slackware SSA:2024-135-01: [slackware-security] mozilla-firefox (SSA:2024-135-01) | CVE-2024-4777, CVE-2024-4768, CVE-2024-4769, CVE-2024-4770, CVE-2024-4367, CVE-2024-4767 | 2024/5/15 | testing |
adobe apsb24-36: APSB24-36 | CVE-2024-30296, CVE-2024-30293, CVE-2024-30294, CVE-2024-30297, CVE-2024-30298, CVE-2024-30295, CVE-2024-30282 | 2024/5/14 | testing |
adobe apsb24-37: APSB24-37 | CVE-2024-30287, CVE-2024-30292, CVE-2024-30283, CVE-2024-30288, CVE-2024-30290, CVE-2024-30286, CVE-2024-30291, CVE-2024-30289 | 2024/5/14 | testing |
adobe apsb24-29: APSB24-29 | CVE-2024-34098, CVE-2024-34094, CVE-2024-30311, CVE-2024-34101, CVE-2024-30310, CVE-2024-34097, CVE-2024-34095, CVE-2024-34100, CVE-2024-30312, CVE-2024-30284, CVE-2024-34096, CVE-2024-34099 | 2024/5/14 | testing |
adobe apsb24-39: APSB24-39 | CVE-2024-30314 | 2024/5/14 | testing |
microsoft_edge 2024_May_14: Microsoft Edge Stable Channel and Extended Stable Channels, (Version 124.0.2478.105) | CVE-2024-4761 | 2024/5/14 | development |
mozilla mfsa2024-23: Security Vulnerabilities fixed in Thunderbird 115.11 | CVE-2024-4777, CVE-2024-4768, CVE-2024-4769, CVE-2024-4770, CVE-2024-4367, CVE-2024-4767 | 2024/5/14 | development |
redhat RHSA-2024:2842: RHSA-2024:2842: .NET 8.0 security update (Important) | CVE-2024-30045, CVE-2024-30046 | 2024/5/14 | testing |
redhat RHSA-2024:2839: RHSA-2024:2839: expat security update (Moderate) | CVE-2023-52425 | 2024/5/14 | testing |
adobe apsb24-30: APSB24-30 | CVE-2024-20793, CVE-2024-20791, CVE-2024-20792 | 2024/5/14 | testing |
freebsd 8e0e8b56-11c6-11ef-9f97-a8a1599412c6: chromium -- multiple security fixes | CVE-2024-4761 | 2024/5/14 | development |
f5_networks K000139594: libxml2 vulnerability CVE-2022-40304 | CVE-2022-40304 | 2024/5/14 | development |
f5_networks K000139592: libxml2 vulnerability CVE-2023-29469 | CVE-2023-29469 | 2024/5/14 | development |
f5_networks K000138520: BIG-IP Configuration utility vulnerability CVE-2024-27202 | CVE-2024-27202 | 2024/5/8 | development |
f5_networks K000139217: BIG-IP TMM tenants on VELOS and rSeries vulnerability CVE-2024-32761 | CVE-2024-32761 | 2024/5/8 | development |
f5_networks K000138744: BIG-IP APM browser network access VPN client vulnerability CVE-2024-28883 | CVE-2024-28883 | 2024/5/8 | development |
f5_networks K000138894: BIG-IP Configuration utility XSS vulnerability CVE-2024-33604 | CVE-2024-33604 | 2024/5/8 | development |
f5_networks K000139037: TMM vulnerability CVE-2024-25560 | CVE-2024-25560 | 2024/5/8 | development |
f5_networks K000138636: BIG-IP Configuration utility XSS vulnerability CVE-2024-31156 | CVE-2024-31156 | 2024/5/8 | development |
f5_networks K000138728: BIG-IP IPsec vulnerability CVE-2024-33608 | CVE-2024-33608 | 2024/5/8 | development |
f5_networks K000138912: BIG-IP SSL vulnerability CVE-2024-28889 | CVE-2024-28889 | 2024/5/8 | development |
Security Update for Nagios XI | CVE-2024-33775 | 2024/5/8 | development |
debian_linux dla-3805: Debian dla-3805 : libqt5concurrent5 - security update | CVE-2023-24607, CVE-2023-37369, CVE-2023-32762, CVE-2023-51714, CVE-2023-33285, CVE-2023-38197, CVE-2023-32763 | 2024/5/1 | development |
D-Link NAS devices - remote detection | | 2024/4/12 | development |