Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2002-1161 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1380. Reason: This candidate is a reservation duplicate of CVE-2002-1380. Notes: none | N/A | N/A | 2002-12-18T10:00:00.000Z | 2004-01-26T15:00:00.000Z |
| CVE-2004-0585 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0589. Reason: This candidate is a duplicate of CVE-2004-0589. Notes: All CVE users should reference CVE-2004-0589 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-06-23T08:00:00.000Z | 2004-06-24T13:00:00.000Z |
| CVE-2003-0351 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0306. Reason: This candidate is a reservation duplicate of CVE-2003-0306. Notes: All CVE users should reference CVE-2003-0306 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-08-20T08:00:00.000Z | 2004-08-20T13:00:00.000Z |
| CVE-2003-0598 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0657. Reason: This candidate is a reservation duplicate of CVE-2003-0657. Notes: All CVE users should reference CVE-2003-0657 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-08-14T08:00:00.000Z | 2004-08-20T13:00:00.000Z |
| CVE-2004-1159 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1122, CVE-2004-1314. Reason: this was an out-of-band assignment duplicate intended for one issue, but the description and references inadvertently combined multiple issues. Notes: All CVE users should consult CVE-2004-1122 and CVE-2004-1314 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-12-10T10:00:00.000Z | 2004-12-22T15:00:00.000Z |
| CVE-1999-0020 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0032. Reason: This candidate is a duplicate of CVE-1999-0032. Notes: All CVE users should reference CVE-1999-0032 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2000-02-04T10:00:00.000Z | 2005-02-04T05:00:00.000Z |
| CVE-1999-0110 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0315. Reason: This candidate's original description had a typo that delayed it from being detected as a duplicate of CVE-1999-0315. Notes: All CVE users should reference CVE-1999-0315 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2000-02-04T10:00:00.000Z | 2005-02-04T05:00:00.000Z |
| CVE-1999-0187 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0022. Reason: This candidate is a duplicate of CVE-1999-0022. Notes: All CVE users should reference CVE-1999-0022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2000-02-04T10:00:00.000Z | 2005-02-04T05:00:00.000Z |
| CVE-1999-1056 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1395. Reason: This candidate is a duplicate of CVE-1999-1395. Notes: All CVE users should reference CVE-1999-1395 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2001-09-12T08:00:00.000Z | 2005-02-04T05:00:00.000Z |
| CVE-1999-1108 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1107. Reason: This candidate is a duplicate of CVE-1999-1107. Notes: All CVE users should reference CVE-1999-1107 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2001-09-12T08:00:00.000Z | 2005-02-04T05:00:00.000Z |
| CVE-1999-1310 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1022. Reason: This candidate is a duplicate of CVE-1999-1022. Notes: All CVE users should reference CVE-1999-1022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2001-09-12T08:00:00.000Z | 2005-02-04T05:00:00.000Z |
| CVE-2002-0192 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0193, CVE-2002-1564. Reason: This candidate was published with a description that identified a different vulnerability than what was identified in the original authoritative reference. Notes: Consult CVE-2002-0193 or CVE-2002-1564 to find the identifier for the proper issue | N/A | N/A | 2002-05-17T08:00:00.000Z | 2005-02-04T05:00:00.000Z |
| CVE-2002-0828 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0862. Reason: This is a duplicate of CVE-2002-0862. Notes: All CVE users should reference CVE-2002-0862 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-08-07T08:00:00.000Z | 2005-02-04T05:00:00.000Z |
| CVE-2002-0646 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-0371. Reason: This candidate is a reservation duplicate of CVE-2002-0371. Notes: CVE-2002-0371 should be used instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-10-15T08:00:00.000Z | 2005-02-06T15:00:00.000Z |
| CVE-2002-1259 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1286. Reason: This candidate is a reservation duplicate of CVE-2002-1286. Notes: All CVE users should reference CVE-2002-1286 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2002-12-18T10:00:00.000Z | 2005-02-06T15:00:00.000Z |
| CVE-2002-1263 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1295. Reason: This candidate is a reservation duplicate of CVE-2002-1295. Notes: All CVE users should reference CVE-2002-1295 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-01-03T10:00:00.000Z | 2005-02-06T15:00:00.000Z |
| CVE-2003-0157 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0138. Reason: This candidate is a reservation duplicate of CVE-2003-0138 due to incomplete coordination. Notes: All CVE users should reference CVE-2003-0138 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-03-21T10:00:00.000Z | 2005-02-06T15:00:00.000Z |
| CVE-2003-0158 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0139. Reason: This candidate is a reservation duplicate of CVE-2003-0139 due to incomplete coordination. Notes: All CVE users should reference CVE-2003-0139 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-03-21T10:00:00.000Z | 2005-02-06T15:00:00.000Z |
| CVE-2003-0591 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is a duplicate number that was created during the refinement phase. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-07-25T08:00:00.000Z | 2005-02-06T15:00:00.000Z |
| CVE-2003-0687 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has been revoked by its Candidate Numbering Authority (CNA) because it was internally assigned to a problem that was not reachable (the affected routine was not used by the software). Notes: none | N/A | N/A | 2004-06-03T08:00:00.000Z | 2005-02-06T15:00:00.000Z |
| CVE-2003-0790 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: the reported issue is not a vulnerability or exposure. Notes: This candidate was assigned to a "head-reading" bug in a component of fetchmail 6.2.4 and earlier, which was claimed to allow a denial of service. However, the bug is in a broken component of fetchmail that is not "reachable" by any execution path, so it cannot be triggered by any sort of attack and is not exploitable | N/A | N/A | 2003-10-25T08:00:00.000Z | 2005-02-06T15:00:00.000Z |
| CVE-2003-0862 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0813. Reason: This candidate is a duplicate of CVE-2003-0813. Notes: All CVE users should reference CVE-2003-0813 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-10-15T08:00:00.000Z | 2005-02-06T15:00:00.000Z |
| CVE-2003-0867 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0662. Reason: This candidate is a duplicate of CVE-2003-0662. Notes: All CVE users should reference CVE-2003-0662 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-10-17T08:00:00.000Z | 2005-02-06T15:00:00.000Z |
| CVE-2003-0879 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0518. Reason: This candidate is a reservation duplicate of CVE-2003-0518. Notes: All CVE users should reference CVE-2003-0518 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-10-28T10:00:00.000Z | 2005-02-06T15:00:00.000Z |
| CVE-2003-0964 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: N/A. Notes: none | N/A | N/A | 2003-10-01T08:00:00.000Z | 2005-02-06T15:00:00.000Z |
| CVE-2003-1047 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0540. Reason: This candidate is a duplicate of CVE-2004-0540. Notes: All CVE users should reference CVE-2004-0540 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-06-08T08:00:00.000Z | 2005-02-06T15:00:00.000Z |
| CVE-2003-1565 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1565. Reason: This candidate is a duplicate of CVE-2002-1565. Notes: All CVE users should reference CVE-2002-1565 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2003-08-05T08:00:00.000Z | 2005-02-06T15:00:00.000Z |
| CVE-2004-0076 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was removed from consideration by its Candidate Numbering Authority. Notes: none | N/A | N/A | 2004-06-03T08:00:00.000Z | 2005-02-06T15:00:00.000Z |
| CVE-2004-0187 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0185. Reason: This candidate is a reservation duplicate of CVE-2004-0185. Notes: All CVE users should reference CVE-2004-0185 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-03-04T10:00:00.000Z | 2005-02-06T15:00:00.000Z |
| CVE-2004-0472 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is a reservation duplicate of CVE-2004-0434. Notes: All CVE users should reference CVE-2004-0434 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2004-05-20T08:00:00.000Z | 2005-02-06T15:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-1999-0660 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is no… | 1999-01-01T05:00:00.000 | 2023-11-07T01:55:00.443 |
| fkie_cve-1999-1056 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1395. Reason: This candid… | 1992-12-31T05:00:00.000 | 2023-11-07T01:55:06.290 |
| fkie_cve-1999-1108 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1107. Reason: This candid… | 1998-11-18T05:00:00.000 | 2023-11-07T01:55:06.680 |
| fkie_cve-1999-1310 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-1022. Reason: This candid… | 1994-11-04T05:00:00.000 | 2023-11-07T01:55:08.250 |
| fkie_cve-1999-1594 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.613 | 2023-11-07T01:55:10.620 |
| fkie_cve-1999-1595 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.693 | 2023-11-07T01:55:10.873 |
| fkie_cve-1999-1596 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.753 | 2023-11-07T01:55:11.093 |
| fkie_cve-1999-1597 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.817 | 2023-11-07T01:55:11.307 |
| fkie_cve-1999-1598 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.897 | 2023-11-07T01:55:11.520 |
| fkie_cve-2000-0744 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2000-0743. Reason: This candidat… | 2000-10-20T04:00:00.000 | 2023-11-07T01:55:23.877 |
| fkie_cve-2000-1248 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:12.973 | 2023-11-07T01:55:29.043 |
| fkie_cve-2000-1249 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.037 | 2023-11-07T01:55:29.257 |
| fkie_cve-2000-1250 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.097 | 2023-11-07T01:55:29.467 |
| fkie_cve-2000-1251 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.177 | 2023-11-07T01:55:29.743 |
| fkie_cve-2000-1252 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.240 | 2023-11-07T01:55:29.953 |
| fkie_cve-2001-0654 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.167 | 2023-11-07T01:55:35.133 |
| fkie_cve-2001-0655 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.197 | 2023-11-07T01:55:35.370 |
| fkie_cve-2001-0656 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.230 | 2023-11-07T01:55:35.600 |
| fkie_cve-2001-0657 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.243 | 2023-11-07T01:55:35.810 |
| fkie_cve-2001-0798 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.277 | 2023-11-07T01:55:37.277 |
| fkie_cve-2001-0802 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.290 | 2023-11-07T01:55:37.520 |
| fkie_cve-2001-0810 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.323 | 2023-11-07T01:55:37.937 |
| fkie_cve-2001-0811 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.353 | 2023-11-07T01:55:38.150 |
| fkie_cve-2001-0812 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.387 | 2023-11-07T01:55:38.367 |
| fkie_cve-2001-0813 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.417 | 2023-11-07T01:55:38.583 |
| fkie_cve-2001-0814 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.433 | 2023-11-07T01:55:38.803 |
| fkie_cve-2001-1121 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-1084. Reason: This candidat… | 2001-07-02T04:00:00.000 | 2023-11-07T01:55:41.453 |
| fkie_cve-2001-1167 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-0976. Reason: This candid… | 2001-08-28T04:00:00.000 | 2023-11-07T01:55:41.797 |
| fkie_cve-2001-1492 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2001-1460. Reason: This candid… | 2001-12-31T05:00:00.000 | 2023-11-07T01:55:44.577 |
| fkie_cve-2001-1588 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.300 | 2023-11-07T01:55:45.377 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-995j-587r-259w |
|
Moderate severity vulnerability that affects rack-mini-profiler | 2018-08-13T20:46:58Z | 2020-06-16T21:42:03Z |
| ghsa-35c4-f3rq-f9g3 |
|
Moderate severity vulnerability that affects activesupport | 2018-09-17T21:57:23Z | 2020-06-16T21:42:52Z |
| ghsa-crvj-3gj9-gm2p |
|
High severity vulnerability that affects qs | 2018-10-09T00:44:29Z | 2020-06-16T21:43:40Z |
| ghsa-qpwj-mvv7-v3m9 |
|
High severity vulnerability that affects org.apache.cxf.fediz:fediz-spring and org.apache.cxf.fediz… | 2018-10-18T16:57:10Z | 2020-06-16T21:52:31Z |
| ghsa-mrhj-2g4v-39qx |
|
Moderate severity vulnerability that affects rails-html-sanitizer | 2018-09-17T21:58:19Z | 2020-06-16T21:54:12Z |
| ghsa-9vc2-p34x-jhxh |
|
Moderate severity vulnerability that affects rack | 2018-09-17T21:56:30Z | 2020-06-16T21:54:47Z |
| ghsa-v76m-f5cx-8rg4 |
|
Moderate severity vulnerability that affects DotNetNuke.Core | 2018-10-16T19:33:25Z | 2020-06-16T21:57:07Z |
| ghsa-v7q8-wvvh-c97p |
|
Moderate severity vulnerability that affects Zope2 | 2018-07-23T19:51:28Z | 2020-06-16T21:57:13Z |
| ghsa-w3gh-g32m-cvhr |
|
High severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fediz:fe… | 2018-10-18T16:56:47Z | 2020-06-16T21:59:21Z |
| ghsa-3233-rgx3-c2wh |
|
Moderate severity vulnerability that affects mustache | 2018-10-09T00:38:09Z | 2020-06-16T21:59:24Z |
| ghsa-w4x9-4f5x-8jj8 |
|
Low severity vulnerability that affects org.apache.hive:hive-exec, org.apache.hive:hive, and o… | 2018-11-21T22:23:29Z | 2020-06-16T21:59:37Z |
| ghsa-whw7-h25v-9qvx |
|
Moderate severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fedi… | 2018-10-18T16:56:38Z | 2020-06-16T22:00:38Z |
| ghsa-xpwp-rq3x-x6v7 |
|
Critical severity vulnerability that affects recurly-api-client | 2018-10-16T17:35:04Z | 2020-06-16T22:03:58Z |
| ghsa-xv6v-72hh-g6g2 |
|
Moderate severity vulnerability that affects org.owasp.antisamy:antisamy | 2018-10-18T17:22:26Z | 2020-06-16T22:04:31Z |
| ghsa-pgv6-jrvv-75jp |
|
Moderate severity vulnerability that affects send | 2018-10-09T00:34:30Z | 2020-06-16T22:04:41Z |
| ghsa-32f7-cmr3-vpjv |
|
Moderate severity vulnerability that affects aioxmpp | 2019-02-07T18:18:30Z | 2020-06-17T15:14:32Z |
| ghsa-5p9f-55j8-922m |
|
Moderate severity vulnerability that affects doorkeeper | 2018-08-13T20:49:10Z | 2020-06-17T15:14:35Z |
| ghsa-82x2-g7vr-39wq |
|
Moderate severity vulnerability that affects web-console | 2018-08-13T20:48:09Z | 2020-06-17T15:14:38Z |
| ghsa-8474-rc7c-wrhp |
|
High severity vulnerability that affects safemode | 2018-08-08T22:29:10Z | 2020-06-17T15:14:40Z |
| ghsa-9wcm-rrvh-qjc8 |
|
High severity vulnerability that affects colorscore | 2018-08-15T20:03:53Z | 2020-06-17T15:14:43Z |
| ghsa-g6f4-j6c2-w3p3 |
|
High severity vulnerability that affects uglify-js | 2018-10-09T00:39:43Z | 2020-06-17T15:14:46Z |
| ghsa-hm48-76wh-q86v |
|
High severity vulnerability that affects activerecord | 2018-08-21T19:03:17Z | 2020-06-17T15:14:48Z |
| ghsa-hxf5-mg84-pj4m |
|
Moderate severity vulnerability that affects moment | 2018-07-31T23:03:17Z | 2020-06-17T15:14:53Z |
| ghsa-qc8j-m8j3-rjq6 |
|
Moderate severity vulnerability that affects rails-html-sanitizer | 2018-09-17T21:57:58Z | 2020-06-17T15:15:01Z |
| ghsa-qf5x-qgx7-437h |
|
Moderate severity vulnerability that affects actionpack | 2018-09-17T21:54:11Z | 2020-06-17T15:15:04Z |
| ghsa-r53m-pfr5-7v87 |
|
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core | 2019-04-18T14:50:19Z | 2020-06-17T15:15:06Z |
| ghsa-vxp4-25qp-86qh |
|
Moderate severity vulnerability that affects ember | 2017-10-24T18:33:36Z | 2020-06-17T15:15:14Z |
| ghsa-w655-w578-99pq |
|
High severity vulnerability that affects espeak-ruby | 2018-08-21T17:09:08Z | 2020-06-17T15:15:17Z |
| ghsa-wxvm-fh75-mpgr |
|
Critical severity vulnerability that affects dns-sync | 2018-07-26T16:24:34Z | 2020-06-17T15:15:19Z |
| ghsa-9959-c6q6-6qp3 |
|
Moderate severity vulnerability that affects validator | 2017-10-24T18:33:36Z | 2020-06-17T16:30:41Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2019-13 |
|
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x b… | django | 2019-08-09T13:15:00Z | 2019-08-28T13:15:00Z |
| pysec-2019-104 |
|
** DISPUTED ** core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-r… | mitogen | 2019-08-18T20:15:00Z | 2019-08-30T11:38:00Z |
| pysec-2019-23 |
|
All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect… | httpie | 2019-08-23T17:15:00Z | 2019-09-02T18:15:00Z |
| pysec-2019-140 |
|
Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN rand… | werkzeug | 2019-08-09T15:15:00Z | 2019-09-11T00:15:00Z |
| pysec-2019-133 |
|
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired s… | urllib3 | 2019-04-18T21:29:00Z | 2019-09-14T18:15:00Z |
| pysec-2019-126 |
|
** DISPUTED ** In Supervisor through 4.0.2, an unauthenticated user can read log files or… | supervisor | 2019-09-10T17:15:00Z | 2019-09-17T22:15:00Z |
| pysec-2019-108 |
|
** DISPUTED ** An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle … | numpy | 2019-01-16T05:29:00Z | 2019-10-01T00:15:00Z |
| pysec-2019-41 |
|
psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of r… | psutil | 2019-11-12T02:15:00Z | 2019-11-18T21:15:00Z |
| pysec-2019-116 |
|
Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper … | rediswrapper | 2019-10-05T23:15:00Z | 2019-12-09T19:06:00Z |
| pysec-2017-50 |
|
Lemur 0.1.4 does not use sufficient entropy in its IV when encrypting AES in CBC mode. | lemur | 2017-08-09T16:29:00Z | 2019-12-11T21:22:00Z |
| pysec-2019-105 |
|
The modoboa-dmarc plugin 1.1.0 for Modoboa is vulnerable to an XML External Entity Inject… | modoboa-dmarc | 2019-12-10T20:15:00Z | 2019-12-19T15:11:00Z |
| pysec-2019-173 |
|
In Apache Incubator Superset before 0.32, a user can view database names that he has no a… | apache-superset | 2019-12-16T22:15:00Z | 2019-12-19T18:24:00Z |
| pysec-2019-29 |
|
OpenStack Keystone 15.0.0 and 16.0.0 is affected by Data Leakage in the list credentials … | keystone | 2019-12-09T18:15:00Z | 2019-12-20T00:15:00Z |
| pysec-2019-112 |
|
In Archery before 1.3, inserting an XSS payload into a project name (either by creating a… | pyarchery | 2019-12-26T23:15:00Z | 2020-01-02T14:27:00Z |
| pysec-2019-16 |
|
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A … | django | 2019-12-18T19:15:00Z | 2020-01-08T04:15:00Z |
| pysec-2019-125 |
|
Valve Steam Client before 2019-09-12 allows placing or appending partially controlled fil… | steam | 2019-10-04T20:15:00Z | 2020-01-16T13:15:00Z |
| pysec-2020-162 |
|
In Apache Airflow before 1.10.5 when running with the "classic" UI, a malicious admin use… | apache-airflow | 2020-01-14T17:15:00Z | 2020-01-21T16:21:00Z |
| pysec-2020-146 |
|
TUF (aka The Update Framework) 0.7.2 through 0.12.1 allows Uncontrolled Resource Consumption. | tuf | 2020-01-14T19:15:00Z | 2020-01-21T19:55:00Z |
| pysec-2020-85 |
|
An open redirect on the login form (and possibly other places) in Plone 4.0 through 5.2.1… | plone | 2020-01-23T21:15:00Z | 2020-01-24T21:32:00Z |
| pysec-2020-90 |
|
A privilege escalation issue in plone.app.contenttypes in Plone 4.3 through 5.2.1 allows … | plone | 2020-01-23T21:15:00Z | 2020-01-24T22:44:00Z |
| pysec-2020-89 |
|
Missing password strength checks on some forms in Plone 4.3 through 5.2.0 allow users to … | plone | 2020-01-23T21:15:00Z | 2020-01-24T22:52:00Z |
| pysec-2020-88 |
|
SQL Injection in DTML or in connection objects in Plone 4.0 through 5.2.1 allows users to… | plone | 2020-01-23T21:15:00Z | 2020-01-24T23:00:00Z |
| pysec-2020-87 |
|
plone.restapi in Plone 5.2.0 through 5.2.1 allows users with a certain privilege level to… | plone | 2020-01-23T21:15:00Z | 2020-01-24T23:03:00Z |
| pysec-2020-86 |
|
An XSS issue in the title field in Plone 5.0 through 5.2.1 allows users with a certain pr… | plone | 2020-01-23T21:15:00Z | 2020-01-24T23:07:00Z |
| pysec-2020-94 |
|
PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped an… | pysaml2 | 2020-01-13T19:15:00Z | 2020-01-27T18:15:00Z |
| pysec-2020-178 |
|
Waitress through version 1.3.1 allows request smuggling by sending the Content-Length hea… | waitress | 2020-01-22T19:15:00Z | 2020-01-30T17:07:00Z |
| pysec-2020-81 |
|
libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, rela… | pillow | 2020-01-03T01:15:00Z | 2020-01-31T04:15:00Z |
| pysec-2020-156 |
|
flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is… | webargs | 2020-01-29T15:15:00Z | 2020-02-03T16:36:00Z |
| pysec-2019-22 |
|
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4… | freeipa | 2019-11-27T08:15:00Z | 2020-02-05T00:15:00Z |
| pysec-2019-28 |
|
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4… | ipa | 2019-11-27T09:15:00Z | 2020-02-05T00:15:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2012-6497 | Ruby on Rails contains a flaw in the Authlogic gem. The issue is triggered when the progr… | 2012-12-21T00:00:00.000Z |
| gsd-2012-6496 | Due to the way dynamic finders in Active Record extract options from method parameters, a… | 2012-12-22T00:00:00.000Z |
| gsd-2013-0183 | multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attac… | 2013-01-07T00:00:00.000Z |
| gsd-2013-0155 | Ruby on Rails 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not … | 2013-01-08T00:00:00.000Z |
| gsd-2013-0156 | active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before … | 2013-01-08T00:00:00.000Z |
| gsd-2013-1802 | extlib Gem for Ruby contains a flaw that is triggered when a type casting error occurs du… | 2013-01-08T00:00:00.000Z |
| gsd-2013-1800 | The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string value… | 2013-01-09T00:00:00.000Z |
| gsd-2013-0285 | The Ruby Gem nori has a parameter parsing error that may allow an attacker to execute arb… | 2013-01-10T00:00:00.000Z |
| gsd-2013-0175 | The multi_xml Gem for Ruby contains a flaw that is triggered when an error occurs during … | 2013-01-11T00:00:00.000Z |
| gsd-2013-0184 | Unspecified vulnerability in Rack::Auth::AbstractRequest in Rack 1.1.x before 1.1.5, 1.2.… | 2013-01-13T00:00:00.000Z |
| gsd-2013-1801 | httparty Gem for Ruby contains a flaw that is triggered when a type casting error occurs … | 2013-01-14T00:00:00.000Z |
| gsd-2013-0233 | Devise contains a flaw that is triggered during when a type conversion error occurs durin… | 2013-01-28T00:00:00.000Z |
| gsd-2013-0333 | lib/active_support/json/backends/yaml.rb in Ruby on Rails 2.3.x before 2.3.16 and 3.0.x b… | 2013-01-28T00:00:00.000Z |
| gsd-2013-0256 | darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, … | 2013-02-06T00:00:00.000Z |
| gsd-2013-0262 | rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attack… | 2013-02-07T00:00:00.000Z |
| gsd-2013-0263 | Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10… | 2013-02-07T00:00:00.000Z |
| gsd-2013-0276 | ActiveRecord in Ruby on Rails before 2.3.17, 3.1.x before 3.1.11, and 3.2.x before 3.2.12… | 2013-02-11T00:00:00.000Z |
| gsd-2013-0277 | ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers … | 2013-02-11T00:00:00.000Z |
| gsd-2013-0269 | The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows rem… | 2013-02-12T00:00:00.000Z |
| gsd-2013-1756 | Dragonfly Gem for Ruby contains a flaw that is triggered during the parsing of a speciall… | 2013-02-19T00:00:00.000Z |
| gsd-2013-0162 | The diff_pp function in lib/gauntlet_rubyparser.rb in the ruby_parser gem 3.1.1 and earli… | 2013-02-21T00:00:00.000Z |
| gsd-2013-1607 | PDFKit Gem for Ruby contains a flaw that is due to the program failing to properly valida… | 2013-02-21T00:00:00.000Z |
| gsd-2013-1656 | Spree Commerce 1.0.x through 1.3.2 allows remote authenticated administrators to instanti… | 2013-02-21T00:00:00.000Z |
| gsd-2013-2506 | Spree contains a flaw that leads to unauthorized privileges being gained. The issue is tr… | 2013-02-21T00:00:00.000Z |
| gsd-2013-2512 | ftpd Gem for Ruby contains a flaw that is triggered when handling a specially crafted opt… | 2013-02-28T00:00:00.000Z |
| gsd-2013-2516 | fileutils Gem for Ruby contains a flaw in file_utils.rb. The issue is triggered when hand… | 2013-02-28T00:00:00.000Z |
| gsd-2013-2513 | flash_tool Gem for Ruby contains a flaw that is triggered during the handling of download… | 2013-03-04T00:00:00.000Z |
| gsd-2013-2616 | MiniMagick Gem for Ruby contains a flaw that is triggered during the handling of speciall… | 2013-03-12T00:00:00.000Z |
| gsd-2013-2617 | lib/curl.rb in the Curl Gem for Ruby allows remote attackers to execute arbitrary command… | 2013-03-12T00:00:00.000Z |
| gsd-2013-2615 | fastreader Gem for Ruby contains a flaw that is triggered during the handling of speciall… | 2013-03-13T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-231 | Malicious code in @epc-apps/api-generic-plan (npm) | 2022-05-16T07:13:13Z | 2022-05-16T07:13:14Z |
| mal-2022-238 | Malicious code in @epc-infra/clinstestpackage (npm) | 2022-05-16T07:13:13Z | 2022-05-16T07:13:14Z |
| mal-2022-239 | Malicious code in @epc-infra/dns-stack (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-240 | Malicious code in @epc-infra/dynamo-stack (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-241 | Malicious code in @epc-infra/region-only-policy (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-242 | Malicious code in @epc-infra/stack-config (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-244 | Malicious code in @epc-libraries/cdk-custom-resources (npm) | 2022-05-16T07:13:33Z | 2022-05-16T07:13:33Z |
| mal-2022-233 | Malicious code in @epc-apps/api-management-plan (npm) | 2022-05-16T07:13:34Z | 2022-05-16T07:13:35Z |
| mal-2022-245 | Malicious code in @epc-libraries/data-api-versions (npm) | 2022-05-16T07:14:57Z | 2022-05-16T07:14:57Z |
| mal-2022-237 | Malicious code in @epc-infra/aurora-stack (npm) | 2022-05-16T07:15:02Z | 2022-05-16T07:15:02Z |
| mal-2022-246 | Malicious code in @epc-libraries/driver-outage-db (npm) | 2022-05-16T07:15:02Z | 2022-05-16T07:15:02Z |
| mal-2022-1929 | Malicious code in clinstestpackage (npm) | 2022-05-16T07:17:21Z | 2022-05-16T07:17:28Z |
| mal-2022-247 | Malicious code in @epc-libraries/kinesis-service (npm) | 2022-05-16T07:19:35Z | 2022-05-16T07:19:35Z |
| mal-2022-248 | Malicious code in @epc-libraries/utils (npm) | 2022-05-16T07:19:45Z | 2022-05-16T07:19:45Z |
| mal-2022-236 | Malicious code in @epc-infra/app-lookup-stack (npm) | 2022-05-16T07:19:51Z | 2022-05-16T07:19:51Z |
| mal-2022-1040 | Malicious code in api-extractor-test-01 (npm) | 2022-05-16T07:27:01Z | 2022-05-16T07:27:01Z |
| mal-2022-5577 | Malicious code in rainbow-bridge-testing (npm) | 2022-05-16T07:27:01Z | 2022-05-16T07:27:02Z |
| mal-2022-4264 | Malicious code in lbc-git (npm) | 2022-05-16T07:31:48Z | 2022-05-16T07:31:49Z |
| mal-2022-1823 | Malicious code in cap-common-pages (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| mal-2022-1824 | Malicious code in cap-products (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| mal-2022-1990 | Malicious code in coldstone-helpers (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| mal-2022-1991 | Malicious code in coldstone-sls (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:40:54Z |
| mal-2022-1645 | Malicious code in bolt-styles (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:41:01Z |
| mal-2022-1142 | Malicious code in assets-common (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:41:02Z |
| mal-2022-4291 | Malicious code in lexical-website-new (npm) | 2022-05-16T07:40:54Z | 2022-05-16T07:41:02Z |
| mal-2022-2826 | Malicious code in eslint-plugin-seller-ui-eslint-plugin (npm) | 2022-05-17T05:53:39Z | 2022-05-17T05:53:49Z |
| mal-2022-579 | Malicious code in @seller-ui/products (npm) | 2022-05-17T05:53:38Z | 2022-05-17T05:53:49Z |
| mal-2022-580 | Malicious code in @seller-ui/settings (npm) | 2022-05-17T05:53:39Z | 2022-05-17T05:53:49Z |
| mal-2022-7036 | Malicious code in wakakaa (npm) | 2022-05-17T06:28:02Z | 2022-05-17T06:28:03Z |
| mal-2022-7278 | Malicious code in xiawaa (npm) | 2022-05-17T06:28:02Z | 2022-05-17T06:28:03Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-apache-2020-1927 | 2024-03-06T10:57:05.567Z | 2025-04-03T14:40:37.652Z | |
| bit-apache-2020-1934 | 2024-03-06T10:56:53.607Z | 2025-04-03T14:40:37.652Z | |
| bit-apache-2020-9490 | 2024-03-06T10:56:35.882Z | 2025-04-03T14:40:37.652Z | |
| bit-apisix-2020-13945 | 2024-03-06T10:51:26.305Z | 2025-04-03T14:40:37.652Z | |
| bit-appsmith-2022-38298 | 2024-03-06T10:51:15.688Z | 2025-04-03T14:40:37.652Z | |
| bit-appsmith-2022-38299 | 2024-03-06T10:51:02.508Z | 2025-04-03T14:40:37.652Z | |
| bit-appsmith-2022-39824 | 2024-03-06T10:50:47.399Z | 2025-04-03T14:40:37.652Z | |
| bit-appsmith-2024-51408 | 2024-11-07T07:07:47.085Z | 2025-04-03T14:40:37.652Z | |
| bit-appsmith-2024-55963 | 2025-04-02T07:06:56.893Z | 2025-04-03T14:40:37.652Z | |
| bit-appsmith-2024-55964 | 2025-04-02T07:06:54.525Z | 2025-04-03T14:40:37.652Z | |
| bit-cassandra-2020-13946 | 2024-03-06T10:51:19.779Z | 2025-04-03T14:40:37.652Z | |
| bit-cassandra-2020-17516 | 2024-03-06T10:51:09.067Z | 2025-04-03T14:40:37.652Z | |
| bit-clickhouse-2020-26759 | 2024-03-06T10:50:51.666Z | 2025-04-03T14:40:37.652Z | |
| bit-concourse-2022-31683 | 2024-03-06T10:50:52.308Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2020-12758 | 2024-03-06T10:55:15.268Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2020-12797 | 2024-03-06T10:55:03.903Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2020-13170 | 2024-03-06T10:54:54.162Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2020-13250 | 2024-03-06T10:54:43.689Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2020-25864 | 2024-03-06T10:54:23.598Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2020-28053 | 2024-03-06T10:54:15.090Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2020-7219 | 2024-03-06T10:54:04.970Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2020-7955 | 2024-03-06T10:53:55.191Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-28156 | 2024-03-06T10:53:45.007Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-3121 | 2024-03-06T10:53:33.669Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-32574 | 2024-03-06T10:53:21.700Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-36213 | 2024-03-06T10:53:11.575Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-37219 | 2024-03-06T10:53:02.967Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-38698 | 2024-03-06T10:52:52.988Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-41803 | 2024-03-06T10:52:42.202Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-41805 | 2024-03-06T10:52:33.477Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-fn12833 | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security) | 2026-01-30T16:25:25.422564Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fn26367 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:10:23.074072Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fr00621 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T14:36:52.496829Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fr57243 | Cancelling a query (e | 2026-01-30T14:52:52.746706Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fs64938 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:24:53.185811Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fz95989 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:40:52.734894Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gc16599 | Cancelling a query (e | 2026-01-30T15:46:54.243517Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gj12884 | Within HostnameError | 2026-01-30T16:31:25.827659Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gq48460 | Cancelling a query (e | 2026-01-30T16:26:55.253385Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gs30434 | Within HostnameError | 2026-01-30T14:35:22.588418Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hf39630 | potential heap based buffer overflow was found in _bfd_elf_slurp_version_tables() in bfd/elf | 2026-01-30T17:20:56.632450Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hg66170 | Cancelling a query (e | 2026-01-30T15:35:23.809128Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hj04971 | vulnerability was found in PostgreSQL with the use of the MERGE command, which fails to test new rows against row security policies defined for UPDATE and SELECT | 2026-01-30T17:21:56.808972Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hj34439 | Go before 1 | 2026-01-30T16:39:55.415446Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hl71566 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:50:56.129322Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ht23337 | flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm | 2026-01-30T17:15:56.746125Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hv28992 | Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3 | 2026-01-30T15:55:24.450018Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hy43775 | Within HostnameError | 2026-01-30T14:46:52.607713Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ia26094 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:51:22.634752Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ib05679 | Within HostnameError | 2026-01-30T15:06:23.436295Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ib84500 | security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion | 2026-01-30T16:29:55.343868Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-il25782 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:09:53.055759Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-iy17697 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:37:55.497960Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jm36781 | Within HostnameError | 2026-01-30T14:37:22.513933Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jr48309 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:11:25.334563Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jx43631 | Within HostnameError | 2026-01-30T15:06:23.337190Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kc06686 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:10:53.141957Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kd20596 | Cancelling a query (e | 2026-01-30T16:28:55.316811Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kf66928 | Within HostnameError | 2026-01-30T14:53:23.030035Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kg18353 | Within HostnameError | 2026-01-30T14:02:50.542288Z | 2026-01-29T18:58:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2022-059 | 2022-10-19T20:28:24.000Z | 2023-08-10T18:22:23.000Z | |
| drupal-contrib-2022-060 | 2022-11-30T15:20:10.000Z | 2023-08-10T18:23:08.000Z | |
| drupal-contrib-2022-062 | 2022-11-30T15:34:03.000Z | 2023-08-10T18:25:13.000Z | |
| drupal-contrib-2022-061 | 2022-11-30T15:28:44.000Z | 2023-08-10T18:25:19.000Z | |
| drupal-contrib-2022-050 | 2022-07-27T17:03:38.000Z | 2023-08-10T19:24:22.000Z | |
| drupal-contrib-2022-051 | 2022-07-27T17:07:39.000Z | 2023-08-10T19:25:28.000Z | |
| drupal-contrib-2022-052 | 2022-08-10T15:09:36.000Z | 2023-08-10T19:25:47.000Z | |
| drupal-contrib-2022-053 | 2022-08-24T18:21:02.000Z | 2023-08-10T19:26:24.000Z | |
| drupal-contrib-2022-054 | 2022-09-07T16:57:28.000Z | 2023-08-10T19:26:43.000Z | |
| drupal-contrib-2022-055 | 2022-09-07T17:04:31.000Z | 2023-08-10T19:27:28.000Z | |
| drupal-contrib-2022-056 | 2022-09-07T17:06:06.000Z | 2023-08-10T19:28:12.000Z | |
| drupal-contrib-2022-058 | 2022-10-12T19:41:07.000Z | 2023-08-10T19:30:04.000Z | |
| drupal-contrib-2022-038 | 2022-05-04T16:26:47.000Z | 2023-08-10T21:00:44.000Z | |
| drupal-contrib-2022-042 | 2022-05-25T16:45:17.000Z | 2023-08-10T21:02:21.000Z | |
| drupal-contrib-2022-040 | 2022-05-18T17:13:43.000Z | 2023-08-10T21:05:48.000Z | |
| drupal-contrib-2022-043 | 2022-05-25T16:49:46.000Z | 2023-08-10T21:32:49.000Z | |
| drupal-contrib-2022-044 | 2022-05-25T16:53:45.000Z | 2023-08-10T21:33:53.000Z | |
| drupal-contrib-2022-045 | 2022-05-25T17:03:55.000Z | 2023-08-10T21:35:00.000Z | |
| drupal-contrib-2022-046 | 2022-06-29T16:51:17.000Z | 2023-08-10T21:35:30.000Z | |
| drupal-contrib-2022-047 | 2022-06-29T17:25:39.000Z | 2023-08-10T21:35:49.000Z | |
| drupal-contrib-2022-048 | 2022-07-13T15:44:42.000Z | 2023-08-10T21:36:29.000Z | |
| drupal-contrib-2022-027 | 2022-02-23T17:18:07.000Z | 2023-08-10T21:37:54.000Z | |
| drupal-contrib-2022-028 | 2022-03-09T18:28:39.000Z | 2023-08-10T21:39:01.000Z | |
| drupal-contrib-2022-029 | 2022-03-09T18:57:52.000Z | 2023-08-10T21:39:44.000Z | |
| drupal-contrib-2022-032 | 2022-03-30T18:23:29.000Z | 2023-08-10T21:41:21.000Z | |
| drupal-contrib-2022-035 | 2022-05-04T16:06:53.000Z | 2023-08-10T21:43:30.000Z | |
| drupal-contrib-2022-036 | 2022-05-04T16:11:07.000Z | 2023-08-10T21:43:53.000Z | |
| drupal-contrib-2022-018 | 2022-01-25T18:39:50.000Z | 2023-08-11T13:46:46.000Z | |
| drupal-contrib-2022-021 | 2022-01-25T18:41:04.000Z | 2023-08-11T13:47:07.000Z | |
| drupal-contrib-2022-014 | 2022-01-26T17:18:11.000Z | 2023-08-11T13:48:18.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2005-000343 | DeleGate DNS Message Decompression Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000396 | Ruby XMLRPC Arbitrary Command Execution Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000530 | Vulnerability in multiple web browsers allowing request spoofing attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000537 | Webmin and Usermin authentication bypass vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000538 | Ruby vulnerability allowing to bypass safe level 4 as a sandbox | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000695 | Ruby XMLRPC Server Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000705 | Fujitsu Java Runtime Environment reflection API vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000706 | Fujitsu Java Runtime Environment reflection API vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000707 | Fujitsu Java Runtime Environment reflection API vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000756 | Tsuru-Kame Mail vulnerable in S/MIME signature verification | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000757 | Cybozu Office browser script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000758 | msearch directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000759 | McAfee VirusScan Engine buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000760 | McAfee VirusScan Engine buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000761 | Norton AntiVirus causes abnormal OS termination when a user edits a shared network file | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000762 | Norton AntiVirus causes abnormal OS termination when scanning illegal files | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000763 | ppBlog cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000764 | Website connection problem when a mobile phone terminal uses specific QR code | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000765 | Buffalo router configuration management interface vulnerable to remote access and password leakage | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000766 | w3ml cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000767 | WebUD arbitrary program execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000768 | Movable Type session management vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000769 | Virus Security heap overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000770 | Virus Security memory leak vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000771 | Wiki clone cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000772 | Inappropriate interpretation of mailto URL scheme by mail client software | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000773 | desknet's cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000774 | SFS cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000776 | Java Cryptography Extension 1.2.1 (JCE 1.2.1) will no longer function properly after July 28, 2005 due to the expiration of its digital certificate | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2005-000777 | tDiary cross-site request forgery vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|---|---|
| ts-2025-004 | TS-2025-004 | 2025-05-27T00:00 |
| ts-2025-005 | TS-2025-005 | 2025-08-07T00:00 |
| ts-2025-006 | TS-2025-006 | 2025-10-28T00:00 |
| ts-2025-007 | TS-2025-007 | 2025-11-07T00:00 |
| ts-2025-008 | TS-2025-008 | 2025-11-19T00:00 |
| ts-2026-001 | TS-2026-001 | 2026-01-15T00:00 |
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2014-09208 | Ettercap堆缓冲区溢出漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09209 | IBM WebSphere Portal XML注入漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09210 | IBM Business Process Manager跨站脚本漏洞(CNVD-2014-09210) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09211 | IBM WebSphere Portal跨站脚本漏洞(CNVD-2014-09211) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09212 | IBM WebSphere Portal跨站脚本漏洞(CNVD-2014-09212) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09213 | IBM Rational Quality Manager跨站脚本漏洞(CNVD-2014-09213) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09214 | WordPress插件SPNbabble存在多个跨站请求伪造漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09215 | WordPress插件O2Tweet存在多个跨站请求伪造漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09216 | WordPress插件Mikiurl Wordpress Eklentisi存在多个跨站请求伪造漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09217 | WordPress插件DandyID Services存在多个跨站请求伪造漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09218 | Ricksoft WBS Gantt-Chart add-on跨站脚本漏洞(CNVD-2014-09218) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09219 | Ricksoft WBS Gantt-Chart add-on跨站脚本漏洞(CNVD-2014-09219) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09220 | TSUTAYA application任意命令执行漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09221 | IBM DB2拒绝服务漏洞(CNVD-2014-09221) | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09222 | OTRS Help Desk安全机制绕过漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09223 | Info-ZIP UnZip远程堆缓冲区溢出漏洞 | 2014-12-29 | 2014-12-30 |
| cnvd-2014-09224 | Huawei USG9560/9520/9580 Main Processing Unit (MPU)内存泄露漏洞 | 2014-12-29 | 2014-12-30 |
| cnvd-2014-09225 | Huawei WS318预测随机数发生器漏洞 | 2014-12-29 | 2014-12-30 |
| cnvd-2014-09226 | Huawei Tecal E9000 Chassis IPMICommand处理权限提升漏洞 | 2014-12-29 | 2014-12-30 |
| cnvd-2014-09227 | Huawei Tecal RH Series存在多个漏洞 | 2014-12-28 | 2014-12-30 |
| cnvd-2014-09228 | WordPress WP Symposium插件'tray' SQL注入漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09229 | WordPress WP Symposium插件存在多个跨站脚本漏洞 | 2014-12-26 | 2014-12-30 |
| cnvd-2014-09230 | Linux Kernel本地信息泄露漏洞(CNVD-2014-09230) | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09231 | libsndfile 'file_io.c' Divide-By-Zero拒绝服务漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09232 | libsndfile 'src/sd2.c'存在多个缓冲区溢出漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09233 | OpenStack Neutron存在多个安全绕过漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09234 | Koha存在多个跨站脚本漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09235 | elfutils '/libelf/elf_begin.c'目录遍历漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09236 | PHP Double Free拒绝服务漏洞 | 2014-12-30 | 2014-12-31 |
| cnvd-2014-09237 | IDA Pro存在多个漏洞(CNVD-2014-09237) | 2014-12-28 | 2014-12-31 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2014-00038 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику вызвать «отказ в об… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00041 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику вызвать «отказ в об… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00042 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику вызвать «отказ в об… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00045 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику вызвать «отказ в об… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00046 | Уязвимость операционной системы Zyxel ZLD, позволяющая злоумышленнику вызвать отказ в обс… | 07.07.2016 | 28.11.2016 |
| bdu:2014-00049 | Уязвимость операционной системы Zyxel ZLD, позволяющая удаленному злоумышленнику вызвать … | 07.07.2016 | 28.11.2016 |
| bdu:2014-00050 | Уязвимость операционной системы Zyxel ZLD, позволяющая удаленному злоумышленнику повысить… | 07.07.2016 | 28.11.2016 |
| bdu:2014-00051 | Уязвимость операционной системы Zyxel ZLD, позволяющая удаленному злоумышленнику выполнит… | 07.07.2016 | 28.11.2016 |
| bdu:2014-00052 | Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к защищ… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00053 | Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к защищ… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00054 | Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслужи… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00055 | Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслужи… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00056 | Уязвимость ОС Windows, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00057 | Уязвимость операционной системы Windows, позволяющая злоумышленнику повысить свои привилегии | 05.07.2016 | 28.11.2016 |
| bdu:2014-00058 | Уязвимость операционной системы Windows, позволяющая злоумышленнику вызвать отказ в обслу… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00060 | Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00061 | Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00064 | Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00065 | Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии | 05.07.2016 | 28.11.2016 |
| bdu:2014-00066 | Уязвимость системы управления базами данных MySQL, позволяющая злоумышленнику вызвать отк… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00067 | Уязвимость операционной системы Windows, позволяющая повысить уровень привилегий | 05.07.2016 | 28.11.2016 |
| bdu:2014-00068 | Уязвимость системы управления базами данных MySQL, позволяющая злоумышленнику вызвать отк… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00069 | Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к конфи… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00070 | Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к стати… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00071 | Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к конфи… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00072 | Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к конфи… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00073 | Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к конфи… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00074 | Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к конфи… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00075 | Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к конфи… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00076 | Уязвимость операционной системы Linux, позволяющая злоумышленнику получить доступ к конфи… | 05.07.2016 | 28.11.2016 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2000-avi-031 | Faille dans la commande newgrp sous HP-UX | 2000-08-17T00:00:00.000000 | 2000-08-17T00:00:00.000000 |
| certa-2000-avi-032 | Vulnérabilité dans la machine virtuelle Java de Microsoft | 2000-08-22T00:00:00.000000 | 2000-08-22T00:00:00.000000 |
| certa-2000-avi-033 | Vulnérabilité dans GNOME Updater | 2000-08-22T00:00:00.000000 | 2000-08-22T00:00:00.000000 |
| certa-2000-avi-034 | Faille dans le serveur Internet Java de SUN | 2000-08-23T00:00:00.000000 | 2000-08-23T00:00:00.000000 |
| certa-2000-avi-035 | Vulnérabilité dans Microsoft Information Server | 2000-08-28T00:00:00.000000 | 2000-08-28T00:00:00.000000 |
| certa-2000-avi-036 | Cheval de Troie : Troj/qaz | 2000-08-29T00:00:00.000000 | 2000-08-29T00:00:00.000000 |
| certa-2000-avi-037 | Vulnérabilité sous Windows 2000 dans la politique de sécurité locale | 2000-08-29T00:00:00.000000 | 2000-08-29T00:00:00.000000 |
| certa-2000-avi-038 | Vulnérabilité sous ISS REAL SECURE | 2000-08-30T00:00:00.000000 | 2000-08-30T00:00:00.000000 |
| certa-2000-avi-039 | vulnérabilités de RPC.statd sous Unix | 2000-08-30T00:00:00.000000 | 2000-08-30T00:00:00.000000 |
| certa-2000-avi-040 | Vulnérabilité sous PGP 5.5.x à 6.5.3 | 2000-08-31T00:00:00.000000 | 2000-08-31T00:00:00.000000 |
| certa-2000-avi-041 | Ver sous Windows : W32/Apology | 2000-08-31T00:00:00.000000 | 2000-08-31T00:00:00.000000 |
| certa-2000-avi-042 | Vulnérabilité dans les extensions de fichiers sous Windows | 2000-09-04T00:00:00.000000 | 2000-09-04T00:00:00.000000 |
| certa-2000-avi-043 | Vulnérabilité dans mgetty sous Unix | 2000-09-04T00:00:00.000000 | 2000-09-04T00:00:00.000000 |
| certa-2000-avi-044 | Vulnérabilité de Windows NT4.0 affectant Internet Information Server | 2000-09-07T00:00:00.000000 | 2000-09-07T00:00:00.000000 |
| certa-2000-avi-045 | Note concernant les correctifs ou mises à jour | 2000-09-07T00:00:00.000000 | 2000-09-07T00:00:00.000000 |
| certa-2000-avi-046 | vulnérabilité du service imagerie sous Windows 2000 | 2000-09-11T00:00:00.000000 | 2000-09-11T00:00:00.000000 |
| certa-2000-avi-047 | Vulnérabilité de RPC sous Windows2000 | 2000-09-12T00:00:00.000000 | 2000-09-12T00:00:00.000000 |
| certa-2000-avi-048 | Vulnérabilité du client telnet sous Windows 2000 | 2000-09-15T00:00:00.000000 | 2000-09-15T00:00:00.000000 |
| certa-2000-avi-049 | Virus FunnyStory | 2000-09-19T00:00:00.000000 | 2000-09-19T00:00:00.000000 |
| certa-2000-avi-050 | Vulnérabilité dans le démon klogd sous Linux | 2000-09-20T00:00:00.000000 | 2000-09-20T00:00:00.000000 |
| certa-2000-avi-051 | Vulnérabilités dans CISCOSecure sous Windows NT Server | 2000-09-22T00:00:00.000000 | 2000-09-22T00:00:00.000000 |
| certa-2000-avi-052 | Vulnérabilité sous Windows liée à l'ouverture d'un Document Office | 2000-09-25T00:00:00.000000 | 2000-09-25T00:00:00.000000 |
| certa-2000-avi-053 | Vulnérabilité dans HP OpenView | 2000-09-28T00:00:00.000000 | 2000-09-28T00:00:00.000000 |
| certa-2000-avi-054 | Vulnérabilité dans le garde barrière PIX de CISCO | 2000-09-29T00:00:00.000000 | 2000-09-29T00:00:00.000000 |
| certa-2000-avi-055 | Vulnérabilités des LPC sous Windows 2000 et NT | 2000-10-04T00:00:00.000000 | 2000-10-04T00:00:00.000000 |
| certa-2000-avi-056 | Vulnérabilité dans la fonction de « fusion-publipostage » sous Word 97 et 2000 | 2000-10-09T00:00:00.000000 | 2000-10-09T00:00:00.000000 |
| certa-2000-avi-057 | Vulnérabilité dans les protections de fichiers sous Windows 9x et Me | 2000-10-11T00:00:00.000000 | 2000-10-11T00:00:00.000000 |
| certa-2000-avi-058 | Vulnérabilité dans IPX/SPX de Microsoft sous Windows 9x/ME | 2000-10-12T00:00:00.000000 | 2000-10-12T00:00:00.000000 |
| certa-2000-avi-059 | Vulnérabilité dans la machine virtuelle Java de Microsoft | 2000-10-13T00:00:00.000000 | 2000-10-13T00:00:00.000000 |
| certa-2000-avi-060 | Vulnérabilité dans le cache d'authentification d'Internet Explorer | 2000-10-13T00:00:00.000000 | 2000-10-13T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2001-ale-016 | Propagation du ver badtrans - variante B | 2001-11-27T00:00:00.000000 | 2001-11-27T00:00:00.000000 |
| certa-2001-ale-012 | Rappels concernant les virus | 2001-09-13T00:00:00.000000 | 2002-01-09T00:00:00.000000 |
| certa-2002-ale-001 | Exploitation massive d'une faille de CDE | 2002-01-24T00:00:00.000000 | 2002-01-24T00:00:00.000000 |
| certa-2002-ale-002 | Exploitation d'une faille de wu-ftpd | 2002-01-28T00:00:00.000000 | 2002-01-28T00:00:00.000000 |
| certa-2002-ale-003 | Propagation importante du virus « W32.Myparty@mm » | 2002-01-29T00:00:00.000000 | 2002-01-29T00:00:00.000000 |
| certa-2002-ale-004 | Multiples implémentations de SNMP V1 vulnérables | 2002-02-13T00:00:00.000000 | 2002-02-13T00:00:00.000000 |
| certa-2002-ale-005 | Risque de compromission des auto-commutateurs (PABX) ALCATEL 4400 | 2002-02-20T00:00:00.000000 | 2002-02-20T00:00:00.000000 |
| certa-2002-ale-006 | Propagation du ver Spida (Microsoft SQL Server) | 2002-05-22T00:00:00.000000 | 2002-06-04T00:00:00.000000 |
| certa-2002-ale-007 | Cédérom Pages Pro | 2002-09-04T00:00:00.000000 | 2002-09-04T00:00:00.000000 |
| certa-2003-ale-001 | Vulnérabilité dans l'implémentation des logiciels de lecture des documents PDF | 2003-06-23T00:00:00.000000 | 2003-07-04T00:00:00.000000 |
| certa-2003-ale-002 | Exploitation d'une faille de Windows RPC | 2003-08-01T00:00:00.000000 | 2003-08-19T00:00:00.000000 |
| certa-2003-ale-003 | Exploitation massive de la vulnérabilité « include PHP » | 2003-09-09T00:00:00.000000 | 2003-09-09T00:00:00.000000 |
| certa-2003-ale-005 | Vulnérabilité de sadmind sur Solaris | 2003-09-19T00:00:00.000000 | 2003-09-19T00:00:00.000000 |
| certa-2003-ale-004 | Vulnérabilité d'Internet Explorer | 2003-09-10T00:00:00.000000 | 2003-10-06T00:00:00.000000 |
| certa-2004-ale-001 | Obstacles à la résolution d'incidents | 2004-01-30T00:00:00.000000 | 2004-01-30T00:00:00.000000 |
| certa-2003-ale-006 | Vulnérabilité dans l'affichage des adresses réticulaires | 2003-12-19T00:00:00.000000 | 2004-02-03T00:00:00.000000 |
| certa-2004-ale-002 | Propagation du virux Bizex | 2004-02-26T00:00:00.000000 | 2004-02-26T00:00:00.000000 |
| certa-2004-ale-003 | Propagation du ver Phatbot | 2004-03-19T00:00:00.000000 | 2004-03-19T00:00:00.000000 |
| certa-2004-ale-005 | Vulnérabilité d'Internet Explorer | 2004-04-09T00:00:00.000000 | 2004-04-15T00:00:00.000000 |
| certa-2004-ale-006 | Vulnérabilité SMB sous Windows | 2004-04-28T00:00:00.000000 | 2004-04-28T00:00:00.000000 |
| certa-2004-ale-007 | Exploitation de la vulnérabilité LSASS sous Windows : appration du ver Sasser | 2004-05-02T00:00:00.000000 | 2004-05-02T00:00:00.000000 |
| certa-2004-ale-008 | Vulnérabilité de Safari | 2004-05-19T00:00:00.000000 | 2004-05-24T00:00:00.000000 |
| certa-2004-ale-009 | Vulnérabilités d'Internet Explorer | 2004-06-09T00:00:00.000000 | 2004-08-03T00:00:00.000000 |
| certa-2004-ale-004 | Vulnérabilité du composant dtlogin de CDE | 2004-03-26T00:00:00.000000 | 2004-08-05T00:00:00.000000 |
| certa-2004-ale-010 | Vulnérabilité du service Telnet de Cisco IOS | 2004-08-30T00:00:00.000000 | 2004-08-30T00:00:00.000000 |
| certa-2004-ale-011 | Diffusion de programmes exploitant la faille GDI+ | 2004-09-23T00:00:00.000000 | 2004-09-23T00:00:00.000000 |
| certa-2004-ale-012 | Vulnérabilité d'Internet Explorer | 2004-11-09T00:00:00.000000 | 2004-12-02T00:00:00.000000 |
| certa-2004-ale-013 | Vulnérabilité dans le composant ActiveX DHTML Edit d'Internet Explorer | 2004-12-20T00:00:00.000000 | 2004-12-20T00:00:00.000000 |
| certa-2004-ale-014 | Exploitation massive d'une faille du forum phpBB | 2004-12-22T00:00:00.000000 | 2004-12-22T00:00:00.000000 |
| certa-2005-ale-001 | Vulnérabilité d'Internet Explorer | 2005-01-03T00:00:00.000000 | 2005-01-11T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2021-205 | Heap-use-after-free in lua_closeslot | 2021-01-16T00:01:03.500860Z | 2022-04-13T03:04:30.724783Z |
| osv-2020-1349 | Heap-buffer-overflow in mu::ParserBase::ParseCmdCodeBulk | 2020-07-22T21:50:08.481816Z | 2022-04-13T03:04:30.730045Z |
| osv-2020-1156 | Heap-buffer-overflow in mu::Parser::Sum | 2020-07-22T21:49:51.826984Z | 2022-04-13T03:04:30.735555Z |
| osv-2020-1330 | Heap-buffer-overflow in mu::ParserBase::ParseCmdCodeBulk | 2020-07-22T21:50:07.104906Z | 2022-04-13T03:04:30.741147Z |
| osv-2020-1009 | Heap-buffer-overflow in mu::ParserBase::ParseCmdCodeBulk | 2020-07-22T21:49:39.777520Z | 2022-04-13T03:04:30.746791Z |
| osv-2020-1093 | Heap-buffer-overflow in mu::ParserBase::ParseCmdCodeBulk | 2020-07-22T21:49:46.567121Z | 2022-04-13T03:04:30.752284Z |
| osv-2021-32 | Heap-use-after-free in igraph_vector_ptr_size | 2021-01-09T00:00:09.974433Z | 2022-04-13T03:04:30.757714Z |
| osv-2021-25 | Heap-use-after-free in igraph_read_graph_gml | 2021-01-08T00:00:01.980323Z | 2022-04-13T03:04:30.762899Z |
| osv-2021-947 | Dynamic-stack-buffer-overflow in hsql::SQLParserResult::addStatement | 2021-07-10T00:01:12.069383Z | 2022-04-13T03:04:30.768366Z |
| osv-2021-950 | Dynamic-stack-buffer-overflow in std::__1::__wrap_iter<hsql::Expr**>::__wrap_iter | 2021-07-10T00:01:24.552480Z | 2022-04-13T03:04:30.774343Z |
| osv-2020-391 | Use-of-uninitialized-value in mprint | 2020-07-01T00:00:06.825617Z | 2022-04-13T03:04:30.780960Z |
| osv-2016-6 | UNKNOWN READ in mprint | 2021-01-15T05:22:02.070395Z | 2022-04-13T03:04:30.786861Z |
| osv-2016-7 | Heap-buffer-overflow in mcopy | 2021-01-15T05:22:13.068Z | 2022-04-13T03:04:30.792444Z |
| osv-2017-140 | Heap-buffer-overflow in mprint | 2021-01-15T00:01:14.133316Z | 2022-04-13T03:04:30.798695Z |
| osv-2018-15 | Heap-buffer-overflow in json_parse_string | 2021-01-13T00:00:06.229450Z | 2022-04-13T03:04:30.805121Z |
| osv-2021-1322 | Heap-buffer-overflow in cdf_read_property_info | 2021-09-19T00:00:35.246398Z | 2022-04-13T03:04:30.810696Z |
| osv-2016-3 | UNKNOWN READ in file_regexec | 2021-01-15T05:20:54.558144Z | 2022-04-13T03:04:30.816004Z |
| osv-2017-52 | Use-of-uninitialized-value in mcopy | 2021-01-13T21:56:15.043847Z | 2022-04-13T03:04:30.821252Z |
| osv-2017-134 | Heap-buffer-overflow in cdf_file_property_info | 2021-01-15T00:00:24.559102Z | 2022-04-13T03:04:30.826487Z |
| osv-2020-1280 | Heap-buffer-overflow in cdf_read_property_info | 2020-07-22T21:50:02.720163Z | 2022-04-13T03:04:30.831905Z |
| osv-2021-1238 | UNKNOWN READ in cdf_read_property_info | 2021-09-12T00:00:57.129964Z | 2022-04-13T03:04:30.837467Z |
| osv-2020-190 | Use-of-uninitialized-value in file_vprintf | 2020-06-24T01:51:18.178456Z | 2022-04-13T03:04:30.848993Z |
| osv-2017-131 | Heap-buffer-overflow in mprint | 2021-01-15T00:00:17.673475Z | 2022-04-13T03:04:30.854629Z |
| osv-2016-2 | UNKNOWN READ in file_regexec | 2021-01-13T21:57:40.577225Z | 2022-04-13T03:04:30.860493Z |
| osv-2020-535 | Heap-buffer-overflow in looks_ucs32 | 2020-07-01T00:00:15.186923Z | 2022-04-13T03:04:30.865616Z |
| osv-2020-184 | Heap-buffer-overflow in file_strncmp | 2020-06-24T01:51:17.908691Z | 2022-04-13T03:04:30.870815Z |
| osv-2016-1 | UNKNOWN READ in mprint | 2021-01-13T21:56:22.388453Z | 2022-04-13T03:04:30.875874Z |
| osv-2020-75 | Index-out-of-bounds in der_tag | 2020-06-24T01:51:12.970172Z | 2022-04-13T03:04:30.881125Z |
| osv-2020-97 | Use-of-uninitialized-value in file_vprintf | 2020-06-24T01:51:13.931038Z | 2022-04-13T03:04:30.886577Z |
| osv-2020-1193 | Heap-buffer-overflow in cdf_read_property_info | 2020-07-22T21:49:55.080772Z | 2022-04-13T03:04:30.891785Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2021-0024 | crate has been renamed to `sn_api` | 2021-02-15T12:00:00Z | 2021-02-15T16:43:30Z |
| rustsec-2021-0025 | crate has been renamed to `qjsonrpc` | 2021-02-15T12:00:00Z | 2021-02-15T16:43:30Z |
| rustsec-2021-0034 | office is unmaintained, use calamine instead | 2021-02-04T12:00:00Z | 2021-03-03T18:06:07Z |
| rustsec-2020-0147 | rulinalg is unmaintained, use nalgebra instead | 2020-02-11T12:00:00Z | 2021-03-04T13:58:02Z |
| rustsec-2021-0062 | project abandoned; migrate to the `aes-siv` crate | 2021-02-28T12:00:00Z | 2021-05-03T19:05:09Z |
| rustsec-2021-0059 | `aesni` has been merged into the `aes` crate | 2021-04-29T12:00:00Z | 2021-05-04T01:28:43Z |
| rustsec-2021-0060 | `aes-soft` has been merged into the `aes` crate | 2021-04-29T12:00:00Z | 2021-05-04T01:28:43Z |
| rustsec-2021-0061 | `aes-ctr` has been merged into the `aes` crate | 2021-04-29T12:00:00Z | 2021-05-04T01:28:43Z |
| rustsec-2021-0064 | `cpuid-bool` has been renamed to `cpufeatures` | 2021-05-06T12:00:00Z | 2021-05-06T23:45:32Z |
| rustsec-2021-0096 | spirv_headers is unmaintained, use spirv instead | 2021-08-16T12:00:00Z | 2021-08-23T14:34:15Z |
| rustsec-2021-0099 | Crate has been renamed to `cosmrs` | 2021-08-25T12:00:00Z | 2021-08-25T14:54:10Z |
| rustsec-2020-0157 | Improper Synchronization and Race Condition in vm-memory | 2020-06-02T12:00:00Z | 2021-09-10T15:50:27Z |
| rustsec-2021-0102 | Permissions bypass in pleaser | 2021-05-27T12:00:00Z | 2021-09-10T15:58:05Z |
| rustsec-2021-0101 | Permissions bypass in pleaser | 2021-05-27T12:00:00Z | 2021-09-10T15:58:27Z |
| rustsec-2021-0104 | File exposure in pleaser | 2021-05-27T12:00:00Z | 2021-09-10T16:01:55Z |
| rustsec-2020-0156 | Observable Discrepancy in libsecp256k1-rs | 2020-01-22T12:00:00Z | 2021-09-10T16:03:52Z |
| rustsec-2021-0105 | Relative Path Traversal in git-delta | 2021-07-12T12:00:00Z | 2021-09-10T16:04:49Z |
| rustsec-2021-0106 | Uncontrolled Search Path Element in sharkdp/bat | 2021-07-15T12:00:00Z | 2021-09-10T16:11:09Z |
| rustsec-2021-0069 | SMTP command injection in body | 2021-05-22T12:00:00Z | 2021-10-19T19:56:47Z |
| rustsec-2019-0035 | Unaligned memory access | 2019-04-19T12:00:00Z | 2021-10-19T22:14:35Z |
| rustsec-2020-0024 | Improper uniqueness verification of signature threshold | 2020-07-09T12:00:00Z | 2021-10-19T22:14:35Z |
| rustsec-2021-0001 | XSS in mdBook's search page | 2021-01-04T12:00:00Z | 2021-10-19T22:14:35Z |
| rustsec-2021-0020 | Multiple Transfer-Encoding headers misinterprets request payload | 2021-02-05T12:00:00Z | 2021-10-19T22:14:35Z |
| rustsec-2021-0067 | Memory access due to code generation flaw in Cranelift module | 2021-05-21T12:00:00Z | 2021-10-19T22:14:35Z |
| rustsec-2021-0078 | Lenient `hyper` header parsing of `Content-Length` could allow request smuggling | 2021-07-07T12:00:00Z | 2021-10-19T22:14:35Z |
| rustsec-2021-0079 | Integer overflow in `hyper`'s parsing of the `Transfer-Encoding` header leads to data loss | 2021-07-07T12:00:00Z | 2021-10-19T22:14:35Z |
| rustsec-2021-0093 | Data race in crossbeam-deque | 2021-07-30T12:00:00Z | 2021-10-19T22:14:35Z |
| rustsec-2020-0158 | slice-deque is unmaintained | 2020-02-10T12:00:00Z | 2021-11-18T14:04:01Z |
| rustsec-2021-0127 | serde_cbor is unmaintained | 2021-08-15T12:00:00Z | 2021-12-01T14:04:55Z |
| rustsec-2021-0131 | Integer overflow in the bundled Brotli C library | 2021-12-20T12:00:00Z | 2021-12-21T20:51:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2020:1852 | Moderate: patch security and bug fix update | 2020-04-28T09:23:52Z | 2020-04-28T09:23:44Z |
| alsa-2020:1926 | Important: container-tools:1.0 security and bug fix update | 2020-04-28T16:06:48Z | 2020-04-28T16:06:37Z |
| alsa-2020:1931 | Important: container-tools:2.0 security update | 2020-04-28T16:07:22Z | 2020-04-28T16:07:11Z |
| alsa-2020:1932 | Important: container-tools:rhel8 security update | 2020-04-28T16:07:32Z | 2020-04-28T16:07:22Z |
| alsa-2020:2041 | Important: squid:4 security update | 2020-05-06T12:52:10Z | 2020-05-06T12:52:10Z |
| alsa-2020:2848 | Important: nodejs:10 security update | 2020-07-07T08:51:24Z | 2020-07-07T08:51:24Z |
| alsa-2020:2852 | Important: nodejs:12 security update | 2020-07-07T08:52:35Z | 2020-07-07T08:52:35Z |
| alsa-2020:3032 | Moderate: mod_auth_openidc:2.3 security and bug fix update | 2020-07-21T14:12:27Z | 2020-07-21T14:12:10Z |
| alsa-2020:3053 | Moderate: container-tools:rhel8 security, bug fix, and enhancement update | 2020-07-21T15:01:40Z | 2020-07-21T15:01:25Z |
| alsa-2020:3662 | Moderate: php:7.3 security, bug fix, and enhancement update | 2020-09-08T08:38:31Z | 2020-09-08T08:38:22Z |
| alsa-2020:3732 | Important: mysql:8.0 security update | 2020-09-14T12:23:24Z | 2020-09-14T12:23:24Z |
| alsa-2020:4272 | Moderate: nodejs:12 security and bug fix update | 2020-10-19T07:13:10Z | 2020-10-19T07:13:10Z |
| alsa-2020:4490 | Moderate: gnupg2 security, bug fix, and enhancement update | 2020-11-03T12:09:29Z | 2020-11-03T19:35:32Z |
| alsa-2020:4641 | Moderate: python38:3.8 security, bug fix, and enhancement update | 2020-11-03T12:23:02Z | 2020-11-03T19:46:00Z |
| alsa-2020:4654 | Moderate: python27:2.7 security update | 2020-11-03T12:24:08Z | 2020-11-03T19:47:29Z |
| alsa-2020:4694 | Moderate: container-tools:rhel8 security, bug fix, and enhancement update | 2020-11-03T12:27:37Z | 2020-11-03T19:50:37Z |
| alsa-2020:4712 | Moderate: subversion:1.10 security update | 2020-11-03T12:29:29Z | 2020-11-03T19:51:49Z |
| alsa-2020:4743 | Moderate: squid:4 security, bug fix, and enhancement update | 2020-11-03T12:32:17Z | 2020-11-03T19:54:15Z |
| alsa-2020:4952 | Important: freetype security update | 2020-11-05T08:26:43Z | 2020-11-05T08:26:43Z |
| alsa-2020:5499 | Moderate: nodejs:12 security and bug fix update | 2020-12-15T16:03:21Z | 2020-12-15T16:03:05Z |
| alsa-2020:5620 | Important: postgresql:12 security update | 2020-12-17T15:30:10Z | 2020-12-17T15:30:10Z |
| alsa-2021:0507 | Important: subversion:1.10 security update | 2021-02-15T07:04:31Z | 2021-02-15T07:04:31Z |
| alsa-2021:0531 | Moderate: container-tools:rhel8 security, bug fix, and enhancement update | 2021-02-16T07:31:27Z | 2021-02-16T13:02:13Z |
| alsa-2021:0548 | Moderate: nodejs:10 security update | 2021-02-16T07:34:15Z | 2021-02-16T13:03:03Z |
| alsa-2021:0549 | Moderate: nodejs:12 security update | 2021-02-16T07:34:29Z | 2021-02-16T13:03:05Z |
| alsa-2021:0551 | Moderate: nodejs:14 security and bug fix update | 2021-02-16T07:34:42Z | 2021-02-16T13:03:09Z |
| alsa-2021:0618 | Important: stunnel security update | 2021-02-22T09:54:57Z | 2021-02-22T09:54:57Z |
| alsa-2021:0705 | Important: container-tools:1.0 security update | 2021-03-02T18:20:39Z | 2021-03-02T18:20:39Z |
| alsa-2021:0706 | Important: container-tools:2.0 security update | 2021-03-02T18:48:35Z | 2021-03-02T18:48:35Z |
| alsa-2021:0734 | Important: nodejs:12 security update | 2021-03-04T15:17:37Z | 2021-03-04T15:17:37Z |