Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-1153 |
N/A
|
PostMaster 1.0 in BeOS r5 pro and earlier allows … |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.048Z |
| CVE-2000-1154 |
N/A
|
RHConsole in RobinHood 1.1 web server in BeOS r5 … |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.334Z |
| CVE-2000-1155 |
N/A
|
RHDaemon in RobinHood 1.1 web server in BeOS r5 p… |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.335Z |
| CVE-2000-1156 |
N/A
|
StarOffice 5.2 follows symlinks and sets world-re… |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.351Z |
| CVE-2000-1157 |
N/A
|
Buffer overflow in NAI Sniffer Agent allows remot… |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.364Z |
| CVE-2000-1158 |
N/A
|
NAI Sniffer Agent uses base64 encoding for authen… |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.415Z |
| CVE-2000-1159 |
N/A
|
NAI Sniffer Agent allows remote attackers to gain… |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.332Z |
| CVE-2000-1160 |
N/A
|
NAI Sniffer Agent allows remote attackers to caus… |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.334Z |
| CVE-2000-1161 |
N/A
|
The installation of AdCycle banner management sys… |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.331Z |
| CVE-2000-1168 |
N/A
|
IBM HTTP Server 1.3.6 (based on Apache) allows re… |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.352Z |
| CVE-2000-1172 |
N/A
|
Buffer overflow in Gaim 0.10.3 and earlier using … |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.315Z |
| CVE-2000-1173 |
N/A
|
Microsys CyberPatrol uses weak encryption (trivia… |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.526Z |
| CVE-2000-1175 |
N/A
|
Buffer overflow in Koules 1.4 allows local users … |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.352Z |
| CVE-2000-1176 |
N/A
|
Directory traversal vulnerability in YaBB search.… |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.454Z |
| CVE-2000-1177 |
N/A
|
bb-hist.sh, bb-histlog.sh, bb-hostsvc.sh, bb-rep.… |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.365Z |
| CVE-2000-1183 |
N/A
|
Buffer overflow in socks5 server on Linux allows … |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.328Z |
| CVE-2000-1185 |
N/A
|
The telnet proxy in RideWay PN proxy server allow… |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.350Z |
| CVE-2000-1186 |
N/A
|
Buffer overflow in phf CGI program allows remote … |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.524Z |
| CVE-2000-1188 |
N/A
|
Directory traversal vulnerability in Quikstore sh… |
n/a |
n/a |
2000-12-19T05:00:00.000Z | 2024-08-08T05:45:37.326Z |
| CVE-2000-0048 |
N/A
|
get_it program in Corel Linux Update allows local… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:05:53.960Z |
| CVE-2000-0080 |
N/A
|
AIX techlibss allows local users to overwrite fil… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:05:53.910Z |
| CVE-2000-0111 |
N/A
|
The RightFax web client uses predictable session … |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:05:53.833Z |
| CVE-2000-0252 |
N/A
|
The dansie shopping cart application cart.pl allo… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:14:20.463Z |
| CVE-2000-0253 |
N/A
|
The dansie shopping cart application cart.pl allo… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:14:20.804Z |
| CVE-2000-0254 |
N/A
|
The dansie shopping cart application cart.pl allo… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:14:20.457Z |
| CVE-2000-0255 |
N/A
|
The Nbase-Xyplex EdgeBlaster router allows remote… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:14:20.581Z |
| CVE-2000-0276 |
N/A
|
BeOS 4.5 and 5.0 allow local users to cause a den… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:14:20.572Z |
| CVE-2000-0278 |
N/A
|
The SalesLogix Eviewer allows remote attackers to… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:14:21.282Z |
| CVE-2000-0283 |
N/A
|
The default installation of IRIX Performance Copi… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:14:20.941Z |
| CVE-2000-0287 |
N/A
|
The BizDB CGI script bizdb-search.cgi allows remo… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:14:20.618Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0168 |
N/A
|
Microsoft Windows 9x operating systems allow an a… |
n/a |
n/a |
2000-07-12T04:00:00.000Z | 2024-08-08T05:05:54.071Z |
| CVE-2000-0192 |
N/A
|
The default installation of Caldera OpenLinux 2.3… |
n/a |
n/a |
2000-04-25T04:00:00.000Z | 2024-08-08T05:05:54.198Z |
| CVE-2000-0206 |
N/A
|
The installation of Oracle 8.1.5.x on Linux follo… |
n/a |
n/a |
2000-04-25T04:00:00.000Z | 2024-08-08T05:05:54.105Z |
| CVE-2000-0200 |
N/A
|
Buffer overflow in Microsoft Clip Art Gallery all… |
n/a |
n/a |
2000-04-10T04:00:00.000Z | 2024-08-08T05:05:54.091Z |
| CVE-2000-0225 |
N/A
|
The Pocsag POC32 program does not properly preven… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:05:54.083Z |
| CVE-2000-0185 |
N/A
|
RealMedia RealServer reveals the real IP address … |
n/a |
n/a |
2000-04-25T04:00:00.000Z | 2024-08-08T05:05:54.074Z |
| CVE-2000-0202 |
N/A
|
Microsoft SQL Server 7.0 and Microsoft Data Engin… |
n/a |
n/a |
2000-04-10T04:00:00.000Z | 2024-08-08T05:05:54.147Z |
| CVE-2000-0174 |
N/A
|
StarOffice StarScheduler web server allows remote… |
n/a |
n/a |
2000-07-12T04:00:00.000Z | 2024-08-08T05:05:53.978Z |
| CVE-2000-0175 |
N/A
|
Buffer overflow in StarOffice StarScheduler web s… |
n/a |
n/a |
2000-07-12T04:00:00.000Z | 2024-08-08T05:05:53.955Z |
| CVE-2000-0184 |
N/A
|
Linux printtool sets the permissions of printer c… |
n/a |
n/a |
2000-04-25T04:00:00.000Z | 2024-08-08T05:05:54.110Z |
| CVE-2000-0173 |
N/A
|
Vulnerability in the EELS system in SCO UnixWare … |
n/a |
n/a |
2000-03-22T05:00:00.000Z | 2024-08-08T05:05:53.928Z |
| CVE-2000-0183 |
N/A
|
Buffer overflow in ircII 4.4 IRC client allows re… |
n/a |
n/a |
2000-04-18T04:00:00.000Z | 2024-08-08T05:05:54.072Z |
| CVE-2000-0223 |
N/A
|
Buffer overflow in the wmcdplay CD player program… |
n/a |
n/a |
2000-04-25T04:00:00.000Z | 2024-08-08T05:05:54.103Z |
| CVE-2000-0171 |
N/A
|
atsadc in the atsar package for Linux does not pr… |
n/a |
n/a |
2000-06-02T04:00:00.000Z | 2024-08-08T05:05:54.018Z |
| CVE-2000-0181 |
N/A
|
Firewall-1 3.0 and 4.0 leaks packets with private… |
n/a |
n/a |
2000-04-25T04:00:00.000Z | 2024-08-08T05:05:53.978Z |
| CVE-2000-0237 |
N/A
|
Netscape Enterprise Server with Web Publishing en… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:14:20.484Z |
| CVE-2000-0230 |
N/A
|
Buffer overflow in imwheel allows local users to … |
n/a |
n/a |
2000-06-02T04:00:00.000Z | 2024-08-08T05:05:54.115Z |
| CVE-2000-0180 |
N/A
|
Sojourn search engine allows remote attackers to … |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T05:05:53.969Z |
| CVE-2000-0199 |
N/A
|
When a new SQL Server is registered in Enterprise… |
n/a |
n/a |
2000-03-22T05:00:00.000Z | 2024-08-08T05:05:54.118Z |
| CVE-2000-0169 |
N/A
|
Batch files in the Oracle web listener ows-bin di… |
n/a |
n/a |
2000-06-02T04:00:00.000Z | 2024-08-08T05:05:54.156Z |
| CVE-2000-0198 |
N/A
|
Buffer overflow in POP3 and IMAP servers in the M… |
n/a |
n/a |
2000-03-22T05:00:00.000Z | 2024-08-08T05:05:54.146Z |
| CVE-2000-0233 |
N/A
|
SuSE Linux IMAP server allows remote attackers to… |
n/a |
n/a |
2000-06-02T04:00:00.000Z | 2024-08-08T05:14:20.278Z |
| CVE-2000-0239 |
N/A
|
Buffer overflow in the MERCUR WebView WebMail ser… |
n/a |
n/a |
2000-04-12T04:00:00.000Z | 2024-08-08T05:14:20.443Z |
| CVE-2000-0231 |
N/A
|
Linux kreatecd trusts a user-supplied path that i… |
n/a |
n/a |
2000-06-02T04:00:00.000Z | 2024-08-08T05:14:20.518Z |
| CVE-2000-0228 |
N/A
|
Microsoft Windows Media License Manager allows re… |
n/a |
n/a |
2000-06-02T04:00:00.000Z | 2024-08-08T05:05:54.258Z |
| CVE-2000-0236 |
N/A
|
Netscape Enterprise Server with Directory Indexin… |
n/a |
n/a |
2000-07-12T04:00:00.000Z | 2024-08-08T05:14:20.565Z |
| CVE-2000-0238 |
N/A
|
Buffer overflow in the web server for Norton Anti… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:14:20.310Z |
| CVE-2000-0226 |
N/A
|
IIS 4.0 allows attackers to cause a denial of ser… |
n/a |
n/a |
2000-06-02T04:00:00.000Z | 2024-08-08T05:05:54.320Z |
| CVE-2000-0613 |
N/A
|
Cisco Secure PIX Firewall does not properly ident… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:21:31.253Z |
| CVE-2000-0240 |
N/A
|
vqSoft vqServer program allows remote attackers t… |
n/a |
n/a |
2000-10-13T04:00:00.000Z | 2024-08-08T05:14:20.689Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-w978-rmpf-qmwg |
4.4 (3.1)
|
Limited header injection when using dynamic overrides with user input in RubyGems secure_headers | 2020-01-23T02:27:53Z | 2023-05-16T16:11:19Z |
| ghsa-xq52-rv6w-397c |
4.4 (3.1)
|
Directive injection when using dynamic overrides with user input | 2020-01-23T02:28:11Z | 2023-05-16T16:09:56Z |
| ghsa-hxhm-96pp-2m43 |
8.7 (3.1)
|
Remote Code Execution in Angular Expressions | 2020-01-24T15:27:25Z | 2021-01-08T20:33:38Z |
| ghsa-5fq8-3q2f-4m5g |
6.5 (3.1)
4.8 (4.0)
|
Session key exposure through session list in Django User Sessions | 2020-01-24T19:56:59Z | 2024-09-16T21:59:21Z |
| ghsa-6gc6-m364-85ww |
4.4 (3.1)
|
Log injection in SimpleSAMLphp | 2020-01-24T21:26:13Z | 2021-01-08T20:33:05Z |
| ghsa-mj9p-v2r8-wf8w |
4.4 (3.1)
|
Cross-site scripting in SimpleSAMLphp | 2020-01-24T21:26:54Z | 2021-01-08T20:32:54Z |
| ghsa-2r3v-q9x3-7g46 |
3.7 (3.1)
|
Link injection in SimpleSAMLphp | 2020-01-24T21:27:16Z | 2021-08-19T16:31:00Z |
| ghsa-p9cm-r7jg-8q3g |
6.3 (3.1)
|
Incorrect signature verification in SimpleSAMLphp | 2020-01-24T21:27:42Z | 2021-08-19T16:43:43Z |
| ghsa-gp2m-7cfp-h6gf |
9.8 (3.1)
|
Incorrect persistent NameID generation in SimpleSAMLphp | 2020-01-24T21:28:06Z | 2024-02-07T18:42:34Z |
| ghsa-r2wf-q3x4-hrv9 |
6.1 (3.1)
|
Default development error handler in Ratpack is vulnerable to HTML content injection (XSS) | 2020-01-27T19:28:20Z | 2021-08-19T16:44:56Z |
| ghsa-xrr9-rh8p-433v |
5.4 (3.1)
|
Request smuggling is possible when both chunked TE and content length specified | 2020-01-27T19:28:40Z | 2021-01-08T20:32:37Z |
| ghsa-977j-xj7q-2jr9 |
5.0 (3.1)
1.0 (4.0)
|
Segmentation faultin TensorFlow when converting a Python string to `tf.float16` | 2020-01-28T21:32:29Z | 2024-10-30T21:27:16Z |
| ghsa-v384-jqmq-fc74 |
6.1 (3.1)
|
XSS in Dolibarr ERP & CRM | 2020-01-28T22:26:16Z | 2021-08-19T16:47:32Z |
| ghsa-2289-pqfq-6wx7 |
9.8 (3.1)
|
Unrestricted upload of file with dangerous type in Apache Solr | 2020-01-28T22:26:54Z | 2021-08-19T16:48:04Z |
| ghsa-g8q7-xv52-hf9f |
4.4 (3.1)
5.9 (4.0)
|
Feedgen Vulnerable to XML Denial of Service Attacks | 2020-01-28T22:37:50Z | 2024-09-20T17:44:21Z |
| ghsa-8w65-xjc5-9w79 |
5.4 (3.1)
|
Cross-Site Scripting in node-red | 2020-01-30T21:00:21Z | 2023-09-11T18:10:34Z |
| ghsa-vmm6-w4cf-7f3x |
8.7 (3.1)
|
Authentication Bypass For Endpoints With Anonymous Access in Opencast | 2020-01-30T21:21:30Z | 2021-10-20T18:03:07Z |
| ghsa-94qw-r73x-j7hg |
4.8 (3.1)
|
Users with ROLE_COURSE_ADMIN can create new users in Opencast | 2020-01-30T21:21:37Z | 2021-10-20T18:03:31Z |
| ghsa-mh8g-hprg-8363 |
6.8 (3.1)
|
Hard-Coded Key Used For Remember-me Token in Opencast | 2020-01-30T21:21:44Z | 2021-10-20T18:03:56Z |
| ghsa-w29m-fjp4-qhmq |
7.7 (3.1)
|
Unsafe Identifiers in Opencast | 2020-01-30T21:21:50Z | 2021-01-14T17:45:47Z |
| ghsa-h362-m8f2-5x7c |
7.7 (3.1)
|
Password Hashing: Do not use MD5 | 2020-01-30T21:21:58Z | 2021-01-08T20:31:50Z |
| ghsa-6f54-3qr9-pjgj |
7.6 (3.1)
|
Unauthenticated Access Via OAI-PMH | 2020-01-30T21:22:06Z | 2021-01-08T20:32:00Z |
| ghsa-27gm-ghr9-4v95 |
|
Cross-site scripting vulnerability in TinyMCE | 2020-01-30T21:22:15Z | 2023-06-27T16:50:58Z |
| ghsa-8f9f-pc5v-9r5h |
8.7 (3.1)
|
Malicious takeover of previously owned ENS names | 2020-01-30T23:55:04Z | 2022-09-21T19:32:10Z |
| ghsa-7q36-4xx7-xcxf |
4.8 (3.1)
|
Untrusted data can lead to DoS attack due to hash collisions and stack overflow in MessagePack | 2020-01-31T17:59:20Z | 2024-10-16T22:06:55Z |
| ghsa-w2pf-g6r8-pg22 |
6.1 (3.1)
|
auth0-lock vulnerable to XSS via unsanitized placeholder property | 2020-01-31T17:59:51Z | 2023-09-11T18:14:11Z |
| ghsa-763g-fqq7-48wg |
5.3 (3.1)
|
XML external entity (XXE) processing ('external-parameter-entities' feature was not fully disabled)) | 2020-01-31T18:00:07Z | 2021-08-19T16:49:30Z |
| ghsa-8vp7-j5cj-vvm2 |
4.4 (3.1)
|
Ability to expose data in Sylius by using an unintended serialisation group | 2020-01-31T18:00:43Z | 2024-02-07T18:42:55Z |
| ghsa-prg5-hg25-8grq |
4.4 (3.1)
|
Ability to switch channels via GET parameter enabled in production environments | 2020-01-31T18:00:58Z | 2021-01-08T20:32:23Z |
| ghsa-73m2-3pwg-5fgc |
5.7 (3.1)
6.9 (4.0)
|
Catastrophic backtracking in regex allows Denial of Service in Waitress | 2020-02-04T03:07:31Z | 2024-11-19T15:34:34Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-759 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:36.478576Z |
| pysec-2021-763 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:36.820839Z |
| pysec-2021-777 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:38.080205Z |
| pysec-2021-778 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:38.165715Z |
| pysec-2021-782 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:38.525134Z |
| pysec-2021-786 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:38.896417Z |
| pysec-2021-787 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:38.998901Z |
| pysec-2021-791 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:39.345760Z |
| pysec-2021-792 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:39.432731Z |
| pysec-2021-797 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:39.861916Z |
| pysec-2021-799 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:40.029733Z |
| pysec-2021-800 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow-gpu | 2021-08-12T22:15:00Z | 2021-12-09T06:35:40.116575Z |
| pysec-2021-285 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:45.209094Z |
| pysec-2021-287 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:45.390087Z |
| pysec-2021-290 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:45.672870Z |
| pysec-2021-291 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:45.759545Z |
| pysec-2021-292 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:45.845259Z |
| pysec-2021-294 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:46.024313Z |
| pysec-2021-295 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:46.123018Z |
| pysec-2021-296 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:46.211223Z |
| pysec-2021-299 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:46.477427Z |
| pysec-2021-300 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:46.598549Z |
| pysec-2021-301 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:46.691143Z |
| pysec-2021-304 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:46.967506Z |
| pysec-2021-305 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:47.052583Z |
| pysec-2021-306 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:47.149147Z |
| pysec-2021-307 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:47.234797Z |
| pysec-2021-309 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:47.431884Z |
| pysec-2021-313 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:47.774010Z |
| pysec-2021-314 |
|
TensorFlow is an end-to-end open source platform for machine learning. In affected versio… | tensorflow | 2021-08-12T23:15:00Z | 2021-08-27T03:22:47.865620Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-251 | Malicious code in @epic-mw/localization (npm) | 2022-06-20T20:13:30Z | 2022-06-20T20:13:31Z |
| mal-2022-4162 | Malicious code in kibana-buildkite (npm) | 2022-06-20T20:13:30Z | 2022-06-20T20:13:33Z |
| mal-2022-4163 | Malicious code in kibana-buildkite-library (npm) | 2022-06-20T20:13:30Z | 2022-06-20T20:13:30Z |
| mal-2022-4280 | Malicious code in lemaaa (npm) | 2022-06-20T20:13:30Z | 2022-06-20T20:13:31Z |
| mal-2022-4869 | Malicious code in noblox.js-addons (npm) | 2022-06-20T20:13:31Z | 2022-06-20T20:13:31Z |
| mal-2022-700 | Malicious code in @ve-private/test-helpers (npm) | 2022-06-20T20:13:31Z | 2022-06-20T20:13:32Z |
| mal-2022-7320 | Malicious code in yandex-font (npm) | 2022-06-20T20:13:31Z | 2022-06-20T20:13:32Z |
| mal-2022-875 | Malicious code in adv-discord-utility (npm) | 2022-06-20T20:13:31Z | 2022-06-20T20:13:31Z |
| mal-2022-1860 | Malicious code in centrifuge-cli (npm) | 2022-06-20T20:13:32Z | 2022-06-20T20:13:33Z |
| mal-2022-5237 | Malicious code in payment_method (npm) | 2022-06-20T20:13:32Z | 2022-06-20T20:13:32Z |
| mal-2022-7083 | Malicious code in web3-ppos (npm) | 2022-06-20T20:13:32Z | 2022-06-20T20:13:33Z |
| mal-2022-989 | Malicious code in analyticsdx-template-lint (npm) | 2022-06-20T20:13:32Z | 2022-06-20T20:13:32Z |
| mal-2022-2854 | Malicious code in esprima-moz (npm) | 2022-06-20T20:13:33Z | 2022-06-20T20:13:34Z |
| mal-2022-4656 | Malicious code in mock-dependency (npm) | 2022-06-20T20:13:33Z | 2022-06-20T20:13:38Z |
| mal-2022-6023 | Malicious code in serverless-infrastructure (npm) | 2022-06-20T20:13:33Z | 2022-06-20T20:13:33Z |
| mal-2022-6629 | Malicious code in traditional-infrastructure (npm) | 2022-06-20T20:13:33Z | 2022-06-20T20:13:33Z |
| mal-2022-2415 | Malicious code in defillama-adapters (npm) | 2022-06-20T20:13:34Z | 2022-06-20T20:13:35Z |
| mal-2022-3287 | Malicious code in gatsby-source-newrelic-sdk (npm) | 2022-06-20T20:13:34Z | 2022-06-20T20:13:35Z |
| mal-2022-3289 | Malicious code in gatsby-theme-about (npm) | 2022-06-20T20:13:34Z | 2022-06-20T20:13:34Z |
| mal-2022-3291 | Malicious code in gatsby-theme-parent (npm) | 2022-06-20T20:13:34Z | 2022-06-20T20:13:34Z |
| mal-2022-3282 | Malicious code in gatsby-plugin-ghost-manifest (npm) | 2022-06-20T20:13:35Z | 2022-06-20T20:13:35Z |
| mal-2022-3286 | Malicious code in gatsby-source-data-dictionary (npm) | 2022-06-20T20:13:35Z | 2022-06-20T20:13:35Z |
| mal-2022-3288 | Malicious code in gatsby-source-remote-images (npm) | 2022-06-20T20:13:35Z | 2022-06-20T20:13:36Z |
| mal-2022-4051 | Malicious code in jquery-querybuilder (npm) | 2022-06-20T20:13:35Z | 2022-06-20T20:13:36Z |
| mal-2022-2712 | Malicious code in embark-dapp-test-service (npm) | 2022-06-20T20:13:36Z | 2022-06-20T20:13:36Z |
| mal-2022-2713 | Malicious code in embark-inside-monorepo (npm) | 2022-06-20T20:13:36Z | 2022-06-20T20:13:37Z |
| mal-2022-2714 | Malicious code in embark-solo (npm) | 2022-06-20T20:13:36Z | 2022-06-20T20:13:36Z |
| mal-2022-4766 | Malicious code in mynewpkg (npm) | 2022-06-20T20:13:36Z | 2022-06-20T20:13:37Z |
| mal-2022-7021 | Malicious code in wafer-countdown (npm) | 2022-06-20T20:13:37Z | 2022-06-20T20:13:38Z |
| mal-2022-7022 | Malicious code in wafer-darla (npm) | 2022-06-20T20:13:37Z | 2022-06-20T20:13:38Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-1451 | xpdf: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-09-15T22:00:00.000+00:00 | 2024-09-24T22:00:00.000+00:00 |
| wid-sec-w-2022-1454 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-09-18T22:00:00.000+00:00 | 2025-09-29T22:00:00.000+00:00 |
| wid-sec-w-2022-1456 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-09-18T22:00:00.000+00:00 | 2022-12-26T23:00:00.000+00:00 |
| wid-sec-w-2022-1458 | Kubernetes: Mehrere Schwachstellen | 2022-09-18T22:00:00.000+00:00 | 2023-06-15T22:00:00.000+00:00 |
| wid-sec-w-2022-1461 | IBM Spectrum Protect: Mehrere Schwachstellen | 2022-09-18T22:00:00.000+00:00 | 2023-06-20T22:00:00.000+00:00 |
| wid-sec-w-2022-1473 | Apache Kafka: Schwachstelle ermöglicht Denial of Service | 2022-09-19T22:00:00.000+00:00 | 2023-09-07T22:00:00.000+00:00 |
| wid-sec-w-2022-1476 | SUSE Manager: Mehrere Schwachstellen | 2022-09-19T22:00:00.000+00:00 | 2023-03-02T23:00:00.000+00:00 |
| wid-sec-w-2022-1484 | Mozilla Firefox und Mozilla Firefox ESR: Mehrere Schwachstellen | 2022-09-20T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2022-1485 | Hashicorp Vault: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-09-20T22:00:00.000+00:00 | 2023-04-26T22:00:00.000+00:00 |
| wid-sec-w-2022-1486 | Grafana: Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2022-09-20T22:00:00.000+00:00 | 2024-01-23T23:00:00.000+00:00 |
| wid-sec-w-2022-1489 | dbus: Mehrere Schwachstellen | 2022-09-20T22:00:00.000+00:00 | 2024-01-22T23:00:00.000+00:00 |
| wid-sec-w-2022-1490 | Ghostscript: Schwachstelle ermöglicht Denial of Service | 2022-09-20T22:00:00.000+00:00 | 2025-05-01T22:00:00.000+00:00 |
| wid-sec-w-2022-1492 | Internet Systems Consortium BIND: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-09-20T22:00:00.000+00:00 | 2026-01-06T23:00:00.000+00:00 |
| wid-sec-w-2022-1493 | xpdf: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-09-21T22:00:00.000+00:00 | 2024-09-24T22:00:00.000+00:00 |
| wid-sec-w-2022-1495 | Linux Kernel (dvb-core): Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-09-21T22:00:00.000+00:00 | 2024-01-25T23:00:00.000+00:00 |
| wid-sec-w-2022-1496 | Linux Kernel (mremap): Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-09-21T22:00:00.000+00:00 | 2023-06-06T22:00:00.000+00:00 |
| wid-sec-w-2022-1497 | Mozilla Thunderbird: Mehrere Schwachstellen | 2022-09-21T22:00:00.000+00:00 | 2023-02-22T23:00:00.000+00:00 |
| wid-sec-w-2022-1501 | Python: Schwachstelle ermöglicht Codeausführung | 2022-09-21T22:00:00.000+00:00 | 2025-11-06T23:00:00.000+00:00 |
| wid-sec-w-2022-1503 | vim: Schwachstelle ermöglicht Codeausführung | 2022-09-22T22:00:00.000+00:00 | 2023-10-08T22:00:00.000+00:00 |
| wid-sec-w-2022-1504 | expat: Schwachstelle ermöglicht Codeausführung | 2022-09-22T22:00:00.000+00:00 | 2025-12-28T23:00:00.000+00:00 |
| wid-sec-w-2022-1505 | Squid: Mehrere Schwachstellen | 2022-09-22T22:00:00.000+00:00 | 2025-11-18T23:00:00.000+00:00 |
| wid-sec-w-2022-1508 | Linux Kernel: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2022-09-22T22:00:00.000+00:00 | 2023-10-10T22:00:00.000+00:00 |
| wid-sec-w-2022-1532 | vim: Schwachstelle ermöglicht Manipulation von Dateien | 2022-09-25T22:00:00.000+00:00 | 2023-10-08T22:00:00.000+00:00 |
| wid-sec-w-2022-1533 | Node.js: Mehrere Schwachstellen | 2022-09-25T22:00:00.000+00:00 | 2024-05-09T22:00:00.000+00:00 |
| wid-sec-w-2022-1535 | QEMU: Schwachstelle ermöglicht Denial of Service | 2022-09-25T22:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2022-1538 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-09-26T22:00:00.000+00:00 | 2026-02-04T23:00:00.000+00:00 |
| wid-sec-w-2022-1540 | vim: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-09-26T22:00:00.000+00:00 | 2023-10-08T22:00:00.000+00:00 |
| wid-sec-w-2022-1541 | Google Chrome und Microsoft Edge: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-09-27T22:00:00.000+00:00 | 2023-08-09T22:00:00.000+00:00 |
| wid-sec-w-2022-1548 | IBM WebSphere Application Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-09-27T22:00:00.000+00:00 | 2023-06-05T22:00:00.000+00:00 |
| wid-sec-w-2022-1551 | Layer 2 Netzwerksicherheitskontrollen: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2022-09-27T22:00:00.000+00:00 | 2023-10-04T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsma-21-294-01 | B. Braun Infusomat Space Large Volume Pump | 2021-10-21T00:00:00.000000Z | 2021-10-21T00:00:00.000000Z |
| icsa-21-299-01 | Fuji Electric Tellus Lite V-Simulator and V-Server Lite | 2021-10-26T00:00:00.000000Z | 2021-10-26T00:00:00.000000Z |
| icsa-21-301-01 | Sensormatic Electronics victor | 2021-10-28T00:00:00.000000Z | 2021-10-28T00:00:00.000000Z |
| icsa-21-306-01 | Sensormatic Electronics VideoEdge | 2021-11-02T00:00:00.000000Z | 2021-11-02T00:00:00.000000Z |
| icsa-21-308-01 | VISAM VBASE Editor | 2021-11-04T00:00:00.000000Z | 2021-11-04T00:00:00.000000Z |
| icsa-21-308-02 | AzeoTech DAQFactory | 2021-11-04T00:00:00.000000Z | 2021-11-04T00:00:00.000000Z |
| icsma-21-308-01 | Philips Tasy EMR | 2021-11-04T00:00:00.000000Z | 2021-11-04T00:00:00.000000Z |
| icsa-21-336-05 | Hitachi Energy Relion 670/650/SAM600-IO | 2021-11-04T13:30:00.000000Z | 2025-05-27T12:30:00.000000Z |
| icsa-25-065-02 | Hitachi Energy Relion 670/650/SAM600-IO | 2021-11-04T13:30:00.000000Z | 2025-02-25T13:30:00.000000Z |
| icsa-21-313-01 | Schneider Electric NMC cards and Embedded Devices | 2021-11-09T00:00:00.000000Z | 2021-11-09T00:00:00.000000Z |
| icsa-21-313-02 | Schneider Electric GUIcon | 2021-11-09T00:00:00.000000Z | 2021-11-09T00:00:00.000000Z |
| icsa-21-313-03 | Siemens Nucleus RTOS TCP/IP Stack | 2021-11-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-313-04 | mySCADA myDESIGNER | 2021-11-09T00:00:00.000000Z | 2021-11-09T00:00:00.000000Z |
| icsa-21-313-05 | OSIsoft PI Vision | 2021-11-09T00:00:00.000000Z | 2021-11-09T00:00:00.000000Z |
| icsa-21-313-06 | OSIsoft PI Web API | 2021-11-09T00:00:00.000000Z | 2021-11-09T00:00:00.000000Z |
| icsa-21-315-03 | Siemens SIMATIC WinCC (Update E) | 2021-11-09T00:00:00.000000Z | 2023-04-11T00:00:00.000000Z |
| icsa-21-315-04 | Siemens Mendix | 2021-11-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-315-05 | Siemens Mendix Studio Pro | 2021-11-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-315-06 | Siemens SCALANCE W1750D | 2021-11-09T00:00:00.000000Z | 2022-10-11T00:00:00.000000Z |
| icsa-21-315-07 | Siemens Nucleus RTOS-based APOGEE and TALON Products (Update C) | 2021-11-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-315-08 | Siemens NX OBJ Translator | 2021-11-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-315-10 | Siemens SENTRON powermanager | 2021-11-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-315-11 | Siemens SIMATIC RTLS Locating Manager | 2021-11-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-315-12 | Siemens NX JT Translator | 2021-11-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-21-315-13 | Siemens Siveillance Video DLNA Server | 2021-11-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsma-21-313-01 | Philips MRI 1.5T and 3T | 2021-11-09T00:00:00.000000Z | 2021-11-09T00:00:00.000000Z |
| icsa-21-315-01 | WECON PLC Editor | 2021-11-11T00:00:00.000000Z | 2021-11-11T00:00:00.000000Z |
| icsa-21-315-02 | Multiple Data Distribution Service (DDS) Implementations (Update A) | 2021-11-11T00:00:00.000000Z | 2022-02-01T00:00:00.000000Z |
| icsa-21-315-09 | Siemens Climatix POL909 (Update A) | 2021-11-11T00:00:00.000000Z | 2022-03-10T00:00:00.000000Z |
| icsa-21-320-01 | FATEK Automation WinProladder | 2021-11-16T00:00:00.000000Z | 2021-11-16T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cbr8snmp-zgjkz9fc | Cisco IOS XE Software for Cisco cBR-8 Converged Broadband Routers Simple Network Management Protocol Denial of Service Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-cisco-ap-lljsgxv | Cisco Access Points SSH Management Privilege Escalation Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-ewlc-capwap-dos-gmnjdkoy | Cisco IOS XE Software for Catalyst 9000 Family Wireless Controllers CAPWAP Denial of Service Vulnerabilities | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-ewlc-capwap-rce-lygj8kf | Cisco IOS XE Software for Catalyst 9000 Family Wireless Controllers CAPWAP Remote Code Execution Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-ewlc-gre-6u4elzat | Cisco IOS XE Software for Catalyst 9800 Series Wireless Controllers EoGRE Denial of Service Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-ewlc-ipv6-dos-nmyecnzv | Cisco IOS XE Software for Catalyst 9800 Series Wireless Controllers IPv6 Denial of Service Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-28T15:57:04+00:00 |
| cisco-sa-fxo-pattern-bypass-juxgygyv | Cisco IOS and IOS XE Software FXO Interface Destination Pattern Bypass Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-ikev2-ebfrwmpr | Cisco IOS and IOS XE Software IKEv2 AutoReconnect Feature Denial of Service Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-ios-nxos-xr-udld-dos-w5hghgtq | Multiple Cisco Operating Systems Unidirectional Link Detection Denial of Service Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-iosxe-ewc-dos-g6jruhrt | Cisco Embedded Wireless Controller Software for Catalyst Access Points Denial of Service Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-iosxe-h323alg-bypass-4vy2mp2q | Cisco IOS XE Software H.323 Application Level Gateway Bypass Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-iosxesdwan-arbfileov-mvof3zzn | Cisco IOS XE SD-WAN Software Arbitrary File Overwrite Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-iosxesdwan-privesc-vp4fg3jd | Cisco IOS XE SD-WAN Software Privilege Escalation Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-iosxesdwan-rbuffover-ve2ob6tp | Cisco IOS XE SD-WAN Software Buffer Overflow Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-ioxesdwan-clicmdinj-7byx5k3 | Cisco IOS XE SD-WAN Software Command Injection Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-lldp-dos-sbnuhsjt | Cisco IOS and IOS XE Software Link Layer Discovery Protocol Denial of Service Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-quewedge-69bshubw | Cisco IOS XE Software Interface Queue Wedge Denial of Service Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-ratenat-pyvla7wm | Cisco IOS XE Software Rate Limiting Network Address Translation Denial of Service Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-sd-wan-credentials-ydyfskzz | Cisco SD-WAN vManage Software Disaster Recovery Feature Password Exposure Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-sd-wan-fhqh8pkx | Cisco SD-WAN Software Information Disclosure Vulnerability | 2021-09-22T16:00:00+00:00 | 2023-06-16T19:11:51+00:00 |
| cisco-sa-sd-wan-gjr5pgom | Cisco IOS XE SD-WAN Software Arbitrary File Overwrite Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-sd-wan-josurjcc | Cisco SD-WAN vManage Software Cypher Query Language Injection Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-sdwan-maapi-cmdinjec-znuytuc | Cisco SD-WAN Software Command Injection Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-sdwan-maapi-privesc-ksug7qss | Cisco IOS XE SD-WAN Software Command Injection Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-trustsec-dos-7fuxdr2 | Cisco IOS and IOS XE Software TrustSec CLI Parser Denial of Service Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-zbfw-pp9jfzwl | Cisco IOS XE Software Zone-Based Policy Firewall ICMP and UDP Inspection Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-zbfw-tguguyq | Cisco IOS XE Software Protection Against Distributed Denial of Service Attacks Feature Vulnerability | 2021-09-22T16:00:00+00:00 | 2021-09-22T16:00:00+00:00 |
| cisco-sa-amp-redirect-rq2bu7du | Cisco Orbital Open Redirect Vulnerability | 2021-10-06T16:00:00+00:00 | 2021-10-06T16:00:00+00:00 |
| cisco-sa-anyconnect-lib-hija-cafb7x4q | Cisco AnyConnect Secure Mobility Client for Linux and Mac OS with VPN Posture (HostScan) Module Shared Library Hijacking Vulnerability | 2021-10-06T16:00:00+00:00 | 2021-10-06T16:00:00+00:00 |
| cisco-sa-ata19x-multivuln-a4j57f3 | Cisco ATA 190 Series Analog Telephone Adapter Software Vulnerabilities | 2021-10-06T16:00:00+00:00 | 2021-10-22T15:03:27+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-21873 | Tile Data Repository Elevation of Privilege Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21874 | Windows Security Center API Remote Code Execution Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21875 | Windows Storage Elevation of Privilege Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21876 | Win32k Information Disclosure Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21877 | Storage Spaces Controller Information Disclosure Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21878 | Windows Geolocation Service Remote Code Execution Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21879 | Windows Kernel Elevation of Privilege Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21880 | Windows GDI+ Information Disclosure Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-14T08:00:00.000Z |
| msrc_cve-2022-21881 | Windows Kernel Elevation of Privilege Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21882 | Win32k Elevation of Privilege Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-13T08:00:00.000Z |
| msrc_cve-2022-21883 | Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21884 | Local Security Authority Subsystem Service Elevation of Privilege Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21885 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21887 | Win32k Elevation of Privilege Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21888 | Windows Modern Execution Server Remote Code Execution Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21889 | Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21890 | Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21891 | Microsoft Dynamics 365 (on-premises) Spoofing Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21892 | Windows Resilient File System (ReFS) Remote Code Execution Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21893 | Remote Desktop Protocol Remote Code Execution Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-13T08:00:00.000Z |
| msrc_cve-2022-21894 | Secure Boot Security Feature Bypass Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21895 | Windows User Profile Service Elevation of Privilege Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21896 | Windows DWM Core Library Elevation of Privilege Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21897 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21898 | DirectX Graphics Kernel Remote Code Execution Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21899 | Windows Extensible Firmware Interface Security Feature Bypass Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21900 | Windows Hyper-V Security Feature Bypass Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21901 | Windows Hyper-V Elevation of Privilege Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21902 | Windows DWM Core Library Elevation of Privilege Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| msrc_cve-2022-21903 | Windows GDI Elevation of Privilege Vulnerability | 2022-01-11T08:00:00.000Z | 2022-01-11T08:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2020:2189-1 | Security update for python | 2020-12-07T11:05:46Z | 2020-12-07T11:05:46Z |
| opensuse-su-2020:2190-1 | Security update for python3 | 2020-12-07T11:05:54Z | 2020-12-07T11:05:54Z |
| opensuse-su-2020:2192-1 | Security update for xen | 2020-12-07T11:06:08Z | 2020-12-07T11:06:08Z |
| opensuse-su-2020:2193-1 | Security update for the Linux Kernel | 2020-12-07T11:06:42Z | 2020-12-07T11:06:42Z |
| opensuse-su-2020:2194-1 | Security update for minidlna | 2020-12-07T11:23:14Z | 2020-12-07T11:23:14Z |
| opensuse-su-2020:2198-1 | Security update for pngcheck | 2020-12-07T11:23:38Z | 2020-12-07T11:23:38Z |
| opensuse-su-2020:2204-1 | Security update for minidlna | 2020-12-07T23:23:49Z | 2020-12-07T23:23:49Z |
| opensuse-su-2020:2205-1 | Security update for rpmlint | 2020-12-08T09:22:34Z | 2020-12-08T09:22:34Z |
| opensuse-su-2020:2211-1 | Security update for python | 2020-12-08T23:06:50Z | 2020-12-08T23:06:50Z |
| opensuse-su-2020:2213-1 | Security update for chromium | 2020-12-08T23:25:59Z | 2020-12-08T23:25:59Z |
| opensuse-su-2020:2216-1 | Security update for chromium | 2020-12-09T13:12:37Z | 2020-12-09T13:12:37Z |
| opensuse-su-2020:2220-1 | Security update for pngcheck | 2020-12-09T23:26:25Z | 2020-12-09T23:26:25Z |
| opensuse-su-2020:2222-1 | Security update for nsd | 2020-12-10T11:23:12Z | 2020-12-10T11:23:12Z |
| opensuse-su-2020:2223-1 | Security update for openssl-1_1 | 2020-12-10T13:00:09Z | 2020-12-10T13:00:09Z |
| opensuse-su-2020:2090-1 | Security update for mariadb-connector-c | 2020-12-10T13:23:32Z | 2020-12-10T13:23:32Z |
| opensuse-su-2020:2226-1 | Security update for minidlna | 2020-12-10T15:24:51Z | 2020-12-10T15:24:51Z |
| opensuse-su-2020:2227-1 | Security update for pngcheck | 2020-12-10T15:24:56Z | 2020-12-10T15:24:56Z |
| opensuse-su-2020:2229-1 | Security update for chromium | 2020-12-11T09:25:23Z | 2020-12-11T09:25:23Z |
| opensuse-su-2020:2232-1 | Security update for rpmlint | 2020-12-11T19:24:18Z | 2020-12-11T19:24:18Z |
| opensuse-su-2020:2236-1 | Security update for openssl-1_0_0 | 2020-12-12T14:43:28Z | 2020-12-12T14:43:28Z |
| opensuse-su-2020:2237-1 | Security update for python-urllib3 | 2020-12-13T05:24:04Z | 2020-12-13T05:24:04Z |
| opensuse-su-2020:2238-1 | Security update for curl | 2020-12-13T05:24:33Z | 2020-12-13T05:24:33Z |
| opensuse-su-2020:2240-1 | Security update for openssh | 2020-12-13T05:24:47Z | 2020-12-13T05:24:47Z |
| opensuse-su-2020:2245-1 | Security update for openssl-1_1 | 2020-12-14T17:06:59Z | 2020-12-14T17:06:59Z |
| opensuse-su-2020:2249-1 | Security update for curl | 2020-12-14T17:26:21Z | 2020-12-14T17:26:21Z |
| opensuse-su-2020:2254-1 | Security update for mariadb | 2020-12-14T23:52:53Z | 2020-12-14T23:52:53Z |
| opensuse-su-2020:2260-1 | Security update for the Linux Kernel | 2020-12-15T09:29:17Z | 2020-12-15T09:29:17Z |
| opensuse-su-2020:2261-1 | Security update for audacity | 2020-12-15T11:27:36Z | 2020-12-15T11:27:36Z |
| opensuse-su-2020:2264-1 | Security update for gdm | 2020-12-15T11:44:05Z | 2020-12-15T11:44:05Z |
| opensuse-su-2020:2268-1 | Security update for clamav | 2020-12-17T15:24:14Z | 2020-12-17T15:24:14Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2009:1466 | Red Hat Security Advisory: kernel security and bug fix update | 2009-09-29T15:31:00+00:00 | 2025-11-21T17:35:16+00:00 |
| rhsa-2009:1455 | Red Hat Security Advisory: kernel security and bug fix update | 2009-09-29T19:30:00+00:00 | 2025-11-21T17:35:13+00:00 |
| rhsa-2009:1469 | Red Hat Security Advisory: kernel security update | 2009-09-30T14:54:00+00:00 | 2025-11-21T17:35:16+00:00 |
| rhsa-2009:1470 | Red Hat Security Advisory: openssh security update | 2009-09-30T15:08:00+00:00 | 2025-11-21T17:35:16+00:00 |
| rhsa-2009:1471 | Red Hat Security Advisory: elinks security update | 2009-10-01T17:10:00+00:00 | 2025-11-21T17:35:16+00:00 |
| rhsa-2009:1472 | Red Hat Security Advisory: xen security and bug fix update | 2009-10-01T17:55:00+00:00 | 2025-11-21T17:35:17+00:00 |
| rhsa-2009:1484 | Red Hat Security Advisory: postgresql security update | 2009-10-07T15:26:00+00:00 | 2025-11-21T17:35:17+00:00 |
| rhsa-2009:1485 | Red Hat Security Advisory: postgresql security update | 2009-10-07T16:08:00+00:00 | 2025-11-21T17:35:19+00:00 |
| rhsa-2009:1490 | Red Hat Security Advisory: squirrelmail security update | 2009-10-08T20:12:00+00:00 | 2025-11-21T17:35:18+00:00 |
| rhsa-2009:1499 | Red Hat Security Advisory: acroread security update | 2009-10-14T15:36:00+00:00 | 2025-11-21T17:35:18+00:00 |
| rhsa-2009:1505 | Red Hat Security Advisory: java-1.4.2-ibm security update | 2009-10-14T16:08:00+00:00 | 2026-03-13T01:03:33+00:00 |
| rhsa-2009:1506 | Red Hat Security Advisory: tomcat6 security update | 2009-10-14T16:15:00+00:00 | 2025-11-21T17:35:20+00:00 |
| rhsa-2009:1502 | Red Hat Security Advisory: kdegraphics security update | 2009-10-15T08:26:00+00:00 | 2025-11-21T17:35:18+00:00 |
| rhsa-2009:1500 | Red Hat Security Advisory: xpdf security update | 2009-10-15T08:28:00+00:00 | 2025-11-21T17:35:18+00:00 |
| rhsa-2009:1501 | Red Hat Security Advisory: xpdf security update | 2009-10-15T08:34:00+00:00 | 2025-11-21T17:35:18+00:00 |
| rhsa-2009:1503 | Red Hat Security Advisory: gpdf security update | 2009-10-15T08:45:00+00:00 | 2025-11-21T17:35:18+00:00 |
| rhsa-2009:1504 | Red Hat Security Advisory: poppler security and bug fix update | 2009-10-15T08:48:00+00:00 | 2025-11-21T17:35:19+00:00 |
| rhsa-2009:1513 | Red Hat Security Advisory: cups security update | 2009-10-15T08:59:00+00:00 | 2025-11-21T17:35:25+00:00 |
| rhsa-2009:1512 | Red Hat Security Advisory: kdegraphics security update | 2009-10-15T09:05:00+00:00 | 2025-11-21T17:35:20+00:00 |
| rhsa-2009:1522 | Red Hat Security Advisory: kernel security and bug fix update | 2009-10-22T15:06:00+00:00 | 2025-11-21T17:35:20+00:00 |
| rhsa-2009:1528 | Red Hat Security Advisory: samba security and bug fix update | 2009-10-27T16:41:00+00:00 | 2025-11-21T17:35:21+00:00 |
| rhsa-2009:1529 | Red Hat Security Advisory: samba security update | 2009-10-27T17:05:00+00:00 | 2025-11-21T17:35:21+00:00 |
| rhsa-2009:1530 | Red Hat Security Advisory: firefox security update | 2009-10-27T22:43:00+00:00 | 2025-11-21T17:35:21+00:00 |
| rhsa-2009:1531 | Red Hat Security Advisory: seamonkey security update | 2009-10-27T23:35:00+00:00 | 2025-11-21T17:35:22+00:00 |
| rhsa-2009:1535 | Red Hat Security Advisory: pidgin security update | 2009-10-29T14:13:00+00:00 | 2025-11-21T17:35:22+00:00 |
| rhsa-2009:1536 | Red Hat Security Advisory: pidgin security update | 2009-10-29T14:34:00+00:00 | 2025-11-21T17:35:23+00:00 |
| rhsa-2009:1540 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | 2009-11-03T18:21:00+00:00 | 2025-11-21T17:35:23+00:00 |
| rhsa-2009:1541 | Red Hat Security Advisory: kernel security update | 2009-11-03T19:05:00+00:00 | 2025-11-21T17:35:23+00:00 |
| rhsa-2009:1548 | Red Hat Security Advisory: kernel security and bug fix update | 2009-11-03T19:28:00+00:00 | 2025-11-21T17:35:24+00:00 |
| rhsa-2009:1549 | Red Hat Security Advisory: wget security update | 2009-11-03T20:00:00+00:00 | 2025-11-21T17:35:24+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2017:1690-1 | Security update for postgresql94 | 2017-06-26T11:21:37Z | 2017-06-26T11:21:37Z |
| suse-su-2017:1696-1 | Security update for kernel-source | 2017-06-26T13:12:47Z | 2017-06-26T13:12:47Z |
| suse-su-2017:1701-1 | Security update for jakarta-taglibs-standard | 2017-06-26T16:30:06Z | 2017-06-26T16:30:06Z |
| suse-su-2017:1699-1 | Security update for cobbler | 2017-06-26T16:30:28Z | 2017-06-26T16:30:28Z |
| suse-su-2017:1704-1 | Security update for the Linux kernel | 2017-06-27T08:14:13Z | 2017-06-27T08:14:13Z |
| suse-su-2017:1705-1 | Security update for freeradius-server | 2017-06-27T15:19:07Z | 2017-06-27T15:19:07Z |
| suse-su-2017:1706-1 | Security update for the Linux Kernel | 2017-06-27T15:40:13Z | 2017-06-27T15:40:13Z |
| suse-su-2017:1707-1 | Security update for the Linux kernel | 2017-06-28T05:41:20Z | 2017-06-28T05:41:20Z |
| suse-su-2017:1709-1 | Security update for php53 | 2017-06-28T12:43:50Z | 2017-06-28T12:43:50Z |
| suse-su-2017:1714-1 | Security update for apache2 | 2017-06-28T19:14:29Z | 2017-06-28T19:14:29Z |
| suse-su-2017:1712-1 | Security update for vim | 2017-06-28T19:15:12Z | 2017-06-28T19:15:12Z |
| suse-su-2017:1715-1 | Security update for xen | 2017-06-29T09:13:38Z | 2017-06-29T09:13:38Z |
| suse-su-2017:1718-1 | Security update for openvpn-openssl1 | 2017-06-29T11:41:38Z | 2017-06-29T11:41:38Z |
| suse-su-2017:1717-1 | Security update for php7 | 2017-06-29T12:50:03Z | 2017-06-29T12:50:03Z |
| suse-su-2017:1716-1 | Security update for clamav | 2017-06-29T12:51:09Z | 2017-06-29T12:51:09Z |
| suse-su-2017:1735-1 | Security update for the Linux kernel | 2017-06-29T17:14:33Z | 2017-06-29T17:14:33Z |
| suse-su-2017:1738-1 | Security update for bind | 2017-06-29T20:20:16Z | 2017-06-29T20:20:16Z |
| suse-su-2017:1736-1 | Security update for bind | 2017-06-29T20:21:17Z | 2017-06-29T20:21:17Z |
| suse-su-2017:1737-1 | Security update for bind | 2017-06-29T20:22:24Z | 2017-06-29T20:22:24Z |
| suse-su-2017:1745-1 | Security update for unrar | 2017-06-30T13:35:47Z | 2017-06-30T13:35:47Z |
| suse-su-2017:1742-1 | Security update for xen | 2017-06-30T13:36:48Z | 2017-06-30T13:36:48Z |
| suse-su-2017:1744-1 | Security update for python-pycrypto | 2017-06-30T15:26:49Z | 2017-06-30T15:26:49Z |
| suse-su-2017:1763-1 | Security update for clamav | 2017-07-03T15:17:08Z | 2017-07-03T15:17:08Z |
| suse-su-2017:1760-1 | Security update for unrar | 2017-07-03T15:17:39Z | 2017-07-03T15:17:39Z |
| suse-su-2017:1777-1 | Security update for freeradius-server | 2017-07-04T13:54:26Z | 2017-07-04T13:54:26Z |
| suse-su-2017:1770-1 | Security update for xen | 2017-07-04T14:04:01Z | 2017-07-04T14:04:01Z |
| suse-su-2017:1774-1 | Security update for qemu | 2017-07-04T14:11:58Z | 2017-07-04T14:11:58Z |
| suse-su-2017:1775-1 | Security update for vim | 2017-07-04T14:13:09Z | 2017-07-04T14:13:09Z |
| suse-su-2017:1773-1 | Security update for systemd | 2017-07-04T14:14:16Z | 2017-07-04T14:14:16Z |
| suse-su-2017:1771-1 | Security update for sudo | 2017-07-04T14:15:09Z | 2017-07-04T14:15:09Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2024:4256 | Important: less security update | 2024-07-02T00:00:00Z | 2024-07-03T11:41:26Z |
| alsa-2024:4259 | Moderate: xmlrpc-c security and bug fix update | 2024-07-02T00:00:00Z | 2024-07-03T14:16:04Z |
| alsa-2024:4260 | Moderate: python-idna security update | 2024-07-02T00:00:00Z | 2024-07-03T11:38:17Z |
| alsa-2024:4262 | Moderate: linux-firmware security update | 2024-07-02T00:00:00Z | 2024-07-08T18:05:46Z |
| alsa-2024:4264 | Low: openldap security update | 2024-07-02T00:00:00Z | 2024-07-03T11:33:34Z |
| alsa-2024:4265 | Moderate: cups security update | 2024-07-02T00:00:00Z | 2024-07-03T11:29:10Z |
| alsa-2024:4267 | Moderate: fontforge security update | 2024-07-02T00:00:00Z | 2024-07-03T14:14:44Z |
| alsa-2024:4278 | Important: qemu-kvm security update | 2024-07-02T00:00:00Z | 2024-07-03T14:13:47Z |
| alsa-2024:4312 | Important: openssh security update | 2024-07-03T00:00:00Z | 2024-07-04T06:32:48Z |
| alsa-2024:4349 | Moderate: kernel security and bug fix update | 2024-07-08T00:00:00Z | 2024-11-03T22:17:33Z |
| alsa-2024:4351 | Low: virt:rhel and virt-devel:rhel security and bug fix update | 2024-07-08T00:00:00Z | 2024-07-08T11:18:04Z |
| alsa-2024:4352 | Important: kernel-rt security and bug fix update | 2024-07-08T00:00:00Z | 2024-07-08T18:07:21Z |
| alsa-2024:4367 | Important: pki-core security update | 2024-07-08T00:00:00Z | 2024-07-08T19:24:19Z |
| alsa-2024:4371 | Important: buildah security update | 2024-07-08T00:00:00Z | 2024-07-09T12:31:42Z |
| alsa-2024:4376 | Moderate: libreswan security update | 2024-07-08T00:00:00Z | 2024-07-09T12:36:52Z |
| alsa-2024:4378 | Important: podman security update | 2024-07-08T00:00:00Z | 2024-07-09T12:30:05Z |
| alsa-2024:4379 | Important: gvisor-tap-vsock security update | 2024-07-08T00:00:00Z | 2024-07-09T12:27:51Z |
| alsa-2024:4420 | Important: virt:rhel and virt-devel:rhel security update | 2024-07-09T00:00:00Z | 2024-07-10T13:18:35Z |
| alsa-2024:4422 | Moderate: fence-agents security update | 2024-07-09T00:00:00Z | 2024-07-10T13:12:27Z |
| alsa-2024:4438 | Moderate: dotnet6.0 security update | 2024-07-09T00:00:00Z | 2024-07-10T09:06:45Z |
| alsa-2024:4439 | Moderate: dotnet6.0 security update | 2024-07-09T00:00:00Z | 2024-07-10T09:03:22Z |
| alsa-2024:4450 | Important: dotnet8.0 security update | 2024-07-10T00:00:00Z | 2024-07-11T08:47:11Z |
| alsa-2024:4451 | Important: dotnet8.0 security update | 2024-07-10T00:00:00Z | 2024-07-11T08:44:08Z |
| alsa-2024:4457 | Moderate: openssh security update | 2024-07-10T00:00:00Z | 2024-07-17T14:49:58Z |
| alsa-2024:4499 | Moderate: ruby security update | 2024-07-11T00:00:00Z | 2024-07-17T14:48:19Z |
| alsa-2024:4500 | Important: firefox security update | 2024-07-11T00:00:00Z | 2024-07-17T14:45:01Z |
| alsa-2024:4517 | Important: firefox security update | 2024-07-11T00:00:00Z | 2024-07-17T14:39:06Z |
| alsa-2024:4502 | Important: skopeo security update | 2024-07-15T00:00:00Z | 2024-07-17T14:43:23Z |
| alsa-2024:4567 | Important: java-11-openjdk security update | 2024-07-16T00:00:00Z | 2024-07-26T15:17:22Z |
| alsa-2024:4563 | Important: java-1.8.0-openjdk security update | 2024-07-17T00:00:00Z | 2024-07-18T15:14:20Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2021-1218 | Heap-buffer-overflow in value_move | 2021-09-10T00:01:30.327601Z | 2022-04-13T03:04:39.785928Z |
| osv-2021-1221 | Heap-buffer-overflow in parse_via_param | 2021-09-11T00:00:10.922189Z | 2022-04-13T03:04:37.763544Z |
| osv-2021-1222 | Invalid-free in swift_unexpectedError | 2021-09-11T00:00:12.261007Z | 2022-04-13T03:04:35.854242Z |
| osv-2021-1224 | Heap-buffer-overflow in srtp_stream_init_keys | 2021-09-11T00:01:13.004929Z | 2022-04-13T03:04:39.630798Z |
| osv-2021-1227 | Heap-buffer-overflow in blosclz_compress | 2021-09-11T00:01:45.898877Z | 2022-04-13T03:04:35.752295Z |
| osv-2021-1228 | Heap-buffer-overflow in backup_lpf | 2021-09-12T00:00:08.147879Z | 2022-04-13T03:04:39.812193Z |
| osv-2021-1229 | Heap-buffer-overflow in flatbuffers::JsonPrinter::GenFieldOffset | 2021-09-12T00:00:09.534319Z | 2022-04-13T03:04:42.073120Z |
| osv-2021-1230 | UNKNOWN READ in helper_ret_stb_mmu_x86_64 | 2021-09-12T00:00:11.430175Z | 2022-04-13T03:32:30.819169Z |
| osv-2021-1231 | Heap-buffer-overflow in padding | 2021-09-12T00:00:14.393392Z | 2022-04-13T03:04:39.801760Z |
| osv-2021-1235 | Heap-buffer-overflow in ih264d_fill_bs1_16x16mb_pslice | 2021-09-12T00:00:37.949727Z | 2023-02-24T01:45:10.980832Z |
| osv-2021-1236 | UNKNOWN READ in icu_70::UCharsTrie::branchNext | 2021-09-12T00:00:39.088726Z | 2023-02-24T02:18:55.717212Z |
| osv-2021-1237 | Heap-buffer-overflow in ih264d_parse_decode_slice | 2021-09-12T00:00:40.701615Z | 2023-02-24T01:42:22.584425Z |
| osv-2021-1238 | UNKNOWN READ in cdf_read_property_info | 2021-09-12T00:00:57.129964Z | 2022-04-13T03:04:30.837467Z |
| osv-2021-1239 | Heap-buffer-overflow in stbi__load_and_postprocess_8bit | 2021-09-12T00:01:05.421369Z | 2022-04-13T03:04:40.826791Z |
| osv-2021-1241 | Heap-buffer-overflow in wabt::string_view::compare | 2021-09-12T00:01:27.535685Z | 2023-09-16T14:07:19.262111Z |
| osv-2021-1246 | Heap-buffer-overflow in FSE_writeNCount_generic | 2021-09-13T00:00:35.678119Z | 2022-04-13T03:04:31.669800Z |
| osv-2021-1249 | Heap-buffer-overflow in int flatbuffers::ReadScalar<int> | 2021-09-14T00:00:07.321535Z | 2022-04-13T03:04:42.051274Z |
| osv-2021-1250 | Segv on unknown address in ft_free | 2021-09-14T00:00:09.257971Z | 2022-04-13T03:04:37.307853Z |
| osv-2021-1257 | Stack-buffer-overflow in GRIBDataset::Open | 2021-09-14T00:01:43.346984Z | 2022-04-13T03:04:42.155223Z |
| osv-2021-1258 | Bad-cast to SplashPattern from invalid vptr | 2021-09-15T00:00:11.560834Z | 2022-04-13T03:04:37.235796Z |
| osv-2021-1261 | UNKNOWN READ in kh_get_ucl_hash_node | 2021-09-15T00:00:41.384284Z | 2026-02-17T14:15:50.348749Z |
| osv-2021-1262 | Heap-buffer-overflow in H5O__chunk_deserialize | 2021-09-15T00:01:43.515380Z | 2022-04-13T03:04:43.070356Z |
| osv-2021-1266 | UNKNOWN WRITE in void AK::BumpAllocator<true, 2097152ul>::for_each_chunk<AK::UniformBumpAllocator | 2021-09-16T00:00:19.187563Z | 2022-04-13T03:04:32.129544Z |
| osv-2021-1269 | Use-of-uninitialized-value in std::__1::basic_ostream<char, std::__1::char_traits<char> >& std::__1::__put_cha | 2021-09-17T00:00:07.966622Z | 2022-04-13T03:04:32.390354Z |
| osv-2021-1275 | Use-of-uninitialized-value in std::__1::basic_ostream<char, std::__1::char_traits<char> >& std::__1::__put_cha | 2021-09-17T00:00:13.564872Z | 2022-04-13T03:04:32.383997Z |
| osv-2021-1287 | Use-of-uninitialized-value in piex::image_type_recognition::ContainsNikonSignatures | 2021-09-17T00:00:35.215722Z | 2022-04-13T03:04:39.505395Z |
| osv-2021-1300 | UNKNOWN READ in get_body | 2021-09-17T00:01:33.668747Z | 2022-04-13T03:04:37.727198Z |
| osv-2021-1301 | Use-of-uninitialized-value in std::__1::__hash_iterator<std::__1::__hash_node<std::__1::__hash_value_type<std: | 2021-09-17T00:01:36.462295Z | 2022-04-13T03:04:39.662150Z |
| osv-2021-1305 | Use-of-uninitialized-value in std::__1::basic_ostream<char, std::__1::char_traits<char> >& std::__1::__put_cha | 2021-09-17T00:01:40.665077Z | 2022-04-13T03:04:32.377836Z |
| osv-2021-1309 | Heap-buffer-overflow in ext2fs_dinode_copy | 2021-09-18T00:00:18.281968Z | 2022-04-13T03:04:36.448065Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-wordpress-2022-21663 | Authenticated Object Injection in Multisites in WordPress | 2024-03-06T11:10:06.883Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2021-32764 | YouTube Onebox susceptible to XSS | 2024-03-06T11:10:07.487Z | 2025-11-06T13:25:46.476Z |
| bit-gitlab-2023-2001 | 2024-03-06T11:10:08.186Z | 2025-04-03T14:40:37.652Z | |
| bit-vault-2022-25244 | 2024-03-06T11:10:08.366Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-32475 | 2024-03-06T11:10:09.007Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2022-41908 | `CHECK` fail via inputs in `PyFunc` in Tensorflow | 2024-03-06T11:10:11.097Z | 2025-05-20T10:02:07.006Z |
| bit-tomcat-2021-30639 | DoS after non-blocking IO error | 2024-03-06T11:10:12.195Z | 2025-05-20T10:02:07.006Z |
| bit-vault-2022-25243 | 2024-03-06T11:10:13.097Z | 2025-04-03T14:40:37.652Z | |
| bit-discourse-2021-3138 | 2024-03-06T11:10:13.104Z | 2025-11-06T13:25:46.476Z | |
| bit-wordpress-2022-21662 | Stored XSS in WordPress | 2024-03-06T11:10:13.268Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2023-1965 | 2024-03-06T11:10:13.676Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-32474 | 2024-03-06T11:10:14.394Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2022-41907 | Overflow in `ResizeNearestNeighborGrad` in Tensorflow | 2024-03-06T11:10:16.106Z | 2025-05-20T10:02:07.006Z |
| bit-tomcat-2021-25329 | Incomplete fix for CVE-2020-9484 | 2024-03-06T11:10:17.511Z | 2026-03-20T09:47:33.381Z |
| bit-vault-2021-45042 | 2024-03-06T11:10:18.604Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2023-1936 | Exposure of Private Personal Information to an Unauthorized Actor in GitLab | 2024-03-06T11:10:18.777Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2020-24327 | 2024-03-06T11:10:18.981Z | 2025-04-03T14:40:37.652Z | |
| bit-wordpress-2022-21661 | SQL injection in WordPress | 2024-03-06T11:10:19.099Z | 2025-08-20T06:29:59.371Z |
| bit-moodle-2021-32473 | 2024-03-06T11:10:19.288Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2022-41902 | Out of bounds write in grappler in Tensorflow | 2024-03-06T11:10:21.578Z | 2025-05-20T10:02:07.006Z |
| bit-tomcat-2021-25122 | Apache Tomcat h2c request mix-up | 2024-03-06T11:10:22.561Z | 2026-03-20T09:47:33.381Z |
| bit-vault-2021-43998 | 2024-03-06T11:10:23.204Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2023-1836 | 2024-03-06T11:10:24.061Z | 2025-04-03T14:40:37.652Z | |
| bit-moodle-2021-32472 | 2024-03-06T11:10:24.398Z | 2025-04-03T14:40:37.652Z | |
| bit-wordpress-2021-44223 | 2024-03-06T11:10:25.977Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2022-41901 | `CHECK_EQ` fail via input in `SparseMatrixNNZ` in Tensorflow | 2024-03-06T11:10:26.898Z | 2025-05-20T10:02:07.006Z |
| bit-tomcat-2021-24122 | Apache Tomcat information disclosure | 2024-03-06T11:10:27.482Z | 2026-03-20T09:47:33.381Z |
| bit-vault-2021-42135 | 2024-03-06T11:10:28.289Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2023-1825 | Insertion of Sensitive Information Into Sent Data in GitLab | 2024-03-06T11:10:29.409Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2021-32244 | 2024-03-06T11:10:29.416Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2006-avi-088 | Vulnérabilité sur BIND4/BIND8 sur HP Tru64 | 2006-02-21T00:00:00.000000 | 2006-02-21T00:00:00.000000 |
| certa-2006-avi-087 | Vulnérabilité de Xpdf et ses dérivés | 2006-02-22T00:00:00.000000 | 2006-02-22T00:00:00.000000 |
| certa-2006-avi-089 | Vulnérabilité dans Novell CASA | 2006-02-23T00:00:00.000000 | 2006-02-23T00:00:00.000000 |
| certa-2006-avi-090 | Vulnérabilité de phplib | 2006-02-24T00:00:00.000000 | 2006-02-24T00:00:00.000000 |
| certa-2006-avi-091 | Vulnérabilité de Mambo | 2006-02-24T00:00:00.000000 | 2006-02-24T00:00:00.000000 |
| certa-2006-avi-092 | Vulnérabilité de GNU tar | 2006-02-24T00:00:00.000000 | 2006-03-13T00:00:00.000000 |
| certa-2006-avi-093 | Vulnérabilité dans Winamp | 2006-02-27T00:00:00.000000 | 2006-02-27T00:00:00.000000 |
| certa-2006-avi-094 | Vulnérabilité de unzip | 2006-02-28T00:00:00.000000 | 2006-03-21T00:00:00.000000 |
| certa-2006-avi-095 | Multiples vulnérabilités dans Squirrelmail | 2006-02-28T00:00:00.000000 | 2006-03-13T00:00:00.000000 |
| certa-2006-avi-096 | Mises à jour de sécurité Mac OS X | 2006-03-02T00:00:00.000000 | 2006-03-02T00:00:00.000000 |
| certa-2006-avi-097 | Vulnérabilité dans SecureCRT et SecureFX | 2006-03-03T00:00:00.000000 | 2006-03-08T00:00:00.000000 |
| certa-2006-avi-099 | Multiples vulnérabilités dans Joomla! | 2006-03-03T00:00:00.000000 | 2006-03-03T00:00:00.000000 |
| certa-2006-avi-100 | Vulnérabilité dans OpenSSH | 2006-03-03T00:00:00.000000 | 2006-03-03T00:00:00.000000 |
| certa-2006-avi-101 | Vulnérabilité dans HP System Management Homepage | 2006-03-03T00:00:00.000000 | 2006-03-03T00:00:00.000000 |
| certa-2006-avi-102 | Vulnérabilité dans l'installation Ubuntu | 2006-03-13T00:00:00.000000 | 2006-03-13T00:00:00.000000 |
| certa-2006-avi-103 | Vulnérabilité dans GnuPG | 2006-03-13T00:00:00.000000 | 2006-03-16T00:00:00.000000 |
| certa-2006-avi-104 | Vulnérabilité de Kpdf | 2006-03-13T00:00:00.000000 | 2006-04-18T00:00:00.000000 |
| certa-2006-avi-105 | Vulnérabilité de SSH.com SFTP | 2006-03-13T00:00:00.000000 | 2006-03-13T00:00:00.000000 |
| certa-2006-avi-106 | Vulnérabilité de Metamail | 2006-03-13T00:00:00.000000 | 2006-04-04T00:00:00.000000 |
| certa-2006-avi-107 | Vulnérabilité dans WordPress | 2006-03-13T00:00:00.000000 | 2006-03-13T00:00:00.000000 |
| certa-2006-avi-108 | Multiples vulnérabilités dans MacOS | 2006-03-14T00:00:00.000000 | 2006-03-14T00:00:00.000000 |
| certa-2006-avi-109 | Vulnérabilité dans Metamail | 2006-03-14T00:00:00.000000 | 2006-03-20T00:00:00.000000 |
| certa-2006-avi-110 | Vulnérabilité dans Flex | 2006-03-14T00:00:00.000000 | 2006-03-28T00:00:00.000000 |
| certa-2006-avi-111 | Vulnérabilité de nfsd sous FreeBSD | 2006-03-14T00:00:00.000000 | 2006-03-14T00:00:00.000000 |
| certa-2006-avi-112 | Multiples vulnérabilités dans Microsoft Office | 2006-03-15T00:00:00.000000 | 2006-03-15T00:00:00.000000 |
| certa-2006-avi-113 | Vulnérabilité de l'accès aux services dans Microsoft Windows | 2006-03-15T00:00:00.000000 | 2006-03-15T00:00:00.000000 |
| certa-2006-avi-114 | Vulnérabilités dans Flash Player | 2006-03-15T00:00:00.000000 | 2006-03-22T00:00:00.000000 |
| certa-2006-avi-115 | Plusieurs vulnérabilités dans l'outil zoo | 2006-03-16T00:00:00.000000 | 2006-03-16T00:00:00.000000 |
| certa-2006-avi-116 | Vulnérabilité dans cURL | 2006-03-20T00:00:00.000000 | 2006-03-22T00:00:00.000000 |
| certa-2006-avi-117 | Vulnérabilité dans HP-UX | 2006-03-20T00:00:00.000000 | 2006-03-20T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2017-000202 | Multiple vulnerabilities in Cybozu Garoon | 2017-08-21T14:30+09:00 | 2018-02-14T12:25+09:00 |
| jvndb-2017-000197 | Installer of Photo Collection PC Software provided by NTT DOCOMO, INC. may insecurely load Dynamic Link Libraries and invoke executable files | 2017-08-22T12:34+09:00 | 2018-02-28T12:13+09:00 |
| jvndb-2017-000205 | The installer of the Ministry of Justice [The electronic authentication system based on the commercial registration system "The CRCA user's Software"] may insecurely load Dynamic Link Libraries | 2017-08-23T15:24+09:00 | 2018-02-28T14:04+09:00 |
| jvndb-2017-000204 | Multiple vulnerabilities in "Dokodemo eye Smart HD" SCR02HD | 2017-08-23T15:36+09:00 | 2018-02-28T14:28+09:00 |
| jvndb-2017-000206 | Multiple vulnerabilities in WebCalendar | 2017-08-24T14:03+09:00 | 2018-02-28T12:07+09:00 |
| jvndb-2017-000207 | Multiple vulnerabilities in SEO Panel | 2017-08-24T14:03+09:00 | 2018-02-28T12:19+09:00 |
| jvndb-2017-000208 | WordPress plugin "BackupGuard" vulnerable to cross-site scripting | 2017-08-24T14:03+09:00 | 2018-02-28T12:26+09:00 |
| jvndb-2017-000203 | Multiple vulnerabilities in baserCMS | 2017-08-25T14:50+09:00 | 2018-02-28T11:45+09:00 |
| jvndb-2017-000209 | Installer of Optimal Guard may insecurely load Dynamic Link Libraries | 2017-08-25T14:50+09:00 | 2018-02-28T12:23+09:00 |
| jvndb-2017-000210 | Installer of "Security Kinou Mihariban" may insecurely load Dynamic Link Libraries | 2017-08-25T14:50+09:00 | 2018-02-28T14:04+09:00 |
| jvndb-2017-000215 | Installer and self-extracting archive containing the installer of "Security Setup Tool" may insecurely load Dynamic Link Libraries | 2017-08-25T14:50+09:00 | 2018-02-28T14:28+09:00 |
| jvndb-2017-000216 | Installer of "Flets Setsuzoku Tool" may insecurely load Dynamic Link Libraries | 2017-08-25T14:52+09:00 | 2018-02-28T11:39+09:00 |
| jvndb-2017-000212 | Installer of "Flets Azukeru for Windows Auto Backup Tool" may insecurely load Dynamic Link Libraries | 2017-08-25T15:02+09:00 | 2018-02-28T14:07+09:00 |
| jvndb-2017-000214 | Installer of "Flets Install Tool" may insecurely load Dynamic Link Libraries | 2017-08-25T15:02+09:00 | 2018-02-28T14:07+09:00 |
| jvndb-2017-006466 | Denial-of-service (DoS) Vulnerability in HiRDB | 2017-08-28T13:46+09:00 | 2017-09-05T10:46+09:00 |
| jvndb-2017-000211 | Installer of "Remote Support Tool (Enkaku Support Tool)" may insecurely load Dynamic Link Libraries | 2017-08-30T15:10+09:00 | 2017-08-30T15:10+09:00 |
| jvndb-2017-000219 | Multiple Fuji Xerox products may insecurely load Dynamic Link Libraries | 2017-08-31T16:35+09:00 | 2021-04-12T13:30+09:00 |
| jvndb-2017-006769 | Denial-of-service (DoS) Vulnerability in JP1 and Hitachi IT Operations Director | 2017-09-04T12:14+09:00 | 2017-09-05T10:46+09:00 |
| jvndb-2017-000220 | Multiple vulnerabilities in CG-WLR300NM | 2017-09-08T14:14+09:00 | 2018-02-28T12:21+09:00 |
| jvndb-2017-000221 | Installer of FENCE-Explorer may insecurely load Dynamic Link Libraries and invoke executable files | 2017-09-11T14:55+09:00 | 2018-02-28T13:58+09:00 |
| jvndb-2017-000222 | SEIL Series routers vulnerable to denial-of-service (DoS) | 2017-09-11T15:19+09:00 | 2018-02-28T14:12+09:00 |
| jvndb-2017-000217 | Backdoor access issue in Wi-Fi STATION L-02F | 2017-09-12T14:34+09:00 | 2018-02-28T14:11+09:00 |
| jvndb-2017-000218 | Wi-Fi STATION L-02F fails to restrict access permissions | 2017-09-12T14:35+09:00 | 2018-02-28T14:09+09:00 |
| jvndb-2017-007422 | InterScan Web Security Virtual Appliance vulnerable to code injection | 2017-09-21T15:58+09:00 | 2018-03-07T14:32+09:00 |
| jvndb-2017-007582 | jwt-scala fails to verify token signatures | 2017-09-26T15:37+09:00 | 2018-03-07T12:23+09:00 |
| jvndb-2017-000146 | Marp vulnerable to improper access control in JavaScript execution | 2017-09-29T13:54+09:00 | 2018-02-07T11:52+09:00 |
| jvndb-2017-000223 | Install program and Installer of i-filter 6.0 may insecurely load Dynamic Link Libraries and invoke executable files | 2017-09-29T13:54+09:00 | 2017-09-29T13:54+09:00 |
| jvndb-2017-007767 | Self-Decrypting Confidential Files created by JP1/HIBUN may insecurely load Dynamic Link Libraries | 2017-10-03T11:18+09:00 | 2017-10-06T11:36+09:00 |
| jvndb-2017-000225 | Cybozu Office fails to restrict access permissions | 2017-10-11T14:28+09:00 | 2018-03-07T12:21+09:00 |
| jvndb-2017-000226 | HIBUN Confidential File Decryption program may insecurely load Dynamic Link Libraries | 2017-10-11T16:43+09:00 | 2018-03-07T12:12+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-01666 | EMC RSA Certificate Manager和RSA Registration Manager跨站脚本漏洞(CNVD-2015-01666) | 2015-03-13 | 2015-03-16 |
| cnvd-2015-01667 | EMC RSA Certificate Manager和RSA Registration Manager输入验证漏洞 | 2015-03-13 | 2015-03-16 |
| cnvd-2015-01668 | EMC Secure Remote Services Virtual Edition Gateway Provisioning服务SQL注入漏洞 | 2015-03-13 | 2015-03-16 |
| cnvd-2015-01669 | EMC Secure Remote Services Virtual Edition Gateway Provisioning服务操作系统命令注入漏洞 | 2015-03-13 | 2015-03-16 |
| cnvd-2015-01670 | WoltLab Community Gallery跨站脚本漏洞 | 2015-03-13 | 2015-03-16 |
| cnvd-2015-01671 | Betster SQL注入漏洞 | 2015-03-13 | 2015-03-16 |
| cnvd-2015-01672 | Django跨站脚本漏洞(CNVD-2015-01672) | 2015-03-13 | 2015-03-16 |
| cnvd-2015-01673 | Xen存在多个漏洞 | 2015-03-13 | 2015-03-16 |
| cnvd-2015-01674 | Xen拒绝服务漏洞(CNVD-2015-01674) | 2015-03-13 | 2015-03-16 |
| cnvd-2015-01685 | Elipse E3进程控制漏洞 | 2015-03-13 | 2015-03-16 |
| cnvd-2015-01686 | BACnet OPC Server身份验证漏洞 | 2015-03-13 | 2015-03-16 |
| cnvd-2015-01687 | BACnet OPC Server堆缓冲区溢出漏洞 | 2015-03-13 | 2015-03-16 |
| cnvd-2015-01788 | WordPress插件WPML跨站脚本漏洞 | 2015-03-13 | 2015-03-18 |
| cnvd-2015-01789 | Cisco TelePresence Video Communication Server (VCS) /Expressway存在漏洞 | 2015-03-13 | 2015-03-18 |
| cnvd-2015-01790 | Cisco Intrusion Prevention System (IPS) Software竞争条件漏洞 | 2015-03-13 | 2015-03-18 |
| cnvd-2015-01791 | Telerik Analytics Monitor Library搜索路径漏洞 | 2015-03-13 | 2015-03-18 |
| cnvd-2016-06814 | 上海盛代信息科技有限公司票务管理系统Web版存在SQL注入漏洞 | 2015-03-15 | 2015-06-15 |
| cnvd-2015-01792 | Elastix transactionID SQL注入漏洞 | 2015-03-16 | 2015-03-18 |
| cnvd-2016-07146 | 福州开发区创达电子有限公司特种设备安全监察系统存在SQL注入漏洞 | 2015-03-16 | 2015-06-16 |
| cnvd-2016-07147 | 成都飞鱼星科技股份有限公司VOLANS SR上网行为审计网关存在SQL注入漏洞 | 2015-03-16 | 2015-06-16 |
| cnvd-2015-01793 | libarchive目录遍历漏洞 | 2015-03-17 | 2015-03-18 |
| cnvd-2015-01794 | Schneider Electric Pelco DS-NVs缓冲区溢出漏洞 | 2015-03-17 | 2015-03-18 |
| cnvd-2015-01795 | Cisco Virtual TelePresence Server Software任意命令执行漏洞 | 2015-03-17 | 2015-03-18 |
| cnvd-2015-01796 | HP ArcSight Enterprise Security Manager存在未明漏洞 | 2015-03-17 | 2015-03-18 |
| cnvd-2015-01797 | Adobe Flash Player任意代码执行漏洞(CNVD-2015-01797) | 2015-03-17 | 2015-03-18 |
| cnvd-2015-01798 | Adobe Flash Player任意代码执行漏洞(CNVD-2015-01798) | 2015-03-17 | 2015-03-18 |
| cnvd-2015-01799 | Adobe Flash Player任意代码执行漏洞(CNVD-2015-01799) | 2015-03-17 | 2015-03-18 |
| cnvd-2015-01800 | Adobe Flash Player任意代码执行漏洞(CNVD-2015-01800) | 2015-03-17 | 2015-03-18 |
| cnvd-2015-01801 | Adobe Flash Player任意代码执行漏洞(CNVD-2015-01801) | 2015-03-17 | 2015-03-18 |
| cnvd-2015-01802 | Adobe Flash Player任意代码执行漏洞(CNVD-2015-01802) | 2015-03-17 | 2015-03-18 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-04165 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 02.07.2021 |
| bdu:2015-04166 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 02.07.2021 |
| bdu:2015-04167 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 02.07.2021 |
| bdu:2015-04168 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 02.07.2021 |
| bdu:2015-04169 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 05.07.2024 |
| bdu:2015-04170 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04171 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04172 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04173 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04174 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04175 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04176 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04177 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04178 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04179 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 05.07.2024 |
| bdu:2015-04180 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04181 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04182 | Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04183 | Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушит… | 28.04.2015 | 05.07.2024 |
| bdu:2015-04184 | Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04185 | Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04186 | Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04187 | Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04188 | Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04189 | Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04190 | Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04191 | Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04192 | Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04193 | Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04194 | Уязвимость операционной системы SUSE Linux Enterprise, позволяющая злоумышленнику нарушит… | 28.04.2015 | 28.11.2016 |
| ID | Description | Updated |
|---|---|---|
| var-202101-1964 | China United Network Communications Group Co., Ltd. (English name China Unicom, abbreviat… | 2022-05-04T09:50:01.477000Z |
| var-202012-1619 | Xiamen Kehua Hengsheng Co., Ltd. is the world's leading provider of ICT (information and … | 2022-05-04T09:50:02.761000Z |
| var-202012-1598 | CC-PCNT02 is the controller of Honeywell DCS C300 system and supports Ethernet communicat… | 2022-05-04T09:50:02.772000Z |
| var-202012-1576 | The main business scope of Shenzhen Yichen Technology Development Co., Ltd.: network card… | 2022-05-04T09:50:02.788000Z |
| var-202011-1584 | Genexis is a leading European product and technology supplier dedicated to providing and … | 2022-05-04T09:50:04.509000Z |
| var-202011-1562 | CSC830 PLC is a small controller of Beijing Sifang Relay Automation Co., Ltd. for small a… | 2022-05-04T09:50:04.521000Z |
| var-202011-1541 | The VersaMax series is a small programmable controller. General Electric Company Vers… | 2022-05-04T09:50:04.532000Z |
| var-202011-1520 | NVR104 is a standalone NVR video recorder launched by Liling, which supports up to 4 chan… | 2022-05-04T09:50:04.543000Z |
| var-202010-1632 | The precision air conditioner network monitoring terminal is an intelligent network monit… | 2022-05-04T09:50:05.849000Z |
| var-202010-1611 | Redmi Note 7 is the first product of Xiaomi's Redmi brand mobile phone. Redmi Note7 h… | 2022-05-04T09:50:05.860000Z |
| var-202009-1689 | Shenzhen Ruishi Technology Co., Ltd. (hereinafter referred to as Ruishi Technology) is a … | 2022-05-04T09:50:10.140000Z |
| var-202009-1668 | Redmi Note 7 generally refers to Redmi Note 7. Redmi Note 7 is the first product of Xiaom… | 2022-05-04T09:50:10.150000Z |
| var-202008-1324 | ABB (China) Co., Ltd. is committed to providing solutions for customers in the industrial… | 2022-05-04T09:50:11.665000Z |
| var-202008-1282 | Modicon M580 is a programmable logic controller introduced by Schneider Electric. Sch… | 2022-05-04T09:50:11.685000Z |
| var-202007-1512 | LTE digital cellular mobile communication network MME equipment is an important network e… | 2022-05-04T09:50:12.656000Z |
| var-202007-1491 | Advantech WebAccessNode is a HMI/SCADA monitoring software based entirely on IE browser. … | 2022-05-04T09:50:12.669000Z |
| var-202006-1915 | FameView configuration software is a high-performance configuration monitoring software b… | 2022-05-04T09:50:14.162000Z |
| var-202006-1894 | Yinghantong InRouter615-S series industrial LTE router is a 4G industrial router. The… | 2022-05-04T09:50:14.174000Z |
| var-202002-1701 | Schneider Electric SA is a global electrical company headquartered in France. Schneid… | 2022-05-04T09:50:24.595000Z |
| var-202002-1113 | Affected Dell Client platforms contain a BIOS Setup configuration authentication bypass v… | 2022-05-04T09:50:27.794000Z |
| var-202001-1958 | PortServer TS series terminal server can provide simple, reliable and cost-effective seri… | 2022-05-04T09:50:28.660000Z |
| var-201912-2002 | TP-Link AC1900 is a mini wireless router of China TP-Link. TP-Link AC1900 has a denial o… | 2022-05-04T09:50:30.587000Z |
| var-201911-1944 | ZTE Corporation is a leading global provider of integrated communications solutions. The … | 2022-05-04T09:50:32.068000Z |
| var-201910-1867 | Baidu Tiangong Intelligent Platform is a cloud service platform for the Internet of Thing… | 2022-05-04T09:50:36.511000Z |
| var-201909-1663 | Zhejiang Dahua Technology Co., Ltd. is a smart IoT solution provider and operator based o… | 2022-05-04T09:50:38.157000Z |
| var-201908-2189 | Shenzhen Lucky Tenda Technology Co., Ltd. is one of the first pioneers in China's wireles… | 2022-05-04T09:50:39.931000Z |
| var-201907-1760 | Tpshop is a multi-business model mall system developed by Shenzhen Sobao Network Co., Ltd… | 2022-05-04T09:50:41.632000Z |
| var-201903-1737 | Shenzhen Woshida Technology Co., Ltd. is an enterprise specializing in the development, p… | 2022-05-04T09:50:49.001000Z |
| var-201901-1690 | Shenzhen Ruilian Digital Technology Co., Ltd. is committed to developing leading Internet… | 2022-05-04T09:50:54.069000Z |
| var-201812-1298 | Subsonic is a media file hosting platform. A request forgery vulnerability exists on … | 2022-05-04T09:50:55.208000Z |