Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2001-0395 |
N/A
|
Lightwave ConsoleServer 3200 does not disconnect … |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.226Z |
| CVE-2001-0396 |
N/A
|
The pre-login mode in the System Administrator in… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.843Z |
| CVE-2001-0397 |
N/A
|
Buffer overflow in Silent Runner Collector (SRC) … |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.691Z |
| CVE-2001-0398 |
N/A
|
The BAT! mail client allows remote attackers to b… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.237Z |
| CVE-2001-0399 |
N/A
|
Caucho Resin 1.3b1 and earlier allows remote atta… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.192Z |
| CVE-2001-0400 |
N/A
|
nph-maillist.pl allows remote attackers to execut… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.236Z |
| CVE-2001-0401 |
N/A
|
Buffer overflow in tip in Solaris 8 and earlier a… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.215Z |
| CVE-2001-0403 |
N/A
|
/opt/JSparm/bin/perfmon program in Solaris allows… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.692Z |
| CVE-2001-0404 |
N/A
|
Directory traversal vulnerability in JavaServer W… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.693Z |
| CVE-2001-0406 |
N/A
|
Samba before 2.2.0 allows local attackers to over… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.580Z |
| CVE-2001-0410 |
N/A
|
Buffer overflow in Trend Micro Virus Buster 2001 … |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.701Z |
| CVE-2001-0411 |
N/A
|
Reliant Unix 5.44 and earlier allows remote attac… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.058Z |
| CVE-2001-0415 |
N/A
|
REDIPlus program, REDI.exe, stores passwords and … |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.270Z |
| CVE-2001-0417 |
N/A
|
Kerberos 4 (aka krb4) allows local users to overw… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.901Z |
| CVE-2001-0418 |
N/A
|
content.pl script in NCM Content Management Syste… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.292Z |
| CVE-2001-0419 |
N/A
|
Buffer overflow in shared library ndwfn4.so for i… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.114Z |
| CVE-2001-0420 |
N/A
|
Directory traversal vulnerability in talkback.cgi… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.661Z |
| CVE-2001-0421 |
N/A
|
FTP server in Solaris 8 and earlier allows local … |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.785Z |
| CVE-2001-0424 |
N/A
|
BubbleMon 1.31 does not properly drop group privi… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.739Z |
| CVE-2001-0425 |
N/A
|
AdLibrary.pm in AdCycle 0.78b allows remote attac… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.228Z |
| CVE-2001-0426 |
N/A
|
Buffer overflow in dtsession on Solaris, and poss… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.861Z |
| CVE-2001-0431 |
N/A
|
Vulnerability in iPlanet Web Server Enterprise Ed… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.579Z |
| CVE-2001-0432 |
N/A
|
Buffer overflows in various CGI programs in the r… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.639Z |
| CVE-2001-0433 |
N/A
|
Buffer overflow in Savant 3.0 web server allows r… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.248Z |
| CVE-2001-0435 |
N/A
|
The split key mechanism used by PGP 7.0 allows a … |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.592Z |
| CVE-2001-0436 |
N/A
|
dcboard.cgi in DCForum 2000 1.0 allows remote att… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.327Z |
| CVE-2001-0437 |
N/A
|
upload_file.pl in DCForum 2000 1.0 allows remote … |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.285Z |
| CVE-2001-0438 |
N/A
|
Preview version of Timbuktu for Mac OS X allows l… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.606Z |
| CVE-2001-0441 |
N/A
|
Buffer overflow in (1) wrapping and (2) unwrappin… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.397Z |
| CVE-2001-0443 |
N/A
|
Buffer overflow in QPC QVT/Net Popd 4.20 in QVT/N… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.566Z |
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2001-0395 |
N/A
|
Lightwave ConsoleServer 3200 does not disconnect … |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.226Z |
| CVE-2001-0396 |
N/A
|
The pre-login mode in the System Administrator in… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.843Z |
| CVE-2001-0397 |
N/A
|
Buffer overflow in Silent Runner Collector (SRC) … |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.691Z |
| CVE-2001-0398 |
N/A
|
The BAT! mail client allows remote attackers to b… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.237Z |
| CVE-2001-0399 |
N/A
|
Caucho Resin 1.3b1 and earlier allows remote atta… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.192Z |
| CVE-2001-0400 |
N/A
|
nph-maillist.pl allows remote attackers to execut… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.236Z |
| CVE-2001-0401 |
N/A
|
Buffer overflow in tip in Solaris 8 and earlier a… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.215Z |
| CVE-2001-0403 |
N/A
|
/opt/JSparm/bin/perfmon program in Solaris allows… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.692Z |
| CVE-2001-0404 |
N/A
|
Directory traversal vulnerability in JavaServer W… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.693Z |
| CVE-2001-0406 |
N/A
|
Samba before 2.2.0 allows local attackers to over… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.580Z |
| CVE-2001-0410 |
N/A
|
Buffer overflow in Trend Micro Virus Buster 2001 … |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.701Z |
| CVE-2001-0411 |
N/A
|
Reliant Unix 5.44 and earlier allows remote attac… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.058Z |
| CVE-2001-0415 |
N/A
|
REDIPlus program, REDI.exe, stores passwords and … |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.270Z |
| CVE-2001-0417 |
N/A
|
Kerberos 4 (aka krb4) allows local users to overw… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.901Z |
| CVE-2001-0418 |
N/A
|
content.pl script in NCM Content Management Syste… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.292Z |
| CVE-2001-0419 |
N/A
|
Buffer overflow in shared library ndwfn4.so for i… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.114Z |
| CVE-2001-0420 |
N/A
|
Directory traversal vulnerability in talkback.cgi… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.661Z |
| CVE-2001-0421 |
N/A
|
FTP server in Solaris 8 and earlier allows local … |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.785Z |
| CVE-2001-0424 |
N/A
|
BubbleMon 1.31 does not properly drop group privi… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.739Z |
| CVE-2001-0425 |
N/A
|
AdLibrary.pm in AdCycle 0.78b allows remote attac… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.228Z |
| CVE-2001-0426 |
N/A
|
Buffer overflow in dtsession on Solaris, and poss… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:37.861Z |
| CVE-2001-0431 |
N/A
|
Vulnerability in iPlanet Web Server Enterprise Ed… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.579Z |
| CVE-2001-0432 |
N/A
|
Buffer overflows in various CGI programs in the r… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.639Z |
| CVE-2001-0433 |
N/A
|
Buffer overflow in Savant 3.0 web server allows r… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.248Z |
| CVE-2001-0435 |
N/A
|
The split key mechanism used by PGP 7.0 allows a … |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.592Z |
| CVE-2001-0436 |
N/A
|
dcboard.cgi in DCForum 2000 1.0 allows remote att… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.327Z |
| CVE-2001-0437 |
N/A
|
upload_file.pl in DCForum 2000 1.0 allows remote … |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.285Z |
| CVE-2001-0438 |
N/A
|
Preview version of Timbuktu for Mac OS X allows l… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.606Z |
| CVE-2001-0441 |
N/A
|
Buffer overflow in (1) wrapping and (2) unwrappin… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.397Z |
| CVE-2001-0443 |
N/A
|
Buffer overflow in QPC QVT/Net Popd 4.20 in QVT/N… |
n/a |
n/a |
2001-05-24T04:00:00 | 2024-08-08T04:21:38.566Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2000-0872 | explorer.php in PhotoAlbum 0.9.9 allows remote attackers to read arbitrary files via a .. (dot dot)… | 2000-11-14T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0873 | netstat in AIX 4.x.x does not properly restrict access to the -Zi option, which allows local users … | 2000-11-14T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0874 | Eudora mail client includes the absolute path of the sender's host within a virtual card (VCF). | 2000-11-14T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0875 | WFTPD and WFTPD Pro 2.41 RC12 allows remote attackers to cause a denial of service by sending a lon… | 2000-11-14T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0876 | WFTPD and WFTPD Pro 2.41 RC12 allows remote attackers to obtain the full pathname of the server vi… | 2000-11-14T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0877 | mailform.pl CGI script in MailForm 2.0 allows remote attackers to read arbitrary files by specifyin… | 2000-11-14T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0878 | The mailto CGI script allows remote attacker to execute arbitrary commands via shell metacharacters… | 2000-11-14T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0879 | LPPlus programs dccsched, dcclpdser, dccbkst, dccshut, dcclpdshut, and dccbkstshut are installed se… | 2000-11-14T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0880 | LPPlus creates the lpdprocess file with world-writeable permissions, which allows local users to ki… | 2000-11-14T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0881 | The dccscan setuid program in LPPlus does not properly check if the user has the permissions to pri… | 2000-11-14T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0882 | Intel Express 500 series switches allow a remote attacker to cause a denial of service via a malfor… | 2000-11-14T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0883 | The default configuration of mod_perl for Apache as installed on Mandrake Linux 6.1 through 7.1 set… | 2000-11-14T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-1223 | quikstore.cgi in Quikstore Shopping Cart allows remote attackers to execute arbitrary commands via … | 2000-11-20T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-1217 | Microsoft Windows 2000 before Service Pack 2 (SP2), when running in a non-Windows 2000 domain and u… | 2000-11-21T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-1224 | Caucho Technology Resin 1.2 and possibly earlier allows remote attackers to view JSP source via an … | 2000-11-23T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-1222 | AIX sysback before 4.2.1.13 uses a relative path to find and execute the hostname program, which al… | 2000-12-10T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0998 | Format string vulnerability in top program allows local attackers to gain root privileges via the "… | 2000-12-11T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-0999 | Format string vulnerabilities in OpenBSD ssh program (and possibly other BSD-based operating system… | 2000-12-11T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-1000 | Format string vulnerability in AOL Instant Messenger (AIM) 4.1.2010 allows remote attackers to caus… | 2000-12-11T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-1001 | add_2_basket.asp in Element InstantShop allows remote attackers to modify price information via the… | 2000-12-11T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-1002 | POP3 daemon in Stalker CommuniGate Pro 3.3.2 generates different error messages for invalid usernam… | 2000-12-11T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-1003 | NETBIOS client in Windows 95 and Windows 98 allows a remote attacker to cause a denial of service b… | 2000-12-11T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-1004 | Format string vulnerability in OpenBSD photurisd allows local users to execute arbitrary commands v… | 2000-12-11T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-1005 | Directory traversal vulnerability in html_web_store.cgi and web_store.cgi CGI programs in eXtropia … | 2000-12-11T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-1006 | Microsoft Exchange Server 5.5 does not properly handle a MIME header with a blank charset specified… | 2000-12-11T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-1007 | I-gear 3.5.7 and earlier does not properly process log entries in which a URL is longer than 255 ch… | 2000-12-11T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-1008 | PalmOS 3.5.2 and earlier uses weak encryption to store the user password, which allows attackers wi… | 2000-12-11T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-1009 | dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which al… | 2000-12-11T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-1010 | Format string vulnerability in talkd in OpenBSD and possibly other BSD-based OSes allows remote att… | 2000-12-11T05:00:00.000 | 2025-04-03T01:03:51.193 |
| fkie_cve-2000-1011 | Buffer overflow in catopen() function in FreeBSD 5.0 and earlier, and possibly other OSes, allows l… | 2000-12-11T05:00:00.000 | 2025-04-03T01:03:51.193 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-5x7p-gm79-383m |
9.8 (3.1)
|
Malicious Package in regenraotr | 2020-09-01T21:11:57Z | 2021-10-01T13:28:51Z |
| ghsa-wp2p-q35g-3rjj |
9.8 (3.1)
|
Malicious Package in soket.io | 2020-09-01T21:13:01Z | 2021-10-01T13:29:21Z |
| ghsa-x6gq-467r-hwcc |
9.8 (3.1)
|
Malicious Package in soket.js | 2020-09-01T21:14:05Z | 2021-10-01T13:29:35Z |
| ghsa-j3qq-qvc8-c6g7 |
9.8 (3.1)
|
Malicious Package in foever | 2020-09-01T21:15:09Z | 2021-10-01T13:29:49Z |
| ghsa-992f-wf4w-x36v |
|
Prototype Pollution in merge-objects | 2020-09-01T21:16:13Z | 2020-08-31T18:33:09Z |
| ghsa-f5cv-xrv9-r8w7 |
|
NoSQL injection in express-cart | 2020-09-01T21:17:16Z | 2021-09-24T20:58:36Z |
| ghsa-77q4-m83q-w76v |
7.5 (3.1)
|
Missing Origin Validation in browserify-hmr | 2020-09-01T21:18:20Z | 2021-09-24T20:59:15Z |
| ghsa-9hqj-38j2-5jgm |
|
Command Injection in ascii-art | 2020-09-01T21:19:23Z | 2020-08-31T18:33:35Z |
| ghsa-xhjx-mfr6-9rr4 |
|
Command Injection in samsung-remote | 2020-09-01T21:20:28Z | 2020-08-31T18:33:52Z |
| ghsa-9x64-5r7x-2q53 |
9.8 (3.1)
|
Malicious Package in flatmap-stream | 2020-09-01T21:21:32Z | 2021-10-01T13:30:04Z |
| ghsa-h5vj-f7r9-w564 |
9.8 (3.1)
|
Entropy Backdoor in text-qrcode | 2020-09-01T21:22:35Z | 2021-10-01T13:30:18Z |
| ghsa-xwqw-rf2q-xmhf |
|
Cross-Site Scripting in buefy | 2020-09-01T21:23:38Z | 2021-09-24T22:00:38Z |
| ghsa-hgr5-82rc-p936 |
|
Cross-Site Scripting in md-data-table | 2020-09-01T21:24:41Z | 2020-08-31T18:34:23Z |
| ghsa-mpjf-8cmf-p789 |
|
Cross-Site Scripting in jingo | 2020-09-01T21:25:46Z | 2020-08-31T18:34:28Z |
| ghsa-x6m6-5hrf-fh6r |
7.5 (3.1)
|
Denial of Service in markdown-it-toc-and-anchor | 2020-09-01T21:26:50Z | 2023-12-07T22:05:03Z |
| ghsa-4qqc-mp5f-ccv4 |
|
Command Injection in bestzip | 2020-09-02T15:05:51Z | 2020-09-02T15:04:08Z |
| ghsa-pp7h-53gx-mx7r |
6.5 (3.1)
|
Remote Memory Exposure in bl | 2020-09-02T15:26:19Z | 2022-05-26T20:43:51Z |
| ghsa-w32g-5hqp-gg6q |
|
Cross-Site Scripting in mermaid | 2020-09-02T15:41:41Z | 2021-09-27T13:34:07Z |
| ghsa-44vf-8ffm-v2qh |
|
Sensitive Data Exposure in rails-session-decoder | 2020-09-02T15:42:47Z | 2020-08-31T18:34:35Z |
| ghsa-m5ch-gx8g-rg73 |
|
Remote Code Execution in pomelo-monitor | 2020-09-02T15:43:53Z | 2020-08-31T18:34:39Z |
| ghsa-9p64-h5q4-phpm |
|
Remote Code Execution in office-converter | 2020-09-02T15:44:58Z | 2020-08-31T18:34:44Z |
| ghsa-x9hc-rw35-f44h |
7.3 (3.1)
|
Sandbox Breakout / Arbitrary Code Execution in static-eval | 2020-09-02T15:46:03Z | 2021-09-27T13:40:52Z |
| ghsa-p9vv-3945-x93h |
|
Cross-Site Scripting in semantic-ui-search | 2020-09-02T15:47:10Z | 2021-09-27T13:59:52Z |
| ghsa-2hqf-qqmq-pgpp |
9.8 (3.1)
|
Malicious Package in commander-js | 2020-09-02T15:48:16Z | 2021-10-01T13:30:38Z |
| ghsa-277p-xwpp-3jf7 |
9.8 (3.1)
|
Malicious Package in rrgod | 2020-09-02T15:49:22Z | 2021-10-01T13:42:09Z |
| ghsa-p8fm-w787-x6x3 |
9.8 (3.1)
|
Malicious Package in portionfatty12 | 2020-09-02T15:50:28Z | 2021-10-01T13:42:27Z |
| ghsa-fm4j-4xhm-xpwx |
|
Sandbox Breakout / Arbitrary Code Execution in sandbox | 2020-09-02T15:51:34Z | 2020-08-31T18:34:58Z |
| ghsa-hxwc-5vw9-2w4w |
|
NoSQL Injection in loopback-connector-mongodb | 2020-09-02T15:52:39Z | 2021-09-27T15:13:26Z |
| ghsa-c7pp-x73h-4m2v |
|
Cross-Site Scripting in bootstrap-vue | 2020-09-02T15:53:46Z | 2021-09-27T15:43:19Z |
| ghsa-8wgc-jjvv-cv6v |
|
Improper Authorization in loopback | 2020-09-02T15:54:52Z | 2021-09-27T15:44:08Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2022-43118 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-strings | 2022-09-19T14:15:00Z | 2024-11-21T14:22:44.584448Z |
| pysec-2022-43098 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-file-system | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.564135Z |
| pysec-2022-43102 |
9.8 (3.1)
|
The d8s-urls for python 0.1.0, as distributed on PyPI, included a potential code-executio… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.766564Z |
| pysec-2022-43103 |
9.8 (3.1)
|
The d8s-uuids for python, as distributed on PyPI, included a potential code-execution bac… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.817031Z |
| pysec-2022-43104 |
9.8 (3.1)
|
The d8s-domains for python, as distributed on PyPI, included a potential code-execution b… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.865878Z |
| pysec-2022-43105 |
9.8 (3.1)
|
The d8s-dates for python, as distributed on PyPI, included a potential code-execution bac… | democritus-hypothesis | 2022-09-19T15:15:00Z | 2024-11-21T14:22:43.915613Z |
| pysec-2022-43110 |
9.8 (3.1)
|
The d8s-urls for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T15:15:00Z | 2024-11-21T14:22:44.173987Z |
| pysec-2022-43113 |
9.8 (3.1)
|
The d8s-domains for python, as distributed on PyPI, included a potential code-execution b… | democritus-networking | 2022-09-19T15:15:00Z | 2024-11-21T14:22:44.327837Z |
| pysec-2022-43074 |
9.8 (3.1)
|
The d8s-archives for python, as distributed on PyPI, included a potential code-execution … | d8s-archives | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.229096Z |
| pysec-2022-43076 |
9.8 (3.1)
|
The d8s-grammars for python, as distributed on PyPI, included a potential code-execution … | d8s-grammars | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.333517Z |
| pysec-2022-43078 |
9.8 (3.1)
|
The d8s-json for python, as distributed on PyPI, included a potential code-execution back… | d8s-json | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.439723Z |
| pysec-2022-43079 |
9.8 (3.1)
|
The d8s-math for python, as distributed on PyPI, included a potential code-execution back… | d8s-math | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.499117Z |
| pysec-2022-43080 |
9.8 (3.1)
|
The d8s-netstrings for python, as distributed on PyPI, included a potential code-executio… | d8s-netstrings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.556543Z |
| pysec-2022-43083 |
9.8 (3.1)
|
The d8s-python for python, as distributed on PyPI, included a potential code-execution ba… | d8s-python | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.723606Z |
| pysec-2022-43087 |
9.8 (3.1)
|
The d8s-strings for python, as distributed on PyPI, included a potential code-execution b… | d8s-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:42.944804Z |
| pysec-2022-43092 |
9.8 (3.1)
|
The d8s-xml for python, as distributed on PyPI, included a potential code-execution backd… | d8s-xml | 2022-09-19T16:15:00Z | 2024-11-21T14:22:43.200942Z |
| pysec-2022-43099 |
9.8 (3.1)
|
The d8s-pdfs for python, as distributed on PyPI, included a potential code-execution back… | democritus-file-system | 2022-09-19T16:15:00Z | 2024-11-21T14:22:43.616362Z |
| pysec-2022-43101 |
9.8 (3.1)
|
The d8s-strings for python, as distributed on PyPI, included a potential code-execution b… | democritus-hypothesis | 2022-09-19T16:15:00Z | 2024-11-21T14:22:43.716069Z |
| pysec-2022-43106 |
9.8 (3.1)
|
The d8s-dicts for python, as distributed on PyPI, included a potential code-execution bac… | democritus-hypothesis | 2022-09-19T16:15:00Z | 2024-11-21T14:22:43.965654Z |
| pysec-2022-43107 |
9.8 (3.1)
|
The d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execut… | democritus-hypothesis | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.021497Z |
| pysec-2022-43111 |
9.8 (3.1)
|
The d8s-html for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.226888Z |
| pysec-2022-43112 |
9.8 (3.1)
|
The d8s-asns for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.27716Z |
| pysec-2022-43114 |
9.8 (3.1)
|
The d8s-mpeg for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.376649Z |
| pysec-2022-43115 |
9.8 (3.1)
|
The d8s-ip-addresses for python, as distributed on PyPI, included a potential code-execut… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.428296Z |
| pysec-2022-43116 |
9.8 (3.1)
|
The d8s-utility for python, as distributed on PyPI, included a potential code-execution b… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.483759Z |
| pysec-2022-43117 |
9.8 (3.1)
|
The d8s-pdfs for python, as distributed on PyPI, included a potential code-execution back… | democritus-networking | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.53409Z |
| pysec-2022-43119 |
9.8 (3.1)
|
The d8s-archives for python, as distributed on PyPI, included a potential code-execution … | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.633699Z |
| pysec-2022-43120 |
9.8 (3.1)
|
The d8s-json for python, as distributed on PyPI, included a potential code-execution back… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.684065Z |
| pysec-2022-43121 |
9.8 (3.1)
|
The d8s-math for python, as distributed on PyPI, included a potential code-execution back… | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.735083Z |
| pysec-2022-43122 |
9.8 (3.1)
|
The d8s-grammars for python, as distributed on PyPI, included a potential code-execution … | democritus-strings | 2022-09-19T16:15:00Z | 2024-11-21T14:22:44.785522Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-2915 | Malicious code in exchange_clients (npm) | 2022-06-20T20:10:31Z | 2022-06-20T20:10:32Z |
| mal-2022-4901 | Malicious code in nodehound (npm) | 2022-06-20T20:10:31Z | 2022-06-20T20:10:31Z |
| mal-2022-5372 | Malicious code in plugin-syntax-flow (npm) | 2022-06-20T20:10:31Z | 2022-06-20T20:10:37Z |
| mal-2022-5874 | Malicious code in rush-lib (npm) | 2022-06-20T20:10:31Z | 2022-06-20T20:10:31Z |
| MAL-2022-5370 | Malicious code in plugin-proposal-export-default-from (npm) | 2022-06-20T20:10:32Z | 2022-06-20T20:10:37Z |
| mal-2022-5370 | Malicious code in plugin-proposal-export-default-from (npm) | 2022-06-20T20:10:32Z | 2022-06-20T20:10:37Z |
| MAL-2022-3313 | Malicious code in gd-pc-common (npm) | 2022-06-20T20:10:37Z | 2022-06-20T20:10:38Z |
| MAL-2022-4240 | Malicious code in kusto-language-service (npm) | 2022-06-20T20:10:37Z | 2022-06-20T20:10:38Z |
| MAL-2022-4399 | Malicious code in lorawan-devices (npm) | 2022-06-20T20:10:37Z | 2022-06-20T20:10:37Z |
| MAL-2022-4533 | Malicious code in media-server-embed (npm) | 2022-06-20T20:10:37Z | 2022-06-20T20:10:37Z |
| mal-2022-3313 | Malicious code in gd-pc-common (npm) | 2022-06-20T20:10:37Z | 2022-06-20T20:10:38Z |
| mal-2022-4240 | Malicious code in kusto-language-service (npm) | 2022-06-20T20:10:37Z | 2022-06-20T20:10:38Z |
| mal-2022-4399 | Malicious code in lorawan-devices (npm) | 2022-06-20T20:10:37Z | 2022-06-20T20:10:37Z |
| mal-2022-4533 | Malicious code in media-server-embed (npm) | 2022-06-20T20:10:37Z | 2022-06-20T20:10:37Z |
| MAL-2022-1330 | Malicious code in azure-filter-3 (npm) | 2022-06-20T20:10:38Z | 2022-06-20T20:10:39Z |
| MAL-2022-3307 | Malicious code in gd-gplus (npm) | 2022-06-20T20:10:38Z | 2022-06-20T20:10:38Z |
| MAL-2022-3314 | Malicious code in gd-react-toolbox (npm) | 2022-06-20T20:10:38Z | 2022-06-20T20:10:39Z |
| MAL-2022-943 | Malicious code in all-digital (npm) | 2022-06-20T20:10:38Z | 2022-06-20T20:10:39Z |
| mal-2022-1330 | Malicious code in azure-filter-3 (npm) | 2022-06-20T20:10:38Z | 2022-06-20T20:10:39Z |
| mal-2022-3307 | Malicious code in gd-gplus (npm) | 2022-06-20T20:10:38Z | 2022-06-20T20:10:38Z |
| mal-2022-3314 | Malicious code in gd-react-toolbox (npm) | 2022-06-20T20:10:38Z | 2022-06-20T20:10:39Z |
| mal-2022-943 | Malicious code in all-digital (npm) | 2022-06-20T20:10:38Z | 2022-06-20T20:10:39Z |
| MAL-2022-3821 | Malicious code in ing-feat-view-cancel-payments (npm) | 2022-06-20T20:10:39Z | 2022-06-20T20:10:39Z |
| MAL-2022-3830 | Malicious code in ing-message-screen (npm) | 2022-06-20T20:10:39Z | 2022-06-20T20:10:40Z |
| MAL-2022-4431 | Malicious code in lx-cockpit-components-loader (npm) | 2022-06-20T20:10:39Z | 2022-06-20T20:10:40Z |
| MAL-2022-5230 | Malicious code in pattern-middleware (npm) | 2022-06-20T20:10:39Z | 2022-06-20T20:10:39Z |
| mal-2022-3821 | Malicious code in ing-feat-view-cancel-payments (npm) | 2022-06-20T20:10:39Z | 2022-06-20T20:10:39Z |
| mal-2022-3830 | Malicious code in ing-message-screen (npm) | 2022-06-20T20:10:39Z | 2022-06-20T20:10:40Z |
| mal-2022-4431 | Malicious code in lx-cockpit-components-loader (npm) | 2022-06-20T20:10:39Z | 2022-06-20T20:10:40Z |
| mal-2022-5230 | Malicious code in pattern-middleware (npm) | 2022-06-20T20:10:39Z | 2022-06-20T20:10:39Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| wid-sec-w-2023-0468 | Red Hat OpenShift: Schwachstelle ermöglicht Denial of Service | 2023-02-22T23:00:00.000+00:00 | 2024-12-03T23:00:00.000+00:00 |
| wid-sec-w-2023-0469 | Linux Kernel: Schwachstelle ermöglicht Ausführen von beliebigem Programmcode mit Administratorrechten | 2023-02-22T23:00:00.000+00:00 | 2024-05-07T22:00:00.000+00:00 |
| wid-sec-w-2023-0471 | Apache Sling: Schwachstelle ermöglicht Darstellen falscher Informationen | 2023-02-22T23:00:00.000+00:00 | 2023-02-22T23:00:00.000+00:00 |
| wid-sec-w-2023-0474 | Ubiquiti UniFi Dream Machine Pro: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-02-23T23:00:00.000+00:00 | 2023-02-23T23:00:00.000+00:00 |
| wid-sec-w-2023-0476 | Zoho ManageEngine ServiceDesk Plus: Mehrere Schwachstellen | 2023-02-23T23:00:00.000+00:00 | 2023-02-23T23:00:00.000+00:00 |
| wid-sec-w-2023-0477 | Dell Computer: Schwachstelle ermöglicht Denial of Service | 2023-02-23T23:00:00.000+00:00 | 2023-02-23T23:00:00.000+00:00 |
| wid-sec-w-2023-0478 | IBM MQ: Schwachstelle ermöglicht Denial of Service | 2023-02-26T23:00:00.000+00:00 | 2023-03-08T23:00:00.000+00:00 |
| wid-sec-w-2023-0479 | Red Hat OpenShift: Schwachstelle ermöglicht Denial of Service | 2023-02-26T23:00:00.000+00:00 | 2023-12-03T23:00:00.000+00:00 |
| wid-sec-w-2023-0480 | Zoho ManageEngine Endpoint Central: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-02-26T23:00:00.000+00:00 | 2023-02-26T23:00:00.000+00:00 |
| wid-sec-w-2023-0481 | Linux Kernel: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2023-02-26T23:00:00.000+00:00 | 2024-06-11T22:00:00.000+00:00 |
| wid-sec-w-2023-0482 | Linux Kernel: Mehrere Schwachstellen | 2023-02-26T23:00:00.000+00:00 | 2023-02-26T23:00:00.000+00:00 |
| wid-sec-w-2023-0483 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-02-26T23:00:00.000+00:00 | 2024-03-20T23:00:00.000+00:00 |
| wid-sec-w-2023-0484 | IBM SAN Volume Controller: Schwachstelle ermöglicht Privilegieneskalation | 2023-02-26T23:00:00.000+00:00 | 2023-02-26T23:00:00.000+00:00 |
| wid-sec-w-2023-0487 | IBM Business Automation Workflow: Schwachstelle ermöglicht Cross-Site Scripting | 2023-02-27T23:00:00.000+00:00 | 2023-02-27T23:00:00.000+00:00 |
| wid-sec-w-2023-0488 | IBM HTTP Server: Schwachstelle ermöglicht Denial of Service | 2023-02-27T23:00:00.000+00:00 | 2023-04-24T22:00:00.000+00:00 |
| wid-sec-w-2023-0489 | Hitachi Energy Relion: Schwachstelle ermöglicht Denial of Service | 2023-02-27T23:00:00.000+00:00 | 2023-02-27T23:00:00.000+00:00 |
| wid-sec-w-2023-0490 | Mattermost: Mehrere Schwachstellen | 2023-02-27T23:00:00.000+00:00 | 2023-02-27T23:00:00.000+00:00 |
| wid-sec-w-2023-0492 | Nextcloud: Schwachstelle ermöglicht Offenlegung von Informationen | 2023-02-27T23:00:00.000+00:00 | 2023-02-27T23:00:00.000+00:00 |
| wid-sec-w-2023-0493 | Hitachi Ops Center: Mehrere Schwachstellen ermöglichen nicht spezifizierten Angriff | 2023-02-27T23:00:00.000+00:00 | 2023-02-27T23:00:00.000+00:00 |
| wid-sec-w-2023-0494 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-02-27T23:00:00.000+00:00 | 2024-03-27T23:00:00.000+00:00 |
| wid-sec-w-2023-0495 | WithSecure Produkte: Mehrere Schwachstellen | 2023-02-27T23:00:00.000+00:00 | 2023-02-28T23:00:00.000+00:00 |
| wid-sec-w-2023-0496 | VMware Workspace One Boxer: Schwachstelle ermöglicht Cross-Site Scripting | 2023-02-27T23:00:00.000+00:00 | 2023-02-27T23:00:00.000+00:00 |
| wid-sec-w-2023-0509 | Mozilla Firefox: Schwachstelle ermöglicht Codeausführung | 2023-02-28T23:00:00.000+00:00 | 2023-02-28T23:00:00.000+00:00 |
| wid-sec-w-2023-0510 | Redis: Mehrere Schwachstellen ermöglichen Denial of Service | 2023-02-28T23:00:00.000+00:00 | 2025-02-13T23:00:00.000+00:00 |
| wid-sec-w-2023-0511 | sudo: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-02-28T23:00:00.000+00:00 | 2023-10-01T22:00:00.000+00:00 |
| wid-sec-w-2023-0512 | Linux Kernel: Schwachstelle ermöglicht Denial of Service | 2023-02-28T23:00:00.000+00:00 | 2024-02-27T23:00:00.000+00:00 |
| wid-sec-w-2023-0513 | Python: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen | 2023-02-28T23:00:00.000+00:00 | 2025-01-06T23:00:00.000+00:00 |
| wid-sec-w-2023-0514 | IBM Storage Produkte: Schwachstelle ermöglicht Privilegieneskalation | 2023-02-28T23:00:00.000+00:00 | 2023-02-28T23:00:00.000+00:00 |
| wid-sec-w-2023-0515 | Red Hat Enterprise Linux Ceph Storage: Schwachstelle ermöglicht Privilegieneskalation | 2023-02-28T23:00:00.000+00:00 | 2023-12-26T23:00:00.000+00:00 |
| wid-sec-w-2023-0516 | Linux Kernel: Schwachstelle ermöglicht nicht spezifizierten Angriff | 2023-02-28T23:00:00.000+00:00 | 2023-04-18T22:00:00.000+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| rhsa-2007:0888 | Red Hat Security Advisory: php security update | 2007-10-23T15:54:00+00:00 | 2026-01-08T09:19:46+00:00 |
| rhsa-2007_0888 | Red Hat Security Advisory: php security update | 2007-10-23T15:54:00+00:00 | 2024-11-22T01:29:14+00:00 |
| rhsa-2007:0917 | Red Hat Security Advisory: php security update | 2007-10-23T15:56:00+00:00 | 2026-01-13T20:58:07+00:00 |
| rhsa-2007_0917 | Red Hat Security Advisory: php security update | 2007-10-23T15:56:00+00:00 | 2024-11-22T01:29:40+00:00 |
| rhsa-2007:0992 | Red Hat Security Advisory: libpng security update | 2007-10-23T16:54:00+00:00 | 2025-11-21T17:32:29+00:00 |
| rhsa-2007_0992 | Red Hat Security Advisory: libpng security update | 2007-10-23T16:54:00+00:00 | 2024-11-22T01:33:21+00:00 |
| rhsa-2007:0891 | Red Hat Security Advisory: php security update | 2007-10-25T17:33:00+00:00 | 2026-01-13T22:36:27+00:00 |
| rhsa-2007_0891 | Red Hat Security Advisory: php security update | 2007-10-25T17:33:00+00:00 | 2024-11-22T01:50:10+00:00 |
| rhsa-2007:0911 | Red Hat Security Advisory: httpd security update | 2007-10-25T17:35:00+00:00 | 2026-01-08T09:19:51+00:00 |
| rhsa-2007_0911 | Red Hat Security Advisory: httpd security update | 2007-10-25T17:35:00+00:00 | 2024-11-22T02:04:02+00:00 |
| rhsa-2007:1020 | Red Hat Security Advisory: cups security and bug fix update | 2007-10-31T13:48:00+00:00 | 2026-01-13T22:31:09+00:00 |
| rhsa-2007_1020 | Red Hat Security Advisory: cups security and bug fix update | 2007-10-31T13:48:00+00:00 | 2024-11-22T01:35:04+00:00 |
| rhsa-2007:0939 | Red Hat Security Advisory: kernel security update | 2007-11-01T13:28:00+00:00 | 2026-01-13T20:58:08+00:00 |
| rhsa-2007_0939 | Red Hat Security Advisory: kernel security update | 2007-11-01T13:28:00+00:00 | 2024-11-22T02:10:50+00:00 |
| rhsa-2007:0950 | Red Hat Security Advisory: JBoss Enterprise Application Platform security update | 2007-11-05T14:41:00+00:00 | 2025-11-21T17:32:24+00:00 |
| rhsa-2007_0950 | Red Hat Security Advisory: JBoss Enterprise Application Platform security update | 2007-11-05T14:41:00+00:00 | 2024-11-22T02:04:05+00:00 |
| rhsa-2007:0967 | Red Hat Security Advisory: pcre security update | 2007-11-05T16:07:00+00:00 | 2025-11-21T17:32:26+00:00 |
| rhsa-2007_0967 | Red Hat Security Advisory: pcre security update | 2007-11-05T16:07:00+00:00 | 2024-11-22T02:04:46+00:00 |
| rhsa-2007:0968 | Red Hat Security Advisory: pcre security update | 2007-11-05T16:11:00+00:00 | 2025-11-21T17:32:26+00:00 |
| rhsa-2007_0968 | Red Hat Security Advisory: pcre security update | 2007-11-05T16:11:00+00:00 | 2024-11-22T02:04:50+00:00 |
| rhsa-2007:0966 | Red Hat Security Advisory: perl security update | 2007-11-05T16:23:00+00:00 | 2025-11-21T17:32:26+00:00 |
| rhsa-2007_0966 | Red Hat Security Advisory: perl security update | 2007-11-05T16:23:00+00:00 | 2024-11-22T01:31:03+00:00 |
| rhsa-2007:1011 | Red Hat Security Advisory: perl security update | 2007-11-05T16:27:00+00:00 | 2025-11-21T17:32:30+00:00 |
| rhsa-2007_1011 | Red Hat Security Advisory: perl security update | 2007-11-05T16:27:00+00:00 | 2024-11-22T01:31:08+00:00 |
| rhba-2007:0565 | Red Hat Bug Fix Advisory: tcp_wrappers bug fix update | 2007-11-07T00:00:00+00:00 | 2025-11-21T17:20:49+00:00 |
| rhba-2007_0565 | Red Hat Bug Fix Advisory: tcp_wrappers bug fix update | 2007-11-07T00:00:00+00:00 | 2024-12-02T07:21:04+00:00 |
| rhsa-2007:0368 | Red Hat Security Advisory: tcpdump security and bug fix update | 2007-11-07T09:00:00+00:00 | 2025-11-21T17:31:39+00:00 |
| rhsa-2007:0540 | Red Hat Security Advisory: openssh security and bug fix update | 2007-11-07T09:00:00+00:00 | 2025-11-21T17:31:55+00:00 |
| rhsa-2007:0542 | Red Hat Security Advisory: mcstrans security and bug fix update | 2007-11-07T09:00:00+00:00 | 2026-01-13T22:41:03+00:00 |
| rhsa-2007:0555 | Red Hat Security Advisory: pam security, bug fix, and enhancement update | 2007-11-07T09:00:00+00:00 | 2025-11-21T17:31:54+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| icsa-23-166-12 | Siemens SINAMICS Medium Voltage Products | 2023-06-13T00:00:00.000000Z | 2023-06-14T00:00:00.000000Z |
| icsa-23-166-13 | Siemens SICAM A8000 Devices | 2023-06-13T00:00:00.000000Z | 2023-06-13T00:00:00.000000Z |
| icsa-23-166-14 | Siemens Teamcenter Visualization and JT2Go | 2023-06-13T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-164-01 | Datalogics Library Third-Party | 2023-06-13T06:00:00.000000Z | 2023-06-13T06:00:00.000000Z |
| icsa-23-164-02 | Rockwell Automation FactoryTalk Services Platform | 2023-06-13T06:00:00.000000Z | 2023-06-13T06:00:00.000000Z |
| icsa-23-164-03 | Rockwell Automation FactoryTalk Edge Gateway | 2023-06-13T06:00:00.000000Z | 2023-06-13T06:00:00.000000Z |
| icsa-23-164-04 | Rockwell Automation FactoryTalk Transaction Manager | 2023-06-13T06:00:00.000000Z | 2023-06-13T06:00:00.000000Z |
| icsa-23-166-01 | SUBNET PowerSYSTEM Center | 2023-06-15T06:00:00.000000Z | 2023-06-15T06:00:00.000000Z |
| icsa-23-166-02 | Advantech WebAccess/SCADA | 2023-06-15T06:00:00.000000Z | 2023-06-15T06:00:00.000000Z |
| icsa-23-171-01 | Enphase Envoy | 2023-06-20T06:00:00.000000Z | 2023-07-13T06:00:00.000000Z |
| icsa-23-171-02 | Enphase Installer Toolkit Android App | 2023-06-20T06:00:00.000000Z | 2023-06-20T06:00:00.000000Z |
| icsa-23-173-02 | Advantech R-SeeNet | 2023-06-20T06:00:00.000000Z | 2023-06-20T06:00:00.000000Z |
| icsa-23-173-03 | SpiderControl SCADAWebServer | 2023-06-23T06:00:00.000000Z | 2023-06-23T06:00:00.000000Z |
| icsa-23-178-01 | Hitachi Energy FOXMAN-UN and UNEM Products | 2023-06-27T06:00:00.000000Z | 2023-06-27T06:00:00.000000Z |
| icsa-25-160-02 | Hitachi Energy Relion 670 650 SAM600-IO Series | 2023-06-27T12:30:00.000000Z | 2025-05-27T12:30:00.000000Z |
| icsa-23-180-01 | Delta Electronics InfraSuite Device Master | 2023-06-29T06:00:00.000000Z | 2023-06-29T06:00:00.000000Z |
| icsa-23-180-02 | Schneider Electric EcoStruxure Operator Terminal Expert | 2023-06-29T06:00:00.000000Z | 2023-06-29T06:00:00.000000Z |
| icsa-23-180-03 | Ovarro TBox RTUs | 2023-06-29T06:00:00.000000Z | 2023-06-29T06:00:00.000000Z |
| icsa-23-180-04 | Mitsubishi Electric MELSEC-F Series | 2023-06-29T06:00:00.000000Z | 2023-07-11T06:00:00.000000Z |
| icsma-23-180-01 | Medtronic Paceart Optima System | 2023-06-29T06:00:00.000000Z | 2023-06-29T06:00:00.000000Z |
| icsa-23-187-01 | PiiGAB M-Bus | 2023-07-06T06:00:00.000000Z | 2023-07-06T06:00:00.000000Z |
| icsa-23-187-02 | ABUS TVIP | 2023-07-06T06:00:00.000000Z | 2023-07-06T06:00:00.000000Z |
| icsa-23-192-01 | Rockwell Automation Enhanced HIM | 2023-07-11T00:00:00.000000Z | 2023-07-11T00:00:00.000000Z |
| icsa-23-192-02 | Sensormatic Electronics iSTAR | 2023-07-11T00:00:00.000000Z | 2023-07-11T00:00:00.000000Z |
| icsa-23-194-01 | Siemens RUGGEDCOM ROX | 2023-07-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-194-02 | Siemens SiPass Integrated | 2023-07-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-194-03 | Siemens SIMATIC CN 4100 | 2023-07-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-194-04 | Siemens SIMATIC MV500 Devices | 2023-07-11T00:00:00.000000Z | 2025-05-06T06:00:00.000000Z |
| icsa-23-192-03 | Panasonic Control FPWin Pro7 | 2023-07-11T06:00:00.000000Z | 2023-07-11T06:00:00.000000Z |
| icsa-26-020-02 | Schneider Electric devices using CODESYS Runtime | 2023-07-11T07:15:18.000000Z | 2026-01-20T15:49:51.778731Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cisco-sa-pak-mem-exhst-3ke9fefy | Cisco IOS XR Software UDP Packet Memory Exhaustion Vulnerability | 2024-09-11T16:00:00+00:00 | 2024-09-11T16:00:00+00:00 |
| cisco-sa-c9800-cwa-acl-npsbhsna | Cisco IOS XE Software for Wireless Controllers CWA Pre-Authentication ACL Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-cpp-vfr-dos-nhhkggo | Cisco IOS XE Software IPv4 Fragmentation Reassembly Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-dnac-ssh-e4uodasj | Cisco Catalyst Center Static SSH Host Key Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-httpsrvr-dos-yozthut | Cisco IOS XE Software HTTP Server Telephony Services Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-webui-hfwnrgk | Cisco IOS and IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-ios-xe-sda-edge-dos-mbcbg9k | Cisco IOS XE Software SD-Access Fabric Edge Node Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-pim-apbvfysj | Cisco IOS XE Software Protocol Independent Multicast Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-repacl-9exgnbpd | Cisco IOS Software on Cisco Industrial Ethernet Series Switches Access Control List Bypass Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-rsvp-dos-oypvgvzf | Cisco IOS and IOS XE Software Resource Reservation Protocol Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-sdw-vedos-kqffhps3 | Cisco SD-WAN vEdge Software UDP Packet Validation Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-sdwan-utd-dos-hdatqxs | Cisco Catalyst SD-WAN Routers Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-sdwan-xss-zq4kpvyd | Cisco Catalyst SD-WAN Manager Cross-Site Scripting Vulnerability | 2024-09-25T16:00:00+00:00 | 2025-03-28T18:38:53+00:00 |
| cisco-sa-utd-snort3-dos-bypas-b4ouewxd | Cisco Unified Threat Defense Snort Intrusion Prevention System Engine for Cisco IOS XE Software Security Policy Bypass and Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-vlan-dos-27pur5rt | Cisco Catalyst 9000 Series Switches Denial of Service Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-10-04T21:53:25+00:00 |
| cisco-sa-webui-csrf-ycuyxkko | Cisco IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | 2024-09-25T16:00:00+00:00 | 2024-09-25T16:00:00+00:00 |
| cisco-sa-cimc-redfish-cominj-sbkv5zz | Cisco UCS B-Series, Managed C-Series, and X-Series Servers Redfish API Command Injection Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-expw-escalation-3bkz77bd | Cisco Expressway Series Privilege Escalation Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ise-info-disc-zyf2neex | Cisco Identity Services Engine Information Disclosure Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-meraki-mx-vpn-dos-by-qwukqv7x | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Session Takeover and Denial of Service Vulnerability | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:27+00:00 |
| cisco-sa-meraki-mx-vpn-dos-qtrhzg2 | Cisco Meraki MX and Z Series Teleworker Gateway AnyConnect VPN Denial of Service Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2025-06-02T14:22:28+00:00 |
| cisco-sa-ndfc-cidv-xvyx2wlj | Cisco Nexus Dashboard Fabric Controller Configuration Backup Information Disclosure Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndfc-cmdinj-uvyzrkfr | Cisco Nexus Dashboard Fabric Controller Arbitrary Command Execution Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndfc-ptrce-bushlbp | Cisco Nexus Dashboard Fabric Controller Remote Code Execution Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndfc-raci-t46k3jnn | Cisco Nexus Dashboard Fabric Controller REST API Command Injection Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndhs-idv-bk8vqedc | Cisco Nexus Dashboard Hosted Services Information Disclosure Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndhs-uaapi-jh4v6zpn | Cisco Nexus Dashboard and Nexus Dashboard Fabric Controller Unauthorized REST API Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-ndo-tlsvld-fduf3cpw | Cisco Nexus Dashboard Orchestrator SSL/TLS Certificate Validation Vulnerability | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-rv34x-privesc-rce-qe33tcms | Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers Privilege Escalation and Remote Command Execution Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| cisco-sa-sb-rv04x_rv32x_vulns-yj2osdhv | Cisco Small Business RV042, RV042G, RV320, and RV325 Routers Denial of Service and Remote Code Execution Vulnerabilities | 2024-10-02T16:00:00+00:00 | 2024-10-02T16:00:00+00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| msrc_cve-2022-21594 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-10-02T00:00:00.000Z | 2022-10-20T00:00:00.000Z |
| msrc_cve-2022-21599 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-10-02T00:00:00.000Z | 2022-10-20T00:00:00.000Z |
| msrc_cve-2022-21604 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-10-02T00:00:00.000Z | 2022-10-20T00:00:00.000Z |
| msrc_cve-2022-21608 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.7.39 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-10-02T00:00:00.000Z | 2022-10-20T00:00:00.000Z |
| msrc_cve-2022-21611 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-10-02T00:00:00.000Z | 2022-10-20T00:00:00.000Z |
| msrc_cve-2022-21617 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Connection Handling). Supported versions that are affected are 5.7.39 and prior and 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-10-02T00:00:00.000Z | 2022-10-20T00:00:00.000Z |
| msrc_cve-2022-21619 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a | 2022-10-02T00:00:00.000Z | 2025-10-01T23:11:15.000Z |
| msrc_cve-2022-21624 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web | 2022-10-02T00:00:00.000Z | 2025-10-01T23:11:15.000Z |
| msrc_cve-2022-21625 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-10-02T00:00:00.000Z | 2022-10-20T00:00:00.000Z |
| msrc_cve-2022-21626 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplie | 2022-10-02T00:00:00.000Z | 2025-10-01T23:11:15.000Z |
| msrc_cve-2022-21628 | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run o | 2022-10-02T00:00:00.000Z | 2025-10-01T23:11:16.000Z |
| msrc_cve-2022-21632 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Privileges). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-10-02T00:00:00.000Z | 2022-10-20T00:00:00.000Z |
| msrc_cve-2022-21633 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-10-02T00:00:00.000Z | 2022-10-20T00:00:00.000Z |
| msrc_cve-2022-21635 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H). | 2022-10-02T00:00:00.000Z | 2022-10-20T00:00:00.000Z |
| msrc_cve-2022-21637 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-10-02T00:00:00.000Z | 2022-10-20T00:00:00.000Z |
| msrc_cve-2022-21638 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-10-02T00:00:00.000Z | 2022-10-20T00:00:00.000Z |
| msrc_cve-2022-21640 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-10-02T00:00:00.000Z | 2022-10-20T00:00:00.000Z |
| msrc_cve-2022-21641 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.29 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | 2022-10-02T00:00:00.000Z | 2022-10-20T00:00:00.000Z |
| msrc_cve-2022-2879 | Unbounded memory consumption when reading headers in archive/tar | 2022-10-02T00:00:00.000Z | 2024-09-11T00:00:00.000Z |
| msrc_cve-2022-2880 | Incorrect sanitization of forwarded query parameters in net/http/httputil | 2022-10-02T00:00:00.000Z | 2022-10-19T00:00:00.000Z |
| msrc_cve-2022-2928 | An option refcount overflow exists in dhcpd | 2022-10-02T00:00:00.000Z | 2024-07-12T00:00:00.000Z |
| msrc_cve-2022-2929 | DHCP memory leak | 2022-10-02T00:00:00.000Z | 2024-07-12T00:00:00.000Z |
| msrc_cve-2022-3165 | An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message resulting in a denial of service. | 2022-10-02T00:00:00.000Z | 2024-09-11T00:00:00.000Z |
| msrc_cve-2022-3171 | Memory handling vulnerability in ProtocolBuffers Java core and lite | 2022-10-02T00:00:00.000Z | 2024-09-11T00:00:00.000Z |
| msrc_cve-2022-32149 | Denial of service via crafted Accept-Language header in golang.org/x/text/language | 2022-10-02T00:00:00.000Z | 2025-05-27T00:00:00.000Z |
| msrc_cve-2022-3344 | A flaw was found in the KVM's AMD nested virtualization (SVM). A malicious L1 guest could purposely fail to intercept the shutdown of a cooperative nested guest (L2) possibly leading to a page fault and kernel panic in the host (L0). | 2022-10-02T00:00:00.000Z | 2022-10-29T00:00:00.000Z |
| msrc_cve-2022-3474 | Bazel leaks user credentials through the remote assets API | 2022-10-02T00:00:00.000Z | 2024-12-03T00:00:00.000Z |
| msrc_cve-2022-3521 | Linux Kernel kcm kcmsock.c kcm_tx_work race condition | 2022-10-02T00:00:00.000Z | 2022-10-19T00:00:00.000Z |
| msrc_cve-2022-3533 | Linux Kernel BPF usdt.c parse_usdt_arg memory leak | 2022-10-02T00:00:00.000Z | 2023-07-21T00:00:00.000Z |
| msrc_cve-2022-3541 | Linux Kernel BPF spl2sw_driver.c spl2sw_nvmem_get_mac_address use after free | 2022-10-02T00:00:00.000Z | 2022-10-19T00:00:00.000Z |
| ID | Description | Updated |
|---|---|---|
| var-202107-1886 | Axis is an IT company that specializes in providing network video solutions. AXIS M11… | 2022-05-04T10:10:31.185000Z |
| var-202107-1907 | SecPath ACG1000 is a new generation of virtualized application control gateway specially … | 2022-05-04T10:10:31.174000Z |
| var-202106-2263 | Hangzhou Hikvision System Technology Co., Ltd. is a smart IoT solution provider and opera… | 2022-05-04T10:10:34.997000Z |
| var-202106-2284 | Matsushita Electric (China) Co., Ltd. is mainly responsible for the sales and after-sales… | 2022-05-04T10:10:34.985000Z |
| var-202106-2305 | OPPO Find x is a smartphone launched by OPPO Guangdong Mobile Communications Co., Ltd. … | 2022-05-04T10:10:34.974000Z |
| var-202106-2326 | Hikvision is a video-centric intelligent IoT solution and big data service provider. … | 2022-05-04T10:10:34.963000Z |
| var-202107-0508 | IBM MQ Appliance 9.1 and 9.2 is vulnerable to cross-site request forgery which could allo… | 2022-05-04T10:10:34.479000Z |
| var-202105-1575 | D-Link Electronic Equipment (Shanghai) Co., Ltd. was established on August 13, 2002. The … | 2022-05-04T10:10:35.670000Z |
| var-202105-1596 | Shenzhen Jixiang Tengda Technology Co., Ltd. (hereinafter referred to as "Tengda") was fo… | 2022-05-04T10:10:35.660000Z |
| var-202105-1617 | Enterprising 750W is an enterprise-class wireless router. Shanghai Aitai Technology C… | 2022-05-04T10:10:35.649000Z |
| var-202105-1638 | Xpon-ONU is a router. Xpon-ONU has a weak password vulnerability, which can be exploi… | 2022-05-04T10:10:35.633000Z |
| var-202105-1659 | NR255P is a new generation of high-performance QOS router developed by Shenzhen Leike Ind… | 2022-05-04T10:10:35.622000Z |
| var-202105-1680 | WX2560H is a gateway wireless controller independently developed by New H3C Technology Co… | 2022-05-04T10:10:35.611000Z |
| var-202105-1701 | Taiyuan Yisi Software Technology Co., Ltd. is an Internet software development and system… | 2022-05-04T10:10:35.599000Z |
| var-202106-1948 | Apache HTTP Server is an open source web server of the Apache Foundation. The server is f… | 2022-05-04T10:10:35.155000Z |
| var-202106-2011 | NETGEAR DGN1000 is a wireless router. NETGEAR DGN1000 has a weak password vulnerabili… | 2022-05-04T10:10:35.143000Z |
| var-202106-2032 | The micro-enterprise integrated gateway is a VPN router under the Tenda brand. Tenda … | 2022-05-04T10:10:35.127000Z |
| var-202106-2053 | ZXV10 W815N is a wireless router of ZTE Corporation. ZTE Corporation ZXV10 W815N has … | 2022-05-04T10:10:35.117000Z |
| var-202106-2074 | Matsushita Electric (China) Co., Ltd. is mainly responsible for the sales and after-sales… | 2022-05-04T10:10:35.106000Z |
| var-202106-2095 | ZTE Corporation is the world's leading provider of integrated communications solutions. T… | 2022-05-04T10:10:35.095000Z |
| var-202106-2116 | Ruckus R310 is a wireless access point product of Ruckus Wireless. Ruckus Wireless Ru… | 2022-05-04T10:10:35.083000Z |
| var-202106-2137 | D-Link DIR-809 is a wireless router using RTOS. D-Link DIR-809 has a denial of servic… | 2022-05-04T10:10:35.067000Z |
| var-202106-2158 | The NETGEAR WNR3500L router is a wireless router device. The NETGEAR WNR3500L router … | 2022-05-04T10:10:35.055000Z |
| var-202106-2179 | EA6350 is a router product of Belkin Company. Belkin's EA6350 has a weak password vul… | 2022-05-04T10:10:35.045000Z |
| var-202106-2200 | Tenda AC11 is a wireless router that uses RTOS operating system. Shenzhen Jixiang Ten… | 2022-05-04T10:10:35.035000Z |
| var-202106-2221 | Prolink Technology Co., Ltd. is the world's leading supplier of network communication equ… | 2022-05-04T10:10:35.024000Z |
| var-202106-2242 | China Telecom Group Co., Ltd. was established in September 2000. It is a large-scale stat… | 2022-05-04T10:10:35.012000Z |
| var-202104-1990 | Hikvision is a video-centric IoT solution provider, providing comprehensive security, sma… | 2022-05-04T10:10:36.226000Z |
| var-202104-2011 | ZTE Corporation is the world's leading provider of integrated communications solutions. … | 2022-05-04T10:10:36.210000Z |
| var-202104-2032 | MAS mobile proxy server is an access tool that assists enterprises in realizing wireless … | 2022-05-04T10:10:36.199000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2022-001382 | File Permission Vulnerability in Hitachi Command Suite | 2022-03-07T15:35+09:00 | 2022-03-07T15:35+09:00 |
| jvndb-2022-001383 | Directory Permission Vulnerability in Hitachi Ops Center Viewpoint | 2022-03-07T15:45+09:00 | 2022-03-07T15:45+09:00 |
| jvndb-2022-001384 | Multiple vulnerabilities in OMRON CX-Programmer | 2022-03-08T15:56+09:00 | 2024-06-21T11:32+09:00 |
| jvndb-2022-001387 | Installer of WPS Office for Windows misconfigures the ACL for the installation directory | 2022-03-09T12:30+09:00 | 2024-06-21T11:37+09:00 |
| jvndb-2022-000016 | UNIVERGE WA Series vulnerable to OS command injection | 2022-03-10T14:31+09:00 | 2022-03-10T14:31+09:00 |
| jvndb-2022-001404 | Installer of Trend Micro Password Manager may insecurely load Dynamic Link Libraries | 2022-03-11T15:55+09:00 | 2022-03-11T15:55+09:00 |
| jvndb-2021-008345 | Installer of Trend Micro Portable Security may insecurely load Dynamic Link Libraries | 2022-03-14T16:43+09:00 | 2022-03-14T16:43+09:00 |
| jvndb-2022-000020 | Multiple vulnerabilities in pfSense | 2022-03-15T14:58+09:00 | 2024-06-21T11:59+09:00 |
| jvndb-2022-000021 | Multiple vulnerabilities in KINGSOFT "WPS Office" and "KINGSOFT Internet Security" | 2022-03-16T14:46+09:00 | 2022-03-16T14:46+09:00 |
| jvndb-2022-001477 | Netcommunity OG410X and OG810X VoIP gateway/Hikari VoIP adapter for business offices vulnerable to OS command injection | 2022-03-23T12:08+09:00 | 2022-03-23T12:08+09:00 |
| jvndb-2022-000022 | AttacheCase may insecurely load Dynamic Link Libraries | 2022-03-30T14:00+09:00 | 2024-06-21T11:42+09:00 |
| jvndb-2022-000023 | WordPress Plugin "Advanced Custom Fields" vulnerable to missing authorization | 2022-03-30T15:23+09:00 | 2024-06-21T12:25+09:00 |
| jvndb-2022-000024 | Zero-channel BBS Plus vulnerable to cross-site scripting | 2022-03-30T15:36+09:00 | 2024-06-20T17:34+09:00 |
| jvndb-2022-001494 | Trend Micro Apex Central and Trend Micro Apex Central as a Service vulnerable to improper check for file contents | 2022-03-31T17:25+09:00 | 2022-03-31T17:25+09:00 |
| jvndb-2022-001526 | Trend Micro Antivirus for Mac vulnerable to privilege escalation | 2022-04-07T16:58+09:00 | 2022-04-07T16:58+09:00 |
| jvndb-2022-000026 | WordPress Plugin "MicroPayments - Paid Author Subscriptions, Content, Downloads, Membership" vulnerable to cross-site request forgery | 2022-04-15T13:15+09:00 | 2024-06-25T18:04+09:00 |
| jvndb-2022-000027 | Hammock AssetView missing authentication for critical functions | 2022-04-22T13:53+09:00 | 2024-06-20T12:15+09:00 |
| jvndb-2022-000028 | Multiple vulnerabilities in multiple MEIKYO ELECTRIC products | 2022-05-09T14:31+09:00 | 2024-06-19T15:55+09:00 |
| jvndb-2022-000029 | KOYO Electronics Screen Creator Advance2 vulnerable to authentication bypass | 2022-05-09T14:43+09:00 | 2024-06-19T16:03+09:00 |
| jvndb-2022-000030 | Multiple vulnerabilities in Operation management interface of FUJITSU Network IPCOM | 2022-05-09T15:02+09:00 | 2024-07-18T16:30+09:00 |
| jvndb-2022-000031 | GENEREX RCCMD vulnerable to directory traversal | 2022-05-10T15:47+09:00 | 2024-06-18T15:35+09:00 |
| jvndb-2022-000032 | Installer of Trend Micro Password Manager may insecurely load Dynamic Link Libraries | 2022-05-11T15:21+09:00 | 2024-06-18T17:46+09:00 |
| jvndb-2022-001795 | Command injection vulnerability in QNAP VioStar series NVR | 2022-05-12T18:07+09:00 | 2024-06-20T11:31+09:00 |
| jvndb-2022-001800 | Installer of Trend Micro HouseCall for Home Networks may insecurely load Dynamic Link Libraries | 2022-05-13T16:24+09:00 | 2022-05-13T16:24+09:00 |
| jvndb-2022-000034 | EC-CUBE plugin "Easy Blog for EC-CUBE4" vulnerable to cross-site request forgery | 2022-05-13T16:31+09:00 | 2024-06-18T12:13+09:00 |
| jvndb-2022-000033 | Strapi vulnerable to cross-site scripting | 2022-05-13T16:45+09:00 | 2024-06-18T11:17+09:00 |
| jvndb-2022-000035 | Multiple vulnerabilities in Cybozu Garoon | 2022-05-16T14:25+09:00 | 2024-06-17T16:34+09:00 |
| jvndb-2022-000036 | Multiple vulnerabilities in Rakuten Casa | 2022-05-19T15:13+09:00 | 2024-06-18T12:09+09:00 |
| jvndb-2022-000037 | Spring Security OAuth (spring-security-oauth2) vulnerable to denial-of-service (DoS) | 2022-05-20T17:04+09:00 | 2024-06-20T12:09+09:00 |
| jvndb-2022-000038 | WordPress plugin "WP Statistics" vulnerable to cross-site scripting | 2022-05-24T15:00+09:00 | 2024-06-18T15:41+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-02432 | IBM InfoSphere Information Server安全绕过漏洞 | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02439 | IBM Security SiteProtector System本地信息泄露漏洞 | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02440 | IBM Security SiteProtector安全绕过漏洞 | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02441 | IBM Security SiteProtector System远程命令执行漏洞 | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02442 | IBM Security SiteProtector System跨站脚本漏洞 | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02443 | Microsoft Office组件内存错误引用漏洞 | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02444 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02444) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02445 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02445) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02446 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02446) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02447 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02447) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02448 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02448) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02449 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02449) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02450 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02450) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02451 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02451) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02452 | Microsoft Internet Explorer内存破坏漏洞(CNVD-2015-02452) | 2015-04-15 | 2015-04-16 |
| cnvd-2015-02508 | HP存在多个远程代码执行漏洞 | 2015-04-15 | 2015-04-17 |
| cnvd-2015-02509 | Microsoft Office内存破坏漏洞(CNVD-2015-02509) | 2015-04-15 | 2015-04-17 |
| cnvd-2015-02510 | Microsoft Outlook App for Mac跨站脚本漏洞 | 2015-04-15 | 2015-04-17 |
| cnvd-2015-02511 | Microsoft Office组件内存错误引用漏洞(CNVD-2015-02511) | 2015-04-15 | 2015-04-17 |
| cnvd-2015-02512 | Microsoft Office组件内存错误引用漏洞(CNVD-2015-02512) | 2015-04-15 | 2015-04-17 |
| cnvd-2015-02543 | Chrony内存破坏漏洞 | 2015-04-15 | 2015-04-20 |
| cnvd-2015-02544 | HP存在多个权限提升漏洞 | 2015-04-15 | 2015-04-20 |
| cnvd-2015-02545 | das_watchdog 'XAUTHORITY'环境变量处理缓冲区溢出漏洞 | 2015-04-15 | 2015-04-20 |
| cnvd-2015-02422 | Microsoft IIS远程代码执行漏洞 | 2015-04-16 | 2015-04-17 |
| cnvd-2015-02479 | Microsoft Windows NtCreateTransactionManager类型混淆漏洞 | 2015-04-16 | 2015-04-17 |
| cnvd-2015-02480 | Microsoft ASP.NET信息泄露漏洞 | 2015-04-16 | 2015-04-17 |
| cnvd-2015-02481 | Microsoft Windows MS-DOS设备名漏洞 | 2015-04-16 | 2015-04-17 |
| cnvd-2015-02482 | Microsoft Windows MSXML3同源策略SFB漏洞 | 2015-04-16 | 2015-04-17 |
| cnvd-2015-02483 | Microsoft Windows ADFS信息泄露漏洞 | 2015-04-16 | 2015-04-17 |
| cnvd-2015-02484 | Microsoft SharePoint Server跨站脚本漏洞(CNVD-2015-02484) | 2015-04-16 | 2015-04-17 |
| ID | Description | Published | Updated |
|---|---|---|---|
| CERTA-2005-AVI-022 | Vulnérabilité de Ethereal | 2005-01-24T00:00:00.000000 | 2005-02-17T00:00:00.000000 |
| CERTA-2005-AVI-023 | Multiples vulnérabilités du noyau Linux | 2005-01-24T00:00:00.000000 | 2005-02-21T00:00:00.000000 |
| CERTA-2005-AVI-024 | Vulnérabilité de Veritas Backup Exec | 2005-01-24T00:00:00.000000 | 2005-01-24T00:00:00.000000 |
| CERTA-2005-AVI-025 | Correctif de sécurité cumulatif pour les produits Oracle | 2005-01-24T00:00:00.000000 | 2005-01-24T00:00:00.000000 |
| CERTA-2005-AVI-026 | Vulnérabilité des points d'accès 3Com OfficeConnect Wireless 11g | 2005-01-24T00:00:00.000000 | 2005-01-24T00:00:00.000000 |
| CERTA-2005-AVI-027 | Vulnérabilité de Konversation | 2005-01-24T00:00:00.000000 | 2005-02-14T00:00:00.000000 |
| CERTA-2005-AVI-028 | Failles dans les greffons Java de Sun | 2005-01-24T00:00:00.000000 | 2005-01-24T00:00:00.000000 |
| certa-2005-avi-022 | Vulnérabilité de Ethereal | 2005-01-24T00:00:00.000000 | 2005-02-17T00:00:00.000000 |
| certa-2005-avi-023 | Multiples vulnérabilités du noyau Linux | 2005-01-24T00:00:00.000000 | 2005-02-21T00:00:00.000000 |
| certa-2005-avi-024 | Vulnérabilité de Veritas Backup Exec | 2005-01-24T00:00:00.000000 | 2005-01-24T00:00:00.000000 |
| certa-2005-avi-025 | Correctif de sécurité cumulatif pour les produits Oracle | 2005-01-24T00:00:00.000000 | 2005-01-24T00:00:00.000000 |
| certa-2005-avi-026 | Vulnérabilité des points d'accès 3Com OfficeConnect Wireless 11g | 2005-01-24T00:00:00.000000 | 2005-01-24T00:00:00.000000 |
| certa-2005-avi-027 | Vulnérabilité de Konversation | 2005-01-24T00:00:00.000000 | 2005-02-14T00:00:00.000000 |
| certa-2005-avi-028 | Failles dans les greffons Java de Sun | 2005-01-24T00:00:00.000000 | 2005-01-24T00:00:00.000000 |
| CERTA-2005-AVI-029 | Vulnérabilité du système d'exploitation Cisco IOS | 2005-01-26T00:00:00.000000 | 2005-01-26T00:00:00.000000 |
| certa-2005-avi-029 | Vulnérabilité du système d'exploitation Cisco IOS | 2005-01-26T00:00:00.000000 | 2005-01-26T00:00:00.000000 |
| CERTA-2005-AVI-030 | Vulnérabilités dans le traitement des paquets BGP par Cisco IOS | 2005-01-27T00:00:00.000000 | 2005-01-27T00:00:00.000000 |
| CERTA-2005-AVI-031 | Vulnérabilité les routeurs Cisco supportant MPLS | 2005-01-27T00:00:00.000000 | 2005-01-27T00:00:00.000000 |
| CERTA-2005-AVI-032 | Vulnérabilité IPv6 dans Cisco IOS | 2005-01-27T00:00:00.000000 | 2005-01-27T00:00:00.000000 |
| CERTA-2005-AVI-033 | Vulnérabilité des serveurs DNS BIND | 2005-01-27T00:00:00.000000 | 2005-06-10T00:00:00.000000 |
| CERTA-2005-AVI-034 | Multiples vulnérabilités dans Mac OS X | 2005-01-27T00:00:00.000000 | 2005-06-23T00:00:00.000000 |
| CERTA-2005-AVI-035 | Vulnérabilité de AWStats | 2005-01-27T00:00:00.000000 | 2005-02-18T00:00:00.000000 |
| certa-2005-avi-030 | Vulnérabilités dans le traitement des paquets BGP par Cisco IOS | 2005-01-27T00:00:00.000000 | 2005-01-27T00:00:00.000000 |
| certa-2005-avi-031 | Vulnérabilité les routeurs Cisco supportant MPLS | 2005-01-27T00:00:00.000000 | 2005-01-27T00:00:00.000000 |
| certa-2005-avi-032 | Vulnérabilité IPv6 dans Cisco IOS | 2005-01-27T00:00:00.000000 | 2005-01-27T00:00:00.000000 |
| certa-2005-avi-033 | Vulnérabilité des serveurs DNS BIND | 2005-01-27T00:00:00.000000 | 2005-06-10T00:00:00.000000 |
| certa-2005-avi-034 | Multiples vulnérabilités dans Mac OS X | 2005-01-27T00:00:00.000000 | 2005-06-23T00:00:00.000000 |
| certa-2005-avi-035 | Vulnérabilité de AWStats | 2005-01-27T00:00:00.000000 | 2005-02-18T00:00:00.000000 |
| CERTA-2005-AVI-036 | Vulnérabilité dans WinAMP | 2005-01-28T00:00:00.000000 | 2005-01-28T00:00:00.000000 |
| certa-2005-avi-036 | Vulnérabilité dans WinAMP | 2005-01-28T00:00:00.000000 | 2005-01-28T00:00:00.000000 |