Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2008-2033 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-1381. Reason: This candidate is a duplicate of CVE-2008-1381. Notes: All CVE users should reference CVE-2008-1381 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-04-30T15:00:00.000Z | 2008-05-08T09:00:00.000Z |
| CVE-2008-2007 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-1035. Reason: This candidate is a reservation duplicate of CVE-2008-1035. Notes: All CVE users should reference CVE-2008-1035 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-05-22T10:00:00.000Z | 2008-06-06T09:00:00.000Z |
| CVE-2008-3427 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-3420. Reason: This candidate is a duplicate of CVE-2008-3420. Notes: All CVE users should reference CVE-2008-3420 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-07-31T22:00:00.000Z | 2008-08-22T09:00:00.000Z |
| CVE-2008-2727 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-2725. Reason: This candidate is a duplicate of CVE-2008-2725. Notes: All CVE users should reference CVE-2008-2725 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-09-02T14:00:00.000Z | 2008-09-11T09:00:00.000Z |
| CVE-2008-2728 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-2726. Reason: This candidate is a duplicate of CVE-2008-2726. Notes: All CVE users should reference CVE-2008-2726 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-09-02T14:00:00.000Z | 2008-09-11T09:00:00.000Z |
| CVE-2008-4112 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-3195. Reason: This candidate is a duplicate of CVE-2008-3195. Notes: All CVE users should reference CVE-2008-3195 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-09-16T23:00:00.000Z | 2008-09-24T09:00:00.000Z |
| CVE-2008-4189 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-1105. Reason: This candidate is a duplicate of CVE-2008-1105. Notes: All CVE users should reference CVE-2008-1105 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-09-23T16:00:00.000Z | 2008-10-07T09:00:00.000Z |
| CVE-2008-4430 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-3699. Reason: This candidate is a duplicate of CVE-2008-3699. Notes: All CVE users should reference CVE-2008-3699 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-10-03T22:00:00.000Z | 2008-10-10T09:00:00.000Z |
| CVE-2008-5850 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate was originally recorded for a "SPLAT Remote Root Exploit" that was claimed to exist for Check Point SmartCenter. The claim has no actionable details and was disclosed by a person of unknown reliability who did not coordinate with the vendor. No people of known reliability have confirmed the original claim. The vendor has not indicated that they are aware of any vulnerability. Since the claim has no actionable details or independent verification, it is outside the scope of CVE according to current inclusion criteria | N/A | N/A | 2009-01-06T17:00:00.000Z | 2009-01-10T10:00:00.000Z |
| CVE-2008-4042 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-3889. Reason: This candidate is a duplicate of CVE-2008-3889. Notes: All CVE users should reference CVE-2008-3889 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-09-11T14:00:00.000Z | 2009-01-29T10:00:00.000Z |
| CVE-2008-5622 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-5621. Reason: This candidate is a duplicate of CVE-2008-5621. Notes: All CVE users should reference CVE-2008-5621 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-12-17T02:00:00.000Z | 2009-02-05T10:00:00.000Z |
| CVE-2006-6967 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). In addition, it describes standard behavior (publication of revocation lists) and as such does not cross privilege boundaries. Notes: the former description is: "Check Point FireWall-1 allows remote attackers to obtain certificate revocation lists (CRLs) and other unspecified sensitive information via an HTTP request for the top-level URI on the internal certificate authority (ICA) port (18264/tcp). | N/A | N/A | 2007-02-04T05:00:00.000Z | 2009-02-26T15:00:00.000Z |
| CVE-2008-6067 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-5838. Reason: This candidate is a duplicate of CVE-2008-5838. Notes: All CVE users should reference CVE-2008-5838 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2009-02-05T02:00:00.000Z | 2009-03-17T09:00:00.000Z |
| CVE-2009-1205 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-4475. Reason: This candidate is a duplicate of CVE-2007-4475. Notes: All CVE users should reference CVE-2007-4475 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2009-04-01T10:00:00.000Z | 2009-04-03T09:00:00.000Z |
| CVE-2008-6176 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-6171. Reason: This candidate is a duplicate of CVE-2008-6171. Notes: All CVE users should reference CVE-2008-6171 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2009-02-19T16:00:00.000Z | 2009-04-29T09:00:00.000Z |
| CVE-2008-6628 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-6268. Reason: This candidate is a duplicate of CVE-2008-6268. Notes: All CVE users should reference CVE-2008-6268 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2009-04-06T21:00:00.000Z | 2009-05-15T09:00:00.000Z |
| CVE-2009-1676 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2009-1535. Reason: This candidate is a duplicate of CVE-2009-1535. Notes: All CVE users should reference CVE-2009-1535 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2009-05-18T18:00:00.000Z | 2009-06-12T09:00:00.000Z |
| CVE-2009-2315 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2009-2204. Reason: This candidate is a duplicate of CVE-2009-2204. Notes: All CVE users should reference CVE-2009-2204 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2009-07-05T16:00:00.000Z | 2009-07-15T09:00:00.000Z |
| CVE-2008-3120 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2008-3363. Reason: This candidate is a duplicate of CVE-2008-3363. Notes: All CVE users should reference CVE-2008-3363 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2008-07-10T18:00:00.000Z | 2009-08-15T09:00:00.000Z |
| CVE-2009-3454 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2009-2510. Reason: This candidate is a duplicate of CVE-2009-2510. Notes: All CVE users should reference CVE-2009-2510 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2009-09-29T17:00:00.000Z | 2009-10-15T09:00:00.000Z |
| CVE-2005-4265 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-4209. Reason: This candidate is a duplicate of CVE-2005-4209. Notes: All CVE users should reference CVE-2005-4209 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-12-15T16:00:00.000Z | 2009-10-31T13:00:00.000Z |
| CVE-2009-1563 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2009-0689. Reason: This candidate is a duplicate of CVE-2009-0689. Certain codebase relationships were not originally clear. Notes: All CVE users should reference CVE-2009-0689 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2009-10-29T14:00:00.000Z | 2009-11-24T10:00:00.000Z |
| CVE-2009-4054 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2009-3672. Reason: This candidate is a duplicate of CVE-2009-3672. The duplicate was assigned by the CNA without proper coordination with MITRE. Notes: All CVE users should reference CVE-2009-3672 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2009-11-23T17:00:00.000Z | 2009-12-04T10:00:00.000Z |
| CVE-2009-3239 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2009-2139, CVE-2009-2140. Reason: This candidate is a duplicate of CVE-2009-2139 and CVE-2009-2140. Notes: All CVE users should reference CVE-2009-2139 and CVE-2009-2140 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2009-09-18T10:00:00.000Z | 2009-12-15T10:00:00.000Z |
| CVE-2009-4481 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2009-3111. Reason: This candidate is a duplicate of CVE-2009-3111. Notes: All CVE users should reference CVE-2009-3111 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2009-12-30T21:00:00.000Z | 2010-01-14T10:00:00.000Z |
| CVE-2010-1501 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-1767. Reason: This candidate is a duplicate of CVE-2010-1767. Notes: All CVE users should reference CVE-2010-1767 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2010-04-23T14:00:00.000Z | 2010-04-30T09:00:00.000Z |
| CVE-2010-1745 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-1867. Reason: This candidate is a duplicate of CVE-2010-1867. Notes: All CVE users should reference CVE-2010-1867 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2010-05-06T18:00:00.000Z | 2010-04-30T09:00:00.000Z |
| CVE-2010-1974 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-1168. Reason: This candidate is a duplicate of CVE-2010-1168. Notes: All CVE users should reference CVE-2010-1168 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2010-05-19T18:13:00.000Z | 2010-06-23T09:00:00.000Z |
| CVE-2010-2972 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-1797. Reason: This candidate is a duplicate of CVE-2010-1797. Notes: All CVE users should reference CVE-2010-1797 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2010-08-05T18:00:00.000Z | 2010-08-18T09:00:00.000Z |
| CVE-2010-1738 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-1448. Reason: This candidate is a duplicate of CVE-2010-1448. Notes: All CVE users should reference CVE-2010-1448 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2010-05-06T18:00:00.000Z | 2010-08-24T09:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2004-2775 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2020-11-05T20:15:14.410 | 2023-11-07T01:57:08.137 |
| fkie_cve-2004-9998 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has b… | 2004-12-31T05:00:00.000 | 2023-11-07T01:57:08.387 |
| fkie_cve-2004-9999 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has b… | 2004-12-31T05:00:00.000 | 2023-11-07T01:57:08.410 |
| fkie_cve-2005-0093 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was w… | 2005-05-02T04:00:00.000 | 2023-11-07T01:57:09.640 |
| fkie_cve-2005-0122 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0975. Reason: This candid… | 2005-04-14T04:00:00.000 | 2023-11-07T01:57:09.907 |
| fkie_cve-2005-0123 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.073 | 2023-11-07T01:57:09.937 |
| fkie_cve-2005-0128 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.087 | 2023-11-07T01:57:10.263 |
| fkie_cve-2005-0165 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.120 | 2023-11-07T01:57:10.933 |
| fkie_cve-2005-0166 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.137 | 2023-11-07T01:57:11.150 |
| fkie_cve-2005-0167 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.167 | 2023-11-07T01:57:11.370 |
| fkie_cve-2005-0168 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.183 | 2023-11-07T01:57:11.583 |
| fkie_cve-2005-0169 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.213 | 2023-11-07T01:57:11.810 |
| fkie_cve-2005-0170 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.230 | 2023-11-07T01:57:12.027 |
| fkie_cve-2005-0171 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.243 | 2023-11-07T01:57:12.247 |
| fkie_cve-2005-0172 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.277 | 2023-11-07T01:57:12.467 |
| fkie_cve-2005-0203 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has b… | 2005-06-09T04:00:00.000 | 2023-11-07T01:57:13.270 |
| fkie_cve-2005-0228 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2004-1388. Reason: This candid… | 2005-05-02T04:00:00.000 | 2023-11-07T01:57:13.500 |
| fkie_cve-2005-0389 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0814. Reason: This candid… | 2005-05-02T04:00:00.000 | 2023-11-07T01:57:14.867 |
| fkie_cve-2005-0394 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was wit… | 2021-06-18T13:15:07.433 | 2023-11-07T01:57:15.150 |
| fkie_cve-2005-0395 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has b… | 2005-06-09T04:00:00.000 | 2023-11-07T01:57:15.397 |
| fkie_cve-2005-0528 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2003-0985. Reason: This candid… | 2005-12-31T05:00:00.000 | 2023-11-07T01:57:16.670 |
| fkie_cve-2005-0609 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.290 | 2023-11-07T01:57:17.510 |
| fkie_cve-2005-0683 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0659. Reason: This candid… | 2005-05-02T04:00:00.000 | 2023-11-07T01:57:18.340 |
| fkie_cve-2005-0714 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0340. Reason: This candid… | 2005-05-02T04:00:00.000 | 2023-11-07T01:57:18.610 |
| fkie_cve-2005-0727 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0735. Reason: This candid… | 2005-05-02T04:00:00.000 | 2023-11-07T01:57:18.723 |
| fkie_cve-2005-0728 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0736. Reason: This candid… | 2005-05-02T04:00:00.000 | 2023-11-07T01:57:18.753 |
| fkie_cve-2005-0751 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has b… | 2005-06-09T04:00:00.000 | 2023-11-07T01:57:19.007 |
| fkie_cve-2005-0840 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0706. Reason: This candid… | 2005-05-02T04:00:00.000 | 2023-11-07T01:57:19.930 |
| fkie_cve-2005-0940 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0490. Reason: This candid… | 2005-05-02T04:00:00.000 | 2023-11-07T01:57:20.863 |
| fkie_cve-2005-0951 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: this candidate was c… | 2005-05-02T04:00:00.000 | 2023-11-07T01:57:21.037 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-8j6j-4h2c-c65p |
|
Arbitrary Code Execution in require-node | 2020-09-03T17:02:52Z | 2020-08-31T18:44:11Z |
| ghsa-crf7-fvjx-863q |
|
Path Traversal in zero | 2020-09-03T17:09:26Z | 2020-08-31T18:44:37Z |
| ghsa-9qgh-7pgp-hp7r |
|
Cross-Site Scripting in graylog-web-interface | 2020-09-03T17:10:31Z | 2020-08-31T18:44:42Z |
| ghsa-9pcf-h8q9-63f6 |
|
Sandbox Breakout / Arbitrary Code Execution in safe-eval | 2020-09-03T17:12:41Z | 2020-08-31T18:44:49Z |
| ghsa-5634-rv46-48jf |
|
Cross-Site Scripting in bleach | 2020-09-03T17:13:45Z | 2020-08-31T18:44:51Z |
| ghsa-xfrc-7mj2-5xh9 |
|
Undefined Behavior in zencashjs | 2020-09-03T17:14:51Z | 2020-08-31T18:44:53Z |
| ghsa-v9wp-8r97-v6xg |
|
Cross-Site Scripting in jquery.json-viewer | 2020-09-03T17:17:00Z | 2020-08-31T18:44:56Z |
| ghsa-gvff-25cc-4f66 |
|
Path Traversal in restify-swagger-jsdoc | 2020-09-03T17:15:56Z | 2020-08-31T18:44:58Z |
| ghsa-4q2f-8g74-qm56 |
|
Cross-Site Scripting in takeapeek | 2020-09-03T17:18:05Z | 2020-08-31T18:45:01Z |
| ghsa-h726-x36v-rx45 |
|
Prototype Pollution in lodash.merge | 2020-09-03T18:04:54Z | 2020-08-31T18:46:04Z |
| ghsa-2m96-9w4j-wgv7 |
|
Prototype Pollution in lodash.merge | 2020-09-03T18:06:00Z | 2020-08-31T18:46:06Z |
| ghsa-h5mp-5q4p-ggf5 |
|
Prototype Pollution in lodash.defaultsdeep | 2020-09-03T18:07:05Z | 2020-08-31T18:46:09Z |
| ghsa-5947-m4fg-xhqg |
|
Prototype Pollution in lodash.mergewith | 2020-09-03T18:08:10Z | 2020-08-31T18:46:11Z |
| ghsa-46fh-8fc5-xcwx |
|
Prototype Pollution in lodash.defaultsdeep | 2020-09-03T18:09:16Z | 2020-08-31T18:46:13Z |
| ghsa-779f-wgxg-qr8f |
|
Prototype Pollution in lodash.mergewith | 2020-09-03T18:10:22Z | 2020-08-31T18:46:16Z |
| ghsa-cr67-78jr-j94p |
|
Local File Inclusion in domokeeper | 2020-09-03T18:14:47Z | 2020-08-31T18:46:25Z |
| ghsa-ch52-vgq2-943f |
|
Regular Expression Denial of Service in marked | 2020-09-03T18:15:53Z | 2020-08-31T18:46:28Z |
| ghsa-vpj4-89q8-rh38 |
|
Cross-Site Scripting in bpmn-js-properties-panel | 2020-09-03T18:16:59Z | 2020-08-31T18:46:32Z |
| ghsa-vmh4-322v-cfpc |
|
Cross-Site Scripting in cmmn-js-properties-panel | 2020-09-03T18:18:06Z | 2020-08-31T18:46:35Z |
| ghsa-h9wr-xr4r-66fh |
|
Cross-Site Scripting in dmn-js-properties-panel | 2020-09-03T18:20:20Z | 2020-08-31T18:46:37Z |
| ghsa-rmmc-8cqj-hfp3 |
|
Authentication Bypass in otpauth | 2020-09-03T18:24:43Z | 2020-08-31T18:46:51Z |
| ghsa-g9wg-wq4f-2x5w |
|
Cross-Site Scripting in console-feed | 2020-09-03T19:00:10Z | 2020-08-31T18:46:53Z |
| ghsa-vx5w-cxch-wwc9 |
|
Path Traversal in f-serv | 2020-09-03T19:02:27Z | 2020-08-31T18:46:58Z |
| ghsa-7r5f-7qr4-pf6q |
|
Sandbox Breakout / Arbitrary Code Execution in notevil | 2020-09-03T19:03:33Z | 2020-08-31T18:47:00Z |
| ghsa-c3px-v9c7-m734 |
|
Prototype Pollution in mithril | 2020-09-03T19:04:39Z | 2020-08-31T18:47:02Z |
| ghsa-m86m-5m44-pc93 |
|
Denial of Service in grpc-ts-health-check | 2020-09-03T19:05:46Z | 2020-08-31T18:47:07Z |
| ghsa-hx78-272p-mqqh |
|
Authorization Bypass in graphql-shield | 2020-09-03T19:21:11Z | 2020-08-31T18:47:59Z |
| ghsa-5mrr-rgp6-x4gr |
|
Command Injection in marsdb | 2020-09-03T19:39:05Z | 2020-08-31T18:48:01Z |
| ghsa-fw4p-36j9-rrj3 |
|
Denial of Service in sequelize | 2020-09-03T20:25:33Z | 2020-08-31T18:48:48Z |
| ghsa-4vvp-x9h2-x2vf |
|
Path Traversal in public | 2020-09-03T20:26:39Z | 2020-08-31T18:48:53Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2020-25 |
|
Autobahn|Python before 20.12.3 allows redirect header injection. | autobahn | 2020-12-27T00:15:00Z | 2020-12-30T15:37:00Z |
| pysec-2020-48 |
|
Hyperledger Indy Node is the server portion of a distributed ledger purpose-built for dec… | indy-node | 2020-12-24T20:15:00Z | 2020-12-31T19:25:00Z |
| pysec-2020-92 |
|
A denial of service via regular expression in the py.path.svnwc component of py (aka pyth… | py | 2020-12-09T07:15:00Z | 2021-01-05T03:15:00Z |
| pysec-2021-61 |
|
clickhouse-driver before 0.1.5 allows a malicious clickhouse server to trigger a crash or… | clickhouse-driver | 2021-01-06T13:15:00Z | 2021-01-08T21:19:00Z |
| pysec-2021-72 |
|
This affects the package pwntools before 4.3.1. The shellcraft generator for affected ver… | pwntools | 2021-01-08T12:15:00Z | 2021-01-12T19:55:00Z |
| pysec-2021-5 |
|
CairoSVG is a Python (pypi) package. CairoSVG is an SVG converter based on Cairo. In Cair… | cairosvg | 2021-01-06T17:15:00Z | 2021-01-13T15:43:00Z |
| pysec-2021-46 |
|
before_upstream_connection in AuthPlugin in http/proxy/auth.py in proxy.py before 2.3.1 a… | proxy-py | 2021-01-11T05:15:00Z | 2021-01-14T15:09:00Z |
| pysec-2021-15 |
|
git-big-picture before 1.0.0 mishandles ' characters in a branch name, leading to code ex… | git-big-picture | 2021-01-13T17:15:00Z | 2021-01-19T14:43:00Z |
| pysec-2021-67 |
|
JupyterHub 1.1.0 allows CSRF in the admin panel via a request that lacks an _xsrf field, … | jupyterhub | 2021-01-13T04:15:00Z | 2021-01-19T19:58:00Z |
| pysec-2021-62 |
|
python-cryptography 3.2 is vulnerable to Bleichenbacher timing attacks in the RSA decrypt… | cryptography | 2021-01-11T16:15:00Z | 2021-01-19T21:48:00Z |
| pysec-2019-123 |
|
SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by… | sqlalchemy | 2019-02-20T00:29:00Z | 2021-01-20T15:15:00Z |
| pysec-2019-124 |
|
SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled. | sqlalchemy | 2019-02-06T21:29:00Z | 2021-01-20T15:15:00Z |
| pysec-2020-31 |
|
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where … | django | 2020-06-03T14:15:00Z | 2021-01-20T15:15:00Z |
| pysec-2020-32 |
|
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameter… | django | 2020-06-03T14:15:00Z | 2021-01-20T15:15:00Z |
| pysec-2020-33 |
|
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.… | django | 2020-09-01T13:15:00Z | 2021-01-20T15:15:00Z |
| pysec-2020-34 |
|
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.… | django | 2020-09-01T13:15:00Z | 2021-01-20T15:15:00Z |
| pysec-2019-2 |
|
A flaw was discovered in the way Ansible templating was implemented in versions before 2.… | ansible | 2019-07-30T23:15:00Z | 2021-01-28T16:39:00Z |
| pysec-2020-161 |
|
A flaw was found in the solaris_zone module from the Ansible Community modules. When sett… | ansible | 2020-08-26T03:15:00Z | 2021-01-28T18:00:00Z |
| pysec-2021-71 |
|
In Pillow before 8.1.0, SGIRleDecode has a 4-byte buffer over-read when decoding crafted … | pillow | 2021-01-12T09:15:00Z | 2021-01-29T00:46:00Z |
| pysec-2021-69 |
|
In Pillow before 8.1.0, PcxDecode has a buffer over-read when decoding a crafted PCX file… | pillow | 2021-01-12T09:15:00Z | 2021-01-29T00:47:00Z |
| pysec-2021-48 |
|
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 … | pysaml2 | 2021-01-21T15:15:00Z | 2021-01-29T17:58:00Z |
| pysec-2021-33 |
|
LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of t… | oncall | 2021-02-05T18:15:00Z | 2021-02-08T20:54:00Z |
| pysec-2021-16 |
|
httplib2 is a comprehensive HTTP client library for Python. In httplib2 before version 0.… | httplib2 | 2021-02-08T20:15:00Z | 2021-02-12T14:56:00Z |
| pysec-2021-63 |
|
In the cryptography package before 3.3.2 for Python, certain sequences of update calls to… | cryptography | 2021-02-07T20:15:00Z | 2021-02-19T17:23:00Z |
| pysec-2021-68 |
|
An issue was discovered in NFStream 5.2.0. Because some allocated modules are not correct… | nfstream | 2021-02-16T15:15:00Z | 2021-02-19T21:11:00Z |
| pysec-2021-2 |
|
Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow a… | apache-airflow | 2021-02-17T15:15:00Z | 2021-02-23T17:48:00Z |
| pysec-2021-3 |
|
The lineage endpoint of the deprecated Experimental API was not protected by authenticati… | apache-airflow | 2021-02-17T15:15:00Z | 2021-02-23T17:59:00Z |
| pysec-2021-65 |
|
GramAddict through 1.2.3 allows remote attackers to execute arbitrary code because of use… | gramaddict | 2021-02-17T22:15:00Z | 2021-02-24T13:58:00Z |
| pysec-2021-113 |
|
Django Channels 3.x before 3.0.3 allows remote attackers to obtain sensitive information … | channels | 2021-02-22T03:15:00Z | 2021-02-26T12:36:00Z |
| pysec-2021-9 |
|
In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.ar… | django | 2021-02-02T07:15:00Z | 2021-03-05T19:19:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2016-6316 | There is a possible XSS vulnerability in Action View. Text declared as "HTML safe" will … | 2016-08-11T00:00:00.000Z |
| gsd-2016-6317 | There is a vulnerability when Active Record is used in conjunction with JSON parameter pa… | 2016-08-11T00:00:00.000Z |
| gsd-2016-6582 | Doorkeeper failed to implement OAuth 2.0 Token Revocation (RFC 7009) in the following way… | 2016-08-18T00:00:00.000Z |
| gsd-2016-10173 | Minitar allows attackers to overwrite arbitrary files during archive extraction via a .. … | 2016-08-22T00:00:00.000Z |
| gsd-2016-7103 | Cross-site scripting (XSS) vulnerability in jQuery UI before 1.12.0 might allow remote at… | 2016-08-27T00:00:00.000Z |
| gsd-2016-1000253 | The format of the source doesn't require a description, click on the link for more details. | |
| gsd-2016-10345 | In Phusion Passenger before 5.1.0, a known /tmp filename was used during passenger-instal… | 2016-11-09T00:00:00.000Z |
| gsd-2016-10522 | The rails_admin gem is vulnerable to cross-site request forgery (CSRF) attacks. Due to a … | 2016-12-21T00:00:00.000Z |
| gsd-2017-18076 | In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly prote… | 2017-01-11T00:00:00.000Z |
| gsd-2016-1000249 | The format of the source doesn't require a description, click on the link for more details. | |
| gsd-2017-5946 | The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversa… | 2017-02-27T00:00:00.000Z |
| gsd-2016-4658 | Nokogiri version 1.7.1 has been released, pulling in several upstream patches to the vend… | 2017-03-11T00:00:00.000Z |
| gsd-2017-7540 | Safemode, as used in Foreman, versions 1.3.2 and earlier are vulnerable to bypassing safe… | 2017-04-05T00:00:00.000Z |
| gsd-2017-8418 | RuboCop 0.48.1 and earlier does not use /tmp in safe way, allowing local users to exploit… | 2017-05-01T00:00:00.000Z |
| gsd-2017-1002201 | In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on… | 2017-05-08T00:00:00.000Z |
| gsd-2017-5029 | nokogiri version 1.7.2 has been released. This is a security update based on 1.7.1, addr… | 2017-05-09T00:00:00.000Z |
| gsd-2017-16833 | Stored cross-site scripting (XSS) vulnerability in Gemirro allows attackers to inject arb… | 2017-07-11T00:00:00.000Z |
| gsd-2017-0899 | RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specificatio… | 2017-08-29T00:00:00.000Z |
| gsd-2017-0900 | RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specificatio… | 2017-08-29T00:00:00.000Z |
| gsd-2017-0901 | RubyGems version 2.6.12 and earlier fails to validate specification names, allowing a mal… | 2017-08-29T00:00:00.000Z |
| gsd-2017-0902 | RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking vulnerability that a… | 2017-08-29T00:00:00.000Z |
| gsd-2017-9050 | The version of libxml2 packaged with Nokogiri contains several vulnerabilities. Nokogiri … | 2017-09-19T00:00:00.000Z |
| gsd-2017-0903 | There is a possible unsafe object deserialization vulnerability in RubyGems. It is possib… | 2017-10-09T00:00:00.000Z |
| gsd-2016-7798 | The openssl gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm)… | 2017-10-24T00:00:00.000Z |
| gsd-2017-15928 | In the Ox gem 2.8.0 for Ruby, the process crashes with a segmentation fault when a crafte… | 2017-10-27T00:00:00.000Z |
| gsd-2017-16229 | In the Ox gem 2.8.1 for Ruby, the process crashes with a stack-based buffer over-read in … | 2017-10-29T00:00:00.000Z |
| gsd-2017-16516 | In the yajl-ruby gem 1.3.0 for Ruby, when a crafted JSON file is supplied to Yajl::Parser… | 2017-11-03T00:00:00.000Z |
| gsd-2017-0904 | The private_address_check ruby gem before 0.4.0 is vulnerable to a bypass due to use of R… | 2017-11-07T00:00:00.000Z |
| gsd-2017-0905 | If you are using the #find method on any of the classes that are derived from the Resourc… | 2017-11-09T00:00:00.000Z |
| gsd-2017-0909 | The private_address_check ruby gem before 0.4.1 is vulnerable to a bypass due to an incom… | 2017-11-09T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-5389 | Malicious code in pocjenkircetest (npm) | 2022-06-01T09:07:44Z | 2022-06-01T09:07:45Z |
| mal-2022-94 | Malicious code in @azure-test2/test2 (npm) | 2022-06-01T09:08:19Z | 2022-06-01T09:08:20Z |
| mal-2022-2429 | Malicious code in depedence-confusion (npm) | 2022-06-01T09:10:16Z | 2022-06-01T09:10:16Z |
| mal-2022-4205 | Malicious code in kntl-digital3 (npm) | 2022-06-01T09:11:57Z | 2022-06-01T09:11:57Z |
| mal-2022-72 | Malicious code in @amcdc/backend-api-swagger (npm) | 2022-06-01T09:12:30Z | 2022-06-01T09:12:38Z |
| mal-2022-569 | Malicious code in @s3p-js-deep-purple/utils (npm) | 2022-06-01T09:14:30Z | 2022-06-01T09:14:30Z |
| mal-2022-5678 | Malicious code in react-transition-group-community-version (npm) | 2022-06-01T09:15:36Z | 2022-06-01T09:15:37Z |
| mal-2022-705 | Malicious code in @visiology-public-utilities/language-utils (npm) | 2022-06-01T09:16:27Z | 2022-06-01T09:16:27Z |
| mal-2022-644 | Malicious code in @tilliwilli/npm-lifecycles (npm) | 2022-06-01T09:17:16Z | 2022-06-01T09:17:17Z |
| mal-2022-352 | Malicious code in @image-process-library/blob-to-base64 (npm) | 2022-06-01T09:19:16Z | 2022-06-01T09:19:16Z |
| mal-2022-2442 | Malicious code in dependencyconfusioncve2 (npm) | 2022-06-01T09:21:16Z | 2022-06-01T09:21:16Z |
| mal-2022-2441 | Malicious code in dependencyconfusioncve (npm) | 2022-06-01T09:21:16Z | 2022-06-01T09:21:17Z |
| mal-2022-59 | Malicious code in @adam_baldwin/sample_4 (npm) | 2022-06-01T09:24:03Z | 2022-06-01T09:24:03Z |
| mal-2022-3917 | Malicious code in inv-cyber (npm) | 2022-06-01T09:25:12Z | 2022-06-01T09:25:12Z |
| mal-2022-3918 | Malicious code in inv-cyber-core (npm) | 2022-06-01T09:25:12Z | 2022-06-01T09:25:12Z |
| mal-2022-60 | Malicious code in @adam_baldwin/tag-tmp (npm) | 2022-06-01T09:25:44Z | 2022-06-01T09:25:45Z |
| mal-2022-1660 | Malicious code in bounty-plz (npm) | 2022-06-01T09:26:02Z | 2022-06-01T09:26:03Z |
| mal-2022-5068 | Malicious code in omniprotocol (npm) | 2022-06-01T09:26:52Z | 2022-06-01T09:26:52Z |
| mal-2022-3297 | Malicious code in gc-gsl-editor (npm) | 2022-06-01T09:26:52Z | 2022-06-01T09:26:53Z |
| mal-2022-3300 | Malicious code in gctor-storage (npm) | 2022-06-01T09:26:52Z | 2022-06-01T09:26:58Z |
| mal-2022-58 | Malicious code in @adam_baldwin/pingback (npm) | 2022-06-01T09:27:08Z | 2022-06-01T09:27:08Z |
| mal-2022-1362 | Malicious code in azure-pipelines-dependency-track (npm) | 2022-06-01T09:27:58Z | 2022-06-01T09:27:58Z |
| mal-2022-6067 | Malicious code in sg-dome (npm) | 2022-06-01T09:27:58Z | 2022-06-01T09:27:58Z |
| mal-2022-3476 | Malicious code in grunt-import-html (npm) | 2022-06-01T09:27:58Z | 2022-06-01T09:28:03Z |
| mal-2022-6068 | Malicious code in sg-orbit (npm) | 2022-06-01T09:27:58Z | 2022-06-01T09:28:03Z |
| mal-2022-618 | Malicious code in @superbet-group/testsandbox (npm) | 2022-06-01T09:30:48Z | 2022-06-01T09:30:48Z |
| mal-2022-1056 | Malicious code in apnic-bootstrap4 (npm) | 2022-06-02T09:02:44Z | 2022-06-02T09:02:45Z |
| mal-2022-4290 | Malicious code in lexical-monorepo (npm) | 2022-06-02T10:28:04Z | 2022-06-02T10:28:05Z |
| mal-2022-2320 | Malicious code in dai-pg (npm) | 2022-06-02T10:38:35Z | 2022-06-02T10:38:36Z |
| mal-2022-3849 | Malicious code in insights-explorer (npm) | 2022-06-02T10:38:35Z | 2022-06-02T10:38:36Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2020-10090 | 2024-03-06T11:23:50.890Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10091 | 2024-03-06T11:23:49.610Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10092 | 2024-03-06T11:23:48.320Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10535 | 2024-03-06T11:23:47.028Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10952 | 2024-03-06T11:23:45.726Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10953 | 2024-03-06T11:23:44.411Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10954 | 2024-03-06T11:23:43.181Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10955 | 2024-03-06T11:23:41.904Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10956 | 2024-03-06T11:23:40.637Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10975 | 2024-03-06T11:23:39.384Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10976 | 2024-03-06T11:23:38.111Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10977 | 2024-03-06T11:23:36.866Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10978 | 2024-03-06T11:23:35.522Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10979 | 2024-03-06T11:23:34.248Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10980 | 2024-03-06T11:23:33.013Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-10981 | 2024-03-06T11:23:31.761Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-11505 | 2024-03-06T11:23:30.519Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-11506 | 2024-03-06T11:23:29.202Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-11649 | 2024-03-06T11:23:27.888Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-12275 | 2024-03-06T11:23:26.642Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-12276 | 2024-03-06T11:23:25.385Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-12277 | 2024-03-06T11:23:24.109Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-12448 | 2024-03-06T11:23:22.845Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13261 | 2024-03-06T11:23:21.598Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13262 | 2024-03-06T11:23:20.331Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13263 | 2024-03-06T11:23:19.027Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13264 | 2024-03-06T11:23:17.785Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13265 | 2024-03-06T11:23:16.561Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13266 | 2024-03-06T11:23:15.296Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13267 | 2024-03-06T11:23:14.054Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| cleanstart-2026-kn30288 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-rhfx-m35p-ff5j, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.27.5-r1, 1.27.6-r0 | 2026-02-19T00:39:07.163109Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-ln12820 | vulnerability has been identified in Node | 2026-02-19T00:58:49.154512Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-nn87556 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.29.0-r0 | 2026-02-19T00:39:07.788394Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-oj16660 | Security fixes for GHSA-2gh3-rmm4-6rq5, GHSA-434x-w66g-qw3r, GHSA-r6v5-fh4h-64xc, GHSA-xwfj-jgwm-7wp5 applied in versions: 1.28.2-r0, 1.28.4-r0 | 2026-02-19T00:39:07.225007Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-yn08405 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 7.1.1-r7 | 2026-02-19T00:39:05.944714Z | 2026-02-18T09:40:19Z |
| cleanstart-2026-lm41397 | node-tar is a full-featured Tar for Node | 2026-02-24T00:40:50.950958Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-sp64433 | Security fixes for GHSA-6rw7-vpxm-498p, GHSA-73rr-hh4g-fpgx, GHSA-8qq5-rm4j-mr97 applied in versions: 4.2.1.1-r1 | 2026-02-24T00:44:51.180009Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-yq79300 | Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate | 2026-02-24T00:45:20.890998Z | 2026-02-23T12:58:32Z |
| cleanstart-2026-dc27717 | OpenVPN version 2 | 2026-02-25T00:39:42.192253Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-dn18334 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-25T00:39:41.622120Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-ds30740 | go-git is a highly extensible git implementation library written in pure Go | 2026-02-25T00:46:12.495329Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-oo47906 | Security fixes for GHSA-vc5p-v9hr-52mj applied in versions: 4.1.1-r0 | 2026-02-25T00:49:14.177631Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-pm90259 | Cancelling a query (e | 2026-02-25T00:50:43.010672Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-rd09851 | net/url package does not set a limit on the number of query parameters in a query | 2026-02-25T00:53:44.039015Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-uk11127 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-25T00:52:43.391940Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-wk32717 | During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succ... | 2026-02-25T00:52:13.178542Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-xk29348 | Security fixes for GHSA-f6x5-jh6r-wrfv, GHSA-j5w8-q4qc-rx2x applied in versions: 8.4.0-r0 | 2026-02-25T00:39:11.477214Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-zs11519 | Security fixes for GHSA-vc5p-v9hr-52mj applied in versions: 4.1.1-r0 | 2026-02-25T00:49:13.663387Z | 2026-02-24T09:23:19Z |
| cleanstart-2026-vu62737 | excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate | 2026-02-26T00:41:56.473097Z | 2026-02-25T07:34:17Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2017-083 | 2017-11-08T17:22:08.000Z | 2023-08-21T13:31:18.000Z | |
| drupal-contrib-2023-040 | 2023-08-23T17:24:02.000Z | 2023-08-23T18:28:12.000Z | |
| drupal-contrib-2023-039 | 2023-08-23T17:06:18.000Z | 2023-08-23T18:28:35.000Z | |
| drupal-contrib-2023-037 | 2023-08-23T16:54:32.000Z | 2023-08-23T18:29:48.000Z | |
| drupal-contrib-2023-034 | 2023-08-23T14:51:16.000Z | 2023-08-23T18:45:47.000Z | |
| drupal-contrib-2023-035 | 2023-08-23T14:54:52.000Z | 2023-08-23T18:45:59.000Z | |
| drupal-contrib-2023-038 | 2023-08-23T17:00:14.000Z | 2023-08-23T18:47:17.000Z | |
| drupal-contrib-2023-041 | 2023-08-30T16:22:06.000Z | 2023-08-30T18:51:23.000Z | |
| drupal-contrib-2023-042 | 2023-08-30T16:23:18.000Z | 2023-08-30T18:51:57.000Z | |
| drupal-contrib-2023-043 | 2023-09-06T15:23:32.000Z | 2023-09-06T16:48:26.000Z | |
| drupal-contrib-2023-045 | 2023-09-13T15:47:17.000Z | 2023-09-13T17:42:33.000Z | |
| drupal-contrib-2023-044 | 2023-09-06T16:33:36.000Z | 2023-09-18T14:27:44.000Z | |
| drupal-contrib-2023-047 | 2023-09-27T16:33:34.000Z | 2023-09-28T21:17:46.000Z | |
| drupal-contrib-2019-088 | 2019-11-13T18:09:57.000Z | 2023-10-02T19:48:10.000Z | |
| drupal-contrib-2023-048 | 2023-10-04T15:41:34.000Z | 2023-10-04T16:35:18.000Z | |
| drupal-contrib-2022-016 | 2022-01-25T18:39:26.000Z | 2023-10-06T19:27:29.000Z | |
| drupal-contrib-2022-019 | 2022-01-25T18:40:00.000Z | 2023-10-24T16:11:02.000Z | |
| drupal-contrib-2023-025 | 2023-06-28T17:10:15.000Z | 2023-10-26T13:22:52.000Z | |
| drupal-contrib-2023-049 | 2023-11-01T16:56:37.000Z | 2023-11-06T14:25:23.000Z | |
| drupal-contrib-2023-050 | 2023-11-08T15:30:45.000Z | 2023-11-08T17:10:18.000Z | |
| drupal-contrib-2023-051 | 2023-11-08T15:33:12.000Z | 2023-11-08T17:10:24.000Z | |
| drupal-contrib-2023-052 | 2023-11-15T14:24:12.000Z | 2023-11-15T17:19:15.000Z | |
| drupal-contrib-2023-053 | 2023-11-29T15:27:05.000Z | 2023-11-29T18:08:04.000Z | |
| drupal-contrib-2023-054 | 2023-12-06T16:16:28.000Z | 2023-12-07T02:47:34.000Z | |
| drupal-contrib-2023-055 | 2023-12-20T17:02:51.000Z | 2023-12-20T17:53:15.000Z | |
| drupal-contrib-2022-013 | 2022-01-25T18:37:38.000Z | 2024-01-25T20:19:13.000Z | |
| drupal-contrib-2024-010 | 2024-02-21T16:58:11.000Z | 2025-02-20T18:36:16.000Z | |
| drupal-contrib-2024-009 | 2024-02-14T19:31:10.000Z | 2025-02-20T18:37:01.000Z | |
| drupal-contrib-2024-008 | 2024-02-07T17:56:55.000Z | 2025-02-20T18:37:40.000Z | |
| drupal-contrib-2024-007 | 2024-01-31T17:22:36.000Z | 2025-02-20T18:38:01.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2007-000420 | HP System Management Homepage cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000429 | Meneame cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000434 | ADPLAN cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000446 | Internet Explorer vulnerable in MHTML handling | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000447 | Internet Explorer vulnerable in handling MHTML protocol | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000454 | dotProject cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000471 | RaidenHTTPD cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000476 | Hiki arbitrary file deletion vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000486 | rktSNS cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000487 | sHTTPd cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000491 | Lhaca LHZ Archive Extended Header Size Processing Buffer Overflow Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000494 | KDDI sample CGI download program directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000507 | Flash Player allows to send arbitrary Referer headers | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000548 | Nessus report function vulnerable to arbitrary script execution | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000551 | Aruba Mobility Controller Series cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000559 | Yayoi Kaikei improper handling of credential information | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000560 | Safari URL spoofing vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000572 | WebCart cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000598 | Apache Tomcat Host Manager cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000625 | Tuigwaa cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000626 | Mayaa cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000639 | Shopping Basket Pro directory traversal vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000640 | Fulltext search CGI from futomi's CGI Cafe vulnerable to cross-site scripting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000645 | 7-ZIP32.DLL buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000646 | Fuktommy.com httpd.pl including HTML preprocessor vulnerable to directory traversal | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000647 | Fuktommy.com httpd.pl included in its HTML preprocessor vulnerable in allowing an attacker to view arbitrary CGI source code | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000678 | Fingerprint Authentication Software for Sony Pocket Bit installs hidden folders and files | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000697 | Lhaplus buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000699 | JP1/NETM/DM Manager SQL Injection Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000700 | Cosminexus javadoc Cross-Site Scripting Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00156 | Asuswrt 'infosvr'远程命令执行漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00157 | Open-Xchange Server/OX App Suite存在未明HTML注入漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00158 | WordPress插件Banner Effect Header 'options-general.php'跨站脚本漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00159 | Kajona 'admin.php'跨站脚本漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00160 | TYPO3存在未明漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00161 | TYPO3 Url任意域修改漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00162 | Smoothwall Express存在多个跨站脚本漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00163 | Smoothwall Express跨站脚本漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00164 | Smoothwall Express存在多个跨站请求伪造漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00165 | WordPress插件Simplelife存在多个跨站请求伪造漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00166 | WordPress插件SimpleFlickr存在多个跨站请求伪造漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00167 | WordPress插件twimp-wp跨站请求伪造漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00168 | WordPress插件Twitter LiveBlog跨站请求伪造漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00169 | WordPress插件TweetScribe跨站请求伪造漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00170 | WordPress插件Wp Unique Article Header Image存在多个跨站请求伪造漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00171 | WordPress插件Post to Twitter存在多个跨站请求伪造漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00172 | WordPress插件Simple visitor stat存在多个跨站脚本漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00173 | WordPress Social Slider插件SQL注入漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00174 | HESK存在多个跨站脚本漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00175 | CosmoShop ePRO存在多个跨站脚本漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00176 | CosmoShop ePRO跨站请求伪造漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00177 | WordPress插件gSlideShow存在多个跨站请求伪造漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00178 | WordPress插件PWGRandom存在多个跨站请求伪造漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00179 | WordPress插件Sodahead Polls存在多个跨站脚本漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00180 | PHP Fileinfo component拒绝服务漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00181 | WordPress插件PictoBrowser跨站请求伪造漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00182 | Easewe FTP OCX任意文件执行漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00183 | WordPress插件Cart66 Lite SQL注入漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00184 | concrete5存在多个跨站脚本漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00185 | Roundcube Webmail存在多个跨站请求伪造漏洞 | 2015-01-08 | 2015-01-09 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2014-00368 | Уязвимость пакета программ Microsoft Office, позволяющая удаленному злоумышленнику выполн… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00369 | Уязвимость текстового редактора Microsoft Word Viewer, позволяющая удаленному злоумышленн… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00370 | Уязвимость текстового редактора Microsoft Word, позволяющая удаленному злоумышленнику вып… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00371 | Уязвимость пакета программ Microsoft Office Web Apps, позволяющая злоумышленнику выполнит… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00372 | Уязвимость текстового редактора Microsoft Word, позволяющего злоумышленнику выполнить про… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00374 | Уязвимость пакета программ Microsoft Office, позволяющая злоумышленнику выполнить произво… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00375 | Уязвимость текстового редактора Microsoft Word Viewer, позволяющая злоумышленнику выполни… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00376 | Уязвимость текстового редактора Microsoft Word, позволяющая злоумышленнику выполнить прои… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00377 | Уязвимость программного пакета Microsoft Office, позволяющая злоумышленнику выполнить про… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00378 | Уязвимость программного пакета Microsoft Office, позволяющая злоумышленнику выполнить про… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00379 | Уязвимость текстового редактора Microsoft Word, позволяющая злоумышленнику выполнить прои… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00380 | Уязвимость текстового редактора Microsoft Word, позволяющая злоумышленнику выполнить прои… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00381 | Уязвимость программного пакета Microsoft Office, позволяющая злоумышленнику выполнить про… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00383 | Уязвимость программного пакета Microsoft Office Web Apps, позволяющая удаленному злоумышл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00384 | Уязвимость программы управления проектами Microsoft Project, позволяющая удаленному злоум… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00385 | Уязвимость пакета программ Microsoft SharePoint, позволяющая удаленному нарушителю выполн… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00387 | Уязвимость программной платформы Oracle Fusion Middleware, позволяющая злоумышленнику обр… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00388 | Уязвимость программной платформы Oracle Fusion Middleware, позволяющая злоумышленнику ото… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00389 | Уязвимость программной платформы Oracle Fusion Middleware, позволяющая злоумышленнику вып… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00395 | Уязвимость цифровой системы автоматизации Emerson DeltaV, позволяющая злоумышленнику повы… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00396 | Уязвимость цифровой системы автоматизации Emerson DeltaV, позволяющая злоумышленнику полу… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00397 | Уязвимость сервера управления IP-адресами NameSurfer, позволяющая злоумышленнику внедрить… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00398 | Уязвимость сервера управления IP-адресами NameSurfer, позволяющая злоумышленнику получить… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00399 | Уязвимость сервера управления IP-адресами NameSurfer, позволяющая злоумышленнику получить… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00400 | Уязвимость сервера управления IP-адресами NameSurfer, позволяющая злоумышленнику выполнит… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00401 | Уязвимость микропрограммного обеспечения звена фотоэлектрической системы Solar-Log, позво… | 07.07.2016 | 28.11.2016 |
| bdu:2014-00402 | Уязвимость микропрограммного обеспечения звена фотоэлектрической системы Solar-Log, позво… | 07.07.2016 | 28.11.2016 |
| bdu:2014-00403 | Уязвимость системы управления веб-проектами 1С-Битрикс: Управление сайтом, позволяющая уд… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00404 | Уязвимость системы управления веб-проектами 1С-Битрикс: Управление сайтом, позволяющая зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00415 | Уязвимость файлового сервера SAP NetWeaver, позволяющая удаленному злоумышленнику получит… | 05.07.2016 | 28.11.2016 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2001-avi-130 | Vulnérabilité d'IGMP sous SGI Irix | 2001-10-26T00:00:00.000000 | 2001-10-26T00:00:00.000000 |
| certa-2001-avi-131 | Vulnérabilités du serveur Apache | 2001-10-26T00:00:00.000000 | 2001-10-26T00:00:00.000000 |
| certa-2001-avi-132 | Vulnérabilités de webalizer | 2001-10-26T00:00:00.000000 | 2001-10-26T00:00:00.000000 |
| certa-2001-avi-133 | Vulnérabilité de ufsrestore sous Solaris. | 2001-10-29T00:00:00.000000 | 2001-10-29T00:00:00.000000 |
| certa-2001-avi-134 | Multiples vulnérabilités dans le SGBD Oracle | 2001-10-31T00:00:00.000000 | 2001-10-31T00:00:00.000000 |
| certa-2001-avi-135 | Vulnérabilité dans sdiff | 2001-10-31T00:00:00.000000 | 2001-10-31T00:00:00.000000 |
| certa-2001-avi-136 | Vulnérabilités dans Oracle Label Security | 2001-10-31T00:00:00.000000 | 2001-10-31T00:00:00.000000 |
| certa-2001-avi-118 | Vulnérabilité dans login sous Linux | 2001-10-19T00:00:00.000000 | 2001-11-02T00:00:00.000000 |
| certa-2001-avi-137 | Vulnérabilité de UPnP sous Windows | 2001-11-06T00:00:00.000000 | 2001-11-06T00:00:00.000000 |
| certa-2001-avi-138 | Vulnérabilité des SYNCOOKIES dans le noyau Linux | 2001-11-07T00:00:00.000000 | 2001-11-07T00:00:00.000000 |
| certa-2001-avi-140 | Vulnérabilités dans Internet Explorer | 2001-11-15T00:00:00.000000 | 2001-11-15T00:00:00.000000 |
| certa-2001-avi-141 | Vulnérabilités de Lotus domino Server 5.x | 2001-11-15T00:00:00.000000 | 2001-11-15T00:00:00.000000 |
| certa-2001-avi-142 | Vulnérabilité des utilitaires 'ppp' | 2001-11-16T00:00:00.000000 | 2001-11-16T00:00:00.000000 |
| certa-2001-avi-143 | Vulnérabilité dans les routeurs Cisco | 2001-11-16T00:00:00.000000 | 2001-11-16T00:00:00.000000 |
| certa-2001-avi-089 | Vulnérabilités dans le service d'impression BSD | 2001-08-31T00:00:00.000000 | 2001-11-19T00:00:00.000000 |
| certa-2001-avi-144 | Vulnérabilités liées aux ACL dans les routeurs CISCO 12000 | 2001-11-20T00:00:00.000000 | 2001-11-20T00:00:00.000000 |
| certa-2001-avi-145 | Vulnérabilités dans le service d'impression lpsched sous IRIX | 2001-11-20T00:00:00.000000 | 2001-11-20T00:00:00.000000 |
| certa-2001-avi-146 | Vulnérabilité dans Windows Media Player | 2001-11-20T00:00:00.000000 | 2001-11-20T00:00:00.000000 |
| certa-2001-avi-124 | Vulnérabilités dans le noyau linux (2.2.x et 2.4.x) | 2001-10-23T00:00:00.000000 | 2001-11-22T00:00:00.000000 |
| certa-2001-avi-147 | Corruption de cache ARP des équipements CISCO | 2001-11-22T00:00:00.000000 | 2001-11-22T00:00:00.000000 |
| certa-2001-avi-148 | Vulnérabilité dans le service d'impression sous HP-UX | 2001-11-22T00:00:00.000000 | 2001-11-22T00:00:00.000000 |
| certa-2001-avi-149 | Vulnérabilités dans le package susehelp de SuSE | 2001-11-26T00:00:00.000000 | 2001-11-26T00:00:00.000000 |
| certa-2001-avi-150 | Vulnérabilité du serveur Xsun sous Solaris | 2001-11-26T00:00:00.000000 | 2001-11-26T00:00:00.000000 |
| certa-2001-avi-151 | Vulnérabilité de Xview sous Solaris | 2001-11-26T00:00:00.000000 | 2001-11-26T00:00:00.000000 |
| certa-2001-avi-152 | Vulnérabilité de « patchadd » sous Solaris | 2001-11-26T00:00:00.000000 | 2001-11-26T00:00:00.000000 |
| certa-2001-avi-154 | Vulnérabilité de CBAC sous CISCO IOS | 2001-11-29T00:00:00.000000 | 2001-11-29T00:00:00.000000 |
| certa-2001-avi-010 | Multiples vulnérabilités dans le serveur DNS BIND | 2001-01-30T00:00:00.000000 | 2001-11-30T00:00:00.000000 |
| certa-2001-avi-155 | Vulnérabilités de Mailx sous Solaris | 2001-11-30T00:00:00.000000 | 2001-11-30T00:00:00.000000 |
| certa-2001-avi-156 | Fichiers temporaires mal sécurisés créés par divers shells | 2001-11-30T00:00:00.000000 | 2001-11-30T00:00:00.000000 |
| certa-2001-avi-153 | Vulnérabilité de wu-ftpd | 2001-11-29T00:00:00.000000 | 2001-12-03T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2015-ale-005 | Vulnérabilité dans Adobe Flash Player | 2015-07-08T00:00:00.000000 | 2015-07-10T00:00:00.000000 |
| certfr-2015-ale-006 | Vulnérabilité dans Adobe Flash Player | 2015-07-11T00:00:00.000000 | 2015-07-20T00:00:00.000000 |
| certfr-2015-ale-007 | Vulnérabilité dans Oracle Java SE | 2015-07-13T00:00:00.000000 | 2015-07-20T00:00:00.000000 |
| certfr-2015-ale-008 | Vulnérabilité dans le pilote de gestion des polices de caractères de Microsoft Windows | 2015-07-20T00:00:00.000000 | 2015-07-30T00:00:00.000000 |
| certfr-2015-ale-010 | Multiples vulnérabilités dans Google Android | 2015-07-28T00:00:00.000000 | 2015-10-06T00:00:00.000000 |
| certfr-2015-ale-011 | Vulnérabilité dans Adobe Flash Player | 2015-10-14T00:00:00.000000 | 2015-10-19T00:00:00.000000 |
| certfr-2015-ale-012 | Campagne de messages électroniques non sollicités de type Dridex | 2015-10-23T00:00:00.000000 | 2015-11-26T00:00:00.000000 |
| certfr-2015-ale-009 | Vulnérabilité dans Apple Mac OS X | 2015-07-24T00:00:00.000000 | 2015-12-22T00:00:00.000000 |
| certfr-2015-ale-015 | Campagne de messages électroniques non sollicités de type TeslaCrypt | 2015-12-21T00:00:00.000000 | 2016-03-10T00:00:00.000000 |
| certfr-2016-ale-001 | Campagne de messages électroniques non sollicités de type Locky | 2016-02-19T00:00:00.000000 | 2016-04-07T00:00:00.000000 |
| certfr-2016-ale-002 | Vulnérabilité dans Adobe Flash Player | 2016-04-06T00:00:00.000000 | 2016-04-08T00:00:00.000000 |
| certfr-2015-ale-014 | Vulnérabilité dans Juniper ScreenOS | 2015-12-18T00:00:00.000000 | 2016-04-11T00:00:00.000000 |
| certfr-2016-ale-003 | Vulnérabilité dans Adobe Flash Player | 2016-05-11T00:00:00.000000 | 2016-05-12T00:00:00.000000 |
| certfr-2016-ale-004 | Vulnérabilité dans Adobe Flash Player | 2016-06-15T00:00:00.000000 | 2016-06-16T00:00:00.000000 |
| certfr-2015-ale-013 | Vulnérabilité dans Joomla! | 2015-12-14T00:00:00.000000 | 2016-08-01T00:00:00.000000 |
| certfr-2016-ale-005 | Multiples vulnérabilités dans les pare-feux Cisco | 2016-08-18T00:00:00.000000 | 2016-09-05T00:00:00.000000 |
| certfr-2016-ale-007 | Vulnérabilité dans Cisco IOS, IOS XE et IOS XR | 2016-09-19T00:00:00.000000 | 2016-09-19T00:00:00.000000 |
| certfr-2016-ale-008 | Vulnérabilité dans Microsoft Windows | 2016-11-02T00:00:00.000000 | 2016-11-09T00:00:00.000000 |
| certfr-2016-ale-006 | Campagne de messages électroniques non sollicités de type Zepto/Odin | 2016-09-05T00:00:00.000000 | 2016-11-17T00:00:00.000000 |
| certfr-2016-ale-010 | Vulnérabilité dans les routeurs Netgear | 2016-12-13T00:00:00.000000 | 2016-12-26T00:00:00.000000 |
| certfr-2016-ale-009 | Campagne d'attaque contre des routeurs DSL | 2016-12-01T00:00:00.000000 | 2017-01-26T00:00:00.000000 |
| certfr-2017-ale-001 | Vulnérabilité dans Cisco WebEx | 2017-01-25T00:00:00.000000 | 2017-01-31T00:00:00.000000 |
| certfr-2017-ale-002 | Vulnérabilité dans Microsoft Windows | 2017-02-20T00:00:00.000000 | 2017-03-15T00:00:00.000000 |
| certfr-2017-ale-003 | Vulnérabilité dans les navigateurs Microsoft | 2017-02-27T00:00:00.000000 | 2017-03-15T00:00:00.000000 |
| certfr-2017-ale-006 | Multiples vulnérabilités dans SCADA Siemens RUGGEDCOM ROX I | 2017-03-29T00:00:00.000000 | 2017-03-29T00:00:00.000000 |
| certfr-2017-ale-007 | Vulnérabilité dans Microsoft Office | 2017-04-10T00:00:00.000000 | 2017-04-12T00:00:00.000000 |
| certfr-2017-ale-004 | Vulnérabilité dans Apache Struts | 2017-03-10T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| certfr-2017-ale-005 | Vulnérabilité dans les commutateurs Cisco | 2017-03-20T00:00:00.000000 | 2017-05-10T00:00:00.000000 |
| certfr-2017-ale-009 | Vulnérabilité dans Microsoft Malware Protection Engine | 2017-05-09T00:00:00.000000 | 2017-05-15T00:00:00.000000 |
| certfr-2017-ale-010 | Propagation d'un rançongiciel exploitant les vulnérabilités MS17-010 | 2017-05-12T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-144 | Heap-use-after-free in int arrow::BitUtil::BitReader::GetBatch<short> | 2020-06-24T01:51:16.108113Z | 2022-04-13T03:04:31.872314Z |
| osv-2021-1192 | Segv on unknown address in arrow::DefaultBackend | 2021-09-02T00:01:47.797383Z | 2022-04-13T03:04:31.877586Z |
| osv-2020-63 | UNKNOWN READ in arrow::BaseBinaryBuilder<arrow::BinaryType>::UnsafeAppend | 2020-06-24T01:51:12.364400Z | 2022-04-13T03:04:31.882807Z |
| osv-2020-109 | UNKNOWN READ in arrow::BufferBuilder::Append | 2020-06-24T01:51:14.472718Z | 2022-04-13T03:04:31.888090Z |
| osv-2020-917 | Heap-buffer-overflow in arrow::Status arrow::VisitArrayInline<arrow::internal::ValidateArrayVisitor> | 2020-07-22T00:00:06.823071Z | 2022-04-13T03:04:31.893536Z |
| osv-2020-1058 | Heap-buffer-overflow in arrow::UnionType::UnionType | 2020-07-22T21:49:43.983439Z | 2022-04-13T03:04:31.899224Z |
| osv-2020-1327 | UNKNOWN READ in arrow::Status arrow::VisitArrayInline<arrow::internal::ValidateArrayDataVisitor> | 2020-07-22T21:50:06.904891Z | 2022-04-13T03:04:31.904776Z |
| osv-2020-1266 | UNKNOWN READ in arrow::Array::IsNull | 2020-07-22T21:50:01.820417Z | 2022-04-13T03:04:31.910847Z |
| osv-2020-1228 | Heap-use-after-free in arrow::internal::CountSetBits | 2020-07-22T21:49:58.406648Z | 2022-04-13T03:04:31.916896Z |
| osv-2020-2154 | Heap-buffer-overflow in void arrow::internal::TransferBitmap< | 2020-11-15T22:33:33.533893Z | 2022-04-13T03:04:31.922252Z |
| osv-2020-180 | Heap-buffer-overflow in parquet::PlainByteArrayDecoder::DecodeArrowDense | 2020-06-24T01:51:17.681643Z | 2022-04-13T03:04:31.927524Z |
| osv-2020-174 | Heap-buffer-overflow in int arrow::BitUtil::BitReader::GetBatch<short> | 2020-06-24T01:51:17.409834Z | 2022-04-13T03:04:31.932877Z |
| osv-2020-758 | Heap-buffer-overflow in void arrow::internal::TransferBitmap< | 2020-07-09T00:00:16.162262Z | 2022-04-13T03:04:31.938186Z |
| osv-2021-1189 | Segv on unknown address in arrow::DefaultBackend | 2021-09-02T00:00:11.313252Z | 2022-04-13T03:04:31.943435Z |
| osv-2020-1352 | Heap-buffer-overflow in arrow::Status arrow::internal::ValidateArrayVisitor::ValidateListArray<arrow::Li | 2020-07-22T21:50:08.733370Z | 2022-04-13T03:04:31.948799Z |
| osv-2020-187 | UNKNOWN READ in arrow::ipc::MessageDecoder::MessageDecoderImpl::ConsumeDataBufferInt32 | 2020-06-24T01:51:18.041219Z | 2022-04-13T03:04:31.954408Z |
| osv-2020-776 | Negative-size-param in arrow::ConcatenateBuffers | 2020-07-14T05:37:29.441412Z | 2022-04-13T03:04:31.959785Z |
| osv-2020-2122 | Heap-buffer-overflow in void parquet::internal::DefRepLevelsToListInfo<int> | 2020-11-02T00:00:35.960641Z | 2022-04-13T03:04:31.965135Z |
| osv-2020-21 | UNKNOWN WRITE in arrow::internal::unpack32 | 2020-06-24T01:51:10.547779Z | 2022-04-13T03:04:31.970546Z |
| osv-2020-115 | UNKNOWN WRITE in arrow::BaseBinaryBuilder<arrow::BinaryType>::UnsafeAppend | 2020-06-24T01:51:14.744320Z | 2022-04-13T03:04:31.975799Z |
| osv-2020-936 | Global-buffer-overflow in arrow::Status arrow::VisitArrayInline<arrow::internal::ValidateArrayDataVisitor> | 2020-07-22T00:00:15.065970Z | 2022-04-13T03:04:31.981199Z |
| osv-2020-911 | Heap-buffer-overflow in arrow::Status arrow::ConcatenateOffsets<int> | 2020-07-21T00:00:27.530378Z | 2022-04-13T03:04:31.986646Z |
| osv-2020-86 | Heap-buffer-overflow in bool arrow::util::RleDecoder::NextCounts<int> | 2020-06-24T01:51:13.440194Z | 2022-04-13T03:04:31.991977Z |
| osv-2020-52 | Heap-buffer-overflow in int arrow::util::RleDecoder::GetBatchWithDictSpaced<double> | 2020-06-24T01:51:11.907364Z | 2022-04-13T03:04:31.997317Z |
| osv-2020-1842 | Heap-buffer-overflow in parquet::arrow::SchemaManifest::Make | 2020-09-26T00:00:04.850649Z | 2022-04-13T03:04:32.002917Z |
| osv-2020-1047 | UNKNOWN READ in arrow::ipc::internal::FieldFromFlatbuffer | 2020-07-22T21:49:42.853693Z | 2022-04-13T03:04:32.008566Z |
| osv-2020-1170 | Heap-buffer-overflow in arrow::internal::CountSetBits | 2020-07-22T21:49:52.928701Z | 2022-04-13T03:04:32.014023Z |
| osv-2020-125 | Negative-size-param in parquet::PlainByteArrayDecoder::DecodeArrowDense | 2020-06-24T01:51:15.244409Z | 2022-04-13T03:04:32.019256Z |
| osv-2020-34 | UNKNOWN READ in parquet::LevelDecoder::SetData | 2020-06-24T01:51:11.146400Z | 2022-04-13T03:04:32.024330Z |
| osv-2021-1592 | Heap-buffer-overflow in arrow::internal::ValidateArrayImpl::Visit | 2021-11-20T00:00:17.804875Z | 2022-04-13T03:04:32.029669Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2020-0015 | Crash causing Denial of Service attack | 2020-04-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0017 | Use after free in ArcIntern::drop | 2020-05-28T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0019 | tokio-rustls reads may cause excessive memory usage | 2020-05-19T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0021 | rio allows a use-after-free buffer access when a future is leaked | 2020-05-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0022 | Ozone contains several memory safety issues | 2020-07-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0023 | Lifetime boundary for `raw_slice` and `raw_slice_mut` are incorrect | 2020-02-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0025 | bigint is unmaintained, use uint instead | 2020-05-07T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0026 | linked-hash-map creates uninitialized NonNull pointer | 2020-06-23T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0027 | traitobject assumes the layout of fat pointers | 2020-06-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0028 | `LocalRequest::clone` creates multiple mutable references to the same object | 2020-05-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0029 | Allows viewing and modifying arbitrary structs as bytes | 2020-06-14T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0030 | Missing sanitization in mozwire allows local file overwrite of files ending in .conf | 2020-08-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0031 | HTTP Request smuggling through malformed Transfer Encoding headers | 2020-06-16T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0032 | StrcCtx deallocates a memory region that it doesn't own | 2020-08-20T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0033 | Matrix::new() drops uninitialized memory | 2020-08-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0034 | Multiple security issues including data race, buffer overflow, and uninitialized memory drop | 2020-08-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0035 | Chunk API does not respect align requirement | 2020-08-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0037 | Misbehaving `HandleLike` implementation can lead to memory safety violation | 2020-08-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0038 | Memory safety issues in `compact::Vec` | 2020-09-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0039 | `index()` allows out-of-bound read and `remove()` has off-by-one error | 2020-09-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0040 | Obstack generates unaligned references | 2020-09-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0041 | Multiple soundness issues in Chunk and InlineArray | 2020-09-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0042 | Missing check in ArrayVec leads to out-of-bounds write. | 2020-09-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0043 | Insufficient size checks in outgoing buffer in ws allows remote attacker to run the process out of memory | 2020-09-25T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0044 | Unsafe Send implementation in Atom allows data races | 2020-09-21T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0045 | bespoke Cell implementation allows obtaining several mutable references to the same data | 2020-01-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0046 | bespoke Cell implementation allows obtaining several mutable references to the same data | 2020-01-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0047 | array_queue pop_back() may cause a use-after-free | 2020-09-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0048 | Use-after-free in BodyStream due to lack of pinning | 2020-01-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0049 | Use-after-free in Framed due to lack of pinning | 2020-01-30T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2021:4396 | Moderate: sqlite security update | 2021-11-09T09:16:47Z | 2021-11-12T10:20:56Z |
| alsa-2021:4451 | Moderate: gnutls and nettle security, bug fix, and enhancement update | 2021-11-09T09:23:20Z | 2021-11-12T10:20:56Z |
| alsa-2021:4455 | Low: python-pip security update | 2021-11-09T09:24:55Z | 2021-11-12T10:20:56Z |
| alsa-2021:4489 | Low: rpm security, bug fix, and enhancement update | 2021-11-09T09:32:33Z | 2021-11-12T10:20:56Z |
| alsa-2021:4517 | Moderate: vim security update | 2021-11-09T13:22:45Z | 2021-11-12T10:20:56Z |
| alsa-2021:3253 | Important: libsndfile security update | 2021-08-24T07:29:56Z | 2021-11-12T10:21:01Z |
| alsa-2021:4172 | Moderate: qt5 security, bug fix, and enhancement update | 2021-11-09T08:31:20Z | 2021-11-12T10:21:01Z |
| alsa-2021:4173 | Moderate: exiv2 security, bug fix, and enhancement update | 2021-11-09T08:31:22Z | 2021-11-12T10:21:01Z |
| alsa-2021:4235 | Moderate: jasper security update | 2021-11-09T08:48:32Z | 2021-11-12T10:21:01Z |
| alsa-2021:4241 | Moderate: libtiff security and bug fix update | 2021-11-09T08:50:38Z | 2021-11-12T10:21:01Z |
| alsa-2021:4251 | Moderate: openjpeg2 security update | 2021-11-09T08:51:11Z | 2021-11-12T10:21:01Z |
| alsa-2021:4256 | Moderate: graphviz security update | 2021-11-09T08:52:05Z | 2021-11-12T10:21:01Z |
| alsa-2021:4288 | Moderate: libjpeg-turbo security and bug fix update | 2021-11-09T08:56:07Z | 2021-11-12T10:21:01Z |
| alsa-2021:4316 | Low: zziplib security update | 2021-11-09T08:59:11Z | 2021-11-12T10:21:01Z |
| alsa-2021:4325 | Moderate: lasso security and enhancement update | 2021-11-09T09:01:05Z | 2021-11-12T10:21:01Z |
| alsa-2021:4339 | Moderate: grilo security update | 2021-11-09T09:02:57Z | 2021-11-12T10:21:01Z |
| alsa-2021:4356 | Moderate: kernel security, bug fix, and enhancement update | 2021-11-09T09:08:02Z | 2021-11-12T10:21:01Z |
| alsa-2021:4358 | Moderate: glibc security, bug fix, and enhancement update | 2021-11-09T09:08:59Z | 2021-11-12T10:21:01Z |
| alsa-2021:4361 | Moderate: NetworkManager security, bug fix, and enhancement update | 2021-11-09T09:11:14Z | 2021-11-12T10:21:01Z |
| alsa-2021:4374 | Moderate: file security update | 2021-11-09T09:13:30Z | 2021-11-12T10:21:01Z |
| alsa-2021:4381 | Moderate: GNOME security, bug fix, and enhancement update | 2021-11-09T09:15:15Z | 2021-11-12T10:21:01Z |
| alsa-2021:4382 | Moderate: json-c security and bug fix update | 2021-11-09T13:10:09Z | 2021-11-12T10:21:01Z |
| alsa-2021:4385 | Moderate: glib2 security and bug fix update | 2021-11-09T09:16:02Z | 2021-11-12T10:21:01Z |
| alsa-2021:4386 | Low: gcc security and bug fix update | 2021-11-09T09:16:05Z | 2021-11-12T10:21:01Z |
| alsa-2021:4408 | Low: libsolv security and bug fix update | 2021-11-09T09:18:39Z | 2021-11-12T10:21:01Z |
| alsa-2021:4464 | Moderate: dnf security and bug fix update | 2021-11-09T09:25:37Z | 2021-11-12T10:21:01Z |
| alsa-2021:4510 | Low: lua security update | 2021-11-09T09:37:44Z | 2021-11-12T10:21:01Z |
| alsa-2021:4519 | Moderate: autotrace security update | 2021-11-09T09:40:34Z | 2021-11-12T10:21:01Z |
| alsa-2021:4526 | Important: mingw-glib2 security, bug fix, and enhancement update | 2021-11-09T09:43:49Z | 2021-11-12T10:21:01Z |
| alsa-2021:4139 | Moderate: resource-agents security, bug fix, and enhancement update | 2021-11-09T08:20:04Z | 2021-11-12T10:21:02Z |