Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0759 |
N/A
|
Buffer overflow in FuseMAIL POP service via long … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:37.653Z |
| CVE-1999-0787 |
N/A
|
The SSH authentication agent follows symlinks via… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.126Z |
| CVE-1999-0788 |
N/A
|
Arkiea nlservd allows remote attackers to conduct… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.020Z |
| CVE-1999-0791 |
N/A
|
Hybrid Network cable modems do not include an aut… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.074Z |
| CVE-1999-0823 |
N/A
|
Buffer overflow in FreeBSD xmindpath allows local… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.126Z |
| CVE-1999-0826 |
N/A
|
Buffer overflow in FreeBSD angband allows local u… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.225Z |
| CVE-1999-0873 |
N/A
|
Buffer overflow in Skyfull mail server via MAIL F… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:28.820Z |
| CVE-1999-0904 |
N/A
|
Buffer overflow in BFTelnet allows remote attacke… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.075Z |
| CVE-1999-0912 |
N/A
|
FreeBSD VFS cache (vfs_cache) allows local users … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.308Z |
| CVE-1999-0927 |
N/A
|
NTMail allows remote attackers to read arbitrary … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.410Z |
| CVE-1999-0928 |
N/A
|
Buffer overflow in SmartDesk WebSuite allows remo… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.498Z |
| CVE-1999-0932 |
N/A
|
Mediahouse Statistics Server allows remote attack… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.378Z |
| CVE-1999-0942 |
N/A
|
UnixWare dos7utils allows a local user to gain ro… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.614Z |
| CVE-1999-0946 |
N/A
|
Buffer overflow in Yamaha MidiPlug via a Text var… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.425Z |
| CVE-1999-0954 |
N/A
|
WWWBoard has a default username and default password. |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.379Z |
| CVE-1999-0971 |
N/A
|
Buffer overflow in Exim allows local users to gai… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.296Z |
| CVE-1999-1004 |
N/A
|
Buffer overflow in the POP server POProxy for the… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.347Z |
| CVE-2000-0002 |
N/A
|
Buffer overflow in ZBServer Pro 1.50 allows remot… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T04:58:11.447Z |
| CVE-2000-0009 |
N/A
|
The bna_pass program in Optivity NETarchitect use… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T04:58:11.888Z |
| CVE-2000-0056 |
N/A
|
IMail IMONITOR status.cgi CGI script allows remot… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.944Z |
| CVE-2000-0063 |
N/A
|
cgiproc CGI script in Nortel Contivity HTTP serve… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.526Z |
| CVE-2000-0064 |
N/A
|
cgiproc CGI script in Nortel Contivity HTTP serve… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.982Z |
| CVE-2000-0065 |
N/A
|
Buffer overflow in InetServ 3.0 allows remote att… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.909Z |
| CVE-2000-0075 |
N/A
|
Super Mail Transfer Package (SMTP), later called … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.968Z |
| CVE-2000-0076 |
N/A
|
nviboot boot script in the Debian nvi package all… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.920Z |
| CVE-2000-0090 |
N/A
|
VMWare 1.1.2 allows local users to cause a denial… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.623Z |
| CVE-2000-0094 |
N/A
|
procfs in BSD systems allows local users to gain … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.945Z |
| CVE-2000-0116 |
N/A
|
Firewall-1 does not properly filter script tags, … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.921Z |
| CVE-2000-0117 |
N/A
|
The siteUserMod.cgi program in Cobalt RaQ2 server… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.941Z |
| CVE-2000-0127 |
N/A
|
The Webspeed configuration program does not prope… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:54.007Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0759 |
N/A
|
Buffer overflow in FuseMAIL POP service via long … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:37.653Z |
| CVE-1999-0787 |
N/A
|
The SSH authentication agent follows symlinks via… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.126Z |
| CVE-1999-0788 |
N/A
|
Arkiea nlservd allows remote attackers to conduct… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.020Z |
| CVE-1999-0791 |
N/A
|
Hybrid Network cable modems do not include an aut… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.074Z |
| CVE-1999-0823 |
N/A
|
Buffer overflow in FreeBSD xmindpath allows local… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.126Z |
| CVE-1999-0826 |
N/A
|
Buffer overflow in FreeBSD angband allows local u… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:48:38.225Z |
| CVE-1999-0873 |
N/A
|
Buffer overflow in Skyfull mail server via MAIL F… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:28.820Z |
| CVE-1999-0904 |
N/A
|
Buffer overflow in BFTelnet allows remote attacke… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.075Z |
| CVE-1999-0912 |
N/A
|
FreeBSD VFS cache (vfs_cache) allows local users … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.308Z |
| CVE-1999-0927 |
N/A
|
NTMail allows remote attackers to read arbitrary … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.410Z |
| CVE-1999-0928 |
N/A
|
Buffer overflow in SmartDesk WebSuite allows remo… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.498Z |
| CVE-1999-0932 |
N/A
|
Mediahouse Statistics Server allows remote attack… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.378Z |
| CVE-1999-0942 |
N/A
|
UnixWare dos7utils allows a local user to gain ro… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.614Z |
| CVE-1999-0946 |
N/A
|
Buffer overflow in Yamaha MidiPlug via a Text var… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.425Z |
| CVE-1999-0954 |
N/A
|
WWWBoard has a default username and default password. |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.379Z |
| CVE-1999-0971 |
N/A
|
Buffer overflow in Exim allows local users to gai… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.296Z |
| CVE-1999-1004 |
N/A
|
Buffer overflow in the POP server POProxy for the… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-01T16:55:29.347Z |
| CVE-2000-0002 |
N/A
|
Buffer overflow in ZBServer Pro 1.50 allows remot… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T04:58:11.447Z |
| CVE-2000-0009 |
N/A
|
The bna_pass program in Optivity NETarchitect use… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T04:58:11.888Z |
| CVE-2000-0056 |
N/A
|
IMail IMONITOR status.cgi CGI script allows remot… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.944Z |
| CVE-2000-0063 |
N/A
|
cgiproc CGI script in Nortel Contivity HTTP serve… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.526Z |
| CVE-2000-0064 |
N/A
|
cgiproc CGI script in Nortel Contivity HTTP serve… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.982Z |
| CVE-2000-0065 |
N/A
|
Buffer overflow in InetServ 3.0 allows remote att… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.909Z |
| CVE-2000-0075 |
N/A
|
Super Mail Transfer Package (SMTP), later called … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.968Z |
| CVE-2000-0076 |
N/A
|
nviboot boot script in the Debian nvi package all… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.920Z |
| CVE-2000-0090 |
N/A
|
VMWare 1.1.2 allows local users to cause a denial… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.623Z |
| CVE-2000-0094 |
N/A
|
procfs in BSD systems allows local users to gain … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.945Z |
| CVE-2000-0116 |
N/A
|
Firewall-1 does not properly filter script tags, … |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.921Z |
| CVE-2000-0117 |
N/A
|
The siteUserMod.cgi program in Cobalt RaQ2 server… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:53.941Z |
| CVE-2000-0127 |
N/A
|
The Webspeed configuration program does not prope… |
n/a |
n/a |
2000-10-13T04:00:00 | 2024-08-08T05:05:54.007Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-1999-0834 | Buffer overflow in RSAREF2 via the encryption and decryption functions in the RSAREF library. | 1999-12-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0838 | Buffer overflow in Serv-U FTP 2.5 allows remote users to conduct a denial of service via the SITE c… | 1999-12-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0846 | Denial of service in MDaemon 2.7 via a large number of connection attempts. | 1999-12-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0853 | Buffer overflow in Netscape Enterprise Server and Netscape FastTrack Server allows remote attackers… | 1999-12-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0855 | Buffer overflow in FreeBSD gdc program. | 1999-12-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0856 | login in Slackware 7.0 allows remote attackers to identify valid users on the system by reporting a… | 1999-12-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0857 | FreeBSD gdc program allows local users to modify files via a symlink attack. | 1999-12-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0859 | Solaris arp allows local users to read files via the -f parameter, which lists lines in the file th… | 1999-12-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0860 | Solaris chkperm allows local users to read files owned by bin via the VMSYS environmental variable … | 1999-12-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0963 | FreeBSD mount_union command allows local users to gain root privileges via a symlink attack. | 1999-12-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0004 | ZBServer Pro allows remote attackers to read source code for executable files by inserting a . (dot… | 1999-12-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0021 | Lotus Domino HTTP server allows remote attackers to determine the real path of the server via a req… | 1999-12-01T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0828 | UnixWare pkg commands such as pkginfo, pkgcat, and pkgparam allow local users to read arbitrary fil… | 1999-12-02T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0850 | The default permissions for Endymion MailMan allow local users to read email or modify files. | 1999-12-02T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0852 | IBM WebSphere sets permissions that allow a local user to modify a deinstallation script or its dat… | 1999-12-02T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0858 | Internet Explorer 5 allows a remote attacker to modify the IE client's proxy configuration via a ma… | 1999-12-02T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0862 | Insecure directory permissions in RPM distribution for PostgreSQL allows local users to gain privil… | 1999-12-02T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0366 | dump in Debian GNU/Linux 2.1 does not properly restore symlinks, which allows a local user to modif… | 1999-12-02T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0825 | The default permissions for UnixWare /var/mail allow local users to read and modify other users' mail. | 1999-12-03T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0864 | UnixWare programs that dump core allow a local user to modify files via a symlink attack on the ./c… | 1999-12-03T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0865 | Buffer overflow in CommuniGatePro via a long string to the HTTP configuration port. | 1999-12-03T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0866 | Buffer overflow in UnixWare xauto program allows local users to gain root privilege. | 1999-12-03T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0139 | Internet Anywhere POP3 Mail Server allows local users to cause a denial of service via a malformed … | 1999-12-03T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0357 | ORBit and esound in Red Hat Linux 6.1 do not use sufficiently random numbers, which allows local us… | 1999-12-03T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0358 | ORBit and gnome-session in Red Hat Linux 6.1 allows remote attackers to crash a program. | 1999-12-03T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0988 | UnixWare pkgtrans allows local users to read arbitrary files via a symlink attack. | 1999-12-04T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0982 | The Sun Web-Based Enterprise Management (WBEM) installation script stores a password in plaintext i… | 1999-12-05T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0990 | Error messages generated by gdm with the VerboseAuth setting allows an attacker to identify valid u… | 1999-12-05T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0989 | Buffer overflow in Internet Explorer 5 directshow filter (MSDXM.OCX) allows remote attackers to exe… | 1999-12-06T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-1999-0991 | Buffer overflow in GoodTech Telnet Server NT allows remote users to cause a denial of service via a… | 1999-12-06T05:00:00.000 | 2025-04-03T01:03:51.193 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-8948-ffc6-jg52 |
4.2 (3.1)
|
Insecure Default Configuration in redbird | 2019-06-06T15:32:21Z | 2021-08-04T20:58:53Z |
| ghsa-gm9g-2g8v-fvxj |
7.5 (3.1)
|
Prototype Pollution in upmerge | 2019-06-06T15:32:28Z | 2021-09-16T20:59:20Z |
| ghsa-c35v-qwqg-87jc |
3.1 (3.1)
|
express-basic-auth Timing Attack due to native string comparison instead of constant time string co… | 2019-06-06T15:32:32Z | 2022-08-03T16:27:53Z |
| ghsa-r6v3-hpxj-r8rv |
7.5 (3.1)
|
Code Injection in PyXDG | 2019-06-07T20:56:27Z | 2024-10-15T16:41:13Z |
| ghsa-g45g-g52h-39rg |
4.7 (3.1)
|
Cross-site Scripting in Chartkick | 2019-06-07T20:56:42Z | 2023-01-23T20:02:18Z |
| ghsa-52mh-p2m2-w625 |
6.1 (3.1)
|
Cross-site Scripting in HAPI FHIR | 2019-06-07T20:56:59Z | 2021-08-04T21:01:39Z |
| ghsa-984p-xq9m-4rjw |
5.6 (3.1)
|
Rate Limiting Bypass in express-brute | 2019-06-07T21:01:53Z | 2021-08-04T21:03:16Z |
| ghsa-6394-6h9h-cfjg |
|
Regular Expression Denial of Service | 2019-06-07T21:12:35Z | 2021-02-25T17:23:12Z |
| ghsa-hxcm-v35h-mg2x |
|
Prototype Pollution in querystringify | 2019-06-07T21:12:50Z | 2023-11-29T22:16:43Z |
| ghsa-6cc5-2vg4-cc7m |
6.1 (3.1)
5.3 (4.0)
|
Twisted CRLF Injection | 2019-06-10T18:05:06Z | 2024-11-25T18:33:21Z |
| ghsa-7rp2-fm2h-wchj |
6.1 (3.1)
5.3 (4.0)
|
Django Cross-site Scripting in AdminURLFieldWidget | 2019-06-10T18:43:25Z | 2024-09-20T16:03:27Z |
| ghsa-8w57-jfpm-945m |
|
Denial of Service in http-proxy-agent | 2019-06-11T16:16:07Z | 2023-04-11T00:26:58Z |
| ghsa-vc6r-4x6g-mmqc |
|
Path Traversal in m-server | 2019-06-11T16:16:23Z | 2020-08-31T18:33:45Z |
| ghsa-j9f8-8h89-j69x |
7.3 (3.1)
|
Remote Code Execution in node-os-utils | 2019-06-11T16:16:34Z | 2021-08-04T21:06:49Z |
| ghsa-73cw-jxmm-qpgh |
|
Path Traversal in localhost-now | 2019-06-11T16:40:48Z | 2020-08-31T18:31:31Z |
| ghsa-8f93-rv4p-x4jw |
|
SQL Injection in sql | 2019-06-12T16:36:52Z | 2020-08-31T18:31:48Z |
| ghsa-57cf-349j-352g |
|
Out-of-bounds Read in npmconf | 2019-06-12T16:37:00Z | 2020-08-31T18:31:27Z |
| ghsa-gc94-6w89-hpqr |
|
Command Injection in fs-path | 2019-06-12T16:37:07Z | 2021-09-16T20:59:56Z |
| ghsa-46hv-7769-j7rx |
5.3 (3.1)
|
Unauthorized File Access in harp | 2019-06-13T16:12:22Z | 2023-09-07T21:43:42Z |
| ghsa-6fmm-47qc-p4m4 |
5.3 (3.1)
|
Unauthorized File Access in harp | 2019-06-13T16:12:26Z | 2023-09-07T21:41:55Z |
| ghsa-22mf-97vh-x8rw |
7.5 (3.1)
7.2 (4.0)
|
Deserialization vulnerability exists in parso | 2019-06-13T16:12:57Z | 2024-10-09T20:52:02Z |
| ghsa-fqfj-cmh6-hj49 |
9.8 (3.1)
|
ruby-openid SSRF via claimed_id request | 2019-06-13T16:15:56Z | 2023-07-05T19:06:46Z |
| ghsa-2479-qvv7-47qq |
7.5 (3.1)
|
Parse Server before v3.4.1 vulnerable to Denial of Service | 2019-06-13T16:22:13Z | 2022-09-13T22:16:02Z |
| ghsa-f7qw-5pvg-mmwp |
7.3 (3.1)
|
Prototype Pollution in lutils-merge | 2019-06-13T18:58:44Z | 2021-08-16T14:36:47Z |
| ghsa-h6ch-v84p-w6p9 |
|
Regular Expression Denial of Service (ReDoS) | 2019-06-13T18:58:54Z | 2021-02-24T19:27:02Z |
| ghsa-pm52-wwrw-c282 |
6.5 (3.1)
|
Command Injection in wiki-plugin-datalog | 2019-06-13T18:59:06Z | 2021-08-16T14:32:10Z |
| ghsa-crfx-5phg-hmw9 |
|
Cross-Site Scripting in ids-enterprise | 2019-06-13T18:59:12Z | 2020-08-31T18:41:52Z |
| ghsa-hpfq-8wx8-cgqw |
|
Cross-Site Scripting in ids-enterprise | 2019-06-13T18:59:18Z | 2020-08-31T18:41:56Z |
| ghsa-49r3-3h96-rwj6 |
|
Cross-Site Scripting in ids-enterprise | 2019-06-13T19:09:31Z | 2020-08-31T18:41:54Z |
| ghsa-jwgx-9mmh-684w |
9.8 (3.1)
|
Credential exposure through log files in Undertow | 2019-06-13T20:02:56Z | 2022-02-11T21:13:16Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-454 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.426864Z |
| pysec-2021-455 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.577181Z |
| pysec-2021-456 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.721328Z |
| pysec-2021-457 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:47.879310Z |
| pysec-2021-458 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.047849Z |
| pysec-2021-459 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.199089Z |
| pysec-2021-460 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can fo… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.349137Z |
| pysec-2021-461 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.500169Z |
| pysec-2021-462 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.648836Z |
| pysec-2021-463 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.800365Z |
| pysec-2021-464 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:48.953620Z |
| pysec-2021-465 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.104886Z |
| pysec-2021-466 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.257791Z |
| pysec-2021-467 |
|
TensorFlow is an end-to-end open source platform for machine learning. Calling `tf.raw_op… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.452107Z |
| pysec-2021-468 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.596439Z |
| pysec-2021-469 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.747683Z |
| pysec-2021-470 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:49.894355Z |
| pysec-2021-471 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.046503Z |
| pysec-2021-472 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.195889Z |
| pysec-2021-473 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.345149Z |
| pysec-2021-474 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can tr… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.495115Z |
| pysec-2021-475 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.647185Z |
| pysec-2021-476 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.800401Z |
| pysec-2021-477 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:50.949292Z |
| pysec-2021-478 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.099370Z |
| pysec-2021-479 |
|
TensorFlow is an end-to-end open source platform for machine learning. The implementation… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.250544Z |
| pysec-2021-480 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.420468Z |
| pysec-2021-481 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can re… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.614588Z |
| pysec-2021-483 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:51.920437Z |
| pysec-2021-484 |
|
TensorFlow is an end-to-end open source platform for machine learning. An attacker can ca… | tensorflow-cpu | 2021-05-14T20:15:00Z | 2021-12-09T06:34:52.071121Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| MAL-2022-453 | Malicious code in @ncr-swt-retail/scox-npm-releases (npm) | 2022-06-20T18:20:28Z | 2022-06-20T18:20:28Z |
| MAL-2022-476 | Malicious code in @node32/fetlife-assets (npm) | 2022-06-20T18:20:28Z | 2022-06-20T18:20:28Z |
| MAL-2022-478 | Malicious code in @octopus-ng/fetlife-assets (npm) | 2022-06-20T18:20:28Z | 2022-06-20T18:20:29Z |
| MAL-2022-479 | Malicious code in @ohiosos/fetlife-assets (npm) | 2022-06-20T18:20:28Z | 2022-06-20T18:20:29Z |
| mal-2022-453 | Malicious code in @ncr-swt-retail/scox-npm-releases (npm) | 2022-06-20T18:20:28Z | 2022-06-20T18:20:28Z |
| mal-2022-476 | Malicious code in @node32/fetlife-assets (npm) | 2022-06-20T18:20:28Z | 2022-06-20T18:20:28Z |
| mal-2022-478 | Malicious code in @octopus-ng/fetlife-assets (npm) | 2022-06-20T18:20:28Z | 2022-06-20T18:20:29Z |
| mal-2022-479 | Malicious code in @ohiosos/fetlife-assets (npm) | 2022-06-20T18:20:28Z | 2022-06-20T18:20:29Z |
| MAL-2022-482 | Malicious code in @openmage/fetlife-assets (npm) | 2022-06-20T18:20:29Z | 2022-06-20T18:20:29Z |
| MAL-2022-483 | Malicious code in @openu/fetlife-assets (npm) | 2022-06-20T18:20:29Z | 2022-06-20T18:20:29Z |
| MAL-2022-495 | Malicious code in @parabol/fetlife-assets (npm) | 2022-06-20T18:20:29Z | 2022-06-20T18:20:29Z |
| MAL-2022-497 | Malicious code in @passit/fetlife-assets (npm) | 2022-06-20T18:20:29Z | 2022-06-20T18:20:30Z |
| mal-2022-482 | Malicious code in @openmage/fetlife-assets (npm) | 2022-06-20T18:20:29Z | 2022-06-20T18:20:29Z |
| mal-2022-483 | Malicious code in @openu/fetlife-assets (npm) | 2022-06-20T18:20:29Z | 2022-06-20T18:20:29Z |
| mal-2022-495 | Malicious code in @parabol/fetlife-assets (npm) | 2022-06-20T18:20:29Z | 2022-06-20T18:20:29Z |
| mal-2022-497 | Malicious code in @passit/fetlife-assets (npm) | 2022-06-20T18:20:29Z | 2022-06-20T18:20:30Z |
| MAL-2022-500 | Malicious code in @phabricator/fetlife-assets (npm) | 2022-06-20T18:20:30Z | 2022-06-20T18:20:30Z |
| MAL-2022-501 | Malicious code in @picsart/fetlife-assets (npm) | 2022-06-20T18:20:30Z | 2022-06-20T18:20:30Z |
| MAL-2022-504 | Malicious code in @plantemoran/fetlife-assets (npm) | 2022-06-20T18:20:30Z | 2022-06-20T18:20:31Z |
| MAL-2022-509 | Malicious code in @pnfp/fetlife-assets (npm) | 2022-06-20T18:20:30Z | 2022-06-20T18:20:31Z |
| mal-2022-500 | Malicious code in @phabricator/fetlife-assets (npm) | 2022-06-20T18:20:30Z | 2022-06-20T18:20:30Z |
| mal-2022-501 | Malicious code in @picsart/fetlife-assets (npm) | 2022-06-20T18:20:30Z | 2022-06-20T18:20:30Z |
| mal-2022-504 | Malicious code in @plantemoran/fetlife-assets (npm) | 2022-06-20T18:20:30Z | 2022-06-20T18:20:31Z |
| mal-2022-509 | Malicious code in @pnfp/fetlife-assets (npm) | 2022-06-20T18:20:30Z | 2022-06-20T18:20:31Z |
| MAL-2022-510 | Malicious code in @polymail/fetlife-assets (npm) | 2022-06-20T18:20:31Z | 2022-06-20T18:20:31Z |
| MAL-2022-512 | Malicious code in @pornhub/fetlife-assets (npm) | 2022-06-20T18:20:31Z | 2022-06-20T18:20:31Z |
| MAL-2022-517 | Malicious code in @portswigger/fetlife-assets (npm) | 2022-06-20T18:20:31Z | 2022-06-20T18:20:32Z |
| MAL-2022-533 | Malicious code in @prospect/fetlife-assets (npm) | 2022-06-20T18:20:31Z | 2022-06-20T18:20:32Z |
| MAL-2022-534 | Malicious code in @protiviti/fetlife-assets (npm) | 2022-06-20T18:20:31Z | 2022-06-20T18:20:32Z |
| mal-2022-510 | Malicious code in @polymail/fetlife-assets (npm) | 2022-06-20T18:20:31Z | 2022-06-20T18:20:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2022-0364 | vim: Mehrere Schwachstellen | 2022-05-19T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-1907 | Grafana: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-05-19T22:00:00.000+00:00 | 2024-01-23T23:00:00.000+00:00 |
| wid-sec-w-2022-0180 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-05-22T22:00:00.000+00:00 | 2023-07-13T22:00:00.000+00:00 |
| wid-sec-w-2022-0016 | Linux Kernel: Mehrere Schwachstellen | 2022-05-24T22:00:00.000+00:00 | 2024-04-24T22:00:00.000+00:00 |
| wid-sec-w-2023-0857 | IBM QRadar SIEM: Mehrere Schwachstellen | 2022-05-24T22:00:00.000+00:00 | 2023-04-04T22:00:00.000+00:00 |
| wid-sec-w-2022-0268 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-05-26T22:00:00.000+00:00 | 2024-07-09T22:00:00.000+00:00 |
| wid-sec-w-2022-0284 | logrotate: Schwachstelle ermöglicht Denial of Service | 2022-05-26T22:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| wid-sec-w-2022-0365 | CUPS: Schwachstelle ermöglicht Privilegieneskalation | 2022-05-26T22:00:00.000+00:00 | 2024-02-20T23:00:00.000+00:00 |
| wid-sec-w-2022-0932 | dpkg: Schwachstelle ermöglicht Manipulation von Dateien | 2022-05-26T22:00:00.000+00:00 | 2024-08-11T22:00:00.000+00:00 |
| wid-sec-w-2022-1661 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-05-26T22:00:00.000+00:00 | 2023-06-28T22:00:00.000+00:00 |
| wid-sec-w-2022-2256 | Red Hat Enterprise Linux und Virtualization: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-05-26T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2022-0017 | MariaDB: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-05-29T22:00:00.000+00:00 | 2023-09-27T22:00:00.000+00:00 |
| wid-sec-w-2022-0130 | vim: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-05-29T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0796 | Linux Kernel: Schwachstelle ermöglicht Offenlegung von Informationen | 2022-05-29T22:00:00.000+00:00 | 2024-02-07T23:00:00.000+00:00 |
| wid-sec-w-2022-0131 | vim: Mehrere Schwachstellen | 2022-05-30T22:00:00.000+00:00 | 2023-04-03T22:00:00.000+00:00 |
| wid-sec-w-2022-0019 | Mozilla Firefox und Thunderbird: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-05-31T22:00:00.000+00:00 | 2024-07-10T22:00:00.000+00:00 |
| wid-sec-w-2022-0132 | vim: Schwachstelle ermöglicht Codeausführung | 2022-05-31T22:00:00.000+00:00 | 2025-03-30T22:00:00.000+00:00 |
| wid-sec-w-2022-0269 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2022-05-31T22:00:00.000+00:00 | 2024-04-17T22:00:00.000+00:00 |
| wid-sec-w-2023-0856 | IBM QRadar SIEM: Mehrere Schwachstellen | 2022-05-31T22:00:00.000+00:00 | 2023-04-04T22:00:00.000+00:00 |
| wid-sec-w-2022-0023 | Red Hat OpenShift: Mehrere Schwachstellen | 2022-06-01T22:00:00.000+00:00 | 2024-08-28T22:00:00.000+00:00 |
| wid-sec-w-2022-0028 | IBM Java: Mehrere Schwachstellen | 2022-06-01T22:00:00.000+00:00 | 2024-12-17T23:00:00.000+00:00 |
| wid-sec-w-2022-0078 | vim: Schwachstelle ermöglicht Codeausführung | 2022-06-02T22:00:00.000+00:00 | 2023-12-14T23:00:00.000+00:00 |
| wid-sec-w-2022-0079 | Linux Kernel: Schwachstelle ermöglicht Privilegieneskalation | 2022-06-02T22:00:00.000+00:00 | 2023-01-11T23:00:00.000+00:00 |
| wid-sec-w-2022-0135 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-06-06T22:00:00.000+00:00 | 2023-04-05T22:00:00.000+00:00 |
| wid-sec-w-2022-0137 | Android Patchday Juni 2022 | 2022-06-06T22:00:00.000+00:00 | 2024-06-24T22:00:00.000+00:00 |
| wid-sec-w-2022-0181 | Grub2: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2022-06-07T22:00:00.000+00:00 | 2025-04-06T22:00:00.000+00:00 |
| wid-sec-w-2022-0192 | Apache HTTP Server: Mehrere Schwachstellen | 2022-06-07T22:00:00.000+00:00 | 2024-03-26T23:00:00.000+00:00 |
| wid-sec-w-2022-0255 | PHP: Mehrere Schwachstellen ermöglichen Codeausführung | 2022-06-09T22:00:00.000+00:00 | 2023-12-04T23:00:00.000+00:00 |
| wid-sec-w-2022-0262 | Ruby: Mehrere Schwachstellen | 2022-06-09T22:00:00.000+00:00 | 2025-05-18T22:00:00.000+00:00 |
| wid-sec-w-2022-0271 | vim: Mehrere Schwachstellen | 2022-06-12T22:00:00.000+00:00 | 2023-12-14T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2005:517 | Red Hat Security Advisory: HelixPlayer security update | 2005-06-23T19:31:00+00:00 | 2025-11-21T17:29:14+00:00 |
| rhsa-2005_517 | Red Hat Security Advisory: HelixPlayer security update | 2005-06-23T19:31:00+00:00 | 2024-11-14T10:03:50+00:00 |
| rhsa-2005:535 | Red Hat Security Advisory: sudo security update | 2005-06-29T15:54:00+00:00 | 2026-01-13T20:57:36+00:00 |
| rhsa-2005_535 | Red Hat Security Advisory: sudo security update | 2005-06-29T15:54:00+00:00 | 2024-11-21T23:51:50+00:00 |
| rhsa-2005:569 | Red Hat Security Advisory: zlib security update | 2005-07-06T14:30:00+00:00 | 2025-11-21T17:29:18+00:00 |
| rhsa-2005_569 | Red Hat Security Advisory: zlib security update | 2005-07-06T14:30:00+00:00 | 2024-11-21T23:52:46+00:00 |
| rhsa-2005:564 | Red Hat Security Advisory: php security update | 2005-07-07T19:56:00+00:00 | 2026-01-08T09:18:43+00:00 |
| rhsa-2005_564 | Red Hat Security Advisory: php security update | 2005-07-07T19:56:00+00:00 | 2024-11-21T23:52:54+00:00 |
| rhsa-2005:575 | Red Hat Security Advisory: Adobe Acrobat Reader security update | 2005-07-08T19:40:00+00:00 | 2026-01-13T22:39:46+00:00 |
| rhsa-2005_575 | Red Hat Security Advisory: Adobe Acrobat Reader security update | 2005-07-08T19:40:00+00:00 | 2024-11-14T10:03:57+00:00 |
| rhsa-2005:562 | Red Hat Security Advisory: krb5 security update | 2005-07-12T18:12:00+00:00 | 2026-01-13T20:57:41+00:00 |
| rhsa-2005_562 | Red Hat Security Advisory: krb5 security update | 2005-07-12T18:12:00+00:00 | 2024-11-21T23:52:34+00:00 |
| rhsa-2005:567 | Red Hat Security Advisory: krb5 security update | 2005-07-12T18:15:00+00:00 | 2026-01-13T20:57:39+00:00 |
| rhsa-2005_567 | Red Hat Security Advisory: krb5 security update | 2005-07-12T18:15:00+00:00 | 2024-11-21T23:52:38+00:00 |
| rhsa-2005:571 | Red Hat Security Advisory: cups security update | 2005-07-14T17:48:00+00:00 | 2025-11-21T17:29:18+00:00 |
| rhsa-2005_571 | Red Hat Security Advisory: cups security update | 2005-07-14T17:48:00+00:00 | 2024-11-21T23:53:04+00:00 |
| rhsa-2005:586 | Red Hat Security Advisory: firefox security update | 2005-07-21T10:14:00+00:00 | 2025-11-21T17:29:21+00:00 |
| rhsa-2005_586 | Red Hat Security Advisory: firefox security update | 2005-07-21T10:14:00+00:00 | 2024-11-21T23:55:20+00:00 |
| rhsa-2005:601 | Red Hat Security Advisory: thunderbird security update | 2005-07-21T17:42:00+00:00 | 2026-01-13T22:35:25+00:00 |
| rhsa-2005_601 | Red Hat Security Advisory: thunderbird security update | 2005-07-21T17:42:00+00:00 | 2024-11-21T23:55:30+00:00 |
| rhsa-2005:584 | Red Hat Security Advisory: zlib security update | 2005-07-21T17:50:00+00:00 | 2026-01-13T22:38:25+00:00 |
| rhsa-2005_584 | Red Hat Security Advisory: zlib security update | 2005-07-21T17:50:00+00:00 | 2024-11-21T23:53:34+00:00 |
| rhsa-2005:378 | Red Hat Security Advisory: cpio security update | 2005-07-21T18:12:00+00:00 | 2025-11-21T17:28:58+00:00 |
| rhsa-2005_378 | Red Hat Security Advisory: cpio security update | 2005-07-21T18:12:00+00:00 | 2024-11-21T23:41:14+00:00 |
| rhsa-2005:639 | Red Hat Security Advisory: kdenetwork security update | 2005-07-22T01:26:00+00:00 | 2025-11-21T17:29:24+00:00 |
| rhsa-2005_639 | Red Hat Security Advisory: kdenetwork security update | 2005-07-22T01:26:00+00:00 | 2024-11-21T23:55:47+00:00 |
| rhsa-2005:587 | Red Hat Security Advisory: mozilla security update | 2005-07-22T10:41:00+00:00 | 2025-11-21T17:29:21+00:00 |
| rhsa-2005_587 | Red Hat Security Advisory: mozilla security update | 2005-07-22T10:41:00+00:00 | 2024-11-21T23:55:25+00:00 |
| rhsa-2005:582 | Red Hat Security Advisory: httpd security update | 2005-07-25T07:46:00+00:00 | 2025-11-21T17:29:19+00:00 |
| rhsa-2005_582 | Red Hat Security Advisory: httpd security update | 2005-07-25T07:46:00+00:00 | 2024-11-21T23:53:14+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsma-20-296-02 | B. Braun SpaceCom, Battery Pack SP with Wi-Fi, and Data module compactplus | 2020-10-22T00:00:00.000000Z | 2020-10-22T00:00:00.000000Z |
| icsa-20-301-01 | SHUN HU Technology JUUKO Industrial Radio Remote Control | 2020-10-27T00:00:00.000000Z | 2020-10-27T00:00:00.000000Z |
| icsa-20-303-02 | Mitsubishi Electric MELSEC iQ-R | 2020-10-29T00:00:00.000000Z | 2020-10-29T00:00:00.000000Z |
| icsa-20-303-01 | Mitsubishi Electric MELSEC iQ-R, Q, and L Series (Update E) | 2020-10-29T06:00:00.000000Z | 2024-09-05T06:00:00.000000Z |
| icsa-20-308-01 | WAGO Series 750-88x and 750-352 (Update A) | 2020-11-03T00:00:00.000000Z | 2020-12-15T00:00:00.000000Z |
| icsa-20-308-02 | NEXCOM NIO50 | 2020-11-03T00:00:00.000000Z | 2020-11-03T00:00:00.000000Z |
| icsa-20-308-03 | ARC Informatique PcVue (Update A) | 2020-11-03T00:00:00.000000Z | 2021-01-05T00:00:00.000000Z |
| icsa-20-310-01 | WECON PLC Editor | 2020-11-05T00:00:00.000000Z | 2020-11-05T00:00:00.000000Z |
| icsa-20-310-02 | Mitsubishi Electric GT14 Model of GOT1000 Series | 2020-11-05T00:00:00.000000Z | 2020-11-05T00:00:00.000000Z |
| icsa-20-315-01 | ICSA-20-315-01_OSIsoft PI Interface for OPC XML-DA | 2020-11-10T00:00:00.000000Z | 2020-11-10T00:00:00.000000Z |
| icsa-20-315-02 | OSIsoft PI Vision | 2020-11-10T00:00:00.000000Z | 2020-11-10T00:00:00.000000Z |
| icsa-20-315-03 | Schneider Electric PLC Simulator for EcoStruxure Control Expert | 2020-11-10T00:00:00.000000Z | 2020-11-10T00:00:00.000000Z |
| icsa-20-315-04 | Siemens SIMATIC S7-300 CPUs and SINUMERIK Controller (Update A) | 2020-11-10T00:00:00.000000Z | 2022-08-09T00:00:00.000000Z |
| icsa-20-315-05 | Siemens SCALANCE W 1750D | 2020-11-10T00:00:00.000000Z | 2020-11-10T00:00:00.000000Z |
| icsa-20-317-01 | Mitsubishi Electric MELSEC iQ-R Series | 2020-11-12T00:00:00.000000Z | 2020-11-12T00:00:00.000000Z |
| icsma-20-317-01 | BD Alaris 8015 PC Unit and BD Alaris Systems Manager | 2020-11-12T00:00:00.000000Z | 2020-11-12T00:00:00.000000Z |
| icsa-20-324-01 | Johnson Controls Sensormatic Electronics American Dynamics victor Web Client | 2020-11-17T00:00:00.000000Z | 2020-11-17T00:00:00.000000Z |
| icsa-20-324-02 | Paradox IP150 (Update A) | 2020-11-17T00:00:00.000000Z | 2022-09-19T00:00:00.000000Z |
| icsa-20-324-03 | Real Time Automation EtherNet/IP | 2020-11-17T00:00:00.000000Z | 2020-11-17T00:00:00.000000Z |
| icsa-20-324-04 | Schneider Electric Interactive Graphical SCADA System (IGSS) | 2020-11-17T00:00:00.000000Z | 2020-11-17T00:00:00.000000Z |
| icsa-20-324-05 | Mitsubishi Electric MELSEC iQ-R Series (Update C) | 2020-11-19T00:00:00.000000Z | 2021-12-16T00:00:00.000000Z |
| icsa-20-282-02 | Mitsubishi Electric MELSEC iQ-R Series (Update D) | 2020-11-19T07:00:00.000000Z | 2024-08-22T06:00:00.000000Z |
| icsa-20-329-01 | Rockwell Automation FactoryTalk Linx | 2020-11-24T00:00:00.000000Z | 2020-11-24T00:00:00.000000Z |
| icsa-20-329-02 | Fuji Electric V-Server Lite | 2020-11-24T00:00:00.000000Z | 2020-11-24T00:00:00.000000Z |
| icsa-20-336-01 | Schneider Electric EcoStruxure Operator Terminal Expert runtime (Vijeo XD) | 2020-12-01T00:00:00.000000Z | 2020-12-01T00:00:00.000000Z |
| icsa-20-338-01 | National Instruments CompactRIO | 2020-12-03T00:00:00.000000Z | 2020-12-03T00:00:00.000000Z |
| icsa-20-343-01 | Multiple Embedded TCP/IP Stacks | 2020-12-08T00:00:00.000000Z | 2020-12-08T00:00:00.000000Z |
| icsa-20-343-02 | Mitsubishi Electric GOT and Tension Controller (Update B) | 2020-12-08T00:00:00.000000Z | 2022-01-20T00:00:00.000000Z |
| icsa-20-343-03 | Schneider Electric Easergy T300 | 2020-12-08T00:00:00.000000Z | 2020-12-08T00:00:00.000000Z |
| icsa-20-343-04 | Schneider Electric Modicon M221 Programmable Logic Controller | 2020-12-08T00:00:00.000000Z | 2020-12-08T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-ftdfmc-dos-njyvdcla | Cisco Firepower Management Center Software Denial of Service Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-ftdfmc-sft-mitm-tc8azfs2 | Cisco Firepower Management Center Software and Firepower Threat Defense Software sftunnel Pass the Hash Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-fxos-cmdinj-b63rwkpm | Cisco FXOS Software for Firepower 4100/9300 Series Command Injection Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-fxos-cmdinj-pqzvmxcr | Cisco FXOS Software Command Injection Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-23T13:21:04+00:00 |
| cisco-sa-fxos-sbbp-xtupkytn | Cisco FXOS Software for Firepower 4100/9300 Series Appliances Secure Boot Bypass Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-fxos-sbbyp-kqp6ngre | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software for Firepower 1000/2100 Series Appliances Secure Boot Bypass Vulnerabilities | 2020-10-21T16:00:00+00:00 | 2020-10-23T13:31:44+00:00 |
| cisco-sa-fxosfcm-csrf-uho4e5bz | Cisco FXOS Software Firepower Chassis Manager Cross-Site Request Forgery Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-tcp-intercept-bypass-xg9m3pby | Cisco Firepower Threat Defense Software TCP Intercept Bypass Vulnerability | 2020-10-21T16:00:00+00:00 | 2020-10-21T16:00:00+00:00 |
| cisco-sa-asa-ssl-dos-7uzwwsey | Cisco Adaptive Security Appliance Software SSL/TLS Denial of Service Vulnerability | 2020-10-22T16:00:00+00:00 | 2020-10-27T20:31:40+00:00 |
| cisco-sa-anyconnect-file-read-lsvdd6uh | Cisco AnyConnect Secure Mobility Client for Windows Arbitrary File Read Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-anyconnect-ipc-kfqo9qhk | Cisco AnyConnect Secure Mobility Client Arbitrary Code Execution Vulnerability | 2020-11-04T16:00:00+00:00 | 2021-05-21T18:06:37+00:00 |
| cisco-sa-cedge-filt-bypass-y6wzmqm4 | Cisco SD-WAN Software Packet Filtering Bypass Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-12-14T21:43:02+00:00 |
| cisco-sa-cimc-auth-zwkppjxl | Cisco Integrated Management Controller Authorization Bypass Vulnerability | 2020-11-04T16:00:00+00:00 | 2021-02-26T15:37:04+00:00 |
| cisco-sa-cimc-civ-pkdbe9x5 | Cisco Integrated Management Controller Command Injection Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-cimc-enum-cyhep3b7 | Cisco Integrated Management Controller Username Enumeration Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-eff-incperm-9e6h4ybz | Cisco Edge Fog Fabric Resource Exposure Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-esa-zip-bypass-gbu4gttg | Cisco Email Security Appliance Zip Content Filter Bypass Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-imp-dos-utx2dqu2 | Cisco Unified Communications Manager IM and Presence Service Denial of Service Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-iosxr-pxe-unsign-code-exec-qaa78fd2 | Cisco IOS XR Software Enhanced Preboot eXecution Environment Unsigned Code Execution Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-12-01T17:50:58+00:00 |
| cisco-sa-ise-priv-esc-fnzx8hhj | Cisco Identity Services Engine Privilege Escalation Vulnerability | 2020-11-04T16:00:00+00:00 | 2021-05-03T20:17:53+00:00 |
| cisco-sa-ise-xss-eurcwx9 | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2020-11-04T16:00:00+00:00 | 2021-02-26T18:56:49+00:00 |
| cisco-sa-ise-xxs-pkjcmq9d | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-tele-info-dreglpdq | Cisco TelePresence Collaboration Endpoint Software Information Disclosure Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vepegr-4xynyluj | Cisco SD-WAN Software Privilege Escalation Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vepescm-bjgqm4vj | Cisco SD-WAN Software Privilege Escalation Vulnerability | 2020-11-04T16:00:00+00:00 | 2021-02-16T13:52:13+00:00 |
| cisco-sa-vepeshlg-tjghoqca | Cisco SD-WAN Software Privilege Escalation Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vepestd-8c3j9vc | Cisco SD-WAN Software Privilege Escalation Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vman-traversal-hqh24tmk | Cisco SD-WAN vManage Software Directory Traversal Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanage-escalation-jhqs5skf | Cisco SD-WAN vManage Software Privilege Escalation Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| cisco-sa-vmanage-file-y2jsrnrb | Cisco SD-WAN vManage Software Arbitrary File Creation Vulnerability | 2020-11-04T16:00:00+00:00 | 2020-11-04T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2021-35627 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35628 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35629 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35630 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation deletion or modification access to critical data or all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35631 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: GIS). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35632 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Data Dictionary). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35633 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Logging). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35634 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35635 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35636 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35637 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35638 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35640 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35641 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35642 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35643 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35644 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35645 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35646 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35647 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-35648 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-3671 | A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server. | 2021-10-02T00:00:00.000Z | 2024-10-15T00:00:00.000Z |
| msrc_cve-2021-38297 | Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module when GOARCH=wasm GOOS=js is used. | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-3872 | Heap-based Buffer Overflow in vim/vim | 2021-10-02T00:00:00.000Z | 2021-10-22T00:00:00.000Z |
| msrc_cve-2021-3875 | Heap-based Buffer Overflow in vim/vim | 2021-10-02T00:00:00.000Z | 2021-10-21T00:00:00.000Z |
| msrc_cve-2021-3903 | Heap-based Buffer Overflow in vim/vim | 2021-10-02T00:00:00.000Z | 2021-11-03T00:00:00.000Z |
| msrc_cve-2021-41099 | Integer overflow issue with strings in Redis | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-41103 | Insufficiently restricted permissions on plugin directories | 2021-10-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2021-41186 | ReDoS vulnerability in parser_apache2 | 2021-10-02T00:00:00.000Z | 2025-10-01T23:11:12.000Z |
| msrc_cve-2021-41524 | null pointer dereference in h2 fuzzing | 2021-10-02T00:00:00.000Z | 2021-10-13T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-201709-1240 | Arris Modems is a modem produced by telecommunications equipment manufacturer Arris, a ne… | 2022-05-04T09:39:24.245000Z |
| var-201707-1349 | Lenovo PowerV Firewall is a comprehensive UTM that integrates firewall, IPSec VPN, SSL VP… | 2022-05-04T09:39:29.149000Z |
| var-201706-1114 | DSS (Digital Surveillance System) is a highly integrated and powerful digital monitoring … | 2022-05-04T09:39:30.459000Z |
| var-201706-1135 | Foscamcamera is a webcam that can push messages to mobile phones and directly implement v… | 2022-05-04T09:39:30.448000Z |
| var-201705-4197 | Beijing Weifangtong Information Technology Co., Ltd. bunker fortress is a single point fu… | 2022-05-04T09:39:32.369000Z |
| var-201703-1394 | WirelessIPCamera (P2P) WIFICAM is a wireless IP camera. WirelessIPCamera (P2P) WIFICAM is… | 2022-05-04T09:39:39.561000Z |
| var-201701-1165 | Samsung Smartcam is Samsung's smart webcam. There is a remote command execution vulnerabi… | 2022-05-04T09:39:41.669000Z |
| var-201611-0413 | TP-LINKTDDP is a device debugging protocol. TP-LINKTDDP has an information disclosure vul… | 2022-05-04T09:39:42.635000Z |
| var-201612-0643 | The D-LinkDAR-8000-X series and the DAR-7000-x series of online behavior auditing gateway… | 2022-05-04T09:39:42.305000Z |
| var-201608-0491 | CIMCO is the DNC system with the largest installed capacity in the world. It is mainly us… | 2022-05-04T09:39:46.993000Z |
| var-201605-0620 | Weak password on Yushi camera, allowing initial password login | 2022-05-04T09:39:47.726000Z |
| var-201606-0554 | Netgear is the world's leading enterprise network solution and advocate for digital home … | 2022-05-04T09:39:47.379000Z |
| var-201601-0678 | Telnet Weak password vulnerability, allowing weak password login | 2022-05-04T09:39:49.232000Z |
| var-201401-0726 | Huawei B593u-12 / T-Mobile HOME NET Router is an LTE wireless router series. Huawei B593u… | 2022-05-04T09:40:10.288000Z |
| var-201402-0575 | OpenVox VoxStack is a family of Asterisk-based analog voice gateways designed for small a… | 2022-05-04T09:40:10.053000Z |
| var-201307-0613 | Cisco WebEx is a web conferencing solution. The Cisco WebEx One-Click Client handles pass… | 2022-05-04T09:40:14.164000Z |
| var-201303-0573 | Rosewill RSVA11001/RSVA12001 is a camera device. Rosewill RSVA11001/RSVA12001 has a secur… | 2022-05-04T09:40:18.596000Z |
| var-201103-0385 | The TP-LINK TL-WR740N is a wireless router device. The TP-LINK TL-WR740N device has an un… | 2022-05-04T09:40:29.645000Z |
| var-201106-0295 | Siemens SIMATIC S7 series PLC Used in various industrial fields, including energy, water … | 2022-05-04T09:40:29.076000Z |
| var-201005-0430 | IncrediMail is an email mail client. The ImShExtU.dll ActiveX control included with Incre… | 2022-05-04T09:40:35.307000Z |
| var-201003-0520 | Cisco Unified Communications Manager is a call processing component in the Cisco IP Telep… | 2022-05-04T09:40:36.284000Z |
| var-200612-0787 | D-LINK DWL-2000AP + is a popular wireless access router. DWL-2000AP + has a vulnerabili… | 2022-05-04T09:41:08.155000Z |
| var-202112-2272 | Certain NETGEAR devices are affected by stored XSS. This affects GS108Tv2 before 5.4.2.36… | 2022-05-04T09:41:49.404000Z |
| var-202112-0753 | Internally used text extraction reports allow an attacker to inject code that can be exec… | 2022-05-04T09:41:50.287000Z |
| var-202109-1969 | Ruijie Networks Co., Ltd. is a professional network manufacturer with a full range of net… | 2022-05-04T09:41:56.652000Z |
| var-202110-0177 | A possible buffer overflow vulnerability in maetd_cpy_slice of libSPenBase library of Sam… | 2022-05-04T09:41:56.512000Z |
| var-202108-1624 | Certain NETGEAR devices are affected by command injection by an authenticated user. This … | 2022-05-04T09:41:58.436000Z |
| var-202108-2313 | Ruijie Networks Co., Ltd. is a professional network manufacturer with a full range of net… | 2022-05-04T09:41:58.233000Z |
| var-202108-2334 | SINDOH P411_P416 is a printer. SINDOH P411_P416 has an unauthorized access vulnerabil… | 2022-05-04T09:41:58.223000Z |
| var-202108-2355 | Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of… | 2022-05-04T09:41:58.208000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2016-000091 | H2O use-after-free vulnerability | 2016-05-27T13:46+09:00 | 2016-06-23T17:23+09:00 |
| jvndb-2016-000076 | Japan Connected-free Wi-Fi vulnerable to API execution | 2016-05-27T13:51+09:00 | 2016-06-23T17:38+09:00 |
| jvndb-2016-000086 | Multiple Buffalo wireless LAN routers vulnerable to directory traversal | 2016-05-27T13:53+09:00 | 2016-06-27T14:58+09:00 |
| jvndb-2016-000087 | Multiple Buffalo wireless LAN routers vulnerable to information disclosure | 2016-05-27T13:53+09:00 | 2016-06-27T14:59+09:00 |
| jvndb-2016-000072 | WebARENA formmail vulnerable to cross-site scripting | 2016-05-27T13:54+09:00 | 2016-06-08T17:47+09:00 |
| jvndb-2016-000090 | Source code of Old_GSI_Maps prior to January, 2015 vulnerable to directory traversal | 2016-05-30T14:07+09:00 | 2016-06-23T15:13+09:00 |
| jvndb-2016-000092 | DMM.com Securities FX Apps for Android fail to verify SSL server certificates | 2016-05-30T14:21+09:00 | 2017-05-23T14:28+09:00 |
| jvndb-2016-000077 | Cybozu Garoon mail function vulnerable to access restriction bypass | 2016-05-30T16:18+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000078 | Cybozu Garoon function "Files" vulnerable to directory traversal | 2016-05-30T16:18+09:00 | 2016-06-23T17:40+09:00 |
| jvndb-2016-000079 | Cybozu Garoon vulnerable to information disclosure | 2016-05-30T16:18+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000080 | Cybozu Garoon vulnerable to denial-of-service (DoS) | 2016-05-30T16:18+09:00 | 2017-05-23T16:23+09:00 |
| jvndb-2016-000081 | Cybozu Garoon vulnerable to open redirect | 2016-05-30T16:18+09:00 | 2016-06-23T17:06+09:00 |
| jvndb-2016-000082 | Cybozu Garoon fails to restrict access permissions | 2016-05-30T16:18+09:00 | 2016-06-23T17:35+09:00 |
| jvndb-2016-000083 | Cybozu Garoon vulnerable to cross-site scripting | 2016-05-30T16:18+09:00 | 2016-06-23T17:05+09:00 |
| jvndb-2016-000084 | Cybozu Garoon vulnerable to cross-site scripting | 2016-05-30T16:18+09:00 | 2016-06-23T17:09+09:00 |
| jvndb-2016-000085 | Cybozu Garoon fails to restrict access permissions | 2016-05-30T16:18+09:00 | 2016-06-23T17:43+09:00 |
| jvndb-2016-000093 | Cybozu Garoon function "Portlets" vulnerable to access restriction bypass | 2016-05-30T16:18+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000094 | Cybozu Garoon function "MultiReport" vulnerable to access restriction bypass | 2016-05-30T16:18+09:00 | 2016-06-28T17:01+09:00 |
| jvndb-2016-000095 | Cybozu Garoon logging function vulnerable to directory traversal | 2016-05-30T16:18+09:00 | 2016-06-23T17:49+09:00 |
| jvndb-2016-000073 | Trend Micro Internet Security access restriction flaw | 2016-06-02T16:18+09:00 | 2016-06-22T18:12+09:00 |
| jvndb-2016-000074 | Trend Micro enterprise products directory traversal vulnerability | 2016-06-02T16:18+09:00 | 2016-06-22T17:56+09:00 |
| jvndb-2016-000088 | Trend Micro Internet Security vulnerable to arbitrary script execution | 2016-06-02T16:18+09:00 | 2016-06-22T18:08+09:00 |
| jvndb-2016-000089 | Trend Micro enterprise products HTTP header injection vulnerability | 2016-06-02T16:18+09:00 | 2016-06-22T17:58+09:00 |
| jvndb-2016-000096 | Apache Struts 1 vulnerability that allows unintended remote operations against components on memory | 2016-06-07T16:26+09:00 | 2017-02-20T15:42+09:00 |
| jvndb-2016-000097 | Apache Struts 1 vulnerable to input validation bypass | 2016-06-07T16:26+09:00 | 2016-12-05T16:59+09:00 |
| jvndb-2016-000098 | TERASOLUNA Server Framework for Java(WEB) access restriction bypass vulnerability in the file extention filter | 2016-06-07T16:26+09:00 | 2016-06-27T11:32+09:00 |
| jvndb-2016-000099 | DX Library vulnerable to remote code execution | 2016-06-08T14:30+09:00 | 2016-06-27T11:32+09:00 |
| jvndb-2016-000100 | ETX-R vulnerable to cross-site request forgery | 2016-06-14T13:55+09:00 | 2016-06-23T17:12+09:00 |
| jvndb-2016-000101 | ETX-R vulnerable to denial-of-service (DoS) | 2016-06-14T14:00+09:00 | 2016-06-23T12:20+09:00 |
| jvndb-2016-000103 | Deep Discovery Inspector vulnerable to remote code execution | 2016-06-16T14:03+09:00 | 2016-07-12T15:03+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-01367 | Visualware MyConnection Server跨站脚本漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01368 | UNIT4 Prosoft HRMS跨站脚本漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01369 | Ilch CMS跨站请求伪造漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01370 | WordPress插件Easy Social Icons跨站请求伪造漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01371 | Wordpress插件WordPress Survey and Poll SQL注入漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01372 | WordPress插件CrossSlide jQuery跨站请求伪造漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01373 | D-Link DIR-645 Wired/Wireless Router操作系统命令注入漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01374 | D-Link DAP-1320代码注入漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01375 | D-Link DCS-931L跨站请求伪造漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01376 | D-Link DIR-645 Wired/Wireless Router栈缓冲区溢出漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01377 | Zhone GPON 2520输入验证漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01378 | DLGuard跨站脚本漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01379 | DLGuard SQL注入漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01380 | Magento Server MAGMI插件目录遍历漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01381 | Magento Server MAGMI插件跨站脚本漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01382 | IBM Rational Insight信息泄露漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01383 | Komodia SDK for Komodia Redirector with SSL Digestor信息泄露漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01384 | Komodia SDK for Komodia Redirector with SSL Digestor加密问题漏洞 | 2015-02-28 | 2015-03-02 |
| cnvd-2015-01398 | Drupal Spider Video Player模块存在多个漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01400 | GNU glibc 'fnmatch_loop.c'远程缓冲区溢出漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01401 | GNU C Library拒绝服务漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01404 | WordPress插件WP Slimstat 'wp-admin/admin.php'跨站脚本漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01405 | Zope 'manage_tabs_message'参数跨站脚本漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01406 | Cisco Security Manager存在多个跨站脚本漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01407 | Cisco IOS Software安全绕过漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01408 | Network Vision IntraVue存在未明远程命令注入漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01409 | Cisco Application Networking Manager跨站请求伪造漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01410 | Cisco IOS/IOS XE Software拒绝服务漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01411 | Drupal Spider Catalog模块跨站请求伪造漏洞 | 2015-02-28 | 2015-03-04 |
| cnvd-2015-01412 | Joomla! Googlemaps Plugin路径泄露漏洞 | 2015-02-28 | 2015-03-04 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2003-AVI-163 | Vulnérabilité de dtprintinfo sous HP-UX | 2003-10-13T00:00:00.000000 | 2003-10-13T00:00:00.000000 |
| certa-2003-avi-163 | Vulnérabilité de dtprintinfo sous HP-UX | 2003-10-13T00:00:00.000000 | 2003-10-13T00:00:00.000000 |
| CERTA-2003-AVI-164 | Vulnérabilité dans Apache Tomcat 4.x | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| CERTA-2003-AVI-165 | Vulnérabilité de l'appel système sysinfo sous Solaris | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| CERTA-2003-AVI-166 | Vulnérabilité dans la vérification Authenticode | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| CERTA-2003-AVI-167 | Vulnérabilité dans l'aide à la résolution de problèmes sous windows 2000 | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| CERTA-2003-AVI-168 | Vulnérabilité dans Microsoft Messenger Service | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| CERTA-2003-AVI-169 | Vulnérabilité dans le protocole "Help and Support Center" de Microsoft | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| CERTA-2003-AVI-170 | Vulnérabilité dans les contrôles ListBox et ComboBox | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| CERTA-2003-AVI-171 | Vulnérabilité dans Exchange Server | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| CERTA-2003-AVI-172 | Vulnérabilité de Microsoft Exchange Server Outlook Web Access | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| certa-2003-avi-164 | Vulnérabilité dans Apache Tomcat 4.x | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| certa-2003-avi-165 | Vulnérabilité de l'appel système sysinfo sous Solaris | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| certa-2003-avi-166 | Vulnérabilité dans la vérification Authenticode | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| certa-2003-avi-167 | Vulnérabilité dans l'aide à la résolution de problèmes sous windows 2000 | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| certa-2003-avi-168 | Vulnérabilité dans Microsoft Messenger Service | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| certa-2003-avi-169 | Vulnérabilité dans le protocole "Help and Support Center" de Microsoft | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| certa-2003-avi-170 | Vulnérabilité dans les contrôles ListBox et ComboBox | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| certa-2003-avi-171 | Vulnérabilité dans Exchange Server | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| certa-2003-avi-172 | Vulnérabilité de Microsoft Exchange Server Outlook Web Access | 2003-10-16T00:00:00.000000 | 2003-10-16T00:00:00.000000 |
| CERTA-2003-AVI-173 | Vulnérabilité du navigateur et du client de messagerie Opera | 2003-10-27T00:00:00.000000 | 2003-11-21T00:00:00.000000 |
| CERTA-2003-AVI-174 | Déni de service dans GDM | 2003-10-27T00:00:00.000000 | 2003-10-27T00:00:00.000000 |
| certa-2003-avi-173 | Vulnérabilité du navigateur et du client de messagerie Opera | 2003-10-27T00:00:00.000000 | 2003-11-21T00:00:00.000000 |
| certa-2003-avi-174 | Déni de service dans GDM | 2003-10-27T00:00:00.000000 | 2003-10-27T00:00:00.000000 |
| CERTA-2003-AVI-175 | Vulnérabilité de la Machine Virtuelle Java de Sun | 2003-10-29T00:00:00.000000 | 2003-11-07T00:00:00.000000 |
| certa-2003-avi-175 | Vulnérabilité de la Machine Virtuelle Java de Sun | 2003-10-29T00:00:00.000000 | 2003-11-07T00:00:00.000000 |
| CERTA-2003-AVI-176 | Vulnérabilité du serveur NFS sous Solaris | 2003-10-30T00:00:00.000000 | 2003-10-30T00:00:00.000000 |
| CERTA-2003-AVI-177 | Vulnérabilités du serveur HTTP Apache | 2003-10-30T00:00:00.000000 | 2004-02-23T00:00:00.000000 |
| certa-2003-avi-176 | Vulnérabilité du serveur NFS sous Solaris | 2003-10-30T00:00:00.000000 | 2003-10-30T00:00:00.000000 |
| certa-2003-avi-177 | Vulnérabilités du serveur HTTP Apache | 2003-10-30T00:00:00.000000 | 2004-02-23T00:00:00.000000 |