Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0649 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FSP service is running. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-1999-0652 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A database service is running, e.g. a SQL server, Oracle, or mySQL. | N/A | N/A | 2000-02-04T10:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2003-1147 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0955. Reason: This candidate is a duplicate of CVE-2003-0955. Notes: All CVE users should reference CVE-2003-0955 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-05-10T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-0389 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0814. Reason: This candidate is a duplicate of CVE-2005-0814. Notes: All CVE users should reference CVE-2005-0814 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-03-23T10:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-0714 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0340. Reason: This candidate is a reservation duplicate of CVE-2005-0340. Notes: All CVE users should reference CVE-2005-0340 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-03-12T10:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-0727 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0735. Reason: This candidate is a duplicate of CVE-2005-0735. Notes: All CVE users should reference CVE-2005-0727 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-03-12T10:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-0728 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0736. Reason: This candidate is a duplicate of CVE-2005-0736. Notes: All CVE users should reference CVE-2005-0736 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-03-12T10:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-0840 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0706. Reason: This candidate is a duplicate of CVE-2005-0706. Notes: All CVE users should reference CVE-2005-0706 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-03-23T10:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-0940 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0490. Reason: This candidate was inadvertently referenced in a vendor advisory due to a typo. Notes: All CVE users should reference CVE-2005-0490 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-02-28T10:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-1044 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0941. Reason: This candidate is a duplicate of CVE-2005-0941. Notes: All CVE users should reference CVE-2005-0941 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-04-12T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-1271 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1343. Reason: This candidate is a reservation duplicate of CVE-2005-1343. Notes: All CVE users should reference CVE-2005-1343 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-05-12T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-1277 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1766. Reason: This candidate is a duplicate of CVE-2005-1766. Notes: This duplicate occurred due to insufficient coordination across three separate parties. All CVE users should reference CVE-2005-1766 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-06-26T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-1334 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1579. Reason: This candidate is a duplicate of CVE-2005-1579. Notes: All CVE users should reference CVE-2005-1579 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-06-03T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-1690 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1250. Reason: This candidate is a duplicate of CVE-2005-1250. Notes: this duplicate occurred as a result of multiple independent discoveries and insufficient coordination by the vendor and CNA. All CVE users should reference CVE-2005-1250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-06-29T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-1912 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1841. Reason: This candidate is a duplicate of CVE-2005-1841. Notes: this duplicate occurred as a result of separate assignments by multiple CNAs, one to the researcher and one to the vendor. All CVE users should reference CVE-2005-1841 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-07-07T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-1938 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1250. Reason: This candidate is a duplicate of CVE-2005-1250. Notes: this duplicate occurred as a result of multiple independent discoveries and insufficient coordination by the vendor and CNA. All CVE users should reference CVE-2005-1250 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-06-29T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-2355 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2335, CVE-2005-2356. Reason: due to a typo in an advisory, this candidate was accidentally referenced. Notes: All CVE users should consult CVE-2005-2335 and CVE-2005-2356 to determine the appropriate identifier for the issue | N/A | N/A | 2005-07-25T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-2446 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2369. Reason: This candidate is a duplicate of CVE-2005-2369. Notes: All CVE users should reference CVE-2005-2369 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-08-03T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-2447 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2370. Reason: This candidate is a duplicate of CVE-2005-2370. Notes: All CVE users should reference CVE-2005-2370 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-08-03T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-2497 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2641. Reason: This candidate is a duplicate of CVE-2005-2641. Notes: All CVE users should reference CVE-2005-2641 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-10-07T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-2578 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2552. Reason: This candidate is a duplicate of CVE-2005-2552. Notes: All CVE users should reference CVE-2005-2552 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-08-16T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-2671 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2041. Reason: This candidate is a duplicate of CVE-2005-2041. Notes: All CVE users should reference CVE-2005-2041 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-08-23T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-2913 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2799. Reason: This candidate is a duplicate of CVE-2005-2799. Notes: All CVE users should reference CVE-2005-2799 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-09-14T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-3028 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2986. Reason: This candidate is a duplicate of CVE-2005-2986. Notes: All CVE users should reference CVE-2005-2986 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-09-21T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-3117 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3150. Reason: This candidate was privately assigned by a CNA to an issue, but the issue was published through separate channels and assigned a new identifier by the MITRE CNA, so it is a duplicate of CVE-2005-3150. Notes: All CVE users should reference CVE-2005-3150 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-10-06T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-3162 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3160. Reason: this candidate is a duplicate of CVE-2005-3160. Notes: All CVE users should reference CVE-2005-3160 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-10-06T08:00:00.000Z | 2005-11-02T15:00:00.000Z |
| CVE-2005-2965 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-4802, CVE-2005-4803. Reason: this candidate was intended for one issue, but the description and references inadvertently combined multiple issues. Notes: All CVE users should consult CVE-2005-4802 and CVE-2005-4803 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-10-11T08:00:00.000Z | 2005-11-04T15:00:00.000Z |
| CVE-2005-3122 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3424, CVE-2005-3425. Reason: this candidate was intended for one issue, but two different authoritative sources used it for two distinct issues. Notes: All CVE users should consult CVE-2005-3424 and CVE-2005-3425 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-10-31T01:00:00.000Z | 2005-11-04T15:00:00.000Z |
| CVE-2005-2937 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3663, CVE-2005-3664. Reason: this candidate was intended for one issue, but multiple advisories used this candidate for different issues. Notes: All CVE users should consult CVE-2005-3663 and CVE-2005-3664 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-10-11T08:00:00.000Z | 2005-11-18T15:00:00.000Z |
| CVE-2005-3542 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3508. Reason: This candidate is a reservation duplicate of CVE-2005-3508. Notes: All CVE users should reference CVE-2005-3508 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T12:37:00.000Z | 2005-11-22T15:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2002-2135 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1618. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.257 |
| fkie_cve-2002-2136 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1590. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.297 |
| fkie_cve-2002-2147 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1828. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.403 |
| fkie_cve-2002-2151 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1651. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.457 |
| fkie_cve-2002-2157 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1660. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.520 |
| fkie_cve-2002-2160 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1798. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.580 |
| fkie_cve-2002-2194 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1589. Reason: This candid… | 2002-12-31T05:00:00.000 | 2023-11-07T01:56:09.847 |
| fkie_cve-2002-2440 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.647 | 2023-11-07T01:56:11.690 |
| fkie_cve-2002-2441 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.723 | 2023-11-07T01:56:11.903 |
| fkie_cve-2002-2442 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.817 | 2023-11-07T01:56:12.113 |
| fkie_cve-2003-0090 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2000-0844. Reason: This candid… | 2003-12-15T05:00:00.000 | 2023-11-07T01:56:13.590 |
| fkie_cve-2003-0157 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0138. Reason: This candid… | 2003-03-24T05:00:00.000 | 2023-11-07T01:56:14.440 |
| fkie_cve-2003-0158 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0139. Reason: This candid… | 2003-03-24T05:00:00.000 | 2023-11-07T01:56:14.473 |
| fkie_cve-2003-0199 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.777 | 2023-11-07T01:56:15.040 |
| fkie_cve-2003-0200 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.807 | 2023-11-07T01:56:15.257 |
| fkie_cve-2003-0351 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0306. Reason: This candid… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:16.783 |
| fkie_cve-2003-0439 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.837 | 2023-11-07T01:56:17.367 |
| fkie_cve-2003-0463 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was w… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:17.870 |
| fkie_cve-2003-0568 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.853 | 2023-11-07T01:56:18.793 |
| fkie_cve-2003-0569 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.887 | 2023-11-07T01:56:19.007 |
| fkie_cve-2003-0570 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.900 | 2023-11-07T01:56:19.217 |
| fkie_cve-2003-0571 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.933 | 2023-11-07T01:56:19.427 |
| fkie_cve-2003-0582 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0504. Reason: This candid… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:19.753 |
| fkie_cve-2003-0591 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is a … | 2003-08-27T04:00:00.000 | 2023-11-07T01:56:19.833 |
| fkie_cve-2003-0598 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0657. Reason: This candid… | 2003-08-27T04:00:00.000 | 2023-11-07T01:56:19.903 |
| fkie_cve-2003-0678 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.963 | 2023-11-07T01:56:20.467 |
| fkie_cve-2003-0684 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.980 | 2023-11-07T01:56:20.740 |
| fkie_cve-2003-0687 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has b… | 2004-08-18T04:00:00.000 | 2023-11-07T01:56:20.970 |
| fkie_cve-2003-0691 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was w… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:21.030 |
| fkie_cve-2003-0698 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0743. Reason: This candid… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:21.120 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-2mhh-w6q8-5hxw |
|
Remote Memory Disclosure in ws | 2019-02-18T23:56:42Z | 2020-08-31T18:09:55Z |
| ghsa-77g4-36jp-5v3m |
|
Remote Memory Disclosure in bittorrent-dht | 2020-09-01T15:22:12Z | 2020-08-31T18:09:58Z |
| ghsa-vgrx-w6rg-8fqf |
|
Forgeable Public/Private Tokens in jwt-simple | 2018-11-06T23:12:07Z | 2020-08-31T18:10:20Z |
| ghsa-xg5r-8j97-2wrj |
|
Directory Traversal in restafary | 2019-02-18T23:39:22Z | 2020-08-31T18:10:25Z |
| ghsa-rhvc-x32h-5526 |
|
No CSRF Validation in droppy | 2019-02-18T23:39:32Z | 2020-08-31T18:10:30Z |
| ghsa-cgjx-mwpx-47jv |
|
Private Data Disclosure in express-restify-mongoose | 2018-10-23T17:14:57Z | 2020-08-31T18:10:32Z |
| ghsa-hjhr-r3gq-qvp6 |
|
Timing Attack in csrf-lite | 2019-02-18T23:39:44Z | 2020-08-31T18:10:37Z |
| ghsa-6cpc-mj5c-m9rq |
|
Arbitrary File Write in cli | 2019-02-18T23:40:03Z | 2020-08-31T18:10:40Z |
| ghsa-856x-cp3q-47vg |
|
Insecure Default Configuration in airbrake | 2019-02-18T23:58:13Z | 2020-08-31T18:10:42Z |
| ghsa-m5h6-hr3q-22h5 |
|
npm Token Leak in npm | 2018-07-31T22:58:35Z | 2020-08-31T18:10:47Z |
| ghsa-7mc5-chhp-fmc3 |
|
Regular Expression Denial of Service in negotiator | 2018-10-09T00:30:30Z | 2020-08-31T18:11:01Z |
| ghsa-2v7q-2xqx-f4q5 |
|
Potential SQL Injection in sequelize | 2019-02-18T23:54:32Z | 2020-08-31T18:11:09Z |
| ghsa-98pq-pmw9-4gpm |
|
SQL Injection in sequelize | 2019-02-18T23:54:34Z | 2020-08-31T18:11:11Z |
| ghsa-x2jc-pwfj-h9p3 |
|
SQL Injection in sequelize | 2019-02-18T23:54:28Z | 2020-08-31T18:11:14Z |
| ghsa-cgpp-wm2h-6hqx |
|
SQL Injection in waterline-sequel | 2019-02-18T23:54:28Z | 2020-08-31T18:11:18Z |
| ghsa-2r5h-gh4x-8hp9 |
|
Resources Downloaded over Insecure Protocol in igniteui | 2019-02-18T23:40:14Z | 2020-08-31T18:11:21Z |
| ghsa-6663-c963-2gqg |
|
DoS due to excessively large websocket message in ws | 2019-02-18T23:58:35Z | 2020-08-31T18:11:28Z |
| ghsa-84fv-prrc-5ggr |
|
Route Validation Bypass in call | 2019-02-18T23:40:04Z | 2020-08-31T18:11:30Z |
| ghsa-cgqv-x5cx-xvqh |
|
Arbitrary Code Injection in pouchdb | 2018-07-26T16:22:08Z | 2020-08-31T18:12:18Z |
| ghsa-4662-j96g-mv46 |
|
Arbitrary Code Injection in reduce-css-calc | 2018-06-07T19:43:06Z | 2020-08-31T18:12:20Z |
| ghsa-f7ph-p5rv-phw2 |
|
Cross-Site Scripting in nunjucks | 2018-11-06T23:13:37Z | 2020-08-31T18:12:27Z |
| ghsa-hf5h-hh56-3vrg |
|
Denial of Service in uws | 2020-09-01T16:02:29Z | 2020-08-31T18:12:32Z |
| ghsa-g3xp-v2ff-x5c3 |
|
Downloads Resources over HTTP in go-ipfs-dep | 2019-02-18T23:54:18Z | 2020-08-31T18:12:48Z |
| ghsa-mm7h-323r-9p4g |
|
Downloads Resources over HTTP in imageoptim | 2019-02-18T23:50:33Z | 2020-08-31T18:14:15Z |
| ghsa-5g4r-87v2-jqvx |
|
Downloads Resources over HTTP in apk-parser | 2020-09-01T16:05:44Z | 2020-08-31T18:14:17Z |
| ghsa-2wrq-wmqf-8vcc |
|
Downloads Resources over HTTP in operadriver | 2019-02-18T23:35:48Z | 2020-08-31T18:14:19Z |
| ghsa-fwx5-5fqj-jv98 |
|
Cross-Site Scripting in morris.js | 2018-11-09T17:46:30Z | 2020-08-31T18:18:39Z |
| ghsa-26q7-g57v-mxcp |
|
HTML Injection in shout | 2018-11-07T00:28:11Z | 2020-08-31T18:19:13Z |
| ghsa-3pwh-5mmc-mwrx |
|
Denial of Service in nes | 2018-07-24T20:06:33Z | 2020-08-31T18:19:35Z |
| ghsa-mj87-8xf8-fp4w |
|
Cross-Site Scripting in yui | 2020-09-01T16:42:51Z | 2020-08-31T18:19:38Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2020-11 |
|
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a… | ansible | 2020-03-12T18:15:00Z | 2020-05-29T14:09:00Z |
| pysec-2020-6 |
|
A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, whe… | ansible | 2020-03-03T22:15:00Z | 2020-05-29T14:11:00Z |
| pysec-2020-42 |
|
An issue was discovered in fastecdsa before 2.1.2. When using the NIST P-256 curve in the… | fastecdsa | 2020-06-02T21:15:00Z | 2020-06-03T13:47:00Z |
| pysec-2020-1 |
|
A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 … | ansible | 2020-05-11T14:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-10 |
|
A flaw was found in Ansible Engine when the module package or service is used and the par… | ansible | 2020-03-16T16:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-12 |
|
A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. … | ansible | 2020-03-16T16:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-5 |
|
A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.… | ansible | 2020-03-11T19:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-7 |
|
A flaw was found in the Ansible Engine when the fetch module is used. An attacker could i… | ansible | 2020-03-16T16:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-9 |
|
A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when u… | ansible | 2020-03-09T16:15:00Z | 2020-06-13T04:15:00Z |
| pysec-2020-35 |
|
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection … | django | 2020-02-03T12:15:00Z | 2020-06-19T03:15:00Z |
| pysec-2020-47 |
|
In Indy Node 1.12.2, there is an Uncontrolled Resource Consumption vulnerability. Indy No… | indy-node | 2020-06-11T00:15:00Z | 2020-06-22T16:36:00Z |
| pysec-2019-114 |
|
Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk une… | pyspark | 2019-08-07T17:15:00Z | 2020-06-23T00:15:00Z |
| pysec-2020-112 |
|
Tendenci 12.0.10 allows unrestricted deserialization in apps\helpdesk\views\staff.py. | tendenci | 2020-06-21T15:15:00Z | 2020-06-26T19:34:00Z |
| pysec-2020-37 |
|
In django-basic-auth-ip-whitelist before 0.3.4, a potential timing attack exists on websi… | django-basic-auth-ip-whitelist | 2020-06-24T13:15:00Z | 2020-07-09T14:11:00Z |
| pysec-2020-82 |
|
libImaging/SgiRleDecode.c in Pillow before 6.2.2 has an SGI buffer overflow. | pillow | 2020-01-03T01:15:00Z | 2020-07-10T17:06:00Z |
| pysec-2020-83 |
|
libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow. | pillow | 2020-01-03T01:15:00Z | 2020-07-10T17:09:00Z |
| pysec-2019-115 |
|
python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other cip… | python-gnupg | 2019-03-21T16:01:00Z | 2020-07-13T04:15:00Z |
| pysec-2020-63 |
|
OpenStack Manila <7.4.1, >=8.0.0 <8.1.1, and >=9.0.0 <9.1.1 allows attackers to view, upd… | manila | 2020-03-12T17:15:00Z | 2020-07-14T17:27:00Z |
| pysec-2020-36 |
|
Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection … | django | 2020-03-05T15:15:00Z | 2020-07-14T17:28:00Z |
| pysec-2020-39 |
|
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in… | django-two-factor-auth | 2020-07-10T21:15:00Z | 2020-07-21T18:06:00Z |
| pysec-2020-23 |
|
An issue was found in Apache Airflow versions 1.10.10 and below. A stored XSS vulnerabili… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-21T18:38:00Z |
| pysec-2020-17 |
|
An issue was found in Apache Airflow versions 1.10.10 and below. It was discovered that m… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-21T18:45:00Z |
| pysec-2020-14 |
|
An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command in… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-22T17:15:00Z |
| pysec-2020-51 |
|
In jupyterhub-kubespawner before 0.12, certain usernames will be able to craft particular… | jupyterhub-kubespawner | 2020-07-17T21:15:00Z | 2020-07-22T20:28:00Z |
| pysec-2020-15 |
|
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecuto… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-24T18:19:00Z |
| pysec-2020-16 |
|
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecuto… | apache-airflow | 2020-07-17T00:15:00Z | 2020-07-24T18:22:00Z |
| pysec-2019-117 |
|
ReportLab through 3.5.26 allows remote code execution because of toColor(eval(arg)) in co… | reportlab | 2019-10-16T12:15:00Z | 2020-07-27T03:15:00Z |
| pysec-2020-77 |
|
In libImaging/PcxDecode.c in Pillow before 7.1.0, an out-of-bounds read can occur when re… | pillow | 2020-06-25T19:15:00Z | 2020-07-27T19:15:00Z |
| pysec-2020-78 |
|
In Pillow before 7.1.0, there are two Buffer Overflows in libImaging/TiffDecode.c. | pillow | 2020-06-25T19:15:00Z | 2020-07-27T19:15:00Z |
| pysec-2020-79 |
|
In libImaging/Jpeg2KDecode.c in Pillow before 7.1.0, there are multiple out-of-bounds rea… | pillow | 2020-06-25T19:15:00Z | 2020-07-27T19:15:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2013-4562 | omniauth-facebook Gem for Ruby contains a flaw as HTTP requests do not require multiple s… | 2013-11-12T00:00:00.000Z |
| gsd-2013-4593 | omniauth-facebook Gem for Ruby contains a flaw that is due to the application supporting … | 2013-11-14T00:00:00.000Z |
| gsd-2013-6421 | sprout Gem for Ruby contains a flaw in the unpack_zip() function in archive_unpacker.rb. … | 2013-12-02T00:00:00.000Z |
| gsd-2013-4491 | There is a vulnerability in the internationalization component of Ruby on Rails. Under ce… | 2013-12-03T00:00:00.000Z |
| gsd-2013-4492 | The HTML exception message raised by I18n::MissingTranslation fails to escape the keys. | 2013-12-03T00:00:00.000Z |
| gsd-2013-6414 | There is a denial of service vulnerability in the header handling component of Action View. | 2013-12-03T00:00:00.000Z |
| gsd-2013-6415 | There is an XSS vulnerability in the number_to_currency helper in Ruby on Raile. The numb… | 2013-12-03T00:00:00.000Z |
| gsd-2013-6416 | There is a vulnerability in the simple_format helper in Ruby on Rails. The simple_format … | 2013-12-03T00:00:00.000Z |
| gsd-2013-6417 | The prior fix to CVE-2013-0155 was incomplete and the use of common 3rd party libraries c… | 2013-12-03T00:00:00.000Z |
| gsd-2013-7086 | Webbynode Gem for Ruby contains a flaw in notify.rb that is triggered when handling a spe… | 2013-12-12T00:00:00.000Z |
| gsd-2013-6460 | Nokogiri gem 1.5.x has Denial of Service via infinite loop when parsing XML documents | 2013-12-14T00:00:00.000Z |
| gsd-2013-6461 | Nokogiri gem 1.5.x and 1.6.x has DoS while parsing XML entities by failing to apply limits | 2013-12-14T00:00:00.000Z |
| gsd-2013-7111 | Bio Basespace SDK Gem for Ruby contains a flaw that is due to the API client code passing… | 2013-12-14T00:00:00.000Z |
| gsd-2013-7222 | Fat Free CRM contains a flaw that is due to the application defining a static security se… | 2013-12-24T00:00:00.000Z |
| gsd-2013-7223 | Fat Free CRM contains a flaw as the application is missing the protect_from_forgery state… | 2013-12-24T00:00:00.000Z |
| gsd-2013-7224 | Fat Free CRM contains a flaw in user controllers that is triggered as JSON requests are r… | 2013-12-24T00:00:00.000Z |
| gsd-2013-7225 | Fat Free CRM contains a flaw that may allow carrying out an SQL injection attack. The iss… | 2013-12-24T00:00:00.000Z |
| gsd-2013-7249 | Fat Free CRM contains a flaw that is triggered when the attacker sends a direct request f… | 2013-12-24T00:00:00.000Z |
| gsd-2014-1233 | paratrooper-pingdom Gem for Ruby contains a flaw in /lib/paratrooper-pingdom.rb. The issu… | 2013-12-26T00:00:00.000Z |
| gsd-2014-1234 | Paratrooper-newrelic Gem for Ruby contains a flaw in /lib/paratrooper-newrelic.rb. The is… | 2014-01-08T00:00:00.000Z |
| gsd-2014-0013 | In general, Ember.js escapes or strips any user-supplied content before inserting it in s… | 2014-01-14T00:00:00.000Z |
| gsd-2014-0014 | In general, Ember.js escapes or strips any user-supplied content before inserting it in s… | 2014-01-14T00:00:00.000Z |
| gsd-2014-1834 | Echor Gem for Ruby contains a flaw in backplane.rb in the perform_request function that i… | 2014-01-14T00:00:00.000Z |
| gsd-2014-1835 | echor Gem for Ruby contains a flaw that is due to the program exposing credential informa… | 2014-01-14T00:00:00.000Z |
| gsd-2014-1831 | Phusion Passenger before 4.0.37 allows local users to write to certain files and director… | 2014-01-28T00:00:00.000Z |
| gsd-2014-1832 | Phusion Passenger 4.0.37 allows local users to write to certain files and directories via… | 2014-01-29T00:00:00.000Z |
| gsd-2014-0046 | In general, Ember.js escapes or strips any user-supplied content before inserting it in s… | 2014-02-07T00:00:00.000Z |
| gsd-2014-0083 | The Ruby net-ldap gem before 0.11 uses a weak salt when generating SSHA passwords. | 2014-02-13T00:00:00.000Z |
| gsd-2014-0080 | SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgre… | 2014-02-18T00:00:00.000Z |
| gsd-2014-0081 | Multiple cross-site scripting (XSS) vulnerabilities in actionview/lib/action_view/helpers… | 2014-02-18T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-1214 | Malicious code in axp-utility-belt (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:22Z |
| mal-2022-4669 | Malicious code in mollie-design-system (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:22Z |
| mal-2022-7106 | Malicious code in website-404-error-page (npm) | 2022-05-19T08:37:21Z | 2022-05-19T08:37:22Z |
| mal-2022-1212 | Malicious code in axp-base (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:27Z |
| mal-2022-1213 | Malicious code in axp-shared-scripts (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:27Z |
| mal-2022-2377 | Malicious code in ddc-classnames-js (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| mal-2022-2378 | Malicious code in ddc-new-relic (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| mal-2022-2464 | Malicious code in dgse-tools-mgm-elf-helper (npm) | 2022-05-19T08:37:22Z | 2022-05-19T08:37:28Z |
| mal-2022-377 | Malicious code in @kibt/operation-track (npm) | 2022-05-23T10:22:10Z | 2022-05-23T10:22:10Z |
| mal-2022-378 | Malicious code in @kibt/weblogger (npm) | 2022-05-23T10:22:10Z | 2022-05-23T10:22:10Z |
| mal-2022-2022 | Malicious code in colors_express (npm) | 2022-05-31T11:55:20Z | 2022-05-31T11:55:21Z |
| mal-2022-2590 | Malicious code in dragox-utilities (npm) | 2022-05-31T12:53:57Z | 2022-05-31T12:53:57Z |
| mal-2022-391 | Malicious code in @logistics-frontend/client-core (npm) | 2022-05-31T12:55:54Z | 2022-05-31T12:55:55Z |
| mal-2022-392 | Malicious code in @logistics-frontend/core (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:55:55Z |
| mal-2022-393 | Malicious code in @logistics-frontend/hooks (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:55:55Z |
| mal-2022-396 | Malicious code in @logistics-frontend/polyfills (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:55:55Z |
| mal-2022-397 | Malicious code in @logistics-frontend/types (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:55:55Z |
| mal-2022-398 | Malicious code in @logistics-frontend/ui-old (npm) | 2022-05-31T12:55:54Z | 2022-05-31T12:55:55Z |
| mal-2022-399 | Malicious code in @logistics-frontend/utils (npm) | 2022-05-31T12:55:54Z | 2022-05-31T12:55:55Z |
| mal-2022-390 | Malicious code in @logistics-frontend/blocks (npm) | 2022-05-31T12:55:54Z | 2022-05-31T12:55:58Z |
| mal-2022-395 | Malicious code in @logistics-frontend/ndd (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:56:03Z |
| mal-2022-394 | Malicious code in @logistics-frontend/modules (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:56:04Z |
| mal-2022-6965 | Malicious code in volgactf (npm) | 2022-05-31T12:57:01Z | 2022-05-31T12:57:02Z |
| mal-2022-961 | Malicious code in amber-blocks (npm) | 2022-05-31T12:57:01Z | 2022-05-31T12:57:02Z |
| mal-2022-2180 | Malicious code in coolqueue.io (npm) | 2022-05-31T12:58:09Z | 2022-05-31T12:58:09Z |
| mal-2022-5680 | Malicious code in react-video-live-demo (npm) | 2022-05-31T12:58:09Z | 2022-05-31T12:58:10Z |
| mal-2022-666 | Malicious code in @tr-digital/react-rehydrate (npm) | 2022-05-31T12:58:42Z | 2022-05-31T12:58:42Z |
| mal-2022-5069 | Malicious code in oms-js-utils (npm) | 2022-05-31T13:00:08Z | 2022-05-31T13:00:09Z |
| mal-2022-5070 | Malicious code in oms-sentry (npm) | 2022-05-31T13:00:08Z | 2022-05-31T13:00:09Z |
| mal-2022-5942 | Malicious code in sb1-adobe-analytics (npm) | 2022-05-31T13:00:07Z | 2022-05-31T13:00:09Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-django-2022-41323 | 2024-03-06T10:52:25.371Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2023-23969 | 2024-03-06T10:52:12.389Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2023-24580 | 2024-03-06T10:52:03.082Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2023-31047 | 2024-03-06T10:51:52.986Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2023-46695 | 2024-03-06T10:51:16.068Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2024-53907 | 2025-03-10T08:13:36.167Z | 2025-04-03T14:40:37.652Z | |
| bit-django-2024-53908 | 2025-03-10T08:13:29.171Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13662 | 2024-03-06T10:58:54.899Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13663 | 2024-03-06T10:58:43.895Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13664 | 2024-03-06T10:58:34.293Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13665 | 2024-03-06T10:58:25.802Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13666 | 2024-03-06T10:58:14.593Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13667 | 2024-03-06T10:58:01.865Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13669 | 2024-03-06T10:57:40.474Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13670 | 2024-03-06T10:57:29.673Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13672 | 2024-03-06T10:57:10.585Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13674 | 2024-03-06T10:56:59.186Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13675 | 2024-03-06T10:56:51.003Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13676 | 2024-03-06T10:56:40.705Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13677 | 2024-03-06T10:56:30.677Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-13688 | 2024-03-06T10:56:19.474Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-28948 | 2024-03-06T10:56:10.686Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2020-9281 | 2024-03-06T10:55:38.980Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2021-33829 | 2024-03-06T10:55:26.487Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-25270 | 2024-03-06T10:53:49.081Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-25271 | 2024-03-06T10:53:39.007Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-25273 | 2024-03-06T10:53:28.666Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-25274 | 2024-03-06T10:53:18.690Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-25275 | 2024-03-06T10:53:08.904Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-25276 | 2024-03-06T10:52:55.802Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ol25917 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:44:22.881508Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ol60454 | Within HostnameError | 2026-01-30T14:52:23.086717Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-on38469 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:37:25.667594Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oo14630 | tar | 2026-01-30T14:47:23.043882Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-oo42606 | Cancelling a query (e | 2026-01-30T15:00:52.876848Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pb78859 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T17:25:56.763674Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pc16040 | Within HostnameError | 2026-01-30T15:37:23.991168Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pd17156 | Cancelling a query (e | 2026-01-30T15:00:22.872625Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pg91940 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T15:31:24.365282Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ph90623 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T14:49:52.682724Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk62208 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:20:55.127319Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pk92575 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T14:35:52.456913Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-po40318 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:31:53.772564Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pt11267 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:22:25.604414Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-py85990 | tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing | 2026-01-30T14:07:50.722290Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pz62650 | Cancelling a query (e | 2026-01-30T16:41:55.453512Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qd78411 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:36:25.408698Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qe58701 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:22:55.193625Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qj89068 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:34:54.378061Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qk01721 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:32:54.211133Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qw16951 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:48:54.464404Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rb28539 | Within HostnameError | 2026-01-30T14:43:52.571458Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rd08428 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:17:23.554517Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rj88561 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:53.732429Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rl45001 | tar | 2026-01-30T15:01:22.967754Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rq53330 | Within HostnameError | 2026-01-30T15:17:53.658995Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rt10702 | Within HostnameError | 2026-01-30T16:30:25.697056Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ru37859 | Cancelling a query (e | 2026-01-30T15:39:24.210234Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rw65075 | Within HostnameError | 2026-01-30T15:35:53.815887Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rx06615 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T15:45:24.056160Z | 2026-01-29T18:58:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2021-028 | 2021-09-15T15:28:04.000Z | 2023-08-11T17:02:11.000Z | |
| drupal-contrib-2021-029 | 2021-09-15T15:30:15.000Z | 2023-08-11T17:03:09.000Z | |
| drupal-contrib-2021-030 | 2021-09-22T16:43:17.000Z | 2023-08-11T17:03:36.000Z | |
| drupal-contrib-2021-031 | 2021-09-22T16:49:24.000Z | 2023-08-11T17:04:21.000Z | |
| drupal-contrib-2021-032 | 2021-09-22T16:51:57.000Z | 2023-08-11T17:04:59.000Z | |
| drupal-contrib-2021-033 | 2021-09-22T16:55:24.000Z | 2023-08-11T17:05:59.000Z | |
| drupal-contrib-2021-013 | 2021-06-02T16:56:19.000Z | 2023-08-11T17:07:00.000Z | |
| drupal-contrib-2021-014 | 2021-06-02T16:59:12.000Z | 2023-08-11T17:07:36.000Z | |
| drupal-contrib-2021-015 | 2021-06-16T15:58:47.000Z | 2023-08-11T17:08:06.000Z | |
| drupal-contrib-2021-016 | 2021-06-16T16:05:14.000Z | 2023-08-11T17:08:37.000Z | |
| drupal-contrib-2021-017 | 2021-06-16T16:15:21.000Z | 2023-08-11T17:09:04.000Z | |
| drupal-contrib-2021-018 | 2021-06-23T16:47:59.000Z | 2023-08-11T17:09:57.000Z | |
| drupal-contrib-2021-019 | 2021-06-23T16:51:26.000Z | 2023-08-11T17:10:31.000Z | |
| drupal-contrib-2021-020 | 2021-06-30T16:39:06.000Z | 2023-08-11T17:11:13.000Z | |
| drupal-contrib-2021-021 | 2021-06-30T16:43:19.000Z | 2023-08-11T17:11:42.000Z | |
| drupal-contrib-2021-022 | 2021-06-30T16:46:21.000Z | 2023-08-11T17:12:21.000Z | |
| drupal-contrib-2021-003 | 2021-01-27T17:53:09.000Z | 2023-08-11T17:13:06.000Z | |
| drupal-contrib-2021-004 | 2021-03-03T16:49:33.000Z | 2023-08-11T17:15:22.000Z | |
| drupal-contrib-2021-005 | 2021-03-17T18:36:07.000Z | 2023-08-11T17:15:48.000Z | |
| drupal-contrib-2021-006 | 2021-04-28T16:47:09.000Z | 2023-08-11T17:16:38.000Z | |
| drupal-contrib-2021-007 | 2021-05-12T16:08:34.000Z | 2023-08-11T17:17:34.000Z | |
| drupal-contrib-2021-008 | 2021-05-12T16:14:35.000Z | 2023-08-11T17:17:58.000Z | |
| drupal-contrib-2021-009 | 2021-05-12T16:23:23.000Z | 2023-08-11T17:18:42.000Z | |
| drupal-contrib-2021-010 | 2021-06-02T16:49:49.000Z | 2023-08-11T17:21:33.000Z | |
| drupal-contrib-2021-011 | 2021-06-02T16:51:10.000Z | 2023-08-11T17:22:44.000Z | |
| drupal-contrib-2021-001 | 2021-01-27T17:17:43.000Z | 2023-08-11T17:24:49.000Z | |
| drupal-contrib-2021-002 | 2021-01-27T17:27:57.000Z | 2023-08-11T17:25:36.000Z | |
| drupal-contrib-2020-033 | 2020-08-05T20:05:36.000Z | 2023-08-11T17:31:14.000Z | |
| drupal-contrib-2020-032 | 2020-08-05T15:47:56.000Z | 2023-08-11T17:31:20.000Z | |
| drupal-contrib-2020-034 | 2020-10-14T14:38:16.000Z | 2023-08-11T17:32:53.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2006-000392 | Ruby contains a vulnerability that prevents safe level 4 from functioning as a sandbox. | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000540 | Microsoft Windows Indexing Service cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000599 | Nagasaki Electronic Prefectural Office System vulnerable to bypass authentication | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000600 | Nagasaki Electronic Prefectural Office System authentication information vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000601 | Eudora Japanese version stops working after the application crashes | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000602 | Multiple email clients vulnerable in handling an attachement inapropriately | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000603 | Hatena Toolbar sends URL information unecnrypted | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000604 | Nagasaki Electronic Prefectural Office System SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000605 | Hyper NIKKI System allows unauthorized email submission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000606 | Minnu's filer2 vulnerable in allowing arbitrary Ruby script execution | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000609 | CAFEMILK Shopping Cart CGI cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000610 | QUICK CART OS command injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000611 | QUICK CART cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000612 | FreeStyleWiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000613 | Trac cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000614 | Winny buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000615 | Apache Struts Validator allows to bypass input data validation | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000616 | DonutP and UnDonut confirmation dialog display vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000617 | Multiple email clients vulnerable to directory traversal due to inappropriate unicode handling | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000619 | MyWeb SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000620 | RWiki arbitrary Ruby script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000621 | RWiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000622 | dotProject cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000623 | Joomla! cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000624 | CGI RESCUE WebFORM allows unauthorized email transmission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000625 | CGI RESCUE WebFORM allows unauthorized email transmission | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000626 | dotProject cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000627 | Phorum cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000628 | Wiki clone products vulnerable to denial of service attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000629 | Wiki clone products vulnerable to denial of service attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00025 | Maxthon Cloud Browser application 地址栏欺骗漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00026 | WordPress插件IP Ban存在多个跨站请求伪造漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00027 | Huawei eSpace Desktop V100R001C03拒绝服务漏洞(CNVD-2015-00027) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00028 | Huawei eSpace Desktop V200R003C00存在多个不可信搜索路径漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00029 | Huawei eSpace Desktop V100R001C03拒绝服务漏洞(CNVD-2015-00029) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00030 | Huawei eSpace Desktop V200R001C03拒绝服务漏洞(CNVD-2015-00030) | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00031 | LibreSSL双重释放漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00032 | IBM Rational AppScan Source信息泄露漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00033 | IBM WebSphere Service Registry and Repository预期访问限制绕过漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00034 | IBM Security Identity Manager跨站请求伪造漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00035 | Tribal Tribiq CMS路径泄露漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00036 | WhatsApp Non-Printable字符串处理拒绝服务漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00037 | Microsoft Windows 'AhcVerifyAdminContext'本地权限提升漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00038 | RubyGems Doorkeeper跨站请求伪造漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00039 | DBMail 'dm_db.c' CRAM-MD5验证绕过漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00040 | Info-ZIP UnZip越界拒绝服务漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00041 | Serendipity HTML注入漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00042 | Libmspack 'qtmd.c'无限循环拒绝服务漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00061 | libssh双重释放漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00043 | VideoLAN VLC media player堆缓冲区溢出漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00044 | VideoLAN VLC Media Player栈缓冲区溢出漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00045 | VideoLAN VLC Media Player缓冲区溢出漏洞(CNVD-2015-00045) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00046 | VideoLAN VLC media player拒绝服务漏洞(CNVD-2015-00046) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00047 | VideoLAN VLC Media Player缓冲区溢出漏洞(CNVD-2015-00047) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00048 | VideoLAN VLC media player缓冲区溢出漏洞(CNVD-2015-00048) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00049 | Facebook HipHop Virtual Machine CRLF注入漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00050 | Facebook HipHop Virtual Machine预期访问限制绕过漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00051 | Facebook HipHop Virtual Machine crypgraphic保护机制绕过漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00053 | Facebook HipHop Virtual Machine信息泄露漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00054 | DFLabs PTK跨站请求伪造漏洞 | 2015-01-04 | 2015-01-06 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2014-00111 | Уязвимость операционной системы Linux, позволяющая злоумышленнику повысить свои привилегии | 05.07.2016 | 28.11.2016 |
| bdu:2014-00115 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00116 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00126 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00145 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику внедрить произвольный веб-с… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00148 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00151 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00152 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00156 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00168 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00175 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику подменить URL-адреса | 05.07.2016 | 28.11.2016 |
| bdu:2014-00181 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00187 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00200 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00209 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00222 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику выполнить произволь… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00223 | Уязвимость операционной системы Cisco IOS, позволяющая злоумышленнику установить сетевое … | 05.07.2016 | 28.11.2016 |
| bdu:2014-00224 | Уязвимость операционной системы Cisco IOS, позволяющая удалённому злоумышленнику вызвать … | 05.07.2016 | 28.11.2016 |
| bdu:2014-00225 | Уязвимость операционной системы Cisco IOS, позволяющая удалённому злоумышленнику вызвать … | 05.07.2016 | 28.11.2016 |
| bdu:2014-00227 | Уязвимость антивирусном средстве Dr.Web Enterprise Security Suite, позволяющая злоумышлен… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00229 | Уязвимость браузера Firefox ESR, позволяющая локальным пользователям повысить уровень сво… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00230 | Уязвимость почтового клиента Thunderbird, позволяющая локальным пользователям повысить ур… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00231 | Уязвимость пакета программ Mozilla SeaMonkey, позволяющая локальным пользователям повысит… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00235 | Уязвимость браузера Firefox ESR, позволяющая злоумышленнику получить доступ к аутентифика… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00236 | Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику получить доступ к ау… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00237 | Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику получить доступ … | 05.07.2016 | 28.11.2016 |
| bdu:2014-00238 | Уязвимость браузера Firefox, позволяющая злоумышленнику вызывать непреднамеренный запуск … | 05.07.2016 | 28.11.2016 |
| bdu:2014-00239 | Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику вызывать непредн… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00243 | Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику получить доступ к ко… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00244 | Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику получить доступ … | 05.07.2016 | 28.11.2016 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2000-avi-092 | Vulnérabilités de Solaris | 2000-12-20T00:00:00.000000 | 2000-12-20T00:00:00.000000 |
| certa-2000-avi-093 | Vulnérabilité sous Microsoft IIS (Extensions FrontPage) | 2000-12-28T00:00:00.000000 | 2000-12-28T00:00:00.000000 |
| certa-2001-avi-001 | Vulnérabilité de Lotus Domino 5 | 2001-01-12T00:00:00.000000 | 2001-01-12T00:00:00.000000 |
| certa-2001-avi-002 | Vulnérabilité de l'authentification NTLM sous Windows | 2001-01-12T00:00:00.000000 | 2001-01-12T00:00:00.000000 |
| certa-2001-avi-003 | Accès privilégié oublié dans le code de Interbase Server de Borland | 2001-01-12T00:00:00.000000 | 2001-01-12T00:00:00.000000 |
| certa-2001-avi-004 | Vulnérabilité dans ARP sous SunOS | 2001-01-15T00:00:00.000000 | 2001-01-15T00:00:00.000000 |
| certa-2001-avi-005 | Vulnérabilité du système d'internationalisation sous SGI Irix. | 2001-01-19T00:00:00.000000 | 2001-01-19T00:00:00.000000 |
| certa-2001-avi-006 | Vulnérabilité sous Microsoft Power Point 2000 | 2001-01-24T00:00:00.000000 | 2001-01-24T00:00:00.000000 |
| certa-2001-avi-007 | Mise à jour de Wu-FTPd | 2001-01-24T00:00:00.000000 | 2001-01-24T00:00:00.000000 |
| certa-2001-avi-008 | Vulnérabilité sous Lotus Notes (Domino 5) | 2001-01-25T00:00:00.000000 | 2001-01-25T00:00:00.000000 |
| certa-2001-avi-009 | Vulnérabilité dans les permissions d'accès sous Windows NT 4 | 2001-01-30T00:00:00.000000 | 2001-01-30T00:00:00.000000 |
| certa-2001-avi-011 | Vulnérabilités de MySQL 3.23.31 et du module PHP d'apache sous Linux | 2001-01-31T00:00:00.000000 | 2001-01-31T00:00:00.000000 |
| certa-2001-avi-012 | Vulnérabilité dans le protocole RDP sous Windows 2000 | 2001-02-01T00:00:00.000000 | 2001-02-01T00:00:00.000000 |
| certa-2001-avi-013 | Vulnérabilités sur les commutateurs CISCO série CSS | 2001-02-05T00:00:00.000000 | 2001-02-05T00:00:00.000000 |
| certa-2001-avi-014 | Vulnérabilité de l'agent NDDE de Microsoft Windows | 2001-02-07T00:00:00.000000 | 2001-02-07T00:00:00.000000 |
| certa-2001-avi-015 | Vulnérabilité de Windows NT 4 dans l'authentification NTLM | 2001-02-08T00:00:00.000000 | 2001-02-08T00:00:00.000000 |
| certa-2001-avi-016 | Vulnérabilité des logiciels d'administration à distance de Compaq | 2001-02-12T00:00:00.000000 | 2001-02-12T00:00:00.000000 |
| certa-2001-avi-017 | Vulnérabilité de SSH | 2001-02-12T00:00:00.000000 | 2001-02-12T00:00:00.000000 |
| certa-2001-avi-018 | Vulnérabilité sous Windows NT 4 dans le protocole PPTP | 2001-02-14T00:00:00.000000 | 2001-02-14T00:00:00.000000 |
| certa-2001-avi-019 | Vulnérabilité de Vixie-cron sous Unix | 2001-02-21T00:00:00.000000 | 2001-02-21T00:00:00.000000 |
| certa-2001-avi-020 | Vulnérabilité dans le contrôleur de domaine de Windows 2000 Server | 2001-02-21T00:00:00.000000 | 2001-02-21T00:00:00.000000 |
| certa-2001-avi-021 | Vulnérabilité sous Microsoft Outlook et Outlook Express | 2001-02-23T00:00:00.000000 | 2001-02-23T00:00:00.000000 |
| certa-2001-avi-022 | Vulnérabilité dans le <SPAN class= "textit">Java Runtime Environment</SPAN> (JRE) de Sun | 2001-02-27T00:00:00.000000 | 2001-02-27T00:00:00.000000 |
| certa-2001-avi-023 | Dépassement de mémoire dans l'observateur d'événements de Windows 2000 | 2001-02-28T00:00:00.000000 | 2001-02-28T00:00:00.000000 |
| certa-2001-avi-024 | Vulnérabilité dans la gestion des clients sous Lotus Notes | 2001-03-01T00:00:00.000000 | 2001-03-01T00:00:00.000000 |
| certa-2001-avi-025 | Vulnérabilité d'Internet Information Server 5.0 et Exchange 2000 | 2001-03-02T00:00:00.000000 | 2001-03-02T00:00:00.000000 |
| certa-2001-avi-026 | Vulnérabilités dans les commutateurs CISCO IOS | 2001-03-05T00:00:00.000000 | 2001-03-05T00:00:00.000000 |
| certa-2001-avi-027 | Vulnérabilités d'Internet Explorer et de Windows Scripting Host | 2001-03-07T00:00:00.000000 | 2001-03-07T00:00:00.000000 |
| certa-2001-avi-028 | vulnérabilité de sudo sous Linux Debian | 2001-03-08T00:00:00.000000 | 2001-03-08T00:00:00.000000 |
| certa-2001-avi-029 | Vulnérabilité de Microsoft Internet Information Serveur 5.0 | 2001-03-09T00:00:00.000000 | 2001-03-09T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2006-ale-014 | Vulnérabilités dans Microsoft Word | 2006-12-06T00:00:00.000000 | 2007-02-14T00:00:00.000000 |
| certa-2006-ale-013 | Vulnérabilité de MacOS X | 2006-11-23T00:00:00.000000 | 2007-02-16T00:00:00.000000 |
| certa-2007-ale-002 | Vulnérabilité dans Windows | 2007-01-12T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2007-ale-008 | Vulnérabilité dans Mirosoft Windows | 2007-03-29T00:00:00.000000 | 2007-04-03T00:00:00.000000 |
| certa-2007-ale-009 | Vulnérabilité dans BrightStor ARCServe Backup | 2007-03-30T00:00:00.000000 | 2007-04-27T00:00:00.000000 |
| certa-2007-ale-006 | Vulnérabilité dans le logiciel Microsoft Word | 2007-02-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| certa-2007-ale-010 | Vulnérabilité de Microsoft DNS Server | 2007-04-16T00:00:00.000000 | 2007-05-09T00:00:00.000000 |
| certa-2007-ale-012 | Multiples vulnérabilités dans Mozilla Firefox | 2007-06-06T00:00:00.000000 | 2007-07-18T00:00:00.000000 |
| certa-2007-ale-013 | Vulnérabilité dans Mozilla Firefox | 2007-07-27T00:00:00.000000 | 2007-07-31T00:00:00.000000 |
| certa-2007-ale-014 | Vulnérabilité dans Apple QuickTime | 2007-09-13T00:00:00.000000 | 2007-10-12T00:00:00.000000 |
| certa-2007-ale-015 | Vulnérabilité dans le traitement des URI sous Windows | 2007-10-10T00:00:00.000000 | 2007-11-14T00:00:00.000000 |
| certa-2007-ale-016 | Vulnérabilité d'Oracle 10g | 2007-11-16T00:00:00.000000 | 2007-11-16T00:00:00.000000 |
| certa-2007-ale-017 | Vulnérabilité dans la gestion RTSP d'Apple QuickTime | 2007-11-27T00:00:00.000000 | 2007-12-14T00:00:00.000000 |
| certa-2008-ale-001 | Vulnérabilité dans Apple QuickTime | 2008-01-11T00:00:00.000000 | 2008-02-07T00:00:00.000000 |
| certa-2008-ale-002 | Vulnérabilité dans Joomla! | 2008-01-14T00:00:00.000000 | 2008-02-25T00:00:00.000000 |
| certa-2008-ale-003 | Vulnérabilité dans Excel | 2008-01-16T00:00:00.000000 | 2008-03-12T00:00:00.000000 |
| certa-2008-ale-004 | Vulnérabilité dans VMware | 2008-02-27T00:00:00.000000 | 2008-04-16T00:00:00.000000 |
| certa-2008-ale-005 | Vulnérabilité dans Microsoft Jet Database Engine | 2008-03-25T00:00:00.000000 | 2008-05-14T00:00:00.000000 |
| certa-2008-ale-007 | Multiples vulnérabilités dans Apple iCal | 2008-05-23T00:00:00.000000 | 2008-05-29T00:00:00.000000 |
| certa-2008-ale-008 | Vulnérabilité du navigateur Safari | 2008-06-02T00:00:00.000000 | 2008-06-20T00:00:00.000000 |
| certa-2008-ale-011 | Vulnérabilité dans Oracle BEA WebLogic Server | 2008-07-24T00:00:00.000000 | 2008-08-08T00:00:00.000000 |
| certa-2008-ale-009 | Vulnérabilité dans Microsoft Access Snapshot Viewer | 2008-07-08T00:00:00.000000 | 2008-08-13T00:00:00.000000 |
| certa-2008-ale-010 | Vulnérabilité dans Microsoft Word | 2008-07-09T00:00:00.000000 | 2008-08-13T00:00:00.000000 |
| certa-2007-ale-005 | Vulnérabilité de Sun Solaris | 2007-02-12T00:00:00.000000 | 2008-09-18T00:00:00.000000 |
| certa-2006-ale-012 | Vulnérabilité de Microsoft PowerPoint | 2006-10-13T00:00:00.000000 | 2008-10-09T00:00:00.000000 |
| certa-2007-ale-007 | Vulnérabilité de Microsoft Windows Explorer | 2007-03-09T00:00:00.000000 | 2008-10-09T00:00:00.000000 |
| certa-2008-ale-016 | Vulnérabilité dans Microsoft Internet Explorer | 2008-12-10T00:00:00.000000 | 2008-12-17T00:00:00.000000 |
| certa-2008-ale-014 | Vulnérabilité dans Opera | 2008-11-20T00:00:00.000000 | 2009-01-06T00:00:00.000000 |
| certa-2008-ale-017 | Vulnérabilité dans Microsoft SQL Server | 2008-12-12T00:00:00.000000 | 2009-02-11T00:00:00.000000 |
| certa-2009-ale-001 | Vulnérabilité dans l'interprétation JBIG2 des produits Adobe | 2009-02-20T00:00:00.000000 | 2009-03-20T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2022-12 | Heap-buffer-overflow in print_mac | 2022-01-06T00:02:06.880603Z | 2022-04-13T03:04:31.155422Z |
| osv-2021-929 | Heap-buffer-overflow in extract_name | 2021-07-08T00:00:32.006993Z | 2022-04-13T03:04:31.161444Z |
| osv-2021-924 | Heap-buffer-overflow in check_bad_address | 2021-07-08T00:00:12.086205Z | 2022-04-13T03:04:31.167687Z |
| osv-2021-931 | Heap-buffer-overflow in extract_name | 2021-07-08T00:00:46.211999Z | 2022-04-13T03:04:31.173917Z |
| osv-2022-145 | Heap-buffer-overflow in print_mac | 2022-02-13T00:01:27.883603Z | 2022-04-13T03:04:31.179893Z |
| osv-2022-11 | Heap-buffer-overflow in dhcp_reply | 2022-01-06T00:01:04.470937Z | 2022-04-13T03:04:31.185616Z |
| osv-2022-10 | Heap-buffer-overflow in check_bad_address | 2022-01-06T00:00:44.554417Z | 2022-04-13T03:04:31.191964Z |
| osv-2021-932 | Heap-buffer-overflow in resize_packet | 2021-07-08T00:01:25.139349Z | 2022-04-13T03:04:31.204327Z |
| osv-2018-291 | Use-of-uninitialized-value in pdf_lex | 2021-01-15T00:00:24.146243Z | 2022-04-13T03:04:31.210625Z |
| osv-2018-245 | Use-of-uninitialized-value in fz_keep_imp | 2021-01-15T00:00:05.471739Z | 2022-04-13T03:04:31.216503Z |
| osv-2018-384 | Use-of-uninitialized-value in template_affine_N_lerp | 2021-01-15T00:01:07.085645Z | 2022-04-13T03:04:31.222473Z |
| osv-2018-300 | Use-of-uninitialized-value in fz_unpack_tile | 2021-01-15T00:00:27.081384Z | 2022-04-13T03:04:31.228288Z |
| osv-2018-332 | UNKNOWN READ in template_affine_color_N_lerp | 2021-01-15T00:00:42.303176Z | 2022-04-13T03:04:31.234198Z |
| osv-2018-446 | Use-of-uninitialized-value in fz_drop_key_storable | 2021-01-15T00:01:21.873280Z | 2022-04-13T03:04:31.240055Z |
| osv-2018-441 | Stack-buffer-underflow in ps_index | 2021-01-15T00:01:20.656220Z | 2022-04-13T03:04:31.245426Z |
| osv-2018-247 | Heap-use-after-free in fz_drop_key_storable | 2021-01-15T00:00:06.141074Z | 2022-04-13T03:04:31.250683Z |
| osv-2018-451 | Use-of-uninitialized-value in jbig2_huffman_get | 2021-01-15T00:01:23.287241Z | 2022-04-13T03:04:31.255933Z |
| osv-2018-454 | Use-of-uninitialized-value in fz_expand_indexed_pixmap | 2021-01-15T00:01:24.322934Z | 2022-04-13T03:04:31.261326Z |
| osv-2018-347 | Heap-use-after-free in fz_drop_key_storable | 2021-01-15T00:00:48.480542Z | 2022-04-13T03:04:31.266953Z |
| osv-2018-237 | Use-of-uninitialized-value in sfnt_open_font | 2021-01-15T00:00:03.611036Z | 2022-04-13T03:04:31.272413Z |
| osv-2018-310 | Use-of-uninitialized-value in jbig2_arith_decode | 2021-01-15T00:00:34.416235Z | 2022-04-13T03:04:31.278175Z |
| osv-2021-212 | Heap-buffer-overflow in pdf_get_xref_entry | 2021-01-20T00:00:22.336840Z | 2022-04-13T03:04:31.283755Z |
| osv-2018-413 | Use-of-uninitialized-value in fz_adjust_ft_glyph_width | 2021-01-15T00:01:14.634126Z | 2022-04-13T03:04:31.289112Z |
| osv-2018-358 | Use-of-uninitialized-value in jbig2_arith_bytein | 2021-01-15T00:00:54.170412Z | 2022-04-13T03:04:31.294694Z |
| osv-2018-368 | Use-of-uninitialized-value in evict | 2021-01-15T00:00:59.648020Z | 2022-04-13T03:04:31.299932Z |
| osv-2018-448 | Use-of-uninitialized-value in CachedXFORM4to3 | 2021-01-15T00:01:22.087409Z | 2022-04-13T03:04:31.305468Z |
| osv-2018-288 | Use-of-uninitialized-value in jbig2_decode_symbol_dict | 2021-01-15T00:00:23.679341Z | 2022-04-13T03:04:31.311022Z |
| osv-2018-414 | Use-of-uninitialized-value in jbig2_immediate_generic_region | 2021-01-15T00:01:14.704723Z | 2022-04-13T03:04:31.316179Z |
| osv-2018-255 | Heap-use-after-free in add_range | 2021-01-15T00:00:09.207387Z | 2022-04-13T03:04:31.321155Z |
| osv-2018-459 | Use-of-uninitialized-value in lex_white | 2021-01-15T00:01:26.113650Z | 2022-04-13T03:04:31.326252Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2022-0058 | Library exclusively intended to inject UB into safe Rust. | 2022-09-28T12:00:00Z | 2022-10-11T10:32:22Z |
| rustsec-2022-0060 | orbtk is Unmaintained | 2022-10-13T12:00:00Z | 2022-10-19T01:14:12Z |
| rustsec-2022-0061 | Crate `parity-wasm` deprecated by the author | 2022-10-01T12:00:00Z | 2022-10-23T11:05:06Z |
| rustsec-2022-0066 | Denial of Service from unchecked request length | 2022-10-30T12:00:00Z | 2022-11-02T22:38:38Z |
| rustsec-2019-0024 | Test advisory with associated example crate | 2019-10-08T12:00:00Z | 2022-11-05T17:45:24Z |
| rustsec-2022-0068 | out-of-bounds read possible when setting list-of-pointers | 2022-11-30T12:00:00Z | 2022-11-30T22:16:39Z |
| rustsec-2022-0071 | Rusoto is unmaintained | 2022-04-24T12:00:00Z | 2022-12-18T12:08:00Z |
| rustsec-2022-0073 | crate has been renamed to `embedded-alloc` | 2022-12-21T12:00:00Z | 2022-12-23T16:46:57Z |
| rustsec-2022-0075 | Bug in pooling instance allocator | 2022-11-10T12:00:00Z | 2023-01-14T00:56:30Z |
| rustsec-2022-0080 | parity-util-mem Unmaintained | 2022-11-30T12:00:00Z | 2023-01-16T09:26:23Z |
| rustsec-2023-0003 | git2 does not verify SSH keys by default | 2023-01-20T12:00:00Z | 2023-01-20T23:06:55Z |
| rustsec-2020-0166 | personnummer Input validation error | 2020-09-04T12:00:00Z | 2023-02-02T10:57:52Z |
| rustsec-2022-0083 | evm incorrect state transition | 2022-10-25T12:00:00Z | 2023-02-02T11:20:42Z |
| rustsec-2022-0084 | libp2p Lack of resource management DoS | 2022-07-12T12:00:00Z | 2023-02-02T11:22:51Z |
| rustsec-2022-0085 | matrix-sdk Impersonation of room keys | 2022-09-29T12:00:00Z | 2023-02-02T11:35:31Z |
| rustsec-2022-0086 | Slack OAuth Secrets leak in debug logs | 2022-07-22T12:00:00Z | 2023-02-02T11:43:48Z |
| rustsec-2022-0087 | Slack Webhooks secrets leak in debug logs | 2022-10-10T12:00:00Z | 2023-02-02T11:45:24Z |
| rustsec-2022-0077 | `claim` is Unmaintained | 2022-12-04T12:00:00Z | 2023-02-04T10:58:43Z |
| rustsec-2023-0004 | bzip2 Denial of Service (DoS) | 2023-01-09T12:00:00Z | 2023-02-04T13:29:07Z |
| rustsec-2022-0088 | `tauri`'s `readDir` endpoint allows possible enumeration outside of filesystem scope | 2022-08-07T12:00:00Z | 2023-02-05T18:48:17Z |
| rustsec-2022-0089 | `aliyun-oss-client` secret exposure | 2022-11-19T12:00:00Z | 2023-02-07T22:07:40Z |
| rustsec-2021-0136 | `sass-rs` has been deprecated | 2021-04-07T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2021-0140 | rusttype is Unmaintained | 2021-04-01T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2021-0146 | Crate `twoway` deprecated by the author | 2021-05-20T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2022-0053 | mapr is Unmaintained | 2022-08-24T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2022-0057 | badge is Unmaintained | 2022-08-31T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2023-0001 | reject_remote_clients Configuration corruption | 2023-01-04T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2023-0002 | git2 Rust package suppresses ssh host key checking | 2023-01-12T12:00:00Z | 2023-02-09T03:11:29Z |
| rustsec-2022-0091 | `tauri` filesystem scope partial bypass | 2022-09-19T12:00:00Z | 2023-02-25T15:16:50Z |
| rustsec-2023-0018 | Race Condition Enabling Link Following and Time-of-check Time-of-use (TOCTOU) | 2023-02-24T12:00:00Z | 2023-03-04T21:50:30Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2020:4643 | Low: poppler security update | 2020-11-03T12:23:18Z | 2021-08-11T08:54:00Z |
| alsa-2020:4690 | Moderate: qt5-qtbase and qt5-qtwebsockets security and bug fix update | 2020-11-03T12:27:18Z | 2021-08-11T08:54:00Z |
| alsa-2020:4763 | Moderate: dovecot security update | 2020-11-03T12:33:59Z | 2021-08-11T08:54:00Z |
| alsa-2020:4844 | Moderate: fontforge security update | 2020-11-03T12:40:50Z | 2021-08-11T08:54:00Z |
| alsa-2020:4846 | Moderate: mingw-expat security update | 2020-11-03T12:41:03Z | 2021-08-11T08:54:00Z |
| alsa-2021:1093 | Important: kernel security, bug fix, and enhancement update | 2021-04-06T13:33:17Z | 2021-08-11T08:54:00Z |
| alsa-2021:1574 | Moderate: NetworkManager and libnma security, bug fix, and enhancement update | 2021-05-18T05:33:20Z | 2021-08-11T08:54:00Z |
| alsa-2021:1578 | Important: kernel security, bug fix, and enhancement update | 2021-05-18T05:33:57Z | 2021-08-11T08:54:00Z |
| alsa-2021:1585 | Moderate: glibc security, bug fix, and enhancement update | 2021-05-18T05:35:07Z | 2021-08-11T08:54:00Z |
| alsa-2021:1598 | Moderate: bluez security update | 2021-05-18T05:37:07Z | 2021-08-11T08:54:00Z |
| alsa-2021:1675 | Low: libdb security update | 2021-05-18T05:48:41Z | 2021-08-11T08:54:00Z |
| alsa-2021:1734 | Moderate: shim security update | 2021-05-18T05:57:10Z | 2021-08-11T08:54:00Z |
| alsa-2021:1752 | Low: evolution security, bug fix, and enhancement update | 2021-05-18T06:00:34Z | 2021-08-11T08:54:00Z |
| alsa-2021:1756 | Moderate: qt5-qtbase security and bug fix update | 2021-05-18T06:01:21Z | 2021-08-11T08:54:00Z |
| alsa-2021:1758 | Low: exiv2 security, bug fix, and enhancement update | 2021-05-18T06:01:36Z | 2021-08-11T08:54:00Z |
| alsa-2021:1849 | Moderate: freerdp security, bug fix, and enhancement update | 2021-05-18T06:14:36Z | 2021-08-11T08:54:00Z |
| alsa-2021:1881 | Moderate: poppler and evince security, bug fix, and enhancement update | 2021-05-18T06:18:48Z | 2021-08-11T08:54:00Z |
| alsa-2021:1968 | Moderate: mingw packages security and bug fix update | 2021-05-18T06:30:39Z | 2021-08-11T08:54:00Z |
| alsa-2021:1972 | Moderate: pandoc security update | 2021-05-18T06:31:29Z | 2021-08-11T08:54:00Z |
| alsa-2021:2168 | Important: kernel security and bug fix update | 2021-06-01T09:02:01Z | 2021-08-11T08:54:00Z |
| alsa-2021:2170 | Important: glib2 security and bug fix update | 2021-06-01T09:04:25Z | 2021-08-11T08:54:00Z |
| alsa-2021:2570 | Important: kernel security and bug fix update | 2021-06-29T13:42:37Z | 2021-08-11T08:54:00Z |
| alsa-2021:2583 | Moderate: python38:3.8 and python38-devel:3.8 security update | 2021-06-29T13:57:32Z | 2021-08-11T08:54:00Z |
| alsa-2021:2714 | Important: kernel security and bug fix update | 2021-07-20T13:30:15Z | 2021-08-11T08:54:00Z |
| alsa-2021:2776 | Important: java-1.8.0-openjdk security update | 2021-07-21T07:31:58Z | 2021-08-11T08:54:00Z |
| alsa-2021:2781 | Important: java-11-openjdk security update | 2021-07-21T07:28:55Z | 2021-08-11T08:54:00Z |
| alsa-2021:3057 | Important: kernel security, bug fix, and enhancement update | 2021-08-10T11:56:07Z | 2021-08-11T08:54:00Z |
| alsa-2021:3058 | Moderate: glib2 security update | 2021-08-10T11:56:26Z | 2021-08-11T08:54:00Z |
| alsa-2020:5487 | Moderate: pacemaker security update | 2020-12-15T16:01:26Z | 2021-08-11T11:18:28Z |
| alsa-2021:3151 | Important: sssd security update | 2021-08-16T08:00:18Z | 2021-08-17T07:24:43Z |