Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-995j-587r-259w | Moderate severity vulnerability that affects rack-mini-profiler | 2018-08-13T20:46:58Z | 2020-06-16T21:42:03Z |
| ghsa-35c4-f3rq-f9g3 | Moderate severity vulnerability that affects activesupport | 2018-09-17T21:57:23Z | 2020-06-16T21:42:52Z |
| ghsa-crvj-3gj9-gm2p | High severity vulnerability that affects qs | 2018-10-09T00:44:29Z | 2020-06-16T21:43:40Z |
| ghsa-qpwj-mvv7-v3m9 | High severity vulnerability that affects org.apache.cxf.fediz:fediz-spring and org.apache.cxf.fediz… | 2018-10-18T16:57:10Z | 2020-06-16T21:52:31Z |
| ghsa-mrhj-2g4v-39qx | Moderate severity vulnerability that affects rails-html-sanitizer | 2018-09-17T21:58:19Z | 2020-06-16T21:54:12Z |
| ghsa-9vc2-p34x-jhxh | Moderate severity vulnerability that affects rack | 2018-09-17T21:56:30Z | 2020-06-16T21:54:47Z |
| ghsa-v76m-f5cx-8rg4 | Moderate severity vulnerability that affects DotNetNuke.Core | 2018-10-16T19:33:25Z | 2020-06-16T21:57:07Z |
| ghsa-v7q8-wvvh-c97p | Moderate severity vulnerability that affects Zope2 | 2018-07-23T19:51:28Z | 2020-06-16T21:57:13Z |
| ghsa-w3gh-g32m-cvhr | High severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fediz:fe… | 2018-10-18T16:56:47Z | 2020-06-16T21:59:21Z |
| ghsa-3233-rgx3-c2wh | Moderate severity vulnerability that affects mustache | 2018-10-09T00:38:09Z | 2020-06-16T21:59:24Z |
| ghsa-w4x9-4f5x-8jj8 | Low severity vulnerability that affects org.apache.hive:hive-exec, org.apache.hive:hive, and o… | 2018-11-21T22:23:29Z | 2020-06-16T21:59:37Z |
| ghsa-whw7-h25v-9qvx | Moderate severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fedi… | 2018-10-18T16:56:38Z | 2020-06-16T22:00:38Z |
| ghsa-xpwp-rq3x-x6v7 | Critical severity vulnerability that affects recurly-api-client | 2018-10-16T17:35:04Z | 2020-06-16T22:03:58Z |
| ghsa-xv6v-72hh-g6g2 | Moderate severity vulnerability that affects org.owasp.antisamy:antisamy | 2018-10-18T17:22:26Z | 2020-06-16T22:04:31Z |
| ghsa-pgv6-jrvv-75jp | Moderate severity vulnerability that affects send | 2018-10-09T00:34:30Z | 2020-06-16T22:04:41Z |
| ghsa-32f7-cmr3-vpjv | Moderate severity vulnerability that affects aioxmpp | 2019-02-07T18:18:30Z | 2020-06-17T15:14:32Z |
| ghsa-5p9f-55j8-922m | Moderate severity vulnerability that affects doorkeeper | 2018-08-13T20:49:10Z | 2020-06-17T15:14:35Z |
| ghsa-82x2-g7vr-39wq | Moderate severity vulnerability that affects web-console | 2018-08-13T20:48:09Z | 2020-06-17T15:14:38Z |
| ghsa-8474-rc7c-wrhp | High severity vulnerability that affects safemode | 2018-08-08T22:29:10Z | 2020-06-17T15:14:40Z |
| ghsa-9wcm-rrvh-qjc8 | High severity vulnerability that affects colorscore | 2018-08-15T20:03:53Z | 2020-06-17T15:14:43Z |
| ghsa-g6f4-j6c2-w3p3 | High severity vulnerability that affects uglify-js | 2018-10-09T00:39:43Z | 2020-06-17T15:14:46Z |
| ghsa-hm48-76wh-q86v | High severity vulnerability that affects activerecord | 2018-08-21T19:03:17Z | 2020-06-17T15:14:48Z |
| ghsa-hxf5-mg84-pj4m | Moderate severity vulnerability that affects moment | 2018-07-31T23:03:17Z | 2020-06-17T15:14:53Z |
| ghsa-qc8j-m8j3-rjq6 | Moderate severity vulnerability that affects rails-html-sanitizer | 2018-09-17T21:57:58Z | 2020-06-17T15:15:01Z |
| ghsa-qf5x-qgx7-437h | Moderate severity vulnerability that affects actionpack | 2018-09-17T21:54:11Z | 2020-06-17T15:15:04Z |
| ghsa-r53m-pfr5-7v87 | Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core | 2019-04-18T14:50:19Z | 2020-06-17T15:15:06Z |
| ghsa-vxp4-25qp-86qh | Moderate severity vulnerability that affects ember | 2017-10-24T18:33:36Z | 2020-06-17T15:15:14Z |
| ghsa-w655-w578-99pq | High severity vulnerability that affects espeak-ruby | 2018-08-21T17:09:08Z | 2020-06-17T15:15:17Z |
| ghsa-wxvm-fh75-mpgr | Critical severity vulnerability that affects dns-sync | 2018-07-26T16:24:34Z | 2020-06-17T15:15:19Z |
| ghsa-9959-c6q6-6qp3 | Moderate severity vulnerability that affects validator | 2017-10-24T18:33:36Z | 2020-06-17T16:30:41Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2002-1161 | N/A | {'providerMetadata': {'dateUpdated': '2004-01-26T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1380. Reason: This candidate is a reservation duplicate of CVE-2002-1380. Notes: none'}]} | N/A | N/A | 2002-12-18T05:00:00 | 2004-01-26T10:00:00 |
| cve-2004-0585 | N/A | {'providerMetadata': {'dateUpdated': '2004-06-24T09:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0589. Reason: This candidate is a duplicate of CVE-2004-0589. Notes: All CVE users should reference CVE-2004-0589 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2004-06-23T04:00:00 | 2004-06-24T09:00:00 |
| cve-2003-0351 | N/A | {'providerMetadata': {'dateUpdated': '2004-08-20T09:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0306. Reason: This candidate is a reservation duplicate of CVE-2003-0306. Notes: All CVE users should reference CVE-2003-0306 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2004-08-20T04:00:00 | 2004-08-20T09:00:00 |
| cve-2003-0598 | N/A | {'providerMetadata': {'dateUpdated': '2004-08-20T09:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0657. Reason: This candidate is a reservation duplicate of CVE-2003-0657. Notes: All CVE users should reference CVE-2003-0657 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2003-08-14T04:00:00 | 2004-08-20T09:00:00 |
| cve-2004-1159 | N/A | {'providerMetadata': {'dateUpdated': '2004-12-22T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1122, CVE-2004-1314. Reason: this was an out-of-band assignment duplicate intended for one issue, but the description and references inadvertently combined multiple issues. Notes: All CVE users should consult CVE-2004-1122 and CVE-2004-1314 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2004-12-10T05:00:00 | 2004-12-22T10:00:00 |
| cve-1999-0020 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-04T00:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0032. Reason: This candidate is a duplicate of CVE-1999-0032. Notes: All CVE users should reference CVE-1999-0032 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2000-02-04T05:00:00 | 2005-02-04T00:00:00 |
| cve-1999-0110 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-04T00:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0315. Reason: This candidate's original description had a typo that delayed it from being detected as a duplicate of CVE-1999-0315. Notes: All CVE users should reference CVE-1999-0315 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage"}]} | N/A | N/A | 2000-02-04T05:00:00 | 2005-02-04T00:00:00 |
| cve-1999-0187 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-04T00:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0022. Reason: This candidate is a duplicate of CVE-1999-0022. Notes: All CVE users should reference CVE-1999-0022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2000-02-04T05:00:00 | 2005-02-04T00:00:00 |
| cve-1999-1056 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-04T00:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1395. Reason: This candidate is a duplicate of CVE-1999-1395. Notes: All CVE users should reference CVE-1999-1395 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| cve-1999-1108 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-04T00:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1107. Reason: This candidate is a duplicate of CVE-1999-1107. Notes: All CVE users should reference CVE-1999-1107 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| cve-1999-1310 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-04T00:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1022. Reason: This candidate is a duplicate of CVE-1999-1022. Notes: All CVE users should reference CVE-1999-1022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| cve-2002-0192 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-04T00:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0193, CVE-2002-1564. Reason: This candidate was published with a description that identified a different vulnerability than what was identified in the original authoritative reference. Notes: Consult CVE-2002-0193 or CVE-2002-1564 to find the identifier for the proper issue'}]} | N/A | N/A | 2002-05-17T04:00:00 | 2005-02-04T00:00:00 |
| cve-2002-0828 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-04T00:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0862. Reason: This is a duplicate of CVE-2002-0862. Notes: All CVE users should reference CVE-2002-0862 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2002-08-07T04:00:00 | 2005-02-04T00:00:00 |
| cve-2002-0646 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0371. Reason: This candidate is a reservation duplicate of CVE-2002-0371. Notes: CVE-2002-0371 should be used instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2002-10-15T04:00:00 | 2005-02-06T10:00:00 |
| cve-2002-1259 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1286. Reason: This candidate is a reservation duplicate of CVE-2002-1286. Notes: All CVE users should reference CVE-2002-1286 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2002-12-18T05:00:00 | 2005-02-06T10:00:00 |
| cve-2002-1263 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1295. Reason: This candidate is a reservation duplicate of CVE-2002-1295. Notes: All CVE users should reference CVE-2002-1295 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2003-01-03T05:00:00 | 2005-02-06T10:00:00 |
| cve-2003-0157 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0138. Reason: This candidate is a reservation duplicate of CVE-2003-0138 due to incomplete coordination. Notes: All CVE users should reference CVE-2003-0138 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2003-03-21T05:00:00 | 2005-02-06T10:00:00 |
| cve-2003-0158 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0139. Reason: This candidate is a reservation duplicate of CVE-2003-0139 due to incomplete coordination. Notes: All CVE users should reference CVE-2003-0139 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2003-03-21T05:00:00 | 2005-02-06T10:00:00 |
| cve-2003-0591 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is a duplicate number that was created during the refinement phase. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2003-07-25T04:00:00 | 2005-02-06T10:00:00 |
| cve-2003-0687 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has been revoked by its Candidate Numbering Authority (CNA) because it was internally assigned to a problem that was not reachable (the affected routine was not used by the software). Notes: none'}]} | N/A | N/A | 2004-06-03T04:00:00 | 2005-02-06T10:00:00 |
| cve-2003-0790 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: the reported issue is not a vulnerability or exposure. Notes: This candidate was assigned to a "head-reading" bug in a component of fetchmail 6.2.4 and earlier, which was claimed to allow a denial of service. However, the bug is in a broken component of fetchmail that is not "reachable" by any execution path, so it cannot be triggered by any sort of attack and is not exploitable'}]} | N/A | N/A | 2003-10-25T04:00:00 | 2005-02-06T10:00:00 |
| cve-2003-0862 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0813. Reason: This candidate is a duplicate of CVE-2003-0813. Notes: All CVE users should reference CVE-2003-0813 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2003-10-15T04:00:00 | 2005-02-06T10:00:00 |
| cve-2003-0867 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0662. Reason: This candidate is a duplicate of CVE-2003-0662. Notes: All CVE users should reference CVE-2003-0662 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2003-10-17T04:00:00 | 2005-02-06T10:00:00 |
| cve-2003-0879 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0518. Reason: This candidate is a reservation duplicate of CVE-2003-0518. Notes: All CVE users should reference CVE-2003-0518 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2003-10-28T05:00:00 | 2005-02-06T10:00:00 |
| cve-2003-0964 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: N/A. Notes: none'}]} | N/A | N/A | 2003-10-01T04:00:00 | 2005-02-06T10:00:00 |
| cve-2003-1047 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0540. Reason: This candidate is a duplicate of CVE-2004-0540. Notes: All CVE users should reference CVE-2004-0540 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2004-06-08T04:00:00 | 2005-02-06T10:00:00 |
| cve-2003-1565 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1565. Reason: This candidate is a duplicate of CVE-2002-1565. Notes: All CVE users should reference CVE-2002-1565 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2003-08-05T04:00:00 | 2005-02-06T10:00:00 |
| cve-2004-0076 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was removed from consideration by its Candidate Numbering Authority. Notes: none'}]} | N/A | N/A | 2004-06-03T04:00:00 | 2005-02-06T10:00:00 |
| cve-2004-0187 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0185. Reason: This candidate is a reservation duplicate of CVE-2004-0185. Notes: All CVE users should reference CVE-2004-0185 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2004-03-04T05:00:00 | 2005-02-06T10:00:00 |
| cve-2004-0472 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is a reservation duplicate of CVE-2004-0434. Notes: All CVE users should reference CVE-2004-0434 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2004-05-20T04:00:00 | 2005-02-06T10:00:00 |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-1999-0660 | N/A | {'providerMetadata': {'dateUpdated': '2003-03-21T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. It might be more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A hacker utility, back door, or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc.'}]} | N/A | N/A | 2000-02-04T05:00:00 | 2003-03-21T10:00:00 |
| cve-1999-1056 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-04T00:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1395. Reason: This candidate is a duplicate of CVE-1999-1395. Notes: All CVE users should reference CVE-1999-1395 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| cve-1999-1108 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-04T00:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1107. Reason: This candidate is a duplicate of CVE-1999-1107. Notes: All CVE users should reference CVE-1999-1107 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| cve-1999-1310 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-04T00:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1022. Reason: This candidate is a duplicate of CVE-1999-1022. Notes: All CVE users should reference CVE-1999-1022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2001-09-12T04:00:00 | 2005-02-04T00:00:00 |
| cve-1999-1594 | N/A | {'providerMetadata': {'dateUpdated': '2020-11-05T19:41:36', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none'}]} | N/A | N/A | 2020-11-05T19:41:36 | 2020-11-05T19:41:36 |
| cve-1999-1595 | N/A | {'providerMetadata': {'dateUpdated': '2020-11-05T19:42:07', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none'}]} | N/A | N/A | 2020-11-05T19:42:07 | 2020-11-05T19:42:07 |
| cve-1999-1596 | N/A | {'providerMetadata': {'dateUpdated': '2020-11-05T19:42:39', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none'}]} | N/A | N/A | 2020-11-05T19:42:39 | 2020-11-05T19:42:39 |
| cve-1999-1597 | N/A | {'providerMetadata': {'dateUpdated': '2020-11-05T19:43:12', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none'}]} | N/A | N/A | 2020-11-05T19:43:12 | 2020-11-05T19:43:12 |
| cve-1999-1598 | N/A | {'providerMetadata': {'dateUpdated': '2020-11-05T19:43:30', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none'}]} | N/A | N/A | 2020-11-05T19:43:30 | 2020-11-05T19:43:30 |
| cve-2000-0744 | N/A | {'providerMetadata': {'dateUpdated': '2022-08-17T02:58:08', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2000-0743. Reason: This candidate is a duplicate of CVE-2000-0743. Notes: All CVE users should reference CVE-2000-0743 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2000-10-13T04:00:00 | 2022-08-17T02:58:08 |
| cve-2000-1248 | N/A | {'providerMetadata': {'dateUpdated': '2020-11-05T19:44:14', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none'}]} | N/A | N/A | 2020-11-05T19:44:14 | 2020-11-05T19:44:14 |
| cve-2000-1249 | N/A | {'providerMetadata': {'dateUpdated': '2020-11-05T19:44:37', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none'}]} | N/A | N/A | 2020-11-05T19:44:37 | 2020-11-05T19:44:37 |
| cve-2000-1250 | N/A | {'providerMetadata': {'dateUpdated': '2020-11-05T19:45:01', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none'}]} | N/A | N/A | 2020-11-05T19:45:01 | 2020-11-05T19:45:01 |
| cve-2000-1251 | N/A | {'providerMetadata': {'dateUpdated': '2020-11-05T19:45:28', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none'}]} | N/A | N/A | 2020-11-05T19:45:28 | 2020-11-05T19:45:28 |
| cve-2000-1252 | N/A | {'providerMetadata': {'dateUpdated': '2020-11-05T19:46:12', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none'}]} | N/A | N/A | 2020-11-05T19:46:12 | 2020-11-05T19:46:12 |
| cve-2001-0654 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': '37e5125f-f79b-445b-8fad-9564f167944b', 'shortName': 'certcc'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2001-0655 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': '37e5125f-f79b-445b-8fad-9564f167944b', 'shortName': 'certcc'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2001-0656 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': '37e5125f-f79b-445b-8fad-9564f167944b', 'shortName': 'certcc'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2001-0657 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': '37e5125f-f79b-445b-8fad-9564f167944b', 'shortName': 'certcc'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2001-0798 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': 'bc94ec7e-8909-4cbb-83df-d2fc9330fa88', 'shortName': 'sgi'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2001-0802 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': 'bc94ec7e-8909-4cbb-83df-d2fc9330fa88', 'shortName': 'sgi'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2001-0810 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': 'bc94ec7e-8909-4cbb-83df-d2fc9330fa88', 'shortName': 'sgi'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2001-0811 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': 'bc94ec7e-8909-4cbb-83df-d2fc9330fa88', 'shortName': 'sgi'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2001-0812 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': 'bc94ec7e-8909-4cbb-83df-d2fc9330fa88', 'shortName': 'sgi'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2001-0813 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': 'bc94ec7e-8909-4cbb-83df-d2fc9330fa88', 'shortName': 'sgi'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2001-0814 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': 'bc94ec7e-8909-4cbb-83df-d2fc9330fa88', 'shortName': 'sgi'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2001. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2001-1121 | N/A | {'providerMetadata': {'dateUpdated': '2022-08-17T03:00:22', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-1084. Reason: This candidate is a duplicate of CVE-2001-1084. Notes: All CVE users should reference CVE-2001-1084 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2002-06-25T04:00:00 | 2022-08-17T03:00:22 |
| cve-2001-1167 | N/A | {'providerMetadata': {'dateUpdated': '2002-03-22T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-0976. Reason: This candidate is a duplicate of CVE-2001-0976. Notes: CVE-2001-0976 should be used instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2002-03-15T05:00:00 | 2002-03-22T10:00:00 |
| cve-2001-1492 | N/A | {'providerMetadata': {'dateUpdated': '2005-07-12T09:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-1460. Reason: This candidate is a refinement duplicate of CVE-2001-1460. Notes: All CVE users should reference CVE-2001-1460 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-06-21T04:00:00 | 2005-07-12T09:00:00 |
| cve-2001-1588 | N/A | {'providerMetadata': {'dateUpdated': '2020-11-05T19:46:42', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none'}]} | N/A | N/A | 2020-11-05T19:46:42 | 2020-11-05T19:46:42 |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-1999-0660 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is no… | 1999-01-01T05:00:00.000 | 2023-11-07T01:55:00.443 |
| fkie_cve-1999-1056 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1395. Reason: This candid… | 1992-12-31T05:00:00.000 | 2023-11-07T01:55:06.290 |
| fkie_cve-1999-1108 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1107. Reason: This candid… | 1998-11-18T05:00:00.000 | 2023-11-07T01:55:06.680 |
| fkie_cve-1999-1310 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1022. Reason: This candid… | 1994-11-04T05:00:00.000 | 2023-11-07T01:55:08.250 |
| fkie_cve-1999-1594 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.613 | 2023-11-07T01:55:10.620 |
| fkie_cve-1999-1595 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.693 | 2023-11-07T01:55:10.873 |
| fkie_cve-1999-1596 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.753 | 2023-11-07T01:55:11.093 |
| fkie_cve-1999-1597 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.817 | 2023-11-07T01:55:11.307 |
| fkie_cve-1999-1598 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.897 | 2023-11-07T01:55:11.520 |
| fkie_cve-2000-0744 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2000-0743. Reason: This candidat… | 2000-10-20T04:00:00.000 | 2023-11-07T01:55:23.877 |
| fkie_cve-2000-1248 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.973 | 2023-11-07T01:55:29.043 |
| fkie_cve-2000-1249 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.037 | 2023-11-07T01:55:29.257 |
| fkie_cve-2000-1250 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.097 | 2023-11-07T01:55:29.467 |
| fkie_cve-2000-1251 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.177 | 2023-11-07T01:55:29.743 |
| fkie_cve-2000-1252 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.240 | 2023-11-07T01:55:29.953 |
| fkie_cve-2001-0654 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.167 | 2023-11-07T01:55:35.133 |
| fkie_cve-2001-0655 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.197 | 2023-11-07T01:55:35.370 |
| fkie_cve-2001-0656 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.230 | 2023-11-07T01:55:35.600 |
| fkie_cve-2001-0657 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.243 | 2023-11-07T01:55:35.810 |
| fkie_cve-2001-0798 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.277 | 2023-11-07T01:55:37.277 |
| fkie_cve-2001-0802 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.290 | 2023-11-07T01:55:37.520 |
| fkie_cve-2001-0810 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.323 | 2023-11-07T01:55:37.937 |
| fkie_cve-2001-0811 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.353 | 2023-11-07T01:55:38.150 |
| fkie_cve-2001-0812 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.387 | 2023-11-07T01:55:38.367 |
| fkie_cve-2001-0813 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.417 | 2023-11-07T01:55:38.583 |
| fkie_cve-2001-0814 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.433 | 2023-11-07T01:55:38.803 |
| fkie_cve-2001-1121 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-1084. Reason: This candidat… | 2001-07-02T04:00:00.000 | 2023-11-07T01:55:41.453 |
| fkie_cve-2001-1167 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-0976. Reason: This candid… | 2001-08-28T04:00:00.000 | 2023-11-07T01:55:41.797 |
| fkie_cve-2001-1492 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-1460. Reason: This candid… | 2001-12-31T05:00:00.000 | 2023-11-07T01:55:44.577 |
| fkie_cve-2001-1588 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.300 | 2023-11-07T01:55:45.377 |
| ID | Description | Package | Published | Updated |
|---|---|---|---|---|
| pysec-2019-13 | An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x b… | django | 2019-08-09T13:15:00Z | 2019-08-28T13:15:00Z |
| pysec-2019-104 | ** DISPUTED ** core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-r… | mitogen | 2019-08-18T20:15:00Z | 2019-08-30T11:38:00Z |
| pysec-2019-23 | All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect… | httpie | 2019-08-23T17:15:00Z | 2019-09-02T18:15:00Z |
| pysec-2019-140 | Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN rand… | werkzeug | 2019-08-09T15:15:00Z | 2019-09-11T00:15:00Z |
| pysec-2019-133 | The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired s… | urllib3 | 2019-04-18T21:29:00Z | 2019-09-14T18:15:00Z |
| pysec-2019-126 | ** DISPUTED ** In Supervisor through 4.0.2, an unauthenticated user can read log files or… | supervisor | 2019-09-10T17:15:00Z | 2019-09-17T22:15:00Z |
| pysec-2019-108 | ** DISPUTED ** An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle … | numpy | 2019-01-16T05:29:00Z | 2019-10-01T00:15:00Z |
| pysec-2019-41 | psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of r… | psutil | 2019-11-12T02:15:00Z | 2019-11-18T21:15:00Z |
| pysec-2019-116 | Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper … | rediswrapper | 2019-10-05T23:15:00Z | 2019-12-09T19:06:00Z |
| pysec-2017-50 | Lemur 0.1.4 does not use sufficient entropy in its IV when encrypting AES in CBC mode. | lemur | 2017-08-09T16:29:00Z | 2019-12-11T21:22:00Z |
| pysec-2019-105 | The modoboa-dmarc plugin 1.1.0 for Modoboa is vulnerable to an XML External Entity Inject… | modoboa-dmarc | 2019-12-10T20:15:00Z | 2019-12-19T15:11:00Z |
| pysec-2019-173 | In Apache Incubator Superset before 0.32, a user can view database names that he has no a… | apache-superset | 2019-12-16T22:15:00Z | 2019-12-19T18:24:00Z |
| pysec-2019-29 | OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials … | keystone | 2019-12-09T18:15:00Z | 2019-12-20T00:15:00Z |
| pysec-2019-112 | In Archery before 1.3, inserting an XSS payload into a project name (either by creating a… | pyarchery | 2019-12-26T23:15:00Z | 2020-01-02T14:27:00Z |
| pysec-2019-16 | Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A … | django | 2019-12-18T19:15:00Z | 2020-01-08T04:15:00Z |
| pysec-2019-125 | Valve Steam Client before 2019-09-12 allows placing or appending partially controlled fil… | steam | 2019-10-04T20:15:00Z | 2020-01-16T13:15:00Z |
| pysec-2020-162 | In Apache Airflow before 1.10.5 when running with the "classic" UI, a malicious admin use… | apache-airflow | 2020-01-14T17:15:00Z | 2020-01-21T16:21:00Z |
| pysec-2020-146 | TUF (aka The Update Framework) 0.7.2 through 0.12.1 allows Uncontrolled Resource Consumption. | tuf | 2020-01-14T19:15:00Z | 2020-01-21T19:55:00Z |
| pysec-2020-85 | An open redirect on the login form (and possibly other places) in Plone 4.0 through 5.2.1… | plone | 2020-01-23T21:15:00Z | 2020-01-24T21:32:00Z |
| pysec-2020-90 | A privilege escalation issue in plone.app.contenttypes in Plone 4.3 through 5.2.1 allows … | plone | 2020-01-23T21:15:00Z | 2020-01-24T22:44:00Z |
| pysec-2020-89 | Missing password strength checks on some forms in Plone 4.3 through 5.2.0 allow users to … | plone | 2020-01-23T21:15:00Z | 2020-01-24T22:52:00Z |
| pysec-2020-88 | SQL Injection in DTML or in connection objects in Plone 4.0 through 5.2.1 allows users to… | plone | 2020-01-23T21:15:00Z | 2020-01-24T23:00:00Z |
| pysec-2020-87 | plone.restapi in Plone 5.2.0 through 5.2.1 allows users with a certain privilege level to… | plone | 2020-01-23T21:15:00Z | 2020-01-24T23:03:00Z |
| pysec-2020-86 | An XSS issue in the title field in Plone 5.0 through 5.2.1 allows users with a certain pr… | plone | 2020-01-23T21:15:00Z | 2020-01-24T23:07:00Z |
| pysec-2020-94 | PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped an… | pysaml2 | 2020-01-13T19:15:00Z | 2020-01-27T18:15:00Z |
| pysec-2020-178 | Waitress through version 1.3.1 allows request smuggling by sending the Content-Length hea… | waitress | 2020-01-22T19:15:00Z | 2020-01-30T17:07:00Z |
| pysec-2020-81 | libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, rela… | pillow | 2020-01-03T01:15:00Z | 2020-01-31T04:15:00Z |
| pysec-2020-156 | flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is… | webargs | 2020-01-29T15:15:00Z | 2020-02-03T16:36:00Z |
| pysec-2019-22 | A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4… | freeipa | 2019-11-27T08:15:00Z | 2020-02-05T00:15:00Z |
| pysec-2019-28 | A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4… | ipa | 2019-11-27T09:15:00Z | 2020-02-05T00:15:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2012-6497 | Ruby on Rails contains a flaw in the Authlogic gem. The issue is triggered when the progr… | 2012-12-21T00:00:00.000Z |
| gsd-2012-6496 | Due to the way dynamic finders in Active Record extract options from method parameters, a… | 2012-12-22T00:00:00.000Z |
| gsd-2013-0183 | multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attac… | 2013-01-07T00:00:00.000Z |
| gsd-2013-0155 | Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not … | 2013-01-08T00:00:00.000Z |
| gsd-2013-0156 | active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before … | 2013-01-08T00:00:00.000Z |
| gsd-2013-1802 | extlib Gem for Ruby contains a flaw that is triggered when a type casting error occurs du… | 2013-01-08T00:00:00.000Z |
| gsd-2013-1800 | The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string value… | 2013-01-09T00:00:00.000Z |
| gsd-2013-0285 | The Ruby Gem nori has a parameter parsing error that may allow an attacker to execute arb… | 2013-01-10T00:00:00.000Z |
| gsd-2013-0175 | The multi_xml Gem for Ruby contains a flaw that is triggered when an error occurs during … | 2013-01-11T00:00:00.000Z |
| gsd-2013-0184 | Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x before 1.1.5, 1.2.… | 2013-01-13T00:00:00.000Z |
| gsd-2013-1801 | httparty Gem for Ruby contains a flaw that is triggered when a type casting error occurs … | 2013-01-14T00:00:00.000Z |
| gsd-2013-0233 | Devise contains a flaw that is triggered during when a type conversion error occurs durin… | 2013-01-28T00:00:00.000Z |
| gsd-2013-0333 | lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x b… | 2013-01-28T00:00:00.000Z |
| gsd-2013-0256 | darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, … | 2013-02-06T00:00:00.000Z |
| gsd-2013-0262 | rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attack… | 2013-02-07T00:00:00.000Z |
| gsd-2013-0263 | Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10… | 2013-02-07T00:00:00.000Z |
| gsd-2013-0276 | ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12… | 2013-02-11T00:00:00.000Z |
| gsd-2013-0277 | ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers … | 2013-02-11T00:00:00.000Z |
| gsd-2013-0269 | The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows rem… | 2013-02-12T00:00:00.000Z |
| gsd-2013-1756 | Dragonfly Gem for Ruby contains a flaw that is triggered during the parsing of a speciall… | 2013-02-19T00:00:00.000Z |
| gsd-2013-0162 | The diff_pp function in lib/gauntlet_rubyparser.rb in the ruby_parser gem 3.1.1 and earli… | 2013-02-21T00:00:00.000Z |
| gsd-2013-1607 | PDFKit Gem for Ruby contains a flaw that is due to the program failing to properly valida… | 2013-02-21T00:00:00.000Z |
| gsd-2013-1656 | Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instanti… | 2013-02-21T00:00:00.000Z |
| gsd-2013-2506 | Spree contains a flaw that leads to unauthorized privileges being gained. The issue is tr… | 2013-02-21T00:00:00.000Z |
| gsd-2013-2512 | ftpd Gem for Ruby contains a flaw that is triggered when handling a specially crafted opt… | 2013-02-28T00:00:00.000Z |
| gsd-2013-2516 | fileutils Gem for Ruby contains a flaw in file_utils.rb. The issue is triggered when hand… | 2013-02-28T00:00:00.000Z |
| gsd-2013-2513 | flash_tool Gem for Ruby contains a flaw that is triggered during the handling of download… | 2013-03-04T00:00:00.000Z |
| gsd-2013-2616 | MiniMagick Gem for Ruby contains a flaw that is triggered during the handling of speciall… | 2013-03-12T00:00:00.000Z |
| gsd-2013-2617 | lib/curl.rb in the Curl Gem for Ruby allows remote attackers to execute arbitrary command… | 2013-03-12T00:00:00.000Z |
| gsd-2013-2615 | fastreader Gem for Ruby contains a flaw that is triggered during the handling of speciall… | 2013-03-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-231 | Malicious code in @epc-apps/api-generic-plan (npm) | 2022-05-16T07:13:13Z | 2022-05-16T07:13:14Z |
| mal-2022-238 | Malicious code in @epc-infra/clinstestpackage (npm) | 2022-05-16T07:13:13Z | 2022-05-16T07:13:14Z |
| mal-2022-239 | Malicious code in @epc-infra/dns-stack (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-240 | Malicious code in @epc-infra/dynamo-stack (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-241 | Malicious code in @epc-infra/region-only-policy (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-242 | Malicious code in @epc-infra/stack-config (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-244 | Malicious code in @epc-libraries/cdk-custom-resources (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-233 | Malicious code in @epc-apps/api-management-plan (npm) | 2022-05-16T07:13:34Z | 2022-05-16T07:13:35Z |
| mal-2022-245 | Malicious code in @epc-libraries/data-api-versions (npm) | 2022-05-16T07:14:57Z | 2022-05-16T07:14:57Z |
| mal-2022-237 | Malicious code in @epc-infra/aurora-stack (npm) | 2022-05-16T07:15:02Z | 2022-05-16T07:15:02Z |
| mal-2022-246 | Malicious code in @epc-libraries/driver-outage-db (npm) | 2022-05-16T07:15:02Z | 2022-05-16T07:15:02Z |
| mal-2022-1929 | Malicious code in clinstestpackage (npm) | 2022-05-16T07:17:21Z | 2022-05-16T07:17:28Z |
| mal-2022-247 | Malicious code in @epc-libraries/kinesis-service (npm) | 2022-05-16T07:19:35Z | 2022-05-16T07:19:35Z |
| mal-2022-248 | Malicious code in @epc-libraries/utils (npm) | 2022-05-16T07:19:45Z | 2022-05-16T07:19:45Z |
| mal-2022-236 | Malicious code in @epc-infra/app-lookup-stack (npm) | 2022-05-16T07:19:51Z | 2022-05-16T07:19:51Z |
| mal-2022-1040 | Malicious code in api-extractor-test-01 (npm) | 2022-05-16T07:27:01Z | 2022-05-16T07:27:01Z |
| mal-2022-5577 | Malicious code in rainbow-bridge-testing (npm) | 2022-05-16T07:27:01Z | 2022-05-16T07:27:02Z |
| mal-2022-4264 | Malicious code in lbc-git (npm) | 2022-05-16T07:31:48Z | 2022-05-16T07:31:49Z |
| mal-2022-1823 | Malicious code in cap-common-pages (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| mal-2022-1824 | Malicious code in cap-products (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| mal-2022-1990 | Malicious code in coldstone-helpers (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| mal-2022-1991 | Malicious code in coldstone-sls (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| mal-2022-1645 | Malicious code in bolt-styles (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:41:01Z |
| mal-2022-1142 | Malicious code in assets-common (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:41:02Z |
| mal-2022-4291 | Malicious code in lexical-website-new (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:41:02Z |
| mal-2022-2826 | Malicious code in eslint-plugin-seller-ui-eslint-plugin (npm) | 2022-05-17T05:53:39Z | 2022-05-17T05:53:49Z |
| mal-2022-579 | Malicious code in @seller-ui/products (npm) | 2022-05-17T05:53:38Z | 2022-05-17T05:53:49Z |
| mal-2022-580 | Malicious code in @seller-ui/settings (npm) | 2022-05-17T05:53:39Z | 2022-05-17T05:53:49Z |
| mal-2022-7036 | Malicious code in wakakaa (npm) | 2022-05-17T06:28:02Z | 2022-05-17T06:28:03Z |
| mal-2022-7278 | Malicious code in xiawaa (npm) | 2022-05-17T06:28:02Z | 2022-05-17T06:28:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| WID-SEC-W-2022-2138 | binutils: Schwachstelle ermöglicht Denial of Service | 2021-07-14T22:00:00.000+00:00 | 2022-11-29T23:00:00.000+00:00 |
| WID-SEC-W-2022-2155 | Aruba EdgeConnect: Mehrere Schwachstellen | 2022-11-22T23:00:00.000+00:00 | 2022-11-29T23:00:00.000+00:00 |
| WID-SEC-W-2022-2196 | VMware Tools: Schwachstelle ermöglicht Denial of Service | 2022-11-29T23:00:00.000+00:00 | 2022-11-29T23:00:00.000+00:00 |
| WID-SEC-W-2022-2199 | Keycloak: Schwachstelle ermöglicht Cross-Site Scripting | 2022-11-29T23:00:00.000+00:00 | 2022-11-29T23:00:00.000+00:00 |
| WID-SEC-W-2022-2200 | Trellix Agent: Schwachstelle ermöglicht Privilegieneskalation | 2022-11-29T23:00:00.000+00:00 | 2022-11-29T23:00:00.000+00:00 |
| wid-sec-w-2022-0920 | GnuTLS: Schwachstelle ermöglicht Denial of Service | 2022-03-02T23:00:00.000+00:00 | 2022-11-29T23:00:00.000+00:00 |
| wid-sec-w-2022-1109 | binutils: Schwachstelle ermöglicht Denial of Service | 2021-05-03T22:00:00.000+00:00 | 2022-11-29T23:00:00.000+00:00 |
| wid-sec-w-2022-1946 | gcc: Schwachstelle ermöglicht Denial of Service | 2022-03-27T22:00:00.000+00:00 | 2022-11-29T23:00:00.000+00:00 |
| wid-sec-w-2022-2046 | gcc: Schwachstelle ermöglicht Denial of Service | 2022-01-26T23:00:00.000+00:00 | 2022-11-29T23:00:00.000+00:00 |
| wid-sec-w-2022-2138 | binutils: Schwachstelle ermöglicht Denial of Service | 2021-07-14T22:00:00.000+00:00 | 2022-11-29T23:00:00.000+00:00 |
| wid-sec-w-2022-2155 | Aruba EdgeConnect: Mehrere Schwachstellen | 2022-11-22T23:00:00.000+00:00 | 2022-11-29T23:00:00.000+00:00 |
| wid-sec-w-2022-2196 | VMware Tools: Schwachstelle ermöglicht Denial of Service | 2022-11-29T23:00:00.000+00:00 | 2022-11-29T23:00:00.000+00:00 |
| wid-sec-w-2022-2199 | Keycloak: Schwachstelle ermöglicht Cross-Site Scripting | 2022-11-29T23:00:00.000+00:00 | 2022-11-29T23:00:00.000+00:00 |
| wid-sec-w-2022-2200 | Trellix Agent: Schwachstelle ermöglicht Privilegieneskalation | 2022-11-29T23:00:00.000+00:00 | 2022-11-29T23:00:00.000+00:00 |
| WID-SEC-W-2022-0551 | Kyocera Drucker: Mehrere Schwachstellen | 2022-07-03T22:00:00.000+00:00 | 2022-11-30T23:00:00.000+00:00 |
| WID-SEC-W-2022-0735 | Oracle MySQL: Mehrere Schwachstellen | 2022-07-19T22:00:00.000+00:00 | 2022-11-30T23:00:00.000+00:00 |
| WID-SEC-W-2022-2204 | Grafana: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-11-30T23:00:00.000+00:00 | 2022-11-30T23:00:00.000+00:00 |
| WID-SEC-W-2022-2206 | Drupal: Mehrere Schwachstellen ermöglichen das Umgehen von Sicherheitsvorkehrungen | 2022-11-30T23:00:00.000+00:00 | 2022-11-30T23:00:00.000+00:00 |
| WID-SEC-W-2022-2209 | Microsoft GitHub Enterprise: Mehrere Schwachstellen | 2022-11-30T23:00:00.000+00:00 | 2022-11-30T23:00:00.000+00:00 |
| wid-sec-w-2022-0551 | Kyocera Drucker: Mehrere Schwachstellen | 2022-07-03T22:00:00.000+00:00 | 2022-11-30T23:00:00.000+00:00 |
| wid-sec-w-2022-0735 | Oracle MySQL: Mehrere Schwachstellen | 2022-07-19T22:00:00.000+00:00 | 2022-11-30T23:00:00.000+00:00 |
| wid-sec-w-2022-2204 | Grafana: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-11-30T23:00:00.000+00:00 | 2022-11-30T23:00:00.000+00:00 |
| wid-sec-w-2022-2206 | Drupal: Mehrere Schwachstellen ermöglichen das Umgehen von Sicherheitsvorkehrungen | 2022-11-30T23:00:00.000+00:00 | 2022-11-30T23:00:00.000+00:00 |
| wid-sec-w-2022-2209 | Microsoft GitHub Enterprise: Mehrere Schwachstellen | 2022-11-30T23:00:00.000+00:00 | 2022-11-30T23:00:00.000+00:00 |
| WID-SEC-W-2022-2212 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-12-01T23:00:00.000+00:00 | 2022-12-01T23:00:00.000+00:00 |
| WID-SEC-W-2022-2213 | MISP: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2022-12-01T23:00:00.000+00:00 | 2022-12-01T23:00:00.000+00:00 |
| WID-SEC-W-2022-2215 | D-LINK Router: Schwachstelle ermöglicht Denial of Service | 2022-12-01T23:00:00.000+00:00 | 2022-12-01T23:00:00.000+00:00 |
| WID-SEC-W-2022-2216 | Camunda: Schwachstelle ermöglicht Redirect-Angriff | 2022-12-01T23:00:00.000+00:00 | 2022-12-01T23:00:00.000+00:00 |
| wid-sec-w-2022-2212 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-12-01T23:00:00.000+00:00 | 2022-12-01T23:00:00.000+00:00 |
| wid-sec-w-2022-2213 | MISP: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2022-12-01T23:00:00.000+00:00 | 2022-12-01T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| SSA-543502 | SSA-543502: Local Privilege Escalation Vulnerability in Unicam FX | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-580228 | SSA-580228: Use of Hard-Coded Credentials Vulnerability in Location Intelligence before V4.3 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-602936 | SSA-602936: Multiple Vulnerabilities in SCALANCE SC-600 Family before V3.1 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-647068 | SSA-647068: Ripple20 in SIMATIC RTLS Gateways | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-797296 | SSA-797296: XT File Parsing Vulnerability in Parasolid | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-806742 | SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-017796 | SSA-017796: Multiple File Parsing Vulnerabilities in Tecnomatix Plant Simulation | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-108696 | SSA-108696: Multiple Vulnerabilities in SIDIS Prime before V4.0.400 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-248289 | SSA-248289: Denial of Service Vulnerabilities in the IPv6 Stack of Nucleus RTOS | 2021-04-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-309571 | SSA-309571: IPU 2021.1 Vulnerabilities in Siemens Industrial Products using Intel CPUs (June 2021) | 2021-08-10T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-434032 | SSA-434032: Input Validation Vulnerability in the DHCP Client of Nucleus RTOS | 2019-11-12T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-516818 | SSA-516818: TCP Sequence Number Validation Vulnerability in the TCP/IP Stack of CP343-1 Devices | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-543502 | SSA-543502: Local Privilege Escalation Vulnerability in Unicam FX | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-580228 | SSA-580228: Use of Hard-Coded Credentials Vulnerability in Location Intelligence before V4.3 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-602936 | SSA-602936: Multiple Vulnerabilities in SCALANCE SC-600 Family before V3.1 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-647068 | SSA-647068: Ripple20 in SIMATIC RTLS Gateways | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-797296 | SSA-797296: XT File Parsing Vulnerability in Parasolid | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| ssa-806742 | SSA-806742: Multiple Vulnerabilities in SCALANCE XCM-/XRM-300 before V2.4 | 2024-02-13T00:00:00Z | 2024-02-13T00:00:00Z |
| SSA-000072 | SSA-000072: Multiple File Parsing Vulnerabilities in Simcenter Femap | 2024-02-13T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-145196 | SSA-145196: Authorization Bypass Vulnerability in Siveillance Control | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-576771 | SSA-576771: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-653855 | SSA-653855: Information Disclosure vulnerability in SINEMA Remote Connect Client before V3.1 SP1 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-693975 | SSA-693975: Denial-of-Service Vulnerability in the Web Server of Industrial Products | 2023-12-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-699386 | SSA-699386: Multiple Vulnerabilities in SCALANCE XB-200 / XC-200 / XP-200 / XF-200BA / XR-300WG Family before V4.5 | 2023-11-14T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-770721 | SSA-770721: Multiple Vulnerabilities in SIMATIC RF160B before V2.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-918992 | SSA-918992: Unused HTTP Service on SENTRON 3KC ATC6 Ethernet Module | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| SSA-943925 | SSA-943925: Multiple Vulnerabilities in SINEC NMS before V2.0 SP1 | 2024-02-13T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-000072 | SSA-000072: Multiple File Parsing Vulnerabilities in Simcenter Femap | 2024-02-13T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-145196 | SSA-145196: Authorization Bypass Vulnerability in Siveillance Control | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ssa-576771 | SSA-576771: Multiple Vulnerabilities in SINEMA Remote Connect Server before V3.2 | 2024-03-12T00:00:00Z | 2024-03-12T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| RHSA-2011:0219 | Red Hat Security Advisory: Red Hat Enterprise Linux 4 - 1-Year End Of Life Notice | 2011-02-28T18:42:00+00:00 | 2025-09-25T11:42:24+00:00 |
| rhsa-2011_0219 | Red Hat Security Advisory: Red Hat Enterprise Linux 4 - 1-Year End Of Life Notice | 2011-02-28T18:42:00+00:00 | 2024-11-05T17:26:32+00:00 |
| RHSA-2011:0259 | Red Hat Security Advisory: flash-plugin - 1-Month End Of Life Notice | 2011-02-15T19:28:00+00:00 | 2025-09-25T11:42:25+00:00 |
| rhsa-2011_0259 | Red Hat Security Advisory: flash-plugin - 1-Month End Of Life Notice | 2011-02-15T19:28:00+00:00 | 2024-11-05T17:26:51+00:00 |
| RHSA-2011:0279 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 4.7 6-Month EOL Notice | 2011-02-16T21:31:00+00:00 | 2025-09-25T11:42:28+00:00 |
| rhsa-2011_0279 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 4.7 6-Month EOL Notice | 2011-02-16T21:31:00+00:00 | 2024-11-05T17:27:14+00:00 |
| RHSA-2011:0373 | Red Hat Security Advisory: firefox security update | 2011-03-22T21:07:00+00:00 | 2025-09-25T11:42:40+00:00 |
| rhsa-2011_0373 | Red Hat Security Advisory: firefox security update | 2011-03-22T21:07:00+00:00 | 2024-11-05T17:28:43+00:00 |
| RHSA-2011:0374 | Red Hat Security Advisory: thunderbird security and bug fix update | 2011-03-22T21:07:00+00:00 | 2025-09-25T11:42:40+00:00 |
| rhsa-2011_0374 | Red Hat Security Advisory: thunderbird security and bug fix update | 2011-03-22T21:07:00+00:00 | 2024-11-05T17:28:48+00:00 |
| RHSA-2011:0375 | Red Hat Security Advisory: seamonkey security update | 2011-03-22T20:47:00+00:00 | 2025-09-25T11:42:40+00:00 |
| rhsa-2011_0375 | Red Hat Security Advisory: seamonkey security update | 2011-03-22T20:47:00+00:00 | 2024-11-05T17:28:53+00:00 |
| RHSA-2011:0472 | Red Hat Security Advisory: nss security update | 2011-04-29T02:57:00+00:00 | 2025-09-25T11:42:49+00:00 |
| rhsa-2011_0472 | Red Hat Security Advisory: nss security update | 2011-04-29T02:57:00+00:00 | 2024-11-05T17:30:18+00:00 |
| RHSA-2011:1111 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 5.4 - End Of Life | 2011-08-01T15:47:00+00:00 | 2025-09-25T11:43:30+00:00 |
| rhsa-2011_1111 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 5.4 - End Of Life | 2011-08-01T15:47:00+00:00 | 2024-11-05T17:34:20+00:00 |
| RHSA-2011:1239 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 4.7 - End Of Life | 2011-08-31T19:21:00+00:00 | 2025-09-25T11:43:37+00:00 |
| rhsa-2011_1239 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 4.7 - End Of Life | 2011-08-31T19:21:00+00:00 | 2024-11-05T17:34:42+00:00 |
| RHSA-2011:1240 | Red Hat Security Advisory: Red Hat Enterprise Linux 4 - 6-Month End Of Life Notice | 2011-08-31T19:23:00+00:00 | 2025-09-25T11:43:37+00:00 |
| rhsa-2011_1240 | Red Hat Security Advisory: Red Hat Enterprise Linux 4 - 6-Month End Of Life Notice | 2011-08-31T19:23:00+00:00 | 2024-11-05T17:34:47+00:00 |
| RHSA-2011:1242 | Red Hat Security Advisory: firefox security update | 2011-08-31T20:04:00+00:00 | 2025-09-25T11:43:38+00:00 |
| rhsa-2011_1242 | Red Hat Security Advisory: firefox security update | 2011-08-31T20:04:00+00:00 | 2024-11-05T17:34:56+00:00 |
| RHSA-2011:1243 | Red Hat Security Advisory: thunderbird security update | 2011-08-31T19:58:00+00:00 | 2025-09-25T11:43:38+00:00 |
| rhsa-2011_1243 | Red Hat Security Advisory: thunderbird security update | 2011-08-31T19:58:00+00:00 | 2024-11-05T17:35:06+00:00 |
| RHSA-2011:1244 | Red Hat Security Advisory: seamonkey security update | 2011-08-31T20:14:00+00:00 | 2025-09-25T11:43:39+00:00 |
| rhsa-2011_1244 | Red Hat Security Advisory: seamonkey security update | 2011-08-31T20:14:00+00:00 | 2024-11-05T17:35:09+00:00 |
| RHSA-2011:1266 | Red Hat Security Advisory: seamonkey security update | 2011-09-06T21:19:00+00:00 | 2025-09-25T11:43:41+00:00 |
| rhsa-2011_1266 | Red Hat Security Advisory: seamonkey security update | 2011-09-06T21:19:00+00:00 | 2024-11-05T17:35:24+00:00 |
| RHSA-2011:1248 | Red Hat Security Advisory: ca-certificates security update | 2011-09-02T11:47:00+00:00 | 2025-09-25T11:43:39+00:00 |
| rhsa-2011_1248 | Red Hat Security Advisory: ca-certificates security update | 2011-09-02T11:47:00+00:00 | 2024-11-05T17:35:25+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2019-20838 | libpcre in PCRE before 8.43 allows a subject buffer over-read in JIT when UTF is disabled and \X or \R has more than one fixed quantifier a related issue to CVE-2019-20454. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-20892 | net-snmp before 5.8.1.pre1 has a double free in usm_free_usmStateReference in snmplib/snmpusm.c via an SNMPv3 GetBulk request. NOTE: this affects net-snmp packages shipped to end users by multiple Linux distributions but might not affect an upstream release. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-3842 | In systemd before v242-rc4 it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker in some particular configurations to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any". | 2019-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-3843 | It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future when the UID/GID will be recycled. | 2019-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-3844 | It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future when the GID will be recycled. | 2019-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-6454 | An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1 causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic). | 2019-03-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-6461 | An issue was discovered in cairo 1.16.0. There is an assertion problem in the function _cairo_arc_in_direction in the file cairo-arc.c. | 2019-01-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-6462 | An issue was discovered in cairo 1.16.0. There is an infinite loop in the function _arc_error_normalized in the file cairo-arc.c related to _arc_max_angle_for_tolerance_normalized. | 2019-01-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-7309 | In the GNU C Library (aka glibc or libc6) through 2.29 the memcmp function for the x32 architecture can incorrectly return zero (indicating that the inputs are equal) because the RDX most significant bit is mishandled. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9071 | An issue was discovered in GNU libiberty as distributed in GNU Binutils 2.32. It is a stack consumption issue in d_count_templates_scopes in cp-demangle.c after many recursive calls. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9072 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in setup_group in elf.c. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9073 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in _bfd_elf_slurp_version_tables in elf.c. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9074 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c when called from pex64_get_runtime_function in pei-x86_64.c. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9075 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.32. It is a heap-based buffer overflow in _bfd_archive_64_bit_slurp_armap in archive64.c. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9076 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd) as distributed in GNU Binutils 2.32. It is an attempted excessive memory allocation in elf_read_notes in elf.c. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9077 | An issue was discovered in GNU Binutils 2.32. It is a heap-based buffer overflow in process_mips_specific in readelf.c via a malformed MIPS option section. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2019-9169 | In the GNU C Library (aka glibc or libc6) through 2.29 proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match. | 2019-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-10029 | The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c. | 2020-03-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-10702 | A flaw was found in QEMU in the implementation of the Pointer Authentication (PAuth) support for ARM introduced in version 4.0 and fixed in version 5.0.0. A general failure of the signature generation process caused every PAuth-enforced pointer to be signed with the same signature. A local attacker could obtain the signature of a protected pointer and abuse this flaw to bypass PAuth protection for all programs running on QEMU. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-10744 | An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible: insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18 2.8.12 and 2.9.9 as well as previous versions are affected and Ansible Tower 3.4.5 3.5.6 and 3.6.4 as well as previous versions are affected. | 2020-05-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-10761 | An assertion failure issue was found in the Network Block Device(NBD) Server in all QEMU versions before QEMU 5.0.1. This flaw occurs when an nbd-client sends a spec-compliant request that is near the boundary of maximum permitted request length. A remote nbd-client could use this flaw to crash the qemu-nbd server resulting in a denial of service. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11080 | Denial of service in nghttp2 | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11102 | hw/net/tulip.c in QEMU 4.2.0 has a buffer overflow during the copying of tx/rx buffers because the frame size is not validated against the r/w data length. | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11494 | An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data potentially containing sensitive information from kernel stack memory if the configuration lacks CONFIG_INIT_STACK_ALL aka CID-b9258a2cece4. | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11565 | An issue was discovered in the Linux kernel through 5.6.2. mpol_parse_str in mm/mempolicy.c has a stack-based out-of-bounds write because an empty nodelist is mishandled during mount option parsing aka CID-aa9f7d5172fa. NOTE: Someone in the security community disagrees that this is a vulnerability because the issue “is a bug in parsing mount options which can only be specified by a privileged user so triggering the bug does not grant any powers not already held.” | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11725 | snd_ctl_elem_add in sound/core/control.c in the Linux kernel through 5.6.3 has a count=info->owner line which later affects a private_size*count multiplication for unspecified "interesting side effects." NOTE: kernel engineers dispute this finding because it could be relevant only if new callers were added that were unfamiliar with the misuse of the info->owner field to represent data unrelated to the "owner" concept. The existing callers SNDRV_CTL_IOCTL_ELEM_ADD and SNDRV_CTL_IOCTL_ELEM_REPLACE have been designed to misuse the info->owner field in a safe way | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11869 | An integer overflow was found in QEMU 4.0.1 through 4.2.0 in the way it implemented ATI VGA emulation. This flaw occurs in the ati_2d_blt() routine in hw/display/ati-2d.c while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process resulting in a denial of service. | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11984 | Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE | 2020-08-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-11993 | Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns logging statements were made on the wrong connection causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers. | 2020-08-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-12655 | An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata aka CID-d0c7feaf8767. | 2020-05-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| ICSA-17-054-01 | VIPA Controls WinPLC7 | 2017-02-23T00:00:00.000000Z | 2017-02-23T00:00:00.000000Z |
| ICSA-17-054-02 | Red Lion Controls Sixnet-Managed Industrial Switches, AutomationDirect STRIDE-Managed Ethernet Switches Vulnerability | 2017-02-23T00:00:00.000000Z | 2017-02-23T00:00:00.000000Z |
| icsa-17-054-01 | VIPA Controls WinPLC7 | 2017-02-23T00:00:00.000000Z | 2017-02-23T00:00:00.000000Z |
| icsa-17-054-02 | Red Lion Controls Sixnet-Managed Industrial Switches, AutomationDirect STRIDE-Managed Ethernet Switches Vulnerability | 2017-02-23T00:00:00.000000Z | 2017-02-23T00:00:00.000000Z |
| ICSA-17-059-01 | Siemens RUGGEDCOM NMS | 2017-02-28T00:00:00.000000Z | 2017-02-28T00:00:00.000000Z |
| icsa-17-059-01 | Siemens RUGGEDCOM NMS | 2017-02-28T00:00:00.000000Z | 2017-02-28T00:00:00.000000Z |
| ICSA-17-061-01 | ICSA-17-061-01_Eaton xComfort Ethernet Communication Interface | 2017-03-02T00:00:00.000000Z | 2017-03-02T00:00:00.000000Z |
| ICSA-17-061-02 | Schneider Electric Conext ComBox | 2017-03-02T00:00:00.000000Z | 2017-03-02T00:00:00.000000Z |
| ICSA-17-061-03 | Siemens SINUMERIK Integrate and SINUMERIK Operate | 2017-03-02T00:00:00.000000Z | 2017-03-02T00:00:00.000000Z |
| icsa-17-061-01 | ICSA-17-061-01_Eaton xComfort Ethernet Communication Interface | 2017-03-02T00:00:00.000000Z | 2017-03-02T00:00:00.000000Z |
| icsa-17-061-02 | Schneider Electric Conext ComBox | 2017-03-02T00:00:00.000000Z | 2017-03-02T00:00:00.000000Z |
| icsa-17-061-03 | Siemens SINUMERIK Integrate and SINUMERIK Operate | 2017-03-02T00:00:00.000000Z | 2017-03-02T00:00:00.000000Z |
| ICSA-17-066-01 | ICSA-17-066-01_Schneider Electric Wonderware Intelligence | 2017-03-07T00:00:00.000000Z | 2017-03-07T00:00:00.000000Z |
| icsa-17-066-01 | ICSA-17-066-01_Schneider Electric Wonderware Intelligence | 2017-03-07T00:00:00.000000Z | 2017-03-07T00:00:00.000000Z |
| ICSA-17-068-01 | Schneider Electric ClearSCADA | 2017-03-09T00:00:00.000000Z | 2017-03-09T00:00:00.000000Z |
| icsa-17-068-01 | Schneider Electric ClearSCADA | 2017-03-09T00:00:00.000000Z | 2017-03-09T00:00:00.000000Z |
| ICSA-17-073-01 | FATEK Automation PLC Ethernet Module | 2017-03-14T00:00:00.000000Z | 2017-03-14T00:00:00.000000Z |
| icsa-17-073-01 | FATEK Automation PLC Ethernet Module | 2017-03-14T00:00:00.000000Z | 2017-03-14T00:00:00.000000Z |
| ICSA-17-075-01 | LCDS - Leão Consultoria e Desenvolvimento de Sistemas Ltda ME LAquis SCADA | 2017-03-16T00:00:00.000000Z | 2017-03-16T00:00:00.000000Z |
| icsa-17-075-01 | LCDS - Leão Consultoria e Desenvolvimento de Sistemas Ltda ME LAquis SCADA | 2017-03-16T00:00:00.000000Z | 2017-03-16T00:00:00.000000Z |
| ICSA-17-047-01 | Rockwell Automation Connected Components Workbench | 2017-02-16T00:00:00.000000Z | 2017-03-21T00:00:00.000000Z |
| ICSA-17-047-02 | Rockwell Automation FactoryTalk Activation | 2017-02-16T00:00:00.000000Z | 2017-03-21T00:00:00.000000Z |
| icsa-17-047-01 | Rockwell Automation Connected Components Workbench | 2017-02-16T00:00:00.000000Z | 2017-03-21T00:00:00.000000Z |
| icsa-17-047-02 | Rockwell Automation FactoryTalk Activation | 2017-02-16T00:00:00.000000Z | 2017-03-21T00:00:00.000000Z |
| ICSA-17-082-01 | LCDS - Leão Consultoria e Desenvolvimento de Sistemas Ltda ME LAquis SCADA | 2017-03-23T00:00:00.000000Z | 2017-03-23T00:00:00.000000Z |
| ICSMA-17-082-01 | ICSMA-17-082-01_BD Kiestra PerformA and KLA Journal Service Applications Hard-Coded Passwords Vulnerability | 2017-03-23T00:00:00.000000Z | 2017-03-23T00:00:00.000000Z |
| icsa-17-082-01 | LCDS - Leão Consultoria e Desenvolvimento de Sistemas Ltda ME LAquis SCADA | 2017-03-23T00:00:00.000000Z | 2017-03-23T00:00:00.000000Z |
| icsma-17-082-01 | ICSMA-17-082-01_BD Kiestra PerformA and KLA Journal Service Applications Hard-Coded Passwords Vulnerability | 2017-03-23T00:00:00.000000Z | 2017-03-23T00:00:00.000000Z |
| ICSA-17-087-01 | Siemens RUGGEDCOM ROX I | 2017-03-28T00:00:00.000000Z | 2017-03-28T00:00:00.000000Z |
| ICSA-17-087-02 | 3S-Smart Software Solutions GmbH CODESYS Web Server | 2017-03-28T00:00:00.000000Z | 2017-03-28T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20171129-nxos1 | Cisco NX-OS System Software Patch Installation Arbitrary File Write Vulnerability | 2017-11-29T16:00:00+00:00 | 2017-11-29T16:00:00+00:00 |
| cisco-sa-20171129-nxos2 | Cisco NX-OS System Software Image Signature Bypass Vulnerability | 2017-11-29T16:00:00+00:00 | 2017-11-29T16:00:00+00:00 |
| cisco-sa-20180103-warfp | Cisco WebEx Advanced Recording Format Player Remote Code Execution Vulnerability | 2018-01-03T16:00:00+00:00 | 2018-01-03T16:00:00+00:00 |
| cisco-sa-20180103-wnrp | Cisco WebEx Network Recording Player Buffer Overflow Vulnerability | 2018-01-03T16:00:00+00:00 | 2018-01-03T16:00:00+00:00 |
| cisco-sa-20180110-ucm | Cisco Unified Communications Manager Cross-Site Scripting Vulnerability | 2018-01-10T16:00:00+00:00 | 2018-01-10T16:00:00+00:00 |
| cisco-sa-20171129-fxnx | Cisco FXOS and NX-OS System Software CLI Command Injection Vulnerability | 2017-11-29T16:00:00+00:00 | 2018-01-11T18:32:00+00:00 |
| cisco-sa-20171129-nss | Cisco Nexus Series Switches CLI Command Injection Vulnerability | 2017-11-29T16:00:00+00:00 | 2018-01-11T18:32:00+00:00 |
| cisco-sa-20180117-300-500-smb1 | Cisco Small Business 300 and 500 Series Managed Switches Cross-Site Scripting Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-300-500-smb2 | Cisco Small Business 300 and 500 Series Managed Switches HTTP Response Splitting Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-acpe | Cisco AnyConnect Profile Editor XML External Entity Injection Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-cpi | Cisco Prime Infrastructure Privilege Escalation Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-cps | Cisco Policy Suite Unauthenticated Information Disclosure Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-esc | Cisco Elastic Services Controller Information Disclosure Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-iess | Cisco IOS Software for Industrial Ethernet 4010 Series Switches Test Command Arbitrary Code Execution and Denial of Service Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-ise | Cisco Identity Services Engine DOM Cross-Site Scripting Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-ntr | Cisco D9800 Network Transport Receiver OS Command Injection Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-nx-os | Cisco NX-OS Software Pong Packet Denial of Service Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-nxos1 | Cisco NX-OS System Software Unauthorized User Account Deletion Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-prime-infrastructure | Cisco Prime Infrastructure Open Redirect Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-psc | Cisco Prime Service Catalog Cross-Site Request Forgery Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-staros | Cisco StarOS CLI Command Injection Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-ucs | Cisco UCS Central Software IPv6 Denial of Service Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wap | Cisco WAP150 Wireless Cross-Site Scripting Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wms | Cisco WebEx Meetings Server Information Disclosure Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wms1 | Cisco WebEx Meetings Server Information Disclosure Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wms2 | Cisco WebEx Meetings Server Remote Account Disabling Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wms3 | Cisco WebEx Meetings Server Information Disclosure Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-wsa1 | Cisco Web Security Appliance Reflected Cross-Site Scripting Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-17T16:00:00+00:00 |
| cisco-sa-20180117-nxos | Cisco NX-OS System Software Management Interface Denial of Service Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-19T21:29:00+00:00 |
| cisco-sa-20180117-esasma | Cisco Email Security and Content Security Management Appliance Privilege Escalation Vulnerability | 2018-01-17T16:00:00+00:00 | 2018-01-23T16:28:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| SCA-2022-0005 | Vulnerability in SICK Overall Equipment Effectiveness (OEE) | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| SCA-2022-0006 | Vulnerability in SICK MSC800 | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| sca-2022-0005 | Vulnerability in SICK Overall Equipment Effectiveness (OEE) | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| sca-2022-0006 | Vulnerability in SICK MSC800 | 2022-04-11T15:00:00.000Z | 2022-04-11T15:00:00.000Z |
| SCA-2022-0007 | Vulnerabilities in SICK MARSIC300 | 2022-04-21T15:00:00.000Z | 2022-04-21T15:00:00.000Z |
| sca-2022-0007 | Vulnerabilities in SICK MARSIC300 | 2022-04-21T15:00:00.000Z | 2022-04-21T15:00:00.000Z |
| SCA-2022-0008 | Vulnerability in SICK Gateways for Flexi Soft, Flexi Compact, SICK EFI Gateway UE4740, SICK microScan3 and outdoorScan3 | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| SCA-2022-0009 | Vulnerability in SICK Flexi Soft PROFINET IO Gateway FX0-GPNT and SICK microScan3 PROFINET | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| sca-2022-0008 | Vulnerability in SICK Gateways for Flexi Soft, Flexi Compact, SICK EFI Gateway UE4740, SICK microScan3 and outdoorScan3 | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| sca-2022-0009 | Vulnerability in SICK Flexi Soft PROFINET IO Gateway FX0-GPNT and SICK microScan3 PROFINET | 2022-04-29T15:00:00.000Z | 2022-04-29T15:00:00.000Z |
| SCA-2022-0011 | Vulnerabilities in SICK Package Analytics | 2022-06-08T15:00:00.000Z | 2022-06-08T15:00:00.000Z |
| sca-2022-0011 | Vulnerabilities in SICK Package Analytics | 2022-06-08T15:00:00.000Z | 2022-06-08T15:00:00.000Z |
| SCA-2022-0010 | Vulnerability in SICK Flexi Soft Designer & Safety Designer | 2022-05-16T10:00:00.000Z | 2022-07-19T10:00:00.000Z |
| sca-2022-0010 | Vulnerability in SICK Flexi Soft Designer & Safety Designer | 2022-05-16T10:00:00.000Z | 2022-07-19T10:00:00.000Z |
| SCA-2022-0012 | OpenSSL vulnerability affects multiple SICK SIMs | 2022-08-08T13:00:00.000Z | 2022-08-03T13:00:00.000Z |
| sca-2022-0012 | OpenSSL vulnerability affects multiple SICK SIMs | 2022-08-08T13:00:00.000Z | 2022-08-03T13:00:00.000Z |
| SCA-2022-0014 | SICK FlexiCompact affected by Denial of Service vulnerability | 2022-10-31T11:00:00.000Z | 2022-10-31T11:00:00.000Z |
| sca-2022-0014 | SICK FlexiCompact affected by Denial of Service vulnerability | 2022-10-31T11:00:00.000Z | 2022-10-31T11:00:00.000Z |
| SCA-2022-0013 | Password recovery vulnerability affects multiple SICK SIMs | 2022-10-21T13:00:00.000Z | 2022-11-04T14:00:00.000Z |
| sca-2022-0013 | Password recovery vulnerability affects multiple SICK SIMs | 2022-10-21T13:00:00.000Z | 2022-11-04T14:00:00.000Z |
| SCA-2022-0015 | Use of a Broken or Risky Cryptographic Algorithm in SICK RFU6xx RADIO FREQUEN. SENSOR | 2022-12-08T16:00:00.000Z | 2022-12-08T16:00:00.000Z |
| sca-2022-0015 | Use of a Broken or Risky Cryptographic Algorithm in SICK RFU6xx RADIO FREQUEN. SENSOR | 2022-12-08T16:00:00.000Z | 2022-12-08T16:00:00.000Z |
| SCA-2023-0001 | Bootloader mode vulnerability in Flexi Soft Gateways v3 | 2023-02-20T14:00:00.000Z | 2023-02-20T14:00:00.000Z |
| sca-2023-0001 | Bootloader mode vulnerability in Flexi Soft Gateways v3 | 2023-02-20T14:00:00.000Z | 2023-02-20T14:00:00.000Z |
| SCA-2023-0002 | Use of Telnet in multiple SICK Flexi Soft and Flexi Classic Gateways | 2023-04-11T10:00:00.000Z | 2023-04-11T10:00:00.000Z |
| sca-2023-0002 | Use of Telnet in multiple SICK Flexi Soft and Flexi Classic Gateways | 2023-04-11T10:00:00.000Z | 2023-04-11T10:00:00.000Z |
| SCA-2023-0003 | Vulnerability in SICK Flexi Soft and Flexi Classic Gateways | 2023-05-03T13:00:00.000Z | 2023-05-03T13:00:00.000Z |
| sca-2023-0003 | Vulnerability in SICK Flexi Soft and Flexi Classic Gateways | 2023-05-03T13:00:00.000Z | 2023-05-03T13:00:00.000Z |
| SCA-2023-0004 | Vulnerabilities in SICK FTMg | 2023-05-11T13:00:00.000Z | 2023-05-11T13:00:00.000Z |
| sca-2023-0004 | Vulnerabilities in SICK FTMg | 2023-05-11T13:00:00.000Z | 2023-05-11T13:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2023_14-01 | Unsafe temporary data privileges on Unix systems in Arc before v1.6.0 | 2024-05-15T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2023_16-01 | Path traversal via 'zip slip' in Arc before v1.6.0 | 2024-05-15T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| nn-2023_5-01 | Information disclosure via the debug function in assertions in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-05-20T11:00:00.000Z |
| NN-2022:2-01 | Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| NN-2022:2-02 | Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| NN-2023:10-01 | DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| NN-2023:11-01 | SQL Injection on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| NN-2023:12-01 | Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0 | 2024-01-15T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| NN-2023:15-01 | Sensitive data exfiltration via unsafe permissions on Windows systems in Arc before v1.6.0 | 2024-05-15T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| NN-2023:17-01 | Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| NN-2023:2-01 | Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| NN-2023:3-01 | Authenticated Blind SQL Injection on alerts count in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| NN-2023:4-01 | Stored Cross-Site Scripting (XSS) in Threat Intelligence rules in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| NN-2023:6-01 | Partial DoS on Reports section due to null report name in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| NN-2023:7-01 | DoS via SAML configuration in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| NN-2023:8-01 | Session Fixation in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| NN-2023:9-01 | Authenticated SQL Injection on Query functionality in Guardian/CMC before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| NN-2024:1-01 | DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| NN-2024:2-01 | Incorrect authorization for Reports configuration in Guardian/CMC before 24.2.0 | 2024-09-11T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2022:2-01 | Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2022:2-02 | Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2022_2-01 | Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2022_2-02 | Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 | 2022-02-14T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:10-01 | DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:11-01 | SQL Injection on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 | 2023-09-18T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:12-01 | Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0 | 2024-01-15T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:15-01 | Sensitive data exfiltration via unsafe permissions on Windows systems in Arc before v1.6.0 | 2024-05-15T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:17-01 | Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1 | 2024-04-10T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:2-01 | Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| nn-2023:3-01 | Authenticated Blind SQL Injection on alerts count in Guardian/CMC before 22.6.2 | 2023-08-09T11:00:00.000Z | 2024-09-19T11:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| OXDC-ADV-2024-0002 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0002 | 2024-09-10T00:00:00+02:00 | 2024-09-10T00:00:00+00:00 |
| OXDC-ADV-2024-0003 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0003 | 2024-09-10T00:00:00+02:00 | 2024-09-10T00:00:00+00:00 |
| oxdc-adv-2024-0002 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0002 | 2024-09-10T00:00:00+02:00 | 2024-09-10T00:00:00+00:00 |
| oxdc-adv-2024-0003 | OX Dovecot Pro Security Advisory OXDC-ADV-2024-0003 | 2024-09-10T00:00:00+02:00 | 2024-09-10T00:00:00+00:00 |
| oxas-adv-2025-0001 | OX App Suite Security Advisory OXAS-ADV-2025-0001 | 2025-01-27T00:00:00+01:00 | 2025-04-07T00:00:00+00:00 |
| oxas-adv-2025-0002 | OX App Suite Security Advisory OXAS-ADV-2025-0002 | 2025-08-12T00:00:00+02:00 | 2025-10-31T00:00:00+00:00 |
| oxdc-adv-2025-0001 | OX Dovecot Pro Security Advisory OXDC-ADV-2025-0001 | 2025-10-31T00:00:00+02:00 | 2025-10-31T00:00:00+00:00 |
| ID | Description | Updated |
|---|---|---|
| var-201005-0064 | Cisco Mediator Framework 1.5.1 before 1.5.1.build.14-eng, 2.2 before 2.2.1.dev.1, and 3.0… | 2021-12-18T17:28:24.032000Z |
| var-200412-0263 | The DSS verification code in Dropbear SSH Server before 0.43 frees uninitialized variable… | 2021-12-18T17:51:52.131000Z |
| var-201001-0029 | Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to … | 2021-12-18T17:56:06.278000Z |
| var-201001-0163 | The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.32.4, wh… | 2021-12-18T21:59:59.281000Z |
| var-201805-0613 | procps-ng before version 3.3.15 is vulnerable to multiple integer overflows leading to a … | 2021-12-18T22:07:19.455000Z |
| var-201004-0267 | The virtual networking stack in VMware Workstation 7.0 before 7.0.1 build 227600, VMware … | 2021-12-18T23:56:55.293000Z |
| var-201804-1619 | Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Install). Support… | 2021-12-19T00:57:05.378000Z |
| var-202104-2088 | 2022-01-01T21:43:54.006000Z | |
| var-201012-0429 | 2022-01-17T14:43:53.884000Z | |
| var-201008-0396 | 2022-01-17T15:13:57.932000Z | |
| var-201005-0441 | 2022-01-17T15:35:01.886000Z | |
| var-201005-0440 | 2022-01-17T15:35:03.822000Z | |
| var-202101-1992 | 2022-03-28T13:10:14.160000Z | |
| var-202012-1590 | 2022-03-28T13:10:48.663000Z | |
| var-202011-1582 | 2022-03-28T13:11:18.983000Z | |
| var-201302-0422 | 2022-03-28T13:18:10.496000Z | |
| var-201712-0384 | 2022-03-28T13:39:01.352000Z | |
| var-201204-0234 | 2022-03-28T14:09:38.006000Z | |
| var-202110-1907 | 2022-03-28T15:24:27.396000Z | |
| var-202109-1968 | 2022-03-28T15:24:42.425000Z | |
| var-202103-1752 | 2022-03-28T15:26:17.351000Z | |
| var-202103-1651 | 2022-03-28T15:26:17.893000Z | |
| var-202101-2000 | 2022-03-28T15:26:59.562000Z | |
| var-202101-1994 | 2022-03-28T15:26:59.656000Z | |
| var-202008-0729 | 2022-03-28T15:28:42.740000Z | |
| var-201109-0401 | 2022-03-28T15:47:17.677000Z | |
| var-202012-1631 | 2022-03-28T16:00:29.378000Z | |
| var-202112-1881 | DIAEnergie Version 1.7.5 and prior is vulnerable to a reflected cross-site scripting atta… | 2022-03-29T07:27:46.293000Z |
| var-202112-1878 | DIAEnergie Version 1.7.5 and prior is vulnerable to multiple cross-site scripting vulnera… | 2022-03-29T07:33:48.880000Z |
| var-202112-1879 | DIAEnergie Version 1.7.5 and prior is vulnerable to stored cross-site scripting when an u… | 2022-03-29T07:41:37.597000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2005-000343 | DeleGate DNS Message Decompression Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000396 | Ruby XMLRPC Arbitrary Command Execution Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000530 | Vulnerability in multiple web browsers allowing request spoofing attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000537 | Webmin and Usermin authentication bypass vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000538 | Ruby vulnerability allowing to bypass safe level 4 as a sandbox | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000695 | Ruby XMLRPC Server Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000705 | Fujitsu Java Runtime Environment reflection API vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000706 | Fujitsu Java Runtime Environment reflection API vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000707 | Fujitsu Java Runtime Environment reflection API vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000756 | Tsuru-Kame Mail vulnerable in S/MIME signature verification | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000757 | Cybozu Office browser script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000758 | msearch directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000759 | McAfee VirusScan Engine buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000760 | McAfee VirusScan Engine buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000761 | Norton AntiVirus causes abnormal OS termination when a user edits a shared network file | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000762 | Norton AntiVirus causes abnormal OS termination when scanning illegal files | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000763 | ppBlog cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000764 | Website connection problem when a mobile phone terminal uses specific QR code | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000765 | Buffalo router configuration management interface vulnerable to remote access and password leakage | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000766 | w3ml cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000767 | WebUD arbitrary program execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000768 | Movable Type session management vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000769 | Virus Security heap overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000770 | Virus Security memory leak vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000771 | Wiki clone cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000772 | Inappropriate interpretation of mailto URL scheme by mail client software | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000773 | desknet's cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000774 | SFS cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000776 | Java Cryptography Extension 1.2.1 (JCE 1.2.1) will no longer function properly after July 28, 2005 due to the expiration of its digital certificate | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000777 | tDiary cross-site request forgery vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|---|---|
| ts-2025-004 | TS-2025-004 | 2025-05-27T00:00 |
| ts-2025-005 | TS-2025-005 | 2025-08-07T00:00 |
| ts-2025-006 | TS-2025-006 | 2025-10-28T00:00 |