Recent vulnerabilities
| ID | Description | Published | Updated |
|---|---|---|---|
| ghsa-9hgh-v7v7-5f66 | In autofile Audio File Library 0.3.6, there exists one memory leak vulnerability in printfileinfo, … | 2022-02-25T00:01:05Z | 2025-11-03T21:30:38Z |
| ghsa-8x27-645q-g2rv | WatchGuard Firebox and XTM appliances allow a remote attacker with unprivileged credentials to acce… | 2022-02-25T00:01:06Z | 2025-10-22T00:32:30Z |
| ghsa-grqq-3jqg-g95p | Existing CommBuffer checks in SmmEntryPoint will not catch underflow when computing BufferSize. | 2022-03-04T00:00:16Z | 2025-11-03T21:30:38Z |
| ghsa-5xgr-wq7f-67xj | A buffer overflow vulnerability exists in FRRouting through 8.1.0 due to missing a check on the inp… | 2022-03-04T00:00:17Z | 2025-11-04T18:30:38Z |
| ghsa-6w5w-27h7-6r2x | A buffer overflow vulnerability exists in FRRouting through 8.1.0 due to a wrong check on the input… | 2022-03-04T00:00:17Z | 2025-11-04T18:30:38Z |
| ghsa-54p4-8qjr-jvgc | Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the subtlv … | 2022-03-04T00:00:18Z | 2025-11-04T18:30:38Z |
| ghsa-9hg8-8wq3-mhhg | Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to wrong checks on the input p… | 2022-03-04T00:00:18Z | 2025-11-04T18:30:38Z |
| ghsa-fjww-grc5-6wh6 | An Arm product family through 2022-01-03 has an Exposed Dangerous Method or Function. | 2022-03-04T00:00:18Z | 2025-10-22T00:32:30Z |
| ghsa-mv8p-w8jf-x9q9 | Buffer overflow vulnerabilities exist in FRRouting through 8.1.0 due to the use of strdup with a no… | 2022-03-04T00:00:18Z | 2025-11-04T18:30:38Z |
| ghsa-839c-8x38-qf59 | bluetoothd from bluez incorrectly saves adapters' Discoverable status when a device is powered down… | 2022-03-04T00:00:22Z | 2025-11-04T18:30:38Z |
| ghsa-j3vw-4g3g-wvjc | A heap-based buffer overflow was found in openjpeg in color.c:379:42 in sycc420_to_rgb when decompr… | 2022-03-05T00:00:43Z | 2025-11-03T21:30:38Z |
| ghsa-vvw7-v96v-gmxr | On WatchGuard Firebox and XTM appliances, an unauthenticated user can execute arbitrary code, aka F… | 2022-03-05T00:00:43Z | 2025-10-22T00:32:30Z |
| ghsa-jvfv-hrrc-6q72 | Improper Restriction of XML External Entity Reference in Liquibase | 2022-03-05T00:00:45Z | 2025-11-03T22:28:08Z |
| ghsa-3p6x-mw8p-qjh9 | An authenticated user can create a link with reflected Javascript code inside it for items’ page … | 2022-03-10T00:00:29Z | 2025-11-04T00:30:31Z |
| ghsa-vv83-2f3m-pvxg | An authenticated user can create a link with reflected XSS payload for actions’ pages, and send i… | 2022-03-10T00:00:29Z | 2025-11-04T00:30:31Z |
| ghsa-87fp-835h-vrgc | An authenticated user can create a link with reflected Javascript code inside it for services’ pa… | 2022-03-10T00:00:30Z | 2025-11-04T00:30:31Z |
| ghsa-cf7c-p4p5-gq5x | An authenticated user can create a link with reflected Javascript code inside it for graphs’ page… | 2022-03-10T00:00:30Z | 2025-11-04T00:30:31Z |
| ghsa-xh7f-2c8g-37p4 | The TP-240 (aka tp240dvr) component in Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Expre… | 2022-03-11T00:02:03Z | 2025-10-22T00:32:30Z |
| ghsa-g2fr-rq52-c2h3 | A heap overflow vulnerability was found in bluez in versions prior to 5.63. An attacker with local … | 2022-03-11T00:02:25Z | 2025-11-04T18:30:38Z |
| ghsa-wj55-vqcq-gxcp | There's a flaw in urllib's AbstractBasicAuthHandler class. An attacker who controls a malicious HTT… | 2022-03-11T00:02:31Z | 2025-11-04T00:30:31Z |
| ghsa-2h5q-vphx-mcwx | A vulnerability was discovered in the 389 Directory Server that allows an unauthenticated attacker … | 2022-03-17T00:00:25Z | 2025-11-03T21:30:38Z |
| ghsa-mx45-vcw4-89j8 | In kbase_jd_user_buf_pin_pages of mali_kbase_mem.c, there is a possible out of bounds write due to … | 2022-03-17T00:00:36Z | 2025-10-22T00:32:30Z |
| ghsa-2vw2-587w-g9v6 | Improper limitation of path names in Veeam Backup & Replication 9.5U3, 9.5U4,10.x, and 11.x allows … | 2022-03-18T00:01:08Z | 2025-10-22T00:32:30Z |
| ghsa-vhpf-rh57-x3v9 | Veeam Backup & Replication 10.x and 11.x has Incorrect Access Control (issue 1 of 2). | 2022-03-18T00:01:08Z | 2025-10-22T00:32:30Z |
| ghsa-2886-x646-53fj | A use after free issue was addressed with improved memory management. This issue is fixed in macOS … | 2022-03-19T00:00:54Z | 2025-10-22T00:32:30Z |
| ghsa-g28r-w65r-h89m | OpenVPN 2.1 until v2.4.12 and v2.5.6 may enable authentication bypass in external authentication pl… | 2022-03-19T00:00:57Z | 2025-11-03T21:30:38Z |
| ghsa-p75p-vc6x-p9wf | A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS … | 2022-03-19T00:00:57Z | 2025-10-22T00:32:30Z |
| ghsa-w87j-439w-p9f3 | A vulnerability was found in the 389 Directory Server that allows expired passwords to access the d… | 2022-03-24T00:00:16Z | 2025-11-03T21:30:38Z |
| ghsa-cgwh-hfr7-38m2 | A Denial of Service vulnerability exists in mbed TLS 3.0.0 and earlier in the mbedtls_pkcs12_deriva… | 2022-03-25T00:00:32Z | 2025-11-03T21:30:38Z |
| ghsa-9gcv-6rm7-vw3w | An authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to … | 2022-03-26T00:00:32Z | 2025-10-22T00:32:30Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2014-4148 | N/A | win32k.sys in the kernel-mode drivers in Microsof… |
n/a |
n/a |
2014-10-15T10:00:00.000Z | 2025-10-22T00:05:35.135Z |
| cve-2014-6352 | N/A | Microsoft Windows Vista SP2, Windows Server 2008 … |
n/a |
n/a |
2014-10-22T14:00:00.000Z | 2025-10-22T00:05:34.995Z |
| cve-2014-5408 | 7.5 (v2.0) | Nordex NC2 Cross-site Scripting |
Nordex |
Nordex Control 2 (NC2) SCADA |
2014-11-05T11:00:00 | 2025-11-03T18:50:14.150Z |
| cve-2014-5417 | 7.5 (v2.0) | Meinberg Radio Clocks LANTIME M-Series |
Meinberg Radio Clocks |
LANTIME M-Series |
2014-11-05T11:00:00 | 2025-11-04T23:19:36.651Z |
| cve-2014-4077 | N/A | Microsoft Windows Server 2003 SP2, Windows Vista … |
n/a |
n/a |
2014-11-11T22:00:00.000Z | 2025-10-22T00:05:34.855Z |
| cve-2014-6332 | N/A | OleAut32.dll in OLE in Microsoft Windows Server 2… |
n/a |
n/a |
2014-11-11T22:00:00.000Z | 2025-10-22T00:05:34.718Z |
| cve-2014-6324 | N/A | The Kerberos Key Distribution Center (KDC) in Mic… |
n/a |
n/a |
2014-11-18T23:00:00.000Z | 2025-10-22T00:05:34.565Z |
| cve-2014-8439 | N/A | Adobe Flash Player before 13.0.0.258 and 14.x and… |
n/a |
n/a |
2014-11-25T23:00:00.000Z | 2025-10-22T00:05:34.383Z |
| cve-2014-9163 | N/A | Stack-based buffer overflow in Adobe Flash Player… |
n/a |
n/a |
2014-12-10T21:00:00.000Z | 2025-10-22T00:05:34.235Z |
| cve-2014-100005 | N/A | Multiple cross-site request forgery (CSRF) vulner… |
n/a |
n/a |
2015-01-13T11:00:00.000Z | 2025-10-22T00:05:34.069Z |
| cve-2015-0016 | N/A | Directory traversal vulnerability in the TS WebPr… |
n/a |
n/a |
2015-01-13T22:00:00.000Z | 2025-10-22T00:05:33.942Z |
| cve-2014-5418 | 5 (v2.0) | GE Multilink Uncontrolled Resource Consumption |
GE |
Multilink ML800/1200/1600/2400 |
2015-01-17T02:00:00 | 2025-11-04T23:30:32.557Z |
| cve-2014-5419 | 10 (v2.0) | GE Multilink Use of Hard-coded Cryptographic Key |
GE |
Multilink ML800/1200/1600/2400 |
2015-01-17T02:00:00 | 2025-11-04T23:32:07.026Z |
| cve-2015-0310 | N/A | Adobe Flash Player before 13.0.0.262 and 14.x thr… |
n/a |
n/a |
2015-01-23T21:00:00.000Z | 2025-10-22T00:05:33.820Z |
| cve-2015-0311 | N/A | Unspecified vulnerability in Adobe Flash Player t… |
n/a |
n/a |
2015-01-23T21:00:00.000Z | 2025-10-22T00:05:33.672Z |
| cve-2015-0313 | N/A | Use-after-free vulnerability in Adobe Flash Playe… |
n/a |
n/a |
2015-02-02T19:00:00.000Z | 2025-10-22T00:05:33.535Z |
| cve-2015-0071 | N/A | Microsoft Internet Explorer 9 through 11 allows r… |
n/a |
n/a |
2015-02-11T02:00:00.000Z | 2025-10-22T00:05:33.391Z |
| cve-2015-1427 | N/A | The Groovy scripting engine in Elasticsearch befo… |
n/a |
n/a |
2015-02-17T15:00:00.000Z | 2025-10-22T00:05:33.236Z |
| cve-2015-2051 | N/A | The D-Link DIR-645 Wired/Wireless Router Rev. Ax … |
n/a |
n/a |
2015-02-23T17:00:00.000Z | 2025-10-22T00:05:33.088Z |
| cve-2014-5409 | 6.4 (v2.0) | GE Hydran M2 Predictable Value Range from Previous Values |
GE |
Hydran M2, containing the 17046 Ethernet option |
2015-03-14T01:00:00 | 2025-11-03T18:58:26.900Z |
| cve-2014-5400 | 6.8 (v2.0) | Hospira MedNet Password in Configuration File |
Hospira |
MedNet |
2015-04-03T10:00:00 | 2025-11-03T18:26:56.284Z |
| cve-2014-5403 | 6.8 (v2.0) | Hospira MedNet Use of Hard-coded Cryptographic Key |
Hospira |
MedNet |
2015-04-03T10:00:00 | 2025-11-03T18:22:39.434Z |
| cve-2014-5405 | 9 (v2.0) | Hospira MedNet Use of Hard-coded Password |
Hospira |
MedNet |
2015-04-03T10:00:00 | 2025-11-03T18:25:50.764Z |
| cve-2015-0666 | N/A | Directory traversal vulnerability in the fmserver… |
n/a |
n/a |
2015-04-03T10:00:00.000Z | 2025-10-22T00:05:32.918Z |
| cve-2015-1130 | N/A | The XPC implementation in Admin Framework in Appl… |
n/a |
n/a |
2015-04-10T14:00:00.000Z | 2025-10-22T00:05:32.768Z |
| cve-2015-1635 | N/A | HTTP.sys in Microsoft Windows 7 SP1, Windows Serv… |
n/a |
n/a |
2015-04-14T20:00:00.000Z | 2025-10-22T00:05:32.590Z |
| cve-2015-1641 | N/A | Microsoft Word 2007 SP3, Office 2010 SP2, Word 20… |
n/a |
n/a |
2015-04-14T20:00:00.000Z | 2025-10-21T23:56:03.725Z |
| cve-2015-3043 | N/A | Adobe Flash Player before 13.0.0.281 and 14.x thr… |
n/a |
n/a |
2015-04-14T22:00:00.000Z | 2025-10-21T23:56:03.325Z |
| cve-2015-1318 | N/A | The crash reporting feature in Apport 2.13 throug… |
n/a |
n/a |
2015-04-17T17:00:00.000Z | 2025-11-03T19:25:15.372Z |
| cve-2015-3035 | N/A | Directory traversal vulnerability in TP-LINK Arch… |
n/a |
n/a |
2015-04-17T18:00:00.000Z | 2025-10-21T23:56:02.932Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| cve-2014-6287 | N/A | The findMacroMarker function in parserLib.pas in … |
n/a |
n/a |
2014-10-07T10:00:00.000Z | 2025-10-22T00:05:35.677Z |
| cve-2014-4113 | N/A | win32k.sys in the kernel-mode drivers in Microsof… |
n/a |
n/a |
2014-10-15T10:00:00.000Z | 2025-10-22T00:05:35.545Z |
| cve-2014-4114 | N/A | Microsoft Windows Vista SP2, Windows Server 2008 … |
n/a |
n/a |
2014-10-15T10:00:00.000Z | 2025-10-22T00:05:35.412Z |
| cve-2014-4123 | N/A | Microsoft Internet Explorer 7 through 11 allows r… |
n/a |
n/a |
2014-10-15T10:00:00.000Z | 2025-10-22T00:05:35.270Z |
| cve-2014-4148 | N/A | win32k.sys in the kernel-mode drivers in Microsof… |
n/a |
n/a |
2014-10-15T10:00:00.000Z | 2025-10-22T00:05:35.135Z |
| cve-2014-6352 | N/A | Microsoft Windows Vista SP2, Windows Server 2008 … |
n/a |
n/a |
2014-10-22T14:00:00.000Z | 2025-10-22T00:05:34.995Z |
| cve-2014-5408 | 7.5 (v2.0) | Nordex NC2 Cross-site Scripting |
Nordex |
Nordex Control 2 (NC2) SCADA |
2014-11-05T11:00:00 | 2025-11-03T18:50:14.150Z |
| cve-2014-5417 | 7.5 (v2.0) | Meinberg Radio Clocks LANTIME M-Series |
Meinberg Radio Clocks |
LANTIME M-Series |
2014-11-05T11:00:00 | 2025-11-04T23:19:36.651Z |
| cve-2014-4077 | N/A | Microsoft Windows Server 2003 SP2, Windows Vista … |
n/a |
n/a |
2014-11-11T22:00:00.000Z | 2025-10-22T00:05:34.855Z |
| cve-2014-6332 | N/A | OleAut32.dll in OLE in Microsoft Windows Server 2… |
n/a |
n/a |
2014-11-11T22:00:00.000Z | 2025-10-22T00:05:34.718Z |
| cve-2014-6324 | N/A | The Kerberos Key Distribution Center (KDC) in Mic… |
n/a |
n/a |
2014-11-18T23:00:00.000Z | 2025-10-22T00:05:34.565Z |
| cve-2014-8439 | N/A | Adobe Flash Player before 13.0.0.258 and 14.x and… |
n/a |
n/a |
2014-11-25T23:00:00.000Z | 2025-10-22T00:05:34.383Z |
| cve-2014-9163 | N/A | Stack-based buffer overflow in Adobe Flash Player… |
n/a |
n/a |
2014-12-10T21:00:00.000Z | 2025-10-22T00:05:34.235Z |
| cve-2014-100005 | N/A | Multiple cross-site request forgery (CSRF) vulner… |
n/a |
n/a |
2015-01-13T11:00:00.000Z | 2025-10-22T00:05:34.069Z |
| cve-2015-0016 | N/A | Directory traversal vulnerability in the TS WebPr… |
n/a |
n/a |
2015-01-13T22:00:00.000Z | 2025-10-22T00:05:33.942Z |
| cve-2014-5418 | 5 (v2.0) | GE Multilink Uncontrolled Resource Consumption |
GE |
Multilink ML800/1200/1600/2400 |
2015-01-17T02:00:00 | 2025-11-04T23:30:32.557Z |
| cve-2014-5419 | 10 (v2.0) | GE Multilink Use of Hard-coded Cryptographic Key |
GE |
Multilink ML800/1200/1600/2400 |
2015-01-17T02:00:00 | 2025-11-04T23:32:07.026Z |
| cve-2015-0310 | N/A | Adobe Flash Player before 13.0.0.262 and 14.x thr… |
n/a |
n/a |
2015-01-23T21:00:00.000Z | 2025-10-22T00:05:33.820Z |
| cve-2015-0311 | N/A | Unspecified vulnerability in Adobe Flash Player t… |
n/a |
n/a |
2015-01-23T21:00:00.000Z | 2025-10-22T00:05:33.672Z |
| cve-2015-0313 | N/A | Use-after-free vulnerability in Adobe Flash Playe… |
n/a |
n/a |
2015-02-02T19:00:00.000Z | 2025-10-22T00:05:33.535Z |
| cve-2015-0071 | N/A | Microsoft Internet Explorer 9 through 11 allows r… |
n/a |
n/a |
2015-02-11T02:00:00.000Z | 2025-10-22T00:05:33.391Z |
| cve-2015-1427 | N/A | The Groovy scripting engine in Elasticsearch befo… |
n/a |
n/a |
2015-02-17T15:00:00.000Z | 2025-10-22T00:05:33.236Z |
| cve-2015-2051 | N/A | The D-Link DIR-645 Wired/Wireless Router Rev. Ax … |
n/a |
n/a |
2015-02-23T17:00:00.000Z | 2025-10-22T00:05:33.088Z |
| cve-2014-5409 | 6.4 (v2.0) | GE Hydran M2 Predictable Value Range from Previous Values |
GE |
Hydran M2, containing the 17046 Ethernet option |
2015-03-14T01:00:00 | 2025-11-03T18:58:26.900Z |
| cve-2014-5400 | 6.8 (v2.0) | Hospira MedNet Password in Configuration File |
Hospira |
MedNet |
2015-04-03T10:00:00 | 2025-11-03T18:26:56.284Z |
| cve-2014-5403 | 6.8 (v2.0) | Hospira MedNet Use of Hard-coded Cryptographic Key |
Hospira |
MedNet |
2015-04-03T10:00:00 | 2025-11-03T18:22:39.434Z |
| cve-2014-5405 | 9 (v2.0) | Hospira MedNet Use of Hard-coded Password |
Hospira |
MedNet |
2015-04-03T10:00:00 | 2025-11-03T18:25:50.764Z |
| cve-2015-0666 | N/A | Directory traversal vulnerability in the fmserver… |
n/a |
n/a |
2015-04-03T10:00:00.000Z | 2025-10-22T00:05:32.918Z |
| cve-2015-1130 | N/A | The XPC implementation in Admin Framework in Appl… |
n/a |
n/a |
2015-04-10T14:00:00.000Z | 2025-10-22T00:05:32.768Z |
| cve-2015-1635 | N/A | HTTP.sys in Microsoft Windows 7 SP1, Windows Serv… |
n/a |
n/a |
2015-04-14T20:00:00.000Z | 2025-10-22T00:05:32.590Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2024-8802 | Malicious code in swoeirt (npm) | 2024-09-04T09:08:29Z | 2024-12-09T14:39:22Z |
| mal-2024-8804 | Malicious code in towueir (npm) | 2024-09-04T09:08:29Z | 2024-12-09T14:39:22Z |
| mal-2024-8814 | Malicious code in yieoure (npm) | 2024-09-04T09:08:29Z | 2024-12-09T14:39:22Z |
| mal-2024-8816 | Malicious code in ywpeirt (npm) | 2024-09-04T09:08:29Z | 2024-12-09T14:39:22Z |
| mal-2024-8817 | Malicious code in zuwoirt (npm) | 2024-09-04T09:08:29Z | 2024-12-09T14:39:22Z |
| mal-2024-8739 | Malicious code in anieort (npm) | 2024-09-04T09:08:30Z | 2024-12-09T14:39:21Z |
| mal-2024-8759 | Malicious code in dwieuor (npm) | 2024-09-04T09:08:30Z | 2024-12-09T14:39:21Z |
| mal-2024-8768 | Malicious code in gswoer (npm) | 2024-09-04T09:08:30Z | 2024-12-09T14:39:22Z |
| mal-2024-8772 | Malicious code in hwieuor (npm) | 2024-09-04T09:08:30Z | 2024-12-09T14:39:22Z |
| mal-2024-8774 | Malicious code in hwpoepr (npm) | 2024-09-04T09:08:30Z | 2024-12-09T14:39:22Z |
| mal-2024-8775 | Malicious code in hwueoir (npm) | 2024-09-04T09:08:30Z | 2024-12-09T14:39:22Z |
| mal-2024-8783 | Malicious code in lowieore (npm) | 2024-09-04T09:08:30Z | 2024-12-09T14:39:22Z |
| mal-2024-8801 | Malicious code in swioeur (npm) | 2024-09-04T09:08:30Z | 2024-12-09T14:39:22Z |
| mal-2024-8808 | Malicious code in vueoriu (npm) | 2024-09-04T09:08:30Z | 2024-12-09T14:39:22Z |
| mal-2024-8811 | Malicious code in xiwoeir (npm) | 2024-09-04T09:08:30Z | 2024-12-09T14:39:22Z |
| mal-2024-8799 | Malicious code in rbds-frill-auth0-integration (npm) | 2024-09-04T09:23:46Z | 2024-12-09T14:39:22Z |
| mal-2024-8800 | Malicious code in saptiya (npm) | 2024-09-04T09:23:46Z | 2024-12-09T14:39:22Z |
| mal-2024-8757 | Malicious code in dither-client (npm) | 2024-09-04T09:25:41Z | 2024-12-09T14:39:21Z |
| mal-2024-8809 | Malicious code in walletv5 (npm) | 2024-09-04T09:25:41Z | 2024-12-09T14:39:22Z |
| mal-2024-8731 | Malicious code in @ep-mobile/icons (npm) | 2024-09-04T10:15:48Z | 2024-12-09T14:39:21Z |
| mal-2024-8732 | Malicious code in @desesap289/dev_dependency (npm) | 2024-09-04T11:32:35Z | 2024-12-09T14:39:21Z |
| mal-2024-8827 | Malicious code in tcgplayer-developer (npm) | 2024-09-05T01:45:19Z | 2024-12-09T14:39:22Z |
| mal-2024-8820 | Malicious code in testcafe-reporter-ayx-reportportal (npm) | 2024-09-05T19:50:35Z | 2024-12-09T14:39:22Z |
| mal-2024-8831 | Malicious code in indrive-web (npm) | 2024-09-06T01:32:50Z | 2024-12-09T14:39:22Z |
| mal-2024-8832 | Malicious code in tappp-tv-ui-libs (npm) | 2024-09-06T01:34:23Z | 2024-12-09T14:39:22Z |
| mal-2024-8859 | Malicious code in beautiful-text (npm) | 2024-09-10T23:32:26Z | 2024-12-09T14:39:21Z |
| mal-2024-8872 | Malicious code in quickread (npm) | 2024-09-11T23:23:14Z | 2024-12-09T14:39:22Z |
| mal-2024-8877 | Malicious code in afe-host-client (npm) | 2024-09-16T14:37:29Z | 2024-12-09T14:39:21Z |
| mal-2024-8908 | Malicious code in ttuiooty (npm) | 2024-09-18T23:39:38Z | 2024-12-09T14:39:22Z |
| mal-2024-9944 | Malicious code in asciidrawing (PyPI) | 2024-09-20T10:55:48Z | 2025-02-10T05:36:19Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2025-2395 | Rancher Manager: Mehrere Schwachstellen | 2025-10-23T22:00:00.000+00:00 | 2025-10-29T23:00:00.000+00:00 |
| wid-sec-w-2025-2398 | Moxa Switch: Mehrere Schwachstellen | 2025-10-23T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2403 | Ubiquiti UniFi: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2025-10-23T22:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2407 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-26T23:00:00.000+00:00 | 2025-10-27T23:00:00.000+00:00 |
| wid-sec-w-2025-2416 | Proxmox Backup Server: Mehrere Schwachstellen | 2025-10-26T23:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2420 | Apache Tomcat: Mehrere Schwachstellen | 2025-10-27T23:00:00.000+00:00 | 2025-10-28T23:00:00.000+00:00 |
| wid-sec-w-2025-2427 | strongSwan (eap-mschapv2 plugin): Schwachstelle ermöglicht Codeausführung und DoS | 2025-10-27T23:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2436 | Xwayland und X.Org X11: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2025-10-28T23:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2441 | Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service | 2025-10-29T23:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2444 | Dell Secure Connect Gateway: Mehrere Schwachstellen | 2025-10-29T23:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2445 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2025-10-29T23:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2450 | Linux Kernel: Mehrere Schwachstellen | 2025-10-29T23:00:00.000+00:00 | 2025-10-30T23:00:00.000+00:00 |
| wid-sec-w-2025-2469 | Redis: Schwachstelle ermöglicht Codeausführung | 2025-11-02T23:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2473 | Apple iOS: Mehrere Schwachstellen | 2025-11-03T23:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2475 | Apple macOS: Mehrere Schwachstellen | 2025-11-03T23:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2480 | Apple Safari: Mehrere Schwachstellen | 2025-11-03T23:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2481 | Apple Xcode: Mehrere Schwachstellen | 2025-11-03T23:00:00.000+00:00 | 2025-11-04T23:00:00.000+00:00 |
| wid-sec-w-2025-2491 | Google Chrome/Microsoft Edge: Mehrere Schwachstellen | 2025-11-05T23:00:00.000+00:00 | 2025-11-06T23:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2009:0369 | Red Hat Security Advisory: java-1.6.0-ibm security update | 2009-03-25T14:52:00+00:00 | 2025-11-08T03:24:05+00:00 |
| rhsa-2009:0392 | Red Hat Security Advisory: java-1.6.0-sun security update | 2009-03-26T16:03:00+00:00 | 2025-11-08T03:24:07+00:00 |
| rhsa-2009:0394 | Red Hat Security Advisory: java-1.5.0-sun security update | 2009-03-26T16:06:00+00:00 | 2025-11-08T03:24:08+00:00 |
| rhsa-2009:0377 | Red Hat Security Advisory: java-1.6.0-openjdk security update | 2009-04-07T18:36:00+00:00 | 2025-11-08T03:24:07+00:00 |
| rhsa-2009:0445 | Red Hat Security Advisory: java-1.4.2-ibm security update | 2009-04-23T18:44:00+00:00 | 2025-11-08T03:24:09+00:00 |
| rhsa-2009:0466 | Red Hat Security Advisory: java-1.5.0-ibm security update | 2009-05-07T11:45:00+00:00 | 2025-11-08T03:24:13+00:00 |
| rhsa-2009:0478 | Red Hat Security Advisory: acroread security update | 2009-05-13T14:23:00+00:00 | 2025-11-08T03:24:09+00:00 |
| rhsa-2009:1038 | Red Hat Security Advisory: java-1.5.0-ibm security update | 2009-05-18T20:28:00+00:00 | 2025-11-08T03:24:13+00:00 |
| rhsa-2009:1109 | Red Hat Security Advisory: acroread security update | 2009-06-17T09:16:00+00:00 | 2025-11-08T03:24:10+00:00 |
| rhsa-2009:1184 | Red Hat Security Advisory: nspr and nss security and bug fix update | 2009-07-30T22:09:00+00:00 | 2025-11-08T03:26:55+00:00 |
| rhsa-2009:1186 | Red Hat Security Advisory: nspr and nss security, bug fix, and enhancement update | 2009-07-30T22:20:00+00:00 | 2025-11-08T03:26:57+00:00 |
| rhsa-2009:1189 | Red Hat Security Advisory: flash-plugin security update | 2009-07-31T14:16:00+00:00 | 2025-11-08T03:26:58+00:00 |
| rhsa-2009:1188 | Red Hat Security Advisory: flash-plugin security update | 2009-07-31T14:20:00+00:00 | 2025-11-08T03:26:58+00:00 |
| rhsa-2009:1190 | Red Hat Security Advisory: nspr and nss security and bug fix update | 2009-07-31T14:26:00+00:00 | 2025-11-08T03:26:59+00:00 |
| rhsa-2009:1199 | Red Hat Security Advisory: java-1.5.0-sun security update | 2009-08-06T20:38:00+00:00 | 2025-11-08T03:26:59+00:00 |
| rhsa-2009:1200 | Red Hat Security Advisory: java-1.6.0-sun security update | 2009-08-06T20:41:00+00:00 | 2025-11-08T03:24:16+00:00 |
| rhsa-2009:1201 | Red Hat Security Advisory: java-1.6.0-openjdk security and bug fix update | 2009-08-06T21:14:00+00:00 | 2025-11-08T03:24:12+00:00 |
| rhsa-2009:1198 | Red Hat Security Advisory: java-1.6.0-ibm security update | 2009-08-06T21:27:00+00:00 | 2025-11-08T03:24:11+00:00 |
| rhsa-2009:1207 | Red Hat Security Advisory: nspr and nss security update | 2009-08-12T14:31:00+00:00 | 2025-11-08T03:27:00+00:00 |
| rhsa-2009:1236 | Red Hat Security Advisory: java-1.5.0-ibm security update | 2009-08-28T08:57:00+00:00 | 2025-11-08T03:27:00+00:00 |
| rhsa-2009:1337 | Red Hat Security Advisory: gfs2-utils security and bug fix update | 2009-09-02T08:00:00+00:00 | 2025-11-08T03:24:12+00:00 |
| rhsa-2009:1339 | Red Hat Security Advisory: rgmanager security, bug fix, and enhancement update | 2009-09-02T08:00:00+00:00 | 2025-11-08T03:24:14+00:00 |
| rhsa-2009:1341 | Red Hat Security Advisory: cman security, bug fix, and enhancement update | 2009-09-02T08:00:00+00:00 | 2025-11-08T03:24:14+00:00 |
| rhsa-2009:1428 | Red Hat Security Advisory: xmlsec1 security update | 2009-09-08T15:43:00+00:00 | 2025-11-08T03:24:15+00:00 |
| rhsa-2009:1432 | Red Hat Security Advisory: seamonkey security update | 2009-09-09T23:48:00+00:00 | 2025-11-08T03:27:00+00:00 |
| rhsa-2009:1499 | Red Hat Security Advisory: acroread security update | 2009-10-14T15:36:00+00:00 | 2025-11-08T03:27:01+00:00 |
| rhsa-2009:1505 | Red Hat Security Advisory: java-1.4.2-ibm security update | 2009-10-14T16:08:00+00:00 | 2025-11-08T03:24:17+00:00 |
| rhsa-2009:1528 | Red Hat Security Advisory: samba security and bug fix update | 2009-10-27T16:41:00+00:00 | 2025-11-08T03:27:02+00:00 |
| rhsa-2009:1529 | Red Hat Security Advisory: samba security update | 2009-10-27T17:05:00+00:00 | 2025-11-08T03:27:03+00:00 |
| rhsa-2009:1540 | Red Hat Security Advisory: kernel-rt security, bug fix, and enhancement update | 2009-11-03T18:21:00+00:00 | 2025-11-08T03:27:03+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2017-6828 | Heap-based buffer overflow in audiofile allows remote attackers to have unspecified impact | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:57.000Z |
| msrc_cve-2017-6829 | The decodeSample function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file. | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:57.000Z |
| msrc_cve-2017-6830 | Heap-based buffer overflow in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:57.000Z |
| msrc_cve-2017-6831 | Heap-based buffer overflow in the decodeBlockWAVE function in IMA.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0 and 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file. | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:57.000Z |
| msrc_cve-2017-6832 | Heap-based buffer overflow in the decodeBlock in MSADPCM.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0, 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file. | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:58.000Z |
| msrc_cve-2017-6833 | Vulnerability in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:58.000Z |
| msrc_cve-2017-6834 | Heap-based buffer overflow in the ulaw2linear_buf function in G711.cpp in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0, 0.2.7 allows remote attackers to cause a denial of service (crash) via a crafted file. | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:58.000Z |
| msrc_cve-2017-6835 | Vulnerability in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service via a crafted file. | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:58.000Z |
| msrc_cve-2017-6836 | Heap-based buffer overflow in the Expand3To4Module::run function in libaudiofile/modules/SimpleModule.h in Audio File Library (aka audiofile) 0.3.6, 0.3.5, 0.3.4, 0.3.3, 0.3.2, 0.3.1, 0.3.0 allows remote attackers to cause a denial of service (crash) via a crafted file. | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:59.000Z |
| msrc_cve-2017-6837 | WAVE.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:59.000Z |
| msrc_cve-2017-6838 | Integer overflow in sfcommands/sfconvert.c in Audio File Library | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:59.000Z |
| msrc_cve-2017-6839 | Integer overflow in modules/MSADPCM.cpp in Audio File Library (aka audiofile) 0.3.6 allows remote attackers to cause a denial of service (crash) via a crafted file. | 2017-03-02T00:00:00.000Z | 2025-10-01T23:10:59.000Z |
| msrc_cve-2015-4646 | (1) unsquash-1.c (2) unsquash-2.c (3) unsquash-3.c and (4) unsquash-4.c in Squashfs and sasquatch allow remote attackers to cause a denial of service (application crash) via a crafted input. | 2017-04-02T00:00:00.000Z | 2021-12-16T00:00:00.000Z |
| msrc_cve-2017-3604 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | 2017-04-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2017-3605 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | 2017-04-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2017-3606 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | 2017-04-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2017-3607 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | 2017-04-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2017-3608 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | 2017-04-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2017-3609 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | 2017-04-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2017-3610 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | 2017-04-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2017-3611 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | 2017-04-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2017-3612 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | 2017-04-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2017-3613 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | 2017-04-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2017-3614 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | 2017-04-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2017-3615 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | 2017-04-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2017-3616 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | 2017-04-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2017-3617 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | 2017-04-02T00:00:00.000Z | 2024-06-30T07:00:00.000Z |
| msrc_cve-2017-7718 | hw/display/cirrus_vga_rop.h in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions. | 2017-04-02T00:00:00.000Z | 2025-09-04T02:42:31.000Z |
| msrc_cve-2017-8361 | The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file. | 2017-04-02T00:00:00.000Z | 2021-01-28T00:00:00.000Z |
| msrc_cve-2017-8362 | The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted audio file. | 2017-04-02T00:00:00.000Z | 2021-01-28T00:00:00.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2006-000736 | NEC MultiWriter 1700C web server authentication bypass vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000737 | NEC MultiWriter 1700C/7500C FTP server vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000742 | desknet's buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000753 | Ruby cgi.rb Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000758 | MyODBC Japanese Conversion Edition denial of service vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000760 | Hyper NIKKI System cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000771 | Kahua vulnerable in allowing to share login sessions | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000777 | Nucleus cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000781 | EC-CUBE cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000784 | eyeOS cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000791 | phpComasy cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000792 | tDiary cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000802 | Blogn cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000803 | Chama Cargo cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000808 | Denial of service vulnerability in Ruby CGI library (cgi.rb) | 2008-05-21T00:00+09:00 | 2008-11-14T12:20+09:00 |
| jvndb-2006-000809 | TikiWiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000812 | Hanako buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000816 | Shobo Shobo Nikki System (sns) cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000849 | SugarCRM cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000850 | a-blog cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000851 | pnamazu cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000852 | Joomla! cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000853 | tDiary arbitrary Ruby script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000858 | Ruby vulnerability caused by a problem with the alias funtion so that safe level 4 does not function as a sandbox | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000938 | Webmin directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000939 | Multiple vulnerabilities in Webmin and Usermin | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000975 | Hitachi Soumu Workflow Authentication Bypassing Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000983 | JP1 Request Handling Denial of Service Vulnerabilities | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000006 | Serene Bach cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000070 | Drupal cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|