Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-1999-0260 |
N/A
|
The jj CGI program allows command execution via s… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.846Z |
| CVE-1999-0262 |
N/A
|
Hylafax faxsurvey CGI script on Linux allows remo… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.890Z |
| CVE-1999-0263 |
N/A
|
Solaris SUNWadmap can be exploited to obtain root… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.880Z |
| CVE-1999-0264 |
N/A
|
htmlscript CGI program allows remote read access … |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.886Z |
| CVE-1999-0265 |
N/A
|
ICMP redirect messages may crash or lock up a host. |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.686Z |
| CVE-1999-0266 |
N/A
|
The info2www CGI script allows remote file access… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.869Z |
| CVE-1999-0267 |
N/A
|
Buffer overflow in NCSA HTTP daemon v1.3 allows r… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.891Z |
| CVE-1999-0269 |
N/A
|
Netscape Enterprise servers may list files throug… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.771Z |
| CVE-1999-0272 |
N/A
|
Denial of service in Slmail v2.5 through the POP3 port. |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.865Z |
| CVE-1999-0273 |
N/A
|
Denial of service through Solaris 2.5.1 telnet by… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.940Z |
| CVE-1999-0274 |
N/A
|
Denial of service in Windows NT DNS servers throu… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.879Z |
| CVE-1999-0276 |
N/A
|
mSQL v2.0.1 and below allows remote execution thr… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.876Z |
| CVE-1999-0277 |
N/A
|
The WorkMan program can be used to overwrite any … |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.856Z |
| CVE-1999-0278 |
N/A
|
In IIS, remote attackers can obtain source code f… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.784Z |
| CVE-1999-0279 |
N/A
|
Excite for Web Servers (EWS) allows remote comman… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.831Z |
| CVE-1999-0281 |
N/A
|
Denial of service in IIS using long URLs. |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.953Z |
| CVE-1999-0288 |
N/A
|
The WINS server in Microsoft Windows NT 4.0 befor… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.732Z |
| CVE-1999-0289 |
N/A
|
The Apache web server for Win32 may provide acces… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.890Z |
| CVE-1999-0292 |
N/A
|
Denial of service through Winpopup using large us… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.902Z |
| CVE-1999-0293 |
N/A
|
AAA authentication on Cisco systems allows attack… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:52.019Z |
| CVE-1999-0294 |
N/A
|
All records in a WINS database can be deleted thr… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:52.021Z |
| CVE-1999-0295 |
N/A
|
Solaris sysdef command allows local users to read… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.770Z |
| CVE-1999-0296 |
N/A
|
Solaris volrmmount program allows attackers to re… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.898Z |
| CVE-1999-0299 |
N/A
|
Buffer overflow in FreeBSD lpd through long DNS h… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.882Z |
| CVE-1999-0300 |
N/A
|
nis_cachemgr for Solaris NIS+ allows attackers to… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.887Z |
| CVE-1999-0301 |
N/A
|
Buffer overflow in SunOS/Solaris ps command. |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.857Z |
| CVE-1999-0302 |
N/A
|
SunOS/Solaris FTP clients can be forced to execut… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:52.027Z |
| CVE-1999-0303 |
N/A
|
Buffer overflow in BNU UUCP daemon (uucpd) throug… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.974Z |
| CVE-1999-0305 |
N/A
|
The system configuration control (sysctl) facilit… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.894Z |
| CVE-1999-0308 |
N/A
|
HP-UX gwind program allows users to modify arbitr… |
n/a |
n/a |
1999-09-29T08:00:00.000Z | 2024-08-01T16:34:51.885Z |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-r7q2-5gqg-6c7q |
|
actionpack Improper Input Validation vulnerability | 2017-10-24T18:33:38Z | 2023-05-12T17:22:22Z |
| ghsa-rp63-jfmw-532w |
|
Mail Gem Improper Input Validation vulnerability | 2017-10-24T18:33:38Z | 2023-09-05T22:04:31Z |
| ghsa-rvpq-5xqx-pfpp |
|
Ruby on Rails vulnerable to code injection | 2017-10-24T18:33:38Z | 2025-04-03T14:27:51Z |
| ghsa-rxq3-gm4p-5fj4 |
9.8 (3.1)
|
rails vulnerable to improper authentication | 2017-10-24T18:33:38Z | 2024-02-14T21:33:07Z |
| ghsa-v5jg-558j-q67c |
|
actionpack Cross-site Scripting vulnerability | 2017-10-24T18:33:38Z | 2023-05-12T17:23:04Z |
| ghsa-v9v4-7jp6-8c73 |
|
rails Cross-site Scripting vulnerability | 2017-10-24T18:33:38Z | 2023-04-20T21:47:18Z |
| ghsa-vxf6-w9mp-95hm |
|
Puppet supports use of IP addresses in certnames without warning of potential risks | 2017-10-24T18:33:38Z | 2023-05-12T17:24:42Z |
| ghsa-wcm2-9c89-wmfm |
6.1 (3.1)
|
Cross-site Scripting in jquery-ui | 2017-10-24T18:33:38Z | 2025-04-14T21:53:50Z |
| ghsa-wwmf-6p58-6vj2 |
|
Remote code execution in rwiki | 2017-10-24T18:33:38Z | 2025-04-03T14:25:17Z |
| ghsa-xf96-32q2-9rw2 |
|
Rails ActiveRecord gem vulnerable to SQL injection | 2017-10-24T18:33:38Z | 2023-05-26T16:40:08Z |
| ghsa-xgj6-pgrm-x4r2 |
|
gtk2 vulnerable to Use of Externally-Controlled Format String | 2017-10-24T18:33:38Z | 2023-01-26T22:31:40Z |
| ghsa-xxr8-833v-c7wc |
|
Cross-site Scripting vulnerability in i18n translations helper method | 2017-10-24T18:33:38Z | 2023-05-26T21:06:30Z |
| ghsa-7qcx-jmrc-h2rr |
6.1 (3.1)
|
Cross-Site Scripting in keystone | 2017-11-15T19:44:16Z | 2021-09-03T21:41:16Z |
| ghsa-wmjf-jpjj-9f3j |
3.3 (3.1)
|
RuboCop gem Insecure use of /tmp | 2017-11-15T20:39:47Z | 2023-08-28T13:43:41Z |
| ghsa-5v3f-73gv-x7x5 |
5.5 (3.1)
|
cairo is vulnerable to denial of service due to a null pointer dereference | 2017-11-15T20:41:14Z | 2023-08-28T10:13:34Z |
| ghsa-mw35-24gh-f82w |
9.8 (3.1)
|
keycloak-connect and keycloak-js improperly handle invalid tokens | 2017-11-15T20:41:51Z | 2023-09-08T19:56:20Z |
| ghsa-6494-v9fq-fgq2 |
8.8 (3.1)
|
Keystone is vulnerable to CSV injection | 2017-11-16T01:46:50Z | 2022-04-25T22:05:05Z |
| ghsa-7cv6-gvx3-m54m |
4.8 (3.1)
|
Cross-Site Scripting in keystone | 2017-11-16T01:47:02Z | 2021-06-11T13:54:39Z |
| ghsa-q97v-764g-r2rp |
8.8 (3.1)
|
gollum and gollum-lib allow remote authenticated users to execute arbitrary code | 2017-11-16T01:47:37Z | 2023-01-23T21:34:16Z |
| ghsa-pjj4-w39g-pw54 |
7.5 (3.1)
|
Ox gem crashes due to a crafted input | 2017-11-21T18:26:40Z | 2023-01-26T21:23:13Z |
| ghsa-rph7-j9qr-h8q8 |
8.1 (3.1)
|
Potential Command Injection in codem-transcode | 2017-11-28T22:20:17Z | 2021-09-17T19:23:32Z |
| ghsa-wwh7-4jw9-33x6 |
7.5 (3.1)
|
yajl-ruby gem Denial of Service vulnerability | 2017-11-28T22:44:42Z | 2023-08-29T16:04:20Z |
| ghsa-5c8j-xr24-2665 |
9.8 (3.1)
|
Potential Command Injection in printer | 2017-11-28T22:44:52Z | 2021-09-01T21:34:20Z |
| ghsa-x7p2-x2j6-mwhr |
6.1 (3.1)
|
Gemirro Stored XSS in Gemspec "homepage" value | 2017-11-29T23:19:51Z | 2023-08-29T12:26:53Z |
| ghsa-653m-r33x-39ff |
6.1 (3.1)
|
Geminabox contains Cross-site Scripting | 2017-11-29T23:20:14Z | 2023-03-14T23:07:43Z |
| ghsa-hxhj-hp9m-qwc4 |
|
private_address_check vulnerable to bypass of Resolv.getaddresses method | 2017-11-29T23:21:05Z | 2023-01-23T17:38:44Z |
| ghsa-q43c-g2g7-6gxj |
8.8 (3.1)
|
Cross-Site Request Forgery (CSRF) in keystone | 2017-11-30T23:14:47Z | 2021-06-10T21:18:39Z |
| ghsa-3v3c-r5v2-68ph |
|
private_address_check contains Incomplete List of Disallowed Inputs | 2017-11-30T23:14:55Z | 2023-01-20T22:07:25Z |
| ghsa-hwcf-pp87-7x6p |
6.1 (3.1)
|
mde ejs vulnerable to XSS | 2017-11-30T23:15:05Z | 2023-09-08T21:35:56Z |
| ghsa-3w5v-p54c-f74x |
9.8 (3.1)
|
ejs is vulnerable to remote code execution due to weak input validation | 2017-11-30T23:15:19Z | 2023-09-08T20:54:25Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2013-14 |
|
Salt (aka SaltStack) before 0.15.0 through 0.17.0 allows remote authenticated minions to … | salt | 2013-11-05T18:55:00Z | 2021-07-05T00:01:26.068729Z |
| pysec-2013-15 |
|
The salt master in Salt (aka SaltStack) 0.11.0 through 0.17.0 does not properly drop grou… | salt | 2013-11-05T18:55:00Z | 2021-07-05T00:01:26.106423Z |
| pysec-2013-26 |
|
The default configuration for salt-ssh in Salt (aka SaltStack) 0.17.0 does not validate t… | salt | 2013-11-05T18:55:00Z | 2021-07-25T23:34:53.687508Z |
| pysec-2013-27 |
|
Unspecified vulnerability in salt-ssh in Salt (aka SaltStack) 0.17.0 has unspecified impa… | salt | 2013-11-05T18:55:00Z | 2021-07-25T23:34:53.727680Z |
| pysec-2013-28 |
|
Directory traversal vulnerability in the client in Tryton 3.0.0, as distributed before 20… | tryton | 2013-11-18T02:55:00Z | 2021-07-25T23:34:56.639990Z |
| pysec-2013-45 |
|
keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an i… | nova | 2013-12-27T01:55:00Z | 2024-11-21T14:22:56.793365Z |
| pysec-2014-97 |
|
Libcloud 0.12.3 through 0.13.2 does not set the scrub_data parameter for the destroy Digi… | apache-libcloud | 2014-01-07T18:55:00Z | 2021-11-22T04:57:51.510127Z |
| pysec-2014-81 |
|
httplib2 0.7.2, 0.8, and earlier, after an initial connection is made, does not verify th… | httplib2 | 2014-01-18T21:55:00Z | 2021-08-27T03:42:09.595120Z |
| pysec-2014-64 |
|
The isURLInPortal method in the URLTool class in in_portal.py in Plone 2.1 through 4.1, 4… | plone | 2014-01-21T16:06:00Z | 2021-07-25T23:34:47.517338Z |
| pysec-2014-69 |
|
python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not prop… | python-keystoneclient | 2014-01-21T18:55:00Z | 2021-07-25T23:34:51.958825Z |
| pysec-2014-116 |
|
The TempURL middleware in OpenStack Object Storage (Swift) 1.4.6 through 1.8.0, 1.9.0 thr… | swift | 2014-01-23T01:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-17 |
|
The parser cache functionality in parsergenerator.py in RPLY (aka python-rply) before 0.7… | rply | 2014-01-28T00:55:00Z | 2021-07-05T00:01:25.895879Z |
| pysec-2014-95 |
|
Race condition in the xdg.BaseDirectory.get_runtime_dir function in python-xdg 0.25 allow… | pyxdg | 2014-01-28T00:55:00Z | 2021-08-27T03:22:18.849828Z |
| pysec-2014-111 |
|
The i_create_images_and_backing (aka create_images_and_backing) method in libvirt driver … | nova | 2014-02-06T17:00:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-88 |
|
python-bugzilla before 0.9.0 does not validate X.509 certificates, which allows man-in-th… | python-bugzilla | 2014-02-08T00:55:00Z | 2021-08-27T03:22:17.861270Z |
| pysec-2014-102 |
|
OpenStack Image Registry and Delivery Service (Glance) 2013.2 through 2013.2.1 and Icehou… | glance | 2014-02-14T15:55:00Z | 2024-11-25T18:35:18.357593Z |
| pysec-2014-12 |
|
The OpenStack Python client library for Swift (python-swiftclient) 1.0 through 1.9.0 does… | python-swiftclient | 2014-02-18T19:55:00Z | 2021-07-05T00:01:25.452828Z |
| pysec-2014-52 |
|
traverser.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allow… | plone | 2014-03-11T19:37:00Z | 2021-07-25T23:34:45.751265Z |
| pysec-2014-53 |
|
Multiple unspecified vulnerabilities in (1) dataitems.py, (2) get.py, and (3) traverseNam… | plone | 2014-03-11T19:37:00Z | 2021-07-25T23:34:45.892869Z |
| pysec-2014-54 |
|
Multiple cross-site scripting (XSS) vulnerabilities in (1) spamProtect.py, (2) pts.py, an… | plone | 2014-03-11T19:37:00Z | 2021-07-25T23:34:46.028547Z |
| pysec-2014-55 |
|
zip.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 does not pr… | plone | 2014-03-11T19:37:00Z | 2021-07-25T23:34:46.176817Z |
| pysec-2014-56 |
|
sendto.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows r… | plone | 2014-03-11T19:37:00Z | 2021-07-25T23:34:46.316071Z |
| pysec-2014-57 |
|
typeswidget.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 doe… | plone | 2014-03-11T19:37:00Z | 2021-07-25T23:34:46.454886Z |
| pysec-2014-58 |
|
The WYSIWYG component (wysiwyg.py) in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3… | plone | 2014-03-11T19:37:00Z | 2021-07-25T23:34:46.598296Z |
| pysec-2014-59 |
|
Multiple open redirect vulnerabilities in (1) marmoset_patch.py, (2) publish.py, and (3) … | plone | 2014-03-11T19:37:00Z | 2021-07-25T23:34:46.736480Z |
| pysec-2014-60 |
|
The object manager implementation (objectmanager.py) in Plone 2.1 through 4.1, 4.2.x thro… | plone | 2014-03-11T19:37:00Z | 2021-07-25T23:34:46.895458Z |
| pysec-2014-61 |
|
member_portrait.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1… | plone | 2014-03-11T19:37:00Z | 2021-07-25T23:34:47.083456Z |
| pysec-2014-62 |
|
mail_password.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 a… | plone | 2014-03-11T19:37:00Z | 2021-07-25T23:34:47.220560Z |
| pysec-2014-63 |
|
(1) cb_decode.py and (2) linkintegrity.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, … | plone | 2014-03-11T19:37:00Z | 2021-07-25T23:34:47.359775Z |
| pysec-2014-83 |
|
The (1) extract_keys_from_pdf and (2) fill_pdf functions in pdf_ext.py in logilab-commons… | logilab-common | 2014-03-11T19:37:00Z | 2021-08-27T03:22:06.075755Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-1085 | Malicious code in argo-hosting-api (npm) | 2022-05-31T13:29:20Z | 2022-05-31T13:29:20Z |
| mal-2022-6265 | Malicious code in spr-svg-loaders (npm) | 2022-05-31T13:29:37Z | 2022-05-31T13:29:38Z |
| mal-2022-3557 | Malicious code in handsontable-examples (npm) | 2022-05-31T13:31:02Z | 2022-05-31T13:31:10Z |
| mal-2022-4296 | Malicious code in lib-admin-ui (npm) | 2022-05-31T13:31:02Z | 2022-05-31T13:31:03Z |
| mal-2022-4445 | Malicious code in mad-expo-core (npm) | 2022-05-31T13:31:02Z | 2022-05-31T13:31:10Z |
| mal-2022-6970 | Malicious code in vro-language-server (npm) | 2022-05-31T13:31:02Z | 2022-05-31T13:31:03Z |
| mal-2022-1057 | Malicious code in apollo-federation-ruby (npm) | 2022-05-31T13:32:26Z | 2022-05-31T13:32:26Z |
| mal-2022-1685 | Malicious code in brlc-token (npm) | 2022-05-31T13:32:26Z | 2022-05-31T13:32:26Z |
| mal-2022-3968 | Malicious code in isomorphic-core (npm) | 2022-05-31T13:32:26Z | 2022-05-31T13:32:30Z |
| mal-2022-4564 | Malicious code in mes-bah (npm) | 2022-05-31T13:32:26Z | 2022-05-31T13:32:26Z |
| mal-2022-4847 | Malicious code in nginxconfig.io (npm) | 2022-05-31T13:32:26Z | 2022-05-31T13:32:27Z |
| mal-2022-7033 | Malicious code in wagtail-supertable (npm) | 2022-05-31T13:32:26Z | 2022-05-31T13:32:27Z |
| mal-2022-7215 | Malicious code in woocommerce-infinitepay (npm) | 2022-05-31T13:32:26Z | 2022-05-31T13:32:26Z |
| mal-2022-867 | Malicious code in ado-vue (npm) | 2022-05-31T13:32:26Z | 2022-05-31T13:32:27Z |
| mal-2022-5760 | Malicious code in resadmin-web (npm) | 2022-05-31T13:33:32Z | 2022-05-31T13:33:33Z |
| mal-2022-2264 | Malicious code in csdn-tree (npm) | 2022-05-31T13:33:33Z | 2022-05-31T13:33:40Z |
| mal-2022-903 | Malicious code in ai-indeed (npm) | 2022-05-31T13:33:33Z | 2022-05-31T13:33:33Z |
| mal-2022-2027 | Malicious code in colourize (npm) | 2022-05-31T13:35:15Z | 2022-05-31T13:35:15Z |
| mal-2022-3067 | Malicious code in flake8-holvi (npm) | 2022-05-31T13:36:23Z | 2022-05-31T13:36:24Z |
| mal-2022-3657 | Malicious code in holvipartners (npm) | 2022-05-31T13:36:23Z | 2022-05-31T13:36:24Z |
| mal-2022-4434 | Malicious code in lyft-avidl (npm) | 2022-05-31T13:36:23Z | 2022-05-31T13:36:24Z |
| mal-2022-4511 | Malicious code in mb-blog (npm) | 2022-05-31T13:36:23Z | 2022-05-31T13:36:24Z |
| mal-2022-5116 | Malicious code in orangeonion.buildtools (npm) | 2022-05-31T13:36:23Z | 2022-05-31T13:36:23Z |
| mal-2022-6136 | Malicious code in sixt (npm) | 2022-05-31T13:36:23Z | 2022-05-31T13:36:23Z |
| mal-2022-6330 | Malicious code in stripe-connect-rocketrides (npm) | 2022-05-31T13:36:23Z | 2022-05-31T13:36:24Z |
| mal-2022-4944 | Malicious code in npm_ransomware (npm) | 2022-05-31T13:36:55Z | 2022-05-31T13:36:55Z |
| mal-2022-5816 | Malicious code in rkdvil (npm) | 2022-05-31T13:37:28Z | 2022-05-31T13:37:29Z |
| mal-2022-5817 | Malicious code in rkpacktest (npm) | 2022-05-31T13:37:28Z | 2022-05-31T13:37:29Z |
| mal-2022-5643 | Malicious code in react-dom-router-old (npm) | 2022-05-31T13:37:43Z | 2022-05-31T13:37:44Z |
| mal-2022-5642 | Malicious code in react-dom-router-compatibility (npm) | 2022-05-31T13:37:44Z | 2022-05-31T13:37:44Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-discourse-2023-45806 | Discourse vulnerable to DoS via Regexp Injection in Full Name | 2024-03-06T10:52:56.903Z | 2025-05-20T10:02:07.006Z |
| bit-django-2022-28347 | 2024-03-06T10:52:57.760Z | 2025-04-03T14:40:37.652Z | |
| bit-grafana-2023-4399 | 2024-03-06T10:52:57.885Z | 2025-04-03T14:40:37.652Z | |
| bit-gulp-2021-35065 | 2024-03-06T10:52:58.490Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2022-30781 | 2024-03-06T10:52:59.101Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2023-35943 | Envoy vulnerable to CORS filter segfault when origin header is removed | 2024-03-06T10:52:59.499Z | 2025-05-20T10:02:07.006Z |
| bit-haproxy-2023-45539 | 2024-03-06T10:52:59.807Z | 2025-04-03T14:40:37.652Z | |
| bit-apache-2022-28330 | read beyond bounds in mod_isapi | 2024-03-06T10:53:01.782Z | 2025-05-20T10:02:07.006Z |
| bit-ghost-2022-47196 | 2024-03-06T10:53:02.275Z | 2025-11-06T13:25:46.476Z | |
| bit-elasticsearch-2021-22146 | 2024-03-06T10:53:02.276Z | 2025-04-03T14:40:37.652Z | |
| bit-consul-2021-37219 | 2024-03-06T10:53:02.967Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2024-0861 | Direct Request ('Forced Browsing') in GitLab | 2024-03-06T10:53:03.603Z | 2025-05-20T10:02:07.006Z |
| bit-golang-2023-45283 | Insecure parsing of Windows paths with a \??\ prefix in path/filepath | 2024-03-06T10:53:03.789Z | 2025-05-20T10:02:07.006Z |
| bit-handlebars-2021-32817 | File disclosure in express-hbs | 2024-03-06T10:53:03.974Z | 2025-05-20T10:02:07.006Z |
| bit-dotnet-2023-36796 | Visual Studio Remote Code Execution Vulnerability | 2024-03-06T10:53:04.879Z | 2025-05-20T10:02:07.006Z |
| bit-gradle-2023-35946 | Dependency cache path traversal in Gradle | 2024-03-06T10:53:05.804Z | 2025-05-20T10:02:07.006Z |
| bit-django-2022-28346 | 2024-03-06T10:53:06.178Z | 2025-04-03T14:40:37.652Z | |
| bit-discourse-2023-45147 | Arbitrary keys can be added to a topic's custom fields by any user in Discourse | 2024-03-06T10:53:06.773Z | 2025-11-06T13:25:46.476Z |
| bit-grafana-2023-3128 | 2024-03-06T10:53:06.974Z | 2025-04-03T14:40:37.652Z | |
| bit-airflow-2023-42663 | Apache Airflow: Bypass permission verification to view task instances of other dags | 2024-03-06T10:53:07.908Z | 2025-05-20T10:02:07.006Z |
| bit-drupal-2022-25275 | 2024-03-06T10:53:08.904Z | 2025-04-03T14:40:37.652Z | |
| bit-envoy-2023-35942 | Envoy's gRPC access log crash caused by the listener draining | 2024-03-06T10:53:10.274Z | 2025-05-20T10:02:07.006Z |
| bit-helm-2023-25165 | getHostByName Function Information Disclosure | 2024-03-06T10:53:11.303Z | 2025-05-20T10:02:07.006Z |
| bit-gulp-2020-28469 | Regular Expression Denial of Service (ReDoS) | 2024-03-06T10:53:11.461Z | 2025-05-20T10:02:07.006Z |
| bit-consul-2021-36213 | 2024-03-06T10:53:11.575Z | 2025-04-03T14:40:37.652Z | |
| bit-haproxy-2023-40225 | 2024-03-06T10:53:12.013Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2022-27313 | 2024-03-06T10:53:12.361Z | 2025-04-03T14:40:37.652Z | |
| bit-elasticsearch-2021-22145 | 2024-03-06T10:53:12.399Z | 2025-07-09T06:18:38.715Z | |
| bit-harbor-2023-20902 | Timing attack risk in Harbor | 2024-03-06T10:53:13.485Z | 2025-05-20T10:02:07.006Z |
| bit-ghost-2022-47195 | 2024-03-06T10:53:13.671Z | 2025-11-06T13:25:46.476Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-gp14462 | Security fixes for GHSA-vvgc-356p-c3xw applied in versions: 0.18.0-r0 | 2026-02-10T00:39:23.397354Z | 2026-02-09T12:51:17Z |
| cleanstart-2026-tj33788 | Within HostnameError | 2026-02-10T00:39:24.476012Z | 2026-02-09T12:51:17Z |
| cleanstart-2026-im73098 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-11T00:40:59.052841Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-xb34574 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-11T00:40:59.223419Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-ls08172 | Within HostnameError | 2026-02-11T00:41:59.030674Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-cv28298 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-11T00:41:59.034081Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-by71381 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-11T00:41:59.117560Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-fi29887 | During the TLS 1 | 2026-02-13T00:39:44.225771Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-jb30245 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 0.47.2-r0 | 2026-02-13T00:39:45.274258Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-gv85693 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-13T00:40:14.240914Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-ca79883 | Security fixes for GHSA-6v2p-p943-phr9, GHSA-c6gw-w398-hv78, GHSA-f6x5-jh6r-wrfv, GHSA-hcg3-p754-cr77, GHSA-j5w8-q4qc-rx2x, GHSA-qxp5-gw88-xv66, GHSA-v778-237x-gjrc, GHSA-vvgc-356p-c3xw applied in versions: 1.15.0-r1 | 2026-02-13T00:40:14.901695Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-tr92727 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-13T00:41:14.875956Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-wv76464 | libexpat in Expat before 2 | 2026-02-13T00:43:45.311968Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-mh09144 | issue was discovered in libexpat before 2 | 2026-02-13T00:45:17.459930Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-kk07808 | issue has been found in third-party PNM decoding associated with libpng 1 | 2026-02-14T00:37:45.311656Z | 2026-02-13T12:28:27Z |
| cleanstart-2026-jr03360 | Within HostnameError | 2026-02-17T00:39:45.300172Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-vg57433 | Within HostnameError | 2026-02-17T00:39:45.599344Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-uh39784 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-17T00:40:45.017480Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-gg58376 | Within HostnameError | 2026-02-17T00:41:15.939977Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-lr19699 | Within HostnameError | 2026-02-18T00:37:41.636616Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-dt95939 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.674179Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-zt77083 | When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers | 2026-02-18T00:40:43.959662Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-yn08405 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 7.1.1-r7 | 2026-02-19T00:39:05.944714Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-kn30288 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-rhfx-m35p-ff5j, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0 | 2026-02-19T00:39:07.163109Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-oj16660 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0 | 2026-02-19T00:39:07.225007Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-nn87556 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.29.0-r0 | 2026-02-19T00:39:07.788394Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-ln12820 | vulnerability has been identified in Node | 2026-02-19T00:58:49.154512Z | 2026-02-18T09:40:19Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2022-058 | 2022-10-12T19:41:07.000Z | 2023-08-10T19:30:04.000Z | |
| drupal-contrib-2022-059 | 2022-10-19T20:28:24.000Z | 2023-08-10T18:22:23.000Z | |
| drupal-contrib-2022-060 | 2022-11-30T15:20:10.000Z | 2023-08-10T18:23:08.000Z | |
| drupal-contrib-2022-061 | 2022-11-30T15:28:44.000Z | 2023-08-10T18:25:19.000Z | |
| drupal-contrib-2022-062 | 2022-11-30T15:34:03.000Z | 2023-08-10T18:25:13.000Z | |
| drupal-contrib-2023-001 | 2023-01-11T17:15:37.000Z | 2023-08-10T14:25:04.000Z | |
| drupal-contrib-2023-002 | 2023-01-18T17:28:05.000Z | 2023-08-10T14:25:24.000Z | |
| drupal-contrib-2023-003 | 2023-01-18T17:36:56.000Z | 2023-08-10T14:25:39.000Z | |
| drupal-contrib-2023-004 | 2023-01-18T17:49:04.000Z | 2023-08-10T14:23:53.000Z | |
| drupal-contrib-2023-005 | 2023-02-01T16:13:42.000Z | 2023-08-10T14:23:38.000Z | |
| drupal-contrib-2023-006 | 2023-03-01T15:15:08.000Z | 2023-08-10T14:22:32.000Z | |
| drupal-contrib-2023-007 | 2023-03-01T17:11:03.000Z | 2023-08-10T14:22:08.000Z | |
| drupal-contrib-2023-008 | 2023-03-01T17:38:09.000Z | 2023-08-10T14:21:21.000Z | |
| drupal-contrib-2023-009 | 2023-03-08T17:46:44.000Z | 2023-08-10T14:20:59.000Z | |
| drupal-contrib-2023-010 | 2023-03-15T17:22:57.000Z | 2023-08-10T14:20:35.000Z | |
| drupal-contrib-2023-011 | 2023-03-15T17:40:02.000Z | 2023-08-10T15:37:51.000Z | |
| drupal-contrib-2023-012 | 2023-03-29T17:44:58.000Z | 2023-08-10T14:19:50.000Z | |
| drupal-contrib-2023-013 | 2023-04-12T16:09:25.000Z | 2023-08-10T14:19:21.000Z | |
| drupal-contrib-2023-014 | 2023-05-03T15:44:12.000Z | 2023-08-10T13:58:54.000Z | |
| drupal-contrib-2023-016 | 2023-05-31T13:14:25.000Z | 2023-08-10T13:58:03.000Z | |
| drupal-contrib-2023-017 | 2023-05-31T13:18:52.000Z | 2023-08-10T13:57:22.000Z | |
| drupal-contrib-2023-018 | 2023-05-31T13:20:43.000Z | 2023-08-10T13:56:48.000Z | |
| drupal-contrib-2023-019 | 2023-05-31T13:22:44.000Z | 2023-08-10T13:56:55.000Z | |
| drupal-contrib-2023-020 | 2023-06-14T14:52:36.000Z | 2023-08-10T13:54:32.000Z | |
| drupal-contrib-2023-021 | 2023-06-21T17:03:14.000Z | 2023-08-10T13:53:57.000Z | |
| drupal-contrib-2023-023 | 2023-06-28T17:02:13.000Z | 2023-08-10T13:53:00.000Z | |
| drupal-contrib-2023-024 | 2023-06-28T17:03:36.000Z | 2023-08-10T13:40:55.000Z | |
| drupal-contrib-2023-025 | 2023-06-28T17:10:15.000Z | 2023-10-26T13:22:52.000Z | |
| drupal-contrib-2023-026 | 2023-06-28T17:11:07.000Z | 2023-08-10T13:49:56.000Z | |
| drupal-contrib-2023-027 | 2023-06-28T17:15:03.000Z | 2023-07-31T21:17:46.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2007-000071 | Fresh Reader RSS feed cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000073 | Movable Type cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000074 | phpAdsNew cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000085 | CGI RESCUE WebFORM vulnerable to HTTP header injection | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000086 | CGI RESCUE WebFORM vulnerable to cross-site scripting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000087 | CGI RESCUE WebFORM missing mail content vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000088 | Shopping Basket Professional vulnerable to OS command injection | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000090 | b2evolution cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000091 | Sleipnir RSS bar vulnerable in handling RSS data in an inappropriate security zone | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000093 | Sleipnir RSS bar vulnerable in handling RSS data in an inappropriate security zone | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000094 | MODx cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000127 | CCC Cleaner buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000134 | Sage vulnerable to arbitrary script execution | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000135 | CCC Cleaner buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000159 | Adobe JRun cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000160 | ColdFusion cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000161 | ColdFusion error page cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000165 | Ariel AirOne series cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000176 | Mozilla Firefox cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000199 | CCC Cleaner division-by-zero vulnerability when scanning UPX-packed executables | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000200 | Trac cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000215 | FENCE-Pro and Systemwalker Desktop Encryption self-decoding file vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000218 | Interstage Application Server cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000225 | NewsGlue and Ikinari Jijyoutsuu arbitrary script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000226 | BASP21 vulnerable to mail header injection | 2008-05-21T00:00+09:00 | 2016-10-13T14:45+09:00 |
| jvndb-2007-000227 | CruiseWorks and Minna De Office vulnerable in access restrictions | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000228 | MailDwarf cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000229 | MailDwarf vulnerability allows unauthorized sending of emails | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000236 | Overlay Weaver cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000259 | open-gorotto cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00126 | GNU Emacs本地信息泄露漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00127 | EDK1 UEFI 'FSVariable.c'本地缓冲区溢出漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00128 | ARJ存在多个目录遍历漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00129 | HUAWEI MobiConnect存在多个漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00130 | CTS Projects & Software ClassAd SQL注入漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00131 | miniunzip 'minizip.c'目录遍历漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00132 | i.Ftp Server远程栈缓冲区溢出漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00133 | PHP 'cgi_main.c'越界读拒绝服务漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00134 | Perl a2p '/usr/bin/a2p'缓冲区溢出漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00135 | Dwarfdump内存错误引用拒绝服务漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00136 | Absolut Engine存在多个SQL注入漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00137 | mime-support Package 'run-mailcap'命令注入漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00138 | Info-ZIP UnZip越界读堆缓冲区溢出漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00139 | Info-ZIP UnZip越界写堆缓冲区溢出漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00140 | VDG Security SENSE存在多个缓冲区溢出漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00141 | PMB SQL注入漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00142 | Exiv riffvideo.cpp缓冲区溢出漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00143 | phpMyRecipes category参数SQL注入漏洞 | 2015-01-06 | 2015-01-07 |
| cnvd-2015-00149 | Absolut Engine跨站脚本漏洞 | 2015-01-06 | 2015-01-10 |
| cnvd-2015-00150 | gcab 'gcab-folder.c'本地目录遍历漏洞 | 2015-01-06 | 2015-01-09 |
| cnvd-2015-00088 | Linux Kernel 'keys/gc.c'本地内存破坏漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00089 | Apache Traffic Server 'HttpTransact.cc'拒绝服务漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00090 | EMC Documentum Web Development Kit (WDK)存在未明漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00091 | EMC Documentum Web Development Kit (WDK)存在未明框架注入漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00092 | EMC Documentum Web Development Kit (WDK)存在多个跨站脚本漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00093 | EMC Documentum Web Development Kit (WDK)URL重定向漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00094 | EMC Documentum Web Development Kit (WDK)跨站请求伪造漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00095 | AdaptCMS任意文件上传漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00096 | AdaptCMS 'Referer' Header Field HTTP开放重定向漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00097 | AdaptCMS存在多个HTML注入漏洞 | 2015-01-07 | 2015-01-08 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2015-02571 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02572 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02573 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02574 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02575 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02576 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02577 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02578 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02579 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02580 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02581 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02582 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02583 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02584 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02585 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02586 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02587 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02588 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02589 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02590 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02591 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02592 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02593 | Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02594 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02595 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 05.07.2024 |
| bdu:2015-02596 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02597 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02598 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02599 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| bdu:2015-02600 | Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику н… | 28.04.2015 | 28.11.2016 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2001-avi-088 | Vulnérabilité de SnmpXdmid sur Sun | 2001-08-31T00:00:00.000000 | 2002-06-28T00:00:00.000000 |
| certa-2001-avi-089 | Vulnérabilités dans le service d'impression BSD | 2001-08-31T00:00:00.000000 | 2001-11-19T00:00:00.000000 |
| certa-2001-avi-090 | Vulnérabilité de in.lpd sous Solaris | 2001-09-03T00:00:00.000000 | 2001-09-03T00:00:00.000000 |
| certa-2001-avi-091 | Vulnérabilité de rlpdaemon sous HP-UX | 2001-09-05T00:00:00.000000 | 2001-09-05T00:00:00.000000 |
| certa-2001-avi-092 | Vulnérabilité dans Microsoft Exchange 5.5 | 2001-09-07T00:00:00.000000 | 2001-09-07T00:00:00.000000 |
| certa-2001-avi-093 | Vulnérabilité dans le serveur RPC sous Windows NT 4.0 | 2001-09-12T00:00:00.000000 | 2001-09-12T00:00:00.000000 |
| certa-2001-avi-094 | Attaques non détectées par certains IDS | 2001-09-13T00:00:00.000000 | 2001-09-13T00:00:00.000000 |
| certa-2001-avi-095 | Vulnérabilité des <SPAN class= "textit">daemons</SPAN> <TT>smap/smapd</TT> ( ou <TT>CSMAP</TT>) | 2001-09-13T00:00:00.000000 | 2001-09-13T00:00:00.000000 |
| certa-2001-avi-096 | Serveurs DNS Microsoft : corruption de cache possible. | 2001-09-20T00:00:00.000000 | 2001-09-20T00:00:00.000000 |
| certa-2001-avi-097 | Vulnérabilités de SSH sur CISCO | 2001-09-21T00:00:00.000000 | 2001-09-21T00:00:00.000000 |
| certa-2001-avi-098 | Vulnérabilités dans le logiciel Interscan eManager de Trend Micro | 2001-09-24T00:00:00.000000 | 2001-09-24T00:00:00.000000 |
| certa-2001-avi-099 | Vulnérabilité dans ArcServe pour Windows NT | 2001-09-25T00:00:00.000000 | 2001-09-25T00:00:00.000000 |
| certa-2001-avi-100 | Vulnérabilité de Microsoft Exchange 2000 Server Outlook Web Access | 2001-09-27T00:00:00.000000 | 2001-09-27T00:00:00.000000 |
| certa-2001-avi-101 | Vulnérabilité dans le paquetage setserial | 2001-09-27T00:00:00.000000 | 2001-09-27T00:00:00.000000 |
| certa-2001-avi-102 | Vulnérabilité dans le garde-barrière PIX de Cisco | 2001-09-28T00:00:00.000000 | 2001-09-28T00:00:00.000000 |
| certa-2001-avi-103 | Vulnérabilité dans le proxy Squid | 2001-09-28T00:00:00.000000 | 2001-09-28T00:00:00.000000 |
| certa-2001-avi-104 | Vulnérabilités multiples dans l'implémentation OpenSSH du protocole SSH v2 | 2001-09-28T00:00:00.000000 | 2001-10-19T00:00:00.000000 |
| certa-2001-avi-105 | Vulnérabilité dans les agents de supervision Compaq | 2001-10-01T00:00:00.000000 | 2001-10-01T00:00:00.000000 |
| certa-2001-avi-106 | Multiples vulnérabilités dans Sendmail | 2001-10-02T00:00:00.000000 | 2001-10-02T00:00:00.000000 |
| certa-2001-avi-107 | Vulnérabilité dans le service RPC ToolTalk | 2001-10-04T00:00:00.000000 | 2001-12-07T00:00:00.000000 |
| certa-2001-avi-108 | Vulnérabilité dans le garde-barrière PIX de Cisco | 2001-10-04T00:00:00.000000 | 2001-10-04T00:00:00.000000 |
| certa-2001-avi-109 | Vulnérabilité dans <TT>rpcbind</TT> sous HP | 2001-10-04T00:00:00.000000 | 2001-10-04T00:00:00.000000 |
| certa-2001-avi-110 | Vulnérabilité de Network Node Manager sous HP Openview | 2001-10-04T00:00:00.000000 | 2001-10-04T00:00:00.000000 |
| certa-2001-avi-111 | Vulnérabilité dans les logiciels Excel et PowerPoint de Microsoft | 2001-10-05T00:00:00.000000 | 2001-10-05T00:00:00.000000 |
| certa-2001-avi-112 | Vulnérabilité de yppasswd | 2001-10-08T00:00:00.000000 | 2001-10-08T00:00:00.000000 |
| certa-2001-avi-113 | Vulnérabilité dans PhpNuke | 2001-10-08T00:00:00.000000 | 2001-10-08T00:00:00.000000 |
| certa-2001-avi-114 | Vulnérabilité dans le moteur d'indexation ht://Dig | 2001-10-12T00:00:00.000000 | 2001-10-12T00:00:00.000000 |
| certa-2001-avi-115 | Faille de sécurité dans Zope | 2001-10-12T00:00:00.000000 | 2001-10-19T00:00:00.000000 |
| certa-2001-avi-116 | Vulnérabilité de Microsoft Internet Explorer | 2001-10-16T00:00:00.000000 | 2001-10-23T00:00:00.000000 |
| certa-2001-avi-117 | Vulnérabilité de Norton Antivirus LiveUpdate | 2001-10-18T00:00:00.000000 | 2001-10-18T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2012-ale-004 | Vulnérabilité dans Microsoft Exchange et Fast Search Server 2010 | 2012-07-25T00:00:00.000000 | 2012-08-16T00:00:00.000000 |
| certa-2012-ale-005 | Vulnérabilité dans Oracle Java | 2012-08-27T00:00:00.000000 | 2012-08-31T00:00:00.000000 |
| certa-2012-ale-006 | Vulnérabilité dans Internet Explorer | 2012-09-18T00:00:00.000000 | 2012-09-21T00:00:00.000000 |
| certa-2012-ale-007 | Vulnérabilité dans MySQL | 2012-12-06T00:00:00.000000 | 2013-01-07T00:00:00.000000 |
| certa-2012-ale-008 | Vulnérabilité dans certains terminaux Samsung | 2012-12-18T00:00:00.000000 | 2012-12-18T00:00:00.000000 |
| certa-2012-ale-009 | Vulnérabilité dans les pilotes NVidia | 2012-12-26T00:00:00.000000 | 2013-01-07T00:00:00.000000 |
| certa-2012-ale-010 | Vulnérabilité dans Internet Explorer | 2012-12-31T00:00:00.000000 | 2013-01-15T00:00:00.000000 |
| certa-2013-ale-001 | Vulnérabilités dans Oracle Java | 2013-01-10T00:00:00.000000 | 2013-01-15T00:00:00.000000 |
| certa-2013-ale-002 | Vulnérabilités dans Adobe Reader et Acrobat | 2013-02-14T00:00:00.000000 | 2013-02-21T00:00:00.000000 |
| certa-2013-ale-003 | Vulnérabilité dans Microsoft Internet Explorer 8 | 2013-05-06T00:00:00.000000 | 2013-05-15T00:00:00.000000 |
| certa-2013-ale-004 | Vulnérabilité dans Adobe ColdFusion | 2013-05-10T00:00:00.000000 | 2013-05-15T00:00:00.000000 |
| certa-2013-ale-005 | Vulnérabilité dans le noyau Linux | 2013-05-14T00:00:00.000000 | 2013-05-24T00:00:00.000000 |
| certa-2013-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| certa-2013-ale-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| certa-2013-ale-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| certfr-2014-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| certfr-2014-ale-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| certfr-2014-ale-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| certfr-2014-ale-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| certfr-2014-ale-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| certfr-2014-ale-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| certfr-2014-ale-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| certfr-2014-ale-008 | Vulnérabilité dans Drupal | 2014-10-16T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| certfr-2014-ale-010 | Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows | 2014-11-11T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-011 | Vulnérabilité de l'implémentation Kerberos dans Microsoft Windows | 2014-11-18T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2015-ale-001 | Vulnérabilité dans Adobe Flash Player | 2015-01-22T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2015-ale-002 | Vulnérabilité dans Adobe Flash Player | 2015-02-02T00:00:00.000000 | 2015-02-05T00:00:00.000000 |
| certfr-2015-ale-003 | Nouvelle campagne d'hameçonnage de type rançongiciel | 2015-02-05T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| certfr-2015-ale-004 | Vulnérabilité dans Microsoft Internet Explorer | 2015-02-10T00:00:00.000000 | 2015-03-31T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-305 | Stack-buffer-overflow in ot::NetworkData::Leader::SendCommissioningGetResponse | 2020-06-30T00:00:48.691484Z | 2022-04-13T03:04:39.086968Z |
| osv-2020-307 | Heap-buffer-overflow in spng_decode_image | 2020-06-30T00:00:49.046191Z | 2022-04-13T03:04:33.693276Z |
| osv-2020-308 | Heap-buffer-overflow in UA_copy | 2020-06-30T00:00:49.384650Z | 2022-04-13T03:04:41.293776Z |
| osv-2020-313 | Heap-buffer-overflow in git_buf_decode_base85 | 2020-07-01T00:00:01.257082Z | 2022-04-13T03:04:35.172768Z |
| osv-2020-315 | Heap-buffer-overflow in r_str_utf8_codepoint | 2020-07-01T00:00:01.824434Z | 2022-04-13T03:04:36.573045Z |
| osv-2020-317 | Heap-buffer-overflow in r_core_lines_initcache | 2020-07-01T00:00:02.076399Z | 2022-04-13T03:04:36.720061Z |
| osv-2020-319 | Use-of-uninitialized-value in inv_txfm2d_add_facade | 2020-07-01T00:00:02.248791Z | 2022-04-13T03:04:39.494971Z |
| osv-2020-322 | Negative-size-param in parse_proxy_protocol_v2 | 2020-07-01T00:00:02.608126Z | 2022-04-13T03:04:31.700929Z |
| osv-2020-323 | Use-of-uninitialized-value in ht_copy | 2020-07-01T00:00:02.715402Z | 2022-04-13T03:04:39.764885Z |
| osv-2020-324 | Heap-buffer-overflow in av1_convolve_2d_copy_sr_sse2 | 2020-07-01T00:00:02.786882Z | 2022-04-13T03:04:39.484676Z |
| osv-2020-325 | Stack-buffer-overflow in std::__1::basic_string<char, std::__1::char_traits<char>, std::__1::allocator<ch | 2020-07-01T00:00:02.845124Z | 2022-04-13T03:04:42.135767Z |
| osv-2020-327 | Heap-buffer-overflow in sas_read8 | 2020-07-01T00:00:02.920090Z | 2022-04-13T03:04:40.613777Z |
| osv-2020-328 | UNKNOWN READ in dotnet_parse_tilde_2 | 2020-07-01T00:00:03.116576Z | 2022-04-13T03:25:20.410918Z |
| osv-2020-333 | Heap-buffer-overflow in sas_read8 | 2020-07-01T00:00:03.620002Z | 2022-04-13T03:04:40.646222Z |
| osv-2020-334 | Heap-buffer-overflow in _iri_unescape_inline | 2020-07-01T00:00:03.651708Z | 2022-04-13T03:04:41.722363Z |
| osv-2020-335 | Global-buffer-overflow in template_fuzzer.cc | 2020-07-01T00:00:03.741355Z | 2022-04-13T03:04:31.744454Z |
| osv-2020-336 | Stack-buffer-overflow in ot::NetworkData::PrefixTlv::Init | 2020-07-01T00:00:03.773709Z | 2022-04-13T03:04:38.935999Z |
| osv-2020-337 | Global-buffer-overflow in lex_multiline_string | 2020-07-01T00:00:03.807910Z | 2022-04-13T03:04:31.739773Z |
| osv-2020-341 | Heap-buffer-overflow in post_process_template | 2020-07-01T00:00:04.091956Z | 2022-04-13T03:04:31.710540Z |
| osv-2020-342 | UNKNOWN READ in ndpi_search_kerberos | 2020-07-01T00:00:04.127415Z | 2022-04-13T03:04:36.090661Z |
| osv-2020-343 | Stack-use-after-return in ot::MeshCoP::ChannelMaskEntryBase::GetChannelPage | 2020-07-01T00:00:04.277007Z | 2022-04-13T03:04:38.873261Z |
| osv-2020-344 | Heap-buffer-overflow in spng_decode_image | 2020-07-01T00:00:04.309532Z | 2022-04-13T03:04:33.708836Z |
| osv-2020-345 | Index-out-of-bounds in yara_yyparse | 2020-07-01T00:00:04.345697Z | 2022-04-13T03:04:42.295200Z |
| osv-2020-347 | Heap-buffer-overflow in BEInt<unsigned short, 2>::operator unsigned short | 2020-07-01T00:00:04.515175Z | 2022-04-13T03:04:32.809168Z |
| osv-2020-348 | Heap-buffer-overflow in std::__1::vector<std::__1::vector<Sass::SharedImpl<Sass::ComplexSelector>, std:: | 2020-07-01T00:00:04.559189Z | 2022-04-13T03:04:38.487815Z |
| osv-2020-351 | UNKNOWN READ in validate_past_idat | 2020-07-01T00:00:04.694618Z | 2022-04-13T03:04:33.672637Z |
| osv-2020-352 | Heap-buffer-overflow in searchObjectForKeyRec | 2020-07-01T00:00:04.730408Z | 2022-04-13T03:04:41.387084Z |
| osv-2020-353 | Stack-buffer-overflow in ot::MeshCoP::Commissioner::GeneratePskc | 2020-07-01T00:00:04.770226Z | 2022-04-13T03:04:38.919894Z |
| osv-2020-354 | UNKNOWN READ in ot::Ip6::NetifUnicastAddress::GetNext | 2020-07-01T00:00:04.807199Z | 2022-04-13T03:04:38.878276Z |
| osv-2020-355 | Use-of-uninitialized-value in LzmaDec_TryDummy | 2020-07-01T00:00:04.840679Z | 2022-04-13T03:04:40.519387Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2020-0159 | Potential segfault in `localtime_r` invocations | 2020-11-10T12:00:00Z | 2022-08-04T19:52:46Z |
| rustsec-2020-0069 | Argument injection in sendmail transport | 2020-11-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0073 | Mutable reference with immutable provenance | 2020-11-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0130 | Bunch<T> unconditionally implements Send/Sync | 2020-11-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0080 | `miow` invalidly assumes the memory layout of std::net::SocketAddr | 2020-11-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0092 | Send/Sync bound needed on V in `impl Send/Sync for ARCache<K, V>` | 2020-11-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0131 | Send/Sync bound needed on T for Send/Sync impl of RcuCell<T> | 2020-11-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0134 | `LockWeak<T>` allows to create data race to `T`. | 2020-11-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0116 | PinSlab<T> and Unordered<T, S> need bounds on their Send/Sync traits | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0126 | SyncChannel<T> can move 'T: !Send' to other threads | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0133 | Queue<T> should have a Send bound on its Send/Sync traits | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0136 | CopyCell lacks bounds on its Send trait allowing for data races | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0149 | Data race and memory safety issue in `Index` | 2020-11-15T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0115 | Singleton lacks bounds on Send and Sync. | 2020-11-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0151 | Generators can cause data races if non-Send types are used in their generator functions | 2020-11-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0087 | TryMutex<T> allows sending non-Send type across threads | 2020-11-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0119 | ReadTicket and WriteTicket should only be sendable when T is Send | 2020-11-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0135 | Slock<T> allows sending non-Send types across thread boundaries | 2020-11-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0071 | Potential segfault in the time crate | 2020-11-18T12:00:00Z | 2024-06-05T14:00:17Z |
| rustsec-2020-0117 | QueueSender<T>/QueueReceiver<T>: Send/Sync impls need `T: Send` | 2020-11-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0125 | convec::ConVec<T> unconditionally implements Send/Sync | 2020-11-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0128 | Cache<K>: Send/Sync impls needs trait bounds on `K` | 2020-11-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0074 | Reference counting error in `From<Py<T>>` | 2020-11-28T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0075 | Unexpected panic when decoding tokens | 2020-11-29T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0088 | MPMCConsumer/Producer allows sending non-Send type across threads | 2020-11-29T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0142 | Send bound needed on T (for Send impl of `Bucket2`) | 2020-11-29T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0094 | Unsound: can make `ARefss` contain a !Send, !Sync object. | 2020-12-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0077 | memmap is unmaintained | 2020-12-02T12:00:00Z | 2022-08-25T07:09:30Z |
| rustsec-2020-0082 | ordered_float:NotNan may contain NaN after panic in assignment operators | 2020-12-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0083 | crate has been superseded by `sn_client` | 2020-12-07T12:00:00Z | 2020-12-07T17:22:02Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2021:2575 | Moderate: lz4 security update | 2021-06-29T13:43:40Z | 2023-03-13T16:34:06Z |
| alsa-2021:2583 | Moderate: python38:3.8 and python38-devel:3.8 security update | 2021-06-29T13:57:32Z | 2021-08-11T08:54:00Z |
| alsa-2021:2584 | Moderate: ruby:2.7 security, bug fix, and enhancement update | 2021-06-29T13:57:50Z | 2023-09-15T13:41:48Z |
| alsa-2021:2587 | Moderate: ruby:2.5 security, bug fix, and enhancement update | 2021-06-29T13:58:20Z | 2022-02-17T11:19:12Z |
| alsa-2021:2588 | Moderate: ruby:2.6 security, bug fix, and enhancement update | 2021-06-29T13:58:40Z | 2023-09-15T13:41:48Z |
| alsa-2021:2714 | Important: kernel security and bug fix update | 2021-07-20T13:30:15Z | 2021-08-11T08:54:00Z |
| alsa-2021:2781 | Important: java-11-openjdk security update | 2021-07-21T07:28:55Z | 2021-08-11T08:54:00Z |
| alsa-2021:2776 | Important: java-1.8.0-openjdk security update | 2021-07-21T07:31:58Z | 2021-08-11T08:54:00Z |
| alsa-2021:3020 | Important: ruby:2.7 security update | 2021-08-05T14:06:16Z | 2021-08-05T14:06:16Z |
| alsa-2021:3057 | Important: kernel security, bug fix, and enhancement update | 2021-08-10T11:56:07Z | 2021-08-11T08:54:00Z |
| alsa-2021:3058 | Moderate: glib2 security update | 2021-08-10T11:56:26Z | 2021-08-11T08:54:00Z |
| alsa-2021:3061 | Moderate: virt:rhel and virt-devel:rhel security and bug fix update | 2021-08-10T11:58:46Z | 2021-12-23T15:15:26Z |
| alsa-2021:3073 | Moderate: nodejs:12 security, bug fix, and enhancement update | 2021-08-10T12:00:47Z | 2021-08-10T12:00:43Z |
| alsa-2021:3074 | Moderate: nodejs:14 security, bug fix, and enhancement update | 2021-08-10T12:00:51Z | 2021-08-10T12:00:47Z |
| alsa-2021:3075 | Low: libuv security update | 2021-08-10T12:00:55Z | 2021-11-12T10:20:56Z |
| alsa-2021:3151 | Important: sssd security update | 2021-08-16T08:00:18Z | 2021-08-17T07:24:43Z |
| alsa-2021:3152 | Important: exiv2 security update | 2021-08-16T09:08:01Z | 2021-08-18T16:32:59Z |
| alsa-2021:3253 | Important: libsndfile security update | 2021-08-24T07:29:56Z | 2021-11-12T10:21:01Z |
| alsa-2021:3447 | Important: kernel security and bug fix update | 2021-09-07T17:24:27Z | 2021-09-08T10:16:55Z |
| alsa-2021:3548 | Moderate: kernel security, bug fix, and enhancement update | 2021-09-15T09:41:20Z | 2023-09-15T13:41:48Z |
| alsa-2021:3572 | Moderate: nss and nspr security, bug fix, and enhancement update | 2021-09-21T07:08:30Z | 2021-11-12T10:20:56Z |
| alsa-2021:3590 | Moderate: mysql:8.0 security, bug fix, and enhancement update | 2021-09-21T07:13:26Z | 2021-09-21T07:13:20Z |
| alsa-2021:3623 | Important: nodejs:12 security and bug fix update | 2021-09-21T12:33:58Z | 2021-09-21T12:33:58Z |
| alsa-2021:3666 | Important: nodejs:14 security and bug fix update | 2021-09-27T06:47:35Z | 2022-11-07T17:47:24Z |
| alsa-2021:3816 | Important: httpd:2.4 security update | 2021-10-12T15:53:03Z | 2022-01-26T07:27:24Z |
| alsa-2021:3819 | Important: .NET 5.0 security and bugfix update | 2021-10-12T19:35:54Z | 2021-11-12T10:20:56Z |
| alsa-2021:3918 | Important: redis:5 security update | 2021-10-19T13:14:11Z | 2021-10-19T13:14:11Z |
| alsa-2021:3893 | Important: java-1.8.0-openjdk security and bug fix update | 2021-10-20T12:38:15Z | 2021-11-12T10:20:56Z |
| alsa-2021:3891 | Important: java-11-openjdk security update | 2021-10-20T12:41:00Z | 2021-11-12T10:20:56Z |
| alsa-2021:3945 | Important: redis:6 security update | 2021-10-20T12:46:40Z | 2021-10-20T12:46:40Z |