Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2005-3637 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3530. Reason: This candidate is a duplicate of CVE-2005-3530. Notes: All CVE users should reference CVE-2005-3530 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-17T02:17:00.000Z | 2005-11-22T15:00:00.000Z |
| CVE-2005-3561 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2954. Reason: This candidate is a reservation duplicate of CVE-2005-2954. Notes: All CVE users should reference CVE-2005-2954 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T12:37:00.000Z | 2005-12-10T15:00:00.000Z |
| CVE-2005-3362 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3153. Reason: This candidate is a reservation duplicate of CVE-2005-3153. Notes: All CVE users should reference CVE-2005-3153 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-10-29T06:22:00.000Z | 2005-12-12T15:00:00.000Z |
| CVE-2005-3562 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2955. Reason: This candidate is a reservation duplicate of CVE-2005-2955. Notes: All CVE users should reference CVE-2005-2955 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T12:37:00.000Z | 2005-12-12T15:00:00.000Z |
| CVE-2005-3563 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2956. Reason: This candidate is a duplicate of CVE-2005-2956. Notes: All CVE users should reference CVE-2005-2956 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-16T12:37:00.000Z | 2005-12-12T15:00:00.000Z |
| CVE-2005-4067 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-4031. Reason: This candidate is a reservation duplicate of CVE-2005-4031. Notes: All CVE users should reference CVE-2005-4031 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-12-08T04:00:00.000Z | 2005-12-12T15:00:00.000Z |
| CVE-2005-4127 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-4092. Reason: This candidate is a duplicate of CVE-2005-4092. This candidate was originally published to handle a pre-patch vague announcement, but multiple simultaneous pre-patch announcements resulted in duplicate CVEs that could not be identified until a full patch was released. Notes: All CVE users should reference CVE-2005-4092 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-12-09T16:00:00.000Z | 2006-01-12T15:00:00.000Z |
| CVE-2005-4128 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-4092. Reason: This candidate is a duplicate of CVE-2005-4092. This candidate was originally published to handle a pre-patch vague announcement, but multiple simultaneous pre-patch announcements resulted in duplicate CVEs that could not be identified until a full patch was released. Notes: All CVE users should reference CVE-2005-4092 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-12-09T16:00:00.000Z | 2006-01-12T15:00:00.000Z |
| CVE-2006-0186 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-4500. Reason: This candidate is a duplicate of CVE-2005-4500. Notes: All CVE users should reference CVE-2005-4500 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-01-12T16:00:00.000Z | 2006-01-17T15:00:00.000Z |
| CVE-2005-3994 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3967. Reason: This candidate is a duplicate of CVE-2005-3967. Notes: All CVE users should reference CVE-2005-3967 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-12-05T05:00:00.000Z | 2006-02-03T15:00:00.000Z |
| CVE-2006-0975 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-0459. Reason: This candidate is a reservation duplicate of CVE-2006-0459. Notes: All CVE users should reference CVE-2006-0459 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-03-03T16:00:00.000Z | 2006-03-10T15:00:00.000Z |
| CVE-2006-1424 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-1482. Reason: This candidate is a duplicate of CVE-2006-1482. Notes: All CVE users should reference CVE-2006-1482 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-03-29T01:00:00.000Z | 2006-04-04T13:00:00.000Z |
| CVE-2006-0092 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-0992, CVE-2006-0158. Reason: this candidate was intended for one issue, but a typo caused it to be associated with a Novell/Groupwise issue. In addition, this issue was a duplicate of a SiteSuite issue that was also assigned CVE-2006-0158. Notes: All CVE users should consult CVE-2006-0992 and CVE-2006-0158 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-01-05T16:00:00.000Z | 2006-04-14T13:00:00.000Z |
| CVE-2006-1845 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-0537. Reason: This candidate is a duplicate of CVE-2006-0537. Notes: All CVE users should reference CVE-2006-0537 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-04-19T20:00:00.000Z | 2006-04-26T13:00:00.000Z |
| CVE-2006-2125 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-3779. Reason: This candidate is a duplicate of CVE-2005-3779. Notes: All CVE users should reference CVE-2005-3779 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-05-02T02:00:00.000Z | 2006-05-04T13:00:00.000Z |
| CVE-2006-2215 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-2181. Reason: This candidate is a duplicate of CVE-2006-2181. Notes: All CVE users should reference CVE-2006-2181 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-05-05T14:00:00.000Z | 2006-05-10T13:00:00.000Z |
| CVE-2006-2350 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-2344. Reason: This candidate is a duplicate of CVE-2006-2344. Notes: All CVE users should reference CVE-2006-2344 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-05-15T14:00:00.000Z | 2006-05-20T13:00:00.000Z |
| CVE-2006-2493 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-1861. Reason: This candidate is a duplicate of CVE-2006-1861. Notes: All CVE users should reference CVE-2006-1861 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-05-20T06:59:00.000Z | 2006-06-05T13:00:00.000Z |
| CVE-2005-4633 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-4619. Reason: This candidate is a duplicate of CVE-2005-4619. Notes: All CVE users should reference CVE-2005-4619 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-01-09T16:00:00.000Z | 2006-07-03T13:00:00.000Z |
| CVE-2005-3990 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-3619. Reason: This candidate is a duplicate of CVE-2006-3619. Notes: All CVE users should reference CVE-2006-3619 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-12-05T04:00:00.000Z | 2006-07-28T13:00:00.000Z |
| CVE-2006-3248 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-4011. Reason: This candidate is a duplicate of CVE-2005-4011. Notes: All CVE users should reference CVE-2005-4011 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-06-27T14:00:00.000Z | 2006-08-08T13:00:00.000Z |
| CVE-2006-4216 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-4159. Reason: This candidate is a duplicate of CVE-2006-4159. Notes: All CVE users should reference CVE-2006-4159 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-08-18T03:00:00.000Z | 2006-08-29T13:00:00.000Z |
| CVE-2006-4225 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-3139. Reason: This candidate is a duplicate of CVE-2006-3139. Notes: All CVE users should reference CVE-2006-3139 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-08-18T23:55:00.000Z | 2006-08-29T13:00:00.000Z |
| CVE-2006-4261 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-4253. Reason: This candidate is a duplicate of CVE-2006-4253. Notes: All CVE users should reference CVE-2006-4253 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-08-22T00:00:00.000Z | 2006-09-25T13:00:00.000Z |
| CVE-2006-4896 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-4785. Reason: This candidate is a duplicate of CVE-2006-4785. Notes: All CVE users should reference CVE-2006-4785 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-09-20T02:00:00.000Z | 2006-09-25T13:00:00.000Z |
| CVE-2006-4341 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-4340. Reason: This candidate was withdrawn by its CNA. It is a reservation duplicate of CVE-2006-4340. Notes: All CVE users should reference CVE-2006-4340 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta | N/A | N/A | 2006-09-11T23:00:00.000Z | 2006-10-05T13:00:00.000Z |
| CVE-2006-5848 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-5878. Reason: This candidate is a duplicate of CVE-2006-5878. Notes: All CVE users should reference CVE-2006-5878 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-11-10T07:00:00.000Z | 2006-11-18T15:00:00.000Z |
| CVE-2006-5941 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2177. Reason: This candidate is a duplicate of CVE-2005-2177. Notes: All CVE users should reference CVE-2005-2177 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-11-24T22:00:00.000Z | 2006-11-30T15:00:00.000Z |
| CVE-2006-6362 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-5873. Reason: This candidate is a duplicate of CVE-2006-5873. Notes: All CVE users should reference CVE-2006-5873 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2006-12-07T16:00:00.000Z | 2006-12-11T15:00:00.000Z |
| CVE-2006-3432 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-0028. Reason: This candidate is a reservation duplicate of CVE-2007-0028. The original assigner switched to a new CVE number. Notes: All CVE users should reference CVE-2007-0028 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-01-10T03:00:00.000Z | 2007-01-12T15:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2003-0741 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:00.993 | 2023-11-07T01:56:21.417 |
| fkie_cve-2003-0790 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: the reported issue i… | 2003-11-17T05:00:00.000 | 2023-11-07T01:56:22.157 |
| fkie_cve-2003-0798 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.027 | 2023-11-07T01:56:22.247 |
| fkie_cve-2003-0799 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.040 | 2023-11-07T01:56:22.457 |
| fkie_cve-2003-0800 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.073 | 2023-11-07T01:56:22.740 |
| fkie_cve-2003-0862 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0813. Reason: This candid… | 2003-11-17T05:00:00.000 | 2023-11-07T01:56:23.453 |
| fkie_cve-2003-0867 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0662. Reason: This candid… | 2003-11-17T05:00:00.000 | 2023-11-07T01:56:23.600 |
| fkie_cve-2003-0868 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.087 | 2023-11-07T01:56:23.630 |
| fkie_cve-2003-0869 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.103 | 2023-11-07T01:56:23.840 |
| fkie_cve-2003-0873 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.137 | 2023-11-07T01:56:24.077 |
| fkie_cve-2003-0879 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0518. Reason: This candid… | 2003-11-17T05:00:00.000 | 2023-11-07T01:56:24.313 |
| fkie_cve-2003-0917 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.150 | 2023-11-07T01:56:24.537 |
| fkie_cve-2003-0918 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.183 | 2023-11-07T01:56:24.783 |
| fkie_cve-2003-0919 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.197 | 2023-11-07T01:56:24.990 |
| fkie_cve-2003-0920 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.213 | 2023-11-07T01:56:25.200 |
| fkie_cve-2003-0921 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.243 | 2023-11-07T01:56:25.417 |
| fkie_cve-2003-0922 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.290 | 2023-11-07T01:56:25.630 |
| fkie_cve-2003-0923 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.323 | 2023-11-07T01:56:25.840 |
| fkie_cve-2003-0952 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.337 | 2023-11-07T01:56:26.243 |
| fkie_cve-2003-0953 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.353 | 2023-11-07T01:56:26.450 |
| fkie_cve-2003-0964 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: N/A. Notes: none | 2003-11-17T05:00:00.000 | 2023-11-07T01:56:26.890 |
| fkie_cve-2003-1047 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0540. Reason: This candid… | 2004-08-06T04:00:00.000 | 2023-11-07T01:56:27.937 |
| fkie_cve-2003-1130 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-1071. Reason: This candid… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:28.640 |
| fkie_cve-2003-1147 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0955. Reason: This candid… | 2003-12-31T05:00:00.000 | 2023-11-07T01:56:28.780 |
| fkie_cve-2003-1217 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.387 | 2023-11-07T01:56:29.300 |
| fkie_cve-2003-1218 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.400 | 2023-11-07T01:56:29.520 |
| fkie_cve-2003-1565 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1565. Reason: This candid… | 2003-08-27T04:00:00.000 | 2023-11-07T01:56:32.510 |
| fkie_cve-2003-1600 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.897 | 2023-11-07T01:56:32.807 |
| fkie_cve-2003-1601 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:13.957 | 2023-11-07T01:56:33.120 |
| fkie_cve-2003-1602 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:14.037 | 2023-11-07T01:56:33.363 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-wmcq-3wfx-qjx5 |
|
Directory Traversal in nodeload-nmickuli | 2020-09-01T17:33:30Z | 2020-08-31T18:22:02Z |
| ghsa-6qh5-wx38-q92g |
|
Directory Traversal in ltt.js | 2019-05-30T17:15:59Z | 2020-08-31T18:22:04Z |
| ghsa-g376-whg7-896m |
|
Directory Traversal in yjmyjmyjm | 2020-09-01T18:45:53Z | 2020-08-31T18:23:39Z |
| ghsa-qj73-v688-wqxf |
|
Hijacked Environment Variables in proxy.js | 2018-08-29T23:19:13Z | 2020-08-31T18:26:04Z |
| ghsa-jcw8-r9xm-32c6 |
|
Command Injection in dns-sync | 2018-07-18T18:28:02Z | 2020-08-31T18:26:20Z |
| ghsa-q75g-2496-mxpp |
|
Regular Expression Denial of Service in parsejson | 2018-07-24T20:11:13Z | 2020-08-31T18:26:32Z |
| ghsa-jxqq-cqm6-pfq9 |
|
Regular Expression Denial of Service in slug | 2018-07-24T20:06:45Z | 2020-08-31T18:26:54Z |
| ghsa-6xhf-x49c-m5m6 |
|
Github Token Leak in aegir | 2018-07-24T20:04:11Z | 2020-08-31T18:27:14Z |
| ghsa-m36m-x4c5-rjxj |
|
Silently Runs Cryptocoin Miner in hooka-tools | 2020-09-01T19:01:58Z | 2020-08-31T18:27:21Z |
| ghsa-7x92-2j68-h32c |
|
Directory Traversal in featurebook | 2020-09-01T19:03:02Z | 2020-08-31T18:27:38Z |
| ghsa-wm7q-rxch-43mx |
|
Byass due to validation before canonicalization in serve | 2020-09-01T19:38:33Z | 2020-08-31T18:29:10Z |
| ghsa-wrw9-m778-g6mc |
|
Memory Exposure in bl | 2019-06-03T17:27:57Z | 2020-08-31T18:29:15Z |
| ghsa-g74r-ffvr-5q9f |
|
Memory Exposure in concat-stream | 2019-06-03T17:26:44Z | 2020-08-31T18:29:17Z |
| ghsa-xc7v-wxcw-j472 |
|
Memory Exposure in tunnel-agent | 2019-06-03T17:08:26Z | 2020-08-31T18:29:19Z |
| ghsa-jj6g-7j8p-7gf2 |
|
Cross-Site Scripting in bracket-template | 2019-05-30T21:03:24Z | 2020-08-31T18:29:43Z |
| ghsa-7jfh-2xc9-ccv7 |
|
Cross-Site Scripting in public | 2019-05-31T23:46:40Z | 2020-08-31T18:29:45Z |
| ghsa-m8fw-534v-xm85 |
|
Cross-Site Scripting (XSS) in cloudcmd | 2019-06-04T15:43:29Z | 2020-08-31T18:31:00Z |
| ghsa-2xv3-h762-ccxv |
|
Out-of-bounds Read in concat-with-sourcemaps | 2019-05-29T19:18:02Z | 2020-08-31T18:31:05Z |
| ghsa-8xqr-4cpm-wx7g |
|
Cross-Site Scripting in react-svg | 2019-05-31T23:47:27Z | 2020-08-31T18:31:14Z |
| ghsa-57cf-349j-352g |
|
Out-of-bounds Read in npmconf | 2019-06-12T16:37:00Z | 2020-08-31T18:31:27Z |
| ghsa-73cw-jxmm-qpgh |
|
Path Traversal in localhost-now | 2019-06-11T16:40:48Z | 2020-08-31T18:31:31Z |
| ghsa-xm7f-x4wx-wmgv |
|
Out-of-bounds Read in byte | 2019-06-04T15:47:43Z | 2020-08-31T18:31:36Z |
| ghsa-cff4-rrq6-h78w |
|
Command Injection in command-exists | 2019-06-03T17:31:26Z | 2020-08-31T18:31:41Z |
| ghsa-j4mr-9xw3-c9jx |
|
Out-of-bounds Read in base64-url | 2019-05-31T23:47:01Z | 2020-08-31T18:31:43Z |
| ghsa-8f93-rv4p-x4jw |
|
SQL Injection in sql | 2019-06-12T16:36:52Z | 2020-08-31T18:31:48Z |
| ghsa-28xh-wpgr-7fm8 |
|
Command Injection in open | 2019-06-20T15:35:49Z | 2020-08-31T18:31:51Z |
| ghsa-8h8v-6qqm-fwpq |
|
Path Traversal in express-cart | 2020-09-01T21:06:38Z | 2020-08-31T18:32:22Z |
| ghsa-g3qw-9pgp-xpj4 |
|
Out-of-bounds Read in njwt | 2020-09-01T21:08:44Z | 2020-08-31T18:32:28Z |
| ghsa-992f-wf4w-x36v |
|
Prototype Pollution in merge-objects | 2020-09-01T21:16:13Z | 2020-08-31T18:33:09Z |
| ghsa-9hqj-38j2-5jgm |
|
Command Injection in ascii-art | 2020-09-01T21:19:23Z | 2020-08-31T18:33:35Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2020-80 |
|
In libImaging/SgiRleDecode.c in Pillow through 7.0.0, a number of out-of-bounds reads exi… | pillow | 2020-06-25T19:15:00Z | 2020-07-27T19:15:00Z |
| pysec-2020-154 |
|
In Wagtail before versions 2.7.4 and 2.9.3, when a form page type is made available to Wa… | wagtail | 2020-07-20T18:15:00Z | 2020-07-28T12:29:00Z |
| pysec-2020-151 |
|
Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not es… | uvicorn | 2020-07-27T12:15:00Z | 2020-07-29T19:15:00Z |
| pysec-2020-44 |
|
This affects the package Gerapy from 0 and before 0.9.3. The input being passed to Popen,… | gerapy | 2020-07-29T13:15:00Z | 2020-07-31T14:59:00Z |
| pysec-2020-30 |
|
A buffer overflow in the patching routine of bsdiff4 before 1.2.0 allows an attacker to w… | bsdiff4 | 2020-07-22T23:15:00Z | 2020-07-31T16:15:00Z |
| pysec-2020-150 |
|
This affects all versions of package uvicorn. The request logger provided by the package … | uvicorn | 2020-07-27T12:15:00Z | 2020-08-04T18:05:00Z |
| pysec-2020-76 |
|
Pillow before 7.1.0 has multiple out-of-bounds reads in libImaging/FliDecode.c. | pillow | 2020-06-25T19:15:00Z | 2020-08-08T20:15:00Z |
| pysec-2020-38 |
|
django-celery-results through 1.2.1 stores task results in the database. Among the data i… | django-celery-results | 2020-08-11T21:15:00Z | 2020-08-14T20:09:00Z |
| pysec-2020-46 |
|
In httplib2 before version 0.18.0, an attacker controlling unescaped part of uri for `htt… | httplib2 | 2020-05-20T16:15:00Z | 2020-08-19T18:56:00Z |
| pysec-2020-102 |
|
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The sal… | salt | 2020-04-30T17:15:00Z | 2020-08-20T01:17:00Z |
| pysec-2020-103 |
|
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2. The sal… | salt | 2020-04-30T17:15:00Z | 2020-08-20T01:17:00Z |
| pysec-2020-70 |
|
In openapi-python-client before version 0.5.3, there is a path traversal vulnerability. I… | openapi-python-client | 2020-08-14T17:15:00Z | 2020-08-20T18:02:00Z |
| pysec-2020-71 |
|
In openapi-python-client before version 0.5.3, clients generated with a maliciously craft… | openapi-python-client | 2020-08-14T17:15:00Z | 2020-08-20T18:11:00Z |
| pysec-2019-10 |
|
An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before … | django | 2019-07-01T14:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-102 |
|
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 20… | limnoria | 2019-11-16T01:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-103 |
|
KeyIdentity LinOTP before 2.10.5.3 has Incorrect Access Control (issue 1 of 2). | linotp | 2019-06-27T14:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-11 |
|
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x b… | django | 2019-08-02T15:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-118 |
|
In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes t… | rpyc | 2019-10-03T20:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-12 |
|
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x b… | django | 2019-08-02T15:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-120 |
|
scapy 2.4.0 is affected by: Denial of Service. The impact is: infinite loop, resource con… | scapy | 2019-07-19T16:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-121 |
|
slixmpp version before commit 7cd73b594e8122dddf847953fcfc85ab4d316416 contains an incorr… | slixmpp | 2019-02-04T21:29:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-128 |
|
In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, … | twisted | 2019-06-10T12:29:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-134 |
|
The validators package 0.12.2 through 0.12.5 for Python enters an infinite loop when vali… | validators | 2019-12-05T01:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-14 |
|
An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x b… | django | 2019-08-02T15:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-172 |
|
In Apache Incubator Superset before 0.31 user could query database metadata information f… | apache-superset | 2019-12-16T22:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-18 |
|
Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontro… | django | 2019-02-11T13:29:00Z | 2020-08-24T17:37:00Z |
| pysec-2020-172 |
|
There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling t… | pillow | 2020-01-05T22:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2020-177 |
|
In SaltStack Salt through 2019.2.0, the salt-api NET API with the ssh client enabled is v… | salt | 2020-01-17T02:15:00Z | 2020-08-24T17:37:00Z |
| pysec-2019-127 |
|
In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 befo… | trytond | 2019-04-05T01:29:00Z | 2020-08-26T12:45:00Z |
| pysec-2020-53 |
|
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. Any user authent… | keystone | 2020-05-07T00:15:00Z | 2020-09-02T16:15:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2014-0082 | actionpack/lib/action_view/template/text.rb in Action View in Ruby on Rails 3.x before 3.… | 2014-02-18T00:00:00.000Z |
| gsd-2014-0036 | The rbovirt gem before 0.0.24 for Ruby uses the rest-client gem with SSL verification dis… | 2014-03-05T00:00:00.000Z |
| gsd-2014-2322 | Arabic Prawn Gem for Ruby contains a flaw in the lib/string_utf_support.rb file. The issu… | 2014-03-10T00:00:00.000Z |
| gsd-2014-0135 | Kafo before 0.3.17 and 0.4.x before 0.5.2, as used by Foreman, uses world-readable permis… | 2014-03-13T00:00:00.000Z |
| gsd-2014-4920 | The twitter-bootstrap-rails Gem for Rails contains a flaw that enables a reflected cross-… | 2014-03-25T00:00:00.000Z |
| gsd-2014-0156 | Awesome spawn contains OS command injection vulnerability, which allows execution of addi… | 2014-03-28T00:00:00.000Z |
| gsd-2014-2888 | sfpagent Gem for Ruby contains a flaw that is triggered as JSON[body] input is not proper… | 2014-04-16T00:00:00.000Z |
| gsd-2014-0130 | There is a vulnerability in the 'implicit render' functionality in Ruby on Rails.The impl… | 2014-05-06T00:00:00.000Z |
| gsd-2014-10075 | The karo gem 2.3.8 for Ruby allows Remote command injection via the host field. karo Gem… | 2014-06-30T00:00:00.000Z |
| gsd-2014-4991 | (1) lib/dataset/database/mysql.rb and (2) lib/dataset/database/postgresql.rb in the codde… | 2014-06-30T00:00:00.000Z |
| gsd-2014-4992 | cap-strap Gem for Ruby contains a flaw that is due to the application exposing credential… | 2014-06-30T00:00:00.000Z |
| gsd-2014-4993 | backup-agoddard Gem for Ruby contains a flaw in /lib/backup/cli/utility.rb that is due to… | 2014-06-30T00:00:00.000Z |
| gsd-2014-4994 | gyazo Gem for Ruby contains a flaw in client.rb that is triggered when handling metachara… | 2014-06-30T00:00:00.000Z |
| gsd-2014-4995 | VladTheEnterprising Gem for Ruby contains a flaw as the program creates temporary files i… | 2014-06-30T00:00:00.000Z |
| gsd-2014-4996 | VladTheEnterprising Gem for Ruby contains a flaw as the program creates temporary files i… | 2014-06-30T00:00:00.000Z |
| gsd-2014-4997 | point-cli Gem for Ruby contains a flaw in /lib/commands/setup.rb that is due to the appli… | 2014-06-30T00:00:00.000Z |
| gsd-2014-4998 | lean-ruport Gem for Ruby contains a flaw in /test/tc_database.rb that is due to the appli… | 2014-06-30T00:00:00.000Z |
| gsd-2014-4999 | kajam Gem for Ruby contains a flaw in /dataset/lib/dataset/database/postgresql.rb that is… | 2014-06-30T00:00:00.000Z |
| gsd-2014-5000 | lawn-login Gem for Ruby contains a flaw in /lib/lawn.rb that is due to the application ex… | 2014-06-30T00:00:00.000Z |
| gsd-2014-5001 | kcapifony Gem for Ruby contains a flaw in /lib/ksymfony1.rb that is triggered as the prog… | 2014-06-30T00:00:00.000Z |
| gsd-2014-5002 | lynx Gem for Ruby contains a flaw in command/basic.rb that is due to the application expo… | 2014-06-30T00:00:00.000Z |
| gsd-2014-5003 | ciborg Gem for Ruby contains a flaw as default.rb creates temporary files insecurely. It … | 2014-06-30T00:00:00.000Z |
| gsd-2014-3482 | SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgre… | 2014-07-02T00:00:00.000Z |
| gsd-2014-3483 | SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgre… | 2014-07-02T00:00:00.000Z |
| gsd-2014-5004 | brbackup Gem for Ruby contains a flaw that is due to the program exposing password inform… | 2014-07-09T00:00:00.000Z |
| gsd-2013-0334 | Bundler before 1.7, when multiple top-level source lines are used, allows remote attacker… | 2014-08-13T00:00:00.000Z |
| gsd-2014-3514 | The create_with functionality in Active Record was implemented incorrectly and completely… | 2014-08-18T00:00:00.000Z |
| gsd-2014-5441 | Fat Free CRM Gem contains a javascript cross-site scripting (XSS) vulnerability. When a u… | 2014-08-22T00:00:00.000Z |
| gsd-2014-10077 | i18n Gem for Ruby contains a flaw in the Hash#slice() function in lib/i18n/core_ext/hash.… | 2014-09-27T00:00:00.000Z |
| gsd-2014-7818 | Specially crafted requests can be used to determine whether a file exists on the filesyst… | 2014-10-30T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-1397 | Malicious code in azuremediaplayer (npm) | 2022-05-31T13:00:57Z | 2022-05-31T13:00:58Z |
| mal-2022-173 | Malicious code in @clover-microapp/utils-isomorphic (npm) | 2022-05-31T13:01:48Z | 2022-05-31T13:01:53Z |
| mal-2022-5675 | Malicious code in react-swipeable-wrapper-example (npm) | 2022-05-31T13:05:29Z | 2022-05-31T13:05:30Z |
| mal-2022-7141 | Malicious code in whjr-analytics (npm) | 2022-05-31T13:05:29Z | 2022-05-31T13:05:30Z |
| mal-2022-3812 | Malicious code in influxdb-client-examples (npm) | 2022-05-31T13:05:29Z | 2022-05-31T13:05:33Z |
| mal-2022-293 | Malicious code in @gpsu/common (npm) | 2022-05-31T13:08:18Z | 2022-05-31T13:08:19Z |
| mal-2022-6122 | Malicious code in simple-project-pkg-b (npm) | 2022-05-31T13:08:52Z | 2022-05-31T13:08:52Z |
| mal-2022-6967 | Malicious code in vor-test-project-npm-please-ignore-1 (npm) | 2022-05-31T13:08:52Z | 2022-05-31T13:08:52Z |
| mal-2022-7086 | Malicious code in web3-util-update (npm) | 2022-05-31T13:10:51Z | 2022-05-31T13:10:51Z |
| mal-2022-6765 | Malicious code in uitk-react-utils (npm) | 2022-05-31T13:11:41Z | 2022-05-31T13:11:41Z |
| mal-2022-1507 | Malicious code in bernie-abacus (npm) | 2022-05-31T13:11:41Z | 2022-05-31T13:11:42Z |
| mal-2022-1508 | Malicious code in bernie-analytics (npm) | 2022-05-31T13:11:41Z | 2022-05-31T13:11:49Z |
| mal-2022-625 | Malicious code in @techops-ui/ping-authentication (npm) | 2022-05-31T13:12:30Z | 2022-05-31T13:12:31Z |
| mal-2022-1863 | Malicious code in ceye-test-0001 (npm) | 2022-05-31T13:13:56Z | 2022-05-31T13:13:56Z |
| mal-2022-4949 | Malicious code in npmupload_test-xxxxxxxxxxxxx (npm) | 2022-05-31T13:13:56Z | 2022-05-31T13:14:04Z |
| mal-2022-5566 | Malicious code in qunit-begin (npm) | 2022-05-31T13:13:55Z | 2022-05-31T13:14:05Z |
| mal-2022-4318 | Malicious code in linter-marlint (npm) | 2022-05-31T13:14:46Z | 2022-05-31T13:14:47Z |
| mal-2022-5636 | Malicious code in react-devtools-release-script (npm) | 2022-05-31T13:14:46Z | 2022-05-31T13:14:47Z |
| mal-2022-7154 | Malicious code in wireit-website (npm) | 2022-05-31T13:14:46Z | 2022-05-31T13:14:47Z |
| mal-2022-4446 | Malicious code in maddysmith-test (npm) | 2022-05-31T13:15:19Z | 2022-05-31T13:15:20Z |
| mal-2022-3647 | Malicious code in hls-outreach-sms (npm) | 2022-05-31T13:16:10Z | 2022-05-31T13:16:10Z |
| mal-2022-5299 | Malicious code in perfetto-ui (npm) | 2022-05-31T13:16:10Z | 2022-05-31T13:16:10Z |
| mal-2022-7071 | Malicious code in web-playback-sdk-sample-app (npm) | 2022-05-31T13:16:10Z | 2022-05-31T13:16:10Z |
| mal-2022-6263 | Malicious code in spotify.github.io (npm) | 2022-05-31T13:16:10Z | 2022-05-31T13:16:14Z |
| mal-2022-2927 | Malicious code in express-lastest (npm) | 2022-05-31T13:18:42Z | 2022-05-31T13:18:43Z |
| mal-2022-2017 | Malicious code in colors-rgb (npm) | 2022-05-31T13:19:32Z | 2022-05-31T13:19:33Z |
| mal-2022-2108 | Malicious code in com.unity.xr.magicleap (npm) | 2022-05-31T13:22:05Z | 2022-05-31T13:22:06Z |
| mal-2022-2751 | Malicious code in enterprise_api_app (npm) | 2022-05-31T13:22:05Z | 2022-05-31T13:22:06Z |
| mal-2022-5380 | Malicious code in pm-web-mapp-shared (npm) | 2022-05-31T13:22:06Z | 2022-05-31T13:22:06Z |
| mal-2022-6084 | Malicious code in sherlocksecure (npm) | 2022-05-31T13:22:05Z | 2022-05-31T13:22:06Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-drupal-2022-25277 | 2024-03-06T10:52:46.499Z | 2025-04-03T14:40:37.652Z | |
| bit-drupal-2022-25278 | 2024-03-06T10:52:33.986Z | 2025-04-03T14:40:37.652Z | |
| bit-ejbca-2020-25276 | 2024-03-06T10:52:38.396Z | 2025-04-03T14:40:37.652Z | |
| bit-ejbca-2020-28942 | 2024-03-06T10:52:27.072Z | 2025-04-03T14:40:37.652Z | |
| bit-ejbca-2021-40086 | 2024-03-06T10:52:17.174Z | 2025-04-03T14:40:37.652Z | |
| bit-ejbca-2021-40087 | 2024-03-06T10:52:04.494Z | 2025-04-03T14:40:37.652Z | |
| bit-ejbca-2021-40088 | 2024-03-06T10:51:53.209Z | 2025-04-03T14:40:37.652Z | |
| bit-ejbca-2021-40089 | 2024-03-06T10:51:40.512Z | 2025-04-03T14:40:37.652Z | |
| bit-ejbca-2022-34831 | 2024-03-06T10:51:28.966Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2020-7009 | 2024-03-06T10:54:57.683Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2020-7014 | 2024-03-06T10:54:49.268Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2020-7019 | 2024-03-06T10:54:38.792Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2020-7020 | 2024-03-06T10:54:24.872Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2020-7021 | 2024-03-06T10:54:14.978Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2021-22132 | 2024-03-06T10:54:05.664Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2021-22134 | 2024-03-06T10:53:55.889Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2021-22135 | 2024-03-06T10:53:44.675Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2021-22137 | 2024-03-06T10:53:35.098Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2021-22144 | 2024-03-06T10:53:22.503Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2021-22146 | 2024-03-06T10:53:02.276Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2021-22147 | 2024-03-06T10:52:52.691Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2022-23708 | 2024-03-06T10:52:31.870Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2022-23712 | 2024-03-06T10:52:20.467Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2023-46673 | 2024-03-06T10:51:39.565Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2023-49921 | 2024-07-31T07:18:47.750Z | 2025-04-03T14:40:37.652Z | |
| bit-elk-2020-7016 | 2024-03-06T10:51:48.566Z | 2025-04-03T14:40:37.652Z | |
| bit-elk-2020-7017 | 2024-03-06T10:51:36.803Z | 2025-04-03T14:40:37.652Z | |
| bit-elk-2024-23443 | 2024-06-21T07:17:42.200Z | 2025-04-03T14:40:37.652Z | |
| bit-elk-2024-37288 | 2024-09-11T07:10:22.120Z | 2025-04-03T14:40:37.652Z | |
| bit-elk-2024-43708 | 2025-01-27T07:09:55.231Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-ry09679 | go-redis is the official Redis client library for the Go programming language | 2026-01-30T15:31:53.660443Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sb25660 | net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines | 2026-01-30T16:44:27.197226Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sg80587 | It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session | 2026-01-30T14:00:21.027172Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sh75345 | Cancelling a query (e | 2026-01-30T15:05:23.442396Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-so16176 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:39:24.255623Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sq13072 | Moby is an open source container framework developed by Docker Inc | 2026-01-30T15:02:22.907312Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sw55801 | Within HostnameError | 2026-01-30T16:24:55.642434Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-sy95837 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:28:53.594094Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tf33105 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:29:25.639055Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tf52804 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:08:23.107112Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ti76190 | Cancelling a query (e | 2026-01-30T15:02:23.296683Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tk38210 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:46:25.995358Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tl71584 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:23:53.438748Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-tr11635 | Cancelling a query (e | 2026-01-30T15:46:54.229170Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ts12850 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:17:53.937628Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ts42581 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T15:29:23.600518Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ty78539 | ParseAddress function constructs domain-literal address components through repeated string concatenation | 2026-01-30T16:35:55.295657Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ui65993 | Within HostnameError | 2026-01-30T16:21:25.457624Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uj17204 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:52.998379Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ul17352 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T16:29:25.464127Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-um63521 | Within HostnameError | 2026-01-30T16:12:25.029065Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-ur80185 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:30:24.609590Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-uz73015 | Cancelling a query (e | 2026-01-30T16:09:25.315533Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vc16841 | Within HostnameError | 2026-01-30T15:02:22.944744Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vl83369 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-01-30T15:03:53.758258Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-vv68546 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-01-30T16:35:55.883570Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wg18689 | attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests | 2026-01-30T16:29:25.690410Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wi17406 | Redis is an open source, in-memory database that persists on disk | 2026-01-30T17:35:28.375848Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-wq07901 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-01-30T16:01:54.911193Z | 2026-01-29T18:58:54Z |
| cleanstart-2026-xd92996 | Cancelling a query (e | 2026-01-30T15:46:24.650971Z | 2026-01-29T18:58:54Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2020-035 | 2020-11-18T17:15:24.000Z | 2023-08-11T17:43:11.000Z | |
| drupal-contrib-2020-038 | 2020-11-18T17:27:58.000Z | 2023-08-11T17:45:32.000Z | |
| drupal-contrib-2020-030 | 2020-07-29T12:23:17.000Z | 2023-08-11T17:46:26.000Z | |
| drupal-contrib-2020-021 | 2020-05-27T15:47:10.000Z | 2023-08-11T17:47:04.000Z | |
| drupal-contrib-2020-024 | 2020-06-10T16:44:34.000Z | 2023-08-11T17:47:56.000Z | |
| drupal-contrib-2020-027 | 2020-07-22T17:58:17.000Z | 2023-08-11T17:49:02.000Z | |
| drupal-contrib-2020-028 | 2020-07-22T18:48:10.000Z | 2023-08-11T17:49:38.000Z | |
| drupal-contrib-2020-029 | 2020-07-22T18:53:26.000Z | 2023-08-11T17:49:52.000Z | |
| drupal-contrib-2020-020 | 2020-05-27T15:32:52.000Z | 2023-08-11T17:51:01.000Z | |
| drupal-contrib-2020-019 | 2020-05-13T16:44:40.000Z | 2023-08-11T17:51:24.000Z | |
| drupal-contrib-2020-018 | 2020-05-13T16:22:47.000Z | 2023-08-11T17:53:41.000Z | |
| drupal-contrib-2020-017 | 2020-05-06T17:02:39.000Z | 2023-08-11T17:54:03.000Z | |
| drupal-contrib-2020-016 | 2020-05-06T16:59:39.000Z | 2023-08-11T17:54:28.000Z | |
| drupal-contrib-2020-015 | 2020-05-06T16:55:06.000Z | 2023-08-11T17:54:54.000Z | |
| drupal-contrib-2020-014 | 2020-05-06T16:52:16.000Z | 2023-08-11T17:55:18.000Z | |
| drupal-contrib-2020-013 | 2020-05-06T16:50:39.000Z | 2023-08-11T17:55:41.000Z | |
| drupal-contrib-2020-012 | 2020-05-06T16:47:19.000Z | 2023-08-11T17:56:01.000Z | |
| drupal-contrib-2020-011 | 2020-05-06T16:43:59.000Z | 2023-08-11T17:56:25.000Z | |
| drupal-contrib-2020-002 | 2020-01-22T17:36:50.000Z | 2023-08-11T17:58:05.000Z | |
| drupal-contrib-2020-003 | 2020-02-05T16:59:21.000Z | 2023-08-11T17:58:52.000Z | |
| drupal-contrib-2020-004 | 2020-02-19T17:22:22.000Z | 2023-08-11T17:59:12.000Z | |
| drupal-contrib-2020-005 | 2020-03-04T17:06:57.000Z | 2023-08-11T17:59:40.000Z | |
| drupal-contrib-2020-006 | 2020-03-11T15:53:32.000Z | 2023-08-11T18:00:08.000Z | |
| drupal-contrib-2020-008 | 2020-03-25T18:05:38.000Z | 2023-08-11T18:00:53.000Z | |
| drupal-contrib-2020-010 | 2020-04-15T15:45:46.000Z | 2023-08-11T18:01:50.000Z | |
| drupal-contrib-2019-089 | 2019-11-13T18:10:23.000Z | 2023-08-11T18:14:07.000Z | |
| drupal-contrib-2019-095 | 2019-12-11T18:59:46.000Z | 2023-08-11T18:15:27.000Z | |
| drupal-contrib-2019-094 | 2019-12-11T18:38:32.000Z | 2023-08-11T18:15:45.000Z | |
| drupal-contrib-2019-093 | 2019-12-11T18:32:17.000Z | 2023-08-11T18:16:07.000Z | |
| drupal-contrib-2019-092 | 2019-12-11T18:20:59.000Z | 2023-08-11T18:16:26.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2006-000630 | Wiki clone products vulnerable to denial of service attacks | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000631 | ACollab SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000632 | ATutor cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000633 | ServerView cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000634 | ServerView directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000635 | Geeklog cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000636 | Loudblog cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000637 | QwikiWiki cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000638 | Dokeos cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000640 | Drupal cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000641 | Kiri directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000642 | 04WebServer cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000643 | 04WebServer directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000644 | NetCommons cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000646 | Owl SQL injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000647 | Owl cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000648 | mail f/w system vulnerable to allow unauthorized email transmissionk | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000649 | Cybozu Office 6 information disclosure vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000650 | Cybozu products vulnerable to directory traversal | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000651 | Cybozu products vulnerable to directory traversal | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000652 | MDPro cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000653 | Movable Type vulnerabile to cross-site scripting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000654 | SugarCRM cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000665 | TeraStation HD-HTGL series cross-site request forgery vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000695 | Kmail CGI authentication bypass vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000734 | Ichitaro buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000736 | NEC MultiWriter 1700C web server authentication bypass vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000737 | NEC MultiWriter 1700C/7500C FTP server vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000742 | desknet's buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2006-000753 | Ruby cgi.rb Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00055 | amCharts Flash存在多个跨站脚本漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00056 | amMap存在多个跨站脚本漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00057 | Ipswitch WhatsUp Gold目录遍历漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00058 | Redmine插件redmine_git_hosting任意命令执行漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00059 | phpMyAdmin存在多个跨站脚本漏洞(CNVD-2015-00059) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00060 | phpMyAdmin存在多个跨站脚本漏洞(CNVD-2015-00060) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00062 | Google Chrome整数溢出漏洞(CNVD-2015-00062) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00063 | Google Chrome内存错误引用漏洞(CNVD-2015-00063) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00064 | SweetRice CMS密码重置漏洞 | 2015-01-05 | 2015-01-06 |
| cnvd-2015-00065 | SweetRice CMS存在多个SQL注入漏洞 | 2015-01-05 | 2015-01-06 |
| cnvd-2015-00066 | SweetRice CMS跨站脚本漏洞 | 2015-01-05 | 2015-01-06 |
| cnvd-2015-00067 | Kandidat CMS存在多个跨站请求伪造漏洞 | 2015-01-05 | 2015-01-06 |
| cnvd-2015-00068 | Microweber CMS SQL注入漏洞 | 2015-01-05 | 2015-01-06 |
| cnvd-2015-00069 | MantisBT信息泄露漏洞 | 2015-01-05 | 2015-01-06 |
| cnvd-2015-00070 | MediaWiki跨站脚本漏洞(CNVD-2015-00070) | 2015-01-05 | 2015-01-06 |
| cnvd-2015-00071 | BEdita存在多个跨站请求伪造漏洞 | 2015-01-05 | 2015-01-06 |
| cnvd-2015-00072 | BEdita跨站脚本漏洞 | 2015-01-05 | 2015-01-06 |
| cnvd-2015-00073 | WordPress插件Cart66 Lite 'models/Cart66.php'目录遍历漏洞 | 2015-01-05 | 2015-01-06 |
| cnvd-2015-00074 | IPCop Firewall cgi-bin/iptablesgui.cgi任意代码执行漏洞 | 2015-01-05 | 2015-01-06 |
| cnvd-2015-00075 | WordPress插件WP-ViperGB存在多个跨站请求伪造漏洞 | 2015-01-05 | 2015-01-06 |
| cnvd-2015-00076 | RabbitMQ 'rabbit_mgmt_util.erl'安全绕过漏洞 | 2015-01-05 | 2015-01-06 |
| cnvd-2015-00077 | Google Chrome拒绝服务漏洞(CNVD-2015-00077) | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00078 | WordPress插件W3 Total Cache跨站请求伪造漏洞 | 2015-01-04 | 2015-01-06 |
| cnvd-2015-00107 | real.c任意代码执行漏洞 | 2015-01-04 | 2015-01-07 |
| cnvd-2015-00108 | Claroline存在多个跨站脚本漏洞(CNVD-2015-00108) | 2015-01-04 | 2015-01-07 |
| cnvd-2015-00109 | Eucalyptus拒绝服务漏洞(CNVD-2015-00109) | 2015-01-04 | 2015-01-07 |
| cnvd-2015-00110 | phpThumb服务器端请求伪造漏洞 | 2015-01-04 | 2015-01-07 |
| cnvd-2015-00111 | Splunk跨站脚本漏洞(CNVD-2015-00111) | 2015-01-04 | 2015-01-07 |
| cnvd-2015-00112 | Hillstone HS TFTP Server拒绝服务漏洞 | 2015-01-04 | 2015-01-07 |
| cnvd-2015-00113 | SyndeoCMS跨站请求伪造漏洞 | 2015-01-04 | 2015-01-07 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2014-00245 | Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить произвольный код | 05.07.2016 | 28.11.2016 |
| bdu:2014-00246 | Уязвимость в программном продукте Mozilla SeaMonkey, позволяющая злоумышленнику выполнить… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00248 | Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код ил… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00249 | Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику выполнить произвольн… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00250 | Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произв… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00252 | Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код ил… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00253 | Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику выполнить произвольн… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00254 | Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произв… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00255 | Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить произвольный код | 05.07.2016 | 28.11.2016 |
| bdu:2014-00256 | Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произв… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00258 | Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код ил… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00259 | Уязвимость почтового клиента Thunderbird позволяющая злоумышленнику выполнить произвольны… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00260 | Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произв… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00262 | Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код ил… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00263 | Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику выполнить произвольн… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00264 | Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произв… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00265 | Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить произвольный код или вы… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00266 | Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код ил… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00267 | Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику выполнить произвольн… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00268 | Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произв… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00269 | Уязвимость браузера Firefox, позволяющая злоумышленнику вызвать отказ в обслуживании | 05.07.2016 | 28.11.2016 |
| bdu:2014-00270 | Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику вызвать отказ в … | 05.07.2016 | 28.11.2016 |
| bdu:2014-00272 | Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить обход правил ограничения | 05.07.2016 | 28.11.2016 |
| bdu:2014-00273 | Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить обход … | 05.07.2016 | 28.11.2016 |
| bdu:2014-00274 | Уязвимость браузера Firefox, позволяющая злоумышленнику выполнить обход правил ограничени… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00275 | Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить обход … | 05.07.2016 | 28.11.2016 |
| bdu:2014-00277 | Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код ил… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00278 | Уязвимость почтового клиента Thunderbird, позволяющая злоумышленнику выполнить произвольн… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00279 | Уязвимость пакета программ Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произв… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00281 | Уязвимость браузера Firefox ESR, позволяющая злоумышленнику выполнить произвольный код | 05.07.2016 | 28.11.2016 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2001-avi-031 | Vulnérabilité de HP OpenView OmniBack sous HP-UX et Windows NT/2000 | 2001-03-09T00:00:00.000000 | 2001-03-09T00:00:00.000000 |
| certa-2001-avi-032 | Vulnérabilité de IBM HTTP Server | 2001-03-09T00:00:00.000000 | 2001-03-09T00:00:00.000000 |
| certa-2001-avi-033 | Vulnérabilité dans Mailsweeper version 4.2 | 2001-03-13T00:00:00.000000 | 2001-03-13T00:00:00.000000 |
| certa-2001-avi-034 | Vulnérabilité du serveur web Apache | 2001-03-13T00:00:00.000000 | 2001-03-13T00:00:00.000000 |
| certa-2001-avi-035 | Vulnérabilité de pcAnywhere. | 2001-03-13T00:00:00.000000 | 2001-03-13T00:00:00.000000 |
| certa-2001-avi-036 | Certificats erronés délivrés par VeriSign | 2001-03-23T00:00:00.000000 | 2001-03-23T00:00:00.000000 |
| certa-2001-avi-037 | Vulnérabilité des logiciels d'administration à distance de Compaq | 2001-03-23T00:00:00.000000 | 2001-03-23T00:00:00.000000 |
| certa-2001-avi-038 | Vulnérabilité dans Microsoft Visual Studio 6.0 | 2001-03-28T00:00:00.000000 | 2001-03-28T00:00:00.000000 |
| certa-2001-avi-039 | Vulnérabilité dans la protection des fichiers compressés sous Windows Plus!98 et Me | 2001-03-28T00:00:00.000000 | 2001-03-28T00:00:00.000000 |
| certa-2001-avi-040 | Vulnérabilité dans les concentrateurs CISCO VPN3000 | 2001-03-29T00:00:00.000000 | 2001-03-29T00:00:00.000000 |
| certa-2001-avi-042 | Vulnérabilité dans les commutateurs CISCO CSS 11050, 11150 et 11800 | 2001-04-11T00:00:00.000000 | 2001-04-11T00:00:00.000000 |
| certa-2001-avi-043 | Vulnérabilité de la fonction glob() dans les serveurs FTP | 2001-04-11T00:00:00.000000 | 2001-04-11T00:00:00.000000 |
| certa-2001-avi-044 | Vulnérabilité dans Microsoft ISA Server 2000 | 2001-04-20T00:00:00.000000 | 2001-04-20T00:00:00.000000 |
| certa-2001-avi-046 | Vulnérabilité dans WebDAV Service Provider | 2001-04-20T00:00:00.000000 | 2001-04-20T00:00:00.000000 |
| certa-2001-avi-047 | Vulnérabilité dans IPTables sous linux 2.4 | 2001-04-27T00:00:00.000000 | 2001-04-27T00:00:00.000000 |
| certa-2001-avi-048 | Vulnérabilité dans Microsoft IIS 5.0 | 2001-05-02T00:00:00.000000 | 2001-05-02T00:00:00.000000 |
| certa-2001-avi-049 | Déni de service sur le contrôleur de domaine Windows 2000 | 2001-05-09T00:00:00.000000 | 2001-05-09T00:00:00.000000 |
| certa-2001-avi-050 | Vulnérabilités dans le serveur d'indexation Windows | 2001-05-11T00:00:00.000000 | 2001-05-11T00:00:00.000000 |
| certa-2001-avi-051 | Vulnérabilité de Vixie Cron | 2001-05-14T00:00:00.000000 | 2001-05-14T00:00:00.000000 |
| certa-2001-avi-052 | Vulnérabilité du protocole HSRP sur les routeurs CISCO | 2001-05-14T00:00:00.000000 | 2001-05-14T00:00:00.000000 |
| certa-2001-avi-053 | Vulnérabilités dans Microsoft IIS 4.0 et 5.0 | 2001-05-15T00:00:00.000000 | 2001-05-15T00:00:00.000000 |
| certa-2001-avi-054 | Vulnérabilité de ESP sous SGI IRIX | 2001-05-15T00:00:00.000000 | 2001-05-15T00:00:00.000000 |
| certa-2001-avi-055 | Vulnérabilités dans Internet Explorer 5.01 et 5.5 | 2001-05-18T00:00:00.000000 | 2001-05-18T00:00:00.000000 |
| certa-2001-avi-056 | Vulnérabilité dans Word lors de l'ouverture de documents RTF | 2001-05-22T00:00:00.000000 | 2001-05-22T00:00:00.000000 |
| certa-2001-avi-057 | Vulnérabilité dans IOS version 12.1(2)T et 12.1(3)T | 2001-05-25T00:00:00.000000 | 2001-05-25T00:00:00.000000 |
| certa-2001-avi-058 | Vulnérabilités dans Windows Media Player | 2001-05-29T00:00:00.000000 | 2001-05-29T00:00:00.000000 |
| certa-2001-avi-059 | Vulnérabilité d'Exchange 2000 | 2001-06-07T00:00:00.000000 | 2001-06-07T00:00:00.000000 |
| certa-2001-avi-060 | Multiples vulnérabilités du service telnet sous Windows 2000 | 2001-06-08T00:00:00.000000 | 2001-06-08T00:00:00.000000 |
| certa-2001-avi-061 | Vulnérabilité de Qpopper | 2001-06-08T00:00:00.000000 | 2001-06-08T00:00:00.000000 |
| certa-2001-avi-062 | Vulnérabilité de Xinetd | 2001-06-11T00:00:00.000000 | 2001-06-11T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2009-ale-004 | Vulnérabilité dans Mozilla Firefox | 2009-03-27T00:00:00.000000 | 2009-03-30T00:00:00.000000 |
| certa-2008-ale-012 | Vulnérabilité dans Microsoft Windows | 2008-10-10T00:00:00.000000 | 2009-04-15T00:00:00.000000 |
| certa-2008-ale-015 | Vulnérabilité dans le convertisseur de texte de WordPad | 2008-12-10T00:00:00.000000 | 2009-04-15T00:00:00.000000 |
| certa-2009-ale-002 | Vulnérabilité dans Microsoft Excel | 2009-02-25T00:00:00.000000 | 2009-04-15T00:00:00.000000 |
| certa-2009-ale-005 | Vulnérabilité de PowerPoint | 2009-04-03T00:00:00.000000 | 2009-05-13T00:00:00.000000 |
| certa-2009-ale-006 | Multiples vulnérabilités dans Adobe Reader et Adobe Acrobat | 2009-04-28T00:00:00.000000 | 2009-05-13T00:00:00.000000 |
| certa-2009-ale-003 | Vulnérabilité dans Apple Mac OS X | 2009-03-24T00:00:00.000000 | 2009-06-02T00:00:00.000000 |
| certa-2009-ale-007 | Vulnérabilité WebDAV sous Microsoft IIS | 2009-05-18T00:00:00.000000 | 2009-06-10T00:00:00.000000 |
| certa-2009-ale-008 | Vulnérabilité Java de Mac OS X | 2009-05-20T00:00:00.000000 | 2009-06-17T00:00:00.000000 |
| certa-2009-ale-009 | Vulnérabilité dans Microsoft DirectShow | 2009-05-29T00:00:00.000000 | 2009-07-14T00:00:00.000000 |
| certa-2009-ale-010 | Vulnérabilité dans le contrôle ActiveX Microsoft Video | 2009-07-07T00:00:00.000000 | 2009-07-15T00:00:00.000000 |
| certa-2009-ale-012 | Vulnérabilité dans Mozilla Firefox | 2009-07-15T00:00:00.000000 | 2009-07-17T00:00:00.000000 |
| certa-2009-ale-013 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2009-07-23T00:00:00.000000 | 2009-07-31T00:00:00.000000 |
| certa-2009-ale-011 | Vulnérabilité dans Microsoft Office Web Components Control | 2009-07-13T00:00:00.000000 | 2009-08-12T00:00:00.000000 |
| certa-2009-ale-016 | Vulnérabilité de SMBv2 dans Microsoft Windows | 2009-09-09T00:00:00.000000 | 2009-10-13T00:00:00.000000 |
| certa-2009-ale-015 | Vulnérabilités du serveur FTP de Microsoft IIS | 2009-09-01T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| certa-2009-ale-018 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-10-09T00:00:00.000000 | 2009-10-14T00:00:00.000000 |
| certa-2009-ale-020 | Vulnérabilité dans Internet Explorer | 2009-11-21T00:00:00.000000 | 2009-12-09T00:00:00.000000 |
| certa-2009-ale-022 | Vulnérabilité dans TANDBERG MXP | 2009-12-11T00:00:00.000000 | 2009-12-11T00:00:00.000000 |
| certa-2009-ale-021 | Vulnérabilité dans Adobe Illustrator | 2009-12-10T00:00:00.000000 | 2010-01-08T00:00:00.000000 |
| certa-2009-ale-023 | Vulnérabilité dans Adobe Reader et Adobe Acrobat | 2009-12-15T00:00:00.000000 | 2010-01-13T00:00:00.000000 |
| certa-2010-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2010-01-15T00:00:00.000000 | 2010-01-22T00:00:00.000000 |
| certa-2010-ale-002 | Vulnérabilité dans le sous-système MS-DOS de Microsoft Windows | 2010-01-21T00:00:00.000000 | 2010-02-10T00:00:00.000000 |
| certa-2010-ale-004 | Vulnérabilité dans Microsoft Internet Explorer | 2010-03-10T00:00:00.000000 | 2010-03-31T00:00:00.000000 |
| certa-2010-ale-003 | Vulnérabilité dans Microsoft VBScript | 2010-03-02T00:00:00.000000 | 2010-04-13T00:00:00.000000 |
| certa-2010-ale-005 | Vulnérabilité dans Java Deployment Toolkit | 2010-04-09T00:00:00.000000 | 2010-04-16T00:00:00.000000 |
| certa-2010-ale-006 | Vulnérabilité de Safari | 2010-05-14T00:00:00.000000 | 2010-05-27T00:00:00.000000 |
| certa-2008-ale-006 | Vulnérabilités dans HP OpenView NNM | 2008-04-18T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| certa-2009-ale-019 | Vulnérabilité dans Windows 7 et Windows Server 2008 R2 | 2009-11-16T00:00:00.000000 | 2010-06-10T00:00:00.000000 |
| certa-2010-ale-007 | Vulnérabilité Shockwave Flash pour les produits Adobe | 2010-06-05T00:00:00.000000 | 2010-06-30T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2018-408 | Use-of-uninitialized-value in fz_is_empty_irect | 2021-01-15T00:01:14.057811Z | 2022-04-13T03:04:31.331986Z |
| osv-2018-274 | Use-of-uninitialized-value in pdf_lex | 2021-01-15T00:00:18.625407Z | 2022-04-13T03:04:31.337748Z |
| osv-2018-284 | Stack-buffer-overflow in pdf_lookup_cmap_full | 2021-01-15T00:00:22.790093Z | 2022-04-13T03:04:31.343138Z |
| osv-2018-293 | Use-of-uninitialized-value in pdf_load_version | 2021-01-15T00:00:24.294870Z | 2022-04-13T03:04:31.348142Z |
| osv-2018-252 | Heap-use-after-free in fz_fin_cached_color_converter | 2021-01-15T00:00:07.554706Z | 2022-04-13T03:04:31.359299Z |
| osv-2018-362 | Use-of-uninitialized-value in fz_unpack_tile | 2021-01-15T00:00:57.147547Z | 2022-04-13T03:04:31.364805Z |
| osv-2018-426 | UNKNOWN READ in jpx_read_image | 2021-01-15T00:01:17.401537Z | 2022-04-13T03:04:31.370670Z |
| osv-2018-233 | Use-of-uninitialized-value in _cmsReadHeader | 2021-01-15T00:00:01.575682Z | 2022-04-13T03:04:31.376583Z |
| osv-2018-388 | Use-of-uninitialized-value in MatShaperEval16 | 2021-01-15T00:01:08.637372Z | 2022-04-13T03:04:31.382346Z |
| osv-2018-279 | Use-of-uninitialized-value in fz_drop_hash_table | 2021-01-15T00:00:20.648060Z | 2022-04-13T03:04:31.387983Z |
| osv-2018-428 | UNKNOWN READ in jbig2_decode_mmr_init | 2021-01-15T00:01:17.967941Z | 2022-04-13T03:04:31.393316Z |
| osv-2018-367 | Use-of-uninitialized-value in cf2_glyphpath_lineTo | 2021-01-15T00:00:59.532565Z | 2022-04-13T03:04:31.398810Z |
| osv-2018-256 | Use-of-uninitialized-value in cf2_glyphpath_lineTo | 2021-01-15T00:00:09.629777Z | 2022-04-13T03:04:31.404902Z |
| osv-2018-422 | Use-of-uninitialized-value in cf2_glyphpath_pushPrevElem | 2021-01-15T00:01:16.942847Z | 2022-04-13T03:04:31.411029Z |
| osv-2021-757 | Use-of-uninitialized-value in nn_check_initialized | 2021-05-12T00:01:05.638739Z | 2022-04-13T03:04:31.416903Z |
| osv-2020-2124 | UNKNOWN READ in jsoncharutils.h | 2020-11-02T00:00:43.118421Z | 2022-04-13T03:04:31.422219Z |
| osv-2020-2108 | Stack-buffer-overflow in simdjson::internal::decimal_right_shift | 2020-10-31T00:00:09.494294Z | 2022-04-13T03:04:31.427396Z |
| osv-2021-1317 | Use-of-uninitialized-value in std::__1::basic_ostream<char, std::__1::char_traits<char> >& std::__1::__put_cha | 2021-09-18T00:01:38.031586Z | 2022-04-13T03:04:31.432910Z |
| osv-2020-2119 | UNKNOWN READ in numberparsing.h | 2020-11-02T00:00:15.881957Z | 2022-04-13T03:04:31.438301Z |
| osv-2021-1312 | Use-of-uninitialized-value in std::__1::basic_ostream<char, std::__1::char_traits<char> >& std::__1::__put_cha | 2021-09-18T00:01:03.273096Z | 2022-04-13T03:04:31.443505Z |
| osv-2021-591 | Segv on unknown address | 2021-04-02T00:01:01.958406Z | 2022-04-13T03:04:31.448881Z |
| osv-2021-597 | Stack-buffer-overflow in read_mft_common | 2021-04-04T00:00:06.122996Z | 2022-04-13T03:04:31.454013Z |
| osv-2020-225 | Heap-buffer-overflow in dname_pkt_compare | 2020-06-24T01:51:19.752668Z | 2022-04-13T03:04:31.459631Z |
| osv-2020-255 | Heap-buffer-overflow in dname_pkt_copy | 2020-06-26T00:00:11.725033Z | 2022-04-13T03:04:31.465910Z |
| osv-2021-534 | Container-overflow in tesseract::ExtractResults16 | 2021-03-19T00:00:04.481954Z | 2022-04-13T03:04:31.477640Z |
| osv-2020-1039 | UNKNOWN WRITE in putgreytile | 2020-07-22T21:49:41.614766Z | 2022-04-13T03:04:31.483339Z |
| osv-2020-954 | Use-of-uninitialized-value in adler32_z | 2020-07-22T00:00:25.376679Z | 2022-04-13T03:04:31.489268Z |
| osv-2020-1252 | Heap-buffer-overflow in jpc_dec_process_sot | 2020-07-22T21:50:00.494951Z | 2022-04-13T03:04:31.495336Z |
| osv-2020-1819 | Heap-buffer-overflow in void cv::copyToMat<int> | 2020-09-21T00:00:12.969129Z | 2022-04-13T03:04:31.501046Z |
| osv-2020-987 | UNKNOWN in TIFFReadRGBATileExt | 2020-07-22T21:49:38.378993Z | 2022-04-13T03:04:31.506488Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2021-0148 | nphysics3d is unmaintained | 2021-01-29T12:00:00Z | 2023-03-11T22:34:14Z |
| rustsec-2021-0149 | nphysics2d is unmaintained | 2021-01-29T12:00:00Z | 2023-03-11T22:34:14Z |
| rustsec-2021-0150 | ncollide3d is unmaintained | 2021-01-29T12:00:00Z | 2023-03-12T06:47:41Z |
| rustsec-2021-0151 | ncollide2d is unmaintained | 2021-01-29T12:00:00Z | 2023-03-12T06:47:41Z |
| rustsec-2020-0168 | mach is unmaintained | 2020-07-14T12:00:00Z | 2023-03-12T06:59:25Z |
| rustsec-2019-0040 | `boxfnonce` obsolete with release of Rust 1.35.0 | 2019-06-20T12:00:00Z | 2023-03-12T07:15:02Z |
| rustsec-2021-0153 | `encoding` is unmaintained | 2021-12-05T12:00:00Z | 2023-03-12T07:17:34Z |
| rustsec-2023-0020 | const-cstr is Unmaintained | 2023-03-12T12:00:00Z | 2023-03-12T18:38:56Z |
| rustsec-2022-0076 | Bug in Wasmtime implementation of pooling instance allocator | 2022-11-10T12:00:00Z | 2023-03-15T23:49:40Z |
| rustsec-2023-0025 | Gitoxide has renamed its crates. | 2023-03-14T12:00:00Z | 2023-03-24T15:33:49Z |
| rustsec-2023-0026 | Gitoxide has renamed its crates. | 2023-03-14T12:00:00Z | 2023-03-24T15:33:49Z |
| rustsec-2023-0028 | buf_redux is Unmaintained | 2023-01-24T12:00:00Z | 2023-03-24T15:42:41Z |
| rustsec-2021-0147 | `daemonize` is Unmaintained | 2021-09-01T12:00:00Z | 2023-04-08T19:49:55Z |
| rustsec-2023-0034 | Resource exhaustion vulnerability in h2 may lead to Denial of Service (DoS) | 2023-04-14T12:00:00Z | 2023-04-20T19:17:55Z |
| rustsec-2023-0036 | tree_magic is Unmaintained | 2023-04-11T12:00:00Z | 2023-04-25T03:08:42Z |
| rustsec-2022-0048 | xml-rs is Unmaintained | 2022-01-26T12:00:00Z | 2023-05-05T07:39:54Z |
| rustsec-2023-0037 | crate has been renamed to `crypto_secretbox` | 2023-05-16T12:00:00Z | 2023-05-17T03:02:51Z |
| rustsec-2023-0019 | `kuchiki` is unmaintained | 2023-01-21T12:00:00Z | 2023-05-23T20:17:25Z |
| rustsec-2016-0001 | SSL/TLS MitM vulnerability due to insecure defaults | 2016-11-05T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2016-0002 | HTTPS MitM vulnerability due to lack of hostname verification | 2016-05-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2016-0003 | HTTP download and execution allows MitM RCE | 2016-08-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2017-0001 | scalarmult() vulnerable to degenerate public keys | 2017-01-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2017-0002 | headers containing newline characters can split messages | 2017-01-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2017-0003 | Hostname verification skipped when custom root certs used | 2017-03-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2017-0004 | Integer overflow leads to heap-based buffer overflow in encode_config_buf | 2017-05-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2017-0005 | Large cookie Max-Age values can cause a denial of service | 2017-05-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2017-0006 | Unchecked vector pre-allocation | 2017-11-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2018-0001 | An integer underflow could lead to panic | 2018-06-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2018-0002 | Links in archives can overwrite any existing file | 2018-06-29T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2018-0003 | Possible double free during unwinding in SmallVec::insert_many | 2018-07-19T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2021:3152 | Important: exiv2 security update | 2021-08-16T09:08:01Z | 2021-08-18T16:32:59Z |
| alsa-2021:3447 | Important: kernel security and bug fix update | 2021-09-07T17:24:27Z | 2021-09-08T10:16:55Z |
| alsa-2021:3590 | Moderate: mysql:8.0 security, bug fix, and enhancement update | 2021-09-21T07:13:26Z | 2021-09-21T07:13:20Z |
| alsa-2021:3623 | Important: nodejs:12 security and bug fix update | 2021-09-21T12:33:58Z | 2021-09-21T12:33:58Z |
| alsa-2021:3918 | Important: redis:5 security update | 2021-10-19T13:14:11Z | 2021-10-19T13:14:11Z |
| alsa-2021:3945 | Important: redis:6 security update | 2021-10-20T12:46:40Z | 2021-10-20T12:46:40Z |
| alsa-2021:4056 | Important: kernel security, bug fix, and enhancement update | 2021-11-02T07:47:41Z | 2021-11-02T18:48:59Z |
| alsa-2021:4058 | Moderate: samba security update | 2021-11-02T07:48:59Z | 2021-11-03T08:35:17Z |
| alsa-2021:4060 | Moderate: libsolv security update | 2021-11-02T07:49:29Z | 2021-11-03T08:35:17Z |
| alsa-2021:4150 | Moderate: python36:3.6 security and bug fix update | 2021-11-09T08:24:37Z | 2021-11-09T12:44:54Z |
| alsa-2021:4151 | Moderate: python27:2.7 security update | 2021-11-09T08:24:39Z | 2021-11-09T12:45:07Z |
| alsa-2021:4160 | Moderate: python39:3.9 and python39-devel:3.9 security update | 2021-11-09T08:26:25Z | 2021-11-09T12:46:25Z |
| alsa-2021:4162 | Moderate: python38:3.8 and python38-devel:3.8 security update | 2021-11-09T12:47:54Z | 2021-11-09T12:47:25Z |
| alsa-2021:4213 | Moderate: php:7.4 security, bug fix, and enhancement update | 2021-11-09T08:42:20Z | 2021-11-09T12:52:36Z |
| alsa-2021:4221 | Moderate: container-tools:2.0 security update | 2021-11-09T08:45:58Z | 2021-11-09T12:54:00Z |
| alsa-2021:4292 | Moderate: squid:4 security, bug fix, and enhancement update | 2021-11-09T08:56:14Z | 2021-11-09T13:01:13Z |
| alsa-2021:4409 | Moderate: libgcrypt security and bug fix update | 2021-11-09T09:18:49Z | 2021-11-09T13:12:33Z |
| alsa-2021:4413 | Moderate: tpm2-tools security and enhancement update | 2021-11-09T09:19:19Z | 2021-11-09T13:12:47Z |
| alsa-2021:4511 | Moderate: curl security and bug fix update | 2021-11-09T09:38:13Z | 2021-11-09T13:21:26Z |
| alsa-2019:2722 | Low: libwmf security update | 2019-09-10T15:32:59Z | 2021-11-12T10:20:55Z |
| alsa-2019:3553 | Low: GNOME security, bug fix, and enhancement update | 2019-11-05T17:59:21Z | 2021-11-12T10:20:55Z |
| alsa-2019:3703 | Low: libvorbis security update | 2019-11-05T20:52:55Z | 2021-11-12T10:20:55Z |
| alsa-2020:0903 | Important: zsh security update | 2020-03-19T10:45:02Z | 2021-11-12T10:20:55Z |
| alsa-2020:1577 | Moderate: exiv2 security, bug fix, and enhancement update | 2020-04-28T08:52:31Z | 2021-11-12T10:20:55Z |
| alsa-2020:1581 | Low: wavpack security update | 2020-04-28T08:53:05Z | 2021-11-12T10:20:55Z |
| alsa-2020:1616 | Low: irssi security update | 2020-04-28T08:56:59Z | 2021-11-12T10:20:55Z |
| alsa-2020:1631 | Low: GStreamer, libmad, and SDL security, bug fix, and enhancement update | 2020-04-28T08:58:37Z | 2021-11-12T10:20:55Z |
| alsa-2020:1686 | Low: libmspack security and bug fix update | 2020-04-28T09:05:11Z | 2021-11-12T10:20:55Z |
| alsa-2020:1708 | Moderate: liblouis security and bug fix update | 2020-04-28T09:07:17Z | 2021-11-12T10:20:55Z |
| alsa-2020:1766 | Moderate: GNOME security, bug fix, and enhancement update | 2020-04-28T09:13:23Z | 2021-11-12T10:20:55Z |