Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2007-5286 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5281. Reason: This candidate is a duplicate of CVE-2007-5281. Notes: All CVE users should reference CVE-2007-5281 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-10-09T04:00:00.000Z | 2007-10-11T13:00:00.000Z |
| CVE-2007-5287 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5282. Reason: This candidate is a duplicate of CVE-2007-5282. Notes: All CVE users should reference CVE-2007-5282 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-10-09T04:00:00.000Z | 2007-10-11T13:00:00.000Z |
| CVE-2007-5288 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5283. Reason: This candidate is a duplicate of CVE-2007-5283. Notes: All CVE users should reference CVE-2007-5283 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-10-09T04:00:00.000Z | 2007-10-11T13:00:00.000Z |
| CVE-2002-1638 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-2153. Reason: This candidate is a duplicate of CVE-2002-2153. Notes: All CVE users should reference CVE-2002-2153 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-03-28T10:00:00.000Z | 2007-10-18T13:00:00.000Z |
| CVE-2002-2135 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1618. Reason: This candidate is a duplicate of CVE-2002-1618. Notes: All CVE users should reference CVE-2002-1618 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-17T02:17:00.000Z | 2007-10-18T13:00:00.000Z |
| CVE-2002-2136 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1590. Reason: This candidate is a duplicate of CVE-2002-1590. Notes: All CVE users should reference CVE-2002-1590 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-17T02:17:00.000Z | 2007-10-18T13:00:00.000Z |
| CVE-2002-2147 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1828. Reason: This candidate is a duplicate of CVE-2002-1828. Notes: All CVE users should reference CVE-2002-1828 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-17T02:17:00.000Z | 2007-10-18T13:00:00.000Z |
| CVE-2002-2151 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1651. Reason: This candidate is a duplicate of CVE-2002-1651. Notes: All CVE users should reference CVE-2002-1651 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-17T02:17:00.000Z | 2007-10-18T13:00:00.000Z |
| CVE-2002-2157 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1660. Reason: This candidate is a duplicate of CVE-2002-1660. Notes: All CVE users should reference CVE-2002-1660 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-17T02:17:00.000Z | 2007-10-18T13:00:00.000Z |
| CVE-2002-2160 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1798. Reason: This candidate is a duplicate of CVE-2002-1798. Notes: All CVE users should reference CVE-2002-1798 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-17T02:17:00.000Z | 2007-10-18T13:00:00.000Z |
| CVE-2002-2194 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2002-1589. Reason: This candidate is a duplicate of CVE-2002-1589. Notes: All CVE users should reference CVE-2002-1589 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-11-17T02:17:00.000Z | 2007-10-18T13:00:00.000Z |
| CVE-2007-5586 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5587. Reason: This candidate is a duplicate of CVE-2007-5587. Notes: All CVE users should reference CVE-2007-5587 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-10-20T01:00:00.000Z | 2007-11-09T15:00:00.000Z |
| CVE-2007-1627 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-4606. Reason: This candidate is a duplicate of CVE-2006-4606. Notes: All CVE users should reference CVE-2006-4606 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-03-24T01:00:00.000Z | 2007-11-15T15:00:00.000Z |
| CVE-2006-7224 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2006-7227, CVE-2005-4872, CVE-2006-7228. Reason: this candidate was SPLIT into other identifiers in order to reflect different affected versions and distinct vendor fixes. Notes: All CVE users should consult CVE-2006-7227, CVE-2005-4872, and CVE-2006-7228 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-11-09T01:00:00.000Z | 2007-11-16T15:00:00.000Z |
| CVE-2007-4721 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6113. Reason: This candidate is a duplicate of CVE-2007-6113. Notes: All CVE users should reference CVE-2007-6113 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-09-05T23:00:00.000Z | 2007-11-28T15:00:00.000Z |
| CVE-2007-5125 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-1171. Reason: This candidate is a duplicate of CVE-2007-1171. Notes: All CVE users should reference CVE-2007-1171 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-09-27T23:00:00.000Z | 2007-11-28T15:00:00.000Z |
| CVE-2007-5908 |
N/A
|
Buffer overflow in the (1) sysfs_show_available_clocksources and (2) sysfs_show_current_clocksources functions in Linux kernel 2.6.23 and earlier might allow local users to cause a denial of service or execute arbitrary code via crafted clock source names. NOTE: follow-on analysis by Linux developers states that "There is no way for unprivileged users (or really even the root user) to add new clocksources. | N/A | N/A | 2007-11-10T00:00:00.000Z | 2007-11-28T15:00:00.000Z |
| CVE-2007-6034 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6062. Reason: This candidate is a duplicate of CVE-2007-6062. Notes: All CVE users should reference CVE-2007-6062 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-11-20T16:00:00.000Z | 2007-11-28T15:00:00.000Z |
| CVE-2007-3595 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-3399. Reason: This candidate is a duplicate of CVE-2007-3399. Notes: All CVE users should reference CVE-2007-3399 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-07-06T22:00:00.000Z | 2007-12-06T15:00:00.000Z |
| CVE-2007-5553 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-4158. Reason: This candidate is a duplicate of CVE-2007-4158. It was based on a vague pre-advisory, so the duplicate was not detected until more details were provided. Notes: All CVE users should reference CVE-2007-4158 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-10-19T00:00:00.000Z | 2007-12-06T15:00:00.000Z |
| CVE-2007-6370 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5583. Reason: This candidate is a duplicate of CVE-2007-5583. Notes: All CVE users should reference CVE-2007-5583 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-12-15T06:00:00.000Z | 2007-12-19T15:00:00.000Z |
| CVE-2007-6590 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-2809. Reason: This candidate is a duplicate of CVE-2008-2809. Notes: All CVE users should reference CVE-2008-2809 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-12-29T02:00:00.000Z | 2008-01-04T15:00:00.000Z |
| CVE-2007-6678 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6167. Reason: This candidate is a duplicate of CVE-2007-6167. Notes: All CVE users should reference CVE-2007-6167 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-01-10T06:00:00.000Z | 2008-01-19T15:00:00.000Z |
| CVE-2007-4576 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-4575. Reason: This candidate is a reservation duplicate of CVE-2007-4575. Notes: All CVE users should reference CVE-2007-4575 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-01-29T06:00:00.000Z | 2008-02-12T15:00:00.000Z |
| CVE-2007-5968 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6313. Reason: this candidate's description and references were inconsistent and described unrelated, non-security issues. The original intended issue is covered by CVE-2007-6313. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-12-11T00:00:00.000Z | 2008-02-26T15:00:00.000Z |
| CVE-2008-0626 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6303. Reason: This candidate is a duplicate of CVE-2007-6303. Notes: All CVE users should reference CVE-2007-6303 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-02-06T20:00:00.000Z | 2008-04-15T09:00:00.000Z |
| CVE-2008-0627 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-6304. Reason: This candidate is a duplicate of CVE-2007-6304. Notes: All CVE users should reference CVE-2007-6304 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-02-06T20:00:00.000Z | 2008-04-15T09:00:00.000Z |
| CVE-2008-1683 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-0887. Reason: This candidate is a duplicate of CVE-2008-0887. Notes: All CVE users should reference CVE-2008-0887 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-04-06T23:00:00.000Z | 2008-04-15T09:00:00.000Z |
| CVE-2007-5317 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-5292. Reason: This candidate is a duplicate of CVE-2007-5292. Notes: All CVE users should reference CVE-2007-5292 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2007-10-10T01:00:00.000Z | 2008-04-18T13:00:00.000Z |
| CVE-2004-1886 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1848. Reason: This candidate is a duplicate of CVE-2004-1848. Notes: All CVE users should reference CVE-2004-1848 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-05-10T08:00:00.000Z | 2008-05-02T13:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2004-0859 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.963 | 2023-11-07T01:56:48.870 |
| fkie_cve-2004-0860 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:01.993 | 2023-11-07T01:56:49.080 |
| fkie_cve-2004-0861 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.010 | 2023-11-07T01:56:49.287 |
| fkie_cve-2004-0868 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0866. Reason: This candid… | 2004-12-23T05:00:00.000 | 2023-11-07T01:56:49.510 |
| fkie_cve-2004-0874 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1123. Reason: This candid… | 2005-01-10T05:00:00.000 | 2023-11-07T01:56:49.570 |
| fkie_cve-2004-0890 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reasons: This candidate is a… | 2005-01-10T05:00:00.000 | 2023-11-07T01:56:49.840 |
| fkie_cve-2004-0910 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0815. Reason: This candid… | 2004-11-03T05:00:00.000 | 2023-11-07T01:56:50.007 |
| fkie_cve-2004-0943 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was w… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:50.467 |
| fkie_cve-2004-0948 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was w… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:50.537 |
| fkie_cve-2004-0954 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0597. Reason: This candid… | 2004-12-23T05:00:00.000 | 2023-11-07T01:56:50.610 |
| fkie_cve-2004-0955 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0599. Reason: This candid… | 2004-12-23T05:00:00.000 | 2023-11-07T01:56:50.650 |
| fkie_cve-2004-0973 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0457. Reason: This candid… | 2004-12-23T05:00:00.000 | 2023-11-07T01:56:50.880 |
| fkie_cve-2004-0995 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.027 | 2023-11-07T01:56:51.080 |
| fkie_cve-2004-1159 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1122, CVE-2004-1314. Reas… | 2005-01-10T05:00:00.000 | 2023-11-07T01:56:52.650 |
| fkie_cve-2004-1238 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:53.340 |
| fkie_cve-2004-1239 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:53.373 |
| fkie_cve-2004-1240 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:53.407 |
| fkie_cve-2004-1241 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:53.443 |
| fkie_cve-2004-1242 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:53.477 |
| fkie_cve-2004-1243 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was i… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:53.503 |
| fkie_cve-2004-1344 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.057 | 2023-11-07T01:56:54.170 |
| fkie_cve-2004-1479 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-0928. Reason: This candid… | 2004-12-31T05:00:00.000 | 2023-11-07T01:56:55.597 |
| fkie_cve-2004-1886 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1848. Reason: This candid… | 2004-03-23T05:00:00.000 | 2023-11-07T01:56:58.833 |
| fkie_cve-2004-2141 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1827. Reason: This candid… | 2004-12-31T05:00:00.000 | 2023-11-07T01:57:01.147 |
| fkie_cve-2004-2285 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-2022. Reason: This candid… | 2004-12-31T05:00:00.000 | 2023-11-07T01:57:02.447 |
| fkie_cve-2004-2404 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-2347. Reason: This candid… | 2004-12-31T05:00:00.000 | 2023-11-07T01:57:03.633 |
| fkie_cve-2004-2770 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-3389. Reason: This candid… | 2011-09-25T10:55:04.737 | 2023-11-07T01:57:07.220 |
| fkie_cve-2004-2772 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:14.193 | 2023-11-07T01:57:07.453 |
| fkie_cve-2004-2773 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:14.253 | 2023-11-07T01:57:07.690 |
| fkie_cve-2004-2774 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:14.347 | 2023-11-07T01:57:07.920 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-8v5f-hp78-jgxq |
|
Signature Verification Bypass in jwt-simple | 2019-06-06T15:30:33Z | 2020-08-31T18:37:26Z |
| ghsa-9w87-4j72-gcv7 |
|
Insecure Default Configuration in graphql-code-generator | 2020-09-02T18:27:54Z | 2020-08-31T18:37:32Z |
| ghsa-xrr6-6ww3-f3qm |
|
Sandbox Breakout / Arbitrary Code Execution in value-censorship | 2020-09-02T21:25:58Z | 2020-08-31T18:39:27Z |
| ghsa-j8qr-rvcv-crhv |
|
Malicious Package in electron-native-notify | 2020-09-11T21:18:05Z | 2020-08-31T18:40:50Z |
| ghsa-4627-w373-375v |
|
Malicious Package in grunt-radical | 2020-09-11T21:22:24Z | 2020-08-31T18:41:06Z |
| ghsa-4x6x-782q-jfc4 |
|
Command Injection in node-wifi | 2020-09-03T02:38:47Z | 2020-08-31T18:41:45Z |
| ghsa-mxmj-84q8-34r7 |
|
Command Injection in expressfs | 2020-09-03T02:39:49Z | 2020-08-31T18:41:47Z |
| ghsa-4q8f-5xxj-946r |
|
Command Injection in addax | 2020-09-03T02:40:51Z | 2020-08-31T18:41:49Z |
| ghsa-crfx-5phg-hmw9 |
|
Cross-Site Scripting in ids-enterprise | 2019-06-13T18:59:12Z | 2020-08-31T18:41:52Z |
| ghsa-49r3-3h96-rwj6 |
|
Cross-Site Scripting in ids-enterprise | 2019-06-13T19:09:31Z | 2020-08-31T18:41:54Z |
| ghsa-hpfq-8wx8-cgqw |
|
Cross-Site Scripting in ids-enterprise | 2019-06-13T18:59:18Z | 2020-08-31T18:41:56Z |
| ghsa-8mgg-5x65-m4m4 |
|
Command Injection in soletta-dev-app | 2020-09-11T21:08:19Z | 2020-08-31T18:41:59Z |
| ghsa-v86x-f47q-f7f4 |
|
Unauthorized File Access in atompm | 2020-09-11T21:09:24Z | 2020-08-31T18:42:01Z |
| ghsa-j6v9-xgvh-f796 |
|
Command Injection in wxchangba | 2020-09-11T21:11:34Z | 2020-08-31T18:42:04Z |
| ghsa-9r3m-mhfm-39cm |
|
Incorrect Calculation in bigint-money | 2020-09-11T21:10:29Z | 2020-08-31T18:42:08Z |
| ghsa-crpm-fm48-chj7 |
|
SQL Injection in resquel | 2020-09-11T21:13:44Z | 2020-08-31T18:42:11Z |
| ghsa-48gc-5j93-5cfq |
|
Path Traversal in serve | 2020-09-11T21:15:54Z | 2020-08-31T18:42:15Z |
| ghsa-45j8-pm75-5v8x |
|
Path Traversal in simplehttpserver | 2019-02-07T18:18:04Z | 2020-08-31T18:42:22Z |
| ghsa-536q-8gxx-m782 |
|
Cross-Site Scripting in dojo | 2019-09-11T23:02:57Z | 2020-08-31T18:42:32Z |
| ghsa-wgw3-gf4p-62xc |
|
Command Injection in wizard-syncronizer | 2020-09-11T21:16:59Z | 2020-08-31T18:42:46Z |
| ghsa-hq8g-qq57-5275 |
|
SQL Injection in untitled-model | 2020-09-11T21:24:33Z | 2020-08-31T18:43:13Z |
| ghsa-cpgr-wmr9-qxv4 |
|
Cross-Site Scripting in serve | 2020-09-11T21:20:14Z | 2020-08-31T18:43:20Z |
| ghsa-5g6j-8hv4-vfgj |
|
Cross-Site Scripting in node-red | 2020-09-11T21:21:19Z | 2020-08-31T18:43:22Z |
| ghsa-3f95-w5h5-fq86 |
|
Prototype Pollution in mergify | 2020-09-11T21:22:24Z | 2020-08-31T18:43:27Z |
| ghsa-g8vp-6hv4-m67c |
|
Command Injection in entitlements | 2020-09-11T21:23:29Z | 2020-08-31T18:43:32Z |
| ghsa-v7cp-5326-54fh |
|
Path Traversal in bruteser | 2020-09-03T16:45:15Z | 2020-08-31T18:43:34Z |
| ghsa-wfhx-6pcm-7m55 |
|
Path Traversal in ponse | 2020-09-03T16:46:22Z | 2020-08-31T18:43:41Z |
| ghsa-v6gv-fg46-h89j |
|
Sensitive Data Exposure in put | 2020-09-03T16:48:36Z | 2020-08-31T18:43:51Z |
| ghsa-qjfh-xc44-rm9x |
|
Path Traversal in file-static-server | 2020-09-03T16:49:43Z | 2020-08-31T18:43:54Z |
| ghsa-gm29-35c7-8cfw |
|
Cross-Site Scripting in buttle | 2019-04-08T15:18:38Z | 2020-08-31T18:43:56Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2020-132 |
|
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLit… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-133 |
|
In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite sav… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-134 |
|
In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in… | tensorflow | 2020-09-25T19:15:00Z | 2020-10-29T16:15:00Z |
| pysec-2020-142 |
|
A mis-handling of invalid unicode characters in the Java implementation of Tink versions … | tink | 2020-10-19T13:15:00Z | 2020-10-29T22:16:00Z |
| pysec-2020-61 |
|
In lookatme (python/pypi package) versions prior to 2.3.0, the package automatically load… | lookatme | 2020-10-26T18:15:00Z | 2020-11-13T16:40:00Z |
| pysec-2020-60 |
|
A stored cross-site scripting (XSS) vulnerability affects the Web UI in Locust before 1.3… | locust | 2020-11-09T21:15:00Z | 2020-11-17T20:37:00Z |
| pysec-2020-159 |
|
In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they p… | alerta-server | 2020-11-06T18:15:00Z | 2020-11-17T21:08:00Z |
| pysec-2020-67 |
|
The cache action in action/cache.py in MoinMoin through 1.9.10 allows directory traversal… | moin | 2020-11-10T17:15:00Z | 2020-11-24T17:20:00Z |
| pysec-2020-18 |
|
The previous default setting for Airflow's Experimental API was to allow all API requests… | apache-airflow | 2020-11-10T16:15:00Z | 2020-11-24T17:29:00Z |
| pysec-2020-157 |
|
Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL. | werkzeug | 2020-11-18T15:15:00Z | 2020-12-01T16:05:00Z |
| pysec-2020-29 |
|
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker … | brotli | 2020-09-15T10:15:00Z | 2020-12-02T12:15:00Z |
| pysec-2020-74 |
|
Multiple cross-site scripting (XSS) vulnerabilities in Papermerge before 1.5.2 allow remo… | papermerge | 2020-12-02T08:15:00Z | 2020-12-02T16:29:00Z |
| pysec-2020-75 |
|
petl before 1.68, in some configurations, allows resolution of entities in an XML document. | petl | 2020-11-26T05:15:00Z | 2020-12-03T16:48:00Z |
| pysec-2020-108 |
|
** DISPUTED ** svm_predict_values in svm.cpp in Libsvm v324, as used in scikit-learn 0.23… | scikit-learn | 2020-11-21T21:15:00Z | 2020-12-03T18:50:00Z |
| pysec-2020-69 |
|
Python oic is a Python OpenID Connect implementation. In Python oic before version 1.2.1,… | oic | 2020-12-02T20:15:00Z | 2020-12-08T02:37:00Z |
| pysec-2020-68 |
|
OAuthenticator is an OAuth login mechanism for JupyterHub. In oauthenticator from version… | oauthenticator | 2020-12-01T21:15:00Z | 2020-12-08T17:50:00Z |
| pysec-2020-163 |
|
A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly v… | ecdsa | 2020-01-02T15:15:00Z | 2020-12-08T18:32:00Z |
| pysec-2020-98 |
|
Red Discord Bot Dashboard is an easy-to-use interactive web dashboard to control your Red… | red-dashboard | 2020-12-09T00:15:00Z | 2020-12-10T20:15:00Z |
| pysec-2020-52 |
|
jupyterhub-systemdspawner enables JupyterHub to spawn single-user notebook servers using … | jupyterhub-systemdspawner | 2020-12-09T17:15:00Z | 2020-12-10T21:46:00Z |
| pysec-2020-141 |
|
In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matchin… | tensorflow | 2020-12-10T23:15:00Z | 2020-12-14T17:42:00Z |
| pysec-2020-300 |
|
In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matchin… | tensorflow-cpu | 2020-12-10T23:15:00Z | 2020-12-14T17:42:00Z |
| pysec-2020-335 |
|
In TensorFlow release candidate versions 2.4.0rc*, the general implementation for matchin… | tensorflow-gpu | 2020-12-10T23:15:00Z | 2020-12-14T17:42:00Z |
| pysec-2020-140 |
|
In affected versions of TensorFlow the tf.raw_ops.DataFormatVecPermute API does not valid… | tensorflow | 2020-12-10T23:15:00Z | 2020-12-14T19:08:00Z |
| pysec-2020-109 |
|
In some conditions, a snap package built by snapcraft includes the current directory in L… | snapcraft | 2020-12-04T03:15:00Z | 2020-12-14T20:36:00Z |
| pysec-2020-20 |
|
In Apache Airflow versions prior to 1.10.13, the Charts and Query View of the old (Flask-… | apache-airflow | 2020-12-14T10:15:00Z | 2020-12-15T15:40:00Z |
| pysec-2020-72 |
|
OpenSlides is a free, Web-based presentation and assembly system for managing and project… | openslides | 2020-12-18T19:15:00Z | 2020-12-22T20:11:00Z |
| pysec-2020-22 |
|
Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with d… | apache-airflow | 2020-12-21T17:15:00Z | 2020-12-22T21:23:00Z |
| pysec-2020-49 |
|
** DISPUTED ** jsonpickle through 1.4.1 allows remote code execution during deserializati… | jsonpickle | 2020-12-17T16:15:00Z | 2020-12-23T15:38:00Z |
| pysec-2020-143 |
|
tlslite-ng is an open source python library that implements SSL and TLS cryptographic pro… | tlslite-ng | 2020-12-21T17:15:00Z | 2020-12-23T16:09:00Z |
| pysec-2020-117 |
|
In Tensorflow before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, the `SparseFillEmpty… | tensorflow | 2020-09-25T19:15:00Z | 2020-12-23T18:33:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2017-1000042 | Mapbox.js versions 1.x prior to 1.6.5 and 2.x prior to 2.1.7 are vulnerable to a cross-si… | 2015-10-24T00:00:00.000Z |
| gsd-2015-7519 | It is possible in some cases, for clients to overwrite headers set by the server, resulti… | 2015-11-23T00:00:00.000Z |
| gsd-2015-9097 | The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is vulnerable to SMTP… | 2015-12-09T00:00:00.000Z |
| gsd-2015-8968 | Git allows executing arbitrary shell commands using git-remote-ext via a remote URLs. Nor… | 2015-12-11T00:00:00.000Z |
| gsd-2015-5312 | Nokogiri version 1.6.7.1 has been released, pulling in several upstream patches to the ve… | 2015-12-15T00:00:00.000Z |
| gsd-2015-8969 | git-fastclone before 1.0.5 passes user modifiable strings directly to a shell command. An… | 2015-12-15T00:00:00.000Z |
| gsd-2015-7541 | The contents of the `image_path`, `colors`, and `depth` variables generated from possibly… | 2016-01-04T00:00:00.000Z |
| gsd-2017-1000043 | Mapbox.js versions 1.x prior to 1.6.6 and 2.x prior to 2.2.4 are vulnerable to a cross-si… | 2016-01-12T00:00:00.000Z |
| gsd-2015-7565 | By default, Ember will escape any values in Handlebars templates that use double curlies … | 2016-01-14T00:00:00.000Z |
| gsd-2015-8314 | Devise version before 3.5.4 uses cookies to implement a "Remember me" functionality. Howe… | 2016-01-18T00:00:00.000Z |
| gsd-2015-7499 | Nokogiri version 1.6.7.2 has been released, pulling in several upstream patches to the ve… | 2016-01-19T00:00:00.000Z |
| gsd-2015-7576 | There is a timing attack vulnerability in the basic authentication support in Action Cont… | 2016-01-25T00:00:00.000Z |
| gsd-2015-7577 | There is a vulnerability in how the nested attributes feature in Active Record handles up… | 2016-01-25T00:00:00.000Z |
| gsd-2015-7578 | There is a possible XSS vulnerability in rails-html-sanitizer. This vulnerability has bee… | 2016-01-25T00:00:00.000Z |
| gsd-2015-7579 | There is a XSS vulnerability in `Rails::Html::FullSanitizer` used by Action View's `strip… | 2016-01-25T00:00:00.000Z |
| gsd-2015-7580 | There is a possible XSS vulnerability in the white list sanitizer in the rails-html-sanit… | 2016-01-25T00:00:00.000Z |
| gsd-2015-7581 | There is an object leak vulnerability for wildcard controllers in Action Pack. This vulne… | 2016-01-25T00:00:00.000Z |
| gsd-2016-0751 | There is a possible object leak which can lead to a denial of service vulnerability in Ac… | 2016-01-25T00:00:00.000Z |
| gsd-2016-0752 | There is a possible directory traversal and information leak vulnerability in Action View… | 2016-01-25T00:00:00.000Z |
| gsd-2016-0753 | There is a possible input validation circumvention vulnerability in Active Model. This vu… | 2016-01-25T00:00:00.000Z |
| gsd-2016-2097 | There is a possible directory traversal and information leak vulnerability in Action Vie… | 2016-02-29T00:00:00.000Z |
| gsd-2016-2098 | There is a possible remote code execution vulnerability in Action Pack. This vulnerabilit… | 2016-02-29T00:00:00.000Z |
| gsd-2016-3098 | "`Administrate::ApplicationController` actions didn't have CSRF protection. Remote attack… | 2016-04-01T00:00:00.000Z |
| gsd-2016-10193 | espeak-ruby passes user modifiable strings directly to a shell command. An attacker can e… | 2016-04-13T00:00:00.000Z |
| gsd-2016-3693 | Safemode is initialised with an optional 'delegate' object. If the delegated object is a … | 2016-04-20T00:00:00.000Z |
| gsd-2016-10194 | festivaltts4r passes user modifiable strings directly to a shell command. An attacker can… | 2016-04-23T00:00:00.000Z |
| gsd-2016-4442 | Carefully crafted requests can expose information about strings and objects allocated dur… | 2016-05-18T00:00:00.000Z |
| gsd-2015-8806 | Nokogiri is affected by series of vulnerabilities in libxml2 and libxslt, which are libra… | 2016-06-07T00:00:00.000Z |
| gsd-2016-5697 | ruby-saml prior to version 1.3.0 is vulnerable to an XML signature wrapping attack in the… | 2016-06-24T00:00:00.000Z |
| gsd-2016-10735 | In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the da… | 2016-07-27T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-2027 | Malicious code in colourize (npm) | 2022-05-31T13:35:15Z | 2022-05-31T13:35:15Z |
| mal-2022-5116 | Malicious code in orangeonion.buildtools (npm) | 2022-05-31T13:36:23Z | 2022-05-31T13:36:23Z |
| mal-2022-6136 | Malicious code in sixt (npm) | 2022-05-31T13:36:23Z | 2022-05-31T13:36:23Z |
| mal-2022-3067 | Malicious code in flake8-holvi (npm) | 2022-05-31T13:36:23Z | 2022-05-31T13:36:24Z |
| mal-2022-3657 | Malicious code in holvipartners (npm) | 2022-05-31T13:36:23Z | 2022-05-31T13:36:24Z |
| mal-2022-4434 | Malicious code in lyft-avidl (npm) | 2022-05-31T13:36:23Z | 2022-05-31T13:36:24Z |
| mal-2022-4511 | Malicious code in mb-blog (npm) | 2022-05-31T13:36:23Z | 2022-05-31T13:36:24Z |
| mal-2022-6330 | Malicious code in stripe-connect-rocketrides (npm) | 2022-05-31T13:36:23Z | 2022-05-31T13:36:24Z |
| mal-2022-4944 | Malicious code in npm_ransomware (npm) | 2022-05-31T13:36:55Z | 2022-05-31T13:36:55Z |
| mal-2022-5816 | Malicious code in rkdvil (npm) | 2022-05-31T13:37:28Z | 2022-05-31T13:37:29Z |
| mal-2022-5817 | Malicious code in rkpacktest (npm) | 2022-05-31T13:37:28Z | 2022-05-31T13:37:29Z |
| mal-2022-5642 | Malicious code in react-dom-router-compatibility (npm) | 2022-05-31T13:37:44Z | 2022-05-31T13:37:44Z |
| mal-2022-5643 | Malicious code in react-dom-router-old (npm) | 2022-05-31T13:37:43Z | 2022-05-31T13:37:44Z |
| mal-2022-367 | Malicious code in @iwcp/nebula-ui (npm) | 2022-05-31T13:38:50Z | 2022-05-31T13:38:51Z |
| mal-2022-3280 | Malicious code in gatsby-plugin-conecad (npm) | 2022-05-31T13:41:09Z | 2022-05-31T13:41:09Z |
| mal-2022-7433 | Malicious code in equests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7434 | Malicious code in reequests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7435 | Malicious code in reqquests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7436 | Malicious code in requeests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7437 | Malicious code in requess (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7438 | Malicious code in requessts (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7439 | Malicious code in requestts (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7440 | Malicious code in requuests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7441 | Malicious code in reuests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-7442 | Malicious code in rrequests (PyPI) | 2022-05-31T00:00:00Z | 2022-05-31T20:12:58Z |
| mal-2022-6388 | Malicious code in sync-colors (npm) | 2022-06-01T09:02:23Z | 2022-06-01T09:02:24Z |
| mal-2022-2018 | Malicious code in colors-support (npm) | 2022-06-01T09:02:24Z | 2022-06-01T09:02:25Z |
| mal-2022-6360 | Malicious code in support-colors (npm) | 2022-06-01T09:02:23Z | 2022-06-01T09:02:29Z |
| mal-2022-6587 | Malicious code in titles (npm) | 2022-06-01T09:02:23Z | 2022-06-01T09:02:29Z |
| mal-2022-3549 | Malicious code in hach-package-manager-bounty-hunter (npm) | 2022-06-01T09:02:55Z | 2022-06-01T09:02:56Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitea-2021-45325 | 2024-03-06T10:54:55.605Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2021-45326 | 2024-03-06T10:54:46.071Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2021-45327 | 2024-03-06T10:54:36.193Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2021-45328 | 2024-03-06T10:54:25.099Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2021-45329 | 2024-03-06T10:54:13.704Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2021-45330 | 2024-03-06T10:54:05.371Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2021-45331 | 2024-03-06T10:53:52.704Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2022-27313 | 2024-03-06T10:53:12.361Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2022-30781 | 2024-03-06T10:52:59.101Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2022-38183 | 2024-03-06T10:52:48.810Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2022-38795 | 2024-03-06T10:52:39.003Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2022-42968 | 2024-03-06T10:52:28.405Z | 2025-04-03T14:40:37.652Z | |
| bit-gitea-2022-46685 | 2024-03-06T10:52:18.708Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10073 | 2024-03-06T11:24:11.903Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10074 | 2024-03-06T11:24:10.672Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10075 | 2024-03-06T11:24:09.488Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10076 | 2024-03-06T11:24:08.301Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10077 | 2024-03-06T11:24:07.050Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10078 | 2024-03-06T11:24:05.803Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10079 | 2024-03-06T11:24:04.533Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10080 | 2024-03-06T11:24:03.257Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10081 | 2024-03-06T11:24:02.000Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10082 | 2024-03-06T11:24:00.768Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10083 | 2024-03-06T11:23:59.550Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10084 | 2024-03-06T11:23:58.320Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10085 | 2024-03-06T11:23:57.115Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10086 | 2024-03-06T11:23:55.896Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10087 | 2024-03-06T11:23:54.648Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10088 | 2024-03-06T11:23:53.420Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10089 | 2024-03-06T11:23:52.161Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-my73913 | Security fixes for GHSA-r6j8-c6r2-37rr applied in versions: 4.12.1-r0 | 2026-02-03T16:02:28.659120Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-nb26505 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 4.5.1-r0 | 2026-02-03T16:02:27.744077Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-xr99875 | Security fixes for GHSA-389x-839f-4rhx, GHSA-3p8m-j85q-pgmj, GHSA-5jpm-x58v-624v, GHSA-84h7-rjj3-6jx4, GHSA-fghv-69vj-qj49, GHSA-jq43-27x9-3v86, GHSA-qqpg-mvqg-649v applied in versions: 0.1.109-r0, 0.1.113-r1 | 2026-02-03T16:02:30.597873Z | 2026-02-03T11:13:56Z |
| cleanstart-2026-wx01708 | vulnerability in the OLE2 file format parser of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device | 2026-02-06T01:10:02.024980Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-xe32069 | Buffer Overflow vulnerability in Ffmpeg before github commit 4565747056a11356210ed8edcecb920105e40b60 allows a remote attacker to achieve an out-of-array write, execute arbitrary code, and cause a ... | 2026-02-06T01:10:32.733224Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-zm20570 | Moby is an open-source project created by Docker for software containerization | 2026-02-06T00:54:29.621254Z | 2026-02-03T13:35:45Z |
| cleanstart-2026-bz58799 | Within HostnameError | 2026-02-06T00:39:29.590361Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-jn44153 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-gx3x-vq4p-mhhv, GHSA-j5w8-q4qc-rx2x applied in versions: 1.18.0-r0, 1.19.0-r1 | 2026-02-06T00:39:29.662228Z | 2026-02-05T12:20:16Z |
| cleanstart-2026-gp14462 | Security fixes for GHSA-vvgc-356p-c3xw applied in versions: 0.18.0-r0 | 2026-02-10T00:39:23.397354Z | 2026-02-09T12:51:17Z |
| cleanstart-2026-tj33788 | Within HostnameError | 2026-02-10T00:39:24.476012Z | 2026-02-09T12:51:17Z |
| cleanstart-2026-by71381 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-11T00:41:59.117560Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-cv28298 | SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption | 2026-02-11T00:41:59.034081Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-im73098 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-11T00:40:59.052841Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-ls08172 | Within HostnameError | 2026-02-11T00:41:59.030674Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-xb34574 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-11T00:40:59.223419Z | 2026-02-10T22:11:02Z |
| cleanstart-2026-ca79883 | Security fixes for GHSA-6v2p-p943-phr9, GHSA-c6gw-w398-hv78, GHSA-f6x5-jh6r-wrfv, GHSA-hcg3-p754-cr77, GHSA-j5w8-q4qc-rx2x, GHSA-qxp5-gw88-xv66, GHSA-v778-237x-gjrc, GHSA-vvgc-356p-c3xw applied in versions: 1.15.0-r1 | 2026-02-13T00:40:14.901695Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-fi29887 | During the TLS 1 | 2026-02-13T00:39:44.225771Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-gv85693 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-13T00:40:14.240914Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-jb30245 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 0.47.2-r0 | 2026-02-13T00:39:45.274258Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-mh09144 | issue was discovered in libexpat before 2 | 2026-02-13T00:45:17.459930Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-tr92727 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-13T00:41:14.875956Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-wv76464 | libexpat in Expat before 2 | 2026-02-13T00:43:45.311968Z | 2026-02-12T13:07:54Z |
| cleanstart-2026-kk07808 | issue has been found in third-party PNM decoding associated with libpng 1 | 2026-02-14T00:37:45.311656Z | 2026-02-13T12:28:27Z |
| cleanstart-2026-gg58376 | Within HostnameError | 2026-02-17T00:41:15.939977Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-jr03360 | Within HostnameError | 2026-02-17T00:39:45.300172Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-uh39784 | SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process | 2026-02-17T00:40:45.017480Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-vg57433 | Within HostnameError | 2026-02-17T00:39:45.599344Z | 2026-02-16T09:23:22Z |
| cleanstart-2026-dt95939 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-18T00:37:41.674179Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-lr19699 | Within HostnameError | 2026-02-18T00:37:41.636616Z | 2026-02-17T14:16:07Z |
| cleanstart-2026-zt77083 | When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers | 2026-02-18T00:40:43.959662Z | 2026-02-17T14:16:07Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2019-013 | 2019-02-06T17:36:06.000Z | 2023-08-11T19:22:41.000Z | |
| drupal-contrib-2019-014 | 2019-02-06T18:13:19.000Z | 2023-08-11T19:23:01.000Z | |
| drupal-contrib-2019-004 | 2019-01-23T17:01:58.000Z | 2023-08-11T19:25:48.000Z | |
| drupal-contrib-2018-078 | 2018-12-05T19:24:02.000Z | 2023-08-11T21:09:51.000Z | |
| drupal-contrib-2018-081 | 2018-12-19T17:53:49.000Z | 2023-08-11T21:10:49.000Z | |
| drupal-contrib-2018-071 | 2018-10-31T14:59:17.000Z | 2023-08-11T21:13:17.000Z | |
| drupal-contrib-2018-073 | 2018-10-31T17:53:57.000Z | 2023-08-11T21:14:25.000Z | |
| drupal-contrib-2018-074 | 2018-11-28T17:32:56.000Z | 2023-08-11T21:15:17.000Z | |
| drupal-contrib-2018-059 | 2018-09-05T17:22:50.000Z | 2023-08-11T21:18:37.000Z | |
| drupal-contrib-2018-067 | 2018-10-17T16:29:08.000Z | 2023-08-11T21:21:48.000Z | |
| drupal-contrib-2018-055 | 2018-08-08T17:14:32.000Z | 2023-08-11T21:24:54.000Z | |
| drupal-contrib-2018-057 | 2018-08-29T16:26:33.000Z | 2023-08-11T21:25:35.000Z | |
| drupal-contrib-2018-038 | 2018-06-06T12:58:31.000Z | 2023-08-11T21:28:55.000Z | |
| drupal-contrib-2018-039 | 2018-06-06T13:01:46.000Z | 2023-08-11T21:29:11.000Z | |
| drupal-contrib-2018-040 | 2018-06-06T13:05:27.000Z | 2023-08-11T21:31:17.000Z | |
| drupal-contrib-2018-018 | 2018-04-18T15:45:18.000Z | 2023-08-11T21:35:30.000Z | |
| drupal-contrib-2018-022 | 2018-04-25T17:37:20.000Z | 2023-08-11T21:38:26.000Z | |
| drupal-contrib-2018-021 | 2018-04-25T17:43:28.000Z | 2023-08-11T21:38:48.000Z | |
| drupal-contrib-2018-025 | 2018-05-09T14:16:32.000Z | 2023-08-11T21:39:24.000Z | |
| drupal-contrib-2018-027 | 2018-05-09T20:28:16.000Z | 2023-08-11T21:40:01.000Z | |
| drupal-contrib-2018-008 | 2018-02-07T18:45:12.000Z | 2023-08-11T21:41:56.000Z | |
| drupal-contrib-2018-014 | 2018-02-21T19:04:59.000Z | 2023-08-11T21:43:18.000Z | |
| drupal-contrib-2018-015 | 2018-02-21T20:12:22.000Z | 2023-08-11T21:43:40.000Z | |
| drupal-contrib-2018-016 | 2018-03-21T16:59:32.000Z | 2023-08-11T21:44:04.000Z | |
| drupal-contrib-2018-017 | 2018-03-21T17:05:41.000Z | 2023-08-11T21:44:22.000Z | |
| drupal-contrib-2018-001 | 2018-01-10T17:57:53.000Z | 2023-08-11T21:45:33.000Z | |
| drupal-contrib-2018-002 | 2018-01-10T18:02:19.000Z | 2023-08-11T21:46:04.000Z | |
| drupal-contrib-2017-091 | 2017-12-06T18:44:03.000Z | 2023-08-21T13:26:56.000Z | |
| drupal-contrib-2017-094 | 2017-12-20T14:12:47.000Z | 2023-08-21T13:28:00.000Z | |
| drupal-contrib-2017-082 | 2017-11-08T17:16:30.000Z | 2023-08-21T13:31:01.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2007-000087 | CGI RESCUE WebFORM missing mail content vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000088 | Shopping Basket Professional vulnerable to OS command injection | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000090 | b2evolution cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000091 | Sleipnir RSS bar vulnerable in handling RSS data in an inappropriate security zone | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000093 | Sleipnir RSS bar vulnerable in handling RSS data in an inappropriate security zone | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000094 | MODx cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000127 | CCC Cleaner buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000134 | Sage vulnerable to arbitrary script execution | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000135 | CCC Cleaner buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000159 | Adobe JRun cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000160 | ColdFusion cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000161 | ColdFusion error page cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000165 | Ariel AirOne series cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000176 | Mozilla Firefox cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000199 | CCC Cleaner division-by-zero vulnerability when scanning UPX-packed executables | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000200 | Trac cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000215 | FENCE-Pro and Systemwalker Desktop Encryption self-decoding file vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000218 | Interstage Application Server cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000225 | NewsGlue and Ikinari Jijyoutsuu arbitrary script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000227 | CruiseWorks and Minna De Office vulnerable in access restrictions | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000228 | MailDwarf cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000229 | MailDwarf vulnerability allows unauthorized sending of emails | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000236 | Overlay Weaver cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000259 | open-gorotto cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000260 | Shihonkanri Plus Ver2 GOOUT directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000290 | InfoBarrier4 self-decrypted file vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000301 | Canon Network Camera Server VB100 Series vulnerable to cross-site scripting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000322 | Lunascape RSS reader arbitrary script execution vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000395 | Homepage Builder sample CGI programs vulnerable to OS command injection | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000400 | Advance-Flow cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00088 | Linux Kernel 'keys/gc.c'本地内存破坏漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00089 | Apache Traffic Server 'HttpTransact.cc'拒绝服务漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00090 | EMC Documentum Web Development Kit (WDK)存在未明漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00091 | EMC Documentum Web Development Kit (WDK)存在未明框架注入漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00092 | EMC Documentum Web Development Kit (WDK)存在多个跨站脚本漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00093 | EMC Documentum Web Development Kit (WDK)URL重定向漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00094 | EMC Documentum Web Development Kit (WDK)跨站请求伪造漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00095 | AdaptCMS任意文件上传漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00096 | AdaptCMS 'Referer' Header Field HTTP开放重定向漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00097 | AdaptCMS存在多个HTML注入漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00098 | HumHub SQL注入漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00099 | Apache POI拒绝服务漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00100 | Apache Solr跨站脚本漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00101 | McAfee ePolicy Orchestrator 'conditionXML'参数XML外部实体注入漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00102 | Xen拒绝服务漏洞(CNVD-2015-00102) | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00103 | FlexPaper 'FlexPaperViewer.swf'跨站脚本漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00104 | FlexPaper ‘FlexPaperViewer.swf'’内容欺骗漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00105 | Sefrengo CMS 'main.php'存在多个SQL注入漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00106 | Sefrengo CMS 'main.php'跨站脚本漏洞 | 2015-01-07 | 2015-01-08 |
| cnvd-2015-00144 | e107 ' e107_admin/users.php'跨站请求伪造漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00145 | Hex-Rays IDA Pro缓冲区溢出漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00146 | Ruby RedCloth library跨站脚本漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00147 | Easy File Sharing Web Server跨站脚本漏洞(CNVD-2015-00147) | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00148 | Microsoft Dynamics CRM跨站脚本漏洞 | 2015-01-07 | 2015-01-09 |
| cnvd-2015-00150 | gcab 'gcab-folder.c'本地目录遍历漏洞 | 2015-01-06 | 2015-01-09 |
| cnvd-2015-00151 | SAP NetWeaver Business Client存在多个跨站脚本漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00152 | ZOHO ManageEngine ADSelfService Plus跨站脚本漏洞(CNVD-2015-00152) | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00153 | CGManager本地信息泄露漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00154 | Strongswan IKEv2 Payloads远程拒绝服务漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00155 | D-Bus本地权限提升漏洞 | 2015-01-08 | 2015-01-09 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2014-00329 | Уязвимость микропрограммного обеспечения маршрутизатора D–Link DSR–500, позволяющая злоум… | 07.07.2016 | 28.11.2016 |
| bdu:2014-00331 | Уязвимость браузера Google Chrome, позволяющая злоумышленнику выполнить произвольный код … | 05.07.2016 | 28.11.2016 |
| bdu:2014-00334 | Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслужи… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00335 | Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслужи… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00336 | Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслужи… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00337 | Уязвимость операционной системы Windows, позволяющая злоумышленнику вызвать отказ в обслу… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00338 | Уязвимость системы управления базами данных MySQL, позволяющая злоумышленнику вызвать отк… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00339 | Уязвимость системы управления базами данных Marida DB, позволяющая злоумышленнику вызвать… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00340 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00341 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00342 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00343 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00344 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00345 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00346 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00347 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00348 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00349 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00350 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00351 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00352 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00353 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00354 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00355 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00356 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00357 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00358 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00359 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00360 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00361 | Уязвимость системы управления базами данных MySQL, позволяющая удаленным пользователям, п… | 05.07.2016 | 28.11.2016 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2001-avi-097 | Vulnérabilités de SSH sur CISCO | 2001-09-21T00:00:00.000000 | 2001-09-21T00:00:00.000000 |
| certa-2001-avi-098 | Vulnérabilités dans le logiciel Interscan eManager de Trend Micro | 2001-09-24T00:00:00.000000 | 2001-09-24T00:00:00.000000 |
| certa-2001-avi-099 | Vulnérabilité dans ArcServe pour Windows NT | 2001-09-25T00:00:00.000000 | 2001-09-25T00:00:00.000000 |
| certa-2001-avi-100 | Vulnérabilité de Microsoft Exchange 2000 Server Outlook Web Access | 2001-09-27T00:00:00.000000 | 2001-09-27T00:00:00.000000 |
| certa-2001-avi-101 | Vulnérabilité dans le paquetage setserial | 2001-09-27T00:00:00.000000 | 2001-09-27T00:00:00.000000 |
| certa-2001-avi-102 | Vulnérabilité dans le garde-barrière PIX de Cisco | 2001-09-28T00:00:00.000000 | 2001-09-28T00:00:00.000000 |
| certa-2001-avi-103 | Vulnérabilité dans le proxy Squid | 2001-09-28T00:00:00.000000 | 2001-09-28T00:00:00.000000 |
| certa-2001-avi-105 | Vulnérabilité dans les agents de supervision Compaq | 2001-10-01T00:00:00.000000 | 2001-10-01T00:00:00.000000 |
| certa-2001-avi-106 | Multiples vulnérabilités dans Sendmail | 2001-10-02T00:00:00.000000 | 2001-10-02T00:00:00.000000 |
| certa-2001-avi-108 | Vulnérabilité dans le garde-barrière PIX de Cisco | 2001-10-04T00:00:00.000000 | 2001-10-04T00:00:00.000000 |
| certa-2001-avi-109 | Vulnérabilité dans <TT>rpcbind</TT> sous HP | 2001-10-04T00:00:00.000000 | 2001-10-04T00:00:00.000000 |
| certa-2001-avi-110 | Vulnérabilité de Network Node Manager sous HP Openview | 2001-10-04T00:00:00.000000 | 2001-10-04T00:00:00.000000 |
| certa-2001-avi-111 | Vulnérabilité dans les logiciels Excel et PowerPoint de Microsoft | 2001-10-05T00:00:00.000000 | 2001-10-05T00:00:00.000000 |
| certa-2001-avi-112 | Vulnérabilité de yppasswd | 2001-10-08T00:00:00.000000 | 2001-10-08T00:00:00.000000 |
| certa-2001-avi-113 | Vulnérabilité dans PhpNuke | 2001-10-08T00:00:00.000000 | 2001-10-08T00:00:00.000000 |
| certa-2001-avi-114 | Vulnérabilité dans le moteur d'indexation ht://Dig | 2001-10-12T00:00:00.000000 | 2001-10-12T00:00:00.000000 |
| certa-2001-avi-117 | Vulnérabilité de Norton Antivirus LiveUpdate | 2001-10-18T00:00:00.000000 | 2001-10-18T00:00:00.000000 |
| certa-2001-avi-104 | Vulnérabilités multiples dans l'implémentation OpenSSH du protocole SSH v2 | 2001-09-28T00:00:00.000000 | 2001-10-19T00:00:00.000000 |
| certa-2001-avi-115 | Faille de sécurité dans Zope | 2001-10-12T00:00:00.000000 | 2001-10-19T00:00:00.000000 |
| certa-2001-avi-119 | Vulnérabilité de l'interface Web du serveur Novell GroupWise | 2001-10-19T00:00:00.000000 | 2001-10-19T00:00:00.000000 |
| certa-2001-avi-120 | Vulnérabilité dans Xlock sous Solaris | 2001-10-19T00:00:00.000000 | 2001-10-19T00:00:00.000000 |
| certa-2001-avi-121 | Vulnérabilité des Cisco IOS et CatOS sous le protocole CDP | 2001-10-19T00:00:00.000000 | 2001-10-19T00:00:00.000000 |
| certa-2001-avi-122 | Déni de service sur Citrix MetaFrame | 2001-10-19T00:00:00.000000 | 2001-10-19T00:00:00.000000 |
| certa-2001-avi-123 | Vulnérabilités dans procmail | 2001-10-22T00:00:00.000000 | 2001-10-22T00:00:00.000000 |
| certa-2001-avi-116 | Vulnérabilité de Microsoft Internet Explorer | 2001-10-16T00:00:00.000000 | 2001-10-23T00:00:00.000000 |
| certa-2001-avi-125 | Débordement de mémoire de Oracle 9iAS Web Cache | 2001-10-24T00:00:00.000000 | 2001-10-24T00:00:00.000000 |
| certa-2001-avi-126 | Vulnérabilité dans le protocole RDP sous Windows 2000 et NT Server | 2001-10-24T00:00:00.000000 | 2001-10-24T00:00:00.000000 |
| certa-2001-avi-127 | Vulnérabilité sous Mac OS X | 2001-10-24T00:00:00.000000 | 2001-10-24T00:00:00.000000 |
| certa-2001-avi-128 | Vulnérabilité d'Internet Explorer 5.1 sous Mac OS X | 2001-10-26T00:00:00.000000 | 2001-10-26T00:00:00.000000 |
| certa-2001-avi-129 | Vulnérabilité dans la machine virtuelle java (JRE) de SUN. | 2001-10-26T00:00:00.000000 | 2001-10-26T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2012-ale-010 | Vulnérabilité dans Internet Explorer | 2012-12-31T00:00:00.000000 | 2013-01-15T00:00:00.000000 |
| certa-2013-ale-001 | Vulnérabilités dans Oracle Java | 2013-01-10T00:00:00.000000 | 2013-01-15T00:00:00.000000 |
| certa-2009-ale-014 | Multiples vulnérabilités du client de messagerie Mozilla Thunderbird | 2009-08-07T00:00:00.000000 | 2013-02-05T00:00:00.000000 |
| certa-2012-ale-001 | Vulnérabilité dans Cisco IronPort | 2012-02-01T00:00:00.000000 | 2013-02-05T00:00:00.000000 |
| certa-2007-ale-011 | Vulnérabilité du composant d'indexation des serveurs Microsoft IIS | 2007-06-06T00:00:00.000000 | 2013-02-19T00:00:00.000000 |
| certa-2009-ale-017 | Vulnérabilités dans l'implémentation TCP/IP de divers produits | 2009-09-09T00:00:00.000000 | 2013-02-19T00:00:00.000000 |
| certa-2008-ale-013 | Vulnérabilité du service sadmind de Sun Solaris | 2008-10-17T00:00:00.000000 | 2013-02-21T00:00:00.000000 |
| certa-2013-ale-002 | Vulnérabilités dans Adobe Reader et Acrobat | 2013-02-14T00:00:00.000000 | 2013-02-21T00:00:00.000000 |
| certa-2013-ale-003 | Vulnérabilité dans Microsoft Internet Explorer 8 | 2013-05-06T00:00:00.000000 | 2013-05-15T00:00:00.000000 |
| certa-2013-ale-004 | Vulnérabilité dans Adobe ColdFusion | 2013-05-10T00:00:00.000000 | 2013-05-15T00:00:00.000000 |
| certa-2013-ale-005 | Vulnérabilité dans le noyau Linux | 2013-05-14T00:00:00.000000 | 2013-05-24T00:00:00.000000 |
| certa-2005-ale-013 | Vulnérabilité dans Citrix Metaframe Presentation | 2005-10-07T00:00:00.000000 | 2013-06-06T00:00:00.000000 |
| certa-2013-ale-006 | Vulnérabilité dans Microsoft Internet Explorer | 2013-09-18T00:00:00.000000 | 2013-10-09T00:00:00.000000 |
| certa-2013-ale-007 | Vulnérabilité dans un composant graphique de Microsoft | 2013-11-06T00:00:00.000000 | 2013-12-10T00:00:00.000000 |
| certa-2013-ale-008 | Vulnérabilité critique dans le noyau de Microsoft Windows | 2013-11-28T00:00:00.000000 | 2014-01-16T00:00:00.000000 |
| certfr-2014-ale-001 | Vulnérabilité dans Microsoft Internet Explorer | 2014-02-21T00:00:00.000000 | 2014-03-12T00:00:00.000000 |
| certfr-2014-ale-002 | Vulnérabilité dans Microsoft Word | 2014-03-25T00:00:00.000000 | 2014-04-09T00:00:00.000000 |
| certfr-2014-ale-004 | Vulnérabilité dans Apache Struts | 2014-04-25T00:00:00.000000 | 2014-04-29T00:00:00.000000 |
| certfr-2014-ale-005 | Vulnérabilité dans Microsoft Internet Explorer | 2014-04-28T00:00:00.000000 | 2014-05-02T00:00:00.000000 |
| certfr-2014-ale-003 | Vulnérabilité dans OpenSSL | 2014-04-08T00:00:00.000000 | 2014-07-30T00:00:00.000000 |
| certfr-2014-ale-006 | Vulnérabilité dans GNU bash | 2014-09-25T00:00:00.000000 | 2014-09-30T00:00:00.000000 |
| certfr-2014-ale-007 | Vulnérabilité dans SSLv3 | 2014-10-15T00:00:00.000000 | 2014-10-15T00:00:00.000000 |
| certfr-2014-ale-009 | Vulnérabilité dans Microsoft OLE | 2014-10-22T00:00:00.000000 | 2014-11-12T00:00:00.000000 |
| certfr-2014-ale-008 | Vulnérabilité dans Drupal | 2014-10-16T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-010 | Vulnérabilité de l'implémentation des protocoles SSL/TLS dans Microsoft Windows | 2014-11-11T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2014-ale-011 | Vulnérabilité de l'implémentation Kerberos dans Microsoft Windows | 2014-11-18T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2015-ale-001 | Vulnérabilité dans Adobe Flash Player | 2015-01-22T00:00:00.000000 | 2015-01-30T00:00:00.000000 |
| certfr-2015-ale-002 | Vulnérabilité dans Adobe Flash Player | 2015-02-02T00:00:00.000000 | 2015-02-05T00:00:00.000000 |
| certfr-2015-ale-004 | Vulnérabilité dans Microsoft Internet Explorer | 2015-02-10T00:00:00.000000 | 2015-03-31T00:00:00.000000 |
| certfr-2015-ale-003 | Nouvelle campagne d'hameçonnage de type rançongiciel | 2015-02-05T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-373 | UNKNOWN READ in url_decode | 2020-07-01T00:00:05.814415Z | 2022-04-13T03:04:31.715630Z |
| osv-2020-406 | Global-buffer-overflow in lwan_strbuf_append_str | 2020-07-01T00:00:07.709109Z | 2022-04-13T03:04:31.720558Z |
| osv-2020-410 | Global-buffer-overflow in lex_multiline_string | 2020-07-01T00:00:07.995615Z | 2022-04-13T03:04:31.725276Z |
| osv-2020-665 | Global-buffer-overflow in backup | 2020-07-01T00:00:23.491385Z | 2022-04-13T03:04:31.729939Z |
| osv-2020-668 | Heap-buffer-overflow in post_process_template | 2020-07-01T00:00:23.600853Z | 2022-04-13T03:04:31.734774Z |
| osv-2020-337 | Global-buffer-overflow in lex_multiline_string | 2020-07-01T00:00:03.807910Z | 2022-04-13T03:04:31.739773Z |
| osv-2020-335 | Global-buffer-overflow in template_fuzzer.cc | 2020-07-01T00:00:03.741355Z | 2022-04-13T03:04:31.744454Z |
| osv-2020-685 | Global-buffer-overflow in backup | 2020-07-01T00:00:24.689135Z | 2022-04-13T03:04:31.749086Z |
| osv-2020-431 | Global-buffer-overflow in parse_headers | 2020-07-01T00:00:09.131195Z | 2022-04-13T03:04:31.753751Z |
| osv-2020-462 | Global-buffer-overflow in strsep_char | 2020-07-01T00:00:10.876736Z | 2022-04-13T03:04:31.758468Z |
| osv-2020-632 | Global-buffer-overflow in parse_http_request | 2020-07-01T00:00:21.523430Z | 2022-04-13T03:04:31.763179Z |
| osv-2020-504 | Global-buffer-overflow in lwan_parse_rfc_time | 2020-07-01T00:00:13.515175Z | 2022-04-13T03:04:31.767885Z |
| osv-2020-1165 | Global-buffer-overflow in parse_headers | 2020-07-22T21:49:52.512552Z | 2022-04-13T03:04:31.772806Z |
| osv-2021-559 | Uncaught exception in java.base/java.nio.CharBuffer.wrap | 2021-03-25T00:01:07.913753Z | 2022-04-13T03:04:31.778313Z |
| osv-2021-558 | Uncaught exception in java.base/java.nio.Buffer.<init> | 2021-03-25T00:01:05.933424Z | 2022-04-13T03:04:31.784176Z |
| osv-2021-564 | Uncaught exception in com.fasterxml.jackson.databind.deser.std.BaseNodeDeserializer.deserializeArray | 2021-03-27T00:00:03.319694Z | 2022-04-13T03:04:31.790105Z |
| osv-2021-556 | Uncaught exception in java.base/java.util.Arrays.copyOf | 2021-03-25T00:01:02.373925Z | 2022-04-13T03:04:31.796152Z |
| osv-2021-555 | Uncaught exception in java.base/java.util.concurrent.ConcurrentHashMap.putVal | 2021-03-25T00:00:09.158172Z | 2022-04-13T03:04:31.802020Z |
| osv-2020-204 | Negative-size-param in parquet::ColumnReaderImplBase<parquet::PhysicalType< | 2020-06-24T01:51:18.827983Z | 2022-04-13T03:04:31.807491Z |
| osv-2020-761 | Heap-buffer-overflow in arrow::ConcatenateBuffers | 2020-07-09T00:00:21.470735Z | 2022-04-13T03:04:31.812566Z |
| osv-2020-1050 | UNKNOWN READ in arrow::Status arrow::internal::ValidateArrayVisitor::ValidateListArray<arrow::La | 2020-07-22T21:49:43.248577Z | 2022-04-13T03:04:31.817970Z |
| osv-2020-27 | Heap-buffer-overflow in parquet::LevelDecoder::SetData | 2020-06-24T01:51:10.819423Z | 2022-04-13T03:04:31.823547Z |
| osv-2020-22 | Container-overflow in parquet::schema::Unflatten | 2020-06-24T01:51:10.604817Z | 2022-04-13T03:04:31.828829Z |
| osv-2020-138 | Heap-buffer-overflow in org::apache::arrow::flatbuf::Message::Verify | 2020-06-24T01:51:15.842848Z | 2022-04-13T03:04:31.834108Z |
| osv-2020-1117 | Heap-buffer-overflow in arrow::internal::CountSetBits | 2020-07-22T21:49:48.392014Z | 2022-04-13T03:04:31.839619Z |
| osv-2020-1159 | Segv on unknown address in arrow::ipc::ReadMessage | 2020-07-22T21:49:52.147608Z | 2022-04-13T03:04:31.845158Z |
| osv-2020-104 | Heap-buffer-overflow in void arrow::util::internal::ByteStreamSlitDecodeSSE2<double> | 2020-06-24T01:51:14.239845Z | 2022-04-13T03:04:31.850595Z |
| osv-2020-974 | Heap-buffer-overflow in arrow::Status arrow::VisitArrayInline<arrow::internal::ValidateArrayDataVisitor> | 2020-07-22T21:49:37.181080Z | 2022-04-13T03:04:31.856092Z |
| osv-2020-1682 | Heap-buffer-overflow in void arrow::internal::TransferBitmap< | 2020-09-01T00:00:34.917477Z | 2022-04-13T03:04:31.861612Z |
| osv-2020-5 | Heap-buffer-overflow in virtual thunk to parquet::ByteStreamSplitDecoder<parquet::PhysicalType< | 2020-06-24T01:51:09.174614Z | 2022-04-13T03:04:31.866912Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2019-0017 | Panic during initialization of Lazy<T> might trigger undefined behavior | 2019-09-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0018 | Internally mutating methods take immutable ref self | 2019-09-02T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0019 | HMAC-BLAKE2 algorithms compute incorrect results | 2019-08-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0020 | fix unsound APIs that could lead to UB | 2019-09-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0021 | `Matrix::zip_elements` causes double free | 2019-09-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0022 | Stream callback function is not unwind safe | 2019-09-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0023 | Cloned interners may read already dropped strings | 2019-08-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0025 | Flaw in CBOR deserializer allows stack overflow | 2019-10-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0026 | generichash::Digest::eq always return true | 2019-10-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0027 | Flaw in Scalar::check_overflow allows side-channel timing attack | 2019-10-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0028 | Unsound `impl Follow for bool` | 2019-10-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0029 | ChaCha20 counter overflow can expose repetitions in the keystream | 2019-10-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0033 | Integer Overflow in HeaderMap::reserve() can cause Denial of Service | 2019-11-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0034 | HeaderMap::Drain API is unsound | 2019-11-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0036 | Type confusion if __private_get_type_id__ is overridden | 2019-11-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0037 | Compiler optimisation for next_with_timeout in pnet::transport::IcmpTransportChannelIterator flaws to SEGFAULT | 2019-06-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0038 | Fix for UB in failure to catch panics crossing FFI boundaries | 2019-03-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2019-0039 | typemap is Unmaintained | 2019-04-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0001 | Stack overflow when resolving additional records from MX or SRV null targets | 2020-01-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0002 | Parsing a specially crafted message can result in a stack overflow | 2020-01-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0004 | sigstack allocation bug can cause memory corruption or leak | 2020-01-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0005 | CBox API allows to de-reference raw pointers without `unsafe` code | 2020-03-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0006 | Flaw in `realloc` allows reading unknown memory | 2020-03-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0007 | use-after or double free of allocated memory | 2020-03-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0008 | Flaw in hyper allows request smuggling by sending a body in GET requests | 2020-03-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0009 | `read_scalar` and `read_scalar_at` allow transmuting values without `unsafe` blocks | 2020-04-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0011 | Library exclusively intended to obfuscate code. | 2020-04-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0012 | Relies on undefined behavior of `char::from_u32_unchecked` | 2020-04-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0013 | fake-static allows converting any reference into a `'static` reference | 2020-04-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0014 | Various memory safety issues | 2020-04-23T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2021:2569 | Moderate: libxml2 security update | 2021-06-29T13:42:19Z | 2021-11-12T10:20:56Z |
| alsa-2021:3075 | Low: libuv security update | 2021-08-10T12:00:55Z | 2021-11-12T10:20:56Z |
| alsa-2021:3572 | Moderate: nss and nspr security, bug fix, and enhancement update | 2021-09-21T07:08:30Z | 2021-11-12T10:20:56Z |
| alsa-2021:3819 | Important: .NET 5.0 security and bugfix update | 2021-10-12T19:35:54Z | 2021-11-12T10:20:56Z |
| alsa-2021:3891 | Important: java-11-openjdk security update | 2021-10-20T12:41:00Z | 2021-11-12T10:20:56Z |
| alsa-2021:3893 | Important: java-1.8.0-openjdk security and bug fix update | 2021-10-20T12:38:15Z | 2021-11-12T10:20:56Z |
| alsa-2021:4042 | Important: flatpak security update | 2021-11-01T13:11:58Z | 2021-11-12T10:20:56Z |
| alsa-2021:4123 | Important: firefox security update | 2021-11-03T19:23:08Z | 2021-11-12T10:20:56Z |
| alsa-2021:4130 | Important: thunderbird security update | 2021-11-04T16:03:41Z | 2021-11-12T10:20:56Z |
| alsa-2021:4149 | Moderate: python-pillow security update | 2021-11-09T08:24:34Z | 2021-11-12T10:20:56Z |
| alsa-2021:4153 | Moderate: dnsmasq security and bug fix update | 2021-11-09T08:24:48Z | 2021-11-12T10:20:56Z |
| alsa-2021:4158 | Moderate: python-lxml security update | 2021-11-09T08:26:20Z | 2021-11-12T10:20:56Z |
| alsa-2021:4161 | Moderate: python-jinja2 security update | 2021-11-09T08:26:43Z | 2021-11-12T10:20:56Z |
| alsa-2021:4179 | Low: file-roller security update | 2021-11-09T08:32:50Z | 2021-11-12T10:20:56Z |
| alsa-2021:4181 | Moderate: mutt security, bug fix, and enhancement update | 2021-11-09T08:33:45Z | 2021-11-12T10:20:56Z |
| alsa-2021:4198 | Moderate: edk2 security, bug fix, and enhancement update | 2021-11-09T08:37:02Z | 2021-11-12T10:20:56Z |
| alsa-2021:4201 | Moderate: babel security and bug fix update | 2021-11-09T08:37:19Z | 2021-11-12T10:20:56Z |
| alsa-2021:4226 | Moderate: grafana security, bug fix, and enhancement update | 2021-11-09T08:46:47Z | 2021-11-12T10:20:56Z |
| alsa-2021:4231 | Moderate: libwebp security update | 2021-11-09T08:47:24Z | 2021-11-12T10:20:56Z |
| alsa-2021:4236 | Low: tcpdump security and bug fix update | 2021-11-09T08:48:42Z | 2021-11-12T10:20:56Z |
| alsa-2021:4315 | Moderate: spamassassin security update | 2021-11-09T08:58:53Z | 2021-11-12T10:20:56Z |
| alsa-2021:4319 | Moderate: compat-exiv2-026 security update | 2021-11-09T09:00:36Z | 2021-11-12T10:20:56Z |
| alsa-2021:4321 | Moderate: linuxptp security, bug fix, and enhancement update | 2021-11-09T09:00:47Z | 2021-11-12T10:20:56Z |
| alsa-2021:4324 | Moderate: python-psutil security update | 2021-11-09T09:01:04Z | 2021-11-12T10:20:56Z |
| alsa-2021:4326 | Moderate: libX11 security update | 2021-11-09T09:01:07Z | 2021-11-12T10:20:56Z |
| alsa-2021:4364 | Moderate: binutils security update | 2021-11-09T09:11:20Z | 2021-11-12T10:20:56Z |
| alsa-2021:4368 | Moderate: openssh security update | 2021-11-09T09:11:41Z | 2021-11-12T10:20:56Z |
| alsa-2021:4384 | Moderate: bind security and bug fix update | 2021-11-09T09:16:00Z | 2021-11-12T10:20:56Z |
| alsa-2021:4387 | Low: libssh security update | 2021-11-09T09:16:07Z | 2021-11-12T10:20:56Z |
| alsa-2021:4393 | Moderate: cups security and bug fix update | 2021-11-09T09:16:27Z | 2021-11-12T10:20:56Z |