Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-5r96-55w4-xch3 | Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers coul… | 2022-02-11T00:00:43Z | 2025-10-22T00:32:29Z |
| ghsa-9358-2j57-j7hg | Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers coul… | 2022-02-11T00:00:44Z | 2025-10-22T00:32:29Z |
| ghsa-jpxp-6rp5-3wg3 | Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers coul… | 2022-02-11T00:00:44Z | 2025-10-22T00:32:29Z |
| ghsa-vchr-42h7-32xh | Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers coul… | 2022-02-11T00:00:44Z | 2025-10-22T00:32:29Z |
| ghsa-4jrj-gxg8-2frj | Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers coul… | 2022-02-11T00:00:45Z | 2025-10-22T00:32:29Z |
| ghsa-6hc3-539h-6xc6 | SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Co… | 2022-02-11T00:00:50Z | 2025-10-22T00:32:29Z |
| ghsa-95v7-jv4x-23ww | VMware Cloud Foundation contains an information disclosure vulnerability due to logging of credenti… | 2022-02-11T00:01:16Z | 2025-10-31T12:30:20Z |
| ghsa-v6h3-3hh9-32cf | An issue was discovered in UsbCoreDxe in Insyde InsydeH2O with kernel 5.5 before 05.51.45, 5.4 befo… | 2022-02-11T00:01:34Z | 2025-11-04T21:30:27Z |
| ghsa-2vc7-6w39-6rh2 | An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Ad… | 2022-02-12T00:00:48Z | 2025-10-22T00:32:29Z |
| ghsa-cj93-q2w3-fjxc | Heap-based Buffer Overflow in Conda vim prior to 8.2. | 2022-02-12T00:01:19Z | 2025-11-03T21:30:37Z |
| ghsa-vjvx-2q28-pjv2 | Use after free in V8 in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potential… | 2022-02-13T00:00:25Z | 2025-10-22T00:32:29Z |
| ghsa-m236-5q24-77fq | Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows de… | 2022-02-15T00:02:42Z | 2025-11-04T00:30:31Z |
| ghsa-3mj9-r4cx-8mx5 | Crash in the CMS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial o… | 2022-02-15T00:02:43Z | 2025-11-04T00:30:30Z |
| ghsa-f9cx-48m4-2xp7 | Unaligned access in the CSN.1 protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 al… | 2022-02-15T00:02:43Z | 2025-11-04T00:30:30Z |
| ghsa-rrrg-823g-x93p | Crash in the PVFS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial … | 2022-02-15T00:02:43Z | 2025-11-04T00:30:30Z |
| ghsa-jj6m-8486-6rg2 | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. | 2022-02-15T00:02:47Z | 2025-11-03T21:30:38Z |
| ghsa-m45p-jcfh-3c2x | Heap-based Buffer Overflow in Conda vim prior to 8.2. | 2022-02-15T00:03:20Z | 2025-11-03T21:30:37Z |
| ghsa-8v55-rm6p-87p5 | The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to … | 2022-02-15T00:03:24Z | 2025-11-03T21:30:37Z |
| ghsa-fwqr-qx2m-vqxq | The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable… | 2022-02-15T00:03:24Z | 2025-11-03T21:30:37Z |
| ghsa-2259-5mcv-w35h | In SVGPP SVG++ library 1.3.0, the XMLDocument::getRoot function in the renderDocument function hand… | 2022-02-16T00:01:42Z | 2025-11-03T18:31:10Z |
| ghsa-285h-2jh7-f2xq | Stack overflow in PJSUA API when calling pjsua_playlist_create. An attacker-controlled 'file_names'… | 2022-02-17T00:00:25Z | 2025-11-04T18:30:38Z |
| ghsa-qxcw-ffrq-8vcm | Stack overflow in PJSUA API when calling pjsua_player_create. An attacker-controlled 'filename' arg… | 2022-02-17T00:00:26Z | 2025-11-04T18:30:37Z |
| ghsa-qq7v-ccww-8wh3 | Read out-of-bounds in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filenam… | 2022-02-17T00:00:27Z | 2025-11-04T18:30:38Z |
| ghsa-xqp8-79vm-66m9 | Stack overflow in PJSUA API when calling pjsua_recorder_create. An attacker-controlled 'filename' a… | 2022-02-17T00:00:27Z | 2025-11-04T18:30:37Z |
| ghsa-7c49-j253-wq5r | It was found that polkit could be tricked into bypassing the credential checks for D-Bus requests, … | 2022-02-17T00:00:28Z | 2025-10-22T00:32:30Z |
| ghsa-f8fv-f786-9933 | Magento improper input validation vulnerability | 2022-02-17T00:00:29Z | 2025-10-22T19:14:04Z |
| ghsa-5wgx-qvpv-2353 | A Remote Command Execution (RCE) vulnerability exists in all series H/W revisions D-link DIR-810L, … | 2022-02-18T00:00:32Z | 2025-10-22T00:32:30Z |
| ghsa-9wpj-h5jq-88p9 | It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone … | 2022-02-19T00:01:03Z | 2025-10-22T00:32:30Z |
| ghsa-gpmp-x3gj-4qx8 | Large loops in multiple protocol dissectors in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allow d… | 2022-02-19T00:01:28Z | 2025-11-04T00:30:31Z |
| ghsa-qwhp-2gp7-qhfq | A double-free was found in the way 389-ds-base handles virtual attributes context in persistent sea… | 2022-02-19T00:01:29Z | 2025-11-03T21:30:38Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2014-1776 | N/A | Use-after-free vulnerability in Microsoft Interne… |
n/a |
n/a |
2014-04-27T10:00:00.000Z | 2025-10-22T00:05:37.934Z |
| cve-2014-0130 | N/A | Directory traversal vulnerability in actionpack/l… |
n/a |
n/a |
2014-05-07T10:00:00.000Z | 2025-10-22T00:05:37.800Z |
| cve-2014-0196 | N/A | The n_tty_write function in drivers/tty/n_tty.c i… |
n/a |
n/a |
2014-05-07T10:00:00.000Z | 2025-10-22T00:05:37.666Z |
| cve-2014-1812 | N/A | The Group Policy implementation in Microsoft Wind… |
n/a |
n/a |
2014-05-14T10:00:00.000Z | 2025-10-22T00:05:37.525Z |
| cve-2014-2349 | 6.2 (v2.0) | Emerson DeltaV Use of Improper Authorization |
Emerson |
DeltaV |
2014-05-22T20:00:00 | 2025-10-31T22:56:34.809Z |
| cve-2014-2350 | 2.4 (v2.0) | Emerson DeltaV Use of Hard-coded Credentials |
Emerson |
DeltaV |
2014-05-22T20:00:00 | 2025-10-31T22:55:07.498Z |
| cve-2014-3153 | N/A | The futex_requeue function in kernel/futex.c in t… |
n/a |
n/a |
2014-06-07T14:00:00.000Z | 2025-10-22T00:05:37.360Z |
| cve-2013-3993 | N/A | IBM InfoSphere BigInsights before 2.1.0.3 allows … |
n/a |
n/a |
2014-07-07T10:00:00.000Z | 2025-10-22T00:05:37.213Z |
| cve-2014-3120 | N/A | The default configuration in Elasticsearch before… |
n/a |
n/a |
2014-07-28T19:00:00.000Z | 2025-10-22T00:05:37.084Z |
| cve-2014-0546 | N/A | Adobe Reader and Acrobat 10.x before 10.1.11 and … |
n/a |
n/a |
2014-08-12T21:00:00.000Z | 2025-10-22T00:05:36.951Z |
| cve-2014-2817 | N/A | Microsoft Internet Explorer 6 through 11 allows r… |
n/a |
n/a |
2014-08-12T21:00:00.000Z | 2025-10-22T00:05:36.812Z |
| cve-2014-2380 | 7.8 (v2.0) | Schneider Electric Wonderware Inadequate Encryption Strength |
Schneider Electric |
Wonderware Information Server Portal |
2014-08-28T01:00:00 | 2025-10-31T23:11:04.615Z |
| cve-2014-2381 | 2.1 (v2.0) | Schneider Electric Wonderware Inadequate Encryption Strength |
Schneider Electric |
Wonderware Information Server Portal |
2014-08-28T01:00:00 | 2025-10-31T23:19:54.894Z |
| cve-2014-5397 | 7.5 (v2.0) | Schneider Electric Wonderware Cross-site Scripting |
Schneider Electric |
Wonderware Information Server Portal |
2014-08-28T01:00:00 | 2025-10-31T23:14:04.849Z |
| cve-2014-5398 | 2.1 (v2.0) | Schneider Electric Wonderware Input Validation |
Schneider Electric |
Wonderware Information Server Portal |
2014-08-28T01:00:00 | 2025-10-31T23:16:04.348Z |
| cve-2014-5399 | 7.5 (v2.0) | Schneider Electric Wonderware SQL Injection |
Schneider Electric |
Wonderware Information Server Portal |
2014-08-28T01:00:00 | 2025-10-31T23:17:37.919Z |
| cve-2013-2597 | N/A | Stack-based buffer overflow in the acdb_ioctl fun… |
n/a |
n/a |
2014-08-31T10:00:00.000Z | 2025-10-22T00:05:36.666Z |
| cve-2014-5407 | 4.1 (v2.0) | Schneider Electric VAMPSET Stack-based Buffer Overflow |
Schneider Electric |
VAMPSET |
2014-09-15T14:00:00 | 2025-11-03T18:52:21.206Z |
| cve-2014-4404 | N/A | Heap-based buffer overflow in IOHIDFamily in Appl… |
n/a |
n/a |
2014-09-18T10:00:00.000Z | 2025-10-22T00:05:36.521Z |
| cve-2014-5411 | 4.9 (v2.0) | Schneider Electric SCADA Expert ClearSCADA Cross-site … |
Schneider Electric |
ClearSCADA |
2014-09-18T10:00:00 | 2025-11-04T22:53:17.900Z |
| cve-2014-5412 | 6.4 (v2.0) | Schneider Electric SCADA Expert ClearSCADA Improper Au… |
Schneider Electric |
ClearSCADA |
2014-09-18T10:00:00 | 2025-11-04T22:56:12.970Z |
| cve-2014-5413 | 6.4 (v2.0) | Schneider Electric SCADA Expert ClearSCADA Cryptograph… |
Schneider Electric |
ClearSCADA |
2014-09-18T10:00:00 | 2025-11-04T22:59:00.297Z |
| cve-2014-6271 | N/A | GNU Bash through 4.3 processes trailing strings a… |
n/a |
n/a |
2014-09-24T18:00:00.000Z | 2025-10-22T00:05:36.342Z |
| cve-2014-7169 | N/A | GNU Bash through 4.3 bash43-025 processes trailin… |
n/a |
n/a |
2014-09-25T01:00:00.000Z | 2025-10-22T00:05:36.027Z |
| cve-2014-6278 | N/A | GNU Bash through 4.3 bash43-026 does not properly… |
n/a |
n/a |
2014-09-30T10:00:00.000Z | 2025-10-22T00:05:35.846Z |
| cve-2014-5410 | 7.1 (v2.0) | Rockwell Automation Micrologix 1400 Improper Input Val… |
Rockwell Automation |
Allen-Bradley MicroLogix 1400 |
2014-10-03T18:00:00 | 2025-11-04T22:30:19.113Z |
| cve-2014-6287 | N/A | The findMacroMarker function in parserLib.pas in … |
n/a |
n/a |
2014-10-07T10:00:00.000Z | 2025-10-22T00:05:35.677Z |
| cve-2014-4113 | N/A | win32k.sys in the kernel-mode drivers in Microsof… |
n/a |
n/a |
2014-10-15T10:00:00.000Z | 2025-10-22T00:05:35.545Z |
| cve-2014-4114 | N/A | Microsoft Windows Vista SP2, Windows Server 2008 … |
n/a |
n/a |
2014-10-15T10:00:00.000Z | 2025-10-22T00:05:35.412Z |
| cve-2014-4123 | N/A | Microsoft Internet Explorer 7 through 11 allows r… |
n/a |
n/a |
2014-10-15T10:00:00.000Z | 2025-10-22T00:05:35.270Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2014-2120 | N/A | Cross-site scripting (XSS) vulnerability in the W… |
n/a |
n/a |
2014-03-19T01:00:00.000Z | 2025-10-22T00:05:38.543Z |
| cve-2014-1761 | N/A | Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and S… |
n/a |
n/a |
2014-03-24T19:00:00.000Z | 2025-10-22T00:05:38.376Z |
| cve-2014-0160 | N/A | The (1) TLS and (2) DTLS implementations in OpenS… |
n/a |
n/a |
2014-04-07T00:00:00.000Z | 2025-10-22T00:05:38.217Z |
| cve-2014-0780 | 7.5 (v2.0) | InduSoft Web Studio Path Traversal |
InduSoft |
Web Studio |
2014-04-25T01:00:00.000Z | 2025-10-22T00:05:38.084Z |
| cve-2014-1776 | N/A | Use-after-free vulnerability in Microsoft Interne… |
n/a |
n/a |
2014-04-27T10:00:00.000Z | 2025-10-22T00:05:37.934Z |
| cve-2014-0130 | N/A | Directory traversal vulnerability in actionpack/l… |
n/a |
n/a |
2014-05-07T10:00:00.000Z | 2025-10-22T00:05:37.800Z |
| cve-2014-0196 | N/A | The n_tty_write function in drivers/tty/n_tty.c i… |
n/a |
n/a |
2014-05-07T10:00:00.000Z | 2025-10-22T00:05:37.666Z |
| cve-2014-1812 | N/A | The Group Policy implementation in Microsoft Wind… |
n/a |
n/a |
2014-05-14T10:00:00.000Z | 2025-10-22T00:05:37.525Z |
| cve-2014-2349 | 6.2 (v2.0) | Emerson DeltaV Use of Improper Authorization |
Emerson |
DeltaV |
2014-05-22T20:00:00 | 2025-10-31T22:56:34.809Z |
| cve-2014-2350 | 2.4 (v2.0) | Emerson DeltaV Use of Hard-coded Credentials |
Emerson |
DeltaV |
2014-05-22T20:00:00 | 2025-10-31T22:55:07.498Z |
| cve-2014-3153 | N/A | The futex_requeue function in kernel/futex.c in t… |
n/a |
n/a |
2014-06-07T14:00:00.000Z | 2025-10-22T00:05:37.360Z |
| cve-2013-3993 | N/A | IBM InfoSphere BigInsights before 2.1.0.3 allows … |
n/a |
n/a |
2014-07-07T10:00:00.000Z | 2025-10-22T00:05:37.213Z |
| cve-2014-3120 | N/A | The default configuration in Elasticsearch before… |
n/a |
n/a |
2014-07-28T19:00:00.000Z | 2025-10-22T00:05:37.084Z |
| cve-2014-0546 | N/A | Adobe Reader and Acrobat 10.x before 10.1.11 and … |
n/a |
n/a |
2014-08-12T21:00:00.000Z | 2025-10-22T00:05:36.951Z |
| cve-2014-2817 | N/A | Microsoft Internet Explorer 6 through 11 allows r… |
n/a |
n/a |
2014-08-12T21:00:00.000Z | 2025-10-22T00:05:36.812Z |
| cve-2014-2380 | 7.8 (v2.0) | Schneider Electric Wonderware Inadequate Encryption Strength |
Schneider Electric |
Wonderware Information Server Portal |
2014-08-28T01:00:00 | 2025-10-31T23:11:04.615Z |
| cve-2014-2381 | 2.1 (v2.0) | Schneider Electric Wonderware Inadequate Encryption Strength |
Schneider Electric |
Wonderware Information Server Portal |
2014-08-28T01:00:00 | 2025-10-31T23:19:54.894Z |
| cve-2014-5397 | 7.5 (v2.0) | Schneider Electric Wonderware Cross-site Scripting |
Schneider Electric |
Wonderware Information Server Portal |
2014-08-28T01:00:00 | 2025-10-31T23:14:04.849Z |
| cve-2014-5398 | 2.1 (v2.0) | Schneider Electric Wonderware Input Validation |
Schneider Electric |
Wonderware Information Server Portal |
2014-08-28T01:00:00 | 2025-10-31T23:16:04.348Z |
| cve-2014-5399 | 7.5 (v2.0) | Schneider Electric Wonderware SQL Injection |
Schneider Electric |
Wonderware Information Server Portal |
2014-08-28T01:00:00 | 2025-10-31T23:17:37.919Z |
| cve-2013-2597 | N/A | Stack-based buffer overflow in the acdb_ioctl fun… |
n/a |
n/a |
2014-08-31T10:00:00.000Z | 2025-10-22T00:05:36.666Z |
| cve-2014-5407 | 4.1 (v2.0) | Schneider Electric VAMPSET Stack-based Buffer Overflow |
Schneider Electric |
VAMPSET |
2014-09-15T14:00:00 | 2025-11-03T18:52:21.206Z |
| cve-2014-4404 | N/A | Heap-based buffer overflow in IOHIDFamily in Appl… |
n/a |
n/a |
2014-09-18T10:00:00.000Z | 2025-10-22T00:05:36.521Z |
| cve-2014-5411 | 4.9 (v2.0) | Schneider Electric SCADA Expert ClearSCADA Cross-site … |
Schneider Electric |
ClearSCADA |
2014-09-18T10:00:00 | 2025-11-04T22:53:17.900Z |
| cve-2014-5412 | 6.4 (v2.0) | Schneider Electric SCADA Expert ClearSCADA Improper Au… |
Schneider Electric |
ClearSCADA |
2014-09-18T10:00:00 | 2025-11-04T22:56:12.970Z |
| cve-2014-5413 | 6.4 (v2.0) | Schneider Electric SCADA Expert ClearSCADA Cryptograph… |
Schneider Electric |
ClearSCADA |
2014-09-18T10:00:00 | 2025-11-04T22:59:00.297Z |
| cve-2014-6271 | N/A | GNU Bash through 4.3 processes trailing strings a… |
n/a |
n/a |
2014-09-24T18:00:00.000Z | 2025-10-22T00:05:36.342Z |
| cve-2014-7169 | N/A | GNU Bash through 4.3 bash43-025 processes trailin… |
n/a |
n/a |
2014-09-25T01:00:00.000Z | 2025-10-22T00:05:36.027Z |
| cve-2014-6278 | N/A | GNU Bash through 4.3 bash43-026 does not properly… |
n/a |
n/a |
2014-09-30T10:00:00.000Z | 2025-10-22T00:05:35.846Z |
| cve-2014-5410 | 7.1 (v2.0) | Rockwell Automation Micrologix 1400 Improper Input Val… |
Rockwell Automation |
Allen-Bradley MicroLogix 1400 |
2014-10-03T18:00:00 | 2025-11-04T22:30:19.113Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2024-1667 | Malicious code in @wdp-gov/lineage-component (npm) | 2024-06-26T12:41:06Z | 2024-07-02T00:27:31Z |
| mal-2024-1668 | Malicious code in @wdp-gov/catalog-serialization-engine (npm) | 2024-06-26T13:35:45Z | 2024-07-02T00:27:31Z |
| mal-2024-7783 | Malicious code in chromestatus-openapi (npm) | 2024-07-22T12:58:52Z | 2025-10-30T06:50:51Z |
| mal-2024-7828 | Malicious code in pkl-vscode (npm) | 2024-07-28T04:28:10Z | 2025-01-21T00:31:58Z |
| mal-2024-7829 | Malicious code in ml-keyframer (npm) | 2024-07-28T05:09:16Z | 2024-12-13T00:36:12Z |
| mal-2024-7830 | Malicious code in symphony-familiarity (npm) | 2024-07-28T05:49:05Z | 2025-01-21T00:31:58Z |
| mal-2024-7844 | Malicious code in lambda-sns-dynatrace-sdk (npm) | 2024-07-29T20:45:11Z | 2025-01-23T00:32:11Z |
| mal-2024-7895 | Malicious code in lit-3 (npm) | 2024-08-05T18:53:26Z | 2025-01-21T00:31:58Z |
| mal-2024-8051 | Malicious code in artifact-lab-3-package-3eef6c2c (PyPI) | 2024-08-28T08:10:54Z | 2024-12-09T14:39:22Z |
| mal-2024-8726 | Malicious code in invokehttp (PyPI) | 2024-08-29T08:52:37Z | 2024-12-09T14:39:23Z |
| mal-2024-8719 | Malicious code in muthu (npm) | 2024-09-03T06:46:48Z | 2024-12-09T14:39:22Z |
| mal-2024-8727 | Malicious code in esdjiw (npm) | 2024-09-03T15:27:54Z | 2024-12-09T14:39:21Z |
| mal-2024-8729 | Malicious code in nspwieo (npm) | 2024-09-03T15:27:54Z | 2024-12-09T14:39:22Z |
| mal-2024-8708 | Malicious code in @google-research/retvecjs (npm) | 2024-09-03T17:38:24Z | 2024-12-09T14:39:21Z |
| mal-2024-8725 | Malicious code in td-emerald-standards (npm) | 2024-09-04T05:23:28Z | 2024-12-09T14:39:22Z |
| mal-2024-8788 | Malicious code in nginerrer-web-shell (npm) | 2024-09-04T07:36:02Z | 2024-12-09T14:39:22Z |
| mal-2024-8750 | Malicious code in bss.bssadmin-fe (npm) | 2024-09-04T08:01:48Z | 2024-12-09T14:39:21Z |
| mal-2024-8764 | Malicious code in generator-toytool (npm) | 2024-09-04T08:01:49Z | 2024-12-09T14:39:22Z |
| mal-2024-8776 | Malicious code in intl.walmart.cca.webapp (npm) | 2024-09-04T08:01:49Z | 2024-12-09T14:39:22Z |
| mal-2024-8777 | Malicious code in json_body_phaser (npm) | 2024-09-04T08:53:25Z | 2024-12-09T14:39:22Z |
| mal-2024-8762 | Malicious code in falcor-restify-demo (npm) | 2024-09-04T08:55:59Z | 2024-12-09T14:39:21Z |
| mal-2024-8763 | Malicious code in fworit (npm) | 2024-09-04T09:08:28Z | 2024-12-09T14:39:22Z |
| mal-2024-8769 | Malicious code in gyowuie (npm) | 2024-09-04T09:08:28Z | 2024-12-09T14:39:22Z |
| mal-2024-8807 | Malicious code in uworut (npm) | 2024-09-04T09:08:28Z | 2024-12-09T14:39:22Z |
| mal-2024-8740 | Malicious code in asowieo (npm) | 2024-09-04T09:08:29Z | 2024-12-09T14:39:21Z |
| mal-2024-8751 | Malicious code in bwiueor (npm) | 2024-09-04T09:08:29Z | 2024-12-09T14:39:21Z |
| mal-2024-8778 | Malicious code in jsowuer (npm) | 2024-09-04T09:08:29Z | 2024-12-09T14:39:22Z |
| mal-2024-8780 | Malicious code in kliowir (npm) | 2024-09-04T09:08:29Z | 2024-12-09T14:39:22Z |
| mal-2024-8781 | Malicious code in lioejre (npm) | 2024-09-04T09:08:29Z | 2024-12-09T14:39:22Z |
| mal-2024-8786 | Malicious code in msldowr (npm) | 2024-09-04T09:08:29Z | 2024-12-09T14:39:22Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2187 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-01T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2195 | Oracle E-Business Suite: Schwachstelle ermöglicht Codeausführung | 2025-10-05T22:00:00.000+00:00 | 2025-10-21T22:00:00.000+00:00 |
| wid-sec-w-2025-2196 | Redis: Mehrere Schwachstellen | 2025-10-05T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2198 | MediaWiki: Mehrere Schwachstellen | 2025-10-05T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2202 | fetchmail: Schwachstelle ermöglicht Denial of Service | 2025-10-05T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2209 | HAProxy und HAProxy ALOHA: Schwachstelle ermöglicht Denial of Service | 2025-10-05T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2224 | Keycloak: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2227 | Golang Go: Mehrere Schwachstellen | 2025-10-07T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2228 | ESRI ArcGIS: Schwachstelle ermöglicht SQL injection | 2025-10-07T22:00:00.000+00:00 | 2025-10-22T22:00:00.000+00:00 |
| wid-sec-w-2025-2247 | Nvidia GPU Display Treiber: Mehrere Schwachstellen | 2025-10-08T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2272 | Moodle: Mehrere Schwachstellen | 2025-10-13T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2274 | Veeam Backup & Replication: Mehrere Schwachstellen | 2025-10-13T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2275 | Mozilla Firefox: Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2301 | Red Hat Enterprise Linux: Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2307 | Microsoft Windows: Mehrere Schwachstellen | 2025-10-14T22:00:00.000+00:00 | 2025-11-05T23:00:00.000+00:00 |
| wid-sec-w-2025-2311 | Red Hat Enterprise Linux (libsoup3): Schwachstelle ermöglicht Offenlegung von Informationen | 2025-10-15T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2317 | Ubiquiti UniFi: Schwachstelle ermöglicht Ausführung von Debug-Funktionen | 2025-10-15T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2322 | Samba: Mehrere Schwachstellen | 2025-10-15T22:00:00.000+00:00 | 2025-10-19T22:00:00.000+00:00 |
| wid-sec-w-2025-2334 | Squid: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen und Offenlegung von Informationen | 2025-10-16T22:00:00.000+00:00 | 2025-11-02T23:00:00.000+00:00 |
| wid-sec-w-2025-2339 | ImageMagick (BMP decoder): Schwachstelle ermöglicht Denial of Service | 2025-10-19T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2344 | Checkmk: Schwachstelle ermöglicht Cross-Site Scripting | 2025-10-20T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2365 | Oracle Java SE: Mehrere Schwachstellen | 2025-10-21T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2375 | Google Chrome: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2025-10-21T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2385 | Drupal Module: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2386 | Unbound: Schwachstelle ermöglicht Manipulation von Dateien | 2025-10-22T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2388 | MongoDB: Schwachstelle ermöglicht Privilegieneskalation | 2025-10-22T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2390 | PowerDNS Recursor: Mehrere Schwachstellen ermöglichen Manipulation von Dateien | 2025-10-22T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2391 | OpenBao: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2025-10-23T22:00:00.000+00:00 |
| wid-sec-w-2025-2392 | Internet Systems Consortium BIND: Mehrere Schwachstellen | 2025-10-22T22:00:00.000+00:00 | 2025-10-26T23:00:00.000+00:00 |
| wid-sec-w-2025-2395 | Rancher Manager: Mehrere Schwachstellen | 2025-10-23T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2008:0524 | Red Hat Security Advisory: Red Hat Network Satellite Server security update | 2008-06-30T15:33:00+00:00 | 2025-11-08T03:23:56+00:00 |
| rhsa-2008:0525 | Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update | 2008-06-30T15:36:00+00:00 | 2025-11-08T03:23:56+00:00 |
| rhsa-2008:0555 | Red Hat Security Advisory: java-1.4.2-ibm security update | 2008-07-14T13:08:00+00:00 | 2025-11-08T03:23:56+00:00 |
| rhsa-2008:0594 | Red Hat Security Advisory: java-1.6.0-sun security update | 2008-07-14T15:32:00+00:00 | 2025-11-08T03:23:57+00:00 |
| rhsa-2008:0595 | Red Hat Security Advisory: java-1.5.0-sun security update | 2008-07-14T15:37:00+00:00 | 2025-11-08T03:23:57+00:00 |
| rhsa-2008:0641 | Red Hat Security Advisory: acroread security update | 2008-07-21T13:44:00+00:00 | 2025-11-08T03:23:59+00:00 |
| rhsa-2008:0812 | Red Hat Security Advisory: RealPlayer security update | 2008-07-31T15:08:00+00:00 | 2025-11-08T03:23:59+00:00 |
| rhsa-2008:0790 | Red Hat Security Advisory: java-1.5.0-ibm security update | 2008-07-31T15:23:00+00:00 | 2025-11-08T03:23:59+00:00 |
| rhsa-2008:0629 | Red Hat Security Advisory: Red Hat Network Satellite Server Solaris client security update | 2008-08-13T14:16:00+00:00 | 2025-11-08T03:23:58+00:00 |
| rhsa-2008:0636 | Red Hat Security Advisory: Red Hat Network Satellite Server Sun Java Runtime security update | 2008-08-13T14:18:00+00:00 | 2025-11-08T03:24:02+00:00 |
| rhsa-2008:0638 | Red Hat Security Advisory: Red Hat Network Satellite Server IBM Java Runtime security update | 2008-08-13T14:19:00+00:00 | 2025-11-08T03:23:59+00:00 |
| rhsa-2008:0601 | Red Hat Security Advisory: adminutil security update | 2008-08-27T20:35:00+00:00 | 2025-11-08T03:23:58+00:00 |
| rhsa-2008:0602 | Red Hat Security Advisory: redhat-ds-base and redhat-ds-admin security and bug fix update | 2008-08-27T20:38:00+00:00 | 2025-11-08T03:24:02+00:00 |
| rhsa-2008:0596 | Red Hat Security Advisory: Red Hat Directory Server 7.1 Service Pack 7 security update | 2008-08-27T20:41:00+00:00 | 2025-11-08T03:23:57+00:00 |
| rhsa-2008:0858 | Red Hat Security Advisory: redhat-ds-base security and bug fix update | 2008-09-10T17:59:00+00:00 | 2025-11-08T03:24:02+00:00 |
| rhsa-2008:0891 | Red Hat Security Advisory: java-1.5.0-ibm security update | 2008-10-24T14:39:00+00:00 | 2025-11-08T03:24:00+00:00 |
| rhsa-2008:0906 | Red Hat Security Advisory: java-1.6.0-ibm security update | 2008-10-24T14:44:00+00:00 | 2025-11-08T03:24:00+00:00 |
| rhsa-2008:0945 | Red Hat Security Advisory: flash-plugin security update | 2008-10-28T14:29:00+00:00 | 2025-11-08T03:24:00+00:00 |
| rhsa-2008:0980 | Red Hat Security Advisory: flash-plugin security update | 2008-11-12T17:23:00+00:00 | 2025-11-08T03:24:02+00:00 |
| rhsa-2008:0974 | Red Hat Security Advisory: acroread security update | 2008-11-12T17:26:00+00:00 | 2025-11-08T03:24:02+00:00 |
| rhsa-2008:0955 | Red Hat Security Advisory: java-1.4.2-ibm security update | 2008-11-25T09:45:00+00:00 | 2025-11-08T03:24:01+00:00 |
| rhsa-2008:1018 | Red Hat Security Advisory: java-1.6.0-sun security update | 2008-12-04T15:45:00+00:00 | 2025-11-08T03:24:02+00:00 |
| rhsa-2008:1025 | Red Hat Security Advisory: java-1.5.0-sun security update | 2008-12-04T15:45:00+00:00 | 2025-11-08T03:24:02+00:00 |
| rhsa-2008:1047 | Red Hat Security Advisory: flash-plugin security update | 2008-12-19T17:52:00+00:00 | 2025-11-08T03:24:03+00:00 |
| rhsa-2009:0015 | Red Hat Security Advisory: java-1.6.0-ibm security update | 2009-01-13T21:33:00+00:00 | 2025-11-08T03:24:04+00:00 |
| rhsa-2009:0016 | Red Hat Security Advisory: java-1.5.0-ibm security update | 2009-01-13T21:39:00+00:00 | 2025-11-08T03:24:05+00:00 |
| rhsa-2009:0012 | Red Hat Security Advisory: netpbm security update | 2009-02-11T16:51:00+00:00 | 2025-11-08T03:24:04+00:00 |
| rhsa-2009:0332 | Red Hat Security Advisory: flash-plugin security update | 2009-02-25T23:56:00+00:00 | 2025-11-08T03:24:05+00:00 |
| rhsa-2009:0334 | Red Hat Security Advisory: flash-plugin security update | 2009-02-25T23:57:00+00:00 | 2025-11-08T03:24:05+00:00 |
| rhsa-2009:0376 | Red Hat Security Advisory: acroread security update | 2009-03-25T13:48:00+00:00 | 2025-11-08T03:24:06+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2015-7511 | Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations. | 2016-04-02T00:00:00.000Z | 2025-09-04T00:25:12.000Z |
| msrc_cve-2015-8863 | Off-by-one error in the tokenadd function in jv_parse.c in jq allows remote attackers to cause a denial of service (crash) via a long JSON-encoded number which triggers a heap-based buffer overflow. | 2016-05-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2016-3959 | The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries. | 2016-05-02T00:00:00.000Z | 2025-09-03T21:31:16.000Z |
| msrc_cve-2016-4074 | The jv_dump_term function in jq 1.5 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted JSON file. This issue has been fixed in jq 1.6_rc1-r0. | 2016-05-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2016-3189 | Use-after-free vulnerability in bzip2recover in bzip2 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted bzip2 file related to block ends set to before the start of the block. | 2016-06-02T00:00:00.000Z | 2020-08-18T00:00:00.000Z |
| msrc_cve-2016-3697 | libcontainer/user/user.go in runC before 0.1.0 as used in Docker before 1.11.2 improperly treats a numeric UID as a potential username which allows local users to gain privileges via a numeric username in the password file in a container. | 2016-06-02T00:00:00.000Z | 2021-07-16T00:00:00.000Z |
| msrc_cve-2015-5738 | The RSA-CRT implementation in the Cavium Software Development Kit (SDK) 2.x when used on OCTEON II CN6xxx Hardware on Linux to support TLS with Perfect Forward Secrecy (PFS) makes it easier for remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack. | 2016-07-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2016-5386 | The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. | 2016-07-02T00:00:00.000Z | 2025-09-03T23:29:37.000Z |
| msrc_cve-2016-7161 | Heap-based buffer overflow in the .receive callback of xlnx.xps-ethernetlite in QEMU (aka Quick Emulator) allows attackers to execute arbitrary code on the QEMU host via a large ethlite packet. | 2016-10-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2016-9296 | A null pointer dereference bug affects the 16.02 and many old versions of p7zip. A lack of null pointer check for the variable folders.PackPositions in function CInArchive::ReadAndDecodePackedStreams in CPP/7zip/Archive/7z/7zIn.cpp as used in the 7z.so library and in 7z applications will cause a crash and a denial of service when decoding malformed 7z files. | 2016-11-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2016-6664 | mysqld_safe in Oracle MySQL through 5.5.51 5.6.x through 5.6.32 and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2 5.6.x before 5.6.32-78-1 and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0 5.6.x before 5.6.32-25.17 and 5.7.x before 5.7.14-26.17 when using file-based logging allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files. | 2016-12-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2016-9179 | It was found that Lynx doesn't parse the authority component of the URL correctly | 2016-12-02T00:00:00.000Z | 2025-09-03T19:35:59.000Z |
| msrc_cve-2014-9913 | Buffer overflow in the list_files function in list.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via vectors related to the compression method. | 2017-01-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2016-10087 | The libpng 0.71 allows context-dependent attackers to cause a NULL pointer dereference vectors | 2017-01-02T00:00:00.000Z | 2025-03-14T00:00:00.000Z |
| msrc_cve-2016-7567 | Buffer overflow in the SLPFoldWhiteSpace function in common/slp_compare.c in OpenSLP 2.0 allows remote attackers to have unspecified impact via a crafted string. | 2017-01-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2016-7798 | The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key which makes it easier for context-dependent attackers to bypass the encryption protection mechanism. | 2017-01-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2016-9795 | The casrvc program in CA Common Services as used in CA Client Automation 12.8 12.9 and 14.0; CA SystemEDGE 5.8.2 and 5.9; CA Systems Performance for Infrastructure Managers 12.8 and 12.9; CA Universal Job Management Agent 11.2; CA Virtual Assurance for Infrastructure Managers 12.8 and 12.9; CA Workload Automation AE 11 11.3 11.3.5 and 11.3.6 on AIX HP-UX Linux and Solaris allows local users to modify arbitrary files and consequently gain root privileges via vectors related to insufficient validation. | 2017-01-02T00:00:00.000Z | 2023-03-10T00:00:00.000Z |
| msrc_cve-2016-9844 | Buffer overflow in the zi_short function in zipinfo.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via a large compression method value in the central directory file header. | 2017-01-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2016-2568 | pkexec, when used with --user nonpriv, allows local users to escape to the parent session | 2017-02-02T00:00:00.000Z | 2025-10-01T23:10:54.000Z |
| msrc_cve-2016-2781 | chroot in GNU coreutils when used with --userspec allows local users to escape to the parent session via a crafted TIOCSTI ioctl call which pushes characters to the terminal's input buffer. | 2017-02-02T00:00:00.000Z | 2025-06-13T00:00:00.000Z |
| msrc_cve-2016-6210 | sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password hashing, uses BLOWFISH hashing on a static password when the username does not exist, which allows remote attackers to enumerate users by leveraging the timing difference between responses when a large password is provided. | 2017-02-02T00:00:00.000Z | 2025-09-04T00:05:57.000Z |
| msrc_cve-2016-8681 | The _dwarf_get_abbrev_for_code function in dwarf_util.c in libdwarf 20161001 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) by calling the dwarfdump command on a crafted file. | 2017-02-02T00:00:00.000Z | 2025-09-03T20:19:35.000Z |
| msrc_cve-2015-4645 | Integer overflow in the read_fragment_table_4 function in unsquash-4.c in Squashfs and sasquatch allows remote attackers to cause a denial of service (application crash) via a crafted input which triggers a stack-based buffer overflow. | 2017-03-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2016-4912 | The _xrealloc function in xlsp_xmalloc.c in OpenSLP 2.0.0 allows remote attackers to cause a denial of service | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:54.000Z |
| msrc_cve-2017-5834 | The parse_dict_node function in bplist.c in libplist allows attackers to cause a denial of service | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:56.000Z |
| msrc_cve-2017-5835 | libplist allows attackers to cause a denial of service (large memory allocation and crash) via vectors involving an offset size of zero. | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:56.000Z |
| msrc_cve-2017-5836 | The plist_free_data function libplist allows attackers to cause a denial of service | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:56.000Z |
| msrc_cve-2017-5931 | Integer overflow in hw/virtio/virtio-crypto.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code on the host via a crafted virtio-crypto request which triggers a heap-based buffer overflow. | 2017-03-02T00:00:00.000Z | 2020-09-25T00:00:00.000Z |
| msrc_cve-2017-5974 | Heap-based buffer overflow in the __zzip_get32 function in fetch.c in zziplib 0.13.62, 0.13.61, 0.13.60, 0.13.59, 0.13.58, 0.13.57, 0.13.56 allows remote attackers to cause a denial of service (crash) via a crafted ZIP file. | 2017-03-02T00:00:00.000Z | 2025-05-15T00:00:00.000Z |
| msrc_cve-2017-6827 | Heap-based buffer overflow in audiofile allows remote attackers to have unspecified impact via a crafted audio file | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:56.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2006-000626 | dotProject cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000627 | Phorum cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000628 | Wiki clone products vulnerable to denial of service attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000629 | Wiki clone products vulnerable to denial of service attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000630 | Wiki clone products vulnerable to denial of service attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000631 | ACollab SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000632 | ATutor cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000633 | ServerView cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000634 | ServerView directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000635 | Geeklog cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000636 | Loudblog cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000637 | QwikiWiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000638 | Dokeos cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000640 | Drupal cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000641 | Kiri directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000642 | 04WebServer cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000643 | 04WebServer directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000644 | NetCommons cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000646 | Owl SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000647 | Owl cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000648 | mail f/w system vulnerable to allow unauthorized email transmissionk | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000649 | Cybozu Office 6 information disclosure vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000650 | Cybozu products vulnerable to directory traversal | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000651 | Cybozu products vulnerable to directory traversal | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000652 | MDPro cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000653 | Movable Type vulnerabile to cross-site scripting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000654 | SugarCRM cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000665 | TeraStation HD-HTGL series cross-site request forgery vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000695 | Kmail CGI authentication bypass vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000734 | Ichitaro buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|