00 | 2024-05-06T22:00:00.000+00:00 |
| wid-sec-w-2022-1146 | Broadcom Brocade SANnav: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-08-22T22:00:00.000+00:00 | 2023-08-13T22:00:00.000+00:00 |
| wid-sec-w-2022-1148 | vim: Schwachstelle ermöglicht Denial of Service | 2022-08-22T22:00:00.000+00:00 | 2023-04-03T22:00:00.000+00:00 |
| wid-sec-w-2022-1150 | Python: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-08-22T22:00:00.000+00:00 | 2025-12-17T23:00:00.000+00:00 |
| wid-sec-w-2022-1152 | PowerDNS: Schwachstelle ermöglicht Denial of Service | 2022-08-22T22:00:00.000+00:00 | 2023-04-04T22:00:00.000+00:00 |
| wid-sec-w-2022-1155 | Red Hat OpenShift: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-08-23T22:00:00.000+00:00 | 2025-11-27T23:00:00.000+00:00 |
| wid-sec-w-2022-1156 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-08-23T22:00:00.000+00:00 | 2023-02-14T23:00:00.000+00:00 |
| wid-sec-w-2022-1157 | vim: Schwachstelle ermöglicht Codeausführung | 2022-08-23T22:00:00.000+00:00 | 2023-04-03T22:00:00.000+00:00 |
| wid-sec-w-2022-1158 | QEMU: Schwachstelle ermöglicht Denial of Service | 2022-08-23T22:00:00.000+00:00 | 2024-08-08T22:00:00.000+00:00 |
| wid-sec-w-2022-1159 | VMware Tools: Schwachstelle ermöglicht Privilegieneskalation | 2022-08-23T22:00:00.000+00:00 | 2025-07-31T22:00:00.000+00:00 |
| wid-sec-w-2022-1164 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-08-23T22:00:00.000+00:00 | 2024-07-10T22:00:00.000+00:00 |
| wid-sec-w-2022-1177 | systemd: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-08-24T22:00:00.000+00:00 | 2023-05-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1184 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-08-24T22:00:00.000+00:00 | 2023-01-25T23:00:00.000+00:00 |
| wid-sec-w-2022-1186 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-08-24T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2022-1192 | binutils: Schwachstelle ermöglicht Denial of Service | 2022-08-25T22:00:00.000+00:00 | 2023-12-11T23:00:00.000+00:00 |
| wid-sec-w-2022-1196 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-08-25T22:00:00.000+00:00 | 2025-05-29T22:00:00.000+00:00 |
| wid-sec-w-2022-1201 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-08-28T22:00:00.000+00:00 | 2026-01-19T23:00:00.000+00:00 |
| wid-sec-w-2022-1202 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-08-28T22:00:00.000+00:00 | 2025-04-14T22:00:00.000+00:00 |
| wid-sec-w-2022-1204 | QEMU: Schwachstelle ermöglicht Denial of Service | 2022-08-28T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2022-1207 | Linux Kernel: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2022-08-29T22:00:00.000+00:00 | 2025-07-31T22:00:00.000+00:00 |
| wid-sec-w-2022-1208 | Linux Kernel: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2022-08-29T22:00:00.000+00:00 | 2024-01-25T23:00:00.000+00:00 |
| wid-sec-w-2022-1209 | ImageMagick: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-08-29T22:00:00.000+00:00 | 2024-08-05T22:00:00.000+00:00 |
| wid-sec-w-2022-1214 | poppler: Schwachstelle ermöglicht Codeausführung | 2022-08-29T22:00:00.000+00:00 | 2023-06-08T22:00:00.000+00:00 |
| wid-sec-w-2022-1215 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-08-29T22:00:00.000+00:00 | 2025-04-14T22:00:00.000+00:00 |
| wid-sec-w-2022-1216 | libTIFF: Schwachstelle ermöglicht Denial of Service | 2022-08-29T22:00:00.000+00:00 | 2025-11-09T23:00:00.000+00:00 |
| wid-sec-w-2022-1217 | xpdf: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2022-08-29T22:00:00.000+00:00 | 2024-05-06T22:00:00.000+00:00 |
| wid-sec-w-2022-1218 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-08-29T22:00:00.000+00:00 | 2024-05-13T22:00:00.000+00:00 |
| wid-sec-w-2022-1224 | Google Chrome: Mehrere Schwachstellen | 2022-08-30T22:00:00.000+00:00 | 2023-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1229 | Samba: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-08-30T22:00:00.000+00:00 | 2024-01-25T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2009:1122 | Red Hat Security Advisory: icu security update | 2009-06-25T14:06:00+00:00 | 2025-11-21T17:34:46+00:00 |
| rhsa-2009:1123 | Red Hat Security Advisory: gstreamer-plugins-good security update | 2009-06-25T14:13:00+00:00 | 2025-11-21T17:34:46+00:00 |
| rhsa-2009:1124 | Red Hat Security Advisory: net-snmp security update | 2009-06-25T14:34:00+00:00 | 2025-11-21T17:34:47+00:00 |
| rhsa-2009:1125 | Red Hat Security Advisory: thunderbird security update | 2009-06-25T14:54:00+00:00 | 2025-11-21T17:34:47+00:00 |
| rhsa-2009:1126 | Red Hat Security Advisory: thunderbird security update | 2009-06-25T15:07:00+00:00 | 2025-11-21T17:34:47+00:00 |
| rhsa-2009:1127 | Red Hat Security Advisory: kdelibs security update | 2009-06-25T15:54:00+00:00 | 2025-11-21T17:34:47+00:00 |
| rhsa-2009:1128 | Red Hat Security Advisory: kdelibs security update | 2009-06-25T16:08:00+00:00 | 2025-11-21T17:34:47+00:00 |
| rhsa-2009:1130 | Red Hat Security Advisory: kdegraphics security update | 2009-06-25T16:19:00+00:00 | 2025-11-21T17:34:48+00:00 |
| rhsa-2009:1132 | Red Hat Security Advisory: kernel security and bug fix update | 2009-06-30T08:05:00+00:00 | 2025-11-21T17:34:48+00:00 |
| rhsa-2009:1134 | Red Hat Security Advisory: seamonkey security update | 2009-06-30T14:53:00+00:00 | 2025-11-21T17:34:48+00:00 |
| rhsa-2009:1138 | Red Hat Security Advisory: openswan security update | 2009-07-02T15:02:00+00:00 | 2025-11-21T17:34:49+00:00 |
| rhsa-2009:1139 | Red Hat Security Advisory: pidgin security and bug fix update | 2009-07-02T15:19:00+00:00 | 2025-11-21T17:34:49+00:00 |
| rhsa-2009:1140 | Red Hat Security Advisory: ruby security update | 2009-07-02T16:55:00+00:00 | 2025-11-21T17:34:50+00:00 |
| rhsa-2009:1141 | Red Hat Security Advisory: nagios security update | 2009-07-02T20:02:00+00:00 | 2025-11-21T17:34:50+00:00 |
| rhsa-2009:1145 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP05 update | 2009-07-06T11:41:00+00:00 | 2025-11-21T17:34:51+00:00 |
| rhsa-2009:1146 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP05 update | 2009-07-06T11:41:00+00:00 | 2025-11-21T17:34:51+00:00 |
| rhsa-2009:1143 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP07 update | 2009-07-06T11:42:00+00:00 | 2025-11-21T17:34:50+00:00 |
| rhsa-2009:1144 | Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP07 update | 2009-07-06T11:42:00+00:00 | 2025-11-21T17:34:53+00:00 |
| rhsa-2009:1148 | Red Hat Security Advisory: httpd security update | 2009-07-09T16:10:00+00:00 | 2025-11-21T17:34:51+00:00 |
| rhsa-2009:1155 | Red Hat Security Advisory: httpd security update | 2009-07-14T19:07:00+00:00 | 2025-11-21T17:34:52+00:00 |
| rhsa-2009:1156 | Red Hat Security Advisory: httpd security update | 2009-07-14T19:07:00+00:00 | 2025-11-21T17:34:55+00:00 |
| rhsa-2009:1157 | Red Hat Security Advisory: kernel-rt security and bug fix update | 2009-07-14T19:11:00+00:00 | 2025-11-21T17:34:53+00:00 |
| rhsa-2009:1154 | Red Hat Security Advisory: dhcp security update | 2009-07-14T19:18:00+00:00 | 2025-11-21T17:34:52+00:00 |
| rhsa-2009:1136 | Red Hat Security Advisory: dhcp security update | 2009-07-14T19:32:00+00:00 | 2025-11-21T17:34:54+00:00 |
| rhsa-2009:1159 | Red Hat Security Advisory: libtiff security update | 2009-07-16T19:30:00+00:00 | 2025-11-21T17:34:53+00:00 |
| rhsa-2009:1160 | Red Hat Security Advisory: httpd22 security update | 2009-07-17T13:13:00+00:00 | 2025-11-21T17:34:53+00:00 |
| rhsa-2009:1164 | Red Hat Security Advisory: tomcat security update | 2009-07-21T20:50:00+00:00 | 2025-11-21T17:34:54+00:00 |
| rhsa-2009:1162 | Red Hat Security Advisory: firefox security update | 2009-07-22T00:27:00+00:00 | 2025-11-21T17:34:55+00:00 |
| rhsa-2009:1163 | Red Hat Security Advisory: seamonkey security update | 2009-07-22T00:54:00+00:00 | 2025-11-21T17:34:57+00:00 |
| rhsa-2009:1176 | Red Hat Security Advisory: python security update | 2009-07-27T09:22:00+00:00 | 2026-01-13T22:39:23+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-21-217-04 | Advantech WebAccess SCADA | 2021-08-05T00:00:00.000000Z | 2021-08-05T00:00:00.000000Z |
| icsa-21-287-03 | Mitsubishi Electric MELSEC iQ-R Series | 2021-08-06T06:00:00.000000Z | 2024-04-18T06:00:00.000000Z |
| icsa-21-222-01 | Siemens JT2Go and Teamcenter Visualization products | 2021-08-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-222-02 | Siemens Automation License Manager | 2021-08-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-222-03 | Siemens JT2Go and Teamcenter Visualization (Update A) | 2021-08-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-222-04 | Siemens SINEC NMS | 2021-08-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-222-05 | Siemens Industrial Products Intel CPUs (Update F) | 2021-08-10T00:00:00.000000Z | 2024-02-13T00:00:00.000000Z |
| icsa-21-222-06 | Siemens Energy AGT and SGT Solutions | 2021-08-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-222-07 | Siemens SIMATIC CP (Update A) | 2021-08-10T00:00:00.000000Z | 2022-06-14T00:00:00.000000Z |
| icsa-21-222-08 | ICSA-21-222-08_Siemens Solid Edge | 2021-08-10T00:00:00.000000Z | 2021-08-10T00:00:00.000000Z |
| icsa-21-222-09 | Siemens SIMATIC S7-1200 (Update A) | 2021-08-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-257-23 | Siemens SIMATIC and TIM | 2021-08-10T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-224-01 | Cognex In-Sight OPC Server | 2021-08-12T00:00:00.000000Z | 2021-08-12T00:00:00.000000Z |
| icsa-21-224-02 | Horner Automation Cscape | 2021-08-12T00:00:00.000000Z | 2021-08-12T00:00:00.000000Z |
| icsa-21-229-01 | ThroughTek Kalay P2P SDK | 2021-08-17T00:00:00.000000Z | 2021-08-17T00:00:00.000000Z |
| icsa-21-229-02 | Advantech WebAccess/NMS | 2021-08-17T00:00:00.000000Z | 2021-08-17T00:00:00.000000Z |
| icsa-21-229-03 | xArrow SCADA | 2021-08-17T00:00:00.000000Z | 2021-08-17T00:00:00.000000Z |
| icsa-21-231-01 | ICSA-21-231-01_AVEVA SuiteLink Server | 2021-08-19T00:00:00.000000Z | 2021-08-19T00:00:00.000000Z |
| icsa-21-231-02 | Baker Hughes Bently Nevada 3500 | 2021-08-19T00:00:00.000000Z | 2022-02-24T00:00:00.000000Z |
| icsa-21-236-01 | Hitachi ABB Power Grids TropOS | 2021-08-24T00:00:00.000000Z | 2021-08-24T00:00:00.000000Z |
| icsa-21-236-02 | Hitachi ABB Power Grids Retail Operations and CSB Products | 2021-08-24T00:00:00.000000Z | 2021-08-24T00:00:00.000000Z |
| icsa-21-236-03 | Delta Electronics TPEditor | 2021-08-24T00:00:00.000000Z | 2021-08-24T00:00:00.000000Z |
| icsa-21-238-01 | Johnson Controls Controlled Electronic Management Systems CEM Systems AC2000 | 2021-08-26T00:00:00.000000Z | 2021-08-26T00:00:00.000000Z |
| icsa-21-238-02 | Annke Network Video Recorder | 2021-08-26T00:00:00.000000Z | 2021-08-26T00:00:00.000000Z |
| icsa-21-238-03 | Delta Electronics DIAEnergie (Update C) | 2021-08-26T00:00:00.000000Z | 2022-03-22T00:00:00.000000Z |
| icsa-21-238-04 | Delta Electronics DOPSoft (Update A) | 2021-08-26T00:00:00.000000Z | 2021-10-28T00:00:00.000000Z |
| icsa-21-243-02 | FANUC Robot Controllers (Update A) | 2021-08-31T00:00:00.000000Z | 2022-02-03T00:00:00.000000Z |
| icsa-21-245-01 | Johnson Controls Sensormatic Electronics Illustra | 2021-09-02T00:00:00.000000Z | 2021-09-02T00:00:00.000000Z |
| icsa-21-245-02 | JTEKT TOYOPUC Products | 2021-09-02T00:00:00.000000Z | 2021-09-02T00:00:00.000000Z |
| icsa-21-245-03 | Advantech WebAccess | 2021-09-02T00:00:00.000000Z | 2021-09-02T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-dnasp-conn-prvesc-q6t6bzw | Cisco DNA Spaces Connector Privilege Escalation Vulnerabilities | 2021-05-19T16:00:00+00:00 | 2021-05-19T16:00:00+00:00 |
| cisco-sa-finesse-opn-rdrct-epdeh7r | Cisco Finesse Open Redirect Vulnerability | 2021-05-19T16:00:00+00:00 | 2021-05-19T16:00:00+00:00 |
| cisco-sa-finesse-strd-xss-bukqfffw | Cisco Finesse Cross-Site Scripting Vulnerabilities | 2021-05-19T16:00:00+00:00 | 2021-05-19T16:00:00+00:00 |
| cisco-sa-pi-epnm-cmd-inj-yu5e6tb3 | Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager Command Injection Vulnerability | 2021-05-19T16:00:00+00:00 | 2021-05-19T16:00:00+00:00 |
| cisco-sa-sb-wap-inject-mp9fsdg | Cisco Small Business 100, 300, and 500 Series Wireless Access Points Command Injection Vulnerabilities | 2021-05-19T16:00:00+00:00 | 2021-08-03T15:59:45+00:00 |
| cisco-sa-lasso-saml-jun2021-doxnrlkd | Lasso SAML Implementation Vulnerability Affecting Cisco Products: June 2021 | 2021-06-01T12:30:00+00:00 | 2021-09-30T14:51:31+00:00 |
| cisco-sa-asr5k-autho-bypass-mjdf5s7n | Cisco ASR 5000 Series Software Authorization Bypass Vulnerabilities | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-cspc-civ-kdubfnfu | Cisco Common Services Platform Collector Command Injection Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-ipcamera-lldpcdp-mem-ytqdmjro | Cisco Video Surveillance 7000 Series IP Cameras Cisco Discovery Protocol and Link Layer Discovery Protocol Memory Leak Vulnerabilities | 2021-06-02T16:00:00+00:00 | 2021-07-07T15:55:28+00:00 |
| cisco-sa-sd-wan-fuercwwf | Cisco SD-WAN Software Privilege Escalation Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-te-recorder-infodis-mx3ettbm | Cisco ThousandEyes Recorder Information Disclosure Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-8fpbnkoz | Cisco Webex Meetings Client Software Logging Information Disclosure Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-dll-inject-xnmcsgtu | Cisco Webex Meetings, Webex Network Recording Player, and Webex Teams DLL Injection Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-multimedia-26dpqvro | Cisco Webex Meetings and Webex Meetings Server Multimedia Sharing Security Bypass Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-player-doj2joj | Cisco Webex Network Recording Player and Webex Player Memory Corruption Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-player-kof8zvt | Cisco Webex Player Memory Corruption Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-player-kxtkfbnr | Cisco Webex Player Memory Corruption Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-player-rcfdevj2 | Cisco Webex Network Recording Player and Webex Player Memory Corruption Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-webex-redirect-xuzfu3ph | Cisco Webex Meetings and Webex Meetings Server File Redirect Vulnerability | 2021-06-02T16:00:00+00:00 | 2021-06-02T16:00:00+00:00 |
| cisco-sa-anyconnect-dos-hmhydfb8 | Cisco AnyConnect Secure Mobility Client for Windows Denial of Service Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-anyconnect-pos-dll-ff8j6dfv | Cisco AnyConnect Secure Mobility Client for Windows with VPN Posture (HostScan) Module DLL Hijacking Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-ciscosb-multivulns-wwyb7s5e | Cisco Small Business 220 Series Smart Switches Vulnerabilities | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-cuic-xss-cshudtrl | Cisco Unified Intelligence Center Reflected Cross-Site Scripting Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-07-21T19:55:20+00:00 |
| cisco-sa-dnac-certvalid-usej2czk | Cisco DNA Center Certificate Validation Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-esa-wsa-cert-vali-n8l97rw | Cisco Email Security Appliance and Cisco Web Security Appliance Certificate Validation Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-jabber-guc5mlwg | Cisco Jabber Desktop and Mobile Client Software Vulnerabilities | 2021-06-16T16:00:00+00:00 | 2021-06-17T20:25:14+00:00 |
| cisco-sa-meetingserver-dos-nzvwmmqt | Cisco Meeting Server API Denial of Service Vulnerability | 2021-06-16T16:00:00+00:00 | 2021-06-16T16:00:00+00:00 |
| cisco-sa-asdm-rce-gqjshxw | Cisco Adaptive Security Device Manager Remote Code Execution Vulnerability | 2021-07-07T16:00:00+00:00 | 2022-08-25T14:41:06+00:00 |
| cisco-sa-bpa-priv-esc-dgubwbh4 | Cisco Business Process Automation Privilege Escalation Vulnerabilities | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| cisco-sa-brcm-mxc-jul2021-26lquzuh | Broadcom MediaxChange Vulnerability Affecting Cisco Products: July 2021 | 2021-07-07T16:00:00+00:00 | 2021-07-07T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-21326 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21327 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21328 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21329 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21330 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21331 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21332 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21333 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21334 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21335 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21336 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21337 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21339 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21340 | Vulnerability in the Oracle Java SE Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u321 8u311 11.0.13 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments typically in clients running sandboxed Java Web Start applications or sandboxed Java applets that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component e.g. through a web service which supplies da | 2022-01-02T00:00:00.000Z | 2022-01-26T00:00:00.000Z |
| msrc_cve-2022-21341 | Vulnerability in the Oracle Java SE Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization). Supported versions that are affected are Oracle Java SE: 7u321 8u311 11.0.13 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments typically in clients running sandboxed Java Web Start applications or sandboxed Java applets that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component e.g. through a web service which supplie | 2022-01-02T00:00:00.000Z | 2022-01-26T00:00:00.000Z |
| msrc_cve-2022-21342 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21344 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21348 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21349 | Vulnerability in the Oracle Java SE Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 7u321 8u311; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments typically in clients running sandboxed Java Web Start applications or sandboxed Java applets that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component e.g. through a web service which supplies data to the APIs. CVSS 3 | 2022-01-02T00:00:00.000Z | 2022-01-26T00:00:00.000Z |
| msrc_cve-2022-21351 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21352 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21355 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21356 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21357 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior 7.5.24 and prior 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Cluster accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 2.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21358 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21360 | Vulnerability in the Oracle Java SE Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321 8u311 11.0.13 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments typically in clients running sandboxed Java Web Start applications or sandboxed Java applets that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component e.g. through a web service which supplies data | 2022-01-02T00:00:00.000Z | 2022-01-26T00:00:00.000Z |
| msrc_cve-2022-21362 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21363 | Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 6.6 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| msrc_cve-2022-21365 | Vulnerability in the Oracle Java SE Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: ImageIO). Supported versions that are affected are Oracle Java SE: 7u321 8u311 11.0.13 17.0.1; Oracle GraalVM Enterprise Edition: 20.3.4 and 21.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments typically in clients running sandboxed Java Web Start applications or sandboxed Java applets that load and run untrusted code (e.g. code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component e.g. through a web service which supplies data | 2022-01-02T00:00:00.000Z | 2022-01-26T00:00:00.000Z |
| msrc_cve-2022-21367 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Compiling). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2022-01-02T00:00:00.000Z | 2022-01-25T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201701-1172 | Guofuan Security Authentication Gateway is a device for user identity authentication, acc… | 2022-05-04T09:47:47.288000Z |
| var-201612-0658 | Huawei Imagine 5 is the smartphone of China Huawei. Huawei Imagine 5 mobile Wi-Fi driver … | 2022-05-04T09:47:48.676000Z |
| var-201610-0708 | D-Link DWR-932B LET is a wireless router. D-Link DWR-932B LET router Telnet service … | 2022-05-04T09:47:49.207000Z |
| var-201609-0688 | Enterprise router ikuai Xiaobai is an enterprise router of China Quanxun Convergence Netw… | 2022-05-04T09:47:49.660000Z |
| var-201605-0674 | The NetgearRouterJNR1010 is a wireless router product. A cross-site request forgery vulne… | 2022-05-04T09:47:53.959000Z |
| var-201601-0682 | ftp The signature access vulnerability allows unauthorized remote access to system management. | 2022-05-04T09:47:55.149000Z |
| var-201503-0498 | DRAM is dynamic random access memory, the most common system memory. DRAM devices have se… | 2022-05-04T09:48:02.291000Z |
| var-201411-0561 | JP1/NETM/DM and Job Management Partner 1/Software Distribution contain a vulnerability th… | 2022-05-04T09:48:04.670000Z |
| var-201402-0570 | OpenVox VoxStack is a family of Asterisk-based analog voice gateways designed for small a… | 2022-05-04T09:48:11.083000Z |
| var-201310-0806 | The JP1/Base contains a vulnerability where arbitrary commands may be executed when it re… | 2022-05-04T09:48:12.896000Z |
| var-201309-0598 | Hitachi JP1/Cm2/Network Node Manager i contains multiple vulnerabilities. Malicious remot… | 2022-05-04T09:48:13.364000Z |
| var-201106-0308 | Siemens SIMATIC S7 series PLC Used in various industrial fields, including energy, water … | 2022-05-04T09:48:30.502000Z |
| var-200211-0077 | GlobalSunTech develops a variety of OEM wireless access point devices such as Linksys, D-… | 2022-05-04T09:49:31.936000Z |
| var-200110-0143 | BUGTRAQ ID: 3475PC-to-Phone is an application that can use the IP phone service to implem… | 2022-05-04T09:49:33.636000Z |
| var-202202-1217 | A CWE-669: Incorrect Resource Transfer Between Spheres vulnerability exists that could ca… | 2022-05-04T09:49:41.593000Z |
| var-202112-2537 | TOTOLINK is a small and medium-sized network solution provider and service provider. … | 2022-05-04T09:49:42.405000Z |
| var-202112-2348 | Certain NETGEAR devices are affected by command injection by an authenticated user. This … | 2022-05-04T09:49:42.490000Z |
| var-202112-1083 | KingView is an industrial automation configuration software produced by Beijing Yakong Te… | 2022-05-04T09:49:43.629000Z |
| var-202110-0174 | A possible buffer overflow vulnerability in libSPenBase library of Samsung Notes prior to… | 2022-05-04T09:49:46.673000Z |
| var-202108-2568 | RG-NBR700W is an Internet behavior management router, which is specially designed for all… | 2022-05-04T09:49:47.876000Z |
| var-202108-2547 | RG-MA1210 is a wireless router. Ruijie Networks RG-MA1210 has a weak password vulnera… | 2022-05-04T09:49:47.886000Z |
| var-202108-2526 | IVMS-8201E-NCG is a carrier-grade networking gateway device that integrates signaling gat… | 2022-05-04T09:49:47.897000Z |
| var-202108-2505 | Dell Color MFP S2825cdn is a printer device. Dell Color MFP S2825cdn has an unauthori… | 2022-05-04T09:49:47.910000Z |
| var-202108-2484 | Axis is an IT company that specializes in providing network video solutions. AXIS P55… | 2022-05-04T09:49:47.921000Z |
| var-202108-2463 | C1860 Series is a laser printer of Samsung (China) Investment Co., Ltd. Samsung (Chin… | 2022-05-04T09:49:47.932000Z |
| var-202108-2442 | Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of… | 2022-05-04T09:49:47.943000Z |
| var-202108-2421 | Beijing Landwell Electronic Technology Co., Ltd. (abbreviated as Landwell), established a… | 2022-05-04T09:49:47.953000Z |
| var-202108-2400 | Hewlett-Packard (Hewlett-Packard, referred to as HP) is one of the information technology… | 2022-05-04T09:49:47.964000Z |
| var-202108-2379 | Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. Twent… | 2022-05-04T09:49:47.973000Z |
| var-202108-2358 | Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of… | 2022-05-04T09:49:47.985000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2017-000105 | RW-4040 tool to verify execution environment may insecurely load Dynamic Link Libraries | 2017-06-01T16:40+09:00 | 2018-01-24T14:05+09:00 |
| jvndb-2017-000106 | RW-5100 driver installer may insecurely load Dynamic Link Libraries | 2017-06-01T16:44+09:00 | 2018-01-24T14:15+09:00 |
| jvndb-2017-000107 | RW-5100 tool to verify execution environment may insecurely load Dynamic Link Libraries | 2017-06-01T16:47+09:00 | 2018-01-24T14:03+09:00 |
| jvndb-2017-000109 | Installer of SaAT Netizen may insecurely load Dynamic Link Libraries | 2017-06-02T14:00+09:00 | 2018-01-17T12:29+09:00 |
| jvndb-2017-000110 | Installer of SaAT Personal may insecurely load Dynamic Link Libraries | 2017-06-02T14:00+09:00 | 2018-01-17T12:25+09:00 |
| jvndb-2017-000119 | Installer of Houkokusyo Sakusei Shien Tool provided by Ministry of the Environment may insecurely load Dynamic Link Libraries | 2017-06-05T13:47+09:00 | 2018-01-17T13:49+09:00 |
| jvndb-2017-000102 | The installer of the Ministry of Justice [The electronic authentication system based on the commercial registration system "The CRCA user's Software"] may insecurely load Dynamic Link Libraries | 2017-06-06T11:19+09:00 | 2018-01-17T13:58+09:00 |
| jvndb-2017-000111 | Hands-on Vulnerability Learning Tool "AppGoat" vulnerable to remote code execution | 2017-06-06T14:19+09:00 | 2017-11-27T17:22+09:00 |
| jvndb-2017-000114 | Hands-on Vulnerability Learning Tool "AppGoat" vulnerable to remote code execution | 2017-06-06T14:19+09:00 | 2017-11-27T17:22+09:00 |
| jvndb-2017-000112 | Hands-on Vulnerability Learning Tool "AppGoat" vulnerable to information disclosure | 2017-06-06T14:20+09:00 | 2017-11-27T17:22+09:00 |
| jvndb-2017-000113 | Hands-on Vulnerability Learning Tool "AppGoat" vulnerable to remote code execution | 2017-06-06T14:21+09:00 | 2017-11-27T17:22+09:00 |
| jvndb-2017-000115 | WordPress plugin "Multi Feed Reader" vulnerable to SQL injection | 2017-06-06T14:54+09:00 | 2018-01-17T13:58+09:00 |
| jvndb-2017-000125 | AppCheck may insecurely invoke an executable file | 2017-06-07T14:54+09:00 | 2018-01-24T12:15+09:00 |
| jvndb-2017-000121 | The installer of PatchJGD provided by Geospatial Information Authority of Japan (GSI) may insecurely load Dynamic Link Libraries | 2017-06-08T15:31+09:00 | 2018-01-24T12:15+09:00 |
| jvndb-2017-000122 | The installer of PatchJGD(Hyoko) provided by Geospatial Information Authority of Japan (GSI) may insecurely load Dynamic Link Libraries | 2017-06-08T15:31+09:00 | 2018-01-24T12:15+09:00 |
| jvndb-2017-000123 | The installer of TKY2JGD provided by Geospatial Information Authority of Japan (GSI) may insecurely load Dynamic Link Libraries | 2017-06-08T15:31+09:00 | 2018-01-24T12:15+09:00 |
| jvndb-2017-000124 | The installer of SemiDynaEXE provided by Geospatial Information Authority of Japan (GSI) may insecurely load Dynamic Link Libraries | 2017-06-08T15:31+09:00 | 2018-01-24T12:15+09:00 |
| jvndb-2017-000117 | Installer of CASL II simulator(self-extract format) may insecurely load Dynamic Link Libraries | 2017-06-09T13:49+09:00 | 2018-02-14T11:58+09:00 |
| jvndb-2017-000126 | Installer of Denshinouhin Check System (for Ministry of Agriculture, Forestry and Fisheries Nouson Seibi Jigyou) may insecurely load Dynamic Link Libraries | 2017-06-09T15:48+09:00 | 2018-02-14T14:00+09:00 |
| jvndb-2017-000129 | Installer of "Setup file of advance preparation" may insecurely load Dinamic Link Libraries | 2017-06-09T15:59+09:00 | 2018-02-14T13:55+09:00 |
| jvndb-2017-000131 | Cybozu KUNAI for Android vulnerable to cross-site scripting | 2017-06-12T13:36+09:00 | 2018-01-24T12:34+09:00 |
| jvndb-2017-000130 | Installer of electronic tendering and bid opening system provided by Acquisition, Technology & Logistics Agency may insecurely invoke an executable file | 2017-06-12T14:49+09:00 | 2018-02-14T13:52+09:00 |
| jvndb-2017-000116 | Installer of QuickTime for Windows may insecurely load Dynamic Link Libraries | 2017-06-13T13:51+09:00 | 2018-02-14T11:58+09:00 |
| jvndb-2017-000127 | Cross-site scripting vulnerability in WordPress plugin "WordPress Download Manager" | 2017-06-13T14:11+09:00 | 2018-01-24T12:24+09:00 |
| jvndb-2017-000128 | Open redirect vulnerability in WordPress plugin "WordPress Download Manager" | 2017-06-13T14:11+09:00 | 2018-01-24T12:21+09:00 |
| jvndb-2017-000132 | WordPress plugin "WP-Members" vulnerable to cross-site scripting | 2017-06-13T14:50+09:00 | 2018-02-07T11:52+09:00 |
| jvndb-2017-000133 | Source code security studying tool iCodeChecker vulnerable to cross-site scripting | 2017-06-13T14:50+09:00 | 2018-02-14T13:48+09:00 |
| jvndb-2017-000139 | WordPress plugin "WP Job Manager" fails to restrict access permissions | 2017-06-15T14:32+09:00 | 2017-06-15T14:32+09:00 |
| jvndb-2017-000140 | WordPress plugin "Event Calendar WD" vulnerable to cross-site scripting | 2017-06-20T13:58+09:00 | 2018-02-14T12:10+09:00 |
| jvndb-2017-000141 | Multiple I-O DATA network camera products vulnerable to cross-site request forgery | 2017-06-20T13:59+09:00 | 2018-02-14T12:10+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2017:1316-1 | Security update for rubygem-passenger | 2017-05-16T13:42:21Z | 2017-05-16T13:42:21Z |
| suse-su-2017:1322-1 | Security update for ghostscript-library | 2017-05-17T06:37:30Z | 2017-05-17T06:37:30Z |
| suse-su-2017:1337-1 | Security update for bash | 2017-05-18T10:24:30Z | 2017-05-18T10:24:30Z |
| suse-su-2017:1328-1 | Security update for rpcbind | 2017-05-18T10:24:40Z | 2017-05-18T10:24:40Z |
| suse-su-2017:1336-1 | Security update for rpcbind | 2017-05-18T10:24:46Z | 2017-05-18T10:24:46Z |
| suse-su-2017:1335-1 | Security update for kdelibs4 | 2017-05-18T10:25:11Z | 2017-05-18T10:25:11Z |
| suse-su-2017:1352-1 | Security update for SUSE Manager Client Tools | 2017-05-18T22:18:32Z | 2017-05-18T22:18:32Z |
| suse-su-2017:1347-1 | Security update for SUSE Manager Client Tools | 2017-05-18T22:19:15Z | 2017-05-18T22:19:15Z |
| suse-su-2017:1346-1 | Security update for SUSE Manager Proxy 3.0 | 2017-05-18T22:20:37Z | 2017-05-18T22:20:37Z |
| suse-su-2017:1349-1 | Security update for SUSE Manager Server 3.0 | 2017-05-18T22:20:39Z | 2017-05-18T22:20:39Z |
| suse-su-2017:1351-1 | Security update for Botan | 2017-05-18T22:25:13Z | 2017-05-18T22:25:13Z |
| suse-su-2017:1357-1 | Security update for git | 2017-05-19T07:22:11Z | 2017-05-19T07:22:11Z |
| suse-su-2017:1360-1 | Security update for the Linux Kernel | 2017-05-19T12:12:38Z | 2017-05-19T12:12:38Z |
| suse-su-2017:1366-1 | Security update for libxml2 | 2017-05-22T08:37:33Z | 2017-05-22T08:37:33Z |
| suse-su-2017:1367-1 | Security update for libsndfile | 2017-05-22T08:38:30Z | 2017-05-22T08:38:30Z |
| suse-su-2017:1368-1 | Security update for libplist | 2017-05-22T08:41:20Z | 2017-05-22T08:41:20Z |
| suse-su-2017:1365-1 | Security update for collectd | 2017-05-22T08:41:29Z | 2017-05-22T08:41:29Z |
| suse-su-2017:1389-1 | Security update for java-1_6_0-ibm | 2017-05-23T13:36:48Z | 2017-05-23T13:36:48Z |
| suse-su-2017:1386-1 | Security update for java-1_8_0-ibm | 2017-05-23T13:37:36Z | 2017-05-23T13:37:36Z |
| suse-su-2017:1387-1 | Security update for java-1_7_1-ibm | 2017-05-23T13:37:48Z | 2017-05-23T13:37:48Z |
| suse-su-2017:1384-1 | Security update for java-1_7_0-ibm | 2017-05-23T13:37:57Z | 2017-05-23T13:37:57Z |
| suse-su-2017:1385-1 | Security update for java-1_7_1-ibm | 2017-05-23T13:38:24Z | 2017-05-23T13:38:24Z |
| suse-su-2017:1382-1 | Security update for tomcat | 2017-05-23T13:38:30Z | 2017-05-23T13:38:30Z |
| suse-su-2017:1379-1 | Security update for libplist | 2017-05-23T13:38:46Z | 2017-05-23T13:38:46Z |
| suse-su-2017:1396-1 | Security update for samba | 2017-05-24T08:22:03Z | 2017-05-24T08:22:03Z |
| suse-su-2017:1393-1 | Security update for samba | 2017-05-24T08:22:53Z | 2017-05-24T08:22:53Z |
| suse-su-2017:1392-1 | Security update for samba | 2017-05-24T08:23:42Z | 2017-05-24T08:23:42Z |
| suse-su-2017:1391-1 | Security update for samba | 2017-05-24T08:24:18Z | 2017-05-24T08:24:18Z |
| suse-su-2017:1400-1 | Security update for java-1_7_0-openjdk | 2017-05-24T14:23:03Z | 2017-05-24T14:23:03Z |
| suse-su-2017:1398-1 | Security update for pam | 2017-05-24T14:23:46Z | 2017-05-24T14:23:46Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2020:1990-1 | Security update for SDL | 2020-11-21T09:23:50Z | 2020-11-21T09:23:50Z |
| opensuse-su-2020:1993-1 | Security update for rmt-server | 2020-11-21T11:23:05Z | 2020-11-21T11:23:05Z |
| opensuse-su-2020:1994-1 | Security update for java-11-openjdk | 2020-11-21T11:23:12Z | 2020-11-21T11:23:12Z |
| opensuse-su-2020:1997-1 | Security update for blueman | 2020-11-22T19:22:57Z | 2020-11-22T19:22:57Z |
| opensuse-su-2020:1998-1 | Security update for moinmoin-wiki | 2020-11-23T07:20:43Z | 2020-11-23T07:20:43Z |
| opensuse-su-2020:2000-1 | Security update for rmt-server | 2020-11-23T09:30:24Z | 2020-11-23T09:30:24Z |
| opensuse-su-2020:2008-1 | Security update for rclone | 2020-11-24T11:29:44Z | 2020-11-24T11:29:44Z |
| opensuse-su-2020:2010-1 | Security update for chromium | 2020-11-24T23:27:03Z | 2020-11-24T23:27:03Z |
| opensuse-su-2020:2012-1 | Security update for chromium | 2020-11-25T11:28:26Z | 2020-11-25T11:28:26Z |
| opensuse-su-2020:2013-1 | Security update for chromium | 2020-11-25T11:28:45Z | 2020-11-25T11:28:45Z |
| opensuse-su-2020:2016-1 | Security update for chromium | 2020-11-25T17:26:21Z | 2020-11-25T17:26:21Z |
| opensuse-su-2020:2017-1 | Security update for xen | 2020-11-25T20:08:37Z | 2020-11-25T20:08:37Z |
| opensuse-su-2020:2018-1 | Security update for postgresql12 | 2020-11-25T20:08:45Z | 2020-11-25T20:08:45Z |
| opensuse-su-2020:2019-1 | Security update for postgresql10 | 2020-11-25T20:08:51Z | 2020-11-25T20:08:51Z |
| opensuse-su-2020:2020-1 | Security update for MozillaFirefox | 2020-11-25T20:09:06Z | 2020-11-25T20:09:06Z |
| opensuse-su-2020:2021-1 | Security update for chromium | 2020-11-25T20:09:27Z | 2020-11-25T20:09:27Z |
| opensuse-su-2020:2022-1 | Security update for MozillaThunderbird | 2020-11-25T20:10:38Z | 2020-11-25T20:10:38Z |
| opensuse-su-2020:2024-1 | Security update for blueman | 2020-11-26T05:24:39Z | 2020-11-26T05:24:39Z |
| opensuse-su-2020:2025-1 | Security update for LibVNCServer | 2020-11-26T06:57:37Z | 2020-11-26T06:57:37Z |
| opensuse-su-2020:2026-1 | Security update for chromium | 2020-11-26T09:29:21Z | 2020-11-26T09:29:21Z |
| opensuse-su-2020:2028-1 | Security update for postgresql10 | 2020-11-26T13:48:08Z | 2020-11-26T13:48:08Z |
| opensuse-su-2020:2029-1 | Security update for postgresql12 | 2020-11-26T13:48:15Z | 2020-11-26T13:48:15Z |
| opensuse-su-2020:2030-1 | Security update for xen | 2020-11-26T13:48:25Z | 2020-11-26T13:48:25Z |
| opensuse-su-2020:2031-1 | Security update for MozillaFirefox | 2020-11-26T13:48:42Z | 2020-11-26T13:48:42Z |
| opensuse-su-2020:2032-1 | Security update for chromium | 2020-11-26T13:49:16Z | 2020-11-26T13:49:16Z |
| opensuse-su-2020:2033-1 | Security update for slurm | 2020-11-26T13:49:30Z | 2020-11-26T13:49:30Z |
| opensuse-su-2020:2034-1 | Security update for the Linux Kernel | 2020-11-26T13:50:49Z | 2020-11-26T13:50:49Z |
| opensuse-su-2020:2035-1 | Security update for rclone | 2020-11-26T15:27:43Z | 2020-11-26T15:27:43Z |
| opensuse-su-2020:2037-1 | Security update for krb5 | 2020-11-26T15:27:58Z | 2020-11-26T15:27:58Z |
| opensuse-su-2020:2039-1 | Security update for podman | 2020-11-26T15:28:10Z | 2020-11-26T15:28:10Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-01626 | Microsoft windows Adobe字体驱动内存信息泄露漏洞(CNVD-2015-01626) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01627 | Microsoft windows Adobe字体驱动内存信息泄露漏洞(CNVD-2015-01627) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01628 | Microsoft windows Adobe字体驱动拒绝服务漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01629 | IBM SDK Java Technology信息泄露漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01630 | Microsoft VBScript脚本引擎内存破坏任意代码执行漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01631 | Microsoft SharePoint跨站脚本漏洞(CNVD-2015-01631) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01632 | Microsoft Office内存破坏漏洞(CNVD-2015-01632) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01633 | NVIDIA Display Driver R304提升特权漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01636 | Apple OS X IOAcceleratorFamily单字节内存错误权限提升漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01637 | Apple iOS SMS消息空指针引用漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01638 | Apple iOS安全绕过漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01639 | Apple iOS磁盘挂接逻辑漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01640 | Apple iOS IOSurface类型混淆漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01641 | Apple iOS iCloud Keychain缓冲区溢出漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01642 | Red Hat 389 Directory Server信息泄露漏洞(CNVD-2015-01642) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01643 | Red Hat 389 Directory Server信息泄露漏洞(CNVD-2015-01643) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01644 | Pivotal Software Spring Framework Java SockJS客户端存在未明漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01645 | Red Hat redhat-access-plugin for OpenStack Dashboard任意文件读取漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01646 | Zeuscart信息泄露漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01647 | 多款Apple产品Secure Transport存在未明漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01648 | BACnet OPC Server拒绝服务漏洞 | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01649 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-01649) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01650 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-01650) | 2015-03-12 | 2015-03-13 |
| cnvd-2015-01659 | Microsoft windows DLL加载任意代码执行漏洞 | 2015-03-12 | 2015-03-16 |
| cnvd-2015-01660 | Microsoft Exchange Server错误消息跨站脚本漏洞 | 2015-03-12 | 2015-03-16 |
| cnvd-2015-01661 | Microsoft Exchange Server伪造会议请求欺骗漏洞 | 2015-03-12 | 2015-03-16 |
| cnvd-2015-01662 | Microsoft Exchange Server审核报告跨站脚本漏洞 | 2015-03-12 | 2015-03-16 |
| cnvd-2015-01663 | Microsoft Exchange Server ExchangeDLP跨站脚本漏洞 | 2015-03-12 | 2015-03-16 |
| cnvd-2015-01664 | Microsoft Exchange Server Canary参数跨站脚本漏洞 | 2015-03-12 | 2015-03-16 |
| cnvd-2015-01675 | Microsoft Office内存错误引用漏洞 | 2015-03-12 | 2015-03-16 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2005-avi-509 | Vulnérabilité dans udev | 2005-12-29T00:00:00.000000 | 2005-12-29T00:00:00.000000 |
| certa-2005-avi-510 | Multiples vulnérabilités dans MailEnable | 2005-12-29T00:00:00.000000 | 2005-12-29T00:00:00.000000 |
| certa-2005-avi-511 | Vulnérabilité dans Avaya Modular Messaging POP3 | 2005-12-30T00:00:00.000000 | 2005-12-30T00:00:00.000000 |
| certa-2006-avi-001 | Vulnérabiliés sur SCPonly | 2006-01-02T00:00:00.000000 | 2006-01-02T00:00:00.000000 |
| certa-2006-avi-002 | Vulnérabilité dans phpBB | 2006-01-02T00:00:00.000000 | 2006-01-02T00:00:00.000000 |
| certa-2006-avi-003 | Vulnérabilité dans Fetchmail | 2006-01-04T00:00:00.000000 | 2007-03-26T00:00:00.000000 |
| certa-2006-avi-004 | Vulnérabilité sur CISCO ACS | 2006-01-04T00:00:00.000000 | 2006-01-04T00:00:00.000000 |
| certa-2006-avi-005 | Vulnérabilité de Juniper NetScreen Security Manager 2004 | 2006-01-04T00:00:00.000000 | 2006-01-04T00:00:00.000000 |
| certa-2006-avi-006 | Vulnérabilité dans cpio | 2006-01-04T00:00:00.000000 | 2006-01-12T00:00:00.000000 |
| certa-2006-avi-007 | Vulnérabilité dans les produits Symantec | 2006-01-04T00:00:00.000000 | 2006-01-04T00:00:00.000000 |
| certa-2006-avi-008 | Vulnérabilité du serveur VMware ESX | 2006-01-05T00:00:00.000000 | 2006-01-05T00:00:00.000000 |
| certa-2006-avi-009 | Vulnérabilité sur Perl | 2006-01-05T00:00:00.000000 | 2006-01-05T00:00:00.000000 |
| certa-2006-avi-010 | Vulnérabilité dans le gestion de /dev/fd de OpenBSD | 2006-01-05T00:00:00.000000 | 2006-01-05T00:00:00.000000 |
| certa-2006-avi-011 | Disponibilité du correctif sur la vulnérabilité | 2006-01-06T00:00:00.000000 | 2006-01-09T00:00:00.000000 |
| certa-2006-avi-012 | Vulnérabilité dans ClamAV | 2006-01-10T00:00:00.000000 | 2006-03-08T00:00:00.000000 |
| certa-2006-avi-013 | Vulnérabilité du module mod_ssl dans Apache 2 | 2006-01-10T00:00:00.000000 | 2006-02-27T00:00:00.000000 |
| certa-2006-avi-014 | Multiples vulnérabilités dans postgreSQL | 2006-01-10T00:00:00.000000 | 2006-01-10T00:00:00.000000 |
| certa-2006-avi-015 | Vulnérabilité dans auth_ldap pour Apache | 2006-01-10T00:00:00.000000 | 2006-01-23T00:00:00.000000 |
| certa-2006-avi-016 | Vulnérabilité dans uucp et uustat sous Solaris | 2006-01-10T00:00:00.000000 | 2006-01-10T00:00:00.000000 |
| certa-2006-avi-017 | Vulnérabilité dans Microsoft Windows | 2006-01-11T00:00:00.000000 | 2006-01-11T00:00:00.000000 |
| certa-2006-avi-018 | Vulnérabilité dans Microsoft Outlook et Exchange | 2006-01-11T00:00:00.000000 | 2006-01-11T00:00:00.000000 |
| certa-2006-avi-019 | Vulnérabilités dans QuickTime | 2006-01-11T00:00:00.000000 | 2006-01-11T00:00:00.000000 |
| certa-2006-avi-020 | Vulnérabilité dans mod_auth_pgsql pour Apache | 2006-01-11T00:00:00.000000 | 2006-01-16T00:00:00.000000 |
| certa-2006-avi-021 | Vulnérabilité du système de filtrage ipfw de FreeBSD | 2006-01-12T00:00:00.000000 | 2006-01-12T00:00:00.000000 |
| certa-2006-avi-022 | Vulnérabilité de Symantec Norton Protected Recycle Bin | 2006-01-12T00:00:00.000000 | 2006-01-12T00:00:00.000000 |
| certa-2006-avi-023 | Vulnérabilité dans Cisco CS-MARS | 2006-01-12T00:00:00.000000 | 2006-01-12T00:00:00.000000 |
| certa-2006-avi-024 | Vulnérabilité de PostgreSQL pour Windows | 2006-01-13T00:00:00.000000 | 2006-01-13T00:00:00.000000 |
| certa-2006-avi-025 | Vulnérabilité dans les produits Aironet Access Points de Cisco | 2006-01-13T00:00:00.000000 | 2006-01-13T00:00:00.000000 |
| certa-2006-avi-026 | Vulnérabilité de Solaris 10 | 2006-01-13T00:00:00.000000 | 2006-01-13T00:00:00.000000 |
| certa-2006-avi-027 | Vulnérabilité dans Solaris | 2006-01-16T00:00:00.000000 | 2006-01-16T00:00:00.000000 |