Recent vulnerabilities
Recent vulnerabilities from
Select from 69 available sources using the dropdown above.
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-1434 |
N/A
|
login in Slackware Linux 3.2 through 3.5 does not… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.255Z |
| CVE-1999-1435 |
N/A
|
Buffer overflow in libsocks5 library of Socks 5 (… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.217Z |
| CVE-1999-1436 |
N/A
|
Ray Chan WWW Authorization Gateway 0.1 CGI progra… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.288Z |
| CVE-1999-1438 |
N/A
|
Vulnerability in /bin/mail in SunOS 4.1.1 and ear… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.242Z |
| CVE-1999-1439 |
N/A
|
gcc 2.7.2 allows local users to overwrite arbitra… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.207Z |
| CVE-1999-1440 |
N/A
|
Win32 ICQ 98a 1.30, and possibly other versions, … |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.241Z |
| CVE-1999-1441 |
N/A
|
Linux 2.0.34 does not properly prevent users from… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.339Z |
| CVE-1999-1442 |
N/A
|
Bug in AMD K6 processor on Linux 2.0.x and 2.1.x … |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.220Z |
| CVE-1999-1443 |
N/A
|
Micah Software Full Armor Network Configurator an… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.201Z |
| CVE-1999-1444 |
N/A
|
genkey utility in Alibaba 2.0 generates RSA key p… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.230Z |
| CVE-1999-1445 |
N/A
|
Vulnerability in imapd and ipop3d in Slackware 3.… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.321Z |
| CVE-1999-1446 |
N/A
|
Internet Explorer 3 records a history of all URL'… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.235Z |
| CVE-1999-1447 |
N/A
|
Internet Explorer 4.0 allows remote attackers to … |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.180Z |
| CVE-1999-1448 |
N/A
|
Eudora and Eudora Light before 3.05 allows remote… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.281Z |
| CVE-1999-1449 |
N/A
|
SunOS 4.1.4 on a Sparc 20 machine allows local us… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.262Z |
| CVE-1999-1450 |
N/A
|
Vulnerability in (1) rlogin daemon rshd and (2) s… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.392Z |
| CVE-1999-1451 |
N/A
|
The Winmsdp.exe sample file in IIS 4.0 and Site S… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.399Z |
| CVE-1999-1453 |
N/A
|
Internet Explorer 4 allows remote attackers (mali… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.228Z |
| CVE-1999-1454 |
N/A
|
Macromedia "The Matrix" screen saver on Windows 9… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:11:03.382Z |
| CVE-1999-1457 |
N/A
|
Buffer overflow in thttpd HTTP server before 2.04… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:18:07.040Z |
| CVE-1999-1458 |
N/A
|
Buffer overflow in at program in Digital UNIX 4.0… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:18:07.124Z |
| CVE-1999-1459 |
N/A
|
BMC PATROL Agent before 3.2.07 allows local users… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:18:07.212Z |
| CVE-1999-1460 |
N/A
|
BMC PATROL SNMP Agent before 3.2.07 allows local … |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:18:07.281Z |
| CVE-1999-1461 |
N/A
|
inpview in InPerson on IRIX 5.3 through IRIX 6.5.… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:18:06.968Z |
| CVE-1999-1462 |
N/A
|
Vulnerability in bb-hist.sh CGI History module in… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:18:07.463Z |
| CVE-1999-1463 |
N/A
|
Windows NT 4.0 before SP3 allows remote attackers… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:18:07.370Z |
| CVE-1999-1464 |
N/A
|
Vulnerability in Cisco IOS 11.1CC and 11.1CT with… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:18:07.449Z |
| CVE-1999-1465 |
N/A
|
Vulnerability in Cisco IOS 11.1 through 11.3 with… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:18:06.981Z |
| CVE-1999-1466 |
N/A
|
Vulnerability in Cisco routers versions 8.2 throu… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:18:07.269Z |
| CVE-1999-1467 |
N/A
|
Vulnerability in rcp on SunOS 4.0.x allows remote… |
n/a |
n/a |
2001-09-12T04:00:00.000Z | 2024-08-01T17:18:07.436Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2001-0094 |
N/A
|
Buffer overflow in kdc_reply_cipher of libkrb (Ke… |
n/a |
n/a |
2002-03-09T05:00:00.000Z | 2024-08-08T04:06:55.434Z |
| CVE-2001-0095 |
N/A
|
catman in Solaris 2.7 and 2.8 allows local users … |
n/a |
n/a |
2001-09-18T04:00:00.000Z | 2024-08-08T04:06:55.297Z |
| CVE-2001-0096 |
N/A
|
FrontPage Server Extensions (FPSE) in IIS 4.0 and… |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T04:06:55.335Z |
| CVE-2001-0097 |
N/A
|
The Web interface for Infinite Interchange 3.6.1 … |
n/a |
n/a |
2001-02-02T05:00:00.000Z | 2024-08-08T04:06:55.060Z |
| CVE-2001-0098 |
N/A
|
Buffer overflow in Bea WebLogic Server before 5.1… |
n/a |
n/a |
2001-02-02T05:00:00.000Z | 2024-08-08T04:06:55.296Z |
| CVE-2001-0099 |
N/A
|
bsguest.cgi guestbook script allows remote attack… |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T04:06:55.339Z |
| CVE-2001-0100 |
N/A
|
bslist.cgi mailing list script allows remote atta… |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T04:06:55.448Z |
| CVE-2001-0101 |
N/A
|
Vulnerability in fetchmail 5.5.0-2 and earlier in… |
n/a |
n/a |
2001-02-02T05:00:00.000Z | 2024-08-08T04:06:55.260Z |
| CVE-2001-0102 |
N/A
|
"Multiple Users" Control Panel in Mac OS 9 allows… |
n/a |
n/a |
2001-02-02T05:00:00.000Z | 2024-08-08T04:06:55.275Z |
| CVE-2001-0103 |
N/A
|
CoffeeCup Direct and Free FTP clients uses weak e… |
n/a |
n/a |
2001-02-02T05:00:00.000Z | 2024-08-08T04:06:55.433Z |
| CVE-2001-0104 |
N/A
|
MDaemon Pro 3.5.1 and earlier allows local users … |
n/a |
n/a |
2001-02-02T05:00:00.000Z | 2024-08-08T04:06:55.419Z |
| CVE-2001-0105 |
N/A
|
Vulnerability in top in HP-UX 11.04 and earlier a… |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T04:06:55.381Z |
| CVE-2001-0106 |
N/A
|
Vulnerability in inetd server in HP-UX 11.04 and … |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T04:06:55.369Z |
| CVE-2001-1273 |
N/A
|
The "mxcsr P4" vulnerability in the Linux kernel … |
n/a |
n/a |
2002-05-03T04:00:00.000Z | 2024-08-08T04:51:07.589Z |
| CVE-2000-0890 |
N/A
|
periodic in FreeBSD 4.1.1 and earlier, and possib… |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T05:37:31.690Z |
| CVE-2000-0893 |
N/A
|
The presence of the Distributed GL Daemon (dgld) … |
n/a |
n/a |
2001-02-02T05:00:00.000Z | 2024-08-08T05:37:31.517Z |
| CVE-2001-0021 |
N/A
|
MailMan Webmail 3.0.25 and earlier allows remote … |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T04:06:54.651Z |
| CVE-2001-0030 |
N/A
|
FoolProof 3.9 allows local users to bypass progra… |
n/a |
n/a |
2001-02-02T05:00:00.000Z | 2024-08-08T04:06:54.678Z |
| CVE-2001-0031 |
N/A
|
BroadVision One-To-One Enterprise allows remote a… |
n/a |
n/a |
2001-02-02T05:00:00.000Z | 2024-08-08T04:06:55.298Z |
| CVE-2001-0032 |
N/A
|
Format string vulnerability in ssldump possibly a… |
n/a |
n/a |
2001-02-02T05:00:00.000Z | 2024-08-08T04:06:54.755Z |
| CVE-2001-0033 |
N/A
|
KTH Kerberos IV allows local users to change the … |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T04:06:55.308Z |
| CVE-2001-0034 |
N/A
|
KTH Kerberos IV allows local users to specify an … |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T04:06:54.827Z |
| CVE-2001-0035 |
N/A
|
Buffer overflow in the kdc_reply_cipher function … |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T04:06:55.377Z |
| CVE-2001-0036 |
N/A
|
KTH Kerberos IV allows local users to overwrite a… |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T04:06:55.319Z |
| CVE-2001-0037 |
N/A
|
Directory traversal vulnerability in HomeSeer bef… |
n/a |
n/a |
2001-02-02T05:00:00.000Z | 2024-08-08T04:06:55.099Z |
| CVE-2001-0038 |
N/A
|
Offline Explorer 1.4 before Service Release 2 all… |
n/a |
n/a |
2001-02-02T05:00:00.000Z | 2024-08-08T04:06:55.305Z |
| CVE-2001-0039 |
N/A
|
IPSwitch IMail 6.0.5 allows remote attackers to c… |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T04:06:55.330Z |
| CVE-2001-0040 |
N/A
|
APC UPS daemon, apcupsd, saves its process ID in … |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T04:06:54.898Z |
| CVE-2001-0041 |
N/A
|
Memory leak in Cisco Catalyst 4000, 5000, and 600… |
n/a |
n/a |
2001-05-07T04:00:00.000Z | 2024-08-08T04:06:54.553Z |
| CVE-2001-0042 |
N/A
|
PHP 3.x (PHP3) on Apache 1.3.6 allows remote atta… |
n/a |
n/a |
2004-09-01T04:00:00.000Z | 2024-08-08T04:06:55.365Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-4fqg-89cc-5pv5 |
9.8 (3.1)
|
Malicious Package in sj-labc | 2020-09-04T14:58:44Z | 2021-10-01T17:21:38Z |
| ghsa-c3hq-7mxh-mqxf |
|
Sandbox Breakout / Arbitrary Code Execution in lighter-vm | 2020-09-04T14:59:50Z | 2020-08-31T18:54:55Z |
| ghsa-gc25-3vc5-2jf9 |
|
Sandbox Breakout / Arbitrary Code Execution in sandbox | 2020-09-04T15:00:58Z | 2026-02-02T23:12:39Z |
| ghsa-3gpc-w23c-w59w |
|
Sandbox Breakout / Arbitrary Code Execution in pitboss-ng | 2020-09-04T15:02:06Z | 2021-04-21T19:45:42Z |
| ghsa-jp99-5h8w-gmxc |
|
Sandbox Breakout / Arbitrary Code Execution in @zhaoyao91/eval-in-vm | 2020-09-04T15:03:13Z | 2020-08-31T18:55:02Z |
| ghsa-54qm-37qr-w5wq |
|
Sandbox Breakout / Arbitrary Code Execution in veval | 2020-09-04T15:04:20Z | 2020-08-31T18:55:05Z |
| ghsa-49c6-3wr4-8jr4 |
9.8 (3.1)
|
Malicious Package in malicious-npm-package | 2020-09-04T15:05:26Z | 2021-10-01T20:07:48Z |
| ghsa-g9r4-xpmj-mj65 |
|
Prototype Pollution in handlebars | 2020-09-04T15:06:32Z | 2020-08-31T18:55:14Z |
| ghsa-q2c6-c6pm-g3gh |
|
Arbitrary Code Execution in handlebars | 2020-09-04T15:07:38Z | 2020-08-31T18:55:11Z |
| ghsa-g7h8-p22m-2rvx |
|
Prototype Pollution in flat-wrap | 2020-09-04T15:08:46Z | 2020-08-31T18:55:16Z |
| ghsa-6fh5-8wq8-w3wr |
|
Prototype Pollution in unflatten | 2020-09-04T15:09:55Z | 2020-08-31T18:55:18Z |
| ghsa-wx77-rp39-c6vg |
|
Regular Expression Denial of Service in markdown | 2020-09-04T15:11:03Z | 2022-03-24T22:10:13Z |
| ghsa-q9wr-gcjc-hq52 |
|
Prototype Pollution in reggae | 2020-09-04T15:12:13Z | 2020-08-31T18:55:23Z |
| ghsa-ch82-gqh6-9xj9 |
|
Prototype Pollution in get-setter | 2020-09-04T15:13:19Z | 2020-08-31T18:55:25Z |
| ghsa-9qrg-h9g8-c65q |
|
Prototype Pollution in deep-setter | 2020-09-04T15:14:26Z | 2020-08-31T18:55:28Z |
| ghsa-8j49-49jq-vwcq |
|
Prototype Pollution in getsetdeep | 2020-09-04T15:15:34Z | 2020-08-31T18:55:30Z |
| ghsa-qccf-q7p4-3q3j |
|
Prototype Pollution in safe-object2 | 2020-09-04T15:16:42Z | 2020-08-31T18:55:32Z |
| ghsa-83pq-466j-fc6j |
|
Prototype Pollution in sahmat | 2020-09-04T15:17:50Z | 2020-08-31T18:55:34Z |
| ghsa-9gxr-rhx6-4jgv |
|
Sandbox Breakout / Prototype Pollution in notevil | 2020-09-04T15:18:57Z | 2020-08-31T18:55:36Z |
| ghsa-5p98-wpc9-g498 |
|
Server-Side Request Forgery in html-pdf-chrome | 2020-09-04T15:21:32Z | 2022-06-22T19:28:32Z |
| ghsa-mmqv-m45h-q2hp |
|
Sandbox Breakout / Arbitrary Code Execution in localeval | 2020-09-04T15:22:40Z | 2026-01-16T14:47:29Z |
| ghsa-c5xm-m64m-f2vq |
9.8 (3.1)
|
Malicious Package in cxct | 2020-09-04T15:23:47Z | 2021-10-01T20:13:30Z |
| ghsa-54xj-q58h-9x57 |
9.8 (3.1)
|
Arbitrary File Write in iobroker.admin | 2020-09-04T15:24:56Z | 2021-10-01T20:14:10Z |
| ghsa-hg79-j56m-fxgv |
|
Cross-Site Scripting in react | 2020-09-04T15:26:04Z | 2021-10-01T20:15:16Z |
| ghsa-qp6m-jqfr-2f7v |
9.1 (3.1)
|
Malicious Package in babel-laoder | 2020-09-04T15:27:11Z | 2021-10-01T20:17:24Z |
| ghsa-vvfh-mvjv-w38q |
9.1 (3.1)
|
Malicious Package in babel-loadre | 2020-09-04T15:28:19Z | 2021-10-01T20:17:42Z |
| ghsa-9cph-cqqh-36pw |
9.1 (3.1)
|
Malicious Package in babel-loqder | 2020-09-04T15:29:25Z | 2021-10-01T20:17:59Z |
| ghsa-2jm5-2cqf-6vw9 |
9.1 (3.1)
|
Malicious Package in baes-x | 2020-09-04T15:30:32Z | 2021-10-01T20:29:19Z |
| ghsa-2fwq-wx47-hm6x |
9.1 (3.1)
|
Malicious Package in bcion | 2020-09-04T15:31:39Z | 2021-10-01T20:30:20Z |
| ghsa-7j93-5m2h-rvjx |
9.1 (3.1)
|
Malicious Package in bconi | 2020-09-04T15:32:46Z | 2021-10-01T20:37:33Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2023-217 |
8.8 (3.1)
|
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.2.2. | modoboa | 2023-10-20T17:15:00+00:00 | 2023-10-27T20:23:07.873996+00:00 |
| pysec-2023-210 |
|
views.py in Wagtail CRX CodeRed Extensions (formerly CodeRed CMS or coderedcms) before 0.… | coderedcms | 2023-10-22T19:15:00+00:00 | 2023-10-22T20:22:30.887585+00:00 |
| pysec-2023-211 |
|
views/switch.py in django-grappelli (aka Django Grappelli) before 2.15.2 attempts to prev… | django-grappelli | 2023-10-22T19:15:00+00:00 | 2023-10-22T20:22:30.994719+00:00 |
| pysec-2023-218 |
4.3 (3.1)
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Airflo… | apache-airflow | 2023-10-23T19:15:00+00:00 | 2023-10-28T05:24:46.485079+00:00 |
| pysec-2023-220 |
6.5 (3.1)
|
Nautobot is a Network Automation Platform built as a web application atop the Django Pyth… | nautobot | 2023-10-25T18:17:00+00:00 | 2023-11-01T18:30:02.084237+00:00 |
| pysec-2023-221 |
7.5 (3.1)
|
Werkzeug is a comprehensive WSGI web application library. If an upload of a file that sta… | werkzeug | 2023-10-25T18:17:00Z | 2023-11-08T18:38:34.170214Z |
| pysec-2023-228 |
3.3 (3.1)
|
When installing a package from a Mercurial VCS URL (ie "pip install hg+...") with pip p… | pip | 2023-10-25T18:17:00+00:00 | 2023-11-03T16:28:41.538340+00:00 |
| pysec-2023-224 |
5.3 (3.1)
|
Twisted is an event-based framework for internet applications. Prior to version 23.10.0rc… | twisted | 2023-10-25T21:15:00+00:00 | 2023-11-02T16:33:16.395026+00:00 |
| pysec-2023-230 |
5.3 (3.1)
|
Synapse is an open-source Matrix homeserver Prior to versions 1.95.1 and 1.96.0rc1, cache… | matrix-synapse | 2023-10-31T17:15:00+00:00 | 2023-11-08T20:24:49.199333+00:00 |
| pysec-2023-222 |
|
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.… | django | 2023-11-02T06:15:00+00:00 | 2023-11-02T10:30:06.341485+00:00 |
| pysec-2023-223 |
|
Unsafe YAML deserialization in yaml.Loader in transmute-core before 1.13.5 allows attacke… | transmute-core | 2023-11-02T06:15:00+00:00 | 2023-11-02T10:30:07.951105+00:00 |
| pysec-2023-225 |
|
In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encodi… | django | 2023-11-03T05:15:00+00:00 | 2023-11-03T10:29:40.160394+00:00 |
| pysec-2023-226 |
|
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.te… | django | 2023-11-03T05:15:00+00:00 | 2023-11-03T10:29:40.328470+00:00 |
| pysec-2023-227 |
|
An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrol… | pillow | 2023-11-03T05:15:00+00:00 | 2023-11-03T10:29:41.505456+00:00 |
| pysec-2023-233 |
8.8 (3.1)
|
Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif,… | exiv2 | 2023-11-06T18:15:00Z | 2024-01-02T15:20:59.435740Z |
| pysec-2023-235 |
7.5 (3.1)
|
An issue was discovered in Couchbase Server 7.2.0. There is a private key leak in debug.l… | couchbase | 2023-11-08T21:15:00Z | 2024-01-03T21:03:33.010228Z |
| pysec-2023-274 |
8.8 (3.1)
|
Label Studio is a multi-type data labeling and annotation tool with standardized output f… | label-studio | 2023-11-09T15:15:00+00:00 | 2024-11-21T14:22:53.173192+00:00 |
| pysec-2023-234 |
7.5 (3.1)
|
An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via w… | esptool | 2023-11-09T16:15:00Z | 2024-01-02T13:04:16.284694Z |
| pysec-2023-241 |
9.1 (3.1)
|
Piccolo is an object-relational mapping and query builder which supports asyncio. Prior t… | piccolo | 2023-11-10T18:15:00Z | 2024-01-23T23:21:13.409656Z |
| pysec-2023-231 |
|
Apache Airflow, versions before 2.7.3, has a vulnerability that allows an authorized user… | apache-airflow | 2023-11-12T14:15:00+00:00 | 2023-11-12T16:29:15.321733+00:00 |
| pysec-2023-232 |
|
We failed to apply CVE-2023-40611 in 2.7.1 and this vulnerability was marked as fixed the… | apache-airflow | 2023-11-12T14:15:00+00:00 | 2023-11-12T16:29:15.404665+00:00 |
| pysec-2023-236 |
7.5 (3.1)
|
Remarshal prior to v0.17.1 expands YAML alias nodes unlimitedly, hence Remarshal is vulne… | remarshal | 2023-11-13T03:15:00+00:00 | 2023-11-16T20:25:23.801345+00:00 |
| pysec-2023-275 |
7.5 (3.1)
|
Label Studio is an open source data labeling tool. In all current versions of Label Studi… | label-studio | 2023-11-13T21:15:00+00:00 | 2024-11-21T14:22:53.350760+00:00 |
| pysec-2023-237 |
5.9 (3.1)
|
An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the extension info m… | asyncssh | 2023-11-14T03:15:00+00:00 | 2023-11-17T17:27:01.919743+00:00 |
| pysec-2023-239 |
6.8 (3.1)
|
An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the remote end of an… | asyncssh | 2023-11-14T03:15:00+00:00 | 2023-11-20T09:25:38.326328+00:00 |
| pysec-2023-246 |
7.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. The HTTP … | aiohttp | 2023-11-14T21:15:00+00:00 | 2023-11-22T23:23:57.547793+00:00 |
| pysec-2023-247 |
6.5 (3.1)
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Affected … | aiohttp | 2023-11-14T21:15:00+00:00 | 2023-11-22T23:23:57.631856+00:00 |
| pysec-2023-303 |
8.8 (3.1)
|
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federate… | vantage6-node | 2023-11-14T21:15:00+00:00 | 2024-11-21T14:23:02.574095+00:00 |
| pysec-2023-304 |
8.8 (3.1)
|
vantage6 is a framework to manage and deploy privacy enhancing technologies like Federate… | vantage6-server | 2023-11-14T21:15:00+00:00 | 2024-11-21T14:23:02.641254+00:00 |
| pysec-2023-242 |
7.4 (3.1)
|
Missing SSL certificate validation in HTTPie v3.2.2 allows attackers to eavesdrop on comm… | httpie | 2023-11-16T18:15:00+00:00 | 2023-11-22T02:43:48.390438+00:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-6102 | Malicious code in shopify-koa-app (npm) | 2022-06-20T20:18:14Z | 2022-06-20T20:18:14Z |
| mal-2022-6804 | Malicious code in uphold-authorization-code-oauth (npm) | 2022-06-20T20:18:14Z | 2022-06-20T20:18:15Z |
| mal-2022-6806 | Malicious code in uphold-client-credentials-oauth (npm) | 2022-06-20T20:18:14Z | 2022-06-20T20:18:15Z |
| mal-2022-6810 | Malicious code in uphold-transaction (npm) | 2022-06-20T20:18:14Z | 2022-06-20T20:18:14Z |
| mal-2022-4147 | Malicious code in keychainswift (npm) | 2022-06-20T20:18:15Z | 2022-06-20T20:18:16Z |
| mal-2022-6808 | Malicious code in uphold-pat (npm) | 2022-06-20T20:18:15Z | 2022-06-20T20:18:20Z |
| mal-2022-6809 | Malicious code in uphold-pat-sample (npm) | 2022-06-20T20:18:15Z | 2022-06-20T20:18:15Z |
| mal-2022-6812 | Malicious code in upholdsdk (npm) | 2022-06-20T20:18:15Z | 2022-06-20T20:18:16Z |
| mal-2022-1185 | Malicious code in avddeploy (npm) | 2022-06-20T20:18:16Z | 2022-06-20T20:18:17Z |
| mal-2022-6805 | Malicious code in uphold-authorization-code-oauth-sample (npm) | 2022-06-20T20:18:16Z | 2022-06-20T20:18:16Z |
| mal-2022-6807 | Malicious code in uphold-client-credentials-oauth-sample (npm) | 2022-06-20T20:18:16Z | 2022-06-20T20:18:16Z |
| mal-2022-6811 | Malicious code in uphold-transaction-sample (npm) | 2022-06-20T20:18:16Z | 2022-06-20T20:18:16Z |
| mal-2022-1182 | Malicious code in autorest-extension-base (npm) | 2022-06-20T20:18:17Z | 2022-06-20T20:18:17Z |
| mal-2022-2740 | Malicious code in eng-package-utils (npm) | 2022-06-20T20:18:17Z | 2022-06-20T20:18:25Z |
| mal-2022-3545 | Malicious code in h98d (npm) | 2022-06-20T20:18:17Z | 2022-06-20T20:18:18Z |
| mal-2022-5014 | Malicious code in octo-styleguide (npm) | 2022-06-20T20:18:17Z | 2022-06-20T20:18:18Z |
| mal-2022-6394 | Malicious code in synobot (npm) | 2022-06-20T20:18:17Z | 2022-06-20T20:18:18Z |
| mal-2022-2971 | Malicious code in favcount (npm) | 2022-06-20T20:18:18Z | 2022-06-20T20:18:19Z |
| mal-2022-4035 | Malicious code in jixmaooc (npm) | 2022-06-20T20:18:18Z | 2022-06-20T20:18:18Z |
| mal-2022-4387 | Malicious code in loki-price (npm) | 2022-06-20T20:18:18Z | 2022-06-20T20:18:19Z |
| mal-2022-4737 | Malicious code in multivalue-control-extension (npm) | 2022-06-20T20:18:18Z | 2022-06-20T20:18:19Z |
| mal-2022-4983 | Malicious code in nx-azure (npm) | 2022-06-20T20:18:19Z | 2022-06-20T20:18:20Z |
| mal-2022-6713 | Malicious code in types-publisher (npm) | 2022-06-20T20:18:19Z | 2022-06-20T20:18:19Z |
| mal-2022-1471 | Malicious code in bats-file (npm) | 2022-06-20T20:18:20Z | 2022-06-20T20:18:25Z |
| mal-2022-2813 | Malicious code in eslint-plugin-elastic-charts (npm) | 2022-06-20T20:18:20Z | 2022-06-20T20:18:20Z |
| mal-2022-3578 | Malicious code in head-dlb (npm) | 2022-06-20T20:18:20Z | 2022-06-20T20:18:21Z |
| mal-2022-3717 | Malicious code in hubspot-dlb (npm) | 2022-06-20T20:18:20Z | 2022-06-20T20:18:21Z |
| mal-2022-6824 | Malicious code in urlinator (npm) | 2022-06-20T20:18:20Z | 2022-06-20T20:18:20Z |
| mal-2022-6964 | Malicious code in volga-solv3 (npm) | 2022-06-20T20:18:20Z | 2022-06-20T20:18:20Z |
| mal-2022-2699 | Malicious code in elf-utils-js (npm) | 2022-06-20T20:18:21Z | 2022-06-20T20:18:22Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-0862 | Red Hat OpenShift: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-04-04T22:00:00.000+00:00 | 2023-05-18T22:00:00.000+00:00 |
| wid-sec-w-2023-0863 | Cisco Small Business: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2023-04-05T22:00:00.000+00:00 | 2023-04-05T22:00:00.000+00:00 |
| wid-sec-w-2023-0864 | Red Hat JBoss A-MQ: Mehrere Schwachstellen | 2023-04-05T22:00:00.000+00:00 | 2023-05-18T22:00:00.000+00:00 |
| wid-sec-w-2023-0865 | Cisco Prime Infrastructure: Mehrere Schwachstellen | 2023-04-05T22:00:00.000+00:00 | 2023-04-05T22:00:00.000+00:00 |
| wid-sec-w-2023-0866 | Cisco Small Business: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2023-04-05T22:00:00.000+00:00 | 2023-04-05T22:00:00.000+00:00 |
| wid-sec-w-2023-0867 | Cisco Small Business: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2023-04-05T22:00:00.000+00:00 | 2023-04-05T22:00:00.000+00:00 |
| wid-sec-w-2023-0869 | Cisco WebEx: Mehrere Schwachstellen | 2023-04-05T22:00:00.000+00:00 | 2023-04-05T22:00:00.000+00:00 |
| wid-sec-w-2023-0870 | Cisco Identity Services Engine (ISE): Mehrere Schwachstellen ermöglichen Privilegieneskalation | 2023-04-05T22:00:00.000+00:00 | 2023-04-05T22:00:00.000+00:00 |
| wid-sec-w-2023-0871 | IBM Spectrum Scale: Schwachstelle ermöglicht Codeausführung | 2023-04-05T22:00:00.000+00:00 | 2023-06-29T22:00:00.000+00:00 |
| wid-sec-w-2023-0872 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-04-05T22:00:00.000+00:00 | 2024-04-21T22:00:00.000+00:00 |
| wid-sec-w-2023-0873 | ILIAS: Mehrere Schwachstellen | 2023-04-05T22:00:00.000+00:00 | 2023-04-05T22:00:00.000+00:00 |
| wid-sec-w-2023-0874 | Veritas NetBackup: Schwachstelle ermöglicht Cross-Site Scripting | 2023-04-05T22:00:00.000+00:00 | 2023-04-05T22:00:00.000+00:00 |
| wid-sec-w-2023-0881 | IBM Maximo Asset Management: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2023-04-05T22:00:00.000+00:00 | 2023-04-05T22:00:00.000+00:00 |
| wid-sec-w-2023-0882 | docker Desktop: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-04-05T22:00:00.000+00:00 | 2023-04-05T22:00:00.000+00:00 |
| wid-sec-w-2023-0883 | WithSecure Produkte: Schwachstelle ermöglicht Denial of Service | 2023-04-10T22:00:00.000+00:00 | 2023-04-10T22:00:00.000+00:00 |
| wid-sec-w-2023-0885 | Progress Software Sitefinity: Mehrere Schwachstellen | 2023-04-10T22:00:00.000+00:00 | 2023-04-10T22:00:00.000+00:00 |
| wid-sec-w-2023-0886 | HP LaserJet: Mehrere Schwachstellen | 2023-04-10T22:00:00.000+00:00 | 2023-04-10T22:00:00.000+00:00 |
| wid-sec-w-2023-0887 | ImageMagick: Schwachstelle ermöglicht Codeausführung | 2023-04-10T22:00:00.000+00:00 | 2024-08-05T22:00:00.000+00:00 |
| wid-sec-w-2023-0888 | tcpdump: Schwachstelle ermöglicht Denial of Service | 2023-04-10T22:00:00.000+00:00 | 2023-05-22T22:00:00.000+00:00 |
| wid-sec-w-2023-0889 | libTIFF: Schwachstelle ermöglicht Denial of Service | 2023-04-10T22:00:00.000+00:00 | 2025-06-30T22:00:00.000+00:00 |
| wid-sec-w-2023-0892 | LibreSSL: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-04-10T22:00:00.000+00:00 | 2023-04-10T22:00:00.000+00:00 |
| wid-sec-w-2023-0893 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-04-10T22:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2023-0894 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-04-10T22:00:00.000+00:00 | 2025-03-11T23:00:00.000+00:00 |
| wid-sec-w-2023-0895 | Google Pixel: Mehrere Schwachstellen | 2023-04-10T22:00:00.000+00:00 | 2023-04-13T22:00:00.000+00:00 |
| wid-sec-w-2023-0896 | Zoho ManageEngine ServiceDesk Plus: Mehrere Schwachstellen ermöglichen Umgehen von Sicherheitsvorkehrungen | 2023-04-10T22:00:00.000+00:00 | 2023-04-10T22:00:00.000+00:00 |
| wid-sec-w-2023-0897 | Siemens SIPROTEC 5 Geräte: Schwachstelle ermöglicht Denial of Service | 2023-04-10T22:00:00.000+00:00 | 2023-04-10T22:00:00.000+00:00 |
| wid-sec-w-2023-0898 | Siemens SIMATIC S7: Schwachstelle ermöglicht Denial of Service | 2023-04-10T22:00:00.000+00:00 | 2023-04-10T22:00:00.000+00:00 |
| wid-sec-w-2023-0899 | Siemens JT2Go: Schwachstelle ermöglicht Codeausführung | 2023-04-10T22:00:00.000+00:00 | 2023-04-10T22:00:00.000+00:00 |
| wid-sec-w-2023-0900 | binutils: Schwachstelle ermöglicht Denial of Service | 2023-04-10T22:00:00.000+00:00 | 2025-06-02T22:00:00.000+00:00 |
| wid-sec-w-2023-0901 | Dell NetWorker: Mehrere Schwachstellen | 2023-04-10T22:00:00.000+00:00 | 2023-04-10T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-24-184-01 | Johnson Controls Kantech Door Controllers | 2024-07-02T06:00:00.000000Z | 2024-07-02T06:00:00.000000Z |
| icsa-24-184-02 | mySCADA myPRO | 2024-07-02T06:00:00.000000Z | 2024-07-02T06:00:00.000000Z |
| icsa-24-184-03 | Mitsubishi Electric Iconics Digital Solutions and Mitsubishi Electric Products (Update D) | 2024-07-02T06:00:00.000000Z | 2026-04-07T06:00:00.000000Z |
| icsa-25-007-01 | ABB ASPECT System | 2024-07-03T00:30:00.000000Z | 2024-12-05T00:30:00.000000Z |
| icsa-24-193-01 | Siemens Remote Connect Server | 2024-07-09T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-24-193-02 | Siemens RUGGEDCOM APE 1808 | 2024-07-09T00:00:00.000000Z | 2026-01-14T22:00:11.677616Z |
| icsa-24-193-03 | Siemens Teamcenter Visualization and JT2Go | 2024-07-09T00:00:00.000000Z | 2024-08-13T00:00:00.000000Z |
| icsa-24-193-04 | Siemens Simcenter Femap | 2024-07-09T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-24-193-05 | Siemens SCALANCE, RUGGEDCOM | 2024-07-09T00:00:00.000000Z | 2025-12-09T00:00:00.000000Z |
| icsa-24-193-06 | Siemens RUGGEDCOM | 2024-07-09T00:00:00.000000Z | 2025-08-12T00:00:00.000000Z |
| icsa-24-193-07 | Siemens SIMATIC and SIMIT | 2024-07-09T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-24-193-08 | Siemens Mendix Encryption Module | 2024-07-09T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-24-193-09 | Siemens SINEMA Remote Connect Server | 2024-07-09T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-24-193-10 | Siemens JT Open and PLM XML SDK | 2024-07-09T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-24-193-11 | Siemens RUGGEDCOM APE 1808 | 2024-07-09T00:00:00.000000Z | 2026-01-14T22:00:09.701376Z |
| icsa-24-193-12 | Siemens TIA Portal and SIMATIC STEP 7 | 2024-07-09T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-24-193-13 | Siemens TIA Portal, SIMATIC, and SIRIUS | 2024-07-09T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-24-193-14 | Siemens SIPROTEC | 2024-07-09T00:00:00.000000Z | 2025-11-11T00:00:00.000000Z |
| icsa-24-193-15 | Siemens SINEMA Remote Connect Server | 2024-07-09T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-24-193-16 | Siemens SIMATIC WinCC | 2024-07-09T00:00:00.000000Z | 2024-11-12T00:00:00.000000Z |
| icsa-24-193-17 | Siemens SIMATIC STEP 7 (TIA Portal) | 2024-07-09T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-24-345-02 | Schneider Electric EcoStruxure Foxboro DCS Core Control Services | 2024-07-09T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-24-345-03 | Schneider Electric FoxRTU Station | 2024-07-09T00:00:00.000000Z | 2024-07-09T00:00:00.000000Z |
| icsa-25-112-03 | Schneider Electric Wiser Home Controller WHC-5918A | 2024-07-09T00:00:00.000000Z | 2026-01-30T07:00:00.000000Z |
| icsa-24-191-01 | Delta Electronics CNCSoft-G2 (Update A) | 2024-07-09T06:00:00.000000Z | 2025-02-18T07:00:00.000000Z |
| icsa-24-191-02 | Mitsubishi Electric MELIPC Series MI5122-VW | 2024-07-09T06:00:00.000000Z | 2024-07-09T06:00:00.000000Z |
| icsa-24-191-03 | Johnson Controls Illustra Pro Gen 4 | 2024-07-09T06:00:00.000000Z | 2024-07-09T06:00:00.000000Z |
| icsa-24-191-04 | Johnson Controls Inc. Software House C●CURE 9000 | 2024-07-09T06:00:00.000000Z | 2024-07-09T06:00:00.000000Z |
| icsa-24-191-05 | Johnson Controls Inc. Software House C●CURE 9000 (Update B) | 2024-07-09T06:00:00.000000Z | 2025-07-17T06:00:00.000000Z |
| icsa-24-193-18 | Rockwell Automation ThinManager ThinServer | 2024-07-11T06:00:00.000000Z | 2024-07-11T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-0336 | The Samba AD DC includes checks when adding service principals names (SPNs) to an account to ensure that SPNs do not alias with those already in the database. Some of these checks are able to be bypassed if an account modification re-adds an SPN that was previously present on that account such as one added when a computer is joined to a domain. An attacker who has the ability to write to an account can exploit this to perform a denial-of-service attack by adding an SPN that matches an existing service. Additionally an attacker who can intercept traffic can impersonate existing services resulting in a loss of confidentiality and integrity. | 2022-08-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2022-0358 | A flaw was found in the QEMU virtio-fs shared file system daemon (virtiofsd) implementation. This flaw is strictly related to CVE-2018-13405. A local guest user can create files in the directories shared by virtio-fs with unintended group ownership in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of the group. This could allow a malicious unprivileged user inside the guest to gain access to resources accessible to the root group potentially escalating their privileges within the guest. A malicious local user in the host might also leverage this unexpected executable file created by the guest to escalate their privileges on the host system. | 2022-08-02T00:00:00.000Z | 2024-09-11T00:00:00.000Z |
| msrc_cve-2022-0480 | A flaw was found in the filelock_init in fs/locks.c function in the Linux kernel. This issue can lead to host memory exhaustion due to memcg not limiting the number of Portable Operating System Interface (POSIX) file locks. | 2022-08-02T00:00:00.000Z | 2025-10-01T23:11:13.000Z |
| msrc_cve-2022-0850 | A vulnerability was found in linux kernel where an information leak occurs via ext4_extent_header to userspace. | 2022-08-02T00:00:00.000Z | 2023-08-26T00:00:00.000Z |
| msrc_cve-2022-0934 | A single-byte non-arbitrary write/use-after-free flaw was found in dnsmasq. This flaw allows an attacker who sends a crafted packet processed by dnsmasq potentially causing a denial of service. | 2022-08-02T00:00:00.000Z | 2023-03-08T00:00:00.000Z |
| msrc_cve-2022-1012 | A memory leak problem was found in the TCP source port generation algorithm in net/ipv4/tcp.c due to the small table perturb size. This flaw may allow an attacker to information leak and may cause a denial of service problem. | 2022-08-02T00:00:00.000Z | 2022-08-12T00:00:00.000Z |
| msrc_cve-2022-1016 | A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain which can cause a use-after-free. This issue needs to handle 'return' with proper preconditions as it can lead to a kernel information leak problem caused by a local unprivileged attacker. | 2022-08-02T00:00:00.000Z | 2023-01-06T00:00:00.000Z |
| msrc_cve-2022-1043 | A flaw was found in the Linux kernel’s io_uring implementation. This flaw allows an attacker with a local account to corrupt system memory crash the system or escalate privileges. | 2022-08-02T00:00:00.000Z | 2022-09-07T00:00:00.000Z |
| msrc_cve-2022-1117 | A vulnerability was found in fapolicyd. The vulnerability occurs due to an assumption on how glibc names the runtime linker a build time regular expression may not correctly detect the runtime linker. The consequence is that the pattern detection for applications launched by the run time linker may fail to detect the pattern and allow execution. | 2022-08-02T00:00:00.000Z | 2022-09-09T00:00:00.000Z |
| msrc_cve-2022-1158 | A flaw was found in KVM. When updating a guest's page table entry vm_pgoff was improperly used as the offset to get the page's pfn. As vaddr and vm_pgoff are controllable by user-mode processes this flaw allows unprivileged local users on the host to write outside the userspace region and potentially corrupt the kernel resulting in a denial of service condition. | 2022-08-02T00:00:00.000Z | 2022-08-16T00:00:00.000Z |
| msrc_cve-2022-1198 | A use-after-free vulnerabilitity was discovered in drivers/net/hamradio/6pack.c of linux that allows an attacker to crash linux kernel by simulating ax25 device using 6pack driver from user space. | 2022-08-02T00:00:00.000Z | 2022-09-07T00:00:00.000Z |
| msrc_cve-2022-1199 | A flaw was found in the Linux kernel. This flaw allows an attacker to crash the Linux kernel by simulating amateur radio from the user space resulting in a null-ptr-deref vulnerability and a use-after-free vulnerability. | 2022-08-02T00:00:00.000Z | 2022-09-07T00:00:00.000Z |
| msrc_cve-2022-1204 | A use-after-free flaw was found in the Linux kernel’s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system. | 2022-08-02T00:00:00.000Z | 2022-09-03T00:00:00.000Z |
| msrc_cve-2022-1205 | A NULL pointer dereference flaw was found in the Linux kernel’s Amateur Radio AX.25 protocol functionality in the way a user connects with the protocol. This flaw allows a local user to crash the system. | 2022-08-02T00:00:00.000Z | 2022-09-07T00:00:00.000Z |
| msrc_cve-2022-1263 | A NULL pointer dereference issue was found in KVM when releasing a vCPU with dirty ring support enabled. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls causing a kernel oops condition that results in a denial of service. | 2022-08-02T00:00:00.000Z | 2022-09-08T00:00:00.000Z |
| msrc_cve-2022-1271 | An arbitrary file write vulnerability was found in GNU gzip's zgrep utility. When zgrep is applied on the attacker's chosen file name (for example a crafted file name) this can overwrite an attacker's content to an arbitrary attacker-selected file. This flaw occurs due to insufficient validation when processing filenames with two or more newlines where selected content and the target file names are embedded in crafted multi-line file names. This flaw allows a remote low privileged attacker to force zgrep to write arbitrary files on the system. | 2022-08-02T00:00:00.000Z | 2022-09-08T00:00:00.000Z |
| msrc_cve-2022-1508 | An out-of-bounds read flaw was found in the Linux kernel’s io_uring module in the way a user triggers the io_read() function with some special parameters. This flaw allows a local user to read some memory out of bounds. | 2022-08-02T00:00:00.000Z | 2022-09-07T00:00:00.000Z |
| msrc_cve-2022-1705 | Improper sanitization of Transfer-Encoding headers in net/http | 2022-08-02T00:00:00.000Z | 2026-02-18T14:41:31.000Z |
| msrc_cve-2022-1962 | Stack exhaustion due to deeply nested types in go/parser | 2022-08-02T00:00:00.000Z | 2026-02-18T14:35:38.000Z |
| msrc_cve-2022-1973 | A use-after-free flaw was found in the Linux kernel in log_replay in fs/ntfs3/fslog.c in the NTFS journal. This flaw allows a local attacker to crash the system and leads to a kernel information leak problem. | 2022-08-02T00:00:00.000Z | 2022-08-16T00:00:00.000Z |
| msrc_cve-2022-1976 | A flaw was found in the Linux kernel’s implementation of IO-URING. This flaw allows an attacker with local executable permission to create a string of requests that can cause a use-after-free flaw within the kernel. This issue leads to memory corruption and possible privilege escalation. | 2022-08-02T00:00:00.000Z | 2022-09-08T00:00:00.000Z |
| msrc_cve-2022-2031 | A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys allowing them to decrypt each other's tickets. A user who has been requested to change their password can exploit this flaw to obtain and use tickets to other services. | 2022-08-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2022-2153 | A flaw was found in the Linux kernel’s KVM when attempting to set a SynIC IRQ. This issue makes it possible for a misbehaving VMM to write to SYNIC/STIMER MSRs causing a NULL pointer dereference. This flaw allows an unprivileged local attacker on the host to issue specific ioctl calls causing a kernel oops condition that results in a denial of service. | 2022-08-02T00:00:00.000Z | 2022-09-07T00:00:00.000Z |
| msrc_cve-2022-2255 | A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing. | 2022-08-02T00:00:00.000Z | 2022-09-01T00:00:00.000Z |
| msrc_cve-2022-2503 | Linux Kernel LoadPin bypass via dm-verity table reload | 2022-08-02T00:00:00.000Z | 2022-08-18T00:00:00.000Z |
| msrc_cve-2022-2509 | A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function. | 2022-08-02T00:00:00.000Z | 2022-08-06T00:00:00.000Z |
| msrc_cve-2022-2571 | Heap-based Buffer Overflow in vim/vim | 2022-08-02T00:00:00.000Z | 2022-08-06T00:00:00.000Z |
| msrc_cve-2022-2580 | Heap-based Buffer Overflow in vim/vim | 2022-08-02T00:00:00.000Z | 2022-08-06T00:00:00.000Z |
| msrc_cve-2022-2581 | Out-of-bounds Read in vim/vim | 2022-08-02T00:00:00.000Z | 2022-08-06T00:00:00.000Z |
| msrc_cve-2022-25857 | Denial of Service (DoS) | 2022-08-02T00:00:00.000Z | 2025-10-01T23:11:16.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| opensuse-su-2022:0050-1 | Security update for net-snmp | 2022-01-11T09:11:40Z | 2022-01-11T09:11:40Z |
| opensuse-su-2022:0052-1 | Security update for libsndfile | 2022-01-11T09:14:57Z | 2022-01-11T09:14:57Z |
| opensuse-su-2022:0011-1 | Security update for jawn | 2022-01-11T13:01:01Z | 2022-01-11T13:01:01Z |
| opensuse-su-2022:0056-1 | Security update for the Linux Kernel | 2022-01-11T15:21:39Z | 2022-01-11T15:21:39Z |
| opensuse-su-2022:0058-1 | Security update for MozillaThunderbird | 2022-01-12T08:20:27Z | 2022-01-12T08:20:27Z |
| opensuse-su-2022:0062-1 | Security update for openexr | 2022-01-12T13:18:42Z | 2022-01-12T13:18:42Z |
| opensuse-su-2022:0064-1 | Security update for python39-pip | 2022-01-12T16:46:56Z | 2022-01-12T16:46:56Z |
| opensuse-su-2022:0069-1 | Security update for libmspack | 2022-01-13T14:12:42Z | 2022-01-13T14:12:42Z |
| opensuse-su-2022:0012-1 | Security update for prosody | 2022-01-14T13:36:36Z | 2022-01-14T13:36:36Z |
| opensuse-su-2022:0014-1 | Security update for chromium | 2022-01-17T09:35:20Z | 2022-01-17T09:35:20Z |
| opensuse-su-2022:0088-1 | Security update for ghostscript | 2022-01-17T12:40:21Z | 2022-01-17T12:40:21Z |
| opensuse-su-2022:0091-1 | Security update for apache2 | 2022-01-17T15:25:36Z | 2022-01-17T15:25:36Z |
| opensuse-su-2022:0016-1 | Security update for watchman | 2022-01-17T20:11:25Z | 2022-01-17T20:11:25Z |
| opensuse-su-2022:0104-1 | Security update for SDL2 | 2022-01-18T08:37:08Z | 2022-01-18T08:37:08Z |
| opensuse-su-2022:0106-1 | Security update for jawn | 2022-01-18T10:43:15Z | 2022-01-18T10:43:15Z |
| opensuse-su-2022:0108-1 | Security update for java-1_8_0-ibm | 2022-01-18T10:46:46Z | 2022-01-18T10:46:46Z |
| opensuse-su-2022:0111-1 | Security update for virglrenderer | 2022-01-18T12:03:18Z | 2022-01-18T12:03:18Z |
| opensuse-su-2022:0112-1 | Security update for nodejs14 | 2022-01-18T12:03:34Z | 2022-01-18T12:03:34Z |
| opensuse-su-2022:0113-1 | Security update for nodejs12 | 2022-01-18T12:03:49Z | 2022-01-18T12:03:49Z |
| opensuse-su-2022:0131-1 | Security update for the Linux Kernel | 2022-01-19T16:31:13Z | 2022-01-19T16:31:13Z |
| opensuse-su-2022:0135-1 | Security update for busybox | 2022-01-20T09:04:27Z | 2022-01-20T09:04:27Z |
| opensuse-su-2022:0136-1 | Security update for MozillaFirefox | 2022-01-20T09:06:20Z | 2022-01-20T09:06:20Z |
| opensuse-su-2022:0140-1 | Security update for grafana | 2022-01-20T12:25:15Z | 2022-01-20T12:25:15Z |
| opensuse-su-2022:0141-1 | Security update for permissions | 2022-01-20T12:47:26Z | 2022-01-20T12:47:26Z |
| opensuse-su-2022:0144-1 | Security update for cryptsetup | 2022-01-20T15:38:27Z | 2022-01-20T15:38:27Z |
| opensuse-su-2022:0149-1 | Security update for rust1.56 | 2022-01-21T08:04:54Z | 2022-01-21T08:04:54Z |
| opensuse-su-2022:0150-1 | Security update for aide | 2022-01-21T10:24:56Z | 2022-01-21T10:24:56Z |
| opensuse-su-2022:0018-1 | Security update for stb | 2022-01-21T11:04:52Z | 2022-01-21T11:04:52Z |
| opensuse-su-2022:0151-1 | Security update for bind | 2022-01-21T11:41:01Z | 2022-01-21T11:41:01Z |
| opensuse-su-2022:0157-1 | Security update for zxing-cpp | 2022-01-24T09:10:46Z | 2022-01-24T09:10:46Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2012:1013 | Red Hat Security Advisory: jbossas security update | 2012-06-19T19:23:00+00:00 | 2025-11-21T17:40:43+00:00 |
| rhsa-2012:1014 | Red Hat Security Advisory: jbossas security update | 2012-06-19T19:24:00+00:00 | 2025-11-21T17:40:43+00:00 |
| rhsa-2012:1015 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 6.0 6-Month EOL Notice | 2012-06-19T19:25:00+00:00 | 2025-11-21T17:40:44+00:00 |
| rhba-2012:0763 | Red Hat Bug Fix Advisory: glibc bug fix and enhancement update | 2012-06-20T00:00:00+00:00 | 2025-11-21T17:20:53+00:00 |
| rhba-2012:0881 | Red Hat Bug Fix Advisory: freeradius bug fix and enhancement update | 2012-06-20T00:00:00+00:00 | 2025-11-21T17:20:54+00:00 |
| rhsa-2012:0997 | Red Hat Security Advisory: 389-ds-base security update | 2012-06-20T11:30:00+00:00 | 2025-11-21T17:40:42+00:00 |
| rhsa-2012:1019 | Red Hat Security Advisory: java-1.7.0-oracle security update | 2012-06-20T11:35:00+00:00 | 2025-11-21T17:40:44+00:00 |
| rhsa-2012:1009 | Red Hat Security Advisory: java-1.7.0-openjdk security and bug fix update | 2012-06-20T11:38:00+00:00 | 2025-11-21T17:40:42+00:00 |
| rhsa-2012:1022 | Red Hat Security Advisory: jbossas security update | 2012-06-20T15:56:00+00:00 | 2025-11-21T17:40:44+00:00 |
| rhsa-2012:1023 | Red Hat Security Advisory: jbossas security update | 2012-06-20T15:57:00+00:00 | 2025-11-21T17:40:48+00:00 |
| rhsa-2012:1024 | Red Hat Security Advisory: jbossas security update | 2012-06-20T15:57:00+00:00 | 2025-11-21T17:40:45+00:00 |
| rhsa-2012:1025 | Red Hat Security Advisory: jbossas security update | 2012-06-20T16:02:00+00:00 | 2025-11-21T17:40:45+00:00 |
| rhsa-2012:1026 | Red Hat Security Advisory: jbossas and jboss-naming security update | 2012-06-20T16:02:00+00:00 | 2025-11-21T17:40:45+00:00 |
| rhsa-2012:1027 | Red Hat Security Advisory: jbossas-web and jboss-naming security update | 2012-06-20T16:02:00+00:00 | 2025-11-21T17:40:45+00:00 |
| rhsa-2012:1028 | Red Hat Security Advisory: JBoss Enterprise BRMS Platform 5.3.0 update | 2012-06-22T01:12:00+00:00 | 2026-01-28T22:54:02+00:00 |
| rhsa-2012:1036 | Red Hat Security Advisory: postgresql security update | 2012-06-25T17:56:00+00:00 | 2025-11-21T17:40:45+00:00 |
| rhsa-2012:1037 | Red Hat Security Advisory: postgresql and postgresql84 security update | 2012-06-25T18:05:00+00:00 | 2025-11-21T17:40:46+00:00 |
| rhsa-2012:1041 | Red Hat Security Advisory: redhat-ds-base security update | 2012-06-26T17:13:00+00:00 | 2025-11-21T17:40:46+00:00 |
| rhsa-2012:1043 | Red Hat Security Advisory: libwpd security update | 2012-06-26T17:16:00+00:00 | 2025-11-21T17:40:47+00:00 |
| rhsa-2012:1042 | Red Hat Security Advisory: kernel security and bug fix update | 2012-06-26T18:32:00+00:00 | 2025-11-21T17:40:46+00:00 |
| rhsa-2012:1045 | Red Hat Security Advisory: php security update | 2012-06-27T15:43:00+00:00 | 2026-01-28T22:54:02+00:00 |
| rhsa-2012:1046 | Red Hat Security Advisory: php security update | 2012-06-27T15:44:00+00:00 | 2026-01-28T22:54:03+00:00 |
| rhsa-2012:1047 | Red Hat Security Advisory: php53 security update | 2012-06-27T15:44:00+00:00 | 2026-01-28T22:54:03+00:00 |
| rhsa-2012:1052 | Red Hat Security Advisory: mod_cluster security update | 2012-07-03T08:58:00+00:00 | 2025-11-21T17:40:48+00:00 |
| rhsa-2012:1053 | Red Hat Security Advisory: mod_cluster security update | 2012-07-03T09:03:00+00:00 | 2025-11-21T17:40:48+00:00 |
| rhsa-2012:1054 | Red Hat Security Advisory: libtiff security update | 2012-07-03T09:23:00+00:00 | 2025-11-21T17:40:53+00:00 |
| rhsa-2012:1056 | Red Hat Security Advisory: resteasy security update | 2012-07-05T19:19:00+00:00 | 2025-11-21T17:40:49+00:00 |
| rhsa-2012:1057 | Red Hat Security Advisory: resteasy security update | 2012-07-05T19:20:00+00:00 | 2025-11-21T17:40:49+00:00 |
| rhsa-2012:1058 | Red Hat Security Advisory: resteasy security update | 2012-07-05T19:23:00+00:00 | 2025-11-21T17:40:49+00:00 |
| rhsa-2012:1059 | Red Hat Security Advisory: resteasy security update | 2012-07-05T19:24:00+00:00 | 2025-11-21T17:40:50+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| suse-su-2018:1254-1 | Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP1) | 2018-05-11T17:53:57Z | 2018-05-11T17:53:57Z |
| suse-su-2018:1259-1 | Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP1) | 2018-05-11T17:54:13Z | 2018-05-11T17:54:13Z |
| suse-su-2018:1239-1 | Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) | 2018-05-11T17:54:23Z | 2018-05-11T17:54:23Z |
| suse-su-2018:1241-1 | Security update for the Linux Kernel (Live Patch 15 for SLE 12 SP2) | 2018-05-11T17:54:33Z | 2018-05-11T17:54:33Z |
| suse-su-2018:1245-1 | Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2) | 2018-05-11T17:54:41Z | 2018-05-11T17:54:41Z |
| suse-su-2018:1256-1 | Security update for the Linux Kernel (Live Patch 17 for SLE 12 SP2) | 2018-05-11T17:54:53Z | 2018-05-11T17:54:53Z |
| suse-su-2018:1250-1 | Security update for the Linux Kernel (Live Patch 16 for SLE 12 SP2) | 2018-05-11T17:55:03Z | 2018-05-11T17:55:03Z |
| suse-su-2018:1272-1 | Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP2) | 2018-05-11T17:55:45Z | 2018-05-11T17:55:45Z |
| suse-su-2018:1253-1 | Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP2) | 2018-05-11T17:55:56Z | 2018-05-11T17:55:56Z |
| suse-su-2018:1268-1 | Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2) | 2018-05-11T17:56:07Z | 2018-05-11T17:56:07Z |
| suse-su-2018:1230-1 | Security update for the Linux Kernel (Live Patch 12 for SLE 12 SP2) | 2018-05-11T17:56:18Z | 2018-05-11T17:56:18Z |
| suse-su-2018:1223-1 | Security update for the Linux Kernel (Live Patch 19 for SLE 12 SP2) | 2018-05-11T17:56:27Z | 2018-05-11T17:56:27Z |
| suse-su-2018:1258-1 | Security update for the Linux Kernel (Live Patch 18 for SLE 12 SP2) | 2018-05-11T17:56:41Z | 2018-05-11T17:56:41Z |
| suse-su-2018:1236-1 | Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP2) | 2018-05-11T17:56:50Z | 2018-05-11T17:56:50Z |
| suse-su-2018:1242-1 | Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP2) | 2018-05-11T17:57:00Z | 2018-05-11T17:57:00Z |
| suse-su-2018:1262-1 | Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP2) | 2018-05-11T17:57:16Z | 2018-05-11T17:57:16Z |
| suse-su-2018:1270-1 | Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3) | 2018-05-11T17:57:28Z | 2018-05-11T17:57:28Z |
| suse-su-2018:1248-1 | Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3) | 2018-05-11T17:57:37Z | 2018-05-11T17:57:37Z |
| suse-su-2018:1260-1 | Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3) | 2018-05-11T17:57:45Z | 2018-05-11T17:57:45Z |
| suse-su-2018:1252-1 | Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3) | 2018-05-11T17:57:54Z | 2018-05-11T17:57:54Z |
| suse-su-2018:1263-1 | Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3) | 2018-05-11T17:58:04Z | 2018-05-11T17:58:04Z |
| suse-su-2018:1228-1 | Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3) | 2018-05-11T17:58:13Z | 2018-05-11T17:58:13Z |
| suse-su-2018:1240-1 | Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3) | 2018-05-11T17:58:22Z | 2018-05-11T17:58:22Z |
| suse-su-2018:1238-1 | Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP3) | 2018-05-11T17:58:34Z | 2018-05-11T17:58:34Z |
| suse-su-2018:1249-1 | Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3) | 2018-05-11T17:58:44Z | 2018-05-11T17:58:44Z |
| suse-su-2018:1225-1 | Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP3) | 2018-05-11T17:58:56Z | 2018-05-11T17:58:56Z |
| suse-su-2018:1246-1 | Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP3) | 2018-05-11T17:59:05Z | 2018-05-11T17:59:05Z |
| suse-su-2018:1288-1 | Security update for librsvg | 2018-05-15T13:04:44Z | 2018-05-15T13:04:44Z |
| suse-su-2018:1296-1 | Security update for libreoffice | 2018-05-15T13:05:48Z | 2018-05-15T13:05:48Z |
| suse-su-2018:1291-1 | Security update for php5 | 2018-05-15T13:08:43Z | 2018-05-15T13:08:43Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2025:17742 | Moderate: vim security update | 2025-10-13T00:00:00Z | 2025-10-14T13:35:06Z |
| alsa-2025:17760 | Moderate: kernel security update | 2025-10-13T00:00:00Z | 2025-10-16T07:33:20Z |
| alsa-2025:17776 | Moderate: kernel security update | 2025-10-13T00:00:00Z | 2025-10-17T09:45:53Z |
| alsa-2025:17797 | Moderate: kernel security update | 2025-10-13T00:00:00Z | 2025-10-14T10:15:00Z |
| alsa-2025:17802 | Important: webkit2gtk3 security update | 2025-10-13T00:00:00Z | 2025-10-14T10:09:21Z |
| alsa-2025:17812 | Moderate: kernel-rt security update | 2025-10-13T00:00:00Z | 2025-10-14T07:28:37Z |
| alsa-2025:17913 | Moderate: vim security update | 2025-10-14T00:00:00Z | 2025-10-14T13:33:05Z |
| alsa-2025:18070 | Important: webkit2gtk3 security update | 2025-10-15T00:00:00Z | 2025-11-03T08:51:57Z |
| alsa-2025:18097 | Important: webkit2gtk3 security update | 2025-10-15T00:00:00Z | 2025-10-23T12:50:53Z |
| alsa-2025:18148 | Important: .NET 8.0 security update | 2025-10-15T00:00:00Z | 2025-10-20T12:11:02Z |
| alsa-2025:18149 | Important: .NET 8.0 security update | 2025-10-15T00:00:00Z | 2025-10-20T12:28:15Z |
| alsa-2025:18150 | Important: .NET 9.0 security update | 2025-10-15T00:00:00Z | 2025-11-03T08:55:12Z |
| alsa-2025:18151 | Important: .NET 9.0 security update | 2025-10-15T00:00:00Z | 2025-11-03T08:48:44Z |
| alsa-2025:18152 | Important: .NET 8.0 security update | 2025-10-15T00:00:00Z | 2025-11-03T08:46:41Z |
| alsa-2025:18153 | Important: .NET 9.0 security update | 2025-10-15T00:00:00Z | 2025-11-03T08:44:34Z |
| alsa-2025:18154 | Important: firefox security update | 2025-10-15T00:00:00Z | 2025-10-20T12:30:08Z |
| alsa-2025:18155 | Important: firefox security update | 2025-10-15T00:00:00Z | 2025-10-20T12:31:42Z |
| alsa-2025:18183 | Important: libsoup3 security update | 2025-10-15T00:00:00Z | 2025-10-16T08:01:45Z |
| alsa-2025:18231 | Moderate: libssh security update | 2025-10-16T00:00:00Z | 2025-10-16T14:22:59Z |
| alsa-2025:18275 | Moderate: libssh security update | 2025-10-16T00:00:00Z | 2025-10-17T08:04:25Z |
| alsa-2025:18281 | Moderate: kernel security update | 2025-10-20T00:00:00Z | 2025-10-22T10:16:53Z |
| alsa-2025:18285 | Important: firefox security update | 2025-10-20T00:00:00Z | 2025-10-20T11:50:28Z |
| alsa-2025:18286 | Moderate: libssh security update | 2025-10-20T00:00:00Z | 2025-10-20T11:55:49Z |
| alsa-2025:18297 | Moderate: kernel security update | 2025-10-20T00:00:00Z | 2025-10-20T12:01:40Z |
| alsa-2025:18298 | Moderate: kernel-rt security update | 2025-10-20T00:00:00Z | 2025-10-20T12:08:20Z |
| alsa-2025:18318 | Moderate: kernel security update | 2025-10-20T00:00:00Z | 2025-10-22T10:27:59Z |
| alsa-2025:18320 | Important: thunderbird security update | 2025-10-20T00:00:00Z | 2025-10-22T10:33:35Z |
| alsa-2025:18321 | Important: thunderbird security update | 2025-10-20T00:00:00Z | 2025-10-22T10:38:17Z |
| alsa-2025:18815 | Moderate: java-1.8.0-openjdk security update | 2025-10-22T00:00:00Z | 2025-10-30T12:06:21Z |
| alsa-2025:18821 | Moderate: java-17-openjdk security update | 2025-10-22T00:00:00Z | 2025-10-30T07:23:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2023-332 | Heap-buffer-overflow in RegionGeometry_Polygon::parse | 2023-04-21T14:00:12.631857Z | 2023-04-21T14:00:12.632090Z |
| osv-2023-333 | Heap-buffer-overflow in ih264d_get_bits_h264 | 2023-04-21T14:00:45.626123Z | 2023-04-21T14:00:45.626363Z |
| osv-2023-334 | Heap-buffer-overflow in unicode_decode_utf8 | 2023-04-22T14:00:15.547819Z | 2023-04-22T14:00:15.548065Z |
| osv-2023-335 | Security exception in org.json.JSONArray.writeTo | 2023-04-22T14:00:41.470858Z | 2023-04-22T14:00:41.471103Z |
| osv-2023-337 | Heap-buffer-overflow in PyBytes_FromStringAndSize | 2023-04-22T14:02:16.429774Z | 2023-04-22T14:02:16.430016Z |
| osv-2023-340 | Heap-double-free in grk::DecompressCodeblock::release | 2023-04-24T14:00:30.054535Z | 2023-06-20T14:14:43.265931Z |
| osv-2023-342 | Heap-use-after-free in ih264_inter_pred_luma_vert_ssse3 | 2023-04-24T14:02:30.818849Z | 2023-04-24T14:02:30.819120Z |
| osv-2023-343 | Heap-buffer-overflow in _libssh2_ntohu32 | 2023-04-25T14:01:02.980876Z | 2023-08-30T14:13:26.448798Z |
| osv-2023-344 | Heap-buffer-overflow in tok_get_normal_mode | 2023-04-25T14:01:18.715805Z | 2023-04-25T14:01:18.716085Z |
| osv-2023-345 | Heap-buffer-overflow in mg_mqtt_parse | 2023-04-26T14:02:05.194063Z | 2023-06-29T14:16:50.467360Z |
| osv-2023-346 | UNKNOWN WRITE in void std::__1::allocator_traits<std::__1::allocator<wabt::interp::HandlerDesc> > | 2023-04-27T14:02:25.286668Z | 2026-03-11T14:24:45.211720Z |
| osv-2023-350 | UNKNOWN READ in cli_html_normalise | 2023-04-29T14:01:02.900884Z | 2023-04-30T14:20:30.195844Z |
| osv-2023-353 | Stack-buffer-overflow in pdfi_read_cff_dict | 2023-04-29T14:02:16.888498Z | 2023-05-03T14:21:57.175421Z |
| osv-2023-356 | Heap-buffer-overflow in pdf_nextobject | 2023-04-30T14:03:00.823786Z | 2023-08-12T14:21:32.402904Z |
| osv-2023-357 | Heap-buffer-overflow in flac__analyze_frame | 2023-05-01T14:01:05.606039Z | 2023-05-01T14:01:05.606339Z |
| osv-2023-358 | Heap-double-free in wolfCrypt_custom_free | 2023-05-01T14:01:17.580134Z | 2023-05-14T14:16:55.769240Z |
| osv-2023-359 | Heap-buffer-overflow in H5MM_memcpy | 2023-05-01T14:02:33.841821Z | 2026-03-24T15:52:15.056909Z |
| osv-2023-361 | Heap-buffer-overflow in tok_get_normal_mode | 2023-05-02T14:00:14.863724Z | 2023-05-02T14:00:14.864013Z |
| osv-2023-364 | Heap-double-free in HashMgr::~HashMgr | 2023-05-03T14:00:43.946257Z | 2023-05-04T14:11:43.526808Z |
| osv-2023-366 | Heap-use-after-free in gc_mark_children | 2023-05-04T14:02:02.626247Z | 2023-06-13T05:21:25.752073Z |
| osv-2023-370 | Heap-buffer-overflow in H5FS__sect_link | 2023-05-06T14:01:04.165113Z | 2026-03-24T15:11:55.539963Z |
| osv-2023-372 | UNKNOWN WRITE in hb_ot_layout_substitute_start | 2023-05-06T14:02:02.806574Z | 2023-05-06T14:02:02.806822Z |
| osv-2023-375 | Heap-buffer-overflow in H5MM_memcpy | 2023-05-07T14:00:16.015866Z | 2023-08-25T14:31:31.759698Z |
| osv-2023-376 | UNKNOWN WRITE in OT::Layout::GPOS_impl::CursivePosFormat1::subset | 2023-05-07T14:00:21.523030Z | 2023-05-07T14:00:21.523307Z |
| osv-2023-377 | UNKNOWN WRITE in bool OT::Layout::Common::CoverageFormat2_4<OT::Layout::MediumTypes>::serialize<h | 2023-05-07T14:00:31.978521Z | 2023-05-07T14:00:31.978773Z |
| osv-2023-379 | Heap-buffer-overflow in void sort_r_simple<> | 2023-05-07T14:02:21.124794Z | 2023-05-07T14:02:21.125050Z |
| osv-2023-380 | UNKNOWN WRITE in bool OT::Layout::Common::Coverage::serialize<hb_map_iter_t<hb_map_iter_t<hb_filt | 2023-05-07T14:02:23.816056Z | 2023-05-07T14:02:23.816302Z |
| osv-2023-381 | UNKNOWN READ in H5FL__blk_gc_list | 2023-05-08T14:02:04.934252Z | 2026-03-24T15:11:28.111319Z |
| osv-2023-382 | Use-of-uninitialized-value in wabt::BinaryReaderObjdump::PrintInitExpr | 2023-05-08T14:02:07.619674Z | 2023-09-08T14:16:45.211921Z |
| osv-2023-384 | Heap-use-after-free in mrb_str_hash_m | 2023-05-09T14:00:31.526197Z | 2023-05-09T14:00:31.526487Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-golang-2023-45289 | Incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http | 2024-03-12T08:24:51.862Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-0199 | Incorrect Authorization in GitLab | 2024-03-12T08:25:54.981Z | 2025-05-20T10:02:07.006Z |
| bit-parse-2024-29027 | Parse Server crash and RCE via invalid Cloud Function or Cloud Job name | 2024-03-21T07:25:25.649Z | 2026-03-11T18:56:50.865Z |
| bit-airflow-2024-29735 | Apache Airflow: Potentially harmful permission changing by log task handler | 2024-03-28T07:16:52.369Z | 2025-05-20T10:02:07.006Z |
| bit-grafana-2024-1313 | Users outside an organization can delete a snapshot with its key | 2024-03-28T07:19:10.064Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2024-28746 | Apache Airflow: Ignored Airflow Permissions | 2024-03-31T18:16:36.634Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2024-27906 | Apache Airflow: Dag Code and Import Error Permissions Ignored | 2024-03-31T18:16:47.034Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2024-26280 | Apache Airflow: Overly broad default permissions for Viewer/Ops (audit logs) | 2024-03-31T18:16:59.178Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2024-26147 | Helm's Missing YAML Content Leads To Panic | 2024-03-31T18:18:46.734Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2024-25620 | Dependency management path traversal in helm | 2024-03-31T18:18:57.477Z | 2025-05-20T10:02:07.006Z |
| bit-mastodon-2024-25623 | Lack of media type verification of Activity Streams objects allows impersonation of remote accounts | 2024-03-31T18:20:59.562Z | 2025-05-20T10:02:07.006Z |
| bit-mastodon-2024-25619 | Destroying OAuth Applications doesn't notify Streaming of Access Tokens being destroyed in mastodon | 2024-03-31T18:21:09.827Z | 2025-05-20T10:02:07.006Z |
| bit-mastodon-2024-25618 | External OpenID Connect Account Takeover by E-Mail Change in mastodon | 2024-03-31T18:21:20.227Z | 2025-05-20T10:02:07.006Z |
| bit-mlflow-2024-27133 | Insufficient sanitization in MLflow leads to XSS when running a recipe that uses an untrusted dataset. | 2024-03-31T18:21:40.530Z | 2026-02-11T09:09:18.507Z |
| bit-mlflow-2024-27132 | Insufficient sanitization in MLflow leads to XSS when running an untrusted recipe. | 2024-03-31T18:21:50.638Z | 2026-02-11T09:09:18.507Z |
| bit-moodle-2024-25983 | Msa-24-0006: idor on dashboard comments block | 2024-03-31T18:22:02.363Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-25982 | Msa-24-0005: csrf risk in language import utility | 2024-03-31T18:22:12.259Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-25981 | Msa-24-0004: forum export did not respect activity group settings | 2024-03-31T18:22:20.962Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-25980 | Msa-24-0003: h5p attempts report did not respect activity group settings | 2024-03-31T18:22:30.148Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-25979 | Msa-24-0002: forum search accepted random parameters in its url | 2024-03-31T18:22:42.352Z | 2025-05-20T10:02:07.006Z |
| bit-moodle-2024-25978 | Msa-24-0001: denial of service risk in file picker unzip functionality | 2024-03-31T18:22:52.148Z | 2025-05-20T10:02:07.006Z |
| bit-parse-2024-27298 | Parse Server literalizeRegexPart SQL Injection | 2024-03-31T18:25:01.637Z | 2026-03-11T18:56:50.865Z |
| bit-prestashop-2024-26129 | Prestashop vulnerable to path disclosure in JavaScript variable | 2024-03-31T18:26:56.335Z | 2025-05-20T10:02:07.006Z |
| bit-zookeeper-2024-23944 | Apache ZooKeeper: Information disclosure in persistent watcher handling | 2024-03-31T18:32:55.925Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2024-28242 | Disclosure of the existence of secret categories with custom backgrounds in Discourse | 2024-04-01T14:04:02.275Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2024-27100 | Denial of service via Staff Actions in Discourse | 2024-04-01T14:04:13.082Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2024-27085 | Denial of service through invites in Discourse | 2024-04-01T14:04:24.759Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2024-24827 | No rate limits on POST /uploads endpoint in Discourse | 2024-04-01T14:04:36.691Z | 2025-08-27T09:06:48.117Z |
| bit-discourse-2024-24748 | Disclosure of the existence of secret subcategories in Discourse | 2024-04-01T14:04:47.201Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-2818 | Allocation of Resources Without Limits or Throttling in GitLab | 2024-04-03T10:50:50.059Z | 2025-05-20T10:02:07.006Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2007-avi-567 | Vulnérabilité dans Novell Identity Manager | 2007-12-27T00:00:00.000000 | 2007-12-27T00:00:00.000000 |
| certa-2007-avi-568 | Multiples vulnérabilités dans VLC Media Player | 2007-12-27T00:00:00.000000 | 2007-12-27T00:00:00.000000 |
| certa-2007-avi-569 | Vulnérabilité de Tomcat | 2007-12-28T00:00:00.000000 | 2007-12-28T00:00:00.000000 |
| certa-2007-avi-570 | Vulnérabilité dans IBM DB2 Content Manager | 2007-12-28T00:00:00.000000 | 2007-12-28T00:00:00.000000 |
| certa-2007-avi-571 | Vulnérabilité de Mantis | 2007-12-31T00:00:00.000000 | 2007-12-31T00:00:00.000000 |
| certa-2007-avi-572 | Vulnérabilité dans Syslog-ng | 2007-12-31T00:00:00.000000 | 2007-12-31T00:00:00.000000 |
| certa-2007-avi-573 | Vulnérabilité dans Dovecot | 2007-12-31T00:00:00.000000 | 2007-12-31T00:00:00.000000 |
| certa-2008-avi-001 | Vulnérabilité dans Qt | 2008-01-03T00:00:00.000000 | 2008-01-03T00:00:00.000000 |
| certa-2008-avi-002 | Vulnérabilité dans PHP 4 | 2008-01-04T00:00:00.000000 | 2008-01-04T00:00:00.000000 |
| certa-2008-avi-003 | Vulnérabilité dans Novell ZENworks Endpoint Security Management | 2008-01-07T00:00:00.000000 | 2008-01-07T00:00:00.000000 |
| certa-2008-avi-004 | Vulnérabilité dans AIX | 2008-01-08T00:00:00.000000 | 2008-01-08T00:00:00.000000 |
| certa-2008-avi-005 | Vulnérabilités dans PostgreSQL | 2008-01-08T00:00:00.000000 | 2008-01-08T00:00:00.000000 |
| certa-2008-avi-006 | Vulnérabilité dans Asterisk | 2008-01-08T00:00:00.000000 | 2008-01-08T00:00:00.000000 |
| certa-2008-avi-007 | Multiples vulnérabilités dans Xerox WorkCentre | 2008-01-08T00:00:00.000000 | 2008-01-08T00:00:00.000000 |
| certa-2008-avi-008 | Multiples vulnérabilités dans les produits VMware | 2008-01-08T00:00:00.000000 | 2008-01-08T00:00:00.000000 |
| certa-2008-avi-009 | Vulnérabilités protocolaires dans Microsoft Windows | 2008-01-09T00:00:00.000000 | 2008-01-09T00:00:00.000000 |
| certa-2008-avi-010 | Vulnérabilité dans LSASS de Windows | 2008-01-09T00:00:00.000000 | 2008-01-09T00:00:00.000000 |
| certa-2008-avi-011 | Multiples vulnérabilités dans Apache | 2008-01-09T00:00:00.000000 | 2008-02-14T00:00:00.000000 |
| certa-2008-avi-012 | Vulnérabilité d'IBM Websphere Application Server | 2008-01-10T00:00:00.000000 | 2008-01-10T00:00:00.000000 |
| certa-2008-avi-013 | Vulnérabilité dans Novell Client | 2008-01-10T00:00:00.000000 | 2008-01-10T00:00:00.000000 |
| certa-2008-avi-014 | Vulnérabilité dans l'environnement d'exécution Java (JRE) | 2008-01-10T00:00:00.000000 | 2008-01-10T00:00:00.000000 |
| certa-2008-avi-015 | Vulnérabilité dans McAfee E-Business Server | 2008-01-10T00:00:00.000000 | 2008-01-10T00:00:00.000000 |
| certa-2008-avi-016 | Vulnérabilité dans IBM Lotus Domino | 2008-01-10T00:00:00.000000 | 2008-01-10T00:00:00.000000 |
| certa-2008-avi-017 | Vulnérabilité dans IBM Tivoli Storage Manager Express | 2008-01-11T00:00:00.000000 | 2008-01-11T00:00:00.000000 |
| certa-2008-avi-018 | Vulnérabilités dans Python | 2008-01-15T00:00:00.000000 | 2008-01-15T00:00:00.000000 |
| certa-2008-avi-019 | Vulnérabilité dans Sun Solaris | 2008-01-15T00:00:00.000000 | 2008-01-15T00:00:00.000000 |
| certa-2008-avi-020 | Multiples vulnérabilités de FreeBSD | 2008-01-15T00:00:00.000000 | 2008-01-15T00:00:00.000000 |
| certa-2008-avi-021 | Vulnérabilités dans Drupal | 2008-01-15T00:00:00.000000 | 2008-01-15T00:00:00.000000 |
| certa-2008-avi-022 | Vulnérabilité dans libxml2 | 2008-01-15T00:00:00.000000 | 2008-02-04T00:00:00.000000 |
| certa-2008-avi-023 | Vulnérabilité dans Mambo | 2008-01-16T00:00:00.000000 | 2008-01-16T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2024-003242 | OMRON NJ/NX series vulnerable to insufficient verification of data authenticity | 2024-05-28T12:28+09:00 | 2024-07-26T16:27+09:00 |
| jvndb-2024-000052 | Multiple vulnerabilities in UTAU | 2024-05-28T14:23+09:00 | 2024-05-28T14:23+09:00 |
| jvndb-2024-000053 | Multiple vulnerabilities in Unifier and Unifier Cast | 2024-05-28T14:47+09:00 | 2024-05-28T14:47+09:00 |
| jvndb-2024-003249 | ELECOM wireless LAN routers vulnerable to OS command injection | 2024-05-29T12:33+09:00 | 2024-05-29T12:33+09:00 |
| jvndb-2024-000054 | EC-Orange vulnerable to authorization bypass | 2024-05-29T14:06+09:00 | 2024-05-29T14:06+09:00 |
| jvndb-2024-000055 | Redmine DMSF Plugin vulnerable to path traversal | 2024-05-29T14:13+09:00 | 2024-05-29T14:13+09:00 |
| jvndb-2024-000056 | awkblog vulnerable to OS command injection | 2024-05-30T14:39+09:00 | 2024-05-30T14:39+09:00 |
| jvndb-2024-003253 | Multiple vulnerabilities in Sharp and Toshiba Tec MFPs | 2024-06-03T14:36+09:00 | 2024-06-03T14:36+09:00 |
| jvndb-2024-003254 | Seiko Solutions SkyBridge MB-A100/MB-A110 and SkyBridge BASIC MB-A130 vulnerable to OS command injection | 2024-06-03T14:53+09:00 | 2024-06-03T14:53+09:00 |
| jvndb-2024-000057 | Multiple vulnerabilities in UNIVERSAL PASSPORT RX | 2024-06-03T15:32+09:00 | 2024-06-03T15:32+09:00 |
| jvndb-2024-000060 | Multiple vulnerabilities in "FreeFrom - the nostr client" App | 2024-06-07T14:51+09:00 | 2024-06-07T14:51+09:00 |
| jvndb-2024-000058 | WordPress Plugin "Music Store - WordPress eCommerce" vulnerable to SQL injection | 2024-06-07T15:24+09:00 | 2024-06-10T17:08+09:00 |
| jvndb-2024-000062 | Denial-of-service (DoS) vulnerability in IPCOM WAF function | 2024-06-12T15:03+09:00 | 2024-06-12T15:03+09:00 |
| jvndb-2024-003539 | Multiple vulnerabilities in Toshiba Tec and Oki Electric Industry MFPs | 2024-06-17T15:21+09:00 | 2024-06-17T15:21+09:00 |
| jvndb-2024-000063 | Multiple vulnerabilities in ID Link Manager and FUJITSU Software TIME CREATOR | 2024-06-18T13:43+09:00 | 2024-06-18T13:43+09:00 |
| jvndb-2024-000061 | Multiple vulnerabilities in Ricoh Streamline NX PC Client | 2024-06-18T14:56+09:00 | 2024-06-18T14:56+09:00 |
| jvndb-2024-000064 | WordPress plugin "SiteGuard WP Plugin" may leak the customized path to the login page | 2024-06-19T14:25+09:00 | 2024-06-19T14:25+09:00 |
| jvndb-2024-000065 | "ZOZOTOWN" App for Android fails to restrict custom URL schemes properly | 2024-06-19T16:04+09:00 | 2024-06-19T16:04+09:00 |
| jvndb-2024-003645 | Multiple vulnerabilities in multiple Trend Micro products | 2024-06-20T14:59+09:00 | 2024-06-20T14:59+09:00 |
| jvndb-2024-003699 | LINE client for iOS vulnerable to universal cross-site scripting | 2024-06-24T11:05+09:00 | 2024-06-24T11:05+09:00 |
| jvndb-2024-000066 | WordPress plugins "WP Tweet Walls" and "Sola Testimonials" vulnerable to cross-site request forgery | 2024-06-26T14:25+09:00 | 2024-06-26T14:25+09:00 |
| jvndb-2024-000067 | "Piccoma" App uses a hard-coded API key for an external service | 2024-06-28T13:18+09:00 | 2024-06-28T13:18+09:00 |
| jvndb-2024-003831 | Multiple TP-Link products vulnerable to OS command injection | 2024-06-28T17:38+09:00 | 2024-06-28T17:38+09:00 |
| jvndb-2024-000068 | JP1/Extensible SNMP Agent fails to restrict access permissions | 2024-07-03T14:57+09:00 | 2024-07-03T14:57+09:00 |
| jvndb-2024-000069 | Cleartext transmission issue in TONE store App to TONE store | 2024-07-08T13:43+09:00 | 2024-07-08T13:43+09:00 |
| jvndb-2024-000059 | Multiple vulnerabilities in multiple Webmin products | 2024-07-09T14:27+09:00 | 2024-07-09T14:27+09:00 |
| jvndb-2024-000070 | Out-of-bounds write vulnerability in Ricoh MFPs and printers | 2024-07-10T14:16+09:00 | 2024-07-10T14:16+09:00 |
| jvndb-2024-000071 | FUJITSU Network Edgiot GW1500 vulnerable to path traversal | 2024-07-16T14:41+09:00 | 2024-07-16T14:41+09:00 |
| jvndb-2024-000072 | Cybozu Garoon vulnerable to cross-site scripting | 2024-07-16T16:14+09:00 | 2024-07-16T16:14+09:00 |
| jvndb-2024-000073 | Assimp vulnerable to heap-based buffer overflow | 2024-07-18T13:44+09:00 | 2024-07-18T13:44+09:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-02916 | libxml-libxml-perl XML处理信息泄露漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02917 | Nagios Business Process Intelligence (BPI) index.php存在未明跨站脚本漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02918 | Cisco Unity Connection CUCReports页面跨站请求伪造漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02919 | Cisco Unified Communications Manage SQL注入漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02920 | Cisco UCS Central Software任意命令执行漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02921 | ManageEngine Applications Manager CommonAPIUtil getAdminMG远程代码执行漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02922 | ManageEngine Desktop Central MSP IOSCheckInServlet UDID远程代码执行漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02923 | ManageEngine Applications Manager MaintenanceTaskAPIUtil远程代码执行漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02924 | ManageEngine Applications Manager CommonAPIUtil getMGDetails远程代码执行漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02925 | ManageEngine Applications Manager DBUtil port远程代码执行漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02926 | EMC SourceOne Email Management账户锁定功能暴力破解漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02927 | Ruby证书校验漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02928 | Erlang OTP信息泄露漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02929 | Fortinet FortiAnalyzer 'sql-query'跨站脚本漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02930 | Quassel IRC SQL注入漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02931 | Linux kernel拒绝服务漏洞(CNVD-2015-02931) | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02932 | Linux kernel 'ndisc_router_discovery()'函数拒绝服务漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02933 | PHP PHAR文件解析敏感信息泄露漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02934 | PHP 'phar_set_inode()'函数缓冲区溢出漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02935 | PHP远程代码执行漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02936 | Oracle Data Quality LoaderWizard DataPreview类型混淆远程代码执行漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02937 | Oracle Data Quality LoaderWizard SetEntities类型混淆远程代码执行漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02938 | Oracle Data Quality DscXB onloadstatechange内存错误引用远程代码执行漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02939 | HP ThinPro OS连接设置选项特权访问漏洞 | 2015-05-07 | 2015-05-08 |
| cnvd-2015-02945 | VeryPhoto Pro for iOS Wifi接口模块名本地文件包含漏洞 | 2015-05-07 | 2015-05-11 |
| cnvd-2015-02946 | phpMyBackupPro存在未明代码注入漏洞(CNVD-2015-02946) | 2015-05-07 | 2015-05-11 |
| cnvd-2015-02947 | phpMyBackupPro存在未明代码注入漏洞(CNVD-2015-02947) | 2015-05-07 | 2015-05-11 |
| cnvd-2015-02948 | phpMyBackupPro存在未明代码注入漏洞(CNVD-2015-02948) | 2015-05-07 | 2015-05-11 |
| cnvd-2015-02949 | Photo Website for iOS airphotos.ma本地文件包含漏洞 | 2015-05-07 | 2015-05-11 |
| cnvd-2015-02950 | phpMyBackupPro多用户模式SQL注入漏洞 | 2015-05-07 | 2015-05-11 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-05227 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05228 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05229 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05230 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05231 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05232 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05233 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05234 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05235 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05236 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05237 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05238 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05239 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05240 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05241 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05242 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05243 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05244 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05245 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05246 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05247 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05248 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05249 | Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05250 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 05.07.2024 |
| bdu:2015-05251 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05252 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05253 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05254 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05255 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| bdu:2015-05256 | Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциа… | 28.04.2015 | 28.11.2016 |
| ID | Description | Updated |
|---|---|---|
| var-202105-1681 | Beijing Greenved Technology Co., Ltd. is a high-tech enterprise specializing in the desig… | 2022-05-04T10:21:13.274000Z |
| var-202105-1660 | WayOS intelligent routing management system is designed by Weimen Technology for small an… | 2022-05-04T10:21:13.285000Z |
| var-202105-1639 | ONU EB01 is a router product. Cianet ONU EB01 has a weak password vulnerability, whic… | 2022-05-04T10:21:13.297000Z |
| var-202105-1618 | Shenzhen Jixiang Tengda Technology Co., Ltd. is a high-tech enterprise integrating indepe… | 2022-05-04T10:21:13.307000Z |
| var-202105-1597 | Tenda AC series is a wireless router product of China Tenda (Tenda) company. Many Ten… | 2022-05-04T10:21:13.321000Z |
| var-202105-1576 | Leguang is a brand of wireless network products independently developed by Shenzhen Chaoh… | 2022-05-04T10:21:13.333000Z |
| var-202104-2076 | Runshen Information Technology (Shanghai) Co., Ltd. is a company engaged in technology de… | 2022-05-04T10:21:13.916000Z |
| var-202104-2055 | Tangshan Liulin Automation Equipment Co., Ltd. is a high-tech enterprise specializing in … | 2022-05-04T10:21:13.926000Z |
| var-202104-2034 | HUAWEI IP PHONE 7960 and HUAWEI IP ESPACE 7910 are feature-rich and easy-to-use IP phones… | 2022-05-04T10:21:13.937000Z |
| var-202104-2013 | Shenzhen Jixiang Tengda Technology Co., Ltd. is a high-tech enterprise integrating indepe… | 2022-05-04T10:21:13.947000Z |
| var-202104-1992 | New H3C Technology Co., Ltd. was established on September 26, 2003. Legal representative … | 2022-05-04T10:21:13.958000Z |
| var-202103-1806 | Wuxi Kaiyun Information Technology Co., Ltd. focuses on informatization construction, and… | 2022-05-04T10:21:15.248000Z |
| var-202103-1785 | XINJE XL5E-16T is a series of Ethernet controller products. XINJE XL5E-16T ModbusTCP … | 2022-05-04T10:21:15.259000Z |
| var-202103-1764 | Cisco is the world's leading provider of network solutions. There is a binary vulnera… | 2022-05-04T10:21:15.273000Z |
| var-202103-1742 | Hisense Group Co., Ltd. is an electronic information industry group company. Hisense … | 2022-05-04T10:21:15.287000Z |
| var-202103-1721 | TP-Link TL-R498GPM-AC is a router. TP-Link TL-R498GPM-AC has a denial of service vuln… | 2022-05-04T10:21:15.298000Z |
| var-202103-1700 | Inhantong InRouter900 series industrial routers are 4G industrial routers. Inhantong … | 2022-05-04T10:21:15.309000Z |
| var-202103-1679 | Skyworth Digital Co., Ltd. (hereinafter referred to as "Skyworth Digital") is a national … | 2022-05-04T10:21:15.322000Z |
| var-202103-1658 | YR1881XG is a router. Shenzhen Meikexing Communication Technology Co., Ltd. YR1881XG … | 2022-05-04T10:21:15.335000Z |
| var-202103-1636 | The business scope of China Mobile Communications Co., Ltd. includes: IP telephony busine… | 2022-05-04T10:21:15.346000Z |
| var-202102-1620 | EasyBuilder Pro is an HMI software developed by Weilun. EasyBuilder Pro has a dll hij… | 2022-05-04T10:21:19.465000Z |
| var-202102-1599 | The business scope of Xiamen Lionfish Network Technology Co., Ltd. includes: Internet of … | 2022-05-04T10:21:19.476000Z |
| var-202102-1578 | TL-ER3229G is a dual-core multi-WAN port gigabit enterprise VPN router. TP-Link route… | 2022-05-04T10:21:19.487000Z |
| var-202102-1557 | Shenzhen Weimeng Technology Co., Ltd. is a leading domestic provider of network equipment… | 2022-05-04T10:21:19.498000Z |
| var-202102-1536 | Tianyi broadband government-enterprise gateway A8-C (8+8) is a broadband broadband for te… | 2022-05-04T10:21:19.508000Z |
| var-202102-1515 | Shenzhen Skyworth Digital Technology Co., Ltd. is a high-tech enterprise focusing on prov… | 2022-05-04T10:21:19.519000Z |
| var-202101-2018 | Wanglun Tianxia (Beijing) Intelligent Technology Co., Ltd. is a technology-based enterpri… | 2022-05-04T10:21:21.043000Z |
| var-202101-1996 | Shenzhen Jixiang Tengda Technology Co., Ltd. (hereinafter referred to as "Tengda") is a p… | 2022-05-04T10:21:21.054000Z |
| var-202101-1973 | Wuhan Cetron Technology Co., Ltd. (abbreviated as Cetron) is a high-tech and innovative e… | 2022-05-04T10:21:21.067000Z |
| var-202012-1611 | Forcecontrol is a monitoring configuration software, mainly used for data acquisition and… | 2022-05-04T10:21:22.613000Z |