Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-2mhh-w6q8-5hxw | Remote Memory Disclosure in ws | 2019-02-18T23:56:42Z | 2020-08-31T18:09:55Z |
| ghsa-77g4-36jp-5v3m | Remote Memory Disclosure in bittorrent-dht | 2020-09-01T15:22:12Z | 2020-08-31T18:09:58Z |
| ghsa-vgrx-w6rg-8fqf | Forgeable Public/Private Tokens in jwt-simple | 2018-11-06T23:12:07Z | 2020-08-31T18:10:20Z |
| ghsa-xg5r-8j97-2wrj | Directory Traversal in restafary | 2019-02-18T23:39:22Z | 2020-08-31T18:10:25Z |
| ghsa-rhvc-x32h-5526 | No CSRF Validation in droppy | 2019-02-18T23:39:32Z | 2020-08-31T18:10:30Z |
| ghsa-cgjx-mwpx-47jv | Private Data Disclosure in express-restify-mongoose | 2018-10-23T17:14:57Z | 2020-08-31T18:10:32Z |
| ghsa-hjhr-r3gq-qvp6 | Timing Attack in csrf-lite | 2019-02-18T23:39:44Z | 2020-08-31T18:10:37Z |
| ghsa-6cpc-mj5c-m9rq | Arbitrary File Write in cli | 2019-02-18T23:40:03Z | 2020-08-31T18:10:40Z |
| ghsa-856x-cp3q-47vg | Insecure Default Configuration in airbrake | 2019-02-18T23:58:13Z | 2020-08-31T18:10:42Z |
| ghsa-m5h6-hr3q-22h5 | npm Token Leak in npm | 2018-07-31T22:58:35Z | 2020-08-31T18:10:47Z |
| ghsa-7mc5-chhp-fmc3 | Regular Expression Denial of Service in negotiator | 2018-10-09T00:30:30Z | 2020-08-31T18:11:01Z |
| ghsa-2v7q-2xqx-f4q5 | Potential SQL Injection in sequelize | 2019-02-18T23:54:32Z | 2020-08-31T18:11:09Z |
| ghsa-98pq-pmw9-4gpm | SQL Injection in sequelize | 2019-02-18T23:54:34Z | 2020-08-31T18:11:11Z |
| ghsa-x2jc-pwfj-h9p3 | SQL Injection in sequelize | 2019-02-18T23:54:28Z | 2020-08-31T18:11:14Z |
| ghsa-cgpp-wm2h-6hqx | SQL Injection in waterline-sequel | 2019-02-18T23:54:28Z | 2020-08-31T18:11:18Z |
| ghsa-2r5h-gh4x-8hp9 | Resources Downloaded over Insecure Protocol in igniteui | 2019-02-18T23:40:14Z | 2020-08-31T18:11:21Z |
| ghsa-6663-c963-2gqg | DoS due to excessively large websocket message in ws | 2019-02-18T23:58:35Z | 2020-08-31T18:11:28Z |
| ghsa-84fv-prrc-5ggr | Route Validation Bypass in call | 2019-02-18T23:40:04Z | 2020-08-31T18:11:30Z |
| ghsa-cgqv-x5cx-xvqh | Arbitrary Code Injection in pouchdb | 2018-07-26T16:22:08Z | 2020-08-31T18:12:18Z |
| ghsa-4662-j96g-mv46 | Arbitrary Code Injection in reduce-css-calc | 2018-06-07T19:43:06Z | 2020-08-31T18:12:20Z |
| ghsa-f7ph-p5rv-phw2 | Cross-Site Scripting in nunjucks | 2018-11-06T23:13:37Z | 2020-08-31T18:12:27Z |
| ghsa-hf5h-hh56-3vrg | Denial of Service in uws | 2020-09-01T16:02:29Z | 2020-08-31T18:12:32Z |
| ghsa-g3xp-v2ff-x5c3 | Downloads Resources over HTTP in go-ipfs-dep | 2019-02-18T23:54:18Z | 2020-08-31T18:12:48Z |
| ghsa-mm7h-323r-9p4g | Downloads Resources over HTTP in imageoptim | 2019-02-18T23:50:33Z | 2020-08-31T18:14:15Z |
| ghsa-5g4r-87v2-jqvx | Downloads Resources over HTTP in apk-parser | 2020-09-01T16:05:44Z | 2020-08-31T18:14:17Z |
| ghsa-2wrq-wmqf-8vcc | Downloads Resources over HTTP in operadriver | 2019-02-18T23:35:48Z | 2020-08-31T18:14:19Z |
| ghsa-fwx5-5fqj-jv98 | Cross-Site Scripting in morris.js | 2018-11-09T17:46:30Z | 2020-08-31T18:18:39Z |
| ghsa-26q7-g57v-mxcp | HTML Injection in shout | 2018-11-07T00:28:11Z | 2020-08-31T18:19:13Z |
| ghsa-3pwh-5mmc-mwrx | Denial of Service in nes | 2018-07-24T20:06:33Z | 2020-08-31T18:19:35Z |
| ghsa-mj87-8xf8-fp4w | Cross-Site Scripting in yui | 2020-09-01T16:42:51Z | 2020-08-31T18:19:38Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-1999-0649 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FSP service is running.'}]} | N/A | N/A | 2000-02-04T05:00:00 | 2005-11-02T10:00:00 |
| cve-1999-0652 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A database service is running, e.g. a SQL server, Oracle, or mySQL.'}]} | N/A | N/A | 2000-02-04T05:00:00 | 2005-11-02T10:00:00 |
| cve-2003-1147 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0955. Reason: This candidate is a duplicate of CVE-2003-0955. Notes: All CVE users should reference CVE-2003-0955 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-05-10T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-0389 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '79363d38-fa19-49d1-9214-5f28da3f3ac5', 'shortName': 'debian'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0814. Reason: This candidate is a duplicate of CVE-2005-0814. Notes: All CVE users should reference CVE-2005-0814 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-03-23T05:00:00 | 2005-11-02T10:00:00 |
| cve-2005-0714 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0340. Reason: This candidate is a reservation duplicate of CVE-2005-0340. Notes: All CVE users should reference CVE-2005-0340 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-03-12T05:00:00 | 2005-11-02T10:00:00 |
| cve-2005-0727 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0735. Reason: This candidate is a duplicate of CVE-2005-0735. Notes: All CVE users should reference CVE-2005-0727 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-03-12T05:00:00 | 2005-11-02T10:00:00 |
| cve-2005-0728 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0736. Reason: This candidate is a duplicate of CVE-2005-0736. Notes: All CVE users should reference CVE-2005-0736 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-03-12T05:00:00 | 2005-11-02T10:00:00 |
| cve-2005-0840 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '63664ac6-956c-4cba-a5d0-f46076e16109', 'shortName': 'freebsd'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0706. Reason: This candidate is a duplicate of CVE-2005-0706. Notes: All CVE users should reference CVE-2005-0706 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-03-23T05:00:00 | 2005-11-02T10:00:00 |
| cve-2005-0940 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0490. Reason: This candidate was inadvertently referenced in a vendor advisory due to a typo. Notes: All CVE users should reference CVE-2005-0490 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-02-28T05:00:00 | 2005-11-02T10:00:00 |
| cve-2005-1044 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0941. Reason: This candidate is a duplicate of CVE-2005-0941. Notes: All CVE users should reference CVE-2005-0941 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-04-12T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-1271 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1343. Reason: This candidate is a reservation duplicate of CVE-2005-1343. Notes: All CVE users should reference CVE-2005-1343 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-05-12T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-1277 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1766. Reason: This candidate is a duplicate of CVE-2005-1766. Notes: This duplicate occurred due to insufficient coordination across three separate parties. All CVE users should reference CVE-2005-1766 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-06-26T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-1334 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1579. Reason: This candidate is a duplicate of CVE-2005-1579. Notes: All CVE users should reference CVE-2005-1579 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-06-03T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-1690 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1250. Reason: This candidate is a duplicate of CVE-2005-1250. Notes: this duplicate occurred as a result of multiple independent discoveries and insufficient coordination by the vendor and CNA. All CVE users should reference CVE-2005-1250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-06-29T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-1912 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1841. Reason: This candidate is a duplicate of CVE-2005-1841. Notes: this duplicate occurred as a result of separate assignments by multiple CNAs, one to the researcher and one to the vendor. All CVE users should reference CVE-2005-1841 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-07-07T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-1938 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1250. Reason: This candidate is a duplicate of CVE-2005-1250. Notes: this duplicate occurred as a result of multiple independent discoveries and insufficient coordination by the vendor and CNA. All CVE users should reference CVE-2005-1250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-06-29T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-2355 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '79363d38-fa19-49d1-9214-5f28da3f3ac5', 'shortName': 'debian'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2335, CVE-2005-2356. Reason: due to a typo in an advisory, this candidate was accidentally referenced. Notes: All CVE users should consult CVE-2005-2335 and CVE-2005-2356 to determine the appropriate identifier for the issue'}]} | N/A | N/A | 2005-07-25T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-2446 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2369. Reason: This candidate is a duplicate of CVE-2005-2369. Notes: All CVE users should reference CVE-2005-2369 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-08-03T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-2447 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2370. Reason: This candidate is a duplicate of CVE-2005-2370. Notes: All CVE users should reference CVE-2005-2370 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-08-03T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-2497 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2641. Reason: This candidate is a duplicate of CVE-2005-2641. Notes: All CVE users should reference CVE-2005-2641 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-10-07T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-2578 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2552. Reason: This candidate is a duplicate of CVE-2005-2552. Notes: All CVE users should reference CVE-2005-2552 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-08-16T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-2671 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2041. Reason: This candidate is a duplicate of CVE-2005-2041. Notes: All CVE users should reference CVE-2005-2041 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-08-23T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-2913 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2799. Reason: This candidate is a duplicate of CVE-2005-2799. Notes: All CVE users should reference CVE-2005-2799 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-09-14T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-3028 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2986. Reason: This candidate is a duplicate of CVE-2005-2986. Notes: All CVE users should reference CVE-2005-2986 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-09-21T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-3117 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '79363d38-fa19-49d1-9214-5f28da3f3ac5', 'shortName': 'debian'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3150. Reason: This candidate was privately assigned by a CNA to an issue, but the issue was published through separate channels and assigned a new identifier by the MITRE CNA, so it is a duplicate of CVE-2005-3150. Notes: All CVE users should reference CVE-2005-3150 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-10-06T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-3162 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-02T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3160. Reason: this candidate is a duplicate of CVE-2005-3160. Notes: All CVE users should reference CVE-2005-3160 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-10-06T04:00:00 | 2005-11-02T10:00:00 |
| cve-2005-2965 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-04T10:00:00', 'orgId': '79363d38-fa19-49d1-9214-5f28da3f3ac5', 'shortName': 'debian'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-4802, CVE-2005-4803. Reason: this candidate was intended for one issue, but the description and references inadvertently combined multiple issues. Notes: All CVE users should consult CVE-2005-4802 and CVE-2005-4803 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-10-11T04:00:00 | 2005-11-04T10:00:00 |
| cve-2005-3122 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-04T10:00:00', 'orgId': '79363d38-fa19-49d1-9214-5f28da3f3ac5', 'shortName': 'debian'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3424, CVE-2005-3425. Reason: this candidate was intended for one issue, but two different authoritative sources used it for two distinct issues. Notes: All CVE users should consult CVE-2005-3424 and CVE-2005-3425 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-10-30T20:00:00 | 2005-11-04T10:00:00 |
| cve-2005-2937 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-18T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3663, CVE-2005-3664. Reason: this candidate was intended for one issue, but multiple advisories used this candidate for different issues. Notes: All CVE users should consult CVE-2005-3663 and CVE-2005-3664 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-10-11T04:00:00 | 2005-11-18T10:00:00 |
| cve-2005-3542 | N/A | {'providerMetadata': {'dateUpdated': '2005-11-22T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3508. Reason: This candidate is a reservation duplicate of CVE-2005-3508. Notes: All CVE users should reference CVE-2005-3508 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-11-16T07:37:00 | 2005-11-22T10:00:00 |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2002-2135 | N/A | {'providerMetadata': {'dateUpdated': '2007-10-18T09:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1618. Reason: This candidate is a duplicate of CVE-2002-1618. Notes: All CVE users should reference CVE-2002-1618 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| cve-2002-2136 | N/A | {'providerMetadata': {'dateUpdated': '2007-10-18T09:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1590. Reason: This candidate is a duplicate of CVE-2002-1590. Notes: All CVE users should reference CVE-2002-1590 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| cve-2002-2147 | N/A | {'providerMetadata': {'dateUpdated': '2007-10-18T09:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1828. Reason: This candidate is a duplicate of CVE-2002-1828. Notes: All CVE users should reference CVE-2002-1828 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| cve-2002-2151 | N/A | {'providerMetadata': {'dateUpdated': '2007-10-18T09:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1651. Reason: This candidate is a duplicate of CVE-2002-1651. Notes: All CVE users should reference CVE-2002-1651 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| cve-2002-2157 | N/A | {'providerMetadata': {'dateUpdated': '2007-10-18T09:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1660. Reason: This candidate is a duplicate of CVE-2002-1660. Notes: All CVE users should reference CVE-2002-1660 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| cve-2002-2160 | N/A | {'providerMetadata': {'dateUpdated': '2007-10-18T09:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1798. Reason: This candidate is a duplicate of CVE-2002-1798. Notes: All CVE users should reference CVE-2002-1798 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| cve-2002-2194 | N/A | {'providerMetadata': {'dateUpdated': '2007-10-18T09:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1589. Reason: This candidate is a duplicate of CVE-2002-1589. Notes: All CVE users should reference CVE-2002-1589 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-11-16T21:17:00 | 2007-10-18T09:00:00 |
| cve-2002-2440 | N/A | {'providerMetadata': {'dateUpdated': '2020-11-05T19:49:17', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none'}]} | N/A | N/A | 2020-11-05T19:49:17 | 2020-11-05T19:49:17 |
| cve-2002-2441 | N/A | {'providerMetadata': {'dateUpdated': '2020-11-05T19:49:42', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none'}]} | N/A | N/A | 2020-11-05T19:49:42 | 2020-11-05T19:49:42 |
| cve-2002-2442 | N/A | {'providerMetadata': {'dateUpdated': '2020-11-05T19:50:09', 'orgId': '53f830b8-0a3f-465b-8143-3b8a9948e749', 'shortName': 'redhat'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none'}]} | N/A | N/A | 2020-11-05T19:50:09 | 2020-11-05T19:50:09 |
| cve-2003-0090 | N/A | {'providerMetadata': {'dateUpdated': '2003-11-21T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2000-0844. Reason: This candidate is a duplicate of CVE-2000-0844. Notes: All CVE users should reference CVE-2000-0844 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2003-11-18T05:00:00 | 2003-11-21T10:00:00 |
| cve-2003-0157 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0138. Reason: This candidate is a reservation duplicate of CVE-2003-0138 due to incomplete coordination. Notes: All CVE users should reference CVE-2003-0138 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2003-03-21T05:00:00 | 2005-02-06T10:00:00 |
| cve-2003-0158 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0139. Reason: This candidate is a reservation duplicate of CVE-2003-0139 due to incomplete coordination. Notes: All CVE users should reference CVE-2003-0139 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2003-03-21T05:00:00 | 2005-02-06T10:00:00 |
| cve-2003-0199 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': '286789f9-fbc2-4510-9f9a-43facdede74c', 'shortName': 'apple'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2003-0200 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': '286789f9-fbc2-4510-9f9a-43facdede74c', 'shortName': 'apple'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2003-0351 | N/A | {'providerMetadata': {'dateUpdated': '2004-08-20T09:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0306. Reason: This candidate is a reservation duplicate of CVE-2003-0306. Notes: All CVE users should reference CVE-2003-0306 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2004-08-20T04:00:00 | 2004-08-20T09:00:00 |
| cve-2003-0439 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': '79363d38-fa19-49d1-9214-5f28da3f3ac5', 'shortName': 'debian'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2003-0463 | N/A | {'providerMetadata': {'dateUpdated': '2006-02-08T01:00:00Z', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none'}]} | N/A | N/A | 2006-02-08T01:00:00Z | 2024-09-16T23:20:40.229Z |
| cve-2003-0568 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': '37e5125f-f79b-445b-8fad-9564f167944b', 'shortName': 'certcc'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2003-0569 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': '37e5125f-f79b-445b-8fad-9564f167944b', 'shortName': 'certcc'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2003-0570 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': '37e5125f-f79b-445b-8fad-9564f167944b', 'shortName': 'certcc'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2003-0571 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': '37e5125f-f79b-445b-8fad-9564f167944b', 'shortName': 'certcc'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2003-0582 | N/A | {'providerMetadata': {'dateUpdated': '2003-07-25T09:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0504. Reason: This candidate is a duplicate of CVE-2003-0504. Notes: All CVE users should reference CVE-2003-0504 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2003-07-25T04:00:00 | 2003-07-25T09:00:00 |
| cve-2003-0591 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is a duplicate number that was created during the refinement phase. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2003-07-25T04:00:00 | 2005-02-06T10:00:00 |
| cve-2003-0598 | N/A | {'providerMetadata': {'dateUpdated': '2004-08-20T09:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0657. Reason: This candidate is a reservation duplicate of CVE-2003-0657. Notes: All CVE users should reference CVE-2003-0657 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2003-08-14T04:00:00 | 2004-08-20T09:00:00 |
| cve-2003-0678 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': '79363d38-fa19-49d1-9214-5f28da3f3ac5', 'shortName': 'debian'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2003-0684 | N/A | {'providerMetadata': {'dateUpdated': '2017-05-11T13:57:01', 'orgId': '79363d38-fa19-49d1-9214-5f28da3f3ac5', 'shortName': 'debian'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2003. Notes: none'}]} | N/A | N/A | 2017-05-11T14:01:00 | 2017-05-11T13:57:01 |
| cve-2003-0687 | N/A | {'providerMetadata': {'dateUpdated': '2005-02-06T10:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has been revoked by its Candidate Numbering Authority (CNA) because it was internally assigned to a problem that was not reachable (the affected routine was not used by the software). Notes: none'}]} | N/A | N/A | 2004-06-03T04:00:00 | 2005-02-06T10:00:00 |
| cve-2003-0691 | N/A | {'providerMetadata': {'dateUpdated': '2006-02-27T23:00:00Z', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not associated with any specific security issue. Notes: none'}]} | N/A | N/A | 2006-02-27T23:00:00Z | 2024-09-16T22:25:23.087Z |
| cve-2003-0698 | N/A | {'providerMetadata': {'dateUpdated': '2005-06-02T09:00:00', 'orgId': '8254265b-2729-46b6-b9e3-3dfca2d5bfca', 'shortName': 'mitre'}, 'rejectedReasons': [{'lang': 'en', 'value': 'DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0743. Reason: This candidate is a duplicate of CVE-2003-0743. Notes: All CVE users should reference CVE-2003-0743 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage'}]} | N/A | N/A | 2005-04-14T04:00:00 | 2005-06-02T09:00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2002-2135 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1618. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.257 |
| fkie_cve-2002-2136 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1590. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.297 |
| fkie_cve-2002-2147 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1828. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.403 |
| fkie_cve-2002-2151 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1651. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.457 |
| fkie_cve-2002-2157 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1660. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.520 |
| fkie_cve-2002-2160 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1798. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.580 |
| fkie_cve-2002-2194 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1589. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.847 |
| fkie_cve-2002-2440 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.647 | 2023-11-07T01:56:11.690 |
| fkie_cve-2002-2441 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.723 | 2023-11-07T01:56:11.903 |
| fkie_cve-2002-2442 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.817 | 2023-11-07T01:56:12.113 |
| fkie_cve-2003-0090 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2000-0844. Reason: This candid… | 2003-12-15T05:00:00.000 | 2023-11-07T01:56:13.590 |
| fkie_cve-2003-0157 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0138. Reason: This candid… | 2003-03-24T05:00:00.000 | 2023-11-07T01:56:14.440 |
| fkie_cve-2003-0158 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0139. Reason: This candid… | 2003-03-24T05:00:00.000 | 2023-11-07T01:56:14.473 |
| fkie_cve-2003-0199 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.777 | 2023-11-07T01:56:15.040 |
| fkie_cve-2003-0200 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.807 | 2023-11-07T01:56:15.257 |
| fkie_cve-2003-0351 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0306. Reason: This candid… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:16.783 |
| fkie_cve-2003-0439 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.837 | 2023-11-07T01:56:17.367 |
| fkie_cve-2003-0463 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was w… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:17.870 |
| fkie_cve-2003-0568 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.853 | 2023-11-07T01:56:18.793 |
| fkie_cve-2003-0569 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.887 | 2023-11-07T01:56:19.007 |
| fkie_cve-2003-0570 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.900 | 2023-11-07T01:56:19.217 |
| fkie_cve-2003-0571 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.933 | 2023-11-07T01:56:19.427 |
| fkie_cve-2003-0582 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0504. Reason: This candid… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:19.753 |
| fkie_cve-2003-0591 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is a … | 2003-08-27T04:00:00.000 | 2023-11-07T01:56:19.833 |
| fkie_cve-2003-0598 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0657. Reason: This candid… | 2003-08-27T04:00:00.000 | 2023-11-07T01:56:19.903 |
| fkie_cve-2003-0678 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.963 | 2023-11-07T01:56:20.467 |
| fkie_cve-2003-0684 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.980 | 2023-11-07T01:56:20.740 |
| fkie_cve-2003-0687 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has b… | 2004-08-18T04:00:00.000 | 2023-11-07T01:56:20.970 |
| fkie_cve-2003-0691 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was w… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:21.030 |
| fkie_cve-2003-0698 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0743. Reason: This candid… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:21.120 |
| ID | Description | Package | Published | Updated |
|---|---|---|---|---|
| pysec-2020-11 | A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a… | ansible | 2020-03-12T18:15:00Z | 2020-05-29T14:09:00Z |
| pysec-2020-6 | A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, whe… | ansible | 2020-03-03T22:15:00Z | 2020-05-29T14:11:00Z |
| pysec-2020-42 | An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the… | fastecdsa | 2020-06-02T21:15:00Z | 2020-06-03T13:47:00Z |
| pysec-2020-1 | A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 … | ansible | 2020-05-11T14:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-10 | A flaw was found in Ansible Engine when the module package or service is used and the par… | ansible | 2020-03-16T16:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-12 | A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. … | ansible | 2020-03-16T16:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-5 | A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.… | ansible | 2020-03-11T19:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-7 | A flaw was found in the Ansible Engine when the fetch module is used. An attacker could i… | ansible | 2020-03-16T16:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-9 | A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when u… | ansible | 2020-03-09T16:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-35 | Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection … | django | 2020-02-03T12:15:00Z | 2020-06-19T03:15:00Z |
| pysec-2020-47 | In Indy Node 1.12.2, there is an Uncontrolled Resource Consumption vulnerability. Indy No… | indy-node | 2020-06-11T00:15:00Z | 2020-06-22T16:36:00Z |
| pysec-2019-114 | Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk une… | pyspark | 2019-08-07T17:15:00Z | 2020-06-23T00:15:00Z |
| pysec-2020-112 | Tendenci 12.0.10 allows unrestricted deserialization in apps\helpdesk\views\staff.py. | tendenci | 2020-06-21T15:15:00Z | 2020-06-26T19:34:00Z |
| pysec-2020-37 | In django-basic-auth-ip-whitelist before 0.3.4, a potential timing attack exists on websi… | django-basic-auth-ip-whitelist | 2020-06-24T13:15:00Z | 2020-07-09T14:11:00Z |
| pysec-2020-82 | libImaging/SgiRleDecode.c in Pillow before 6.2.2 has an SGI buffer overflow. | pillow | 2020-01-03T01:15:00Z | 2020-07-10T17:06:00Z |
| pysec-2020-83 | libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow. | pillow | 2020-01-03T01:15:00Z | 2020-07-10T17:09:00Z |
| pysec-2019-115 | python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other cip… | python-gnupg | 2019-03-21T16:01:00Z | 2020-07-13T04:15:00Z |
| pysec-2020-63 | OpenStack Manila <7.4.1, >=8.0.0 <8.1.1, and >=9.0.0 <9.1.1 allows attackers to view, upd… | manila | 2020-03-12T17:15:00Z | 2020-07-14T17:27:00Z |
| pysec-2020-36 | Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection … | django | 2020-03-05T15:15:00Z | 2020-07-14T17:28:00Z |
| pysec-2020-39 | Django Two-Factor Authentication before 1.12, stores the user's password in clear text in… | django-two-factor-auth | 2020-07-10T21:15:00Z | 2020-07-21T18:06:00Z |
| pysec-2020-23 | An issue was found in Apache Airflow versions 1.10.10 and below. A stored XSS vulnerabili… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-21T18:38:00Z |
| pysec-2020-17 | An issue was found in Apache Airflow versions 1.10.10 and below. It was discovered that m… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-21T18:45:00Z |
| pysec-2020-14 | An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command in… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-22T17:15:00Z |
| pysec-2020-51 | In jupyterhub-kubespawner before 0.12, certain usernames will be able to craft particular… | jupyterhub-kubespawner | 2020-07-17T21:15:00Z | 2020-07-22T20:28:00Z |
| pysec-2020-15 | An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecuto… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-24T18:19:00Z |
| pysec-2020-16 | An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecuto… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-24T18:22:00Z |
| pysec-2019-117 | ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in co… | reportlab | 2019-10-16T12:15:00Z | 2020-07-27T03:15:00Z |
| pysec-2020-77 | In libImaging/PcxDecode.c in Pillow before 7.1.0, an out-of-bounds read can occur when re… | pillow | 2020-06-25T19:15:00Z | 2020-07-27T19:15:00Z |
| pysec-2020-78 | In Pillow before 7.1.0, there are two Buffer Overflows in libImaging/TiffDecode.c. | pillow | 2020-06-25T19:15:00Z | 2020-07-27T19:15:00Z |
| pysec-2020-79 | In libImaging/Jpeg2KDecode.c in Pillow before 7.1.0, there are multiple out-of-bounds rea… | pillow | 2020-06-25T19:15:00Z | 2020-07-27T19:15:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2013-4562 | omniauth-facebook Gem for Ruby contains a flaw as HTTP requests do not require multiple s… | 2013-11-12T00:00:00.000Z |
| gsd-2013-4593 | omniauth-facebook Gem for Ruby contains a flaw that is due to the application supporting … | 2013-11-14T00:00:00.000Z |
| gsd-2013-6421 | sprout Gem for Ruby contains a flaw in the unpack_zip() function in archive_unpacker.rb. … | 2013-12-02T00:00:00.000Z |
| gsd-2013-4491 | There is a vulnerability in the internationalization component of Ruby on Rails. Under ce… | 2013-12-03T00:00:00.000Z |
| gsd-2013-4492 | The HTML exception message raised by I18n::MissingTranslation fails to escape the keys. | 2013-12-03T00:00:00.000Z |
| gsd-2013-6414 | There is a denial of service vulnerability in the header handling component of Action View. | 2013-12-03T00:00:00.000Z |
| gsd-2013-6415 | There is an XSS vulnerability in the number_to_currency helper in Ruby on Raile. The numb… | 2013-12-03T00:00:00.000Z |
| gsd-2013-6416 | There is a vulnerability in the simple_format helper in Ruby on Rails. The simple_format … | 2013-12-03T00:00:00.000Z |
| gsd-2013-6417 | The prior fix to CVE-2013-0155 was incomplete and the use of common 3rd party libraries c… | 2013-12-03T00:00:00.000Z |
| gsd-2013-7086 | Webbynode Gem for Ruby contains a flaw in notify.rb that is triggered when handling a spe… | 2013-12-12T00:00:00.000Z |
| gsd-2013-6460 | Nokogiri gem 1.5.x has Denial of Service via infinite loop when parsing XML documents | 2013-12-14T00:00:00.000Z |
| gsd-2013-6461 | Nokogiri gem 1.5.x and 1.6.x has DoS while parsing XML entities by failing to apply limits | 2013-12-14T00:00:00.000Z |
| gsd-2013-7111 | Bio Basespace SDK Gem for Ruby contains a flaw that is due to the API client code passing… | 2013-12-14T00:00:00.000Z |
| gsd-2013-7222 | Fat Free CRM contains a flaw that is due to the application defining a static security se… | 2013-12-24T00:00:00.000Z |
| gsd-2013-7223 | Fat Free CRM contains a flaw as the application is missing the protect_from_forgery state… | 2013-12-24T00:00:00.000Z |
| gsd-2013-7224 | Fat Free CRM contains a flaw in user controllers that is triggered as JSON requests are r… | 2013-12-24T00:00:00.000Z |
| gsd-2013-7225 | Fat Free CRM contains a flaw that may allow carrying out an SQL injection attack. The iss… | 2013-12-24T00:00:00.000Z |
| gsd-2013-7249 | Fat Free CRM contains a flaw that is triggered when the attacker sends a direct request f… | 2013-12-24T00:00:00.000Z |
| gsd-2014-1233 | paratrooper-pingdom Gem for Ruby contains a flaw in /lib/paratrooper-pingdom.rb. The issu… | 2013-12-26T00:00:00.000Z |
| gsd-2014-1234 | Paratrooper-newrelic Gem for Ruby contains a flaw in /lib/paratrooper-newrelic.rb. The is… | 2014-01-08T00:00:00.000Z |
| gsd-2014-0013 | In general, Ember.js escapes or strips any user-supplied content before inserting it in s… | 2014-01-14T00:00:00.000Z |
| gsd-2014-0014 | In general, Ember.js escapes or strips any user-supplied content before inserting it in s… | 2014-01-14T00:00:00.000Z |
| gsd-2014-1834 | Echor Gem for Ruby contains a flaw in backplane.rb in the perform_request function that i… | 2014-01-14T00:00:00.000Z |
| gsd-2014-1835 | echor Gem for Ruby contains a flaw that is due to the program exposing credential informa… | 2014-01-14T00:00:00.000Z |
| gsd-2014-1831 | Phusion Passenger before 4.0.37 allows local users to write to certain files and director… | 2014-01-28T00:00:00.000Z |
| gsd-2014-1832 | Phusion Passenger 4.0.37 allows local users to write to certain files and directories via… | 2014-01-29T00:00:00.000Z |
| gsd-2014-0046 | In general, Ember.js escapes or strips any user-supplied content before inserting it in s… | 2014-02-07T00:00:00.000Z |
| gsd-2014-0083 | The Ruby net-ldap gem before 0.11 uses a weak salt when generating SSHA passwords. | 2014-02-13T00:00:00.000Z |
| gsd-2014-0080 | SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgre… | 2014-02-18T00:00:00.000Z |
| gsd-2014-0081 | Multiple cross-site scripting (XSS) vulnerabilities in actionview/lib/action_view/helpers… | 2014-02-18T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-1214 | Malicious code in axp-utility-belt (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:22Z |
| mal-2022-4669 | Malicious code in mollie-design-system (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:22Z |
| mal-2022-7106 | Malicious code in website-404-error-page (npm) | 2022-05-19T08:37:21Z | 2022-05-19T08:37:22Z |
| mal-2022-1212 | Malicious code in axp-base (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:27Z |
| mal-2022-1213 | Malicious code in axp-shared-scripts (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:27Z |
| mal-2022-2377 | Malicious code in ddc-classnames-js (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| mal-2022-2378 | Malicious code in ddc-new-relic (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| mal-2022-2464 | Malicious code in dgse-tools-mgm-elf-helper (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| mal-2022-377 | Malicious code in @kibt/operation-track (npm) | 2022-05-23T10:22:10Z | 2022-05-23T10:22:10Z |
| mal-2022-378 | Malicious code in @kibt/weblogger (npm) | 2022-05-23T10:22:10Z | 2022-05-23T10:22:10Z |
| mal-2022-2022 | Malicious code in colors_express (npm) | 2022-05-31T11:55:20Z | 2022-05-31T11:55:21Z |
| mal-2022-2590 | Malicious code in dragox-utilities (npm) | 2022-05-31T12:53:57Z | 2022-05-31T12:53:57Z |
| mal-2022-391 | Malicious code in @logistics-frontend/client-core (npm) | 2022-05-31T12:55:54Z | 2022-05-31T12:55:55Z |
| mal-2022-392 | Malicious code in @logistics-frontend/core (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:55:55Z |
| mal-2022-393 | Malicious code in @logistics-frontend/hooks (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:55:55Z |
| mal-2022-396 | Malicious code in @logistics-frontend/polyfills (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:55:55Z |
| mal-2022-397 | Malicious code in @logistics-frontend/types (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:55:55Z |
| mal-2022-398 | Malicious code in @logistics-frontend/ui-old (npm) | 2022-05-31T12:55:54Z | 2022-05-31T12:55:55Z |
| mal-2022-399 | Malicious code in @logistics-frontend/utils (npm) | 2022-05-31T12:55:54Z | 2022-05-31T12:55:55Z |
| mal-2022-390 | Malicious code in @logistics-frontend/blocks (npm) | 2022-05-31T12:55:54Z | 2022-05-31T12:55:58Z |
| mal-2022-395 | Malicious code in @logistics-frontend/ndd (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:56:03Z |
| mal-2022-394 | Malicious code in @logistics-frontend/modules (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:56:04Z |
| mal-2022-6965 | Malicious code in volgactf (npm) | 2022-05-31T12:57:01Z | 2022-05-31T12:57:02Z |
| mal-2022-961 | Malicious code in amber-blocks (npm) | 2022-05-31T12:57:01Z | 2022-05-31T12:57:02Z |
| mal-2022-2180 | Malicious code in coolqueue.io (npm) | 2022-05-31T12:58:09Z | 2022-05-31T12:58:09Z |
| mal-2022-5680 | Malicious code in react-video-live-demo (npm) | 2022-05-31T12:58:09Z | 2022-05-31T12:58:10Z |
| mal-2022-666 | Malicious code in @tr-digital/react-rehydrate (npm) | 2022-05-31T12:58:42Z | 2022-05-31T12:58:42Z |
| mal-2022-5069 | Malicious code in oms-js-utils (npm) | 2022-05-31T13:00:08Z | 2022-05-31T13:00:09Z |
| mal-2022-5070 | Malicious code in oms-sentry (npm) | 2022-05-31T13:00:08Z | 2022-05-31T13:00:09Z |
| mal-2022-5942 | Malicious code in sb1-adobe-analytics (npm) | 2022-05-31T13:00:07Z | 2022-05-31T13:00:09Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| WID-SEC-W-2022-2241 | mutt: Schwachstelle ermöglicht Offenlegung von Informationen | 2020-11-23T23:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| WID-SEC-W-2022-2243 | mutt: Schwachstelle ermöglicht Manipulation von Daten | 2020-06-21T22:00:00.000+00:00 | 2025-01-15T23:00:00.000+00:00 |
| WID-SEC-W-2022-2244 | mutt: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-06-15T22:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| WID-SEC-W-2022-2245 | mutt: Schwachstelle ermöglicht Umgehung von Sicherheitsvorkehrungen | 2020-06-14T22:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| WID-SEC-W-2022-2249 | IBM Spectrum Scale: Schwachstelle ermöglicht Codeausführung | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| WID-SEC-W-2022-2251 | Aruba ClearPass Policy Manager: Mehrere Schwachstellen | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| WID-SEC-W-2022-2252 | Redmine.org Redmine: Mehrere Schwachstellen | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| WID-SEC-W-2022-2253 | Fortinet FortiSandbox: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| WID-SEC-W-2022-2254 | Fortinet FortiOS: Schwachstelle ermöglicht Cross-Site Scripting | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| WID-SEC-W-2022-2255 | Fortinet FortiOS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-1303 | Oracle Java SE: Mehrere Schwachstellen | 2021-04-20T22:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-1589 | Mozilla Thunderbird: Mehrere Schwachstellen | 2022-09-29T22:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2230 | Avast und AVG Antivirus: Schwachstelle ermöglicht Privilegieneskalation | 2022-12-05T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2240 | mutt: Schwachstelle ermöglicht Denial of Service | 2021-01-19T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2244 | mutt: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2020-06-15T22:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2245 | mutt: Schwachstelle ermöglicht Umgehung von Sicherheitsvorkehrungen | 2020-06-14T22:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2249 | IBM Spectrum Scale: Schwachstelle ermöglicht Codeausführung | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2251 | Aruba ClearPass Policy Manager: Mehrere Schwachstellen | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2252 | Redmine.org Redmine: Mehrere Schwachstellen | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2253 | Fortinet FortiSandbox: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2254 | Fortinet FortiOS: Schwachstelle ermöglicht Cross-Site Scripting | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| wid-sec-w-2022-2255 | Fortinet FortiOS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2022-12-06T23:00:00.000+00:00 | 2022-12-06T23:00:00.000+00:00 |
| WID-SEC-W-2022-0150 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-02-14T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| WID-SEC-W-2022-0311 | Linux Kernel: Mehrere Schwachstellen | 2019-12-01T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| WID-SEC-W-2022-0315 | Linux Kernel: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2021-05-30T22:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| WID-SEC-W-2022-0439 | Red Hat OpenStack: Mehrere Schwachstellen | 2022-06-22T22:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| WID-SEC-W-2022-0456 | tribe29 checkmk: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2022-06-23T22:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| WID-SEC-W-2022-0728 | libTIFF: Schwachstelle ermöglicht Denial of Service | 2022-01-09T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| WID-SEC-W-2022-0730 | libTIFF: Mehrere Schwachstellen ermöglichen Denial of Service | 2022-03-15T23:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| WID-SEC-W-2022-0817 | Red Hat OpenStack: Schwachstelle ermöglicht Manipulation von Dateien | 2022-07-24T22:00:00.000+00:00 | 2022-12-07T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| SSA-292063 | SSA-292063: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.3 and 23.1.0 on RUGGEDCOM APE1808 devices | 2023-11-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-322980 | SSA-322980: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2023-04-11T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-382651 | SSA-382651: File Parsing Vulnerability in Solid Edge | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-489698 | SSA-489698: X_T File Parsing Vulnerability in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-552874 | SSA-552874: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-589937 | SSA-589937: Multiple Memory Corruption Vulnerabilities in Solid Edge | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-592380 | SSA-592380: Denial of Service Vulnerability in SIMATIC S7-1500 CPUs and related products | 2023-12-12T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-647455 | SSA-647455: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.2 on RUGGEDCOM APE1808 devices | 2023-10-10T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-661579 | SSA-661579: Multiple File Parsing Vulnerabilities in Teamcenter Visualization and JT2Go | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-665034 | SSA-665034: Vulnerability in Nozomi Guardian/CMC before 23.3.0 on RUGGEDCOM APE1808 devices | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-871717 | SSA-871717: Multiple Vulnerabilities in Polarion ALM | 2024-02-13T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-916916 | SSA-916916: Security Vulnerabilities Fixed in RUGGEDCOM CROSSBOW V5.5 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-923361 | SSA-923361: MODEL File Parsing Vulnerability in Tecnomatix Plant Simulation before V2302.0011 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-925850 | SSA-925850: Improper Access Control in Polarion ALM | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-935500 | SSA-935500: Denial of Service Vulnerability in FTP Server of Nucleus RTOS based APOGEE, TALON and Desigo PXC/PXM Products | 2022-10-11T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-953710 | SSA-953710: Vulnerabilities in the Network Communication Stack in Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-968170 | SSA-968170: Remote Code Execution Vulnerability in SIMATIC STEP 7 V5.x and Derived Products | 2023-06-13T00:00:00Z | 2024-05-14T00:00:00Z |
| SSA-976324 | SSA-976324: Multiple IGS File Parsing Vulnerabilities in PS/IGES Parasolid Translator Component before V27.1.215 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-046364 | SSA-046364: X_T File Parsing Vulnerabilities in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-225840 | SSA-225840: Vulnerabilities in the Network Communication Stack in Sinteso EN and Cerberus PRO EN Fire Protection Systems | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-240541 | SSA-240541: WIBU Systems CodeMeter Heap Buffer Overflow Vulnerability in Industrial Products | 2023-09-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-258494 | SSA-258494: Stack Overflow Vulnerability in Simcenter Nastran before 2406.90 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-273900 | SSA-273900: Multiple Vulnerabilities in SIMATIC CN 4100 before V3.0 | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-292022 | SSA-292022: Vulnerability in Nozomi Guardian/CMC before 23.4.1 on RUGGEDCOM APE1808 devices | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-292063 | SSA-292063: Multiple Vulnerabilities in Nozomi Guardian/CMC before 22.6.3 and 23.1.0 on RUGGEDCOM APE1808 devices | 2023-11-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-322980 | SSA-322980: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2023-04-11T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-382651 | SSA-382651: File Parsing Vulnerability in Solid Edge | 2024-03-12T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-489698 | SSA-489698: X_T File Parsing Vulnerability in Parasolid | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-552874 | SSA-552874: Denial of Service Vulnerability in SIPROTEC 5 Devices | 2022-12-13T00:00:00Z | 2024-05-14T00:00:00Z |
| ssa-589937 | SSA-589937: Multiple Memory Corruption Vulnerabilities in Solid Edge | 2024-05-14T00:00:00Z | 2024-05-14T00:00:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| RHSA-2012:1577 | Red Hat Security Advisory: java-1.4.2-ibm-sap End of Support Notice | 2012-12-17T20:59:00+00:00 | 2025-09-25T11:46:30+00:00 |
| rhsa-2012_1577 | Red Hat Security Advisory: java-1.4.2-ibm-sap End of Support Notice | 2012-12-17T20:59:00+00:00 | 2024-11-05T17:55:22+00:00 |
| RHSA-2013:0214 | Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update | 2013-01-31T19:13:00+00:00 | 2025-09-25T11:46:53+00:00 |
| rhsa-2013_0214 | Red Hat Security Advisory: nss and nspr security, bug fix, and enhancement update | 2013-01-31T19:13:00+00:00 | 2024-11-05T17:57:11+00:00 |
| RHSA-2013:0210 | Red Hat Security Advisory: Red Hat Enterprise Linux 3 - 1-Year End Of Support Notice | 2013-01-30T21:02:00+00:00 | 2025-09-25T11:46:53+00:00 |
| rhsa-2013_0210 | Red Hat Security Advisory: Red Hat Enterprise Linux 3 - 1-Year End Of Support Notice | 2013-01-30T21:02:00+00:00 | 2024-11-05T17:57:36+00:00 |
| RHSA-2013:0578 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 5.6 5-Month EOL Notice | 2013-02-28T18:36:00+00:00 | 2025-09-25T11:47:22+00:00 |
| rhsa-2013_0578 | Red Hat Security Advisory: Red Hat Enterprise Linux Extended Update Support 5.6 5-Month EOL Notice | 2013-02-28T18:36:00+00:00 | 2024-11-05T18:01:22+00:00 |
| RHSA-2013:0666 | Red Hat Security Advisory: Oracle Java SE 6 - notification of end of public updates | 2013-03-20T15:58:00+00:00 | 2025-09-25T11:47:38+00:00 |
| rhsa-2013_0666 | Red Hat Security Advisory: Oracle Java SE 6 - notification of end of public updates | 2013-03-20T15:58:00+00:00 | 2024-11-05T18:03:49+00:00 |
| RHSA-2013:0688 | Red Hat Security Advisory: Red Hat Enterprise Linux Advanced Mission Critical 5.3 1-Year Notice | 2013-03-28T21:51:00+00:00 | 2025-09-25T11:47:46+00:00 |
| rhsa-2013_0688 | Red Hat Security Advisory: Red Hat Enterprise Linux Advanced Mission Critical 5.3 1-Year Notice | 2013-03-28T21:51:00+00:00 | 2024-11-05T18:04:12+00:00 |
| RHSA-2013:0762 | Red Hat Security Advisory: Red Hat Enterprise MRG for Red Hat Enterprise Linux 5 1-Year Notice | 2013-04-22T15:46:00+00:00 | 2025-09-25T11:47:57+00:00 |
| rhsa-2013_0762 | Red Hat Security Advisory: Red Hat Enterprise MRG for Red Hat Enterprise Linux 5 1-Year Notice | 2013-04-22T15:46:00+00:00 | 2024-11-05T18:05:22+00:00 |
| RHSA-2013:0784 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.1 Extended Update Support 1-Month Notice | 2013-05-02T15:25:00+00:00 | 2025-09-25T11:47:59+00:00 |
| rhsa-2013_0784 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.1 Extended Update Support 1-Month Notice | 2013-05-02T15:25:00+00:00 | 2024-11-05T18:05:45+00:00 |
| RHSA-2013:0791 | Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update | 2013-06-03T17:26:00+00:00 | 2025-09-25T11:48:03+00:00 |
| rhsa-2013_0791 | Red Hat Security Advisory: qemu-kvm-rhev security and bug fix update | 2013-06-03T17:26:00+00:00 | 2024-11-05T18:05:58+00:00 |
| RHSA-2013:0895 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.1 Extended Update Support Retirement Notice | 2013-06-03T17:25:00+00:00 | 2025-09-25T11:48:10+00:00 |
| rhsa-2013_0895 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.1 Extended Update Support Retirement Notice | 2013-06-03T17:25:00+00:00 | 2024-11-05T18:07:19+00:00 |
| RHSA-2013:0996 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.6 Extended Update Support 1-Month Notice | 2013-06-27T16:42:00+00:00 | 2025-09-25T11:48:16+00:00 |
| rhsa-2013_0996 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.6 Extended Update Support 1-Month Notice | 2013-06-27T16:42:00+00:00 | 2024-11-05T18:08:26+00:00 |
| RHSA-2013:1001 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.2 Extended Update Support 6-Month Notice | 2013-06-28T02:39:00+00:00 | 2025-09-25T11:48:16+00:00 |
| rhsa-2013_1001 | Red Hat Security Advisory: Red Hat Enterprise Linux 6.2 Extended Update Support 6-Month Notice | 2013-06-28T02:39:00+00:00 | 2024-11-05T18:08:32+00:00 |
| RHSA-2013:1126 | Red Hat Security Advisory: Red Hat Enterprise Linux 3 Extended Lifecycle Support 6-Month Notice | 2013-07-31T17:59:00+00:00 | 2025-09-25T11:48:25+00:00 |
| rhsa-2013_1126 | Red Hat Security Advisory: Red Hat Enterprise Linux 3 Extended Lifecycle Support 6-Month Notice | 2013-07-31T17:59:00+00:00 | 2024-11-05T18:10:01+00:00 |
| RHSA-2013:1145 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.6 Extended Update Support Retirement Notice | 2013-08-07T17:50:00+00:00 | 2025-09-25T11:48:27+00:00 |
| rhsa-2013_1145 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.6 Extended Update Support Retirement Notice | 2013-08-07T17:50:00+00:00 | 2024-11-05T18:10:35+00:00 |
| RHSA-2013:1376 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.3 Advanced Mission Critical 6-month Notice | 2013-09-30T17:51:00+00:00 | 2025-09-25T11:48:42+00:00 |
| rhsa-2013_1376 | Red Hat Security Advisory: Red Hat Enterprise Linux 5.3 Advanced Mission Critical 6-month Notice | 2013-09-30T17:51:00+00:00 | 2024-11-05T18:12:23+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2020-14624 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: JSON). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14631 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Audit). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14632 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14633 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14634 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14641 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14643 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14651 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14654 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14656 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14663 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14678 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14680 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14697 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14702 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-14725 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15393 | In the Linux kernel 4.4 through 5.7.6 usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak aka CID-28ebeb8db770. | 2020-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15469 | In QEMU 4.2.0 a MemoryRegionOps object may lack read/write callback methods leading to a NULL pointer dereference. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15705 | GRUB2: avoid loading unsigned kernels when GRUB is booted directly under secureboot without shim | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15706 | GRUB2 contains a race condition leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15707 | GRUB2 contained integer overflows when handling the initrd command leading to a heap-based buffer overflow. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15859 | QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c because a guest OS user can trigger an e1000e packet with the data's address set to the e1000e's MMIO address. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-15863 | hw/net/xgmac.c in the XGMAC Ethernet controller in QEMU before 07-20-2020 has a buffer overflow. This occurs during packet transmission and affects the highbank and midway emulated machines. A guest user or process could use this flaw to crash the QEMU process on the host resulting in a denial of service or potential privileged code execution. This was fixed in commit 5519724a13664b43e225ca05351c60b4468e4555. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-16092 | In QEMU through 5.0.0 an assertion failure can occur in the network packet processing. This issue affects the e1000e and vmxnet3 network devices. A malicious guest user/process could use this flaw to abort the QEMU process on the host resulting in a denial of service condition in net_tx_pkt_add_raw_fragment in hw/net/net_tx_pkt.c. | 2020-08-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-16166 | The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c. | 2020-07-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-1711 | An out-of-bounds heap buffer access flaw was found in the way the iSCSI Block driver in QEMU versions 2.12.0 before 4.2.1 handled a response coming from an iSCSI server while checking the status of a Logical Address Block (LBA) in an iscsi_co_block_status() routine. A remote user could use this flaw to crash the QEMU process resulting in a denial of service or potential execution of arbitrary code with privileges of the QEMU process on the host. | 2020-02-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-1712 | A heap use-after-free vulnerability was found in systemd before version v245-rc1 where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges by sending specially crafted dbus messages. | 2020-03-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-1720 | A flaw was found in PostgreSQL's "ALTER ... DEPENDS ON EXTENSION" where sub-commands did not perform authorization checks. An authenticated attacker could use this flaw in certain configurations to perform drop objects such as function triggers et al. leading to database corruption. This issue affects PostgreSQL versions before 12.2 before 11.7 before 10.12 and before 9.6.17. | 2020-03-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-1752 | A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that when processed by the glob function would potentially lead to arbitrary code execution. This was fixed in version 2.32. | 2020-04-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2020-7211 | tftp.c in libslirp 4.1.0 as used in QEMU 4.2.0 does not prevent ..\ directory traversal on Windows. | 2020-01-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-17-122-02 | CyberVision Kaa IoT Platform | 2017-05-02T00:00:00.000000Z | 2017-05-02T00:00:00.000000Z |
| icsa-17-122-03 | Advantech B+B SmartWorx MESR901 | 2017-05-02T00:00:00.000000Z | 2017-05-02T00:00:00.000000Z |
| ICSA-17-094-05 | Rockwell Automation ControlLogix 5580 and CompactLogix 5380 | 2017-04-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| ICSA-17-124-01 | Hikvision Cameras | 2017-05-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| ICSA-17-124-02 | Dahua Technology Co., Ltd Digital Video Recorders and IP Cameras | 2017-05-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| ICSA-17-124-03 | Advantech WebAccess | 2017-05-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-094-05 | Rockwell Automation ControlLogix 5580 and CompactLogix 5380 | 2017-04-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-124-01 | Hikvision Cameras | 2017-05-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-124-02 | Dahua Technology Co., Ltd Digital Video Recorders and IP Cameras | 2017-05-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| icsa-17-124-03 | Advantech WebAccess | 2017-05-04T00:00:00.000000Z | 2017-05-04T00:00:00.000000Z |
| ICSA-17-129-03 | Siemens SIMATIC WinCC and SIMATIC WinCC Runtime Professional | 2017-05-09T00:00:00.000000Z | 2017-05-09T00:00:00.000000Z |
| icsa-17-129-03 | Siemens SIMATIC WinCC and SIMATIC WinCC Runtime Professional | 2017-05-09T00:00:00.000000Z | 2017-05-09T00:00:00.000000Z |
| ICSA-17-131-01 | PHOENIX CONTACT mGuard | 2017-05-11T00:00:00.000000Z | 2017-05-11T00:00:00.000000Z |
| ICSA-17-131-02 | Satel Iberia SenNet Data Logger and Electricity Meters | 2017-05-11T00:00:00.000000Z | 2017-05-11T00:00:00.000000Z |
| icsa-17-131-01 | PHOENIX CONTACT mGuard | 2017-05-11T00:00:00.000000Z | 2017-05-11T00:00:00.000000Z |
| icsa-17-131-02 | Satel Iberia SenNet Data Logger and Electricity Meters | 2017-05-11T00:00:00.000000Z | 2017-05-11T00:00:00.000000Z |
| ICSA-17-136-01 | Detcon SiteWatch Gateway | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| ICSA-17-136-02 | Schneider Electric SoMachine HVAC | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| ICSA-17-136-03 | Hanwha Techwin SRN-4000 | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| ICSA-17-136-04 | Schneider Electric VAMPSET | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-136-01 | Detcon SiteWatch Gateway | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-136-02 | Schneider Electric SoMachine HVAC | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-136-03 | Hanwha Techwin SRN-4000 | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| icsa-17-136-04 | Schneider Electric VAMPSET | 2017-05-16T00:00:00.000000Z | 2017-05-16T00:00:00.000000Z |
| ICSA-17-138-01 | ICSA-17-138-01_Miele Professional PG 85 Series | 2017-05-18T00:00:00.000000Z | 2017-05-18T00:00:00.000000Z |
| ICSA-17-138-02 | Schneider Electric Wonderware InduSoft Web Studio | 2017-05-18T00:00:00.000000Z | 2017-05-18T00:00:00.000000Z |
| icsa-17-138-01 | ICSA-17-138-01_Miele Professional PG 85 Series | 2017-05-18T00:00:00.000000Z | 2017-05-18T00:00:00.000000Z |
| icsa-17-138-02 | Schneider Electric Wonderware InduSoft Web Studio | 2017-05-18T00:00:00.000000Z | 2017-05-18T00:00:00.000000Z |
| ICSA-17-115-04 | Rockwell Automation Allen-Bradley MicroLogix 1100 and 1400 | 2017-04-25T00:00:00.000000Z | 2017-05-23T00:00:00.000000Z |
| ICSA-17-143-01 | Moxa OnCell | 2017-05-23T00:00:00.000000Z | 2017-05-23T00:00:00.000000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-20180307-550x | Cisco 550X Series Stackable Managed Switches SNMP Denial of Service Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-cpcp | Cisco Prime Collaboration Provisioning Hard-Coded Password Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-dcnm | Cisco Data Center Network Manager Cross-Site Request Forgery Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise | Cisco Identity Services Engine Authenticated CLI Denial of Service Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise1 | Cisco Identity Services Engine Cross-Site Scripting Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise2 | Cisco Identity Services Engine Authenticated Privilege Escalation Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise3 | Cisco Identity Services Engine Local Command Injection Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise4 | Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise5 | Cisco Identity Services Engine Cross-Site Request Forgery Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ise6 | Cisco Identity Services Engine Command Injection to Underlying Operating System Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-pdcnm | Cisco Prime Data Center Network Manager Cross-Site Scripting Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-res | Cisco Registered Envelope Service Cross-Site Scripting Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-sm | Cisco Security Manager DesktopServlet Reflected Cross-Site Scripting Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-staros | Cisco StarOS CLI Command Injection Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-staros1 | Cisco StarOS CLI Command Injection Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-ucs | Cisco UCS Director Cross-Site Scripting Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-val | Cisco Videoscape AnyRes Live Cross-Site Scripting Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180307-wsa | Cisco Web Security Appliance FTP Authentication Bypass Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-07T16:00:00+00:00 |
| cisco-sa-20180221-ucdm | Cisco Unified Communications Domain Manager Remote Code Execution Vulnerability | 2018-02-21T16:00:00+00:00 | 2018-03-09T14:47:00+00:00 |
| cisco-sa-20180316-umb | Cisco Umbrella Dashboard Session Expiration Issue | 2018-03-16T16:00:00+00:00 | 2018-03-16T16:00:00+00:00 |
| cisco-sa-20170419-energywise | Cisco IOS and IOS XE Software EnergyWise Denial of Service Vulnerabilities | 2017-04-19T16:00:00+00:00 | 2018-03-22T17:07:00+00:00 |
| cisco-sa-20180307-acs1 | Cisco Secure Access Control Server XML External Entity Injection Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-27T16:11:00+00:00 |
| cisco-sa-20180307-acs | Cisco Secure Access Control Server XML External Entity Injection Vulnerability | 2018-03-07T16:00:00+00:00 | 2018-03-27T16:15:00+00:00 |
| cisco-sa-20180328-FIB-dos | Cisco IOS and IOS XE Software Forwarding Information Base Denial of Service Vulnerability | 2018-03-28T16:00:00+00:00 | 2018-03-28T16:00:00+00:00 |
| cisco-sa-20180328-cmdinj | Cisco IOS XE Software CLI Command Injection Vulnerabilities | 2018-03-28T16:00:00+00:00 | 2018-03-28T16:00:00+00:00 |
| cisco-sa-20180328-dot1x | Cisco IOS Software 802.1x Multiple-Authentication Port Authentication Bypass Vulnerability | 2018-03-28T16:00:00+00:00 | 2018-03-28T16:00:00+00:00 |
| cisco-sa-20180328-fib-dos | Cisco IOS and IOS XE Software Forwarding Information Base Denial of Service Vulnerability | 2018-03-28T16:00:00+00:00 | 2018-03-28T16:00:00+00:00 |
| cisco-sa-20180328-fwip | Cisco IOS XE Software Zone-Based Firewall IP Fragmentation Denial of Service Vulnerability | 2018-03-28T16:00:00+00:00 | 2018-03-28T16:00:00+00:00 |
| cisco-sa-20180328-igmp | Cisco IOS XE Software Internet Group Management Protocol Memory Leak Vulnerability | 2018-03-28T16:00:00+00:00 | 2018-03-28T16:00:00+00:00 |
| cisco-sa-20180328-ipv4 | Cisco IOS XE Software for Cisco Catalyst Switches IPv4 Denial of Service Vulnerability | 2018-03-28T16:00:00+00:00 | 2018-03-28T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| sca-2025-0008 | Multiple vulnerabilities in Endress+Hauser MEAC300-FNADE4 | 2025-07-03T13:00:00.000Z | 2025-07-03T13:00:00.000Z |
| sca-2025-0009 | Vulnerabilities affecting SICK TDC-E210GC | 2025-08-01T13:00:00.000Z | 2025-08-01T13:00:00.000Z |
| sca-2025-0010 | Multiple vulnerabilities in SICK Enterprise Analytics and SICK Logistic Analytics Products | 2025-10-02T13:00:00.000Z | 2025-10-02T13:00:00.000Z |
| sca-2025-0012 | Sudo vulnerability affects SICK SID products | 2025-10-27T11:00:00.000Z | 2025-10-27T14:00:00.000Z |
| sca-2025-0013 | Vulnerabilities affecting SICK TLOC100-100 | 2025-10-27T14:00:00.000Z | 2025-10-27T14:00:00.000Z |
| sca-2025-0014 | CodeMeter vulnerablity affects SICK CODE-LOC and SICK LIDAR-LOC | 2025-11-03T11:00:00.000Z | 2025-11-03T14:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| nn-2025:9-01 | Path traversal in Time Machine functionality in Guardian/CMC before 25.2.0 | 2025-10-07T11:00:00.000Z | 2025-10-07T11:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202103-0230 | A vulnerability has been identified in Solid Edge SE2020 (All Versions < SE2020MP13), Sol… | 2022-05-04T08:13:28.253000Z |
| var-202109-1793 | A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge … | 2022-05-04T08:13:30.769000Z |
| var-202103-1346 | A remote arbitrary file read vulnerability was discovered in some Aruba Instant Access Po… | 2022-05-04T08:14:15.277000Z |
| var-202109-1974 | A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal) v… | 2022-05-04T08:16:26.089000Z |
| var-202103-1333 | A remote arbitrary file modification vulnerability was discovered in some Aruba Instant A… | 2022-05-04T08:21:39.419000Z |
| var-202106-0696 | Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86,… | 2022-05-04T08:21:47.847000Z |
| var-202109-0234 | A vulnerability in the Internet Key Exchange Version 2 (IKEv2) support for the AutoReconn… | 2022-05-04T08:24:39.300000Z |
| var-202109-1826 | A vulnerability has been identified in NX 1980 Series (All versions < V1984), Solid Edge … | 2022-05-04T08:28:05.251000Z |
| var-202112-2536 | Huawei AR1220F-S is a new generation enterprise-class gigabit router. Huawei AR1220F-… | 2022-05-04T08:32:36.056000Z |
| var-202112-2273 | Certain NETGEAR devices are affected by stored XSS. This affects RAX200 before 1.0.5.126,… | 2022-05-04T08:32:36.348000Z |
| var-202111-1111 | Dell BIOS contains an improper input validation vulnerability. A local authenticated mali… | 2022-05-04T08:32:44.162000Z |
| var-202111-0183 | IBM MQ 9.1 LTS, 9.1 CD, 9.2 LTS, and 9.2CD is vulnerable to a denial of service attack ca… | 2022-05-04T08:32:45.325000Z |
| var-202110-1910 | Huawei Technologies Co., Ltd. is the world's leading provider of information and communic… | 2022-05-04T08:32:45.818000Z |
| var-202108-2575 | X463de is a printer of Lexmark International Inc. Lexmark X463de has an unauthorized … | 2022-05-04T08:32:53.156000Z |
| var-202108-2554 | Huawei HG659 is a home gateway. Huawei HG659 has an information disclosure vulnerabil… | 2022-05-04T08:32:53.166000Z |
| var-202108-2533 | Ricoh (China) Investment Co., Ltd. provides office image processing equipment (such as MF… | 2022-05-04T08:32:53.181000Z |
| var-202108-2512 | Hong Kong Broadband Network Limited is a leading provider of integrated telecommunication… | 2022-05-04T08:32:53.193000Z |
| var-202108-2491 | DocuPrint CM305 df is a printer. DocuPrint CM305 df has an unauthorized access vulner… | 2022-05-04T08:32:53.204000Z |
| var-202108-2470 | The HP Photosmart 5520 series is a mid-range inkjet printer. The HP Photosmart 5520 s… | 2022-05-04T08:32:53.216000Z |
| var-202108-2449 | Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of… | 2022-05-04T08:32:53.231000Z |
| var-202108-2428 | Lexmark MS610dn is a printer product of Lexmark. Lexmark MS610dn has an unauthorized … | 2022-05-04T08:32:53.242000Z |
| var-202108-2407 | Fuji Xerox (China) Co., Ltd. was established on January 3, 1995. It is a wholly-owned hol… | 2022-05-04T08:32:53.253000Z |
| var-202108-2386 | Fuji Xerox (China) Co., Ltd. was established on January 3, 1995. It is a wholly-owned hol… | 2022-05-04T08:32:53.264000Z |
| var-202108-2365 | MOBOTIX M26 is a camera of MOBOTIX. MOBOTIX M26 has an unauthorized access vulnerabil… | 2022-05-04T08:32:53.274000Z |
| var-202108-2344 | MP C3004ex is a color digital copier. Ricoh (China) Investment Co., Ltd. MP C3004ex h… | 2022-05-04T08:32:53.285000Z |
| var-202108-2323 | Fuji Xerox (China) Co., Ltd. was established on January 3, 1995. It is a wholly-owned hol… | 2022-05-04T08:32:53.296000Z |
| var-202108-2302 | Samsung (China) Investment Co., Ltd. is the headquarters of Samsung Group in China. As of… | 2022-05-04T08:32:53.307000Z |
| var-202107-1894 | Axis is an IT company that specializes in providing network video solutions. AXIS P13… | 2022-05-04T08:32:54.844000Z |
| var-202107-1873 | Axis is an IT company that specializes in providing network video solutions. AXIS M31… | 2022-05-04T08:32:54.854000Z |
| var-202107-1852 | Matsushita Electric (China) was established in 1994 and is mainly responsible for the sal… | 2022-05-04T08:32:54.864000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2006-000392 | Ruby contains a vulnerability that prevents safe level 4 from functioning as a sandbox. | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000540 | Microsoft Windows Indexing Service cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000599 | Nagasaki Electronic Prefectural Office System vulnerable to bypass authentication | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000600 | Nagasaki Electronic Prefectural Office System authentication information vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000601 | Eudora Japanese version stops working after the application crashes | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000602 | Multiple email clients vulnerable in handling an attachement inapropriately | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000603 | Hatena Toolbar sends URL information unecnrypted | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000604 | Nagasaki Electronic Prefectural Office System SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000605 | Hyper NIKKI System allows unauthorized email submission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000606 | Minnu's filer2 vulnerable in allowing arbitrary Ruby script execution | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000609 | CAFEMILK Shopping Cart CGI cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000610 | QUICK CART OS command injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000611 | QUICK CART cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000612 | FreeStyleWiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000613 | Trac cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000614 | Winny buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000615 | Apache Struts Validator allows to bypass input data validation | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000616 | DonutP and UnDonut confirmation dialog display vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000617 | Multiple email clients vulnerable to directory traversal due to inappropriate unicode handling | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000619 | MyWeb SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000620 | RWiki arbitrary Ruby script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000621 | RWiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000622 | dotProject cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000623 | Joomla! cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000624 | CGI RESCUE WebFORM allows unauthorized email transmission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000625 | CGI RESCUE WebFORM allows unauthorized email transmission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000626 | dotProject cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000627 | Phorum cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000628 | Wiki clone products vulnerable to denial of service attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000629 | Wiki clone products vulnerable to denial of service attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|