Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0687 |
N/A
|
Auction Weaver CGI script 1.03 and earlier allows… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:40.809Z |
| CVE-2000-0688 |
N/A
|
Subscribe Me LITE does not properly authenticate … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.094Z |
| CVE-2000-0689 |
N/A
|
Account Manager LITE does not properly authentica… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:40.974Z |
| CVE-2000-0690 |
N/A
|
Auction Weaver CGI script 1.02 and earlier allows… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:40.887Z |
| CVE-2000-0691 |
N/A
|
The faxrunq and faxrunqd in the mgetty package al… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.134Z |
| CVE-2000-0692 |
N/A
|
ISS RealSecure 3.2.1 and 3.2.2 allows remote atta… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.483Z |
| CVE-2000-0695 |
N/A
|
Buffer overflows in pgxconfig in the Raptor GFX c… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:40.807Z |
| CVE-2000-0696 |
N/A
|
The administration interface for the dwhttpd web … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.103Z |
| CVE-2000-0697 |
N/A
|
The administration interface for the dwhttpd web … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.437Z |
| CVE-2000-0701 |
N/A
|
The wrapper program in mailman 2.0beta3 and 2.0be… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.187Z |
| CVE-2000-0704 |
N/A
|
Buffer overflow in SGI Omron WorldView Wnn allows… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.165Z |
| CVE-2000-0709 |
N/A
|
The shtml.exe component of Microsoft FrontPage 20… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.478Z |
| CVE-2000-0710 |
N/A
|
The shtml.exe component of Microsoft FrontPage 20… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:40.980Z |
| CVE-2000-0713 |
N/A
|
Buffer overflow in Adobe Acrobat 4.05, Reader, Bu… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.031Z |
| CVE-2000-0714 |
N/A
|
umb-scheme 3.2-11 for Red Hat Linux is installed … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.232Z |
| CVE-2000-0715 |
N/A
|
DiskCheck script diskcheck.pl in Red Hat Linux 6.… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:40.779Z |
| CVE-2000-0719 |
N/A
|
VariCAD 7.0 is installed with world-writeable fil… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.520Z |
| CVE-2000-0721 |
N/A
|
The FSserial, FlagShip_c, and FlagShip_p programs… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.464Z |
| CVE-2000-0722 |
N/A
|
Helix GNOME Updater helix-update 0.5 and earlier … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.474Z |
| CVE-2000-0723 |
N/A
|
Helix GNOME Updater helix-update 0.5 and earlier … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.135Z |
| CVE-2000-0724 |
N/A
|
The go-gnome Helix GNOME pre-installer allows loc… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.189Z |
| CVE-2000-0734 |
N/A
|
eEye IRIS 1.01 beta allows remote attackers to ca… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.473Z |
| CVE-2000-0735 |
N/A
|
Buffer overflow in Becky! Internet Mail client 1.… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.539Z |
| CVE-2000-0736 |
N/A
|
Buffer overflow in Becky! Internet Mail client 1.… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.237Z |
| CVE-2000-0746 |
N/A
|
Vulnerabilities in IIS 4.0 and 5.0 do not properl… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.328Z |
| CVE-2000-0748 |
N/A
|
OpenLDAP 1.2.11 and earlier improperly installs t… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.569Z |
| CVE-2000-0752 |
N/A
|
Buffer overflows in brouted in FreeBSD and possib… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.444Z |
| CVE-2000-0755 |
N/A
|
Vulnerability in the newgrp command in HP-UX 11.0… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.415Z |
| CVE-2000-0756 |
N/A
|
Microsoft Outlook 2000 does not properly process … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.422Z |
| CVE-2000-0757 |
N/A
|
The sysgen service in Aptis Totalbill does not pe… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.461Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0687 |
N/A
|
Auction Weaver CGI script 1.03 and earlier allows… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:40.809Z |
| CVE-2000-0688 |
N/A
|
Subscribe Me LITE does not properly authenticate … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.094Z |
| CVE-2000-0689 |
N/A
|
Account Manager LITE does not properly authentica… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:40.974Z |
| CVE-2000-0690 |
N/A
|
Auction Weaver CGI script 1.02 and earlier allows… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:40.887Z |
| CVE-2000-0691 |
N/A
|
The faxrunq and faxrunqd in the mgetty package al… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.134Z |
| CVE-2000-0692 |
N/A
|
ISS RealSecure 3.2.1 and 3.2.2 allows remote atta… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.483Z |
| CVE-2000-0695 |
N/A
|
Buffer overflows in pgxconfig in the Raptor GFX c… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:40.807Z |
| CVE-2000-0696 |
N/A
|
The administration interface for the dwhttpd web … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.103Z |
| CVE-2000-0697 |
N/A
|
The administration interface for the dwhttpd web … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.437Z |
| CVE-2000-0701 |
N/A
|
The wrapper program in mailman 2.0beta3 and 2.0be… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.187Z |
| CVE-2000-0704 |
N/A
|
Buffer overflow in SGI Omron WorldView Wnn allows… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.165Z |
| CVE-2000-0709 |
N/A
|
The shtml.exe component of Microsoft FrontPage 20… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.478Z |
| CVE-2000-0710 |
N/A
|
The shtml.exe component of Microsoft FrontPage 20… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:40.980Z |
| CVE-2000-0713 |
N/A
|
Buffer overflow in Adobe Acrobat 4.05, Reader, Bu… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.031Z |
| CVE-2000-0714 |
N/A
|
umb-scheme 3.2-11 for Red Hat Linux is installed … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.232Z |
| CVE-2000-0715 |
N/A
|
DiskCheck script diskcheck.pl in Red Hat Linux 6.… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:40.779Z |
| CVE-2000-0719 |
N/A
|
VariCAD 7.0 is installed with world-writeable fil… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.520Z |
| CVE-2000-0721 |
N/A
|
The FSserial, FlagShip_c, and FlagShip_p programs… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.464Z |
| CVE-2000-0722 |
N/A
|
Helix GNOME Updater helix-update 0.5 and earlier … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.474Z |
| CVE-2000-0723 |
N/A
|
Helix GNOME Updater helix-update 0.5 and earlier … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.135Z |
| CVE-2000-0724 |
N/A
|
The go-gnome Helix GNOME pre-installer allows loc… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.189Z |
| CVE-2000-0734 |
N/A
|
eEye IRIS 1.01 beta allows remote attackers to ca… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.473Z |
| CVE-2000-0735 |
N/A
|
Buffer overflow in Becky! Internet Mail client 1.… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.539Z |
| CVE-2000-0736 |
N/A
|
Buffer overflow in Becky! Internet Mail client 1.… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.237Z |
| CVE-2000-0746 |
N/A
|
Vulnerabilities in IIS 4.0 and 5.0 do not properl… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.328Z |
| CVE-2000-0748 |
N/A
|
OpenLDAP 1.2.11 and earlier improperly installs t… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.569Z |
| CVE-2000-0752 |
N/A
|
Buffer overflows in brouted in FreeBSD and possib… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.444Z |
| CVE-2000-0755 |
N/A
|
Vulnerability in the newgrp command in HP-UX 11.0… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.415Z |
| CVE-2000-0756 |
N/A
|
Microsoft Outlook 2000 does not properly process … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.422Z |
| CVE-2000-0757 |
N/A
|
The sysgen service in Aptis Totalbill does not pe… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.461Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-1999-1530 | cgiwrap as used on Cobalt RaQ 2.0 and RaQ 3i does not properly identify the user for running certai… | 1999-11-08T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1550 | bigconf.conf in F5 BIG/ip 2.1.2 and earlier allows remote attackers to read arbitrary files by spec… | 1999-11-08T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2001-0679 | A buffer overflow in InterScan VirusWall 3.23 and 3.3 allows a remote attacker to execute arbitrary… | 1999-11-08T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0832 | Buffer overflow in NFS server on Linux allows attackers to execute commands via a long pathname. | 1999-11-09T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0983 | Whois Internic Lookup program whois.cgi allows remote attackers to execute commands via shell metac… | 1999-11-09T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0984 | Matt's Whois program whois.cgi allows remote attackers to execute commands via shell metacharacters… | 1999-11-09T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0985 | CC Whois program whois.cgi allows remote attackers to execute commands via shell metacharacters in … | 1999-11-09T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1111 | Vulnerability in StackGuard before 1.21 allows remote attackers to bypass the Random and Terminator… | 1999-11-09T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1112 | Buffer overflow in IrfanView32 3.07 and earlier allows attackers to execute arbitrary commands via … | 1999-11-09T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0833 | Buffer overflow in BIND 8.2 via NXT records. | 1999-11-10T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0835 | Denial of service in BIND named via malformed SIG records. | 1999-11-10T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0837 | Denial of service in BIND by improperly closing TCP sessions via so_linger. | 1999-11-10T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0848 | Denial of service in BIND named via consuming more than "fdmax" file descriptors. | 1999-11-10T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0849 | Denial of service in BIND named via maxdname. | 1999-11-10T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0851 | Denial of service in BIND named via naptr. | 1999-11-10T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1511 | Buffer overflows in Xtramail 1.11 allow attackers to cause a denial of service (crash) and possibly… | 1999-11-10T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1539 | Buffer overflow in FTP server in QPC Software's QVT/Term Plus versions 4.2d and 4.3 and QVT/Net 4.3… | 1999-11-10T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0329 | A Microsoft ActiveX control allows a remote attacker to execute a malicious cabinet file via an att… | 1999-11-11T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1050 | Directory traversal vulnerability in Matt Wright FormHandler.cgi script allows remote attackers to … | 1999-11-12T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0330 | The networking software in Windows 95 and Windows 98 allows remote attackers to execute commands vi… | 1999-11-12T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0165 | The Delegate application proxy has several buffer overflows which allow a remote attacker to execut… | 1999-11-13T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1110 | Windows Media Player ActiveX object as used in Internet Explorer 5.0 returns a specific error code … | 1999-11-14T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1528 | ProSoft Netware Client 5.12 on Macintosh MacOS 9 does not automatically log a user out of the NDS t… | 1999-11-14T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1190 | Buffer overflow in POP3 server of Admiral Systems EmailClub 1.05 allows remote attackers to execute… | 1999-11-15T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1051 | Default configuration in Matt Wright FormHandler.cgi script allows arbitrary directories to be used… | 1999-11-16T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1457 | Buffer overflow in thttpd HTTP server before 2.04-31 allows remote attackers to execute arbitrary c… | 1999-11-16T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1508 | Web server in Tektronix PhaserLink Printer 840.0 and earlier allows a remote attacker to gain admin… | 1999-11-16T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1549 | Lynx 2.x does not properly distinguish between internal and external HTML, which may allow a local … | 1999-11-16T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0793 | Internet Explorer allows remote attackers to read files by redirecting data to a Javascript applet. | 1999-11-17T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1092 | tin 1.40 creates the .tin directory with insecure permissions, which allows local users to read pas… | 1999-11-17T05:00:00.000 | 2025-04-03T01:03:51.193 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-23gj-368h-92pq |
7.5 (3.1)
|
Path Traversal in DKPro Core | 2019-05-29T18:05:11Z | 2021-08-04T15:17:12Z |
| ghsa-h896-mx9x-g32g |
7.5 (3.1)
|
XML External Entity injection in Apache Camel | 2019-05-29T18:15:50Z | 2022-11-17T17:55:41Z |
| ghsa-gh4g-3gm9-5wrq |
6.1 (3.1)
|
Cross-Site Scripting in shave | 2019-05-29T18:38:08Z | 2021-08-04T16:06:35Z |
| ghsa-g86p-hgx5-2pfh |
9.8 (3.1)
9.3 (4.0)
|
Improper Authentication in Buildbot | 2019-05-29T18:48:11Z | 2024-09-13T17:46:56Z |
| ghsa-2hw2-62cp-p9p7 |
5.9 (3.1)
|
Access control bypass in Apache ZooKeeper | 2019-05-29T18:54:11Z | 2021-07-27T20:54:44Z |
| ghsa-ww4x-rwq6-qpgf |
8.8 (3.1)
|
OmniAuth Ruby gem Cross-site Request Forgery in request phase | 2019-05-29T19:11:31Z | 2024-02-15T15:03:15Z |
| ghsa-2xv3-h762-ccxv |
|
Out-of-bounds Read in concat-with-sourcemaps | 2019-05-29T19:18:02Z | 2020-08-31T18:31:05Z |
| ghsa-qr32-j4j6-3m7r |
|
Command Injection in fs-git | 2019-05-29T20:23:00Z | 2020-08-31T18:20:27Z |
| ghsa-p72p-rjr2-r439 |
|
Server-Side Request Forgery in terriajs-server | 2019-05-29T20:24:02Z | 2020-08-31T18:35:03Z |
| ghsa-2hwp-g4g7-mwwj |
|
Reflected Cross-Site Scripting in jquery.terminal | 2019-05-29T20:25:35Z | 2020-08-31T18:35:05Z |
| ghsa-jjpq-gp5q-8q6w |
6.1 (3.1)
|
Cross-site scripting in Apache Tomcat | 2019-05-30T03:30:42Z | 2024-03-11T14:33:57Z |
| ghsa-6qh5-wx38-q92g |
|
Directory Traversal in ltt.js | 2019-05-30T17:15:59Z | 2020-08-31T18:22:04Z |
| ghsa-xf7w-r453-m56c |
7.5 (3.1)
|
Arbitrary File Overwrite in fstream | 2019-05-30T17:19:34Z | 2021-08-04T20:12:16Z |
| ghsa-87mg-h5r3-hw88 |
|
Cross-Site Scripting in bootbox | 2019-05-30T17:23:28Z | 2021-09-16T21:01:13Z |
| ghsa-27v7-qhfv-rqq8 |
3.3 (3.1)
|
Insecure Credential Storage in web3 | 2019-05-30T17:26:30Z | 2021-08-31T20:56:47Z |
| ghsa-j59f-6m4q-62h6 |
7.5 (3.1)
|
Improper Key Verification in ipns | 2019-05-30T17:28:48Z | 2023-12-07T22:05:54Z |
| ghsa-jj6g-7j8p-7gf2 |
|
Cross-Site Scripting in bracket-template | 2019-05-30T21:03:24Z | 2020-08-31T18:29:43Z |
| ghsa-37pw-qw47-4jxm |
8.8 (3.1)
|
Privilege escalation vulnerability in Apache Hadoop | 2019-05-31T16:09:15Z | 2021-05-11T16:17:59Z |
| ghsa-xm28-fw2x-fqv2 |
7.5 (3.1)
|
Denial of Service in foreman | 2019-05-31T23:08:14Z | 2021-08-04T21:19:17Z |
| ghsa-xrmp-99wj-p6jc |
7.3 (3.1)
|
Prototype Pollution in deap | 2019-05-31T23:43:09Z | 2021-08-04T21:21:43Z |
| ghsa-vmhw-fhj6-m3g5 |
|
Path Traversal in angular-http-server | 2019-05-31T23:46:33Z | 2020-08-31T18:31:33Z |
| ghsa-7jfh-2xc9-ccv7 |
|
Cross-Site Scripting in public | 2019-05-31T23:46:40Z | 2020-08-31T18:29:45Z |
| ghsa-j4mr-9xw3-c9jx |
|
Out-of-bounds Read in base64-url | 2019-05-31T23:47:01Z | 2020-08-31T18:31:43Z |
| ghsa-8xqr-4cpm-wx7g |
|
Cross-Site Scripting in react-svg | 2019-05-31T23:47:27Z | 2020-08-31T18:31:14Z |
| ghsa-xc7v-wxcw-j472 |
|
Memory Exposure in tunnel-agent | 2019-06-03T17:08:26Z | 2020-08-31T18:29:19Z |
| ghsa-g74r-ffvr-5q9f |
|
Memory Exposure in concat-stream | 2019-06-03T17:26:44Z | 2020-08-31T18:29:17Z |
| ghsa-f7r3-p866-q9qr |
3.7 (3.1)
|
ircdkit vulnerable to Denial of Service due to unhandled connection end event | 2019-06-03T17:27:49Z | 2022-08-03T16:34:42Z |
| ghsa-wrw9-m778-g6mc |
|
Memory Exposure in bl | 2019-06-03T17:27:57Z | 2020-08-31T18:29:15Z |
| ghsa-h9x2-5rm7-x4gm |
|
Insecure Comparison in secure-compare | 2019-06-03T17:28:23Z | 2020-08-31T18:09:18Z |
| ghsa-cff4-rrq6-h78w |
|
Command Injection in command-exists | 2019-06-03T17:31:26Z | 2020-08-31T18:31:41Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-210 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:34.367051Z |
| pysec-2021-211 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:34.535736Z |
| pysec-2021-212 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:34.716646Z |
| pysec-2021-213 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:34.891385Z |
| pysec-2021-214 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:35.059356Z |
| pysec-2021-215 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:35.223640Z |
| pysec-2021-216 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:35.384566Z |
| pysec-2021-217 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:35.567916Z |
| pysec-2021-218 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:35.737731Z |
| pysec-2021-219 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:35.924594Z |
| pysec-2021-220 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:36.144215Z |
| pysec-2021-221 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:36.340283Z |
| pysec-2021-222 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite computa… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:36.517027Z |
| pysec-2021-223 |
|
TensorFlow is an end-to-end open source platform for machine learning. Optimized pooling … | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:36.699869Z |
| pysec-2021-224 |
|
TensorFlow is an end-to-end open source platform for machine learning. The `Prepare` step… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:36.876924Z |
| pysec-2021-225 |
|
TensorFlow is an end-to-end open source platform for machine learning. The optimized impl… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:37.053061Z |
| pysec-2021-226 |
|
TensorFlow is an end-to-end open source platform for machine learning. The reference impl… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:37.235055Z |
| pysec-2021-227 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:37.400702Z |
| pysec-2021-228 |
|
TensorFlow is an end-to-end open source platform for machine learning. TFlite graphs must… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:37.582991Z |
| pysec-2021-229 |
|
TensorFlow is an end-to-end open source platform for machine learning. The fix for CVE-20… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:37.768858Z |
| pysec-2021-230 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:37.941172Z |
| pysec-2021-231 |
|
TensorFlow is an end-to-end open source platform for machine learning. TFLite's convoluti… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:38.125295Z |
| pysec-2021-232 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:38.313497Z |
| pysec-2021-233 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:38.479573Z |
| pysec-2021-234 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:38.644851Z |
| pysec-2021-235 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:38.832523Z |
| pysec-2021-236 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.020093Z |
| pysec-2021-237 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.194303Z |
| pysec-2021-238 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.383979Z |
| pysec-2021-239 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.570829Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-362 | Malicious code in @insulet/fetlife-assets (npm) | 2022-06-20T18:20:20Z | 2022-06-20T18:20:21Z |
| mal-2022-363 | Malicious code in @investnext/fetlife-assets (npm) | 2022-06-20T18:20:20Z | 2022-06-20T18:20:21Z |
| MAL-2022-365 | Malicious code in @israelhayom/fetlife-assets (npm) | 2022-06-20T18:20:21Z | 2022-06-20T18:20:21Z |
| MAL-2022-368 | Malicious code in @jerusalem/fetlife-assets (npm) | 2022-06-20T18:20:21Z | 2022-06-20T18:20:21Z |
| MAL-2022-371 | Malicious code in @jnjmobile/fetlife-assets (npm) | 2022-06-20T18:20:21Z | 2022-06-20T18:20:25Z |
| MAL-2022-374 | Malicious code in @justauth/fetlife-assets (npm) | 2022-06-20T18:20:21Z | 2022-06-20T18:20:22Z |
| mal-2022-365 | Malicious code in @israelhayom/fetlife-assets (npm) | 2022-06-20T18:20:21Z | 2022-06-20T18:20:21Z |
| mal-2022-368 | Malicious code in @jerusalem/fetlife-assets (npm) | 2022-06-20T18:20:21Z | 2022-06-20T18:20:21Z |
| mal-2022-371 | Malicious code in @jnjmobile/fetlife-assets (npm) | 2022-06-20T18:20:21Z | 2022-06-20T18:20:25Z |
| mal-2022-374 | Malicious code in @justauth/fetlife-assets (npm) | 2022-06-20T18:20:21Z | 2022-06-20T18:20:22Z |
| MAL-2022-375 | Malicious code in @kaspersky/fetlife-assets (npm) | 2022-06-20T18:20:22Z | 2022-06-20T18:20:22Z |
| MAL-2022-376 | Malicious code in @keybank/fetlife-assets (npm) | 2022-06-20T18:20:22Z | 2022-06-20T18:20:23Z |
| MAL-2022-379 | Malicious code in @kimley-horn/fetlife-assets (npm) | 2022-06-20T18:20:22Z | 2022-06-20T18:20:22Z |
| MAL-2022-382 | Malicious code in @kindredext/fetlife-assets (npm) | 2022-06-20T18:20:22Z | 2022-06-20T18:20:23Z |
| mal-2022-375 | Malicious code in @kaspersky/fetlife-assets (npm) | 2022-06-20T18:20:22Z | 2022-06-20T18:20:22Z |
| mal-2022-376 | Malicious code in @keybank/fetlife-assets (npm) | 2022-06-20T18:20:22Z | 2022-06-20T18:20:23Z |
| mal-2022-379 | Malicious code in @kimley-horn/fetlife-assets (npm) | 2022-06-20T18:20:22Z | 2022-06-20T18:20:22Z |
| mal-2022-382 | Malicious code in @kindredext/fetlife-assets (npm) | 2022-06-20T18:20:22Z | 2022-06-20T18:20:23Z |
| MAL-2022-384 | Malicious code in @kolikkopelit/fetlife-assets (npm) | 2022-06-20T18:20:23Z | 2022-06-20T18:20:23Z |
| MAL-2022-389 | Malicious code in @localizejs/fetlife-assets (npm) | 2022-06-20T18:20:23Z | 2022-06-20T18:20:24Z |
| MAL-2022-400 | Malicious code in @loofah/fetlife-assets (npm) | 2022-06-20T18:20:23Z | 2022-06-20T18:20:24Z |
| MAL-2022-401 | Malicious code in @lowes/fetlife-assets (npm) | 2022-06-20T18:20:23Z | 2022-06-20T18:20:24Z |
| mal-2022-384 | Malicious code in @kolikkopelit/fetlife-assets (npm) | 2022-06-20T18:20:23Z | 2022-06-20T18:20:23Z |
| mal-2022-389 | Malicious code in @localizejs/fetlife-assets (npm) | 2022-06-20T18:20:23Z | 2022-06-20T18:20:24Z |
| mal-2022-400 | Malicious code in @loofah/fetlife-assets (npm) | 2022-06-20T18:20:23Z | 2022-06-20T18:20:24Z |
| mal-2022-401 | Malicious code in @lowes/fetlife-assets (npm) | 2022-06-20T18:20:23Z | 2022-06-20T18:20:24Z |
| MAL-2022-407 | Malicious code in @maariv/fetlife-assets (npm) | 2022-06-20T18:20:24Z | 2022-06-20T18:20:24Z |
| MAL-2022-408 | Malicious code in @maccabi4u/fetlife-assets (npm) | 2022-06-20T18:20:24Z | 2022-06-20T18:20:25Z |
| MAL-2022-410 | Malicious code in @mainwp/fetlife-assets (npm) | 2022-06-20T18:20:24Z | 2022-06-20T18:20:25Z |
| MAL-2022-419 | Malicious code in @mariacasino/fetlife-assets (npm) | 2022-06-20T18:20:24Z | 2022-06-20T18:20:25Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-0174 | Red Hat OpenStack: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-05-01T22:00:00.000+00:00 | 2023-04-12T22:00:00.000+00:00 |
| wid-sec-w-2022-0282 | QEMU: Mehrere Schwachstellen | 2022-05-01T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2022-0575 | Python: Schwachstelle ermöglicht Codeausführung | 2022-05-01T22:00:00.000+00:00 | 2024-03-27T23:00:00.000+00:00 |
| wid-sec-w-2022-0008 | libxml2: Schwachstelle ermöglicht Codeausführung | 2022-05-02T22:00:00.000+00:00 | 2024-12-03T23:00:00.000+00:00 |
| wid-sec-w-2022-0360 | FasterXML Jackson: Schwachstelle ermöglicht Denial of Service | 2022-05-02T22:00:00.000+00:00 | 2024-05-28T22:00:00.000+00:00 |
| wid-sec-w-2022-0507 | Angular: Schwachstelle ermöglicht Denial of Service | 2022-05-02T22:00:00.000+00:00 | 2023-09-05T22:00:00.000+00:00 |
| wid-sec-w-2022-0071 | OpenSSL: Mehrere Schwachstellen | 2022-05-03T22:00:00.000+00:00 | 2025-02-13T23:00:00.000+00:00 |
| wid-sec-w-2022-0537 | Mozilla Firefox und Mozilla Firefox ESR: Mehrere Schwachstellen | 2022-05-03T22:00:00.000+00:00 | 2025-04-01T22:00:00.000+00:00 |
| wid-sec-w-2022-0538 | Mozilla Thunderbird: Mehrere Schwachstellen | 2022-05-04T22:00:00.000+00:00 | 2025-04-01T22:00:00.000+00:00 |
| wid-sec-w-2023-0455 | OpenLDAP: Schwachstelle ermöglicht Manipulation von Dateien | 2022-05-04T22:00:00.000+00:00 | 2024-10-14T22:00:00.000+00:00 |
| wid-sec-w-2022-0123 | rsyslog: Schwachstelle ermöglicht Codeausführung | 2022-05-05T22:00:00.000+00:00 | 2024-08-11T22:00:00.000+00:00 |
| wid-sec-w-2022-0417 | Red Hat OpenShift Service Mesh: Mehrere Schwachstellen | 2022-05-05T22:00:00.000+00:00 | 2025-12-01T23:00:00.000+00:00 |
| wid-sec-w-2022-1311 | poppler: Schwachstelle ermöglicht Denial of Service | 2022-05-05T22:00:00.000+00:00 | 2024-02-27T23:00:00.000+00:00 |
| wid-sec-w-2022-0009 | ImageMagick: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-05-08T22:00:00.000+00:00 | 2024-08-05T22:00:00.000+00:00 |
| wid-sec-w-2022-0124 | vim: Mehrere Schwachstellen | 2022-05-08T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0971 | Red Hat OpenShift: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-05-08T22:00:00.000+00:00 | 2023-02-20T23:00:00.000+00:00 |
| wid-sec-w-2022-2353 | Foxit Reader: Mehrere Schwachstellen | 2022-05-08T22:00:00.000+00:00 | 2022-12-18T23:00:00.000+00:00 |
| wid-sec-w-2024-2211 | xpdf: Schwachstelle ermöglicht Denial of Service | 2022-05-09T22:00:00.000+00:00 | 2024-09-24T22:00:00.000+00:00 |
| wid-sec-w-2022-0011 | Python: Mehrere Schwachstellen | 2022-05-10T22:00:00.000+00:00 | 2024-12-01T23:00:00.000+00:00 |
| wid-sec-w-2022-0072 | AMD Prozessoren: Mehrere Schwachstellen ermöglichen Offenlegung von Informationen | 2022-05-10T22:00:00.000+00:00 | 2025-02-16T23:00:00.000+00:00 |
| wid-sec-w-2022-0073 | AMD Prozessoren: Mehrere Schwachstellen | 2022-05-10T22:00:00.000+00:00 | 2025-02-16T23:00:00.000+00:00 |
| wid-sec-w-2022-0126 | vim: Mehrere Schwachstellen | 2022-05-10T22:00:00.000+00:00 | 2023-04-03T22:00:00.000+00:00 |
| wid-sec-w-2022-0177 | Linux Kernel: Schwachstelle ermöglicht Denial of Service und Offenlegung von Informationen | 2022-05-10T22:00:00.000+00:00 | 2023-06-28T22:00:00.000+00:00 |
| wid-sec-w-2022-0277 | cURL: Mehrere Schwachstellen | 2022-05-10T22:00:00.000+00:00 | 2023-07-04T22:00:00.000+00:00 |
| wid-sec-w-2022-0323 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-05-10T22:00:00.000+00:00 | 2023-02-15T23:00:00.000+00:00 |
| wid-sec-w-2022-0361 | VMware Tanzu Spring Framework: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-05-10T22:00:00.000+00:00 | 2024-03-20T23:00:00.000+00:00 |
| wid-sec-w-2022-0795 | zsh: Schwachstelle ermöglicht Codeausführung | 2022-05-10T22:00:00.000+00:00 | 2024-06-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1447 | Red Hat Enterprise Linux (flatpak): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-05-10T22:00:00.000+00:00 | 2024-06-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1453 | Intel Prozessoren: Schwachstelle ermöglicht Denial of Service | 2022-05-10T22:00:00.000+00:00 | 2022-12-26T23:00:00.000+00:00 |
| wid-sec-w-2022-1836 | Red Hat Enterprise Linux (BlueZ): Schwachstelle ermöglicht Denial of Service | 2022-05-10T22:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2005:435 | Red Hat Security Advisory: mozilla security update | 2005-05-23T09:42:00+00:00 | 2026-01-08T09:18:32+00:00 |
| rhsa-2005_435 | Red Hat Security Advisory: mozilla security update | 2005-05-23T09:42:00+00:00 | 2024-11-21T23:55:15+00:00 |
| rhsa-2005:473 | Red Hat Security Advisory: lesstif security update | 2005-05-24T17:17:00+00:00 | 2025-11-21T17:29:08+00:00 |
| rhsa-2005_473 | Red Hat Security Advisory: lesstif security update | 2005-05-24T17:17:00+00:00 | 2024-11-21T23:24:22+00:00 |
| rhsa-2005:427 | Red Hat Security Advisory: ethereal security update | 2005-05-24T17:27:00+00:00 | 2026-01-08T09:18:28+00:00 |
| rhsa-2005_427 | Red Hat Security Advisory: ethereal security update | 2005-05-24T17:27:00+00:00 | 2024-11-21T23:46:23+00:00 |
| rhsa-2005:413 | Red Hat Security Advisory: ImageMagick security update | 2005-05-25T16:14:00+00:00 | 2026-01-08T09:18:24+00:00 |
| rhsa-2005_413 | Red Hat Security Advisory: ImageMagick security update | 2005-05-25T16:14:00+00:00 | 2024-11-21T23:43:46+00:00 |
| rhsa-2005:472 | Red Hat Security Advisory: kernel security update | 2005-05-25T16:42:00+00:00 | 2026-01-08T09:18:33+00:00 |
| rhsa-2005_472 | Red Hat Security Advisory: kernel security update | 2005-05-25T16:42:00+00:00 | 2024-11-21T23:52:14+00:00 |
| rhsa-2005:430 | Red Hat Security Advisory: gnutls security update | 2005-06-01T13:11:00+00:00 | 2025-11-21T17:29:06+00:00 |
| rhsa-2005_430 | Red Hat Security Advisory: gnutls security update | 2005-06-01T13:11:00+00:00 | 2024-11-21T23:46:40+00:00 |
| rhsa-2005:433 | Red Hat Security Advisory: postgresql security update | 2005-06-01T13:24:00+00:00 | 2026-01-08T09:18:30+00:00 |
| rhsa-2005_433 | Red Hat Security Advisory: postgresql security update | 2005-06-01T13:24:00+00:00 | 2024-11-21T23:47:13+00:00 |
| rhsa-2005:476 | Red Hat Security Advisory: openssl security update | 2005-06-01T13:32:00+00:00 | 2025-11-21T17:29:09+00:00 |
| rhsa-2005_476 | Red Hat Security Advisory: openssl security update | 2005-06-01T13:32:00+00:00 | 2024-11-22T00:00:47+00:00 |
| rhsa-2005:480 | Red Hat Security Advisory: ImageMagick security update | 2005-06-02T14:30:00+00:00 | 2025-11-21T17:29:09+00:00 |
| rhsa-2005_480 | Red Hat Security Advisory: ImageMagick security update | 2005-06-02T14:30:00+00:00 | 2024-11-21T23:47:58+00:00 |
| rhsa-2005:481 | Red Hat Security Advisory: openssh security update | 2005-06-02T14:31:00+00:00 | 2025-11-21T17:29:09+00:00 |
| rhsa-2005_481 | Red Hat Security Advisory: openssh security update | 2005-06-02T14:31:00+00:00 | 2024-11-21T23:26:35+00:00 |
| rhsa-2005:416 | Red Hat Security Advisory: kdbg security update | 2005-06-02T14:32:00+00:00 | 2025-11-21T17:29:05+00:00 |
| rhsa-2005_416 | Red Hat Security Advisory: kdbg security update | 2005-06-02T14:32:00+00:00 | 2024-11-21T23:44:25+00:00 |
| rhsa-2005:102 | Red Hat Security Advisory: dbus security update. | 2005-06-08T15:00:00+00:00 | 2025-11-21T17:28:27+00:00 |
| rhsa-2005_102 | Red Hat Security Advisory: dbus security update. | 2005-06-08T15:00:00+00:00 | 2024-11-21T23:28:25+00:00 |
| rhsa-2005:165 | Red Hat Security Advisory: rsh security update | 2005-06-08T15:01:00+00:00 | 2025-11-21T17:28:36+00:00 |
| rhsa-2005_165 | Red Hat Security Advisory: rsh security update | 2005-06-08T15:01:00+00:00 | 2024-11-21T23:26:31+00:00 |
| rhsa-2005:420 | Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 1 | 2005-06-08T15:12:00+00:00 | 2026-01-08T09:18:28+00:00 |
| rhsa-2005_420 | Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 1 | 2005-06-08T15:12:00+00:00 | 2024-11-21T23:56:38+00:00 |
| rhsa-2005:198 | Red Hat Security Advisory: xorg-x11 security update | 2005-06-08T15:33:00+00:00 | 2025-11-21T17:28:38+00:00 |
| rhsa-2005_198 | Red Hat Security Advisory: xorg-x11 security update | 2005-06-08T15:33:00+00:00 | 2024-11-21T23:24:06+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsma-20-196-01 | Capsule Technologies SmartLinx Neuron 2 (Update A) | 2020-07-14T00:00:00.000000Z | 2020-10-20T00:00:00.000000Z |
| icsa-20-205-01 | Schneider Electric Triconex TriStation and Tricon Communication Module | 2020-07-23T00:00:00.000000Z | 2020-07-23T00:00:00.000000Z |
| icsa-20-210-01 | Secomea GateManager | 2020-07-28T00:00:00.000000Z | 2020-07-28T00:00:00.000000Z |
| icsa-20-210-02 | Softing Industrial Automation OPC | 2020-07-28T00:00:00.000000Z | 2020-07-28T00:00:00.000000Z |
| icsa-20-210-03 | HMS Industrial Networks eCatcher | 2020-07-28T00:00:00.000000Z | 2020-07-28T00:00:00.000000Z |
| icsa-20-212-01 | Inductive Automation Ignition 8 | 2020-07-30T00:00:00.000000Z | 2020-07-30T00:00:00.000000Z |
| icsa-20-212-02 | ICSA-20-212-02_Mitsubishi Electric Multiple Factory Automation Engineering Software Products (Update A) | 2020-07-30T00:00:00.000000Z | 2022-09-30T00:00:00.000000Z |
| icsa-20-212-03 | Mitsubishi Electric Factory Automation Products Path Traversal (Update C) | 2020-07-30T00:00:00.000000Z | 2021-05-27T00:00:00.000000Z |
| icsa-20-212-04 | Mitsubishi Electric Factory Automation Engineering Products | 2020-07-30T00:00:00.000000Z | 2022-12-09T00:00:00.000000Z |
| icsma-20-212-01 | Philips DreamMapper | 2020-07-30T00:00:00.000000Z | 2020-07-30T00:00:00.000000Z |
| icsa-20-217-01 | Delta Industrial Automation CNCSoft ScreenEditor | 2020-08-04T00:00:00.000000Z | 2020-08-04T00:00:00.000000Z |
| icsa-20-219-01 | Trailer Power Line Communications | 2020-08-06T00:00:00.000000Z | 2020-08-06T00:00:00.000000Z |
| icsa-20-219-02 | Advantech WebAccess HMI Designer | 2020-08-06T00:00:00.000000Z | 2020-08-06T00:00:00.000000Z |
| icsa-20-219-03 | Geutebrück G-Cam and G-Code | 2020-08-06T00:00:00.000000Z | 2020-08-06T00:00:00.000000Z |
| icsa-20-219-04 | Delta Industrial Automation TPEditor | 2020-08-06T00:00:00.000000Z | 2020-08-06T00:00:00.000000Z |
| icsa-20-224-01 | Yokogawa CENTUM (Update A) | 2020-08-11T00:00:00.000000Z | 2021-01-05T00:00:00.000000Z |
| icsa-20-224-02 | Schneider Electric APC Easy UPS On-Line | 2020-08-11T00:00:00.000000Z | 2020-08-11T00:00:00.000000Z |
| icsa-20-224-03 | Tridium Niagara | 2020-08-11T00:00:00.000000Z | 2020-08-11T00:00:00.000000Z |
| icsa-20-224-04 | Siemens SCALANCE, RUGGEDCOM | 2020-08-11T00:00:00.000000Z | 2020-08-11T00:00:00.000000Z |
| icsa-20-224-05 | Siemens SIMATIC, SIMOTICS (Update A) | 2020-08-11T00:00:00.000000Z | 2020-12-08T00:00:00.000000Z |
| icsa-20-224-06 | Siemens Desigo CC | 2020-08-11T00:00:00.000000Z | 2020-08-11T00:00:00.000000Z |
| icsa-20-224-07 | Siemens Automation License Manager | 2020-08-11T00:00:00.000000Z | 2020-08-11T00:00:00.000000Z |
| icsa-20-224-08 | Siemens SICAM A8000 RTUs | 2020-08-11T00:00:00.000000Z | 2020-08-11T00:00:00.000000Z |
| icsa-20-203-01 | Wibu-Systems CodeMeter (Update F) | 2020-08-20T00:00:00.000000Z | 2022-03-10T00:00:00.000000Z |
| icsma-20-233-01 | Philips SureSigns VS4 | 2020-08-20T00:00:00.000000Z | 2020-08-20T00:00:00.000000Z |
| icsa-20-238-01 | Advantech iView | 2020-08-25T00:00:00.000000Z | 2020-08-25T00:00:00.000000Z |
| icsa-20-238-02 | Emerson OpenEnterprise | 2020-08-25T00:00:00.000000Z | 2020-08-25T00:00:00.000000Z |
| icsa-20-238-03 | WECON LeviStudioU (Update C) | 2020-08-25T00:00:00.000000Z | 2020-12-03T00:00:00.000000Z |
| icsa-20-240-01 | Red Lion N-Tron 702-W, 702M12-W | 2020-08-27T00:00:00.000000Z | 2020-08-27T00:00:00.000000Z |
| icsa-20-245-01 | Mitsubishi Electric Multiple Products (Update G) | 2020-09-01T06:00:00.000000Z | 2024-06-13T06:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-iosxe-rsp3-rce-jvhg8z7c | Cisco IOS XE Software for Cisco ASR 900 Series Route Switch Processor 3 Arbitrary Code Execution Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-umbrella-dos-t2qmux37 | Cisco IOS XE Software for Catalyst 9200 Series Switches Umbrella Connector Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iosxe-wlc-fnfv9-evraqpnx | Cisco IOS XE Software for Catalyst 9800 Series and Cisco AireOS Software for Cisco WLC Flexible NetFlow Version 9 Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-iox-usb-guestshell-wmevscdj | Cisco IOS XE Software IOx Guest Shell USB SSD Namespace Protection Privilege Escalation Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-ipsla-jw2djmsv | Cisco IOS XE Software IP Service Level Agreements Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-isr4461-gkkurohx | Cisco IOS XE Software for Cisco 4461 Integrated Services Routers Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-jp-dos-g5ffgm8y | Cisco Catalyst 9200 Series Switches Jumbo Frame Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-le-drtob625 | Cisco IOS XE Software Ethernet Frame Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-mdns-dos-3th6ca9j | Cisco IOS XE Software for Catalyst 9800 Series Wireless Controllers Multicast DNS Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-profinet-j9qmchpb | Cisco IOS and IOS XE Software PROFINET Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-12-09T15:09:18+00:00 |
| cisco-sa-rommon-secboot-7jgvlvyc | Cisco IOS XE ROM Monitor Software Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-splitdns-spwqpdgw | Cisco IOS and IOS XE Software Split DNS Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-unauth-file-access-ebtwkkvw | Cisco IOS XE Software Guest Shell Unauthorized File System Access Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-web-ui-exnfmcpo | Cisco IOS XE Software Web UI Improper Input Validation Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-webui-auth-bypass-6j2byuc7 | Cisco IOS XE Software Web UI Authorization Bypass Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-wpa-dos-cxshjerc | Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family WPA Denial of Service Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-xbace-oncebys | Cisco IOS XE Software Arbitrary Code Execution Vulnerability | 2020-09-24T16:00:00+00:00 | 2020-11-02T15:15:42+00:00 |
| cisco-sa-zbfw-94ckg4g | Cisco IOS XE Software Zone-Based Firewall Denial of Service Vulnerabilities | 2020-09-24T16:00:00+00:00 | 2020-09-24T16:00:00+00:00 |
| cisco-sa-cdp-memleak-heyebx9 | Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Memory Leak Vulnerability | 2020-10-07T16:00:00+00:00 | 2020-10-07T16:00:00+00:00 |
| cisco-sa-cdp-rcedos-mahr8vnx | Cisco Video Surveillance 8000 Series IP Cameras Cisco Discovery Protocol Remote Code Execution and Denial of Service Vulnerability | 2020-10-07T16:00:00+00:00 | 2020-10-07T16:00:00+00:00 |
| cisco-sa-cvdsd-missing-auth-rqo88rnj | Cisco Vision Dynamic Signage Director Missing Authentication Vulnerability | 2020-10-07T16:00:00+00:00 | 2020-10-07T16:00:00+00:00 |
| cisco-sa-esa-url-bypass-zztugtg3 | Cisco Email Security Appliance URL Filtering Bypass Vulnerability | 2020-10-07T16:00:00+00:00 | 2020-10-07T16:00:00+00:00 |
| cisco-sa-expressway-vcs-dos-n6xxtmzb | Cisco Expressway Series and TelePresence Video Communication Server Denial of Service Vulnerability | 2020-10-07T16:00:00+00:00 | 2020-10-07T16:00:00+00:00 |
| cisco-sa-fmc-xss-ylrjqqu | Cisco Firepower Management Center Cross-Site Scripting Vulnerability | 2020-10-07T16:00:00+00:00 | 2020-10-07T16:00:00+00:00 |
| cisco-sa-ind-dos-bwg634zn | Cisco Industrial Network Director Denial of Service Vulnerability | 2020-10-07T16:00:00+00:00 | 2020-10-07T16:00:00+00:00 |
| cisco-sa-ise-auth-bypass-ujwqltzm | Cisco Identity Services Engine Authorization Bypass Vulnerability | 2020-10-07T16:00:00+00:00 | 2020-10-07T16:00:00+00:00 |
| cisco-sa-ise-xxs-mf5cbyx5 | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2020-10-07T16:00:00+00:00 | 2020-10-07T16:00:00+00:00 |
| cisco-sa-ndb-path-traversal-wvdyxzpy | Cisco Nexus Data Broker Software Path Traversal Vulnerability | 2020-10-07T16:00:00+00:00 | 2020-10-07T16:00:00+00:00 |
| cisco-sa-sdwan-xss-xxelfpc3 | Cisco SD-WAN vManage Cross-Site Scripting Vulnerability | 2020-10-07T16:00:00+00:00 | 2020-10-07T16:00:00+00:00 |
| cisco-sa-staros-priv-esc-ggcumfxv | Cisco StarOS Privilege Escalation Vulnerability | 2020-10-07T16:00:00+00:00 | 2020-10-07T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-39191 | URL Redirection to Untrusted Site ('Open Redirect') in mod_auth_openidc | 2021-09-02T00:00:00.000Z | 2022-01-19T00:00:00.000Z |
| msrc_cve-2021-39251 | A crafted NTFS image can cause a NULL pointer dereference in ntfs_extent_inode_open in NTFS-3G < 2021.8.22. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-39252 | A crafted NTFS image can cause an out-of-bounds read in ntfs_ie_lookup in NTFS-3G < 2021.8.22. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-39253 | A crafted NTFS image can cause an out-of-bounds read in ntfs_runlists_merge_i in NTFS-3G < 2021.8.22. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-39254 | A crafted NTFS image can cause an integer overflow in memmove leading to a heap-based buffer overflow in the function ntfs_attr_record_resize in NTFS-3G < 2021.8.22. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-39255 | A crafted NTFS image can trigger an out-of-bounds read caused by an invalid attribute in ntfs_attr_find_in_attrdef in NTFS-3G < 2021.8.22. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-39256 | A crafted NTFS image can cause a heap-based buffer overflow in ntfs_inode_lookup_by_name in NTFS-3G < 2021.8.22. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-39257 | A crafted NTFS image with an unallocated bitmap can lead to a endless recursive function call chain (starting from ntfs_attr_pwrite) causing stack consumption in NTFS-3G < 2021.8.22. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-39258 | A crafted NTFS image can cause out-of-bounds reads in ntfs_attr_find and ntfs_external_attr_find in NTFS-3G < 2021.8.22. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-39259 | A crafted NTFS image can trigger an out-of-bounds access caused by an unsanitized attribute length in ntfs_inode_lookup_by_name in NTFS-3G < 2021.8.22. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-39260 | A crafted NTFS image can cause an out-of-bounds access in ntfs_inode_sync_standard_information in NTFS-3G < 2021.8.22. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-39261 | A crafted NTFS image can cause a heap-based buffer overflow in ntfs_compressed_pwrite in NTFS-3G < 2021.8.22. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-39262 | A crafted NTFS image can cause an out-of-bounds access in ntfs_decompress in NTFS-3G < 2021.8.22. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-39263 | A crafted NTFS image can trigger a heap-based buffer overflow caused by an unsanitized attribute in ntfs_get_attribute_value in NTFS-3G < 2021.8.22. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-39275 | ap_escape_quotes buffer overflow | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-39537 | An issue was discovered in ncurses through v6.2-1. _nc_captoinfo in captoinfo.c has a heap-based buffer overflow. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-40438 | mod_proxy SSRF | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-40490 | A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-40528 | The ElGamal implementation in Libgcrypt before 1.9.4 allows plaintext recovery because during interaction between two cryptographic libraries a certain dangerous combination of the prime defined by the receiver's public key the generator defined by the receiver's public key and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP. | 2021-09-02T00:00:00.000Z | 2021-09-14T00:00:00.000Z |
| msrc_cve-2021-40812 | The GD Graphics Library (aka LibGD) through 2.3.2 has an out-of-bounds read because of the lack of certain gdGetBuf and gdPutBuf return value checks. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-41054 | tftpd_file.c in atftp through 0.7.4 has a buffer overflow because buffer-size handling does not properly consider the combination of data OACK and other options. | 2021-09-02T00:00:00.000Z | 2021-09-25T00:00:00.000Z |
| msrc_cve-2021-41072 | squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem. | 2021-09-02T00:00:00.000Z | 2022-01-20T00:00:00.000Z |
| msrc_cve-2021-41073 | loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows local users to gain privileges by using IORING_OP_PROVIDE_BUFFERS to trigger a free of a kernel buffer as demonstrated by using /proc/<pid>/maps for exploitation. | 2021-09-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-41617 | sshd in OpenSSH 6.2 through 8.x before 8.8 when certain non-default configurations are used allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process if the configuration specifies running the command as a different user. | 2021-09-02T00:00:00.000Z | 2021-10-02T00:00:00.000Z |
| msrc_cve-2020-27304 | The CivetWeb web library does not validate uploaded filepaths when running on an OS other than Windows when using the built-in HTTP form-based file upload mechanism via the mg_handle_form_request API. Web applications that use the file upload form handler and use parts of the user-controlled filename in the output path are susceptible to directory traversal | 2021-10-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2021-21703 | PHP-FPM memory access in root process leading to privilege escalation | 2021-10-02T00:00:00.000Z | 2025-10-01T23:11:07.000Z |
| msrc_cve-2021-21704 | Multiple vulnerabilities in Firebird client extension | 2021-10-02T00:00:00.000Z | 2025-10-01T23:11:08.000Z |
| msrc_cve-2021-21705 | Incorrect URL validation in FILTER_VALIDATE_URL | 2021-10-02T00:00:00.000Z | 2025-10-01T23:11:08.000Z |
| msrc_cve-2021-22930 | Node.js before 16.6.0 14.17.4 and 12.22.4 is vulnerable to a use after free attack where an attacker might be able to exploit the memory corruption to change process behavior. | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-2471 | Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Connectors accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. CVSS 3.1 Base Score 5.9 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-10-27T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202103-1321 | Using unsafe PendingIntent in Samsung Notes prior to version 4.2.00.22 allows local attac… | 2022-05-04T09:37:49.117000Z |
| var-202102-1521 | The business scope of New H3C Technology Co., Ltd. includes: technology development, tech… | 2022-05-04T09:37:50.903000Z |
| var-202102-1542 | The RG-NBR series is an Internet behavior management router launched by Ruijie. It is a r… | 2022-05-04T09:37:50.892000Z |
| var-202102-1563 | Shenzhen Jixiang Tengda Technology Co., Ltd. was founded in 1999. It is a professional su… | 2022-05-04T09:37:50.876000Z |
| var-202102-1584 | TL-XDR1850 is a wireless router. TP-Link TL-XDR1850 easy to show version has a denial… | 2022-05-04T09:37:50.865000Z |
| var-202102-1605 | CMCC R3S-3 is a router. China Mobile Internet of Things Co., Ltd. CMCC R3S-3 has an u… | 2022-05-04T09:37:50.853000Z |
| var-202102-1626 | EasyBuilder Pro is an HMI software developed by Weilun. EasyBuilder Pro has a binary … | 2022-05-04T09:37:50.842000Z |
| var-202101-1962 | Rockchip Microelectronics Co., Ltd. has a R&D team specializing in system-level chip desi… | 2022-05-04T09:37:55.141000Z |
| var-202101-1983 | Tricon safety instrumented system is the safety instrumented system of Schneider Electric… | 2022-05-04T09:37:55.131000Z |
| var-202101-2007 | ACS Motion Control is an OEM-oriented motion controller and drive solutions provider head… | 2022-05-04T09:37:55.119000Z |
| var-202101-2028 | Beijing Century Changqiu Technology Co., Ltd. is a high-tech enterprise engaged in the re… | 2022-05-04T09:37:55.107000Z |
| var-202012-1580 | LTE digital cellular mobile communication network MME equipment is an important network e… | 2022-05-04T09:37:56.472000Z |
| var-202012-1602 | Omron Group is a manufacturer of automation control and electronic equipment. Omron A… | 2022-05-04T09:37:56.460000Z |
| var-202012-1623 | Mi 9 is a mobile phone released by Xiaomi at the Beijing University of Technology Gymnasi… | 2022-05-04T09:37:56.448000Z |
| var-202011-1527 | Harbin Zhonglong Baiying Technology Development Co., Ltd. was established on May 29, 2013… | 2022-05-04T09:37:58.121000Z |
| var-202011-1548 | Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. A… | 2022-05-04T09:37:58.109000Z |
| var-202011-1569 | Advantech WebAccess/HMI Designer is a man-machine interface integrated development tool. … | 2022-05-04T09:37:58.099000Z |
| var-202011-1591 | EPON RL821GWV-D is a router. Richerlink EPON RL821GWV-D has an information disclosure… | 2022-05-04T09:37:58.085000Z |
| var-202010-1599 | China Mobile Yu Router is a router. There are unauthorized access vulnerabilities in … | 2022-05-04T09:37:59.203000Z |
| var-202010-1620 | Chengdu Zhifeng Technology Co., Ltd. was established in October 2016. It is an emerging h… | 2022-05-04T09:37:59.193000Z |
| var-202010-1641 | Shanghai ZLAN Information Technology Co., Ltd. is a high-tech enterprise that provides in… | 2022-05-04T09:37:59.181000Z |
| var-202009-1684 | Tenda G1 is an enterprise-level AP management router with 100 people. The Tenda G1 ro… | 2022-05-04T09:38:01.134000Z |
| var-202009-1705 | GX Work2 is a PLC programming software developed by Mitsubishi Electric Automation Co., L… | 2022-05-04T09:38:01.122000Z |
| var-202008-1296 | Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture. A… | 2022-05-04T09:38:05.588000Z |
| var-202008-1317 | VxWorks is a real-time operating system launched by Wind River Systems, Inc. of the Unite… | 2022-05-04T09:38:05.576000Z |
| var-202007-1488 | TPEditor is the programming software used by Delta Electronic Programmable Display Series… | 2022-05-04T09:38:06.700000Z |
| var-202007-1509 | Shanghai ZLAN Information Technology Co., Ltd. is a high-tech enterprise providing indust… | 2022-05-04T09:38:06.687000Z |
| var-202006-1815 | Multiple vulnerabilities in the Cisco IOx application environment of Cisco 809 and 829 In… | 2022-05-04T09:38:08.763000Z |
| var-202006-1889 | Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chi… | 2022-05-04T09:38:08.294000Z |
| var-202006-1910 | Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chi… | 2022-05-04T09:38:08.280000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000016 | Vine MV vulnerable to cross-site scripting | 2016-01-29T13:50+09:00 | 2016-02-10T10:19+09:00 |
| jvndb-2016-000017 | JOB-CUBE vulnerable to cross-site scripting | 2016-01-29T14:06+09:00 | 2016-03-04T17:47+09:00 |
| jvndb-2016-000019 | Akerun - Smart Lock Robot App for iOS fails to verify SSL server certificates | 2016-02-12T15:59+09:00 | 2017-05-23T12:25+09:00 |
| jvndb-2016-000018 | Microsoft Producer for Microsoft Office PowerPoint vulnerable to cross-site scripting | 2016-02-15T09:56+09:00 | 2016-02-15T09:56+09:00 |
| jvndb-2016-000020 | Cybozu Office vulnerable to denial-of-service (DoS) | 2016-02-15T15:43+09:00 | 2016-02-23T16:32+09:00 |
| jvndb-2016-000021 | Cybozu Office vulnerable to information disclosure | 2016-02-15T15:44+09:00 | 2016-02-23T16:32+09:00 |
| jvndb-2016-000022 | Cybozu Office vulnerable to information disclosure | 2016-02-15T15:44+09:00 | 2016-02-23T16:32+09:00 |
| jvndb-2016-000023 | Cybozu Office access restriction bypass vulnerability | 2016-02-15T15:45+09:00 | 2016-02-23T16:32+09:00 |
| jvndb-2016-000024 | Cybozu Office vulnerable to cross-site request forgery | 2016-02-15T16:20+09:00 | 2016-02-23T16:32+09:00 |
| jvndb-2016-000025 | Cybozu Office vulnerable to open redirect | 2016-02-15T16:20+09:00 | 2016-02-23T16:32+09:00 |
| jvndb-2016-000026 | Cybozu Office vulnerable to cross-site scripting | 2016-02-15T16:21+09:00 | 2016-06-06T15:00+09:00 |
| jvndb-2016-000028 | Internet Explorer cross-domain policy bypass | 2016-02-19T14:39+09:00 | 2016-02-23T11:23+09:00 |
| jvndb-2016-000030 | baserCMS vulnerable to OS command injection | 2016-02-19T14:39+09:00 | 2016-03-07T15:51+09:00 |
| jvndb-2016-000027 | EC-CUBE plugin "Help plug-in" vulnerable to SQL injection | 2016-02-19T14:42+09:00 | 2016-03-03T17:51+09:00 |
| jvndb-2016-000029 | LINE for Windows and LINE for Mac OS vulnerable to denial-of-service (DoS) | 2016-02-19T14:43+09:00 | 2016-03-10T17:39+09:00 |
| jvndb-2016-000031 | Log-Chat vulnerable to cross-site scripting | 2016-02-22T14:56+09:00 | 2016-02-25T15:10+09:00 |
| jvndb-2016-001472 | Remote File Inclusion Vulnerability in Hitachi Command Suite | 2016-02-25T16:09+09:00 | 2016-09-14T18:18+09:00 |
| jvndb-2016-000032 | Multiple Corega wireless LAN routers vulnerable to cross-site request forgery | 2016-03-02T14:52+09:00 | 2016-03-16T13:46+09:00 |
| jvndb-2016-001559 | Information Disclosure Vulnerability in Hitachi Compute Systems Manager | 2016-03-07T17:00+09:00 | 2016-03-31T17:50+09:00 |
| jvndb-2016-000034 | WordPress plugin "WP Favorite Posts" vulnerable to cross-site scripting | 2016-03-24T12:28+09:00 | 2016-03-29T15:40+09:00 |
| jvndb-2016-000035 | Aterm WF800HP vulnerable to cross-site request forgery | 2016-03-30T14:49+09:00 | 2016-04-18T15:42+09:00 |
| jvndb-2016-000036 | Aterm WG300HP vulnerable to cross-site request forgery | 2016-03-30T14:49+09:00 | 2016-04-18T15:41+09:00 |
| jvndb-2016-000037 | WisePoint contains issue in preventing clickjacking attacks | 2016-04-04T15:30+09:00 | 2016-04-07T12:05+09:00 |
| jvndb-2016-000038 | ActiveX control for EVA Animator vulnerable to buffer overflow | 2016-04-04T15:30+09:00 | 2016-04-20T09:38+09:00 |
| jvndb-2016-000039 | AQUOS Photo Player HN-PP150 vulnerable to cross-site request forgery | 2016-04-04T15:30+09:00 | 2016-04-07T12:05+09:00 |
| jvndb-2016-000040 | baserCMS plugin "Recruit Plugin" vulnerable to cross-site scripting | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000041 | baserCMS plugin "Recruit Plugin" vulnerable to cross-site request forgery | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000042 | baserCMS plugin "Menubook Plugin" vulnerable to cross-site scripting | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000043 | baserCMS plugin "Menubook Plugin" vulnerable to cross-site request forgery | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000044 | baserCMS plugin "Casebook Plugin" vulnerable to cross-site scripting | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-01242 | FreeBSD远程拒绝服务漏洞(CNVD-2015-01242) | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01243 | TYPO3 CMS认证绕过漏洞 | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01244 | Zeuscart存在多个漏洞 | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01251 | IBM Tivoli Storage Manager本地信息泄露漏洞 | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01279 | WordPress插件Apptha WordPress Video Gallery SQL注入漏洞 | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01280 | Lexmark Markvision Enterprise LibraryFileUploadServlet servlet目录遍历漏洞 | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01281 | WordPress插件WooCommerce跨站脚本漏洞(CNVD-2015-01281) | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01282 | Persistent Systems Radia Client Automation代码注入漏洞 | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01283 | RhodeCode信息泄露漏洞 | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01284 | MyBB存在多个HTML注入漏洞 | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01285 | GNU glibc 'libio/wstrops.c'整数溢出漏洞 | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01286 | Mozilla Firefox缓冲区溢出漏洞(CNVD-2015-01286) | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01287 | Mozilla Firefox/Thunderbird存在未明内存破坏漏洞(CNVD-2015-01287) | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01288 | Mozilla Firefox中间人信息泄露漏洞 | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01289 | Mozilla Firefox内存破坏漏洞(CNVD-2015-01289) | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01290 | Mozilla Firefox拒绝服务漏洞(CNVD-2015-01290) | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01291 | Mozilla Firefox/Thunderbird拒绝服务漏洞(CNVD-2015-01291) | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01292 | Mozilla Firefox/Firefox ESR/Thunderbird DLL加载任意代码执行漏洞 | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01293 | Mozilla Firefox/Thunderbird存在未明内存破坏漏洞(CNVD-2015-01293) | 2015-02-26 | 2015-02-27 |
| cnvd-2015-01323 | libcsoap 'nanohttp-server.c'拒绝服务漏洞 | 2015-02-26 | 2015-02-28 |
| cnvd-2015-01324 | libcsoap 'nanohttp-server.c'缓冲区溢出漏洞 | 2015-02-26 | 2015-02-28 |
| cnvd-2015-01337 | Schneider Electric DTM缓冲区溢出漏洞 | 2015-02-26 | 2015-02-28 |
| cnvd-2015-01338 | mod-gnutls 'gnutls_hooks.c'安全绕过漏洞 | 2015-02-26 | 2015-02-28 |
| cnvd-2015-01349 | PHP内存错误引用远程代码执行漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01351 | AL-Mail32附件名拒绝服务漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01352 | AL-Mail32附件名目录遍历漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01353 | Cisco IOS XR Software IPv6报文处理拒绝服务漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01354 | Linux Kernel 'rds/sysctl.c'本地信息泄露漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01355 | Todd Miller Sudo本地安全绕过漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01356 | Zen Cart跨站脚本漏洞 | 2015-02-26 | 2015-03-02 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2003-avi-132 | Vulnérabilité du serveur wu-ftpd | 2003-08-01T00:00:00.000000 | 2003-09-04T00:00:00.000000 |
| certa-2003-avi-133 | Multiples failles dans McAfee »Security ePolicy Orchestrator» | 2003-08-01T00:00:00.000000 | 2003-08-01T00:00:00.000000 |
| CERTA-2003-AVI-134 | Vulnérabilité de la fonction realpath pour les systèmes BSD | 2003-08-06T00:00:00.000000 | 2003-08-18T00:00:00.000000 |
| certa-2003-avi-134 | Vulnérabilité de la fonction realpath pour les systèmes BSD | 2003-08-06T00:00:00.000000 | 2003-08-18T00:00:00.000000 |
| CERTA-2003-AVI-135 | Vulnérabilités du serveur de messagerie Postfix | 2003-08-07T00:00:00.000000 | 2003-08-07T00:00:00.000000 |
| certa-2003-avi-135 | Vulnérabilités du serveur de messagerie Postfix | 2003-08-07T00:00:00.000000 | 2003-08-07T00:00:00.000000 |
| CERTA-2003-AVI-136 | Vulnérabilité du serveur in.ftpd sous Solaris 9 | 2003-08-18T00:00:00.000000 | 2003-08-18T00:00:00.000000 |
| certa-2003-avi-136 | Vulnérabilité du serveur in.ftpd sous Solaris 9 | 2003-08-18T00:00:00.000000 | 2003-08-18T00:00:00.000000 |
| CERTA-2003-AVI-137 | Vulnérabilités de l'application CiscoWorks | 2003-08-19T00:00:00.000000 | 2003-08-19T00:00:00.000000 |
| certa-2003-avi-137 | Vulnérabilités de l'application CiscoWorks | 2003-08-19T00:00:00.000000 | 2003-08-19T00:00:00.000000 |
| CERTA-2003-AVI-138 | Vulnérabilité de la commande UnZip | 2003-08-20T00:00:00.000000 | 2003-08-20T00:00:00.000000 |
| certa-2003-avi-138 | Vulnérabilité de la commande UnZip | 2003-08-20T00:00:00.000000 | 2003-08-20T00:00:00.000000 |
| CERTA-2003-AVI-139 | Multiples vulnérabilités dans Internet Explorer | 2003-08-21T00:00:00.000000 | 2003-08-21T00:00:00.000000 |
| CERTA-2003-AVI-140 | Vulnérabilité de Microsoft Data Access Components | 2003-08-21T00:00:00.000000 | 2003-08-21T00:00:00.000000 |
| certa-2003-avi-139 | Multiples vulnérabilités dans Internet Explorer | 2003-08-21T00:00:00.000000 | 2003-08-21T00:00:00.000000 |
| certa-2003-avi-140 | Vulnérabilité de Microsoft Data Access Components | 2003-08-21T00:00:00.000000 | 2003-08-21T00:00:00.000000 |
| CERTA-2003-AVI-141 | Vulnérabilité de sendmail | 2003-08-27T00:00:00.000000 | 2003-09-03T00:00:00.000000 |
| certa-2003-avi-141 | Vulnérabilité de sendmail | 2003-08-27T00:00:00.000000 | 2003-09-03T00:00:00.000000 |
| CERTA-2003-AVI-142 | Défaut du client SNTP des routeurs Netgear | 2003-08-28T00:00:00.000000 | 2003-08-28T00:00:00.000000 |
| certa-2003-avi-142 | Défaut du client SNTP des routeurs Netgear | 2003-08-28T00:00:00.000000 | 2003-08-28T00:00:00.000000 |
| CERTA-2003-AVI-143 | Vulnérabilités dans XFree86 | 2003-09-03T00:00:00.000000 | 2003-09-03T00:00:00.000000 |
| certa-2003-avi-143 | Vulnérabilités dans XFree86 | 2003-09-03T00:00:00.000000 | 2003-09-03T00:00:00.000000 |
| CERTA-2003-AVI-144 | Vulnérabilité de NetBIOS | 2003-09-04T00:00:00.000000 | 2003-09-04T00:00:00.000000 |
| CERTA-2003-AVI-145 | Vulnérabilité de Microsoft Word | 2003-09-04T00:00:00.000000 | 2003-09-04T00:00:00.000000 |
| CERTA-2003-AVI-146 | Vulnérabilité du convertisseur Microsoft WordPerfect | 2003-09-04T00:00:00.000000 | 2003-09-04T00:00:00.000000 |
| CERTA-2003-AVI-147 | Vulnérabilité dans Visual Basic pour Applications (VBA) | 2003-09-04T00:00:00.000000 | 2003-09-04T00:00:00.000000 |
| CERTA-2003-AVI-148 | Vulnérabilité dans Microsoft Access Snapshot Viewer | 2003-09-04T00:00:00.000000 | 2003-09-04T00:00:00.000000 |
| certa-2003-avi-144 | Vulnérabilité de NetBIOS | 2003-09-04T00:00:00.000000 | 2003-09-04T00:00:00.000000 |
| certa-2003-avi-145 | Vulnérabilité de Microsoft Word | 2003-09-04T00:00:00.000000 | 2003-09-04T00:00:00.000000 |
| certa-2003-avi-146 | Vulnérabilité du convertisseur Microsoft WordPerfect | 2003-09-04T00:00:00.000000 | 2003-09-04T00:00:00.000000 |