Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0578 |
N/A
|
SGI MIPSPro compilers C, C++, F77 and F90 generat… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.250Z |
| CVE-2000-0580 |
N/A
|
Windows 2000 Server allows remote attackers to ca… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.267Z |
| CVE-2000-0589 |
N/A
|
SawMill 5.0.21 uses weak encryption to store pass… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.287Z |
| CVE-2000-0592 |
N/A
|
Buffer overflows in POP3 service in WinProxy 2.0 … |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.296Z |
| CVE-2000-0605 |
N/A
|
Blackboard CourseInfo 4.0 stores the local and SQ… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.247Z |
| CVE-2000-0606 |
N/A
|
Buffer overflow in kon program in Kanji on Consol… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.251Z |
| CVE-2000-0607 |
N/A
|
Buffer overflow in fld program in Kanji on Consol… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.314Z |
| CVE-2000-0608 |
N/A
|
NetWin dMailWeb and cwMail 2.6i and earlier allow… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.254Z |
| CVE-2000-0609 |
N/A
|
NetWin dMailWeb and cwMail 2.6g and earlier allow… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.272Z |
| CVE-2000-0612 |
N/A
|
Windows 95 and Windows 98 do not properly process… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.256Z |
| CVE-2000-0614 |
N/A
|
Tnef program in Linux systems allows remote attac… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.319Z |
| CVE-2000-0617 |
N/A
|
Buffer overflow in xconq and cconq game programs … |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.329Z |
| CVE-2000-0618 |
N/A
|
Buffer overflow in xconq and cconq game programs … |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.313Z |
| CVE-2000-0623 |
N/A
|
Buffer overflow in O'Reilly WebSite Professional … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:21:31.322Z |
| CVE-2000-0625 |
N/A
|
NetZero 3.0 and earlier uses weak encryption for … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:21:31.299Z |
| CVE-2000-0626 |
N/A
|
Buffer overflow in Alibaba web server allows remo… |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:21:31.325Z |
| CVE-2000-0629 |
N/A
|
The default configuration of the Sun Java web ser… |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:21:31.329Z |
| CVE-2000-0645 |
N/A
|
WFTPD and WFTPD Pro 2.41 allows remote attackers … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:41.141Z |
| CVE-2000-0646 |
N/A
|
WFTPD and WFTPD Pro 2.41 allows remote attackers … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:41.043Z |
| CVE-2000-0647 |
N/A
|
WFTPD and WFTPD Pro 2.41 allows remote attackers … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:40.709Z |
| CVE-2000-0648 |
N/A
|
WFTPD and WFTPD Pro 2.41 allows local users to ca… |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:40.699Z |
| CVE-2000-0649 |
N/A
|
IIS 4.0 allows remote attackers to obtain the int… |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:41.358Z |
| CVE-2000-0653 |
N/A
|
Microsoft Outlook Express allows remote attackers… |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:41.045Z |
| CVE-2000-0656 |
N/A
|
Buffer overflow in AnalogX proxy server 4.04 and … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:40.649Z |
| CVE-2000-0657 |
N/A
|
Buffer overflow in AnalogX proxy server 4.04 and … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:40.751Z |
| CVE-2000-0658 |
N/A
|
Buffer overflow in AnalogX proxy server 4.04 and … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:40.618Z |
| CVE-2000-0659 |
N/A
|
Buffer overflow in AnalogX proxy server 4.04 and … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:40.974Z |
| CVE-2000-0667 |
N/A
|
Vulnerability in gpm in Caldera Linux allows loca… |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:40.863Z |
| CVE-2000-0680 |
N/A
|
The CVS 1.10.8 server does not properly restrict … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:40.711Z |
| CVE-2000-0686 |
N/A
|
Auction Weaver CGI script 1.03 and earlier allows… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.184Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0578 |
N/A
|
SGI MIPSPro compilers C, C++, F77 and F90 generat… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.250Z |
| CVE-2000-0580 |
N/A
|
Windows 2000 Server allows remote attackers to ca… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.267Z |
| CVE-2000-0589 |
N/A
|
SawMill 5.0.21 uses weak encryption to store pass… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.287Z |
| CVE-2000-0592 |
N/A
|
Buffer overflows in POP3 service in WinProxy 2.0 … |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.296Z |
| CVE-2000-0605 |
N/A
|
Blackboard CourseInfo 4.0 stores the local and SQ… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.247Z |
| CVE-2000-0606 |
N/A
|
Buffer overflow in kon program in Kanji on Consol… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.251Z |
| CVE-2000-0607 |
N/A
|
Buffer overflow in fld program in Kanji on Consol… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.314Z |
| CVE-2000-0608 |
N/A
|
NetWin dMailWeb and cwMail 2.6i and earlier allow… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.254Z |
| CVE-2000-0609 |
N/A
|
NetWin dMailWeb and cwMail 2.6g and earlier allow… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.272Z |
| CVE-2000-0612 |
N/A
|
Windows 95 and Windows 98 do not properly process… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.256Z |
| CVE-2000-0614 |
N/A
|
Tnef program in Linux systems allows remote attac… |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.319Z |
| CVE-2000-0617 |
N/A
|
Buffer overflow in xconq and cconq game programs … |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.329Z |
| CVE-2000-0618 |
N/A
|
Buffer overflow in xconq and cconq game programs … |
n/a |
n/a |
2000-07-19T04:00:00 | 2024-08-08T05:21:31.313Z |
| CVE-2000-0623 |
N/A
|
Buffer overflow in O'Reilly WebSite Professional … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:21:31.322Z |
| CVE-2000-0625 |
N/A
|
NetZero 3.0 and earlier uses weak encryption for … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:21:31.299Z |
| CVE-2000-0626 |
N/A
|
Buffer overflow in Alibaba web server allows remo… |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:21:31.325Z |
| CVE-2000-0629 |
N/A
|
The default configuration of the Sun Java web ser… |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:21:31.329Z |
| CVE-2000-0645 |
N/A
|
WFTPD and WFTPD Pro 2.41 allows remote attackers … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:41.141Z |
| CVE-2000-0646 |
N/A
|
WFTPD and WFTPD Pro 2.41 allows remote attackers … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:41.043Z |
| CVE-2000-0647 |
N/A
|
WFTPD and WFTPD Pro 2.41 allows remote attackers … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:40.709Z |
| CVE-2000-0648 |
N/A
|
WFTPD and WFTPD Pro 2.41 allows local users to ca… |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:40.699Z |
| CVE-2000-0649 |
N/A
|
IIS 4.0 allows remote attackers to obtain the int… |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:41.358Z |
| CVE-2000-0653 |
N/A
|
Microsoft Outlook Express allows remote attackers… |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:41.045Z |
| CVE-2000-0656 |
N/A
|
Buffer overflow in AnalogX proxy server 4.04 and … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:40.649Z |
| CVE-2000-0657 |
N/A
|
Buffer overflow in AnalogX proxy server 4.04 and … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:40.751Z |
| CVE-2000-0658 |
N/A
|
Buffer overflow in AnalogX proxy server 4.04 and … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:40.618Z |
| CVE-2000-0659 |
N/A
|
Buffer overflow in AnalogX proxy server 4.04 and … |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:40.974Z |
| CVE-2000-0667 |
N/A
|
Vulnerability in gpm in Caldera Linux allows loca… |
n/a |
n/a |
2000-08-03T04:00:00 | 2024-08-08T05:28:40.863Z |
| CVE-2000-0680 |
N/A
|
The CVS 1.10.8 server does not properly restrict … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:40.711Z |
| CVE-2000-0686 |
N/A
|
Auction Weaver CGI script 1.03 and earlier allows… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.184Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-1999-1532 | Netscape Messaging Server 3.54, 3.55, and 3.6 allows a remote attacker to cause a denial of service… | 1999-10-29T04:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0873 | Buffer overflow in Skyfull mail server via MAIL FROM command. | 1999-10-30T04:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1577 | Buffer overflow in HHOpen ActiveX control (hhopen.ocx) 1.0.0.1 for Internet Explorer 4.01 and 5 all… | 1999-10-31T04:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0354 | Internet Explorer 4.x or 5.x with Word 97 allows arbitrary execution of Visual Basic programs to th… | 1999-11-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0827 | By default, Internet Explorer 5.0 and other versions enables the "Navigate sub-frames across differ… | 1999-11-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0829 | HP Secure Web Console uses weak encryption. | 1999-11-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0830 | Buffer overflow in SCO UnixWare Xsco command via a long argument. | 1999-11-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0854 | Ultimate Bulletin Board stores data files in the cgi-bin directory, allowing remote attackers to vi… | 1999-11-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1077 | Idle locking function in MacOS 9 allows local attackers to bypass the password protection of idled … | 1999-11-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1517 | runtar in the Amanda backup system used in various UNIX operating systems executes tar with root pr… | 1999-11-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0946 | Buffer overflow in Yamaha MidiPlug via a Text variable in an EMBED tag. | 1999-11-02T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0947 | AN-HTTPd provides example CGI scripts test.bat, input.bat, input2.bat, and envout.bat, which allow … | 1999-11-02T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0948 | Buffer overflow in uum program for Canna input system allows local users to gain root privileges. | 1999-11-02T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0949 | Buffer overflow in canuum program for Canna input system allows local users to gain root privileges. | 1999-11-02T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1531 | Buffer overflow in IBM HomePagePrint 1.0.7 for Windows98J allows a malicious Web site to execute ar… | 1999-11-02T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0885 | Alibaba web server allows remote attackers to execute commands via a pipe character in a malformed URL. | 1999-11-03T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0904 | Buffer overflow in BFTelnet allows remote attackers to cause a denial of service via a long username. | 1999-11-03T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0843 | Denial of service in Cisco routers running NAT via a PORT command from an FTP client to a Telnet port. | 1999-11-04T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0887 | FTGate web interface server allows remote attackers to read files via a .. (dot dot) attack. | 1999-11-04T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0896 | Buffer overflow in RealNetworks RealServer administration utility allows remote attackers to execut… | 1999-11-04T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0898 | Buffer overflows in Windows NT 4.0 print spooler allow remote attackers to gain privileges or cause… | 1999-11-04T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0899 | The Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropr… | 1999-11-04T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1065 | Palm Pilot HotSync Manager 3.0.4 in Windows 98 allows remote attackers to cause a denial of service… | 1999-11-04T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1340 | Buffer overflow in faxalter in hylafax 4.0.2 allows local users to gain privileges via a long -m co… | 1999-11-04T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1509 | Directory traversal vulnerability in Etype Eserv 2.50 web server allows a remote attacker to read a… | 1999-11-04T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1571 | Buffer overflow in sar for SCO OpenServer 5.0.0 through 5.0.5 may allow local users to gain root pr… | 1999-11-04T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1529 | A buffer overflow exists in the HELO command in Trend Micro Interscan VirusWall SMTP gateway 3.23/3… | 1999-11-07T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1533 | Eicon Technology Diva LAN ISDN modem allows a remote attacker to cause a denial of service (hang) v… | 1999-11-07T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0821 | FreeBSD seyon allows local users to gain privileges by providing a malicious program in the -emulat… | 1999-11-08T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0863 | Buffer overflow in FreeBSD seyon via HOME environmental variable, -emulator argument, -modems argum… | 1999-11-08T05:00:00.000 | 2025-04-03T01:03:51.193 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-6c3j-c64m-qhgq |
6.1 (3.1)
|
XSS in jQuery as used in Drupal, Backdrop CMS, and other products | 2019-04-26T16:29:11Z | 2024-11-05T20:16:55Z |
| ghsa-mw6v-crh8-8533 |
9.8 (3.1)
9.3 (4.0)
|
Integer Overflow or Wraparound in Google TensorFlow | 2019-04-30T15:36:41Z | 2024-10-28T14:24:41Z |
| ghsa-mfg7-x5m7-6p8w |
6.5 (3.1)
7.1 (4.0)
|
NULL Pointer Dereference in Google TensorFlow | 2019-04-30T15:37:17Z | 2024-10-28T14:27:38Z |
| ghsa-gc52-xj6p-9pxp |
3.8 (3.1)
|
Exposure of Sensitive Information to an Unauthorized Actor in Keycloak | 2019-04-30T15:37:21Z | 2021-08-03T21:24:04Z |
| ghsa-943p-xc6m-c6gr |
|
Rejected CVE ID | 2019-04-30T15:37:27Z | 2021-12-03T14:34:42Z |
| ghsa-q492-f7gr-27rp |
8.1 (3.1)
7.2 (4.0)
|
Improper Restriction of Operations within the Bounds of a Memory Buffer in Google TensorFlow | 2019-04-30T15:37:31Z | 2024-10-28T14:10:11Z |
| ghsa-qx2v-j445-g354 |
8.1 (3.1)
7.2 (4.0)
|
Improper Input Validation in Google TensorFlow | 2019-04-30T15:37:34Z | 2024-10-28T14:27:27Z |
| ghsa-72fv-qgj6-2w2p |
6.1 (3.1)
|
Cross-site Scripting in NodeBB | 2019-05-01T18:37:08Z | 2021-08-03T21:27:01Z |
| ghsa-x2mc-8fgj-3wmr |
7.5 (3.1)
|
Improper Input Validation in tar-fs | 2019-05-01T18:37:18Z | 2021-08-03T21:27:51Z |
| ghsa-j44m-qm6p-hp7m |
7.5 (3.1)
|
Arbitrary File Overwrite in tar | 2019-05-01T18:37:31Z | 2023-11-29T22:25:48Z |
| ghsa-4wjq-69rc-8wcp |
7.5 (3.1)
|
Path Traversal in Apache Camel | 2019-05-02T15:21:34Z | 2022-11-17T17:45:21Z |
| ghsa-jxgm-9f58-w4xp |
6.5 (3.1)
|
Improper Input Validation in Apache Archiva | 2019-05-14T04:00:21Z | 2021-07-27T20:35:40Z |
| ghsa-cqcf-4g4h-rghf |
6.5 (3.1)
|
Cross-site scripting in Apache Archiva | 2019-05-14T04:00:31Z | 2021-05-11T16:14:58Z |
| ghsa-vm59-329q-p468 |
6.1 (3.1)
|
Cross-site Scripting in Apache UIMA | 2019-05-14T04:00:37Z | 2021-08-03T21:30:31Z |
| ghsa-g99m-3m46-4gm9 |
7.5 (3.1)
|
Infinite Loop in Apache Sanselan | 2019-05-14T04:00:47Z | 2021-08-03T21:31:13Z |
| ghsa-rjx9-2936-9ffx |
7.5 (3.1)
|
Improper Input Validation in Apache Sanselan | 2019-05-14T04:01:06Z | 2021-08-03T22:54:50Z |
| ghsa-8v67-x8q5-3x3g |
6.1 (3.1)
|
Cross-Site Scripting in simditor | 2019-05-14T04:01:27Z | 2021-08-04T14:53:05Z |
| ghsa-54mg-vgrp-mwx9 |
3.7 (3.1)
|
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack | 2019-05-14T04:01:37Z | 2021-08-04T15:01:30Z |
| ghsa-h9gj-rqrw-x4fq |
7.5 (3.1)
|
Server Side Request Forgery in Apache Axis | 2019-05-14T04:02:24Z | 2024-06-21T21:33:48Z |
| ghsa-jgmr-wrwx-mgfj |
5.3 (3.1)
|
Exposure of Sensitive Information to an Unauthorized Actor and SQL Injection in Spring Data JPA | 2019-05-14T04:02:35Z | 2021-08-03T21:46:37Z |
| ghsa-wv67-9jq7-8r69 |
7.5 (3.1)
|
Improper Input Validation and Buffer Over-read in mqtt-packet | 2019-05-14T04:02:45Z | 2021-08-03T21:47:43Z |
| ghsa-4x49-w62v-76q7 |
6.5 (3.1)
|
Path Traversal in Spring Cloud Config | 2019-05-23T08:39:23Z | 2021-08-03T21:40:51Z |
| ghsa-pgr8-jg6h-8gw6 |
6.3 (3.1)
|
Cross-Site Scripting in webpack-bundle-analyzer | 2019-05-23T09:26:20Z | 2021-08-04T15:26:36Z |
| ghsa-5f7m-mmpc-qhh4 |
|
mysql Node.JS Module Vulnerable to Remote Memory Exposure | 2019-05-23T09:27:00Z | 2022-08-03T20:30:06Z |
| ghsa-6qqf-vvcr-7qrv |
|
Cryptographically Weak PRNG in generate-password | 2019-05-23T09:27:22Z | 2020-08-31T18:34:48Z |
| ghsa-5ww9-j83m-q7qx |
7.5 (3.1)
|
Information exposure in FasterXML jackson-databind | 2019-05-23T09:32:24Z | 2024-03-15T01:06:41Z |
| ghsa-78j5-gcmf-vqc8 |
6.1 (3.1)
|
Cross-Site Scripting (XSS) in Verdaccio | 2019-05-29T18:02:59Z | 2021-10-06T22:02:18Z |
| ghsa-42xw-2xvc-qx8m |
7.5 (3.1)
|
Denial of Service in axios | 2019-05-29T18:04:45Z | 2021-07-27T20:36:18Z |
| ghsa-36m4-6v6m-4vpr |
6.1 (3.1)
|
Cross-site Scripting in remarkable | 2019-05-29T18:04:55Z | 2023-09-08T19:21:19Z |
| ghsa-f554-x222-wgf7 |
9.8 (3.1)
|
Command Injection in Xstream | 2019-05-29T18:05:03Z | 2024-03-04T23:51:42Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-179 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:28.937409Z |
| pysec-2021-180 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:29.100995Z |
| pysec-2021-181 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:29.285990Z |
| pysec-2021-182 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:29.446413Z |
| pysec-2021-183 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:29.613359Z |
| pysec-2021-184 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:29.791310Z |
| pysec-2021-185 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:29.986611Z |
| pysec-2021-186 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:30.167299Z |
| pysec-2021-187 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:30.332227Z |
| pysec-2021-188 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:30.499582Z |
| pysec-2021-189 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:30.663551Z |
| pysec-2021-190 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can re… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:30.834118Z |
| pysec-2021-192 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:31.200110Z |
| pysec-2021-193 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:31.368222Z |
| pysec-2021-194 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:31.559796Z |
| pysec-2021-195 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:31.758663Z |
| pysec-2021-196 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ac… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:31.940947Z |
| pysec-2021-197 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:32.127822Z |
| pysec-2021-198 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:32.310582Z |
| pysec-2021-199 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:32.482991Z |
| pysec-2021-200 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:32.655132Z |
| pysec-2021-201 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:32.823380Z |
| pysec-2021-202 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:32.984830Z |
| pysec-2021-203 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can wr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:33.149908Z |
| pysec-2021-204 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:33.334705Z |
| pysec-2021-205 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:33.499981Z |
| pysec-2021-206 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:33.683964Z |
| pysec-2021-207 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:33.847369Z |
| pysec-2021-208 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:34.015475Z |
| pysec-2021-209 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:34.191182Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2022-290 | Malicious code in @globes/fetlife-assets (npm) | 2022-06-20T18:20:15Z | 2022-06-20T18:20:15Z |
| MAL-2022-291 | Malicious code in @gmelius/fetlife-assets (npm) | 2022-06-20T18:20:15Z | 2022-06-20T18:20:15Z |
| MAL-2022-333 | Malicious code in @hilcorp/fetlife-assets (npm) | 2022-06-20T18:20:15Z | 2022-06-20T18:20:16Z |
| MAL-2022-336 | Malicious code in @homebrew/fetlife-assets (npm) | 2022-06-20T18:20:15Z | 2022-06-20T18:20:16Z |
| mal-2022-290 | Malicious code in @globes/fetlife-assets (npm) | 2022-06-20T18:20:15Z | 2022-06-20T18:20:15Z |
| mal-2022-291 | Malicious code in @gmelius/fetlife-assets (npm) | 2022-06-20T18:20:15Z | 2022-06-20T18:20:15Z |
| mal-2022-333 | Malicious code in @hilcorp/fetlife-assets (npm) | 2022-06-20T18:20:15Z | 2022-06-20T18:20:16Z |
| mal-2022-336 | Malicious code in @homebrew/fetlife-assets (npm) | 2022-06-20T18:20:15Z | 2022-06-20T18:20:16Z |
| MAL-2022-337 | Malicious code in @honeywell/fetlife-assets (npm) | 2022-06-20T18:20:16Z | 2022-06-20T18:20:16Z |
| MAL-2022-339 | Malicious code in @hudapp/fetlife-assets (npm) | 2022-06-20T18:20:16Z | 2022-06-20T18:20:17Z |
| MAL-2022-340 | Malicious code in @huji/fetlife-assets (npm) | 2022-06-20T18:20:16Z | 2022-06-20T18:20:17Z |
| MAL-2022-341 | Malicious code in @ibb-apache/fetlife-assets (npm) | 2022-06-20T18:20:16Z | 2022-06-20T18:20:18Z |
| mal-2022-337 | Malicious code in @honeywell/fetlife-assets (npm) | 2022-06-20T18:20:16Z | 2022-06-20T18:20:16Z |
| mal-2022-339 | Malicious code in @hudapp/fetlife-assets (npm) | 2022-06-20T18:20:16Z | 2022-06-20T18:20:17Z |
| mal-2022-340 | Malicious code in @huji/fetlife-assets (npm) | 2022-06-20T18:20:16Z | 2022-06-20T18:20:17Z |
| mal-2022-341 | Malicious code in @ibb-apache/fetlife-assets (npm) | 2022-06-20T18:20:16Z | 2022-06-20T18:20:18Z |
| MAL-2022-343 | Malicious code in @icbc-ltd/fetlife-assets (npm) | 2022-06-20T18:20:17Z | 2022-06-20T18:20:18Z |
| mal-2022-343 | Malicious code in @icbc-ltd/fetlife-assets (npm) | 2022-06-20T18:20:17Z | 2022-06-20T18:20:18Z |
| MAL-2022-344 | Malicious code in @icmb/fetlife-assets (npm) | 2022-06-20T18:20:18Z | 2022-06-20T18:20:19Z |
| MAL-2022-347 | Malicious code in @igame/fetlife-assets (npm) | 2022-06-20T18:20:18Z | 2022-06-20T18:20:19Z |
| mal-2022-344 | Malicious code in @icmb/fetlife-assets (npm) | 2022-06-20T18:20:18Z | 2022-06-20T18:20:19Z |
| mal-2022-347 | Malicious code in @igame/fetlife-assets (npm) | 2022-06-20T18:20:18Z | 2022-06-20T18:20:19Z |
| MAL-2022-355 | Malicious code in @impresscms/fetlife-assets (npm) | 2022-06-20T18:20:19Z | 2022-06-20T18:20:19Z |
| MAL-2022-357 | Malicious code in @infogram/fetlife-assets (npm) | 2022-06-20T18:20:19Z | 2022-06-20T18:20:20Z |
| mal-2022-355 | Malicious code in @impresscms/fetlife-assets (npm) | 2022-06-20T18:20:19Z | 2022-06-20T18:20:19Z |
| mal-2022-357 | Malicious code in @infogram/fetlife-assets (npm) | 2022-06-20T18:20:19Z | 2022-06-20T18:20:20Z |
| MAL-2022-359 | Malicious code in @instagram/fetlife-assets (npm) | 2022-06-20T18:20:20Z | 2022-06-20T18:20:20Z |
| MAL-2022-362 | Malicious code in @insulet/fetlife-assets (npm) | 2022-06-20T18:20:20Z | 2022-06-20T18:20:21Z |
| MAL-2022-363 | Malicious code in @investnext/fetlife-assets (npm) | 2022-06-20T18:20:20Z | 2022-06-20T18:20:21Z |
| mal-2022-359 | Malicious code in @instagram/fetlife-assets (npm) | 2022-06-20T18:20:20Z | 2022-06-20T18:20:20Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-0359 | MariaDB: Schwachstellen ermöglichen Denial of Service | 2022-04-13T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2025-1407 | McAfee Agent: Mehrere Schwachstellen | 2022-04-13T22:00:00.000+00:00 | 2025-06-26T22:00:00.000+00:00 |
| wid-sec-w-2022-0167 | vim: Schwachstelle ermöglicht Codeausführung | 2022-04-18T22:00:00.000+00:00 | 2022-12-26T23:00:00.000+00:00 |
| wid-sec-w-2022-0168 | MariaDB: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-04-18T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2022-0633 | mutt: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-04-18T22:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| wid-sec-w-2022-1138 | Google Chrome: Schwachstelle ermöglicht Codeausführung | 2022-04-18T22:00:00.000+00:00 | 2022-12-11T23:00:00.000+00:00 |
| wid-sec-w-2022-2107 | Asterisk: Mehrere Schwachstellen | 2022-04-18T22:00:00.000+00:00 | 2024-12-08T23:00:00.000+00:00 |
| wid-sec-w-2024-1393 | Rückruf: 7-Zip: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode | 2022-04-18T22:00:00.000+00:00 | 2024-06-17T22:00:00.000+00:00 |
| wid-sec-w-2022-0169 | Oracle MySQL: Mehrere Schwachstellen | 2022-04-19T22:00:00.000+00:00 | 2024-05-28T22:00:00.000+00:00 |
| wid-sec-w-2022-0200 | Oracle Java SE und OpenJDK: Mehrere Schwachstellen | 2022-04-19T22:00:00.000+00:00 | 2025-02-18T23:00:00.000+00:00 |
| wid-sec-w-2022-0240 | ffmpeg: Schwachstelle ermöglicht Denial of Service | 2022-04-19T22:00:00.000+00:00 | 2023-12-26T23:00:00.000+00:00 |
| wid-sec-w-2024-2180 | Oracle Fusion Middleware: Mehrere Schwachstellen | 2022-04-19T22:00:00.000+00:00 | 2024-09-18T22:00:00.000+00:00 |
| wid-sec-w-2022-0170 | MariaDB: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-04-20T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2022-0069 | Red Hat OpenShift Logging Subsystem: Mehrere Schwachstellen | 2022-04-21T22:00:00.000+00:00 | 2025-07-27T22:00:00.000+00:00 |
| wid-sec-w-2022-0171 | vim: Schwachstelle ermöglicht Denial of Service | 2022-04-21T22:00:00.000+00:00 | 2023-02-28T23:00:00.000+00:00 |
| wid-sec-w-2022-0254 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-04-24T22:00:00.000+00:00 | 2023-07-13T22:00:00.000+00:00 |
| wid-sec-w-2022-0775 | FreeType: Mehrere Schwachstellen | 2022-04-24T22:00:00.000+00:00 | 2025-06-03T22:00:00.000+00:00 |
| wid-sec-w-2022-2366 | HCL BigFix: Mehrere Schwachstellen | 2022-04-24T22:00:00.000+00:00 | 2022-12-19T23:00:00.000+00:00 |
| wid-sec-w-2022-2411 | FreeRADIUS: Mehrere Schwachstellen | 2022-04-24T22:00:00.000+00:00 | 2023-05-16T22:00:00.000+00:00 |
| wid-sec-w-2022-1310 | OpenSC: Schwachstelle ermöglicht Denial of Service | 2022-04-25T22:00:00.000+00:00 | 2025-04-09T22:00:00.000+00:00 |
| wid-sec-w-2023-1484 | Grafana: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-04-25T22:00:00.000+00:00 | 2023-06-15T22:00:00.000+00:00 |
| wid-sec-w-2024-1033 | xpdf: Schwachstelle ermöglicht Denial of Service | 2022-04-25T22:00:00.000+00:00 | 2024-05-06T22:00:00.000+00:00 |
| wid-sec-w-2022-0007 | Red Hat Enterprise Linux: Schwachstelle ermöglicht Codeausführung | 2022-04-26T22:00:00.000+00:00 | 2024-02-11T23:00:00.000+00:00 |
| wid-sec-w-2022-0522 | cURL: Mehrere Schwachstellen | 2022-04-26T22:00:00.000+00:00 | 2023-12-04T23:00:00.000+00:00 |
| wid-sec-w-2022-1281 | Ruby on Rails: Mehrere Schwachstellen ermöglichen Cross-Site Scripting | 2022-04-26T22:00:00.000+00:00 | 2023-04-27T22:00:00.000+00:00 |
| wid-sec-w-2022-0070 | Redis: Mehrere Schwachstellen ermöglichen Ausführen von beliebigem Programmcode mit Administratorrechten | 2022-04-27T22:00:00.000+00:00 | 2024-10-24T22:00:00.000+00:00 |
| wid-sec-w-2022-2059 | Ruby: Schwachstelle ermöglicht Codeausführung | 2022-04-27T22:00:00.000+00:00 | 2023-01-30T23:00:00.000+00:00 |
| wid-sec-w-2024-1218 | Cisco ASA (Adaptive Security Appliance) und Cisco Firepower: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-04-27T22:00:00.000+00:00 | 2024-05-22T22:00:00.000+00:00 |
| wid-sec-w-2022-0173 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-04-28T22:00:00.000+00:00 | 2023-07-13T22:00:00.000+00:00 |
| wid-sec-w-2022-0201 | Ghostscript: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-04-28T22:00:00.000+00:00 | 2023-03-21T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2005:429 | Red Hat Security Advisory: gaim security update | 2005-05-11T08:33:00Z | 2005-05-11T00:00:00Z |
| rhsa-2005_429 | Red Hat Security Advisory: gaim security update | 2005-05-11T08:33:00Z | 2005-05-11T00:00:00Z |
| rhsa-2005:421 | Red Hat Security Advisory: tcpdump security update | 2005-05-11T08:37:00+00:00 | 2026-01-08T09:18:28+00:00 |
| rhsa-2005_421 | Red Hat Security Advisory: tcpdump security update | 2005-05-11T08:37:00+00:00 | 2024-11-21T23:44:44+00:00 |
| rhsa-2005:417 | Red Hat Security Advisory: tcpdump security update | 2005-05-11T08:40:00+00:00 | 2026-01-08T09:18:25+00:00 |
| rhsa-2005_417 | Red Hat Security Advisory: tcpdump security update | 2005-05-11T08:40:00+00:00 | 2024-11-21T23:44:40+00:00 |
| rhsa-2005:412 | Red Hat Security Advisory: openmotif security update | 2005-05-11T15:25:00+00:00 | 2025-11-21T17:29:04+00:00 |
| rhsa-2005_412 | Red Hat Security Advisory: openmotif security update | 2005-05-11T15:25:00+00:00 | 2024-11-21T23:24:17+00:00 |
| rhsa-2005:408 | Red Hat Security Advisory: cyrus-imapd security update | 2005-05-17T14:25:00+00:00 | 2025-11-21T17:29:02+00:00 |
| rhsa-2005_408 | Red Hat Security Advisory: cyrus-imapd security update | 2005-05-17T14:25:00+00:00 | 2024-11-21T23:43:28+00:00 |
| rhsa-2005:393 | Red Hat Security Advisory: kdelibs security update | 2005-05-17T14:33:00+00:00 | 2026-01-08T09:18:19+00:00 |
| rhsa-2005_393 | Red Hat Security Advisory: kdelibs security update | 2005-05-17T14:33:00+00:00 | 2024-11-21T23:42:46+00:00 |
| rhsa-2005:371 | Red Hat Security Advisory: ncpfs security update | 2005-05-17T14:34:00+00:00 | 2025-11-21T17:28:56+00:00 |
| rhsa-2005_371 | Red Hat Security Advisory: ncpfs security update | 2005-05-17T14:34:00+00:00 | 2024-11-21T23:40:07+00:00 |
| rhsa-2005:275 | Red Hat Security Advisory: ia32el security update | 2005-05-18T13:00:00+00:00 | 2025-11-21T17:28:42+00:00 |
| rhsa-2005_275 | Red Hat Security Advisory: ia32el security update | 2005-05-18T13:00:00+00:00 | 2024-11-14T10:03:34+00:00 |
| rhsa-2005:074 | Red Hat Security Advisory: rsh security update | 2005-05-18T13:03:00+00:00 | 2025-11-21T17:28:24+00:00 |
| rhsa-2005_074 | Red Hat Security Advisory: rsh security update | 2005-05-18T13:03:00+00:00 | 2024-11-21T23:26:23+00:00 |
| rhsa-2005:294 | Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 5 | 2005-05-18T13:27:00+00:00 | 2025-11-21T17:28:44+00:00 |
| rhsa-2005_294 | Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 5 | 2005-05-18T13:27:00+00:00 | 2024-11-21T23:33:23+00:00 |
| rhsa-2005:106 | Red Hat Security Advisory: openssh security update | 2005-05-18T13:48:00+00:00 | 2025-11-21T17:28:28+00:00 |
| rhsa-2005_106 | Red Hat Security Advisory: openssh security update | 2005-05-18T13:48:00+00:00 | 2024-11-21T23:26:27+00:00 |
| rhsa-2005:256 | Red Hat Security Advisory: glibc security update | 2005-05-18T13:59:00+00:00 | 2025-11-21T17:28:40+00:00 |
| rhsa-2005_256 | Red Hat Security Advisory: glibc security update | 2005-05-18T13:59:00+00:00 | 2024-11-21T23:32:23+00:00 |
| rhba-2005:447 | Red Hat Bug Fix Advisory: Updated cdrtools packages | 2005-05-19T00:00:00+00:00 | 2025-11-21T17:20:47+00:00 |
| rhba-2005_447 | Red Hat Bug Fix Advisory: Updated cdrtools packages | 2005-05-19T00:00:00+00:00 | 2024-11-21T23:18:36+00:00 |
| rhsa-2005:238 | Red Hat Security Advisory: evolution security update | 2005-05-19T12:17:00+00:00 | 2025-11-21T17:28:40+00:00 |
| rhsa-2005_238 | Red Hat Security Advisory: evolution security update | 2005-05-19T12:17:00+00:00 | 2024-11-21T23:32:15+00:00 |
| rhsa-2005:434 | Red Hat Security Advisory: firefox security update | 2005-05-23T09:14:00+00:00 | 2026-01-08T09:18:31+00:00 |
| rhsa-2005_434 | Red Hat Security Advisory: firefox security update | 2005-05-23T09:14:00+00:00 | 2024-11-21T23:55:10+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsma-20-170-03 | Baxter Phoenix Hemodialysis Delivery System (Update A) | 2020-06-18T00:00:00.000000Z | 2020-06-23T00:00:00.000000Z |
| icsma-20-170-04 | Baxter Sigma Spectrum Infusion Pumps (Update B) | 2020-06-18T00:00:00.000000Z | 2020-06-23T00:00:00.000000Z |
| icsma-20-170-05 | BIOTRONIK CardioMessenger II | 2020-06-18T00:00:00.000000Z | 2020-06-18T00:00:00.000000Z |
| icsma-20-170-06 | BD Alaris PCU (Update A) | 2020-06-18T00:00:00.000000Z | 2020-06-23T00:00:00.000000Z |
| icsa-20-175-01 | Mitsubishi Electric MELSEC iQ-R, iQ-F, Q, L and FX Series CPU Modules (Update A) | 2020-06-23T00:00:00.000000Z | 2020-07-07T00:00:00.000000Z |
| icsa-20-175-02 | Honeywell ControlEdge PLC and RTU | 2020-06-23T00:00:00.000000Z | 2020-06-23T00:00:00.000000Z |
| icsa-20-175-03 | ABB Device Library Wizard | 2020-06-23T00:00:00.000000Z | 2020-06-23T00:00:00.000000Z |
| icsa-20-177-01 | ENTTEC Lighting Controllers (Update A) | 2020-06-25T00:00:00.000000Z | 2020-09-15T00:00:00.000000Z |
| icsa-20-177-02 | Rockwell Automation FactoryTalk Services Platform XXE | 2020-06-25T00:00:00.000000Z | 2020-06-25T00:00:00.000000Z |
| icsa-20-177-03 | Rockwell Automation FactoryTalk View SE | 2020-06-25T00:00:00.000000Z | 2020-06-25T00:00:00.000000Z |
| icsma-20-177-01 | Philips Ultrasound Systems | 2020-06-25T00:00:00.000000Z | 2020-06-25T00:00:00.000000Z |
| icsa-20-182-01 | Delta Industrial Automation DOPSoft (Update A) | 2020-06-30T00:00:00.000000Z | 2020-07-28T00:00:00.000000Z |
| icsa-20-182-02 | Mitsubishi Electric Factory Automation Engineering Software Products | 2020-06-30T00:00:00.000000Z | 2020-06-30T00:00:00.000000Z |
| icsa-20-184-01 | Nortek Linear eMerge 50P/5000P | 2020-07-02T00:00:00.000000Z | 2020-07-02T00:00:00.000000Z |
| icsa-20-184-02 | ABB System 800xA Information Manager | 2020-07-02T00:00:00.000000Z | 2020-07-02T00:00:00.000000Z |
| icsma-20-184-01 | OpenClinic GA (Update B) | 2020-07-02T00:00:00.000000Z | 2021-06-15T00:00:00.000000Z |
| icsa-20-189-01 | Grundfos CIM 500 | 2020-07-07T00:00:00.000000Z | 2020-07-07T00:00:00.000000Z |
| icsa-20-189-02 | Mitsubishi Electric GOT2000 Series | 2020-07-07T00:00:00.000000Z | 2020-07-07T00:00:00.000000Z |
| icsa-20-191-01 | Phoenix Contact Automation Worx Software Suite | 2020-07-09T00:00:00.000000Z | 2020-07-09T00:00:00.000000Z |
| icsa-20-191-02 | Rockwell Automation Logix Designer Studio 5000 | 2020-07-09T00:00:00.000000Z | 2020-07-09T00:00:00.000000Z |
| icsa-20-196-01 | Advantech iView | 2020-07-14T00:00:00.000000Z | 2020-07-14T00:00:00.000000Z |
| icsa-20-196-02 | Moxa EDR-G902 and EDR-G903 Series Routers | 2020-07-14T00:00:00.000000Z | 2020-07-14T00:00:00.000000Z |
| icsa-20-196-03 | Siemens SICAM MMU, SICAM T, and SICAM SGU | 2020-07-14T00:00:00.000000Z | 2020-07-14T00:00:00.000000Z |
| icsa-20-196-04 | Siemens SIMATIC HMI Panels | 2020-07-14T00:00:00.000000Z | 2020-07-14T00:00:00.000000Z |
| icsa-20-196-05 | Siemens UMC Stack (Update H) | 2020-07-14T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-20-196-06 | Siemens SIMATIC S7-200 SMART CPU Family | 2020-07-14T00:00:00.000000Z | 2020-07-14T00:00:00.000000Z |
| icsa-20-196-07 | Siemens Opcenter Execution Core (Update B) | 2020-07-14T00:00:00.000000Z | 2020-08-11T00:00:00.000000Z |
| icsa-20-196-08 | Siemens LOGO! Web Server | 2020-07-14T00:00:00.000000Z | 2020-07-14T00:00:00.000000Z |
| icsma-20-196-01 | Capsule Technologies SmartLinx Neuron 2 (Update A) | 2020-07-14T00:00:00.000000Z | 2020-10-20T00:00:00.000000Z |
| icsa-20-205-01 | Schneider Electric Triconex TriStation and Tricon Communication Module | 2020-07-23T00:00:00.000000Z | 2020-07-23T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-nfvis-file-overwrite-uonzpmkr | Cisco Enterprise NFV Infrastructure Software File Overwrite Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-nfvis-path-emy79oc2 | Cisco Enterprise NFV Infrastructure Software Path Traversal Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-rv-osinj-rce-pwtkpcjv | Cisco Small Business RV340 Series Routers Command Injection and Remote Code Execution Vulnerabilities | 2020-09-02T16:00:00+00:00 | 2020-09-30T19:35:24+00:00 |
| cisco-sa-sma-wsa-esa-info-dis-vsvpzohp | Cisco Content Security Management Appliance and Cisco Web Security Appliance Information Disclosure Vulnerability | 2020-09-02T16:00:00+00:00 | 2022-02-02T21:31:49+00:00 |
| cisco-sa-webex-media-znjfwhd6 | Cisco Webex Meetings Client for Windows, Webex Meetings Desktop App, and Webex Teams Information Disclosure Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-webex-meetings-utbwor4q | Cisco Webex Training Unauthorized Meeting Join Vulnerability | 2020-09-02T16:00:00+00:00 | 2020-09-02T16:00:00+00:00 |
| cisco-sa-aironet-dos-h3dculxw | Cisco Aironet Access Point Authentication Flood Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-aironet-dos-vhr2zg9y | Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ap-ethport-dos-xtjtt8py | Cisco Aironet Access Points Ethernet Wired Clients Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-30T15:49:49+00:00 |
| cisco-sa-capwap-dos-shfzxf | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-capwap-dos-tpdntdyq | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family CAPWAP Denial of Service Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-confacl-hbptfsuo | Cisco IOS XE Software RESTCONF and NETCONF-YANG Access Control List Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-cops-vld-mpbtvgew | Cisco IOS XE Software Common Open Policy Service Engine Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-dclass-dos-vkh9d8k3 | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family WLAN Local Profiling Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-esp20-arp-dos-gvhvggqj | Cisco IOS XE Software for Cisco ASR 1000 Series 20-Gbps Embedded Services Processor IP ARP Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ewlc-icmpv6-qb9eyycr | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family Improper Access Control Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-file-overwrite-ynu5prjd | Cisco IOS XE Software Arbitrary File Overwrite Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-info-disclosure-v4bmjbnf | Cisco IOS and IOS XE Software Information Disclosure Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-bgp-evpn-dos-lnfyjxff | Cisco IOS and IOS XE Software MP-BGP EVPN Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-lpwa-access-cxsd7pra | Cisco IOS Software for Cisco Industrial Routers Virtual-LPWA Unauthorized Access Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-lua-rce-7vejx4f | Cisco IOS XE Software Arbitrary Code Execution Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-profinet-dos-65qyg3w5 | Cisco IOS and IOS XE Software PROFINET Link Layer Discovery Protocol Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-12-09T15:23:48+00:00 |
| cisco-sa-ios-webui-priv-esc-k8zvewm | Cisco IOS XE Software Privilege Escalation Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ios-xe-webui-multi-vftkk7yr | Cisco IOS XE Software Web Management Framework Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-cmdinj-2mzhjm6k | Cisco IOS XE Software Command Injection Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-ctbypass-7qhafhkk | Cisco IOS XE Software Consent Token Bypass Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-dhcp-dos-jsckx43h | Cisco IOS XE Software for Cisco cBR-8 Converged Broadband Routers DHCP Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-ewlc-snmp-dos-wnkedg9k | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family SNMP Trap Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-iox-app-host-mczcnsbt | Cisco IOS XE Software IOx Application Hosting Privilege Escalation Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-isdn-q931-dos-67euzbtf | Cisco IOS and IOS XE Software ISDN Q.931 Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-39272 | Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances such as a certain situation with IMAP and PREAUTH. | 2021-08-02T00:00:00.000Z | 2022-01-19T00:00:00.000Z |
| msrc_cve-2021-40145 | gdImageGd2Ptr in gd_gd2.c in the GD Graphics Library (aka LibGD) through 2.3.2 has a double free. NOTE: the vendor's position is "The GD2 image format is a proprietary image format of libgd. It has to be regarded as being obsolete and should only be used for development and testing purposes. | 2021-08-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-40153 | squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory and thus allows writing to locations outside of the destination. | 2021-08-02T00:00:00.000Z | 2022-01-20T00:00:00.000Z |
| msrc_cve-2021-40330 | git_connect_git in connect.c in Git before 2.30.1 allows a repository path to contain a newline character which may result in unexpected cross-protocol requests as demonstrated by the git://localhost:1234/%0d%0a%0d%0aGET%20/%20HTTP/1.1 substring. | 2021-08-02T00:00:00.000Z | 2021-09-10T00:00:00.000Z |
| msrc_cve-2016-20012 | OpenSSH through 8.7 allows remote attackers who have a suspicion that a certain combination of username and public key is known to an SSH server to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product | 2021-09-02T00:00:00.000Z | 2021-10-01T00:00:00.000Z |
| msrc_cve-2020-8561 | Webhook redirect in kube-apiserver | 2021-09-02T00:00:00.000Z | 2025-10-01T23:11:07.000Z |
| msrc_cve-2021-22945 | When sending data to an MQTT server libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-22946 | A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations exposing possibly sensitive data in clear text over the network. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-23445 | Cross-site Scripting (XSS) | 2021-09-02T00:00:00.000Z | 2026-01-03T01:37:36.000Z |
| msrc_cve-2021-25741 | Symlink Exchange Can Allow Host Filesystem Access | 2021-09-02T00:00:00.000Z | 2025-10-01T23:11:09.000Z |
| msrc_cve-2021-33285 | In NTFS-3G versions < 2021.8.22 when a specially crafted NTFS attribute is supplied to the function ntfs_get_attribute_value a heap buffer overflow can occur allowing for memory disclosure or denial of service. The vulnerability is caused by an out-of-bound buffer access which can be triggered by mounting a crafted ntfs partition. The root cause is a missing consistency check after reading an MFT record : the "bytes_in_use" field should be less than the "bytes_allocated" field. When it is not the parsing of the records proceeds into the wild. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-33286 | In NTFS-3G versions < 2021.8.22 when a specially crafted unicode string is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-33287 | In NTFS-3G versions < 2021.8.22 when specially crafted NTFS attributes are read in the function ntfs_attr_pread_i a heap buffer overflow can occur and allow for writing to arbitrary memory or denial of service of the application. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-33289 | In NTFS-3G versions < 2021.8.22 when a specially crafted MFT section is supplied in an NTFS image a heap buffer overflow can occur and allow for code execution. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-33928 | Buffer overflow vulnerability in function pool_installable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service. | 2021-09-02T00:00:00.000Z | 2021-09-08T00:00:00.000Z |
| msrc_cve-2021-33929 | Buffer overflow vulnerability in function pool_disabled_solvable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service. | 2021-09-02T00:00:00.000Z | 2021-09-08T00:00:00.000Z |
| msrc_cve-2021-33930 | Buffer overflow vulnerability in function pool_installable_whatprovides in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service. | 2021-09-02T00:00:00.000Z | 2021-09-08T00:00:00.000Z |
| msrc_cve-2021-33938 | Buffer overflow vulnerability in function prune_to_recommended in src/policy.c in libsolv before 0.7.17 allows attackers to cause a Denial of Service. | 2021-09-02T00:00:00.000Z | 2021-09-08T00:00:00.000Z |
| msrc_cve-2021-34798 | NULL pointer dereference in httpd core | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35266 | In NTFS-3G versions < 2021.8.22 when a specially crafted NTFS inode pathname is supplied in an NTFS image a heap buffer overflow can occur resulting in memory disclosure denial of service and even code execution. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35267 | NTFS-3G versions < 2021.8.22 a stack buffer overflow can occur when correcting differences in the MFT and MFTMirror allowing for code execution or escalation of privileges when setuid-root. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35268 | In NTFS-3G versions < 2021.8.22 when a specially crafted NTFS inode is loaded in the function ntfs_inode_real_open a heap buffer overflow can occur allowing for code execution and escalation of privileges. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35269 | NTFS-3G versions < 2021.8.22 when a specially crafted NTFS attribute from the MFT is setup in the function ntfs_attr_setup_flag a heap buffer overflow can occur allowing for code execution and escalation of privileges. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-3583 | A flaw was found in Ansible where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-36160 | mod_proxy_uwsgi out of bound read | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-3653 | A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result the L2 guest would be allowed to read/write physical pages of the host resulting in a crash of the entire system leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-3770 | Heap-based Buffer Overflow in vim/vim | 2021-09-02T00:00:00.000Z | 2021-09-10T00:00:00.000Z |
| msrc_cve-2021-3778 | Heap-based Buffer Overflow in vim/vim | 2021-09-02T00:00:00.000Z | 2021-09-25T00:00:00.000Z |
| msrc_cve-2021-3796 | Use After Free in vim/vim | 2021-09-02T00:00:00.000Z | 2021-09-28T00:00:00.000Z |
| msrc_cve-2021-38300 | arch/mips/net/bpf_jit.c in the Linux kernel before 5.4.10 can generate undesirable machine code when transforming unprivileged cBPF programs allowing execution of arbitrary code within the kernel context. This occurs because conditional branches can exceed the 128 KB limit of the MIPS architecture. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202106-2264 | Matsushita Electric (China) Co., Ltd. is a manufacturer mainly responsible for the sales … | 2022-05-04T09:37:45.901000Z |
| var-202106-2304 | FLIR Systems, Inc. focuses on the design, development, production, marketing and promotio… | 2022-05-04T09:37:45.891000Z |
| var-202106-2325 | China Telecom's NB-IOT smart device management platform is an IoT management platform. … | 2022-05-04T09:37:45.880000Z |
| var-202105-1578 | Shanghai Juyi Technology Development Co., Ltd., legal representative: Wang Nan, registere… | 2022-05-04T09:37:46.774000Z |
| var-202105-1599 | TP_LINK-TD-W8901G is a wireless router. TP_LINK-TD-W8901G has a weak password vulnera… | 2022-05-04T09:37:46.759000Z |
| var-202105-1620 | TL-WDR8500 is a router product of TP-LINK. The TP-Link router has a buffer overflow v… | 2022-05-04T09:37:46.749000Z |
| var-202105-1641 | Shenzhen Heweishun Network Technology Co., Ltd. provides high-speed, safe, and easy-to-ma… | 2022-05-04T09:37:46.738000Z |
| var-202105-1662 | Hangzhou Guanhang Technology Co., Ltd. is an innovative intelligent network solution manu… | 2022-05-04T09:37:46.726000Z |
| var-202105-1683 | H3C WAC380-30 is a gateway wireless controller independently developed by New H3C Technol… | 2022-05-04T09:37:46.716000Z |
| var-202105-1704 | Anhui Xieda Software Technology Co., Ltd. was established on May 16, 2008. The legal repr… | 2022-05-04T09:37:46.706000Z |
| var-202106-2010 | NETGEAR DGN2200v3 is a wireless router. NETGEAR DGN2200v3 has a weak password vulnera… | 2022-05-04T09:37:46.058000Z |
| var-202106-2031 | D-Link DIR-809 is a wireless router using RTOS. D-Link DIR-809 has a binary vulnerabi… | 2022-05-04T09:37:46.048000Z |
| var-202106-2033 | RG-NBS2026G is a switch launched by Beijing Xingwang Ruijie Network Technology Co., Ltd. … | 2022-05-04T09:37:46.032000Z |
| var-202106-2054 | ZXV10 W815N is a wireless router of ZTE Corporation. ZTE Corporation ZXV10 W815N has … | 2022-05-04T09:37:46.020000Z |
| var-202106-2075 | RG-NBR700G is an Internet behavior management router launched by Ruijie. It is a router d… | 2022-05-04T09:37:46.009000Z |
| var-202104-1977 | Quick control configuration software is a monitoring software used in industrial power an… | 2022-05-04T09:37:47.595000Z |
| var-202104-1998 | DrayTek Vigor series routers are dual WAN port security firewall routers designed for med… | 2022-05-04T09:37:47.585000Z |
| var-202104-2019 | Smart Wi-Fi is a router product of Linksys. The Linksys Smart Wi-Fi router has a weak… | 2022-05-04T09:37:47.576000Z |
| var-202104-2040 | Shanghai Aitai Technology Co., Ltd. enterprising 750W is an enterprise-class wireless rou… | 2022-05-04T09:37:47.564000Z |
| var-202104-2061 | Tangshan Liulin Automation Equipment Co., Ltd. is a high-tech enterprise specializing in … | 2022-05-04T09:37:47.548000Z |
| var-202104-2082 | RG-EG Easy Gateway Management System is a multi-service integrated gateway product launch… | 2022-05-04T09:37:47.537000Z |
| var-202103-1638 | TL-ER7520G is a new generation of all-gigabit enterprise router products. Universal T… | 2022-05-04T09:37:48.901000Z |
| var-202103-1660 | H3C ER3200 is a router of New H3C Technology Co., Ltd. New H3C Technology Co., Ltd. H… | 2022-05-04T09:37:48.890000Z |
| var-202103-1681 | HG8346M is a Huawei router. Huawei HG8346M FTTH has a denial of service vulnerability… | 2022-05-04T09:37:48.880000Z |
| var-202103-1702 | Inhantong InRouter900 series industrial routers are 4G industrial routers. Inhantong … | 2022-05-04T09:37:48.870000Z |
| var-202103-1723 | TP-Link TL-R483G is a multi-WAN port gigabit enterprise VPN router. TP-Link TL-R483G … | 2022-05-04T09:37:48.859000Z |
| var-202103-1744 | Xiamen Baima Technology Co., Ltd. focuses on the Industrial Internet of Things (IIoT: Ind… | 2022-05-04T09:37:48.848000Z |
| var-202103-1766 | Allen-Bradley ControlLogix 5571 is a programmable automation controller of the ControlLog… | 2022-05-04T09:37:48.832000Z |
| var-202103-1787 | ZTE Corporation is the world's leading provider of integrated communications solutions. … | 2022-05-04T09:37:48.821000Z |
| var-202103-1808 | Hikvision is a video-centric intelligent IoT solution and big data service provider. … | 2022-05-04T09:37:48.811000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2015-000190 | EC-CUBE plugin BbAdminViewsControl vulnerable to SQL injection | 2015-12-03T14:26+09:00 | 2016-07-07T14:53+09:00 |
| jvndb-2015-000191 | GANMA! App for iOS fails to verify SSL server certificates | 2015-12-07T14:21+09:00 | 2018-03-07T13:50+09:00 |
| jvndb-2015-000196 | Web Analytics Service vulnerable to cross-site scripting | 2015-12-08T14:29+09:00 | 2016-01-07T15:13+09:00 |
| jvndb-2015-000192 | WL-330NUL information management vulnerability | 2015-12-09T14:38+09:00 | 2016-01-13T17:37+09:00 |
| jvndb-2015-000193 | WL-330NUL vulnerable to remote command execution | 2015-12-09T14:41+09:00 | 2016-01-13T17:37+09:00 |
| jvndb-2015-000194 | WL-330NUL vulnerable to denial-of-service (DoS) | 2015-12-09T14:47+09:00 | 2016-01-13T17:37+09:00 |
| jvndb-2015-000195 | WL-330NUL vulnerable to cross-site scripting | 2015-12-09T14:51+09:00 | 2016-01-13T17:37+09:00 |
| jvndb-2015-000197 | Zend Framework vulnerable to SQL injection | 2015-12-11T13:46+09:00 | 2018-04-11T11:32+09:00 |
| jvndb-2015-000199 | WinRAR may insecurely load executable files | 2015-12-17T15:19+09:00 | 2016-01-07T15:36+09:00 |
| jvndb-2015-000200 | Welcart vulnerable to SQL injection | 2015-12-17T15:19+09:00 | 2016-01-07T15:37+09:00 |
| jvndb-2015-005234 | Adobe Flash Player issue where iframe contents may be overwritten | 2015-12-17T15:19+09:00 | 2015-12-17T15:19+09:00 |
| jvndb-2015-006129 | Multiple Cross-site Scripting Vulnerabilities in EUR | 2015-12-17T16:18+09:00 | 2015-12-28T13:54+09:00 |
| jvndb-2015-006130 | Vulnerability in JP1/Automatic Job Management System 3 | 2015-12-17T16:19+09:00 | 2016-09-14T18:18+09:00 |
| jvndb-2015-000201 | CG-WLBARGS does not properly perform authentication | 2015-12-25T14:33+09:00 | 2016-01-07T15:32+09:00 |
| jvndb-2015-000202 | CG-WLBARAGM may behave as an open proxy | 2015-12-25T14:45+09:00 | 2016-01-07T15:32+09:00 |
| jvndb-2015-000203 | CG-WLNCM4G may behave as an open resolver | 2015-12-25T14:45+09:00 | 2016-01-07T15:32+09:00 |
| jvndb-2015-006527 | Cross-site Scripting Vulnerability in uCosminexus Portal Framework and Groupmax Collaboration | 2015-12-28T13:51+09:00 | 2016-02-10T14:36+09:00 |
| jvndb-2016-000001 | DX Library vulnerable to buffer overflow | 2016-01-05T14:26+09:00 | 2016-06-08T18:06+09:00 |
| jvndb-2016-000002 | acmailer vulnerable to OS command injection | 2016-01-15T13:57+09:00 | 2016-01-27T17:20+09:00 |
| jvndb-2016-000003 | H2O vulnerable to HTTP header injection | 2016-01-15T13:57+09:00 | 2016-01-27T17:33+09:00 |
| jvndb-2016-000004 | Shoplat App for iOS issue in the verification of SSL certificates | 2016-01-18T14:24+09:00 | 2017-05-23T13:57+09:00 |
| jvndb-2016-000005 | Multiple Buffalo network devices vulnerable to cross-site request forgery | 2016-01-22T14:36+09:00 | 2016-03-10T17:53+09:00 |
| jvndb-2016-000006 | Multiple Buffalo network devices vulnerable to cross-site scripting | 2016-01-22T14:36+09:00 | 2016-03-10T17:53+09:00 |
| jvndb-2016-000007 | HOME SPOT CUBE vulnerable to cross-site scripting | 2016-01-27T14:40+09:00 | 2016-02-16T17:26+09:00 |
| jvndb-2016-000008 | HOME SPOT CUBE vulnerable to open redirect | 2016-01-27T14:40+09:00 | 2016-02-16T17:26+09:00 |
| jvndb-2016-000009 | HOME SPOT CUBE vulnerable to HTTP header injection | 2016-01-27T14:40+09:00 | 2016-02-16T17:26+09:00 |
| jvndb-2016-000010 | HOME SPOT CUBE vulnerable to cross-site request forgery | 2016-01-27T14:40+09:00 | 2016-02-16T17:26+09:00 |
| jvndb-2016-000011 | HOME SPOT CUBE vulnerable to clickjacking | 2016-01-27T14:40+09:00 | 2016-02-16T17:26+09:00 |
| jvndb-2016-000012 | HOME SPOT CUBE vulnerable to OS command injection | 2016-01-27T14:40+09:00 | 2016-02-16T17:26+09:00 |
| jvndb-2016-000015 | EXPRESSCLUSTER X vulnerable to directory traversal | 2016-01-29T13:45+09:00 | 2016-03-16T14:24+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-01328 | xdg-utils 'xdg-open'远程命令注入漏洞 | 2015-02-21 | 2015-02-28 |
| cnvd-2015-01329 | Saurus CMS存在多个漏洞 | 2015-02-21 | 2015-02-28 |
| cnvd-2015-01330 | Cosmoshop 'index.cgi'跨站脚本漏洞 | 2015-02-21 | 2015-02-28 |
| cnvd-2015-01331 | Dell Asset Manager存在多个SQL注入漏洞 | 2015-02-21 | 2015-02-28 |
| cnvd-2015-01332 | D-Link DIR-645存在多个漏洞 | 2015-02-21 | 2015-02-28 |
| cnvd-2015-01333 | Cit-e-Net Cit-e-Access存在多个跨站脚本漏洞 | 2015-02-21 | 2015-02-28 |
| cnvd-2015-01334 | C-BOARD Moyuku远程代码执行漏洞 | 2015-02-21 | 2015-02-28 |
| cnvd-2015-01335 | Google Email Application for Android拒绝服务漏洞 | 2015-02-21 | 2015-02-28 |
| cnvd-2015-01336 | IBM Tivoli Endpoint Manager Web Reports组件跨站脚本漏洞 | 2015-02-21 | 2015-02-28 |
| cnvd-2015-01174 | Samba任意代码执行漏洞 | 2015-02-25 | 2015-02-26 |
| cnvd-2015-01185 | Mozilla Firefox 'nsXMLHttpRequest::GetResponse'堆内存破坏漏洞 | 2015-02-25 | 2015-02-26 |
| cnvd-2015-01186 | Mozilla Firefox堆缓冲区溢出漏洞(CNVD-2015-01186) | 2015-02-25 | 2015-02-26 |
| cnvd-2015-01187 | Mozilla Firefox缓冲区溢出漏洞 | 2015-02-25 | 2015-02-26 |
| cnvd-2015-01188 | Mozilla Firefox安全绕过漏洞(CNVD-2015-01188) | 2015-02-25 | 2015-02-26 |
| cnvd-2015-01189 | Mozilla Firefox拒绝服务漏洞(CNVD-2015-01189) | 2015-02-25 | 2015-02-26 |
| cnvd-2015-01190 | Mozilla Firefox错误引用拒绝服务漏洞 | 2015-02-25 | 2015-02-26 |
| cnvd-2015-01191 | Mozilla Firefox堆缓冲区溢出漏洞(CNVD-2015-01191) | 2015-02-25 | 2015-02-26 |
| cnvd-2015-01192 | Mozilla Firefox/Thunderbird任意文件读取漏洞 | 2015-02-25 | 2015-02-26 |
| cnvd-2015-01193 | Mozilla Firefox Caja Compiler沙盒绕过漏洞 | 2015-02-25 | 2015-02-26 |
| cnvd-2015-01194 | Mozilla Firefox安全绕过漏洞(CNVD-2015-01194) | 2015-02-25 | 2015-02-26 |
| cnvd-2015-01195 | Mozilla Firefox存在未明漏洞 | 2015-02-25 | 2015-02-26 |
| cnvd-2015-01298 | OpenJDK安全限制绕过漏洞 | 2015-02-25 | 2015-02-28 |
| cnvd-2015-01200 | Jetty信息泄露漏洞 | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01201 | WordPress插件WP Slimstat弱加密漏洞 | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01202 | VideoLAN libbluray目录遍历漏洞 | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01219 | SAP HANA存在多个跨站脚本漏洞 | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01234 | SAP BussinessObjects Edge未授权访问漏洞(CNVD-2015-01234) | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01235 | SAP BussinessObjects Edge未授权访问漏洞(CNVD-2015-01235) | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01236 | SAP BussinessObjects Edge未授权访问漏洞(CNVD-2015-01236) | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01237 | SAP BussinessObjects Edge安全绕过漏洞 | 2015-02-26 | 2015-02-27 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2003-avi-116 | Vulnérabilité dans DirectX | 2003-07-24T00:00:00.000000 | 2003-07-24T00:00:00.000000 |
| certa-2003-avi-117 | Vulnérabilités dans MS-SQL Server | 2003-07-24T00:00:00.000000 | 2003-07-24T00:00:00.000000 |
| certa-2003-avi-118 | Multiples vulnérabilités dans le noyau linux 2.4 | 2003-07-24T00:00:00.000000 | 2003-07-24T00:00:00.000000 |
| certa-2003-avi-119 | Vulnérabilité IPv6 dans Solaris 8 | 2003-07-24T00:00:00.000000 | 2003-07-24T00:00:00.000000 |
| CERTA-2003-AVI-120 | Vulnérabilité dans la suite Oracle E-Business | 2003-07-25T00:00:00.000000 | 2003-07-25T00:00:00.000000 |
| CERTA-2003-AVI-121 | Débordement de mémoire dans le programme FNDWRR de la suite Oracle E-Business | 2003-07-25T00:00:00.000000 | 2003-07-25T00:00:00.000000 |
| CERTA-2003-AVI-122 | Vulnérabilité dans EXTPROC d'Oracle Database Server | 2003-07-25T00:00:00.000000 | 2003-07-25T00:00:00.000000 |
| CERTA-2003-AVI-123 | Vulnérabilité dans les serveurs Novell Netware | 2003-07-25T00:00:00.000000 | 2003-07-25T00:00:00.000000 |
| CERTA-2003-AVI-124 | Vulnérabilité de VMware pour plates-formes Linux | 2003-07-25T00:00:00.000000 | 2003-07-25T00:00:00.000000 |
| CERTA-2003-AVI-125 | Vulnérabilité de Merge de SCO UnixWare | 2003-07-25T00:00:00.000000 | 2003-07-25T00:00:00.000000 |
| CERTA-2003-AVI-126 | Vulnérabilité de Workgroup Manager de MacOS X | 2003-07-25T00:00:00.000000 | 2003-07-25T00:00:00.000000 |
| certa-2003-avi-120 | Vulnérabilité dans la suite Oracle E-Business | 2003-07-25T00:00:00.000000 | 2003-07-25T00:00:00.000000 |
| certa-2003-avi-121 | Débordement de mémoire dans le programme FNDWRR de la suite Oracle E-Business | 2003-07-25T00:00:00.000000 | 2003-07-25T00:00:00.000000 |
| certa-2003-avi-122 | Vulnérabilité dans EXTPROC d'Oracle Database Server | 2003-07-25T00:00:00.000000 | 2003-07-25T00:00:00.000000 |
| certa-2003-avi-123 | Vulnérabilité dans les serveurs Novell Netware | 2003-07-25T00:00:00.000000 | 2003-07-25T00:00:00.000000 |
| certa-2003-avi-124 | Vulnérabilité de VMware pour plates-formes Linux | 2003-07-25T00:00:00.000000 | 2003-07-25T00:00:00.000000 |
| certa-2003-avi-125 | Vulnérabilité de Merge de SCO UnixWare | 2003-07-25T00:00:00.000000 | 2003-07-25T00:00:00.000000 |
| certa-2003-avi-126 | Vulnérabilité de Workgroup Manager de MacOS X | 2003-07-25T00:00:00.000000 | 2003-07-25T00:00:00.000000 |
| CERTA-2003-AVI-127 | Vulnérabilité dans l'éditeur de liens dynamiques sur Solaris | 2003-07-31T00:00:00.000000 | 2003-08-01T00:00:00.000000 |
| CERTA-2003-AVI-128 | Vulnérabilité dans CISCO IOS | 2003-07-31T00:00:00.000000 | 2003-07-31T00:00:00.000000 |
| CERTA-2003-AVI-129 | Vulnérabilité du serveur HTTP dans CISCO IOS | 2003-07-31T00:00:00.000000 | 2003-07-31T00:00:00.000000 |
| CERTA-2003-AVI-130 | Vulnérabilité de l'application Stunnel | 2003-07-31T00:00:00.000000 | 2003-07-31T00:00:00.000000 |
| certa-2003-avi-127 | Vulnérabilité dans l'éditeur de liens dynamiques sur Solaris | 2003-07-31T00:00:00.000000 | 2003-08-01T00:00:00.000000 |
| certa-2003-avi-128 | Vulnérabilité dans CISCO IOS | 2003-07-31T00:00:00.000000 | 2003-07-31T00:00:00.000000 |
| certa-2003-avi-129 | Vulnérabilité du serveur HTTP dans CISCO IOS | 2003-07-31T00:00:00.000000 | 2003-07-31T00:00:00.000000 |
| certa-2003-avi-130 | Vulnérabilité de l'application Stunnel | 2003-07-31T00:00:00.000000 | 2003-07-31T00:00:00.000000 |
| CERTA-2003-AVI-131 | Vulnérabilité sur les gardes-barrières NetScreen | 2003-08-01T00:00:00.000000 | 2003-08-01T00:00:00.000000 |
| CERTA-2003-AVI-132 | Vulnérabilité du serveur wu-ftpd | 2003-08-01T00:00:00.000000 | 2003-09-04T00:00:00.000000 |
| CERTA-2003-AVI-133 | Multiples failles dans McAfee »Security ePolicy Orchestrator» | 2003-08-01T00:00:00.000000 | 2003-08-01T00:00:00.000000 |
| certa-2003-avi-131 | Vulnérabilité sur les gardes-barrières NetScreen | 2003-08-01T00:00:00.000000 | 2003-08-01T00:00:00.000000 |