Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0150 |
N/A
|
The Perl fingerd program allows arbitrary command… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.679Z |
| CVE-1999-0152 |
N/A
|
The DG/UX finger daemon allows remote command exe… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.691Z |
| CVE-1999-0153 |
N/A
|
Windows 95/NT out of band (OOB) data denial of se… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.671Z |
| CVE-1999-0155 |
N/A
|
The ghostscript command with the -dSAFER option a… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.844Z |
| CVE-1999-0157 |
N/A
|
Cisco PIX firewall and CBAC IP fragmentation atta… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.674Z |
| CVE-1999-0158 |
N/A
|
Cisco PIX firewall manager (PFM) on Windows NT al… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.695Z |
| CVE-1999-0160 |
N/A
|
Some classic Cisco IOS devices have a vulnerabili… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.678Z |
| CVE-1999-0161 |
N/A
|
In Cisco IOS 10.3, with the tacacs-ds or tacacs k… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.691Z |
| CVE-1999-0162 |
N/A
|
The "established" keyword in some Cisco IOS softw… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.705Z |
| CVE-1999-0164 |
N/A
|
A race condition in the Solaris ps command allows… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.761Z |
| CVE-1999-0166 |
N/A
|
NFS allows users to use a "cd .." command to acce… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.683Z |
| CVE-1999-0167 |
N/A
|
In SunOS, NFS file handles could be guessed, givi… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.741Z |
| CVE-1999-0168 |
N/A
|
The portmapper may act as a proxy and redirect se… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.737Z |
| CVE-1999-0170 |
N/A
|
Remote attackers can mount an NFS file system in … |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.719Z |
| CVE-1999-0172 |
N/A
|
FormMail CGI program allows remote execution of c… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.720Z |
| CVE-1999-0173 |
N/A
|
FormMail CGI program can be used by web servers o… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.869Z |
| CVE-1999-0174 |
N/A
|
The view-source CGI program allows remote attacke… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.740Z |
| CVE-1999-0175 |
N/A
|
The convert.bas program in the Novell web server … |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.805Z |
| CVE-1999-0176 |
N/A
|
The Webgais program allows a remote user to execu… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.802Z |
| CVE-1999-0177 |
N/A
|
The uploader program in the WebSite web server al… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.753Z |
| CVE-1999-0178 |
N/A
|
Buffer overflow in the win-c-sample program (win-… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.717Z |
| CVE-1999-0179 |
N/A
|
Windows NT crashes or locks up when a Samba clien… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.932Z |
| CVE-1999-0180 |
N/A
|
in.rshd allows users to login with a NULL usernam… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.854Z |
| CVE-1999-0181 |
N/A
|
The wall daemon can be used for denial of service… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.764Z |
| CVE-1999-0182 |
N/A
|
Samba has a buffer overflow which allows a remote… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.839Z |
| CVE-1999-0183 |
N/A
|
Linux implementations of TFTP would allow access … |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.865Z |
| CVE-1999-0184 |
N/A
|
When compiled with the -DALLOW_UPDATES option, bi… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.928Z |
| CVE-1999-0185 |
N/A
|
In SunOS or Solaris, a remote user could connect … |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.775Z |
| CVE-1999-0188 |
N/A
|
The passwd command in Solaris can be subjected to… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.791Z |
| CVE-1999-0190 |
N/A
|
Solaris rpcbind can be exploited to overwrite arb… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:27:57.935Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-jg4m-q6w8-vrjp |
|
rgpg Code Injection vulnerability | 2017-10-24T18:33:37Z | 2023-01-26T21:04:14Z |
| ghsa-jmgw-6vjg-jjwg |
|
actionpack Improper Input Validation vulnerability | 2017-10-24T18:33:37Z | 2023-02-15T22:22:59Z |
| ghsa-jxhw-mg8m-2pj8 |
|
Devise does not properly perform type conversion when performing database queries | 2017-10-24T18:33:37Z | 2023-01-23T21:20:12Z |
| ghsa-jxx8-v83v-rhw3 |
|
Spree Improper Input Validation vulnerability | 2017-10-24T18:33:37Z | 2023-08-29T09:24:34Z |
| ghsa-m6f7-46hw-grcj |
|
Creme Fraiche contains OS Command Injection | 2017-10-24T18:33:37Z | 2023-03-14T20:44:40Z |
| ghsa-m7fq-cf8q-35q7 |
|
crack does not properly restrict casts of string values | 2017-10-24T18:33:37Z | 2023-01-23T21:21:34Z |
| ghsa-mgx3-27hr-mfgp |
|
HTTParty does not restrict casts of string values | 2017-10-24T18:33:37Z | 2023-03-14T20:47:11Z |
| ghsa-mpxf-gcw2-pw5q |
|
actionpack Improper Input Validation vulnerability | 2017-10-24T18:33:37Z | 2023-07-31T18:14:44Z |
| ghsa-p463-639r-q9g9 |
|
Dragonfly Code Injection vulnerability | 2017-10-24T18:33:37Z | 2025-04-14T21:47:15Z |
| ghsa-p673-hjf2-pwfr |
|
Shell command injection in command_wrap | 2017-10-24T18:33:37Z | 2023-07-03T23:38:02Z |
| ghsa-pchc-949f-53m5 |
|
Improper Input Validation in multi_xml | 2017-10-24T18:33:37Z | 2023-02-13T17:01:58Z |
| ghsa-q44r-f2hm-v76v |
|
Pupper does not properly restrict characters in Common Name field of Certificate Signing Request | 2017-10-24T18:33:37Z | 2023-05-12T17:21:34Z |
| ghsa-q6cw-2553-7837 |
|
newrelic_rpm Gem Discloses Sensitive Information | 2017-10-24T18:33:37Z | 2023-08-29T13:38:38Z |
| ghsa-q759-hwvc-m3jg |
|
actionpack Cross-site Scripting vulnerability | 2017-10-24T18:33:37Z | 2023-08-25T20:06:33Z |
| ghsa-qqxp-xp9v-vvx6 |
|
jquery-ui Tooltip widget vulnerable to XSS | 2017-10-24T18:33:37Z | 2025-04-14T21:53:44Z |
| ghsa-qrgf-jqqm-x7xv |
|
Code injection in dragonfly gem | 2017-10-24T18:33:37Z | 2023-01-24T14:54:19Z |
| ghsa-r23g-3qw4-gfh2 |
|
RedCloth Cross-site Scripting vulnerability | 2017-10-24T18:33:37Z | 2023-08-28T19:55:45Z |
| ghsa-r5hc-9xx5-97rw |
|
i18n gem Cross-site Scripting vulnerability | 2017-10-24T18:33:37Z | 2023-07-04T00:12:42Z |
| ghsa-rfmf-rx8w-935w |
|
Sounder Contains Arbitrary Command Execution Vulnerability | 2017-10-24T18:33:37Z | 2023-07-03T21:20:17Z |
| ghsa-rg5m-3fqp-6px8 |
|
actionmailer email address processing causes Denial of service | 2017-10-24T18:33:37Z | 2023-07-04T00:18:31Z |
| ghsa-rprj-g6xc-p5gq |
|
Wicked gem contains Path traversal vulnerability | 2017-10-24T18:33:37Z | 2025-04-13T22:44:33Z |
| ghsa-v2r9-c84j-v7xm |
|
RDoc contains XSS vulnerability | 2017-10-24T18:33:37Z | 2023-07-05T20:39:56Z |
| ghsa-w248-xr37-jx8m |
|
fastreader Gem for Ruby URI Handling Arbitrary Command Injection | 2017-10-24T18:33:37Z | 2023-08-28T13:51:43Z |
| ghsa-w6rc-q387-vpgq |
|
insecure temporary directory usage in passenger | 2017-10-24T18:33:37Z | 2023-06-09T20:17:24Z |
| ghsa-w754-gq8r-pf5f |
|
MiniMagick Gem for Ruby URI Handling Arbitrary Command Injection | 2017-10-24T18:33:37Z | 2023-08-29T14:01:28Z |
| ghsa-x457-cw4h-hq5f |
|
JSON gem has Improper Input Validation vulnerability | 2017-10-24T18:33:37Z | 2023-06-01T19:55:21Z |
| ghsa-xgr2-v94m-rc9g |
|
activesupport in Rails vulnerable to incorrect data conversion | 2017-10-24T18:33:37Z | 2023-08-25T20:10:51Z |
| ghsa-xxvw-45rp-3mj2 |
|
Deserialization Code Execution in js-yaml | 2017-10-24T18:33:37Z | 2021-09-22T18:27:56Z |
| ghsa-24fg-p96v-hxh8 |
|
actionpack Cross-Site Request Forgery vulnerability | 2017-10-24T18:33:38Z | 2023-05-26T17:41:44Z |
| ghsa-2xjj-5x6h-8vmf |
|
Cross-site Scripting in actionpack | 2017-10-24T18:33:38Z | 2023-08-25T20:14:16Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2012-39 |
|
virt/disk/api.py in OpenStack Compute (Nova) Folsom (2012.2), Essex (2012.1), and Diablo … | nova | 2012-07-22T16:55:00Z | 2024-11-21T14:22:56.493974Z |
| pysec-2012-34 |
|
OpenStack Keystone before 2012.1.1, as used in OpenStack Folsom before Folsom-1 and OpenS… | keystone | 2012-07-31T10:45:00Z | 2024-11-21T14:22:52.344123Z |
| pysec-2012-2 |
|
The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirec… | django | 2012-07-31T17:55:00Z | 2021-07-05T00:01:18.211806Z |
| pysec-2012-3 |
|
The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x bef… | django | 2012-07-31T17:55:00Z | 2021-07-05T00:01:18.288820Z |
| pysec-2012-4 |
|
The get_image_dimensions function in the image-handling functionality in Django before 1.… | django | 2012-07-31T17:55:00Z | 2021-07-05T00:01:18.369979Z |
| pysec-2012-21 |
|
virt/disk/api.py in OpenStack Compute (Nova) 2012.1.x before 2012.1.2 and Folsom before F… | nova | 2012-08-20T18:55:00+00:00 | 2023-11-07T20:24:25.753827+00:00 |
| pysec-2012-11 |
|
Buffer overflow in the fribidi_utf8_to_unicode function in PyFriBidi before 0.11.0 allows… | pyfribidi | 2012-08-26T20:55:00Z | 2021-07-25T23:34:50.398385Z |
| pysec-2012-13 |
|
Elixir 0.8.0 uses Blowfish in CFB mode without constructing a unique initialization vecto… | elixir | 2012-08-26T21:55:00Z | 2021-08-27T03:22:03.583910Z |
| pysec-2012-18 |
|
Open redirect vulnerability in views/auth_forms.py in OpenStack Dashboard (Horizon) Essex… | horizon | 2012-09-05T23:55:00+00:00 | 2023-11-07T20:24:25.109703+00:00 |
| pysec-2012-19 |
|
OpenStack Keystone, as used in OpenStack Folsom before folsom-rc1 and OpenStack Essex (20… | keystone | 2012-09-05T23:55:00+00:00 | 2023-11-07T20:24:25.208233+00:00 |
| pysec-2012-10 |
|
security/__init__.py in MoinMoin 1.9 through 1.9.4 does not properly handle group names t… | moin | 2012-09-10T22:55:00Z | 2021-07-25T23:34:40.223243Z |
| pysec-2012-1 |
|
Beaker before 1.6.4, when using PyCrypto to encrypt sessions, uses AES in ECB cipher mode… | beaker | 2012-09-15T17:55:00Z | 2021-07-05T00:01:17.212849Z |
| pysec-2012-12 |
|
Apache Libcloud before 0.11.1 uses an incorrect regular expression during verification of… | apache-libcloud | 2012-11-04T22:55:00Z | 2021-08-27T03:21:55.557676Z |
| pysec-2012-17 |
|
Tweepy does not verify that the server hostname matches a domain name in the subject's Co… | tweepy | 2012-11-04T22:55:00Z | 2021-08-27T03:22:49.526995Z |
| pysec-2012-29 |
|
The v1 API in OpenStack Glance Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote… | glance | 2012-11-11T13:00:00Z | 2024-11-21T14:22:51.054769Z |
| pysec-2012-30 |
|
The v2 API in OpenStack Glance Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote… | glance | 2012-11-11T13:00:00Z | 2024-11-21T14:22:51.113933Z |
| pysec-2012-7 |
|
The django.http.HttpRequest.get_host function in Django 1.3.x before 1.3.4 and 1.4.x befo… | django | 2012-11-18T23:55:00Z | 2021-07-15T02:22:08.562601Z |
| pysec-2012-8 |
|
Python Keyring 0.9.1 does not securely initialize the cipher when encrypting passwords fo… | keyring | 2012-11-30T22:55:00Z | 2021-07-15T02:22:15.253541Z |
| pysec-2012-20 |
|
OpenStack Keystone, as used in OpenStack Folsom 2012.2, does not properly implement token… | keystone | 2012-12-18T01:55:00+00:00 | 2023-11-07T20:24:25.260316+00:00 |
| pysec-2012-35 |
|
OpenStack Keystone Essex (2012.1) and Folsom (2012.2) does not properly handle EC2 tokens… | keystone | 2012-12-18T01:55:00Z | 2024-11-21T14:22:52.404569Z |
| pysec-2012-41 |
|
OpenStack Compute (Nova) Folsom before 2012.2.2 and Grizzly, when using libvirt and LVM b… | nova | 2012-12-26T22:55:00Z | 2024-11-21T14:22:56.616552Z |
| pysec-2013-23 |
|
Cross-site scripting (XSS) vulnerability in the rsslink function in theme/__init__.py in … | moin | 2013-01-03T01:55:00Z | 2021-07-25T23:34:40.266603Z |
| pysec-2013-5 |
|
Directory traversal vulnerability in the _do_attachment_move function in the AttachFile a… | moin | 2013-01-03T01:55:00Z | 2021-07-05T00:01:22.941193Z |
| pysec-2013-6 |
|
Multiple unrestricted file upload vulnerabilities in the (1) twikidraw (action/twikidraw.… | moin | 2013-01-03T01:55:00Z | 2021-07-05T00:01:22.974248Z |
| pysec-2013-7 |
|
Multiple directory traversal vulnerabilities in the (1) twikidraw (action/twikidraw.py) a… | moin | 2013-01-03T01:55:00Z | 2021-07-05T00:01:23.010630Z |
| pysec-2013-36 |
|
The client in FreeIPA 2.x and 3.x before 3.1.2 does not properly obtain the Certification… | freeipa | 2013-01-27T18:55:00Z | 2024-11-21T14:22:50.474073Z |
| pysec-2013-38 |
|
The client in FreeIPA 2.x and 3.x before 3.1.2 does not properly obtain the Certification… | ipa | 2013-01-27T18:55:00Z | 2024-11-21T14:22:51.898526Z |
| pysec-2013-37 |
|
store/swift.py in OpenStack Glance Essex (2012.1), Folsom (2012.2) before 2012.2.3, and G… | glance | 2013-02-24T21:55:00Z | 2024-11-21T14:22:51.177765Z |
| pysec-2013-39 |
|
OpenStack Keystone Folsom (2012.2) does not properly perform revocation checks for Keysto… | keystone | 2013-03-22T21:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2013-43 |
|
OpenStack Compute (Nova) Grizzly, Folsom (2012.2), and Essex (2012.1) allows remote authe… | nova | 2013-03-22T21:55:00Z | 2024-11-25T18:35:18.357593Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-398 | Malicious code in @logistics-frontend/ui-old (npm) | 2022-05-31T12:55:54Z | 2022-05-31T12:55:55Z |
| mal-2022-399 | Malicious code in @logistics-frontend/utils (npm) | 2022-05-31T12:55:54Z | 2022-05-31T12:55:55Z |
| mal-2022-392 | Malicious code in @logistics-frontend/core (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:55:55Z |
| mal-2022-393 | Malicious code in @logistics-frontend/hooks (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:55:55Z |
| mal-2022-394 | Malicious code in @logistics-frontend/modules (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:56:04Z |
| mal-2022-395 | Malicious code in @logistics-frontend/ndd (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:56:03Z |
| mal-2022-396 | Malicious code in @logistics-frontend/polyfills (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:55:55Z |
| mal-2022-397 | Malicious code in @logistics-frontend/types (npm) | 2022-05-31T12:55:55Z | 2022-05-31T12:55:55Z |
| mal-2022-6965 | Malicious code in volgactf (npm) | 2022-05-31T12:57:01Z | 2022-05-31T12:57:02Z |
| mal-2022-961 | Malicious code in amber-blocks (npm) | 2022-05-31T12:57:01Z | 2022-05-31T12:57:02Z |
| mal-2022-2180 | Malicious code in coolqueue.io (npm) | 2022-05-31T12:58:09Z | 2022-05-31T12:58:09Z |
| mal-2022-3074 | Malicious code in flipper-frontend-core (npm) | 2022-05-31T12:58:09Z | 2022-10-17T19:22:03Z |
| mal-2022-5680 | Malicious code in react-video-live-demo (npm) | 2022-05-31T12:58:09Z | 2022-05-31T12:58:10Z |
| mal-2022-666 | Malicious code in @tr-digital/react-rehydrate (npm) | 2022-05-31T12:58:42Z | 2022-05-31T12:58:42Z |
| mal-2022-5942 | Malicious code in sb1-adobe-analytics (npm) | 2022-05-31T13:00:07Z | 2022-05-31T13:00:09Z |
| mal-2022-5069 | Malicious code in oms-js-utils (npm) | 2022-05-31T13:00:08Z | 2022-05-31T13:00:09Z |
| mal-2022-5070 | Malicious code in oms-sentry (npm) | 2022-05-31T13:00:08Z | 2022-05-31T13:00:09Z |
| mal-2022-1397 | Malicious code in azuremediaplayer (npm) | 2022-05-31T13:00:57Z | 2022-05-31T13:00:58Z |
| mal-2022-173 | Malicious code in @clover-microapp/utils-isomorphic (npm) | 2022-05-31T13:01:48Z | 2022-05-31T13:01:53Z |
| mal-2022-3812 | Malicious code in influxdb-client-examples (npm) | 2022-05-31T13:05:29Z | 2022-05-31T13:05:33Z |
| mal-2022-5675 | Malicious code in react-swipeable-wrapper-example (npm) | 2022-05-31T13:05:29Z | 2022-05-31T13:05:30Z |
| mal-2022-7141 | Malicious code in whjr-analytics (npm) | 2022-05-31T13:05:29Z | 2022-05-31T13:05:30Z |
| mal-2022-293 | Malicious code in @gpsu/common (npm) | 2022-05-31T13:08:18Z | 2022-05-31T13:08:19Z |
| mal-2022-6122 | Malicious code in simple-project-pkg-b (npm) | 2022-05-31T13:08:52Z | 2022-05-31T13:08:52Z |
| mal-2022-6967 | Malicious code in vor-test-project-npm-please-ignore-1 (npm) | 2022-05-31T13:08:52Z | 2022-05-31T13:08:52Z |
| mal-2022-7086 | Malicious code in web3-util-update (npm) | 2022-05-31T13:10:51Z | 2022-05-31T13:10:51Z |
| mal-2022-1507 | Malicious code in bernie-abacus (npm) | 2022-05-31T13:11:41Z | 2022-05-31T13:11:42Z |
| mal-2022-1508 | Malicious code in bernie-analytics (npm) | 2022-05-31T13:11:41Z | 2022-05-31T13:11:49Z |
| mal-2022-6765 | Malicious code in uitk-react-utils (npm) | 2022-05-31T13:11:41Z | 2022-05-31T13:11:41Z |
| mal-2022-625 | Malicious code in @techops-ui/ping-authentication (npm) | 2022-05-31T13:12:30Z | 2022-05-31T13:12:31Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-drupal-2022-31042 | Failure to strip the Cookie header on change in host or HTTP downgrade in Guzzle | 2024-03-06T10:52:15.080Z | 2025-05-20T10:02:07.006Z |
| bit-git-2020-5260 | malicious URLs may cause Git to present stored credentials to the wrong server | 2024-03-06T10:52:15.272Z | 2025-05-20T10:02:07.006Z |
| bit-discourse-2023-47119 | HTML injection in oneboxed links | 2024-03-06T10:52:15.470Z | 2025-05-20T10:02:07.006Z |
| bit-ejbca-2021-40086 | 2024-03-06T10:52:17.174Z | 2025-04-03T14:40:37.652Z | |
| bit-apache-2022-30522 | mod_sed denial of service | 2024-03-06T10:52:17.872Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2023-38180 | .NET and Visual Studio Denial of Service Vulnerability | 2024-03-06T10:52:18.075Z | 2025-10-22T09:08:25.162Z |
| bit-gitea-2022-46685 | 2024-03-06T10:52:18.708Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2024-1525 | Authentication Bypass Using an Alternate Path or Channel in GitLab | 2024-03-06T10:52:18.885Z | 2025-05-20T10:02:07.006Z |
| bit-elasticsearch-2022-23712 | 2024-03-06T10:52:20.467Z | 2025-04-03T14:40:37.652Z | |
| bit-ghost-2023-32235 | 2024-03-06T10:52:21.101Z | 2025-04-03T14:40:37.652Z | |
| bit-etcd-2020-15113 | Improper Preservation of Permissions in etcd | 2024-03-06T10:52:21.172Z | 2025-05-20T10:02:07.006Z |
| bit-airflow-2023-45348 | Apache Airflow: Configuration information leakage vulnerability | 2024-03-06T10:52:21.772Z | 2025-05-20T10:02:07.006Z |
| bit-consul-2022-24687 | 2024-03-06T10:52:21.903Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-29248 | Cross-domain cookie leakage in Guzzle | 2024-03-06T10:52:24.379Z | 2025-05-20T10:02:07.006Z |
| bit-django-2022-41323 | 2024-03-06T10:52:25.371Z | 2025-04-03T14:40:37.652Z | |
| bit-ejbca-2020-28942 | 2024-03-06T10:52:27.072Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2023-44487 | 2024-03-06T10:52:27.702Z | 2026-02-11T09:09:18.507Z | |
| bit-discourse-2023-46130 | Bypassing height value allowed in some theme components | 2024-03-06T10:52:27.869Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2023-45287 | Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel | 2024-03-06T10:52:27.963Z | 2025-05-20T10:02:07.006Z |
| bit-gitlab-2024-1451 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitLab | 2024-03-06T10:52:28.168Z | 2025-05-20T10:02:07.006Z |
| bit-apache-2022-29404 | Denial of service in mod_lua r:parsebody | 2024-03-06T10:52:28.171Z | 2025-05-20T10:02:07.006Z |
| bit-gitea-2022-42968 | 2024-03-06T10:52:28.405Z | 2025-04-03T14:40:37.652Z | |
| bit-dotnet-2023-38178 | .NET Core and Visual Studio Denial of Service Vulnerability | 2024-03-06T10:52:28.462Z | 2025-05-20T10:02:07.006Z |
| bit-ghost-2023-31133 | Ghost vulnerable to disclosure of private API fields | 2024-03-06T10:52:29.977Z | 2025-05-20T10:02:07.006Z |
| bit-etcd-2020-15112 | Improper Input Validation in etcd | 2024-03-06T10:52:31.679Z | 2025-05-20T10:02:07.006Z |
| bit-elasticsearch-2022-23708 | 2024-03-06T10:52:31.870Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2023-42792 | Apache Airflow: Improper access control to DAG resources | 2024-03-06T10:52:32.990Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2023-44387 | Gradle has incorrect permission assignment for symlinked files used in copy or archiving operations | 2024-03-06T10:52:33.070Z | 2025-05-20T10:02:07.006Z |
| bit-consul-2021-41805 | 2024-03-06T10:52:33.477Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-25278 | 2024-03-06T10:52:33.986Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ui65993 | Within HostnameError | 2026-01-30T16:21:25.457624Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xo49545 | Within HostnameError | 2026-01-30T16:21:25.500719Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nr68832 | libexpat in Expat before 2 | 2026-01-30T16:22:25.447471Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-pt11267 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:22:25.604414Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qe58701 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:22:55.193625Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ek72220 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:24:55.137022Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sw55801 | Within HostnameError | 2026-01-30T16:24:55.642434Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-fn12833 | Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security) | 2026-01-30T16:25:25.422564Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-mb75553 | vulnerability was found in Avahi, where a reachable assertion exists in avahi_dns_packet_append_record | 2026-01-30T16:26:25.443727Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gq48460 | Cancelling a query (e | 2026-01-30T16:26:55.253385Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ai42483 | PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access | 2026-01-30T16:26:55.732852Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-an66259 | attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests | 2026-01-30T16:28:25.281484Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-kd20596 | Cancelling a query (e | 2026-01-30T16:28:55.316811Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ma27248 | Cancelling a query (e | 2026-01-30T16:28:55.356497Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ul17352 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:29:25.464127Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nv82543 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:29:25.549030Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tf33105 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:29:25.639055Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wg18689 | attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests | 2026-01-30T16:29:25.690410Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-au31441 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:29:25.997506Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ib84500 | security issue was discovered in Kubernetes where a malicious or compromised pod could bypass network restrictions enforced by network policies during namespace deletion | 2026-01-30T16:29:55.343868Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-rt10702 | Within HostnameError | 2026-01-30T16:30:25.697056Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-dn37053 | Within HostnameError | 2026-01-30T16:30:25.711037Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-yk54840 | Within HostnameError | 2026-01-30T16:30:55.324232Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-nl96892 | Within HostnameError | 2026-01-30T16:31:25.336110Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-gj12884 | Within HostnameError | 2026-01-30T16:31:25.827659Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ty78539 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T16:35:55.295657Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-na36743 | Within HostnameError | 2026-01-30T16:35:55.379246Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vv68546 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:35:55.883570Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-qd78411 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:36:25.408698Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-on38469 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:37:25.667594Z | 2026-01-29T18:58:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2021-028 | 2021-09-15T15:28:04.000Z | 2023-08-11T17:02:11.000Z | |
| drupal-contrib-2021-029 | 2021-09-15T15:30:15.000Z | 2023-08-11T17:03:09.000Z | |
| drupal-contrib-2021-030 | 2021-09-22T16:43:17.000Z | 2023-08-11T17:03:36.000Z | |
| drupal-contrib-2021-031 | 2021-09-22T16:49:24.000Z | 2023-08-11T17:04:21.000Z | |
| drupal-contrib-2021-032 | 2021-09-22T16:51:57.000Z | 2023-08-11T17:04:59.000Z | |
| drupal-contrib-2021-033 | 2021-09-22T16:55:24.000Z | 2023-08-11T17:05:59.000Z | |
| drupal-contrib-2021-035 | 2021-09-22T17:09:11.000Z | 2023-08-11T16:51:09.000Z | |
| drupal-contrib-2021-036 | 2021-09-22T17:12:02.000Z | 2023-08-11T16:53:25.000Z | |
| drupal-contrib-2021-037 | 2021-09-22T17:17:05.000Z | 2023-08-11T16:54:22.000Z | |
| drupal-contrib-2021-038 | 2021-09-22T17:25:50.000Z | 2023-08-11T16:54:48.000Z | |
| drupal-contrib-2021-039 | 2021-09-22T17:26:04.000Z | 2023-08-11T16:55:33.000Z | |
| drupal-contrib-2021-040 | 2021-09-22T17:26:12.000Z | 2023-08-11T16:55:39.000Z | |
| drupal-contrib-2021-041 | 2021-09-22T17:26:20.000Z | 2023-08-11T16:55:59.000Z | |
| drupal-contrib-2021-042 | 2021-09-29T14:38:35.000Z | 2023-08-11T16:56:26.000Z | |
| drupal-contrib-2021-043 | 2021-10-13T16:32:09.000Z | 2023-08-11T16:57:04.000Z | |
| drupal-contrib-2021-044 | 2021-11-17T15:45:07.000Z | 2023-08-11T16:47:14.000Z | |
| drupal-contrib-2021-045 | 2021-12-08T18:02:44.000Z | 2023-08-11T16:48:31.000Z | |
| drupal-contrib-2021-047 | 2021-12-22T17:47:54.000Z | 2023-08-11T16:49:16.000Z | |
| drupal-contrib-2022-001 | 2022-01-05T17:06:22.000Z | 2023-08-11T14:06:56.000Z | |
| drupal-contrib-2022-002 | 2022-01-05T17:12:29.000Z | 2023-08-11T14:06:15.000Z | |
| drupal-contrib-2022-004 | 2022-01-19T15:33:50.000Z | 2023-08-11T14:04:07.000Z | |
| drupal-contrib-2022-005 | 2022-01-25T18:35:09.000Z | 2023-08-11T14:03:48.000Z | |
| drupal-contrib-2022-006 | 2022-01-25T18:35:55.000Z | 2023-08-11T14:56:17.000Z | |
| drupal-contrib-2022-008 | 2022-01-25T18:36:22.000Z | 2023-08-11T14:01:01.000Z | |
| drupal-contrib-2022-009 | 2022-01-25T18:36:37.000Z | 2023-08-11T14:02:59.000Z | |
| drupal-contrib-2022-012 | 2022-01-25T18:37:20.000Z | 2023-08-11T13:55:41.000Z | |
| drupal-contrib-2022-013 | 2022-01-25T18:37:38.000Z | 2024-01-25T20:19:13.000Z | |
| drupal-contrib-2022-015 | 2022-01-25T18:39:13.000Z | 2023-08-11T14:02:31.000Z | |
| drupal-contrib-2022-016 | 2022-01-25T18:39:26.000Z | 2023-10-06T19:27:29.000Z | |
| drupal-contrib-2022-017 | 2022-01-25T18:39:38.000Z | 2023-08-11T13:56:08.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2006-000626 | dotProject cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000627 | Phorum cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000628 | Wiki clone products vulnerable to denial of service attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000629 | Wiki clone products vulnerable to denial of service attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000630 | Wiki clone products vulnerable to denial of service attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000631 | ACollab SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000632 | ATutor cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000633 | ServerView cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000634 | ServerView directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000635 | Geeklog cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000636 | Loudblog cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000637 | QwikiWiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000638 | Dokeos cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000640 | Drupal cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000641 | Kiri directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000642 | 04WebServer cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000643 | 04WebServer directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000644 | NetCommons cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000646 | Owl SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000647 | Owl cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000648 | mail f/w system vulnerable to allow unauthorized email transmissionk | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000649 | Cybozu Office 6 information disclosure vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000650 | Cybozu products vulnerable to directory traversal | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000651 | Cybozu products vulnerable to directory traversal | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000652 | MDPro cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000653 | Movable Type vulnerabile to cross-site scripting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000654 | SugarCRM cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000665 | TeraStation HD-HTGL series cross-site request forgery vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000695 | Kmail CGI authentication bypass vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000734 | Ichitaro buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00037 | Microsoft Windows 'AhcVerifyAdminContext'本地权限提升漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00038 | RubyGems Doorkeeper跨站请求伪造漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00039 | DBMail 'dm_db.c' CRAM-MD5验证绕过漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00040 | Info-ZIP UnZip越界拒绝服务漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00041 | Serendipity HTML注入漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00042 | Libmspack 'qtmd.c'无限循环拒绝服务漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00043 | VideoLAN VLC media player堆缓冲区溢出漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00044 | VideoLAN VLC Media Player栈缓冲区溢出漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00045 | VideoLAN VLC Media Player缓冲区溢出漏洞(CNVD-2015-00045) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00046 | VideoLAN VLC media player拒绝服务漏洞(CNVD-2015-00046) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00047 | VideoLAN VLC Media Player缓冲区溢出漏洞(CNVD-2015-00047) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00048 | VideoLAN VLC media player缓冲区溢出漏洞(CNVD-2015-00048) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00049 | Facebook HipHop Virtual Machine CRLF注入漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00050 | Facebook HipHop Virtual Machine预期访问限制绕过漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00051 | Facebook HipHop Virtual Machine crypgraphic保护机制绕过漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00053 | Facebook HipHop Virtual Machine信息泄露漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00054 | DFLabs PTK跨站请求伪造漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00055 | amCharts Flash存在多个跨站脚本漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00056 | amMap存在多个跨站脚本漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00057 | Ipswitch WhatsUp Gold目录遍历漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00058 | Redmine插件redmine_git_hosting任意命令执行漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00059 | phpMyAdmin存在多个跨站脚本漏洞(CNVD-2015-00059) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00060 | phpMyAdmin存在多个跨站脚本漏洞(CNVD-2015-00060) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00061 | libssh双重释放漏洞 | 2015-01-04 | 2015-01-05 |
| cnvd-2015-00062 | Google Chrome整数溢出漏洞(CNVD-2015-00062) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00063 | Google Chrome内存错误引用漏洞(CNVD-2015-00063) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00077 | Google Chrome拒绝服务漏洞(CNVD-2015-00077) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00078 | WordPress插件W3 Total Cache跨站请求伪造漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00107 | real.c任意代码执行漏洞 | 2015-01-04 | 2015-01-07 |
| cnvd-2015-00108 | Claroline存在多个跨站脚本漏洞(CNVD-2015-00108) | 2015-01-04 | 2015-01-07 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-02511 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02512 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02513 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02514 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02515 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02516 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02517 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02518 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02519 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02520 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02521 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02522 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02523 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02524 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02525 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02526 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02527 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02528 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02529 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02530 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02531 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02532 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02533 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02534 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02535 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2024 |
| bdu:2015-02536 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02537 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02538 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02539 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02540 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2001-avi-027 | Vulnérabilités d'Internet Explorer et de Windows Scripting Host | 2001-03-07T00:00:00.000000 | 2001-03-07T00:00:00.000000 |
| certa-2001-avi-028 | vulnérabilité de sudo sous Linux Debian | 2001-03-08T00:00:00.000000 | 2001-03-08T00:00:00.000000 |
| certa-2001-avi-029 | Vulnérabilité de Microsoft Internet Information Serveur 5.0 | 2001-03-09T00:00:00.000000 | 2001-03-09T00:00:00.000000 |
| certa-2001-avi-031 | Vulnérabilité de HP OpenView OmniBack sous HP-UX et Windows NT/2000 | 2001-03-09T00:00:00.000000 | 2001-03-09T00:00:00.000000 |
| certa-2001-avi-032 | Vulnérabilité de IBM HTTP Server | 2001-03-09T00:00:00.000000 | 2001-03-09T00:00:00.000000 |
| certa-2001-avi-033 | Vulnérabilité dans Mailsweeper version 4.2 | 2001-03-13T00:00:00.000000 | 2001-03-13T00:00:00.000000 |
| certa-2001-avi-034 | Vulnérabilité du serveur web Apache | 2001-03-13T00:00:00.000000 | 2001-03-13T00:00:00.000000 |
| certa-2001-avi-035 | Vulnérabilité de pcAnywhere. | 2001-03-13T00:00:00.000000 | 2001-03-13T00:00:00.000000 |
| certa-2001-avi-036 | Certificats erronés délivrés par VeriSign | 2001-03-23T00:00:00.000000 | 2001-03-23T00:00:00.000000 |
| certa-2001-avi-037 | Vulnérabilité des logiciels d'administration à distance de Compaq | 2001-03-23T00:00:00.000000 | 2001-03-23T00:00:00.000000 |
| certa-2001-avi-038 | Vulnérabilité dans Microsoft Visual Studio 6.0 | 2001-03-28T00:00:00.000000 | 2001-03-28T00:00:00.000000 |
| certa-2001-avi-039 | Vulnérabilité dans la protection des fichiers compressés sous Windows Plus!98 et Me | 2001-03-28T00:00:00.000000 | 2001-03-28T00:00:00.000000 |
| certa-2001-avi-040 | Vulnérabilité dans les concentrateurs CISCO VPN3000 | 2001-03-29T00:00:00.000000 | 2001-03-29T00:00:00.000000 |
| certa-2001-avi-041 | Vulnérabilité dans Internet Explorer 5.01 et 5.5 | 2001-03-30T00:00:00.000000 | 2002-07-16T00:00:00.000000 |
| certa-2001-avi-042 | Vulnérabilité dans les commutateurs CISCO CSS 11050, 11150 et 11800 | 2001-04-11T00:00:00.000000 | 2001-04-11T00:00:00.000000 |
| certa-2001-avi-043 | Vulnérabilité de la fonction glob() dans les serveurs FTP | 2001-04-11T00:00:00.000000 | 2001-04-11T00:00:00.000000 |
| certa-2001-avi-044 | Vulnérabilité dans Microsoft ISA Server 2000 | 2001-04-20T00:00:00.000000 | 2001-04-20T00:00:00.000000 |
| certa-2001-avi-045 | Débordement de mémoire dans NTPd | 2001-04-20T00:00:00.000000 | 2002-12-20T00:00:00.000000 |
| certa-2001-avi-046 | Vulnérabilité dans WebDAV Service Provider | 2001-04-20T00:00:00.000000 | 2001-04-20T00:00:00.000000 |
| certa-2001-avi-047 | Vulnérabilité dans IPTables sous linux 2.4 | 2001-04-27T00:00:00.000000 | 2001-04-27T00:00:00.000000 |
| certa-2001-avi-048 | Vulnérabilité dans Microsoft IIS 5.0 | 2001-05-02T00:00:00.000000 | 2001-05-02T00:00:00.000000 |
| certa-2001-avi-049 | Déni de service sur le contrôleur de domaine Windows 2000 | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| certa-2001-avi-050 | Vulnérabilités dans le serveur d'indexation Windows | 2001-05-11T00:00:00.000000 | 2001-05-11T00:00:00.000000 |
| certa-2001-avi-051 | Vulnérabilité de Vixie Cron | 2001-05-14T00:00:00.000000 | 2001-05-14T00:00:00.000000 |
| certa-2001-avi-052 | Vulnérabilité du protocole HSRP sur les routeurs CISCO | 2001-05-14T00:00:00.000000 | 2001-05-14T00:00:00.000000 |
| certa-2001-avi-053 | Vulnérabilités dans Microsoft IIS 4.0 et 5.0 | 2001-05-15T00:00:00.000000 | 2001-05-15T00:00:00.000000 |
| certa-2001-avi-054 | Vulnérabilité de ESP sous SGI IRIX | 2001-05-15T00:00:00.000000 | 2001-05-15T00:00:00.000000 |
| certa-2001-avi-055 | Vulnérabilités dans Internet Explorer 5.01 et 5.5 | 2001-05-18T00:00:00.000000 | 2001-05-18T00:00:00.000000 |
| certa-2001-avi-056 | Vulnérabilité dans Word lors de l'ouverture de documents RTF | 2001-05-22T00:00:00.000000 | 2001-05-22T00:00:00.000000 |
| certa-2001-avi-057 | Vulnérabilité dans IOS version 12.1(2)T et 12.1(3)T | 2001-05-25T00:00:00.000000 | 2001-05-25T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2008-ale-013 | Vulnérabilité du service sadmind de Sun Solaris | 2008-10-17T00:00:00.000000 | 2013-02-21T00:00:00.000000 |
| certa-2008-ale-014 | Vulnérabilité dans Opera | 2008-11-20T00:00:00.000000 | 2009-01-06T00:00:00.000000 |
| certa-2008-ale-015 | Vulnérabilité dans le convertisseur de texte de WordPad | 2008-12-10T00:00:00.000000 | 2009-04-15T00:00:00.000000 |
| certa-2008-ale-016 | Vulnérabilité dans Microsoft Internet Explorer | 2008-12-10T00:00:00.000000 | 2008-12-17T00:00:00.000000 |
| certa-2008-ale-017 | Vulnérabilité dans Microsoft SQL Server | 2008-12-12T00:00:00.000000 | 2009-02-11T00:00:00.000000 |
| certa-2009-ale-001 | Vulnérabilité dans l'interprétation JBIG2 des produits Adobe | 2009-02-20T00:00:00.000000 | 2009-03-20T00:00:00.000000 |
| certa-2009-ale-002 | Vulnérabilité dans Microsoft Excel | 2009-02-25T00:00:00.000000 | 2009-04-15T00:00:00.000000 |
| certa-2009-ale-003 | Vulnérabilité dans Apple Mac OS X | 2009-03-24T00:00:00.000000 | 2009-06-02T00:00:00.000000 |
| certa-2009-ale-004 | Vulnérabilité dans Mozilla Firefox | 2009-03-27T00:00:00.000000 | 2009-03-30T00:00:00.000000 |
| certa-2009-ale-005 | Vulnérabilité de PowerPoint | 2009-04-03T00:00:00.000000 | 2009-05-13T00:00:00.000000 |
| certa-2009-ale-006 | Multiples vulnérabilités dans Adobe Reader et Adobe Acrobat | 2009-04-28T00:00:00.000000 | 2009-05-13T00:00:00.000000 |
| certa-2009-ale-007 | Vulnérabilité WebDAV sous Microsoft IIS | 2009-05-18T00:00:00.000000 | 2009-06-10T00:00:00.000000 |
| certa-2009-ale-008 | Vulnérabilité Java de Mac OS X | 2009-05-20T00:00:00.000000 | 2009-06-17T00:00:00.000000 |
| certa-2009-ale-009 | Vulnérabilité dans Microsoft DirectShow | 2009-05-29T00:00:00.000000 | 2009-07-14T00:00:00.000000 |
| certa-2009-ale-010 | Vulnérabilité dans le contrôle ActiveX Microsoft Video | 2009-07-07T00:00:00.000000 | 2009-07-15T00:00:00.000000 |
| certa-2009-ale-011 | Vulnérabilité dans Microsoft Office Web Components Control | 2009-07-13T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-ale-012 | Vulnérabilité dans Mozilla Firefox | 2009-07-15T00:00:00.000000 | 2009-07-17T00:00:00.000000 |
| certa-2009-ale-013 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2009-07-23T00:00:00.000000 | 2009-07-31T00:00:00.000000 |
| certa-2009-ale-014 | Multiples vulnérabilités du client de messagerie Mozilla Thunderbird | 2009-08-07T00:00:00.000000 | 2013-02-05T00:00:00.000000 |
| certa-2009-ale-015 | Vulnérabilités du serveur FTP de Microsoft IIS | 2009-09-01T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| certa-2009-ale-016 | Vulnérabilité de SMBv2 dans Microsoft Windows | 2009-09-09T00:00:00.000000 | 2009-10-13T00:00:00.000000 |
| certa-2009-ale-017 | Vulnérabilités dans l'implémentation TCP/IP de divers produits | 2009-09-09T00:00:00.000000 | 2013-02-19T00:00:00.000000 |
| certa-2009-ale-018 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-10-09T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| certa-2009-ale-019 | Vulnérabilité dans Windows 7 et Windows Server 2008 R2 | 2009-11-16T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| certa-2009-ale-020 | Vulnérabilité dans Internet Explorer | 2009-11-21T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| certa-2009-ale-021 | Vulnérabilité dans Adobe Illustrator | 2009-12-10T00:00:00.000000 | 2010-01-08T00:00:00.000000 |
| certa-2009-ale-022 | Vulnérabilité dans TANDBERG MXP | 2009-12-11T00:00:00.000000 | 2009-12-11T00:00:00.000000 |
| certa-2009-ale-023 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-12-15T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2010-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2010-01-15T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| certa-2010-ale-002 | Vulnérabilité dans le sous-système MS-DOS de Microsoft Windows | 2010-01-21T00:00:00.000000 | 2010-02-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-184 | Heap-buffer-overflow in file_strncmp | 2020-06-24T01:51:17.908691Z | 2022-04-13T03:04:30.870815Z |
| osv-2020-185 | Heap-buffer-overflow in ndpi_search_kerberos | 2020-06-24T01:51:17.946420Z | 2022-04-13T03:04:35.918459Z |
| osv-2020-187 | UNKNOWN READ in arrow::ipc::MessageDecoder::MessageDecoderImpl::ConsumeDataBufferInt32 | 2020-06-24T01:51:18.041219Z | 2022-04-13T03:04:31.954408Z |
| osv-2020-188 | Heap-buffer-overflow in BEInt<short, 2>::operator short | 2020-06-24T01:51:18.079088Z | 2022-04-13T03:04:33.175458Z |
| osv-2020-189 | Stack-buffer-overflow in tvb_get_ipv4_addr_with_prefix_len | 2020-06-24T01:51:18.143719Z | 2022-04-13T03:04:37.791677Z |
| osv-2020-190 | Use-of-uninitialized-value in file_vprintf | 2020-06-24T01:51:18.178456Z | 2022-04-13T03:04:30.848993Z |
| osv-2020-194 | Heap-buffer-overflow in check_ymsg | 2020-06-24T01:51:18.363782Z | 2022-04-13T03:04:36.020083Z |
| osv-2020-196 | Heap-use-after-free in Pe64_r_bin_pe_free | 2020-06-24T01:51:18.455623Z | 2023-02-24T01:33:55.035893Z |
| osv-2020-197 | Heap-buffer-overflow in jbig2_image_get_pixels_fast | 2020-06-24T01:51:18.519912Z | 2022-04-13T03:04:40.607737Z |
| osv-2020-200 | Heap-buffer-overflow in spng_decode_scanline | 2020-06-24T01:51:18.641839Z | 2022-04-13T03:04:33.713905Z |
| osv-2020-201 | Use-of-uninitialized-value in fuzzing::memory::memory_test_msan | 2020-06-24T01:51:18.676412Z | 2022-04-13T03:04:35.110491Z |
| osv-2020-204 | Negative-size-param in parquet::ColumnReaderImplBase<parquet::PhysicalType< | 2020-06-24T01:51:18.827983Z | 2022-04-13T03:04:31.807491Z |
| osv-2020-207 | Heap-buffer-overflow in pcpp::IPv6Layer::parseExtensions | 2020-06-24T01:51:18.953301Z | 2022-04-13T03:04:38.531844Z |
| osv-2020-208 | Use-of-uninitialized-value in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<ch | 2020-06-24T01:51:19.019962Z | 2022-04-13T03:04:38.657493Z |
| osv-2020-209 | Stack-buffer-overflow in coolkey_rsa_op | 2020-06-24T01:51:19.054921Z | 2022-04-13T03:04:41.701963Z |
| osv-2020-211 | Heap-buffer-overflow in res2_inverse | 2020-06-24T01:51:19.127694Z | 2022-04-13T03:04:37.721550Z |
| osv-2020-213 | Heap-buffer-overflow in Op_YCbCr422_to_RGB_16bit::convert_colorspace | 2020-06-24T01:51:19.218628Z | 2022-04-13T03:04:32.424915Z |
| osv-2020-214 | Heap-use-after-free in String_clear | 2020-06-24T01:51:19.252592Z | 2022-04-13T03:35:27.733269Z |
| osv-2020-215 | Use-of-uninitialized-value in xmlStrdup | 2020-06-24T01:51:19.309469Z | 2022-04-13T03:04:39.947858Z |
| osv-2020-218 | Heap-buffer-overflow in __libcpp_strstr | 2020-06-24T01:51:19.441010Z | 2022-04-13T03:04:38.612407Z |
| osv-2020-223 | Heap-use-after-free in CRYPTO_DOWN_REF | 2020-06-24T01:51:19.666966Z | 2022-04-13T03:04:38.747259Z |
| osv-2020-224 | Use-of-uninitialized-value in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<ch | 2020-06-24T01:51:19.717840Z | 2022-04-13T03:04:38.702666Z |
| osv-2020-225 | Heap-buffer-overflow in dname_pkt_compare | 2020-06-24T01:51:19.752668Z | 2022-04-13T03:04:31.459631Z |
| osv-2020-227 | Heap-double-free in spng__free | 2020-06-24T01:51:19.852052Z | 2022-04-13T03:04:33.698514Z |
| osv-2020-231 | UNKNOWN WRITE in gen_mftr | 2020-06-26T00:00:06.484913Z | 2022-04-13T03:04:39.209952Z |
| osv-2020-232 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2020-06-26T00:00:06.617669Z | 2022-04-13T03:04:32.957836Z |
| osv-2020-233 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2020-06-26T00:00:07.429323Z | 2022-04-13T03:04:32.814525Z |
| osv-2020-236 | Heap-buffer-overflow in get_ndpi_flow_info6 | 2020-06-26T00:00:08.221531Z | 2022-04-13T03:04:36.270450Z |
| osv-2020-238 | Heap-use-after-free in copy_string | 2020-06-26T00:00:08.394661Z | 2022-04-13T03:04:41.168121Z |
| osv-2020-240 | UNKNOWN READ in perfetto::trace_processor::TraceStorage::GetIdForVariadicType | 2020-06-26T00:00:09.058036Z | 2022-04-13T03:04:42.008649Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2020-0157 | Improper Synchronization and Race Condition in vm-memory | 2020-06-02T12:00:00Z | 2021-09-10T15:50:27Z |
| rustsec-2020-0029 | Allows viewing and modifying arbitrary structs as bytes | 2020-06-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0031 | HTTP Request smuggling through malformed Transfer Encoding headers | 2020-06-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0167 | `pnet_packet` buffer overrun in `set_payload` setters | 2020-06-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0026 | linked-hash-map creates uninitialized NonNull pointer | 2020-06-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0052 | Undefined Behavior in bounded channel | 2020-06-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0022 | Ozone contains several memory safety issues | 2020-07-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0165 | mozjpeg DecompressScanlines::read_scanlines is Unsound | 2020-07-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0024 | Improper uniqueness verification of signature threshold | 2020-07-09T12:00:00Z | 2021-10-19T22:14:35Z |
| rustsec-2020-0168 | mach is unmaintained | 2020-07-14T12:00:00Z | 2023-03-12T06:59:25Z |
| rustsec-2020-0030 | Missing sanitization in mozwire allows local file overwrite of files ending in .conf | 2020-08-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0032 | StrcCtx deallocates a memory region that it doesn't own | 2020-08-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0033 | Matrix::new() drops uninitialized memory | 2020-08-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0034 | Multiple security issues including data race, buffer overflow, and uninitialized memory drop | 2020-08-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0035 | Chunk API does not respect align requirement | 2020-08-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0164 | `cell-project` used incorrect variance when projecting through `&Cell<T>` | 2020-08-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0037 | Misbehaving `HandleLike` implementation can lead to memory safety violation | 2020-08-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0038 | Memory safety issues in `compact::Vec` | 2020-09-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0039 | `index()` allows out-of-bound read and `remove()` has off-by-one error | 2020-09-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0040 | Obstack generates unaligned references | 2020-09-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0060 | futures_task::waker may cause a use-after-free if used on a type that isn't 'static | 2020-09-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0166 | personnummer Input validation error | 2020-09-04T12:00:00Z | 2023-02-02T10:57:52Z |
| rustsec-2020-0041 | Multiple soundness issues in Chunk and InlineArray | 2020-09-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0044 | Unsafe Send implementation in Atom allows data races | 2020-09-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0042 | Missing check in ArrayVec leads to out-of-bounds write. | 2020-09-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0043 | Insufficient size checks in outgoing buffer in ws allows remote attacker to run the process out of memory | 2020-09-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0047 | array_queue pop_back() may cause a use-after-free | 2020-09-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0050 | VecCopy allows misaligned access to elements | 2020-09-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0051 | Obsolete versions of the `rustsec` crate do not support the new V3 advisory format | 2020-10-01T12:00:00Z | 2020-10-02T01:29:11Z |
| rustsec-2020-0057 | crate has been renamed to `cipher` | 2020-10-15T12:00:00Z | 2020-10-25T19:05:32Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2021:0618 | Important: stunnel security update | 2021-02-22T09:54:57Z | 2021-02-22T09:54:57Z |
| alsa-2021:0705 | Important: container-tools:1.0 security update | 2021-03-02T18:20:39Z | 2021-03-02T18:20:39Z |
| alsa-2021:0706 | Important: container-tools:2.0 security update | 2021-03-02T18:48:35Z | 2021-03-02T18:48:35Z |
| alsa-2021:0711 | Important: virt:rhel and virt-devel:rhel security update | 2021-03-03T12:22:25Z | 2021-12-23T15:15:26Z |
| alsa-2021:0734 | Important: nodejs:12 security update | 2021-03-04T15:17:37Z | 2021-03-04T15:17:37Z |
| alsa-2021:0735 | Important: nodejs:10 security update | 2021-03-04T15:17:39Z | 2021-03-04T15:17:39Z |
| alsa-2021:0744 | Important: nodejs:14 security and bug fix update | 2021-03-08T09:55:44Z | 2021-03-08T09:55:44Z |
| alsa-2021:1064 | Moderate: virt:rhel and virt-devel:rhel security update | 2021-04-05T16:17:13Z | 2021-12-23T15:15:26Z |
| alsa-2021:1093 | Important: kernel security, bug fix, and enhancement update | 2021-04-06T13:33:17Z | 2021-08-11T08:54:00Z |
| alsa-2021:1242 | Important: mariadb:10.3 and mariadb-devel:10.3 security update | 2021-04-19T00:00:00Z | 2023-03-13T16:34:13Z |
| alsa-2021:1574 | Moderate: NetworkManager and libnma security, bug fix, and enhancement update | 2021-05-18T05:33:20Z | 2021-08-11T08:54:00Z |
| alsa-2021:1578 | Important: kernel security, bug fix, and enhancement update | 2021-05-18T05:33:57Z | 2021-08-11T08:54:00Z |
| alsa-2021:1585 | Moderate: glibc security, bug fix, and enhancement update | 2021-05-18T05:35:07Z | 2021-08-11T08:54:00Z |
| alsa-2021:1586 | Moderate: GNOME security, bug fix, and enhancement update | 2021-05-18T05:35:26Z | 2021-11-12T10:20:56Z |
| alsa-2021:1598 | Moderate: bluez security update | 2021-05-18T05:37:07Z | 2021-08-11T08:54:00Z |
| alsa-2021:1600 | Moderate: opensc security, bug fix, and enhancement update | 2021-05-18T05:37:30Z | 2023-03-13T16:34:08Z |
| alsa-2021:1609 | Moderate: p11-kit security, bug fix, and enhancement update | 2021-05-18T05:38:50Z | 2023-03-13T16:34:09Z |
| alsa-2021:1627 | Moderate: trousers security, bug fix, and enhancement update | 2021-05-18T05:41:50Z | 2023-03-13T16:34:09Z |
| alsa-2021:1631 | Moderate: python-urllib3 security update | 2021-05-18T05:42:27Z | 2021-05-18T05:42:15Z |
| alsa-2021:1647 | Moderate: samba security, bug fix, and enhancement update | 2021-05-18T05:44:25Z | 2021-11-12T10:20:56Z |
| alsa-2021:1675 | Low: libdb security update | 2021-05-18T05:48:41Z | 2021-08-11T08:54:00Z |
| alsa-2021:1702 | Moderate: brotli security update | 2021-05-18T05:52:13Z | 2021-11-12T10:20:56Z |
| alsa-2021:1734 | Moderate: shim security update | 2021-05-18T05:57:10Z | 2021-08-11T08:54:00Z |
| alsa-2021:1744 | Moderate: sane-backends security update | 2021-05-18T05:58:46Z | 2021-11-12T10:20:56Z |
| alsa-2021:1752 | Low: evolution security, bug fix, and enhancement update | 2021-05-18T06:00:34Z | 2021-08-11T08:54:00Z |
| alsa-2021:1756 | Moderate: qt5-qtbase security and bug fix update | 2021-05-18T06:01:21Z | 2021-08-11T08:54:00Z |
| alsa-2021:1758 | Low: exiv2 security, bug fix, and enhancement update | 2021-05-18T06:01:36Z | 2021-08-11T08:54:00Z |
| alsa-2021:1761 | Moderate: python27:2.7 security and bug fix update | 2021-05-18T06:02:07Z | 2021-05-18T06:01:53Z |
| alsa-2021:1762 | Moderate: virt:rhel and virt-devel:rhel security, bug fix, and enhancement update | 2021-05-18T06:02:26Z | 2021-12-23T15:15:25Z |
| alsa-2021:1789 | Moderate: gssdp and gupnp security update | 2021-05-18T06:05:22Z | 2021-11-12T10:20:56Z |