Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-62g2-m955-v383 | Improper Input Validation in Apache Spark | 2022-05-14T01:50:10Z | 2025-12-11T20:37:38Z |
| ghsa-5m8p-88m5-5qqp | Unspecified vulnerability in the ExternalInterface ActionScript functionality in Adobe Flash Player… | 2022-05-14T01:52:25Z | 2025-10-22T03:30:33Z |
| ghsa-5vgc-hmw3-287j | A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an ar… | 2022-05-14T01:52:31Z | 2025-11-25T18:32:14Z |
| ghsa-3w2h-f87x-m6vp | Memory safety bugs present in Firefox 60 and Firefox ESR 60. Some of these bugs showed evidence of … | 2022-05-14T01:52:32Z | 2025-11-25T18:32:15Z |
| ghsa-rv96-qgg3-4gv7 | The Firefox sandbox in Adobe Flash Player before 10.3.183.67 and 11.x before 11.6.602.171 on Window… | 2022-05-14T01:52:32Z | 2025-10-22T03:30:33Z |
| ghsa-vfrp-p8qm-9m8x | A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple argume… | 2022-05-14T01:52:32Z | 2025-11-25T18:32:14Z |
| ghsa-77mg-phf5-3h8g | When the Mozilla Updater opens a MAR format file which contains a very long item filename, an out-o… | 2022-05-14T01:52:46Z | 2025-11-25T18:32:14Z |
| ghsa-393c-hwwh-9gm2 | A use-after-free vulnerability can occur when an IndexedDB index is deleted while still in use by J… | 2022-05-14T01:52:50Z | 2025-11-25T18:32:14Z |
| ghsa-q5f8-grf8-9ff4 | A use-after-free vulnerability can occur when refresh driver timers are refreshed in some circumsta… | 2022-05-14T01:52:51Z | 2025-11-25T18:32:14Z |
| ghsa-qv7h-qvhv-jxmh | Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence o… | 2022-05-14T01:52:51Z | 2025-11-25T18:32:14Z |
| ghsa-q3w3-fw86-hj52 | In the previous mitigations for Spectre, the resolution or precision of various methods was reduced… | 2022-05-14T01:52:52Z | 2025-11-25T18:32:14Z |
| ghsa-q2jx-rgv9-xm3x | The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, O… | 2022-05-14T02:01:47Z | 2025-10-22T03:30:31Z |
| ghsa-f32r-xw6q-p85m | Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compati… | 2022-05-14T02:03:51Z | 2025-10-22T03:30:36Z |
| ghsa-68qr-58pp-42rr | Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X an… | 2022-05-14T02:06:53Z | 2025-11-17T21:31:16Z |
| ghsa-cpx9-g67g-v8c5 | The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS bef… | 2022-05-14T02:07:35Z | 2025-10-22T00:31:11Z |
| ghsa-93cg-vfx4-pxr4 | The Array.prototype.concat implementation in builtins.cc in Google V8, as used in Google Chrome bef… | 2022-05-14T02:09:45Z | 2025-10-22T00:31:12Z |
| ghsa-4r4r-223f-8hjj | The kernel in Microsoft Windows 10 Gold allows local users to gain privileges via a crafted applica… | 2022-05-14T02:13:11Z | 2025-10-22T00:31:12Z |
| ghsa-g9g3-3gv9-454q | Unspecified vulnerability in Adobe Flash Player 10.2.154.13 and earlier on Windows, Mac OS X, Linux… | 2022-05-14T02:14:56Z | 2025-10-22T03:30:29Z |
| ghsa-xhq8-8cqj-q337 | Adobe Flash Player before 10.2.154.27 on Windows, Mac OS X, Linux, and Solaris and 10.2.156.12 and … | 2022-05-14T02:15:15Z | 2025-10-22T03:30:29Z |
| ghsa-p5xj-3764-5mhh | Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and … | 2022-05-14T02:15:25Z | 2025-11-17T21:31:15Z |
| ghsa-gwxh-45g8-xg45 | Cross-site scripting (XSS) vulnerability in Adobe Flash Player before 10.3.183.15 and 11.x before 1… | 2022-05-14T02:15:26Z | 2025-10-22T03:30:30Z |
| ghsa-xxxm-q6xf-58pf | Integer overflow in the copyRawDataTo method in the Matrix3D class in Adobe Flash Player before 11.… | 2022-05-14T02:15:27Z | 2025-10-22T03:30:32Z |
| ghsa-5876-f5vv-fv9w | Unspecified vulnerability in Adobe Flash Player before 11.3.300.271 on Windows and Mac OS X and bef… | 2022-05-14T02:17:28Z | 2025-10-22T03:30:31Z |
| ghsa-m6wc-h767-27c3 | Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x bef… | 2022-05-14T02:18:00Z | 2025-10-22T03:30:28Z |
| ghsa-453q-q3mp-9cq4 | Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code executio… | 2022-05-14T02:19:45Z | 2025-10-22T00:31:22Z |
| ghsa-gxjf-m829-568r | Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable us… | 2022-05-14T02:21:34Z | 2025-10-22T00:31:17Z |
| ghsa-6rfx-wjcx-jvgf | The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows… | 2022-05-14T02:21:54Z | 2025-10-22T00:31:17Z |
| ghsa-r3jw-q3j2-jqv3 | Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Office Com… | 2022-05-14T02:21:54Z | 2025-10-22T00:31:17Z |
| ghsa-cx4j-72f6-rmxr | atmfd.dll in the Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R… | 2022-05-14T02:21:55Z | 2025-10-22T00:31:17Z |
| ghsa-4f5g-j7wg-7w8j | ChakraCore RCE Vulnerability | 2022-05-14T02:22:42Z | 2025-10-22T17:20:06Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2018-7841 | N/A | A SQL Injection (CWE-89) vulnerability exists in … |
U.motion |
U.motion Builder software version 1.3.4 |
2019-05-22T19:20:54.000Z | 2025-10-21T23:45:36.396Z |
| cve-2018-13383 | A heap buffer overflow in Fortinet FortiOS 6.0.0 … |
Fortinet |
Fortinet FortiOS and FortiProxy |
2019-05-29T17:20:03.000Z | 2025-10-21T23:45:36.261Z | |
| cve-2019-9670 | N/A | mailboxd component in Synacor Zimbra Collaboratio… |
n/a |
n/a |
2019-05-29T21:04:28.000Z | 2025-10-21T23:45:36.122Z |
| cve-2019-9874 | N/A | Deserialization of Untrusted Data in the Sitecore… |
n/a |
n/a |
2019-05-31T20:11:49.000Z | 2025-10-21T23:45:35.994Z |
| cve-2019-9875 | N/A | Deserialization of Untrusted Data in the anti CSR… |
n/a |
n/a |
2019-05-31T20:34:46.000Z | 2025-10-21T23:45:35.858Z |
| cve-2019-11580 | N/A | Atlassian Crowd and Crowd Data Center had the pdk… |
Atlassian |
Crowd |
2019-06-03T13:43:48.001Z | 2025-10-21T23:45:35.696Z |
| cve-2018-13379 | An Improper Limitation of a Pathname to a Restric… |
Fortinet |
Fortinet FortiOS, FortiProxy |
2019-06-04T20:18:08.000Z | 2025-10-21T23:45:35.558Z | |
| cve-2018-13382 | An Improper Authorization vulnerability in Fortin… |
Fortinet |
Fortinet FortiOS, FortiProxy |
2019-06-04T20:33:53.000Z | 2025-10-21T23:45:35.394Z | |
| cve-2019-10149 | A flaw was found in Exim versions 4.87 to 4.91 (i… |
exim |
exim |
2019-06-05T00:00:00.000Z | 2025-10-21T23:45:35.245Z | |
| cve-2019-12735 | N/A | getchar.c in Vim before 8.1.1365 and Neovim befor… |
n/a |
n/a |
2019-06-05T13:07:48.000Z | 2025-11-11T16:50:16.838Z |
| cve-2010-5330 | N/A | On certain Ubiquiti devices, Command Injection ex… |
n/a |
n/a |
2019-06-11T20:46:05.000Z | 2025-10-21T23:45:35.107Z |
| cve-2019-1064 | 7.8 (v3.1) | Windows Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1703 |
2019-06-12T13:49:41.000Z | 2025-10-21T23:45:34.956Z |
| cve-2019-1069 | 7.8 (v3.1) | Task Scheduler Elevation of Privilege Vulnerability |
Microsoft |
Windows 10 Version 1703 |
2019-06-12T13:49:41.000Z | 2025-10-21T23:45:34.809Z |
| cve-2019-5786 | N/A | Object lifetime issue in Blink in Google Chrome p… |
Google |
Chrome |
2019-06-27T16:13:43.000Z | 2025-10-21T23:45:34.644Z |
| cve-2019-13147 | N/A | In Audio File Library (aka audiofile) 0.3.6, ther… |
n/a |
n/a |
2019-07-01T00:00:00.000Z | 2025-11-03T19:25:23.948Z |
| cve-2019-7256 | N/A | Linear eMerge E3-Series devices allow Command Inj… |
n/a |
n/a |
2019-07-02T00:00:00.000Z | 2025-10-21T23:45:34.488Z |
| cve-2018-15811 | N/A | DNN (aka DotNetNuke) 9.2 through 9.2.1 uses a wea… |
n/a |
n/a |
2019-07-03T16:23:27.000Z | 2025-10-21T23:45:34.330Z |
| cve-2018-18325 | N/A | DNN (aka DotNetNuke) 9.2 through 9.2.2 uses a wea… |
n/a |
n/a |
2019-07-03T16:37:17.000Z | 2025-10-21T23:45:34.191Z |
| cve-2019-0880 | N/A | A local elevation of privilege vulnerability exis… |
Microsoft |
Windows Server |
2019-07-15T18:56:19.000Z | 2025-10-21T23:45:34.045Z |
| cve-2019-12991 | N/A | Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler … |
n/a |
n/a |
2019-07-16T17:16:38.000Z | 2025-10-21T23:45:33.894Z |
| cve-2019-12989 | N/A | Citrix SD-WAN 10.2.x before 10.2.3 and NetScaler … |
n/a |
n/a |
2019-07-16T17:32:44.000Z | 2025-10-21T23:45:33.734Z |
| cve-2019-13272 | N/A | In the Linux kernel before 5.1.17, ptrace_link in… |
n/a |
n/a |
2019-07-17T12:32:55.000Z | 2025-10-21T23:45:33.569Z |
| cve-2019-1579 | N/A | Remote Code Execution in PAN-OS 7.1.18 and earlie… |
n/a |
Palo Alto Networks GlobalProtect Portal/Gateway Interface |
2019-07-19T21:12:19.000Z | 2025-10-21T23:45:33.397Z |
| cve-2019-12815 | N/A | An arbitrary file copy vulnerability in mod_copy … |
n/a |
n/a |
2019-07-19T22:56:14.000Z | 2025-11-04T16:09:12.220Z |
| cve-2019-11708 | N/A | Insufficient vetting of parameters passed with th… |
Mozilla |
Firefox ESR |
2019-07-23T13:20:03.000Z | 2025-10-21T23:45:33.259Z |
| cve-2019-11707 | N/A | A type confusion vulnerability can occur when man… |
Mozilla |
Firefox ESR |
2019-07-23T13:20:17.000Z | 2025-10-21T23:45:33.091Z |
| cve-2019-1129 | N/A | An elevation of privilege vulnerability exists wh… |
Microsoft |
Windows |
2019-07-29T14:13:14.000Z | 2025-10-21T23:45:32.929Z |
| cve-2019-1130 | N/A | An elevation of privilege vulnerability exists wh… |
Microsoft |
Windows Server |
2019-07-29T14:13:22.000Z | 2025-10-21T23:45:32.799Z |
| cve-2019-1132 | N/A | An elevation of privilege vulnerability exists in… |
Microsoft |
Windows |
2019-07-29T14:13:38.000Z | 2025-10-21T23:45:32.651Z |
| cve-2019-14196 | N/A | An issue was discovered in Das U-Boot through 201… |
n/a |
n/a |
2019-07-31T12:30:00.000Z | 2025-11-03T19:25:25.335Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2018-11138 | N/A | The '/common/download_agent_installer.php' script… |
n/a |
n/a |
2018-05-31T18:00:00.000Z | 2025-10-21T23:45:50.901Z |
| cve-2018-0296 | N/A | A vulnerability in the web interface of the Cisco… |
n/a |
Cisco Adaptive Security Appliance unknown |
2018-06-07T12:00:00.000Z | 2025-10-21T23:45:50.734Z |
| cve-2016-5290 | N/A | Memory safety bugs were reported in Firefox 49 an… |
Mozilla |
Thunderbird |
2018-06-11T21:00:00 | 2024-08-06T00:53:48.950Z |
| cve-2016-5291 | N/A | A same-origin policy bypass with local shortcut f… |
Mozilla |
Thunderbird |
2018-06-11T21:00:00 | 2024-08-06T00:53:49.045Z |
| cve-2016-5293 | N/A | When the Mozilla Updater is run, if the Updater's… |
Mozilla |
Firefox ESR |
2018-06-11T21:00:00 | 2024-08-06T00:53:48.955Z |
| cve-2016-5294 | N/A | The Mozilla Updater can be made to choose an arbi… |
Mozilla |
Thunderbird |
2018-06-11T21:00:00 | 2024-08-06T00:53:49.006Z |
| cve-2016-5296 | N/A | A heap-buffer-overflow in Cairo when processing S… |
Mozilla |
Thunderbird |
2018-06-11T21:00:00 | 2024-08-06T00:53:48.993Z |
| cve-2016-5297 | N/A | An error in argument length checking in JavaScrip… |
Mozilla |
Thunderbird |
2018-06-11T21:00:00 | 2024-08-06T00:53:48.926Z |
| cve-2016-9064 | N/A | Add-on updates failed to verify that the add-on I… |
Mozilla |
Firefox ESR |
2018-06-11T21:00:00 | 2024-08-06T02:42:10.023Z |
| cve-2016-9066 | N/A | A buffer overflow resulting in a potentially expl… |
Mozilla |
Thunderbird |
2018-06-11T21:00:00 | 2024-08-06T02:42:09.998Z |
| cve-2016-9074 | N/A | An existing mitigation of timing side-channel att… |
Mozilla |
Thunderbird |
2018-06-11T21:00:00 | 2024-08-06T02:42:09.995Z |
| cve-2016-9079 | N/A | A use-after-free vulnerability in SVG Animation h… |
Mozilla |
Firefox |
2018-06-11T21:00:00.000Z | 2025-10-21T23:45:50.578Z |
| cve-2016-9893 | N/A | Memory safety bugs were reported in Thunderbird 4… |
Mozilla |
Firefox |
2018-06-11T21:00:00 | 2024-08-06T03:07:30.912Z |
| cve-2016-9895 | N/A | Event handlers on "marquee" elements were execute… |
Mozilla |
Firefox |
2018-06-11T21:00:00 | 2024-08-06T03:07:31.051Z |
| cve-2016-9898 | N/A | Use-after-free resulting in potentially exploitab… |
Mozilla |
Firefox |
2018-06-11T21:00:00 | 2024-08-06T03:07:30.980Z |
| cve-2016-9899 | N/A | Use-after-free while manipulating DOM events and … |
Mozilla |
Firefox |
2018-06-11T21:00:00 | 2024-08-06T03:07:31.881Z |
| cve-2016-9900 | N/A | External resources that should be blocked when lo… |
Mozilla |
Firefox |
2018-06-11T21:00:00 | 2024-08-06T03:07:31.403Z |
| cve-2016-9901 | N/A | HTML tags received from the Pocket server will be… |
Mozilla |
Firefox ESR |
2018-06-11T21:00:00 | 2024-08-06T03:07:31.414Z |
| cve-2016-9902 | N/A | The Pocket toolbar button, once activated, listen… |
Mozilla |
Firefox ESR |
2018-06-11T21:00:00 | 2024-08-06T03:07:31.367Z |
| cve-2016-9904 | N/A | An attacker could use a JavaScript Map/Set timing… |
Mozilla |
Firefox |
2018-06-11T21:00:00 | 2024-08-06T03:07:31.215Z |
| cve-2016-9905 | N/A | A potentially exploitable crash in "EnumerateSubD… |
Mozilla |
Firefox ESR |
2018-06-11T21:00:00 | 2024-08-06T03:07:31.496Z |
| cve-2017-5373 | N/A | Memory safety bugs were reported in Firefox 50.1 … |
Mozilla |
Thunderbird |
2018-06-11T21:00:00 | 2024-08-05T14:55:35.805Z |
| cve-2017-5375 | N/A | JIT code allocation can allow for a bypass of ASL… |
Mozilla |
Thunderbird |
2018-06-11T21:00:00 | 2024-08-05T14:55:35.692Z |
| cve-2017-5376 | N/A | Use-after-free while manipulating XSL in XSLT doc… |
Mozilla |
Thunderbird |
2018-06-11T21:00:00 | 2024-08-05T14:55:35.801Z |
| cve-2017-5378 | N/A | Hashed codes of JavaScript objects are shared bet… |
Mozilla |
Thunderbird |
2018-06-11T21:00:00 | 2024-08-05T14:55:35.814Z |
| cve-2017-5380 | N/A | A potential use-after-free found through fuzzing … |
Mozilla |
Thunderbird |
2018-06-11T21:00:00 | 2024-08-05T14:55:35.799Z |
| cve-2017-5383 | N/A | URLs containing certain unicode glyphs for altern… |
Mozilla |
Thunderbird |
2018-06-11T21:00:00 | 2024-08-05T14:55:35.810Z |
| cve-2017-5386 | N/A | WebExtension scripts can use the "data:" protocol… |
Mozilla |
Firefox ESR |
2018-06-11T21:00:00 | 2024-08-05T14:55:35.701Z |
| cve-2017-5390 | N/A | The JSON viewer in the Developer Tools uses insec… |
Mozilla |
Thunderbird |
2018-06-11T21:00:00 | 2024-08-05T14:55:35.774Z |
| cve-2017-5396 | N/A | A use-after-free vulnerability in the Media Decod… |
Mozilla |
Thunderbird |
2018-06-11T21:00:00 | 2024-08-05T14:55:35.793Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2024-9933 | Malicious code in 3web (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:52Z |
| mal-2024-9934 | Malicious code in 3web-py (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:52Z |
| mal-2024-9954 | Malicious code in bussardweg4a (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:52Z |
| mal-2024-9955 | Malicious code in bussardweg4av2 (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:52Z |
| mal-2024-9956 | Malicious code in bussardweg4av3 (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:52Z |
| mal-2024-9969 | Malicious code in eethereum (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:52Z |
| mal-2024-9970 | Malicious code in eetherium (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:52Z |
| mal-2024-9971 | Malicious code in ehtereum (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:52Z |
| mal-2024-9972 | Malicious code in etehreum (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9974 | Malicious code in etheereium (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9975 | Malicious code in etheerem (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9976 | Malicious code in etheereum (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9977 | Malicious code in etheerim (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9978 | Malicious code in etheerium (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9979 | Malicious code in etheeruim (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9980 | Malicious code in etheeruimm (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9981 | Malicious code in etheerum (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9982 | Malicious code in etheeruum (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9983 | Malicious code in etheirum (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9984 | Malicious code in etheraem (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9985 | Malicious code in ethereim (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9986 | Malicious code in ethereium (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9987 | Malicious code in etherem (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9988 | Malicious code in ethererum (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9989 | Malicious code in ethereuim (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9990 | Malicious code in ethereumm (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9991 | Malicious code in ethereun (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9992 | Malicious code in ethereuum (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9993 | Malicious code in etheriem (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| mal-2024-9994 | Malicious code in etherim (PyPI) | 2024-06-28T20:16:20Z | 2025-12-11T09:27:53Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2005:026 | Red Hat Security Advisory: tetex security update | 2005-03-16T15:19:00+00:00 | 2025-11-21T17:28:13+00:00 |
| rhsa-2005:306 | Red Hat Security Advisory: ethereal security update | 2005-03-18T09:19:00+00:00 | 2025-11-21T17:28:46+00:00 |
| rhsa-2005:303 | Red Hat Security Advisory: sylpheed security update | 2005-03-18T09:20:00+00:00 | 2025-11-21T17:28:45+00:00 |
| rhsa-2005:300 | Red Hat Security Advisory: libexif security update | 2005-03-21T18:22:00+00:00 | 2025-11-21T17:28:44+00:00 |
| rhsa-2005:235 | Red Hat Security Advisory: mailman security update | 2005-03-21T18:31:00+00:00 | 2025-11-21T17:28:40+00:00 |
| rhsa-2005:299 | Red Hat Security Advisory: realplayer security update | 2005-03-21T18:32:00+00:00 | 2025-11-21T17:28:44+00:00 |
| rhsa-2005:320 | Red Hat Security Advisory: ImageMagick security update | 2005-03-23T10:02:00+00:00 | 2025-11-21T17:28:47+00:00 |
| rhsa-2005:070 | Red Hat Security Advisory: ImageMagick security update | 2005-03-23T10:07:00+00:00 | 2025-11-21T17:28:22+00:00 |
| rhsa-2005:232 | Red Hat Security Advisory: ipsec-tools security update | 2005-03-23T10:10:00+00:00 | 2025-11-21T17:28:42+00:00 |
| rhsa-2005:325 | Red Hat Security Advisory: kdelibs security update | 2005-03-23T10:20:00+00:00 | 2025-11-21T17:28:47+00:00 |
| rhsa-2005:335 | Red Hat Security Advisory: mozilla security update | 2005-03-23T19:14:00+00:00 | 2025-11-21T17:28:49+00:00 |
| rhsa-2005:336 | Red Hat Security Advisory: firefox security update | 2005-03-23T19:21:00+00:00 | 2025-11-21T17:28:49+00:00 |
| rhsa-2005:337 | Red Hat Security Advisory: thunderbird security update | 2005-03-23T19:26:00+00:00 | 2025-11-21T17:28:50+00:00 |
| rhsa-2005:334 | Red Hat Security Advisory: mysql security update | 2005-03-28T19:44:00+00:00 | 2025-11-21T17:28:49+00:00 |
| rhsa-2005:327 | Red Hat Security Advisory: telnet security update | 2005-03-28T19:49:00+00:00 | 2025-11-21T17:28:52+00:00 |
| rhsa-2005:304 | Red Hat Security Advisory: grip security update | 2005-03-28T19:50:00+00:00 | 2025-11-21T17:28:45+00:00 |
| rhsa-2005:330 | Red Hat Security Advisory: krb5 security update | 2005-03-30T07:58:00+00:00 | 2025-11-21T17:28:47+00:00 |
| rhsa-2005:331 | Red Hat Security Advisory: XFree86 security update | 2005-03-30T08:28:00+00:00 | 2025-11-21T17:28:49+00:00 |
| rhsa-2005:354 | Red Hat Security Advisory: tetex security update | 2005-04-01T14:39:00+00:00 | 2025-11-21T17:28:54+00:00 |
| rhsa-2005:344 | Red Hat Security Advisory: gtk2 security update | 2005-04-01T14:47:00+00:00 | 2025-11-21T17:28:52+00:00 |
| rhsa-2005:348 | Red Hat Security Advisory: mysql-server security update | 2005-04-05T15:02:00+00:00 | 2025-11-21T17:28:53+00:00 |
| rhsa-2005:340 | Red Hat Security Advisory: curl security update | 2005-04-05T15:06:00+00:00 | 2025-11-21T17:28:51+00:00 |
| rhsa-2005:343 | Red Hat Security Advisory: gdk-pixbuf security update | 2005-04-05T15:11:00+00:00 | 2025-11-21T17:28:53+00:00 |
| rhsa-2005:307 | Red Hat Security Advisory: kdelibs security update | 2005-04-06T17:54:00+00:00 | 2025-11-21T17:28:46+00:00 |
| rhsa-2005:044 | Red Hat Security Advisory: XFree86 security update | 2005-04-06T18:05:00+00:00 | 2025-11-21T17:28:18+00:00 |
| rhsa-2005:212 | Red Hat Security Advisory: dhcp security update | 2005-04-12T13:42:00+00:00 | 2025-11-21T17:28:38+00:00 |
| rhsa-2005:021 | Red Hat Security Advisory: kdegraphics security update | 2005-04-12T14:07:00+00:00 | 2025-11-21T17:28:13+00:00 |
| rhsa-2005:364 | Red Hat Security Advisory: logwatch security update | 2005-04-19T18:33:00+00:00 | 2025-11-21T17:28:55+00:00 |
| rhsa-2005:332 | Red Hat Security Advisory: xloadimage security update | 2005-04-19T18:36:00+00:00 | 2025-11-21T17:28:49+00:00 |
| rhsa-2005:366 | Red Hat Security Advisory: kernel security update | 2005-04-19T18:52:00+00:00 | 2025-11-21T17:28:56+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2020-14540 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14547 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14550 | Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.48 and prior 5.7.30 and prior and 8.0.20 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14553 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14559 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 5.6.48 and prior 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14568 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14575 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14576 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: UDF). Supported versions that are affected are 5.7.30 and prior and 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14586 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14591 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Audit Plug-in). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14597 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14614 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14619 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14620 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14623 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14624 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: JSON). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14631 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Audit). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14632 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14633 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14634 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14641 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14643 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14651 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14654 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14656 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14663 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14678 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14680 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14697 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14702 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2011-000002 | SGX-SP Final and SGX-SP Final NE vulnerable to cross-site scripting | 2011-01-13T11:46+09:00 | 2011-01-13T11:46+09:00 |
| jvndb-2011-000003 | Aipo vulnerable to SQL injection | 2011-01-13T11:53+09:00 | 2011-01-13T11:53+09:00 |
| jvndb-2011-000005 | Ruby Version Manager escape sequence injection vulnerability | 2011-01-18T17:49+09:00 | 2011-01-18T17:49+09:00 |
| jvndb-2011-000006 | Cross-site scripting vulnerability in multiple Rocomotion products | 2011-01-18T17:51+09:00 | 2011-01-18T17:51+09:00 |
| jvndb-2011-000007 | Cisco Linksys WRT54GC vulnerable to buffer overflow | 2011-01-21T18:22+09:00 | 2011-01-21T18:22+09:00 |
| jvndb-2011-000004 | Lunascape may insecurely load dynamic libraries | 2011-01-21T18:30+09:00 | 2011-01-21T18:30+09:00 |
| jvndb-2011-000008 | MODx Evolution vulnerable to SQL injection | 2011-01-26T15:46+09:00 | 2011-01-26T15:46+09:00 |
| jvndb-2011-000009 | MODx Evolution vulnerable to directory traversal | 2011-01-26T15:52+09:00 | 2011-01-26T15:52+09:00 |
| jvndb-2011-000010 | Opera may insecurely load executable files | 2011-02-02T14:53+09:00 | 2011-02-02T14:53+09:00 |
| jvndb-2011-000011 | EC-CUBE vulnerable to cross-site scripting | 2011-02-02T14:54+09:00 | 2011-02-02T14:54+09:00 |
| jvndb-2011-000013 | F-Secure Internet Gatekeeper for Linux authentication issue | 2011-02-17T10:27+09:00 | 2011-02-17T10:27+09:00 |
| jvndb-2011-000012 | Lunascape may insecurely load executable files | 2011-02-23T15:41+09:00 | 2011-02-23T15:41+09:00 |
| jvndb-2011-000014 | SEIL Series routers vulnerable to buffer overflow | 2011-02-28T17:17+09:00 | 2011-02-28T17:17+09:00 |
| jvndb-2011-000015 | Multiple Things CGI products vulnerable to cross-site scripting | 2011-03-02T17:27+09:00 | 2011-03-02T17:27+09:00 |
| jvndb-2011-000018 | IBM Lotus vulnerable to denial-of-service (DoS) | 2011-03-04T19:28+09:00 | 2018-02-07T17:10+09:00 |
| jvndb-2011-000016 | IBM DB2 vulnerable to denial-of-service (DoS) | 2011-03-04T19:29+09:00 | 2018-02-07T17:10+09:00 |
| jvndb-2011-000017 | IBM WebSphere Application Server vulnerable to denial-of-service (DoS) | 2011-03-04T19:29+09:00 | 2018-02-07T17:10+09:00 |
| jvndb-2011-000019 | OTRS vulnerable to OS command injection | 2011-03-07T18:19+09:00 | 2011-03-07T18:19+09:00 |
| jvndb-2011-001145 | JP1/NETM/DM Denial of Service (DoS) Vulnerability | 2011-03-08T10:25+09:00 | 2011-03-08T10:25+09:00 |
| jvndb-2011-000020 | IBM Tivoli vulnerable to denial-of-service (DoS) | 2011-03-10T16:38+09:00 | 2018-02-07T17:10+09:00 |
| jvndb-2011-000021 | e107 vulnerable to cross-site scripting | 2011-03-28T08:06+09:00 | 2011-03-28T08:06+09:00 |
| jvndb-2011-000022 | Picasa may insecurely load executable files | 2011-03-28T08:11+09:00 | 2011-03-28T08:11+09:00 |
| jvndb-2011-001156 | Hitachi Tuning Manager Software Cross-Site Scripting Vulnerability | 2011-04-01T15:52+09:00 | 2011-04-01T15:52+09:00 |
| jvndb-2011-000023 | Password Vault Web Access vulnerable to cross-site scripting | 2011-04-08T14:09+09:00 | 2011-04-08T14:09+09:00 |
| jvndb-2011-000024 | Multiple Yamaha routers vulnerable to denial-of-service (DoS) | 2011-05-11T08:32+09:00 | 2011-05-31T10:39+09:00 |
| jvndb-2011-000025 | Multiple Buffalo routers vulnerable to cross-site request forgery | 2011-05-11T08:37+09:00 | 2011-05-11T08:37+09:00 |
| jvndb-2011-000029 | EC-CUBE vulnerable to cross-site request forgery | 2011-05-11T08:44+09:00 | 2011-05-11T08:44+09:00 |
| jvndb-2011-000027 | La Fonera+ vulnerable to denial-of-service (DoS) | 2011-05-13T19:17+09:00 | 2011-05-13T19:17+09:00 |
| jvndb-2011-000026 | Applications that use the Windows Help function may be vulnerable to privilege escalation | 2011-05-13T19:36+09:00 | 2011-05-13T19:36+09:00 |
| jvndb-2011-000028 | Virus Buster 2009 key input encryption function vulnerability | 2011-05-17T17:17+09:00 | 2011-05-17T17:17+09:00 |
| ID | Description | Updated |
|---|