Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0655 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. Notes: the former description is: "A service may include useful information in its banner or help function (such as the name and version), making it useful for information gathering activities. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2001-12-09T15:00:00.000Z |
| CVE-1999-0621 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NETBIOS is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2002-02-02T15:00:00.000Z |
| CVE-2001-1167 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-0976. Reason: This candidate is a duplicate of CVE-2001-0976. Notes: CVE-2001-0976 should be used instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-03-15T10:00:00.000Z | 2002-03-22T15:00:00.000Z |
| CVE-1999-0615 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SNMP service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2002-05-09T13:00:00.000Z |
| CVE-2002-1261 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1292. Reason: This candidate is a reservation duplicate of CVE-2002-1292. Notes: All CVE users should reference CVE-2002-1292 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-12-17T10:00:00.000Z | 2002-12-18T15:00:00.000Z |
| CVE-2002-1404 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1348. Reason: This candidate is a reservation duplicate of CVE-2002-1348. Notes: All CVE users should reference CVE-2002-1348 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-02-05T10:00:00.000Z | 2003-02-11T15:00:00.000Z |
| CVE-2002-1234 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0180. Reason: This candidate is a an out-of-band assignment duplicate of CVE-2002-0180. Notes: All CVE users should reference CVE-2002-0180 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-10-25T08:00:00.000Z | 2003-02-26T15:00:00.000Z |
| CVE-1999-0614 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FTP service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0616 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The TFTP service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0617 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SMTP service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0619 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The Telnet service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0620 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NIS is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0622 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to DNS service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0623 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X Windows service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0631 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NFS service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0633 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The HTTP/WWW service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0634 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SSH service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0642 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A POP service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0643 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The IMAP service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0644 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NNTP news service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0645 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The IRC service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0646 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The LDAP service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0648 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X25 service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0658 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "DCOM is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0659 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A Windows NT Primary Domain Controller (PDC) or Backup Domain Controller (BDC) is present. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0660 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. It might be more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A hacker utility, back door, or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-03-21T15:00:00.000Z |
| CVE-1999-0647 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The bootparam (bootparamd) service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2003-05-08T13:00:00.000Z |
| CVE-2003-0582 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0504. Reason: This candidate is a duplicate of CVE-2003-0504. Notes: All CVE users should reference CVE-2003-0504 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-07-25T08:00:00.000Z | 2003-07-25T13:00:00.000Z |
| CVE-2003-0090 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2000-0844. Reason: This candidate is a duplicate of CVE-2000-0844. Notes: All CVE users should reference CVE-2000-0844 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-11-18T10:00:00.000Z | 2003-11-21T15:00:00.000Z |
| CVE-2002-0841 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0842. Reason: This candidate is a duplicate of CVE-2002-0842. The duplicate assignment was made before public disclosure. Notes: none | N/A | N/A | 2003-02-21T10:00:00.000Z | 2004-01-26T15:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-1999-0020 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0032. Reason: This candid… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:53.530 |
| fkie_cve-1999-0110 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0315. Reason: This candid… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:55.093 |
| fkie_cve-1999-0187 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0022. Reason: This candid… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:55.743 |
| fkie_cve-1999-0282 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1584, CVE-1999-1586. Reas… | 1997-09-23T04:00:00.000 | 2023-11-07T01:54:56.640 |
| fkie_cve-1999-0335 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0032. Reason: This candidat… | 1996-08-01T04:00:00.000 | 2023-11-07T01:54:57.050 |
| fkie_cve-1999-0531 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:58.853 |
| fkie_cve-1999-0614 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.310 |
| fkie_cve-1999-0615 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.343 |
| fkie_cve-1999-0616 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.373 |
| fkie_cve-1999-0617 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.410 |
| fkie_cve-1999-0619 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.450 |
| fkie_cve-1999-0620 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.480 |
| fkie_cve-1999-0621 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.540 |
| fkie_cve-1999-0622 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.607 |
| fkie_cve-1999-0623 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.640 |
| fkie_cve-1999-0631 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.713 |
| fkie_cve-1999-0633 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.750 |
| fkie_cve-1999-0634 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.870 |
| fkie_cve-1999-0642 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:54:59.973 |
| fkie_cve-1999-0643 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:55:00.010 |
| fkie_cve-1999-0644 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:55:00.043 |
| fkie_cve-1999-0645 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:55:00.070 |
| fkie_cve-1999-0646 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:55:00.103 |
| fkie_cve-1999-0647 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:55:00.137 |
| fkie_cve-1999-0648 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:55:00.170 |
| fkie_cve-1999-0649 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:55:00.207 |
| fkie_cve-1999-0652 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:55:00.253 |
| fkie_cve-1999-0655 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is no… | 1999-01-01T05:00:00.000 | 2023-11-07T01:55:00.307 |
| fkie_cve-1999-0658 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:55:00.370 |
| fkie_cve-1999-0659 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is so… | 1999-01-01T05:00:00.000 | 2023-11-07T01:55:00.407 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-89ch-hqf9-rgp3 |
|
Using JS libraries with known security vulnerabilities | 2019-11-12T22:59:28Z | 2019-11-15T20:11:29Z |
| ghsa-6r5x-hmgg-7h53 |
|
Remote code execution in Handlebars.js | 2019-07-15T19:46:01Z | 2019-12-20T02:08:50Z |
| ghsa-m5ff-3wj3-8ph4 |
|
HTTP Request Smuggling: Invalid whitespace characters in headers in Waitress | 2019-12-26T16:34:38Z | 2019-12-26T16:34:06Z |
| ghsa-f884-gm86-cg3q |
|
PrestaShop module ps_facetedsearch might be vulnerable from CVE-2017-9841 | 2020-01-07T17:20:47Z | 2020-01-07T17:20:13Z |
| ghsa-wqq8-mqj9-697f |
|
PrestaShop autoupgrade module ZIP archives were vulnerable from CVE-2017-9841 | 2020-01-08T03:10:30Z | 2020-01-08T03:06:57Z |
| ghsa-769f-539v-f5jg |
|
PrestaShop gamification module ZIP archives were vulnerable from CVE-2017-9841 | 2020-01-08T03:10:44Z | 2020-01-08T03:10:06Z |
| ghsa-9r27-994c-4xch |
|
discord-html not escaping HTML code blocks when lacking a language identifier | 2020-02-24T17:34:02Z | 2020-02-21T20:20:53Z |
| ghsa-p94w-42g3-f7h4 |
|
Holder can (re)create authentic credentials after receiving a credential in vp-toolkit | 2020-03-06T01:16:00Z | 2020-02-28T16:38:09Z |
| ghsa-ff5x-w9wg-h275 |
|
Holder can generate proof of ownership for credentials it does not control in vp-toolkit | 2020-03-06T01:15:46Z | 2020-02-28T16:38:18Z |
| ghsa-738m-f33v-qc2r |
|
SMTP Injection in PHPMailer | 2020-03-05T22:09:19Z | 2020-03-05T21:57:18Z |
| ghsa-mr6r-mvw4-736g |
|
Vyper interfaces returning integer types less than 256 bits can be manipulated if uint256 is used | 2020-03-25T18:20:19Z | 2020-03-25T18:19:55Z |
| ghsa-7fhm-mqm4-2wp7 |
|
Withdrawn: ESLint dependencies are vulnerable (ReDoS and Prototype Pollution) | 2020-03-13T20:36:16Z | 2020-04-03T21:54:52Z |
| ghsa-3gg7-9q2x-79fc |
|
Improper Restriction of Rendered UI Layers or Frames in Keycloak | 2020-04-15T21:09:40Z | 2020-04-15T21:07:13Z |
| ghsa-qmqc-x3r4-6v39 |
|
Polymorphic deserialization of malicious object in jackson-databind | 2020-05-15T18:59:07Z | 2020-04-22T20:58:45Z |
| ghsa-334p-wv2m-w3vp |
|
Denial of service in Apache Xerces2 | 2020-06-15T18:51:30Z | 2020-06-15T15:55:30Z |
| ghsa-wrr7-33fx-rcvj |
|
Deserialization of Untrusted Data in jackson-databind | 2020-06-15T18:44:56Z | 2020-06-16T20:41:59Z |
| ghsa-23v3-qfrj-wmgh |
|
Moderate severity vulnerability that affects actionpack | 2018-09-17T21:54:22Z | 2020-06-16T20:51:48Z |
| ghsa-4j6x-w426-6rc6 |
|
Default Express middleware security check is ignored in production | 2019-11-08T17:31:17Z | 2020-06-16T20:58:26Z |
| ghsa-568q-9fw5-28wf |
|
Moderate severity vulnerability that affects org.postgresql:pgjdbc-aggregate | 2018-10-19T16:53:33Z | 2020-06-16T21:00:08Z |
| ghsa-6cw8-7j6c-hccp |
|
Moderate severity vulnerability that affects io.vertx:vertx-core | 2018-10-19T17:43:36Z | 2020-06-16T21:18:56Z |
| ghsa-778x-2mqv-w6xw |
|
Moderate severity vulnerability that affects org.keycloak:keycloak-core | 2018-10-18T16:48:01Z | 2020-06-16T21:21:49Z |
| ghsa-959q-32g8-vvp7 |
|
Moderate severity vulnerability that affects org.keycloak:keycloak-core | 2018-10-18T16:50:05Z | 2020-06-16T21:27:40Z |
| ghsa-44vc-fpcg-5cc5 |
|
Moderate severity vulnerability that affects safemode | 2018-08-08T22:29:49Z | 2020-06-16T21:30:40Z |
| ghsa-ccq6-3qx5-vmqx |
|
Moderate severity vulnerability that affects is-my-json-valid | 2018-07-31T22:54:14Z | 2020-06-16T21:33:36Z |
| ghsa-9wv8-jgw4-4g28 |
|
High severity vulnerability that affects festivaltts4r | 2018-08-15T20:04:13Z | 2020-06-16T21:33:56Z |
| ghsa-3q5q-f79q-7hr2 |
|
High severity vulnerability that affects rubyzip | 2018-07-31T18:21:46Z | 2020-06-16T21:36:51Z |
| ghsa-77pc-q5q7-qg9h |
|
Moderate severity vulnerability that affects rails-html-sanitizer | 2018-09-17T21:58:30Z | 2020-06-16T21:37:28Z |
| ghsa-5xmj-wm96-fmw8 |
|
Moderate severity vulnerability that affects actionpack | 2018-09-17T21:54:37Z | 2020-06-16T21:38:53Z |
| ghsa-cwp3-834g-x79g |
|
Moderate severity vulnerability that affects archive-tar-minitar and minitar | 2018-08-21T17:07:36Z | 2020-06-16T21:39:02Z |
| ghsa-hhxm-4f85-rgr8 |
|
High severity vulnerability that affects many_versioned_gem | 2019-02-05T16:25:34Z | 2020-06-16T21:40:22Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2024-55 |
|
Malicious package. Exfiltrated secrets to a target server. | cipherbcrypt | 0001-01-01T00:00:00+00:00 | |
| pysec-2010-13 |
|
MoinMoin 1.7.x before 1.7.3 and 1.8.x before 1.8.3 checks parent ACLs in certain inapprop… | moin | 2010-03-29T20:30:00Z | 2010-05-27T05:47:00Z |
| pysec-2010-20 |
|
Multiple directory traversal vulnerabilities in FTPServer.py in pyftpdlib before 0.2.0 al… | pyftpdlib | 2010-10-19T20:00:00Z | 2010-10-20T04:00:00Z |
| pysec-2010-21 |
|
FTPServer.py in pyftpdlib before 0.2.0 does not increment the attempted_logins count for … | pyftpdlib | 2010-10-19T20:00:00Z | 2010-10-20T04:00:00Z |
| pysec-2010-22 |
|
pyftpdlib before 0.1.1 does not choose a random value for the port associated with the PA… | pyftpdlib | 2010-10-19T20:00:00Z | 2010-10-20T04:00:00Z |
| pysec-2010-23 |
|
FTPServer.py in pyftpdlib before 0.2.0 allows remote attackers to cause a denial of servi… | pyftpdlib | 2010-10-19T20:00:00Z | 2010-10-20T04:00:00Z |
| pysec-2010-24 |
|
The ftp_STOU function in FTPServer.py in pyftpdlib before 0.2.0 does not limit the number… | pyftpdlib | 2010-10-19T20:00:00Z | 2010-10-20T04:00:00Z |
| pysec-2010-25 |
|
The ftp_PORT function in FTPServer.py in pyftpdlib before 0.2.0 does not prevent TCP conn… | pyftpdlib | 2010-10-19T20:00:00Z | 2010-10-20T04:00:00Z |
| pysec-2009-6 |
|
Multiple cross-site scripting (XSS) vulnerabilities in action/AttachFile.py in MoinMoin 1… | moin | 2009-04-29T18:30:00Z | 2017-08-17T01:30:00Z |
| pysec-2019-113 |
|
CRLF Injection in pypiserver 1.2.5 and below allows attackers to set arbitrary HTTP heade… | pypiserver | 2019-01-25T04:29:00Z | 2019-01-25T19:42:00Z |
| pysec-2019-122 |
|
Sqla_yaml_fixtures 0.9.1 allows local users to execute arbitrary python code via the fixt… | sqla-yaml-fixtures | 2019-01-03T19:29:00Z | 2019-01-31T18:00:00Z |
| pysec-2019-7 |
|
www/resource.py in Buildbot before 1.8.1 allows CRLF injection in the Location header of … | buildbot | 2019-02-03T08:29:00Z | 2019-02-06T21:48:00Z |
| pysec-2019-1 |
|
aioxmpp version 0.10.2 and earlier contains a Improper Handling of Structural Elements vu… | aioxmpp | 2019-02-04T21:29:00Z | 2019-02-15T15:00:00Z |
| pysec-2019-139 |
|
An issue was discovered in webargs before 5.1.3, as used with marshmallow and other produ… | webargs | 2019-03-12T02:29:00Z | 2019-03-12T13:09:00Z |
| pysec-2019-21 |
|
An issue was discovered in Donfig 0.3.0. There is a vulnerability in the collect_yaml met… | donfig | 2019-03-21T20:29:00Z | 2019-03-26T14:13:00Z |
| pysec-2019-107 |
|
nbla/logger.cpp in libnnabla.a in Sony Neural Network Libraries (aka nnabla) through v1.0… | nnabla | 2019-04-04T05:29:00Z | 2019-04-05T20:09:00Z |
| pysec-2019-17 |
|
In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper… | django | 2019-01-09T23:29:00Z | 2019-04-23T13:11:00Z |
| pysec-2019-6 |
|
Buildbot before 1.8.2 and 2.x before 2.3.1 accepts a user-submitted authorization token f… | buildbot | 2019-05-23T15:30:00Z | 2019-06-07T18:29:00Z |
| pysec-2019-79 |
|
An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2… | django | 2019-06-03T17:29:00Z | 2019-06-12T17:29:00Z |
| pysec-2019-132 |
|
In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attac… | urllib3 | 2019-04-15T15:29:00Z | 2019-06-13T04:29:00Z |
| pysec-2019-109 |
|
** DISPUTED ** A deserialization vulnerability exists in the way parso through 0.4.0 hand… | parso | 2019-06-06T19:29:00Z | 2019-07-05T11:15:00Z |
| pysec-2019-20 |
|
verification.py in django-rest-registration (aka Django REST Registration library) before… | django-rest-registration | 2019-07-02T22:15:00Z | 2019-07-12T13:52:00Z |
| pysec-2019-26 |
|
invenio-previewer before 1.0.0a12 allows XSS. | invenio-previewer | 2019-07-29T14:15:00Z | 2019-07-31T19:44:00Z |
| pysec-2019-24 |
|
invenio-app before 1.1.1 allows host header injection. | invenio-app | 2019-07-29T15:15:00Z | 2019-08-01T16:12:00Z |
| pysec-2019-27 |
|
invenio-records before 1.2.2 allows XSS. | invenio-records | 2019-07-29T15:15:00Z | 2019-08-01T16:29:00Z |
| pysec-2019-25 |
|
invenio-communities before 1.0.0a20 allows XSS. | invenio-communities | 2019-07-29T15:15:00Z | 2019-08-01T16:59:00Z |
| pysec-2019-119 |
|
SaltStack Salt 2018.3, 2019.2 is affected by: SQL Injection. The impact is: An attacker c… | salt | 2019-07-18T17:15:00Z | 2019-08-13T18:15:00Z |
| pysec-2019-129 |
|
In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verif… | twisted | 2019-06-16T12:29:00Z | 2019-08-14T03:15:00Z |
| pysec-2019-219 |
|
Recommender before 2018-07-18 allows XSS. | recommender-xblock | 2019-08-09T16:15:00Z | 2019-08-15T16:48:00Z |
| pysec-2019-19 |
|
django-js-reverse (aka Django JS Reverse) before 0.9.1 has XSS via js_reverse_inline. | django-js-reverse | 2019-08-23T13:15:00Z | 2019-08-26T17:39:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2007-0469 | The extract_files function in installer.rb in RubyGems before 0.9.1 does not check whethe… | 2007-01-22T00:00:00.000Z |
| gsd-2007-6183 | Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialo… | 2007-11-27T00:00:00.000Z |
| gsd-2008-7311 | Spree contains a hardcoded flaw related to the config.action_controller_session hash valu… | 2008-08-12T00:00:00.000Z |
| gsd-2008-7310 | Spree contains a hash restriction weakness that occurs when parsing a modified URL. This … | 2008-09-22T00:00:00.000Z |
| gsd-2009-4123 | A security problem involving peer certificate verification was found where failed verific… | 2009-12-07T00:00:00.000Z |
| gsd-2010-3978 | Spree contains a flaw that may lead to an unauthorized information disclosure. The issue … | 2010-11-02T00:00:00.000Z |
| gsd-2011-0739 | Mail Gem for Ruby contains a flaw related to the failure to properly sanitise input passe… | 2011-01-25T00:00:00.000Z |
| gsd-2011-3186 | A response splitting flaw in Ruby on Rails 2.3.x was reported that could allow a remote a… | 2011-08-16T00:00:00.000Z |
| gsd-2011-4319 | A cross-site scripting (XSS) flaw was found in the way the 'translate' helper method of t… | 2011-11-17T00:00:00.000Z |
| gsd-2011-5036 | Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes hash values for fo… | 2011-12-28T00:00:00.000Z |
| gsd-2012-6135 | Phusion Passenger Gem for Ruby contains a flaw that is triggered during application start… | 2012-02-01T00:00:00.000Z |
| gsd-2012-6684 | Cross-site scripting (XSS) vulnerability in the RedCloth library 4.2.9 for Ruby and earli… | 2012-02-29T00:00:00.000Z |
| gsd-2012-1098 | Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before 3.0.12, 3.1.x befo… | 2012-03-01T00:00:00.000Z |
| gsd-2012-1099 | Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_optio… | 2012-03-01T00:00:00.000Z |
| gsd-2012-2139 | Directory traversal vulnerability in lib/mail/network/delivery_methods/file_delivery.rb i… | 2012-03-14T00:00:00.000Z |
| gsd-2012-2140 | The Mail gem before 2.4.3 for Ruby allows remote attackers to execute arbitrary commands … | 2012-03-14T00:00:00.000Z |
| gsd-2012-2126 | RubyGems before 1.8.23 does not verify an SSL certificate, which allows remote attackers … | 2012-04-20T00:00:00.000Z |
| gsd-2012-6109 | lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1… | 2012-05-04T00:00:00.000Z |
| gsd-2012-2660 | actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before 3.0.13, 3.1.x befo… | 2012-05-31T00:00:00.000Z |
| gsd-2012-2661 | The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and… | 2012-05-31T00:00:00.000Z |
| gsd-2012-2671 | Rack::Cache (rack-cache) contains a flaw related to the rubygem caching sensitive HTTP he… | 2012-06-06T00:00:00.000Z |
| gsd-2012-6685 | Nokogiri before 1.5.4 is vulnerable to XXE attacks | 2012-06-08T00:00:00.000Z |
| gsd-2012-3424 | The decode_credentials method in actionpack/lib/action_controller/metal/http_authenticati… | 2012-07-26T00:00:00.000Z |
| gsd-2012-3463 | Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_tag_h… | 2012-08-09T00:00:00.000Z |
| gsd-2012-3464 | Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/str… | 2012-08-09T00:00:00.000Z |
| gsd-2012-3465 | Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/sanitize_h… | 2012-08-09T00:00:00.000Z |
| gsd-2012-6134 | The omniauth-oauth2 Ruby Gem contains a flaw that allows an attacker to inject values int… | 2012-09-08T00:00:00.000Z |
| gsd-2012-2125 | RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for … | 2012-09-25T00:00:00.000Z |
| gsd-2012-5604 | The ldap_fluff gem for Ruby, as used in Red Hat CloudForms 1.1, when using Active Directo… | 2012-12-04T00:00:00.000Z |
| gsd-2013-0284 | A bug in the Ruby agent causes database connection information and raw SQL statements to … | 2012-12-06T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-5108 | Malicious code in opsie (npm) | 2022-05-09T21:16:00Z | 2022-05-09T21:16:01Z |
| mal-2022-4049 | Malicious code in jquerry (npm) | 2022-05-11T16:45:06Z | 2022-05-11T16:45:07Z |
| mal-2022-5303 | Malicious code in personal-colorss (npm) | 2022-05-13T17:03:32Z | 2022-05-13T17:03:32Z |
| mal-2022-2819 | Malicious code in eslint-plugin-kavak (npm) | 2022-05-16T06:20:33Z | 2022-05-16T06:20:34Z |
| mal-2022-4341 | Malicious code in loadassh (npm) | 2022-05-16T06:22:48Z | 2022-05-16T06:22:56Z |
| mal-2022-4342 | Malicious code in loaddash (npm) | 2022-05-16T06:22:48Z | 2022-05-16T06:22:56Z |
| mal-2022-5239 | Malicious code in payoneer-scripts (npm) | 2022-05-16T06:25:04Z | 2022-05-16T06:25:34Z |
| mal-2022-3359 | Malicious code in gfg-security-utilities (npm) | 2022-05-16T06:27:19Z | 2022-05-16T06:27:20Z |
| mal-2022-6234 | Malicious code in speedy-ts-compiler (npm) | 2022-05-16T06:37:16Z | 2022-05-16T06:37:16Z |
| mal-2022-2100 | Malicious code in com.unity.probuilder (npm) | 2022-05-16T06:45:14Z | 2022-05-16T06:45:15Z |
| mal-2022-2101 | Malicious code in com.unity.render-pipelines.high-definition-config (npm) | 2022-05-16T06:45:15Z | 2022-05-16T06:45:15Z |
| mal-2022-2103 | Malicious code in com.unity.searcher (npm) | 2022-05-16T06:45:14Z | 2022-05-16T06:45:15Z |
| mal-2022-4945 | Malicious code in npm_test_nothing (npm) | 2022-05-16T06:46:03Z | 2022-05-16T06:46:03Z |
| mal-2022-6722 | Malicious code in ual-content-page (npm) | 2022-05-16T06:46:03Z | 2022-05-16T06:46:03Z |
| mal-2022-7288 | Malicious code in xo-locale (npm) | 2022-05-16T06:46:03Z | 2022-05-16T06:46:03Z |
| mal-2022-870 | Malicious code in adroit-websdk-client (npm) | 2022-05-16T06:46:03Z | 2022-05-16T06:46:04Z |
| mal-2022-2953 | Malicious code in f0-utils (npm) | 2022-05-16T06:46:05Z | 2022-05-16T06:46:05Z |
| mal-2022-2707 | Malicious code in elysium-ui (npm) | 2022-05-16T06:46:05Z | 2022-05-16T06:46:06Z |
| mal-2022-869 | Malicious code in adroit-f0-components (npm) | 2022-05-16T06:46:05Z | 2022-05-16T06:46:06Z |
| mal-2022-1577 | Malicious code in binance-connector-node (npm) | 2022-05-16T06:46:18Z | 2022-05-16T06:46:19Z |
| mal-2022-6524 | Malicious code in testingx (npm) | 2022-05-16T06:46:35Z | 2022-05-16T06:46:35Z |
| mal-2022-998 | Malicious code in angieslist-gulp-build-tasks (npm) | 2022-05-16T06:46:35Z | 2022-05-16T06:46:36Z |
| mal-2022-2609 | Malicious code in dummy-preprocessor (npm) | 2022-05-16T06:47:07Z | 2022-05-16T06:47:08Z |
| mal-2022-3279 | Malicious code in gatsby-plugin-added-by-parent-theme (npm) | 2022-05-16T06:47:08Z | 2022-05-16T06:47:09Z |
| mal-2022-3502 | Malicious code in gulp-browserify-thin (npm) | 2022-05-16T06:47:08Z | 2022-05-16T06:47:15Z |
| mal-2022-2020 | Malicious code in colors-update (npm) | 2022-05-16T07:05:12Z | 2022-05-16T07:06:31Z |
| mal-2022-230 | Malicious code in @epc-apps/alert-servie (npm) | 2022-05-16T07:13:06Z | 2022-05-16T07:13:06Z |
| mal-2022-232 | Malicious code in @epc-apps/api-ingestor (npm) | 2022-05-16T07:13:06Z | 2022-05-16T07:13:06Z |
| mal-2022-234 | Malicious code in @epc-apps/api-outages (npm) | 2022-05-16T07:13:11Z | 2022-05-16T07:13:12Z |
| mal-2022-243 | Malicious code in @epc-infra/users-stack (npm) | 2022-05-16T07:13:11Z | 2022-05-16T07:13:12Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-golang-2021-33194 | 2024-03-06T11:05:26.460Z | 2024-03-06T11:25:28.861Z | |
| bit-mariadb-2022-27458 | 2024-03-06T10:58:21.495Z | 2024-03-06T11:25:28.861Z | |
| bit-postgresql-2024-24213 | 2024-03-06T11:02:10.168Z | 2024-03-06T11:25:28.861Z | |
| bit-rabbitmq-2020-5419 | 2024-03-06T11:04:02.503Z | 2024-03-06T11:25:28.861Z | |
| bit-rabbitmq-2021-22117 | 2024-03-06T11:03:44.606Z | 2024-03-06T11:25:28.861Z | |
| bit-kafka-2024-27309 | 2024-04-16T07:20:25.284Z | 2024-05-02T07:52:56.618Z | |
| bit-solr-2023-44487 | 2024-03-06T11:05:51.759Z | 2024-06-23T19:56:34.118Z | |
| bit-wordpress-2023-28492 | 2024-07-18T07:44:25.068Z | 2024-07-18T07:56:34.499Z | |
| bit-envoy-2024-7207 | 2024-09-26T07:10:09.460Z | 2024-09-26T07:51:02.528Z | |
| bit-gitlab-2022-4315 | 2024-11-05T07:26:59.363Z | 2024-11-27T19:40:48.342Z | |
| bit-wordpress-2023-23814 | 2024-12-11T07:22:41.801Z | 2024-12-11T07:36:45.271Z | |
| bit-node-2025-23087 | 2025-01-27T07:15:36.528Z | 2025-03-02T07:44:48.340Z | |
| bit-node-2025-23088 | 2025-01-27T07:15:29.521Z | 2025-03-02T07:44:48.340Z | |
| bit-node-2025-23089 | 2025-01-27T07:15:22.512Z | 2025-03-02T07:44:48.340Z | |
| bit-wordpress-2023-51474 | 2024-07-18T07:43:55.364Z | 2025-03-24T17:31:38.612Z | |
| bit-wordpress-2024-3755 | 2024-07-18T07:42:10.574Z | 2025-03-24T17:31:38.612Z | |
| bit-wordpress-2024-3756 | 2024-07-18T07:41:57.570Z | 2025-03-24T17:31:38.612Z | |
| bit-wordpress-2024-3992 | 2024-08-06T10:14:12.806Z | 2025-03-24T17:31:38.612Z | |
| bit-airflow-2020-11981 | 2024-03-06T11:01:26.575Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2020-11982 | 2024-03-06T11:01:18.203Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2020-11983 | 2024-03-06T11:01:07.495Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2020-13944 | 2024-03-06T11:00:45.413Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2020-17511 | 2024-03-06T11:00:34.382Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2020-17513 | 2024-03-06T11:00:25.620Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2020-17515 | 2024-03-06T11:00:14.504Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2020-17526 | 2024-03-06T11:00:04.682Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2020-9485 | 2024-03-06T10:59:54.373Z | 2025-04-03T14:40:37.652Z | |
| bit-apache-2020-11984 | 2024-03-06T10:57:57.770Z | 2025-04-03T14:40:37.652Z | |
| bit-apache-2020-11985 | 2024-03-06T10:57:47.876Z | 2025-04-03T14:40:37.652Z | |
| bit-apache-2020-11993 | 2024-03-06T10:57:38.504Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2025-cn65903 | Security fixes for GHSA-6v2p-p543-phr9, GHSA-qxp5-gwg8-xv66, GHSA-vvgc-356p-c3xw applied in versions: 1.5.0-r0, 1.7.0-r0 | 2026-01-16T12:00:42.667592Z | 2025-09-29T13:20:40Z |
| cleanstart-2025-jl63399 | Security fixes for CVE-2025-61729 applied in versions: 0.20.2-r1 | 2026-01-16T12:00:43.312220Z | 2025-12-06T13:34:11Z |
| cleanstart-2025-us16386 | Security fixes for GHSA-qxp5-gwg8-xv66, GHSA-vvgc-356p-c3xw applied in versions: 1.7.2-r0 | 2026-01-16T11:58:18.007779Z | 2025-12-23T06:02:25Z |
| cleanstart-2026-ad41794 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:47:54.368234Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ai42483 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-01-30T16:26:55.732852Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-aj76138 | tar | 2026-01-30T14:58:52.957172Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-an66259 | attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests | 2026-01-30T16:28:25.281484Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-au31441 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:29:25.997506Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-av38242 | Cancelling a query (e | 2026-01-30T15:33:23.662793Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bh03809 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:04:53.009971Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bj28314 | Within HostnameError | 2026-01-30T15:00:22.906070Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bl06950 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:08:23.121647Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bt39952 | Moby is an open source container framework developed by Docker Inc | 2026-01-30T15:45:23.955705Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bx37171 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:43:22.549529Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bz92766 | beego is an open-source web framework for the Go programming language | 2026-01-30T15:34:54.149400Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ch38544 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:19:55.527550Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ck72347 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:07:23.436298Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ct39828 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:31:23.928259Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cy03855 | tar | 2026-01-30T15:18:53.133348Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cz81512 | Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes | 2026-01-30T16:11:25.451968Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dd39330 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:53:22.793144Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-di91874 | Cancelling a query (e | 2026-01-30T15:02:23.274144Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dn29911 | attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing | 2026-01-30T16:57:26.436107Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dn37053 | Within HostnameError | 2026-01-30T16:30:25.711037Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dp30290 | processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input | 2026-01-30T15:52:54.729374Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dv06422 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:40:54.415037Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ek72220 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:24:55.137022Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-er42900 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T15:41:23.817747Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fd27182 | Cancelling a query (e | 2026-01-30T15:02:52.949683Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fm00685 | Cancelling a query (e | 2026-01-30T15:07:53.091254Z | 2026-01-29T18:58:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2023-030 | 2023-07-12T18:19:42.000Z | 2023-07-12T18:39:39.000Z | |
| drupal-contrib-2023-032 | 2023-07-26T19:19:38.000Z | 2023-07-26T20:00:09.000Z | |
| drupal-contrib-2023-031 | 2023-07-26T19:15:46.000Z | 2023-07-27T16:05:03.000Z | |
| drupal-contrib-2023-028 | 2023-06-28T17:21:37.000Z | 2023-07-31T21:17:11.000Z | |
| drupal-contrib-2023-027 | 2023-06-28T17:15:03.000Z | 2023-07-31T21:17:46.000Z | |
| drupal-contrib-2023-029 | 2023-06-28T17:34:47.000Z | 2023-07-31T21:18:37.000Z | |
| drupal-contrib-2023-033 | 2023-08-02T18:59:27.000Z | 2023-08-02T19:52:35.000Z | |
| drupal-contrib-2023-024 | 2023-06-28T17:03:36.000Z | 2023-08-10T13:40:55.000Z | |
| drupal-contrib-2023-026 | 2023-06-28T17:11:07.000Z | 2023-08-10T13:49:56.000Z | |
| drupal-contrib-2023-023 | 2023-06-28T17:02:13.000Z | 2023-08-10T13:53:00.000Z | |
| drupal-contrib-2023-021 | 2023-06-21T17:03:14.000Z | 2023-08-10T13:53:57.000Z | |
| drupal-contrib-2023-020 | 2023-06-14T14:52:36.000Z | 2023-08-10T13:54:32.000Z | |
| drupal-contrib-2023-018 | 2023-05-31T13:20:43.000Z | 2023-08-10T13:56:48.000Z | |
| drupal-contrib-2023-019 | 2023-05-31T13:22:44.000Z | 2023-08-10T13:56:55.000Z | |
| drupal-contrib-2023-017 | 2023-05-31T13:18:52.000Z | 2023-08-10T13:57:22.000Z | |
| drupal-contrib-2023-016 | 2023-05-31T13:14:25.000Z | 2023-08-10T13:58:03.000Z | |
| drupal-contrib-2023-014 | 2023-05-03T15:44:12.000Z | 2023-08-10T13:58:54.000Z | |
| drupal-contrib-2023-013 | 2023-04-12T16:09:25.000Z | 2023-08-10T14:19:21.000Z | |
| drupal-contrib-2023-012 | 2023-03-29T17:44:58.000Z | 2023-08-10T14:19:50.000Z | |
| drupal-contrib-2023-010 | 2023-03-15T17:22:57.000Z | 2023-08-10T14:20:35.000Z | |
| drupal-contrib-2023-009 | 2023-03-08T17:46:44.000Z | 2023-08-10T14:20:59.000Z | |
| drupal-contrib-2023-008 | 2023-03-01T17:38:09.000Z | 2023-08-10T14:21:21.000Z | |
| drupal-contrib-2023-007 | 2023-03-01T17:11:03.000Z | 2023-08-10T14:22:08.000Z | |
| drupal-contrib-2023-006 | 2023-03-01T15:15:08.000Z | 2023-08-10T14:22:32.000Z | |
| drupal-contrib-2023-005 | 2023-02-01T16:13:42.000Z | 2023-08-10T14:23:38.000Z | |
| drupal-contrib-2023-004 | 2023-01-18T17:49:04.000Z | 2023-08-10T14:23:53.000Z | |
| drupal-contrib-2023-001 | 2023-01-11T17:15:37.000Z | 2023-08-10T14:25:04.000Z | |
| drupal-contrib-2023-002 | 2023-01-18T17:28:05.000Z | 2023-08-10T14:25:24.000Z | |
| drupal-contrib-2023-003 | 2023-01-18T17:36:56.000Z | 2023-08-10T14:25:39.000Z | |
| drupal-contrib-2023-011 | 2023-03-15T17:40:02.000Z | 2023-08-10T15:37:51.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2002-000291 | Canna irw_through Buffer Overflow Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2003-000029 | w3m Cross-Site Scripting Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2003-000030 | w3m Vulnerability of Unauthorized Access to Files or Cookies | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2003-000144 | IP Messenger for Win Filename Buffer Overflow Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2003-000149 | lv Arbitrary Command Execution Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2003-000163 | KON2 Buffer Overflow Vulnerability in Command Argument Validation | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2003-000242 | skk Arbitrary Code Execution Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000169 | LHa Vuffer Overflow Vulnerability in Testing and Extracting Process | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000170 | Lha Directory Traversal Vulnerability in Testing and Extracting Process | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000179 | DeleGate SSLway Filter Buffer Overflow Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000195 | LHA Arbitrary Command Execution Vulnerability with Shell Metacharacter in Directory Name | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000196 | LHA Buffer Overflow Vulnerability with lack of Path Length Validation | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000197 | LHA extrace_one Vuffer Overflow Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000231 | KAME Racoon eay_check_x509cert Improper Certificate Verification Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000323 | Ruby CGI Session Management Insecure File Permission Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000473 | Ruby cgi.rb Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000511 | DeleGate Multiple Buffer Overflow Vulnerabilities | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000554 | Namazu cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000586 | Virus Buster Corporate Edition vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000587 | desknet's buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000588 | SSL-VPN products vulnerable to cookie theft | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000589 | Toshiba HDD & DVD video recorders can be accessed without authentication | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000590 | Becky! Internet Mail vulnerability in S/MIME signature verification | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000591 | Shuriken Pro3 S/MIME signature verification does not verify the From address | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000592 | Shuriken Pro3 S/MIME signature verification does not verify the certificate authenticity | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000593 | LDAP server update function vulnerable to buffer overflow | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2004-000594 | DNS cache servers resource consumption by TCP SYN_SENT states | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000163 | Sylpheed Email Header Buffer Overflow Vulnerability with non-ASCII Characters | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000183 | Apache Tomcat denial of service vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000199 | Sylpheed Filename Buffer Overflow Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|---|---|
| ts-2022-001 | TS-2022-001 | 2022-02-07T00:00 |
| ts-2022-002 | TS-2022-002 | 2022-05-11T00:00 |
| ts-2022-003 | TS-2022-003 | 2022-06-14T00:00 |
| ts-2022-004 | TS-2022-004 | 2022-11-21T00:00 |
| ts-2022-005 | TS-2022-005 | 2022-11-21T00:00 |
| ts-2023-001 | TS-2023-001 | 2023-01-17T00:00 |
| ts-2023-002 | TS-2023-002 | 2023-01-24T00:00 |
| ts-2023-003 | TS-2023-003 | 2023-03-22T00:00 |
| ts-2023-004 | TS-2023-004 | 2023-04-04T00:00 |
| ts-2023-005 | TS-2023-005 | 2023-04-28T00:00 |
| ts-2023-006 | TS-2023-006 | 2023-08-22T00:00 |
| ts-2023-007 | TS-2023-007 | 2023-10-26T00:00 |
| ts-2023-008 | TS-2023-008 | 2023-11-01T00:00 |
| ts-2023-009 | TS-2023-009 | 2023-12-22T00:00 |
| ts-2024-001 | TS-2024-001 | 2024-01-08T00:00 |
| ts-2024-002 | TS-2024-002 | 2024-01-30T00:00 |
| ts-2024-003 | TS-2024-003 | 2024-04-23T00:00 |
| ts-2024-004 | TS-2024-004 | 2024-05-06T00:00 |
| ts-2024-005 | TS-2024-005 | 2024-05-08T00:00 |
| ts-2024-006 | TS-2024-006 | 2024-05-22T00:00 |
| ts-2024-007 | TS-2024-007 | 2024-06-12T00:00 |
| ts-2024-008 | TS-2024-008 | 2024-06-14T00:00 |
| ts-2024-009 | TS-2024-009 | 2024-06-27T00:00 |
| ts-2024-010 | TS-2024-010 | 2024-07-19T00:00 |
| ts-2024-011 | TS-2024-011 | 2024-07-22T00:00 |
| ts-2024-012 | TS-2024-012 | 2024-10-02T00:00 |
| ts-2024-013 | TS-2024-013 | 2024-12-04T00:00 |
| ts-2025-001 | TS-2025-001 | 2025-03-07T00:00 |
| ts-2025-002 | TS-2025-002 | 2025-05-15T00:00 |
| ts-2025-003 | TS-2025-003 | 2025-05-21T00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2014-09151 | Puppet Enterprise信息泄露漏洞(CNVD-2014-09151) | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09154 | ARRIS Touchstone TG862G/CT Telephony Gateway安全机制绕过漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09180 | Drupal Open Atrium Module存在多个漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09181 | IBM WebSphere Application Server信息泄露漏洞(CNVD-2014-09181) | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09182 | IBM WebSphere Application Server目录遍历漏洞(CNVD-2014-09182) | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09183 | IBM WebSphere Application Server跨站脚本漏洞(CNVD-2014-09183) | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09184 | IBM WebSphere Application Server点击劫持漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09185 | IBM WebSphere Application Server Liberty Profile权限提升漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09186 | Puppet Server争用条件漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09187 | Cisco IronPort Email Security Appliance拒绝服务漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09188 | OpenSSL 's23_srvr.c'拒绝服务漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09189 | Cisco Meraki MS MRMX信息泄露漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09190 | Cisco Meraki MS MRMX任意命令执行漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09191 | Cisco Meraki MS MRMX存在shell获取漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09192 | Cisco Meraki MS MRMX任意固件安装漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09193 | IBM Security Access Manager拒绝服务漏洞(CNVD-2014-09193) | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09194 | IBM Security Access Manager信息泄露漏洞(CNVD-2014-09194) | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09195 | NetIQ Access Manager目录遍历漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09196 | IBM Security Access Manager信息泄露漏洞(CNVD-2014-09196) | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09197 | NetIQ Access Manager存在多个跨站脚本漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09198 | IBM Security Access Manager信息泄露漏洞(CNVD-2014-09198) | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09199 | IBM Security Access Manager信息泄露漏洞(CNVD-2014-09199) | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09200 | IBM Security Access Manager信息泄露漏洞(CNVD-2014-09200) | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09201 | IBM Security Access Manager拒绝服务漏洞(CNVD-2014-09201) | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09202 | IBM Security Access Manager SQL注入漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09203 | IBM Security Access Manager安全机制绕过漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09204 | IBM Security Access Manager跨站请求伪造漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09205 | IBM Security Access Manager点击劫持漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09206 | WordPress插件TwitterDash跨站请求伪造漏洞 | 2014-12-26 | 2014-12-29 |
| cnvd-2014-09207 | Piwigo 'rate_picture'函数SQL注入漏洞 | 2014-12-26 | 2014-12-29 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2014-00001 | Уязвимость микропрограммного обеспечения программируемого логического контроллера Schneid… | 07.07.2016 | 28.11.2016 |
| bdu:2014-00005 | Уязвимость гипервизора VMware Workstation, позволяющая злоумышленнику получить контроль н… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00006 | Уязвимость гипервизора VMware ESXi, позволяющая злоумышленнику повысить привилегии или вы… | 07.07.2016 | 28.11.2016 |
| bdu:2014-00009 | Уязвимость текстового редактора Microsoft Word, позволяющая злоумышленнику вызвать отказ … | 05.07.2016 | 28.11.2016 |
| bdu:2014-00010 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику выполнить произвольный код | 05.07.2016 | 28.11.2016 |
| bdu:2014-00011 | Уязвимость системы управления базами данных MySQL, позволяющая злоумышленнику, прошедшему… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00012 | Уязвимость системы управления базами данных MySQL, позволяющая злоумышленнику, прошедшему… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00013 | Уязвимость системы обмена программными сообщениями Apache Qpid, позволяющая злоумышленник… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00014 | Уязвимость системы мониторинга вычислительных ресурсов Ganglia, позволяющая злоумышленник… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00015 | Уязвимость микропрограммного обеспечения маршрутизатора Cisco Linksys WRT350N, позволяюща… | 07.07.2016 | 28.11.2016 |
| bdu:2014-00016 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику получить привилегии… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00019 | Уязвимость программного обеспечения управления виртуальной инфраструктурой VMware vCenter… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00020 | Уязвимость микропрограммного обеспечения программируемого логического контроллера Siemens… | 07.07.2016 | 28.11.2016 |
| bdu:2014-00021 | Уязвимость микропрограммного обеспечения программируемого логического контроллера Siemens… | 07.07.2016 | 28.11.2016 |
| bdu:2014-00022 | Уязвимость микропрограммного обеспечения программируемого логического контроллера Siemens… | 07.07.2016 | 28.11.2016 |
| bdu:2014-00023 | Уязвимость микропрограммного обеспечения программируемого логического контроллера Siemens… | 07.07.2016 | 28.11.2016 |
| bdu:2014-00024 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику вызвать отказ в обс… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00025 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику вызвать отказ в обс… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00026 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику вызвать отказ в обс… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00027 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику вызвать отказ в обс… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00028 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику вызвать отказ в обс… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00029 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику вызвать отказ в обс… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00030 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику вызвать отказ в обс… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00031 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику вызвать отказ в обс… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00032 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику вызвать отказ в обс… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00033 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику повысить привилегии… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00034 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику вызвать отказ в обс… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00035 | Уязвимость операционных систем Cisco IOS, Cisco IOS XE и системы управления IP-телефонией… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00036 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику вызвать «отказ в об… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00037 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику вызвать «отказ в об… | 05.07.2016 | 28.11.2016 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2000-avi-001 | Débordements de variables dans les services authentifiés par Kerberos | 2000-05-18T00:00:00.000000 | 2000-05-18T00:00:00.000000 |
| certa-2000-avi-002 | Vulnérabilités dans Office 2000 | 2000-05-25T00:00:00.000000 | 2000-05-25T00:00:00.000000 |
| certa-2000-avi-003 | Vulnérabilité sous HP Web JetAdmin Version 5.6 et antérieures | 2000-05-29T00:00:00.000000 | 2000-05-29T00:00:00.000000 |
| certa-2000-avi-004 | Vulnérabilité dans le protocole du service explorateur d'ordinateurs sous Windows NT et Windows 2000 | 2000-05-29T00:00:00.000000 | 2000-05-29T00:00:00.000000 |
| certa-2000-avi-005 | Deux nouveaux vers VBS | 2000-05-31T00:00:00.000000 | 2000-05-31T00:00:00.000000 |
| certa-2000-avi-006 | Vulnérabilités lors de sessions SSL | 2000-06-07T00:00:00.000000 | 2000-06-07T00:00:00.000000 |
| certa-2000-avi-007 | Vulnérabilités sur le serveur FTP utilisant Kerberos 5 | 2000-06-15T00:00:00.000000 | 2000-06-15T00:00:00.000000 |
| certa-2000-avi-008 | Vulnérabilité sous Windows 2000 | 2000-06-19T00:00:00.000000 | 2000-06-19T00:00:00.000000 |
| certa-2000-avi-009 | Exécution de fichiers locaux grâce aux fichiers d'aides de Microsoft Windows | 2000-06-20T00:00:00.000000 | 2000-06-20T00:00:00.000000 |
| certa-2000-avi-010 | Débordement de pile dans le programme <TT>splitVT</TT> | 2000-06-20T00:00:00.000000 | 2000-06-20T00:00:00.000000 |
| certa-2000-avi-011 | Problèmes de privilèges dans les extensions de FrontPage | 2000-06-27T00:00:00.000000 | 2000-06-27T00:00:00.000000 |
| certa-2000-avi-012 | Vulnérabilité dans « Workshop » cvconnect sous IRIX | 2000-06-29T00:00:00.000000 | 2000-06-29T00:00:00.000000 |
| certa-2000-avi-013 | Vulnérabilité dans Microsoft SQL Serveur | 2000-07-11T00:00:00.000000 | 2000-07-11T00:00:00.000000 |
| certa-2000-avi-014 | Vulnérabilité dans l'utilitaire makewhatis sous Unix | 2000-07-13T00:00:00.000000 | 2000-07-13T00:00:00.000000 |
| certa-2000-avi-015 | Vulnérabilité dans l'en-tête des mèls sous Outlook | 2000-07-19T00:00:00.000000 | 2000-07-19T00:00:00.000000 |
| certa-2000-avi-016 | Vulnérabilités dans Internet Explorer 4.01, Office 2000 et PowerPoint 97 | 2000-07-19T00:00:00.000000 | 2000-07-19T00:00:00.000000 |
| certa-2000-avi-017 | Vulnérabilité du service Telnet sous Windows 2000 | 2000-07-25T00:00:00.000000 | 2000-07-25T00:00:00.000000 |
| certa-2000-avi-018 | Vulnérabilité sous Netscape 4.73 et antérieures | 2000-07-27T00:00:00.000000 | 2000-07-27T00:00:00.000000 |
| certa-2000-avi-019 | Virus sous Autocad2000 | 2000-07-27T00:00:00.000000 | 2000-07-27T00:00:00.000000 |
| certa-2000-avi-020 | Vulnérabilité sous Adobe Acrobat | 2000-07-27T00:00:00.000000 | 2000-07-27T00:00:00.000000 |
| certa-2000-avi-021 | Vulnérabilité dans le protocole NBNS sous Windows NT et 2000 | 2000-07-28T00:00:00.000000 | 2000-07-28T00:00:00.000000 |
| certa-2000-avi-022 | Vulnérabilités sous Firewall-1 | 2000-08-03T00:00:00.000000 | 2000-08-03T00:00:00.000000 |
| certa-2000-avi-023 | Vulnérabilité dans le « Service Control Manager » de Windows 2000 | 2000-08-07T00:00:00.000000 | 2000-08-07T00:00:00.000000 |
| certa-2000-avi-024 | Vulnérabilités dans les programmes et librairies d'impression sous Solaris | 2000-08-08T00:00:00.000000 | 2000-08-08T00:00:00.000000 |
| certa-2000-avi-025 | Vulnérabilité de Windows 9x avec le protocole IPX | 2000-08-08T00:00:00.000000 | 2000-08-08T00:00:00.000000 |
| certa-2000-avi-026 | Vulnérabilité de Netscape avec Java | 2000-08-09T00:00:00.000000 | 2000-08-09T00:00:00.000000 |
| certa-2000-avi-027 | Débordement de mémoire dans les documents HTML d'Office 2000 | 2000-08-16T00:00:00.000000 | 2000-08-16T00:00:00.000000 |
| certa-2000-avi-028 | Vulnérabilité dans les permissions de fichiers sous IIS version 4.0 et 5.0 | 2000-08-16T00:00:00.000000 | 2000-08-16T00:00:00.000000 |
| certa-2000-avi-029 | Faille dans le démon telnetd sous IRIX de SGI | 2000-08-17T00:00:00.000000 | 2000-08-17T00:00:00.000000 |
| certa-2000-avi-030 | Vulnérabilité sous Internet Information Server 5.0 | 2000-08-17T00:00:00.000000 | 2000-08-17T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2000-ale-002 | Alerte de virus NEWLOVE | 2000-05-19T00:00:00.000000 | 2000-05-19T00:00:00.000000 |
| certa-2000-ale-003 | « Mesures de performances » de l'Internet | 2000-05-26T00:00:00.000000 | 2000-05-26T00:00:00.000000 |
| certa-2000-ale-004 | Virus Macro OF97/Cybernet-A | 2000-05-26T00:00:00.000000 | 2000-05-26T00:00:00.000000 |
| certa-2000-ale-005 | Virus macro V97M/Resume.A | 2000-05-29T00:00:00.000000 | 2000-05-29T00:00:00.000000 |
| certa-2000-ale-006 | Deni de service sous Firewall-1 | 2000-06-08T00:00:00.000000 | 2000-06-08T00:00:00.000000 |
| certa-2000-ale-007 | Virus VBS/LoveLet-AS | 2000-06-09T00:00:00.000000 | 2000-06-09T00:00:00.000000 |
| certa-2000-ale-008 | The Serbian Badman Trojan (TSB) | 2000-06-13T00:00:00.000000 | 2000-06-13T00:00:00.000000 |
| certa-2000-ale-009 | Ver VBS/Stages-A, Mirc/stages-a, pIRC/Stages-A | 2000-06-20T00:00:00.000000 | 2000-06-20T00:00:00.000000 |
| certa-2000-ale-010 | Vulnérabilités dans le serveur de fichier wu-ftpd | 2000-06-26T00:00:00.000000 | 2000-06-26T00:00:00.000000 |
| certa-2000-ale-011 | Trojan Simpsons | 2000-06-29T00:00:00.000000 | 2000-06-29T00:00:00.000000 |
| certa-2000-ale-001 | Alerte de virus LOVE-LETTER-FOR-YOU | 2000-05-05T00:00:00.000000 | 2000-07-05T00:00:00.000000 |
| certa-2000-ale-012 | Mauvaise compatibilité des scanners de virus avec NTFS | 2000-09-08T00:00:00.000000 | 2000-09-08T00:00:00.000000 |
| certa-2000-ale-014 | Vulnérabilité dans la bibliothèque glibc sous Unix | 2000-09-14T00:00:00.000000 | 2000-09-14T00:00:00.000000 |
| certa-2000-ale-013 | Virus VBS Quatro-A | 2000-09-18T00:00:00.000000 | 2000-09-18T00:00:00.000000 |
| certa-2000-ale-015 | Risque d'usurpation de l'identité de Sun Microsystems | 2000-10-25T00:00:00.000000 | 2000-10-25T00:00:00.000000 |
| certa-2000-ale-016 | Connexion à Wanadoo | 2000-11-30T00:00:00.000000 | 2000-11-30T00:00:00.000000 |
| certa-2001-ale-001 | Propagation du ver Ramen sous Linux. | 2001-01-19T00:00:00.000000 | 2001-01-19T00:00:00.000000 |
| certa-2001-ale-002 | Risque d'exploitation des ressources partagées sous Windows | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| certa-2001-ale-003 | Prolifération du ver Li0n | 2001-03-26T00:00:00.000000 | 2001-03-26T00:00:00.000000 |
| certa-2001-ale-004 | Vulnérabilité dans le démon snmpXdmid sous Sun Solaris | 2001-03-30T00:00:00.000000 | 2001-03-30T00:00:00.000000 |
| certa-2001-ale-005 | Vulnérabilités dans les modems ADSL d'Alcatel | 2001-04-11T00:00:00.000000 | 2001-04-11T00:00:00.000000 |
| certa-2001-ale-006 | Prolifération en Europe du virus HOMEPAGE | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| certa-2001-ale-007 | Propagation d'un ver affectant sadmind et IIS | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| certa-2001-ale-009 | Propagation importante du virus SirCam | 2001-07-24T00:00:00.000000 | 2001-07-26T00:00:00.000000 |
| certa-2001-ale-008 | Propagation du ver « Code Red » | 2001-07-18T00:00:00.000000 | 2001-08-13T00:00:00.000000 |
| certa-2001-ale-010 | Propagation du ver "Code Blue" | 2001-09-07T00:00:00.000000 | 2001-09-07T00:00:00.000000 |
| certa-2001-ale-011 | <TT>antivirus2001</TT> est un cheval de Troie | 2001-09-10T00:00:00.000000 | 2001-09-13T00:00:00.000000 |
| certa-2001-ale-013 | Propagation du ver/virus NIMDA (Concept Virus) | 2001-09-19T00:00:00.000000 | 2001-09-19T00:00:00.000000 |
| certa-2001-ale-014 | Risque de divulgation de données personnelles/confidentielles par des produits Microsoft | 2001-10-19T00:00:00.000000 | 2001-10-19T00:00:00.000000 |
| certa-2001-ale-015 | Exploitation massive d'une ancienne vulnérabilité de SSH | 2001-11-19T00:00:00.000000 | 2001-11-19T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-127 | Heap-use-after-free in UA_ServerConfig_clean | 2022-02-07T00:00:13.222125Z | 2022-02-07T00:00:13.222344Z |
| osv-2022-129 | Heap-buffer-overflow in dwg_free_HATCH_private | 2022-02-09T00:00:11.798343Z | 2022-02-09T00:00:11.798577Z |
| osv-2022-188 | Incorrect-function-pointer-type in cv::split | 2022-02-23T00:00:47.945292Z | 2022-02-23T00:00:47.945497Z |
| osv-2022-231 | Heap-buffer-overflow in do_fileid | 2022-03-11T00:00:50.495613Z | 2022-03-11T00:00:50.495861Z |
| osv-2022-237 | Stack-buffer-overflow in sc_format_oid | 2022-03-12T00:00:21.696792Z | 2022-03-12T00:00:21.697036Z |
| osv-2022-268 | Stack-use-after-return in template_sanity_check | 2022-03-21T00:01:55.565037Z | 2022-03-21T00:01:55.565249Z |
| osv-2022-276 | Segv on unknown address in sc_file_clear_acl_entries | 2022-03-24T00:00:43.845979Z | 2022-03-24T00:00:43.846203Z |
| osv-2022-282 | Heap-buffer-overflow in cosm_new_file | 2022-03-26T00:01:18.978386Z | 2022-03-26T00:01:18.978611Z |
| osv-2022-283 | Heap-buffer-overflow in epassNUMBER_hook_path | 2022-03-26T00:01:45.914197Z | 2022-03-26T00:01:45.914434Z |
| osv-2022-296 | Negative-size-param in jxl::N_SSE4::BlendingStage::ProcessPaddingRow | 2022-04-03T00:00:21.308788Z | 2022-04-03T00:00:21.309111Z |
| osv-2022-301 | Heap-buffer-overflow in template_compose_group | 2022-04-04T00:01:45.327471Z | 2022-04-04T00:01:45.327710Z |
| osv-2022-305 | Heap-buffer-overflow in jxl::N_AVX2::BlendingStage::ProcessPaddingRow | 2022-04-05T00:00:26.264820Z | 2022-04-05T00:00:26.265051Z |
| osv-2022-313 | Heap-buffer-overflow in generic_unpack | 2022-04-07T00:00:47.839342Z | 2022-04-07T00:00:47.839583Z |
| osv-2022-320 | Heap-buffer-overflow in lwan_h2_huffman_decode_for_fuzzing | 2022-04-09T00:00:11.593728Z | 2022-04-09T00:00:11.594Z |
| osv-2022-322 | Heap-buffer-overflow in frame_get_metalayers | 2022-04-09T00:00:44.310354Z | 2022-04-09T00:00:44.310661Z |
| osv-2022-323 | Heap-buffer-overflow in ConvertRGB24ToY_SSE41 | 2022-04-09T00:00:46.308548Z | 2022-04-09T00:00:46.308780Z |
| osv-2020-2099 | Heap-buffer-overflow in decode_chars | 2020-10-28T00:00:05.887987Z | 2022-04-13T03:04:30.610125Z |
| osv-2021-442 | Heap-buffer-overflow in fnv_32a_buf | 2021-02-24T00:00:23.135123Z | 2022-04-13T03:04:30.615610Z |
| osv-2021-689 | UNKNOWN WRITE in Runtime_Release | 2021-04-27T00:01:03.314259Z | 2022-04-13T03:04:30.620813Z |
| osv-2021-660 | UNKNOWN READ in op_BranchIfPrologue_s | 2021-04-20T00:00:13.765122Z | 2022-04-13T03:04:30.630968Z |
| osv-2021-687 | UNKNOWN WRITE in InitDataSegments | 2021-04-26T00:00:14.214692Z | 2022-04-13T03:04:30.636114Z |
| osv-2021-701 | Heap-use-after-free in m3_FreeRuntime | 2021-04-29T00:00:23.083315Z | 2022-04-13T03:04:30.646328Z |
| osv-2021-700 | UNKNOWN READ in ReadLEB_u32 | 2021-04-29T00:00:12.162949Z | 2022-04-13T03:04:30.651451Z |
| osv-2021-642 | Heap-buffer-overflow in op_Const64 | 2021-04-17T00:00:10.657238Z | 2022-04-13T03:04:30.656599Z |
| osv-2021-688 | Segv on unknown address in std::__Fuzzer::basic_string<char, std::__Fuzzer::char_traits<char>, std::__Fuzze | 2021-04-27T00:01:02.966143Z | 2022-04-13T03:04:30.661693Z |
| osv-2021-728 | UNKNOWN WRITE in _fini | 2021-05-05T00:00:31.085366Z | 2022-04-13T03:04:30.671774Z |
| osv-2021-699 | UNKNOWN WRITE in m3_FreeModule | 2021-04-28T00:01:11.169950Z | 2022-04-13T03:04:30.676815Z |
| osv-2021-698 | UNKNOWN READ in m3_Realloc | 2021-04-28T00:01:10.793206Z | 2022-04-13T03:04:30.686964Z |
| osv-2021-1173 | UNKNOWN READ in luaG_getfuncline | 2021-08-28T00:00:12.122245Z | 2022-04-13T03:04:30.697967Z |
| osv-2021-1171 | Heap-buffer-overflow in luaG_runerror | 2021-08-27T00:00:11.241923Z | 2022-04-13T03:04:30.719580Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2016-0004 | libusb is unmaintained; use rusb instead | 2016-09-10T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2016-0006 | `cassandra` crate is unmaintained; use `cassandra-cpp` instead | 2016-12-15T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2017-0007 | lz4-compress is unmaintained | 2017-04-17T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2018-0014 | chan is end-of-life; use crossbeam-channel instead | 2018-07-31T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2018-0015 | term is looking for a new maintainer | 2018-11-19T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2018-0016 | quickersort is deprecated and unmaintained | 2018-06-30T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2018-0017 | `tempdir` crate has been deprecated; use `tempfile` instead | 2018-02-13T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2019-0032 | crust repo has been archived; use libp2p instead | 2019-11-21T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0003 | rust_sodium is unmaintained; switch to a modern alternative | 2020-01-20T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0010 | tiberius is unmaintained | 2020-02-28T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0016 | `net2` crate has been deprecated; use `socket2` instead | 2020-05-01T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0018 | crate has been renamed to `block-cipher` | 2020-05-26T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0020 | `stb_truetype` crate has been deprecated; use `ttf-parser` instead | 2020-04-18T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0051 | Obsolete versions of the `rustsec` crate do not support the new V3 advisory format | 2020-10-01T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0056 | stdweb is unmaintained | 2020-05-04T12:00:00Z | 2020-10-25T18:57:46Z |
| rustsec-2020-0057 | crate has been renamed to `cipher` | 2020-10-15T12:00:00Z | 2020-10-25T19:05:32Z |
| rustsec-2020-0058 | crate has been renamed to `cipher` | 2020-10-15T12:00:00Z | 2020-10-25T19:14:03Z |
| rustsec-2020-0063 | crate has been renamed to `safe-nd` | 2020-11-02T12:00:00Z | 2020-11-02T14:43:36Z |
| rustsec-2020-0064 | crate has been renamed to `sn_ffi_utils` | 2020-11-02T12:00:00Z | 2020-11-02T14:45:15Z |
| rustsec-2020-0065 | crate has been renamed to `sn_fake_clock` | 2020-11-02T12:00:00Z | 2020-11-02T14:46:33Z |
| rustsec-2020-0066 | crate has been renamed to `sn_bindgen` | 2020-11-02T12:00:00Z | 2020-11-02T14:48:54Z |
| rustsec-2020-0067 | crate has been renamed to `qp2p` | 2020-11-02T12:00:00Z | 2020-11-02T14:50:19Z |
| rustsec-2020-0076 | crate has been renamed to `sn_routing` | 2020-11-02T12:00:00Z | 2020-12-02T17:59:27Z |
| rustsec-2020-0083 | crate has been superseded by `sn_client` | 2020-12-07T12:00:00Z | 2020-12-07T17:22:02Z |
| rustsec-2020-0084 | crate has been superseded by `sn_client` | 2020-12-07T12:00:00Z | 2020-12-07T17:22:02Z |
| rustsec-2020-0085 | crate has been renamed to `sn_node` | 2020-12-07T12:00:00Z | 2020-12-07T17:22:02Z |
| rustsec-2020-0086 | crate has been renamed to `sn_client` | 2020-12-07T12:00:00Z | 2020-12-07T17:22:02Z |
| rustsec-2021-0002 | interfaces2 is unmaintained, use interfaces instead | 2021-01-04T12:00:00Z | 2021-01-06T16:07:19Z |
| rustsec-2020-0109 | stderr is unmaintained; use eprintln instead | 2020-12-22T12:00:00Z | 2021-01-20T19:29:04Z |
| rustsec-2020-0144 | lzw is unmaintained | 2020-02-10T12:00:00Z | 2021-02-10T18:27:15Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2019:0975 | Important: container-tools:rhel8 security and bug fix update | 2019-05-07T03:39:11Z | 2019-05-07T03:39:02Z |
| alsa-2019:0981 | Important: python27:2.7 security update | 2019-05-07T03:40:00Z | 2019-05-07T03:39:54Z |
| alsa-2019:0984 | Moderate: python36:3.6 security update | 2019-05-07T03:40:33Z | 2019-05-07T03:40:21Z |
| alsa-2019:1529 | Important: pki-deps:10.6 security update | 2019-06-18T16:36:21Z | 2019-06-18T16:36:09Z |
| alsa-2019:1972 | Important: ruby:2.5 security update | 2019-07-30T11:16:25Z | 2019-07-30T15:56:05Z |
| alsa-2019:2511 | Important: mysql:8.0 security update | 2019-08-15T17:31:05Z | 2019-08-15T17:31:05Z |
| alsa-2019:2512 | Important: subversion:1.10 security update | 2019-08-15T17:34:10Z | 2019-08-15T17:34:10Z |
| alsa-2019:2593 | Important: squid:4 security update | 2019-09-02T10:22:04Z | 2019-09-02T10:22:04Z |
| alsa-2019:2720 | Important: pki-deps:10.6 security update | 2019-09-10T15:32:49Z | 2019-09-10T15:32:43Z |
| alsa-2019:2799 | Important: nginx:1.14 security update | 2019-09-17T08:45:10Z | 2019-09-17T08:45:10Z |
| alsa-2019:2925 | Important: nodejs:10 security update | 2019-09-30T07:07:29Z | 2019-09-30T07:07:29Z |
| alsa-2019:3335 | Moderate: python27:2.7 security and bug fix update | 2019-11-05T17:32:12Z | 2019-11-05T17:31:55Z |
| alsa-2019:3403 | Important: container-tools:rhel8 security, bug fix, and enhancement update | 2019-11-05T17:41:57Z | 2019-11-05T17:41:43Z |
| alsa-2019:3476 | Moderate: squid:4 security and bug fix update | 2019-11-05T17:50:00Z | 2019-11-05T17:49:48Z |
| alsa-2019:3494 | Important: container-tools:1.0 security and bug fix update | 2019-11-05T17:52:13Z | 2019-11-05T17:52:00Z |
| alsa-2019:3735 | Critical: php:7.2 security update | 2019-11-06T13:15:34Z | 2019-11-06T13:15:21Z |
| alsa-2019:3736 | Critical: php:7.3 security update | 2019-11-06T13:15:46Z | 2019-11-06T13:15:34Z |
| alsa-2019:4269 | Important: container-tools:rhel8 security and bug fix update | 2019-12-17T09:19:28Z | 2019-12-17T09:19:15Z |
| alsa-2019:4273 | Important: container-tools:1.0 security update | 2019-12-17T09:20:02Z | 2019-12-17T09:19:52Z |
| alsa-2020:0348 | Important: container-tools:rhel8 security, bug fix, and enhancement update | 2020-02-04T11:39:46Z | 2020-02-04T11:39:39Z |
| alsa-2020:0579 | Important: nodejs:10 security update | 2020-02-25T07:57:02Z | 2020-02-25T07:57:02Z |
| alsa-2020:0598 | Important: nodejs:12 security update | 2020-02-25T13:06:23Z | 2020-02-25T13:06:23Z |
| alsa-2020:1293 | Important: nodejs:12 security update | 2020-04-02T07:23:16Z | 2020-04-02T07:23:16Z |
| alsa-2020:1317 | Important: nodejs:10 security update | 2020-04-06T07:21:40Z | 2020-04-06T07:21:40Z |
| alsa-2020:1379 | Important: container-tools:rhel8 security and bug fix update | 2020-04-07T09:15:36Z | 2020-04-07T09:15:25Z |
| alsa-2020:1360 | Important: container-tools:1.0 security update | 2020-04-07T12:58:09Z | 2020-04-07T12:58:07Z |
| alsa-2020:1605 | Moderate: python27:2.7 security, bug fix, and enhancement update | 2020-04-28T08:55:59Z | 2020-04-28T08:55:52Z |
| alsa-2020:1624 | Moderate: php:7.2 security, bug fix, and enhancement update | 2020-04-28T08:57:54Z | 2020-04-28T08:57:41Z |
| alsa-2020:1644 | Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update | 2020-04-28T09:00:20Z | 2020-04-28T09:00:04Z |
| alsa-2020:1650 | Moderate: container-tools:rhel8 security, bug fix, and enhancement update | 2020-04-28T09:01:00Z | 2020-04-28T09:00:50Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| osec-2017-01 | Local privilege escalation issue with ocaml binaries | 2017-06-23T15:19:47Z | 2025-12-16T12:00:00Z |
| osec-2018-01 | An integer overflow in the `bigarray` serialization module leads to arbitrary code execution | 2018-04-06T18:29:00Z | 2025-12-16T12:00:00Z |
| osec-2016-01 | Buffer overflow and information leak in OCaml < 4.03.0 | 2016-04-29T00:18:22Z | 2026-01-01T12:00:00Z |
| osec-2023-01 | Time of check time of use issue in opam's cache | 2023-05-25T12:00:00Z | 2026-01-09T12:00:00Z |
| osec-2016-02 | Memory disclosure in mirage-net-xen | 2016-05-03T00:00:00Z | 2026-01-13T12:00:00Z |
| osec-2019-01 | Memory disclosure in mirage-net-xen | 2019-03-21T00:00:00Z | 2026-01-13T12:00:00Z |
| osec-2019-02 | Grant unshare vulnerability in mirage-xen | 2019-04-26T00:00:00Z | 2026-01-13T12:00:00Z |
| osec-2025-01 | Albatross console out of memory | 2025-08-15T00:18:22Z | 2026-01-13T12:00:00Z |
| osec-2026-01 | Buffer Over-Read in OCaml Marshal Deserialization | 2026-02-17T13:30:00Z | 2026-02-17T15:00:00Z |
| osec-2022-01 | Infinite loop in console output on xen | 2022-12-07T00:00:00Z | 2026-02-18T09:30:00Z |
| osec-2026-02 | ARP unbounded memory usage | 2026-02-18T10:30:00Z | 2026-02-18T10:30:00Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| hsec-2023-0001 | Hash flooding vulnerability in aeson | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0002 | Improper Verification of Cryptographic Signature | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0003 | code injection in xmonad-contrib | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0004 | xml-conduit unbounded entity expansion | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0005 | tls-extra: certificate validation does not check Basic Constraints | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0006 | x509-validation does not enforce pathLenConstraint | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0007 | readFloat: memory exhaustion with large exponent | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0008 | Stored XSS in hledger-web | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0009 | git-annex command injection via malicious SSH hostname | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0010 | git-annex private data exfiltration to compromised remote | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0011 | git-annex GPG decryption attack via compromised remote | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0012 | git-annex checksum exposure to encrypted special remotes | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0013 | git-annex plaintext storage of embedded credentials on encrypted remotes | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0014 | Arbitrary file write is possible when using PDF output or --extract-media with untrusted input | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2023-0015 | cabal-install uses expired key policies | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0001 | Reflected XSS vulnerability in keter | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0002 | out-of-bounds write when there are many bzip2 selectors | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0003 | process: command injection via argument list on Windows | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0006 | fromIntegral: conversion error | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0007 | Sign extension error in the AArch64 NCG | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0008 | Sign extension error in the PPC64le FFI | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2024-0009 | Public key confusion in third-party blocks | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0001 | Subword division operations may produce incorrect results | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0002 | Double Public Key Signing Function Oracle Attack on Ed25519 | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0003 | Use after free in multithreaded lzma (.xz) decoder | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0004 | Broken Path Sanitization in spacecookie Library | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0005 | cabal-install dependency confusion | 2025-11-14T14:45:34Z | 2025-11-14T14:45:34Z |
| hsec-2025-0006 | Private key leak via inherited file descriptor | 2025-11-17T02:22:38Z | 2025-11-17T02:22:38Z |
| hsec-2025-0007 | cmark-gfm: resource exhaustion due to quadratic complexity in parser | 2025-12-27T08:58:56Z | 2025-12-27T08:58:56Z |
| hsec-2024-0004 | Hackage package and doc upload stored XSS vulnerability | 2026-01-16T11:18:20Z | 2026-01-16T11:18:20Z |