Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0759 |
N/A
|
Jakarta Tomcat 3.1 under Apache reveals physical … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.525Z |
| CVE-2000-0760 |
N/A
|
The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 u… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.518Z |
| CVE-2000-0769 |
N/A
|
O'Reilly WebSite Pro 2.3.7 installs the uploader.… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.536Z |
| CVE-2000-0772 |
N/A
|
The installation of Tumbleweed Messaging Manageme… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.531Z |
| CVE-2000-0774 |
N/A
|
The sample Java servlet "test" in Bajie HTTP web … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.494Z |
| CVE-2000-0775 |
N/A
|
Buffer overflow in RobTex Viking server earlier t… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.532Z |
| CVE-2000-0784 |
N/A
|
sshd program in the Rapidstream 2.1 Beta VPN appl… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.622Z |
| CVE-2000-0785 |
N/A
|
WircSrv IRC Server 5.07s allows IRC operators to … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.620Z |
| CVE-2000-0789 |
N/A
|
WinU 5.x and earlier uses weak encryption to stor… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.594Z |
| CVE-2000-0791 |
N/A
|
Trustix installs the httpsd program for Apache-SS… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.613Z |
| CVE-2000-0793 |
N/A
|
Norton AntiVirus 5.00.01C with the Novell Netware… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.486Z |
| CVE-2000-0794 |
N/A
|
Buffer overflow in IRIX libgl.so library allows l… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.619Z |
| CVE-2000-0798 |
N/A
|
The truncate function in IRIX 6.x does not proper… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.515Z |
| CVE-2000-0800 |
N/A
|
String parsing error in rpc.kstatd in the linuxnf… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.530Z |
| CVE-2000-0801 |
N/A
|
Buffer overflow in bdf program in HP-UX 11.00 may… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.519Z |
| CVE-2000-0802 |
N/A
|
The BAIR program does not properly restrict acces… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.560Z |
| CVE-1999-0145 |
N/A
|
Sendmail WIZ command enabled, allowing root access. |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:27:57.695Z |
| CVE-1999-0247 |
N/A
|
Buffer overflow in nnrpd program in INN up to ver… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:51.632Z |
| CVE-1999-0248 |
N/A
|
A race condition in the authentication agent mech… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:51.869Z |
| CVE-1999-0358 |
N/A
|
Digital Unix 4.0 has a buffer overflow in the inc… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:52.011Z |
| CVE-1999-0393 |
N/A
|
Remote attackers can cause a denial of service in… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:51.979Z |
| CVE-1999-0395 |
N/A
|
A race condition in the BackWeb Polite Agent Prot… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:51.863Z |
| CVE-1999-0403 |
N/A
|
A bug in Cyrix CPUs on Linux allows local users t… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:52.126Z |
| CVE-1999-0429 |
N/A
|
The Lotus Notes 4.5 client may send a copy of enc… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:41:44.230Z |
| CVE-1999-0440 |
N/A
|
The byte code verifier component of the Java Virt… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:41:44.840Z |
| CVE-1999-0671 |
N/A
|
Buffer overflow in ToxSoft NextFTP client through… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:37.346Z |
| CVE-1999-0672 |
N/A
|
Buffer overflow in Fujitsu Chocoa IRC client via … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:37.566Z |
| CVE-1999-0675 |
N/A
|
Check Point FireWall-1 can be subjected to a deni… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:37.041Z |
| CVE-1999-0679 |
N/A
|
Buffer overflow in hybrid-6 IRC server commonly u… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:36.965Z |
| CVE-1999-0697 |
N/A
|
SCO Doctor allows local users to gain root privil… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:37.340Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2000-0759 |
N/A
|
Jakarta Tomcat 3.1 under Apache reveals physical … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.525Z |
| CVE-2000-0760 |
N/A
|
The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 u… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.518Z |
| CVE-2000-0769 |
N/A
|
O'Reilly WebSite Pro 2.3.7 installs the uploader.… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.536Z |
| CVE-2000-0772 |
N/A
|
The installation of Tumbleweed Messaging Manageme… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.531Z |
| CVE-2000-0774 |
N/A
|
The sample Java servlet "test" in Bajie HTTP web … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.494Z |
| CVE-2000-0775 |
N/A
|
Buffer overflow in RobTex Viking server earlier t… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.532Z |
| CVE-2000-0784 |
N/A
|
sshd program in the Rapidstream 2.1 Beta VPN appl… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.622Z |
| CVE-2000-0785 |
N/A
|
WircSrv IRC Server 5.07s allows IRC operators to … |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.620Z |
| CVE-2000-0789 |
N/A
|
WinU 5.x and earlier uses weak encryption to stor… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.594Z |
| CVE-2000-0791 |
N/A
|
Trustix installs the httpsd program for Apache-SS… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.613Z |
| CVE-2000-0793 |
N/A
|
Norton AntiVirus 5.00.01C with the Novell Netware… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.486Z |
| CVE-2000-0794 |
N/A
|
Buffer overflow in IRIX libgl.so library allows l… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.619Z |
| CVE-2000-0798 |
N/A
|
The truncate function in IRIX 6.x does not proper… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.515Z |
| CVE-2000-0800 |
N/A
|
String parsing error in rpc.kstatd in the linuxnf… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.530Z |
| CVE-2000-0801 |
N/A
|
Buffer overflow in bdf program in HP-UX 11.00 may… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.519Z |
| CVE-2000-0802 |
N/A
|
The BAIR program does not properly restrict acces… |
n/a |
n/a |
2000-09-21T04:00:00 | 2024-08-08T05:28:41.560Z |
| CVE-1999-0145 |
N/A
|
Sendmail WIZ command enabled, allowing root access. |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:27:57.695Z |
| CVE-1999-0247 |
N/A
|
Buffer overflow in nnrpd program in INN up to ver… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:51.632Z |
| CVE-1999-0248 |
N/A
|
A race condition in the authentication agent mech… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:51.869Z |
| CVE-1999-0358 |
N/A
|
Digital Unix 4.0 has a buffer overflow in the inc… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:52.011Z |
| CVE-1999-0393 |
N/A
|
Remote attackers can cause a denial of service in… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:51.979Z |
| CVE-1999-0395 |
N/A
|
A race condition in the BackWeb Polite Agent Prot… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:51.863Z |
| CVE-1999-0403 |
N/A
|
A bug in Cyrix CPUs on Linux allows local users t… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:34:52.126Z |
| CVE-1999-0429 |
N/A
|
The Lotus Notes 4.5 client may send a copy of enc… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:41:44.230Z |
| CVE-1999-0440 |
N/A
|
The byte code verifier component of the Java Virt… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:41:44.840Z |
| CVE-1999-0671 |
N/A
|
Buffer overflow in ToxSoft NextFTP client through… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:37.346Z |
| CVE-1999-0672 |
N/A
|
Buffer overflow in Fujitsu Chocoa IRC client via … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:37.566Z |
| CVE-1999-0675 |
N/A
|
Check Point FireWall-1 can be subjected to a deni… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:37.041Z |
| CVE-1999-0679 |
N/A
|
Buffer overflow in hybrid-6 IRC server commonly u… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:36.965Z |
| CVE-1999-0697 |
N/A
|
SCO Doctor allows local users to gain root privil… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:37.340Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-1999-1519 | Gene6 G6 FTP Server 2.0 allows a remote attacker to cause a denial of service (resource exhaustion)… | 1999-11-17T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0073 | Buffer overflow in Microsoft Rich Text Format (RTF) reader allows attackers to cause a denial of se… | 1999-11-17T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0987 | Windows NT does not properly download a system policy if the domain user logs into the domain with … | 1999-11-18T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0352 | Pine before version 4.21 does not properly filter shell metacharacters from URLs, which allows remo… | 1999-11-18T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0831 | Denial of service in Linux syslogd via a large number of connections. | 1999-11-19T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0999 | Microsoft SQL 7.0 server allows a remote attacker to cause a denial of service via a malformed TDS … | 1999-11-19T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1475 | ProFTPd 1.2 compiled with the mod_sqlpw module records user passwords in the wtmp log file, which a… | 1999-11-19T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0818 | Buffer overflow in Solaris kcms_configure via a long NETPATH environmental variable. | 1999-11-20T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1058 | Buffer overflow in Vermillion FTP Daemon VFTPD 1.23 allows remote attackers to cause a denial of se… | 1999-11-22T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1527 | Internal HTTP server in Sun Netbeans Java IDE in Netbeans Developer 3.0 Beta and Forte Community Ed… | 1999-11-23T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0531 | Linux gpm program allows local users to cause a denial of service by flooding the /dev/gpmctl devic… | 1999-11-23T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0844 | Denial of service in MDaemon WorldClient and WebConfig services via a long URL. | 1999-11-24T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1163 | Vulnerability in HP Series 800 S/X/V Class servers allows remote attackers to gain access to the S/… | 1999-11-24T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1189 | Buffer overflow in Netscape Navigator/Communicator 4.7 for Windows 95 and Windows 98 allows remote … | 1999-11-24T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1548 | Cabletron SmartSwitch Router (SSR) 8000 firmware 2.x can only handle 200 ARP requests per second al… | 1999-11-24T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0317 | Buffer overflow in Linux su command gives root access to local users. | 1999-11-25T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0845 | Buffer overflow in SCO su program allows local users to gain root access via a long username. | 1999-11-25T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-1547 | Oracle Web Listener 2.1 allows remote attackers to bypass access restrictions by replacing a charac… | 1999-11-25T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0387 | A legacy credential caching mechanism used in Windows 95 and Windows 98 systems allows attackers to… | 1999-11-29T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0839 | Windows NT Task Scheduler installed with Internet Explorer 5 allows a user to gain privileges by mo… | 1999-11-29T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0842 | Symantec Mail-Gear 1.0 web interface server allows remote users to read arbitrary files via a .. (d… | 1999-11-29T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0847 | Buffer overflow in free internet chess server (FICS) program, xboard. | 1999-11-29T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0822 | Buffer overflow in Qpopper (qpop) 3.0 allows remote root access via AUTH command. | 1999-11-30T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0824 | A Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the … | 1999-11-30T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0840 | Buffer overflow in CDE dtmail and dtmailpr programs allows local users to gain privileges via a lon… | 1999-11-30T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0841 | Buffer overflow in CDE mailtool allows local users to gain root privileges via a long MIME Content-Type. | 1999-11-30T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0819 | NTMail does not disable the VRFY command, even if the administrator has explicitly disabled it. | 1999-12-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0820 | FreeBSD seyon allows users to gain privileges via a modified PATH variable for finding the xterm an… | 1999-12-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0823 | Buffer overflow in FreeBSD xmindpath allows local users to gain privileges via -f argument. | 1999-12-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0826 | Buffer overflow in FreeBSD angband allows local users to gain privileges. | 1999-12-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-3fc5-9x9m-vqc4 |
9.8 (3.1)
|
Privilege Escalation in express-cart | 2019-06-03T17:31:32Z | 2021-08-04T21:25:59Z |
| ghsa-xggx-fx6w-v7ch |
5.3 (3.1)
|
Improper Neutralization of Wildcards or Matching Symbols | 2019-06-04T15:42:15Z | 2021-08-04T20:41:46Z |
| ghsa-3p92-886g-qxpq |
5.1 (3.1)
|
Remote Memory Exposure in floody | 2019-06-04T15:42:32Z | 2021-08-04T21:27:04Z |
| ghsa-pgcr-7wm4-mcv6 |
7.5 (3.1)
|
Sensitive Data Exposure in pem | 2019-06-04T15:42:45Z | 2021-08-04T21:28:00Z |
| ghsa-m8fw-534v-xm85 |
|
Cross-Site Scripting (XSS) in cloudcmd | 2019-06-04T15:43:29Z | 2020-08-31T18:31:00Z |
| ghsa-xm7f-x4wx-wmgv |
|
Out-of-bounds Read in byte | 2019-06-04T15:47:43Z | 2020-08-31T18:31:36Z |
| ghsa-m734-r4g6-34f9 |
|
NoSQL Injection in loopback-connector-mongodb | 2019-06-04T19:36:17Z | 2021-08-04T20:47:58Z |
| ghsa-5v72-xg48-5rpm |
7.5 (3.1)
|
Denial of Service in ws | 2019-06-04T19:37:52Z | 2021-08-04T21:29:05Z |
| ghsa-wfp9-vr4j-f49j |
|
NoSQL Injection in sequelize | 2019-06-04T20:04:27Z | 2023-04-21T19:34:39Z |
| ghsa-f698-m2v9-5fh3 |
|
Command Injection in opencv | 2019-06-04T20:11:44Z | 2020-08-31T18:35:50Z |
| ghsa-8j8c-7jfh-h6hx |
|
Code Injection in js-yaml | 2019-06-04T20:14:07Z | 2020-08-31T18:36:43Z |
| ghsa-886v-mm6p-4m66 |
|
High severity vulnerability that affects gun | 2019-06-05T09:48:02Z | 2021-09-07T15:24:35Z |
| ghsa-q42p-pg8m-cqh6 |
7.3 (3.1)
|
Prototype Pollution in handlebars | 2019-06-05T14:07:48Z | 2021-08-04T20:54:05Z |
| ghsa-xf5p-87ch-gxw2 |
5.3 (3.1)
|
Marked ReDoS due to email addresses being evaluated in quadratic time | 2019-06-05T14:10:03Z | 2022-08-02T17:43:57Z |
| ghsa-74cp-qw7f-7hpw |
|
Path Traversal in statics-server | 2019-06-05T14:10:23Z | 2020-08-31T18:36:24Z |
| ghsa-86p3-4gfq-38f2 |
5.9 (3.1)
|
Denial of Service in url-relative | 2019-06-05T14:10:34Z | 2021-08-04T21:31:03Z |
| ghsa-vpq5-4rc8-c222 |
|
Denial of Service in canvas | 2019-06-05T14:10:45Z | 2020-08-31T18:36:22Z |
| ghsa-2pr6-76vf-7546 |
5.9 (3.1)
|
Denial of Service in js-yaml | 2019-06-05T14:35:29Z | 2021-08-04T21:32:56Z |
| ghsa-3xc7-xg67-pw99 |
3.5 (3.1)
|
Sensitive Data Exposure in sequelize-cli | 2019-06-05T20:43:10Z | 2021-08-04T20:54:45Z |
| ghsa-83rx-c8cr-6j8q |
5.9 (3.1)
|
Insecure Default Configuration in tesseract.js | 2019-06-05T20:48:55Z | 2021-08-04T21:33:58Z |
| ghsa-wxhq-pm8v-cw75 |
|
Regular Expression Denial of Service in clean-css | 2019-06-05T20:50:16Z | 2020-08-31T18:35:40Z |
| ghsa-4859-gpc7-4j66 |
|
Command Injection in dot | 2019-06-05T21:24:29Z | 2021-08-04T20:55:57Z |
| ghsa-cxx2-fp39-rf3r |
6.1 (3.1)
|
Cross-Site Scripting in JSPWiki | 2019-06-06T15:29:22Z | 2021-08-04T19:53:10Z |
| ghsa-cj6j-32rg-45r2 |
6.1 (3.1)
|
Cross-site Scripting in JSPWiki | 2019-06-06T15:29:25Z | 2021-08-04T19:54:08Z |
| ghsa-hp5r-mhgp-56c9 |
6.1 (3.1)
|
Cross-site Scriptin in JSPWiki | 2019-06-06T15:29:29Z | 2021-08-04T20:00:07Z |
| ghsa-w7q7-vjp8-7jv4 |
|
SQL Injection in typeorm | 2019-06-06T15:30:16Z | 2020-08-31T18:36:13Z |
| ghsa-rv49-54qp-fw42 |
|
Path Traversal in servey | 2019-06-06T15:30:20Z | 2020-08-31T18:36:18Z |
| ghsa-g95f-p29q-9xw4 |
3.7 (3.1)
|
Regular Expression Denial of Service in braces | 2019-06-06T15:30:30Z | 2021-08-04T21:35:07Z |
| ghsa-8v5f-hp78-jgxq |
|
Signature Verification Bypass in jwt-simple | 2019-06-06T15:30:33Z | 2020-08-31T18:37:26Z |
| ghsa-q22g-8fr4-qpj4 |
7.5 (3.1)
|
Regular Expression Denial of Service in remarkable | 2019-06-06T15:32:15Z | 2024-04-22T19:45:28Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-240 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.733041Z |
| pysec-2021-241 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite impleme… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:39.893665Z |
| pysec-2021-242 |
|
TensorFlow is an end-to-end open source platform for machine learning. The TFLite code fo… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.058012Z |
| pysec-2021-243 |
|
TensorFlow is an end-to-end open source platform for machine learning. A specially crafte… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.241160Z |
| pysec-2021-244 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.417025Z |
| pysec-2021-245 |
|
TensorFlow is an end-to-end open source platform for machine learning. Due to lack of val… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.610515Z |
| pysec-2021-246 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:40.807777Z |
| pysec-2021-247 |
|
TensorFlow is an end-to-end open source platform for machine learning. The validation in … | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.001819Z |
| pysec-2021-248 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.176381Z |
| pysec-2021-249 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.356902Z |
| pysec-2021-250 |
|
TensorFlow is an end-to-end open source platform for machine learning. Incomplete validat… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.522961Z |
| pysec-2021-251 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.712204Z |
| pysec-2021-252 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:41.882183Z |
| pysec-2021-253 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.041590Z |
| pysec-2021-254 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.200654Z |
| pysec-2021-255 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing a complex … | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.358462Z |
| pysec-2021-256 |
|
TensorFlow is an end-to-end open source platform for machine learning. Passing invalid ar… | tensorflow | 2021-05-14T20:15:00Z | 2021-08-27T03:22:42.523296Z |
| pysec-2021-441 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling TF operati… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:45.368024Z |
| pysec-2021-442 |
|
TensorFlow is an end-to-end open source platform for machine learning. If the `splits` ar… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:45.524725Z |
| pysec-2021-443 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:45.694528Z |
| pysec-2021-444 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_op… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:45.869282Z |
| pysec-2021-445 |
|
TensorFlow is an end-to-end open source platform for machine learning. A malicious user c… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.030158Z |
| pysec-2021-446 |
|
TensorFlow is an end-to-end open source platform for machine learning. In eager mode (def… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.214930Z |
| pysec-2021-447 |
|
TensorFlow is an end-to-end open source platform for machine learning. The API of `tf.raw… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.373650Z |
| pysec-2021-448 |
|
TensorFlow is an end-to-end open source platform for machine learning. Missing validation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.522398Z |
| pysec-2021-449 |
|
TensorFlow is an end-to-end open source platform for machine learning. Specifying a negat… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.609278Z |
| pysec-2021-450 |
|
TensorFlow is an end-to-end open source platform for machine learning. The `tf.raw_ops.Co… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.764419Z |
| pysec-2021-451 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:46.920888Z |
| pysec-2021-452 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.095784Z |
| pysec-2021-453 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.241877Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-407 | Malicious code in @maariv/fetlife-assets (npm) | 2022-06-20T18:20:24Z | 2022-06-20T18:20:24Z |
| mal-2022-408 | Malicious code in @maccabi4u/fetlife-assets (npm) | 2022-06-20T18:20:24Z | 2022-06-20T18:20:25Z |
| mal-2022-410 | Malicious code in @mainwp/fetlife-assets (npm) | 2022-06-20T18:20:24Z | 2022-06-20T18:20:25Z |
| mal-2022-419 | Malicious code in @mariacasino/fetlife-assets (npm) | 2022-06-20T18:20:24Z | 2022-06-20T18:20:25Z |
| MAL-2022-420 | Malicious code in @marriott/fetlife-assets (npm) | 2022-06-20T18:20:25Z | 2022-06-20T18:20:25Z |
| MAL-2022-421 | Malicious code in @mashov/fetlife-assets (npm) | 2022-06-20T18:20:25Z | 2022-06-20T18:20:25Z |
| MAL-2022-424 | Malicious code in @mcd-gws/fetlife-assets (npm) | 2022-06-20T18:20:25Z | 2022-06-20T18:20:30Z |
| MAL-2022-425 | Malicious code in @mcdonalds/fetlife-assets (npm) | 2022-06-20T18:20:25Z | 2022-06-20T18:20:26Z |
| MAL-2022-426 | Malicious code in @mckesson/fetlife-assets (npm) | 2022-06-20T18:20:25Z | 2022-06-20T18:20:26Z |
| mal-2022-420 | Malicious code in @marriott/fetlife-assets (npm) | 2022-06-20T18:20:25Z | 2022-06-20T18:20:25Z |
| mal-2022-421 | Malicious code in @mashov/fetlife-assets (npm) | 2022-06-20T18:20:25Z | 2022-06-20T18:20:25Z |
| mal-2022-424 | Malicious code in @mcd-gws/fetlife-assets (npm) | 2022-06-20T18:20:25Z | 2022-06-20T18:20:30Z |
| mal-2022-425 | Malicious code in @mcdonalds/fetlife-assets (npm) | 2022-06-20T18:20:25Z | 2022-06-20T18:20:26Z |
| mal-2022-426 | Malicious code in @mckesson/fetlife-assets (npm) | 2022-06-20T18:20:25Z | 2022-06-20T18:20:26Z |
| MAL-2022-433 | Malicious code in @micropython/fetlife-assets (npm) | 2022-06-20T18:20:26Z | 2022-06-20T18:20:26Z |
| MAL-2022-435 | Malicious code in @moneybird/fetlife-assets (npm) | 2022-06-20T18:20:26Z | 2022-06-20T18:20:26Z |
| MAL-2022-436 | Malicious code in @mozilla-mobile/fetlife-assets (npm) | 2022-06-20T18:20:26Z | 2022-06-20T18:20:27Z |
| MAL-2022-446 | Malicious code in @myndr/fetlife-assets (npm) | 2022-06-20T18:20:26Z | 2022-06-20T18:20:27Z |
| mal-2022-433 | Malicious code in @micropython/fetlife-assets (npm) | 2022-06-20T18:20:26Z | 2022-06-20T18:20:26Z |
| mal-2022-435 | Malicious code in @moneybird/fetlife-assets (npm) | 2022-06-20T18:20:26Z | 2022-06-20T18:20:26Z |
| mal-2022-436 | Malicious code in @mozilla-mobile/fetlife-assets (npm) | 2022-06-20T18:20:26Z | 2022-06-20T18:20:27Z |
| mal-2022-446 | Malicious code in @myndr/fetlife-assets (npm) | 2022-06-20T18:20:26Z | 2022-06-20T18:20:27Z |
| MAL-2022-449 | Malicious code in @navyfederal/fetlife-assets (npm) | 2022-06-20T18:20:27Z | 2022-06-20T18:20:27Z |
| MAL-2022-450 | Malicious code in @ncr-design-system/cxd-npm-group (npm) | 2022-06-20T18:20:27Z | 2022-06-20T18:20:27Z |
| MAL-2022-451 | Malicious code in @ncr-design-system/cxd-npm-releases (npm) | 2022-06-20T18:20:27Z | 2022-06-20T18:20:28Z |
| MAL-2022-452 | Malicious code in @ncr-swt-retail/scox-npm-group (npm) | 2022-06-20T18:20:27Z | 2022-06-20T18:20:28Z |
| mal-2022-449 | Malicious code in @navyfederal/fetlife-assets (npm) | 2022-06-20T18:20:27Z | 2022-06-20T18:20:27Z |
| mal-2022-450 | Malicious code in @ncr-design-system/cxd-npm-group (npm) | 2022-06-20T18:20:27Z | 2022-06-20T18:20:27Z |
| mal-2022-451 | Malicious code in @ncr-design-system/cxd-npm-releases (npm) | 2022-06-20T18:20:27Z | 2022-06-20T18:20:28Z |
| mal-2022-452 | Malicious code in @ncr-swt-retail/scox-npm-group (npm) | 2022-06-20T18:20:27Z | 2022-06-20T18:20:28Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-0580 | Red Hat Enterprise Linux (mod_auth_openidc): Mehrere Schwachstellen | 2022-05-10T22:00:00.000+00:00 | 2025-12-29T23:00:00.000+00:00 |
| wid-sec-w-2023-1389 | Red Hat Enterprise Linux (mod_auth_mellon): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-05-10T22:00:00.000+00:00 | 2023-06-08T22:00:00.000+00:00 |
| wid-sec-w-2023-1885 | Red Hat Enterprise Linux (keepalived): Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-05-10T22:00:00.000+00:00 | 2023-07-25T22:00:00.000+00:00 |
| wid-sec-w-2023-1993 | Red Hat Enterprise Linux (aspell): Schwachstelle ermöglicht Codeausführung | 2022-05-10T22:00:00.000+00:00 | 2024-02-26T23:00:00.000+00:00 |
| wid-sec-w-2024-0352 | Red Hat Enterprise Linux (DogTag PKI): Schwachstelle ermöglicht Denial of Service | 2022-05-10T22:00:00.000+00:00 | 2024-02-12T23:00:00.000+00:00 |
| wid-sec-w-2022-0012 | Linux Kernel: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-05-11T22:00:00.000+00:00 | 2024-01-25T23:00:00.000+00:00 |
| wid-sec-w-2022-0127 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-05-11T22:00:00.000+00:00 | 2023-12-14T23:00:00.000+00:00 |
| wid-sec-w-2022-0454 | Red Hat Directory Server: Schwachstelle ermöglicht Denial of Service | 2022-05-11T22:00:00.000+00:00 | 2022-12-13T23:00:00.000+00:00 |
| wid-sec-w-2022-0467 | Apache Tomcat: Schwachstelle ermöglicht Denial of Service | 2022-05-11T22:00:00.000+00:00 | 2024-08-01T22:00:00.000+00:00 |
| wid-sec-w-2022-0540 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-05-11T22:00:00.000+00:00 | 2024-01-25T23:00:00.000+00:00 |
| wid-sec-w-2023-0838 | Xerox FreeFlow Print Server: Mehrere Schwachstellen | 2022-05-11T22:00:00.000+00:00 | 2023-04-03T22:00:00.000+00:00 |
| wid-sec-w-2022-0013 | PostgreSQL: Schwachstelle ermöglicht Erlangen von Administratorrechten | 2022-05-12T22:00:00.000+00:00 | 2024-12-23T23:00:00.000+00:00 |
| wid-sec-w-2022-0523 | PCRE2: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-05-12T22:00:00.000+00:00 | 2023-03-15T23:00:00.000+00:00 |
| wid-sec-w-2022-0776 | vim: Schwachstelle ermöglicht Denial of Service | 2022-05-12T22:00:00.000+00:00 | 2023-04-03T22:00:00.000+00:00 |
| wid-sec-w-2022-0899 | Apache Tomcat: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-05-12T22:00:00.000+00:00 | 2024-03-20T23:00:00.000+00:00 |
| wid-sec-w-2022-0267 | Red Hat Enterprise Linux (pcs): Schwachstelle ermöglicht Offenlegung von Informationen | 2022-05-15T22:00:00.000+00:00 | 2024-09-05T22:00:00.000+00:00 |
| wid-sec-w-2023-0320 | tribe29 checkmk: Schwachstelle ermöglicht Privilegieneskalation | 2022-05-15T22:00:00.000+00:00 | 2023-02-09T23:00:00.000+00:00 |
| wid-sec-w-2024-2210 | xpdf: Schwachstelle ermöglicht Denial of Service | 2022-05-15T22:00:00.000+00:00 | 2024-09-24T22:00:00.000+00:00 |
| wid-sec-w-2022-0179 | E2FSProgs: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-05-16T22:00:00.000+00:00 | 2025-01-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0692 | IBM WebSphere Application Server: Schwachstelle ermöglicht Darstellen falscher Informationen | 2022-05-16T22:00:00.000+00:00 | 2023-05-09T22:00:00.000+00:00 |
| wid-sec-w-2022-1057 | Apple macOS: Mehrere Schwachstellen | 2022-05-16T22:00:00.000+00:00 | 2023-06-21T22:00:00.000+00:00 |
| wid-sec-w-2022-1141 | QEMU: Schwachstelle ermöglicht Denial of Service und Codeausführung | 2022-05-16T22:00:00.000+00:00 | 2024-09-02T22:00:00.000+00:00 |
| wid-sec-w-2022-0014 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-05-17T22:00:00.000+00:00 | 2024-02-20T23:00:00.000+00:00 |
| wid-sec-w-2022-0202 | Nvidia Treiber: Mehrere Schwachstellen | 2022-05-17T22:00:00.000+00:00 | 2023-10-03T22:00:00.000+00:00 |
| wid-sec-w-2022-0283 | GIMP: Schwachstelle ermöglicht Denial of Service | 2022-05-17T22:00:00.000+00:00 | 2025-01-16T23:00:00.000+00:00 |
| wid-sec-w-2022-0362 | vim: Schwachstelle ermöglicht Denial of Service, Manipulation und Codeausführung | 2022-05-17T22:00:00.000+00:00 | 2023-04-03T22:00:00.000+00:00 |
| wid-sec-w-2023-0090 | Jenkins: Mehrere Schwachstellen | 2022-05-17T22:00:00.000+00:00 | 2023-06-15T22:00:00.000+00:00 |
| wid-sec-w-2022-0363 | vim: Mehrere Schwachstellen | 2022-05-18T22:00:00.000+00:00 | 2023-12-14T23:00:00.000+00:00 |
| wid-sec-w-2022-2211 | BusyBox: Schwachstelle ermöglicht Denial of Service | 2022-05-18T22:00:00.000+00:00 | 2024-05-13T22:00:00.000+00:00 |
| wid-sec-w-2024-1032 | xpdf: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2022-05-18T22:00:00.000+00:00 | 2024-05-06T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2005:505 | Red Hat Security Advisory: tcpdump security update | 2005-06-13T12:03:00+00:00 | 2025-11-21T17:29:12+00:00 |
| rhsa-2005_505 | Red Hat Security Advisory: tcpdump security update | 2005-06-13T12:03:00+00:00 | 2024-11-21T23:48:37+00:00 |
| rhsa-2005:410 | Red Hat Security Advisory: gftp security update | 2005-06-13T12:07:00+00:00 | 2025-11-21T17:29:03+00:00 |
| rhsa-2005_410 | Red Hat Security Advisory: gftp security update | 2005-06-13T12:07:00+00:00 | 2024-11-21T23:43:40+00:00 |
| rhsa-2005:489 | Red Hat Security Advisory: squid security update | 2005-06-13T12:08:00+00:00 | 2026-01-06T20:20:09+00:00 |
| rhsa-2005_489 | Red Hat Security Advisory: squid security update | 2005-06-13T12:08:00+00:00 | 2024-11-21T23:44:21+00:00 |
| rhsa-2005:357 | Red Hat Security Advisory: gzip security update | 2005-06-13T12:12:00+00:00 | 2026-01-08T09:18:13+00:00 |
| rhsa-2005_357 | Red Hat Security Advisory: gzip security update | 2005-06-13T12:12:00+00:00 | 2024-11-21T23:38:09+00:00 |
| rhsa-2005:506 | Red Hat Security Advisory: mikmod security update | 2005-06-13T12:18:00+00:00 | 2025-11-21T17:29:12+00:00 |
| rhsa-2005_506 | Red Hat Security Advisory: mikmod security update | 2005-06-13T12:18:00+00:00 | 2024-11-21T23:48:42+00:00 |
| rhsa-2005:502 | Red Hat Security Advisory: sysreport security update | 2005-06-13T12:22:00+00:00 | 2026-01-08T09:18:35+00:00 |
| rhsa-2005_502 | Red Hat Security Advisory: sysreport security update | 2005-06-13T12:22:00+00:00 | 2024-11-21T23:48:20+00:00 |
| rhsa-2005:495 | Red Hat Security Advisory: rsh security update | 2005-06-13T12:23:00+00:00 | 2025-11-21T17:29:10+00:00 |
| rhsa-2005_495 | Red Hat Security Advisory: rsh security update | 2005-06-13T12:23:00+00:00 | 2024-11-21T23:26:40+00:00 |
| rhsa-2005:499 | Red Hat Security Advisory: gedit security update | 2005-06-13T12:28:00+00:00 | 2026-01-08T09:18:35+00:00 |
| rhsa-2005_499 | Red Hat Security Advisory: gedit security update | 2005-06-13T12:28:00+00:00 | 2024-11-21T23:48:15+00:00 |
| rhsa-2005:415 | Red Hat Security Advisory: squid security update | 2005-06-14T19:40:00+00:00 | 2026-01-08T09:18:25+00:00 |
| rhsa-2005_415 | Red Hat Security Advisory: squid security update | 2005-06-14T19:40:00+00:00 | 2024-11-21T23:44:16+00:00 |
| rhsa-2005:474 | Red Hat Security Advisory: bzip2 security update | 2005-06-16T17:36:00+00:00 | 2025-11-21T17:29:08+00:00 |
| rhsa-2005_474 | Red Hat Security Advisory: bzip2 security update | 2005-06-16T17:36:00+00:00 | 2024-11-21T23:38:14+00:00 |
| rhsa-2005:512 | Red Hat Security Advisory: mc security update | 2005-06-16T17:44:00+00:00 | 2025-11-21T17:29:13+00:00 |
| rhsa-2005_512 | Red Hat Security Advisory: mc security update | 2005-06-16T17:44:00+00:00 | 2024-11-21T23:49:18+00:00 |
| rhsa-2005:518 | Red Hat Security Advisory: gaim security update | 2005-06-16T17:52:00Z | 2005-06-16T00:00:00Z |
| rhsa-2005_518 | Red Hat Security Advisory: gaim security update | 2005-06-16T17:52:00Z | 2005-06-16T00:00:00Z |
| rhsa-2005:498 | Red Hat Security Advisory: spamassassin security update | 2005-06-23T19:19:00+00:00 | 2026-01-08T09:18:35+00:00 |
| rhsa-2005_498 | Red Hat Security Advisory: spamassassin security update | 2005-06-23T19:19:00+00:00 | 2024-11-21T23:48:04+00:00 |
| rhsa-2005:523 | Red Hat Security Advisory: RealPlayer security update | 2005-06-23T19:21:00+00:00 | 2025-11-21T17:29:14+00:00 |
| rhsa-2005_523 | Red Hat Security Advisory: RealPlayer security update | 2005-06-23T19:21:00+00:00 | 2024-11-14T10:03:53+00:00 |
| rhsa-2005:524 | Red Hat Security Advisory: freeradius security update | 2005-06-23T19:25:00+00:00 | 2026-01-08T09:18:37+00:00 |
| rhsa-2005_524 | Red Hat Security Advisory: freeradius security update | 2005-06-23T19:25:00+00:00 | 2024-11-21T23:51:24+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-20-252-01 | Siemens SIMATIC RTLS Locating Manager | 2020-09-08T00:00:00.000000Z | 2020-09-08T00:00:00.000000Z |
| icsa-20-252-02 | Siemens SIMATIC S7-300 and S7-400 CPUs (Update C) | 2020-09-08T00:00:00.000000Z | 2020-12-08T00:00:00.000000Z |
| icsa-20-252-03 | Siemens License Management Utility | 2020-09-08T00:00:00.000000Z | 2020-09-08T00:00:00.000000Z |
| icsa-20-252-04 | Siemens Spectrum Power | 2020-09-08T00:00:00.000000Z | 2020-09-08T00:00:00.000000Z |
| icsa-20-252-05 | Siemens Siveillance Video Client | 2020-09-08T00:00:00.000000Z | 2020-09-08T00:00:00.000000Z |
| icsa-20-252-06 | Siemens SIMATIC HMI Products (Update A) | 2020-09-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-252-07 | Siemens Industrial Products (Update F) | 2020-09-08T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-20-252-08 | Siemens Polarion Subversion Webclient | 2020-09-08T00:00:00.000000Z | 2020-09-08T00:00:00.000000Z |
| icsa-20-254-01 | AVEVA Enterprise Data Management Web | 2020-09-10T00:00:00.000000Z | 2020-09-10T00:00:00.000000Z |
| icsa-20-254-02 | FATEK Automation PLC WinProladder | 2020-09-10T00:00:00.000000Z | 2020-09-10T00:00:00.000000Z |
| icsa-20-254-03 | HMS Networks Ewon Flexy and Cosy | 2020-09-10T00:00:00.000000Z | 2020-09-10T00:00:00.000000Z |
| icsma-20-254-01 | Philips Patient Monitoring Devices (Update C) | 2020-09-10T06:00:00.000000Z | 2023-12-14T07:00:00.000000Z |
| icsa-20-261-01 | Advantech WebAccess Node | 2020-09-17T00:00:00.000000Z | 2020-09-17T00:00:00.000000Z |
| icsma-20-261-01 | ICSMA-20-261-01_Philips Clinical Collaboration Platform | 2020-09-17T00:00:00.000000Z | 2020-09-17T00:00:00.000000Z |
| icsa-20-266-01 | GE Digital APM Classic | 2020-09-22T00:00:00.000000Z | 2020-09-22T00:00:00.000000Z |
| icsa-20-266-02 | GE Reason S20 Ethernet Switch | 2020-09-22T00:00:00.000000Z | 2020-09-22T00:00:00.000000Z |
| icsa-20-273-01 | ICSA-20-273-01_MB Connect line mbCONNECT24, mymbCONNECT24 | 2020-09-29T00:00:00.000000Z | 2020-09-29T00:00:00.000000Z |
| icsa-20-273-02 | Yokogawa WideField3 | 2020-09-29T00:00:00.000000Z | 2020-09-29T00:00:00.000000Z |
| icsa-20-273-03 | B&R Automation SiteManager and GateManager | 2020-09-29T00:00:00.000000Z | 2020-09-29T00:00:00.000000Z |
| icsa-20-280-01 | Rockwell Automation ISaGRAF5 Runtime (Update A) | 2020-10-06T00:00:00.000000Z | 2021-06-17T00:00:00.000000Z |
| icsa-20-282-01 | Johnson Controls Sensormatic Electronics American Dynamics victor Web Client and Software House C•CURE Web Client (Update A) | 2020-10-08T00:00:00.000000Z | 2021-01-05T00:00:00.000000Z |
| icsa-20-287-01 | MOXA NPort IAW5000A-I/O Series | 2020-10-13T00:00:00.000000Z | 2020-10-13T00:00:00.000000Z |
| icsa-20-287-02 | LCDS LAquis SCADA | 2020-10-13T00:00:00.000000Z | 2020-10-13T00:00:00.000000Z |
| icsa-20-287-03 | Flexera InstallShield | 2020-10-13T00:00:00.000000Z | 2020-10-13T00:00:00.000000Z |
| icsa-20-287-04 | Fieldcomm Group HART-IP and hipserver | 2020-10-13T00:00:00.000000Z | 2020-10-13T00:00:00.000000Z |
| icsa-20-287-05 | Siemens Desigo Insight | 2020-10-13T00:00:00.000000Z | 2020-10-13T00:00:00.000000Z |
| icsa-20-287-06 | Siemens SIPORT MP | 2020-10-13T00:00:00.000000Z | 2020-10-13T00:00:00.000000Z |
| icsa-20-289-01 | Advantech WebAccess/SCADA | 2020-10-15T00:00:00.000000Z | 2020-10-15T00:00:00.000000Z |
| icsa-20-289-02 | Advantech R-SeeNet | 2020-10-15T00:00:00.000000Z | 2020-10-15T00:00:00.000000Z |
| icsa-20-294-01 | Rockwell Automation 1794-AENT Flex I/O Series B | 2020-10-20T00:00:00.000000Z | 2020-10-20T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-staros-privilege-esc-pyb7ytd | Cisco StarOS Privilege Escalation Vulnerability | 2020-10-07T16:00:00+00:00 | 2020-10-07T16:00:00+00:00 |
| cisco-sa-webex-teams-dll-drsnh5an | Cisco Webex Teams Client for Windows DLL Hijacking Vulnerability | 2020-10-07T16:00:00+00:00 | 2020-10-07T16:00:00+00:00 |
| cisco-sa-asa-ftd-crlf-inj-bx9urwsn | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN CRLF Injection Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:24+00:00 |
| cisco-sa-asa-ftd-tcp-dos-n3dmnu4t | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL/TLS Session Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-22T23:49:39+00:00 |
| cisco-sa-asa-rxss-l54htxp | Cisco Adaptive Security Appliance Software Web-Based Management Interface Reflected Cross-Site Scripting Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:19+00:00 |
| cisco-sa-asaftd-dos-qfcnepfx | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T13:16:34+00:00 |
| cisco-sa-asaftd-fileup-dos-zvc7wtys | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services File Upload Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:04+00:00 |
| cisco-sa-asaftd-frag-memleak-mctqdp9n | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software IP Fragment Memory Leak Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:05+00:00 |
| cisco-sa-asaftd-ftpbypass-hy3utxyu | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software FTP Inspection Bypass Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:09+00:00 |
| cisco-sa-asaftd-ospflls-37xy2q6r | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software OSPFv2 Link-Local Signaling Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:06:55+00:00 |
| cisco-sa-asaftd-rule-bypass-p73abnwq | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN Portal Access Rule Bypass Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:06:54+00:00 |
| cisco-sa-asaftd-sipdos-3dgvdjvg | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SIP Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:07:14+00:00 |
| cisco-sa-asaftd-sslvpndma-dos-hrrqb9yx | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software SSL VPN Direct Memory Access Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:06:59+00:00 |
| cisco-sa-asaftd-tls-bb-2g9uwkp | Cisco Firepower 1000 Series Bleichenbacher Attack Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-asaftd-webdos-fbzm5ynw | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T01:06:59+00:00 |
| cisco-sa-asaftd-xss-multiple-fcb3vpze | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Interface Cross-Site Scripting Vulnerabilities | 2020-10-21T16:00:00+00:00 | 2021-06-28T15:14:27+00:00 |
| cisco-sa-fmc-cacauthbyp-nclgzm3q | Cisco Firepower Management Center Software Common Access Card Authentication Bypass Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-fmc-dos-3wymywkh | Cisco Firepower Management Center Software Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-fmc-redirect-nyduseqn | Cisco Firepower Management Center Software Open Redirect Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-fmc-xss-6vqh4rpz | Cisco Firepower Management Center Software Cross-Site Scripting Vulnerabilities | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-bypass-3ecfd24j | Multiple Cisco Products SNORT HTTP Detection Engine File Policy Bypass Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-container-esc-fmyqfbqv | Cisco Firepower Threat Defense Software Multi-Instance Container Escape Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-hidcmd-pfdewvbd | Cisco Firepower Threat Defense Software Hidden Commands Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-icmp-dos-hxxcycm | Cisco Firepower 4110 ICMP Flood Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-inline-dos-nxquyeqm | Cisco Firepower Threat Defense Software Inline Pair/Passive Mode Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-snmp-dos-r8enpbos | Cisco Firepower Threat Defense Software SNMP Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-ssl-dcrpt-dos-ryekx4yy | Cisco Firepower 2100 Series SSL/TLS Inspection Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-ssl-mf3822z | Cisco Firepower Threat Defense Software SSL Input Validation Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftd-tcp-dos-gdczdqaf | Cisco Firepower Threat Defense Software TCP Flood Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftdfmc-dirtrav-nw8xcusb | Cisco Firepower Management Center Software and Firepower Threat Defense Software Directory Traversal Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-2478 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-2479 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-2481 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-25219 | Lame cache can be abused to severely degrade resolver performance | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-32626 | Lua scripts can overflow the heap-based Lua stack in Redis | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-32627 | Integer overflow issue with Streams in Redis | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-32628 | Vulnerability in handling large ziplists | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-32672 | Vulnerability in Lua Debugger in Redis | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-32675 | DoS vulnerability in Redis | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-32687 | Integer overflow issue with intsets in Redis | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-32762 | Integer overflow that can lead to heap overflow in redis-cli redis-sentinel on some platforms | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35537 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35546 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35575 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35577 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via MySQL Protcol to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35591 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35596 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Error Handling). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35597 | Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35602 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35607 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35608 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35610 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35612 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35618 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Cluster. CVSS 3.1 Base Score 1.8 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:L). | 2021-10-02T00:00:00.000Z | 2021-10-26T00:00:00.000Z |
| msrc_cve-2021-35621 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior 7.5.23 and prior 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | 2021-10-02T00:00:00.000Z | 2021-10-26T00:00:00.000Z |
| msrc_cve-2021-35622 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35623 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35624 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation deletion or modification access to critical data or all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35625 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35626 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202006-1912 | Advantech WebAccess/SCADA is a set of SCADA software based on browser architecture of Chi… | 2022-05-04T09:38:08.268000Z |
| var-202006-1933 | AC9V3.0 upgrade software is a wireless router with Gigabit Ethernet port of Shenzhen Jixi… | 2022-05-04T09:38:08.256000Z |
| var-202004-2235 | NA-VIEW is a touch screen configuration software. NA-VIEW V2.0 (only for 15-inch touc… | 2022-05-04T09:38:10.928000Z |
| var-202004-2256 | Alibaba is a global business-to-business (B2B) e-commerce company. It is currently the wo… | 2022-05-04T09:38:10.916000Z |
| var-202005-1072 | Leguang is a brand of wireless network products independently developed by Shenzhen Chaoh… | 2022-05-04T09:38:10.052000Z |
| var-202005-1093 | Ruijie Networks Co., Ltd. is a company mainly engaged in information system integration s… | 2022-05-04T09:38:10.038000Z |
| var-202005-1114 | Rockwell Automation (China) Co., Ltd. is a company engaged in industrial automation and i… | 2022-05-04T09:38:10.026000Z |
| var-202002-1691 | Schneider Electric Modicon M580 is an Ethernet programmable controller. Schneider Ele… | 2022-05-04T09:38:18.216000Z |
| var-202001-1969 | Beijing Wenwang Yilian Information Technology Co., Ltd. is a long-term research, developm… | 2022-05-04T09:38:22.620000Z |
| var-202001-1990 | ZXR10 1800-2S is a router product of ZTE Corporation of China. ZTE ZXR10 1800-2S has fil… | 2022-05-04T09:38:22.607000Z |
| var-201912-2015 | Netcom WAN Optimization Gateway NS-WOG is the latest technology innovation product of Net… | 2022-05-04T09:38:24.641000Z |
| var-201911-1959 | Amazon Ring Video Doorbell is a smart wireless home security doorbell camera that allows … | 2022-05-04T09:38:26.426000Z |
| var-201910-1863 | Intelbras Router WRN150 is a wireless router from Brazil's Intelbras. Intelbras Router W… | 2022-05-04T09:38:31.640000Z |
| var-201908-2209 | Longsun Technology (Shanghai) Co., Ltd. is a supplier of IoT modules and solutions. Long… | 2022-05-04T09:38:35.040000Z |
| var-201907-1422 | A CWE-119 Buffer Errors vulnerability exists in Modicon M580 CPU - BMEP582040, all versio… | 2022-05-04T09:38:40.369000Z |
| var-201907-1759 | Hangzhou Magic Point Technology Co., Ltd. is a technology-based enterprise combining arti… | 2022-05-04T09:38:40.103000Z |
| var-201906-1346 | DeviceViewer is a Windows-based IP camera viewing application. DeviceViewer has a passwo… | 2022-05-04T09:38:42.119000Z |
| var-201905-1431 | Sony LF-S80D wireless speaker is a smart speaker product produced by Sony Corporation. T… | 2022-05-04T09:38:43.102000Z |
| var-201903-1643 | ZTE Video Conference MCU Device exists XML File Information Disclosure Vulnerability in M… | 2022-05-04T09:38:48.838000Z |
| var-201901-1700 | Maipu switches generally have weak passwords. After entering, they can perform arbitrary … | 2022-05-04T09:38:51.071000Z |
| var-201810-1596 | Pelco Sarix Pro is a video surveillance device from Schneider Electric. Schneider Pelco … | 2022-05-04T09:38:57.756000Z |
| var-201810-1617 | Hangzhou DPtech Co., Ltd. (referred to as DPtech) is a high-tech enterprise integrating R… | 2022-05-04T09:38:57.743000Z |
| var-201809-1337 | Calamp is a pioneer in M2M telematics, managing more than 1.5M IoT devices. CalAmp l… | 2022-05-04T09:38:59.249000Z |
| var-201807-2272 | MikroTikRouterOS is a routing operating system based on Linux kernel development, compati… | 2022-05-04T09:39:04.468000Z |
| var-201803-2360 | The Play Library SDK is developed based on Dahua's proprietary stream encapsulation proto… | 2022-05-04T09:39:12.862000Z |
| var-201801-1826 | pelco Sarix Professional is a video camera. A code execution vulnerability exists in the… | 2022-05-04T09:39:19.207000Z |
| var-201801-1847 | SOC8000 IP-PBX is a new generation carrier-grade unified communications system. There is… | 2022-05-04T09:39:19.196000Z |
| var-201711-1236 | Sichuan Telecom Tianyi Broadband Home Gateway TEWA-500E is a home version router. Sichua… | 2022-05-04T09:39:21.883000Z |
| var-201712-0784 | IBM WebSphere MQ 8.0 and 9.0 could allow, under special circumstances, an unauthorized us… | 2022-05-04T09:39:21.241000Z |
| var-201711-0753 | IBM WebSphere MQ 8.0 and 9.0 could allow an authenticated user to cause a shared memory l… | 2022-05-04T09:39:22.550000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000045 | baserCMS plugin "Casebook Plugin" vulnerable to cross-site request forgery | 2016-04-06T15:29+09:00 | 2016-04-08T16:51+09:00 |
| jvndb-2016-000048 | EC-CUBE plugin "Social-button Plugin Premium" and "Social-button Plugin" vulnerable to cross-site scripting | 2016-04-08T12:31+09:00 | 2016-05-06T16:13+09:00 |
| jvndb-2016-000049 | Tokyo Star bank App fails to verify SSL server certificates | 2016-04-13T14:30+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000050 | Photopt App fails to verify SSL server certificates | 2016-04-19T13:44+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000054 | Electron may insecurely load Node modules | 2016-04-22T13:49+09:00 | 2016-06-01T15:56+09:00 |
| jvndb-2016-000055 | kintone mobile for Android information management vulnerability | 2016-04-25T15:35+09:00 | 2016-06-01T16:21+09:00 |
| jvndb-2016-000056 | kintone mobile for Android fails to verify SSL server certificates | 2016-04-25T15:36+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000051 | EC-CUBE fails to restrict access permissions | 2016-04-26T13:56+09:00 | 2016-05-31T17:41+09:00 |
| jvndb-2016-000052 | EC-CUBE fails to restrict access permissions | 2016-04-26T13:56+09:00 | 2016-05-31T17:41+09:00 |
| jvndb-2016-000057 | Multiple shiro8 Co., Ltd. freearea_ addition_plugins for EC-CUBE vulnerable to cross-site scripting | 2016-04-26T14:18+09:00 | 2016-05-25T17:48+09:00 |
| jvndb-2016-000053 | EC-CUBE vulnerable to cross-site request forgery | 2016-04-26T14:24+09:00 | 2016-05-31T17:40+09:00 |
| jvndb-2016-000058 | Apache Cordova fails to restrict access permissions | 2016-05-11T14:16+09:00 | 2016-06-02T17:49+09:00 |
| jvndb-2016-000059 | Apache Cordova vulnerable to arbitrary plugin execution | 2016-05-11T14:16+09:00 | 2016-06-01T16:30+09:00 |
| jvndb-2016-000061 | WN-GDN/R3 Series does not limit authentication attempts | 2016-05-12T14:34+09:00 | 2016-06-01T16:52+09:00 |
| jvndb-2016-000062 | WN-G300R Series vulnerable to cross-site scripting | 2016-05-12T14:34+09:00 | 2016-06-01T16:48+09:00 |
| jvndb-2016-000063 | FileMaker server issue where PHP source code may be viewable | 2016-05-13T14:27+09:00 | 2016-06-02T09:43+09:00 |
| jvndb-2016-000064 | WordPress plugin "Ninja Forms" vulnerable to PHP object injection | 2016-05-13T14:27+09:00 | 2016-06-01T17:00+09:00 |
| jvndb-2016-000046 | a-blog cms vulnerable to cross-site scripting | 2016-05-16T14:48+09:00 | 2017-05-23T13:44+09:00 |
| jvndb-2016-000047 | a-blog cms vulnerable to session management | 2016-05-16T14:48+09:00 | 2017-05-23T13:44+09:00 |
| jvndb-2016-000060 | Cybozu KUNAI App fails to verify SSL server certificates | 2016-05-16T16:14+09:00 | 2017-05-23T16:23+09:00 |
| jvndb-2016-000065 | 105 BANK App fails to verify SSL server certificates | 2016-05-18T15:26+09:00 | 2017-05-29T11:45+09:00 |
| jvndb-2016-000066 | Web Mailing List vulnerable to cross-site scripting | 2016-05-19T13:37+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000069 | MP Form Mail CGI Professional Edition vulnerable to directory traversal | 2016-05-20T14:22+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000068 | HumHub vulnerable to cross-site scripting | 2016-05-24T12:24+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000070 | php-contact-form vulnerable to cross-site scripting | 2016-05-24T12:27+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000067 | Jetstar App for iOS fails to verify SSL server certificates | 2016-05-24T13:36+09:00 | 2017-05-29T11:45+09:00 |
| jvndb-2016-002715 | Information Disclosure Vulnerability in Hitachi Command Suite | 2016-05-24T16:43+09:00 | 2016-08-03T16:09+09:00 |
| jvndb-2016-002716 | Cross-site Scripting Vulnerability in Hitachi Tuning Manager | 2016-05-24T16:43+09:00 | 2016-08-03T16:09+09:00 |
| jvndb-2016-000071 | WordPress plugin "Markdown on Save Improved" vulnerable to cross-site scripting | 2016-05-25T14:37+09:00 | 2016-06-08T17:23+09:00 |
| jvndb-2016-000075 | NetCommons vulnerable to privilege escalation | 2016-05-26T14:30+09:00 | 2016-06-23T15:13+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-01357 | WESP SDK 'WESPConfig' ActiveX存在多个缓冲区溢出漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01358 | UnAce缓冲区溢出漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01359 | SYNCK GRAPHICA Mailform Pro远程代码执行漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01360 | Squid HTTP头注入漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01361 | Speed Software Root Explorer目录遍历漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01362 | RubyGems xaviershay-dm-rails 'storage.rb' MySQL信息泄露漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01363 | phpBugTracker存在多个漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01364 | Cisco Unified Computing System C-Series DHCP报文处理拒绝服务漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01365 | Kony Enterprise Mobile Management存在多个信息泄露漏洞 | 2015-02-26 | 2015-03-02 |
| cnvd-2015-01386 | ADPlugg 'Access Code'字段HTML注入漏洞 | 2015-02-26 | 2015-03-03 |
| cnvd-2015-01387 | Adtrustmedia PrivDog SSL证书安全绕过漏洞 | 2015-02-26 | 2015-03-03 |
| cnvd-2015-01388 | AL-Mail32附件名缓冲区溢出漏洞 | 2015-02-26 | 2015-03-03 |
| cnvd-2015-01389 | Linux Kernel 'llc/sysctl_net_llc.c'本地信息泄露漏洞 | 2015-02-26 | 2015-03-03 |
| cnvd-2015-01560 | ILAS II图书管理系统SQL注入漏洞 | 2015-02-26 | 2015-04-01 |
| cnvd-2015-01339 | UberFire Framework存在多个漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01340 | textAngular跨站脚本漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01341 | Drupal Webform prepopulate block模块跨站脚本漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01342 | Samsung iPOLiS Device Manager缓冲区溢出漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01343 | GNU C Library代码注入漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01344 | McAfee Managed Agent输入验证漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01345 | Puppet Labs Facter信息泄露漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01346 | IBM Tivoli Storage Manager栈缓冲区溢出漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01347 | Cisco AsyncOS Web框架输入验证漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01348 | WordPress插件Contact Form DB跨站脚本漏洞 | 2015-02-27 | 2015-02-28 |
| cnvd-2015-01385 | Microsoft Virtual PC Hypervisor Virtual Machine Monitor安全绕过漏洞 | 2015-02-27 | 2015-03-03 |
| cnvd-2015-01399 | GNU glibc 'getaddrinfo.c'远程代码执行漏洞 | 2015-02-27 | 2015-03-04 |
| cnvd-2015-01402 | e2fsprogs本地缓冲区溢出漏洞 | 2015-02-27 | 2015-03-04 |
| cnvd-2015-01403 | CreA8social 'Add Game'字段HTML注入漏洞 | 2015-02-27 | 2015-03-04 |
| cnvd-2015-01350 | Joomla! Googlemaps插件安全绕过漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01366 | Vanilla Forums跨站脚本漏洞 | 2015-02-28 | 2015-03-02 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2003-avi-147 | Vulnérabilité dans Visual Basic pour Applications (VBA) | 2003-09-04T00:00:00.000000 | 2003-09-04T00:00:00.000000 |
| certa-2003-avi-148 | Vulnérabilité dans Microsoft Access Snapshot Viewer | 2003-09-04T00:00:00.000000 | 2003-09-04T00:00:00.000000 |
| CERTA-2003-AVI-149 | Vulnérabilités dans le service RPCSS sous Windows | 2003-09-11T00:00:00.000000 | 2003-09-17T00:00:00.000000 |
| CERTA-2003-AVI-150 | Vulnérabilités du client de messagerie Pine | 2003-09-11T00:00:00.000000 | 2003-09-12T00:00:00.000000 |
| certa-2003-avi-149 | Vulnérabilités dans le service RPCSS sous Windows | 2003-09-11T00:00:00.000000 | 2003-09-17T00:00:00.000000 |
| certa-2003-avi-150 | Vulnérabilités du client de messagerie Pine | 2003-09-11T00:00:00.000000 | 2003-09-12T00:00:00.000000 |
| CERTA-2003-AVI-151 | Vulnérabilité du serveur de base de données MySQL | 2003-09-16T00:00:00.000000 | 2003-10-10T00:00:00.000000 |
| certa-2003-avi-151 | Vulnérabilité du serveur de base de données MySQL | 2003-09-16T00:00:00.000000 | 2003-10-10T00:00:00.000000 |
| CERTA-2003-AVI-152 | Vulnérabilité du serveur OpenSSH | 2003-09-17T00:00:00.000000 | 2003-10-01T00:00:00.000000 |
| certa-2003-avi-152 | Vulnérabilité du serveur OpenSSH | 2003-09-17T00:00:00.000000 | 2003-10-01T00:00:00.000000 |
| CERTA-2003-AVI-153 | Vulnérabilités dans le serveur de messagerie Sendmail | 2003-09-19T00:00:00.000000 | 2004-01-21T00:00:00.000000 |
| certa-2003-avi-153 | Vulnérabilités dans le serveur de messagerie Sendmail | 2003-09-19T00:00:00.000000 | 2004-01-21T00:00:00.000000 |
| CERTA-2003-AVI-154 | Vulnérabilité dans lsh | 2003-09-22T00:00:00.000000 | 2003-10-02T00:00:00.000000 |
| certa-2003-avi-154 | Vulnérabilité dans lsh | 2003-09-22T00:00:00.000000 | 2003-10-02T00:00:00.000000 |
| CERTA-2003-AVI-155 | Vulnérabilité de ProFTPD | 2003-09-26T00:00:00.000000 | 2004-05-12T00:00:00.000000 |
| certa-2003-avi-155 | Vulnérabilité de ProFTPD | 2003-09-26T00:00:00.000000 | 2004-05-12T00:00:00.000000 |
| CERTA-2003-AVI-156 | Failles dans des implémentations de SSL/TLS | 2003-09-30T00:00:00.000000 | 2004-03-11T00:00:00.000000 |
| certa-2003-avi-156 | Failles dans des implémentations de SSL/TLS | 2003-09-30T00:00:00.000000 | 2004-03-11T00:00:00.000000 |
| CERTA-2003-AVI-157 | Vulnérabilité de DCE | 2003-10-03T00:00:00.000000 | 2003-10-03T00:00:00.000000 |
| certa-2003-avi-157 | Vulnérabilité de DCE | 2003-10-03T00:00:00.000000 | 2003-10-03T00:00:00.000000 |
| CERTA-2003-AVI-158 | Vulnérabilité dans les équipements NetScreen Firewall/VPN | 2003-10-07T00:00:00.000000 | 2003-10-07T00:00:00.000000 |
| CERTA-2003-AVI-159 | Vulnérabilité de NFS sous SGI IRIX | 2003-10-07T00:00:00.000000 | 2003-10-07T00:00:00.000000 |
| certa-2003-avi-158 | Vulnérabilité dans les équipements NetScreen Firewall/VPN | 2003-10-07T00:00:00.000000 | 2003-10-07T00:00:00.000000 |
| certa-2003-avi-159 | Vulnérabilité de NFS sous SGI IRIX | 2003-10-07T00:00:00.000000 | 2003-10-07T00:00:00.000000 |
| CERTA-2003-AVI-160 | Vulnérabilité des noyaux BSD dans la gestion du cache ARP | 2003-10-09T00:00:00.000000 | 2003-10-09T00:00:00.000000 |
| certa-2003-avi-160 | Vulnérabilité des noyaux BSD dans la gestion du cache ARP | 2003-10-09T00:00:00.000000 | 2003-10-09T00:00:00.000000 |
| CERTA-2003-AVI-161 | Vulnérabilité dans procfs et linprocfs sous FreeBSD | 2003-10-10T00:00:00.000000 | 2003-10-10T00:00:00.000000 |
| CERTA-2003-AVI-162 | Vulnérabilités dans la fonction "readv" sous FreeBSD | 2003-10-10T00:00:00.000000 | 2003-10-17T00:00:00.000000 |
| certa-2003-avi-161 | Vulnérabilité dans procfs et linprocfs sous FreeBSD | 2003-10-10T00:00:00.000000 | 2003-10-10T00:00:00.000000 |
| certa-2003-avi-162 | Vulnérabilités dans la fonction "readv" sous FreeBSD | 2003-10-10T00:00:00.000000 | 2003-10-17T00:00:00.000000 |