Security Update for ServiceNow Platform | CVE-2024-8924 | 2024/10/31 | development |
Security Update for Libexpat | CVE-2024-50602 | 2024/10/30 | development |
Cisco ASA and FTD Denial-of-Service Vulnerability (CVE-2024-20481) | CVE-2024-20481 | 2024/10/24 | development |
Security Update for Zyxel | CVE-2024-9677 | 2024/10/23 | development |
oracle CPUOct2024: Oracle BI Publisher | CVE-2024-21254, CVE-2024-21195, CVE-2024-38809, CVE-2024-29736 | 2024/10/23 | development |
Security Update for SolarWinds Kiwi CatTools | CVE-2024-45713 | 2024/10/23 | development |
cisco cisco-sa-ccmpdm-rxss-tAX76U3k: Cisco Unified Contact Center Management Portal Reflected Cross-Site Scripting Vulnerability | CVE-2024-20512 | 2024/10/17 | development |
Security Update for SolarWinds Platform (2024 October) | CVE-2024-45715, CVE-2024-45710 | 2024/10/17 | development |
oracle CPUOct2024: Oracle Business Intelligence Enterprise Edition / Oracle Analytics Server | CVE-2023-35116, CVE-2024-26308, CVE-2022-23305, CVE-2024-29133, CVE-2023-0401, CVE-2023-5678, CVE-2023-38545, CVE-2024-38999 | 2024/10/17 | development |
juniper JSA88106: JSA88106 : 2024-10 Security Bulletin: Junos OS Evolved: Low privileged local user able to view NETCONF traceoptions files (CVE-2024-39544) | CVE-2024-39563, CVE-2024-39525, CVE-2024-47493, CVE-2024-47503, CVE-2024-47497, CVE-2024-47491, CVE-2024-47489, CVE-2024-47508, CVE-2024-47507, CVE-2024-47502, CVE-2024-47505, CVE-2024-39526, CVE-2024-47495, CVE-2024-47504, CVE-2024-47494, CVE-2024-39534, CVE-2024-39544, CVE-2024-47496, CVE-2024-47509, CVE-2024-39515, CVE-2024-47499, CVE-2024-39527, CVE-2024-39516, CVE-2024-47506, CVE-2024-47498, CVE-2024-39547 | 2024/10/16 | development |
juniper JSA88136: JSA88136 : 2024-10 Security Bulletin: Junos OS Evolved: Specific low privileged CLI commands and SNMP GET requests can trigger a resource leak | CVE-2024-39563, CVE-2024-39525, CVE-2024-47493, CVE-2024-47503, CVE-2024-47497, CVE-2024-47491, CVE-2024-47489, CVE-2024-47508, CVE-2024-47507, CVE-2024-47502, CVE-2024-47505, CVE-2024-39526, CVE-2024-47495, CVE-2024-47504, CVE-2024-47494, CVE-2024-39534, CVE-2024-39544, CVE-2024-47496, CVE-2024-47509, CVE-2024-39515, CVE-2024-47499, CVE-2024-39527, CVE-2024-39516, CVE-2024-47506, CVE-2024-47498, CVE-2024-39547 | 2024/10/16 | development |
juniper JSA88138: JSA88138 : 2024-10 Security Bulletin: Junos OS and Junos OS Evolved: BGP update message containing aggregator attribute with an ASN value of zero (0) is accepted (CVE-2024-47507) | CVE-2024-39563, CVE-2024-39525, CVE-2024-47493, CVE-2024-47503, CVE-2024-47497, CVE-2024-47491, CVE-2024-47489, CVE-2024-47508, CVE-2024-47507, CVE-2024-47502, CVE-2024-47505, CVE-2024-39526, CVE-2024-47495, CVE-2024-47504, CVE-2024-47494, CVE-2024-39534, CVE-2024-39544, CVE-2024-47496, CVE-2024-47509, CVE-2024-39515, CVE-2024-47499, CVE-2024-39527, CVE-2024-39516, CVE-2024-47506, CVE-2024-47498, CVE-2024-39547 | 2024/10/16 | development |
juniper JSA88105: JSA88105 : 2024-10 Security Bulletin: Junos OS Evolved: Connections to the network and broadcast address accepted (CVE-2024-39534) | CVE-2024-39563, CVE-2024-39525, CVE-2024-47493, CVE-2024-47503, CVE-2024-47497, CVE-2024-47491, CVE-2024-47489, CVE-2024-47508, CVE-2024-47507, CVE-2024-47502, CVE-2024-47505, CVE-2024-39526, CVE-2024-47495, CVE-2024-47504, CVE-2024-47494, CVE-2024-39534, CVE-2024-39544, CVE-2024-47496, CVE-2024-47509, CVE-2024-39515, CVE-2024-47499, CVE-2024-39527, CVE-2024-39516, CVE-2024-47506, CVE-2024-47498, CVE-2024-39547 | 2024/10/16 | development |
juniper JSA88121: JSA88121 : 2024-10 Security Bulletin: Junos OS: Due to a race condition AgentD process causes a memory corruption and FPC reset (CVE-2024-47494) | CVE-2024-39563, CVE-2024-39525, CVE-2024-47493, CVE-2024-47503, CVE-2024-47497, CVE-2024-47491, CVE-2024-47489, CVE-2024-47508, CVE-2024-47507, CVE-2024-47502, CVE-2024-47505, CVE-2024-39526, CVE-2024-47495, CVE-2024-47504, CVE-2024-47494, CVE-2024-39534, CVE-2024-39544, CVE-2024-47496, CVE-2024-47509, CVE-2024-39515, CVE-2024-47499, CVE-2024-39527, CVE-2024-39516, CVE-2024-47506, CVE-2024-47498, CVE-2024-39547 | 2024/10/16 | development |
juniper JSA88099: JSA88099 : 2024-10 Security Bulletin: Junos OS and Junos OS Evolved: With BGP traceoptions enabled, receipt of specially crafted BGP update causes RPD crash (CVE-2024-39515) | CVE-2024-39563, CVE-2024-39525, CVE-2024-47493, CVE-2024-47503, CVE-2024-47497, CVE-2024-47491, CVE-2024-47489, CVE-2024-47508, CVE-2024-47507, CVE-2024-47502, CVE-2024-47505, CVE-2024-39526, CVE-2024-47495, CVE-2024-47504, CVE-2024-47494, CVE-2024-39534, CVE-2024-39544, CVE-2024-47496, CVE-2024-47509, CVE-2024-39515, CVE-2024-47499, CVE-2024-39527, CVE-2024-39516, CVE-2024-47506, CVE-2024-47498, CVE-2024-39547 | 2024/10/16 | development |
juniper JSA88134: JSA88134 : 2024-10 Security Bulletin: Junos OS: SRX5000 Series: Receipt of a specific malformed packet will cause a flowd crash (CVE-2024-47504) | CVE-2024-39563, CVE-2024-39525, CVE-2024-47493, CVE-2024-47503, CVE-2024-47497, CVE-2024-47491, CVE-2024-47489, CVE-2024-47508, CVE-2024-47507, CVE-2024-47502, CVE-2024-47505, CVE-2024-39526, CVE-2024-47495, CVE-2024-47504, CVE-2024-47494, CVE-2024-39534, CVE-2024-39544, CVE-2024-47496, CVE-2024-47509, CVE-2024-39515, CVE-2024-47499, CVE-2024-39527, CVE-2024-39516, CVE-2024-47506, CVE-2024-47498, CVE-2024-39547 | 2024/10/16 | development |
juniper JSA88108: JSA88108 : 2024-10 Security Bulletin: Junos OS and Junos OS Evolved: cRPD: Receipt of crafted TCP traffic can trigger high CPU utilization (CVE-2024-39547) | CVE-2024-39563, CVE-2024-39525, CVE-2024-47493, CVE-2024-47503, CVE-2024-47497, CVE-2024-47491, CVE-2024-47489, CVE-2024-47508, CVE-2024-47507, CVE-2024-47502, CVE-2024-47505, CVE-2024-39526, CVE-2024-47495, CVE-2024-47504, CVE-2024-47494, CVE-2024-39534, CVE-2024-39544, CVE-2024-47496, CVE-2024-47509, CVE-2024-39515, CVE-2024-47499, CVE-2024-39527, CVE-2024-39516, CVE-2024-47506, CVE-2024-47498, CVE-2024-39547 | 2024/10/16 | development |
juniper JSA88102: JSA88102 : 2024-10 Security Bulletin: Junos OS and Junos OS Evolved: When BGP nexthop traceoptions is enabled, receipt of specially crafted BGP packet causes RPD crash (CVE-2024-3952 | CVE-2024-39563, CVE-2024-39525, CVE-2024-47493, CVE-2024-47503, CVE-2024-47497, CVE-2024-47491, CVE-2024-47489, CVE-2024-47508, CVE-2024-47507, CVE-2024-47502, CVE-2024-47505, CVE-2024-39526, CVE-2024-47495, CVE-2024-47504, CVE-2024-47494, CVE-2024-39534, CVE-2024-39544, CVE-2024-47496, CVE-2024-47509, CVE-2024-39515, CVE-2024-47499, CVE-2024-39527, CVE-2024-39516, CVE-2024-47506, CVE-2024-47498, CVE-2024-39547 | 2024/10/16 | development |
juniper JSA88100: JSA88100 : 2024-10 Security Bulletin: Junos OS and Junos OS Evolved: Junos OS and Junos OS Evolved: Receipt of a specifically malformed BGP packet causes RPD crash when segment routi | CVE-2024-39563, CVE-2024-39525, CVE-2024-47493, CVE-2024-47503, CVE-2024-47497, CVE-2024-47491, CVE-2024-47489, CVE-2024-47508, CVE-2024-47507, CVE-2024-47502, CVE-2024-47505, CVE-2024-39526, CVE-2024-47495, CVE-2024-47504, CVE-2024-47494, CVE-2024-39534, CVE-2024-39544, CVE-2024-47496, CVE-2024-47509, CVE-2024-39515, CVE-2024-47499, CVE-2024-39527, CVE-2024-39516, CVE-2024-47506, CVE-2024-47498, CVE-2024-39547 | 2024/10/16 | development |
juniper JSA88129: JSA88129 : 2024-10 Security Bulletin: Junos OS and Junos OS Evolved: In a BMP scenario receipt of a malformed AS PATH attribute can cause an RPD core (CVE-2024-47499) | CVE-2024-39563, CVE-2024-39525, CVE-2024-47493, CVE-2024-47503, CVE-2024-47497, CVE-2024-47491, CVE-2024-47489, CVE-2024-47508, CVE-2024-47507, CVE-2024-47502, CVE-2024-47505, CVE-2024-39526, CVE-2024-47495, CVE-2024-47504, CVE-2024-47494, CVE-2024-39534, CVE-2024-39544, CVE-2024-47496, CVE-2024-47509, CVE-2024-39515, CVE-2024-47499, CVE-2024-39527, CVE-2024-39516, CVE-2024-47506, CVE-2024-47498, CVE-2024-39547 | 2024/10/16 | development |
juniper JSA88104: JSA88104 : 2024-10 Security Bulletin: Junos OS: SRX Series: Low privileged user able to access sensitive information on file system (CVE-2024-39527) | CVE-2024-39563, CVE-2024-39525, CVE-2024-47493, CVE-2024-47503, CVE-2024-47497, CVE-2024-47491, CVE-2024-47489, CVE-2024-47508, CVE-2024-47507, CVE-2024-47502, CVE-2024-47505, CVE-2024-39526, CVE-2024-47495, CVE-2024-47504, CVE-2024-47494, CVE-2024-39534, CVE-2024-39544, CVE-2024-47496, CVE-2024-47509, CVE-2024-39515, CVE-2024-47499, CVE-2024-39527, CVE-2024-39516, CVE-2024-47506, CVE-2024-47498, CVE-2024-39547 | 2024/10/16 | development |
juniper JSA88100: JSA88100 : 2024-10 Security Bulletin: Junos OS and Junos OS Evolved: With BGP traceoptions enabled, receipt of specifically malformed BGP update causes RPD crash (CVE-2024-39516) | CVE-2024-39563, CVE-2024-39525, CVE-2024-47493, CVE-2024-47503, CVE-2024-47497, CVE-2024-47491, CVE-2024-47489, CVE-2024-47508, CVE-2024-47507, CVE-2024-47502, CVE-2024-47505, CVE-2024-39526, CVE-2024-47495, CVE-2024-47504, CVE-2024-47494, CVE-2024-39534, CVE-2024-39544, CVE-2024-47496, CVE-2024-47509, CVE-2024-39515, CVE-2024-47499, CVE-2024-39527, CVE-2024-39516, CVE-2024-47506, CVE-2024-47498, CVE-2024-39547 | 2024/10/16 | development |
oracle CPUOct2024: Access Manager | CVE-2024-2511, CVE-2024-23807, CVE-2024-40898, CVE-2024-7264 | 2024/10/15 | development |
oracle CPUOct2024: MySQL Cluster 8.0.39 | CVE-2024-21203, CVE-2023-45853, CVE-2024-21201, CVE-2024-21199, CVE-2024-5535, CVE-2024-21194, CVE-2024-21241, CVE-2024-21238, CVE-2024-6119, CVE-2024-21218, CVE-2024-21198, CVE-2024-21262, CVE-2024-21196, CVE-2024-21244, CVE-2024-28182, CVE-2024-21247, CVE-2024-21207, CVE-2024-21232, CVE-2024-21243, CVE-2024-21212, CVE-2024-21213, CVE-2024-21237, CVE-2024-21230, CVE-2024-21231, CVE-2024-21236, CVE-2024-37371, CVE-2024-21219, CVE-2024-7264, CVE-2024-21239, CVE-2024-21200, CVE-2024-21272, CVE-2024-21193, CVE-2024-39689, CVE-2024-21197, CVE-2024-21209, CVE-2024-21204 | 2024/10/15 | development |
oracle CPUOct2024: MySQL Cluster 8.0.40 | CVE-2024-21203, CVE-2023-45853, CVE-2024-21201, CVE-2024-21199, CVE-2024-5535, CVE-2024-21194, CVE-2024-21241, CVE-2024-21238, CVE-2024-6119, CVE-2024-21218, CVE-2024-37370, CVE-2024-23807, CVE-2024-21198, CVE-2024-21262, CVE-2024-21196, CVE-2024-21244, CVE-2024-28182, CVE-2024-21247, CVE-2024-21207, CVE-2024-21232, CVE-2024-2511, CVE-2024-21243, CVE-2024-21212, CVE-2024-21213, CVE-2024-21237, CVE-2024-21230, CVE-2024-21231, CVE-2024-21236, CVE-2024-37371, CVE-2024-21219, CVE-2024-7264, CVE-2024-21239, CVE-2024-21200, CVE-2024-21272, CVE-2024-21193, CVE-2024-39689, CVE-2024-21197, CVE-2024-40898, CVE-2024-21209, CVE-2024-21204 | 2024/10/15 | development |
oracle CPUOct2024: MySQL Server 8.4.3 | CVE-2024-21203, CVE-2024-21201, CVE-2024-21199, CVE-2024-5535, CVE-2024-21194, CVE-2024-21241, CVE-2024-21238, CVE-2024-6119, CVE-2024-21218, CVE-2024-37370, CVE-2024-21198, CVE-2024-21196, CVE-2024-21244, CVE-2024-21247, CVE-2024-21232, CVE-2024-21243, CVE-2024-21213, CVE-2024-21237, CVE-2024-21230, CVE-2024-21231, CVE-2024-21236, CVE-2024-37371, CVE-2024-21219, CVE-2024-7264, CVE-2024-21239, CVE-2024-21193, CVE-2024-21197, CVE-2024-21209 | 2024/10/15 | development |
oracle CPUOct2024: MySQL Server 9.0.2 | CVE-2024-21203, CVE-2024-21201, CVE-2024-21199, CVE-2024-5535, CVE-2024-21194, CVE-2024-21241, CVE-2024-21238, CVE-2024-6119, CVE-2024-21218, CVE-2024-2408, CVE-2024-37370, CVE-2024-1874, CVE-2024-21198, CVE-2024-21196, CVE-2024-21244, CVE-2024-21247, CVE-2024-21207, CVE-2024-21232, CVE-2024-21243, CVE-2024-21213, CVE-2024-21237, CVE-2024-5585, CVE-2024-21230, CVE-2024-21231, CVE-2024-21236, CVE-2024-37371, CVE-2024-21219, CVE-2024-7264, CVE-2024-4577, CVE-2024-21239, CVE-2024-5458, CVE-2024-21193, CVE-2024-21197, CVE-2024-21209, CVE-2024-21204 | 2024/10/15 | development |
oracle CPUOct2024: MySQL Server 8.0.40 | CVE-2024-21203, CVE-2024-21201, CVE-2024-21199, CVE-2024-5535, CVE-2024-21194, CVE-2024-21241, CVE-2024-21238, CVE-2024-6119, CVE-2024-21218, CVE-2024-37370, CVE-2024-21198, CVE-2024-21196, CVE-2024-21247, CVE-2024-21212, CVE-2024-21213, CVE-2024-21237, CVE-2024-21230, CVE-2024-21231, CVE-2024-21236, CVE-2024-37371, CVE-2024-21219, CVE-2024-7264, CVE-2024-21239, CVE-2024-21193, CVE-2024-21197 | 2024/10/15 | development |
oracle CPUOct2024: Oracle E-Business Suite | CVE-2024-21279, CVE-2024-21280, CVE-2024-21206, CVE-2024-21266, CVE-2024-21269, CVE-2024-21282, CVE-2024-21267, CVE-2024-21277, CVE-2024-21258, CVE-2024-21252, CVE-2024-21270, CVE-2024-21268, CVE-2024-21271, CVE-2024-21275, CVE-2024-21265, CVE-2024-21250, CVE-2024-21278, CVE-2024-21276 | 2024/10/15 | development |
oracle CPUOct2024: MySQL Cluster 7.5.36 | CVE-2024-21203, CVE-2023-45853, CVE-2024-21201, CVE-2024-21199, CVE-2024-5535, CVE-2024-21194, CVE-2024-21241, CVE-2024-21238, CVE-2024-6119, CVE-2024-21218, CVE-2024-21198, CVE-2024-21262, CVE-2024-21196, CVE-2024-21244, CVE-2024-28182, CVE-2024-21247, CVE-2024-21207, CVE-2024-21232, CVE-2024-21243, CVE-2024-21212, CVE-2024-21213, CVE-2024-21237, CVE-2024-21230, CVE-2024-21231, CVE-2024-21236, CVE-2024-37371, CVE-2024-21219, CVE-2024-7264, CVE-2024-21239, CVE-2024-21200, CVE-2024-21272, CVE-2024-21193, CVE-2024-39689, CVE-2024-21197, CVE-2024-21209, CVE-2024-21204 | 2024/10/15 | development |
oracle CPUOct2024: MySQL Cluster 8.4.2 | CVE-2024-21203, CVE-2023-45853, CVE-2024-21201, CVE-2024-21199, CVE-2024-5535, CVE-2024-21194, CVE-2024-21241, CVE-2024-21238, CVE-2024-21218, CVE-2024-21198, CVE-2024-21262, CVE-2024-21196, CVE-2024-21244, CVE-2024-28182, CVE-2024-21247, CVE-2024-21207, CVE-2024-21232, CVE-2024-21243, CVE-2024-21212, CVE-2024-21213, CVE-2024-21237, CVE-2024-21230, CVE-2024-21231, CVE-2024-21236, CVE-2024-37371, CVE-2024-21219, CVE-2024-7264, CVE-2024-21239, CVE-2024-21200, CVE-2024-21272, CVE-2024-21193, CVE-2024-39689, CVE-2024-21197, CVE-2024-21209, CVE-2024-21204 | 2024/10/15 | development |
oracle CPUOct2024: MySQL Cluster 8.4.3 | CVE-2024-21203, CVE-2023-45853, CVE-2024-21201, CVE-2024-21199, CVE-2024-5535, CVE-2024-21194, CVE-2024-21241, CVE-2024-21238, CVE-2024-6119, CVE-2024-21218, CVE-2024-37370, CVE-2024-23807, CVE-2024-21198, CVE-2024-21262, CVE-2024-21196, CVE-2024-21244, CVE-2024-28182, CVE-2024-21247, CVE-2024-21207, CVE-2024-21232, CVE-2024-2511, CVE-2024-21243, CVE-2024-21212, CVE-2024-21213, CVE-2024-21237, CVE-2024-21230, CVE-2024-21231, CVE-2024-21236, CVE-2024-37371, CVE-2024-21219, CVE-2024-7264, CVE-2024-21239, CVE-2024-21200, CVE-2024-21272, CVE-2024-21193, CVE-2024-39689, CVE-2024-21197, CVE-2024-40898, CVE-2024-21209, CVE-2024-21204 | 2024/10/15 | development |
Multiple Vulnerabilities in Wireshark | CVE-2024-9780, CVE-2024-9781 | 2024/10/11 | development |
HP One Agent Software – Potential Privilege Escalation | CVE-2024-8733 | 2024/10/9 | development |
Security Update for Buildah and Podman | CVE-2024-9407 | 2024/10/4 | development |
cisco cisco-sa-ndfc-cmdinj-UvYZrKfr: Cisco Nexus Dashboard Fabric Controller Arbitrary Command Execution Vulnerability | CVE-2024-20444, CVE-2024-20432, CVE-2024-20449 | 2024/10/3 | development |
cisco cisco-sa-ndfc-ptrce-BUSHLbp: Cisco Nexus Dashboard Fabric Controller Remote Code Execution Vulnerability | CVE-2024-20444, CVE-2024-20432, CVE-2024-20449 | 2024/10/3 | development |
Security Update for IBM WebSphere Application Server | CVE-2024-45073 | 2024/10/1 | development |
Security Update for Apache Tomcat | CVE-2024-38286 | 2024/9/26 | testing |
cisco cisco-sa-c9800-cwa-acl-nPSbHSnA: Cisco IOS XE Software for Wireless Controllers CWA Pre-Authentication ACL Bypass Vulnerability | CVE-2024-20510 | 2024/9/26 | development |
cisco cisco-sa-cpp-vfr-dos-nhHKGgO: Cisco IOS XE Software IPv4 Fragmentation Reassembly Denial of Service Vulnerability | CVE-2024-20467 | 2024/9/26 | development |
cisco cisco-sa-ios-xe-sda-edge-dos-MBcbG9k: Cisco IOS XE Software SD-Access Fabric Edge Node Denial of Service Vulnerability | CVE-2024-20480 | 2024/9/26 | development |
cisco cisco-sa-rsvp-dos-OypvgVZf: Cisco IOS and IOS XE Software Resource Reservation Protocol Denial of Service Vulnerability | CVE-2024-20433 | 2024/9/26 | development |
cisco cisco-sa-pim-APbVfySJ: Cisco IOS XE Software Protocol Independent Multicast Denial of Service Vulnerability | CVE-2024-20464 | 2024/9/26 | development |
cisco cisco-sa-sdwan-utd-dos-hDATqxs: Cisco Catalyst SD-WAN Routers Denial of Service Vulnerability | CVE-2024-20455 | 2024/9/26 | development |
cisco cisco-sa-webui-csrf-ycUYxkKO: Cisco IOS XE Software Web UI Cross-Site Request Forgery Vulnerability | CVE-2024-20437 | 2024/9/26 | development |
cisco cisco-sa-sdwan-utd-dos-hDATqxs: Cisco Catalyst SD-WAN Routers Denial of Service Vulnerability | CVE-2024-20455 | 2024/9/26 | development |
Ivanti Cloud Services Appliance (CSA) Path Traversal Vulnerability (CVE-2024-8963) | CVE-2024-8963 | 2024/9/19 | testing |
Security Update for Mozilla Firefox for iOS | CVE-2024-8399 | 2024/9/11 | development |
Multiple Vulnerabilities in FreeBSD | CVE-2024-41928, CVE-2024-43110, CVE-2024-45287, CVE-2024-45288, CVE-2024-45063 | 2024/9/5 | development |