Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0102 |
N/A
|
Buffer overflow in SLmail 3.x allows attackers to… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.535Z |
| CVE-1999-0108 |
N/A
|
The printers program in IRIX has a buffer overflo… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.505Z |
| CVE-1999-0109 |
N/A
|
Buffer overflow in ffbconfig in Solaris 2.5.1. |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.326Z |
| CVE-1999-0111 |
N/A
|
RIP v1 is susceptible to spoofing. |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.514Z |
| CVE-1999-0112 |
N/A
|
Buffer overflow in AIX dtterm program for the CDE. |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.522Z |
| CVE-1999-0113 |
N/A
|
Some implementations of rlogin allow root access … |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.663Z |
| CVE-1999-0116 |
N/A
|
Denial of service when an attacker sends many SYN… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.689Z |
| CVE-1999-0117 |
N/A
|
AIX passwd allows local users to gain root access. |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.677Z |
| CVE-1999-0120 |
N/A
|
Sun/Solaris utmp file allows local users to gain … |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.712Z |
| CVE-1999-0122 |
N/A
|
Buffer overflow in AIX lchangelv gives root access. |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.543Z |
| CVE-1999-0125 |
N/A
|
Buffer overflow in SGI IRIX mailx program. |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.706Z |
| CVE-1999-0126 |
N/A
|
SGI IRIX buffer overflow in xterm and Xaw allows … |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.710Z |
| CVE-1999-0128 |
N/A
|
Oversized ICMP ping packets can result in a denia… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.581Z |
| CVE-1999-0129 |
N/A
|
Sendmail allows local users to write to a file an… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.692Z |
| CVE-1999-0130 |
N/A
|
Local users can start Sendmail in daemon mode and… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.542Z |
| CVE-1999-0131 |
N/A
|
Buffer overflow and denial of service in Sendmail… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.691Z |
| CVE-1999-0132 |
N/A
|
Expreserve, as used in vi and ex, allows local us… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.644Z |
| CVE-1999-0133 |
N/A
|
fm_fls license server for Adobe Framemaker allows… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.751Z |
| CVE-1999-0134 |
N/A
|
vold in Solaris 2.x allows local users to gain ro… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.599Z |
| CVE-1999-0135 |
N/A
|
admintool in Solaris allows a local user to write… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.690Z |
| CVE-1999-0136 |
N/A
|
Kodak Color Management System (KCMS) on Solaris a… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.706Z |
| CVE-1999-0137 |
N/A
|
The dip program on many Linux systems allows loca… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.658Z |
| CVE-1999-0138 |
N/A
|
The suidperl and sperl program do not give up roo… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.547Z |
| CVE-1999-0139 |
N/A
|
Buffer overflow in Solaris x86 mkcookie allows lo… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.550Z |
| CVE-1999-0141 |
N/A
|
Java Bytecode Verifier allows malicious applets t… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.867Z |
| CVE-1999-0143 |
N/A
|
Kerberos 4 key servers allow a user to masquerade… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.749Z |
| CVE-1999-0146 |
N/A
|
The campas CGI program provided with some NCSA we… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.934Z |
| CVE-1999-0147 |
N/A
|
The aglimpse CGI program of the Glimpse package a… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.928Z |
| CVE-1999-0148 |
N/A
|
The handler CGI program in IRIX allows arbitrary … |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.814Z |
| CVE-1999-0149 |
N/A
|
The wrap CGI program in IRIX allows remote attack… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.767Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-4936-rj25-6wm6 |
|
nori contains Improper Input Validation | 2017-10-24T18:33:37Z | 2023-01-20T22:08:42Z |
| ghsa-574q-fxfj-wv6h |
|
Puppet Improper Input Validation vulnerability | 2017-10-24T18:33:37Z | 2023-05-12T17:26:05Z |
| ghsa-699m-mcjm-9cw8 |
|
actionpack vulnerable to Cross-site Scripting | 2017-10-24T18:33:37Z | 2023-08-25T19:05:47Z |
| ghsa-6c8p-qphv-668v |
|
Denial of service in ruby-openid | 2017-10-24T18:33:37Z | 2023-06-09T20:18:48Z |
| ghsa-78j3-7wpm-qhvp |
|
Shell Metacharacter Injection in kelredd-pruview | 2017-10-24T18:33:37Z | 2023-07-05T19:12:35Z |
| ghsa-7fqj-cg79-f2pv |
|
Thumbshooter vulnerable to Code Injection | 2017-10-24T18:33:37Z | 2023-08-28T13:54:43Z |
| ghsa-7g65-ghrg-hpf5 |
|
actionpack Cross-site Scripting vulnerability | 2017-10-24T18:33:37Z | 2025-01-21T15:21:13Z |
| ghsa-85r7-w5mv-c849 |
|
Rack Vulnerable to Path Traversal | 2017-10-24T18:33:37Z | 2023-08-25T23:30:15Z |
| ghsa-8jxj-9r5f-w3m2 |
|
Puppet allows local users to obtain sensitive configuration information | 2017-10-24T18:33:37Z | 2023-05-12T17:05:34Z |
| ghsa-98mf-8f57-64qf |
|
actionpack Cross-site Scripting vulnerability | 2017-10-24T18:33:37Z | 2023-01-23T16:34:24Z |
| ghsa-99ch-8mvp-g7m5 |
|
md2pdf allows context-dependent attackers to execute arbitrary commands via shell metacharacters in… | 2017-10-24T18:33:37Z | 2023-01-23T16:37:19Z |
| ghsa-9c2j-593q-3g82 |
|
activesupport Improper Input Validation vulnerability | 2017-10-24T18:33:37Z | 2023-06-01T19:51:36Z |
| ghsa-9h36-4jf2-hx53 |
|
extlib does not properly restrict casts of string values | 2017-10-24T18:33:37Z | 2023-01-23T20:56:41Z |
| ghsa-9hx9-w2j6-rw76 |
|
Script Injection in Show In Browser gem | 2017-10-24T18:33:37Z | 2025-04-13T23:26:43Z |
| ghsa-9qj7-jvg4-qr2x |
|
Phusion Passenger Denial of Service | 2017-10-24T18:33:37Z | 2023-07-05T18:50:18Z |
| ghsa-c43v-hrmg-56r4 |
|
Cocaine Gem OS Command Injection vulnerability | 2017-10-24T18:33:37Z | 2023-09-05T21:12:28Z |
| ghsa-cf36-985g-v73c |
|
omniauth-facebook Cross-Site Request Forgery vulnerability | 2017-10-24T18:33:37Z | 2023-01-23T21:12:18Z |
| ghsa-cj43-9h3w-v976 |
|
Puppet allows remote attackers to execute arbitrary Ruby programs from the master via the resource_… | 2017-10-24T18:33:37Z | 2022-10-04T21:44:45Z |
| ghsa-f7p5-w2cr-7cp7 |
|
Puppet Improper Input Validation vulnerability | 2017-10-24T18:33:37Z | 2023-05-12T17:27:38Z |
| ghsa-fgmx-8h93-26fh |
|
omniauth-oauth2 Cross-Site Request Forgery vulnerability | 2017-10-24T18:33:37Z | 2023-01-25T23:20:49Z |
| ghsa-fhj9-cjjh-27vm |
|
Active Record contains deserialization of arbitrary YAML | 2017-10-24T18:33:37Z | 2023-03-14T22:15:51Z |
| ghsa-g266-3crh-h7gj |
|
ldoce Gem Arbitrary Command Execution | 2017-10-24T18:33:37Z | 2023-08-29T16:28:48Z |
| ghsa-g89m-3wjw-h857 |
|
Puppet vulnerable to Path Traversal | 2017-10-24T18:33:37Z | 2023-05-12T17:09:48Z |
| ghsa-gh2w-j7cx-2664 |
|
Active Record contains SQL Injection | 2017-10-24T18:33:37Z | 2025-01-21T16:47:32Z |
| ghsa-gppp-5xc5-wfpx |
|
Active Record allows bypassing of database-query restrictions | 2017-10-24T18:33:37Z | 2023-08-25T23:11:25Z |
| ghsa-gr44-7grc-37vq |
|
ActiveRecord vulnerable to modification of protected model attributes | 2017-10-24T18:33:37Z | 2023-01-23T17:23:13Z |
| ghsa-h77x-m5q8-c29h |
|
Rack vulnerable to REDoS | 2017-10-24T18:33:37Z | 2023-08-25T23:23:23Z |
| ghsa-h835-75hw-pj89 |
|
activesupport Cross-site Scripting vulnerability | 2017-10-24T18:33:37Z | 2025-01-21T16:46:59Z |
| ghsa-hxx6-p24v-wg8c |
|
Curl Gem insufficient URL escaping command injection | 2017-10-24T18:33:37Z | 2023-08-29T10:57:50Z |
| ghsa-j838-vfpq-fmf2 |
|
actionpack Cross-site Scripting vulnerability | 2017-10-24T18:33:37Z | 2023-01-23T17:47:24Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2011-26 |
|
Unspecified vulnerability in Zope 2.12.x and 2.13.x, as used in Plone 4.0.x through 4.0.9… | products-plonehotfix20110928 | 2011-10-10T10:55:00Z | 2024-11-21T14:22:59.154748Z |
| pysec-2011-27 |
|
The CMFEditions component 2.x in Plone 4.0.x through 4.0.9, 4.1, and 4.2 through 4.2a2 do… | products-plonehotfix20110928 | 2011-10-10T10:55:00Z | 2024-11-21T14:22:59.206417Z |
| pysec-2011-1 |
|
django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data … | django | 2011-10-19T10:55:00Z | 2021-07-05T00:01:17.786807Z |
| pysec-2011-2 |
|
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and… | django | 2011-10-19T10:55:00Z | 2021-07-05T00:01:17.875375Z |
| pysec-2011-3 |
|
The verify_exists functionality in the URLField implementation in Django before 1.2.7 and… | django | 2011-10-19T10:55:00Z | 2021-07-05T00:01:17.957407Z |
| pysec-2011-4 |
|
Django before 1.2.7 and 1.3.x before 1.3.1 uses a request's HTTP Host header to construct… | django | 2011-10-19T10:55:00Z | 2021-07-05T00:01:18.041571Z |
| pysec-2011-5 |
|
The CSRF protection mechanism in Django through 1.2.7 and 1.3.x through 1.3.1 does not pr… | django | 2011-10-19T10:55:00Z | 2021-07-05T00:01:18.129041Z |
| pysec-2011-17 |
|
Celery 2.1 and 2.2 before 2.2.8, 2.3 before 2.3.4, and 2.4 before 2.4.4 changes the effec… | celery | 2011-12-05T11:55:00Z | 2021-08-27T03:21:56.662825Z |
| pysec-2011-22 |
|
Plone 4.1.3 and earlier computes hash values for form parameters without restricting the … | plone | 2011-12-30T01:55:00Z | 2021-08-27T03:22:11.387960Z |
| pysec-2011-23 |
|
virtualenv.py in virtualenv before 1.5 allows local users to overwrite arbitrary files vi… | virtualenv | 2011-12-31T01:55:00Z | 2021-08-27T03:22:49.873439Z |
| pysec-2012-31 |
|
libs/updater.py in GoLismero 0.6.3, and other versions before Git revision 2b3bb43d6867, … | golismero | 2012-03-19T19:55:00Z | 2024-11-21T14:22:51.617446Z |
| pysec-2012-22 |
|
The ELF file parser in Bitdefender 7.2, Comodo Antivirus 7424, eSafe 7.0.17.0, F-Secure A… | bitdefender | 2012-03-21T10:11:00Z | 2024-11-21T14:22:41.00719Z |
| pysec-2012-23 |
|
The ELF file parser in Bitdefender 7.2, Command Antivirus 5.2.11.5, Comodo Antivirus 7424… | bitdefender | 2012-03-21T10:11:00Z | 2024-11-21T14:22:41.056758Z |
| pysec-2012-24 |
|
The RAR file parser in ClamAV 0.96.4, Rising Antivirus 22.83.00.03, Quick Heal (aka Cat Q… | bitdefender | 2012-03-21T10:11:00Z | 2024-11-21T14:22:41.111226Z |
| pysec-2012-25 |
|
The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antiv… | bitdefender | 2012-03-21T10:11:00Z | 2024-11-21T14:22:41.165409Z |
| pysec-2012-26 |
|
The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.16… | bitdefender | 2012-03-21T10:11:00Z | 2024-11-21T14:22:41.220887Z |
| pysec-2012-27 |
|
The Gzip file parser in AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Command Antivirus 5.… | bitdefender | 2012-03-21T10:11:00Z | 2024-11-21T14:22:41.276629Z |
| pysec-2012-28 |
|
The ELF file parser in AhnLab V3 Internet Security 2011.01.18.00, Bitdefender 7.2, Quick … | bitdefender | 2012-03-21T10:11:00Z | 2024-11-21T14:22:41.328571Z |
| pysec-2012-15 |
|
Paste Script 1.7.5 and earlier does not properly set group memberships during execution w… | paste | 2012-05-01T19:55:00Z | 2021-08-27T03:22:10.166915Z |
| pysec-2012-14 |
|
Universal Feed Parser (aka feedparser or python-feedparser) before 5.1.2 allows remote at… | feedparser | 2012-05-21T22:55:00Z | 2021-08-27T03:22:03.863933Z |
| pysec-2012-5 |
|
CRLF injection vulnerability in the tornado.web.RequestHandler.set_header function in Tor… | tornado | 2012-05-23T20:55:00Z | 2021-07-05T00:01:27.298545Z |
| pysec-2012-32 |
|
Cross-site scripting (XSS) vulnerability in the refresh mechanism in the log viewer in ho… | horizon | 2012-06-05T22:55:00Z | 2024-11-21T14:22:51.729618Z |
| pysec-2012-33 |
|
Session fixation vulnerability in OpenStack Dashboard (Horizon) folsom-1 and 2012.1 allow… | horizon | 2012-06-05T22:55:00Z | 2024-11-21T14:22:51.786908Z |
| pysec-2012-9 |
|
Multiple SQL injection vulnerabilities in SQLAlchemy before 0.7.0b4, as used in Keystone,… | sqlalchemy | 2012-06-05T22:55:00Z | 2021-07-15T02:22:20.378135Z |
| pysec-2012-36 |
|
Openstack Compute (Nova) Folsom, 2012.1, and 2011.3 does not limit the number of security… | nova | 2012-06-07T19:55:00Z | 2024-11-21T14:22:55.825436Z |
| pysec-2012-16 |
|
PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal sche… | pycrypto | 2012-06-17T03:41:00Z | 2021-08-27T03:22:16.601238Z |
| pysec-2012-37 |
|
The (1) EC2 and (2) OS APIs in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), … | nova | 2012-06-21T15:55:00Z | 2024-11-21T14:22:55.891133Z |
| pysec-2012-6 |
|
model/modelstorage.py in the Tryton application framework (trytond) before 2.4.0 for Pyth… | trytond | 2012-07-12T20:55:00Z | 2021-07-05T00:01:27.407587Z |
| pysec-2012-40 |
|
The Nova scheduler in OpenStack Compute (Nova) Folsom (2012.2) and Essex (2012.1), when D… | nova | 2012-07-17T21:55:00Z | 2024-11-21T14:22:56.558714Z |
| pysec-2012-38 |
|
Directory traversal vulnerability in virt/disk/api.py in OpenStack Compute (Nova) Folsom … | nova | 2012-07-22T16:55:00Z | 2024-11-21T14:22:56.434839Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-2768 | Malicious code in epic-games-self-service-portal (npm) | 2022-05-18T06:29:44Z | 2022-05-18T06:29:54Z |
| mal-2022-2769 | Malicious code in epic-support-prettier-config (npm) | 2022-05-18T06:29:44Z | 2022-05-18T06:29:44Z |
| mal-2022-5243 | Malicious code in paypal-rest-sample (npm) | 2022-05-18T06:29:44Z | 2022-05-18T06:29:44Z |
| mal-2022-5433 | Malicious code in pp-mp-connected-path (npm) | 2022-05-18T06:29:44Z | 2022-05-18T06:29:44Z |
| mal-2022-5434 | Malicious code in pp-react-buttons (npm) | 2022-05-18T06:29:44Z | 2022-05-18T06:29:54Z |
| mal-2022-6296 | Malicious code in starter-theme (npm) | 2022-05-18T06:29:44Z | 2022-05-18T06:29:54Z |
| mal-2022-7106 | Malicious code in website-404-error-page (npm) | 2022-05-19T08:37:21Z | 2022-05-19T08:37:22Z |
| mal-2022-1212 | Malicious code in axp-base (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:27Z |
| mal-2022-1213 | Malicious code in axp-shared-scripts (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:27Z |
| mal-2022-1214 | Malicious code in axp-utility-belt (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:22Z |
| mal-2022-2377 | Malicious code in ddc-classnames-js (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| mal-2022-2378 | Malicious code in ddc-new-relic (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| mal-2022-2464 | Malicious code in dgse-tools-mgm-elf-helper (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| mal-2022-4669 | Malicious code in mollie-design-system (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:22Z |
| mal-2022-377 | Malicious code in @kibt/operation-track (npm) | 2022-05-23T10:22:10Z | 2022-05-23T10:22:10Z |
| mal-2022-378 | Malicious code in @kibt/weblogger (npm) | 2022-05-23T10:22:10Z | 2022-05-23T10:22:10Z |
| mal-2022-7433 | Malicious code in equests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7434 | Malicious code in reequests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7435 | Malicious code in reqquests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7436 | Malicious code in requeests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7437 | Malicious code in requess (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7438 | Malicious code in requessts (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7439 | Malicious code in requestts (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7440 | Malicious code in requuests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7441 | Malicious code in reuests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7442 | Malicious code in rrequests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-2022 | Malicious code in colors_express (npm) | 2022-05-31T11:55:20Z | 2022-05-31T11:55:21Z |
| mal-2022-2590 | Malicious code in dragox-utilities (npm) | 2022-05-31T12:53:57Z | 2022-05-31T12:53:57Z |
| mal-2022-390 | Malicious code in @logistics-frontend/blocks (npm) | 2022-05-31T12:55:54Z | 2022-05-31T12:55:58Z |
| mal-2022-391 | Malicious code in @logistics-frontend/client-core (npm) | 2022-05-31T12:55:54Z | 2022-05-31T12:55:55Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-drupal-2022-39261 | Twig may load a template outside a configured directory when using the filesystem loader | 2024-03-06T10:51:53.277Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2023-47121 | Discourse SSRF vulnerability in Embedding | 2024-03-06T10:51:53.707Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-23324 | Envoy ext auth can be bypassed when Proxy protocol filter sets invalid UTF-8 metadata | 2024-03-06T10:51:54.396Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2024-0056 | Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability | 2024-03-06T10:51:56.566Z | 2025-07-09T15:43:42.864Z |
| bit-flink-2020-17519 | Apache Flink directory traversal attack: reading remote files through the REST API | 2024-03-06T10:51:56.799Z | 2025-10-22T09:08:25.162Z |
| bit-elasticsearch-2023-31418 | Elasticsearch uncontrolled resource consumption | 2024-03-06T10:51:58.187Z | 2025-05-20T10:02:07.006Z |
| bit-etcd-2022-34038 | 2024-03-06T10:51:58.470Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2023-46288 | Apache Airflow: Sensitive parameters exposed in API when "non-sensitive-only" configuration is set | 2024-03-06T10:52:00.977Z | 2025-05-20T10:02:07.006Z |
| bit-ghost-2024-23725 | 2024-03-06T10:52:01.089Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2022-3920 | Consul Peering Imported Nodes/Services Leak | 2024-03-06T10:52:02.181Z | 2025-05-20T10:02:07.006Z |
| bit-gdal-2021-45943 | 2024-03-06T10:52:03.078Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2023-24580 | 2024-03-06T10:52:03.082Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-31043 | Fix failure to strip Authorization header on HTTP downgrade in Guzzle | 2024-03-06T10:52:03.100Z | 2025-05-20T10:02:07.006Z |
| bit-fluentd-2021-41186 | ReDoS vulnerability in parser_apache2 | 2024-03-06T10:52:03.183Z | 2025-05-20T10:02:07.006Z |
| bit-envoy-2024-23323 | Excessive CPU usage when URI template matcher is configured using regex in Envoy | 2024-03-06T10:52:03.196Z | 2025-05-20T10:02:07.006Z |
| bit-git-2022-25648 | Command Injection | 2024-03-06T10:52:03.704Z | 2025-05-20T10:02:07.006Z |
| bit-ejbca-2021-40087 | 2024-03-06T10:52:04.494Z | 2025-04-03T14:40:37.652Z | |
| bit-discourse-2023-47120 | Discourse DoS through Onebox favicon URL | 2024-03-06T10:52:05.069Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2022-30556 | Information Disclosure in mod_lua with websockets | 2024-03-06T10:52:05.387Z | 2025-05-20T10:02:07.006Z |
| bit-elasticsearch-2023-31417 | Elasticsearch Insertion of sensitive information in audit logs | 2024-03-06T10:52:07.793Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2023-44487 | 2024-03-06T10:52:07.879Z | 2026-02-11T09:09:18.507Z | |
| bit-flink-2020-17518 | Apache Flink directory traversal attack: remote file writing through the REST API | 2024-03-06T10:52:08.186Z | 2025-05-20T10:02:07.006Z |
| bit-gitea-2023-3515 | Open Redirect in go-gitea/gitea | 2024-03-06T10:52:08.603Z | 2025-05-20T10:02:07.006Z |
| bit-ghost-2023-40028 | Arbitrary file read via symlinks in Ghost | 2024-03-06T10:52:08.986Z | 2025-05-20T10:02:07.006Z |
| bit-etcd-2021-28235 | 2024-03-06T10:52:10.197Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2022-29153 | 2024-03-06T10:52:10.905Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2023-46215 | Apache Airflow Celery provider, Apache Airflow: Sensitive information logged as clear text when rediss, amqp, rpc protocols are used as Celery result backend | 2024-03-06T10:52:11.268Z | 2025-05-20T10:02:07.006Z |
| bit-django-2023-23969 | 2024-03-06T10:52:12.389Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2024-23322 | Envoy crashes when idle and request per try timeout occur within the backoff interval | 2024-03-06T10:52:13.860Z | 2025-05-20T10:02:07.006Z |
| bit-fluentd-2020-21514 | 2024-03-06T10:52:13.870Z | 2025-06-10T07:53:49.719Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-so16176 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:39:24.255623Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mj51212 | Cancelling a query (e | 2026-01-30T15:40:23.782215Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dv06422 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:40:54.415037Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-er42900 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T15:41:23.817747Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-bt39952 | Moby is an open source container framework developed by Docker Inc | 2026-01-30T15:45:23.955705Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rx06615 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:45:24.056160Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ok45738 | Within HostnameError | 2026-01-30T15:45:53.967263Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xd92996 | Cancelling a query (e | 2026-01-30T15:46:24.650971Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tr11635 | Cancelling a query (e | 2026-01-30T15:46:54.229170Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gc16599 | Cancelling a query (e | 2026-01-30T15:46:54.243517Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-zp68963 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:47:54.288582Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ad41794 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:47:54.368234Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qw16951 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:48:54.464404Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ll43287 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:50:54.603931Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oh86281 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:52:25.054249Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dp30290 | processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input | 2026-01-30T15:52:54.729374Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-hv28992 | Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3 | 2026-01-30T15:55:24.450018Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yc48827 | Within HostnameError | 2026-01-30T15:56:24.532632Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wq07901 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:01:54.911193Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr85161 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:02:54.934169Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uz73015 | Cancelling a query (e | 2026-01-30T16:09:25.315533Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xr17407 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-01-30T16:11:25.270681Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-jr48309 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:11:25.334563Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-cz81512 | Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes | 2026-01-30T16:11:25.451968Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-um63521 | Within HostnameError | 2026-01-30T16:12:25.029065Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xi02879 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11 | 2026-01-30T16:18:55.578686Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kz60560 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:19:55.200542Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ch38544 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:19:55.527550Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk62208 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:20:55.127319Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ml51665 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:20:55.711028Z | 2026-01-29T18:58:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2020-032 | 2020-08-05T15:47:56.000Z | 2023-08-11T17:31:20.000Z | |
| drupal-contrib-2020-033 | 2020-08-05T20:05:36.000Z | 2023-08-11T17:31:14.000Z | |
| drupal-contrib-2020-034 | 2020-10-14T14:38:16.000Z | 2023-08-11T17:32:53.000Z | |
| drupal-contrib-2020-035 | 2020-11-18T17:15:24.000Z | 2023-08-11T17:43:11.000Z | |
| drupal-contrib-2020-038 | 2020-11-18T17:27:58.000Z | 2023-08-11T17:45:32.000Z | |
| drupal-contrib-2021-001 | 2021-01-27T17:17:43.000Z | 2023-08-11T17:24:49.000Z | |
| drupal-contrib-2021-002 | 2021-01-27T17:27:57.000Z | 2023-08-11T17:25:36.000Z | |
| drupal-contrib-2021-003 | 2021-01-27T17:53:09.000Z | 2023-08-11T17:13:06.000Z | |
| drupal-contrib-2021-004 | 2021-03-03T16:49:33.000Z | 2023-08-11T17:15:22.000Z | |
| drupal-contrib-2021-005 | 2021-03-17T18:36:07.000Z | 2023-08-11T17:15:48.000Z | |
| drupal-contrib-2021-006 | 2021-04-28T16:47:09.000Z | 2023-08-11T17:16:38.000Z | |
| drupal-contrib-2021-007 | 2021-05-12T16:08:34.000Z | 2023-08-11T17:17:34.000Z | |
| drupal-contrib-2021-008 | 2021-05-12T16:14:35.000Z | 2023-08-11T17:17:58.000Z | |
| drupal-contrib-2021-009 | 2021-05-12T16:23:23.000Z | 2023-08-11T17:18:42.000Z | |
| drupal-contrib-2021-010 | 2021-06-02T16:49:49.000Z | 2023-08-11T17:21:33.000Z | |
| drupal-contrib-2021-011 | 2021-06-02T16:51:10.000Z | 2023-08-11T17:22:44.000Z | |
| drupal-contrib-2021-013 | 2021-06-02T16:56:19.000Z | 2023-08-11T17:07:00.000Z | |
| drupal-contrib-2021-014 | 2021-06-02T16:59:12.000Z | 2023-08-11T17:07:36.000Z | |
| drupal-contrib-2021-015 | 2021-06-16T15:58:47.000Z | 2023-08-11T17:08:06.000Z | |
| drupal-contrib-2021-016 | 2021-06-16T16:05:14.000Z | 2023-08-11T17:08:37.000Z | |
| drupal-contrib-2021-017 | 2021-06-16T16:15:21.000Z | 2023-08-11T17:09:04.000Z | |
| drupal-contrib-2021-018 | 2021-06-23T16:47:59.000Z | 2023-08-11T17:09:57.000Z | |
| drupal-contrib-2021-019 | 2021-06-23T16:51:26.000Z | 2023-08-11T17:10:31.000Z | |
| drupal-contrib-2021-020 | 2021-06-30T16:39:06.000Z | 2023-08-11T17:11:13.000Z | |
| drupal-contrib-2021-021 | 2021-06-30T16:43:19.000Z | 2023-08-11T17:11:42.000Z | |
| drupal-contrib-2021-022 | 2021-06-30T16:46:21.000Z | 2023-08-11T17:12:21.000Z | |
| drupal-contrib-2021-023 | 2021-07-21T16:51:57.000Z | 2023-08-11T16:57:55.000Z | |
| drupal-contrib-2021-024 | 2021-07-28T16:39:17.000Z | 2023-08-11T16:58:13.000Z | |
| drupal-contrib-2021-025 | 2021-08-25T14:36:25.000Z | 2023-08-11T16:59:37.000Z | |
| drupal-contrib-2021-026 | 2021-08-25T15:27:54.000Z | 2023-08-11T17:01:51.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2006-000251 | SquirrelMail cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000293 | Sun Java System Web Server cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000326 | Mozilla Firefox vulnerable to HTTP response splitting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000345 | Microsoft Internet Explorer address bar spoofing vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000392 | Ruby contains a vulnerability that prevents safe level 4 from functioning as a sandbox. | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000540 | Microsoft Windows Indexing Service cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000599 | Nagasaki Electronic Prefectural Office System vulnerable to bypass authentication | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000600 | Nagasaki Electronic Prefectural Office System authentication information vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000601 | Eudora Japanese version stops working after the application crashes | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000602 | Multiple email clients vulnerable in handling an attachement inapropriately | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000603 | Hatena Toolbar sends URL information unecnrypted | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000604 | Nagasaki Electronic Prefectural Office System SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000605 | Hyper NIKKI System allows unauthorized email submission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000606 | Minnu's filer2 vulnerable in allowing arbitrary Ruby script execution | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000609 | CAFEMILK Shopping Cart CGI cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000610 | QUICK CART OS command injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000611 | QUICK CART cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000612 | FreeStyleWiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000613 | Trac cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000614 | Winny buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000615 | Apache Struts Validator allows to bypass input data validation | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000616 | DonutP and UnDonut confirmation dialog display vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000617 | Multiple email clients vulnerable to directory traversal due to inappropriate unicode handling | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000619 | MyWeb SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000620 | RWiki arbitrary Ruby script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000621 | RWiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000622 | dotProject cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000623 | Joomla! cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000624 | CGI RESCUE WebFORM allows unauthorized email transmission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000625 | CGI RESCUE WebFORM allows unauthorized email transmission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00014 | libpng 'png_combine_row()'缓冲区溢出漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00015 | WordPress插件cformsII 'lib_nonajax.php'任意文件上传漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00016 | Gnupg2 'sm/gpgsm.c' Double Free拒绝服务漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00017 | Gnupg2 'dirmngr/ldapserver.c' Double Free拒绝服务漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00018 | Gnupg2 '/sm/minip12.c' Double Free拒绝服务漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00019 | Gnupg2 '/scd/command.c' Double Free拒绝服务漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00020 | WordPress插件Frontend Uploader 'errors'参数跨站脚本漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00021 | Notepad++存在未明缓冲区溢出漏洞 | 2014-12-31 | 2015-01-04 |
| cnvd-2015-00298 | EnterCMR系统命令执行漏洞 | 2014-12-31 | 2015-02-07 |
| cnvd-2015-00002 | ManageEngine Desktop Central远程安全绕过漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00003 | Linux Kernel 'fragmentation.c'拒绝服务漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00004 | GetSimple CMS 'api.php' XML外部实体信息泄露漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00006 | Osclass 'contact.php'任意文件上传漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00007 | Osclass 'ajax.php'本地文件包含漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00008 | Osclass 'alert'参数SQL注入漏洞 | 2015-01-04 | 2015-01-04 |
| cnvd-2015-00022 | Google Chrome拒绝服务漏洞(CNVD-2015-00022) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00023 | Google Chrome拒绝服务漏洞(CNVD-2015-00023) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00024 | Telerik UI for ASP.NET AJAX Q3绝对路径遍历漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00025 | Maxthon Cloud Browser application 地址栏欺骗漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00026 | WordPress插件IP Ban存在多个跨站请求伪造漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00027 | Huawei eSpace Desktop V100R001C03拒绝服务漏洞(CNVD-2015-00027) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00028 | Huawei eSpace Desktop V200R003C00存在多个不可信搜索路径漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00029 | Huawei eSpace Desktop V100R001C03拒绝服务漏洞(CNVD-2015-00029) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00030 | Huawei eSpace Desktop V200R001C03拒绝服务漏洞(CNVD-2015-00030) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00031 | LibreSSL双重释放漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00032 | IBM Rational AppScan Source信息泄露漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00033 | IBM WebSphere Service Registry and Repository预期访问限制绕过漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00034 | IBM Security Identity Manager跨站请求伪造漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00035 | Tribal Tribiq CMS路径泄露漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00036 | WhatsApp Non-Printable字符串处理拒绝服务漏洞 | 2015-01-04 | 2015-01-05 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-02481 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02482 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02483 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02484 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02485 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02486 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02487 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02488 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02489 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02490 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02491 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02492 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02493 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02494 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02495 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02496 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02497 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02498 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02499 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02500 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02501 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02502 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02503 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02504 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02505 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02506 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02507 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02508 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02509 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02510 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2000-avi-091 | Vulnérabilité de « Fast Mode » sous Firewall-1 | 2000-12-20T00:00:00.000000 | 2000-12-20T00:00:00.000000 |
| certa-2000-avi-092 | Vulnérabilités de Solaris | 2000-12-20T00:00:00.000000 | 2000-12-20T00:00:00.000000 |
| certa-2000-avi-093 | Vulnérabilité sous Microsoft IIS (Extensions FrontPage) | 2000-12-28T00:00:00.000000 | 2000-12-28T00:00:00.000000 |
| certa-2011-avi-005 | Multiples vulnérabilités dans evince | 2001-01-11T00:00:00.000000 | 2011-01-07T00:00:00.000000 |
| certa-2001-avi-001 | Vulnérabilité de Lotus Domino 5 | 2001-01-12T00:00:00.000000 | 2001-01-12T00:00:00.000000 |
| certa-2001-avi-002 | Vulnérabilité de l'authentification NTLM sous Windows | 2001-01-12T00:00:00.000000 | 2001-01-12T00:00:00.000000 |
| certa-2001-avi-003 | Accès privilégié oublié dans le code de Interbase Server de Borland | 2001-01-12T00:00:00.000000 | 2001-01-12T00:00:00.000000 |
| certa-2001-avi-004 | Vulnérabilité dans ARP sous SunOS | 2001-01-15T00:00:00.000000 | 2001-01-15T00:00:00.000000 |
| certa-2001-avi-005 | Vulnérabilité du système d'internationalisation sous SGI Irix. | 2001-01-19T00:00:00.000000 | 2001-01-19T00:00:00.000000 |
| certa-2001-avi-006 | Vulnérabilité sous Microsoft Power Point 2000 | 2001-01-24T00:00:00.000000 | 2001-01-24T00:00:00.000000 |
| certa-2001-avi-007 | Mise à jour de Wu-FTPd | 2001-01-24T00:00:00.000000 | 2001-01-24T00:00:00.000000 |
| certa-2001-avi-008 | Vulnérabilité sous Lotus Notes (Domino 5) | 2001-01-25T00:00:00.000000 | 2001-01-25T00:00:00.000000 |
| certa-2001-avi-009 | Vulnérabilité dans les permissions d'accès sous Windows NT 4 | 2001-01-30T00:00:00.000000 | 2001-01-30T00:00:00.000000 |
| certa-2001-avi-010 | Multiples vulnérabilités dans le serveur DNS BIND | 2001-01-30T00:00:00.000000 | 2001-11-30T00:00:00.000000 |
| certa-2001-avi-011 | Vulnérabilités de MySQL 3.23.31 et du module PHP d'apache sous Linux | 2001-01-31T00:00:00.000000 | 2001-01-31T00:00:00.000000 |
| certa-2001-avi-012 | Vulnérabilité dans le protocole RDP sous Windows 2000 | 2001-02-01T00:00:00.000000 | 2001-02-01T00:00:00.000000 |
| certa-2001-avi-013 | Vulnérabilités sur les commutateurs CISCO série CSS | 2001-02-05T00:00:00.000000 | 2001-02-05T00:00:00.000000 |
| certa-2001-avi-014 | Vulnérabilité de l'agent NDDE de Microsoft Windows | 2001-02-07T00:00:00.000000 | 2001-02-07T00:00:00.000000 |
| certa-2001-avi-015 | Vulnérabilité de Windows NT 4 dans l'authentification NTLM | 2001-02-08T00:00:00.000000 | 2001-02-08T00:00:00.000000 |
| certa-2001-avi-016 | Vulnérabilité des logiciels d'administration à distance de Compaq | 2001-02-12T00:00:00.000000 | 2001-02-12T00:00:00.000000 |
| certa-2001-avi-017 | Vulnérabilité de SSH | 2001-02-12T00:00:00.000000 | 2001-02-12T00:00:00.000000 |
| certa-2001-avi-018 | Vulnérabilité sous Windows NT 4 dans le protocole PPTP | 2001-02-14T00:00:00.000000 | 2001-02-14T00:00:00.000000 |
| certa-2001-avi-019 | Vulnérabilité de Vixie-cron sous Unix | 2001-02-21T00:00:00.000000 | 2001-02-21T00:00:00.000000 |
| certa-2001-avi-020 | Vulnérabilité dans le contrôleur de domaine de Windows 2000 Server | 2001-02-21T00:00:00.000000 | 2001-02-21T00:00:00.000000 |
| certa-2001-avi-021 | Vulnérabilité sous Microsoft Outlook et Outlook Express | 2001-02-23T00:00:00.000000 | 2001-02-23T00:00:00.000000 |
| certa-2001-avi-022 | Vulnérabilité dans le <SPAN class= "textit">Java Runtime Environment</SPAN> (JRE) de Sun | 2001-02-27T00:00:00.000000 | 2001-02-27T00:00:00.000000 |
| certa-2001-avi-023 | Dépassement de mémoire dans l'observateur d'événements de Windows 2000 | 2001-02-28T00:00:00.000000 | 2001-02-28T00:00:00.000000 |
| certa-2001-avi-024 | Vulnérabilité dans la gestion des clients sous Lotus Notes | 2001-03-01T00:00:00.000000 | 2001-03-01T00:00:00.000000 |
| certa-2001-avi-025 | Vulnérabilité d'Internet Information Server 5.0 et Exchange 2000 | 2001-03-02T00:00:00.000000 | 2001-03-02T00:00:00.000000 |
| certa-2001-avi-026 | Vulnérabilités dans les commutateurs CISCO IOS | 2001-03-05T00:00:00.000000 | 2001-03-05T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2006-ale-014 | Vulnérabilités dans Microsoft Word | 2006-12-06T00:00:00.000000 | 2007-02-14T00:00:00.000000 |
| certa-2007-ale-001 | Vulnérablité dans Apple Quicktime | 2007-01-04T00:00:00.000000 | 2007-01-24T00:00:00.000000 |
| certa-2007-ale-002 | Vulnérabilité dans Windows | 2007-01-12T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2007-ale-003 | Filoutage contre le site voyages-sncf.com | 2007-01-15T00:00:00.000000 | 2007-01-15T00:00:00.000000 |
| certa-2007-ale-004 | Vulnérabilité dans Microsoft Office | 2007-02-03T00:00:00.000000 | 2007-02-13T00:00:00.000000 |
| certa-2007-ale-005 | Vulnérabilité de Sun Solaris | 2007-02-12T00:00:00.000000 | 2008-09-18T00:00:00.000000 |
| certa-2007-ale-006 | Vulnérabilité dans le logiciel Microsoft Word | 2007-02-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| certa-2007-ale-007 | Vulnérabilité de Microsoft Windows Explorer | 2007-03-09T00:00:00.000000 | 2008-10-09T00:00:00.000000 |
| certa-2007-ale-008 | Vulnérabilité dans Mirosoft Windows | 2007-03-29T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2007-ale-009 | Vulnérabilité dans BrightStor ARCServe Backup | 2007-03-30T00:00:00.000000 | 2007-04-27T00:00:00.000000 |
| certa-2007-ale-010 | Vulnérabilité de Microsoft DNS Server | 2007-04-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| certa-2007-ale-011 | Vulnérabilité du composant d'indexation des serveurs Microsoft IIS | 2007-06-06T00:00:00.000000 | 2013-02-19T00:00:00.000000 |
| certa-2007-ale-012 | Multiples vulnérabilités dans Mozilla Firefox | 2007-06-06T00:00:00.000000 | 2007-07-18T00:00:00.000000 |
| certa-2007-ale-013 | Vulnérabilité dans Mozilla Firefox | 2007-07-27T00:00:00.000000 | 2007-07-31T00:00:00.000000 |
| certa-2007-ale-014 | Vulnérabilité dans Apple QuickTime | 2007-09-13T00:00:00.000000 | 2007-10-12T00:00:00.000000 |
| certa-2007-ale-015 | Vulnérabilité dans le traitement des URI sous Windows | 2007-10-10T00:00:00.000000 | 2007-11-14T00:00:00.000000 |
| certa-2007-ale-016 | Vulnérabilité d'Oracle 10g | 2007-11-16T00:00:00.000000 | 2007-11-16T00:00:00.000000 |
| certa-2007-ale-017 | Vulnérabilité dans la gestion RTSP d'Apple QuickTime | 2007-11-27T00:00:00.000000 | 2007-12-14T00:00:00.000000 |
| certa-2008-ale-001 | Vulnérabilité dans Apple QuickTime | 2008-01-11T00:00:00.000000 | 2008-02-07T00:00:00.000000 |
| certa-2008-ale-002 | Vulnérabilité dans Joomla! | 2008-01-14T00:00:00.000000 | 2008-02-25T00:00:00.000000 |
| certa-2008-ale-003 | Vulnérabilité dans Excel | 2008-01-16T00:00:00.000000 | 2008-03-12T00:00:00.000000 |
| certa-2008-ale-004 | Vulnérabilité dans VMware | 2008-02-27T00:00:00.000000 | 2008-04-16T00:00:00.000000 |
| certa-2008-ale-005 | Vulnérabilité dans Microsoft Jet Database Engine | 2008-03-25T00:00:00.000000 | 2008-05-14T00:00:00.000000 |
| certa-2008-ale-006 | Vulnérabilités dans HP OpenView NNM | 2008-04-18T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| certa-2008-ale-007 | Multiples vulnérabilités dans Apple iCal | 2008-05-23T00:00:00.000000 | 2008-05-29T00:00:00.000000 |
| certa-2008-ale-008 | Vulnérabilité du navigateur Safari | 2008-06-02T00:00:00.000000 | 2008-06-20T00:00:00.000000 |
| certa-2008-ale-009 | Vulnérabilité dans Microsoft Access Snapshot Viewer | 2008-07-08T00:00:00.000000 | 2008-08-13T00:00:00.000000 |
| certa-2008-ale-010 | Vulnérabilité dans Microsoft Word | 2008-07-09T00:00:00.000000 | 2008-08-13T00:00:00.000000 |
| certa-2008-ale-011 | Vulnérabilité dans Oracle BEA WebLogic Server | 2008-07-24T00:00:00.000000 | 2008-08-08T00:00:00.000000 |
| certa-2008-ale-012 | Vulnérabilité dans Microsoft Windows | 2008-10-10T00:00:00.000000 | 2009-04-15T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-138 | Heap-buffer-overflow in org::apache::arrow::flatbuf::Message::Verify | 2020-06-24T01:51:15.842848Z | 2022-04-13T03:04:31.834108Z |
| osv-2020-141 | Heap-use-after-free in pixcmapDestroy | 2020-06-24T01:51:15.964708Z | 2022-04-13T03:04:32.654972Z |
| osv-2020-142 | Heap-use-after-free in ndpi_strncasestr | 2020-06-24T01:51:16.020859Z | 2022-04-13T03:04:36.178485Z |
| osv-2020-143 | Heap-buffer-overflow in QSpecialInteger<QBigEndianStorageType<unsigned int> >::operator unsigned int | 2020-06-24T01:51:16.055970Z | 2023-02-24T02:09:45.849924Z |
| osv-2020-144 | Heap-use-after-free in int arrow::BitUtil::BitReader::GetBatch<short> | 2020-06-24T01:51:16.108113Z | 2022-04-13T03:04:31.872314Z |
| osv-2020-146 | Heap-buffer-overflow in Json::OurReader::parse | 2020-06-24T01:51:16.175015Z | 2022-04-13T03:04:36.739790Z |
| osv-2020-147 | Heap-buffer-overflow in BEInt<short, 2>::operator short | 2020-06-24T01:51:16.229267Z | 2022-04-13T03:04:32.995941Z |
| osv-2020-148 | Use-of-uninitialized-value in AES_encrypt | 2020-06-24T01:51:16.262503Z | 2022-04-13T03:04:35.093996Z |
| osv-2020-149 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator= | 2020-06-24T01:51:16.320307Z | 2022-04-13T03:04:32.979769Z |
| osv-2020-150 | Segv on unknown address in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<ch | 2020-06-24T01:51:16.354141Z | 2022-04-13T03:04:37.943567Z |
| osv-2020-153 | UNKNOWN WRITE in Variant_encodeJson | 2020-06-24T01:51:16.477749Z | 2022-04-13T03:31:44.364576Z |
| osv-2020-154 | Heap-buffer-overflow in search_valid_dns | 2020-06-24T01:51:16.532133Z | 2022-04-13T03:04:36.204911Z |
| osv-2020-156 | Heap-buffer-overflow in flb_unescape_string_utf8 | 2020-06-24T01:51:16.609624Z | 2022-04-13T03:04:38.397174Z |
| osv-2020-160 | Heap-buffer-overflow in populate_relocs_record | 2020-06-24T01:51:16.763715Z | 2022-04-13T03:04:36.589376Z |
| osv-2020-161 | Heap-use-after-free in jbig2_release_huffman_table | 2020-06-24T01:51:16.820995Z | 2022-04-13T03:04:40.575919Z |
| osv-2020-164 | Stack-buffer-overflow in ot::NetworkData::NetworkData::FindService | 2020-06-24T01:51:16.938442Z | 2022-04-13T03:04:38.836598Z |
| osv-2020-165 | UNKNOWN READ in apache::thrift::protocol::TCompactProtocolT<apache::thrift::transport::TMemoryBu | 2020-06-24T01:51:16.975519Z | 2022-04-13T03:04:32.066459Z |
| osv-2020-166 | Heap-buffer-overflow in ndpi_parse_packet_line_info | 2020-06-24T01:51:17.034632Z | 2022-04-13T03:04:35.907890Z |
| osv-2020-170 | Heap-buffer-overflow in populate_relocs_record | 2020-06-24T01:51:17.217363Z | 2022-04-13T03:04:36.522943Z |
| osv-2020-171 | Heap-buffer-overflow in ndpi_parse_packet_line_info | 2020-06-24T01:51:17.251380Z | 2022-04-13T03:04:36.008919Z |
| osv-2020-173 | Use-of-uninitialized-value in BaseCryptStream::BaseCryptStream | 2020-06-24T01:51:17.351460Z | 2022-04-13T03:04:37.242270Z |
| osv-2020-174 | Heap-buffer-overflow in int arrow::BitUtil::BitReader::GetBatch<short> | 2020-06-24T01:51:17.409834Z | 2022-04-13T03:04:31.932877Z |
| osv-2020-176 | UNKNOWN READ in OT::SBIXGlyph::copy | 2020-06-24T01:51:17.508470Z | 2022-04-13T03:04:33.055752Z |
| osv-2020-177 | UNKNOWN in get_ndpi_flow_info6 | 2020-06-24T01:51:17.542041Z | 2022-04-13T03:04:36.058542Z |
| osv-2020-178 | Heap-buffer-overflow in concat_hash_string | 2020-06-24T01:51:17.576965Z | 2022-04-13T03:04:36.265194Z |
| osv-2020-179 | Heap-buffer-overflow in get16 | 2020-06-24T01:51:17.643208Z | 2022-04-13T03:04:36.237311Z |
| osv-2020-180 | Heap-buffer-overflow in parquet::PlainByteArrayDecoder::DecodeArrowDense | 2020-06-24T01:51:17.681643Z | 2022-04-13T03:04:31.927524Z |
| osv-2020-181 | Heap-buffer-overflow in get_ndpi_flow_info | 2020-06-24T01:51:17.721072Z | 2022-04-13T03:04:36.286917Z |
| osv-2020-182 | Heap-buffer-overflow in hb_array_t<OT::IntType<unsigned char, 1u> const> hb_array_t<OT::IntType<unsigned | 2020-06-24T01:51:17.758402Z | 2022-04-13T03:04:33.017765Z |
| osv-2020-183 | Global-buffer-overflow in hb_array_t<OT::IntType<unsigned char, 1u> const> hb_array_t<OT::IntType<unsigned | 2020-06-24T01:51:17.808376Z | 2022-04-13T03:04:33.236636Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2020-0144 | lzw is unmaintained | 2020-02-10T12:00:00Z | 2021-02-10T18:27:15Z |
| rustsec-2020-0158 | slice-deque is unmaintained | 2020-02-10T12:00:00Z | 2021-11-18T14:04:01Z |
| rustsec-2020-0023 | Lifetime boundary for `raw_slice` and `raw_slice_mut` are incorrect | 2020-02-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0147 | rulinalg is unmaintained, use nalgebra instead | 2020-02-11T12:00:00Z | 2021-03-04T13:58:02Z |
| rustsec-2020-0010 | tiberius is unmaintained | 2020-02-28T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0005 | CBox API allows to de-reference raw pointers without `unsafe` code | 2020-03-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0008 | Flaw in hyper allows request smuggling by sending a body in GET requests | 2020-03-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0006 | Flaw in `realloc` allows reading unknown memory | 2020-03-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0007 | use-after or double free of allocated memory | 2020-03-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0146 | arr! macro erases lifetimes | 2020-04-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0009 | `read_scalar` and `read_scalar_at` allow transmuting values without `unsafe` blocks | 2020-04-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0020 | `stb_truetype` crate has been deprecated; use `ttf-parser` instead | 2020-04-18T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0011 | Library exclusively intended to obfuscate code. | 2020-04-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0014 | Various memory safety issues | 2020-04-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0012 | Relies on undefined behavior of `char::from_u32_unchecked` | 2020-04-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0013 | fake-static allows converting any reference into a `'static` reference | 2020-04-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0015 | Crash causing Denial of Service attack | 2020-04-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0016 | `net2` crate has been deprecated; use `socket2` instead | 2020-05-01T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0036 | failure is officially deprecated/unmaintained | 2020-05-02T12:00:00Z | 2024-02-10T15:57:43Z |
| rustsec-2020-0061 | futures_task::noop_waker_ref can segfault due to dereferencing a NULL pointer | 2020-05-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0056 | stdweb is unmaintained | 2020-05-04T12:00:00Z | 2020-10-25T18:57:46Z |
| rustsec-2020-0025 | bigint is unmaintained, use uint instead | 2020-05-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0161 | `array!` macro is unsound in presence of traits that implement methods it calls internally | 2020-05-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0021 | rio allows a use-after-free buffer access when a future is leaked | 2020-05-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0019 | tokio-rustls reads may cause excessive memory usage | 2020-05-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0018 | crate has been renamed to `block-cipher` | 2020-05-26T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0028 | `LocalRequest::clone` creates multiple mutable references to the same object | 2020-05-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0017 | Use after free in ArcIntern::drop | 2020-05-28T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0100 | Double free when calling `sys_info::disk_info` from multiple threads | 2020-05-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0027 | traitobject assumes the layout of fat pointers | 2020-06-01T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2020:4659 | Moderate: gd security update | 2020-11-03T12:24:40Z | 2021-11-12T10:20:55Z |
| alsa-2020:4670 | Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update | 2020-11-03T12:25:36Z | 2022-04-29T15:25:47Z |
| alsa-2020:4676 | Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update | 2020-11-03T12:26:07Z | 2021-12-23T15:15:25Z |
| alsa-2020:4682 | Moderate: grafana security, bug fix, and enhancement update | 2020-11-03T12:26:41Z | 2021-11-12T10:20:56Z |
| alsa-2020:4689 | Moderate: openwsman security update | 2020-11-03T12:27:08Z | 2021-11-12T10:20:56Z |
| alsa-2020:4690 | Moderate: qt5-qtbase and qt5-qtwebsockets security and bug fix update | 2020-11-03T12:27:18Z | 2021-08-11T08:54:00Z |
| alsa-2020:4694 | Moderate: container-tools:rhel8 security, bug fix, and enhancement update | 2020-11-03T12:27:37Z | 2020-11-03T19:50:37Z |
| alsa-2020:4709 | Moderate: librsvg2 security update | 2020-11-03T12:29:09Z | 2021-11-12T10:20:56Z |
| alsa-2020:4712 | Moderate: subversion:1.10 security update | 2020-11-03T12:29:29Z | 2020-11-03T19:51:49Z |
| alsa-2020:4743 | Moderate: squid:4 security, bug fix, and enhancement update | 2020-11-03T12:32:17Z | 2020-11-03T19:54:15Z |
| alsa-2020:4751 | Moderate: httpd:2.4 security, bug fix, and enhancement update | 2020-11-03T12:33:02Z | 2022-01-26T07:27:23Z |
| alsa-2020:4763 | Moderate: dovecot security update | 2020-11-03T12:33:59Z | 2021-08-11T08:54:00Z |
| alsa-2020:4807 | Moderate: prometheus-jmx-exporter security update | 2020-11-03T12:37:53Z | 2021-11-12T10:20:56Z |
| alsa-2020:4827 | Moderate: oniguruma security update | 2020-11-03T12:39:14Z | 2021-11-12T10:20:56Z |
| alsa-2020:4844 | Moderate: fontforge security update | 2020-11-03T12:40:50Z | 2021-08-11T08:54:00Z |
| alsa-2020:4846 | Moderate: mingw-expat security update | 2020-11-03T12:41:03Z | 2021-08-11T08:54:00Z |
| alsa-2020:4952 | Important: freetype security update | 2020-11-05T08:26:43Z | 2020-11-05T08:26:43Z |
| alsa-2020:5393 | Important: libexif security update | 2020-12-14T11:19:49Z | 2021-11-12T10:20:56Z |
| alsa-2020:5487 | Moderate: pacemaker security update | 2020-12-15T16:01:26Z | 2021-08-11T11:18:28Z |
| alsa-2020:5499 | Moderate: nodejs:12 security and bug fix update | 2020-12-15T16:03:21Z | 2020-12-15T16:03:05Z |
| alsa-2020:5500 | Important: mariadb:10.3 security, bug fix, and enhancement update | 2020-12-15T16:03:43Z | 2022-04-28T12:47:02Z |
| alsa-2020:5503 | Moderate: mariadb-connector-c security, bug fix, and enhancement update | 2020-12-15T16:04:12Z | 2021-11-12T10:20:56Z |
| alsa-2020:5620 | Important: postgresql:12 security update | 2020-12-17T15:30:10Z | 2020-12-17T15:30:10Z |
| alsa-2021:0507 | Important: subversion:1.10 security update | 2021-02-15T07:04:31Z | 2021-02-15T07:04:31Z |
| alsa-2021:0531 | Moderate: container-tools:rhel8 security, bug fix, and enhancement update | 2021-02-16T07:31:27Z | 2021-02-16T13:02:13Z |
| alsa-2021:0548 | Moderate: nodejs:10 security update | 2021-02-16T07:34:15Z | 2021-02-16T13:03:03Z |
| alsa-2021:0549 | Moderate: nodejs:12 security update | 2021-02-16T07:34:29Z | 2021-02-16T13:03:05Z |
| alsa-2021:0551 | Moderate: nodejs:14 security and bug fix update | 2021-02-16T07:34:42Z | 2021-02-16T13:03:09Z |
| alsa-2021:0558 | Important: kernel security, bug fix, and enhancement update | 2021-02-16T07:36:08Z | 2023-09-15T13:41:48Z |
| alsa-2021:0611 | Important: xterm security update | 2021-02-18T14:32:15Z | 2021-11-12T10:20:56Z |