Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2013-1894 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-2561. Reason: This candidate is a duplicate of CVE-2013-2561. Notes: All CVE users should reference CVE-2013-2561 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2013-11-23T18:00:00.000Z | 2013-11-23T18:28:53.000Z |
| CVE-2013-3550 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-0237. Reason: This candidate is a reservation duplicate of CVE-2013-0237. Notes: All CVE users should reference CVE-2013-0237 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2013-12-01T17:00:00.000Z | 2013-12-01T17:26:34.000Z |
| CVE-2013-6379 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-4513. Reason: This candidate is a duplicate of CVE-2013-4513. Notes: All CVE users should reference CVE-2013-4513 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2013-11-25T15:00:00.000Z | 2013-12-01T17:26:34.000Z |
| CVE-2013-4417 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2013-12-02T22:00:00.000Z | 2013-12-02T21:57:00.000Z |
| CVE-2013-4528 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2013-12-02T22:00:00.000Z | 2013-12-02T21:57:00.000Z |
| CVE-2013-4543 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2013-12-02T22:00:00.000Z | 2013-12-02T21:57:00.000Z |
| CVE-2013-6356 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue because of dependency on the victim's direct involvement in modifying the Windows registry to enable the attack. Notes: none | N/A | N/A | 2013-12-09T18:00:00.000Z | 2013-12-09T18:57:00.000Z |
| CVE-2013-2215 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2013-12-10T11:00:00.000Z | 2013-12-10T02:57:00.000Z |
| CVE-2013-4403 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-4404. Reason: This candidate is a reservation duplicate of CVE-2013-4404. Notes: All CVE users should reference CVE-2013-4404 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2013-12-19T22:00:00.000Z | 2013-12-19T21:57:00.000Z |
| CVE-2013-4418 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2013-12-19T22:00:00.000Z | 2013-12-19T21:57:00.000Z |
| CVE-2013-6995 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2013-12-21T21:00:00.000Z | 2013-12-21T20:57:00.000Z |
| CVE-2010-4174 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-3282. Reason: This candidate is a duplicate of CVE-2010-3282. Notes: All CVE users should reference CVE-2010-3282 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2013-12-27T01:00:00.000Z | 2013-12-27T00:57:03.000Z |
| CVE-2013-3282 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2014-01-02T11:00:00.000Z | 2014-01-02T05:57:01.000Z |
| CVE-2013-3283 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2014-01-02T11:00:00.000Z | 2014-01-02T05:57:01.000Z |
| CVE-2013-3284 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2014-01-02T11:00:00.000Z | 2014-01-02T05:57:01.000Z |
| CVE-2013-3289 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2014-01-02T11:00:00.000Z | 2014-01-02T05:57:01.000Z |
| CVE-2013-6179 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2014-01-02T11:00:00.000Z | 2014-01-02T05:57:01.000Z |
| CVE-2013-6183 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2014-01-02T11:00:00.000Z | 2014-01-02T05:57:01.000Z |
| CVE-2013-6184 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2014-01-02T11:00:00.000Z | 2014-01-02T05:57:01.000Z |
| CVE-2013-6185 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2014-01-02T11:00:00.000Z | 2014-01-02T05:57:01.000Z |
| CVE-2013-6186 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2014-01-02T11:00:00.000Z | 2014-01-02T05:57:01.000Z |
| CVE-2013-6187 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2014-01-02T11:00:00.000Z | 2014-01-02T05:57:01.000Z |
| CVE-2013-6463 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, CVE-2013-7271. Reason: This candidate is a duplicate of CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, and CVE-2013-7271. Notes: All CVE users should reference CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, and/or CVE-2013-7271 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-01-06T11:00:00.000Z | 2014-01-06T02:57:00.000Z |
| CVE-2013-6405 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-7263, CVE-2013-7264, CVE-2013-7265, CVE-2013-7281. Reason: This candidate is a duplicate of CVE-2013-7263, CVE-2013-7264, CVE-2013-7265, and CVE-2013-7281. Notes: All CVE users should reference CVE-2013-7263, CVE-2013-7264, CVE-2013-7265, and/or CVE-2013-7281 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-01-06T11:00:00.000Z | 2014-01-08T16:57:00.000Z |
| CVE-2014-1448 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-1447. Reason: This candidate is a reservation duplicate of CVE-2014-1447. Only one candidate was needed for the disclosure in question. Notes: All CVE users should reference CVE-2014-1447 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-01-15T02:00:00.000Z | 2014-01-15T02:57:00.000Z |
| CVE-2013-3698 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-6346. Reason: This candidate is a duplicate of CVE-2013-6346. Notes: All CVE users should reference CVE-2013-6346 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-01-16T20:00:00.000Z | 2014-01-16T19:57:00.000Z |
| CVE-2013-3699 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2014-01-16T20:00:00.000Z | 2014-01-16T19:57:00.000Z |
| CVE-2013-3701 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-6345. Reason: This candidate is a duplicate of CVE-2013-6345. Notes: All CVE users should reference CVE-2013-6345 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-01-16T20:00:00.000Z | 2014-01-16T19:57:00.000Z |
| CVE-2013-3702 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-6344. Reason: This candidate is a duplicate of CVE-2013-6344. Notes: All CVE users should reference CVE-2013-6344 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-01-16T20:00:00.000Z | 2014-01-16T19:57:00.000Z |
| CVE-2013-2169 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2014-01-20T02:00:00.000Z | 2014-01-20T02:57:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2005-2497 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2641. Reason: This candid… | 2005-10-07T18:02:00.000 | 2023-11-07T01:57:38.620 |
| fkie_cve-2005-2528 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.540 | 2023-11-07T01:57:39.140 |
| fkie_cve-2005-2578 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2552. Reason: This candid… | 2005-08-16T04:00:00.000 | 2023-11-07T01:57:39.970 |
| fkie_cve-2005-2671 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2041. Reason: This candid… | 2005-08-23T04:00:00.000 | 2023-11-07T01:57:40.800 |
| fkie_cve-2005-2740 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.573 | 2023-11-07T01:57:41.747 |
| fkie_cve-2005-2795 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2021-06-18T15:15:07.803 | 2023-11-07T01:57:42.333 |
| fkie_cve-2005-2802 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2872, CVE-2005-2873. Reas… | 2005-09-06T17:03:00.000 | 2023-11-07T01:57:42.677 |
| fkie_cve-2005-2883 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2855. Reason: This candid… | 2005-09-14T20:03:00.000 | 2023-11-07T01:57:43.493 |
| fkie_cve-2005-2913 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2799. Reason: This candid… | 2005-09-14T21:03:00.000 | 2023-11-07T01:57:43.727 |
| fkie_cve-2005-2937 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3663, CVE-2005-3664. Reas… | 2005-10-12T13:04:00.000 | 2023-11-07T01:57:43.960 |
| fkie_cve-2005-2942 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has b… | 2005-10-12T22:02:00.000 | 2023-11-07T01:57:44.013 |
| fkie_cve-2005-2965 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-4802, CVE-2005-4803. Reas… | 2005-10-12T13:04:00.000 | 2023-11-07T01:57:44.213 |
| fkie_cve-2005-3028 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2986. Reason: This candid… | 2005-09-21T22:03:00.000 | 2023-11-07T01:57:45.080 |
| fkie_cve-2005-3117 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3150. Reason: This candid… | 2005-10-06T19:02:00.000 | 2023-11-07T01:57:46.080 |
| fkie_cve-2005-3122 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3424, CVE-2005-3425. Reas… | 2005-10-30T20:02:00.000 | 2023-11-07T01:57:46.400 |
| fkie_cve-2005-3125 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.587 | 2023-11-07T01:57:46.627 |
| fkie_cve-2005-3162 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3160. Reason: this candid… | 2005-10-06T10:02:00.000 | 2023-11-07T01:57:47.147 |
| fkie_cve-2005-3195 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3178. Reason: this candid… | 2005-10-14T10:02:00.000 | 2023-11-07T01:57:48.283 |
| fkie_cve-2005-3266 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3265. Reason: this candid… | 2005-10-23T18:02:00.000 | 2023-11-07T01:57:48.860 |
| fkie_cve-2005-3362 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3153. Reason: This candid… | 2005-10-28T20:02:00.000 | 2023-11-07T01:57:50.670 |
| fkie_cve-2005-3542 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3508. Reason: This candid… | 2005-11-16T07:42:00.000 | 2023-11-07T01:57:52.460 |
| fkie_cve-2005-3561 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2954. Reason: This candid… | 2005-11-16T07:42:00.000 | 2023-11-07T01:57:52.660 |
| fkie_cve-2005-3562 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2955. Reason: This candid… | 2005-11-16T07:42:00.000 | 2023-11-07T01:57:52.690 |
| fkie_cve-2005-3563 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2956. Reason: This candid… | 2005-11-16T07:42:00.000 | 2023-11-07T01:57:52.720 |
| fkie_cve-2005-3597 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3573. Reason: This candid… | 2005-12-31T05:00:00.000 | 2023-11-07T01:57:53.007 |
| fkie_cve-2005-3637 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3530. Reason: This candid… | 2005-11-16T21:22:00.000 | 2023-11-07T01:57:53.727 |
| fkie_cve-2005-3703 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2272. Reason: This candid… | 2005-12-14T11:03:00.000 | 2023-11-07T01:57:54.430 |
| fkie_cve-2005-3898 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3567. Reason: This candid… | 2005-11-29T21:03:00.000 | 2023-11-07T01:57:56.690 |
| fkie_cve-2005-3965 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-2607. Reason: This candid… | 2005-12-02T18:03:00.000 | 2023-11-07T01:57:57.320 |
| fkie_cve-2005-3990 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-3619. Reason: This candid… | 2005-12-04T23:03:00.000 | 2023-11-07T01:57:57.600 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-83pq-466j-fc6j |
|
Prototype Pollution in sahmat | 2020-09-04T15:17:50Z | 2020-08-31T18:55:34Z |
| ghsa-9gxr-rhx6-4jgv |
|
Sandbox Breakout / Prototype Pollution in notevil | 2020-09-04T15:18:57Z | 2020-08-31T18:55:36Z |
| ghsa-gqf6-75v8-vr26 |
|
Arbitrary File Write in bin-links | 2020-09-04T16:56:11Z | 2020-08-31T18:58:56Z |
| ghsa-533p-g2hq-qr26 |
|
Command Injection in treekill | 2020-09-04T17:16:35Z | 2020-08-31T18:59:07Z |
| ghsa-2mj8-pj3j-h362 |
|
Symlink reference outside of node_modules in bin-links | 2020-09-04T17:17:39Z | 2020-08-31T18:59:12Z |
| ghsa-v45m-2wcp-gg98 |
|
Global node_modules Binary Overwrite in bin-links | 2020-09-04T17:18:44Z | 2020-08-31T18:59:19Z |
| ghsa-cfwc-xjfp-44jg |
|
Command Injection in gnuplot | 2020-09-04T17:19:48Z | 2020-08-31T18:59:23Z |
| ghsa-65xx-c85x-wg76 |
|
Command Injection in plotter | 2020-09-04T17:20:52Z | 2020-08-31T18:59:26Z |
| ghsa-v6c5-hwqg-3x5q |
|
Improper Authorization in passport-cognito | 2020-09-04T17:23:03Z | 2020-08-31T18:59:30Z |
| ghsa-xf64-2f9p-6pqq |
|
Information Exposure in type-graphql | 2020-09-04T17:24:08Z | 2020-08-31T18:59:32Z |
| ghsa-7r9x-hr76-jr96 |
|
Command Injection in giting | 2020-09-04T17:26:18Z | 2020-08-31T18:59:37Z |
| ghsa-97mg-3cr6-3x4c |
|
Remote Code Execution in mongodb-query-parser | 2020-09-04T17:27:23Z | 2020-08-31T18:59:39Z |
| ghsa-25v4-mcx4-hh35 |
|
Cross-Site Scripting in atlasboard-atlassian-package | 2020-09-04T17:28:28Z | 2020-08-31T18:59:41Z |
| ghsa-v66p-w7qx-wv98 |
|
Authentication Bypass in express-laravel-passport | 2020-09-04T17:29:34Z | 2020-08-31T18:59:44Z |
| ghsa-4g46-5grc-wq49 |
|
Cross-Site Scripting in seeftl | 2020-04-01T16:36:31Z | 2020-08-31T18:59:46Z |
| ghsa-gvr4-7xgc-gx3w |
|
Cross-Site Scripting in fileview | 2020-04-01T16:36:15Z | 2020-08-31T18:59:48Z |
| ghsa-7wgh-5q4q-6wx5 |
|
Malicious Package in 1337qq-js | 2020-09-04T17:30:39Z | 2020-08-31T18:59:53Z |
| ghsa-qcff-ffx3-m25c |
|
Command Injection in meta-git | 2020-09-04T17:31:44Z | 2020-08-31T18:59:58Z |
| ghsa-49mg-94fc-2fx6 |
|
Command Injection in npm-git-publish | 2020-09-04T17:32:49Z | 2020-08-31T19:00:00Z |
| ghsa-q643-w9jp-q2qg |
|
Hardcoded Initialization Vector in parsel | 2020-09-04T17:34:59Z | 2020-08-31T19:00:05Z |
| ghsa-wqgx-4q47-j2w5 |
|
Insecure Cryptography Algorithm in parsel | 2020-09-04T17:36:04Z | 2020-08-31T19:00:07Z |
| ghsa-vjvw-wcmw-pr26 |
|
Insufficient Entropy in parsel | 2020-09-04T17:37:08Z | 2020-08-31T19:00:10Z |
| ghsa-22h7-7wwg-qmgg |
|
Prototype Pollution in @hapi/hoek | 2020-09-04T17:56:39Z | 2020-08-31T19:00:24Z |
| ghsa-mg85-8mv5-ffjr |
|
Denial of Service in ammo | 2020-09-03T15:45:40Z | 2020-08-31T19:00:33Z |
| ghsa-rhc3-76jw-4f2x |
|
Denial of Service in @commercial/ammo | 2020-09-04T17:58:46Z | 2020-08-31T19:00:35Z |
| ghsa-gjph-xf5q-6mfq |
|
Denial of Service in @hapi/ammo | 2020-09-03T15:46:02Z | 2020-08-31T19:00:37Z |
| ghsa-9vrw-m88g-w75q |
|
Denial of Service in @hapi/accept | 2020-09-03T15:45:53Z | 2020-08-31T19:00:40Z |
| ghsa-cvfm-xjc8-f2vm |
|
Denial of Service in @commercial/subtext | 2020-09-03T15:46:36Z | 2020-08-31T19:00:44Z |
| ghsa-7hx8-2rxv-66xv |
|
Denial of Service in hapi | 2020-09-03T15:48:00Z | 2020-08-31T19:00:54Z |
| ghsa-23vw-mhv5-grv5 |
|
Denial of Service in @hapi/hapi | 2020-09-03T15:48:43Z | 2020-08-31T19:00:56Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2020-28 |
|
In Mozilla Bleach before 3.12, a mutation XSS in bleach.clean when RCDATA and either svg … | bleach | 2020-03-24T22:15:00Z | 2021-03-30T23:15:00Z |
| pysec-2021-52 |
|
An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does … | salt | 2021-02-27T05:15:00Z | 2021-03-31T14:15:00Z |
| pysec-2021-53 |
|
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can … | salt | 2021-02-27T05:15:00Z | 2021-03-31T14:15:00Z |
| pysec-2021-54 |
|
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They mi… | salt | 2021-02-27T05:15:00Z | 2021-03-31T14:15:00Z |
| pysec-2021-55 |
|
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to … | salt | 2021-02-27T05:15:00Z | 2021-03-31T14:15:00Z |
| pysec-2021-57 |
|
An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vul… | salt | 2021-02-27T05:15:00Z | 2021-03-31T14:15:00Z |
| pysec-2021-73 |
|
An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vul… | salt | 2021-02-27T05:15:00Z | 2021-03-31T14:15:00Z |
| pysec-2021-74 |
|
In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi serv… | salt | 2021-02-27T05:15:00Z | 2021-03-31T14:15:00Z |
| pysec-2021-75 |
|
In SaltStack Salt before 3002.5, when authenticating to services using certain modules, t… | salt | 2021-02-27T05:15:00Z | 2021-03-31T14:15:00Z |
| pysec-2021-50 |
|
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor … | salt | 2021-02-27T05:15:00Z | 2021-04-01T17:15:00Z |
| pysec-2021-51 |
|
An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_ro… | salt | 2021-02-27T05:15:00Z | 2021-04-01T17:15:00Z |
| pysec-2020-95 |
|
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configur… | pyspark | 2020-06-23T22:15:00Z | 2021-04-02T12:15:00Z |
| pysec-2021-11 |
|
django-registration is a user registration package for Django. The django-registration pa… | django-registration | 2021-04-01T22:15:00Z | 2021-04-06T18:40:00Z |
| pysec-2021-34 |
|
models/metadata.py in the pikepdf package 1.3.0 through 2.9.2 for Python allows XXE when … | pikepdf | 2021-04-01T20:15:00Z | 2021-04-09T19:15:00Z |
| pysec-2021-18 |
|
CERN Indico before 2.3.4 can use an attacker-supplied Host header in a password reset link. | indico | 2021-04-07T14:15:00Z | 2021-04-15T14:13:00Z |
| pysec-2021-10 |
|
A SQL Injection issue in the SQL Panel in Jazzband Django Debug Toolbar before 1.11.1, 2.… | django-debug-toolbar | 2021-04-14T18:15:00Z | 2021-04-21T15:05:00Z |
| pysec-2021-26 |
|
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse).… | matrix-synapse | 2021-04-12T22:15:00Z | 2021-04-21T16:45:00Z |
| pysec-2021-27 |
|
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse).… | matrix-synapse | 2021-04-12T21:15:00Z | 2021-04-21T17:02:00Z |
| pysec-2021-23 |
|
Sydent is a reference matrix identity server. A malicious user could abuse Sydent to send… | matrix-sydent | 2021-04-15T21:15:00Z | 2021-04-22T15:25:00Z |
| pysec-2021-22 |
|
Sydent is a reference Matrix identity server. Sydent can be induced to send HTTP GET requ… | matrix-sydent | 2021-04-15T21:15:00Z | 2021-04-22T15:27:00Z |
| pysec-2021-24 |
|
### Impact Missing input validation of some parameters on the endpoints used to confirm t… | matrix-sydent | 2021-04-15T18:15:00Z | 2021-04-22T17:17:00Z |
| pysec-2021-21 |
|
Sydent is a reference Matrix identity server. Sydent does not limit the size of requests … | matrix-sydent | 2021-04-15T21:15:00Z | 2021-04-22T17:19:00Z |
| pysec-2021-25 |
|
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse).… | matrix-synapse | 2021-04-12T22:15:00Z | 2021-04-26T18:40:00Z |
| pysec-2021-114 |
|
Wagtail is a Django content management system. In affected versions of Wagtail, when savi… | wagtail | 2021-04-19T19:15:00Z | 2021-04-29T14:24:00Z |
| pysec-2021-1 |
|
A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by defa… | ansible | 2021-04-29T16:15:00Z | 2021-05-03T20:43:00Z |
| pysec-2020-19 |
|
In Apache Airflow < 1.10.12, the "origin" parameter passed to some of the endpoints like … | apache-airflow | 2020-09-17T14:15:00Z | 2021-05-04T00:15:00Z |
| pysec-2020-21 |
|
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to … | apache-airflow | 2020-12-11T14:15:00Z | 2021-05-04T00:15:00Z |
| pysec-2021-58 |
|
sopel-channelmgnt is a channelmgnt plugin for sopel. In versions prior to 2.0.1, on some … | sopel-plugins-channelmgnt | 2021-04-09T16:15:00Z | 2021-05-04T13:59:00Z |
| pysec-2020-110 |
|
In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious u… | sopel-plugins-channelmgnt | 2020-10-13T18:15:00Z | 2021-05-04T14:02:00Z |
| pysec-2021-20 |
|
markdown2 >=1.0.1.18, fixed in 2.4.0, is affected by a regular expression denial of servi… | markdown2 | 2021-03-03T16:15:00Z | 2021-05-10T03:15:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2018-1000201 | ruby-ffi version 1.9.23 and earlier has a DLL loading issue which can be hijacked on Wind… | 2018-06-22T00:00:00.000Z |
| gsd-2018-14040 | In Bootstrap before 4.1.2, XSS is possible in collapse data-parent attribute (CVE-2018-14… | 2018-07-03T00:00:00.000Z |
| gsd-2018-1000211 | Any OAuth application that uses public/non-confidential authentication when interacting w… | 2018-07-11T00:00:00.000Z |
| gsd-2018-3777 | A flaw in how restforce constructs URL's may allow an attacker to inject additional param… | 2018-07-27T00:00:00.000Z |
| gsd-2018-3779 | The gem duplicates official `activesupport` (no hyphen) code, but adds a compiled extensi… | 2018-08-09T00:00:00.000Z |
| gsd-2018-14643 | An authentication bypass flaw was found in the smart_proxy_dynflow component used by Fore… | 2018-09-14T00:00:00.000Z |
| gsd-2018-17567 | Jekyll through 3.6.2, 3.7.x through 3.7.3, and 3.8.x through 3.8.3 allows attackers to ac… | 2018-09-28T00:00:00.000Z |
| gsd-2018-14404 | Nokogiri 1.8.5 has been released. This is a security and bugfix release. It addresses tw… | 2018-10-04T00:00:00.000Z |
| gsd-2018-18476 | mysql-binuuid-rails 1.1.0 and earlier allows SQL Injection because it removes default str… | 2018-10-19T00:00:00.000Z |
| gsd-2018-1000842 | FatFreeCRM version <=0.14.1, >=0.15.0 <=0.15.1, >=0.16.0 <=0.16.3, >=0.17.0 <=0.17.2, ==0… | 2018-10-27T00:00:00.000Z |
| gsd-2018-16468 | In the Loofah gem, through v2.2.2, unsanitized JavaScript may occur in sanitized output w… | 2018-10-30T00:00:00.000Z |
| gsd-2018-16470 | There is a possible DoS vulnerability in the multipart parser in Rack. This vulnerability… | 2018-11-05T00:00:00.000Z |
| gsd-2018-16471 | There is a possible vulnerability in Rack. This vulnerability has been assigned the CVE i… | 2018-11-05T00:00:00.000Z |
| gsd-2018-1000855 | When passing an invalid check name as parameter to the endpoint where the easymon routes … | 2018-11-09T00:00:00.000Z |
| gsd-2018-16476 | There is a vulnerability in Active Job. This vulnerability has been assigned the CVE iden… | 2018-11-27T00:00:00.000Z |
| gsd-2018-16477 | There is a vulnerability in Active Storage. This vulnerability has been assigned the CVE … | 2018-11-27T00:00:00.000Z |
| gsd-2019-5421 | Devise ruby gem before 4.6.0 when the `lockable` module is used is vulnerable to a time-o… | 2019-02-07T00:00:00.000Z |
| gsd-2019-8331 | In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popov… | 2019-02-15T00:00:00.000Z |
| gsd-2018-1002161 | The format of the source doesn't require a description, click on the link for more details. | |
| gsd-2019-8320 | A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Bef… | 2019-03-05T00:00:00.000Z |
| gsd-2019-8321 | An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteracti… | 2019-03-05T00:00:00.000Z |
| gsd-2019-8322 | An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command ou… | 2019-03-05T00:00:00.000Z |
| gsd-2019-8323 | An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#… | 2019-03-05T00:00:00.000Z |
| gsd-2019-8324 | An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a mul… | 2019-03-05T00:00:00.000Z |
| gsd-2019-8325 | An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManage… | 2019-03-05T00:00:00.000Z |
| gsd-2018-6517 | Prior to version 0.3.0, chloride's use of net-ssh resulted in host fingerprints for previ… | 2019-03-08T00:00:00.000Z |
| gsd-2019-5418 | There is a possible file content disclosure vulnerability in Action View. This vulnerabil… | 2019-03-13T00:00:00.000Z |
| gsd-2019-5419 | There is a potential denial of service vulnerability in actionview. This vulnerability ha… | 2019-03-13T00:00:00.000Z |
| gsd-2019-5420 | There is a possible a possible remote code executing exploit in Rails when in development… | 2019-03-13T00:00:00.000Z |
| gsd-2019-9837 | Doorkeeper::OpenidConnect (aka the OpenID Connect extension for Doorkeeper) 1.4.x and 1.5… | 2019-03-25T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-5314 | Malicious code in pgk (npm) | 2022-06-08T08:43:52Z | 2022-06-08T08:43:53Z |
| mal-2022-6333 | Malicious code in stripe-ms (npm) | 2022-06-08T08:43:53Z | 2022-06-08T08:43:53Z |
| mal-2022-1613 | Malicious code in blockchain-explorer-sdk (npm) | 2022-06-08T08:44:23Z | 2022-06-08T08:44:24Z |
| mal-2022-2777 | Malicious code in erc-20-lib (npm) | 2022-06-08T08:44:24Z | 2022-06-08T08:44:24Z |
| mal-2022-2889 | Malicious code in even-more-externals (npm) | 2022-06-08T08:44:24Z | 2022-06-08T08:44:24Z |
| mal-2022-7328 | Malicious code in yarn-design-system-logos (npm) | 2022-06-08T08:44:23Z | 2022-06-08T08:44:24Z |
| mal-2022-4083 | Malicious code in jubilee-flag-wave (npm) | 2022-06-08T08:45:14Z | 2022-06-08T08:45:14Z |
| mal-2022-6217 | Malicious code in sorareshshsjs (npm) | 2022-06-08T08:49:45Z | 2022-06-08T08:50:22Z |
| mal-2022-2679 | Malicious code in eg-clickstream-sdk-js (npm) | 2022-06-08T08:52:00Z | 2022-06-08T08:52:10Z |
| mal-2022-7085 | Malicious code in web3-upgrade (npm) | 2022-06-08T08:52:50Z | 2022-06-08T08:52:50Z |
| mal-2022-2243 | Malicious code in cron-mail (npm) | 2022-06-08T08:53:25Z | 2022-06-08T08:53:26Z |
| mal-2022-124 | Malicious code in @blackice12/tiny (npm) | 2022-06-08T08:54:15Z | 2022-06-08T08:54:21Z |
| mal-2022-6476 | Malicious code in test-depss (npm) | 2022-06-08T08:56:16Z | 2022-06-08T08:56:16Z |
| mal-2022-2660 | Malicious code in ecobeeesss (npm) | 2022-06-08T08:57:06Z | 2022-06-08T08:57:06Z |
| mal-2022-4884 | Malicious code in node-dvnr (npm) | 2022-06-08T08:57:06Z | 2022-06-08T08:57:06Z |
| mal-2022-7358 | Malicious code in yoti_2020 (npm) | 2022-06-08T09:00:11Z | 2022-06-08T09:00:12Z |
| mal-2022-4032 | Malicious code in jira-frontend (npm) | 2022-06-08T09:01:01Z | 2022-06-08T09:01:02Z |
| mal-2022-4227 | Malicious code in kruit (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:02Z |
| mal-2022-4608 | Malicious code in misk-web-docs (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:02Z |
| mal-2022-4609 | Malicious code in misk-web-tab-admin-dashboard (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:02Z |
| mal-2022-4610 | Malicious code in misk-web-tab-app (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:02Z |
| mal-2022-4611 | Malicious code in misk-web-tab-config (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:02Z |
| mal-2022-4613 | Malicious code in misk-web-tab-template-basic (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:02Z |
| mal-2022-4615 | Malicious code in misk-webadmin (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:02Z |
| mal-2022-6723 | Malicious code in ual-reactjs-renderer-example (npm) | 2022-06-08T09:01:01Z | 2022-06-08T09:01:02Z |
| mal-2022-6791 | Malicious code in universal-authenticator-library-js-example (npm) | 2022-06-08T09:01:01Z | 2022-06-08T09:01:02Z |
| mal-2022-4971 | Malicious code in nucleus-wallet (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:03Z |
| mal-2022-5965 | Malicious code in scilla (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:03Z |
| mal-2022-5966 | Malicious code in scilla-server (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:03Z |
| mal-2022-7372 | Malicious code in z-wallet (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2020-13301 | 2024-03-06T11:22:35.003Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13302 | 2024-03-06T11:22:33.743Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13303 | 2024-03-06T11:22:32.460Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13304 | 2024-03-06T11:22:31.183Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13305 | 2024-03-06T11:22:29.951Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13306 | 2024-03-06T11:22:28.700Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13307 | 2024-03-06T11:22:27.444Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13308 | 2024-03-06T11:22:26.221Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13309 | 2024-03-06T11:22:24.941Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13310 | 2024-03-06T11:22:23.680Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13311 | 2024-03-06T11:22:22.430Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13312 | 2024-03-06T11:22:21.182Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13313 | 2024-03-06T11:22:19.918Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13314 | 2024-03-06T11:22:18.661Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13315 | 2024-03-06T11:22:17.396Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13316 | 2024-03-06T11:22:16.156Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13317 | 2024-03-06T11:22:14.902Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13318 | 2024-03-06T11:22:13.657Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13319 | 2024-03-06T11:22:12.379Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13320 | 2024-03-06T11:22:11.111Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13321 | 2024-03-06T11:22:09.884Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13322 | 2024-03-06T11:22:08.615Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13323 | 2024-03-06T11:22:07.364Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13324 | 2024-03-06T11:22:06.119Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13325 | 2024-03-06T11:22:04.893Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13326 | 2024-03-06T11:22:03.630Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13328 | 2024-03-06T11:22:02.327Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13329 | 2024-03-06T11:22:01.055Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13330 | 2024-03-06T11:21:59.823Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13331 | 2024-03-06T11:21:58.551Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2024-050 | 2024-10-23T12:09:48.000Z | 2025-02-20T19:25:41.000Z | |
| drupal-contrib-2024-049 | 2024-10-09T16:40:07.000Z | 2025-02-20T19:25:53.000Z | |
| drupal-contrib-2024-048 | 2024-10-09T15:56:35.000Z | 2025-02-20T19:26:05.000Z | |
| drupal-contrib-2024-047 | 2024-10-09T15:54:27.000Z | 2025-02-20T19:26:17.000Z | |
| drupal-contrib-2024-046 | 2024-10-09T15:48:11.000Z | 2025-02-20T19:26:30.000Z | |
| drupal-contrib-2024-045 | 2024-10-09T15:48:10.000Z | 2025-02-20T19:26:40.000Z | |
| drupal-contrib-2024-044 | 2024-10-02T16:27:12.000Z | 2025-02-20T19:26:51.000Z | |
| drupal-contrib-2024-043 | 2024-10-02T16:20:48.000Z | 2025-02-20T19:27:03.000Z | |
| drupal-contrib-2024-042 | 2024-10-02T16:15:59.000Z | 2025-02-20T19:27:15.000Z | |
| drupal-contrib-2024-052 | 2024-10-23T15:45:47.000Z | 2025-02-20T20:05:19.000Z | |
| drupal-contrib-2024-055 | 2024-10-30T17:07:09.000Z | 2025-02-20T20:05:30.000Z | |
| drupal-contrib-2024-056 | 2024-10-30T17:11:24.000Z | 2025-02-20T20:05:41.000Z | |
| drupal-contrib-2024-058 | 2024-11-06T16:28:56.000Z | 2025-02-20T20:05:57.000Z | |
| drupal-contrib-2024-059 | 2024-11-13T17:36:48.000Z | 2025-02-20T20:06:05.000Z | |
| drupal-contrib-2024-060 | 2024-11-13T17:37:36.000Z | 2025-02-20T20:06:18.000Z | |
| drupal-contrib-2024-062 | 2024-11-20T17:36:55.000Z | 2025-02-20T20:06:35.000Z | |
| drupal-contrib-2024-064 | 2024-11-27T16:41:51.000Z | 2025-02-20T20:06:49.000Z | |
| drupal-contrib-2024-067 | 2024-12-04T14:40:50.000Z | 2025-02-20T20:07:11.000Z | |
| drupal-contrib-2024-068 | 2024-12-04T14:46:03.000Z | 2025-02-20T20:07:26.000Z | |
| drupal-contrib-2024-069 | 2024-12-04T15:13:14.000Z | 2025-02-20T20:07:35.000Z | |
| drupal-contrib-2024-070 | 2024-12-04T15:51:12.000Z | 2025-02-20T20:07:46.000Z | |
| drupal-contrib-2024-071 | 2024-12-04T16:20:57.000Z | 2025-02-20T20:07:52.000Z | |
| drupal-contrib-2024-072 | 2024-12-11T07:44:40.000Z | 2025-02-20T20:08:00.000Z | |
| drupal-contrib-2024-073 | 2024-12-11T12:36:29.000Z | 2025-02-20T20:08:10.000Z | |
| drupal-contrib-2024-074 | 2024-12-11T14:27:22.000Z | 2025-02-20T20:08:21.000Z | |
| drupal-contrib-2024-075 | 2024-12-11T14:31:11.000Z | 2025-02-20T20:08:28.000Z | |
| drupal-contrib-2024-076 | 2024-12-11T16:53:22.000Z | 2025-02-20T20:08:37.000Z | |
| drupal-contrib-2024-051 | 2024-10-23T15:45:41.000Z | 2025-02-20T20:08:44.000Z | |
| drupal-contrib-2025-003 | 2025-01-15T15:58:05.000Z | 2025-03-31T22:03:43.000Z | |
| drupal-contrib-2025-007 | 2025-01-22T17:01:38.000Z | 2025-03-31T22:04:03.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2007-000875 | AirStation series and BroadStation series vulnerable to cross-site request forgery | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000876 | Ichitaro series buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000877 | Ichitaro series buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000878 | Ichitaro series buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000921 | Groupmax Collaboration Schedule Information Disclosure Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000999 | Hitachi JP1/File Transmission Server/FTP Authentication Bypass Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-001000 | Hitachi JP1/File Transmission Server/FTP Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-001091 | Cosminexus Application Server Incorrect Group Permission Handling Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-001092 | JP1/Cm2/Network Node Manager Arbitrary Code Execution Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-001133 | Cosminexus Component Container Session Handling Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2008-000001 | Multiple JustSystems products vulnerable to buffer overflow | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2008-000005 | Multiple Yamaha routers vulnerable to cross-site request forgery | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2008-000006 | Cross-site scripting vulnerabilities in multiple Hal Networks shopping cart products | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2008-000007 | RaidenHTTPD cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2008-000008 | PC2M cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2008-000011 | Internet Scanner reporting engine vulnerable to cross-site scripting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2008-000012 | Cross-site scripting vulnerability in multiple Tor World CGI scripts | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2008-000014 | Nagios cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2008-001096 | EUR Print Manager Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2008-001097 | SEWB3/PLATFORM Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2008-001150 | JP1/HIBUN Encryption/Decryption and Removable Media Control Malfunction Problems | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2008-000003 | MTCMS WYSIWYG Editor cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T11:30+09:00 |
| jvndb-2008-000004 | Zimbra Collaboration Suite script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T11:30+09:00 |
| jvndb-2008-000010 | Google Desktop cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T11:31+09:00 |
| jvndb-2008-000013 | FTP bounce vulnerability in multiple Canon digital multifunction copiers and laser beam printers | 2008-05-21T00:00+09:00 | 2008-05-21T11:31+09:00 |
| jvndb-2008-000015 | BFup ActiveX Control buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T11:32+09:00 |
| jvndb-2008-000017 | Multiple I-O DATA DEVICE wireless LAN routers default configuration does not set authentication | 2008-05-21T00:00+09:00 | 2008-05-21T11:32+09:00 |
| jvndb-2008-000019 | PerlMailer cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T11:33+09:00 |
| jvndb-2008-000020 | DesignForm cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T11:33+09:00 |
| jvndb-2008-000022 | Lhaplus buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T11:33+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00213 | OpenSSL安全绕过漏洞 | 2015-01-09 | 2015-01-12 |
| cnvd-2015-00214 | OpenSSL中间人安全绕过漏洞(CNVD-2015-00214) | 2015-01-09 | 2015-01-12 |
| cnvd-2015-00215 | OpenSSL中间人安全绕过漏洞(CNVD-2015-00215) | 2015-01-09 | 2015-01-12 |
| cnvd-2015-00216 | OpenSSL Certificate fingerprints本地安全绕过漏洞 | 2015-01-09 | 2015-01-12 |
| cnvd-2015-00217 | WordPress插件AJAX Post Search 'the_search_function' SQL注入漏洞 | 2015-01-08 | 2015-01-12 |
| cnvd-2015-00218 | WordPress插件Cdnvote SQL注入漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00219 | Redaxscript 'includes/password.php'存在多个SQL注入漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00220 | OpenSSL存在未明漏洞 | 2015-01-09 | 2015-01-13 |
| cnvd-2015-00221 | OpenSSL no-ssl3选项空指针引用漏洞 | 2015-01-09 | 2015-01-13 |
| cnvd-2015-00223 | Cisco MDS 9000 NX-OS Software拒绝服务漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00224 | Cisco WebEx Meetings Server用户枚举漏洞(CNVD-2015-00224) | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00225 | Cisco WebEx Meetings Server用户枚举漏洞(CNVD-2015-00225) | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00226 | Cisco Unified Communications Domain Manager远程拒绝服务漏洞(CNVD-2015-00226) | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00227 | Cisco WebEx Meetings Server验证绕过漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00228 | Cisco Secure Access Control Server开放重定向漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00229 | Cisco WebEx Meetings Server加密密码泄露漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00230 | Cisco Secure Access Control Server存在多个跨站脚本漏洞(CNVD-2015-00230) | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00231 | Cisco WebEx Meetings Server跨站脚本漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00232 | Cisco Secure Access Control Server权限提升漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00233 | Cisco WebEx Meetings Server跨站请求伪造漏洞(CNVD-2015-00233) | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00234 | TYPO3 Content Rating SQL注入漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00235 | TYPO3 Content Rating跨站脚本漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00236 | TYPO3 Content Rating Extbase Extension存在多个输入验证漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00237 | TYPO3 LDAP/SSO Authentication Extension验证绕过漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00238 | WordPress插件Shopping Cart 'banneruploaderscript.php'任意文件上传漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00239 | Cisco WebEx Meetings Server存在未明漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00240 | IPCop跨站脚本漏洞 | 2015-01-08 | 2015-01-13 |
| cnvd-2015-00241 | PHPDug存在多个跨站脚本漏洞 | 2015-01-08 | 2015-01-13 |
| cnvd-2015-00242 | PHPDug跨站请求伪造漏洞(CNVD-2015-00242) | 2015-01-08 | 2015-01-13 |
| cnvd-2015-00243 | poMMo Aardvark跨站请求伪造漏洞 | 2015-01-08 | 2015-01-13 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2014-00453 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00454 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00455 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00456 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00457 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00458 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00459 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00460 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00461 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00462 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00463 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00464 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00465 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00466 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00468 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00470 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00471 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00472 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00473 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00480 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00481 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00482 | Уязвимость программной платформы Jrockit, позволяющая удаленному злоумышленнику нарушить … | 05.07.2016 | 28.11.2016 |
| bdu:2014-00483 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00484 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00485 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00003 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00004 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00005 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00006 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00007 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2002-avi-019 | Vulnérabilités de gzip | 2002-02-01T00:00:00.000000 | 2002-02-01T00:00:00.000000 |
| certa-2002-avi-020 | Débordement de mémoire de RealPlayer | 2002-02-01T00:00:00.000000 | 2002-02-01T00:00:00.000000 |
| certa-2002-avi-022 | Vulnérabilités du serveur ProFTPD | 2002-02-04T00:00:00.000000 | 2002-02-04T00:00:00.000000 |
| certa-2002-avi-023 | Vulnérabilité dans le serveur Web Lotus Domino | 2002-02-07T00:00:00.000000 | 2002-02-07T00:00:00.000000 |
| certa-2002-avi-024 | Vulnérabilité dans Microsoft Office v.X pour Mac OS X | 2002-02-07T00:00:00.000000 | 2002-02-07T00:00:00.000000 |
| certa-2002-avi-025 | Vulnérabilité dans le serveur Telnet Microsoft | 2002-02-08T00:00:00.000000 | 2002-02-08T00:00:00.000000 |
| certa-2002-avi-026 | Vulnérabilité dans l'authentification sur Cisco Secure Access Control Server | 2002-02-08T00:00:00.000000 | 2002-02-08T00:00:00.000000 |
| certa-2002-avi-027 | Déni de service dans Realsecure Server Sensor d'ISS | 2002-02-08T00:00:00.000000 | 2002-02-08T00:00:00.000000 |
| certa-2002-avi-028 | Multiples vulnérabilités sur Oracle 9iAS v1.0.2.x | 2002-02-11T00:00:00.000000 | 2002-02-11T00:00:00.000000 |
| certa-2002-avi-029 | Vulnérabilité de groff | 2002-02-12T00:00:00.000000 | 2002-02-12T00:00:00.000000 |
| certa-2002-avi-031 | Vulnérabilité de l'agent SNMP sous Solaris | 2002-02-13T00:00:00.000000 | 2002-02-13T00:00:00.000000 |
| certa-2002-avi-032 | vulnérabilité de SNMP sur CISCO | 2002-02-13T00:00:00.000000 | 2002-02-13T00:00:00.000000 |
| certa-2002-avi-037 | Vulnérabilité des équipements HP AdvanceStack | 2002-02-19T00:00:00.000000 | 2002-02-19T00:00:00.000000 |
| certa-2002-avi-036 | Vulnérabilité de setrlimit sous HP-UX 11.11 | 2002-02-20T00:00:00.000000 | 2002-02-20T00:00:00.000000 |
| certa-2002-avi-030 | Multiples vulnérabilités d'Internet Explorer | 2002-02-12T00:00:00.000000 | 2002-02-21T00:00:00.000000 |
| certa-2002-avi-038 | Vulnérabilité des agents SNMP pour les équipements HP | 2002-02-21T00:00:00.000000 | 2002-02-21T00:00:00.000000 |
| certa-2002-avi-040 | Vulnérabilité dans Microsoft SQL Server 7.0 et 2000 | 2002-02-21T00:00:00.000000 | 2002-02-21T00:00:00.000000 |
| certa-2002-avi-041 | Vulnérabilité du contrôle ActiveX XMLHTTP | 2002-02-22T00:00:00.000000 | 2002-02-22T00:00:00.000000 |
| certa-2002-avi-042 | Vulnérabilité de Internet Explorer liée aux VBScripts | 2002-02-22T00:00:00.000000 | 2002-02-22T00:00:00.000000 |
| certa-2002-avi-044 | Vulnérabilité dans Microsoft Commerce Server 2000 | 2002-02-22T00:00:00.000000 | 2002-02-22T00:00:00.000000 |
| certa-2002-avi-045 | Vulnérabilité dans CISCO CEF | 2002-02-28T00:00:00.000000 | 2002-02-28T00:00:00.000000 |
| certa-2002-avi-046 | Multiples vulnérabilités de SMTP pour Microsoft Windows | 2002-02-28T00:00:00.000000 | 2002-02-28T00:00:00.000000 |
| certa-2002-avi-047 | Vulnérabilités de PHP | 2002-02-28T00:00:00.000000 | 2002-02-28T00:00:00.000000 |
| certa-2002-avi-048 | Multiples implémentations du protocole RADIUS vulnérables | 2002-03-05T00:00:00.000000 | 2002-03-05T00:00:00.000000 |
| certa-2002-avi-049 | Vulnérabilité SSL sous Apache | 2002-03-05T00:00:00.000000 | 2002-03-05T00:00:00.000000 |
| certa-2002-avi-021 | Mise à jour de la gestion des fragments dans Ipfilter | 2002-02-01T00:00:00.000000 | 2002-03-06T00:00:00.000000 |
| certa-2002-avi-043 | Multiples Vulnérabilités sur squid | 2002-02-22T00:00:00.000000 | 2002-03-07T00:00:00.000000 |
| certa-2002-avi-051 | Vulnérabilité dans le shell Windows | 2002-03-08T00:00:00.000000 | 2002-03-08T00:00:00.000000 |
| certa-2002-avi-052 | Vulnérabilité dans la librairie <TT>zlib / libz</TT> | 2002-03-12T00:00:00.000000 | 2002-03-12T00:00:00.000000 |
| certa-2002-avi-053 | Débordement de mémoire dans OpenSSH v2 | 2002-03-12T00:00:00.000000 | 2002-03-12T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2019-ale-008 | Vulnérabilité dans Microsoft SharePoint Server | 2019-05-29T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-009 | Vulnérabilité dans Exim | 2019-06-11T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-010 | Vulnérabilité dans Mozilla Firefox | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-011 | Vulnérabilité dans Oracle WebLogic | 2019-06-20T00:00:00.000000 | 2019-07-23T00:00:00.000000 |
| certfr-2019-ale-006 | Vulnérabilité dans Microsoft Remote Desktop Services | 2019-05-22T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-012 | Multiples vulnérabilités dans Microsoft Remote Desktop Services | 2019-08-14T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-013 | Vulnérabilité dans Microsoft Internet Explorer | 2019-09-24T00:00:00.000000 | 2019-10-25T00:00:00.000000 |
| certfr-2019-ale-014 | Vulnérabilité dans PHP | 2019-10-29T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2019-ale-015 | Multiples vulnérabilités dans Google Chrome | 2019-11-04T00:00:00.000000 | 2020-01-08T00:00:00.000000 |
| certfr-2020-ale-004 | Vulnérabilité dans Microsoft Windows | 2020-01-14T00:00:00.000000 | 2020-01-17T00:00:00.000000 |
| certfr-2020-ale-003 | Vulnérabilité dans les produits Mozilla | 2020-01-09T00:00:00.000000 | 2020-01-20T00:00:00.000000 |
| certfr-2020-ale-005 | Multiples vulnérabilités dans le serveur de passerelle RDP de Windows | 2020-01-14T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2020-01-20T00:00:00.000000 | 2020-02-19T00:00:00.000000 |
| certfr-2020-ale-001 | Multiples vulnérabilités dans les produits de Pulse Secure | 2020-01-09T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-007 | Vulnérabilité dans Microsoft Exchange Server | 2020-02-27T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-010 | Multiples vulnérabilités dans Mozilla Firefox | 2020-04-06T00:00:00.000000 | 2020-05-05T00:00:00.000000 |
| certfr-2020-ale-009 | Multiples vulnérabilités dans Microsoft Windows | 2020-03-24T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-011 | Multiples vulnérabilités dans les produits Microsoft qui utilisent la bibliothèque Autodesk FBX | 2020-04-22T00:00:00.000000 | 2020-06-23T00:00:00.000000 |
| certfr-2020-ale-013 | Multiples vulnérabilités dans Microsoft Windows | 2020-07-01T00:00:00.000000 | 2020-07-05T00:00:00.000000 |
| certfr-2020-ale-002 | Vulnérabilité dans les produits Citrix ADC et Citrix Gateway | 2020-01-09T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-008 | Vulnérabilité dans l'implémentation du protocole SMB par Microsoft | 2020-03-11T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-012 | Multiples vulnérabilités dans SaltStack | 2020-05-04T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-014 | Vulnérabilité dans Palo Alto Networks PAN-OS | 2020-07-03T00:00:00.000000 | 2020-07-31T00:00:00.000000 |
| certfr-2020-ale-015 | Vulnérabilité dans F5 BIG-IP | 2020-07-05T00:00:00.000000 | 2020-09-15T00:00:00.000000 |
| certfr-2020-ale-016 | Vulnérabilité dans Microsoft Domain Name System (DNS) Server | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-017 | Multiples vulnérabilités dans SAP Netweaver AS JAVA | 2020-07-15T00:00:00.000000 | 2020-10-12T00:00:00.000000 |
| certfr-2020-ale-018 | Vulnérabilité dans Cisco ASA et FTD | 2020-07-28T00:00:00.000000 | 2020-11-05T00:00:00.000000 |
| certfr-2020-ale-023 | Multiples vulnérabilités dans Google Chrome | 2020-11-12T00:00:00.000000 | 2020-12-04T00:00:00.000000 |
| certfr-2020-ale-022 | [MàJ] Vulnérabilité dans Oracle Weblogic | 2020-10-30T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| certfr-2020-ale-024 | [MaJ] Vulnérabilité dans les produits VMware | 2020-11-24T00:00:00.000000 | 2020-12-17T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2021-31 | Heap-buffer-overflow in TTF::be_u16 | 2021-01-08T00:01:11.611174Z | 2022-04-13T03:04:32.196419Z |
| osv-2021-822 | Heap-buffer-overflow in AK::Formatter<char const*, void>::format | 2021-06-03T00:00:53.648543Z | 2022-04-13T03:04:32.201464Z |
| osv-2021-830 | Heap-use-after-free in AK::Utf8CodePointIterator::operator* | 2021-06-05T00:00:36.391254Z | 2022-04-13T03:04:32.206558Z |
| osv-2021-887 | Use-after-poison in AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr | 2021-06-22T00:01:25.243822Z | 2022-04-13T03:04:32.211472Z |
| osv-2021-284 | UNKNOWN READ in _fini | 2021-02-06T00:00:56.704817Z | 2022-04-13T03:04:32.216607Z |
| osv-2021-875 | Use-after-poison in AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr | 2021-06-19T00:00:39.638228Z | 2022-04-13T03:04:32.221691Z |
| osv-2021-397 | Heap-buffer-overflow in Crypto::UnsignedBigInteger::UnsignedBigInteger | 2021-02-15T00:00:26.730634Z | 2022-04-13T03:04:32.227173Z |
| osv-2021-399 | Heap-buffer-overflow in void AK::__format_value<unsigned char> | 2021-02-15T00:01:06.379936Z | 2022-04-13T03:04:32.232416Z |
| osv-2021-863 | Use-after-poison in AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr | 2021-06-16T00:00:33.701228Z | 2022-04-13T03:04:32.237808Z |
| osv-2021-514 | UNKNOWN READ in _fini | 2021-03-12T00:00:13.850530Z | 2022-04-13T03:04:32.242907Z |
| osv-2021-1394 | Use-after-poison in JS::Reference::put_value | 2021-09-29T00:00:38.765609Z | 2022-04-13T03:04:32.247868Z |
| osv-2021-395 | Heap-buffer-overflow in Crypto::der_decode_integer | 2021-02-14T00:01:07.503942Z | 2022-04-13T03:04:32.252952Z |
| osv-2021-713 | Heap-use-after-free in AK::StringView::StringView | 2021-05-02T00:00:26.435557Z | 2022-04-13T03:04:32.258179Z |
| osv-2021-446 | Global-buffer-overflow in AK::StringView::operator== | 2021-02-25T00:00:53.328343Z | 2022-04-13T03:04:32.263099Z |
| osv-2021-251 | Heap-buffer-overflow in safe_ltf8_get | 2021-01-30T00:00:11.035389Z | 2022-04-13T03:04:32.268363Z |
| osv-2020-1222 | UNKNOWN READ in hpeek | 2020-07-22T21:49:57.988557Z | 2022-04-13T03:04:32.274127Z |
| osv-2021-258 | Heap-buffer-overflow in unstripe | 2021-02-01T00:00:12.032478Z | 2022-04-13T03:04:32.279738Z |
| osv-2020-958 | Heap-buffer-overflow in hts_log | 2020-07-22T00:00:25.993200Z | 2022-04-13T03:04:32.285044Z |
| osv-2020-955 | UNKNOWN WRITE in vcf_parse_format | 2020-07-22T00:00:25.417163Z | 2022-04-13T03:04:32.290566Z |
| osv-2021-222 | Heap-buffer-overflow in arith_uncompress_to | 2021-01-23T00:01:01.932285Z | 2022-04-13T03:04:32.296206Z |
| osv-2021-231 | Heap-buffer-overflow in int32_get_blk | 2021-01-24T00:00:23.631012Z | 2022-04-13T03:04:32.301338Z |
| osv-2020-998 | Heap-buffer-overflow in hts_md5_update | 2020-07-22T21:49:39.016161Z | 2022-04-13T03:04:32.306703Z |
| osv-2021-228 | Heap-buffer-overflow in safe_ltf8_get | 2021-01-24T00:00:16.807322Z | 2022-04-13T03:04:32.311957Z |
| osv-2021-305 | Heap-buffer-overflow in rle_decode | 2021-02-08T00:00:06.404697Z | 2022-04-13T03:04:32.317259Z |
| osv-2021-220 | Heap-buffer-overflow in rans_uncompress_to_4x16 | 2021-01-23T00:00:03.732785Z | 2022-04-13T03:04:32.322384Z |
| osv-2020-1301 | Heap-buffer-overflow in hts_md5_update | 2020-07-22T21:50:04.440116Z | 2022-04-13T03:04:32.327879Z |
| osv-2021-240 | Heap-buffer-overflow in safe_itf8_get | 2021-01-26T00:01:01.964692Z | 2022-04-13T03:04:32.333405Z |
| osv-2021-242 | Heap-buffer-overflow in rans_uncompress_to_4x16 | 2021-01-26T23:45:33.235035Z | 2022-04-13T03:04:32.338631Z |
| osv-2020-1121 | UNKNOWN READ in vcf_format | 2020-07-22T21:49:48.717026Z | 2022-04-13T03:04:32.343836Z |
| osv-2021-229 | Heap-buffer-overflow in cram_xpack_decode_init | 2021-01-24T00:00:18.032169Z | 2022-04-13T03:04:32.349253Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2020-0102 | LateStatic has incorrect Sync bound | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0103 | `impl Random` on arrays can lead to dropping uninitialized memory | 2020-12-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0104 | ImageChunkMut needs bounds on its Send and Sync traits | 2020-12-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0105 | Update unsound DrainFilter and RString::retain | 2020-12-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0106 | Queues allow non-Send types to be sent to other threads, allowing data races | 2020-12-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0107 | hashconsing's HConsed lacks Send/Sync bound for its Send/Sync trait. | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0108 | Soundness issue: Input<R> can be misused to create data race to an object | 2020-12-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0112 | ButtplugFutureStateShared allows data race to (!Send|!Sync) objects | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0113 | AtomicOption should have Send + Sync bound on its type argument. | 2020-10-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0114 | `Demuxer` can carry non-Send types across thread boundaries | 2020-12-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0115 | Singleton lacks bounds on Send and Sync. | 2020-11-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0116 | PinSlab<T> and Unordered<T, S> need bounds on their Send/Sync traits | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0117 | QueueSender<T>/QueueReceiver<T>: Send/Sync impls need `T: Send` | 2020-11-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0118 | Future<T> lacks bounds on Send and Sync. | 2020-12-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0119 | ReadTicket and WriteTicket should only be sendable when T is Send | 2020-11-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0120 | `Decoder<R>` can carry `R: !Send` to other threads | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0121 | AtomicBox<T> implements Send/Sync for any `T: Sized` | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0122 | beef::Cow lacks a Sync bound on its Send trait allowing for data races | 2020-10-28T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0123 | Contents of uninitialized memory exposed in DeflateOutput's AsyncRead implementation | 2020-01-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0124 | ArcGuard's Send and Sync should have bounds on RC | 2020-12-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0125 | convec::ConVec<T> unconditionally implements Send/Sync | 2020-11-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0126 | SyncChannel<T> can move 'T: !Send' to other threads | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0127 | SyncRef's clone() and debug() allow data races | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0128 | Cache<K>: Send/Sync impls needs trait bounds on `K` | 2020-11-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0129 | ShmWriter allows sending non-Send type across threads | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0130 | Bunch<T> unconditionally implements Send/Sync | 2020-11-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0131 | Send/Sync bound needed on T for Send/Sync impl of RcuCell<T> | 2020-11-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0132 | `FixedCapacityDequeLike::clone()` can cause dropping uninitialized memory | 2020-12-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0133 | Queue<T> should have a Send bound on its Send/Sync traits | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0134 | `LockWeak<T>` allows to create data race to `T`. | 2020-11-14T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2021:5236 | Moderate: postgresql:13 security update | 2021-12-21T09:10:35Z | 2021-12-22T08:23:18Z |
| alsa-2021:5235 | Moderate: postgresql:12 security update | 2021-12-21T09:10:31Z | 2021-12-22T08:30:47Z |
| alsa-2019:3345 | Low: virt:rhel security, bug fix, and enhancement update | 2019-11-05T17:33:34Z | 2021-12-23T15:15:25Z |
| alsa-2020:0279 | Moderate: virt:rhel security update | 2020-01-29T13:42:54Z | 2021-12-23T15:15:25Z |
| alsa-2020:1358 | Important: virt:rhel security and bug fix update | 2020-04-07T12:58:04Z | 2021-12-23T15:15:25Z |
| alsa-2020:2774 | Important: virt:rhel security update | 2020-06-30T13:38:53Z | 2021-12-23T15:15:25Z |
| alsa-2020:4059 | Important: virt:rhel security update | 2020-09-29T08:09:34Z | 2021-12-23T15:15:25Z |
| alsa-2020:4676 | Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update | 2020-11-03T12:26:07Z | 2021-12-23T15:15:25Z |
| alsa-2021:1762 | Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update | 2021-05-18T06:02:26Z | 2021-12-23T15:15:25Z |
| alsa-2021:0711 | Important: virt:rhel and virt-devel:rhel security update | 2021-03-03T12:22:25Z | 2021-12-23T15:15:26Z |
| alsa-2021:1064 | Moderate: virt:rhel and virt-devel:rhel security update | 2021-04-05T16:17:13Z | 2021-12-23T15:15:26Z |
| alsa-2021:3061 | Moderate: virt:rhel and virt-devel:rhel security and bug fix update | 2021-08-10T11:58:46Z | 2021-12-23T15:15:26Z |
| alsa-2021:4191 | Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update | 2021-11-09T08:35:34Z | 2021-12-23T15:15:26Z |
| alsa-2021:5238 | Low: virt:rhel and virt-devel:rhel security update | 2021-12-21T09:11:21Z | 2021-12-23T15:15:26Z |
| alsa-2022:0001 | Important: grafana security update | 2022-01-03T07:30:31Z | 2022-01-07T20:56:35Z |
| alsa-2022:0130 | Important: firefox security update | 2022-01-12T11:30:14Z | 2022-01-13T09:06:41Z |
| alsa-2022:0129 | Important: thunderbird security update | 2022-01-12T11:29:46Z | 2022-01-13T09:06:45Z |
| alsa-2022:0161 | Moderate: java-17-openjdk security update | 2022-01-19T08:53:42Z | 2022-01-20T12:33:38Z |
| alsa-2022:0177 | Important: gegl04 security update | 2022-01-19T09:43:42Z | 2022-01-20T12:33:39Z |
| alsa-2022:0199 | Important: libreswan security update | 2022-01-19T19:11:04Z | 2022-01-20T15:36:09Z |
| alsa-2022:0185 | Moderate: java-11-openjdk security update | 2022-01-24T09:03:13Z | 2022-01-25T08:27:40Z |
| alsa-2022:0267 | Important: polkit security update | 2022-01-25T17:38:41Z | 2022-01-25T17:38:41Z |
| alsa-2020:4751 | Moderate: httpd:2.4 security, bug fix, and enhancement update | 2020-11-03T12:33:02Z | 2022-01-26T07:27:23Z |
| alsa-2021:1809 | Moderate: httpd:2.4 security, bug fix, and enhancement update | 2021-05-18T06:08:34Z | 2022-01-26T07:27:24Z |
| alsa-2021:3816 | Important: httpd:2.4 security update | 2021-10-12T15:53:03Z | 2022-01-26T07:27:24Z |
| alsa-2021:4257 | Moderate: httpd:2.4 security, bug fix, and enhancement update | 2021-11-09T08:52:38Z | 2022-01-26T07:27:24Z |
| alsa-2021:4537 | Important: httpd:2.4 security update | 2021-11-09T19:25:44Z | 2022-01-26T07:27:24Z |
| alsa-2022:0258 | Important: httpd:2.4 security update | 2022-01-25T12:49:42Z | 2022-01-26T07:27:24Z |
| alsa-2022:0290 | Important: parfait:0.5 security update | 2022-01-26T14:27:19Z | 2022-01-27T20:23:26Z |
| alsa-2022:0307 | Moderate: java-1.8.0-openjdk security and bug fix update | 2022-01-27T13:47:36Z | 2022-01-28T08:22:06Z |