Recent vulnerabilities

Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
ID CVSS Description Vendor Product Published Updated
CVE-2007-5286
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5281. Reason: This candidate is a duplicate of CVE-2007-5281. Notes: All CVE users should reference CVE-2007-5281 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2007-10-09T00:00:00.000Z 2007-10-11T09:00:00.000Z
CVE-2007-5287
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5282. Reason: This candidate is a duplicate of CVE-2007-5282. Notes: All CVE users should reference CVE-2007-5282 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2007-10-09T00:00:00.000Z 2007-10-11T09:00:00.000Z
CVE-2007-5288
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5283. Reason: This candidate is a duplicate of CVE-2007-5283. Notes: All CVE users should reference CVE-2007-5283 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2007-10-09T00:00:00.000Z 2007-10-11T09:00:00.000Z
CVE-2002-1638
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-2153. Reason: This candidate is a duplicate of CVE-2002-2153. Notes: All CVE users should reference CVE-2002-2153 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2005-03-28T05:00:00.000Z 2007-10-18T09:00:00.000Z
CVE-2002-2135
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1618. Reason: This candidate is a duplicate of CVE-2002-1618. Notes: All CVE users should reference CVE-2002-1618 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2005-11-16T21:17:00.000Z 2007-10-18T09:00:00.000Z
CVE-2002-2136
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1590. Reason: This candidate is a duplicate of CVE-2002-1590. Notes: All CVE users should reference CVE-2002-1590 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2005-11-16T21:17:00.000Z 2007-10-18T09:00:00.000Z
CVE-2002-2147
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1828. Reason: This candidate is a duplicate of CVE-2002-1828. Notes: All CVE users should reference CVE-2002-1828 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2005-11-16T21:17:00.000Z 2007-10-18T09:00:00.000Z
CVE-2002-2151
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1651. Reason: This candidate is a duplicate of CVE-2002-1651. Notes: All CVE users should reference CVE-2002-1651 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2005-11-16T21:17:00.000Z 2007-10-18T09:00:00.000Z
CVE-2002-2157
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1660. Reason: This candidate is a duplicate of CVE-2002-1660. Notes: All CVE users should reference CVE-2002-1660 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2005-11-16T21:17:00.000Z 2007-10-18T09:00:00.000Z
CVE-2002-2160
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1798. Reason: This candidate is a duplicate of CVE-2002-1798. Notes: All CVE users should reference CVE-2002-1798 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2005-11-16T21:17:00.000Z 2007-10-18T09:00:00.000Z
CVE-2002-2194
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1589. Reason: This candidate is a duplicate of CVE-2002-1589. Notes: All CVE users should reference CVE-2002-1589 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2005-11-16T21:17:00.000Z 2007-10-18T09:00:00.000Z
CVE-2007-5586
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5587. Reason: This candidate is a duplicate of CVE-2007-5587. Notes: All CVE users should reference CVE-2007-5587 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2007-10-19T21:00:00.000Z 2007-11-09T10:00:00.000Z
CVE-2007-1627
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-4606. Reason: This candidate is a duplicate of CVE-2006-4606. Notes: All CVE users should reference CVE-2006-4606 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2007-03-23T21:00:00.000Z 2007-11-15T10:00:00.000Z
CVE-2006-7224
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-7227, CVE-2005-4872, CVE-2006-7228. Reason: this candidate was SPLIT into other identifiers in order to reflect different affected versions and distinct vendor fixes. Notes: All CVE users should consult CVE-2006-7227, CVE-2005-4872, and CVE-2006-7228 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2007-11-08T20:00:00.000Z 2007-11-16T10:00:00.000Z
CVE-2007-4721
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6113. Reason: This candidate is a duplicate of CVE-2007-6113. Notes: All CVE users should reference CVE-2007-6113 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2007-09-05T19:00:00.000Z 2007-11-28T10:00:00.000Z
CVE-2007-5125
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-1171. Reason: This candidate is a duplicate of CVE-2007-1171. Notes: All CVE users should reference CVE-2007-1171 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2007-09-27T19:00:00.000Z 2007-11-28T10:00:00.000Z
CVE-2007-5908
N/A
Buffer overflow in the (1) sysfs_show_available_clocksources and (2) sysfs_show_current_clocksources functions in Linux kernel 2.6.23 and earlier might allow local users to cause a denial of service or execute arbitrary code via crafted clock source names. NOTE: follow-on analysis by Linux developers states that "There is no way for unprivileged users (or really even the root user) to add new clocksources. N/A N/A 2007-11-09T19:00:00.000Z 2007-11-28T10:00:00.000Z
CVE-2007-6034
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6062. Reason: This candidate is a duplicate of CVE-2007-6062. Notes: All CVE users should reference CVE-2007-6062 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2007-11-20T11:00:00.000Z 2007-11-28T10:00:00.000Z
CVE-2007-3595
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-3399. Reason: This candidate is a duplicate of CVE-2007-3399. Notes: All CVE users should reference CVE-2007-3399 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2007-07-06T18:00:00.000Z 2007-12-06T10:00:00.000Z
CVE-2007-5553
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-4158. Reason: This candidate is a duplicate of CVE-2007-4158. It was based on a vague pre-advisory, so the duplicate was not detected until more details were provided. Notes: All CVE users should reference CVE-2007-4158 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2007-10-18T20:00:00.000Z 2007-12-06T10:00:00.000Z
CVE-2007-6370
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5583. Reason: This candidate is a duplicate of CVE-2007-5583. Notes: All CVE users should reference CVE-2007-5583 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2007-12-15T01:00:00.000Z 2007-12-19T10:00:00.000Z
CVE-2007-6590
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-2809. Reason: This candidate is a duplicate of CVE-2008-2809. Notes: All CVE users should reference CVE-2008-2809 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2007-12-28T21:00:00.000Z 2008-01-04T10:00:00.000Z
CVE-2007-6678
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6167. Reason: This candidate is a duplicate of CVE-2007-6167. Notes: All CVE users should reference CVE-2007-6167 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2008-01-10T01:00:00.000Z 2008-01-19T10:00:00.000Z
CVE-2007-4576
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-4575. Reason: This candidate is a reservation duplicate of CVE-2007-4575. Notes: All CVE users should reference CVE-2007-4575 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2008-01-29T01:00:00.000Z 2008-02-12T10:00:00.000Z
CVE-2007-5968
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6313. Reason: this candidate's description and references were inconsistent and described unrelated, non-security issues. The original intended issue is covered by CVE-2007-6313. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2007-12-10T19:00:00.000Z 2008-02-26T10:00:00.000Z
CVE-2008-0626
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6303. Reason: This candidate is a duplicate of CVE-2007-6303. Notes: All CVE users should reference CVE-2007-6303 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2008-02-06T20:00:00.000Z 2008-04-15T09:00:00.000Z
CVE-2008-0627
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6304. Reason: This candidate is a duplicate of CVE-2007-6304. Notes: All CVE users should reference CVE-2007-6304 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2008-02-06T20:00:00.000Z 2008-04-15T09:00:00.000Z
CVE-2008-1683
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-0887. Reason: This candidate is a duplicate of CVE-2008-0887. Notes: All CVE users should reference CVE-2008-0887 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2008-04-06T23:00:00.000Z 2008-04-15T09:00:00.000Z
CVE-2007-5317
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5292. Reason: This candidate is a duplicate of CVE-2007-5292. Notes: All CVE users should reference CVE-2007-5292 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2007-10-09T21:00:00.000Z 2008-04-18T09:00:00.000Z
CVE-2004-1886
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1848. Reason: This candidate is a duplicate of CVE-2004-1848. Notes: All CVE users should reference CVE-2004-1848 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2005-05-10T04:00:00.000Z 2008-05-02T09:00:00.000Z
ID CVSS Description Vendor Product Published Updated
CVE-2004-0859
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none N/A N/A 2017-05-11T14:01:00.000Z 2017-05-11T13:57:01.000Z
CVE-2004-0860
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none N/A N/A 2017-05-11T14:01:00.000Z 2017-05-11T13:57:01.000Z
CVE-2004-0861
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none N/A N/A 2017-05-11T14:01:00.000Z 2017-05-11T13:57:01.000Z
CVE-2004-0868
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0866. Reason: This candidate is a duplicate of CVE-2004-0866. Notes: The description for CVE-2004-0866 was inadvertently attached to this issue instead. All CVE users should reference CVE-2004-0866 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2004-09-24T04:00:00.000Z 2005-02-15T10:00:00.000Z
CVE-2004-0874
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1123. Reason: This candidate is a reservation duplicate of CVE-2004-1123. Notes: All CVE users should reference CVE-2004-1123 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2004-12-05T05:00:00.000Z 2005-02-06T10:00:00.000Z
CVE-2004-0890
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reasons: This candidate is a reservation duplicate of another candidate. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2004-12-08T05:00:00.000Z 2005-02-06T10:00:00.000Z
CVE-2004-0910
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0815. Reason: This candidate is a reservation duplicate of CVE-2004-0815. Notes: All CVE users should reference CVE-2004-0815 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2004-09-28T04:00:00.000Z 2005-02-06T10:00:00.000Z
CVE-2004-0943
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none N/A N/A 2005-10-27T04:00:00.000Z 2024-09-16T18:55:44.074Z
CVE-2004-0948
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. It was a duplicate assignment before public disclosure. Notes: none N/A N/A 2005-02-06T05:00:00.000Z 2024-09-16T23:31:07.546Z
CVE-2004-0954
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0597. Reason: This candidate is a reservation duplicate of CVE-2004-0597. Notes: All CVE users should reference CVE-2004-0597 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2004-10-21T04:00:00.000Z 2005-02-06T10:00:00.000Z
CVE-2004-0955
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0599. Reason: This candidate is a reservation duplicate of CVE-2004-0599 (the first item listed in that candidate). Notes: All CVE users should reference CVE-2004-0599 instead of this candidate. All references and descriptions have been removed from this candidate to prevent accidental usage N/A N/A 2004-11-04T05:00:00.000Z 2005-02-06T10:00:00.000Z
CVE-2004-0973
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0457. Reason: This candidate is a reservation duplicate of CVE-2004-0457. Notes: All CVE users should reference CVE-2004-0457 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2004-10-20T04:00:00.000Z 2005-02-06T10:00:00.000Z
CVE-2004-0995
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none N/A N/A 2017-05-11T14:01:00.000Z 2017-05-11T13:57:01.000Z
CVE-2004-1159
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1122, CVE-2004-1314. Reason: this was an out-of-band assignment duplicate intended for one issue, but the description and references inadvertently combined multiple issues. Notes: All CVE users should consult CVE-2004-1122 and CVE-2004-1314 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2004-12-10T05:00:00.000Z 2004-12-22T10:00:00.000Z
CVE-2004-1238
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004. Notes: none N/A N/A 2005-04-18T04:00:00.000Z 2024-09-17T00:11:40.612Z
CVE-2004-1239
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004. Notes: none N/A N/A 2005-04-18T04:00:00.000Z 2024-09-16T16:12:30.256Z
CVE-2004-1240
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004. Notes: none N/A N/A 2005-04-18T04:00:00.000Z 2024-09-16T16:28:52.817Z
CVE-2004-1241
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004. Notes: none N/A N/A 2005-04-18T04:00:00.000Z 2024-09-17T00:01:12.481Z
CVE-2004-1242
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004. Notes: none N/A N/A 2005-04-18T04:00:00.000Z 2024-09-17T00:26:08.485Z
CVE-2004-1243
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2004. Notes: none N/A N/A 2005-04-18T04:00:00.000Z 2024-09-16T19:46:03.245Z
CVE-2004-1344
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2004. Notes: none N/A N/A 2017-05-11T14:01:00.000Z 2017-05-11T13:57:01.000Z
CVE-2004-1479
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0928. Reason: This candidate is a duplicate of CVE-2004-0928. Notes: All CVE users should reference CVE-2004-0928 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2005-02-13T05:00:00.000Z 2005-02-21T10:00:00.000Z
CVE-2004-1886
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1848. Reason: This candidate is a duplicate of CVE-2004-1848. Notes: All CVE users should reference CVE-2004-1848 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2005-05-10T04:00:00.000Z 2008-05-02T09:00:00.000Z
CVE-2004-2141
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1827. Reason: This candidate is a duplicate of CVE-2004-1827. Notes: All CVE users should reference CVE-2004-1827 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2005-06-30T04:00:00.000Z 2005-08-19T09:00:00.000Z
CVE-2004-2285
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-2022. Reason: This candidate is a duplicate of CVE-2004-2022. Notes: All CVE users should reference CVE-2004-2022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2005-08-04T04:00:00.000Z 2005-08-10T09:00:00.000Z
CVE-2004-2404
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-2347. Reason: This candidate is a duplicate of CVE-2004-2347. Notes: All CVE users should reference CVE-2004-2347 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2005-08-17T04:00:00.000Z 2005-10-14T09:00:00.000Z
CVE-2004-2770
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-3389. Reason: This candidate is a duplicate of CVE-2011-3389. Notes: All CVE users should reference CVE-2011-3389 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage N/A N/A 2011-09-25T10:00:00.000Z 2011-09-29T09:00:00.000Z
CVE-2004-2772
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none N/A N/A 2020-11-05T19:52:53.000Z 2020-11-05T19:52:53.000Z
CVE-2004-2773
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none N/A N/A 2020-11-05T19:53:15.000Z 2020-11-05T19:53:15.000Z
CVE-2004-2774
N/A
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none N/A N/A 2020-11-05T19:53:37.000Z 2020-11-05T19:53:37.000Z
ID Description Published Updated
fkie_cve-2004-0859 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … 2017-05-11T14:29:01.963 2023-11-07T01:56:48.870
fkie_cve-2004-0860 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … 2017-05-11T14:29:01.993 2023-11-07T01:56:49.080
fkie_cve-2004-0861 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … 2017-05-11T14:29:02.010 2023-11-07T01:56:49.287
fkie_cve-2004-0868 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0866. Reason: This candid… 2004-12-23T05:00:00.000 2023-11-07T01:56:49.510
fkie_cve-2004-0874 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1123. Reason: This candid… 2005-01-10T05:00:00.000 2023-11-07T01:56:49.570
fkie_cve-2004-0890 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reasons: This candidate is a… 2005-01-10T05:00:00.000 2023-11-07T01:56:49.840
fkie_cve-2004-0910 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0815. Reason: This candid… 2004-11-03T05:00:00.000 2023-11-07T01:56:50.007
fkie_cve-2004-0943 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was w… 2004-12-31T05:00:00.000 2023-11-07T01:56:50.467
fkie_cve-2004-0948 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was w… 2004-12-31T05:00:00.000 2023-11-07T01:56:50.537
fkie_cve-2004-0954 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0597. Reason: This candid… 2004-12-23T05:00:00.000 2023-11-07T01:56:50.610
fkie_cve-2004-0955 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0599. Reason: This candid… 2004-12-23T05:00:00.000 2023-11-07T01:56:50.650
fkie_cve-2004-0973 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0457. Reason: This candid… 2004-12-23T05:00:00.000 2023-11-07T01:56:50.880
fkie_cve-2004-0995 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … 2017-05-11T14:29:02.027 2023-11-07T01:56:51.080
fkie_cve-2004-1159 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1122, CVE-2004-1314. Reas… 2005-01-10T05:00:00.000 2023-11-07T01:56:52.650
fkie_cve-2004-1238 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… 2004-12-31T05:00:00.000 2023-11-07T01:56:53.340
fkie_cve-2004-1239 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… 2004-12-31T05:00:00.000 2023-11-07T01:56:53.373
fkie_cve-2004-1240 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… 2004-12-31T05:00:00.000 2023-11-07T01:56:53.407
fkie_cve-2004-1241 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… 2004-12-31T05:00:00.000 2023-11-07T01:56:53.443
fkie_cve-2004-1242 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… 2004-12-31T05:00:00.000 2023-11-07T01:56:53.477
fkie_cve-2004-1243 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… 2004-12-31T05:00:00.000 2023-11-07T01:56:53.503
fkie_cve-2004-1344 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … 2017-05-11T14:29:02.057 2023-11-07T01:56:54.170
fkie_cve-2004-1479 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0928. Reason: This candid… 2004-12-31T05:00:00.000 2023-11-07T01:56:55.597
fkie_cve-2004-1886 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1848. Reason: This candid… 2004-03-23T05:00:00.000 2023-11-07T01:56:58.833
fkie_cve-2004-2141 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1827. Reason: This candid… 2004-12-31T05:00:00.000 2023-11-07T01:57:01.147
fkie_cve-2004-2285 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-2022. Reason: This candid… 2004-12-31T05:00:00.000 2023-11-07T01:57:02.447
fkie_cve-2004-2404 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-2347. Reason: This candid… 2004-12-31T05:00:00.000 2023-11-07T01:57:03.633
fkie_cve-2004-2770 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-3389. Reason: This candid… 2011-09-25T10:55:04.737 2023-11-07T01:57:07.220
fkie_cve-2004-2772 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… 2020-11-05T20:15:14.193 2023-11-07T01:57:07.453
fkie_cve-2004-2773 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… 2020-11-05T20:15:14.253 2023-11-07T01:57:07.690
fkie_cve-2004-2774 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… 2020-11-05T20:15:14.347 2023-11-07T01:57:07.920
ID Severity Description Published Updated
ghsa-8v5f-hp78-jgxq
Signature Verification Bypass in jwt-simple 2019-06-06T15:30:33Z 2020-08-31T18:37:26Z
ghsa-9w87-4j72-gcv7
Insecure Default Configuration in graphql-code-generator 2020-09-02T18:27:54Z 2020-08-31T18:37:32Z
ghsa-xrr6-6ww3-f3qm
Sandbox Breakout / Arbitrary Code Execution in value-censorship 2020-09-02T21:25:58Z 2020-08-31T18:39:27Z
ghsa-j8qr-rvcv-crhv
Malicious Package in electron-native-notify 2020-09-11T21:18:05Z 2020-08-31T18:40:50Z
ghsa-4627-w373-375v
Malicious Package in grunt-radical 2020-09-11T21:22:24Z 2020-08-31T18:41:06Z
ghsa-4x6x-782q-jfc4
Command Injection in node-wifi 2020-09-03T02:38:47Z 2020-08-31T18:41:45Z
ghsa-mxmj-84q8-34r7
Command Injection in expressfs 2020-09-03T02:39:49Z 2020-08-31T18:41:47Z
ghsa-4q8f-5xxj-946r
Command Injection in addax 2020-09-03T02:40:51Z 2020-08-31T18:41:49Z
ghsa-crfx-5phg-hmw9
Cross-Site Scripting in ids-enterprise 2019-06-13T18:59:12Z 2020-08-31T18:41:52Z
ghsa-49r3-3h96-rwj6
Cross-Site Scripting in ids-enterprise 2019-06-13T19:09:31Z 2020-08-31T18:41:54Z
ghsa-hpfq-8wx8-cgqw
Cross-Site Scripting in ids-enterprise 2019-06-13T18:59:18Z 2020-08-31T18:41:56Z
ghsa-8mgg-5x65-m4m4
Command Injection in soletta-dev-app 2020-09-11T21:08:19Z 2020-08-31T18:41:59Z
ghsa-v86x-f47q-f7f4
Unauthorized File Access in atompm 2020-09-11T21:09:24Z 2020-08-31T18:42:01Z
ghsa-j6v9-xgvh-f796
Command Injection in wxchangba 2020-09-11T21:11:34Z 2020-08-31T18:42:04Z
ghsa-9r3m-mhfm-39cm
Incorrect Calculation in bigint-money 2020-09-11T21:10:29Z 2020-08-31T18:42:08Z
ghsa-crpm-fm48-chj7
SQL Injection in resquel 2020-09-11T21:13:44Z 2020-08-31T18:42:11Z
ghsa-48gc-5j93-5cfq
Path Traversal in serve 2020-09-11T21:15:54Z 2020-08-31T18:42:15Z
ghsa-45j8-pm75-5v8x
Path Traversal in simplehttpserver 2019-02-07T18:18:04Z 2020-08-31T18:42:22Z
ghsa-536q-8gxx-m782
Cross-Site Scripting in dojo 2019-09-11T23:02:57Z 2020-08-31T18:42:32Z
ghsa-wgw3-gf4p-62xc
Command Injection in wizard-syncronizer 2020-09-11T21:16:59Z 2020-08-31T18:42:46Z
ghsa-hq8g-qq57-5275
SQL Injection in untitled-model 2020-09-11T21:24:33Z 2020-08-31T18:43:13Z
ghsa-cpgr-wmr9-qxv4
Cross-Site Scripting in serve 2020-09-11T21:20:14Z 2020-08-31T18:43:20Z
ghsa-5g6j-8hv4-vfgj
Cross-Site Scripting in node-red 2020-09-11T21:21:19Z 2020-08-31T18:43:22Z
ghsa-3f95-w5h5-fq86
Prototype Pollution in mergify 2020-09-11T21:22:24Z 2020-08-31T18:43:27Z
ghsa-g8vp-6hv4-m67c
Command Injection in entitlements 2020-09-11T21:23:29Z 2020-08-31T18:43:32Z
ghsa-v7cp-5326-54fh
Path Traversal in bruteser 2020-09-03T16:45:15Z 2020-08-31T18:43:34Z
ghsa-wfhx-6pcm-7m55
Path Traversal in ponse 2020-09-03T16:46:22Z 2020-08-31T18:43:41Z
ghsa-v6gv-fg46-h89j
Sensitive Data Exposure in put 2020-09-03T16:48:36Z 2020-08-31T18:43:51Z
ghsa-qjfh-xc44-rm9x
Path Traversal in file-static-server 2020-09-03T16:49:43Z 2020-08-31T18:43:54Z
ghsa-gm29-35c7-8cfw
Cross-Site Scripting in buttle 2019-04-08T15:18:38Z 2020-08-31T18:43:56Z
ID Severity Description Package Published Updated
pysec-2020-132
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLit… tensorflow 2020-09-25T19:15:00Z 2020-10-29T16:15:00Z
pysec-2020-133
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite sav… tensorflow 2020-09-25T19:15:00Z 2020-10-29T16:15:00Z
pysec-2020-134
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in… tensorflow 2020-09-25T19:15:00Z 2020-10-29T16:15:00Z
pysec-2020-142
A mis-handling of invalid unicode characters in the Java implementation of Tink versions … tink 2020-10-19T13:15:00Z 2020-10-29T22:16:00Z
pysec-2020-61
In lookatme (python/pypi package) versions prior to 2.3.0, the package automatically load… lookatme 2020-10-26T18:15:00Z 2020-11-13T16:40:00Z
pysec-2020-60
A stored cross-site scripting (XSS) vulnerability affects the Web UI in Locust before 1.3… locust 2020-11-09T21:15:00Z 2020-11-17T20:37:00Z
pysec-2020-159
In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they p… alerta-server 2020-11-06T18:15:00Z 2020-11-17T21:08:00Z
pysec-2020-67
The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal… moin 2020-11-10T17:15:00Z 2020-11-24T17:20:00Z
pysec-2020-18
The previous default setting for Airflow's Experimental API was to allow all API requests… apache-airflow 2020-11-10T16:15:00Z 2020-11-24T17:29:00Z
pysec-2020-157
Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL. werkzeug 2020-11-18T15:15:00Z 2020-12-01T16:05:00Z
pysec-2020-29
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker … brotli 2020-09-15T10:15:00Z 2020-12-02T12:15:00Z
pysec-2020-74
Multiple cross-site scripting (XSS) vulnerabilities in Papermerge before 1.5.2 allow remo… papermerge 2020-12-02T08:15:00Z 2020-12-02T16:29:00Z
pysec-2020-75
petl before 1.68, in some configurations, allows resolution of entities in an XML document. petl 2020-11-26T05:15:00Z 2020-12-03T16:48:00Z
pysec-2020-108
** DISPUTED ** svm_predict_values in svm.cpp in Libsvm v324, as used in scikit-learn 0.23… scikit-learn 2020-11-21T21:15:00Z 2020-12-03T18:50:00Z
pysec-2020-69
Python oic is a Python OpenID Connect implementation. In Python oic before version 1.2.1,… oic 2020-12-02T20:15:00Z 2020-12-08T02:37:00Z
pysec-2020-68
OAuthenticator is an OAuth login mechanism for JupyterHub. In oauthenticator from version… oauthenticator 2020-12-01T21:15:00Z 2020-12-08T17:50:00Z
pysec-2020-163
A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly v… ecdsa 2020-01-02T15:15:00Z 2020-12-08T18:32:00Z
pysec-2020-98
Red Discord Bot Dashboard is an easy-to-use interactive web dashboard to control your Red… red-dashboard 2020-12-09T00:15:00Z 2020-12-10T20:15:00Z
pysec-2020-52
jupyterhub-systemdspawner enables JupyterHub to spawn single-user notebook servers using … jupyterhub-systemdspawner 2020-12-09T17:15:00Z 2020-12-10T21:46:00Z
pysec-2020-141
In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matchin… tensorflow 2020-12-10T23:15:00Z 2020-12-14T17:42:00Z
pysec-2020-300
In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matchin… tensorflow-cpu 2020-12-10T23:15:00Z 2020-12-14T17:42:00Z
pysec-2020-335
In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matchin… tensorflow-gpu 2020-12-10T23:15:00Z 2020-12-14T17:42:00Z
pysec-2020-140
In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not valid… tensorflow 2020-12-10T23:15:00Z 2020-12-14T19:08:00Z
pysec-2020-109
In some conditions, a snap package built by snapcraft includes the current directory in L… snapcraft 2020-12-04T03:15:00Z 2020-12-14T20:36:00Z
pysec-2020-20
In Apache Airflow versions prior to 1.10.13, the Charts and Query View of the old (Flask-… apache-airflow 2020-12-14T10:15:00Z 2020-12-15T15:40:00Z
pysec-2020-72
OpenSlides is a free, Web-based presentation and assembly system for managing and project… openslides 2020-12-18T19:15:00Z 2020-12-22T20:11:00Z
pysec-2020-22
Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with d… apache-airflow 2020-12-21T17:15:00Z 2020-12-22T21:23:00Z
pysec-2020-49
** DISPUTED ** jsonpickle through 1.4.1 allows remote code execution during deserializati… jsonpickle 2020-12-17T16:15:00Z 2020-12-23T15:38:00Z
pysec-2020-143
tlslite-ng is an open source python library that implements SSL and TLS cryptographic pro… tlslite-ng 2020-12-21T17:15:00Z 2020-12-23T16:09:00Z
pysec-2020-117
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `SparseFillEmpty… tensorflow 2020-09-25T19:15:00Z 2020-12-23T18:33:00Z
ID Description Updated
gsd-2017-1000042 Mapbox.js versions 1.x prior to 1.6.5 and 2.x prior to 2.1.7 are vulnerable to a cross-si… 2015-10-24T00:00:00.000Z
gsd-2015-7519 It is possible in some cases, for clients to overwrite headers set by the server, resulti… 2015-11-23T00:00:00.000Z
gsd-2015-9097 The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is vulnerable to SMTP… 2015-12-09T00:00:00.000Z
gsd-2015-8968 Git allows executing arbitrary shell commands using git-remote-ext via a remote URLs. Nor… 2015-12-11T00:00:00.000Z
gsd-2015-5312 Nokogiri version 1.6.7.1 has been released, pulling in several upstream patches to the ve… 2015-12-15T00:00:00.000Z
gsd-2015-8969 git-fastclone before 1.0.5 passes user modifiable strings directly to a shell command. An… 2015-12-15T00:00:00.000Z
gsd-2015-7541 The contents of the `image_path`, `colors`, and `depth` variables generated from possibly… 2016-01-04T00:00:00.000Z
gsd-2017-1000043 Mapbox.js versions 1.x prior to 1.6.6 and 2.x prior to 2.2.4 are vulnerable to a cross-si… 2016-01-12T00:00:00.000Z
gsd-2015-7565 By default, Ember will escape any values in Handlebars templates that use double curlies … 2016-01-14T00:00:00.000Z
gsd-2015-8314 Devise version before 3.5.4 uses cookies to implement a "Remember me" functionality. Howe… 2016-01-18T00:00:00.000Z
gsd-2015-7499 Nokogiri version 1.6.7.2 has been released, pulling in several upstream patches to the ve… 2016-01-19T00:00:00.000Z
gsd-2015-7576 There is a timing attack vulnerability in the basic authentication support in Action Cont… 2016-01-25T00:00:00.000Z
gsd-2015-7577 There is a vulnerability in how the nested attributes feature in Active Record handles up… 2016-01-25T00:00:00.000Z
gsd-2015-7578 There is a possible XSS vulnerability in rails-html-sanitizer. This vulnerability has bee… 2016-01-25T00:00:00.000Z
gsd-2015-7579 There is a XSS vulnerability in `Rails::Html::FullSanitizer` used by Action View's `strip… 2016-01-25T00:00:00.000Z
gsd-2015-7580 There is a possible XSS vulnerability in the white list sanitizer in the rails-html-sanit… 2016-01-25T00:00:00.000Z
gsd-2015-7581 There is an object leak vulnerability for wildcard controllers in Action Pack. This vulne… 2016-01-25T00:00:00.000Z
gsd-2016-0751 There is a possible object leak which can lead to a denial of service vulnerability in Ac… 2016-01-25T00:00:00.000Z
gsd-2016-0752 There is a possible directory traversal and information leak vulnerability in Action View… 2016-01-25T00:00:00.000Z
gsd-2016-0753 There is a possible input validation circumvention vulnerability in Active Model. This vu… 2016-01-25T00:00:00.000Z
gsd-2016-2097 There is a possible directory traversal and information leak vulnerability in Action Vie… 2016-02-29T00:00:00.000Z
gsd-2016-2098 There is a possible remote code execution vulnerability in Action Pack. This vulnerabilit… 2016-02-29T00:00:00.000Z
gsd-2016-3098 "`Administrate::ApplicationController` actions didn't have CSRF protection. Remote attack… 2016-04-01T00:00:00.000Z
gsd-2016-10193 espeak-ruby passes user modifiable strings directly to a shell command. An attacker can e… 2016-04-13T00:00:00.000Z
gsd-2016-3693 Safemode is initialised with an optional 'delegate' object. If the delegated object is a … 2016-04-20T00:00:00.000Z
gsd-2016-10194 festivaltts4r passes user modifiable strings directly to a shell command. An attacker can… 2016-04-23T00:00:00.000Z
gsd-2016-4442 Carefully crafted requests can expose information about strings and objects allocated dur… 2016-05-18T00:00:00.000Z
gsd-2015-8806 Nokogiri is affected by series of vulnerabilities in libxml2 and libxslt, which are libra… 2016-06-07T00:00:00.000Z
gsd-2016-5697 ruby-saml prior to version 1.3.0 is vulnerable to an XML signature wrapping attack in the… 2016-06-24T00:00:00.000Z
gsd-2016-10735 In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the da… 2016-07-27T00:00:00.000Z
ID Description Published Updated
mal-2022-2027 Malicious code in colourize (npm) 2022-05-31T13:35:15Z 2022-05-31T13:35:15Z
mal-2022-5116 Malicious code in orangeonion.buildtools (npm) 2022-05-31T13:36:23Z 2022-05-31T13:36:23Z
mal-2022-6136 Malicious code in sixt (npm) 2022-05-31T13:36:23Z 2022-05-31T13:36:23Z
mal-2022-3067 Malicious code in flake8-holvi (npm) 2022-05-31T13:36:23Z 2022-05-31T13:36:24Z
mal-2022-3657 Malicious code in holvipartners (npm) 2022-05-31T13:36:23Z 2022-05-31T13:36:24Z
mal-2022-4434 Malicious code in lyft-avidl (npm) 2022-05-31T13:36:23Z 2022-05-31T13:36:24Z
mal-2022-4511 Malicious code in mb-blog (npm) 2022-05-31T13:36:23Z 2022-05-31T13:36:24Z
mal-2022-6330 Malicious code in stripe-connect-rocketrides (npm) 2022-05-31T13:36:23Z 2022-05-31T13:36:24Z
mal-2022-4944 Malicious code in npm_ransomware (npm) 2022-05-31T13:36:55Z 2022-05-31T13:36:55Z
mal-2022-5816 Malicious code in rkdvil (npm) 2022-05-31T13:37:28Z 2022-05-31T13:37:29Z
mal-2022-5817 Malicious code in rkpacktest (npm) 2022-05-31T13:37:28Z 2022-05-31T13:37:29Z
mal-2022-5642 Malicious code in react-dom-router-compatibility (npm) 2022-05-31T13:37:44Z 2022-05-31T13:37:44Z
mal-2022-5643 Malicious code in react-dom-router-old (npm) 2022-05-31T13:37:43Z 2022-05-31T13:37:44Z
mal-2022-367 Malicious code in @iwcp/nebula-ui (npm) 2022-05-31T13:38:50Z 2022-05-31T13:38:51Z
mal-2022-3280 Malicious code in gatsby-plugin-conecad (npm) 2022-05-31T13:41:09Z 2022-05-31T13:41:09Z
mal-2022-7433 Malicious code in equests (PyPI) 2022-05-31T00:00:00Z 2022-05-31T20:12:58Z
mal-2022-7434 Malicious code in reequests (PyPI) 2022-05-31T00:00:00Z 2022-05-31T20:12:58Z
mal-2022-7435 Malicious code in reqquests (PyPI) 2022-05-31T00:00:00Z 2022-05-31T20:12:58Z
mal-2022-7436 Malicious code in requeests (PyPI) 2022-05-31T00:00:00Z 2022-05-31T20:12:58Z
mal-2022-7437 Malicious code in requess (PyPI) 2022-05-31T00:00:00Z 2022-05-31T20:12:58Z
mal-2022-7438 Malicious code in requessts (PyPI) 2022-05-31T00:00:00Z 2022-05-31T20:12:58Z
mal-2022-7439 Malicious code in requestts (PyPI) 2022-05-31T00:00:00Z 2022-05-31T20:12:58Z
mal-2022-7440 Malicious code in requuests (PyPI) 2022-05-31T00:00:00Z 2022-05-31T20:12:58Z
mal-2022-7441 Malicious code in reuests (PyPI) 2022-05-31T00:00:00Z 2022-05-31T20:12:58Z
mal-2022-7442 Malicious code in rrequests (PyPI) 2022-05-31T00:00:00Z 2022-05-31T20:12:58Z
mal-2022-6388 Malicious code in sync-colors (npm) 2022-06-01T09:02:23Z 2022-06-01T09:02:24Z
mal-2022-2018 Malicious code in colors-support (npm) 2022-06-01T09:02:24Z 2022-06-01T09:02:25Z
mal-2022-6360 Malicious code in support-colors (npm) 2022-06-01T09:02:23Z 2022-06-01T09:02:29Z
mal-2022-6587 Malicious code in titles (npm) 2022-06-01T09:02:23Z 2022-06-01T09:02:29Z
mal-2022-3549 Malicious code in hach-package-manager-bounty-hunter (npm) 2022-06-01T09:02:55Z 2022-06-01T09:02:56Z
ID Description Published Updated
wid-sec-w-2022-0161 Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service 2022-03-31T22:00:00.000+00:00 2022-12-28T23:00:00.000+00:00
wid-sec-w-2022-1744 GnuPGP: Schwachstelle ermöglicht Codeausführung 2022-10-16T22:00:00.000+00:00 2022-12-28T23:00:00.000+00:00
wid-sec-w-2022-1962 libTIFF: Schwachstelle ermöglicht Denial of Service 2022-03-28T22:00:00.000+00:00 2022-12-28T23:00:00.000+00:00
wid-sec-w-2022-2380 D-LINK DIR-825: Mehrere Schwachstellen ermöglichen Command Injection 2022-12-20T23:00:00.000+00:00 2022-12-28T23:00:00.000+00:00
wid-sec-w-2022-2412 ESRI ArcGIS: Schwachstelle ermöglicht Offenlegung von Informationen 2022-12-28T23:00:00.000+00:00 2022-12-28T23:00:00.000+00:00
wid-sec-w-2022-0812 IBM Java: Mehrere Schwachstellen ermöglichen Denial of Service 2022-02-22T23:00:00.000+00:00 2023-01-01T23:00:00.000+00:00
wid-sec-w-2022-1034 Mozilla Firefox und Thunderbird: Mehrere Schwachstellen 2022-03-08T23:00:00.000+00:00 2023-01-01T23:00:00.000+00:00
wid-sec-w-2023-0003 D-LINK Router: Schwachstelle ermöglicht Codeausführung 2023-01-01T23:00:00.000+00:00 2023-01-01T23:00:00.000+00:00
wid-sec-w-2023-0004 Cacti: Mehrere Schwachstellen ermöglichen Cross-Site Scripting 2021-08-31T22:00:00.000+00:00 2023-01-01T23:00:00.000+00:00
wid-sec-w-2023-0005 Cacti RRDtool: Schwachstelle ermöglicht Cross-Site Scripting 2020-11-23T23:00:00.000+00:00 2023-01-01T23:00:00.000+00:00
wid-sec-w-2023-0006 Cacti RRDtool: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit den Rechten des Dienstes 2020-02-23T23:00:00.000+00:00 2023-01-01T23:00:00.000+00:00
wid-sec-w-2023-0007 Linux Kernel: Schwachstelle ermöglicht Denial of Service und Privilegien-Erweiterung 2023-01-01T23:00:00.000+00:00 2023-01-01T23:00:00.000+00:00
wid-sec-w-2023-0008 IBM FileNet Content Manager: Mehrere Schwachstellen ermöglichen Denial of Service 2023-01-01T23:00:00.000+00:00 2023-01-01T23:00:00.000+00:00
wid-sec-w-2022-0206 ffmpeg: Schwachstellen ermöglichen Codeausführung 2021-01-03T23:00:00.000+00:00 2023-01-02T23:00:00.000+00:00
wid-sec-w-2022-2414 MatrixSSL: Schwachstelle ermöglicht Codeausführung 2022-12-28T23:00:00.000+00:00 2023-01-02T23:00:00.000+00:00
wid-sec-w-2023-0010 ffmpeg: Schwachstelle ermöglicht Offenlegung von Informationen 2021-08-05T22:00:00.000+00:00 2023-01-02T23:00:00.000+00:00
wid-sec-w-2023-0013 Fortinet FortiManager: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen 2023-01-03T23:00:00.000+00:00 2023-01-03T23:00:00.000+00:00
wid-sec-w-2023-0014 Fortinet FortiWeb: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen 2023-01-03T23:00:00.000+00:00 2023-01-03T23:00:00.000+00:00
wid-sec-w-2023-0016 IBM Tivoli Monitoring: Mehrere Schwachstellen 2023-01-03T23:00:00.000+00:00 2023-01-03T23:00:00.000+00:00
wid-sec-w-2023-0018 Android Patchday Januar 2023 2023-01-03T23:00:00.000+00:00 2023-01-03T23:00:00.000+00:00
wid-sec-w-2023-0019 Kubernetes: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen 2021-07-14T22:00:00.000+00:00 2023-01-03T23:00:00.000+00:00
wid-sec-w-2023-0020 GNU libc: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen 2019-01-21T23:00:00.000+00:00 2023-01-03T23:00:00.000+00:00
wid-sec-w-2023-0022 Red Hat Enterprise Linux (webkit2gtk3): Schwachstelle ermöglicht Codeausführung 2023-01-03T23:00:00.000+00:00 2023-01-04T23:00:00.000+00:00
wid-sec-w-2023-0028 Foxit Phantom PDF Suite: Mehrere Schwachstellen 2023-01-04T23:00:00.000+00:00 2023-01-04T23:00:00.000+00:00
wid-sec-w-2023-0029 vim: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Benutzerrechten 2017-02-12T23:00:00.000+00:00 2023-01-04T23:00:00.000+00:00
wid-sec-w-2022-0779 Red Hat OpenStack: Mehrere Schwachstellen 2022-07-20T22:00:00.000+00:00 2023-01-05T23:00:00.000+00:00
wid-sec-w-2023-0023 WordPress: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen 2023-01-04T23:00:00.000+00:00 2023-01-05T23:00:00.000+00:00
wid-sec-w-2023-0030 IBM Maximo Asset Management: Schwachstelle ermöglicht nicht spezifizierten Angriff 2023-01-05T23:00:00.000+00:00 2023-01-05T23:00:00.000+00:00
wid-sec-w-2023-0031 IBM Tivoli Network Manager: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen 2023-01-05T23:00:00.000+00:00 2023-01-05T23:00:00.000+00:00
wid-sec-w-2022-2318 VMware Produkte: Schwachstelle ermöglicht Codeausführung 2022-12-13T23:00:00.000+00:00 2023-01-08T23:00:00.000+00:00
ID Description Published Updated
icsa-18-032-02 3S-Smart Software Solutions GmbH CODESYS Web Server 2018-02-01T00:00:00.000000Z 2018-02-01T00:00:00.000000Z
icsa-18-032-03 Gemalto Sentinel License Manager 2018-02-01T00:00:00.000000Z 2018-02-01T00:00:00.000000Z
icsma-18-037-01 Vyaire Medical CareFusion Upgrade Utility Vulnerability 2018-02-06T00:00:00.000000Z 2018-02-06T00:00:00.000000Z
icsa-18-044-01 WAGO PFC200 Series 2018-02-13T00:00:00.000000Z 2018-02-13T00:00:00.000000Z
icsa-18-044-02 Schneider Electric IGSS SCADA Software 2018-02-13T00:00:00.000000Z 2018-02-13T00:00:00.000000Z
icsa-17-318-02a ABB TropOS (Update A) 2017-11-14T00:00:00.000000Z 2018-02-15T00:00:00.000000Z
icsa-18-046-01 Nortek Linear eMerge E3 Series 2018-02-15T00:00:00.000000Z 2018-02-15T00:00:00.000000Z
icsa-18-046-02 GE D60 Line Distance Relay 2018-02-15T00:00:00.000000Z 2018-02-15T00:00:00.000000Z
icsa-18-046-03 Schneider Electric IGSS Mobile 2018-02-15T00:00:00.000000Z 2018-02-15T00:00:00.000000Z
icsa-18-046-04 Schneider Electric StruxureOn Gateway 2018-02-15T00:00:00.000000Z 2018-02-15T00:00:00.000000Z
icsa-18-051-01 ABB netCADOPS Web Application 2018-02-20T00:00:00.000000Z 2018-02-20T00:00:00.000000Z
icsa-18-018-01a ICSA-18-018-01A Siemens SIMATIC WinCC Add-On (Update A) 2018-01-18T00:00:00.000000Z 2018-02-22T00:00:00.000000Z
icsa-18-058-02 Delta Electronics WPLSoft 2018-02-27T00:00:00.000000Z 2018-02-27T00:00:00.000000Z
icsa-18-058-03 Emerson ControlWave Micro Process Automation Controller 2018-02-27T00:00:00.000000Z 2018-02-27T00:00:00.000000Z
icsma-18-058-02 Philips Intellispace Portal ISP Vulnerabilities 2018-02-27T00:00:00.000000Z 2018-02-27T00:00:00.000000Z
icsa-18-060-02 Moxa OnCell G3100-HSPA Series 2018-03-01T00:00:00.000000Z 2018-03-01T00:00:00.000000Z
icsa-18-060-03 Delta Electronics Delta Industrial Automation DOPSoft 2018-03-01T00:00:00.000000Z 2018-03-01T00:00:00.000000Z
icsa-18-065-01 Hirschmann Automation and Control GmbH Classic Platform Switches 2018-03-06T00:00:00.000000Z 2018-03-06T00:00:00.000000Z
icsa-18-065-02 Schneider Electric SoMove Software and DTM Software Components 2018-03-06T00:00:00.000000Z 2018-03-06T00:00:00.000000Z
icsa-18-065-03 Eaton ELCSoft 2018-03-06T00:00:00.000000Z 2018-03-06T00:00:00.000000Z
icsa-18-072-02 OSIsoft PI Data Archive 2018-03-13T00:00:00.000000Z 2018-03-13T00:00:00.000000Z
icsa-18-072-03 OSIsoft PI Vision 2018-03-13T00:00:00.000000Z 2018-03-13T00:00:00.000000Z
icsa-18-072-04 OSIsoft PI Web API 2018-03-13T00:00:00.000000Z 2018-03-13T00:00:00.000000Z
icsma-18-037-02 GE Medical Devices Vulnerability 2018-02-06T00:00:00.000000Z 2018-03-13T00:00:00.000000Z
icsa-18-079-01 Geutebruck IP Cameras 2018-03-20T00:00:00.000000Z 2018-03-20T00:00:00.000000Z
icsa-18-081-01 ICSA-18-081-01 Siemens SIMATIC WinCC OA UI Mobile App 2018-03-20T00:00:00.000000Z 2018-03-20T00:00:00.000000Z
icsa-18-081-02 Beckhoff TwinCAT 2018-03-22T00:00:00.000000Z 2018-03-22T00:00:00.000000Z
icsa-18-086-01 Schneider Electric Modicon Premium, Modicon Quantum, Modicon M340, and Modicon BMXNOR0200 2018-03-27T00:00:00.000000Z 2018-03-27T00:00:00.000000Z
icsa-18-088-01 WAGO 750 Series 2018-03-29T00:00:00.000000Z 2018-03-29T00:00:00.000000Z
icsa-18-093-01 ICSA-18-093-01 Siemens Building Technologies Products (Update A) 2018-03-28T00:00:00.000000Z 2018-04-03T00:00:00.000000Z
ID Description Published Updated
cisco-sa-20180516-fnd Cisco IoT Field Network Director Cross-Site Request Forgery Vulnerability 2018-05-16T16:00:00+00:00 2018-05-16T16:00:00+00:00
cisco-sa-20180516-ident-se-xss Cisco Identity Services Engine Cross-Site Scripting Vulnerability 2018-05-16T16:00:00+00:00 2018-05-16T16:00:00+00:00
cisco-sa-20180516-ise-xss Cisco Identity Services Engine Logs Cross-Site Scripting Vulnerability 2018-05-16T16:00:00+00:00 2018-05-16T16:00:00+00:00
cisco-sa-20180516-msms Cisco Meeting Server Media Services Denial of Service Vulnerability 2018-05-16T16:00:00+00:00 2018-05-16T16:00:00+00:00
cisco-sa-20180516-nfvis Cisco Enterprise NFV Infrastructure Software Linux Shell Access Vulnerability 2018-05-16T16:00:00+00:00 2018-05-16T16:00:00+00:00
cisco-sa-20180516-socmin-dos Cisco SocialMiner Notification System Denial of Service Vulnerability 2018-05-16T16:00:00+00:00 2018-05-16T16:00:00+00:00
cisco-sa-20180516-nfvis-cli-command-injection Cisco Enterprise NFV Infrastructure Software CLI Command Injection Vulnerability 2018-05-16T16:00:00+00:00 2018-05-16T17:46:00+00:00
cisco-sa-20180516-nfvis-path-traversal Cisco Enterprise NFV Infrastructure Software Web Management Interface Path Traversal Vulnerability 2018-05-16T16:00:00+00:00 2018-05-16T18:05:00+00:00
cisco-sa-20180129-asa1 Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability 2018-01-29T17:00:00+00:00 2018-05-17T17:52:00+00:00
cisco-sa-20180516-cucm-cup-xss Cisco Unified Communications Manager and Cisco Unified Presence Cross-Site Scripting Vulnerability 2018-05-16T16:00:00+00:00 2018-05-18T15:35:00+00:00
cisco-sa-20180606-anyconnect-cert-bypass Cisco AnyConnect Secure Mobility Client Certificate Bypass Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-cpcp-id Cisco Prime Collaboration Provisioning Cleartext Passwords Written to World-Readable File Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-cuc-xss Cisco Unity Connection Cross-Site Scripting Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-cucm-xfs Cisco Unified Communications Manager Cross-Frame Scripting Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-firesight-vpn-bypass Cisco FireSIGHT System VPN Policy Bypass Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-ise-xss Cisco Identity Services Engine Cross-Site Scripting Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-multiplatform-sip Cisco IP Phone 6800, 7800, and 8800 Series with Multiplatform Firmware Session Initiation Protocol Denial of Service Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-nso Cisco Network Services Orchestrator Arbitrary Command Execution Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-prime-access Cisco Prime Collaboration Provisioning Access Control Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-prime-bypass Cisco Prime Collaboration Provisioning Access Control Bypass Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-prime-escalation Cisco Prime Collaboration Provisioning Access Control Deficiency in Batch Function Privilege Escalation Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-prime-password-recovery Cisco Prime Collaboration Provisioning Unauthorized Password Recovery Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-prime-password-reset Cisco Prime Collaboration Provisioning Unauthorized Password Reset Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-prime-rmi Cisco Prime Collaboration Provisioning Unauthenticated Remote Method Invocation Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-prime-sql Cisco Prime Collaboration Provisioning SQL Injection Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-ucm-xss Cisco Unified Communications Manager Cross-Site Scripting Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-ucs-access Cisco Unified Computing System Role-Based Access Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-ucsdimcs Cisco Integrated Management Controller Supervisor and Cisco UCS Director DOM Stored Cross-Site Scripting Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-waas-snmp Cisco Wide Area Application Services Software Static SNMP Credentials Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
cisco-sa-20180606-webex-xss Cisco WebEx Cross-Site Scripting Vulnerability 2018-06-06T16:00:00+00:00 2018-06-06T16:00:00+00:00
ID Description Published Updated
msrc_cve-2019-12735 getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline as demonstrated by execute in Vim and assert_fails or nvim_input in Neovim. 2019-06-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2019-15845 Ruby through 2.4.7 2.5.x through 2.5.6 and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions. 2019-11-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2019-16201 WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7 2.5.x through 2.5.6 and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network. 2019-11-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2019-16254 Ruby through 2.4.7 2.5.x through 2.5.6 and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header an attacker can exploit it to insert a newline character to split a header and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742 which addressed the CRLF vector but did not address an isolated CR or an isolated LF. 2019-11-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2019-16255 Ruby through 2.4.7 2.5.x through 2.5.6 and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method. 2019-11-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2019-16905 OpenSSH 7.7 through 7.9 and 8.x before 8.1 when compiled with an experimental key type has a pre-authentication integer overflow if a client or server is configured to use a crafted XMSS key. This leads to memory corruption and local code execution because of an error in the XMSS key parsing algorithm. NOTE: the XMSS implementation is considered experimental in all released OpenSSH versions and there is no supported way to enable it when building portable OpenSSH. 2019-10-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2019-19126 On the x86-64 architecture the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program. 2019-11-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2019-19338 A flaw was found in the fix for CVE-2019-11135 in the Linux upstream kernel versions before 5.5 where the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0) but is not affected by the MDS issue (MDS_NO=1) the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability. 2020-07-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2019-20079 The autocmd feature in window.c in Vim before 8.1.2136 accesses freed memory. 2019-12-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2019-20372 NGINX before 1.17.7 with certain error_page configurations allows HTTP request smuggling as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer. 2020-01-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2019-20794 An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace and mount a FUSE filesystem. Upon interaction with this FUSE filesystem if the userspace component is terminated via a kill of the PID namespace's pid 1 it will result in a hung task and resources being permanently locked up until system reboot. This can result in resource exhaustion. 2020-05-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2019-20807 In Vim before 8.1.0881 users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g. Python Ruby or Lua). 2020-05-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2019-20810 go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel before 5.6 does not call snd_card_free for a failure path which causes a memory leak aka CID-9453264ef586. 2020-06-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2019-3886 An incorrect permissions check was discovered in libvirt 4.8.0 and above. The readonly permission was allowed to invoke APIs depending on the guest agent which could lead to potentially disclosing unintended information or denial of service by causing libvirt to block. 2019-04-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2019-6488 The string component in the GNU C Library (aka glibc or libc6) through 2.28 when running on the x32 architecture incorrectly attempts to use a 64-bit register for size_t in assembly codes which can lead to a segmentation fault or possibly unspecified other impact as demonstrated by a crash in __memmove_avx_unaligned_erms in sysdeps/x86_64/multiarch/memmove-vec-unaligned-erms.S during a memcpy. 2019-01-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2019-9070 An issue was discovered in GNU libiberty as distributed in GNU Binutils 2.32. It is a heap-based buffer over-read in d_expression_1 in cp-demangle.c after many recursive calls. 2019-02-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2020-10690 There is a use-after-free in kernel versions before 5.5 due to a race condition between the release of ptp_clock and cdev while resource deallocation. When a (high privileged) process allocates a ptp device file (like /dev/ptpX) and voluntarily goes to sleep. During this time if the underlying device is removed it can cause an exploitable condition as the process wakes up to terminate and clean all attached files. The system crashes due to the cdev structure being invalid (as already freed) which is pointed to by the inode. 2020-05-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2020-10711 A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine it sets the security attribute to indicate that the category bitmap is present even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel resulting in a denial of service. 2020-05-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2020-10733 The Windows installer for PostgreSQL 9.5 - 12 invokes system-provided executables that do not have fully-qualified paths. Executables in the directory where the installer loads or the current working directory take precedence over the intended executables. An attacker having permission to add files into one of those directories can use this to execute arbitrary code with the installer's administrative rights. 2020-09-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2020-10757 A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system. 2020-06-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2020-10766 A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality. 2020-09-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2020-10767 A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality. 2020-09-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2020-10768 A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality. 2020-09-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2020-10781 A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes possibly making the system inoperable. 2020-09-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2020-10933 An issue was discovered in Ruby 2.5.x through 2.5.7 2.6.x through 2.6.5 and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size buffer exception: false) the method resizes the buffer to fit the requested size but no data is copied. Thus the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter. 2020-05-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2020-10942 In the Linux kernel before 5.5.8 get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field which might allow attackers to trigger kernel stack corruption via crafted system calls. 2020-03-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2020-11608 An issue was discovered in the Linux kernel before 5.6.1. drivers/media/usb/gspca/ov519.c allows NULL pointer dereferences in ov511_mode_init_regs and ov518_mode_init_regs when there are zero endpoints aka CID-998912346c0d. 2020-04-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2020-11609 An issue was discovered in the stv06xx subsystem in the Linux kernel before 5.6.1. drivers/media/usb/gspca/stv06xx/stv06xx.c and drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid descriptors as demonstrated by a NULL pointer dereference aka CID-485b06aadb93. 2020-04-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2020-11668 In the Linux kernel before 5.6.1 drivers/media/usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) mishandles invalid descriptors aka CID-a246b4d54770. 2020-04-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
msrc_cve-2020-12464 usb_sg_cancel in drivers/usb/core/message.c in the Linux kernel before 5.6.8 has a use-after-free because a transfer occurs without a reference aka CID-056ad39ee925. 2020-04-02T00:00:00.000Z 2020-09-25T00:00:00.000Z
ID Description Published Updated
ncsc-2024-0401 Kwetsbaarheid verholpen in Ivanti Endpoint Manager Mobile 2024-10-09T11:21:34.434721Z 2024-10-09T11:21:34.434721Z
ncsc-2024-0402 Kwetsbaarheden verholpen in Adobe Commerce en Magento 2024-10-09T13:38:09.912496Z 2024-10-09T13:38:09.912496Z
ncsc-2024-0403 Kwetsbaarheid verholpen in Mozilla Firefox 2024-10-10T07:20:38.171954Z 2024-10-10T07:20:38.171954Z
ncsc-2024-0404 Kwetsbaarheden verholpen in Juniper JunOS en JunOS Evolved 2024-10-10T11:19:54.515278Z 2024-10-10T11:19:54.515278Z
ncsc-2024-0405 Kwetsbaarheden verholpen in Palo Alto Expedition 2024-10-10T12:02:12.890277Z 2024-10-10T12:02:12.890277Z
ncsc-2024-0386 Kwetsbaarheden verholpen in Zimbra 2024-10-02T07:02:43.365395Z 2024-10-10T12:50:25.238470Z
ncsc-2024-0398 Kwetsbaarheden verholpen in Ivanti Connect Secure en Policy Secure 2024-10-09T09:47:33.556285Z 2024-10-11T07:03:14.760313Z
ncsc-2024-0406 Kwetsbaarheden verholpen in Gitlab Enterprise Edition en Community Edition 2024-10-11T08:23:31.975727Z 2024-10-11T08:23:31.975727Z
ncsc-2024-0359 Kwetsbaarheden verholpen in diverse producten van Veeam. 2024-09-06T08:01:04.558202Z 2024-10-11T09:18:53.784374Z
ncsc-2024-0407 Kwetsbaarheden verholpen in Moxa systemen 2024-10-14T12:14:38.572540Z 2024-10-14T12:14:38.572540Z
ncsc-2024-0408 Kwetsbaarheden verholpen in Splunk Enterprise 2024-10-15T15:18:24.694416Z 2024-10-15T15:18:24.694416Z
ncsc-2024-0409 Kwetsbaarheid verholpen in Solarwinds Web Helpdesk 2024-10-17T06:08:32.057774Z 2024-10-17T06:08:32.057774Z
ncsc-2024-0410 Kwetsbaarheden verholpen in Solarwinds Platform 2024-10-17T06:09:32.053449Z 2024-10-17T06:09:32.053449Z
ncsc-2024-0411 Kwetsbaarheden verholpen in Oracle Database producten 2024-10-17T13:15:19.595269Z 2024-10-17T13:15:19.595269Z
ncsc-2024-0412 Kwetsbaarheden verholpen in Oracle Peoplesoft 2024-10-17T13:16:18.175855Z 2024-10-17T13:16:18.175855Z
ncsc-2024-0413 Kwetsbaarheden verholpen in Oracle Commerce 2024-10-17T13:17:19.736602Z 2024-10-17T13:17:19.736602Z
ncsc-2024-0414 Kwetsbaarheden verholpen in Oracle Communications 2024-10-17T13:17:52.103171Z 2024-10-17T13:17:52.103171Z
ncsc-2024-0415 Kwetsbaarheden verholpen in Oracle Enterprise Manager 2024-10-17T13:18:06.611153Z 2024-10-17T13:18:06.611153Z
ncsc-2024-0416 Kwetsbaarheden verholpen in Oracle Financial Services Applications 2024-10-17T13:18:45.385015Z 2024-10-17T13:18:45.385015Z
ncsc-2024-0417 Kwetsbaarheden verholpen in Oracle Fusion Middleware 2024-10-17T13:19:16.185510Z 2024-10-17T13:19:16.185510Z
ncsc-2024-0418 Kwetsbaarheden verholpen in Oracle Analytics 2024-10-17T13:19:50.583299Z 2024-10-17T13:19:50.583299Z
ncsc-2024-0419 Kwetsbaarheden verholpen in Oracle Java 2024-10-17T13:20:07.759085Z 2024-10-17T13:20:07.759085Z
ncsc-2024-0420 Kwetsbaarheden verholpen in Oracle MySQL 2024-10-17T13:20:42.437738Z 2024-10-17T13:20:42.437738Z
ncsc-2024-0421 Kwetsbaarheden verholpen in SolarWinds Serv-U 2024-10-18T09:10:48.856424Z 2024-10-18T09:10:48.856424Z
ncsc-2024-0422 Kwetsbaarheden verholpen in Oracle E-Business Suite 2024-10-18T09:26:29.690794Z 2024-10-18T09:26:29.690794Z
ncsc-2024-0424 Kwetsbaarheden verholpen in Cisco Adaptive Security Appliance en Firepower Threat Defense 2024-10-24T08:37:15.013231Z 2024-10-24T08:37:15.013231Z
ncsc-2024-0425 Kwetsbaarheden verholpen in Mozilla Firefox en Thunderbird 2024-10-30T10:53:07.348476Z 2024-10-30T10:53:07.348476Z
ncsc-2024-0426 Kwetsbaarheden verholpen in Apple MacOS 2024-10-30T11:26:13.535716Z 2024-10-30T11:26:13.535716Z
ncsc-2024-0427 Kwetsbaarheden verholpen in Google Chrome 2024-10-30T11:36:05.615865Z 2024-10-30T11:36:05.615865Z
ncsc-2024-0428 Kwetsbaarheden verholpen in Apple iOS en iPadOS 2024-10-30T11:39:26.910666Z 2024-10-30T11:39:26.910666Z
ID Description Published Updated
opensuse-su-2018:1058-1 Security update for phpMyAdmin 2018-04-23T21:35:19Z 2018-04-23T21:35:19Z
opensuse-su-2018:1059-1 Security update for phpMyAdmin 2018-04-23T21:35:19Z 2018-04-23T21:35:19Z
opensuse-su-2018:1051-1 Security update for hdf5 2018-04-23T21:43:02Z 2018-04-23T21:43:02Z
opensuse-su-2018:1056-1 Security update for hdf5 2018-04-23T21:43:02Z 2018-04-23T21:43:02Z
opensuse-su-2018:1265-1 Security update for opencv 2018-05-11T17:35:46Z 2018-05-11T17:35:46Z
opensuse-su-2018:1271-1 Security update for opencv 2018-05-11T17:35:46Z 2018-05-11T17:35:46Z
opensuse-su-2018:1329-1 Security update for enigmail 2018-05-17T11:35:48Z 2018-05-17T11:35:48Z
opensuse-su-2018:1330-1 Security update for enigmail 2018-05-17T11:35:48Z 2018-05-17T11:35:48Z
opensuse-su-2018:1175-1 Security update for Chromium 2018-05-27T11:26:33Z 2018-05-27T11:26:33Z
opensuse-su-2018:1437-1 Security update for Chromium 2018-05-27T11:26:33Z 2018-05-27T11:26:33Z
opensuse-su-2018:1462-1 Security update for pdns 2018-05-29T10:59:00Z 2018-05-29T10:59:00Z
opensuse-su-2018:1859-1 Security update for Opera 2018-06-30T09:39:52Z 2018-06-30T09:39:52Z
opensuse-su-2018:1969-1 Security update for singularity 2018-07-16T09:52:20Z 2018-07-16T09:52:20Z
opensuse-su-2018:2327-1 Security update for python-Django 2018-08-14T14:57:13Z 2018-08-14T14:57:13Z
opensuse-su-2018:2807-1 Security update for seamonkey 2018-08-16T07:40:05Z 2018-08-16T07:40:05Z
opensuse-su-2018:2806-1 Security update for nemo-extensions 2018-08-16T18:39:40Z 2018-08-16T18:39:40Z
opensuse-su-2018:2810-1 Security update for aubio 2018-08-16T18:40:42Z 2018-08-16T18:40:42Z
opensuse-su-2018:2809-1 Security update for python-Django1 2018-08-16T18:44:03Z 2018-08-16T18:44:03Z
opensuse-su-2018:3687-1 Security update for MozillaThunderbird 2018-11-09T08:34:29Z 2018-11-09T08:34:29Z
opensuse-su-2018:3835-1 Security update for chromium 2018-11-20T18:13:21Z 2018-11-20T18:13:21Z
opensuse-su-2018:3839-1 Security update for GraphicsMagick 2018-11-21T19:12:13Z 2018-11-21T19:12:13Z
opensuse-su-2018:3906-1 Security update for SDL2_image 2018-11-24T17:19:59Z 2018-11-24T17:19:59Z
opensuse-su-2018:4045-1 Security update for dom4j 2018-12-07T18:04:50Z 2018-12-07T18:04:50Z
opensuse-su-2018:4062-1 Security update for pdns-recursor 2018-12-10T13:09:45Z 2018-12-10T13:09:45Z
opensuse-su-2018:4073-1 Security update for pdns 2018-12-11T14:12:15Z 2018-12-11T14:12:15Z
opensuse-su-2018:4143-1 Security update for Chromium 2018-12-15T09:27:33Z 2018-12-15T09:27:33Z
opensuse-su-2018:4177-1 Security update for pdns-recursor 2018-12-18T12:04:40Z 2018-12-18T12:04:40Z
opensuse-su-2018:4175-1 Security update for pdns 2018-12-18T12:04:47Z 2018-12-18T12:04:47Z
opensuse-su-2018:4302-1 Security update for go 2018-12-29T10:20:00Z 2018-12-29T10:20:00Z
opensuse-su-2019:0003-1 Security update for GraphicsMagick 2019-01-01T16:33:52Z 2019-01-01T16:33:52Z
ID Description Published Updated
rhba-2023:2977 Red Hat Bug Fix Advisory: linux-firmware bug fix and enhancement update 2023-05-16T08:19:16+00:00 2025-11-21T17:23:22+00:00
rhba-2023:3052 Red Hat Bug Fix Advisory: cifs-utils bug fix and enhancement update 2023-05-16T08:22:54+00:00 2025-11-21T17:23:22+00:00
rhba-2023:5620 Red Hat Bug Fix Advisory: microcode_ctl bug fix and enhancement update 2023-10-10T16:20:53+00:00 2025-11-21T17:23:23+00:00
rhba-2023:5988 Red Hat Bug Fix Advisory: Updated rhel9/firefox-flatpak container image 2023-10-23T08:30:22+00:00 2025-11-21T17:23:25+00:00
rhba-2023:6004 Red Hat Bug Fix Advisory: Updated rhel9/thunderbird-flatpak container image 2023-10-23T09:32:38+00:00 2025-11-21T17:23:25+00:00
rhba-2024:0115 Red Hat Bug Fix Advisory: linux-firmware bug fix and enhancement update 2024-01-10T10:50:22+00:00 2025-11-21T17:23:28+00:00
rhba-2024:10751 Red Hat Bug Fix Advisory: Updated rhel9/thunderbird-flatpak container image 2024-12-03T13:00:37+00:00 2025-11-21T17:23:30+00:00
rhba-2024:10782 Red Hat Bug Fix Advisory: Updated rhel9/firefox-flatpak container image 2024-12-04T08:15:20+00:00 2025-11-21T17:23:31+00:00
rhba-2024:2108 Red Hat Bug Fix Advisory: Red Hat build of Keycloak 24.0.3 Update 2024-04-29T22:52:54+00:00 2025-11-21T17:23:35+00:00
rhba-2024:3983 Red Hat Bug Fix Advisory: kernel bug fix update 2024-06-19T01:12:35+00:00 2025-11-21T17:23:38+00:00
rhba-2024:5869 Red Hat Bug Fix Advisory: updated RHDH-1.1-RHEL-9 container images 2024-08-26T17:53:15+00:00 2025-11-21T17:23:42+00:00
rhba-2024:7236 Red Hat Bug Fix Advisory: updated el8/flatpak-sdk container image 2024-09-26T14:31:36+00:00 2025-11-21T17:23:45+00:00
rhba-2024:7637 Red Hat Bug Fix Advisory: updated rhel8/support-tools container image 2024-10-03T14:44:08+00:00 2025-11-21T17:23:46+00:00
rhba-2024:8183 Red Hat Bug Fix Advisory: Updated rhel9/firefox-flatpak container image 2024-10-16T13:16:48+00:00 2025-11-21T17:23:46+00:00
rhba-2024:8405 Red Hat Bug Fix Advisory: Updated rhel8/gimp-flatpak container image 2024-10-23T18:27:07+00:00 2025-11-21T17:23:47+00:00
rhba-2024:8186 Red Hat Bug Fix Advisory: Updated rhel9/thunderbird-flatpak container image 2024-10-16T13:23:25+00:00 2025-11-21T17:23:48+00:00
rhba-2025:12877 Red Hat Bug Fix Advisory: linux-firmware bug fix and enhancement update 2025-08-05T05:31:58+00:00 2025-11-21T17:23:49+00:00
rhba-2025:15878 Red Hat Bug Fix Advisory: linux-firmware bug fix and enhancement update 2025-09-16T03:51:47+00:00 2025-11-21T17:23:50+00:00
rhba-2025:2973 Red Hat Bug Fix Advisory: mod_proxy_cluster bug fix update 2025-03-18T00:36:42+00:00 2025-11-21T17:23:52+00:00
rhba-2025:4872 Red Hat Bug Fix Advisory: rpm-ostree bug fix and enhancement update 2025-05-13T11:53:36+00:00 2025-11-21T17:23:52+00:00
rhba-2025:5309 Red Hat Bug Fix Advisory: mod_proxy_cluster bug fix and enhancement update 2025-05-13T11:58:11+00:00 2025-11-21T17:23:52+00:00
rhba-2025:6631 Red Hat Bug Fix Advisory: libndp bug fix and enhancement update 2025-05-13T08:31:05+00:00 2025-11-21T17:23:54+00:00
rhba-2025:9433 Red Hat Bug Fix Advisory: microcode_ctl bug fix and enhancement update 2025-06-24T02:16:25+00:00 2025-11-21T17:23:54+00:00
rhea-2006:0355 Red Hat Enhancement Advisory: oprofile enhancement update 2006-08-09T00:00:00+00:00 2025-11-21T17:23:54+00:00
rhea-2010:0272 Red Hat Enhancement Advisory: valgrind bug fix and enhancement update 2010-03-30T00:00:00+00:00 2025-11-21T17:23:55+00:00
rhea-2011:0039 Red Hat Enhancement Advisory: subversion enhancement update 2011-01-13T00:00:00+00:00 2025-11-21T17:23:55+00:00
rhea-2009:1633 Red Hat Enhancement Advisory: Red Hat Enterprise MRG Messaging and Grid Version 1.2 2009-12-03T04:15:33+00:00 2025-11-21T17:23:56+00:00
rhea-2013:1031 Red Hat Enhancement Advisory: Red Hat OpenShift Enterprise 1.2 Infrastructure Release Advisory 2013-07-09T19:48:02+00:00 2025-11-21T17:23:56+00:00
rhea-2013:1032 Red Hat Enhancement Advisory: Red Hat OpenShift Enterprise 1.2 Node Release Advisory 2013-07-09T18:57:19+00:00 2025-11-21T17:23:56+00:00
rhea-2013:1392 Red Hat Enhancement Advisory: Red Hat Satellite Proxy 5.6.0 General Availability 2013-10-01T10:54:50+00:00 2025-11-21T17:23:56+00:00
ID Description Published Updated
sevd-2022-221-01 EcoStruxureTM Control Expert, EcoStruxureTM Process Expert, and Modicon Controllers M580 and M340 2022-08-09T10:58:35.000Z 2024-08-13T00:00:00.000Z
sevd-2022-221-02 Modicon PAC Controllers 2022-08-09T08:15:40.000Z 2024-08-13T00:00:00.000Z
sevd-2022-221-04 Modicon PAC Controllers 2022-08-09T08:15:40.000Z 2024-08-13T00:00:00.000Z
sevd-2023-010-05 EcoStruxure™ Control Expert, EcoStruxure™ Process Expert and Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) 2023-01-10T15:41:57.000Z 2024-08-13T00:00:00.000Z
sevd-2023-101-05 Modicon PLCs (Programmable Logic Controllers) and PACs (Programmable Automation Controllers) 2023-04-11T09:46:26.000Z 2024-08-13T00:00:00.000Z
sevd-2024-226-01 Accutech Manager 2024-08-13T00:00:00.000Z 2024-08-13T00:00:00.000Z
sevd-2024-226-02 EcoStruxure™ Machine SCADA Expert / BLUE Open Studio 2024-08-13T00:00:00.000Z 2024-08-13T00:00:00.000Z
sevd-2023-192-02 ​​EcoStruxure™ OPC UA Server Expert​ 2023-07-11T07:01:56.000Z 2024-08-13T07:00:00.000Z
sevd-2023-073-01 EcoStruxure™ Power Monitoring Expert 2023-03-14T00:00:00.000Z 2024-09-10T00:00:00.000Z
sevd-2024-163-02 PowerLogic P5 2024-06-11T00:00:00.000Z 2024-09-10T00:00:00.000Z
sevd-2024-254-02 EcoStruxure™ Power Monitoring Expert and EcoStruxure™ Power Operation or EcoStruxure™ Power SCADA Operation with Advanced Reporting and Dashboards 2024-09-10T00:00:00.000Z 2024-09-10T00:00:00.000Z
sevd-2022-102-02 Modicon M340 Controller and Communication Modules 2022-04-12T00:00:00.000Z 2024-10-08T00:00:00.000Z
sevd-2024-282-01 Data Center Expert 2024-10-08T00:00:00.000Z 2024-10-08T00:00:00.000Z
sevd-2024-282-02 Harmony iPC – HMIBSC IIoT Edge Box Core 2024-10-08T00:00:00.000Z 2024-10-08T00:00:00.000Z
sevd-2024-282-03 Easergy Studio 2024-10-08T00:00:00.000Z 2024-10-08T00:00:00.000Z
sevd-2024-282-04 EVlink Home Smart and Schneider Charge 2024-10-08T00:00:00.000Z 2024-10-08T00:00:00.000Z
sevd-2024-282-06 Zelio Soft 2 2024-10-08T00:00:00.000Z 2024-10-08T00:00:00.000Z
sevd-2024-282-07 System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs 2024-10-08T00:00:00.000Z 2024-10-08T00:00:00.000Z
sevd-2024-282-08 EcoStruxure EV Charging Expert 2024-10-08T00:00:00.000Z 2024-10-08T00:00:00.000Z
sevd-2021-159-02 PowerLogic PM5500 and PowerLogic PM8ECC 2021-06-08T00:00:00.000Z 2024-11-12T00:00:00.000Z
sevd-2024-317-01 PowerLogic PM5300 Series 2024-11-12T00:00:00.000Z 2024-11-12T00:00:00.000Z
sevd-2024-317-04 EcoStruxure™ IT Gateway 2024-11-12T00:00:00.000Z 2024-11-12T00:00:00.000Z
sevd-2024-345-01 PowerChute Serial Shutdown 2024-12-10T00:00:00.000Z 2024-12-10T00:00:00.000Z
sevd-2024-345-02 Harmony HMI and Pro-face HMI products 2024-12-10T00:00:00.000Z 2024-12-10T00:00:00.000Z
sevd-2025-014-04 Web Designer for Modicon Communication Modules 2025-01-14T00:00:00.000Z 2025-01-14T00:00:00.000Z
sevd-2025-014-08 Power Logic HDPM6000 High-Density Metering System 2025-01-14T00:00:00.000Z 2025-01-14T00:00:00.000Z
sevd-2025-042-01 ASCO 5310 / 5350 Remote Annunciator 2025-02-11T06:00:00.000Z 2025-02-11T06:00:00.000Z
sevd-2025-042-03 EcoStruxure™ Process Expert, EcoStruxure™ Process Expert for AVEVA System Platform 2025-02-11T06:00:00.000Z 2025-02-11T06:00:00.000Z
sevd-2025-042-04 Enerlin'X IFE and eIFE 2025-02-11T06:00:00.000Z 2025-02-11T06:00:00.000Z
sevd-2025-070-01 EcoStruxure™ Panel Server 2025-03-11T04:00:00.000Z 2025-03-11T04:00:00.000Z
ID Description Published Updated
ssa-944952 SSA-944952: Authentication Bypass Vulnerability in Opcenter Quality 2022-07-12T00:00:00Z 2022-07-12T00:00:00Z
ssa-185638 SSA-185638: Authentication Bypass Vulnerability in SICAM A8000 Web Server Module 2022-08-09T00:00:00Z 2022-08-09T00:00:00Z
ssa-232418 SSA-232418: Vulnerabilities in SIMATIC S7-1200 and SIMATIC S7-1500 CPU Families 2019-08-13T00:00:00Z 2022-08-09T00:00:00Z
ssa-492828 SSA-492828: Denial-of-Service Vulnerability in SIMATIC S7-300 CPUs and SINUMERIK Controller 2020-11-10T00:00:00Z 2022-08-09T00:00:00Z
ssa-555707 SSA-555707: Information Disclosure Vulnerability in Simcenter STAR-CCM+ 2022-08-09T00:00:00Z 2022-08-09T00:00:00Z
ssa-580125 SSA-580125: Multiple Vulnerabilities in SIMATIC eaSie 2022-07-12T00:00:00Z 2022-08-09T00:00:00Z
ssa-629512 SSA-629512: Local Privilege Escalation Vulnerability in TIA Portal 2020-01-14T00:00:00Z 2022-08-09T00:00:00Z
ssa-661034 SSA-661034: Incorrect Permission Assignment in Multiple SIMATIC Software Products 2021-07-13T00:00:00Z 2022-08-09T00:00:00Z
ssa-669737 SSA-669737: Improper Access Control Vulnerability in SICAM TOOLBOX II 2022-02-08T00:00:00Z 2022-08-09T00:00:00Z
ssa-732250 SSA-732250: Libcurl Vulnerabilities in Industrial Devices 2022-05-10T00:00:00Z 2022-08-09T00:00:00Z
ssa-759952 SSA-759952: Command Injection and Denial of Service Vulnerability in Teamcenter 2022-08-09T00:00:00Z 2022-08-09T00:00:00Z
ssa-789162 SSA-789162: Vulnerabilities in Teamcenter 2022-05-10T00:00:00Z 2022-08-09T00:00:00Z
ssa-914168 SSA-914168: Multiple Vulnerabilities in SIMATIC WinCC Affecting Other SIMATIC Software Products 2022-02-08T00:00:00Z 2022-08-09T00:00:00Z
ssa-243317 SSA-243317 File Parsing Vulnerability in Simcenter Femap and Parasolid 2022-07-12T00:00:00Z 2022-09-13T00:00:00Z
ssa-518824 SSA-518824 Multiple File Parsing Vulnerabilities in Simcenter Femap and Parasolid 2022-09-13T00:00:00Z 2022-09-13T00:00:00Z
ssa-254054 SSA-254054: Spring Framework Vulnerability (Spring4Shell or SpringShell, CVE-2022-22965) - Impact to Siemens Products 2022-04-19T00:00:00Z 2022-10-11T00:00:00Z
ssa-258115 SSA-258115: DWG File Parsing Vulnerability in Solid Edge before SE2022MP9 2022-10-11T00:00:00Z 2022-10-11T00:00:00Z
ssa-280624 SSA-280624: Multiple Vulnerabilities in SCALANCE W1750D 2021-10-12T00:00:00Z 2022-10-11T00:00:00Z
ssa-360783 SSA-360783: Multiple Webserver Vulnerabilities in Desigo PXM Devices 2022-10-11T00:00:00Z 2022-10-11T00:00:00Z
ssa-384224 SSA-384224: Denial of Service Vulnerability in SIMATIC HMI Panels 2022-10-11T00:00:00Z 2022-10-11T00:00:00Z
ssa-568427 SSA-568427: Weak Key Protection Vulnerability in SIMATIC S7-1200 and S7-1500 CPU Families 2022-10-11T00:00:00Z 2022-10-11T00:00:00Z
ssa-611756 SSA-611756: JT File Parsing Vulnerability in JTTK and Simcenter Femap 2022-10-11T00:00:00Z 2022-10-11T00:00:00Z
ssa-649853 SSA-649853: Improper Certificate Validation Vulnerability in Industrial Edge Management 2022-10-11T00:00:00Z 2022-10-11T00:00:00Z
ssa-685781 SSA-685781: Multiple Vulnerabilities in Apache HTTP Server Affecting Siemens Products 2022-06-14T00:00:00Z 2022-10-11T00:00:00Z
ssa-836027 SSA-836027: Client-side Authentication in Desigo CC and Cerberus DMS 2022-10-11T00:00:00Z 2022-10-11T00:00:00Z
ssa-917476 SSA-917476: Multiple Vulnerabilities in SCALANCE W1750D 2021-11-09T00:00:00Z 2022-10-11T00:00:00Z
ssa-928782 SSA-928782: Firmware Authenticity Vulnerability in LOGO! 8 BM Devices 2022-10-11T00:00:00Z 2022-10-11T00:00:00Z
ssa-640732 SSA-640732: Authentication Bypass Vulnerability in Siveillance Video Mobile Server 2022-10-21T00:00:00Z 2022-10-21T00:00:00Z
ssa-362164 SSA-362164: Predictable Initial Sequence Numbers in the TCP/IP Stack of Nucleus RTOS 2021-02-09T00:00:00Z 2022-11-08T00:00:00Z
ssa-371761 SSA-371761: Arbitrary Code Execution Vulnerability in the Logback Component of SINEC NMS before V1.0.3 2022-11-08T00:00:00Z 2022-11-08T00:00:00Z
ID Description Published Updated
suse-su-2015:0805-1 Security update for cups-filters 2015-03-13T12:25:45Z 2015-03-13T12:25:45Z
suse-su-2015:0667-1 Security update for libarchive 2015-03-16T08:39:18Z 2015-03-16T08:39:18Z
suse-su-2015:0491-1 Security update for flash-player 2015-03-16T09:30:35Z 2015-03-16T09:30:35Z
suse-su-2015:0541-1 Security update for openssl 2015-03-18T14:19:20Z 2015-03-18T14:19:20Z
suse-su-2015:0553-1 Security update for compat-openssl098 2015-03-18T18:42:02Z 2015-03-18T18:42:02Z
suse-su-2015:0553-2 Security update for compat-openssl098 2015-03-18T18:42:03Z 2015-03-18T18:42:03Z
suse-su-2015:0668-1 Security update for libzip 2015-03-20T13:26:32Z 2015-03-20T13:26:32Z
suse-su-2015:0679-1 Security update for tcpdump 2015-03-20T14:25:34Z 2015-03-20T14:25:34Z
suse-ru-2015:0335-1 Security update for tcpdump 2015-03-20T14:41:11Z 2015-03-20T14:41:11Z
suse-su-2015:0692-1 Security update for tcpdump 2015-03-20T14:41:11Z 2015-03-20T14:41:11Z
suse-su-2015:0836-1 Security update for mercurial 2015-03-20T15:26:35Z 2015-03-20T15:26:35Z
suse-su-2015:0751-1 Security update for mongodb 2015-03-20T15:29:57Z 2015-03-20T15:29:57Z
suse-su-2015:0702-1 Security update for libXfont 2015-03-20T15:39:51Z 2015-03-20T15:39:51Z
suse-su-2015:0735-1 Security update for gnutls 2015-03-23T13:04:00Z 2015-03-23T13:04:00Z
suse-su-2015:0834-1 Security update for emacs 2015-03-23T16:13:36Z 2015-03-23T16:13:36Z
suse-su-2015:0817-1 Security update for mercurial 2015-03-23T17:10:44Z 2015-03-23T17:10:44Z
suse-su-2015:0593-2 Security update for MozillaFirefox 2015-03-23T23:58:05Z 2015-03-23T23:58:05Z
suse-su-2015:0593-1 Security update for Mozilla Firefox 2015-03-24T00:02:15Z 2015-03-24T00:02:15Z
suse-su-2015:0866-1 Security update for gd 2015-03-24T16:10:35Z 2015-03-24T16:10:35Z
suse-su-2015:0835-1 Security update for gd 2015-03-24T16:14:40Z 2015-03-24T16:14:40Z
suse-su-2015:0630-1 Security update for MozillaFirefox 2015-03-24T17:10:32Z 2015-03-24T17:10:32Z
suse-su-2015:0670-1 Security update for pigz 2015-03-24T17:18:12Z 2015-03-24T17:18:12Z
suse-su-2015:0694-1 Security update for python-Django 2015-03-25T23:21:02Z 2015-03-25T23:21:02Z
suse-su-2015:0658-1 Security Update for Linux Kernel 2015-03-26T17:36:44Z 2015-03-26T17:36:44Z
suse-su-2015:0688-1 Security update for webkitgtk 2015-03-27T10:58:10Z 2015-03-27T10:58:10Z
suse-su-2015:1109-1 Security update for python-Django 2015-03-30T09:04:33Z 2015-03-30T09:04:33Z
suse-su-2015:1112-1 Security update for python-Django 2015-03-30T09:04:33Z 2015-03-30T09:04:33Z
suse-su-2015:0745-1 Security update for Xen 2015-03-30T14:19:22Z 2015-03-30T14:19:22Z
suse-su-2015:0746-1 Security update for Xen 2015-03-30T14:25:37Z 2015-03-30T14:25:37Z
suse-su-2015:0747-1 Security update for Xen 2015-03-30T14:29:30Z 2015-03-30T14:29:30Z
ID Description Published Updated
alsa-2021:2569 Moderate: libxml2 security update 2021-06-29T13:42:19Z 2021-11-12T10:20:56Z
alsa-2021:3075 Low: libuv security update 2021-08-10T12:00:55Z 2021-11-12T10:20:56Z
alsa-2021:3572 Moderate: nss and nspr security, bug fix, and enhancement update 2021-09-21T07:08:30Z 2021-11-12T10:20:56Z
alsa-2021:3819 Important: .NET 5.0 security and bugfix update 2021-10-12T19:35:54Z 2021-11-12T10:20:56Z
alsa-2021:3891 Important: java-11-openjdk security update 2021-10-20T12:41:00Z 2021-11-12T10:20:56Z
alsa-2021:3893 Important: java-1.8.0-openjdk security and bug fix update 2021-10-20T12:38:15Z 2021-11-12T10:20:56Z
alsa-2021:4042 Important: flatpak security update 2021-11-01T13:11:58Z 2021-11-12T10:20:56Z
alsa-2021:4123 Important: firefox security update 2021-11-03T19:23:08Z 2021-11-12T10:20:56Z
alsa-2021:4130 Important: thunderbird security update 2021-11-04T16:03:41Z 2021-11-12T10:20:56Z
alsa-2021:4149 Moderate: python-pillow security update 2021-11-09T08:24:34Z 2021-11-12T10:20:56Z
alsa-2021:4153 Moderate: dnsmasq security and bug fix update 2021-11-09T08:24:48Z 2021-11-12T10:20:56Z
alsa-2021:4158 Moderate: python-lxml security update 2021-11-09T08:26:20Z 2021-11-12T10:20:56Z
alsa-2021:4161 Moderate: python-jinja2 security update 2021-11-09T08:26:43Z 2021-11-12T10:20:56Z
alsa-2021:4179 Low: file-roller security update 2021-11-09T08:32:50Z 2021-11-12T10:20:56Z
alsa-2021:4181 Moderate: mutt security, bug fix, and enhancement update 2021-11-09T08:33:45Z 2021-11-12T10:20:56Z
alsa-2021:4198 Moderate: edk2 security, bug fix, and enhancement update 2021-11-09T08:37:02Z 2021-11-12T10:20:56Z
alsa-2021:4201 Moderate: babel security and bug fix update 2021-11-09T08:37:19Z 2021-11-12T10:20:56Z
alsa-2021:4226 Moderate: grafana security, bug fix, and enhancement update 2021-11-09T08:46:47Z 2021-11-12T10:20:56Z
alsa-2021:4231 Moderate: libwebp security update 2021-11-09T08:47:24Z 2021-11-12T10:20:56Z
alsa-2021:4236 Low: tcpdump security and bug fix update 2021-11-09T08:48:42Z 2021-11-12T10:20:56Z
alsa-2021:4315 Moderate: spamassassin security update 2021-11-09T08:58:53Z 2021-11-12T10:20:56Z
alsa-2021:4319 Moderate: compat-exiv2-026 security update 2021-11-09T09:00:36Z 2021-11-12T10:20:56Z
alsa-2021:4321 Moderate: linuxptp security, bug fix, and enhancement update 2021-11-09T09:00:47Z 2021-11-12T10:20:56Z
alsa-2021:4324 Moderate: python-psutil security update 2021-11-09T09:01:04Z 2021-11-12T10:20:56Z
alsa-2021:4326 Moderate: libX11 security update 2021-11-09T09:01:07Z 2021-11-12T10:20:56Z
alsa-2021:4364 Moderate: binutils security update 2021-11-09T09:11:20Z 2021-11-12T10:20:56Z
alsa-2021:4368 Moderate: openssh security update 2021-11-09T09:11:41Z 2021-11-12T10:20:56Z
alsa-2021:4384 Moderate: bind security and bug fix update 2021-11-09T09:16:00Z 2021-11-12T10:20:56Z
alsa-2021:4387 Low: libssh security update 2021-11-09T09:16:07Z 2021-11-12T10:20:56Z
alsa-2021:4393 Moderate: cups security and bug fix update 2021-11-09T09:16:27Z 2021-11-12T10:20:56Z
ID Description Published Updated
osv-2020-373 UNKNOWN READ in url_decode 2020-07-01T00:00:05.814415Z 2022-04-13T03:04:31.715630Z
osv-2020-406 Global-buffer-overflow in lwan_strbuf_append_str 2020-07-01T00:00:07.709109Z 2022-04-13T03:04:31.720558Z
osv-2020-410 Global-buffer-overflow in lex_multiline_string 2020-07-01T00:00:07.995615Z 2022-04-13T03:04:31.725276Z
osv-2020-665 Global-buffer-overflow in backup 2020-07-01T00:00:23.491385Z 2022-04-13T03:04:31.729939Z
osv-2020-668 Heap-buffer-overflow in post_process_template 2020-07-01T00:00:23.600853Z 2022-04-13T03:04:31.734774Z
osv-2020-337 Global-buffer-overflow in lex_multiline_string 2020-07-01T00:00:03.807910Z 2022-04-13T03:04:31.739773Z
osv-2020-335 Global-buffer-overflow in template_fuzzer.cc 2020-07-01T00:00:03.741355Z 2022-04-13T03:04:31.744454Z
osv-2020-685 Global-buffer-overflow in backup 2020-07-01T00:00:24.689135Z 2022-04-13T03:04:31.749086Z
osv-2020-431 Global-buffer-overflow in parse_headers 2020-07-01T00:00:09.131195Z 2022-04-13T03:04:31.753751Z
osv-2020-462 Global-buffer-overflow in strsep_char 2020-07-01T00:00:10.876736Z 2022-04-13T03:04:31.758468Z
osv-2020-632 Global-buffer-overflow in parse_http_request 2020-07-01T00:00:21.523430Z 2022-04-13T03:04:31.763179Z
osv-2020-504 Global-buffer-overflow in lwan_parse_rfc_time 2020-07-01T00:00:13.515175Z 2022-04-13T03:04:31.767885Z
osv-2020-1165 Global-buffer-overflow in parse_headers 2020-07-22T21:49:52.512552Z 2022-04-13T03:04:31.772806Z
osv-2021-559 Uncaught exception in java.base/java.nio.CharBuffer.wrap 2021-03-25T00:01:07.913753Z 2022-04-13T03:04:31.778313Z
osv-2021-558 Uncaught exception in java.base/java.nio.Buffer.<init> 2021-03-25T00:01:05.933424Z 2022-04-13T03:04:31.784176Z
osv-2021-564 Uncaught exception in com.fasterxml.jackson.databind.deser.std.BaseNodeDeserializer.deserializeArray 2021-03-27T00:00:03.319694Z 2022-04-13T03:04:31.790105Z
osv-2021-556 Uncaught exception in java.base/java.util.Arrays.copyOf 2021-03-25T00:01:02.373925Z 2022-04-13T03:04:31.796152Z
osv-2021-555 Uncaught exception in java.base/java.util.concurrent.ConcurrentHashMap.putVal 2021-03-25T00:00:09.158172Z 2022-04-13T03:04:31.802020Z
osv-2020-204 Negative-size-param in parquet::ColumnReaderImplBase<parquet::PhysicalType< 2020-06-24T01:51:18.827983Z 2022-04-13T03:04:31.807491Z
osv-2020-761 Heap-buffer-overflow in arrow::ConcatenateBuffers 2020-07-09T00:00:21.470735Z 2022-04-13T03:04:31.812566Z
osv-2020-1050 UNKNOWN READ in arrow::Status arrow::internal::ValidateArrayVisitor::ValidateListArray<arrow::La 2020-07-22T21:49:43.248577Z 2022-04-13T03:04:31.817970Z
osv-2020-27 Heap-buffer-overflow in parquet::LevelDecoder::SetData 2020-06-24T01:51:10.819423Z 2022-04-13T03:04:31.823547Z
osv-2020-22 Container-overflow in parquet::schema::Unflatten 2020-06-24T01:51:10.604817Z 2022-04-13T03:04:31.828829Z
osv-2020-138 Heap-buffer-overflow in org::apache::arrow::flatbuf::Message::Verify 2020-06-24T01:51:15.842848Z 2022-04-13T03:04:31.834108Z
osv-2020-1117 Heap-buffer-overflow in arrow::internal::CountSetBits 2020-07-22T21:49:48.392014Z 2022-04-13T03:04:31.839619Z
osv-2020-1159 Segv on unknown address in arrow::ipc::ReadMessage 2020-07-22T21:49:52.147608Z 2022-04-13T03:04:31.845158Z
osv-2020-104 Heap-buffer-overflow in void arrow::util::internal::ByteStreamSlitDecodeSSE2<double> 2020-06-24T01:51:14.239845Z 2022-04-13T03:04:31.850595Z
osv-2020-974 Heap-buffer-overflow in arrow::Status arrow::VisitArrayInline<arrow::internal::ValidateArrayDataVisitor> 2020-07-22T21:49:37.181080Z 2022-04-13T03:04:31.856092Z
osv-2020-1682 Heap-buffer-overflow in void arrow::internal::TransferBitmap< 2020-09-01T00:00:34.917477Z 2022-04-13T03:04:31.861612Z
osv-2020-5 Heap-buffer-overflow in virtual thunk to parquet::ByteStreamSplitDecoder<parquet::PhysicalType< 2020-06-24T01:51:09.174614Z 2022-04-13T03:04:31.866912Z
ID Description Published Updated
rustsec-2019-0017 Panic during initialization of Lazy<T> might trigger undefined behavior 2019-09-01T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0018 Internally mutating methods take immutable ref self 2019-09-02T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0019 HMAC-BLAKE2 algorithms compute incorrect results 2019-08-25T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0020 fix unsound APIs that could lead to UB 2019-09-06T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0021 `Matrix::zip_elements` causes double free 2019-09-14T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0022 Stream callback function is not unwind safe 2019-09-14T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0023 Cloned interners may read already dropped strings 2019-08-24T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0025 Flaw in CBOR deserializer allows stack overflow 2019-10-03T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0026 generichash::Digest::eq always return true 2019-10-11T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0027 Flaw in Scalar::check_overflow allows side-channel timing attack 2019-10-14T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0028 Unsound `impl Follow for bool` 2019-10-20T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0029 ChaCha20 counter overflow can expose repetitions in the keystream 2019-10-22T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0033 Integer Overflow in HeaderMap::reserve() can cause Denial of Service 2019-11-16T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0034 HeaderMap::Drain API is unsound 2019-11-16T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0036 Type confusion if __private_get_type_id__ is overridden 2019-11-13T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0037 Compiler optimisation for next_with_timeout in pnet::transport::IcmpTransportChannelIterator flaws to SEGFAULT 2019-06-11T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0038 Fix for UB in failure to catch panics crossing FFI boundaries 2019-03-10T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2019-0039 typemap is Unmaintained 2019-04-06T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2020-0001 Stack overflow when resolving additional records from MX or SRV null targets 2020-01-06T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2020-0002 Parsing a specially crafted message can result in a stack overflow 2020-01-16T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2020-0004 sigstack allocation bug can cause memory corruption or leak 2020-01-24T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2020-0005 CBox API allows to de-reference raw pointers without `unsafe` code 2020-03-19T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2020-0006 Flaw in `realloc` allows reading unknown memory 2020-03-24T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2020-0007 use-after or double free of allocated memory 2020-03-27T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2020-0008 Flaw in hyper allows request smuggling by sending a body in GET requests 2020-03-19T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2020-0009 `read_scalar` and `read_scalar_at` allow transmuting values without `unsafe` blocks 2020-04-11T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2020-0011 Library exclusively intended to obfuscate code. 2020-04-23T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2020-0012 Relies on undefined behavior of `char::from_u32_unchecked` 2020-04-24T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2020-0013 fake-static allows converting any reference into a `'static` reference 2020-04-24T12:00:00Z 2023-06-13T13:10:24Z
rustsec-2020-0014 Various memory safety issues 2020-04-23T12:00:00Z 2023-06-13T13:10:24Z
ID Description Published Updated
bit-gitea-2021-45325 2024-03-06T10:54:55.605Z 2025-04-03T14:40:37.652Z
bit-gitea-2021-45326 2024-03-06T10:54:46.071Z 2025-04-03T14:40:37.652Z
bit-gitea-2021-45327 2024-03-06T10:54:36.193Z 2025-04-03T14:40:37.652Z
bit-gitea-2021-45328 2024-03-06T10:54:25.099Z 2025-04-03T14:40:37.652Z
bit-gitea-2021-45329 2024-03-06T10:54:13.704Z 2025-04-03T14:40:37.652Z
bit-gitea-2021-45330 2024-03-06T10:54:05.371Z 2025-04-03T14:40:37.652Z
bit-gitea-2021-45331 2024-03-06T10:53:52.704Z 2025-04-03T14:40:37.652Z
bit-gitea-2022-27313 2024-03-06T10:53:12.361Z 2025-04-03T14:40:37.652Z
bit-gitea-2022-30781 2024-03-06T10:52:59.101Z 2025-04-03T14:40:37.652Z
bit-gitea-2022-38183 2024-03-06T10:52:48.810Z 2025-04-03T14:40:37.652Z
bit-gitea-2022-38795 2024-03-06T10:52:39.003Z 2025-04-03T14:40:37.652Z
bit-gitea-2022-42968 2024-03-06T10:52:28.405Z 2025-04-03T14:40:37.652Z
bit-gitea-2022-46685 2024-03-06T10:52:18.708Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10073 2024-03-06T11:24:11.903Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10074 2024-03-06T11:24:10.672Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10075 2024-03-06T11:24:09.488Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10076 2024-03-06T11:24:08.301Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10077 2024-03-06T11:24:07.050Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10078 2024-03-06T11:24:05.803Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10079 2024-03-06T11:24:04.533Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10080 2024-03-06T11:24:03.257Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10081 2024-03-06T11:24:02.000Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10082 2024-03-06T11:24:00.768Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10083 2024-03-06T11:23:59.550Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10084 2024-03-06T11:23:58.320Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10085 2024-03-06T11:23:57.115Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10086 2024-03-06T11:23:55.896Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10087 2024-03-06T11:23:54.648Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10088 2024-03-06T11:23:53.420Z 2025-04-03T14:40:37.652Z
bit-gitlab-2020-10089 2024-03-06T11:23:52.161Z 2025-04-03T14:40:37.652Z
ID Description Published Updated
cleanstart-2026-ph90623 excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate 2026-01-30T14:49:52.682724Z 2026-01-29T18:58:54Z
cleanstart-2026-pi00621 excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate 2026-01-30T15:03:52.974587Z 2026-01-29T18:58:54Z
cleanstart-2026-pk62208 excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate 2026-01-30T16:20:55.127319Z 2026-01-29T18:58:54Z
cleanstart-2026-pk69606 SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption 2026-01-30T16:08:25.435888Z 2026-01-29T18:58:54Z
cleanstart-2026-pk92575 ParseAddress function constructs domain-literal address components through repeated string concatenation 2026-01-30T14:35:52.456913Z 2026-01-29T18:58:54Z
cleanstart-2026-po40318 go-redis is the official Redis client library for the Go programming language 2026-01-30T15:31:53.772564Z 2026-01-29T18:58:54Z
cleanstart-2026-ps30901 Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes 2026-01-30T16:07:55.053827Z 2026-01-29T18:58:54Z
cleanstart-2026-pt11267 excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate 2026-01-30T16:22:25.604414Z 2026-01-29T18:58:54Z
cleanstart-2026-pw02676 Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate 2026-01-30T16:35:26.383203Z 2026-01-29T18:58:54Z
cleanstart-2026-pw33232 SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process 2026-01-30T15:09:53.441606Z 2026-01-29T18:58:54Z
cleanstart-2026-py85990 tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing 2026-01-30T14:07:50.722290Z 2026-01-29T18:58:54Z
cleanstart-2026-py88758 Cancelling a query (e 2026-01-30T15:02:53.130919Z 2026-01-29T18:58:54Z
cleanstart-2026-pz62650 Cancelling a query (e 2026-01-30T16:41:55.453512Z 2026-01-29T18:58:54Z
cleanstart-2026-qd78411 SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process 2026-01-30T16:36:25.408698Z 2026-01-29T18:58:54Z
cleanstart-2026-qe58701 excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate 2026-01-30T16:22:55.193625Z 2026-01-29T18:58:54Z
cleanstart-2026-qj89068 SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process 2026-01-30T15:34:54.378061Z 2026-01-29T18:58:54Z
cleanstart-2026-qk01721 go-redis is the official Redis client library for the Go programming language 2026-01-30T15:32:54.211133Z 2026-01-29T18:58:54Z
cleanstart-2026-qm19832 Moby is an open source container framework developed by Docker Inc 2026-01-30T16:13:25.141915Z 2026-01-29T18:58:54Z
cleanstart-2026-qv26039 Within HostnameError 2026-01-30T16:03:24.653963Z 2026-01-29T18:58:54Z
cleanstart-2026-qw16951 SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process 2026-01-30T15:48:54.464404Z 2026-01-29T18:58:54Z
cleanstart-2026-qz70444 Within HostnameError 2026-01-30T17:24:26.605623Z 2026-01-29T18:58:54Z
cleanstart-2026-rb28539 Within HostnameError 2026-01-30T14:43:52.571458Z 2026-01-29T18:58:54Z
cleanstart-2026-rd08428 excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate 2026-01-30T15:17:23.554517Z 2026-01-29T18:58:54Z
cleanstart-2026-rg55910 excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate 2026-01-30T16:27:25.253140Z 2026-01-29T18:58:54Z
cleanstart-2026-rj88561 excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate 2026-01-30T15:03:53.732429Z 2026-01-29T18:58:54Z
cleanstart-2026-rl45001 tar 2026-01-30T15:01:22.967754Z 2026-01-29T18:58:54Z
cleanstart-2026-rn77098 excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate 2026-01-30T16:25:55.300453Z 2026-01-29T18:58:54Z
cleanstart-2026-rq53330 Within HostnameError 2026-01-30T15:17:53.658995Z 2026-01-29T18:58:54Z
cleanstart-2026-rr90125 Cancelling a query (e 2026-01-30T15:32:53.790454Z 2026-01-29T18:58:54Z
cleanstart-2026-rt10702 Within HostnameError 2026-01-30T16:30:25.697056Z 2026-01-29T18:58:54Z
ID Description Published Updated
drupal-contrib-2019-013 2019-02-06T17:36:06.000Z 2023-08-11T19:22:41.000Z
drupal-contrib-2019-014 2019-02-06T18:13:19.000Z 2023-08-11T19:23:01.000Z
drupal-contrib-2019-004 2019-01-23T17:01:58.000Z 2023-08-11T19:25:48.000Z
drupal-contrib-2018-078 2018-12-05T19:24:02.000Z 2023-08-11T21:09:51.000Z
drupal-contrib-2018-081 2018-12-19T17:53:49.000Z 2023-08-11T21:10:49.000Z
drupal-contrib-2018-071 2018-10-31T14:59:17.000Z 2023-08-11T21:13:17.000Z
drupal-contrib-2018-073 2018-10-31T17:53:57.000Z 2023-08-11T21:14:25.000Z
drupal-contrib-2018-074 2018-11-28T17:32:56.000Z 2023-08-11T21:15:17.000Z
drupal-contrib-2018-059 2018-09-05T17:22:50.000Z 2023-08-11T21:18:37.000Z
drupal-contrib-2018-067 2018-10-17T16:29:08.000Z 2023-08-11T21:21:48.000Z
drupal-contrib-2018-055 2018-08-08T17:14:32.000Z 2023-08-11T21:24:54.000Z
drupal-contrib-2018-057 2018-08-29T16:26:33.000Z 2023-08-11T21:25:35.000Z
drupal-contrib-2018-038 2018-06-06T12:58:31.000Z 2023-08-11T21:28:55.000Z
drupal-contrib-2018-039 2018-06-06T13:01:46.000Z 2023-08-11T21:29:11.000Z
drupal-contrib-2018-040 2018-06-06T13:05:27.000Z 2023-08-11T21:31:17.000Z
drupal-contrib-2018-018 2018-04-18T15:45:18.000Z 2023-08-11T21:35:30.000Z
drupal-contrib-2018-022 2018-04-25T17:37:20.000Z 2023-08-11T21:38:26.000Z
drupal-contrib-2018-021 2018-04-25T17:43:28.000Z 2023-08-11T21:38:48.000Z
drupal-contrib-2018-025 2018-05-09T14:16:32.000Z 2023-08-11T21:39:24.000Z
drupal-contrib-2018-027 2018-05-09T20:28:16.000Z 2023-08-11T21:40:01.000Z
drupal-contrib-2018-008 2018-02-07T18:45:12.000Z 2023-08-11T21:41:56.000Z
drupal-contrib-2018-014 2018-02-21T19:04:59.000Z 2023-08-11T21:43:18.000Z
drupal-contrib-2018-015 2018-02-21T20:12:22.000Z 2023-08-11T21:43:40.000Z
drupal-contrib-2018-016 2018-03-21T16:59:32.000Z 2023-08-11T21:44:04.000Z
drupal-contrib-2018-017 2018-03-21T17:05:41.000Z 2023-08-11T21:44:22.000Z
drupal-contrib-2018-001 2018-01-10T17:57:53.000Z 2023-08-11T21:45:33.000Z
drupal-contrib-2018-002 2018-01-10T18:02:19.000Z 2023-08-11T21:46:04.000Z
drupal-contrib-2017-091 2017-12-06T18:44:03.000Z 2023-08-21T13:26:56.000Z
drupal-contrib-2017-094 2017-12-20T14:12:47.000Z 2023-08-21T13:28:00.000Z
drupal-contrib-2017-082 2017-11-08T17:16:30.000Z 2023-08-21T13:31:01.000Z
ID Description Updated
ID Description Published Updated
certa-2012-ale-010 Vulnérabilité dans Internet Explorer 2012-12-31T00:00:00.000000 2013-01-15T00:00:00.000000
certa-2013-ale-001 Vulnérabilités dans Oracle Java 2013-01-10T00:00:00.000000 2013-01-15T00:00:00.000000
certa-2009-ale-014 Multiples vulnérabilités du client de messagerie Mozilla Thunderbird 2009-08-07T00:00:00.000000 2013-02-05T00:00:00.000000
certa-2012-ale-001 Vulnérabilité dans Cisco IronPort 2012-02-01T00:00:00.000000 2013-02-05T00:00:00.000000
certa-2007-ale-011 Vulnérabilité du composant d'indexation des serveurs Microsoft IIS 2007-06-06T00:00:00.000000 2013-02-19T00:00:00.000000
certa-2009-ale-017 Vulnérabilités dans l'implémentation TCP/IP de divers produits 2009-09-09T00:00:00.000000 2013-02-19T00:00:00.000000
certa-2008-ale-013 Vulnérabilité du service sadmind de Sun Solaris 2008-10-17T00:00:00.000000 2013-02-21T00:00:00.000000
certa-2013-ale-002 Vulnérabilités dans Adobe Reader et Acrobat 2013-02-14T00:00:00.000000 2013-02-21T00:00:00.000000
certa-2013-ale-003 Vulnérabilité dans Microsoft Internet Explorer 8 2013-05-06T00:00:00.000000 2013-05-15T00:00:00.000000
certa-2013-ale-004 Vulnérabilité dans Adobe ColdFusion 2013-05-10T00:00:00.000000 2013-05-15T00:00:00.000000
certa-2013-ale-005 Vulnérabilité dans le noyau Linux 2013-05-14T00:00:00.000000 2013-05-24T00:00:00.000000
certa-2005-ale-013 Vulnérabilité dans Citrix Metaframe Presentation 2005-10-07T00:00:00.000000 2013-06-06T00:00:00.000000
certa-2013-ale-006 Vulnérabilité dans Microsoft Internet Explorer 2013-09-18T00:00:00.000000 2013-10-09T00:00:00.000000
certa-2013-ale-007 Vulnérabilité dans un composant graphique de Microsoft 2013-11-06T00:00:00.000000 2013-12-10T00:00:00.000000
certa-2013-ale-008 Vulnérabilité critique dans le noyau de Microsoft Windows 2013-11-28T00:00:00.000000 2014-01-16T00:00:00.000000
certfr-2014-ale-001 Vulnérabilité dans Microsoft Internet Explorer 2014-02-21T00:00:00.000000 2014-03-12T00:00:00.000000
certfr-2014-ale-002 Vulnérabilité dans Microsoft Word 2014-03-25T00:00:00.000000 2014-04-09T00:00:00.000000
certfr-2014-ale-004 Vulnérabilité dans Apache Struts 2014-04-25T00:00:00.000000 2014-04-29T00:00:00.000000
certfr-2014-ale-005 Vulnérabilité dans Microsoft Internet Explorer 2014-04-28T00:00:00.000000 2014-05-02T00:00:00.000000
certfr-2014-ale-003 Vulnérabilité dans OpenSSL 2014-04-08T00:00:00.000000 2014-07-30T00:00:00.000000
certfr-2014-ale-006 Vulnérabilité dans GNU bash 2014-09-25T00:00:00.000000 2014-09-30T00:00:00.000000
certfr-2014-ale-007 Vulnérabilité dans SSLv3 2014-10-15T00:00:00.000000 2014-10-15T00:00:00.000000
certfr-2014-ale-009 Vulnérabilité dans Microsoft OLE 2014-10-22T00:00:00.000000 2014-11-12T00:00:00.000000
certfr-2014-ale-008 Vulnérabilité dans Drupal 2014-10-16T00:00:00.000000 2015-01-30T00:00:00.000000
certfr-2014-ale-010 Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows 2014-11-11T00:00:00.000000 2015-01-30T00:00:00.000000
certfr-2014-ale-011 Vulnérabilité de l'implémentation Kerberos dans Microsoft Windows 2014-11-18T00:00:00.000000 2015-01-30T00:00:00.000000
certfr-2015-ale-001 Vulnérabilité dans Adobe Flash Player 2015-01-22T00:00:00.000000 2015-01-30T00:00:00.000000
certfr-2015-ale-002 Vulnérabilité dans Adobe Flash Player 2015-02-02T00:00:00.000000 2015-02-05T00:00:00.000000
certfr-2015-ale-004 Vulnérabilité dans Microsoft Internet Explorer 2015-02-10T00:00:00.000000 2015-03-31T00:00:00.000000
certfr-2015-ale-003 Nouvelle campagne d'hameçonnage de type rançongiciel 2015-02-05T00:00:00.000000 2015-07-10T00:00:00.000000
ID Description Published Updated
certa-2001-avi-097 Vulnérabilités de SSH sur CISCO 2001-09-21T00:00:00.000000 2001-09-21T00:00:00.000000
certa-2001-avi-098 Vulnérabilités dans le logiciel Interscan eManager de Trend Micro 2001-09-24T00:00:00.000000 2001-09-24T00:00:00.000000
certa-2001-avi-099 Vulnérabilité dans ArcServe pour Windows NT 2001-09-25T00:00:00.000000 2001-09-25T00:00:00.000000
certa-2001-avi-100 Vulnérabilité de Microsoft Exchange 2000 Server Outlook Web Access 2001-09-27T00:00:00.000000 2001-09-27T00:00:00.000000
certa-2001-avi-101 Vulnérabilité dans le paquetage setserial 2001-09-27T00:00:00.000000 2001-09-27T00:00:00.000000
certa-2001-avi-102 Vulnérabilité dans le garde-barrière PIX de Cisco 2001-09-28T00:00:00.000000 2001-09-28T00:00:00.000000
certa-2001-avi-103 Vulnérabilité dans le proxy Squid 2001-09-28T00:00:00.000000 2001-09-28T00:00:00.000000
certa-2001-avi-105 Vulnérabilité dans les agents de supervision Compaq 2001-10-01T00:00:00.000000 2001-10-01T00:00:00.000000
certa-2001-avi-106 Multiples vulnérabilités dans Sendmail 2001-10-02T00:00:00.000000 2001-10-02T00:00:00.000000
certa-2001-avi-108 Vulnérabilité dans le garde-barrière PIX de Cisco 2001-10-04T00:00:00.000000 2001-10-04T00:00:00.000000
certa-2001-avi-109 Vulnérabilité dans <TT>rpcbind</TT> sous HP 2001-10-04T00:00:00.000000 2001-10-04T00:00:00.000000
certa-2001-avi-110 Vulnérabilité de Network Node Manager sous HP Openview 2001-10-04T00:00:00.000000 2001-10-04T00:00:00.000000
certa-2001-avi-111 Vulnérabilité dans les logiciels Excel et PowerPoint de Microsoft 2001-10-05T00:00:00.000000 2001-10-05T00:00:00.000000
certa-2001-avi-112 Vulnérabilité de yppasswd 2001-10-08T00:00:00.000000 2001-10-08T00:00:00.000000
certa-2001-avi-113 Vulnérabilité dans PhpNuke 2001-10-08T00:00:00.000000 2001-10-08T00:00:00.000000
certa-2001-avi-114 Vulnérabilité dans le moteur d'indexation ht://Dig 2001-10-12T00:00:00.000000 2001-10-12T00:00:00.000000
certa-2001-avi-117 Vulnérabilité de Norton Antivirus LiveUpdate 2001-10-18T00:00:00.000000 2001-10-18T00:00:00.000000
certa-2001-avi-104 Vulnérabilités multiples dans l'implémentation OpenSSH du protocole SSH v2 2001-09-28T00:00:00.000000 2001-10-19T00:00:00.000000
certa-2001-avi-115 Faille de sécurité dans Zope 2001-10-12T00:00:00.000000 2001-10-19T00:00:00.000000
certa-2001-avi-119 Vulnérabilité de l'interface Web du serveur Novell GroupWise 2001-10-19T00:00:00.000000 2001-10-19T00:00:00.000000
certa-2001-avi-120 Vulnérabilité dans Xlock sous Solaris 2001-10-19T00:00:00.000000 2001-10-19T00:00:00.000000
certa-2001-avi-121 Vulnérabilité des Cisco IOS et CatOS sous le protocole CDP 2001-10-19T00:00:00.000000 2001-10-19T00:00:00.000000
certa-2001-avi-122 Déni de service sur Citrix MetaFrame 2001-10-19T00:00:00.000000 2001-10-19T00:00:00.000000
certa-2001-avi-123 Vulnérabilités dans procmail 2001-10-22T00:00:00.000000 2001-10-22T00:00:00.000000
certa-2001-avi-116 Vulnérabilité de Microsoft Internet Explorer 2001-10-16T00:00:00.000000 2001-10-23T00:00:00.000000
certa-2001-avi-125 Débordement de mémoire de Oracle 9iAS Web Cache 2001-10-24T00:00:00.000000 2001-10-24T00:00:00.000000
certa-2001-avi-126 Vulnérabilité dans le protocole RDP sous Windows 2000 et NT Server 2001-10-24T00:00:00.000000 2001-10-24T00:00:00.000000
certa-2001-avi-127 Vulnérabilité sous Mac OS X 2001-10-24T00:00:00.000000 2001-10-24T00:00:00.000000
certa-2001-avi-128 Vulnérabilité d'Internet Explorer 5.1 sous Mac OS X 2001-10-26T00:00:00.000000 2001-10-26T00:00:00.000000
certa-2001-avi-129 Vulnérabilité dans la machine virtuelle java (JRE) de SUN. 2001-10-26T00:00:00.000000 2001-10-26T00:00:00.000000
ID Description Published Updated
jvndb-2007-000087 CGI RESCUE WebFORM missing mail content vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000088 Shopping Basket Professional vulnerable to OS command injection 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000090 b2evolution cross-site scripting vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000091 Sleipnir RSS bar vulnerable in handling RSS data in an inappropriate security zone 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000093 Sleipnir RSS bar vulnerable in handling RSS data in an inappropriate security zone 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000094 MODx cross-site scripting vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000127 CCC Cleaner buffer overflow vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000134 Sage vulnerable to arbitrary script execution 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000135 CCC Cleaner buffer overflow vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000159 Adobe JRun cross-site scripting vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000160 ColdFusion cross-site scripting vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000161 ColdFusion error page cross-site scripting vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000165 Ariel AirOne series cross-site scripting vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000176 Mozilla Firefox cross-site scripting vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000199 CCC Cleaner division-by-zero vulnerability when scanning UPX-packed executables 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000200 Trac cross-site scripting vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000215 FENCE-Pro and Systemwalker Desktop Encryption self-decoding file vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000218 Interstage Application Server cross-site scripting vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000225 NewsGlue and Ikinari Jijyoutsuu arbitrary script execution vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000227 CruiseWorks and Minna De Office vulnerable in access restrictions 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000228 MailDwarf cross-site scripting vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000229 MailDwarf vulnerability allows unauthorized sending of emails 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000236 Overlay Weaver cross-site scripting vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000259 open-gorotto cross-site scripting vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000260 Shihonkanri Plus Ver2 GOOUT directory traversal vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000290 InfoBarrier4 self-decrypted file vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000301 Canon Network Camera Server VB100 Series vulnerable to cross-site scripting 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000322 Lunascape RSS reader arbitrary script execution vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000395 Homepage Builder sample CGI programs vulnerable to OS command injection 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
jvndb-2007-000400 Advance-Flow cross-site scripting vulnerability 2008-05-21T00:00+09:00 2008-05-21T00:00+09:00
ID Description Published Updated
cnvd-2015-00088 Linux Kernel 'keys/gc.c'本地内存破坏漏洞 2015-01-07 2015-01-08
cnvd-2015-00089 Apache Traffic Server 'HttpTransact.cc'拒绝服务漏洞 2015-01-07 2015-01-08
cnvd-2015-00090 EMC Documentum Web Development Kit (WDK)存在未明漏洞 2015-01-07 2015-01-08
cnvd-2015-00091 EMC Documentum Web Development Kit (WDK)存在未明框架注入漏洞 2015-01-07 2015-01-08
cnvd-2015-00092 EMC Documentum Web Development Kit (WDK)存在多个跨站脚本漏洞 2015-01-07 2015-01-08
cnvd-2015-00093 EMC Documentum Web Development Kit (WDK)URL重定向漏洞 2015-01-07 2015-01-08
cnvd-2015-00094 EMC Documentum Web Development Kit (WDK)跨站请求伪造漏洞 2015-01-07 2015-01-08
cnvd-2015-00095 AdaptCMS任意文件上传漏洞 2015-01-07 2015-01-08
cnvd-2015-00096 AdaptCMS 'Referer' Header Field HTTP开放重定向漏洞 2015-01-07 2015-01-08
cnvd-2015-00097 AdaptCMS存在多个HTML注入漏洞 2015-01-07 2015-01-08
cnvd-2015-00098 HumHub SQL注入漏洞 2015-01-07 2015-01-08
cnvd-2015-00099 Apache POI拒绝服务漏洞 2015-01-07 2015-01-08
cnvd-2015-00100 Apache Solr跨站脚本漏洞 2015-01-07 2015-01-08
cnvd-2015-00101 McAfee ePolicy Orchestrator 'conditionXML'参数XML外部实体注入漏洞 2015-01-07 2015-01-08
cnvd-2015-00102 Xen拒绝服务漏洞(CNVD-2015-00102) 2015-01-07 2015-01-08
cnvd-2015-00103 FlexPaper 'FlexPaperViewer.swf'跨站脚本漏洞 2015-01-07 2015-01-08
cnvd-2015-00104 FlexPaper ‘FlexPaperViewer.swf'’内容欺骗漏洞 2015-01-07 2015-01-08
cnvd-2015-00105 Sefrengo CMS 'main.php'存在多个SQL注入漏洞 2015-01-07 2015-01-08
cnvd-2015-00106 Sefrengo CMS 'main.php'跨站脚本漏洞 2015-01-07 2015-01-08
cnvd-2015-00144 e107 ' e107_admin/users.php'跨站请求伪造漏洞 2015-01-08 2015-01-09
cnvd-2015-00145 Hex-Rays IDA Pro缓冲区溢出漏洞 2015-01-08 2015-01-09
cnvd-2015-00146 Ruby RedCloth library跨站脚本漏洞 2015-01-08 2015-01-09
cnvd-2015-00147 Easy File Sharing Web Server跨站脚本漏洞(CNVD-2015-00147) 2015-01-08 2015-01-09
cnvd-2015-00148 Microsoft Dynamics CRM跨站脚本漏洞 2015-01-07 2015-01-09
cnvd-2015-00150 gcab 'gcab-folder.c'本地目录遍历漏洞 2015-01-06 2015-01-09
cnvd-2015-00151 SAP NetWeaver Business Client存在多个跨站脚本漏洞 2015-01-08 2015-01-09
cnvd-2015-00152 ZOHO ManageEngine ADSelfService Plus跨站脚本漏洞(CNVD-2015-00152) 2015-01-08 2015-01-09
cnvd-2015-00153 CGManager本地信息泄露漏洞 2015-01-08 2015-01-09
cnvd-2015-00154 Strongswan IKEv2 Payloads远程拒绝服务漏洞 2015-01-08 2015-01-09
cnvd-2015-00155 D-Bus本地权限提升漏洞 2015-01-08 2015-01-09
ID Description Published Updated
bdu:2014-00329 Уязвимость микропрограммного обеспечения маршрутизатора D–Link DSR–500, позволяющая злоум… 07.07.2016 28.11.2016
bdu:2014-00331 Уязвимость браузера Google Chrome, позволяющая злоумышленнику выполнить произвольный код … 05.07.2016 28.11.2016
bdu:2014-00334 Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслужи… 05.07.2016 28.11.2016
bdu:2014-00335 Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслужи… 05.07.2016 28.11.2016
bdu:2014-00336 Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслужи… 05.07.2016 28.11.2016
bdu:2014-00337 Уязвимость операционной системы Windows, позволяющая злоумышленнику вызвать отказ в обслу… 05.07.2016 28.11.2016
bdu:2014-00338 Уязвимость системы управления базами данных MySQL, позволяющая злоумышленнику вызвать отк… 05.07.2016 28.11.2016
bdu:2014-00339 Уязвимость системы управления базами данных Marida DB, позволяющая злоумышленнику вызвать… 05.07.2016 28.11.2016
bdu:2014-00340 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00341 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00342 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00343 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00344 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00345 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00346 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00347 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00348 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00349 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00350 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00351 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00352 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00353 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00354 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00355 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00356 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00357 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00358 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00359 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00360 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
bdu:2014-00361 Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… 05.07.2016 28.11.2016
ID Description Updated
var-202011-1529 Harbin Zhonglong Baiying Technology Development Co., Ltd. was established on May 29, 2013… 2022-05-04T08:33:45.645000Z
var-202011-1277 A CWE-334: Small Space of Random Values vulnerability exists in Modicon M221 (all referen… 2022-05-04T08:33:46.015000Z
var-202011-1278 A CWE-311: Missing Encryption of Sensitive Data vulnerability exists in Modicon M221 (all… 2022-05-04T08:33:46.040000Z
var-202011-1279 A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exist… 2022-05-04T08:33:46.095000Z
var-202012-0814 A CWE-760: Use of a One-Way Hash with a Predictable Salt vulnerability exists in Modicon … 2022-05-04T08:33:46.147000Z
var-202010-1643 C2000-B2-SFE0101-BB1 is a serial device networking server. It provides data transmission … 2022-05-04T08:33:51.816000Z
var-202010-1622 CyberControl is a flexible and customizable automated monitoring software platform that c… 2022-05-04T08:33:51.827000Z
var-202010-1601 New H3C Technology Co., Ltd. is committed to becoming the most reliable partner for custo… 2022-05-04T08:33:51.837000Z
var-202009-1692 TP-LINK Technology Co., Ltd. (hereinafter referred to as "TP-LINK") is a global network c… 2022-05-04T08:33:54.980000Z
var-202009-1671 Shenzhen Xing Fusion Technology Co., Ltd. was established in July 2018. The company's bus… 2022-05-04T08:33:54.991000Z
var-202009-1125 A vulnerability in the PROFINET feature of Cisco IOS Software and Cisco IOS XE Software c… 2022-05-04T08:33:56.714000Z
var-202007-1499 KingView (KingView) is an industrial automation configuration software produced by Beijin… 2022-05-04T08:34:08.612000Z
var-202006-1923 AC9V3.0 upgrade software is a Gigabit Ethernet wireless router of Shenzhen Jixiang Tengda… 2022-05-04T08:34:18.921000Z
var-202006-1902 Haiwell cloud configuration software Cloud SCADA is a .NET Framework-based industrial aut… 2022-05-04T08:34:18.934000Z
var-202005-1091 Codesys is a powerful PLC software programming tool. Codesys v3 has a denial of servi… 2022-05-04T08:34:28.125000Z
var-202005-1070 D-Link Dir-816 is a wireless router. D-Link DIR-816 has a command execution vulnerabi… 2022-05-04T08:34:28.135000Z
var-202004-2260 Shenzhen Dadian Technology Co., Ltd. is a company specializing in the research and develo… 2022-05-04T08:34:30.156000Z
var-202004-2239 Shenzhen Hexin Automation Technology Co., Ltd. (referred to as "Hexin Technology") was es… 2022-05-04T08:34:30.166000Z
var-202002-1702 The equipment room moving ring monitoring system is a monitoring function of the equipmen… 2022-05-04T08:34:43.443000Z
var-202001-1978 Wuxi Xinjie Electric Co., Ltd. is a well-known domestic company specializing in the devel… 2022-05-04T08:34:48.022000Z
var-202001-1957 ZXR10 ZSR V2 series router is a next-generation intelligent access router product integra… 2022-05-04T08:34:48.034000Z
var-202001-0739 The web interface on the Technicolor TC7230 STEB 01.25 is vulnerable to DNS rebinding, wh… 2022-05-04T08:34:58.752000Z
var-201912-1997 TP-Link Archer is a wireless router of China TP-Link company. The TP-Link Archer router … 2022-05-04T08:35:02.659000Z
var-201912-0153 IBM MQ and IBM MQ Appliance 9.1 CD, 9.1 LTS, 9.0 LTS, and 8.0 is vulnerable to a denial o… 2022-05-04T08:35:13.396000Z
var-201911-1945 Hikvision is a video-centric IoT solution provider, providing integrated security, smart … 2022-05-04T08:35:13.659000Z
var-201910-1868 Alibaba Cloud IoT platform is a cloud service platform for the IoT field. It communicates… 2022-05-04T08:35:17.893000Z
var-201909-1669 Sangfor Technology Co., Ltd. is a provider of products, services and solutions focusing o… 2022-05-04T08:35:30.333000Z
var-201908-2203 Xiamen Sixin Communication Technology Co., Ltd. is the research and development, producti… 2022-05-04T08:35:36.677000Z
var-201904-1632 China United Network Communications Group Co., Ltd. ("China Unicom" for short) is a telec… 2022-05-04T08:36:14.803000Z
var-201903-1738 Philips Smart Wireless Speaker is an artificial intelligence-based music player that can … 2022-05-04T08:36:23.933000Z
ID CVSS Description Vendor Product Published Updated
ID CVSS Description Vendor Product Published Updated