Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2001-0395 |
N/A
|
Lightwave ConsoleServer 3200 does not disconnect … |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.226Z |
| CVE-2001-0396 |
N/A
|
The pre-login mode in the System Administrator in… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.843Z |
| CVE-2001-0397 |
N/A
|
Buffer overflow in Silent Runner Collector (SRC) … |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.691Z |
| CVE-2001-0398 |
N/A
|
The BAT! mail client allows remote attackers to b… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.237Z |
| CVE-2001-0399 |
N/A
|
Caucho Resin 1.3b1 and earlier allows remote atta… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.192Z |
| CVE-2001-0400 |
N/A
|
nph-maillist.pl allows remote attackers to execut… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.236Z |
| CVE-2001-0401 |
N/A
|
Buffer overflow in tip in Solaris 8 and earlier a… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.215Z |
| CVE-2001-0403 |
N/A
|
/opt/JSparm/bin/perfmon program in Solaris allows… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.692Z |
| CVE-2001-0404 |
N/A
|
Directory traversal vulnerability in JavaServer W… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.693Z |
| CVE-2001-0406 |
N/A
|
Samba before 2.2.0 allows local attackers to over… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.580Z |
| CVE-2001-0410 |
N/A
|
Buffer overflow in Trend Micro Virus Buster 2001 … |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.701Z |
| CVE-2001-0411 |
N/A
|
Reliant Unix 5.44 and earlier allows remote attac… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.058Z |
| CVE-2001-0415 |
N/A
|
REDIPlus program, REDI.exe, stores passwords and … |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.270Z |
| CVE-2001-0417 |
N/A
|
Kerberos 4 (aka krb4) allows local users to overw… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.901Z |
| CVE-2001-0418 |
N/A
|
content.pl script in NCM Content Management Syste… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.292Z |
| CVE-2001-0419 |
N/A
|
Buffer overflow in shared library ndwfn4.so for i… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.114Z |
| CVE-2001-0420 |
N/A
|
Directory traversal vulnerability in talkback.cgi… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.661Z |
| CVE-2001-0421 |
N/A
|
FTP server in Solaris 8 and earlier allows local … |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.785Z |
| CVE-2001-0424 |
N/A
|
BubbleMon 1.31 does not properly drop group privi… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.739Z |
| CVE-2001-0425 |
N/A
|
AdLibrary.pm in AdCycle 0.78b allows remote attac… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.228Z |
| CVE-2001-0426 |
N/A
|
Buffer overflow in dtsession on Solaris, and poss… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:37.861Z |
| CVE-2001-0431 |
N/A
|
Vulnerability in iPlanet Web Server Enterprise Ed… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.579Z |
| CVE-2001-0432 |
N/A
|
Buffer overflows in various CGI programs in the r… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.639Z |
| CVE-2001-0433 |
N/A
|
Buffer overflow in Savant 3.0 web server allows r… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.248Z |
| CVE-2001-0435 |
N/A
|
The split key mechanism used by PGP 7.0 allows a … |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.592Z |
| CVE-2001-0436 |
N/A
|
dcboard.cgi in DCForum 2000 1.0 allows remote att… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.327Z |
| CVE-2001-0437 |
N/A
|
upload_file.pl in DCForum 2000 1.0 allows remote … |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.285Z |
| CVE-2001-0438 |
N/A
|
Preview version of Timbuktu for Mac OS X allows l… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.606Z |
| CVE-2001-0441 |
N/A
|
Buffer overflow in (1) wrapping and (2) unwrappin… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.397Z |
| CVE-2001-0443 |
N/A
|
Buffer overflow in QPC QVT/Net Popd 4.20 in QVT/N… |
n/a |
n/a |
2001-05-24T04:00:00.000Z | 2024-08-08T04:21:38.566Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0872 |
N/A
|
explorer.php in PhotoAlbum 0.9.9 allows remote at… |
n/a |
n/a |
2000-10-18T04:00:00.000Z | 2024-08-08T05:37:30.632Z |
| CVE-2000-0873 |
N/A
|
netstat in AIX 4.x.x does not properly restrict a… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:37:31.236Z |
| CVE-2000-0874 |
N/A
|
Eudora mail client includes the absolute path of … |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T05:37:30.631Z |
| CVE-2000-0875 |
N/A
|
WFTPD and WFTPD Pro 2.41 RC12 allows remote attac… |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T05:37:30.622Z |
| CVE-2000-0876 |
N/A
|
WFTPD and WFTPD Pro 2.41 RC12 allows remote attac… |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T05:37:31.254Z |
| CVE-2000-0877 |
N/A
|
mailform.pl CGI script in MailForm 2.0 allows rem… |
n/a |
n/a |
2001-09-18T04:00:00.000Z | 2024-08-08T05:37:31.497Z |
| CVE-2000-0878 |
N/A
|
The mailto CGI script allows remote attacker to e… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:37:31.324Z |
| CVE-2000-0879 |
N/A
|
LPPlus programs dccsched, dcclpdser, dccbkst, dcc… |
n/a |
n/a |
2000-10-18T04:00:00.000Z | 2024-08-08T05:37:30.698Z |
| CVE-2000-0880 |
N/A
|
LPPlus creates the lpdprocess file with world-wri… |
n/a |
n/a |
2000-10-18T04:00:00.000Z | 2024-08-08T05:37:31.727Z |
| CVE-2000-0881 |
N/A
|
The dccscan setuid program in LPPlus does not pro… |
n/a |
n/a |
2000-10-18T04:00:00.000Z | 2024-08-08T05:37:30.626Z |
| CVE-2000-0882 |
N/A
|
Intel Express 500 series switches allow a remote … |
n/a |
n/a |
2000-10-18T04:00:00.000Z | 2024-08-08T05:37:31.273Z |
| CVE-2000-0883 |
N/A
|
The default configuration of mod_perl for Apache … |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:37:31.433Z |
| CVE-2000-1223 |
N/A
|
quikstore.cgi in Quikstore Shopping Cart allows r… |
n/a |
n/a |
2005-04-21T04:00:00.000Z | 2024-09-17T03:53:36.325Z |
| CVE-2000-1217 |
N/A
|
Microsoft Windows 2000 before Service Pack 2 (SP2… |
n/a |
n/a |
2005-04-21T04:00:00.000Z | 2024-08-08T05:45:37.468Z |
| CVE-2000-1224 |
N/A
|
Caucho Technology Resin 1.2 and possibly earlier … |
n/a |
n/a |
2005-05-19T04:00:00.000Z | 2024-08-08T05:45:37.527Z |
| CVE-2000-1222 |
N/A
|
AIX sysback before 4.2.1.13 uses a relative path … |
n/a |
n/a |
2005-04-21T04:00:00.000Z | 2024-08-08T05:45:37.456Z |
| CVE-2000-0998 |
N/A
|
Format string vulnerability in top program allows… |
n/a |
n/a |
2000-11-29T05:00:00.000Z | 2024-08-08T05:37:32.193Z |
| CVE-2000-0999 |
N/A
|
Format string vulnerabilities in OpenBSD ssh prog… |
n/a |
n/a |
2000-11-29T05:00:00.000Z | 2024-08-08T05:37:32.152Z |
| CVE-2000-1000 |
N/A
|
Format string vulnerability in AOL Instant Messen… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:37:32.169Z |
| CVE-2000-1001 |
N/A
|
add_2_basket.asp in Element InstantShop allows re… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:37:32.352Z |
| CVE-2000-1002 |
N/A
|
POP3 daemon in Stalker CommuniGate Pro 3.3.2 gene… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:37:32.399Z |
| CVE-2000-1003 |
N/A
|
NETBIOS client in Windows 95 and Windows 98 allow… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:37:32.402Z |
| CVE-2000-1004 |
N/A
|
Format string vulnerability in OpenBSD photurisd … |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:37:32.396Z |
| CVE-2000-1005 |
N/A
|
Directory traversal vulnerability in html_web_sto… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:37:32.266Z |
| CVE-2000-1006 |
N/A
|
Microsoft Exchange Server 5.5 does not properly h… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:37:32.430Z |
| CVE-2000-1007 |
N/A
|
I-gear 3.5.7 and earlier does not properly proces… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:37:32.358Z |
| CVE-2000-1008 |
N/A
|
PalmOS 3.5.2 and earlier uses weak encryption to … |
n/a |
n/a |
2000-11-29T05:00:00.000Z | 2024-08-08T05:37:32.199Z |
| CVE-2000-1009 |
N/A
|
dump in Red Hat Linux 6.2 trusts the pathname spe… |
n/a |
n/a |
2000-11-29T05:00:00.000Z | 2024-08-08T05:37:32.263Z |
| CVE-2000-1010 |
N/A
|
Format string vulnerability in talkd in OpenBSD a… |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:37:32.395Z |
| CVE-2000-1011 |
N/A
|
Buffer overflow in catopen() function in FreeBSD … |
n/a |
n/a |
2001-01-22T05:00:00.000Z | 2024-08-08T05:37:32.193Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-5x7p-gm79-383m |
9.8 (3.1)
|
Malicious Package in regenraotr | 2020-09-01T21:11:57Z | 2021-10-01T13:28:51Z |
| ghsa-wp2p-q35g-3rjj |
9.8 (3.1)
|
Malicious Package in soket.io | 2020-09-01T21:13:01Z | 2021-10-01T13:29:21Z |
| ghsa-x6gq-467r-hwcc |
9.8 (3.1)
|
Malicious Package in soket.js | 2020-09-01T21:14:05Z | 2021-10-01T13:29:35Z |
| ghsa-j3qq-qvc8-c6g7 |
9.8 (3.1)
|
Malicious Package in foever | 2020-09-01T21:15:09Z | 2021-10-01T13:29:49Z |
| ghsa-992f-wf4w-x36v |
|
Prototype Pollution in merge-objects | 2020-09-01T21:16:13Z | 2020-08-31T18:33:09Z |
| ghsa-f5cv-xrv9-r8w7 |
|
NoSQL injection in express-cart | 2020-09-01T21:17:16Z | 2021-09-24T20:58:36Z |
| ghsa-77q4-m83q-w76v |
7.5 (3.1)
|
Missing Origin Validation in browserify-hmr | 2020-09-01T21:18:20Z | 2021-09-24T20:59:15Z |
| ghsa-9hqj-38j2-5jgm |
|
Command Injection in ascii-art | 2020-09-01T21:19:23Z | 2020-08-31T18:33:35Z |
| ghsa-xhjx-mfr6-9rr4 |
|
Command Injection in samsung-remote | 2020-09-01T21:20:28Z | 2020-08-31T18:33:52Z |
| ghsa-9x64-5r7x-2q53 |
9.8 (3.1)
|
Malicious Package in flatmap-stream | 2020-09-01T21:21:32Z | 2021-10-01T13:30:04Z |
| ghsa-h5vj-f7r9-w564 |
9.8 (3.1)
|
Entropy Backdoor in text-qrcode | 2020-09-01T21:22:35Z | 2021-10-01T13:30:18Z |
| ghsa-xwqw-rf2q-xmhf |
|
Cross-Site Scripting in buefy | 2020-09-01T21:23:38Z | 2021-09-24T22:00:38Z |
| ghsa-hgr5-82rc-p936 |
|
Cross-Site Scripting in md-data-table | 2020-09-01T21:24:41Z | 2020-08-31T18:34:23Z |
| ghsa-mpjf-8cmf-p789 |
|
Cross-Site Scripting in jingo | 2020-09-01T21:25:46Z | 2020-08-31T18:34:28Z |
| ghsa-x6m6-5hrf-fh6r |
7.5 (3.1)
|
Denial of Service in markdown-it-toc-and-anchor | 2020-09-01T21:26:50Z | 2023-12-07T22:05:03Z |
| ghsa-4qqc-mp5f-ccv4 |
|
Command Injection in bestzip | 2020-09-02T15:05:51Z | 2020-09-02T15:04:08Z |
| ghsa-pp7h-53gx-mx7r |
6.5 (3.1)
|
Remote Memory Exposure in bl | 2020-09-02T15:26:19Z | 2022-05-26T20:43:51Z |
| ghsa-w32g-5hqp-gg6q |
|
Cross-Site Scripting in mermaid | 2020-09-02T15:41:41Z | 2021-09-27T13:34:07Z |
| ghsa-44vf-8ffm-v2qh |
|
Sensitive Data Exposure in rails-session-decoder | 2020-09-02T15:42:47Z | 2020-08-31T18:34:35Z |
| ghsa-m5ch-gx8g-rg73 |
|
Remote Code Execution in pomelo-monitor | 2020-09-02T15:43:53Z | 2020-08-31T18:34:39Z |
| ghsa-9p64-h5q4-phpm |
|
Remote Code Execution in office-converter | 2020-09-02T15:44:58Z | 2020-08-31T18:34:44Z |
| ghsa-x9hc-rw35-f44h |
7.3 (3.1)
|
Sandbox Breakout / Arbitrary Code Execution in static-eval | 2020-09-02T15:46:03Z | 2021-09-27T13:40:52Z |
| ghsa-p9vv-3945-x93h |
|
Cross-Site Scripting in semantic-ui-search | 2020-09-02T15:47:10Z | 2021-09-27T13:59:52Z |
| ghsa-2hqf-qqmq-pgpp |
9.8 (3.1)
|
Malicious Package in commander-js | 2020-09-02T15:48:16Z | 2021-10-01T13:30:38Z |
| ghsa-277p-xwpp-3jf7 |
9.8 (3.1)
|
Malicious Package in rrgod | 2020-09-02T15:49:22Z | 2021-10-01T13:42:09Z |
| ghsa-p8fm-w787-x6x3 |
9.8 (3.1)
|
Malicious Package in portionfatty12 | 2020-09-02T15:50:28Z | 2021-10-01T13:42:27Z |
| ghsa-fm4j-4xhm-xpwx |
|
Sandbox Breakout / Arbitrary Code Execution in sandbox | 2020-09-02T15:51:34Z | 2026-02-02T23:13:21Z |
| ghsa-hxwc-5vw9-2w4w |
|
NoSQL Injection in loopback-connector-mongodb | 2020-09-02T15:52:39Z | 2021-09-27T15:13:26Z |
| ghsa-c7pp-x73h-4m2v |
|
Cross-Site Scripting in bootstrap-vue | 2020-09-02T15:53:46Z | 2021-09-27T15:43:19Z |
| ghsa-8wgc-jjvv-cv6v |
|
Improper Authorization in loopback | 2020-09-02T15:54:52Z | 2021-09-27T15:44:08Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-281 |
|
Cross-Site Request Forgery (CSRF) in GitHub repository ikus060/rdiffweb prior to 2.4.5. | rdiffweb | 2022-09-17T20:15:00Z | 2022-09-21T10:45:56.877746Z |
| pysec-2022-43118 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-strings | 2022-09-19T14:15:00Z | 2024-11-21T14:22:44.584448Z |
| pysec-2022-43098 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-file-system | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.564135Z |
| pysec-2022-43102 |
9.8 (3.1)
|
The d8s-urls for python 0.1.0, as distributed on PyPI, included a potential code-executio… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.766564Z |
| pysec-2022-43103 |
9.8 (3.1)
|
The d8s-uuids for python, as distributed on PyPI, included a potential code-execution bac… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.817031Z |
| pysec-2022-43104 |
9.8 (3.1)
|
The d8s-domains for python, as distributed on PyPI, included a potential code-execution b… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.865878Z |
| pysec-2022-43105 |
9.8 (3.1)
|
The d8s-dates for python, as distributed on PyPI, included a potential code-execution bac… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.915613Z |
| pysec-2022-43110 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T15:15:00Z | 2024-11-21T14:22:44.173987Z |
| pysec-2022-43113 |
9.8 (3.1)
|
The d8s-domains for python, as distributed on PyPI, included a potential code-execution b… | democritus-networking | 2022-09-19T15:15:00Z | 2024-11-21T14:22:44.327837Z |
| pysec-2022-43074 |
9.8 (3.1)
|
The d8s-archives for python, as distributed on PyPI, included a potential code-execution … | d8s-archives | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.229096Z |
| pysec-2022-43076 |
9.8 (3.1)
|
The d8s-grammars for python, as distributed on PyPI, included a potential code-execution … | d8s-grammars | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.333517Z |
| pysec-2022-43078 |
9.8 (3.1)
|
The d8s-json for python, as distributed on PyPI, included a potential code-execution back… | d8s-json | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.439723Z |
| pysec-2022-43079 |
9.8 (3.1)
|
The d8s-math for python, as distributed on PyPI, included a potential code-execution back… | d8s-math | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.499117Z |
| pysec-2022-43080 |
9.8 (3.1)
|
The d8s-netstrings for python, as distributed on PyPI, included a potential code-executio… | d8s-netstrings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.556543Z |
| pysec-2022-43083 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | d8s-python | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.723606Z |
| pysec-2022-43087 |
9.8 (3.1)
|
The d8s-strings for python, as distributed on PyPI, included a potential code-execution b… | d8s-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.944804Z |
| pysec-2022-43092 |
9.8 (3.1)
|
The d8s-xml for python, as distributed on PyPI, included a potential code-execution backd… | d8s-xml | 2022-09-19T16:15:00Z | 2024-11-21T14:22:43.200942Z |
| pysec-2022-43099 |
9.8 (3.1)
|
The d8s-pdfs for python, as distributed on PyPI, included a potential code-execution back… | democritus-file-system | 2022-09-19T16:15:00Z | 2024-11-21T14:22:43.616362Z |
| pysec-2022-43101 |
9.8 (3.1)
|
The d8s-strings for python, as distributed on PyPI, included a potential code-execution b… | democritus-hypothesis | 2022-09-19T16:15:00Z | 2024-11-21T14:22:43.716069Z |
| pysec-2022-43106 |
9.8 (3.1)
|
The d8s-dicts for python, as distributed on PyPI, included a potential code-execution bac… | democritus-hypothesis | 2022-09-19T16:15:00Z | 2024-11-21T14:22:43.965654Z |
| pysec-2022-43107 |
9.8 (3.1)
|
The d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execut… | democritus-hypothesis | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.021497Z |
| pysec-2022-43111 |
9.8 (3.1)
|
The d8s-html for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.226888Z |
| pysec-2022-43112 |
9.8 (3.1)
|
The d8s-asns for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.27716Z |
| pysec-2022-43114 |
9.8 (3.1)
|
The d8s-mpeg for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.376649Z |
| pysec-2022-43115 |
9.8 (3.1)
|
The d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execut… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.428296Z |
| pysec-2022-43116 |
9.8 (3.1)
|
The d8s-utility for python, as distributed on PyPI, included a potential code-execution b… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.483759Z |
| pysec-2022-43117 |
9.8 (3.1)
|
The d8s-pdfs for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.53409Z |
| pysec-2022-43119 |
9.8 (3.1)
|
The d8s-archives for python, as distributed on PyPI, included a potential code-execution … | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.633699Z |
| pysec-2022-43120 |
9.8 (3.1)
|
The d8s-json for python, as distributed on PyPI, included a potential code-execution back… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.684065Z |
| pysec-2022-43121 |
9.8 (3.1)
|
The d8s-math for python, as distributed on PyPI, included a potential code-execution back… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.735083Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-1340 | Malicious code in azure-keyvault-admin (npm) | 2022-06-20T20:16:31Z | 2022-06-20T20:16:31Z |
| mal-2022-1352 | Malicious code in azure-keyvault-secrets-js (npm) | 2022-06-20T20:16:31Z | 2022-06-20T20:16:32Z |
| mal-2022-1353 | Malicious code in azure-keyvault-secrets-ts (npm) | 2022-06-20T20:16:31Z | 2022-06-20T20:16:31Z |
| mal-2022-1344 | Malicious code in azure-keyvault-certificates (npm) | 2022-06-20T20:16:32Z | 2022-06-20T20:16:33Z |
| mal-2022-1345 | Malicious code in azure-keyvault-certificates-js (npm) | 2022-06-20T20:16:32Z | 2022-06-20T20:16:33Z |
| mal-2022-1347 | Malicious code in azure-keyvault-certificates-ts (npm) | 2022-06-20T20:16:32Z | 2022-06-20T20:16:32Z |
| mal-2022-1351 | Malicious code in azure-keyvault-secrets (npm) | 2022-06-20T20:16:32Z | 2022-06-20T20:16:32Z |
| mal-2022-1348 | Malicious code in azure-keyvault-keys (npm) | 2022-06-20T20:16:33Z | 2022-06-20T20:16:34Z |
| mal-2022-1349 | Malicious code in azure-keyvault-keys-js (npm) | 2022-06-20T20:16:33Z | 2022-06-20T20:16:33Z |
| mal-2022-1350 | Malicious code in azure-keyvault-keys-ts (npm) | 2022-06-20T20:16:33Z | 2022-06-20T20:16:33Z |
| mal-2022-1232 | Malicious code in azure-ai-text-analytics-js (npm) | 2022-06-20T20:16:34Z | 2022-06-20T20:16:39Z |
| mal-2022-1233 | Malicious code in azure-ai-text-analytics-ts (npm) | 2022-06-20T20:16:34Z | 2022-06-20T20:16:35Z |
| mal-2022-1320 | Malicious code in azure-data-tables (npm) | 2022-06-20T20:16:34Z | 2022-06-20T20:16:34Z |
| mal-2022-1321 | Malicious code in azure-data-tables-js (npm) | 2022-06-20T20:16:34Z | 2022-06-20T20:16:34Z |
| mal-2022-1322 | Malicious code in azure-data-tables-ts (npm) | 2022-06-20T20:16:34Z | 2022-06-20T20:16:34Z |
| mal-2022-1231 | Malicious code in azure-ai-text-analytics (npm) | 2022-06-20T20:16:35Z | 2022-06-20T20:16:35Z |
| mal-2022-1314 | Malicious code in azure-core-rest-pipeline-js (npm) | 2022-06-20T20:16:35Z | 2022-06-20T20:16:36Z |
| mal-2022-1315 | Malicious code in azure-core-rest-pipeline-ts (npm) | 2022-06-20T20:16:35Z | 2022-06-20T20:16:36Z |
| mal-2022-5280 | Malicious code in perf-core-rest-pipeline (npm) | 2022-06-20T20:16:35Z | 2022-06-20T20:16:35Z |
| mal-2022-107 | Malicious code in @azure-tests/perf-monitor-query (npm) | 2022-06-20T20:16:36Z | 2022-06-20T20:16:36Z |
| mal-2022-111 | Malicious code in @azure-tests/perf-storage-blob (npm) | 2022-06-20T20:16:36Z | 2022-06-20T20:16:37Z |
| mal-2022-113 | Malicious code in @azure-tests/perf-storage-file-datalake (npm) | 2022-06-20T20:16:36Z | 2022-06-20T20:16:37Z |
| mal-2022-1313 | Malicious code in azure-core-rest-pipeline (npm) | 2022-06-20T20:16:36Z | 2022-06-20T20:16:39Z |
| mal-2022-102 | Malicious code in @azure-tests/perf-event-hubs-track-1 (npm) | 2022-06-20T20:16:37Z | 2022-06-20T20:16:38Z |
| mal-2022-112 | Malicious code in @azure-tests/perf-storage-blob-track-1 (npm) | 2022-06-20T20:16:37Z | 2022-06-20T20:16:38Z |
| mal-2022-114 | Malicious code in @azure-tests/perf-storage-file-share (npm) | 2022-06-20T20:16:37Z | 2022-06-20T20:16:45Z |
| mal-2022-115 | Malicious code in @azure-tests/perf-storage-file-share-track-1 (npm) | 2022-06-20T20:16:37Z | 2022-06-20T20:16:37Z |
| mal-2022-101 | Malicious code in @azure-tests/perf-event-hubs (npm) | 2022-06-20T20:16:38Z | 2022-06-20T20:16:38Z |
| mal-2022-108 | Malicious code in @azure-tests/perf-search-documents (npm) | 2022-06-20T20:16:38Z | 2022-06-20T20:16:38Z |
| mal-2022-96 | Malicious code in @azure-tests/perf-ai-metrics-advisor (npm) | 2022-06-20T20:16:38Z | 2022-06-20T20:16:39Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-0304 | OpenSSL: Mehrere Schwachstellen | 2023-02-07T23:00:00.000+00:00 | 2025-11-09T23:00:00.000+00:00 |
| wid-sec-w-2023-0305 | LibreSSL: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-02-07T23:00:00.000+00:00 | 2023-02-07T23:00:00.000+00:00 |
| wid-sec-w-2023-0307 | IBM InfoSphere Information Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-02-08T23:00:00.000+00:00 | 2023-02-08T23:00:00.000+00:00 |
| wid-sec-w-2023-0308 | IBM WebSphere Application Server Liberty: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-02-08T23:00:00.000+00:00 | 2024-02-27T23:00:00.000+00:00 |
| wid-sec-w-2023-0309 | IBM DB2: Mehrere Schwachstellen | 2023-02-08T23:00:00.000+00:00 | 2025-01-05T23:00:00.000+00:00 |
| wid-sec-w-2023-0310 | Heimdal: Schwachstelle ermöglicht Denial of Service | 2023-02-08T23:00:00.000+00:00 | 2023-10-08T22:00:00.000+00:00 |
| wid-sec-w-2023-0311 | PaloAlto Networks Cortex XSOAR: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-02-08T23:00:00.000+00:00 | 2023-02-08T23:00:00.000+00:00 |
| wid-sec-w-2023-0312 | FreeBSD Project FreeBSD OS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-02-08T23:00:00.000+00:00 | 2023-02-08T23:00:00.000+00:00 |
| wid-sec-w-2023-0313 | QT: Schwachstelle ermöglicht Denial of Service | 2023-02-08T23:00:00.000+00:00 | 2025-09-28T22:00:00.000+00:00 |
| wid-sec-w-2023-0314 | Nextcloud Office App: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-02-08T23:00:00.000+00:00 | 2023-02-08T23:00:00.000+00:00 |
| wid-sec-w-2023-0315 | Red Hat Enterprise Linux (OpenvSwitch): Mehrere Schwachstellen | 2023-02-08T23:00:00.000+00:00 | 2023-11-26T23:00:00.000+00:00 |
| wid-sec-w-2023-0316 | Nagios Enterprises Nagios XI: Mehrere Schwachstellen | 2023-02-08T23:00:00.000+00:00 | 2023-02-28T23:00:00.000+00:00 |
| wid-sec-w-2023-0317 | Red Hat FUSE: Schwachstelle ermöglicht Manipulation von Dateien | 2023-02-08T23:00:00.000+00:00 | 2023-06-29T22:00:00.000+00:00 |
| wid-sec-w-2023-0318 | Red Hat Migration Toolkit for Containers: Mehrere Schwachstellen | 2023-02-08T23:00:00.000+00:00 | 2025-04-29T22:00:00.000+00:00 |
| wid-sec-w-2023-0319 | WithSecure Endpoint Protection: Schwachstelle ermöglicht Denial of Service | 2023-02-08T23:00:00.000+00:00 | 2023-02-12T23:00:00.000+00:00 |
| wid-sec-w-2023-0322 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-02-09T23:00:00.000+00:00 | 2024-07-07T22:00:00.000+00:00 |
| wid-sec-w-2023-0323 | IBM Maximo Asset Management: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-02-09T23:00:00.000+00:00 | 2023-02-09T23:00:00.000+00:00 |
| wid-sec-w-2023-0324 | PostgreSQL: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-02-09T23:00:00.000+00:00 | 2025-09-28T22:00:00.000+00:00 |
| wid-sec-w-2023-0325 | Apache Nifi: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-02-09T23:00:00.000+00:00 | 2023-02-09T23:00:00.000+00:00 |
| wid-sec-w-2023-0326 | Mattermost: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-02-09T23:00:00.000+00:00 | 2023-03-22T23:00:00.000+00:00 |
| wid-sec-w-2023-0327 | IBM Power Hardware Management Console: Schwachstelle ermöglicht Privilegieneskalation | 2023-02-09T23:00:00.000+00:00 | 2023-02-09T23:00:00.000+00:00 |
| wid-sec-w-2023-0328 | Red Hat OpenShift: Mehrere Schwachstellen | 2023-02-09T23:00:00.000+00:00 | 2025-12-02T23:00:00.000+00:00 |
| wid-sec-w-2023-0329 | Microsoft Edge: Mehrere Schwachstellen | 2023-02-09T23:00:00.000+00:00 | 2023-10-01T22:00:00.000+00:00 |
| wid-sec-w-2023-0330 | Trend Micro Apex One: Mehrere Schwachstellen | 2023-02-09T23:00:00.000+00:00 | 2023-02-09T23:00:00.000+00:00 |
| wid-sec-w-2023-0331 | IBM InfoSphere Information Server: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-02-12T23:00:00.000+00:00 | 2023-02-12T23:00:00.000+00:00 |
| wid-sec-w-2023-0332 | Dell BIOS: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-02-12T23:00:00.000+00:00 | 2023-02-12T23:00:00.000+00:00 |
| wid-sec-w-2023-0333 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-02-12T23:00:00.000+00:00 | 2023-02-12T23:00:00.000+00:00 |
| wid-sec-w-2023-0341 | Dell PowerEdge: Mehrere Schwachstellen | 2023-02-12T23:00:00.000+00:00 | 2023-02-12T23:00:00.000+00:00 |
| wid-sec-w-2023-0344 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-02-13T23:00:00.000+00:00 | 2023-02-13T23:00:00.000+00:00 |
| wid-sec-w-2023-0345 | Red Hat Update Infrastructure (RHUI): Mehrere Schwachstellen | 2023-02-13T23:00:00.000+00:00 | 2025-09-17T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-23-166-09 | Siemens Solid Edge | 2023-06-13T00:00:00.000000Z | 2023-11-14T00:00:00.000000Z |
| icsa-23-166-10 | Siemens SIMATIC S7-1500 TM MFP BIOS | 2023-06-13T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-23-166-11 | Siemens SIMATIC S7-1500 TM MFP Linux Kernel | 2023-06-13T00:00:00.000000Z | 2024-04-09T00:00:00.000000Z |
| icsa-23-166-12 | Siemens SINAMICS Medium Voltage Products | 2023-06-13T00:00:00.000000Z | 2023-06-14T00:00:00.000000Z |
| icsa-23-166-13 | Siemens SICAM A8000 Devices | 2023-06-13T00:00:00.000000Z | 2023-06-13T00:00:00.000000Z |
| icsa-23-166-14 | Siemens Teamcenter Visualization and JT2Go | 2023-06-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-164-01 | Datalogics Library Third-Party | 2023-06-13T06:00:00.000000Z | 2023-06-13T06:00:00.000000Z |
| icsa-23-164-02 | Rockwell Automation FactoryTalk Services Platform | 2023-06-13T06:00:00.000000Z | 2023-06-13T06:00:00.000000Z |
| icsa-23-164-03 | Rockwell Automation FactoryTalk Edge Gateway | 2023-06-13T06:00:00.000000Z | 2023-06-13T06:00:00.000000Z |
| icsa-23-164-04 | Rockwell Automation FactoryTalk Transaction Manager | 2023-06-13T06:00:00.000000Z | 2023-06-13T06:00:00.000000Z |
| icsa-23-166-01 | SUBNET PowerSYSTEM Center | 2023-06-15T06:00:00.000000Z | 2023-06-15T06:00:00.000000Z |
| icsa-23-166-02 | Advantech WebAccess/SCADA | 2023-06-15T06:00:00.000000Z | 2023-06-15T06:00:00.000000Z |
| icsa-23-171-01 | Enphase Envoy | 2023-06-20T06:00:00.000000Z | 2023-07-13T06:00:00.000000Z |
| icsa-23-171-02 | Enphase Installer Toolkit Android App | 2023-06-20T06:00:00.000000Z | 2023-06-20T06:00:00.000000Z |
| icsa-23-173-02 | Advantech R-SeeNet | 2023-06-20T06:00:00.000000Z | 2023-06-20T06:00:00.000000Z |
| icsa-23-173-03 | SpiderControl SCADAWebServer | 2023-06-23T06:00:00.000000Z | 2023-06-23T06:00:00.000000Z |
| icsa-25-160-02 | Hitachi Energy Relion 670, 650, SAM600-IO Series (Update A) | 2023-06-27T00:00:00.000000Z | 2026-03-17T06:00:00.000000Z |
| icsa-23-178-01 | Hitachi Energy FOXMAN-UN and UNEM Products | 2023-06-27T06:00:00.000000Z | 2023-06-27T06:00:00.000000Z |
| icsa-23-180-01 | Delta Electronics InfraSuite Device Master | 2023-06-29T06:00:00.000000Z | 2023-06-29T06:00:00.000000Z |
| icsa-23-180-02 | Schneider Electric EcoStruxure Operator Terminal Expert | 2023-06-29T06:00:00.000000Z | 2023-06-29T06:00:00.000000Z |
| icsa-23-180-03 | Ovarro TBox RTUs | 2023-06-29T06:00:00.000000Z | 2023-06-29T06:00:00.000000Z |
| icsa-23-180-04 | Mitsubishi Electric MELSEC-F Series | 2023-06-29T06:00:00.000000Z | 2023-07-11T06:00:00.000000Z |
| icsma-23-180-01 | Medtronic Paceart Optima System | 2023-06-29T06:00:00.000000Z | 2023-06-29T06:00:00.000000Z |
| icsa-23-187-01 | PiiGAB M-Bus | 2023-07-06T06:00:00.000000Z | 2023-07-06T06:00:00.000000Z |
| icsa-23-187-02 | ABUS TVIP | 2023-07-06T06:00:00.000000Z | 2023-07-06T06:00:00.000000Z |
| icsa-23-192-01 | Rockwell Automation Enhanced HIM | 2023-07-11T00:00:00.000000Z | 2023-07-11T00:00:00.000000Z |
| icsa-23-192-02 | Sensormatic Electronics iSTAR | 2023-07-11T00:00:00.000000Z | 2023-07-11T00:00:00.000000Z |
| icsa-23-194-01 | Siemens RUGGEDCOM ROX | 2023-07-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-194-02 | Siemens SiPass Integrated | 2023-07-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-194-03 | Siemens SIMATIC CN 4100 | 2023-07-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-cpp-vfr-dos-nhhkggo | Cisco IOS XE Software IPv4 Fragmentation Reassembly Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-dnac-ssh-e4uodasj | Cisco Catalyst Center Static SSH Host Key Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-httpsrvr-dos-yozthut | Cisco IOS XE Software HTTP Server Telephony Services Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-webui-hfwnrgk | Cisco IOS and IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-xe-sda-edge-dos-mbcbg9k | Cisco IOS XE Software SD-Access Fabric Edge Node Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-pim-apbvfysj | Cisco IOS XE Software Protocol Independent Multicast Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-repacl-9exgnbpd | Cisco IOS Software on Cisco Industrial Ethernet Series Switches Access Control List Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-rsvp-dos-oypvgvzf | Cisco IOS and IOS XE Software Resource Reservation Protocol Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-sdw-vedos-kqffhps3 | Cisco SD-WAN vEdge Software UDP Packet Validation Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-sdwan-utd-dos-hdatqxs | Cisco Catalyst SD-WAN Routers Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-sdwan-xss-zq4kpvyd | Cisco Catalyst SD-WAN Manager Cross-Site Scripting Vulnerability | 2024-09-25T16:00:00+00:00 | 2025-03-28T18:38:53+00:00 |
| cisco-sa-utd-snort3-dos-bypas-b4ouewxd | Cisco Unified Threat Defense Snort Intrusion Prevention System Engine for Cisco IOS XE Software Security Policy Bypass and Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-vlan-dos-27pur5rt | Cisco Catalyst 9000 Series Switches Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-10-04T21:53:25+00:00 |
| cisco-sa-webui-csrf-ycuyxkko | Cisco IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-cimc-redfish-cominj-sbkv5zz | Cisco UCS B-Series, Managed C-Series, and X-Series Servers Redfish API Command Injection Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-expw-escalation-3bkz77bd | Cisco Expressway Series Privilege Escalation Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ise-info-disc-zyf2neex | Cisco Identity Services Engine Information Disclosure Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-by-qwukqv7x | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Session Takeover and Denial of Service Vulnerability | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:27+00:00 |
| cisco-sa-meraki-mx-vpn-dos-qtrhzg2 | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Denial of Service Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:28+00:00 |
| cisco-sa-ndfc-cidv-xvyx2wlj | Cisco Nexus Dashboard Fabric Controller Configuration Backup Information Disclosure Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndfc-cmdinj-uvyzrkfr | Cisco Nexus Dashboard Fabric Controller Arbitrary Command Execution Vulnerability | 2024-10-02T16:00:00+00:00 | 2026-03-31T18:47:53+00:00 |
| cisco-sa-ndfc-ptrce-bushlbp | Cisco Nexus Dashboard Fabric Controller Remote Code Execution Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndfc-raci-t46k3jnn | Cisco Nexus Dashboard Fabric Controller REST API Command Injection Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndhs-idv-bk8vqedc | Cisco Nexus Dashboard Hosted Services Information Disclosure Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndhs-uaapi-jh4v6zpn | Cisco Nexus Dashboard and Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndo-tlsvld-fduf3cpw | Cisco Nexus Dashboard Orchestrator SSL/TLS Certificate Validation Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-rv34x-privesc-rce-qe33tcms | Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Privilege Escalation and Remote Command Execution Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-sb-rv04x_rv32x_vulns-yj2osdhv | Cisco Small Business RV042, RV042G, RV320, and RV325 Routers Denial of Service and Remote Code Execution Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ata19x-multi-rdteqrsy | Cisco ATA 190 Series Analog Telephone Adapter Firmware Vulnerabilities | 2024-10-16T16:00:00+00:00 | 2024-10-24T11:47:37+00:00 |
| cisco-sa-ccmpdm-rxss-tax76u3k | Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability | 2024-10-16T16:00:00+00:00 | 2024-10-16T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-1898 | Use After Free in vim/vim | 2022-05-02T00:00:00.000Z | 2022-06-05T00:00:00.000Z |
| msrc_cve-2022-20770 | ClamAV CHM File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022 | 2022-05-02T00:00:00.000Z | 2022-05-13T00:00:00.000Z |
| msrc_cve-2022-20771 | ClamAV TIFF File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022 | 2022-05-02T00:00:00.000Z | 2022-05-13T00:00:00.000Z |
| msrc_cve-2022-20785 | ClamAV HTML Scanning Memory Leak Vulnerability Affecting Cisco Products: April 2022 | 2022-05-02T00:00:00.000Z | 2022-05-13T00:00:00.000Z |
| msrc_cve-2022-20796 | ClamAV Truncated File Denial of Service Vulnerability Affecting Cisco Products: April 2022 | 2022-05-02T00:00:00.000Z | 2022-05-13T00:00:00.000Z |
| msrc_cve-2022-22576 | An improper authentication vulnerability exists in curl 7.33.0 to and including 7.82.0 which might allow reuse OAUTH2-authenticated connections without properly making sure that the connection was authenticated with the same credentials as set for this transfer. This affects SASL-enabled protocols: SMPTP(S) IMAP(S) POP3(S) and LDAP(S) (openldap only). | 2022-05-02T00:00:00.000Z | 2026-02-21T04:01:03.000Z |
| msrc_cve-2022-24903 | Buffer overflow in TCP syslog server (receiver) components in rsyslog | 2022-05-02T00:00:00.000Z | 2022-05-19T00:00:00.000Z |
| msrc_cve-2022-26691 | A logic issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina macOS Monterey 12.3 macOS Big Sur 11.6.5. An application may be able to gain elevated privileges. | 2022-05-02T00:00:00.000Z | 2026-02-18T01:51:04.000Z |
| msrc_cve-2022-28066 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-26280. Reason: This candidate is a duplicate of CVE-2022-26280. Notes: All CVE users should reference CVE-2022-26280 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | 2022-05-02T00:00:00.000Z | 2025-10-01T23:11:16.000Z |
| msrc_cve-2022-28739 | There is a buffer over-read in Ruby before 2.6.10 2.7.x before 2.7.6 3.x before 3.0.4 and 3.1.x before 3.1.2. It occurs in String-to-Float conversion including Kernel#Float and String#to_f. | 2022-05-02T00:00:00.000Z | 2022-05-20T00:00:00.000Z |
| msrc_cve-2022-28948 | An issue in the Unmarshal function in Go-Yaml v3 causes the program to crash when attempting to deserialize invalid input. | 2022-05-02T00:00:00.000Z | 2023-11-08T00:00:00.000Z |
| msrc_cve-2022-29155 | In OpenLDAP 2.x before 2.5.12 and 2.6.x before 2.6.2 a SQL injection vulnerability exists in the experimental back-sql backend to slapd via a SQL statement within an LDAP query. This can occur during an LDAP search operation when the search filter is processed due to a lack of proper escaping. | 2022-05-02T00:00:00.000Z | 2022-05-13T00:00:00.000Z |
| msrc_cve-2022-29162 | Incorrect Default Permissions in runc | 2022-05-02T00:00:00.000Z | 2022-06-02T00:00:00.000Z |
| msrc_cve-2022-29217 | Key confusion through non-blocklisted public key formats in PyJWT | 2022-05-02T00:00:00.000Z | 2022-06-08T00:00:00.000Z |
| msrc_cve-2022-29581 | Improper Update of Reference Count vulnerability in net/sched of Linux Kernel allows local attacker to cause privilege escalation to root. This issue affects: Linux Kernel versions prior to 5.18; version 4.14 and later versions. | 2022-05-02T00:00:00.000Z | 2023-01-06T00:00:00.000Z |
| msrc_cve-2022-29824 | In libxml2 before 2.9.14 several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted multi-gigabyte XML file. Other software using libxml2's buffer functions for example libxslt through 1.1.35 is affected as well. | 2022-05-02T00:00:00.000Z | 2022-05-11T00:00:00.000Z |
| msrc_cve-2022-29968 | An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb->private. | 2022-05-02T00:00:00.000Z | 2022-05-11T00:00:00.000Z |
| msrc_cve-2022-30065 | A use-after-free in Busybox 1.35-x's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function. | 2022-05-02T00:00:00.000Z | 2022-06-02T00:00:00.000Z |
| msrc_cve-2022-30295 | uClibc-ng through 1.0.40 and uClibc through 0.9.33.2 use predictable DNS transaction IDs that may lead to DNS cache poisoning. This is related to a reset of a value to 0x2. | 2022-05-02T00:00:00.000Z | 2022-05-17T00:00:00.000Z |
| msrc_cve-2022-30594 | The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag. | 2022-05-02T00:00:00.000Z | 2026-02-18T01:36:00.000Z |
| msrc_cve-2022-30767 | nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196. | 2022-05-02T00:00:00.000Z | 2026-02-18T02:44:32.000Z |
| msrc_cve-2022-30783 | An invalid return code in fuse_kern_mount enables intercepting of libfuse-lite protocol traffic between NTFS-3G and the kernel in NTFS-3G through 2021.8.22 when using libfuse-lite. | 2022-05-02T00:00:00.000Z | 2022-06-08T00:00:00.000Z |
| msrc_cve-2022-30784 | A crafted NTFS image can cause heap exhaustion in ntfs_get_attribute_value in NTFS-3G through 2021.8.22. | 2022-05-02T00:00:00.000Z | 2022-06-08T00:00:00.000Z |
| msrc_cve-2022-30785 | A file handle created in fuse_lib_opendir and later used in fuse_lib_readdir enables arbitrary memory read and write operations in NTFS-3G through 2021.8.22 when using libfuse-lite. | 2022-05-02T00:00:00.000Z | 2022-06-08T00:00:00.000Z |
| msrc_cve-2022-30786 | A crafted NTFS image can cause a heap-based buffer overflow in ntfs_names_full_collate in NTFS-3G through 2021.8.22. | 2022-05-02T00:00:00.000Z | 2022-06-08T00:00:00.000Z |
| msrc_cve-2022-30787 | An integer underflow in fuse_lib_readdir enables arbitrary memory read operations in NTFS-3G through 2021.8.22 when using libfuse-lite. | 2022-05-02T00:00:00.000Z | 2022-06-09T00:00:00.000Z |
| msrc_cve-2022-30788 | A crafted NTFS image can cause a heap-based buffer overflow in ntfs_mft_rec_alloc in NTFS-3G through 2021.8.22. | 2022-05-02T00:00:00.000Z | 2022-06-08T00:00:00.000Z |
| msrc_cve-2022-30789 | A crafted NTFS image can cause a heap-based buffer overflow in ntfs_check_log_client_array in NTFS-3G through 2021.8.22. | 2022-05-02T00:00:00.000Z | 2022-06-08T00:00:00.000Z |
| msrc_cve-2022-31015 | Uncaught Exception (due to a data race) leads to process termination in Waitress | 2022-05-02T00:00:00.000Z | 2025-03-14T00:00:00.000Z |
| msrc_cve-2022-31621 | MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open the held lock is not released correctly which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects. | 2022-05-02T00:00:00.000Z | 2022-05-28T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2021:1115-1 | Security update for apache-commons-compress | 2021-08-09T22:43:19Z | 2021-08-09T22:43:19Z |
| opensuse-su-2021:1118-1 | Security update for wireshark | 2021-08-10T04:06:21Z | 2021-08-10T04:06:21Z |
| opensuse-su-2021:1119-1 | Security update for libvirt | 2021-08-10T04:06:25Z | 2021-08-10T04:06:25Z |
| opensuse-su-2021:1125-1 | Security update for aria2 | 2021-08-10T04:07:03Z | 2021-08-10T04:07:03Z |
| opensuse-su-2021:1126-1 | Security update for mysql-connector-java | 2021-08-10T04:07:07Z | 2021-08-10T04:07:07Z |
| opensuse-su-2021:2645-1 | Security update for the Linux Kernel | 2021-08-10T08:03:32Z | 2021-08-10T08:03:32Z |
| opensuse-su-2021:1129-1 | Recommended update for seamonkey | 2021-08-10T10:06:23Z | 2021-08-10T10:06:23Z |
| opensuse-su-2021:1130-1 | Security update for php7 | 2021-08-10T10:21:45Z | 2021-08-10T10:21:45Z |
| opensuse-su-2021:1131-1 | Security update for chromium | 2021-08-10T10:23:44Z | 2021-08-10T10:23:44Z |
| opensuse-su-2021:1134-1 | Security update for python-CairoSVG, python-Pillow | 2021-08-10T12:06:55Z | 2021-08-10T12:06:55Z |
| opensuse-su-2021:1142-1 | Security update for the Linux Kernel | 2021-08-10T17:32:52Z | 2021-08-10T17:32:52Z |
| opensuse-su-2021:1143-1 | Security update for transfig | 2021-08-10T18:05:53Z | 2021-08-10T18:05:53Z |
| opensuse-su-2021:1144-1 | Security update for chromium | 2021-08-10T22:40:35Z | 2021-08-10T22:40:35Z |
| opensuse-su-2021:2662-1 | Security update for grafana | 2021-08-12T10:02:06Z | 2021-08-12T10:02:06Z |
| opensuse-su-2021:2664-1 | Security update for golang-github-prometheus-prometheus | 2021-08-12T10:02:49Z | 2021-08-12T10:02:49Z |
| opensuse-su-2021:2675-1 | Security update for SUSE Manager Client Tools | 2021-08-12T10:05:26Z | 2021-08-12T10:05:26Z |
| opensuse-su-2021:1147-1 | Security update for python-reportlab | 2021-08-13T04:05:58Z | 2021-08-13T04:05:58Z |
| opensuse-su-2021:2685-1 | Security update for libdnf | 2021-08-13T09:21:40Z | 2021-08-13T09:21:40Z |
| opensuse-su-2021:1148-1 | Security update for grafana | 2021-08-13T11:17:54Z | 2021-08-13T11:17:54Z |
| opensuse-su-2021:2687-1 | Security update for the Linux Kernel | 2021-08-14T08:16:56Z | 2021-08-14T08:16:56Z |
| opensuse-su-2021:1158-1 | Security update for openscad | 2021-08-15T10:05:47Z | 2021-08-15T10:05:47Z |
| opensuse-su-2021:2682-1 | Security update for rpm | 2021-08-17T07:23:06Z | 2021-08-17T07:23:06Z |
| opensuse-su-2021:1162-1 | Security update for SUSE Manager Client Tools | 2021-08-17T10:06:47Z | 2021-08-17T10:06:47Z |
| opensuse-su-2021:2760-1 | Security update for c-ares | 2021-08-17T15:11:37Z | 2021-08-17T15:11:37Z |
| opensuse-su-2021:2764-1 | Security update for libsndfile | 2021-08-17T15:17:32Z | 2021-08-17T15:17:32Z |
| opensuse-su-2021:2773-1 | Security update for haproxy | 2021-08-18T14:05:17Z | 2021-08-18T14:05:17Z |
| opensuse-su-2021:2774-1 | Security update for MozillaFirefox | 2021-08-19T11:49:44Z | 2021-08-19T11:49:44Z |
| opensuse-su-2021:1166-1 | Security update for libsndfile | 2021-08-19T15:21:37Z | 2021-08-19T15:21:37Z |
| opensuse-su-2021:1167-1 | Security update for haproxy | 2021-08-19T15:21:40Z | 2021-08-19T15:21:40Z |
| opensuse-su-2021:1168-1 | Security update for c-ares | 2021-08-19T15:21:43Z | 2021-08-19T15:21:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2011:0930 | Red Hat Security Advisory: NetworkManager security update | 2011-07-12T20:06:00+00:00 | 2025-11-21T17:38:28+00:00 |
| rhsa-2011:0928 | Red Hat Security Advisory: kernel security and bug fix update | 2011-07-12T21:08:00+00:00 | 2025-11-21T17:38:28+00:00 |
| rhsa-2011:0938 | Red Hat Security Advisory: java-1.6.0-ibm security update | 2011-07-15T03:55:00+00:00 | 2026-01-13T21:06:31+00:00 |
| rhsa-2011:0927 | Red Hat Security Advisory: kernel security and bug fix update | 2011-07-15T05:14:00+00:00 | 2026-01-13T22:09:19+00:00 |
| rhsa-2011:0946 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.1 update | 2011-07-18T20:15:00+00:00 | 2025-11-21T17:38:29+00:00 |
| rhsa-2011:0947 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.1 update | 2011-07-18T20:29:00+00:00 | 2025-11-21T17:38:32+00:00 |
| rhsa-2011:0948 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.1 update | 2011-07-18T20:32:00+00:00 | 2025-11-21T17:38:30+00:00 |
| rhsa-2011:0949 | Red Hat Security Advisory: JBoss Enterprise Application Platform 5.1.1 update | 2011-07-18T20:35:00+00:00 | 2025-11-21T17:38:30+00:00 |
| rhsa-2011:0950 | Red Hat Security Advisory: jboss-seam2 security update | 2011-07-18T20:45:00+00:00 | 2025-11-21T17:38:30+00:00 |
| rhsa-2011:0951 | Red Hat Security Advisory: jboss-seam security update | 2011-07-18T20:45:00+00:00 | 2025-11-21T17:38:31+00:00 |
| rhsa-2011:0945 | Red Hat Security Advisory: JBoss Enterprise Web Platform 5.1.1 update | 2011-07-18T20:50:00+00:00 | 2025-11-21T17:38:29+00:00 |
| rhsa-2011:0952 | Red Hat Security Advisory: JBoss Enterprise SOA Platform 4.3.0.CP05 and 5.1.0 security update | 2011-07-18T20:56:00+00:00 | 2025-11-21T17:38:34+00:00 |
| rhsa-2011:0953 | Red Hat Security Advisory: system-config-firewall security update | 2011-07-18T21:01:00+00:00 | 2026-03-12T06:05:38+00:00 |
| rhsa-2011:0959 | Red Hat Security Advisory: mutt security update | 2011-07-19T17:57:00+00:00 | 2025-11-21T17:38:32+00:00 |
| rhsa-2011:1083 | Red Hat Security Advisory: fuse security update | 2011-07-20T18:16:00+00:00 | 2026-01-13T22:39:54+00:00 |
| rhsa-2011:1084 | Red Hat Security Advisory: libsndfile security update | 2011-07-20T18:17:00+00:00 | 2025-11-21T17:38:36+00:00 |
| rhsa-2011:0975 | Red Hat Security Advisory: sssd security, bug fix, and enhancement update | 2011-07-21T08:04:00+00:00 | 2025-11-21T17:38:32+00:00 |
| rhsa-2011:1065 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.7 kernel security and bug fix update | 2011-07-21T08:09:00+00:00 | 2026-02-18T16:54:43+00:00 |
| rhsa-2011:0999 | Red Hat Security Advisory: rsync security, bug fix, and enhancement update | 2011-07-21T09:22:00+00:00 | 2026-01-28T22:51:41+00:00 |
| rhsa-2011:1000 | Red Hat Security Advisory: rgmanager security, bug fix, and enhancement update | 2011-07-21T09:22:00+00:00 | 2025-11-21T17:38:34+00:00 |
| rhsa-2011:1005 | Red Hat Security Advisory: sysstat security, bug fix, and enhancement update | 2011-07-21T09:22:00+00:00 | 2025-11-21T17:38:34+00:00 |
| rhsa-2011:1073 | Red Hat Security Advisory: bash security, bug fix, and enhancement update | 2011-07-21T09:22:00+00:00 | 2025-11-21T17:38:35+00:00 |
| rhsa-2011:1019 | Red Hat Security Advisory: libvirt security, bug fix, and enhancement update | 2011-07-21T09:23:00+00:00 | 2025-11-21T17:38:34+00:00 |
| rhsa-2011:1085 | Red Hat Security Advisory: freetype security update | 2011-07-21T15:40:00+00:00 | 2026-01-13T22:15:11+00:00 |
| rhsa-2011:1087 | Red Hat Security Advisory: java-1.5.0-ibm security update | 2011-07-22T22:45:00+00:00 | 2026-01-13T22:31:11+00:00 |
| rhsa-2011:1088 | Red Hat Security Advisory: systemtap security update | 2011-07-25T21:40:00+00:00 | 2025-11-21T17:38:36+00:00 |
| rhsa-2011:1089 | Red Hat Security Advisory: systemtap security update | 2011-07-25T21:40:00+00:00 | 2025-11-21T17:38:36+00:00 |
| rhsa-2011:1100 | Red Hat Security Advisory: icedtea-web security update | 2011-07-27T14:49:00+00:00 | 2025-11-21T17:38:39+00:00 |
| rhsa-2011:1102 | Red Hat Security Advisory: libsoup security update | 2011-07-28T18:07:00+00:00 | 2025-11-21T17:38:37+00:00 |
| rhsa-2011:1103 | Red Hat Security Advisory: libpng security update | 2011-07-28T18:09:00+00:00 | 2026-03-18T20:56:22+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2018:0132-1 | Security update for ImageMagick | 2018-01-18T10:37:33Z | 2018-01-18T10:37:33Z |
| suse-su-2018:0130-1 | Security update for ImageMagick | 2018-01-18T10:38:47Z | 2018-01-18T10:38:47Z |
| suse-su-2018:0135-1 | Security update for gd | 2018-01-18T13:40:57Z | 2018-01-18T13:40:57Z |
| suse-su-2018:0140-1 | Security update for xmltooling | 2018-01-19T12:38:12Z | 2018-01-19T12:38:12Z |
| suse-su-2018:0170-1 | Security update for perl-XML-LibXML | 2018-01-22T10:36:54Z | 2018-01-22T10:36:54Z |
| suse-su-2018:0171-1 | Security update for the Linux Kernel | 2018-01-22T11:02:03Z | 2018-01-22T11:02:03Z |
| suse-su-2018:0174-1 | Security update for rsync | 2018-01-22T11:53:44Z | 2018-01-22T11:53:44Z |
| suse-su-2018:0172-1 | Security update for rsync | 2018-01-22T11:54:24Z | 2018-01-22T11:54:24Z |
| suse-su-2018:0173-1 | Security update for procmail | 2018-01-22T12:38:00Z | 2018-01-22T12:38:00Z |
| suse-su-2018:0178-1 | Security update for ncurses | 2018-01-23T09:38:48Z | 2018-01-23T09:38:48Z |
| suse-su-2018:0179-1 | Security update for wireshark | 2018-01-23T09:39:52Z | 2018-01-23T09:39:52Z |
| suse-su-2018:0181-1 | Security update for libvpx | 2018-01-23T12:37:37Z | 2018-01-23T12:37:37Z |
| suse-su-2018:0180-1 | Security update for the Linux Kernel | 2018-01-23T12:59:47Z | 2018-01-23T12:59:47Z |
| suse-su-2018:0191-1 | Security update for wireshark | 2018-01-24T11:01:38Z | 2018-01-24T11:01:38Z |
| suse-su-2018:0195-1 | Security update for libexif | 2018-01-24T11:11:42Z | 2018-01-24T11:11:42Z |
| suse-su-2018:0193-1 | Security update for libexif | 2018-01-24T11:14:53Z | 2018-01-24T11:14:53Z |
| suse-su-2018:0197-1 | Security update for GraphicsMagick | 2018-01-24T14:43:19Z | 2018-01-24T14:43:19Z |
| suse-su-2018:0200-1 | Security update for libevent | 2018-01-24T16:37:26Z | 2018-01-24T16:37:26Z |
| suse-su-2018:0214-1 | Security update for curl | 2018-01-25T08:36:01Z | 2018-01-25T08:36:01Z |
| suse-su-2018:0213-1 | Security update for the Linux Kernel | 2018-01-25T09:17:00Z | 2018-01-25T09:17:00Z |
| suse-su-2018:0216-1 | Security update for php5 | 2018-01-25T12:37:48Z | 2018-01-25T12:37:48Z |
| suse-su-2018:0217-1 | Security update for curl | 2018-01-25T12:39:05Z | 2018-01-25T12:39:05Z |
| suse-su-2018:0219-1 | Security update for webkit2gtk3 | 2018-01-25T16:38:07Z | 2018-01-25T16:38:07Z |
| suse-su-2018:0231-1 | Security update for transfig | 2018-01-26T07:44:41Z | 2018-01-26T07:44:41Z |
| suse-su-2018:0232-1 | Security update for transfig | 2018-01-26T07:45:55Z | 2018-01-26T07:45:55Z |
| suse-su-2018:0230-1 | Security update for curl | 2018-01-26T07:47:47Z | 2018-01-26T07:47:47Z |
| suse-su-2018:0233-1 | Security update for the Linux Kernel (Live Patch 30 for SLE 12) | 2018-01-26T10:46:34Z | 2018-01-26T10:46:34Z |
| suse-su-2018:0235-1 | Security update for gd | 2018-01-26T12:37:02Z | 2018-01-26T12:37:02Z |
| suse-su-2018:0250-1 | Security update for the Linux Kernel (Live Patch 26 for SLE 12) | 2018-01-26T15:42:23Z | 2018-01-26T15:42:23Z |
| suse-su-2018:0239-1 | Security update for the Linux Kernel (Live Patch 27 for SLE 12) | 2018-01-26T15:42:30Z | 2018-01-26T15:42:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:7496 | Important: libxslt security update | 2025-05-13T00:00:00Z | 2025-07-02T12:34:10Z |
| alsa-2025:7497 | Moderate: tomcat security update | 2025-05-13T00:00:00Z | 2025-07-02T12:33:08Z |
| alsa-2025:7500 | Important: perl security update | 2025-05-13T00:00:00Z | 2025-05-29T10:00:25Z |
| alsa-2025:7502 | Moderate: nodejs22 security update | 2025-05-13T00:00:00Z | 2025-07-02T12:30:23Z |
| alsa-2025:7505 | Important: libsoup3 security update | 2025-05-13T00:00:00Z | 2025-07-02T12:28:37Z |
| alsa-2025:7506 | Important: firefox security update | 2025-05-13T00:00:00Z | 2025-07-02T12:27:26Z |
| alsa-2025:7507 | Important: thunderbird security update | 2025-05-13T00:00:00Z | 2025-07-02T12:26:26Z |
| alsa-2025:7508 | Moderate: java-21-openjdk security update | 2025-05-13T00:00:00Z | 2025-07-02T12:25:11Z |
| alsa-2025:7509 | Important: valkey security update | 2025-05-13T00:00:00Z | 2025-06-16T12:24:03Z |
| alsa-2025:7510 | Moderate: libarchive security update | 2025-05-13T00:00:00Z | 2025-07-02T12:23:07Z |
| alsa-2025:7512 | Moderate: expat security update | 2025-05-13T00:00:00Z | 2025-07-02T12:22:01Z |
| alsa-2025:7517 | Important: sqlite security update | 2025-05-13T00:00:00Z | 2025-06-16T12:24:53Z |
| alsa-2025:7524 | Important: xz security update | 2025-05-13T00:00:00Z | 2025-06-16T12:25:55Z |
| alsa-2025:7531 | Important: kernel security update | 2025-05-14T00:00:00Z | 2025-05-16T09:56:19Z |
| alsa-2025:7532 | Important: kernel-rt security update | 2025-05-14T00:00:00Z | 2025-05-16T09:54:28Z |
| alsa-2025:7539 | Moderate: ruby:2.5 security update | 2025-05-14T00:00:00Z | 2025-07-02T12:19:18Z |
| alsa-2025:7540 | Moderate: libjpeg-turbo security update | 2025-05-14T00:00:00Z | 2025-06-10T19:29:07Z |
| alsa-2025:7569 | Important: yelp and yelp-xsl security update | 2025-05-14T00:00:00Z | 2025-05-16T09:52:42Z |
| alsa-2025:7571 | Important: .NET 9.0 security update | 2025-05-14T00:00:00Z | 2025-05-16T09:46:42Z |
| alsa-2025:7586 | Moderate: ghostscript security update | 2025-05-14T00:00:00Z | 2025-07-02T12:13:44Z |
| alsa-2025:7589 | Important: .NET 8.0 security update | 2025-05-14T00:00:00Z | 2025-05-16T09:41:23Z |
| alsa-2025:7592 | Important: yggdrasil security update | 2025-05-14T00:00:00Z | 2025-07-28T15:43:17Z |
| alsa-2025:7593 | Moderate: ghostscript security update | 2025-05-14T00:00:00Z | 2025-05-29T10:03:51Z |
| alsa-2025:7598 | Important: .NET 8.0 security update | 2025-05-14T00:00:00Z | 2025-05-21T06:14:37Z |
| alsa-2025:7599 | Important: .NET 8.0 security update | 2025-05-14T00:00:00Z | 2025-06-16T12:27:45Z |
| alsa-2025:7600 | Important: .NET 9.0 security update | 2025-05-14T00:00:00Z | 2025-07-02T12:10:43Z |
| alsa-2025:7601 | Important: .NET 9.0 security update | 2025-05-14T00:00:00Z | 2025-06-16T12:28:47Z |
| alsa-2025:7672 | Moderate: xdg-utils security update | 2025-05-15T00:00:00Z | 2025-07-02T12:08:32Z |
| alsa-2025:7686 | Important: redis:6 security update | 2025-05-15T00:00:00Z | 2025-05-16T09:38:39Z |
| alsa-2025:7893 | Important: grafana security update | 2025-05-19T00:00:00Z | 2025-05-26T08:56:38Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-709 | Heap-buffer-overflow in dissect_softether_host_fqdn | 2022-08-14T00:00:51.767243Z | 2022-08-14T00:00:51.767537Z |
| osv-2022-710 | Heap-buffer-overflow in pdfi_read_cff_dict | 2022-08-14T00:00:54.497240Z | 2022-08-14T00:00:54.497510Z |
| osv-2022-711 | Heap-buffer-overflow in _cmsMAT3per | 2022-08-14T00:01:56.994605Z | 2022-08-14T00:01:56.994936Z |
| osv-2022-712 | Heap-buffer-overflow in ndpi_search_florensia | 2022-08-14T00:02:05.111740Z | 2022-08-14T00:02:05.111993Z |
| osv-2022-714 | Heap-buffer-overflow in dynapi_set_helper | 2022-08-15T00:00:47.794062Z | 2026-04-30T14:22:37.500955Z |
| osv-2022-715 | Segv on unknown address in jpeg_read_scanlines | 2022-08-15T00:00:50.156496Z | 2022-10-30T22:16:00.000000Z |
| osv-2022-719 | Stack-buffer-overflow in gs_glyph_data_from_string | 2022-08-17T00:01:47.334986Z | 2022-08-17T00:01:47.335210Z |
| osv-2022-724 | Stack-buffer-underflow in gs_type2_interpret | 2022-08-18T00:01:01.736353Z | 2022-08-18T00:01:01.736604Z |
| osv-2022-725 | Heap-buffer-overflow in jxl::N_EMU128::WriteToU8Stage::ProcessRow | 2022-08-18T00:01:05.918943Z | 2026-02-11T14:11:54.187880Z |
| osv-2022-726 | Heap-use-after-free in gx_device_forward_finalize | 2022-08-18T00:02:06.680237Z | 2022-08-18T00:02:06.680485Z |
| osv-2022-727 | Heap-buffer-overflow in s_file_write_flush | 2022-08-19T00:00:07.550998Z | 2022-08-19T00:00:07.551246Z |
| osv-2022-729 | Security exception in org.apache.commons.jxpath.ri.compiler.CoreOperationMultiply.computeValue | 2022-08-19T00:00:10.461426Z | 2022-08-19T00:00:10.461689Z |
| osv-2022-733 | Security exception in jaz.Zer.<clinit> | 2022-08-19T00:00:14.579733Z | 2022-08-19T00:00:14.579980Z |
| osv-2022-736 | Heap-buffer-overflow in copy_glyph_data | 2022-08-19T00:00:25.579648Z | 2022-08-19T00:00:25.579898Z |
| osv-2022-738 | Security exception in DatatypeFuzzer.fuzzerTestOneInput | 2022-08-19T00:00:35.294543Z | 2025-01-10T04:55:45.450144Z |
| osv-2022-743 | Security exception in org.apache.commons.jxpath.ri.parser.XPathParser.MultiplicativeExpr | 2022-08-19T00:00:54.027907Z | 2022-08-19T00:00:54.028172Z |
| osv-2022-744 | Stack-buffer-overflow in gs_glyph_data_from_bytes | 2022-08-19T00:00:54.177954Z | 2022-08-19T00:00:54.178402Z |
| osv-2022-749 | Security exception in com.ctc.wstx.dtd.FullDTDReader.readContentSpec | 2022-08-20T00:00:08.690762Z | 2022-08-20T00:00:08.691032Z |
| osv-2022-750 | Heap-buffer-overflow in do_job | 2022-08-20T00:00:10.770653Z | 2022-08-20T00:00:10.770920Z |
| osv-2022-751 | Heap-buffer-overflow in gs_type2_interpret | 2022-08-20T00:00:12.956053Z | 2023-02-24T02:57:17.854976Z |
| osv-2022-755 | Global-buffer-overflow in chunk_obj_alloc | 2022-08-20T00:00:49.311644Z | 2022-08-20T00:00:49.311893Z |
| osv-2022-757 | UNKNOWN WRITE in pdfi_free_array | 2022-08-20T00:00:59.035627Z | 2022-08-20T00:00:59.035892Z |
| osv-2022-759 | Security exception in com.ctc.wstx.dtd.FullDTDReader.readContentSpec | 2022-08-20T00:01:56.255492Z | 2022-08-20T00:01:56.255739Z |
| osv-2022-760 | Security exception in com.fasterxml.jackson.dataformat.toml.Parser.parseInlineTable | 2022-08-20T00:01:56.371630Z | 2023-03-09T00:21:36.500254Z |
| osv-2022-763 | Heap-buffer-overflow in sqlite3VdbeExec | 2022-08-21T00:00:23.656015Z | 2026-04-26T14:19:51.633996Z |
| osv-2022-764 | Security exception in org.apache.commons.jxpath.ri.compiler.CoreOperation.parenthesize | 2022-08-21T00:00:44.740591Z | 2022-08-21T00:00:44.740834Z |
| osv-2022-768 | Security exception in org.apache.commons.jxpath.ri.axes.UnionContext.setPosition | 2022-08-22T00:00:44.994128Z | 2022-08-22T00:00:44.994365Z |
| osv-2022-770 | Stack-buffer-overflow in get_transaction | 2022-08-22T00:01:37.084046Z | 2022-08-22T00:01:37.084285Z |
| osv-2022-772 | Heap-use-after-free in pdfi_cidtype2_get_glyph_index | 2022-08-24T00:00:16.335034Z | 2022-08-24T00:00:16.335380Z |
| osv-2022-773 | Heap-double-free in sc_pkcs15_encode_df | 2022-08-24T00:00:17.518353Z | 2022-08-24T00:00:17.518621Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2021-39901 | 2024-03-06T11:18:07.624Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2021-29609 | Incomplete validation in `SparseAdd` | 2024-03-06T11:18:08.164Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2021-39900 | 2024-03-06T11:18:08.867Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2021-29608 | Heap OOB and null pointer dereference in `RaggedTensorToTensor` | 2024-03-06T11:18:09.405Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2021-39899 | 2024-03-06T11:18:10.111Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2021-29607 | Incomplete validation in `SparseSparseMinimum` | 2024-03-06T11:18:10.660Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2021-39898 | 2024-03-06T11:18:11.392Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2021-29606 | Heap OOB read in TFLite | 2024-03-06T11:18:11.890Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2021-39897 | 2024-03-06T11:18:12.683Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2021-29605 | Integer overflow in TFLite memory allocation | 2024-03-06T11:18:13.142Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2021-39896 | 2024-03-06T11:18:13.889Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2021-29604 | Division by zero in TFLite's implementation of hashtable lookup | 2024-03-06T11:18:14.391Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2021-39895 | 2024-03-06T11:18:15.139Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2021-29603 | Heap OOB write in TFLite | 2024-03-06T11:18:15.660Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2021-39894 | 2024-03-06T11:18:16.408Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2021-29602 | Division by zero in TFLite's implementation of `DepthwiseConv` | 2024-03-06T11:18:16.905Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2021-39893 | 2024-03-06T11:18:17.734Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2021-29601 | Integer overflow in TFLite concatentation | 2024-03-06T11:18:18.197Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2021-39892 | 2024-03-06T11:18:18.962Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2021-29600 | Division by zero in TFLite's implementation of `OneHot` | 2024-03-06T11:18:19.505Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2021-39891 | 2024-03-06T11:18:20.195Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2021-29599 | Division by zero in TFLite's implementation of `Split` | 2024-03-06T11:18:20.763Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2021-39890 | 2024-03-06T11:18:21.446Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2021-29598 | Division by zero in TFLite's implementation of `SVDF` | 2024-03-06T11:18:22.016Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2021-39889 | 2024-03-06T11:18:22.704Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2021-29597 | Division by zero in TFLite's implementation of `SpaceToBatchNd` | 2024-03-06T11:18:23.269Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2021-39888 | 2024-03-06T11:18:23.989Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2021-29596 | Division by zero in TFLite's implementation of `EmbeddingLookup` | 2024-03-06T11:18:24.521Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2021-39887 | 2024-03-06T11:18:25.220Z | 2025-04-03T14:40:37.652Z | |
| bit-tensorflow-2021-29595 | Division by zero in TFLite's implementation of `DepthToSpace` | 2024-03-06T11:18:25.797Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2007-avi-147 | Vulnérabilité dans ulogd | 2007-03-28T00:00:00.000000 | 2007-03-28T00:00:00.000000 |
| certa-2007-avi-148 | Multiples vulnérabilités dans IBM Lotus Domino | 2007-03-28T00:00:00.000000 | 2007-03-28T00:00:00.000000 |
| certa-2007-avi-149 | Vulnérabilité de LDAP Account Manager | 2007-03-29T00:00:00.000000 | 2007-03-29T00:00:00.000000 |
| certa-2007-avi-150 | Vulnérabilités dans Cisco Unified CallManager et Presence Server | 2007-03-29T00:00:00.000000 | 2007-03-29T00:00:00.000000 |
| certa-2007-avi-151 | Vulnérabilité mod_perl pour Apache | 2007-04-03T00:00:00.000000 | 2007-05-29T00:00:00.000000 |
| certa-2007-avi-152 | Multiples vulnérabilités dans ImageMagick | 2007-04-03T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2007-avi-153 | Multiples vulnérabilités dans IBM Tivoli Provisioning Manager for OS Deployment | 2007-04-03T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2007-avi-154 | Multiples vulnérabilités de VMware ESX Server | 2007-04-03T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2007-avi-155 | Vulnérabilités dans Sun Solaris et Sun Java Enterprise System | 2007-04-03T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2007-avi-156 | Multiples vulnérabilités dans des composants graphiques de Microsoft Windows | 2007-04-03T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2007-avi-157 | Vulnérabilité dans Apache Tomcat | 2007-04-04T00:00:00.000000 | 2007-04-04T00:00:00.000000 |
| certa-2007-avi-158 | Multiples vulnérabilités de Kerberos | 2007-04-04T00:00:00.000000 | 2007-05-30T00:00:00.000000 |
| certa-2007-avi-159 | Vulnérabilité dans Qt | 2007-04-04T00:00:00.000000 | 2007-08-27T00:00:00.000000 |
| certa-2007-avi-160 | Multiples vulnérabilités dans Wordpress | 2007-04-05T00:00:00.000000 | 2007-04-05T00:00:00.000000 |
| certa-2007-avi-161 | Vulnérabilité des produits Kaspersky | 2007-04-05T00:00:00.000000 | 2007-04-05T00:00:00.000000 |
| certa-2007-avi-162 | Vulnérabilité dans IBM Tivoli Business Service Manager | 2007-04-05T00:00:00.000000 | 2007-04-05T00:00:00.000000 |
| certa-2007-avi-163 | Vulnérabilité dans Symantec Enterprise Security Manager | 2007-04-10T00:00:00.000000 | 2007-04-10T00:00:00.000000 |
| certa-2007-avi-164 | Multiples vulnérabilités dans SAP RFC Library | 2007-04-10T00:00:00.000000 | 2007-04-10T00:00:00.000000 |
| certa-2007-avi-165 | Vulnérabilités dans Microsoft Content Management Server (CMS) | 2007-04-11T00:00:00.000000 | 2007-06-13T00:00:00.000000 |
| certa-2007-avi-166 | Vulnérabilité dans le service UPnP de Microsoft Windows | 2007-04-11T00:00:00.000000 | 2007-04-11T00:00:00.000000 |
| certa-2007-avi-167 | Vulnérabilité de Microsoft Agent dans Windows | 2007-04-11T00:00:00.000000 | 2007-04-11T00:00:00.000000 |
| certa-2007-avi-168 | Multiples vulnérabilités de CSRSS dans Microsoft Windows | 2007-04-11T00:00:00.000000 | 2007-04-11T00:00:00.000000 |
| certa-2007-avi-169 | Vulnérabilité dans le noyau de Microsoft Windows | 2007-04-11T00:00:00.000000 | 2007-04-11T00:00:00.000000 |
| certa-2007-avi-170 | Vulnérabilité dans Adobe ColdFusion MX 7 | 2007-04-11T00:00:00.000000 | 2007-04-11T00:00:00.000000 |
| certa-2007-avi-171 | Vulnérabilités sur Dotclear | 2007-04-13T00:00:00.000000 | 2007-04-13T00:00:00.000000 |
| certa-2007-avi-172 | Vulnérabilités dans des produits sans-fil Cisco | 2007-04-13T00:00:00.000000 | 2007-04-17T00:00:00.000000 |
| certa-2007-avi-173 | Vulnérabilité dans FreeRADIUS | 2007-04-13T00:00:00.000000 | 2007-04-13T00:00:00.000000 |
| certa-2007-avi-174 | Vulnérabilités dans ClamAV | 2007-04-13T00:00:00.000000 | 2007-04-13T00:00:00.000000 |
| certa-2007-avi-175 | Multiples vulnérabilités dans Opera | 2007-04-16T00:00:00.000000 | 2007-04-16T00:00:00.000000 |
| certa-2007-avi-176 | Vulnérabilité dans LANDesk Management Suite | 2007-04-16T00:00:00.000000 | 2007-04-16T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2022-001382 | File Permission Vulnerability in Hitachi Command Suite | 2022-03-07T15:35+09:00 | 2022-03-07T15:35+09:00 |
| jvndb-2022-001383 | Directory Permission Vulnerability in Hitachi Ops Center Viewpoint | 2022-03-07T15:45+09:00 | 2022-03-07T15:45+09:00 |
| jvndb-2022-001384 | Multiple vulnerabilities in OMRON CX-Programmer | 2022-03-08T15:56+09:00 | 2024-06-21T11:32+09:00 |
| jvndb-2022-001387 | Installer of WPS Office for Windows misconfigures the ACL for the installation directory | 2022-03-09T12:30+09:00 | 2024-06-21T11:37+09:00 |
| jvndb-2022-000016 | UNIVERGE WA Series vulnerable to OS command injection | 2022-03-10T14:31+09:00 | 2022-03-10T14:31+09:00 |
| jvndb-2022-001404 | Installer of Trend Micro Password Manager may insecurely load Dynamic Link Libraries | 2022-03-11T15:55+09:00 | 2022-03-11T15:55+09:00 |
| jvndb-2021-008345 | Installer of Trend Micro Portable Security may insecurely load Dynamic Link Libraries | 2022-03-14T16:43+09:00 | 2022-03-14T16:43+09:00 |
| jvndb-2022-000020 | Multiple vulnerabilities in pfSense | 2022-03-15T14:58+09:00 | 2024-06-21T11:59+09:00 |
| jvndb-2022-000021 | Multiple vulnerabilities in KINGSOFT "WPS Office" and "KINGSOFT Internet Security" | 2022-03-16T14:46+09:00 | 2022-03-16T14:46+09:00 |
| jvndb-2022-001477 | Netcommunity OG410X and OG810X VoIP gateway/Hikari VoIP adapter for business offices vulnerable to OS command injection | 2022-03-23T12:08+09:00 | 2022-03-23T12:08+09:00 |
| jvndb-2022-000022 | AttacheCase may insecurely load Dynamic Link Libraries | 2022-03-30T14:00+09:00 | 2024-06-21T11:42+09:00 |
| jvndb-2022-000023 | WordPress Plugin "Advanced Custom Fields" vulnerable to missing authorization | 2022-03-30T15:23+09:00 | 2024-06-21T12:25+09:00 |
| jvndb-2022-000024 | Zero-channel BBS Plus vulnerable to cross-site scripting | 2022-03-30T15:36+09:00 | 2024-06-20T17:34+09:00 |
| jvndb-2022-001494 | Trend Micro Apex Central and Trend Micro Apex Central as a Service vulnerable to improper check for file contents | 2022-03-31T17:25+09:00 | 2022-03-31T17:25+09:00 |
| jvndb-2022-001526 | Trend Micro Antivirus for Mac vulnerable to privilege escalation | 2022-04-07T16:58+09:00 | 2022-04-07T16:58+09:00 |
| jvndb-2022-000026 | WordPress Plugin "MicroPayments - Paid Author Subscriptions, Content, Downloads, Membership" vulnerable to cross-site request forgery | 2022-04-15T13:15+09:00 | 2024-06-25T18:04+09:00 |
| jvndb-2022-000027 | Hammock AssetView missing authentication for critical functions | 2022-04-22T13:53+09:00 | 2024-06-20T12:15+09:00 |
| jvndb-2022-000028 | Multiple vulnerabilities in multiple MEIKYO ELECTRIC products | 2022-05-09T14:31+09:00 | 2024-06-19T15:55+09:00 |
| jvndb-2022-000029 | KOYO Electronics Screen Creator Advance2 vulnerable to authentication bypass | 2022-05-09T14:43+09:00 | 2024-06-19T16:03+09:00 |
| jvndb-2022-000030 | Multiple vulnerabilities in Operation management interface of FUJITSU Network IPCOM | 2022-05-09T15:02+09:00 | 2024-07-18T16:30+09:00 |
| jvndb-2022-000031 | GENEREX RCCMD vulnerable to directory traversal | 2022-05-10T15:47+09:00 | 2024-06-18T15:35+09:00 |
| jvndb-2022-000032 | Installer of Trend Micro Password Manager may insecurely load Dynamic Link Libraries | 2022-05-11T15:21+09:00 | 2024-06-18T17:46+09:00 |
| jvndb-2022-001795 | Command injection vulnerability in QNAP VioStar series NVR | 2022-05-12T18:07+09:00 | 2024-06-20T11:31+09:00 |
| jvndb-2022-001800 | Installer of Trend Micro HouseCall for Home Networks may insecurely load Dynamic Link Libraries | 2022-05-13T16:24+09:00 | 2022-05-13T16:24+09:00 |
| jvndb-2022-000034 | EC-CUBE plugin "Easy Blog for EC-CUBE4" vulnerable to cross-site request forgery | 2022-05-13T16:31+09:00 | 2024-06-18T12:13+09:00 |
| jvndb-2022-000033 | Strapi vulnerable to cross-site scripting | 2022-05-13T16:45+09:00 | 2024-06-18T11:17+09:00 |
| jvndb-2022-000035 | Multiple vulnerabilities in Cybozu Garoon | 2022-05-16T14:25+09:00 | 2024-06-17T16:34+09:00 |
| jvndb-2022-000036 | Multiple vulnerabilities in Rakuten Casa | 2022-05-19T15:13+09:00 | 2024-06-18T12:09+09:00 |
| jvndb-2022-000037 | Spring Security OAuth (spring-security-oauth2) vulnerable to denial-of-service (DoS) | 2022-05-20T17:04+09:00 | 2024-06-20T12:09+09:00 |
| jvndb-2022-000038 | WordPress plugin "WP Statistics" vulnerable to cross-site scripting | 2022-05-24T15:00+09:00 | 2024-06-18T15:41+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-02432 | IBM InfoSphere Information Server安全绕过漏洞 | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02439 | IBM Security SiteProtector System本地信息泄露漏洞 | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02440 | IBM Security SiteProtector安全绕过漏洞 | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02441 | IBM Security SiteProtector System远程命令执行漏洞 | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02442 | IBM Security SiteProtector System跨站脚本漏洞 | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02443 | Microsoft Office组件内存错误引用漏洞 | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02444 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02444) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02445 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02445) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02446 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02446) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02447 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02447) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02448 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02448) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02449 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02449) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02450 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02450) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02451 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02451) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02452 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02452) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02508 | HP存在多个远程代码执行漏洞 | 2015-04-15 | 2015-04-17 |
| cnvd-2015-02509 | Microsoft Office内存破坏漏洞(CNVD-2015-02509) | 2015-04-15 | 2015-04-17 |
| cnvd-2015-02510 | Microsoft Outlook App for Mac跨站脚本漏洞 | 2015-04-15 | 2015-04-17 |
| cnvd-2015-02511 | Microsoft Office组件内存错误引用漏洞(CNVD-2015-02511) | 2015-04-15 | 2015-04-17 |
| cnvd-2015-02512 | Microsoft Office组件内存错误引用漏洞(CNVD-2015-02512) | 2015-04-15 | 2015-04-17 |
| cnvd-2015-02543 | Chrony内存破坏漏洞 | 2015-04-15 | 2015-04-20 |
| cnvd-2015-02544 | HP存在多个权限提升漏洞 | 2015-04-15 | 2015-04-20 |
| cnvd-2015-02545 | das_watchdog 'XAUTHORITY'环境变量处理缓冲区溢出漏洞 | 2015-04-15 | 2015-04-20 |
| cnvd-2015-02422 | Microsoft IIS远程代码执行漏洞 | 2015-04-16 | 2015-04-17 |
| cnvd-2015-02479 | Microsoft Windows NtCreateTransactionManager类型混淆漏洞 | 2015-04-16 | 2015-04-17 |
| cnvd-2015-02480 | Microsoft ASP.NET信息泄露漏洞 | 2015-04-16 | 2015-04-17 |
| cnvd-2015-02481 | Microsoft Windows MS-DOS设备名漏洞 | 2015-04-16 | 2015-04-17 |
| cnvd-2015-02482 | Microsoft Windows MSXML3同源策略SFB漏洞 | 2015-04-16 | 2015-04-17 |
| cnvd-2015-02483 | Microsoft Windows ADFS信息泄露漏洞 | 2015-04-16 | 2015-04-17 |
| cnvd-2015-02484 | Microsoft SharePoint Server跨站脚本漏洞(CNVD-2015-02484) | 2015-04-16 | 2015-04-17 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-04799 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04800 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 05.07.2024 |
| bdu:2015-04801 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 05.07.2024 |
| bdu:2015-04802 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04803 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциа… | 28.04.2015 | 05.07.2024 |
| bdu:2015-04804 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциа… | 28.04.2015 | 05.07.2024 |
| bdu:2015-04805 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04806 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04807 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04808 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04809 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04810 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04811 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциа… | 28.04.2015 | 05.07.2024 |
| bdu:2015-04812 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04813 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04814 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04815 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04816 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04819 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 05.07.2024 |
| bdu:2015-04820 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04821 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04822 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04823 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04824 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04825 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04826 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04827 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04828 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04829 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-04830 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| ID | Description | Updated |
|---|---|---|
| var-202106-2179 | EA6350 is a router product of Belkin Company. Belkin's EA6350 has a weak password vul… | 2022-05-04T10:10:35.045000Z |
| var-202106-2158 | The NETGEAR WNR3500L router is a wireless router device. The NETGEAR WNR3500L router … | 2022-05-04T10:10:35.055000Z |
| var-202106-2137 | D-Link DIR-809 is a wireless router using RTOS. D-Link DIR-809 has a denial of servic… | 2022-05-04T10:10:35.067000Z |
| var-202106-2116 | Ruckus R310 is a wireless access point product of Ruckus Wireless. Ruckus Wireless Ru… | 2022-05-04T10:10:35.083000Z |
| var-202106-2095 | ZTE Corporation is the world's leading provider of integrated communications solutions. T… | 2022-05-04T10:10:35.095000Z |
| var-202106-2074 | Matsushita Electric (China) Co., Ltd. is mainly responsible for the sales and after-sales… | 2022-05-04T10:10:35.106000Z |
| var-202106-2053 | ZXV10 W815N is a wireless router of ZTE Corporation. ZTE Corporation ZXV10 W815N has … | 2022-05-04T10:10:35.117000Z |
| var-202106-2032 | The micro-enterprise integrated gateway is a VPN router under the Tenda brand. Tenda … | 2022-05-04T10:10:35.127000Z |
| var-202106-2011 | NETGEAR DGN1000 is a wireless router. NETGEAR DGN1000 has a weak password vulnerabili… | 2022-05-04T10:10:35.143000Z |
| var-202106-1948 | Apache HTTP Server is an open source web server of the Apache Foundation. The server is f… | 2022-05-04T10:10:35.155000Z |
| var-202105-1701 | Taiyuan Yisi Software Technology Co., Ltd. is an Internet software development and system… | 2022-05-04T10:10:35.599000Z |
| var-202105-1680 | WX2560H is a gateway wireless controller independently developed by New H3C Technology Co… | 2022-05-04T10:10:35.611000Z |
| var-202105-1659 | NR255P is a new generation of high-performance QOS router developed by Shenzhen Leike Ind… | 2022-05-04T10:10:35.622000Z |
| var-202105-1638 | Xpon-ONU is a router. Xpon-ONU has a weak password vulnerability, which can be exploi… | 2022-05-04T10:10:35.633000Z |
| var-202105-1617 | Enterprising 750W is an enterprise-class wireless router. Shanghai Aitai Technology C… | 2022-05-04T10:10:35.649000Z |
| var-202105-1596 | Shenzhen Jixiang Tengda Technology Co., Ltd. (hereinafter referred to as "Tengda") was fo… | 2022-05-04T10:10:35.660000Z |
| var-202105-1575 | D-Link Electronic Equipment (Shanghai) Co., Ltd. was established on August 13, 2002. The … | 2022-05-04T10:10:35.670000Z |
| var-202104-2074 | Hikvision is a video-centric IoT solution provider, providing comprehensive security, sma… | 2022-05-04T10:10:36.178000Z |
| var-202104-2053 | Sanyo generally refers to Sanyo. Sanyo (English name: SANYO) is a large-scale enterprise … | 2022-05-04T10:10:36.188000Z |
| var-202104-2032 | MAS mobile proxy server is an access tool that assists enterprises in realizing wireless … | 2022-05-04T10:10:36.199000Z |
| var-202104-2011 | ZTE Corporation is the world's leading provider of integrated communications solutions. … | 2022-05-04T10:10:36.210000Z |
| var-202104-1990 | Hikvision is a video-centric IoT solution provider, providing comprehensive security, sma… | 2022-05-04T10:10:36.226000Z |
| var-202103-1798 | ZXHN F612 is a simple xPON HGU terminal used in FTTH scenarios. ZTE Corporation ZXHN … | 2022-05-04T10:10:37.627000Z |
| var-202103-1777 | GM620 is an optical cat device of China Mobile. China Mobile GM620 has a denial of se… | 2022-05-04T10:10:37.637000Z |
| var-202103-1756 | Ruijie Networks Co., Ltd. is a professional network manufacturer with a full range of net… | 2022-05-04T10:10:37.648000Z |
| var-202103-1734 | YR1800XG is a router of Shenzhen Meikexing Communication Technology Co., Ltd. Shenzhe… | 2022-05-04T10:10:37.658000Z |
| var-202103-1713 | TL-R476G+ is a TP-Link enterprise VPN router. TP-Link TL-R476G+ has a denial of servi… | 2022-05-04T10:10:37.667000Z |
| var-202103-1692 | Inhantong InRouter900 series industrial routers are 4G industrial routers. Inhantong … | 2022-05-04T10:10:37.678000Z |
| var-202103-1671 | InoTouchPad is an HMI programming software. Inovance Technology InoTouchPad has a mem… | 2022-05-04T10:10:37.688000Z |
| var-202103-1649 | The business scope of Beijing Xinnuoride Software System Co., Ltd. includes: software dev… | 2022-05-04T10:10:37.698000Z |