Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2014-0631 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2014. Notes: none | N/A | N/A | 2015-01-07T15:00:00.000Z | 2015-01-07T12:57:00.000Z |
| CVE-2014-4640 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2014. Notes: none | N/A | N/A | 2015-01-07T15:00:00.000Z | 2015-01-07T12:57:00.000Z |
| CVE-2014-4641 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2014. Notes: none | N/A | N/A | 2015-01-07T15:00:00.000Z | 2015-01-07T12:57:00.000Z |
| CVE-2014-4642 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2014. Notes: none | N/A | N/A | 2015-01-07T15:00:00.000Z | 2015-01-07T12:57:00.000Z |
| CVE-2014-9486 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9447. Reason: This candidate is a duplicate of CVE-2014-9447. Notes: All CVE users should reference CVE-2014-9447 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2015-01-07T15:00:00.000Z | 2015-01-07T13:57:00.000Z |
| CVE-2014-10000 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: This ID is frequently used as an example of the 2014 CVE-ID syntax change, which allows more than 4 digits in the sequence number. Notes: See references | N/A | N/A | 2015-01-13T11:00:00.000Z | 2015-01-13T15:57:00.000Z |
| CVE-2014-7865 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its requester. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2015-01-18T02:00:00.000Z | 2015-01-18T01:57:01.000Z |
| CVE-2014-0606 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-0603. Reason: This issue was MERGED into CVE-2014-0603 in accordance with CVE content decisions, because it is the same type of vulnerability and affects the same versions. Notes: All CVE users should reference CVE-2014-0603 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2015-02-06T11:00:00.000Z | 2015-02-06T04:57:00.000Z |
| CVE-2014-8614 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2014. Notes: none | N/A | N/A | 2015-02-08T23:00:00.000Z | 2015-02-08T22:57:01.000Z |
| CVE-2014-8615 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2014. Notes: none | N/A | N/A | 2015-02-08T23:00:00.000Z | 2015-02-08T22:57:01.000Z |
| CVE-2015-0246 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-1493. Reason: This candidate is a reservation duplicate of CVE-2015-1493. Notes: All CVE users should reference CVE-2015-1493 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2015-02-09T15:00:00.000Z | 2015-02-09T14:57:00.000Z |
| CVE-2014-7196 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-7169. Reason: This candidate is a duplicate of CVE-2014-7169. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2014-7169 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2015-02-15T20:00:00.000Z | 2015-02-15T18:57:00.000Z |
| CVE-2015-2010 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-0010. Reason: This candidate is a duplicate of CVE-2015-0010. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2015-0010 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2015-02-20T17:00:00.000Z | 2015-02-20T17:57:00.000Z |
| CVE-2015-2168 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue in customer-controlled software. Notes: none | N/A | N/A | 2015-03-03T11:00:00.000Z | 2015-03-03T05:57:00.000Z |
| CVE-2014-2188 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-0607. Reason: This candidate is a duplicate of CVE-2015-0607. The wrong ID was used. Notes: All CVE users should reference CVE-2015-0607 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2015-02-27T02:00:00.000Z | 2015-03-06T01:57:01.000Z |
| CVE-2015-2235 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2015-1067. Reason: This candidate is a duplicate of CVE-2015-1067. Notes: All CVE users should reference CVE-2015-1067 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2015-03-07T02:00:00.000Z | 2015-03-11T00:57:00.000Z |
| CVE-2015-0159 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-3570. Reason: This candidate is a reservation duplicate of CVE-2014-3570. Notes: All CVE users should reference CVE-2014-3570 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2015-03-25T01:00:00.000Z | 2015-03-25T01:57:00.000Z |
| CVE-2014-4314 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA who allocated this candidate did not associate it with any vulnerability during 2014. Notes: none | N/A | N/A | 2015-04-10T18:00:00.000Z | 2015-04-10T18:57:00.000Z |
| CVE-2014-4315 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA who allocated this candidate did not associate it with any vulnerability during 2014. Notes: none | N/A | N/A | 2015-04-10T18:00:00.000Z | 2015-04-10T18:57:00.000Z |
| CVE-2013-6144 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2015-04-10T19:00:00.000Z | 2015-04-10T19:57:01.000Z |
| CVE-2013-6145 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2015-04-10T19:00:00.000Z | 2015-04-10T19:57:01.000Z |
| CVE-2013-6146 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2015-04-10T19:00:00.000Z | 2015-04-10T19:57:01.000Z |
| CVE-2013-6147 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2015-04-10T19:00:00.000Z | 2015-04-10T19:57:01.000Z |
| CVE-2013-6148 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2015-04-10T19:00:00.000Z | 2015-04-10T19:57:01.000Z |
| CVE-2013-6149 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2015-04-10T19:00:00.000Z | 2015-04-10T19:57:01.000Z |
| CVE-2013-6150 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2015-04-10T19:00:00.000Z | 2015-04-10T19:57:01.000Z |
| CVE-2013-6151 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2015-04-10T19:00:00.000Z | 2015-04-10T19:57:01.000Z |
| CVE-2013-6152 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2015-04-10T19:00:00.000Z | 2015-04-10T19:57:01.000Z |
| CVE-2013-6153 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2015-04-10T19:00:00.000Z | 2015-04-10T19:57:01.000Z |
| CVE-2013-6154 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2013. Notes: none | N/A | N/A | 2015-04-10T19:00:00.000Z | 2015-04-10T19:57:01.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2006-0170 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-0035. Reason: This candid… | 2006-01-11T21:03:00.000 | 2023-11-07T01:58:19.000 |
| fkie_cve-2006-0186 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-4500. Reason: This candid… | 2006-01-12T06:02:00.000 | 2023-11-07T01:58:19.327 |
| fkie_cve-2006-0264 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-0259. Reason: This candid… | 2006-01-18T11:03:00.000 | 2023-11-07T01:58:20.127 |
| fkie_cve-2006-0390 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-4504. Reason: This candid… | 2006-03-06T20:06:00.000 | 2023-11-07T01:58:21.427 |
| fkie_cve-2006-0394 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-0848. Reason: This candid… | 2006-03-02T01:02:00.000 | 2023-11-07T01:58:21.480 |
| fkie_cve-2006-0556 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.510 | 2023-11-07T01:58:23.620 |
| fkie_cve-2006-0560 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.540 | 2023-11-07T01:58:24.540 |
| fkie_cve-2006-0740 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2021-06-21T14:15:07.727 | 2023-11-07T01:58:26.497 |
| fkie_cve-2006-0849 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2021-06-21T14:15:07.757 | 2023-11-07T01:58:27.883 |
| fkie_cve-2006-0904 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.557 | 2023-11-07T01:58:28.707 |
| fkie_cve-2006-0975 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-0459. Reason: This candid… | 2006-03-03T11:02:00.000 | 2023-11-07T01:58:29.397 |
| fkie_cve-2006-1053 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2021-06-21T14:15:07.787 | 2023-11-07T01:58:30.340 |
| fkie_cve-2006-1054 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-1861. Reason: This candid… | 2006-05-26T21:06:00.000 | 2023-11-07T01:58:30.550 |
| fkie_cve-2006-1086 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-1083. Reason: This candid… | 2006-03-09T00:02:00.000 | 2023-11-07T01:58:31.113 |
| fkie_cve-2006-1169 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.587 | 2023-11-07T01:58:32.410 |
| fkie_cve-2006-1170 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.603 | 2023-11-07T01:58:32.613 |
| fkie_cve-2006-1171 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.637 | 2023-11-07T01:58:32.893 |
| fkie_cve-2006-1187 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.650 | 2023-11-07T01:58:33.370 |
| fkie_cve-2006-1299 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.683 | 2023-11-07T01:58:34.593 |
| fkie_cve-2006-1307 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.697 | 2023-11-07T01:58:34.917 |
| fkie_cve-2006-1310 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.713 | 2023-11-07T01:58:35.140 |
| fkie_cve-2006-1312 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.747 | 2023-11-07T01:58:35.357 |
| fkie_cve-2006-1317 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.760 | 2023-11-07T01:58:35.617 |
| fkie_cve-2006-1424 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-1482. Reason: This candid… | 2006-03-28T20:02:00.000 | 2023-11-07T01:58:37.427 |
| fkie_cve-2006-1512 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-1712. Reason: This candid… | 2006-04-25T00:06:00.000 | 2023-11-07T01:58:38.397 |
| fkie_cve-2006-1519 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-2224. Reason: This candid… | 2006-05-15T10:02:00.000 | 2023-11-07T01:58:38.720 |
| fkie_cve-2006-1521 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:03.790 | 2023-11-07T01:58:38.950 |
| fkie_cve-2006-1663 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-0996. Reason: This candid… | 2006-04-07T10:04:00.000 | 2023-11-07T01:58:40.440 |
| fkie_cve-2006-1845 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-0537. Reason: This candid… | 2006-04-19T16:06:00.000 | 2023-11-07T01:58:42.520 |
| fkie_cve-2006-2125 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3779. Reason: This candid… | 2006-05-01T22:06:00.000 | 2023-11-07T01:58:45.430 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-589w-hccm-265x |
8.0 (3.1)
|
Inline attribute values were not processed. | 2020-10-19T20:17:47Z | 2021-01-07T22:50:45Z |
| ghsa-56pc-6jqp-xqj8 |
5.6 (3.1)
|
Context isolation bypass in Electron | 2020-10-06T17:46:40Z | 2021-01-07T22:51:36Z |
| ghsa-699q-wcff-g9mj |
8.9 (3.1)
|
Unsafe deserialization in Yii 2 | 2020-09-15T18:19:56Z | 2021-01-07T22:56:34Z |
| ghsa-4p7j-5ppx-rfhm |
|
Downloads Resources over HTTP in apk-parser3 | 2020-09-01T16:06:49Z | 2021-01-07T23:32:43Z |
| ghsa-673x-f5wx-fxpw |
7.6 (3.1)
|
Cross Site Scripting and RCE in baserCMS | 2020-08-28T21:45:15Z | 2021-01-07T23:39:00Z |
| ghsa-4r3m-j6x5-48m3 |
7.3 (3.1)
|
Cross Site Scripting(XSS) Vulnerability in Latest Release 4.3.6 Site basic settings | 2020-08-28T21:20:42Z | 2021-01-07T23:39:22Z |
| ghsa-cpxc-67rc-c775 |
7.3 (3.1)
|
Cross Site Scripting in baserCMS | 2020-08-28T20:48:12Z | 2021-01-07T23:39:30Z |
| ghsa-43m5-c88r-cjvv |
6.8 (3.1)
|
XSS due to lack of CSRF validation for replying/publishing | 2020-08-26T18:55:38Z | 2021-01-07T23:39:51Z |
| ghsa-6gg3-pmm7-97xc |
6.4 (3.1)
|
DOM-based XSS in auth0-lock | 2020-08-19T21:05:03Z | 2021-01-07T23:40:43Z |
| ghsa-wvhm-4hhf-97x9 |
7.1 (3.1)
|
Cross-Site Scripting in Prism | 2020-08-07T22:28:30Z | 2021-01-07T23:41:49Z |
| ghsa-wfm4-pq59-wg6r |
5.3 (3.1)
|
Reset Password / Login vulnerability in Sulu | 2020-08-05T21:27:44Z | 2021-01-07T23:41:55Z |
| ghsa-wwrj-35w6-77ff |
6.7 (3.1)
|
CSRF vulnerability in save-server | 2020-08-04T14:54:08Z | 2021-01-07T23:42:18Z |
| ghsa-cc2p-4jhr-xhhx |
7.5 (3.1)
|
False-positive validity for NFT1 genesis transactions in SLPJS | 2020-07-30T14:58:42Z | 2021-01-07T23:43:05Z |
| ghsa-5jpf-pj32-xx53 |
7.7 (3.1)
|
Authorization header is not sanitized in an error object in auth0 | 2020-07-29T16:26:22Z | 2021-01-07T23:44:25Z |
| ghsa-xp63-6vf5-xf3v |
9.3 (3.1)
|
Command injection in codecov (npm package) | 2020-07-20T17:20:20Z | 2021-01-07T23:47:13Z |
| ghsa-2jpm-827p-j44g |
7.2 (3.1)
|
Stored XSS in TimelineJS3 | 2020-07-09T18:28:07Z | 2021-01-07T23:47:19Z |
| ghsa-w534-q4xf-h5v2 |
9.3 (3.1)
|
XSS in Mapfish Print relating to JSONP support | 2020-07-07T16:32:49Z | 2021-01-07T23:47:26Z |
| ghsa-m93v-9qjc-3g79 |
7.8 (3.1)
|
Context isolation bypass via leaked cross-context objects in Electron | 2020-07-07T00:01:07Z | 2021-01-07T23:48:11Z |
| ghsa-6vrv-94jv-crrg |
6.8 (3.1)
|
Context isolation bypass via Promise in Electron | 2020-07-07T00:01:05Z | 2021-01-07T23:48:19Z |
| ghsa-h9jc-284h-533g |
7.7 (3.1)
|
Context isolation bypass via contextBridge in Electron | 2020-07-07T00:01:10Z | 2021-01-07T23:48:28Z |
| ghsa-f9mq-jph6-9mhm |
6.8 (3.1)
|
Arbitrary file read via window-open IPC in Electron | 2020-07-07T00:01:13Z | 2021-01-07T23:48:36Z |
| ghsa-6g6m-m6h5-w9gf |
7.7 (3.1)
|
Authorization bypass in express-jwt | 2020-06-30T16:05:24Z | 2021-01-07T23:49:22Z |
| ghsa-pfxf-wh96-fvjc |
5.3 (3.1)
|
Log Forging in generator-jhipster-kotlin | 2020-06-25T20:02:51Z | 2021-01-07T23:50:00Z |
| ghsa-x5ph-4fr4-g7fw |
|
Downloads Resources over HTTP in galenframework-cli | 2019-02-18T23:54:21Z | 2021-01-08T00:47:45Z |
| ghsa-x3j8-g4v9-67jq |
|
Downloads Resources over HTTP in pennyworth | 2019-02-18T23:56:51Z | 2021-01-08T00:47:47Z |
| ghsa-wr2c-ppj9-f2fv |
|
Downloads Resources over HTTP in webdrvr | 2019-02-18T23:33:54Z | 2021-01-08T01:15:00Z |
| ghsa-wg5r-c793-w5w2 |
|
Downloads Resources over HTTP in mystem-wrapper | 2019-02-18T23:44:28Z | 2021-01-08T01:56:50Z |
| ghsa-w9mf-24h3-9wxf |
|
Downloads Resources over HTTP in windows-iedriver | 2019-02-18T23:41:58Z | 2021-01-08T01:56:52Z |
| ghsa-w364-8vfv-gvf5 |
|
Downloads Resources over HTTP in phantomjs-cheniu | 2019-02-18T23:44:52Z | 2021-01-08T01:57:02Z |
| ghsa-vvwp-3f54-xc39 |
|
Downloads Resources over HTTP in broccoli-closure | 2019-02-18T23:57:05Z | 2021-01-08T01:57:11Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2018-14 |
|
An issue was discovered in Mayan EDMS before 3.0.2. The Cabinets app has XSS via a crafte… | mayan-edms | 2018-09-03T19:29:00Z | 2021-06-16T00:03:23.733638Z |
| pysec-2018-25 |
|
In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, … | pyspark | 2018-07-12T13:29:00Z | 2021-06-16T00:03:24.717902Z |
| pysec-2018-28 |
|
The Requests package before 2.20.0 for Python sends an HTTP Authorization header to an ht… | requests | 2018-10-09T17:29:00Z | 2021-06-16T00:03:24.800813Z |
| pysec-2018-29 |
|
Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.… | salt | 2018-10-24T22:29:00Z | 2021-06-16T00:03:24.871222Z |
| pysec-2021-97 |
|
The thefuck (aka The Fuck) package before 3.31 for Python allows Path Traversal that lead… | thefuck | 2021-06-10T11:15:00Z | 2021-06-16T00:03:24.982635Z |
| pysec-2018-31 |
|
tlslite-ng version 0.7.3 and earlier, since commit d7b288316bca7bcdd082e6ccff5491e2413052… | tlslite-ng | 2018-04-18T19:29:00Z | 2021-06-16T00:03:25.014006Z |
| pysec-2021-98 |
|
Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory… | django | 2021-06-08T18:15:00Z | 2021-06-22T04:54:55.381670Z |
| pysec-2021-99 |
|
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, valid… | django | 2021-06-08T18:15:00Z | 2021-06-22T04:54:55.488063Z |
| pysec-2021-100 |
|
FastAPI is a web framework for building APIs with Python 3.6+ based on standard Python ty… | fastapi | 2021-06-09T18:15:00Z | 2021-06-22T04:54:55.863034Z |
| pysec-2021-101 |
|
The dashboard component of StackLift LocalStack 0.12.6 allows attackers to inject arbitra… | localstack | 2021-05-07T05:15:00Z | 2021-06-22T04:54:56.080124Z |
| pysec-2021-102 |
|
A Cross-site scripting (XSS) vulnerability exists in StackLift LocalStack 0.12.6. | localstack | 2021-05-07T05:15:00Z | 2021-06-22T04:54:56.108960Z |
| pysec-2021-103 |
|
Wagtail is an open source content management system built on Django. A cross-site scripti… | wagtail | 2021-06-17T17:15:00Z | 2021-06-22T04:54:57.540693Z |
| pysec-2021-104 |
|
Zope is an open-source web application server. This advisory extends the previous advisor… | zope | 2021-06-08T18:15:00Z | 2021-06-22T04:54:57.652841Z |
| pysec-2018-33 |
|
__init__.py in f2py in NumPy before 1.8.1 allows local users to write to arbitrary files … | numpy | 2018-01-08T19:29:00Z | 2021-06-29T22:52:17.794688Z |
| pysec-2018-34 |
|
(1) core/tests/test_memmap.py, (2) core/tests/test_multiarray.py, (3) f2py/f2py2e.py, and… | numpy | 2018-01-08T19:29:00Z | 2021-06-29T22:52:17.858494Z |
| pysec-2017-1 |
|
The numpy.pad function in Numpy 1.13.1 and older versions is missing input validation. An… | numpy | 2017-08-15T16:29:00Z | 2021-06-29T22:52:17.919949Z |
| pysec-2018-35 |
|
aio-libs aiohttp-session version 2.6.0 and earlier contains a Other/Unknown vulnerability… | aiohttp-session | 2018-12-20T15:29:00Z | 2021-07-02T02:41:32.834524Z |
| pysec-2018-36 |
|
Ansible before 1.2.1 makes it easier for remote attackers to conduct man-in-the-middle at… | ansible | 2018-05-04T20:29:00Z | 2021-07-02T02:41:32.885648Z |
| pysec-2013-1 |
|
runner/connection_plugins/ssh.py in Ansible before 1.2.3, when using ControlPersist, allo… | ansible | 2013-09-16T19:14:00Z | 2021-07-02T02:41:32.926386Z |
| pysec-2013-2 |
|
lib/ansible/playbook/__init__.py in Ansible 1.2.x before 1.2.3, when playbook does not ru… | ansible | 2013-09-16T19:14:00Z | 2021-07-02T02:41:32.973358Z |
| pysec-2020-198 |
|
Ansible prior to 1.5.4 mishandles the evaluation of some strings. | ansible | 2020-01-09T13:15:00Z | 2021-07-02T02:41:33.018970Z |
| pysec-2017-2 |
|
The user module in ansible before 1.6.6 allows remote authenticated users to execute arbi… | ansible | 2017-06-08T18:29:00Z | 2021-07-02T02:41:33.064199Z |
| pysec-2020-199 |
|
The safe_eval function in Ansible before 1.5.4 does not properly restrict the code subset… | ansible | 2020-02-20T15:15:00Z | 2021-07-02T02:41:33.107799Z |
| pysec-2020-200 |
|
The vault subsystem in Ansible before 1.5.5 does not set the umask before creation or mod… | ansible | 2020-02-20T15:15:00Z | 2021-07-02T02:41:33.150700Z |
| pysec-2020-201 |
|
Ansible before 1.5.5 sets 0644 permissions for sources.list, which might allow local user… | ansible | 2020-02-20T15:15:00Z | 2021-07-02T02:41:33.195519Z |
| pysec-2020-202 |
|
Ansible before 1.5.5 constructs filenames containing user and password fields on the basi… | ansible | 2020-02-20T03:15:00Z | 2021-07-02T02:41:33.239912Z |
| pysec-2020-203 |
|
The safe_eval function in Ansible before 1.6.4 does not properly restrict the code subset… | ansible | 2020-02-20T03:15:00Z | 2021-07-02T02:41:33.286907Z |
| pysec-2020-204 |
|
Ansible before 1.6.7 does not prevent inventory data with "{{" and "lookup" substrings, a… | ansible | 2020-02-18T15:15:00Z | 2021-07-02T02:41:33.333300Z |
| pysec-2020-205 |
|
Multiple argument injection vulnerabilities in Ansible before 1.6.7 allow remote attacker… | ansible | 2020-02-18T15:15:00Z | 2021-07-02T02:41:33.376176Z |
| pysec-2015-1 |
|
Ansible before 1.9.2 does not verify that the server hostname matches a domain name in th… | ansible | 2015-08-12T14:59:00Z | 2021-07-02T02:41:33.423322Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2020-8166 | It is possible to possible to, given a global CSRF token such as the one present in the a… | 2020-05-18T00:00:00.000Z |
| gsd-2020-8167 | There is an vulnerability in rails-ujs that allows attackers to send CSRF tokens to wrong… | 2020-05-18T00:00:00.000Z |
| gsd-2020-11076 | ### Impact By using an invalid transfer-encoding header, an attacker could [smuggle an H… | 2020-05-22T00:00:00.000Z |
| gsd-2020-11077 | ### Impact This is a similar but different vulnerability to the one patched in 3.12.5 an… | 2020-05-22T00:00:00.000Z |
| gsd-2020-11082 | ### Impact There was a vulnerability in versions of Kaminari that would allow an attacker… | 2020-05-28T00:00:00.000Z |
| gsd-2020-7663 | ### Impact The ReDoS flaw allows an attacker to exhaust the server's capacity to process… | 2020-06-05T00:00:00.000Z |
| gsd-2020-8184 | It is possible to forge a secure or host-only cookie prefix in Rack using an arbitrary co… | 2020-06-15T00:00:00.000Z |
| gsd-2020-4054 | When HTML is sanitized using Sanitize's "relaxed" config or a custom config that allows c… | 2020-06-16T00:00:00.000Z |
| gsd-2020-8185 | There is a vulnerability in versions of Rails prior to 6.0.3.2 that allowed an untrusted … | 2020-06-17T00:00:00.000Z |
| gsd-2020-14001 | The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown docu… | 2020-06-28T00:00:00.000Z |
| gsd-2020-15133 | The `Faye::WebSocket::Client` class uses the [`EM::Connection#start_tls`][1] method in [E… | 2020-07-31T00:00:00.000Z |
| gsd-2020-15134 | Faye uses [em-http-request][6] and [faye-websocket][10] in the Ruby version of its client… | 2020-07-31T00:00:00.000Z |
| gsd-2020-15109 | ### Impact This vulnerability allows a malicious customer to craft request data with para… | 2020-08-04T00:00:00.000Z |
| gsd-2020-16252 | The Field Test dashboard is vulnerable to CSRF with non-session based authentication meth… | 2020-08-04T00:00:00.000Z |
| gsd-2020-16253 | The PgHero dashboard is vulnerable to CSRF with non-session based authentication methods.… | 2020-08-04T00:00:00.000Z |
| gsd-2020-16254 | Chartkick is vulnerable to CSS injection if user input is passed to the width or height o… | 2020-08-04T00:00:00.000Z |
| gsd-2020-15169 | There is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translatio… | 2020-09-09T00:00:00.000Z |
| gsd-2020-25739 | An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not hono… | 2020-09-18T00:00:00.000Z |
| gsd-2020-25613 | WEBrick was too tolerant against an invalid Transfer-Encoding header. This may lead to in… | 2020-09-29T00:00:00.000Z |
| gsd-2020-36327 | Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.17 sometimes chooses a dependency sou… | 2020-09-30T00:00:00.000Z |
| gsd-2020-15237 | ### Impact When using the `derivation_endpoint` plugin, it's possible for the attacker t… | 2020-10-05T00:00:00.000Z |
| gsd-2020-8264 | There is a possible XSS vulnerability in Action Pack while the application server is in d… | 2020-10-07T00:00:00.000Z |
| gsd-2020-15269 | ### Impact The perpetrator who previously obtained an old expired user token could use i… | 2020-10-20T00:00:00.000Z |
| gsd-2020-7670 | agoo through 2.12.3 allows request smuggling attacks where agoo is used as a backend and … | 2020-10-20T00:00:00.000Z |
| gsd-2020-15240 | ### Overview Versions after and including `2.3.0` are improperly validating the JWT token… | 2020-11-03T00:00:00.000Z |
| gsd-2020-26222 | ### Impact Remote code execution vulnerability in `dependabot-common` and `dependabot-go_… | 2020-11-13T00:00:00.000Z |
| gsd-2020-26223 | ### Impact The perpetrator could query the [API v2 Order Status] (https://guides.spreecom… | 2020-11-13T00:00:00.000Z |
| gsd-2020-26254 | ### Impact This vulnerability impacts applications using the [omniauth-apple](https://gi… | 2020-12-08T00:00:00.000Z |
| gsd-2020-26247 | ### Description In Nokogiri versions <= 1.11.0.rc3, XML Schemas parsed by `Nokogiri::XML… | 2020-12-30T00:00:00.000Z |
| gsd-2020-26298 | Redcarpet is a Ruby library for Markdown processing. In Redcarpet before version 3.5.1, t… | 2021-01-11T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-7411 | Malicious code in zomato-ui (npm) | 2022-06-13T05:47:59Z | 2022-06-13T05:48:00Z |
| mal-2022-667 | Malicious code in @transaction-history/ui-components (npm) | 2022-06-13T05:48:50Z | 2022-06-13T05:48:50Z |
| mal-2022-3301 | Malicious code in gd-activity-tracker (npm) | 2022-06-13T05:49:05Z | 2022-06-13T05:49:05Z |
| mal-2022-5606 | Malicious code in rc-trigger-popup (npm) | 2022-06-13T05:49:37Z | 2022-06-13T05:49:38Z |
| mal-2022-5123 | Malicious code in orion-web (npm) | 2022-06-13T05:49:55Z | 2022-06-13T05:49:56Z |
| mal-2022-616 | Malicious code in @strava/clio (npm) | 2022-06-13T05:50:27Z | 2022-06-13T05:50:33Z |
| mal-2022-828 | Malicious code in acronis-ui-kit (npm) | 2022-06-13T05:50:43Z | 2022-06-13T05:50:44Z |
| mal-2022-6933 | Malicious code in vimeo-threejs-player (npm) | 2022-06-13T06:00:39Z | 2022-06-13T06:00:39Z |
| mal-2022-2577 | Malicious code in downloadkubernetes (npm) | 2022-06-13T06:00:40Z | 2022-06-13T06:00:40Z |
| mal-2022-4236 | Malicious code in kubernetes-dashboard (npm) | 2022-06-13T06:00:40Z | 2022-06-13T06:00:40Z |
| mal-2022-4238 | Malicious code in kubernetes-ui (npm) | 2022-06-13T06:00:40Z | 2022-06-13T06:00:40Z |
| mal-2022-6934 | Malicious code in vimeo_depth_player (npm) | 2022-06-13T06:00:39Z | 2022-06-13T06:00:40Z |
| mal-2022-888 | Malicious code in aframe-vimeo-component (npm) | 2022-06-13T06:00:39Z | 2022-06-13T06:00:40Z |
| mal-2022-7067 | Malicious code in web-discovery-project (npm) | 2022-06-13T06:01:29Z | 2022-06-13T06:01:29Z |
| mal-2022-1667 | Malicious code in brave-bitgo-client (npm) | 2022-06-13T06:01:29Z | 2022-06-13T06:01:30Z |
| mal-2022-1668 | Malicious code in brave-chromium-themes (npm) | 2022-06-13T06:01:29Z | 2022-06-13T06:01:30Z |
| mal-2022-1669 | Malicious code in brave-core (npm) | 2022-06-13T06:01:29Z | 2022-06-13T06:01:30Z |
| mal-2022-1673 | Malicious code in brave-ios (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:30Z |
| mal-2022-1674 | Malicious code in brave-ledger (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:30Z |
| mal-2022-1675 | Malicious code in brave-research-participation-tool (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:30Z |
| mal-2022-4310 | Malicious code in link-bubble (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:30Z |
| mal-2022-4314 | Malicious code in linkbubble-website (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:30Z |
| mal-2022-6891 | Malicious code in vault-updater (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:30Z |
| mal-2022-1671 | Malicious code in brave-extension (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:31Z |
| mal-2022-1672 | Malicious code in brave-eyeshade (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:31Z |
| mal-2022-1670 | Malicious code in brave-core-crx-packager (npm) | 2022-06-13T06:01:30Z | 2022-06-13T06:01:36Z |
| mal-2022-6223 | Malicious code in sp-bootstrap (npm) | 2022-06-13T16:51:27Z | 2022-06-13T16:51:28Z |
| mal-2022-1580 | Malicious code in bindingx-weex-plugin (npm) | 2022-06-14T07:20:10Z | 2022-06-14T07:20:10Z |
| mal-2022-5193 | Malicious code in pagetour-sdk.http (npm) | 2022-06-14T07:20:10Z | 2022-06-14T07:20:10Z |
| mal-2022-6313 | Malicious code in storage-image-processing-api-functions (npm) | 2022-06-14T07:20:10Z | 2022-06-14T07:20:10Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2021-22180 | 2024-03-06T11:20:29.620Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22181 | 2024-03-06T11:20:28.379Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22182 | 2024-03-06T11:20:27.142Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22183 | 2024-03-06T11:20:25.930Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22184 | 2024-03-06T11:20:24.698Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22185 | 2024-03-06T11:20:23.439Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22186 | 2024-03-06T11:20:22.165Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22187 | 2024-03-06T11:20:20.943Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22188 | 2024-03-06T11:20:19.689Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22189 | 2024-03-06T11:20:18.492Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22190 | 2024-03-06T11:20:17.249Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22192 | 2024-03-06T11:20:15.890Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22193 | 2024-03-06T11:20:14.621Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22194 | 2024-03-06T11:20:13.315Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22196 | 2024-03-06T11:20:12.054Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22197 | 2024-03-06T11:20:10.826Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22198 | 2024-03-06T11:20:09.572Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22199 | 2024-03-06T11:20:08.297Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22200 | 2024-03-06T11:20:07.025Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22201 | 2024-03-06T11:20:05.759Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22202 | 2024-03-06T11:20:04.488Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22203 | 2024-03-06T11:20:03.226Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22206 | 2024-03-06T11:20:00.707Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22208 | 2024-03-06T11:19:59.459Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22209 | 2024-03-06T11:19:58.207Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22210 | 2024-03-06T11:19:56.950Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22211 | 2024-03-06T11:19:55.694Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22213 | 2024-03-06T11:19:54.437Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22214 | 2024-03-06T11:19:53.153Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2021-22215 | 2024-03-06T11:19:51.920Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2025-072 | 2025-05-28T17:43:44.000Z | 2025-05-29T18:16:59.000Z | |
| drupal-contrib-2025-071 | 2025-05-28T17:43:23.000Z | 2025-05-29T18:17:12.000Z | |
| drupal-contrib-2025-070 | 2025-05-28T17:41:20.000Z | 2025-05-29T18:17:25.000Z | |
| drupal-contrib-2025-069 | 2025-05-21T17:29:25.000Z | 2025-05-29T18:17:38.000Z | |
| drupal-contrib-2025-059 | 2025-05-14T18:04:52.000Z | 2025-05-29T18:18:54.000Z | |
| drupal-contrib-2025-058 | 2025-05-14T18:04:44.000Z | 2025-05-29T18:19:12.000Z | |
| drupal-contrib-2025-051 | 2025-05-07T17:07:03.000Z | 2025-05-29T18:19:36.000Z | |
| drupal-contrib-2025-050 | 2025-05-07T17:06:52.000Z | 2025-05-29T18:19:50.000Z | |
| drupal-contrib-2025-049 | 2025-05-07T17:06:36.000Z | 2025-05-29T18:20:00.000Z | |
| drupal-contrib-2025-048 | 2025-05-07T17:06:26.000Z | 2025-05-29T18:20:11.000Z | |
| drupal-contrib-2025-041 | 2025-04-23T16:58:39.000Z | 2025-05-29T18:23:44.000Z | |
| drupal-contrib-2025-034 | 2025-04-16T16:24:49.000Z | 2025-05-29T18:24:01.000Z | |
| drupal-contrib-2025-004 | 2025-01-22T16:50:12.000Z | 2025-05-29T18:26:44.000Z | |
| drupal-contrib-2025-001 | 2025-01-08T17:22:11.000Z | 2025-06-19T22:05:09.000Z | |
| drupal-contrib-2025-077 | 2025-06-25T18:41:06.000Z | 2025-06-25T18:41:06.000Z | |
| drupal-contrib-2025-078 | 2025-06-25T18:41:20.000Z | 2025-06-25T18:41:20.000Z | |
| drupal-contrib-2025-079 | 2025-06-25T18:41:34.000Z | 2025-06-25T18:41:34.000Z | |
| drupal-contrib-2025-080 | 2025-06-25T18:41:56.000Z | 2025-06-25T18:41:56.000Z | |
| drupal-contrib-2025-082 | 2025-06-25T18:42:17.000Z | 2025-06-25T18:42:17.000Z | |
| drupal-contrib-2025-083 | 2025-06-25T18:42:38.000Z | 2025-06-25T18:42:38.000Z | |
| drupal-contrib-2025-084 | 2025-06-25T18:43:00.000Z | 2025-06-25T18:43:00.000Z | |
| drupal-contrib-2025-081 | 2025-06-25T18:42:06.000Z | 2025-06-26T18:17:29.000Z | |
| drupal-contrib-2025-085 | 2025-07-02T17:37:03.000Z | 2025-07-02T17:37:03.000Z | |
| drupal-contrib-2025-086 | 2025-07-02T17:37:13.000Z | 2025-07-02T17:37:13.000Z | |
| drupal-contrib-2025-087 | 2025-07-09T16:37:27.000Z | 2025-07-09T16:37:27.000Z | |
| drupal-contrib-2025-089 | 2025-07-16T16:46:08.000Z | 2025-07-16T16:46:08.000Z | |
| drupal-contrib-2025-090 | 2025-07-16T16:46:26.000Z | 2025-07-16T16:46:26.000Z | |
| drupal-contrib-2025-091 | 2025-07-16T16:46:49.000Z | 2025-07-17T14:42:36.000Z | |
| drupal-contrib-2025-092 | 2025-07-23T17:10:19.000Z | 2025-07-23T17:10:19.000Z | |
| drupal-contrib-2025-093 | 2025-07-30T16:30:44.000Z | 2025-07-30T16:30:44.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2008-000066 | Nucleus EUC-JP Japanese Edition vulnerable to cross-site scripting | 2008-10-06T15:24+09:00 | 2008-10-06T15:24+09:00 |
| jvndb-2008-000016 | Sun Java Runtime Environment (JRE) contains a vulnerability in processing XSLT transformations | 2008-05-21T00:00+09:00 | 2008-10-09T13:35+09:00 |
| jvndb-2008-000073 | Blosxom vulnerable to cross-site scripting | 2008-10-20T17:30+09:00 | 2008-10-20T17:30+09:00 |
| jvndb-2008-000068 | hisa_cart information disclosure vulnerability | 2008-10-21T19:25+09:00 | 2008-10-21T19:25+09:00 |
| jvndb-2008-000070 | Internet Explorer vulnerable in handling CDO protocol | 2008-10-22T17:49+09:00 | 2008-10-22T17:49+09:00 |
| jvndb-2008-000071 | MyNETS cross-site scripting vulnerability | 2008-10-22T17:49+09:00 | 2008-10-22T17:49+09:00 |
| jvndb-2008-001778 | BrightStor ARCserve and eTrust Antivirus Arbitrary Code Execution Vulnerability | 2008-10-30T12:19+09:00 | 2008-10-30T12:19+09:00 |
| jvndb-2008-001779 | CA ARCserver Backup and CA ARCserve Backup Client Agent Denial of Service (DoS) Vulnerability | 2008-10-30T12:20+09:00 | 2008-10-30T12:20+09:00 |
| jvndb-2008-000076 | sISAPILocation vulnerability bypasses HTTP header rewrite function | 2008-11-10T13:29+09:00 | 2008-11-10T13:29+09:00 |
| jvndb-2006-000808 | Denial of service vulnerability in Ruby CGI library (cgi.rb) | 2008-05-21T00:00+09:00 | 2008-11-14T12:20+09:00 |
| jvndb-2008-000077 | GungHo LoadPrgAx vulnerable to arbitrary Java program execution | 2008-11-19T15:50+09:00 | 2008-11-19T15:50+09:00 |
| jvndb-2008-001877 | JP1/Integrated Management Service Support Cross-Site Scripting Vulnerability | 2008-11-21T10:16+09:00 | 2008-11-21T10:16+09:00 |
| jvndb-2008-001043 | X.Org Foundation X server buffer overflow vulnerability | 2008-06-13T17:11+09:00 | 2008-11-21T12:19+09:00 |
| jvndb-2008-001311 | Symantec Backup Exec for Windows Server ActiveX Control Multiple Buffer Overflow Vulnerabilities | 2008-05-21T00:00+09:00 | 2008-11-21T12:20+09:00 |
| jvndb-2008-001312 | Symantec Backup Exec for Windows Server ActiveX Control Multiple Vulnerabilities | 2008-05-21T00:00+09:00 | 2008-11-21T12:20+09:00 |
| jvndb-2008-000074 | Snoopy command injection vulnerability | 2008-10-28T15:34+09:00 | 2008-11-28T13:54+09:00 |
| jvndb-2008-001895 | JP1/VERITAS NetBackup JAVA Administration GUI Privilege Escalation Vulnerability | 2008-12-01T11:10+09:00 | 2008-12-01T11:10+09:00 |
| jvndb-2008-000079 | I-O DATA DEVICE HDL-F series cross-site request forgery vulnerability | 2008-12-02T15:50+09:00 | 2008-12-02T15:50+09:00 |
| jvndb-2008-000067 | Movable Type Enterprise cross-site scripting vulnerability | 2008-12-04T14:52+09:00 | 2008-12-04T14:52+09:00 |
| jvndb-2008-001910 | Groupmax Collaboration - Schedule Mis-scheduling Problem: Unintended Members Included When Reservations are Made by Secretary | 2008-12-05T11:34+09:00 | 2008-12-05T11:34+09:00 |
| jvndb-2008-001911 | Groupmax Workflow - Development Kit for Active Server Pages Cross-Site Scripting Vulnerability | 2008-12-05T11:35+09:00 | 2008-12-05T11:35+09:00 |
| jvndb-2008-000083 | Predictable session ID vulnerability in Access Analyzer CGI by futomi's CGI Cafe | 2008-12-17T15:30+09:00 | 2008-12-17T15:30+09:00 |
| jvndb-2008-000085 | Mayaa cross-site scripting vulnerability | 2008-12-25T16:22+09:00 | 2008-12-25T16:22+09:00 |
| jvndb-2008-000086 | BlackJumboDog authentication bypass vulnerability | 2008-12-25T16:22+09:00 | 2008-12-25T16:22+09:00 |
| jvndb-2009-000001 | MyNETS cross-site scripting vulnerability | 2009-01-08T11:34+09:00 | 2009-01-08T11:34+09:00 |
| jvndb-2009-000003 | MODx cross-site scripting vulnerability | 2009-01-09T15:54+09:00 | 2009-01-09T15:54+09:00 |
| jvndb-2009-000004 | MODx cross-site request forgery vulnerability | 2009-01-09T15:54+09:00 | 2009-01-09T15:54+09:00 |
| jvndb-2009-000005 | MODx vulnerable to SQL injection | 2009-01-09T15:54+09:00 | 2009-01-09T15:54+09:00 |
| jvndb-2009-000006 | Cisco IOS cross-site scripting vulnerability | 2009-01-15T19:14+09:00 | 2009-01-15T19:14+09:00 |
| jvndb-2009-000007 | Oracle WebLogic Server vulnerable to cross-site scripting | 2009-01-20T16:45+09:00 | 2009-01-20T16:45+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00333 | Adobe Flash Player and AIR存在未明堆缓冲区溢出漏洞(CNVD-2015-00333) | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00334 | Adobe Flash Player and AIR越界读取内存破坏漏洞 | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00335 | Adobe Flash Player and AIR存在未明内存破坏漏洞(CNVD-2015-00335) | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00336 | Adobe Flash Player and AIR信息泄露漏洞(CNVD-2015-00336) | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00337 | Adobe Flash Player and AIR存在未明漏洞 | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00338 | Adobe Flash Player and AIR远程代码执行漏洞(CNVD-2015-00338) | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00339 | Adobe Flash Player and AIR存在未明堆缓冲区溢出漏洞(CNVD-2015-00339) | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00340 | Adobe Flash Player and AIR存在未明内存破坏漏洞(CNVD-2015-00340) | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00341 | Codiad path目录遍历漏洞 | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00342 | Schneider Electric Wonderware InTouch Access Anywhere Server缓冲区溢出漏洞 | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00343 | Apple Mac OS X XPC类型混淆本地权限提升漏洞 | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00344 | Corel FastFlick存在多个DLL加载任意代码执行漏洞 | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00345 | Corel Painter 'wacommt.dll' DLL加载任意代码执行漏洞 | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00346 | Corel PDF Fusion 'quserex.dll' DLL加载任意代码执行漏洞 | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00347 | 多个Corel产品'wintab32.dll' DLL加载存在任意代码执行漏洞 | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00348 | CorelCAD 'TD_Mgd_3.08_9.dll' DLL加载任意代码执行漏洞 | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00349 | Fork CMS 'loadForm()' 函数跨站脚本漏洞 | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00350 | VideoStudio Pro X7 'u32ZLib.dll' DLL加载任意代码执行漏洞 | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00351 | Softbb.net SoftBB 'redir_last_post_list.php' SQL注入漏洞 | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00352 | Softbb.net SoftBB 'redir_last_post_list.php'跨站脚本漏洞 | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00353 | WordPress插件Photo Gallery 'wp-admin/admin-ajax.php' SQL注入漏洞 | 2015-01-14 | 2015-01-15 |
| cnvd-2015-00354 | Microsoft Windows TS WebProxy Windows远程权限提升漏洞 | 2015-01-15 | 2015-01-16 |
| cnvd-2015-00355 | Microsoft Windows Network Policy Server远程拒绝服务漏洞 | 2015-01-15 | 2015-01-16 |
| cnvd-2015-00356 | Microsoft Windows Telnet服务缓冲区溢出漏洞 | 2015-01-15 | 2015-01-16 |
| cnvd-2015-00357 | Microsoft Windows Kernel 'mrxdav.sys'本地权限提升漏洞 | 2015-01-15 | 2015-01-16 |
| cnvd-2015-00358 | Microsoft Windows Server DNS和LDAP响应欺骗漏洞 | 2015-01-15 | 2015-01-16 |
| cnvd-2015-00359 | Microsoft Windows Server本地权限提升漏洞 | 2015-01-15 | 2015-01-16 |
| cnvd-2015-00360 | Microsoft Windows本地权限提升漏洞(CNVD-2015-00360) | 2015-01-15 | 2015-01-16 |
| cnvd-2015-00361 | Microsoft Windows错误报告安全机制绕过漏洞 | 2015-01-15 | 2015-01-16 |
| cnvd-2015-00362 | Mozilla Firefox/Thunderbird/SeaMonkey存在多个内存破坏漏洞(CNVD-2015-00362) | 2015-01-15 | 2015-01-16 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-00082 | Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00083 | Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00084 | Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00085 | Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00086 | Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00088 | Уязвимость интерпретатора PHP, позволяющая удаленному злоумышленнику вызвать отказ в обсл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00089 | Уязвимость интерпретатора PHP, позволяющая удаленному злоумышленнику повысить свои привилегии | 05.07.2016 | 28.11.2016 |
| bdu:2015-00090 | Уязвимость интерпретатора PHP, позволяющая удаленному злоумышленнику вызвать отказ в обсл… | 05.07.2016 | 28.11.2016 |
| bdu:2015-00091 | Уязвимость микропрограммного обеспечения маршрутизатора D–Link DSR–150, позволяющая злоум… | 07.07.2016 | 28.11.2016 |
| bdu:2015-00092 | Уязвимость микропрограммного обеспечения маршрутизатора D–Link DSR–250, позволяющая злоум… | 07.07.2016 | 28.11.2016 |
| bdu:2015-00093 | Уязвимость микропрограммного обеспечения маршрутизатора D–Link DSR–1000, позволяющая злоу… | 07.07.2016 | 28.11.2016 |
| bdu:2015-00097 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику обойти ограничения доступа | 05.07.2016 | 28.11.2016 |
| bdu:2015-00098 | Уязвимость браузера Google Chrome, позволяющая удаленному злоумышленнику вызвать отказ в … | 05.07.2016 | 28.11.2016 |
| bdu:2015-00099 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику обойти ограничения песочницы | 05.07.2016 | 28.11.2016 |
| bdu:2015-00100 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2015-00101 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании | 06.07.2016 | 28.11.2016 |
| bdu:2015-00102 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании | 06.07.2016 | 28.11.2016 |
| bdu:2015-00103 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании | 06.07.2016 | 28.11.2016 |
| bdu:2015-00104 | Уязвимость программного обеспечения Cisco Wireless LAN Controller 2500, позволяющая злоум… | 06.07.2016 | 28.11.2016 |
| bdu:2015-00105 | Уязвимость программного обеспечения Cisco Wireless LAN Controller 4100, позволяющая злоум… | 06.07.2016 | 28.11.2016 |
| bdu:2015-00106 | Уязвимость программного обеспечения Cisco Wireless LAN Controller 4500, позволяющая злоум… | 06.07.2016 | 28.11.2016 |
| bdu:2015-00107 | Уязвимость программного обеспечения Cisco Wireless LAN Controller 5500, позволяющая злоум… | 06.07.2016 | 28.11.2016 |
| bdu:2015-00108 | Уязвимость программного обеспечения Cisco Wireless LAN Controller 2000, позволяющая злоум… | 06.07.2016 | 28.11.2016 |
| bdu:2015-00109 | Уязвимость программного обеспечения Cisco Wireless LAN Controller 2100, позволяющая злоум… | 06.07.2016 | 28.11.2016 |
| bdu:2015-00110 | Уязвимость программного обеспечения Cisco Wireless LAN Controller 2500, позволяющая злоум… | 06.07.2016 | 28.11.2016 |
| bdu:2015-00111 | Уязвимость программного обеспечения Cisco Wireless LAN Controller 4100, позволяющая злоум… | 06.07.2016 | 28.11.2016 |
| bdu:2015-00112 | Уязвимость программного обеспечения Cisco Wireless LAN Controller 4400, позволяющая злоум… | 06.07.2016 | 28.11.2016 |
| bdu:2015-00113 | Уязвимость программного обеспечения Cisco Wireless LAN Controller 5500, позволяющая злоум… | 06.07.2016 | 28.11.2016 |
| bdu:2015-00114 | Уязвимость программного обеспечения Cisco Wireless LAN Controller 2000, позволяющая злоум… | 06.07.2016 | 28.11.2016 |
| bdu:2015-00115 | Уязвимость программного обеспечения Cisco Wireless LAN Controller 2100, позволяющая злоум… | 06.07.2016 | 28.11.2016 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2002-avi-113 | Vulnérabilité dans JRUN 3.0 et 3.1 | 2002-05-30T00:00:00.000000 | 2002-05-30T00:00:00.000000 |
| certa-2002-avi-114 | Vulnérabilité dans Microsoft Exchange 2000 | 2002-05-30T00:00:00.000000 | 2002-05-30T00:00:00.000000 |
| certa-2002-avi-104 | Vulnérabilités de tcpdump | 2002-05-17T00:00:00.000000 | 2002-05-31T00:00:00.000000 |
| certa-2002-avi-108 | Vulnérabilité du service ISC DHCPD | 2002-05-23T00:00:00.000000 | 2002-05-31T00:00:00.000000 |
| certa-2002-avi-115 | Vulnérabilité du serveur wu-imapd | 2002-05-31T00:00:00.000000 | 2002-05-31T00:00:00.000000 |
| certa-2002-avi-076 | Vulnérabilité des équipements et applications CISCO sous SOLARIS | 2002-04-11T00:00:00.000000 | 2002-06-03T00:00:00.000000 |
| certa-2002-avi-096 | Vulnérabilité de rpc.rwalld sous Solaris | 2002-05-06T00:00:00.000000 | 2002-06-03T00:00:00.000000 |
| certa-2002-avi-116 | Déni de service sur BIND 9 | 2002-06-05T00:00:00.000000 | 2002-06-05T00:00:00.000000 |
| certa-2002-avi-117 | Vulnérabilité des agents SNMP sous Solaris | 2002-06-05T00:00:00.000000 | 2002-06-05T00:00:00.000000 |
| certa-2002-avi-118 | Vulnérabilité rpc.passwd sous IRIX | 2002-06-05T00:00:00.000000 | 2002-06-05T00:00:00.000000 |
| certa-2002-avi-050 | Vulnérabilité de la machine virtuelle Java | 2002-03-05T00:00:00.000000 | 2002-06-06T00:00:00.000000 |
| certa-2002-avi-119 | Vulnérabilité dans Software Distributor sous HP-UX | 2002-06-10T00:00:00.000000 | 2002-06-10T00:00:00.000000 |
| certa-2002-avi-120 | Débordement de mémoire dans l'application <TT>ASP.NET</TT> de Microsoft | 2002-06-10T00:00:00.000000 | 2002-06-10T00:00:00.000000 |
| certa-2001-avi-081 | Débordement de mémoire dans telnetd | 2001-07-25T00:00:00.000000 | 2002-06-11T00:00:00.000000 |
| certa-2002-avi-109 | Vulnérabilité dans talkd | 2002-05-23T00:00:00.000000 | 2002-06-12T00:00:00.000000 |
| certa-2002-avi-121 | Vulnérabilité du module d'administration web du garde-barrière NetScreen-25 | 2002-06-12T00:00:00.000000 | 2002-06-12T00:00:00.000000 |
| certa-2002-avi-122 | Vulnérabilité dans l'annuaire des services RAS et RRAS de Windows | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| certa-2002-avi-123 | Vulnérabilités dans Microsoft SQLXML | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| certa-2002-avi-124 | Vulnérabilité de Microsoft Internet Information Server | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| certa-2002-avi-125 | Vulnérabilité des services snmpd et edd sur la console SSP (SUN Enterprise 10000) | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| certa-2002-avi-126 | Vulnérabilité dans Oracle 9iAS Reports Server | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| certa-2002-avi-127 | Vulnérabilité sur Oracle Net | 2002-06-13T00:00:00.000000 | 2002-06-13T00:00:00.000000 |
| certa-2002-avi-129 | Vulnérabilité de Ghostscript | 2002-06-14T00:00:00.000000 | 2002-06-14T00:00:00.000000 |
| certa-2002-avi-128 | Vulnérabilité du service gopher dans Microsoft Internet Explorer, Proxy Server et ISA Server | 2002-06-13T00:00:00.000000 | 2002-06-18T00:00:00.000000 |
| certa-2002-avi-131 | Vulnérabilité du client VPN de Cisco | 2002-06-20T00:00:00.000000 | 2002-06-20T00:00:00.000000 |
| certa-2002-avi-132 | Multiples vulnérabilités dans Excel et Word pour Windows | 2002-06-21T00:00:00.000000 | 2002-06-21T00:00:00.000000 |
| certa-2002-avi-133 | Vulnérabilité sur ColdFusion MX de Macromedia | 2002-06-21T00:00:00.000000 | 2002-06-21T00:00:00.000000 |
| certa-2002-avi-135 | Débordement de mémoire dans Microsoft Commerce Server 2000 et 2002 | 2002-06-27T00:00:00.000000 | 2002-06-27T00:00:00.000000 |
| certa-2002-avi-137 | Vulnérabilité sur Oracle9iAS | 2002-06-27T00:00:00.000000 | 2002-06-27T00:00:00.000000 |
| certa-2001-avi-088 | Vulnérabilité de SnmpXdmid sur Sun | 2001-08-31T00:00:00.000000 | 2002-06-28T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2024-ale-006 | [MàJ] Vulnérabilité dans Palo Alto Networks GlobalProtect | 2024-04-12T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-007 | Multiples vulnérabilités dans les produits Cisco | 2024-04-25T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-008 | [MàJ] Vulnérabilité dans les produits Check Point | 2024-05-30T00:00:00.000000 | 2024-07-01T00:00:00.000000 |
| certfr-2024-ale-009 | Vulnérabilité dans OpenSSH | 2024-07-01T00:00:00.000000 | 2024-07-03T00:00:00.000000 |
| certfr-2024-ale-010 | Multiples vulnérabilités dans Roundcube | 2024-08-09T00:00:00.000000 | 2024-10-07T00:00:00.000000 |
| certfr-2024-ale-011 | Vulnérabilité dans SonicWall | 2024-09-10T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-012 | [MàJ] Vulnérabilités affectant OpenPrinting CUPS | 2024-09-27T00:00:00.000000 | 2024-11-21T00:00:00.000000 |
| certfr-2024-ale-015 | [MàJ] Multiples vulnérabilités sur l'interface d'administration des équipements Palo Alto Networks | 2024-11-15T00:00:00.000000 | 2024-11-18T00:00:00.000000 |
| certfr-2024-ale-013 | Exploitations de vulnérabilités dans Ivanti Cloud Services Appliance (CSA) | 2025-03-31T00:00:00.000000 | 2024-10-25T00:00:00.000000 |
| certfr-2024-ale-014 | [MàJ] Multiples vulnérabilités dans Fortinet FortiManager | 2024-10-30T00:00:00.000000 | 2024-10-23T00:00:00.000000 |
| certfr-2025-ale-001 | [MàJ] Vulnérabilité dans les produits Ivanti | 2025-01-09T00:00:00.000000 | 2025-04-01T00:00:00.000000 |
| certfr-2025-ale-002 | [MàJ] Vulnérabilité dans les produits Fortinet | 2025-05-07T00:00:00.000000 | 2025-01-14T00:00:00.000000 |
| certfr-2025-ale-003 | [MàJ] Vulnérabilité dans les produits Ivanti | 2025-04-04T00:00:00.000000 | 2025-04-11T00:00:00.000000 |
| certfr-2025-ale-005 | Vulnérabilité dans SAP NetWeaver | 2025-04-28T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-006 | Vulnérabilité dans les produits Fortinet | 2025-05-13T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-007 | Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile (EPMM) | 2025-05-14T00:00:00.000000 | 2025-06-24T00:00:00.000000 |
| certfr-2025-ale-008 | [MàJ] Vulnérabilité dans Roundcube | 2025-06-05T00:00:00.000000 | 2025-07-21T00:00:00.000000 |
| certfr-2025-ale-004 | Activités de post-exploitation dans Fortinet FortiGate | 2025-04-11T00:00:00.000000 | 2025-08-07T00:00:00.000000 |
| certfr-2025-ale-009 | Multiples vulnérabilités dans Citrix NetScaler ADC et NetScaler Gateway | 2025-07-01T00:00:00.000000 | 2025-07-17T00:00:00.000000 |
| certfr-2025-ale-011 | Incidents de sécurité dans les pare-feux SonicWall | 2025-08-05T00:00:00.000000 | 2025-08-18T00:00:00.000000 |
| certfr-2025-ale-010 | [MàJ] Multiples vulnérabilités dans Microsoft SharePoint | 2025-07-21T00:00:00.000000 | 2025-08-26T00:00:00.000000 |
| certfr-2025-ale-012 | Vulnérabilité dans Citrix NetScaler ADC et NetScaler Gateway | 2025-08-26T00:00:00.000000 | 2025-09-26T00:00:00.000000 |
| certfr-2025-ale-013 | [MàJ] Multiples vulnérabilités dans Cisco ASA et FTD | 2025-09-25T00:00:00.000000 | 2025-10-06T00:00:00.000000 |
| certfr-2026-ale-001 | [MàJ] Multiples vulnérabilités dans Ivanti Endpoint Manager Mobile | 2026-01-30T00:00:00.000000 | 2026-02-03T00:00:00.000000 |
| certfr-2025-ale-014 | [MàJ] Vulnérabilité dans React Server Components | 2025-12-05T00:00:00.000000 | 2026-02-12T00:00:00.000000 |
| certfr-2026-ale-002 | [MàJ] Vulnérabilité dans Cisco Catalyst SD-WAN | 2026-02-25T00:00:00.000000 | 2026-02-26T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-1007 | Heap-use-after-free in DetectParseDupSigCompareFunc | 2020-07-22T21:49:39.655879Z | 2022-04-13T03:04:32.743041Z |
| osv-2020-1321 | UNKNOWN READ in FlowGetHash | 2020-07-22T21:50:06.291563Z | 2022-04-13T03:04:32.748792Z |
| osv-2020-124 | Dynamic-stack-buffer-overflow in RetrieveFPForSig | 2020-06-24T01:51:15.208520Z | 2022-04-13T03:04:32.754082Z |
| osv-2021-1634 | Dynamic-stack-buffer-overflow in OutputJsonDNP3SetItem | 2021-11-30T00:00:09.401031Z | 2022-04-13T03:04:32.759081Z |
| osv-2020-1026 | Heap-buffer-overflow in DefragInsertFrag | 2020-07-22T21:49:40.677143Z | 2022-04-13T03:04:32.763539Z |
| osv-2020-580 | Heap-buffer-overflow in ots::OpenTypeSTAT::Serialize | 2020-07-01T00:00:18.191041Z | 2022-04-13T03:04:32.769242Z |
| osv-2020-910 | Use-of-uninitialized-value in zmq::stream_engine_base_t::out_event | 2020-07-21T00:00:27.471141Z | 2022-04-13T03:04:32.775087Z |
| osv-2020-784 | Bad-cast to zmq::session_base_t from invalid vptr | 2020-07-14T05:37:33.175193Z | 2022-04-13T03:04:32.781119Z |
| osv-2020-1887 | Heap-buffer-overflow in zmq::tcp_read | 2020-09-30T00:00:04.296094Z | 2022-04-13T03:04:32.787196Z |
| osv-2020-1655 | Heap-buffer-overflow in zmq_z85_decode | 2020-08-24T00:01:20.386536Z | 2022-04-13T03:04:32.792589Z |
| osv-2021-618 | Heap-buffer-overflow in OT::AnchorFormat1* hb_serialize_context_t::embed<OT::AnchorFormat1> | 2021-04-09T00:01:00.954975Z | 2022-04-13T03:04:32.798219Z |
| osv-2018-64 | Heap-buffer-overflow in BEInt<unsigned int, 4>::operator unsigned int | 2021-01-13T00:00:31.625117Z | 2022-04-13T03:04:32.803589Z |
| osv-2020-347 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2020-07-01T00:00:04.515175Z | 2022-04-13T03:04:32.809168Z |
| osv-2020-233 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2020-06-26T00:00:07.429323Z | 2022-04-13T03:04:32.814525Z |
| osv-2020-509 | Use-of-uninitialized-value in hb_hashmap_t<hb_serialize_context_t::object_t const*, unsigned int, | 2020-07-01T00:00:13.704856Z | 2022-04-13T03:04:32.820071Z |
| osv-2020-107 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2020-06-24T01:51:14.378012Z | 2022-04-13T03:04:32.825667Z |
| osv-2021-909 | Heap-buffer-overflow in OT::CPALV1Tail::serialize | 2021-07-01T00:00:58.474357Z | 2022-04-13T03:04:32.830977Z |
| osv-2021-1518 | UNKNOWN READ in bool OT::OffsetTo<OT::ClipBox, OT::IntType<unsigned int, 3u>, true>::serialize_c | 2021-11-01T00:01:38.720506Z | 2022-04-13T03:04:32.836473Z |
| osv-2020-484 | Heap-buffer-overflow in AAT::KerxSubTableFormat4<AAT::KerxSubTableHeader>::driver_context_t::transition | 2020-07-01T00:00:12.297418Z | 2022-04-13T03:04:32.842142Z |
| osv-2020-412 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2020-07-01T00:00:08.080711Z | 2022-04-13T03:04:32.847965Z |
| osv-2018-149 | Heap-buffer-overflow in BEInt<unsigned int, 4>::operator unsigned int | 2021-01-13T00:01:04.493783Z | 2022-04-13T03:04:32.858815Z |
| osv-2020-1549 | UNKNOWN WRITE in hb_vector_t<CFF::op_str_t>::resize | 2020-07-31T00:00:39.916125Z | 2022-04-13T03:04:32.864310Z |
| osv-2018-126 | UNKNOWN READ in BEInt<int, 4>::operator int | 2021-01-13T00:00:56.326632Z | 2022-04-13T03:04:32.869605Z |
| osv-2018-119 | UNKNOWN READ in AAT::KerxSubTableFormat1<AAT::KerxSubTableHeader>::driver_context_t::transition | 2021-01-13T00:00:54.593710Z | 2022-04-13T03:04:32.875049Z |
| osv-2018-150 | Global-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2021-01-13T00:01:04.544450Z | 2022-04-13T03:04:32.880412Z |
| osv-2018-127 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2021-01-13T00:00:56.706065Z | 2022-04-13T03:04:32.885786Z |
| osv-2020-54 | Heap-buffer-overflow in OT::HintingDevice* hb_serialize_context_t::embed<OT::HintingDevice> | 2020-06-24T01:51:11.997638Z | 2022-04-13T03:04:32.891216Z |
| osv-2018-61 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2021-01-13T00:00:30.115037Z | 2022-04-13T03:04:32.896822Z |
| osv-2020-1563 | UNKNOWN READ in OT::VariationSelectorRecord::operator= | 2020-08-01T00:00:59.284106Z | 2022-04-13T03:04:32.902373Z |
| osv-2020-708 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2020-07-01T00:00:26.058927Z | 2022-04-13T03:04:32.913605Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2021-0043 | PartialReader passes uninitialized memory to user-provided Read | 2021-02-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0044 | Use after free possible in `uri::Formatter` on panic | 2021-02-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0045 | FromIterator implementation for Vector/Matrix can drop uninitialized memory | 2021-01-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0046 | misc::vec_with_size() can drop uninitialized memory if clone panics | 2021-02-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0047 | SliceDeque::drain_filter can double drop an element if the predicate panics | 2021-02-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0048 | StackVec::extend can write out of bounds when size_hint is incorrect | 2021-02-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0049 | `through` and `through_and` causes a double free if the map function panics | 2021-02-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0050 | swap_index can write out of bounds and return uninitialized memory | 2021-02-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0051 | KeyValueReader passes uninitialized memory to Read instance | 2021-01-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0052 | Multiple functions can cause double-frees | 2021-02-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0053 | 'merge_sort::merge()' crashes with double-free for `T: Drop` | 2021-03-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0054 | Archives may contain uninitialized memory | 2021-04-28T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0055 | NULL pointer deref in signature_algorithms processing | 2021-05-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0056 | CA certificate check bypass with X509_V_FLAG_X509_STRICT | 2021-05-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0057 | Integer overflow in CipherUpdate | 2021-05-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0058 | Null pointer deref in `X509_issuer_and_serial_hash()` | 2021-05-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0063 | XSS in `comrak` | 2021-05-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0065 | anymap is unmaintained. | 2021-05-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0066 | Denial of service on EVM execution due to memory over-allocation | 2021-05-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0068 | Soundness issue in `iced-x86` versions <= 1.10.3 | 2021-05-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0070 | VecStorage Deserialize Allows Violation of Length Invariant | 2021-06-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0071 | `grep-cli` may run arbitrary executables on Windows | 2021-06-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0072 | Task dropped in wrong thread when aborting `LocalSet` task | 2021-07-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0073 | Conversion from `prost_types::Timestamp` to `SystemTime` can cause an overflow and panic | 2021-07-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0074 | Incorrect handling of embedded SVG and MathML leads to mutation XSS | 2021-07-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0075 | Flaw in `FieldVar::mul_by_inverse` allows unsound R1CS constraint systems | 2021-07-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0076 | libsecp256k1 allows overflowing signatures | 2021-07-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0077 | `better-macro` has deliberate RCE to prove a point | 2021-07-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0080 | Links in archive can create arbitrary directories | 2021-07-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2021-0081 | Potential request smuggling capabilities due to lack of input validation | 2021-06-16T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2022:1819 | Moderate: go-toolset:rhel8 security and bug fix update | 2022-05-10T06:29:31Z | 2022-05-10T08:02:33Z |
| alsa-2022:1821 | Moderate: python27:2.7 security update | 2022-05-10T08:02:50Z | 2022-05-10T08:02:48Z |
| alsa-2022:1823 | Moderate: mod_auth_openidc:2.3 security update | 2022-05-10T06:30:32Z | 2022-05-10T08:02:51Z |
| alsa-2022:1830 | Moderate: postgresql:10 security update | 2022-05-10T08:03:34Z | 2022-05-10T08:03:33Z |
| alsa-2022:1851 | Moderate: pki-core:10.6 security and bug fix update | 2022-05-10T08:04:36Z | 2022-05-10T08:04:34Z |
| alsa-2022:1860 | Moderate: maven:3.6 security and enhancement update | 2022-05-10T08:04:46Z | 2022-05-10T08:04:45Z |
| alsa-2022:1861 | Moderate: maven:3.5 security update | 2022-05-10T08:04:48Z | 2022-05-10T08:04:46Z |
| alsa-2022:1894 | Moderate: rust-toolset:rhel8 security, bug fix, and enhancement update | 2022-05-10T08:06:44Z | 2022-05-10T08:06:43Z |
| alsa-2022:1915 | Moderate: httpd:2.4 security and bug fix update | 2022-05-10T08:07:40Z | 2022-05-10T08:07:38Z |
| alsa-2022:1920 | Moderate: qt5-qtsvg security update | 2022-05-10T06:38:43Z | 2022-05-10T08:07:45Z |
| alsa-2022:1930 | Moderate: keepalived security and bug fix update | 2022-05-10T06:39:24Z | 2022-05-10T08:08:11Z |
| alsa-2022:1932 | Moderate: python-lxml security update | 2022-05-10T08:08:19Z | 2022-05-10T08:08:16Z |
| alsa-2022:1934 | Moderate: mod_auth_mellon security update | 2022-05-10T08:08:25Z | 2022-05-10T08:08:23Z |
| alsa-2022:1950 | Moderate: dovecot security update | 2022-05-10T08:08:56Z | 2022-05-10T08:08:55Z |
| alsa-2022:1964 | Moderate: fetchmail security update | 2022-05-10T06:41:48Z | 2022-05-10T08:09:49Z |
| alsa-2022:1986 | Moderate: python3 security update | 2022-05-10T08:11:33Z | 2022-05-10T08:11:09Z |
| alsa-2022:1988 | Important: kernel security, bug fix, and enhancement update | 2022-05-10T08:11:36Z | 2022-05-10T08:11:35Z |
| alsa-2022:1991 | Moderate: cpio security update | 2022-05-10T06:43:49Z | 2022-05-10T08:11:53Z |
| alsa-2022:2008 | Moderate: cockpit security, bug fix, and enhancement update | 2022-05-10T06:44:59Z | 2022-05-10T08:12:37Z |
| alsa-2022:2013 | Moderate: openssh security, bug fix, and enhancement update | 2022-05-10T06:45:24Z | 2022-05-10T08:13:29Z |
| alsa-2022:2081 | Low: bluez security update | 2022-05-10T06:51:59Z | 2022-05-10T08:15:53Z |
| alsa-2022:2092 | Moderate: bind security, bug fix, and enhancement update | 2022-05-10T06:53:47Z | 2022-05-10T08:16:30Z |
| alsa-2022:2110 | Low: grub2 security, bug fix, and enhancement update | 2022-05-10T08:17:41Z | 2022-05-10T08:17:04Z |
| alsa-2022:2120 | Moderate: zsh security update | 2022-05-10T06:56:22Z | 2022-05-10T08:18:35Z |
| alsa-2022:2129 | Moderate: lynx security update | 2022-05-10T06:57:37Z | 2022-05-10T08:18:57Z |
| alsa-2022:2143 | Important: container-tools:3.0 security update | 2022-05-10T14:59:29Z | 2022-05-10T14:59:26Z |
| alsa-2022:2199 | Important: .NET 6.0 security, bug fix, and enhancement update | 2022-05-11T13:20:34Z | 2022-05-11T13:20:34Z |
| alsa-2022:2200 | Important: .NET 5.0 security, bug fix, and enhancement update | 2022-05-11T13:22:02Z | 2022-05-11T13:22:02Z |
| alsa-2022:2201 | Important: rsync security update | 2022-05-11T13:23:26Z | 2022-05-11T13:23:26Z |
| alsa-2022:2202 | Important: .NET Core 3.1 security, bug fix, and enhancement update | 2022-05-11T13:24:22Z | 2022-05-11T13:24:22Z |