Обновление банка данных

Обновлены сведения об уязвимостях программного обеспечения

Добавлена информация о 55 уязвимостях программного обеспечения:

BDU:2021-05338 (Advantech WebAccess);

BDU:2021-05342, BDU:2021-05343, BDU:2021-05364, BDU:2021-05340, BDU:2021-05341 (Windows);

BDU:2021-05334 (Red Hat Enterprise Linux, Debian GNU/Linux, Windows, Firefox, Firefox ESR, Thunderbird);

BDU:2021-05333 (NETGEAR R7800, NETGEAR R6700AX, NETGEAR XR700, NETGEAR RAX78, NETGEAR RAX70, NETGEAR RAX10, NETGEAR RAX120v2, NETGEAR RAX120, NETGEAR R9000, NETGEAR R8900);

BDU:2021-05365 (Workspace ONE UEM);

BDU:2021-05332, BDU:2021-05359, BDU:2021-05362, BDU:2021-05363, BDU:2021-05360 (Adobe XMP-Toolkit-SDK);

BDU:2021-05361 (Adobe Media Encoder);

BDU:2021-05358 (Microsoft Outlook);

BDU:2021-05375 (Aruba Instant);

BDU:2021-05347 (Microsoft Edge, Google Chrome);

BDU:2021-05346 (Debian GNU/Linux, Red Hat Enterprise Linux, Red Hat Software Collections, Fedora, cURL, .NET Core);

BDU:2021-05356, BDU:2021-05349 (Cisco Small Business 220 Series Smart Switches);

BDU:2021-05357 (Analog Telephone Adapter (ATA) 190, Analog Telephone Adapter (ATA) 191, Multiplatform Analog Telephone Adapter (ATA) 191, Multiplatform Analog Telephone Adapter (ATA) 192);

BDU:2021-05355 (AsyncOS);

BDU:2021-05354 (Communication Server);

BDU:2021-05345 (Laravel, Ignition);

BDU:2021-05344 (Elastic App Search);

BDU:2021-05353 (Foxit Reader, Foxit PhantomPDF);

BDU:2021-05376 (RIOT);

BDU:2021-05352 (Tizen RT);

BDU:2021-05368 (WinProladder);

BDU:2021-05351 (BIG-IP Access Policy Manager);

BDU:2021-05374 (Debian GNU/Linux, Fedora, Ubuntu, p5-encode, Perl);

BDU:2021-05350 (Debian GNU/Linux, Fedora, Google Chrome, Microsoft Edge);

BDU:2021-05372 (Ubuntu, Apport);

BDU:2021-05348 (Cisco IOS XE);

BDU:2021-05337 (Debian GNU/Linux, Red Hat Enterprise Linux, LibreOffice);

BDU:2021-05327 (WinRAR);

BDU:2021-05371 (Cisco IOS XE SD-WAN);

BDU:2021-05378 (IBM DB2);

BDU:2021-05336 (D-Link DIR-615 Q1);

BDU:2021-05335 (OpenSUSE Leap, GNUMP3d);

BDU:2021-05377 (Firepower Threat Defense);

BDU:2021-05373, BDU:2021-05369 (tvOS, iPadOS, Iphone Os, Mac OS, watchOS);

BDU:2021-05370 (Iphone Os, tvOS, watchOS);

BDU:2021-05367 (fastify-static);

BDU:2021-05366 (BillQuick Web Suite);

BDU:2021-05328 (Fedora, Unicode, Rust);

BDU:2021-05329 (Unicode, Rust);

BDU:2021-05326, BDU:2021-05325, BDU:2021-05324 (UserGate 500D);

BDU:2021-05339 (DNS-320);

BDU:2021-05330 (Microsoft Exchange Server);

BDU:2021-05331 (Microsoft Office, Microsoft Excel, 365 Apps for Enterprise);


Внесены изменения в 4 записи об уязвимостях программного обеспечения:

BDU:2020-00092, BDU:2020-00093 (Huawei ALP-AL00B, Huawei BLA-AL00B, Huawei Columbia-AL10B, Huawei Columbia-L29D, Huawei Ever-L29B, Huawei Jackman-L22, Huawei ALP-L09, Huawei ALP-L29, Huawei BLA-L29C, Huawei Berkeley-AL20, Huawei Berkeley-L09, Huawei Charlotte-L09C, Huawei Charlotte-L29C, Huawei Cornell-AL00A, Huawei Cornell-L29A, Huawei Emily-L09C, Huawei Emily-L29C, Huawei Mate 20, Honor View 20, Huawei Paris-L21B, Huawei Paris-L21MEB, Huawei Paris-L29B, Huawei Sydney-AL00, Huawei Sydney-L21, Huawei Sydney-L21BR, Huawei Sydney-L22, Huawei Sydney-L22BR, Huawei SydneyM-AL00, Huawei SydneyM-L01, Huawei SydneyM-L03, Huawei SydneyM-L21, Huawei SydneyM-L22, Huawei SydneyM-L23, Huawei Yale-L21A);

BDU:2021-04904 (Apache HTTP Server);

BDU:2021-05138 (Cisco UCS 6400);

  • Автор: admin
  • Опубликовано: 10.11.2021 14:47:24