Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2013-2170 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2014-01-20T02:00:00.000Z | 2014-01-20T02:57:00.000Z |
| CVE-2014-0025 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-1690. Reason: This candidate is a reservation duplicate of CVE-2014-1690. Notes: All CVE users should reference CVE-2014-1690 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-01-28T23:00:00.000Z | 2014-01-28T22:57:01.000Z |
| CVE-2010-3090 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-3089. Reason: This issue was MERGED into CVE-2010-3089 in accordance with CVE content decisions, because it is the same type of vulnerability and affects the same versions. Notes: All CVE users should reference CVE-2010-3089 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-02-10T17:00:00.000Z | 2014-02-10T16:57:01.000Z |
| CVE-2012-5546 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This identifier was publicly assigned by its CNA to information that was incorrectly specified due to a typo. Notes: none | N/A | N/A | 2014-02-10T23:00:00.000Z | 2014-02-10T23:57:00.000Z |
| CVE-2014-0070 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2014-02-27T01:00:00.000Z | 2014-02-27T00:57:00.000Z |
| CVE-2014-1277 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-3948. Reason: This candidate is a duplicate of CVE-2013-3948. Notes: All CVE users should reference CVE-2013-3948 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-03-13T10:00:00.000Z | 2014-03-13T07:57:01.000Z |
| CVE-2014-1284 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-2019. Reason: This candidate is a duplicate of CVE-2014-2019. Notes: All CVE users should reference CVE-2014-2019 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-03-13T10:00:00.000Z | 2014-03-13T07:57:01.000Z |
| CVE-2014-0982 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-0981. Reason: This issue was MERGED into CVE-2014-0981 in accordance with CVE content decisions, because it is the same type of vulnerability and affects the same versions. Notes: All CVE users should reference CVE-2014-0981 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-03-28T21:00:00.000Z | 2014-03-28T20:57:00.000Z |
| CVE-2014-0346 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-0160. Reason: This candidate is a reservation duplicate of CVE-2014-0160. Notes: All CVE users should reference CVE-2014-0160 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-04-07T22:00:00.000Z | 2014-04-07T22:57:00.000Z |
| CVE-2014-2750 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-2744, CVE-2014-2745. Reason: This candidate is a duplicate of CVE-2014-2744 and/or CVE-2014-2745. Notes: All CVE users should reference CVE-2014-2744 and/or CVE-2014-2745 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-04-10T15:00:00.000Z | 2014-04-11T03:57:00.000Z |
| CVE-2014-0360 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-2741. Reason: This candidate is a duplicate of CVE-2014-2741. Notes: All CVE users should reference CVE-2014-2741 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-04-23T20:00:00.000Z | 2014-04-23T20:57:01.000Z |
| CVE-2014-2984 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-2650. Reason: This candidate is a reservation duplicate of CVE-2014-2650. Notes: All CVE users should reference CVE-2014-2650 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-04-25T01:00:00.000Z | 2014-04-25T01:57:01.000Z |
| CVE-2012-2951 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6587. Reason: This candidate is a duplicate of CVE-2007-6587. Notes: All CVE users should reference CVE-2007-6587 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2012-05-29T20:00:00.000Z | 2014-04-26T23:57:01.000Z |
| CVE-2012-4410 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none | N/A | N/A | 2014-04-27T00:00:00.000Z | 2014-04-26T23:57:01.000Z |
| CVE-2013-4145 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-3414. Reason: This candidate is a duplicate of CVE-2012-3414. Notes: All CVE users should reference CVE-2012-3414 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-04-27T01:00:00.000Z | 2014-04-27T00:57:00.000Z |
| CVE-2013-4337 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-5965. Reason: This candidate is a duplicate of CVE-2013-5965. Notes: All CVE users should reference CVE-2013-5965 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-04-27T20:00:00.000Z | 2014-04-27T19:57:00.000Z |
| CVE-2012-3415 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-2401. Reason: This candidate is a duplicate of CVE-2012-2401. Notes: All CVE users should reference CVE-2012-2401 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-04-27T22:00:00.000Z | 2014-04-27T21:57:00.000Z |
| CVE-2013-1805 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-1806. Reason: This issue was MERGED into CVE-2013-1806 in accordance with CVE content decisions, because it is the same type of vulnerability and affects the same versions. Notes: All CVE users should reference CVE-2013-1806 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-04-30T22:00:00.000Z | 2014-04-30T21:57:00.000Z |
| CVE-2013-4121 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was a site-specific issue. Notes: none | N/A | N/A | 2014-05-01T10:00:00.000Z | 2014-05-01T03:57:00.000Z |
| CVE-2013-4336 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-5964. Reason: This candidate is a duplicate of CVE-2013-5964. Notes: All CVE users should reference CVE-2013-5964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-04-27T22:00:00.000Z | 2014-05-08T17:57:00.000Z |
| CVE-2014-2085 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-2084. Reason: This issue was MERGED into CVE-2014-2084 in accordance with CVE content decisions, because it is the same type of vulnerability and affects the same versions. Notes: All CVE users should reference CVE-2014-2084 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-05-17T19:00:00.000Z | 2014-05-17T18:57:00.000Z |
| CVE-2013-6764 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-6795. Reason: This candidate is a duplicate of CVE-2013-6795. A typo in an external publication caused this ID to be associated with the wrong vulnerability. Notes: All CVE users should reference CVE-2013-6795 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-05-19T14:00:00.000Z | 2014-05-19T13:57:00.000Z |
| CVE-2014-3831 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2014-05-22T19:00:00.000Z | 2014-05-22T18:57:00.000Z |
| CVE-2014-3463 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a unique security issue. Notes: none | N/A | N/A | 2014-05-30T10:00:00.000Z | 2014-05-30T08:57:00.000Z |
| CVE-2013-5643 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2014-06-10T10:00:00.000Z | 2014-06-10T04:57:01.000Z |
| CVE-2013-7072 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a unique security issue, and some vulnerability databases had associated inapplicable details with this ID. Notes: none | N/A | N/A | 2014-06-16T21:00:00.000Z | 2014-06-16T20:57:00.000Z |
| CVE-2014-4286 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-4286. Reason: This candidate is a duplicate of CVE-2013-4286. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2013-4286 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-06-18T21:00:00.000Z | 2014-06-18T20:57:00.000Z |
| CVE-2014-0235 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-0325, CVE-2014-3538. Reason: This candidate is a duplicate of CVE-2014-0325 and/or CVE-2014-3538. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2014-0325 instead of this candidate for the issue in the Internet Explorer product, and should reference CVE-2014-3538 instead of this candidate for the issue in the file product. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-04-08T21:00:00.000Z | 2014-07-03T13:57:01.000Z |
| CVE-2014-3540 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-0114. Reason: This candidate is a duplicate of CVE-2014-0114. CVE abstraction content decisions did not require a second ID. Notes: All CVE users should reference CVE-2014-0114 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-07-08T01:00:00.000Z | 2014-07-08T00:57:00.000Z |
| CVE-2014-4740 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-4907, CVE-2014-4908. Reason: This candidate is a duplicate of CVE-2014-4907 and CVE-2014-4908. Notes: All CVE users should reference CVE-2014-4907 and/or CVE-2014-4908 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2014-07-09T14:00:00.000Z | 2014-07-11T08:57:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2005-3994 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3967. Reason: This candid… | 2005-12-05T00:03:00.000 | 2023-11-07T01:57:57.650 |
| fkie_cve-2005-4067 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-4031. Reason: This candid… | 2005-12-07T23:03:00.000 | 2023-11-07T01:57:58.233 |
| fkie_cve-2005-4070 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3665. Reason: This candid… | 2005-12-08T01:03:00.000 | 2023-11-07T01:57:58.277 |
| fkie_cve-2005-4096 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.620 | 2023-11-07T01:57:58.593 |
| fkie_cve-2005-4097 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.637 | 2023-11-07T01:57:58.820 |
| fkie_cve-2005-4098 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.667 | 2023-11-07T01:57:59.033 |
| fkie_cve-2005-4099 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.683 | 2023-11-07T01:57:59.253 |
| fkie_cve-2005-4100 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.713 | 2023-11-07T01:57:59.473 |
| fkie_cve-2005-4101 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.730 | 2023-11-07T01:57:59.720 |
| fkie_cve-2005-4102 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.760 | 2023-11-07T01:57:59.953 |
| fkie_cve-2005-4103 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.777 | 2023-11-07T01:58:00.170 |
| fkie_cve-2005-4104 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.790 | 2023-11-07T01:58:00.390 |
| fkie_cve-2005-4105 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.823 | 2023-11-07T01:58:00.613 |
| fkie_cve-2005-4106 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.837 | 2023-11-07T01:58:00.843 |
| fkie_cve-2005-4107 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.870 | 2023-11-07T01:58:01.060 |
| fkie_cve-2005-4108 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.887 | 2023-11-07T01:58:01.277 |
| fkie_cve-2005-4109 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.900 | 2023-11-07T01:58:01.490 |
| fkie_cve-2005-4110 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.933 | 2023-11-07T01:58:01.703 |
| fkie_cve-2005-4111 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.947 | 2023-11-07T01:58:01.920 |
| fkie_cve-2005-4112 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.980 | 2023-11-07T01:58:02.133 |
| fkie_cve-2005-4113 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.997 | 2023-11-07T01:58:02.343 |
| fkie_cve-2005-4114 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.027 | 2023-11-07T01:58:02.550 |
| fkie_cve-2005-4115 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.040 | 2023-11-07T01:58:02.853 |
| fkie_cve-2005-4116 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.073 | 2023-11-07T01:58:03.190 |
| fkie_cve-2005-4117 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.087 | 2023-11-07T01:58:03.403 |
| fkie_cve-2005-4118 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.120 | 2023-11-07T01:58:03.637 |
| fkie_cve-2005-4119 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.137 | 2023-11-07T01:58:03.893 |
| fkie_cve-2005-4120 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.150 | 2023-11-07T01:58:04.097 |
| fkie_cve-2005-4121 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.183 | 2023-11-07T01:58:04.313 |
| fkie_cve-2005-4122 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.213 | 2023-11-07T01:58:04.530 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-66mv-xh68-h6v2 |
|
Denial of Service in @commercial/hapi | 2020-09-03T15:48:53Z | 2020-08-31T19:00:58Z |
| ghsa-9px9-f7jw-fwhj |
|
Command Injection in priest-runner | 2020-09-03T15:49:37Z | 2020-08-31T19:01:15Z |
| ghsa-w4vp-3mq7-7v82 |
|
Cross-Site Scripting in lazysizes | 2020-09-03T15:49:48Z | 2020-08-31T19:01:17Z |
| ghsa-f3vw-587g-r29g |
|
Path Traversal in sapper | 2020-09-03T15:50:38Z | 2020-08-31T19:01:20Z |
| ghsa-f8rq-m28h-8hxj |
|
Cross-Site Scripting in htmr | 2020-09-03T15:50:29Z | 2020-08-31T19:01:22Z |
| ghsa-mm7r-265w-jv6f |
|
Server-Side Request Forgery in @uppy/companion | 2020-09-03T15:51:19Z | 2020-08-31T19:01:35Z |
| ghsa-vv52-3mrp-455m |
|
Malicious Package in m-backdoor | 2020-09-03T15:53:36Z | 2020-08-31T19:01:56Z |
| ghsa-w42g-7vfc-xf37 |
|
Introspection in schema validation in Apollo Server | 2020-06-05T19:38:14Z | 2020-08-31T19:02:14Z |
| ghsa-r2vw-jgq9-jqx2 |
|
Improper Authorization in @sap-cloud-sdk/core | 2020-09-03T15:54:11Z | 2020-08-31T19:02:48Z |
| ghsa-4qqc-mp5f-ccv4 |
|
Command Injection in bestzip | 2020-09-02T15:05:51Z | 2020-09-02T15:04:08Z |
| ghsa-6x4w-8w53-xrvv |
|
XXE in Apache Standard Taglibs | 2020-09-14T18:44:01Z | 2020-09-14T18:42:48Z |
| ghsa-qvc5-cfrr-384v |
|
RCE in Third Party Library in Shopware | 2020-09-23T17:20:28Z | 2020-09-23T15:01:47Z |
| ghsa-mfc2-93pr-jf92 |
|
Malicious code in `loadyaml` | 2020-10-01T17:10:15Z | 2020-10-01T17:09:29Z |
| ghsa-38hx-3542-8fh3 |
|
Malicious code in `electorn` | 2020-10-01T17:09:56Z | 2020-10-01T17:09:44Z |
| ghsa-55w9-c3g2-4rrh |
|
Man-in-the-middle attack in Apache Axis | 2020-10-07T17:51:02Z | 2020-10-07T17:50:33Z |
| ghsa-xgh6-85xh-479p |
|
Regular Expression Denial of Service in npm-user-validate | 2020-10-16T18:56:26Z | 2020-10-16T18:56:02Z |
| ghsa-vr9x-mm65-2438 |
|
Command Injection in jison | 2020-10-08T21:38:51Z | 2020-10-19T18:55:38Z |
| ghsa-p68v-frgx-4rjp |
|
Denial of Service via Cache Flooding | 2020-10-19T21:34:14Z | 2020-10-19T21:34:01Z |
| ghsa-r82c-j4mq-5xfw |
|
Update bitlyshortener to >=0.5.0 to prevent generating some invalid short URLs | 2020-10-27T19:19:56Z | 2020-10-27T19:19:44Z |
| ghsa-2xwp-m7mq-7q3r |
|
CLI does not correctly implement strict mode | 2020-10-28T17:05:38Z | 2020-10-28T17:04:54Z |
| ghsa-jgrh-5m3h-9c5f |
5.9 (3.1)
|
Web Cache Poisoning in find-my-way | 2020-11-09T22:17:13Z | 2020-11-10T20:19:42Z |
| ghsa-8jq6-w5cg-wm45 |
|
Exploitable inventory component chaining in PocketMine-MP | 2020-11-11T21:38:18Z | 2020-11-11T21:38:07Z |
| ghsa-m9hw-7xfv-wqg7 |
|
Prototype Pollution in json-logic-js | 2020-11-12T19:36:14Z | 2020-11-12T19:35:53Z |
| ghsa-6gv9-7q4g-pmvm |
|
Persistent XSS in customer module in Shopware | 2020-11-13T15:47:36Z | 2020-11-13T01:17:58Z |
| ghsa-q76j-58cx-wp5v |
|
Vulnerability in RPKI manifest validation | 2020-11-13T17:28:49Z | 2020-11-13T17:28:31Z |
| ghsa-hrfh-fp4x-crrq |
|
Persistent XSS in newsletter module in Shopware | 2020-11-13T18:26:06Z | 2020-11-13T18:00:57Z |
| ghsa-28fw-88hq-6jmm |
|
Persistent XSS in shopping worlds | 2020-11-13T18:26:03Z | 2020-11-13T18:25:26Z |
| ghsa-74hv-qjjq-h7g5 |
|
datasette-graphql leaks details of the schema of private database files | 2020-11-24T22:59:08Z | 2020-11-24T21:42:40Z |
| ghsa-gvqv-779r-4jgp |
|
Use after free in CefSharp | 2020-11-27T20:13:05Z | 2020-11-27T20:06:27Z |
| ghsa-x7fx-mcc9-27j7 |
|
Inappropriate implementation in V8 in CefSharp | 2020-11-27T20:12:55Z | 2020-11-27T20:12:35Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2021-64 |
|
django-filter is a generic system for filtering Django QuerySets based on user selections… | django-filter | 2021-04-29T21:15:00Z | 2021-05-10T17:55:00Z |
| pysec-2021-4 |
|
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to … | apache-airflow | 2021-05-02T08:15:00Z | 2021-05-10T20:07:00Z |
| pysec-2021-29 |
|
The Logging subsystem in OctoPrint before 1.6.0 has incorrect access control because it a… | octoprint | 2021-05-11T14:15:00Z | 2021-05-11T15:18:00Z |
| pysec-2021-30 |
|
OctoPrint before 1.6.0 allows XSS because API error messages include the values of input … | octoprint | 2021-05-11T14:15:00Z | 2021-05-11T15:18:00Z |
| pysec-2021-6 |
|
In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser all… | django | 2021-04-06T15:15:00Z | 2021-05-12T08:15:00Z |
| pysec-2021-8 |
|
In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+)… | django | 2021-05-06T16:15:00Z | 2021-05-12T08:15:00Z |
| pysec-2021-7 |
|
In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, Upl… | django | 2021-05-05T15:15:00Z | 2021-05-13T13:41:00Z |
| pysec-2021-47 |
|
Pydantic is a data validation and settings management using Python type hinting. In affec… | pydantic | 2021-05-13T19:15:00Z | 2021-05-13T19:15:00Z |
| pysec-2021-12 |
|
Eventlet is a concurrent networking library for Python. A websocket peer may exhaust memo… | eventlet | 2021-05-07T15:15:00Z | 2021-05-14T17:02:00Z |
| pysec-2021-88 |
|
Zope is an open-source web application server. In Zope versions prior to 4.6 and 5.2, use… | zope | 2021-05-21T14:15:00Z | 2021-06-02T03:47:57.190321Z |
| pysec-2021-79 |
|
Zope Products.CMFCore before 2.5.1 and Products.PluggableAuthService before 2.6.2, as use… | plone | 2021-05-21T22:15:00Z | 2021-06-02T03:48:01.619218Z |
| pysec-2021-83 |
|
Plone though 5.2.4 allows SSRF via the lxml parser. This affects Diazo themes, Dexterity … | plone | 2021-05-21T22:15:00Z | 2021-06-02T03:48:05.392145Z |
| pysec-2021-87 |
|
Cranelift is an open-source code generator maintained by Bytecode Alliance. It translates… | wasmtime | 2021-05-24T16:15:00Z | 2021-06-02T03:48:07.159295Z |
| pysec-2021-81 |
|
Plone through 5.2.4 allows remote authenticated managers to perform disk I/O via crafted … | plone | 2021-05-21T22:15:00Z | 2021-06-02T03:48:09.722168Z |
| pysec-2021-84 |
|
Plone through 5.2.4 allows stored XSS attacks (by a Contributor) by uploading an SVG or H… | plone | 2021-05-21T22:15:00Z | 2021-06-02T03:48:11.504291Z |
| pysec-2021-78 |
|
Plone CMS until version 5.2.4 has a stored Cross-Site Scripting (XSS) vulnerability in th… | plone | 2021-05-20T16:15:00Z | 2021-06-09T05:00:50.662546Z |
| pysec-2021-85 |
|
Plone through 5.2.4 allows XSS via the inline_diff methods in Products.CMFDiffTool. | plone | 2021-05-21T22:15:00Z | 2021-06-09T05:00:54.946731Z |
| pysec-2021-93 |
|
An issue was discovered in Pillow before 8.2.0. For EPS data, the readline implementation… | pillow | 2021-06-02T16:15:00Z | 2021-06-09T05:00:59.042287Z |
| pysec-2021-91 |
|
The Python "Flask-Security-Too" package is used for adding security features to your Flas… | flask-security-too | 2021-01-11T21:15:00Z | 2021-06-09T05:01:03.786366Z |
| pysec-2021-77 |
|
An issue was discovered in management/commands/hyperkitty_import.py in HyperKitty through… | hyperkitty | 2021-05-26T14:15:00Z | 2021-06-09T05:01:08.351404Z |
| pysec-2021-90 |
|
Flask-AppBuilder is a development framework, built on top of Flask. User enumeration in d… | flask-appbuilder | 2021-06-07T19:15:00Z | 2021-06-09T05:01:12.347920Z |
| pysec-2021-92 |
|
An issue was discovered in Pillow before 8.2.0. For FLI data, FliDecode did not properly … | pillow | 2021-06-02T16:15:00Z | 2021-06-09T05:01:16.347355Z |
| pysec-2021-82 |
|
Plone through 5.2.4 allows remote authenticated managers to conduct SSRF attacks via an e… | plone | 2021-05-21T22:15:00Z | 2021-06-09T05:01:20.334920Z |
| pysec-2021-94 |
|
An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not prop… | pillow | 2021-06-02T16:15:00Z | 2021-06-09T05:01:24.292350Z |
| pysec-2021-89 |
|
Datasette is an open source multi-tool for exploring and publishing data. The `?_trace=1`… | datasette | 2021-06-07T22:15:00Z | 2021-06-09T05:01:28.246179Z |
| pysec-2021-86 |
|
This affects all versions of package qlib. The workflow function in cli part of qlib was … | pyqlib | 2021-02-15T16:15:00Z | 2021-06-09T05:01:32.318077Z |
| pysec-2021-95 |
|
The aaugustin websockets library before 9.1 for Python has an Observable Timing Discrepan… | websockets | 2021-06-06T15:15:00Z | 2021-06-09T05:01:36.173811Z |
| pysec-2021-80 |
|
Plone through 5.2.4 allows XSS via a full name that is mishandled during rendering of the… | plone | 2021-05-21T22:15:00Z | 2021-06-09T05:01:40.464417Z |
| pysec-2018-1 |
|
Unauthenticated access to cloudtoken daemon on Linux via network from version 0.1.1 befor… | cloudtoken | 2018-08-10T15:29:00Z | 2021-06-10T06:50:35.324330Z |
| pysec-2018-23 |
|
Python Cryptographic Authority pyopenssl version prior to version 17.5.0 contains a CWE-4… | pyopenssl | 2018-10-08T15:29:00Z | 2021-06-10T06:50:39.370732Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2019-10842 | Arbitrary code execution (via backdoor code, when downloaded from rubygems.org) was disco… | 2019-04-04T00:00:00.000Z |
| gsd-2019-16060 | A flaw in airbrake-ruby v4.2.3 prevented user data from being filtered prior to sending t… | 2019-04-10T00:00:00.000Z |
| gsd-2019-11358 | jQuery before 3.4.0 mishandles jQuery.extend(true, {}, ...) because of bject.prototype po… | 2019-04-19T00:00:00.000Z |
| gsd-2019-11068 | Nokogiri v1.10.3 has been released. This is a security release. It addresses a CVE in up… | 2019-04-22T00:00:00.000Z |
| gsd-2019-12732 | Chartkick is vulnerable to a cross-site scripting (XSS) attack if both the following cond… | 2019-06-04T00:00:00.000Z |
| gsd-2019-11027 | Ruby OpenID (aka ruby-openid) through 2.8.0 has a remotely exploitable flaw. This library… | 2019-06-13T00:00:00.000Z |
| gsd-2019-13146 | Due to unvalidated input, an attacker can pass in arbitrary variants via query parameters… | 2019-07-01T00:00:00.000Z |
| gsd-2019-1020001 | A path traversal vulnerability was discovered in YARD <= 0.9.19 when using `yard server` … | 2019-07-02T00:00:00.000Z |
| gsd-2019-13354 | The `strong_password` gem on RubyGems.org was hijacked by a malicious actor. The maliciou… | 2019-07-05T00:00:00.000Z |
| gsd-2019-13574 | A remote shell execution vulnerability when using MiniMagick::Image.open with URL coming … | 2019-07-12T00:00:00.000Z |
| gsd-2019-1010306 | A remote attacker can execute arbitrary commands by sending a crafted request to the serv… | 2019-07-16T00:00:00.000Z |
| gsd-2019-13589 | The paranoid2 gem 1.1.6 for Ruby, as distributed on RubyGems.org, included a code-executi… | 2019-07-16T00:00:00.000Z |
| gsd-2019-1010191 | The 'marginalia' gem is affected by a SQL Injection vulnerability. All SQL queries are af… | 2019-07-26T00:00:00.000Z |
| gsd-2018-20857 | Zendesk Samlr before 2.6.2 allows an XML nodes comment attack such as a name_id node with… | 2019-07-31T00:00:00.000Z |
| gsd-2019-14281 | The datagrid gem 1.0.6 for Ruby, as distributed on RubyGems.org, included a code-executio… | 2019-07-31T00:00:00.000Z |
| gsd-2019-14282 | The simple_captcha2 gem 0.2.3 for Ruby, as distributed on RubyGems.org, included a code-e… | 2019-07-31T00:00:00.000Z |
| gsd-2019-5477 | A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be e… | 2019-08-11T00:00:00.000Z |
| gsd-2019-15224 | The awesome-bot gem 1.18.0 for Ruby, as distributed on RubyGems.org, included a code-exec… | 2019-08-20T00:00:00.000Z |
| gsd-2018-20975 | Fat Free CRM before 0.18.1 has XSS in the tags_helper in app/helpers/tags_helper.rb. | 2019-08-21T00:00:00.000Z |
| gsd-2020-8130 | There is an OS command injection vulnerability in Ruby Rake < 12.3.3 in Rake::FileList wh… | 2019-08-29T00:00:00.000Z |
| gsd-2019-16109 | Devise before 4.7.1 confirms accounts upon receiving a request with a blank confirmation_… | 2019-09-08T00:00:00.000Z |
| gsd-2019-16892 | In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry si… | 2019-09-12T00:00:00.000Z |
| gsd-2019-16145 | The breadcrumbs contributed module through 0.2.0 for Padrino Framework allows XSS via a c… | 2019-09-23T00:00:00.000Z |
| gsd-2019-16377 | With the consul ruby gem before 1.0.3, if a controller checks multiple powers using `:if`… | 2019-09-23T00:00:00.000Z |
| gsd-2019-16676 | Simple Form before 5.0 has Incorrect Access Control in `file_method?` in `lib/simple_form… | 2019-09-27T00:00:00.000Z |
| gsd-2019-17383 | The netaddr gem before 2.0.4 for Ruby has misconfigured file permissions, such that a gem… | 2019-10-14T00:00:00.000Z |
| gsd-2019-15587 | In the Loofah gem, through v2.3.0, unsanitized JavaScript may occur in sanitized output w… | 2019-10-22T00:00:00.000Z |
| gsd-2019-18409 | The ruby_parser-legacy (aka legacy) gem 1.0.0 for Ruby allows local privilege escalation … | 2019-10-24T00:00:00.000Z |
| gsd-2019-13117 | Nokogiri v1.10.5 has been released. This is a security release. It addresses three CVEs … | 2019-10-31T00:00:00.000Z |
| gsd-2019-18841 | A specially crafted response in data loaded via URL can cause prototype pollution in Java… | 2019-11-09T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-7389 | Malicious code in zilliqa-exchange-tutorial (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:03Z |
| mal-2022-7392 | Malicious code in zilliqa-token-contract (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:03Z |
| mal-2022-7413 | Malicious code in zrc2-wallet-zilliqa (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:03Z |
| mal-2022-1160 | Malicious code in atlassian-sketch-plugin (npm) | 2022-06-08T09:01:01Z | 2022-06-08T09:01:06Z |
| mal-2022-4031 | Malicious code in jira-cloud-for-sketch (npm) | 2022-06-08T09:01:01Z | 2022-06-08T09:01:07Z |
| mal-2022-4612 | Malicious code in misk-web-tab-database (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:07Z |
| mal-2022-4614 | Malicious code in misk-web-tab-web-actions (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:07Z |
| mal-2022-4735 | Malicious code in multisig (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:07Z |
| mal-2022-4798 | Malicious code in neo-savant (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:07Z |
| mal-2022-5077 | Malicious code in onepassword_events_api (npm) | 2022-06-08T09:01:01Z | 2022-06-08T09:01:07Z |
| mal-2022-6415 | Malicious code in tangerine-state-viewer (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:07Z |
| mal-2022-6986 | Malicious code in vt-blockchain-bootcamp-starter-frontend (npm) | 2022-06-08T09:01:01Z | 2022-06-08T09:01:07Z |
| mal-2022-7390 | Malicious code in zilliqa-social-pay (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:07Z |
| mal-2022-898 | Malicious code in ai-aws-manager (npm) | 2022-06-08T09:01:02Z | 2022-06-08T09:01:07Z |
| mal-2022-899 | Malicious code in ai-cluster-manager (npm) | 2022-06-08T09:01:01Z | 2022-06-08T09:01:07Z |
| mal-2022-1001 | Malicious code in angieslist-visitor-app-common (npm) | 2022-06-08T09:02:07Z | 2022-06-08T09:02:07Z |
| mal-2022-5072 | Malicious code in on-running-script-context (npm) | 2022-06-08T09:05:17Z | 2022-06-08T09:05:18Z |
| mal-2022-1492 | Malicious code in bebekair (npm) | 2022-06-09T08:38:52Z | 2022-06-09T08:38:52Z |
| mal-2022-1800 | Malicious code in calc_testing (npm) | 2022-06-09T08:38:52Z | 2022-06-09T08:38:52Z |
| mal-2022-1015 | Malicious code in anotherpackagefor101 (npm) | 2022-06-09T08:46:50Z | 2022-06-09T08:46:50Z |
| mal-2022-4822 | Malicious code in newtestforme1007 (npm) | 2022-06-09T08:46:50Z | 2022-06-09T08:46:50Z |
| mal-2022-4823 | Malicious code in newtestforme1008 (npm) | 2022-06-09T08:46:50Z | 2022-06-09T08:46:50Z |
| mal-2022-5754 | Malicious code in reqsender321 (npm) | 2022-06-09T08:46:50Z | 2022-06-09T08:46:50Z |
| mal-2022-6559 | Malicious code in thisisveryfistpackage11 (npm) | 2022-06-09T08:46:50Z | 2022-06-09T08:46:50Z |
| mal-2022-7419 | Malicious code in zzzhelloeveryone (npm) | 2022-06-09T08:46:50Z | 2022-06-09T08:46:56Z |
| mal-2022-642 | Malicious code in @tide-web-apps/bert2 (npm) | 2022-06-09T08:50:13Z | 2022-06-09T08:51:18Z |
| mal-2022-418 | Malicious code in @manomano-toolbox/toolkit (npm) | 2022-06-09T08:52:09Z | 2022-06-09T08:52:09Z |
| mal-2022-606 | Malicious code in @spinak/iac (npm) | 2022-06-09T08:52:09Z | 2022-06-09T08:52:09Z |
| mal-2022-416 | Malicious code in @manomano-toolbox/hub (npm) | 2022-06-09T08:52:09Z | 2022-06-09T08:52:10Z |
| mal-2022-411 | Malicious code in @manomano-toolbox/api-gateway (npm) | 2022-06-09T08:52:16Z | 2022-06-09T08:52:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2020-13333 | 2024-03-06T11:21:57.279Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13334 | 2024-03-06T11:21:56.035Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13335 | 2024-03-06T11:21:54.786Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13336 | 2024-03-06T11:21:53.536Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13337 | 2024-03-06T11:21:52.295Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13338 | 2024-03-06T11:21:51.042Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13339 | 2024-03-06T11:21:49.793Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13340 | 2024-03-06T11:21:48.537Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13341 | 2024-03-06T11:21:47.290Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13342 | 2024-03-06T11:21:46.057Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13343 | 2024-03-06T11:21:44.793Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13344 | 2024-03-06T11:21:43.563Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13345 | 2024-03-06T11:21:42.325Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13346 | 2024-03-06T11:21:41.060Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13347 | 2024-03-06T11:21:39.807Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13348 | 2024-03-06T11:21:38.585Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13350 | 2024-03-06T11:21:36.083Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13351 | 2024-03-06T11:21:34.782Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13352 | 2024-03-06T11:21:33.523Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13354 | 2024-03-06T11:21:32.256Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13355 | 2024-03-06T11:21:31.027Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13356 | 2024-03-06T11:21:29.808Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13357 | 2024-03-06T11:21:28.531Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13358 | 2024-03-06T11:21:27.247Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13359 | 2024-03-06T11:21:26.007Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-14155 | 2024-03-06T11:21:24.715Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-15525 | 2024-03-06T11:21:23.425Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-26405 | 2024-03-06T11:21:22.192Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-26406 | 2024-03-06T11:21:20.937Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-26407 | 2024-03-06T11:21:19.612Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2025-008 | 2025-01-29T08:51:50.000Z | 2025-03-31T22:04:11.000Z | |
| drupal-contrib-2025-009 | 2025-01-29T16:54:02.000Z | 2025-03-31T22:04:22.000Z | |
| drupal-contrib-2025-011 | 2025-01-29T17:13:29.000Z | 2025-03-31T22:04:35.000Z | |
| drupal-contrib-2025-012 | 2025-01-29T17:16:19.000Z | 2025-03-31T22:04:42.000Z | |
| drupal-contrib-2025-013 | 2025-02-05T17:24:48.000Z | 2025-03-31T22:04:51.000Z | |
| drupal-contrib-2025-014 | 2025-02-12T17:37:40.000Z | 2025-03-31T22:05:00.000Z | |
| drupal-contrib-2025-015 | 2025-02-12T17:37:59.000Z | 2025-03-31T22:05:08.000Z | |
| drupal-contrib-2025-016 | 2025-02-12T17:38:09.000Z | 2025-03-31T22:05:16.000Z | |
| drupal-contrib-2025-017 | 2025-02-12T17:38:22.000Z | 2025-03-31T22:05:40.000Z | |
| drupal-contrib-2025-018 | 2025-02-26T18:34:59.000Z | 2025-03-31T22:06:05.000Z | |
| drupal-contrib-2025-019 | 2025-02-26T18:35:11.000Z | 2025-03-31T22:06:12.000Z | |
| drupal-contrib-2025-020 | 2025-02-26T18:35:21.000Z | 2025-03-31T22:06:18.000Z | |
| drupal-contrib-2025-021 | 2025-03-05T17:18:25.000Z | 2025-03-31T22:06:37.000Z | |
| drupal-contrib-2025-022 | 2025-03-05T17:27:19.000Z | 2025-03-31T22:06:45.000Z | |
| drupal-contrib-2025-023 | 2025-03-05T18:17:14.000Z | 2025-03-31T22:06:55.000Z | |
| drupal-contrib-2025-024 | 2025-03-19T18:52:53.000Z | 2025-03-31T22:07:08.000Z | |
| drupal-contrib-2025-025 | 2025-03-19T18:53:23.000Z | 2025-03-31T22:07:15.000Z | |
| drupal-contrib-2025-026 | 2025-03-19T18:53:42.000Z | 2025-03-31T22:07:23.000Z | |
| drupal-contrib-2025-002 | 2025-01-08T17:54:04.000Z | 2025-03-31T22:22:59.000Z | |
| drupal-contrib-2025-005 | 2025-01-22T16:59:00.000Z | 2025-03-31T22:23:08.000Z | |
| drupal-contrib-2025-006 | 2025-01-22T17:00:11.000Z | 2025-03-31T22:23:16.000Z | |
| drupal-contrib-2025-010 | 2025-01-29T16:57:22.000Z | 2025-03-31T22:23:22.000Z | |
| drupal-contrib-2025-027 | 2025-04-02T17:01:45.000Z | 2025-04-02T17:01:45.000Z | |
| drupal-contrib-2025-028 | 2025-04-02T17:02:32.000Z | 2025-04-02T17:02:32.000Z | |
| drupal-contrib-2025-029 | 2025-04-02T17:03:15.000Z | 2025-04-02T17:03:15.000Z | |
| drupal-contrib-2025-030 | 2025-04-09T17:04:09.000Z | 2025-04-09T17:04:09.000Z | |
| drupal-contrib-2025-032 | 2025-04-09T17:04:46.000Z | 2025-04-09T17:04:46.000Z | |
| drupal-contrib-2025-031 | 2025-04-09T17:04:15.000Z | 2025-04-10T16:01:51.000Z | |
| drupal-contrib-2025-035 | 2025-04-16T16:25:12.000Z | 2025-04-16T16:25:12.000Z | |
| drupal-contrib-2025-036 | 2025-04-16T16:25:27.000Z | 2025-04-16T16:25:27.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2008-000023 | Sony mylo COM-2 does not verify server SSL certificate | 2008-05-21T00:00+09:00 | 2008-05-21T11:34+09:00 |
| jvndb-2008-000027 | Cross-site scripting vulnerabilities in multiple Bluemoon Inc. XOOPS modules | 2008-05-21T00:00+09:00 | 2008-05-21T11:34+09:00 |
| jvndb-2008-001313 | JP1/Cm2/Network Node Manager Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T11:34+09:00 |
| jvndb-2008-001347 | JP1/Cm2/Network Node Manager Web Coordinated Function Multiple Vulnerabilities | 2008-06-06T12:00+09:00 | 2008-06-06T12:00+09:00 |
| jvndb-2008-001348 | Groupmax World Wide Web Desktop/BUNSHOKANRI(=DocumentManagement) Cross-Site Scripting Vulnerability | 2008-06-06T12:00+09:00 | 2008-06-06T12:00+09:00 |
| jvndb-2008-001349 | XMAP3 Denial of Service (DoS) Vulneability | 2008-06-06T12:00+09:00 | 2008-06-06T12:00+09:00 |
| jvndb-2008-001350 | Hitachi Groupmax Collaboration Products Cross-Site Scripting Vulnerability | 2008-06-06T12:00+09:00 | 2008-06-06T12:00+09:00 |
| jvndb-2008-000028 | WEB MART from KENT WEB vulnerable to cross-site scripting | 2008-06-06T12:01+09:00 | 2008-06-06T12:01+09:00 |
| jvndb-2007-000329 | Java Web Start vulnerable to execution of unauthorized system classes | 2008-05-21T00:00+09:00 | 2008-06-06T16:22+09:00 |
| jvndb-2006-000639 | Pixelpost cross-site scripting vulnerability | 2008-06-10T13:57+09:00 | 2008-06-10T13:57+09:00 |
| jvndb-2008-000029 | Sleipnir and Grani vulnerable to arbitrary script execution when Bookmark search results are restored from history | 2008-06-10T13:59+09:00 | 2008-06-10T13:59+09:00 |
| jvndb-2007-000818 | Flash Player allows to send arbitrary HTTP headers | 2008-05-21T00:00+09:00 | 2008-06-20T13:34+09:00 |
| jvndb-2008-000030 | BlognPlus SQL injection vulnerability | 2008-06-20T13:45+09:00 | 2008-06-20T13:45+09:00 |
| jvndb-2008-000031 | CGIWrap error page cross-site scripting vulnerability | 2008-06-20T13:46+09:00 | 2008-06-20T13:46+09:00 |
| jvndb-2008-000032 | nProtect : Netizen denial of service (DoS) vulnerability | 2008-07-07T10:24+09:00 | 2008-07-07T10:24+09:00 |
| jvndb-2008-001417 | Vulnerability in Sample Code in Hitachi uCosminexus Portal Framework Manuals | 2008-07-07T10:38+09:00 | 2008-07-07T10:38+09:00 |
| jvndb-2005-000804 | Tomcat vulnerable in request processing | 2008-05-21T00:00+09:00 | 2008-07-07T18:04+09:00 |
| jvndb-2008-000033 | Multiple Cybozu products vulnerable to cross-site request forgery | 2008-07-08T12:14+09:00 | 2008-07-08T12:14+09:00 |
| jvndb-2008-000034 | Cybozu Garoon session fixation vulnerability | 2008-07-08T12:14+09:00 | 2008-07-08T12:14+09:00 |
| jvndb-2008-000035 | Cybozu Garoon vulnerable to arbitrary script execution | 2008-07-08T12:14+09:00 | 2008-07-08T12:14+09:00 |
| jvndb-2008-000036 | FreeStyleWiki cross-site scripting vulnerability | 2008-07-08T12:14+09:00 | 2008-07-08T12:14+09:00 |
| jvndb-2008-000038 | Redmine vulnerable to cross-site scripting | 2008-07-08T12:15+09:00 | 2008-07-08T12:15+09:00 |
| jvndb-2007-000297 | Apache Tomcat Accept-Language Header Cross-Site Scripting Vulnerability | 2008-05-21T00:00+09:00 | 2008-07-11T13:47+09:00 |
| jvndb-2007-000456 | Apache Tomcat sample web application cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-07-11T13:48+09:00 |
| jvndb-2007-000457 | Apache Tomcat cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-07-11T13:48+09:00 |
| jvndb-2008-000039 | Safari installed in iPod touch and iPhone vulnerable in handling server certificates | 2008-07-16T12:27+09:00 | 2008-07-16T12:27+09:00 |
| jvndb-2008-000040 | Directory traversal vulnerability in WebLogic Server and WebLogic Express plug-ins | 2008-07-24T14:22+09:00 | 2008-07-24T14:22+09:00 |
| jvndb-2008-000041 | WebProxy from LunarNight Laboratory vulnerable to cross-site scripting | 2008-07-24T14:23+09:00 | 2008-07-24T14:23+09:00 |
| jvndb-2008-000042 | Multiple Century Systems routers vulnerable to cross-site request forgery | 2008-07-24T14:23+09:00 | 2008-07-24T14:23+09:00 |
| jvndb-2008-000021 | Mozilla Firefox cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-07-29T14:54+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00244 | poMMo Aardvark存在多个跨站脚本漏洞 | 2015-01-08 | 2015-01-13 |
| cnvd-2015-00245 | Viralheat Argyle Social存在多个跨站请求伪造漏洞 | 2015-01-08 | 2015-01-13 |
| cnvd-2015-00246 | TTChat存在多个跨站脚本漏洞 | 2015-01-08 | 2015-01-13 |
| cnvd-2015-00247 | Happy Chat跨站脚本漏洞 | 2015-01-08 | 2015-01-13 |
| cnvd-2015-00248 | Gogago YouTube Video Converter缓冲区溢出漏洞 | 2015-01-08 | 2015-01-13 |
| cnvd-2015-00249 | Kofax e-Transactions Sender Sendbox文件注入漏洞 | 2015-01-08 | 2015-01-13 |
| cnvd-2015-00250 | WordPress PhotoSmash插件跨站脚本漏洞 | 2015-01-08 | 2015-01-13 |
| cnvd-2015-00251 | BEdita CMS 'index.php'存在多个HTML注入漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00252 | PHP 'regcomp.c'空指针拒绝服务漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00253 | OpenStack Neutron本地拒绝服务漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00254 | e107 '/e107_admin/filemanager.php'跨站脚本漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00255 | Drupal Batch Jobs模块存在多个跨站请求伪造漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00256 | Drupal Todo Filter模块存在多个跨站请求伪造漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00257 | Drupal Log Watcher模块存在多个跨站请求伪造漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00258 | Drupal Jammer模块存在多个跨站请求伪造漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00259 | Drupal Linkit模块存在多个跨站脚本漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00260 | Drupal Field Display Label模块跨站脚本漏洞 | 2015-01-12 | 2015-01-13 |
| cnvd-2015-00261 | WordPress插件Sliding Social Icons存在多个跨站请求伪造漏洞 | 2015-01-08 | 2015-01-13 |
| cnvd-2015-00262 | WordPress插件Lightbox Photo Gallery存在多个跨站请求伪造漏洞 | 2015-01-08 | 2015-01-13 |
| cnvd-2015-00263 | CodeWrights 'HART DTM' Library本地拒绝服务漏洞 | 2015-01-13 | 2015-01-14 |
| cnvd-2015-00264 | WordPress插件Pods存在多个跨站请求伪造漏洞 | 2015-01-13 | 2015-01-14 |
| cnvd-2015-00265 | WordPress插件Pods跨站脚本漏洞 | 2015-01-13 | 2015-01-14 |
| cnvd-2015-00266 | Linux Kernel 'vdso_addr()'函数本地安全绕过漏洞 | 2015-01-13 | 2015-01-14 |
| cnvd-2015-00267 | MantisBT未完全修复存在多个URI重定向漏洞 | 2015-01-13 | 2015-01-14 |
| cnvd-2015-00268 | Privoxy信息泄露漏洞 | 2015-01-13 | 2015-01-14 |
| cnvd-2015-00269 | Privoxy存在多个远程代码执行漏洞 | 2015-01-13 | 2015-01-14 |
| cnvd-2015-00270 | libpng存在多个堆缓冲区溢出漏洞 | 2015-01-13 | 2015-01-14 |
| cnvd-2015-00271 | Tapatalk for WoltLab Burning Board 'welcome.php'存在多个跨站脚本漏洞 | 2015-01-13 | 2015-01-14 |
| cnvd-2015-00272 | Tapatalk for WoltLab Burning Board URI重定向漏洞 | 2015-01-13 | 2015-01-14 |
| cnvd-2015-00273 | Croogo CMS跨站脚本漏洞 | 2015-01-13 | 2015-01-14 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-00008 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00009 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00010 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00011 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00012 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00013 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00014 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00015 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00017 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00019 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00020 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00021 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00022 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00023 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00024 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00025 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00026 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00027 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00028 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00029 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00030 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00031 | Уязвимость программной платформы Jrockit, позволяющая удаленному злоумышленнику нарушить … | 05.07.2016 | 28.11.2016 |
| bdu:2015-00032 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00033 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00034 | Уязвимость программной платформы Jrockit, позволяющая удаленному злоумышленнику нарушить … | 05.07.2016 | 28.11.2016 |
| bdu:2015-00036 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00037 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00038 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00040 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00041 | Уязвимость системы планирования ресурсов Microsoft Dynamics AX, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2002-avi-033 | Vulnérabilité du service <TT>SNMP</TT> sous Microsoft Windows | 2002-02-13T00:00:00.000000 | 2002-03-15T00:00:00.000000 |
| certa-2002-avi-054 | Vulnérabilité dans Netscape Communicator 6.0 | 2002-03-15T00:00:00.000000 | 2002-03-15T00:00:00.000000 |
| certa-2002-avi-035 | Débordement de mémoire dans CUPS | 2002-02-18T00:00:00.000000 | 2002-03-19T00:00:00.000000 |
| certa-2002-avi-055 | Contournement de l'autentification pam-pgsql | 2002-03-19T00:00:00.000000 | 2002-03-19T00:00:00.000000 |
| certa-2002-avi-057 | Multiples vulnérabilités sur Lotus Domino 5.0 | 2002-03-20T00:00:00.000000 | 2002-03-20T00:00:00.000000 |
| certa-2002-avi-058 | Vulnérabilité de l'agent SNMP sous Lotus Domino | 2002-03-20T00:00:00.000000 | 2002-03-20T00:00:00.000000 |
| certa-2002-avi-059 | Vulnérabilité sur les gestionnaires d'affichage X11 utilisant le protocole XDMCP | 2002-03-21T00:00:00.000000 | 2002-03-22T00:00:00.000000 |
| certa-2002-avi-060 | Vulnérabilité dans le commutateur Alteon ACEdirector (AD) de Nortel Networks | 2002-03-25T00:00:00.000000 | 2002-03-25T00:00:00.000000 |
| certa-2002-avi-061 | Vulnérabilité sur webmin | 2002-03-25T00:00:00.000000 | 2002-03-25T00:00:00.000000 |
| certa-2002-avi-062 | Vulnérabilité dans le service d'accès Web <SPAN class="textit">XWebMail</SPAN> de la société XandMail | 2002-03-26T00:00:00.000000 | 2002-03-26T00:00:00.000000 |
| certa-2002-avi-063 | Vulnérabilité dans GESTOR 2.21 | 2002-03-26T00:00:00.000000 | 2002-03-26T00:00:00.000000 |
| certa-2001-avi-139 | Vulnérabilité de CDE | 2001-11-13T00:00:00.000000 | 2002-03-27T00:00:00.000000 |
| certa-2000-avi-079 | Vulnérabilité de Netscape sous Unix | 2000-12-01T00:00:00.000000 | 2002-03-28T00:00:00.000000 |
| certa-2002-avi-064 | Vulnérabilité de CISCO CallManager 3.1 | 2002-03-28T00:00:00.000000 | 2002-03-28T00:00:00.000000 |
| certa-2002-avi-065 | Vulnérabilité du logiciel Analog | 2002-03-29T00:00:00.000000 | 2002-03-29T00:00:00.000000 |
| certa-2002-avi-066 | Vulnérabilités dans Internet Explorer | 2002-03-29T00:00:00.000000 | 2002-03-29T00:00:00.000000 |
| certa-2002-avi-067 | Dénis de service sous IRIX/SGI | 2002-04-02T00:00:00.000000 | 2002-04-02T00:00:00.000000 |
| certa-2002-avi-068 | Vulnérabilité dans Squid | 2002-04-02T00:00:00.000000 | 2002-04-02T00:00:00.000000 |
| certa-2002-avi-070 | Vulnérabilités dans Cisco Secure ACS pour Windows | 2002-04-05T00:00:00.000000 | 2002-04-05T00:00:00.000000 |
| certa-2002-avi-071 | Vulnérabilité de Windows 2000 | 2002-04-05T00:00:00.000000 | 2002-04-05T00:00:00.000000 |
| certa-2002-avi-072 | Vulnérabilité du service MUP sous Windows | 2002-04-05T00:00:00.000000 | 2002-04-05T00:00:00.000000 |
| certa-2002-avi-073 | Vulnérabilité sur le serveur SMTP Lotus Domino 5.0.8 | 2002-04-09T00:00:00.000000 | 2002-04-09T00:00:00.000000 |
| certa-2002-avi-074 | Vulnérabilité de Cisco Aironet | 2002-04-10T00:00:00.000000 | 2002-04-10T00:00:00.000000 |
| certa-2002-avi-077 | Débordement de tampon dans « Netware Remote Manager » | 2002-04-15T00:00:00.000000 | 2002-04-15T00:00:00.000000 |
| certa-2002-avi-078 | Vulnérabilité de mail sous OpenBSD | 2002-04-16T00:00:00.000000 | 2002-04-16T00:00:00.000000 |
| certa-2002-avi-079 | Déni de service sous IRIX/SGI | 2002-04-16T00:00:00.000000 | 2002-04-16T00:00:00.000000 |
| certa-2002-avi-075 | Multiples vulnérabilités dans Microsoft IIS | 2002-04-11T00:00:00.000000 | 2002-04-17T00:00:00.000000 |
| certa-2002-avi-080 | Multiples vulnérabilités sous TRUE64 UNIX | 2002-04-17T00:00:00.000000 | 2002-04-17T00:00:00.000000 |
| certa-2002-avi-081 | Vunérabilités dans Internet Explorer sous Mac OS | 2002-04-17T00:00:00.000000 | 2002-04-17T00:00:00.000000 |
| certa-2002-avi-082 | Vulnérabilité dans Microsoft SQL Server | 2002-04-18T00:00:00.000000 | 2002-04-18T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2020-ale-025 | Vulnérabilité dans Fortinet FortiOS SSL-VPN | 2020-11-27T00:00:00.000000 | 2021-02-08T00:00:00.000000 |
| certfr-2020-ale-019 | Recrudescence d'activité Emotet en France | 2020-09-07T00:00:00.000000 | 2021-02-09T00:00:00.000000 |
| certfr-2020-ale-020 | [MàJ] Vulnérabilité dans Microsoft Netlogon | 2020-09-15T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-021 | Vulnérabilité dans Samba | 2020-09-18T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2021-ale-002 | [MàJ] Vulnérabilité dans Google Chrome et Microsoft Edge | 2021-02-05T00:00:00.000000 | 2021-03-11T00:00:00.000000 |
| certfr-2020-ale-026 | [MaJ] Présence de code malveillant dans SolarWinds Orion | 2020-12-14T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2021-ale-006 | [MàJ] Vulnérabilité dans F5 BIG-IP | 2021-03-22T00:00:00.000000 | 2021-04-15T00:00:00.000000 |
| certfr-2021-ale-001 | |MàJ] Vulnérabilité dans SonicWall SMA100 | 2021-02-02T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-003 | [MàJ] Vulnérabilité dans VMware vCenter Server | 2021-02-25T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-005 | Multiples vulnérabilités dans Microsoft DNS server | 2021-03-12T00:00:00.000000 | 2021-05-12T00:00:00.000000 |
| certfr-2021-ale-008 | Multiples vulnérabilités dans Exim | 2021-05-05T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-009 | [MàJ] Vulnérabilité dans Microsoft Windows | 2021-05-12T00:00:00.000000 | 2021-06-10T00:00:00.000000 |
| certfr-2021-ale-007 | [MàJ] Vulnérabilité dans Pulse Connect Secure | 2021-04-20T00:00:00.000000 | 2021-06-21T00:00:00.000000 |
| certfr-2021-ale-010 | Vulnérabilité dans Adobe Acrobat et Acrobat Reader | 2021-05-12T00:00:00.000000 | 2021-06-29T00:00:00.000000 |
| certfr-2021-ale-013 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-06-30T00:00:00.000000 | 2021-07-02T00:00:00.000000 |
| certfr-2021-ale-004 | [MàJ] Multiples vulnérabilités dans Microsoft Exchange Server | 2021-03-03T00:00:00.000000 | 2021-07-16T00:00:00.000000 |
| certfr-2021-ale-016 | Vulnérabilité dans SonicWall | 2021-07-15T00:00:00.000000 | 2021-08-19T00:00:00.000000 |
| certfr-2021-ale-011 | Vulnérabilité dans VMware vCenter Server | 2021-06-07T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-012 | Multiples vulnérabilités dans Microsoft Windows | 2021-06-09T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-015 | Multiples vulnérabilités dans SolarWinds Serv-U | 2021-07-13T00:00:00.000000 | 2021-10-19T00:00:00.000000 |
| certfr-2021-ale-014 | [MaJ] Multiples vulnérabilités dans Microsoft Windows | 2021-07-02T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-018 | Vulnérabilité dans Atlassian Confluence Server et Data Center | 2021-09-06T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-020 | [Maj] Multiples vulnérabilités dans Microsoft Azure Open Management Infrastructure | 2021-09-17T00:00:00.000000 | 2022-01-05T00:00:00.000000 |
| certfr-2021-ale-017 | Multiples vulnérabilités dans Microsoft Exchange | 2021-08-27T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-019 | [MaJ] Vulnérabilité dans Microsoft Windows | 2021-09-08T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-021 | Vulnérabilité dans Microsoft Exchange | 2021-11-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2021-ale-022 | [MaJ] Vulnérabilité dans Apache Log4j | 2021-12-10T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2022-ale-001 | [MaJ] Vulnérabilité dans Microsoft Windows | 2022-01-12T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2022-ale-003 | [MàJ] Vulnérabilité dans l'implémentation du protocole RPC par Microsoft | 2022-04-13T00:00:00.000000 | 2022-05-04T00:00:00.000000 |
| certfr-2022-ale-004 | Vulnérabilité dans F5 BIG-IP | 2022-05-11T00:00:00.000000 | 2022-09-16T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-999 | UNKNOWN WRITE in vcf_parse_format | 2020-07-22T21:49:39.091716Z | 2022-04-13T03:04:32.354959Z |
| osv-2020-1733 | Heap-buffer-overflow in le_to_u32 | 2020-09-11T00:01:15.355070Z | 2022-04-13T03:04:32.360821Z |
| osv-2021-1442 | Heap-use-after-free in find_es_header | 2021-10-12T00:01:42.721228Z | 2022-04-13T03:04:32.366279Z |
| osv-2021-449 | UNKNOWN READ in std::pair<absl::lts_NUMBER_02_25::container_internal::raw_hash_set<absl::lts_NUM | 2021-02-27T00:00:29.109256Z | 2022-04-13T03:04:32.371909Z |
| osv-2021-1305 | Use-of-uninitialized-value in std::__1::basic_ostream<char, std::__1::char_traits<char> >& std::__1::__put_cha | 2021-09-17T00:01:40.665077Z | 2022-04-13T03:04:32.377836Z |
| osv-2021-1275 | Use-of-uninitialized-value in std::__1::basic_ostream<char, std::__1::char_traits<char> >& std::__1::__put_cha | 2021-09-17T00:00:13.564872Z | 2022-04-13T03:04:32.383997Z |
| osv-2021-1269 | Use-of-uninitialized-value in std::__1::basic_ostream<char, std::__1::char_traits<char> >& std::__1::__put_cha | 2021-09-17T00:00:07.966622Z | 2022-04-13T03:04:32.390354Z |
| osv-2021-1395 | Heap-buffer-overflow in Op_YCbCr_to_RGB<unsigned char>::convert_colorspace | 2021-09-29T00:01:29.961504Z | 2022-04-13T03:04:32.396666Z |
| osv-2020-1570 | Heap-buffer-overflow in x265::PicYuv::copyFromPicture | 2020-08-03T00:00:09.880989Z | 2022-04-13T03:04:32.407749Z |
| osv-2020-1141 | Heap-buffer-overflow in ff_hevc_put_hevc_epel_pixels_8_sse | 2020-07-22T21:49:50.461909Z | 2022-04-13T03:04:32.413194Z |
| osv-2020-1138 | Heap-buffer-overflow in void apply_sao_internal<unsigned short> | 2020-07-22T21:49:50.071384Z | 2022-04-13T03:04:32.419159Z |
| osv-2020-213 | Heap-buffer-overflow in Op_YCbCr422_to_RGB_16bit::convert_colorspace | 2020-06-24T01:51:19.218628Z | 2022-04-13T03:04:32.424915Z |
| osv-2020-1260 | Negative-size-param in heif::HeifPixelImage::fill_RGB_16bit | 2020-07-22T21:50:01.133969Z | 2022-04-13T03:04:32.430391Z |
| osv-2020-1192 | Index-out-of-bounds in decoder_context::has_sps | 2020-07-22T21:49:55.027546Z | 2022-04-13T03:04:32.436045Z |
| osv-2020-1226 | Heap-buffer-overflow in void mc_chroma<unsigned short> | 2020-07-22T21:49:58.234804Z | 2022-04-13T03:04:32.447601Z |
| osv-2020-1246 | Stack-buffer-overflow in void apply_sao_internal<unsigned short> | 2020-07-22T21:50:00.006966Z | 2022-04-13T03:04:32.453257Z |
| osv-2020-568 | Heap-use-after-free in proc_plaintext | 2020-07-01T00:00:17.473815Z | 2022-04-13T03:04:32.464454Z |
| osv-2021-1472 | UNKNOWN WRITE in h3NeighborRotations | 2021-10-21T00:01:21.968011Z | 2022-04-13T03:04:32.469807Z |
| osv-2021-1524 | Heap-buffer-overflow in Canvas5Structure::NIBDecoder::decode | 2021-11-03T00:00:37.119532Z | 2022-04-13T03:04:32.475264Z |
| osv-2020-741 | Heap-buffer-overflow in uri_decoder | 2020-07-04T00:00:01.437763Z | 2022-04-13T03:04:32.487072Z |
| osv-2018-213 | Use-of-uninitialized-value in gvs_tuple_is_normal | 2021-01-13T00:01:26.534121Z | 2022-04-13T03:04:32.492641Z |
| osv-2020-743 | Heap-buffer-overflow in uri_decoder | 2020-07-04T00:00:01.814357Z | 2022-04-13T03:04:32.504752Z |
| osv-2020-831 | Heap-buffer-overflow in g_string_insert_len | 2020-07-14T22:13:38.399117Z | 2022-04-13T03:04:32.510149Z |
| osv-2018-216 | Heap-buffer-overflow in token_stream_prepare | 2021-01-13T00:01:27.343126Z | 2022-04-13T03:04:32.515974Z |
| osv-2018-212 | Heap-buffer-overflow in token_stream_prepare | 2021-01-13T00:01:26.134181Z | 2022-04-13T03:04:32.527743Z |
| osv-2018-22 | Heap-buffer-overflow in gvs_read_unaligned_le | 2021-01-13T00:00:09.013990Z | 2022-04-13T03:04:32.539752Z |
| osv-2018-228 | Heap-buffer-overflow in g_variant_serialiser_is_string | 2021-01-13T00:01:34.116112Z | 2022-04-13T03:04:32.546035Z |
| osv-2020-669 | Use-of-uninitialized-value in g_date_time_get_week_number | 2020-07-01T00:00:23.657942Z | 2022-04-13T03:04:32.552070Z |
| osv-2020-2253 | Global-buffer-overflow in g_date_time_get_ymd | 2020-12-10T00:00:08.953434Z | 2022-04-13T03:04:32.557673Z |
| osv-2021-1076 | UNKNOWN READ in ParseXMLElement | 2021-07-31T00:00:13.254766Z | 2022-04-13T03:04:32.562660Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2020-0135 | Slock<T> allows sending non-Send types across thread boundaries | 2020-11-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0136 | CopyCell lacks bounds on its Send trait allowing for data races | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0137 | AtomicBox<T> lacks bound on its Send and Sync traits allowing data races | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0138 | ReaderResult should be bounded by Sync | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0139 | dces' World type can cause data races | 2020-12-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0140 | `Shared` can cause a data race | 2020-11-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0141 | MvccRwLock allows data races & aliasing violations | 2020-12-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0142 | Send bound needed on T (for Send impl of `Bucket2`) | 2020-11-29T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0143 | Queues allow non-Send types to be sent to other threads, allowing data races | 2020-12-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0145 | Use-after-free when cloning a partially consumed `Vec` iterator | 2020-11-02T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0146 | arr! macro erases lifetimes | 2020-04-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0148 | Multiple soundness issues in `Ptr` | 2020-12-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0149 | Data race and memory safety issue in `Index` | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0150 | RingBuffer can create multiple mutable references and cause data races | 2020-12-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0151 | Generators can cause data races if non-Send types are used in their generator functions | 2020-11-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0152 | ImmediateIO and TransactionalIO can cause data races | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0153 | `read` on uninitialized buffer may cause UB (bite::read::BiteReadExpandedExt::read_framed_max) | 2020-12-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0154 | InputStream::read_exact : `Read` on uninitialized buffer causes UB | 2020-12-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0155 | `Read` on uninitialized buffer in `fill_buf()` and `read_up_to()` | 2020-12-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0160 | Threshold value is ignored (all shares are n=3) | 2020-01-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0161 | `array!` macro is unsound in presence of traits that implement methods it calls internally | 2020-05-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0164 | `cell-project` used incorrect variance when projecting through `&Cell<T>` | 2020-08-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0165 | mozjpeg DecompressScanlines::read_scanlines is Unsound | 2020-07-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0167 | `pnet_packet` buffer overrun in `set_payload` setters | 2020-06-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0003 | Buffer overflow in SmallVec::insert_many | 2021-01-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0004 | Missing Send bound for Lazy | 2021-01-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0005 | Double drop upon panic in 'fn map_array()' | 2021-01-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0006 | Exposes internally used raw pointer | 2021-01-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0007 | `Frame::copy_from_raw_parts` can lead to segfault without `unsafe` | 2021-01-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0008 | reading on uninitialized buffer can cause UB (`impl<R> BufRead for GreedyAccessReader<R>`) | 2021-01-02T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2022:0323 | Important: nginx:1.20 security update | 2022-01-31T09:52:06Z | 2022-01-31T21:06:57Z |
| alsa-2022:0332 | Critical: samba security and bug fix update | 2022-01-31T15:40:41Z | 2022-02-01T09:11:06Z |
| alsa-2022:0366 | Moderate: vim security update | 2022-02-01T20:12:46Z | 2022-02-02T11:55:08Z |
| alsa-2022:0368 | Moderate: rpm security update | 2022-02-01T20:13:05Z | 2022-02-02T11:55:08Z |
| alsa-2022:0370 | Moderate: cryptsetup security update | 2022-02-01T20:13:30Z | 2022-02-02T11:55:08Z |
| alsa-2021:4154 | Moderate: container-tools:rhel8 security, bug fix, and enhancement update | 2021-11-09T08:24:51Z | 2022-02-02T17:58:49Z |
| alsa-2021:4222 | Moderate: container-tools:3.0 security and bug fix update | 2021-11-09T08:46:34Z | 2022-02-02T18:04:53Z |
| alsa-2022:0350 | Moderate: nodejs:14 security, bug fix, and enhancement update | 2022-02-01T20:08:39Z | 2022-02-04T16:13:42Z |
| alsa-2022:0418 | Important: varnish:6 security update | 2022-02-03T09:29:24Z | 2022-02-04T16:49:12Z |
| alsa-2022:0441 | Important: aide security update | 2022-02-07T08:12:10Z | 2022-02-07T18:20:04Z |
| alsa-2022:0495 | Important: .NET 5.0 security and bugfix update | 2022-02-09T08:26:30Z | 2022-02-09T20:42:50Z |
| alsa-2022:0496 | Important: .NET 6.0 security and bugfix update | 2022-02-09T08:26:35Z | 2022-02-12T10:13:41Z |
| alsa-2022:0510 | Important: firefox security update | 2022-02-14T08:13:38Z | 2022-02-14T20:43:46Z |
| alsa-2022:0535 | Important: thunderbird security update | 2022-02-15T10:03:34Z | 2022-02-15T23:59:21Z |
| alsa-2022:0543 | Important: ruby:2.6 security update | 2022-02-16T08:26:13Z | 2022-02-17T11:10:41Z |
| alsa-2021:2587 | Moderate: ruby:2.5 security, bug fix, and enhancement update | 2021-06-29T13:58:20Z | 2022-02-17T11:19:12Z |
| alsa-2022:0545 | Important: ruby:2.5 security update | 2022-02-16T08:27:24Z | 2022-02-17T11:19:13Z |
| alsa-2022:0643 | Important: python-pillow security update | 2022-02-22T17:25:31Z | 2022-02-23T13:26:35Z |
| alsa-2022:0658 | Important: cyrus-sasl security update | 2022-02-23T13:33:12Z | 2022-02-23T22:48:10Z |
| alsa-2022:0818 | Critical: firefox security update | 2022-03-10T14:36:51Z | 2022-03-10T21:25:28Z |
| alsa-2022:0827 | Important: .NET Core 3.1 security and bugfix update | 2022-03-10T14:44:29Z | 2022-03-11T16:01:22Z |
| alsa-2022:0830 | Important: .NET 5.0 security and bugfix update | 2022-03-10T14:46:56Z | 2022-03-11T16:01:23Z |
| alsa-2022:0826 | Important: .NET 6.0 security and bugfix update | 2022-03-10T14:43:46Z | 2022-03-13T13:19:00Z |
| alsa-2022:0845 | Important: thunderbird security update | 2022-03-14T09:49:10Z | 2022-03-15T08:56:50Z |
| alsa-2022:0892 | Moderate: libarchive security update | 2022-03-15T09:11:33Z | 2022-03-16T22:17:21Z |
| alsa-2022:0894 | Moderate: vim security update | 2022-03-15T09:11:53Z | 2022-03-16T22:22:38Z |
| alsa-2022:0896 | Moderate: glibc security update | 2022-03-15T09:12:12Z | 2022-03-16T22:22:38Z |
| alsa-2022:0899 | Moderate: libxml2 security update | 2022-03-15T09:12:39Z | 2022-03-16T22:22:38Z |
| alsa-2022:0889 | Low: 389-ds:1.4 security and bug fix update | 2022-03-15T09:10:39Z | 2022-03-16T23:36:44Z |
| alsa-2022:0886 | Moderate: virt:rhel and virt-devel:rhel security update | 2022-03-15T09:10:17Z | 2022-03-17T20:46:19Z |