Обновление банка данных

Обновлены сведения об уязвимостях программного обеспечения

Добавлена информация о 100 уязвимостях программного обеспечения:

BDU:2023-00305 (Analog Telephone Adapter (ATA) 191, Multiplatform Analog Telephone Adapter (ATA) 191, Multiplatform Analog Telephone Adapter (ATA) 192);

BDU:2023-00308 (Adaptive Security Appliance, Firepower Threat Defense);

BDU:2023-00307 (Cisco SD-WAN, SD-WAN vBond Orchestrator Software, SD-WAN vManage Software, SD-WAN vSmart Controller Software);

BDU:2023-00306, BDU:2023-00304 (Cisco IOS XE);

BDU:2023-00252 (RouterOS);

BDU:2023-00260 (Junos OS Evolved);

BDU:2023-00259 (SAP Customer Data Cloud);

BDU:2023-00303 (Cisco IOS, Cisco IOS XE);

BDU:2023-00251 (Cortex XDR Agent);

BDU:2023-00258 (DWG TrueView);

BDU:2023-00265 (Debian GNU/Linux, Linux);

BDU:2023-00264 (JunOS, Junos OS Evolved);

BDU:2023-00261 (G Data);

BDU:2023-00266 (Go);

BDU:2023-00249, BDU:2023-00250 (Zoom Rooms for Conference Room);

BDU:2023-00248 (Zoom);

BDU:2023-00254 (Precision 5820 Tower, Precision 7820 Tower, Precision 7920 Tower);

BDU:2023-00255, BDU:2023-00256 (GeoDrive);

BDU:2023-00253 (Partner Engagement Manager);

BDU:2023-00257 (ChengMing 3900, Inspiron 14 Plus 7420, Inspiron 16 Plus 7620, Inspiron 3910, Inspiron 5320, Inspiron 5620, Inspiron 7420, Inspiron 7620, OptiPlex 3000, OptiPlex 3000 Thin Client, OptiPlex 5000, OptiPlex 5400, OptiPlex 7000, OptiPlex 7000 OEM, OptiPlex 7400, Precision 3460 Small Form Factor, Precision 3660 Tower, Precision 5770, Vostro 3910, Vostro 5620, Vostro 7620, XPS 17 9720);

BDU:2023-00263 (SmartRTU);

BDU:2023-00262 (R-SeeNet);

BDU:2023-00329, BDU:2023-00335, BDU:2023-00333, BDU:2023-00336, BDU:2023-00331, BDU:2023-00338, BDU:2023-00344, BDU:2023-00324, BDU:2023-00340, BDU:2023-00345, BDU:2023-00325, BDU:2023-00326, BDU:2023-00342, BDU:2023-00328, BDU:2023-00327, BDU:2023-00339, BDU:2023-00343, BDU:2023-00341, BDU:2023-00332, BDU:2023-00334, BDU:2023-00337, BDU:2023-00330 (Windows);

BDU:2023-00316, BDU:2023-00321, BDU:2023-00319, BDU:2023-00323, BDU:2023-00309, BDU:2023-00320, BDU:2023-00322, BDU:2023-00318 (Adobe Acrobat Document Cloud, Adobe Acrobat Reader Document Cloud, Adobe Acrobat 2020, Adobe Acrobat Reader 2020);

BDU:2023-00317 (Adobe InCopy);

BDU:2023-00310, BDU:2023-00311, BDU:2023-00315, BDU:2023-00314, BDU:2023-00312, BDU:2023-00313 (Adobe InDesign);

BDU:2023-00296 (Debian GNU/Linux, Astra Linux Special Edition, ncurses);

BDU:2023-00282, BDU:2023-00269, BDU:2023-00275, BDU:2023-00267, BDU:2023-00276, BDU:2023-00272, BDU:2023-00274, BDU:2023-00278, BDU:2023-00277, BDU:2023-00280, BDU:2023-00271, BDU:2023-00270, BDU:2023-00268, BDU:2023-00281, BDU:2023-00279, BDU:2023-00273 (Debian GNU/Linux, Astra Linux Special Edition, Cgal);

BDU:2023-00287 (Astra Linux Special Edition, Debian GNU/Linux, HAProxy);

BDU:2023-00293, BDU:2023-00295 (Debian GNU/Linux, Astra Linux Special Edition, UnZip);

BDU:2023-00284 (Debian GNU/Linux, Astra Linux Special Edition, Containerd);

BDU:2023-00283 (Debian GNU/Linux, Astra Linux Special Edition, LibRaw);

BDU:2023-00285 (Debian GNU/Linux, Astra Linux Special Edition, Ansible);

BDU:2023-00294 (Debian GNU/Linux, Astra Linux Special Edition, Sinatra);

BDU:2023-00292 (РЕД ОС, Red Hat Enterprise Linux, Simple DirectMedia Layer);

BDU:2023-00290, BDU:2023-00291 (Red Hat Enterprise Linux, Debian GNU/Linux, Red Hat OpenStack Platform, OpenShift Container Platform, Fast Datapath, РЕД ОС, Open vSwitch);

BDU:2023-00289 (Astra Linux Special Edition, Debian GNU/Linux, Intel Microcode);

BDU:2023-00288 (Astra Linux Special Edition, Debian GNU/Linux, vim);

BDU:2023-00286 (Red Hat Enterprise Linux, Astra Linux Special Edition, Debian GNU/Linux, Fedora, Grub2);

BDU:2023-00301, BDU:2023-00302 (RoomOS, TelePresence Collaboration Endpoint (CE));

BDU:2023-00300 (Network Services Orchestrator);

BDU:2023-00299 (Cisco IP Phone 7800 Series, Cisco IP Phone 8800 Series);

BDU:2023-00297, BDU:2023-00298 (Cisco CX Cloud Agent);

BDU:2023-00346 (SonicOS);

BDU:2023-00347 (Mendix SAML)


Внесены изменения в 6 записей об уязвимостях программного обеспечения:

BDU:2022-03217 (FortiOS, FortiSwitch, FortiManager, FortiAnalyzer, FortiAP-S/W2);

BDU:2022-03218 (FortiProxy, FortiOS);

BDU:2022-03132 (FortiWeb);

BDU:2022-03315 (FortiAP-U, FortiAP-S/W2, FortiAP);

BDU:2022-03303 (FortiAP-S, FortiAP-U, FortiAP-W2);

BDU:2022-04700 (Modicon M241, Modicon M251, FortiGate IPS)

  • Автор: admin
  • Опубликовано: 23.01.2023 14:45:35