Recent vulnerabilities
| ID | CVSS | Description | Vendor | Product | Published | Updated |
|---|---|---|---|---|---|---|
| CVE-2010-2303 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-1772. Reason: This candidate is a duplicate of CVE-2010-1772. Notes: All CVE users should reference CVE-2010-1772 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2010-06-15T17:48:00.000Z | 2010-09-28T09:00:00.000Z |
| CVE-2010-2304 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-1773. Reason: This candidate is a duplicate of CVE-2010-1773. Notes: All CVE users should reference CVE-2010-1773 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2010-06-15T17:48:00.000Z | 2010-09-28T09:00:00.000Z |
| CVE-2010-3408 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-1823. Reason: This candidate is a duplicate of CVE-2010-1823. Notes: All CVE users should reference CVE-2010-1823 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2010-09-16T20:00:00.000Z | 2010-09-28T09:00:00.000Z |
| CVE-2010-3409 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-1824. Reason: This candidate is a duplicate of CVE-2010-1824. Notes: All CVE users should reference CVE-2010-1824 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2010-09-16T20:00:00.000Z | 2010-09-28T09:00:00.000Z |
| CVE-2010-3410 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-1825. Reason: This candidate is a duplicate of CVE-2010-1825. Notes: All CVE users should reference CVE-2010-1825 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2010-09-16T20:00:00.000Z | 2010-09-28T09:00:00.000Z |
| CVE-2010-3278 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-3110. Reason: This candidate is a reservation duplicate of CVE-2010-3110. Notes: All CVE users should reference CVE-2010-3110 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2010-09-10T17:00:00.000Z | 2010-10-14T09:00:00.000Z |
| CVE-2010-3885 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-3227. Reason: This candidate is a duplicate of CVE-2010-3227. Notes: All CVE users should reference CVE-2010-3227 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2010-10-08T21:00:00.000Z | 2010-10-28T09:00:00.000Z |
| CVE-2010-4200 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-4008. Reason: This candidate is a duplicate of CVE-2010-4008. Notes: All CVE users should reference CVE-2010-4008 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2010-11-05T22:00:00.000Z | 2010-11-18T10:00:00.000Z |
| CVE-2010-4501 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-4334. Reason: This candidate is a duplicate of CVE-2010-4334. Notes: All CVE users should reference CVE-2010-4334 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2010-12-08T19:00:00.000Z | 2011-01-19T10:00:00.000Z |
| CVE-2011-1057 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-1056. Reason: This candidate is a duplicate of CVE-2011-1056. Notes: All CVE users should reference CVE-2011-1056 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2011-02-21T20:00:00.000Z | 2011-03-11T10:00:00.000Z |
| CVE-2004-2770 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-3389. Reason: This candidate is a duplicate of CVE-2011-3389. Notes: All CVE users should reference CVE-2011-3389 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2011-09-25T14:00:00.000Z | 2011-09-29T13:00:00.000Z |
| CVE-2011-3867 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-2998. Reason: This candidate is a duplicate of CVE-2011-2998. Notes: All CVE users should reference CVE-2011-2998 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2011-09-29T00:00:00.000Z | 2011-10-01T09:00:00.000Z |
| CVE-2011-2708 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-2710. Reason: This candidate is a duplicate of CVE-2011-2710. Notes: All CVE users should reference CVE-2011-2710 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2011-11-23T11:00:00.000Z | 2011-12-13T10:00:00.000Z |
| CVE-2011-4331 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4110. Reason: This candidate is a duplicate of CVE-2011-4110. Notes: All CVE users should reference CVE-2011-4110 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2011-11-23T11:00:00.000Z | 2011-12-13T10:00:00.000Z |
| CVE-2012-1544 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-1876. Reason: This candidate is a duplicate of CVE-2012-1876. Notes: All CVE users should reference CVE-2012-1876 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2012-03-09T11:00:00.000Z | 2012-06-15T09:00:00.000Z |
| CVE-2012-2639 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4940. Reason: This candidate is a reservation duplicate of CVE-2011-4940. Notes: All CVE users should reference CVE-2011-4940 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2012-06-26T10:00:00.000Z | 2012-06-28T09:00:00.000Z |
| CVE-2012-3801 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-2704. Reason: This candidate is a duplicate of CVE-2012-2704. Notes: All CVE users should reference CVE-2012-2704 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2012-06-27T00:00:00.000Z | 2012-08-13T09:00:00.000Z |
| CVE-2012-4166 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-4165. Reason: This candidate is a duplicate of CVE-2012-4165. Notes: All CVE users should reference CVE-2012-4165 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2012-08-21T23:00:00.000Z | 2012-09-05T09:00:00.000Z |
| CVE-2009-2259 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2009-2608. Reason: This candidate is a duplicate of CVE-2009-2608. Notes: All CVE users should reference CVE-2009-2608 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2009-06-30T10:00:00.000Z | 2012-09-13T09:00:00.000Z |
| CVE-2012-5311 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-0227. Reason: This candidate is a duplicate of CVE-2012-0227. Notes: All CVE users should reference CVE-2012-0227 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2012-10-08T17:00:00.000Z | 2012-10-16T09:00:00.000Z |
| CVE-2004-9999 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate has been used as a placeholder by multiple organizations for multiple issues, but it is invalid. Notes: All CVE users should search CVE for the proper identifier. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2005-02-12T10:00:00.000Z | 2012-10-16T13:00:00.000Z |
| CVE-2011-5231 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-0023. Reason: This candidate is a duplicate of CVE-2012-0023. Notes: All CVE users should reference CVE-2012-0023 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2012-10-25T17:00:00.000Z | 2012-11-01T09:00:00.000Z |
| CVE-2011-5232 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-0025. Reason: This candidate is a duplicate of CVE-2012-0025. Notes: All CVE users should reference CVE-2012-0025 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2012-10-25T17:00:00.000Z | 2012-11-06T10:00:00.000Z |
| CVE-2007-1783 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2007-1685. Reason: This candidate is a duplicate of CVE-2007-1685. Notes: All CVE users should reference CVE-2007-1685 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2011-02-24T20:00:00.000Z | 2012-11-06T15:00:00.000Z |
| CVE-2013-1622 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is not a security issue. Further investigation showed that, because of RFC noncompliance, no version or configuration of the product had the vulnerability previously associated with this ID. Notes: none | N/A | N/A | 2013-02-08T19:00:00.000Z | 2013-02-13T10:00:00.000Z |
| CVE-2013-1175 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This issue was announced by the vendor and later withdrawn because it was not a vulnerability. Notes: none | N/A | N/A | 2013-05-16T01:00:00.000Z | 2013-06-04T09:00:00.000Z |
| CVE-2013-5903 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-5093, CVE-2013-5942, CVE-2013-5943. Reason: This candidate is a duplicate of CVE-2013-5093, CVE-2013-5942, and CVE-2013-5943. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2013-5093, CVE-2013-5942, and/or CVE-2013-5943 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2013-09-23T19:00:00.000Z | 2013-09-28T09:00:00.000Z |
| CVE-2013-3611 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2013-09-24T10:00:00.000Z | 2013-10-11T09:00:00.000Z |
| CVE-2012-3977 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-4930. Reason: This candidate is a duplicate of CVE-2012-4930. Notes: All CVE users should reference CVE-2012-4930 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage | N/A | N/A | 2012-10-09T10:00:00.000Z | 2013-11-02T09:00:00.000Z |
| CVE-2013-6377 |
N/A
|
DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none | N/A | N/A | 2013-11-22T11:00:00.000Z | 2013-11-23T18:10:04.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| fkie_cve-2005-1032 | Rejected reason: cart.php in LiteCommerce might allow remote attackers to obtain sensitive informat… | 2005-04-06T04:00:00.000 | 2023-11-07T01:57:22.120 |
| fkie_cve-2005-1044 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0941. Reason: This candid… | 2005-05-02T04:00:00.000 | 2023-11-07T01:57:22.253 |
| fkie_cve-2005-1271 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1343. Reason: This candid… | 2005-05-12T04:00:00.000 | 2023-11-07T01:57:24.410 |
| fkie_cve-2005-1277 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1766. Reason: This candid… | 2005-06-28T04:00:00.000 | 2023-11-07T01:57:24.463 |
| fkie_cve-2005-1334 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1579. Reason: This candid… | 2005-06-03T04:00:00.000 | 2023-11-07T01:57:24.893 |
| fkie_cve-2005-1389 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0175. Reason: This candid… | 2005-05-03T04:00:00.000 | 2023-11-07T01:57:25.300 |
| fkie_cve-2005-1390 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-0174. Reason: This candid… | 2005-05-03T04:00:00.000 | 2023-11-07T01:57:25.337 |
| fkie_cve-2005-1690 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1250. Reason: This candid… | 2005-06-30T04:00:00.000 | 2023-11-07T01:57:27.843 |
| fkie_cve-2005-1731 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.307 | 2023-11-07T01:57:28.177 |
| fkie_cve-2005-1844 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.337 | 2023-11-07T01:57:29.410 |
| fkie_cve-2005-1845 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.353 | 2023-11-07T01:57:29.647 |
| fkie_cve-2005-1860 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.387 | 2023-11-07T01:57:30.260 |
| fkie_cve-2005-1861 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.400 | 2023-11-07T01:57:30.483 |
| fkie_cve-2005-1862 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.433 | 2023-11-07T01:57:30.713 |
| fkie_cve-2005-1863 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.447 | 2023-11-07T01:57:30.933 |
| fkie_cve-2005-1912 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1841. Reason: This candid… | 2005-07-07T04:00:00.000 | 2023-11-07T01:57:31.540 |
| fkie_cve-2005-1919 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was w… | 2005-12-31T05:00:00.000 | 2023-11-07T01:57:31.810 |
| fkie_cve-2005-1938 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1250. Reason: This candid… | 2005-06-30T04:00:00.000 | 2023-11-07T01:57:32.190 |
| fkie_cve-2005-1958 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1855. Reason: This candid… | 2005-06-07T04:00:00.000 | 2023-11-07T01:57:32.347 |
| fkie_cve-2005-2116 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1921. Reason: This candid… | 2005-07-05T04:00:00.000 | 2023-11-07T01:57:34.117 |
| fkie_cve-2005-2133 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1915. Reason: This candid… | 2005-07-05T04:00:00.000 | 2023-11-07T01:57:34.290 |
| fkie_cve-2005-2303 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-1218. Reason: This candid… | 2005-07-19T04:00:00.000 | 2023-11-07T01:57:35.657 |
| fkie_cve-2005-2345 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.480 | 2023-11-07T01:57:36.063 |
| fkie_cve-2005-2348 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.497 | 2023-11-07T01:57:36.280 |
| fkie_cve-2005-2355 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2335, CVE-2005-2356. Reas… | 2005-07-25T04:00:00.000 | 2023-11-07T01:57:36.537 |
| fkie_cve-2005-2408 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual … | 2017-05-11T14:29:02.527 | 2023-11-07T01:57:37.213 |
| fkie_cve-2005-2418 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2403. Reason: This candid… | 2005-08-03T04:00:00.000 | 2023-11-07T01:57:37.500 |
| fkie_cve-2005-2446 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2369. Reason: This candid… | 2005-08-03T04:00:00.000 | 2023-11-07T01:57:37.743 |
| fkie_cve-2005-2447 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2005-2370. Reason: This candid… | 2005-08-03T04:00:00.000 | 2023-11-07T01:57:37.780 |
| fkie_cve-2005-2493 | Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in … | 2021-06-11T22:15:08.453 | 2023-11-07T01:57:38.347 |
| ID | Severity | Description | Published | Updated |
|---|---|---|---|---|
| ghsa-2xwv-3cc9-fp7c |
|
Sensitive Data Exposure in seneca | 2019-09-11T23:07:57Z | 2020-08-31T18:49:15Z |
| ghsa-88h9-fc6v-jcw7 |
|
Unintended Require in larvitbase-www | 2020-09-03T20:28:51Z | 2020-08-31T18:49:17Z |
| ghsa-p62r-jf56-h429 |
|
Malicious Package in evil-package | 2020-09-03T20:29:58Z | 2020-08-31T18:49:31Z |
| ghsa-hvxq-j2r4-4jm8 |
|
Regular Expression Denial of Service in sql-injection | 2020-09-03T20:31:04Z | 2020-08-31T18:49:33Z |
| ghsa-4rgj-8mq3-hggj |
|
Denial of Service in @hapi/subtext | 2020-09-03T20:32:11Z | 2020-08-31T18:49:38Z |
| ghsa-fvwr-h9xh-m6wc |
|
Denial of Service in @commercial/subtext | 2020-09-03T20:33:17Z | 2020-08-31T18:49:40Z |
| ghsa-hv4w-jhcj-6wfw |
|
Cross-Site Scripting in snekserve | 2020-09-03T20:34:23Z | 2020-08-31T18:49:43Z |
| ghsa-v4x8-gw49-7hv4 |
|
Path Traversal in swagger-injector | 2020-09-03T20:37:42Z | 2020-08-31T18:49:54Z |
| ghsa-4x7w-frcq-v4m3 |
|
Path Traversal in @wturyn/swagger-injector | 2020-09-03T20:38:47Z | 2020-08-31T18:49:56Z |
| ghsa-pv6r-vchh-cxg9 |
|
Denial of Service in apostrophe | 2020-09-03T20:42:09Z | 2020-08-31T18:50:15Z |
| ghsa-xgp2-cc4r-7vf6 |
|
Denial of Service in http-live-simulator | 2020-09-03T20:44:21Z | 2020-08-31T18:50:28Z |
| ghsa-chh2-rvhg-wqwr |
|
Malicious Package in json-serializer | 2020-09-03T21:02:10Z | 2020-08-31T18:50:40Z |
| ghsa-mh5c-679w-hh4r |
|
Denial of Service in mongodb | 2020-09-03T21:12:01Z | 2020-08-31T18:51:01Z |
| ghsa-q3w9-g74q-vp5f |
|
Denial of Service in express-fileupload | 2020-09-03T21:14:12Z | 2020-08-31T18:51:13Z |
| ghsa-876r-hj45-fw7g |
|
Sandbox Breakout / Arbitrary Code Execution in safer-eval | 2020-09-03T21:18:41Z | 2020-08-31T18:51:25Z |
| ghsa-f52g-6jhx-586p |
|
Denial of Service in handlebars | 2020-09-03T23:20:12Z | 2020-08-31T18:54:21Z |
| ghsa-j27j-4w6m-8fc4 |
|
Path Traversal in statics-server | 2020-03-31T17:02:12Z | 2020-08-31T18:54:26Z |
| ghsa-jrj9-5qp6-2v8q |
|
Machine-In-The-Middle in airtable | 2020-09-03T23:22:19Z | 2020-08-31T18:54:28Z |
| ghsa-c3hq-7mxh-mqxf |
|
Sandbox Breakout / Arbitrary Code Execution in lighter-vm | 2020-09-04T14:59:50Z | 2020-08-31T18:54:55Z |
| ghsa-jp99-5h8w-gmxc |
|
Sandbox Breakout / Arbitrary Code Execution in @zhaoyao91/eval-in-vm | 2020-09-04T15:03:13Z | 2020-08-31T18:55:02Z |
| ghsa-54qm-37qr-w5wq |
|
Sandbox Breakout / Arbitrary Code Execution in veval | 2020-09-04T15:04:20Z | 2020-08-31T18:55:05Z |
| ghsa-q2c6-c6pm-g3gh |
|
Arbitrary Code Execution in handlebars | 2020-09-04T15:07:38Z | 2020-08-31T18:55:11Z |
| ghsa-g9r4-xpmj-mj65 |
|
Prototype Pollution in handlebars | 2020-09-04T15:06:32Z | 2020-08-31T18:55:14Z |
| ghsa-g7h8-p22m-2rvx |
|
Prototype Pollution in flat-wrap | 2020-09-04T15:08:46Z | 2020-08-31T18:55:16Z |
| ghsa-6fh5-8wq8-w3wr |
|
Prototype Pollution in unflatten | 2020-09-04T15:09:55Z | 2020-08-31T18:55:18Z |
| ghsa-q9wr-gcjc-hq52 |
|
Prototype Pollution in reggae | 2020-09-04T15:12:13Z | 2020-08-31T18:55:23Z |
| ghsa-ch82-gqh6-9xj9 |
|
Prototype Pollution in get-setter | 2020-09-04T15:13:19Z | 2020-08-31T18:55:25Z |
| ghsa-9qrg-h9g8-c65q |
|
Prototype Pollution in deep-setter | 2020-09-04T15:14:26Z | 2020-08-31T18:55:28Z |
| ghsa-8j49-49jq-vwcq |
|
Prototype Pollution in getsetdeep | 2020-09-04T15:15:34Z | 2020-08-31T18:55:30Z |
| ghsa-qccf-q7p4-3q3j |
|
Prototype Pollution in safe-object2 | 2020-09-04T15:16:42Z | 2020-08-31T18:55:32Z |
| ID | Severity | Description | Package | Published | Updated |
|---|---|---|---|---|---|
| pysec-2020-45 |
|
An issue was discovered in OpenStack Horizon before 15.3.2, 16.x before 16.2.1, 17.x and … | horizon | 2020-12-04T08:15:00Z | 2021-03-09T15:08:00Z |
| pysec-2021-49 |
|
PySAML2 is a pure python implementation of SAML Version 2 Standard. PySAML2 before 6.5.0 … | pysaml2 | 2021-01-21T15:15:00Z | 2021-03-10T21:00:00Z |
| pysec-2021-44 |
|
Products.PluggableAuthService is a pluggable Zope authentication and authorization framew… | products-pluggableauthservice | 2021-03-08T21:15:00Z | 2021-03-12T13:22:00Z |
| pysec-2021-45 |
|
Products.PluggableAuthService is a pluggable Zope authentication and authorization framew… | products-pluggableauthservice | 2021-03-08T21:15:00Z | 2021-03-12T13:48:00Z |
| pysec-2021-43 |
|
Products.GenericSetup is a mini-framework for expressing the configured state of a Zope S… | products-genericsetup | 2021-03-09T01:15:00Z | 2021-03-12T18:05:00Z |
| pysec-2020-173 |
|
The pip package before 19.2 for Python allows Directory Traversal when a URL is given in … | pip | 2020-09-04T20:15:00Z | 2021-03-15T16:18:00Z |
| pysec-2021-60 |
|
Tenable for Jira Cloud is an open source project designed to pull Tenable.io vulnerabilit… | tenable-jira-cloud | 2021-03-10T22:15:00Z | 2021-03-18T20:38:00Z |
| pysec-2021-39 |
|
An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleD… | pillow | 2021-03-19T04:15:00Z | 2021-03-22T13:36:00Z |
| pysec-2021-38 |
|
An issue was discovered in Pillow before 8.1.1. The PDF parser allows a regular expressio… | pillow | 2021-03-19T04:15:00Z | 2021-03-22T14:03:00Z |
| pysec-2021-37 |
|
An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is an out-of-bound… | pillow | 2021-03-19T04:15:00Z | 2021-03-22T14:09:00Z |
| pysec-2021-36 |
|
An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is a negative-offs… | pillow | 2021-03-19T04:15:00Z | 2021-03-22T14:11:00Z |
| pysec-2021-70 |
|
In Pillow before 8.1.0, TiffDecode has a heap-based buffer overflow when decoding crafted… | pillow | 2021-01-12T09:15:00Z | 2021-03-22T15:48:00Z |
| pysec-2021-66 |
|
This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is … | jinja2 | 2021-02-01T20:15:00Z | 2021-03-22T16:34:00Z |
| pysec-2021-59 |
|
The urllib3 library 1.26.x before 1.26.4 for Python omits SSL certificate validation in s… | urllib3 | 2021-03-15T18:15:00Z | 2021-03-23T16:47:00Z |
| pysec-2021-42 |
|
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) be… | pillow | 2021-03-03T09:15:00Z | 2021-03-23T19:48:00Z |
| pysec-2021-40 |
|
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) be… | pillow | 2021-03-03T09:15:00Z | 2021-03-23T19:49:00Z |
| pysec-2021-41 |
|
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) be… | pillow | 2021-03-03T09:15:00Z | 2021-03-23T19:49:00Z |
| pysec-2020-96 |
|
A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it i… | pyyaml | 2020-03-24T15:15:00Z | 2021-03-26T02:44:00Z |
| pysec-2021-35 |
|
An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overfl… | pillow | 2021-03-19T04:15:00Z | 2021-03-26T14:06:00Z |
| pysec-2021-76 |
|
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. In aiohtt… | aiohttp | 2021-02-26T03:15:00Z | 2021-03-26T20:01:00Z |
| pysec-2019-4 |
|
In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13… | ansible | 2019-10-08T19:15:00Z | 2021-03-26T22:15:00Z |
| pysec-2021-31 |
|
OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web… | omero-web | 2021-03-23T16:15:00Z | 2021-03-27T01:59:00Z |
| pysec-2021-32 |
|
OMERO.web is open source Django-based software for managing microscopy imaging. OMERO.web… | omero-web | 2021-03-23T16:15:00Z | 2021-03-27T02:20:00Z |
| pysec-2020-104 |
|
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to t… | salt | 2020-11-06T08:15:00Z | 2021-03-30T13:29:00Z |
| pysec-2020-105 |
|
The TLS module within SaltStack Salt through 3002 creates certificates with weak file per… | salt | 2020-11-06T08:15:00Z | 2021-03-30T13:44:00Z |
| pysec-2020-106 |
|
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and to… | salt | 2020-11-06T08:15:00Z | 2021-03-30T13:48:00Z |
| pysec-2021-19 |
|
An XSS vulnerability was discovered in python-lxml's clean module versions before 4.6.3. … | lxml | 2021-03-21T05:15:00Z | 2021-03-30T18:47:00Z |
| pysec-2020-50 |
|
The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints… | jupyter-server | 2020-12-21T18:15:00Z | 2021-03-30T19:15:00Z |
| pysec-2020-62 |
|
A XSS vulnerability was discovered in python-lxml's clean module. The module's parser did… | lxml | 2020-12-03T17:15:00Z | 2021-03-30T21:15:00Z |
| pysec-2020-27 |
|
In Mozilla Bleach before 3.11, a mutation XSS affects users calling bleach.clean with nos… | bleach | 2020-03-24T22:15:00Z | 2021-03-30T22:15:00Z |
| ID | Description | Updated |
|---|---|---|
| gsd-2017-16792 | Stored cross-site scripting (XSS) vulnerability in "geminabox" (Gem in a Box) allows atta… | 2017-11-10T00:00:00.000Z |
| gsd-2017-7475 | Cairo version 1.15.4 is vulnerable to a NULL pointer dereference related to the FT_Load_G… | 2017-11-15T00:00:00.000Z |
| gsd-2017-1000248 | Redis-store <=v1.3.0 allows unsafe objects to be loaded from Redis via the use of the Mar… | 2017-11-16T00:00:00.000Z |
| gsd-2017-17042 | lib/yard/core_ext/file.rb in the server in YARD before 0.9.11 does not block relative pat… | 2017-11-28T00:00:00.000Z |
| gsd-2017-17718 | The Net::LDAP (aka net-ldap) gem before 0.16.0 for Ruby has Missing SSL Certificate Valid… | 2017-12-17T00:00:00.000Z |
| gsd-2018-5216 | Radiant CMS 1.1.4 has XSS via crafted Markdown input in the part_body_content parameter t… | 2018-01-04T00:00:00.000Z |
| gsd-2017-12097 | An exploitable cross site scripting (XSS) vulnerability exists in the filter functionalit… | 2018-01-10T00:00:00.000Z |
| gsd-2017-12098 | An exploitable cross site scripting (XSS) vulnerability exists in the add filter function… | 2018-01-10T00:00:00.000Z |
| gsd-2017-0889 | Paperclip gem provides multiple ways a file can be uploaded to a web server. The vulnerab… | 2018-01-23T00:00:00.000Z |
| gsd-2017-15412 | The version of libxml2 packaged with Nokogiri contains a vulnerability. Nokogiri has miti… | 2018-01-29T00:00:00.000Z |
| gsd-2017-16932 | The version of libxml2 packaged with Nokogiri contains a vulnerability. Nokogiri has miti… | 2018-01-29T00:00:00.000Z |
| gsd-2018-7212 | An issue was discovered in rack-protection 2.x before 2.0.1 on Windows. Path traversal is… | 2018-02-18T00:00:00.000Z |
| gsd-2018-7261 | There are multiple Persistent XSS vulnerabilities in Radiant CMS. They affect Personal Pr… | 2018-02-19T00:00:00.000Z |
| gsd-2018-1000088 | Stored XSS on the OAuth Client's name will cause users being prompted for consent via the… | 2018-02-21T00:00:00.000Z |
| gsd-2017-11428 | ruby-saml prior to version 1.7.0 is vulnerable to an authentication bypass via incorrect … | 2018-02-27T00:00:00.000Z |
| gsd-2017-11430 | OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM … | 2018-02-27T00:00:00.000Z |
| gsd-2018-1000119 | Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack… | 2018-03-07T00:00:00.000Z |
| gsd-2018-8048 | Loofah allows non-whitelisted attributes to be present in sanitized output when input wit… | 2018-03-16T00:00:00.000Z |
| gsd-2018-3740 | When Sanitize gem is used in combination with libxml2 >= 2.9.2, a specially crafted HTML … | 2018-03-19T00:00:00.000Z |
| gsd-2018-3741 | There is a possible XSS vulnerability in rails-html-sanitizer. The gem allows non-whitel… | 2018-03-22T00:00:00.000Z |
| gsd-2017-18258 | The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause … | 2018-04-13T00:00:00.000Z |
| gsd-2019-3881 | Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permission… | 2018-04-23T00:00:00.000Z |
| gsd-2018-1000539 | Ruby's OpenSSL bindings do not check the length of the supplied authentication tag when d… | 2018-04-30T00:00:00.000Z |
| gsd-2018-3759 | private_address_check ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use … | 2018-05-03T00:00:00.000Z |
| gsd-2018-3769 | When request on API contains the "format" parameter in GET, the input value of this param… | 2018-05-23T00:00:00.000Z |
| gsd-2018-11627 | Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parse… | 2018-05-31T00:00:00.000Z |
| gsd-2018-12026 | During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion … | 2018-06-12T00:00:00.000Z |
| gsd-2018-12029 | The file system access race condition allows for local privilege escalation and affects t… | 2018-06-12T00:00:00.000Z |
| gsd-2018-1000544 | rubyzip version 1.2.1 and earlier contains a Directory Traversal vulnerability in Zip::Fi… | 2018-06-14T00:00:00.000Z |
| gsd-2018-3760 | Specially crafted requests can be used to access files that exist on the filesystem that … | 2018-06-19T00:00:00.000Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| mal-2022-5059 | Malicious code in olx-hubot (npm) | 2022-06-02T10:38:35Z | 2022-06-02T10:38:36Z |
| mal-2022-7230 | Malicious code in wormhole-client (npm) | 2022-06-02T10:38:35Z | 2022-06-02T10:38:36Z |
| mal-2022-7231 | Malicious code in wormhole-icco (npm) | 2022-06-02T10:38:36Z | 2022-06-02T10:38:37Z |
| mal-2022-4465 | Malicious code in makerdao-governance-bot (npm) | 2022-06-02T10:38:36Z | 2022-06-02T10:38:41Z |
| mal-2022-6963 | Malicious code in volcan0x (npm) | 2022-06-02T10:38:35Z | 2022-06-02T10:38:41Z |
| mal-2022-4947 | Malicious code in npmbulabula (npm) | 2022-06-02T10:41:59Z | 2022-06-02T10:41:59Z |
| mal-2022-6909 | Malicious code in vfdp-ui-framework (npm) | 2022-06-02T10:43:40Z | 2022-06-02T10:43:41Z |
| mal-2022-168 | Malicious code in @chegg-me-components/header (npm) | 2022-06-02T10:47:20Z | 2022-06-02T10:47:20Z |
| mal-2022-200 | Malicious code in @design-components/customer (npm) | 2022-06-02T10:47:20Z | 2022-06-02T10:47:20Z |
| mal-2022-503 | Malicious code in @pixiv-vroid-hub/vroid-hub-viewer (npm) | 2022-06-02T10:47:20Z | 2022-06-02T10:47:20Z |
| mal-2022-7068 | Malicious code in web-excess (npm) | 2022-06-02T10:49:17Z | 2022-06-02T10:49:17Z |
| mal-2022-2770 | Malicious code in epic-ue-fonts (npm) | 2022-06-02T10:50:08Z | 2022-06-02T10:50:08Z |
| mal-2022-2524 | Malicious code in discordjs-selfbotjs (npm) | 2022-06-02T10:58:04Z | 2022-06-02T10:58:05Z |
| mal-2022-1998 | Malicious code in color-xzibit (npm) | 2022-06-02T10:58:54Z | 2022-06-02T10:58:55Z |
| mal-2022-6342 | Malicious code in stylis-ifl4 (npm) | 2022-06-02T11:02:35Z | 2022-06-02T11:02:36Z |
| mal-2022-1043 | Malicious code in api-token-admin (npm) | 2022-06-02T11:02:51Z | 2022-06-02T11:02:51Z |
| mal-2022-2379 | Malicious code in ddd-demo (npm) | 2022-06-08T08:19:30Z | 2022-06-08T08:19:30Z |
| mal-2022-2380 | Malicious code in ddd-demo2 (npm) | 2022-06-08T08:19:30Z | 2022-06-08T08:19:30Z |
| mal-2022-2381 | Malicious code in ddd-demo3 (npm) | 2022-06-08T08:19:45Z | 2022-06-08T08:19:54Z |
| mal-2022-2307 | Malicious code in d2l-rubric (npm) | 2022-06-08T08:33:40Z | 2022-06-08T08:33:41Z |
| mal-2022-2308 | Malicious code in d2l-rubric-polymer (npm) | 2022-06-08T08:33:40Z | 2022-06-08T08:33:41Z |
| mal-2022-4659 | Malicious code in mock-solc-0.6 (npm) | 2022-06-08T08:37:55Z | 2022-06-08T08:37:55Z |
| mal-2022-3749 | Malicious code in icepond (npm) | 2022-06-08T08:38:46Z | 2022-06-08T08:38:47Z |
| mal-2022-3868 | Malicious code in internal-scripts (npm) | 2022-06-08T08:38:46Z | 2022-06-08T08:38:47Z |
| mal-2022-2319 | Malicious code in dai-monorepo (npm) | 2022-06-08T08:39:19Z | 2022-06-08T08:39:19Z |
| mal-2022-6389 | Malicious code in sync-express (npm) | 2022-06-08T08:43:52Z | 2022-06-08T08:43:52Z |
| mal-2022-1490 | Malicious code in beachlean (npm) | 2022-06-08T08:43:53Z | 2022-06-08T08:43:53Z |
| mal-2022-2483 | Malicious code in discord-js-v13 (npm) | 2022-06-08T08:43:52Z | 2022-06-08T08:43:53Z |
| mal-2022-3815 | Malicious code in informationbadges (npm) | 2022-06-08T08:43:53Z | 2022-06-08T08:43:53Z |
| mal-2022-4719 | Malicious code in ms-2.0.0 (npm) | 2022-06-08T08:43:53Z | 2022-06-08T08:43:53Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| bit-gitlab-2020-13268 | 2024-03-06T11:23:12.820Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13269 | 2024-03-06T11:23:11.525Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13270 | 2024-03-06T11:23:10.258Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13271 | 2024-03-06T11:23:09.001Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13272 | 2024-03-06T11:23:07.764Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13273 | 2024-03-06T11:23:06.491Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13274 | 2024-03-06T11:23:05.224Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13275 | 2024-03-06T11:23:03.974Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13276 | 2024-03-06T11:23:02.719Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13277 | 2024-03-06T11:23:01.447Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13280 | 2024-03-06T11:23:00.208Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13281 | 2024-03-06T11:22:58.974Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13282 | 2024-03-06T11:22:57.722Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13283 | 2024-03-06T11:22:56.484Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13284 | 2024-03-06T11:22:55.215Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13285 | 2024-03-06T11:22:53.955Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13286 | 2024-03-06T11:22:52.654Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13287 | 2024-03-06T11:22:51.384Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13288 | 2024-03-06T11:22:50.137Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13289 | 2024-03-06T11:22:48.889Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13290 | 2024-03-06T11:22:47.645Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13291 | 2024-03-06T11:22:46.374Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13292 | 2024-03-06T11:22:45.050Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13293 | 2024-03-06T11:22:43.736Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13294 | 2024-03-06T11:22:42.497Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13296 | 2024-03-06T11:22:41.282Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13297 | 2024-03-06T11:22:40.028Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13298 | 2024-03-06T11:22:38.789Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13299 | 2024-03-06T11:22:37.550Z | 2025-04-03T14:40:37.652Z | |
| bit-gitlab-2020-13300 | 2024-03-06T11:22:36.290Z | 2025-04-03T14:40:37.652Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| drupal-contrib-2024-006 | 2024-01-24T15:54:55.000Z | 2025-02-20T18:38:32.000Z | |
| drupal-contrib-2024-005 | 2024-01-24T15:47:36.000Z | 2025-02-20T18:38:57.000Z | |
| drupal-contrib-2024-004 | 2024-01-24T15:45:49.000Z | 2025-02-20T18:39:20.000Z | |
| drupal-contrib-2024-003 | 2024-01-24T15:42:46.000Z | 2025-02-20T18:39:54.000Z | |
| drupal-contrib-2024-002 | 2024-01-10T18:00:05.000Z | 2025-02-20T18:40:20.000Z | |
| drupal-contrib-2024-020 | 2024-05-22T16:03:46.000Z | 2025-02-20T18:43:21.000Z | |
| drupal-contrib-2024-018 | 2024-04-24T14:23:34.000Z | 2025-02-20T18:44:08.000Z | |
| drupal-contrib-2024-017 | 2024-04-24T13:16:40.000Z | 2025-02-20T18:44:32.000Z | |
| drupal-contrib-2024-016 | 2024-03-27T17:16:26.000Z | 2025-02-20T19:08:34.000Z | |
| drupal-contrib-2024-015 | 2024-03-06T17:06:37.000Z | 2025-02-20T19:08:51.000Z | |
| drupal-contrib-2024-014 | 2024-02-28T18:36:35.000Z | 2025-02-20T19:09:20.000Z | |
| drupal-contrib-2024-012 | 2024-02-28T18:19:01.000Z | 2025-02-20T19:09:55.000Z | |
| drupal-contrib-2024-011 | 2024-02-28T18:14:40.000Z | 2025-02-20T19:10:16.000Z | |
| drupal-contrib-2024-030 | 2024-08-21T16:23:02.000Z | 2025-02-20T19:11:48.000Z | |
| drupal-contrib-2024-029 | 2024-08-07T17:36:15.000Z | 2025-02-20T19:12:05.000Z | |
| drupal-contrib-2024-028 | 2024-08-07T17:30:20.000Z | 2025-02-20T19:12:22.000Z | |
| drupal-contrib-2024-027 | 2024-08-07T17:19:30.000Z | 2025-02-20T19:12:37.000Z | |
| drupal-contrib-2024-026 | 2024-07-31T15:59:06.000Z | 2025-02-20T19:12:56.000Z | |
| drupal-contrib-2024-025 | 2024-06-05T16:45:02.000Z | 2025-02-20T19:13:15.000Z | |
| drupal-contrib-2024-024 | 2024-05-29T16:58:59.000Z | 2025-02-20T19:13:35.000Z | |
| drupal-contrib-2024-023 | 2024-05-29T16:52:42.000Z | 2025-02-20T19:13:53.000Z | |
| drupal-contrib-2024-022 | 2024-05-29T16:44:55.000Z | 2025-02-20T19:14:10.000Z | |
| drupal-contrib-2024-021 | 2024-05-22T16:21:55.000Z | 2025-02-20T19:14:35.000Z | |
| drupal-contrib-2024-039 | 2024-09-11T16:21:22.000Z | 2025-02-20T19:22:14.000Z | |
| drupal-contrib-2024-038 | 2024-09-04T16:20:17.000Z | 2025-02-20T19:22:30.000Z | |
| drupal-contrib-2024-037 | 2024-09-04T16:15:41.000Z | 2025-02-20T19:22:50.000Z | |
| drupal-contrib-2024-036 | 2024-09-04T15:42:05.000Z | 2025-02-20T19:23:09.000Z | |
| drupal-contrib-2024-035 | 2024-09-04T15:40:44.000Z | 2025-02-20T19:23:27.000Z | |
| drupal-contrib-2024-034 | 2024-09-04T15:35:55.000Z | 2025-02-20T19:23:44.000Z | |
| drupal-contrib-2024-033 | 2024-08-28T15:32:41.000Z | 2025-02-20T19:24:02.000Z |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| jvndb-2007-000701 | Cosminexus, Processing Kit for XML and Hitachi Developer's Kit for Java Buffer Overflow Vulnerabilities | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000702 | Cosminexus Developer's Kit for Java Buffer Overflow and Denial of Service Vulnerabilities | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000710 | Cosminexus Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000711 | TPBroker Denial of Service Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000712 | Cosminexus Agent Process Crash Vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000727 | Safari allows access from HTTP to HTTPS | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000729 | Aipo session fixation vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000730 | Webmin OS command injection vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000745 | PowerArchiver buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000779 | MouseoverDictionary vulnerable to arbitrary script execution | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000801 | NetCommons cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000802 | Lotus Domino cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000803 | Cross-site scripting vulnerability in updir.php in UPDIR.NET | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000804 | Sleipnir and Grani Bookmark Search vulnerable to arbitrary script execution | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000805 | RoundCube Webmail cross-site request forgery vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000806 | Feed2JS cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000807 | FileMaker cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000808 | Lhaplus buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000809 | SonicStage CP buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000810 | JP1/Cm2/Network Node Manager vulnerable to cross-site scripting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000811 | HttpLogger vulnerable to cross-site scripting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000812 | Cybozu Office denial of service (DoS) vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000813 | Multiple Cybozu products vulnerable to cross-site scripting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000814 | Multiple Cybozu products vulnerable to HTTP header injection | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000815 | Multiple Cybozu products vulnerable to cross-site scripting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000816 | Rainboard cross-site scripting vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000820 | Google Web Toolkit vulnerable to cross-site scripting | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000822 | WinAce buffer overflow vulnerability | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000823 | Cross-site scripting in Sun Java System Web Server and Sun Java System Web Proxy Server | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| jvndb-2007-000824 | GreaseKit and Creammonkey allows execution of userscript functions | 2008-05-21T00:00+09:00 | 2008-05-21T00:00+09:00 |
| ID | Description | Updated |
|---|
| ID | Description | Published | Updated |
|---|---|---|---|
| cnvd-2015-00186 | ManageEngine Desktop Central MSP远程代码执行漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00187 | Brother MFC-J4410DW打印机'url'参数存在多个跨站脚本漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00188 | TP-Link TL-WR840N 'Import Configuration'选项跨站请求伪造漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00189 | NotePad++缓冲区溢出漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2015-00190 | Spitfire CMS跨站脚本漏洞 | 2015-01-08 | 2015-01-09 |
| cnvd-2014-08580 | phpwind任意代码执行漏洞 | 2014-11-26 | 2015-01-10 |
| cnvd-2015-00149 | Absolut Engine跨站脚本漏洞 | 2015-01-06 | 2015-01-10 |
| cnvd-2015-00222 | OpenSSL dtls1_get_record函数拒绝服务漏洞 | 2015-01-09 | 2015-01-10 |
| cnvd-2015-00191 | SysAid On-Premise绝对路径遍历漏洞 | 2015-01-08 | 2015-01-12 |
| cnvd-2015-00192 | vBulletin跨站请求伪造漏洞 | 2015-01-08 | 2015-01-12 |
| cnvd-2015-00193 | WordPress插件Relevanssi跨站脚本漏洞 | 2015-01-08 | 2015-01-12 |
| cnvd-2015-00194 | NYU OpenSSO Integration重定向漏洞 | 2015-01-08 | 2015-01-12 |
| cnvd-2015-00195 | Installatron GQ File Manager SQL注入漏洞 | 2015-01-08 | 2015-01-12 |
| cnvd-2015-00196 | Zabbix 'chart_bar.php'存在多个SQL注入漏洞 | 2015-01-08 | 2015-01-12 |
| cnvd-2015-00197 | Mini-stream RM-MP3 Converter缓冲区溢出漏洞(CNVD-2015-00197) | 2015-01-08 | 2015-01-12 |
| cnvd-2015-00198 | VDG Security SENSE目录遍历漏洞 | 2015-01-08 | 2015-01-12 |
| cnvd-2015-00199 | ZfcUser 'redirect'参数跨站脚本漏洞 | 2015-01-09 | 2015-01-12 |
| cnvd-2015-00200 | PHP '/ext/opcache/zend_shared_alloc.c'内存错误引用拒绝服务漏洞 | 2015-01-09 | 2015-01-12 |
| cnvd-2015-00201 | Drupal Htaccess模块跨站请求伪造漏洞 | 2015-01-09 | 2015-01-12 |
| cnvd-2015-00202 | Drupal Context模块开放重定向漏洞 | 2015-01-09 | 2015-01-12 |
| cnvd-2015-00203 | Zurmo CRM存在多个跨站脚本漏洞 | 2015-01-09 | 2015-01-12 |
| cnvd-2015-00204 | WordPress插件Simple Sticky Footer存在多个跨站请求伪造漏洞 | 2015-01-08 | 2015-01-12 |
| cnvd-2015-00205 | Wireshark SMTP解析器'packet-smtp.c'远程拒绝服务漏洞 | 2015-01-09 | 2015-01-12 |
| cnvd-2015-00206 | Wireshark LPP解析器远程拒绝服务漏洞 | 2015-01-09 | 2015-01-12 |
| cnvd-2015-00207 | Wireshark WCCP解析器远程拒绝服务漏洞(CNVD-2015-00207) | 2015-01-09 | 2015-01-12 |
| cnvd-2015-00208 | Wireshark WCCP解析器远程拒绝服务漏洞(CNVD-2015-00208) | 2015-01-09 | 2015-01-12 |
| cnvd-2015-00209 | Wireshark DEC DNA Routing Protocol解析器远程拒绝服务漏洞 | 2015-01-09 | 2015-01-12 |
| cnvd-2015-00210 | Wireshark TLS/SSL解密拒绝服务漏洞 | 2015-01-09 | 2015-01-12 |
| cnvd-2015-00211 | OpenSSL 'dtls1_get_record()'函数空指针拒绝服务漏洞 | 2015-01-09 | 2015-01-12 |
| cnvd-2015-00212 | OpenSSL 'dtls1_buffer_record()'函数拒绝服务漏洞 | 2015-01-09 | 2015-01-12 |
| ID | Description | Published | Updated |
|---|---|---|---|
| bdu:2014-00416 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00417 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00418 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00419 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00421 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00423 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00424 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00425 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00426 | Уязвимость программной платформы JRockit, позволяющая удаленному злоумышленнику нарушить … | 05.07.2016 | 28.11.2016 |
| bdu:2014-00427 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00428 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00429 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00430 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00431 | Уязвимость программной платформы Jrockit, позволяющая удаленному злоумышленнику нарушить … | 05.07.2016 | 28.11.2016 |
| bdu:2014-00432 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00433 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00434 | Уязвимость средства разработки приложений Java Development Kit, позволяющая локальному по… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00435 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00436 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00438 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00439 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00440 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00442 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00444 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00445 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00446 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00448 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00450 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00451 | Уязвимость программной платформы Java Runtime Environment, позволяющая удаленному злоумыш… | 05.07.2016 | 28.11.2016 |
| bdu:2014-00452 | Уязвимость средства разработки приложений Java Development Kit, позволяющая удаленному зл… | 05.07.2016 | 28.11.2016 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certa-2001-avi-157 | Multiples vulnérabilités d'implémentations LDAP | 2001-12-03T00:00:00.000000 | 2001-12-03T00:00:00.000000 |
| certa-2001-avi-158 | Multiples vulnérabilités de l'agent dbsnmp du SGBD Oracle. | 2001-12-04T00:00:00.000000 | 2001-12-04T00:00:00.000000 |
| certa-2001-avi-107 | Vulnérabilité dans le service RPC ToolTalk | 2001-10-04T00:00:00.000000 | 2001-12-07T00:00:00.000000 |
| certa-2001-avi-159 | Risque de compromission locale avec OpenSSH | 2001-12-07T00:00:00.000000 | 2001-12-07T00:00:00.000000 |
| certa-2001-avi-160 | Vulnérabilité d'OWA dans Microsoft Exchange 5.5 | 2001-12-07T00:00:00.000000 | 2001-12-07T00:00:00.000000 |
| certa-2001-avi-162 | Déni de service potentiel de Postfix | 2001-12-17T00:00:00.000000 | 2001-12-17T00:00:00.000000 |
| certa-2001-avi-163 | Vulnérabilités dans Internet Explorer 5.5 et 6 | 2001-12-17T00:00:00.000000 | 2001-12-17T00:00:00.000000 |
| certa-2001-avi-161 | Vulnérabilité de l'exécutable login | 2001-12-13T00:00:00.000000 | 2001-12-19T00:00:00.000000 |
| certa-2001-avi-164 | Vulnérabilité du serveur pfinger | 2001-12-20T00:00:00.000000 | 2001-12-20T00:00:00.000000 |
| certa-2001-avi-165 | Vulnérabilité de UPnP sous Windows | 2001-12-24T00:00:00.000000 | 2001-12-24T00:00:00.000000 |
| certa-2001-avi-166 | Vulnérabilité du serveur web de Lotus Domino associé à SSL | 2001-12-24T00:00:00.000000 | 2001-12-24T00:00:00.000000 |
| certa-2001-avi-167 | Vulnérabilités dans le serveur SQL Microsoft | 2001-12-24T00:00:00.000000 | 2001-12-24T00:00:00.000000 |
| certa-2002-avi-002 | Multiples vulnérabilités dans Oracle9i Application Server | 2002-01-02T00:00:00.000000 | 2002-01-02T00:00:00.000000 |
| certa-2002-avi-003 | Multiples vulnérabilités dans Oracle 9iAS Web Cache | 2002-01-02T00:00:00.000000 | 2002-01-02T00:00:00.000000 |
| certa-2002-avi-001 | Vulnérabilité dans glibc sous linux | 2002-01-02T00:00:00.000000 | 2002-01-14T00:00:00.000000 |
| certa-2002-avi-004 | Vulnérabilité dans <TT>Mutt</TT> | 2002-01-08T00:00:00.000000 | 2002-01-14T00:00:00.000000 |
| certa-2002-avi-005 | Multiples vulnérabilités dans Netscape Enterprise Server et iPlanet Web Server | 2002-01-14T00:00:00.000000 | 2002-01-14T00:00:00.000000 |
| certa-2002-avi-006 | Vulnérabilité dans Sudo | 2002-01-16T00:00:00.000000 | 2002-01-16T00:00:00.000000 |
| certa-2002-avi-007 | Vulnérabilité du daemon <TT>nsd</TT> sous SGI Irix | 2002-01-17T00:00:00.000000 | 2002-01-17T00:00:00.000000 |
| certa-2002-avi-008 | Vulnérabilité dans pine | 2002-01-18T00:00:00.000000 | 2002-01-18T00:00:00.000000 |
| certa-2002-avi-009 | Vulnérabilité de la commande at | 2002-01-21T00:00:00.000000 | 2002-01-21T00:00:00.000000 |
| certa-2002-avi-010 | Vulnérabilité dans stunnel | 2002-01-22T00:00:00.000000 | 2002-01-22T00:00:00.000000 |
| certa-2002-avi-011 | Vulnérabilités dans la fonction libgtop | 2002-01-24T00:00:00.000000 | 2002-01-24T00:00:00.000000 |
| certa-2002-avi-012 | Débordement de mémoire dans ICQ | 2002-01-25T00:00:00.000000 | 2002-01-25T00:00:00.000000 |
| certa-2002-avi-013 | Vulnérabilité de OpenLDAP | 2002-01-25T00:00:00.000000 | 2002-01-25T00:00:00.000000 |
| certa-2002-avi-014 | Vulnérabilité dans les cookies sous Netscape et Mozilla | 2002-01-28T00:00:00.000000 | 2002-01-28T00:00:00.000000 |
| certa-2002-avi-015 | Vulnérabilité dans rsync | 2002-01-28T00:00:00.000000 | 2002-01-28T00:00:00.000000 |
| certa-2002-avi-016 | Vulnérabilité de ptrace dans les systèmes BSD | 2002-01-28T00:00:00.000000 | 2002-01-28T00:00:00.000000 |
| certa-2002-avi-017 | Vulnérabilité de <TT>telnet</TT> sur les commutateurs Catalyst CISCO | 2002-01-30T00:00:00.000000 | 2002-01-30T00:00:00.000000 |
| certa-2002-avi-018 | Mauvaise gestion de l'appartenance à un domaine lors de l'authentification par SID sous Windows NT/2000 | 2002-01-31T00:00:00.000000 | 2002-01-31T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| certfr-2017-ale-011 | Campagne de messages électroniques non sollicités de type Jaff | 2017-05-14T00:00:00.000000 | 2017-06-27T00:00:00.000000 |
| certfr-2017-ale-012 | Campagne de maliciels prenant l'apparence d'un rançongiciel à multiples capacités de propagation | 2017-06-27T00:00:00.000000 | 2017-08-03T00:00:00.000000 |
| certfr-2017-ale-008 | Multiples vulnérabilités dans Microsoft Windows XP et Windows Server 2003 | 2017-04-14T00:00:00.000000 | 2017-09-06T00:00:00.000000 |
| certfr-2017-ale-013 | Présence de code malveillant dans Piriform CCleaner | 2017-09-18T00:00:00.000000 | 2017-10-09T00:00:00.000000 |
| certfr-2017-ale-015 | Vulnérabilités dans la bibliothèque Infineon RSA | 2017-10-16T00:00:00.000000 | 2017-10-17T00:00:00.000000 |
| certfr-2017-ale-014 | Vulnérabilité dans le protocole WPA/WPA2 | 2017-10-18T00:00:00.000000 | 2017-10-19T00:00:00.000000 |
| certfr-2017-ale-016 | Campagne de rançongiciel Bad Rabbit | 2017-10-25T00:00:00.000000 | 2017-10-27T00:00:00.000000 |
| certfr-2017-ale-018 | Vulnérabilité dans Apple MacOS High Sierra | 2017-11-29T00:00:00.000000 | 2017-11-30T00:00:00.000000 |
| certfr-2017-ale-017 | Vulnérabilité dans le serveur de messagerie Exim | 2017-11-27T00:00:00.000000 | 2018-02-01T00:00:00.000000 |
| certfr-2018-ale-003 | Vulnérabilité dans Adobe Flash Player | 2018-02-02T00:00:00.000000 | 2018-02-07T00:00:00.000000 |
| certfr-2017-ale-019 | Vulnérabilité d'usurpation d'identité dans plusieurs clients de messagerie | 2017-12-05T00:00:00.000000 | 2018-03-07T00:00:00.000000 |
| certfr-2017-ale-020 | Vulnérabilité dans des implémentations de TLS | 2017-12-13T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| certfr-2018-ale-002 | Vulnérabilité dans Cisco Adaptive Security Appliance | 2018-02-01T00:00:00.000000 | 2018-04-06T00:00:00.000000 |
| certfr-2018-ale-004 | Vulnérabilité dans le serveur de messagerie Exim | 2018-03-07T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-005 | Multiples vulnérabilités dans Drupal | 2018-03-29T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-006 | Vulnérabilité dans Cisco IOS et IOS XE Smart Install Client | 2018-04-06T00:00:00.000000 | 2018-07-30T00:00:00.000000 |
| certfr-2018-ale-009 | Vulnérabilité dans Microsoft Windows | 2018-08-29T00:00:00.000000 | 2018-09-17T00:00:00.000000 |
| certfr-2018-ale-001 | Multiples vulnérabilités de fuite d'informations dans des processeurs | 2018-01-04T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-007 | Multiples vulnérabilités dans S/MIME et OpenPGP | 2018-05-14T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-008 | Campagne de messages électroniques non sollicités de type Locky Locker | 2018-08-03T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-010 | Vulnérabilité activement exploitée dans le framework STRUTS 2 | 2018-08-29T00:00:00.000000 | 2018-10-10T00:00:00.000000 |
| certfr-2018-ale-011 | Vulnérabilité dans le client Git | 2018-10-08T00:00:00.000000 | 2018-10-12T00:00:00.000000 |
| certfr-2018-ale-012 | Vulnérabilité dans Wallix AdminBastion | 2018-10-26T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| certfr-2018-ale-013 | Vulnérabilité dans Microsoft Internet Explorer | 2018-12-20T00:00:00.000000 | 2019-02-04T00:00:00.000000 |
| certfr-2019-ale-001 | Vulnérabilité dans le gestionnaire de paquets APT | 2019-01-22T00:00:00.000000 | 2019-02-27T00:00:00.000000 |
| certfr-2019-ale-002 | Vulnérabilités affectant l'écosystème Microsoft Exchange et Active Directory | 2019-01-30T00:00:00.000000 | 2019-03-06T00:00:00.000000 |
| certfr-2019-ale-004 | Multiples vulnérabilités dans Microsoft Edge et Internet Explorer | 2019-04-01T00:00:00.000000 | 2019-04-17T00:00:00.000000 |
| certfr-2019-ale-003 | Campagnes de rançongiciels | 2019-01-31T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-005 | Vulnérabilité dans Oracle WebLogic | 2019-04-26T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| certfr-2019-ale-007 | Vulnérabilité dans le serveur DHCP de Windows | 2019-05-15T00:00:00.000000 | 2019-06-20T00:00:00.000000 |
| ID | Description | Published | Updated |
|---|---|---|---|
| osv-2020-2179 | Heap-buffer-overflow in arrow::internal::ValidateUTF8 | 2020-11-23T00:00:07.508800Z | 2022-04-13T03:04:32.035032Z |
| osv-2020-1178 | Global-buffer-overflow in arrow::Status arrow::VisitArrayInline<arrow::internal::ValidateArrayDataVisitor> | 2020-07-22T21:49:53.967051Z | 2022-04-13T03:04:32.040534Z |
| osv-2020-101 | UNKNOWN READ in apache::thrift::transport::TMemoryBuffer::readSlow | 2020-06-24T01:51:14.107760Z | 2022-04-13T03:04:32.046291Z |
| osv-2020-42 | Heap-buffer-overflow in bool arrow::util::RleDecoder::NextCounts<int> | 2020-06-24T01:51:11.505209Z | 2022-04-13T03:04:32.051647Z |
| osv-2020-26 | UNKNOWN READ in parquet::DictDecoderImpl<parquet::PhysicalType< | 2020-06-24T01:51:10.780616Z | 2022-04-13T03:04:32.056995Z |
| osv-2020-165 | UNKNOWN READ in apache::thrift::protocol::TCompactProtocolT<apache::thrift::transport::TMemoryBu | 2020-06-24T01:51:16.975519Z | 2022-04-13T03:04:32.066459Z |
| osv-2020-1894 | Heap-buffer-overflow in parquet::arrow::ApplyOriginalStorageMetadata | 2020-10-02T00:00:08.666922Z | 2022-04-13T03:04:32.072063Z |
| osv-2021-1601 | Heap-buffer-overflow in parquet::DeltaByteArrayDecoder::GetInternal | 2021-11-22T00:00:06.055274Z | 2022-04-13T03:04:32.077733Z |
| osv-2020-110 | Heap-buffer-overflow in parquet::internal::RecordReader::Make | 2020-06-24T01:51:14.532580Z | 2022-04-13T03:04:32.083138Z |
| osv-2020-2158 | Global-buffer-overflow in arrow::Status arrow::internal::ValidateArrayFullImpl::ValidateListLike<arrow::Li | 2020-11-15T22:33:44.639326Z | 2022-04-13T03:04:32.088460Z |
| osv-2021-16 | Stack-buffer-overflow in JS::Heap::gather_conservative_roots | 2021-01-06T00:00:22.099017Z | 2022-04-13T03:04:32.093974Z |
| osv-2021-1116 | Use-after-poison in JS::PrimitiveString::string | 2021-08-10T00:02:29.787563Z | 2022-04-13T03:04:32.099079Z |
| osv-2021-1039 | Use-after-poison in AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr | 2021-07-22T00:01:20.342791Z | 2022-04-13T03:04:32.103963Z |
| osv-2021-793 | Heap-use-after-free in AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr | 2021-05-24T00:01:24.097636Z | 2022-04-13T03:04:32.108972Z |
| osv-2021-563 | Heap-use-after-free in AK::NonnullOwnPtr<JS::IndexedPropertyStorage>::operator-> | 2021-03-26T00:01:07.954062Z | 2022-04-13T03:04:32.113972Z |
| osv-2022-84 | Heap-buffer-overflow in Core::Stream::File::open_path | 2022-01-24T00:00:39.186446Z | 2022-04-13T03:04:32.119317Z |
| osv-2021-494 | Heap-buffer-overflow in AK::ByteBuffer::overwrite | 2021-03-06T00:00:07.530011Z | 2022-04-13T03:04:32.124394Z |
| osv-2021-1266 | UNKNOWN WRITE in void AK::BumpAllocator<true, 2097152ul>::for_each_chunk<AK::UniformBumpAllocator | 2021-09-16T00:00:19.187563Z | 2022-04-13T03:04:32.129544Z |
| osv-2021-1080 | Use-after-poison in AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr | 2021-08-01T00:00:08.293111Z | 2022-04-13T03:04:32.134816Z |
| osv-2021-315 | Global-buffer-overflow in Gfx::decode_frame | 2021-02-08T00:00:57.447823Z | 2022-04-13T03:04:32.139842Z |
| osv-2021-1762 | Heap-buffer-overflow in TTF::be_u16 | 2021-12-26T00:00:42.254250Z | 2022-04-13T03:04:32.144802Z |
| osv-2021-804 | Heap-use-after-free in AK::NonnullOwnPtr<JS::IndexedPropertyStorage>::operator-> | 2021-05-27T00:01:21.705422Z | 2022-04-13T03:04:32.150140Z |
| osv-2021-394 | Heap-buffer-overflow in Crypto::der_decode_sequence | 2021-02-14T00:01:02.208971Z | 2022-04-13T03:04:32.155419Z |
| osv-2021-445 | Global-buffer-overflow in AK::StringView::operator== | 2021-02-25T00:00:11.169626Z | 2022-04-13T03:04:32.160533Z |
| osv-2021-843 | Use-after-poison in AK::NonnullOwnPtr<JS::IndexedPropertyStorage>::operator-> | 2021-06-09T00:00:19.914318Z | 2022-04-13T03:04:32.165655Z |
| osv-2021-1149 | Heap-buffer-overflow in JS::Lexer::consume | 2021-08-19T00:01:39.960686Z | 2022-04-13T03:04:32.170615Z |
| osv-2021-840 | Use-after-poison in AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr | 2021-06-07T00:00:35.428789Z | 2022-04-13T03:04:32.175811Z |
| osv-2021-987 | Use-after-poison in AK::RefPtr<AK::StringImpl, AK::RefPtrTraits<AK::StringImpl> >::RefPtr | 2021-07-14T00:00:27.064949Z | 2022-04-13T03:04:32.181118Z |
| osv-2021-1145 | Use-after-poison in JS::Reference::put_value | 2021-08-19T00:01:22.170463Z | 2022-04-13T03:04:32.186428Z |
| osv-2021-841 | Heap-use-after-free in AK::StringImpl::create | 2021-06-07T00:01:31.914915Z | 2022-04-13T03:04:32.191299Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| rustsec-2020-0050 | VecCopy allows misaligned access to elements | 2020-09-27T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0052 | Undefined Behavior in bounded channel | 2020-06-26T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0059 | MutexGuard::map can cause a data race in safe code | 2020-10-22T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0060 | futures_task::waker may cause a use-after-free if used on a type that isn't 'static | 2020-09-04T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0061 | futures_task::noop_waker_ref can segfault due to dereferencing a NULL pointer | 2020-05-03T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0062 | Improper `Sync` implementation on `FuturesUnordered` in futures-utils can cause data corruption | 2020-01-24T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0068 | Unexpected panic in multihash `from_slice` parsing code | 2020-11-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0069 | Argument injection in sendmail transport | 2020-11-11T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0070 | Some lock_api lock guard objects can cause data races | 2020-11-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0072 | GenericMutexGuard allows data races of non-Sync types across threads | 2020-10-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0073 | Mutable reference with immutable provenance | 2020-11-12T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0074 | Reference counting error in `From<Py<T>>` | 2020-11-28T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0075 | Unexpected panic when decoding tokens | 2020-11-29T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0080 | `miow` invalidly assumes the memory layout of std::net::SocketAddr | 2020-11-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0081 | `mio` invalidly assumes the memory layout of std::net::SocketAddr | 2020-11-02T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0082 | ordered_float:NotNan may contain NaN after panic in assignment operators | 2020-12-06T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0087 | TryMutex<T> allows sending non-Send type across threads | 2020-11-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0088 | MPMCConsumer/Producer allows sending non-Send type across threads | 2020-11-29T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0089 | nanorand 0.5.0 - RNGs failed to generate properly for non-64-bit numbers | 2020-12-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0090 | Thex<T> allows data races of non-Send types across threads | 2020-12-08T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0091 | Dangling reference in `access::Map` with Constant | 2020-12-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0092 | Send/Sync bound needed on V in `impl Send/Sync for ARCache<K, V>` | 2020-11-13T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0093 | Async-h1 request smuggling possible with long unread bodies | 2020-12-17T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0094 | Unsound: can make `ARefss` contain a !Send, !Sync object. | 2020-12-01T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0096 | TreeFocus lacks bounds on its Send and Sync traits | 2020-11-09T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0097 | Soundness issue with base::Error | 2020-12-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0098 | UsbContext trait did not require implementers to be Send and Sync. | 2020-12-18T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0099 | Aovec<T> lacks bound on its Send and Sync traits allowing data races | 2020-12-10T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0100 | Double free when calling `sys_info::disk_info` from multiple threads | 2020-05-31T12:00:00Z | 2023-06-13T13:10:24Z |
| rustsec-2020-0101 | conquer-once's OnceCell lacks Send bound for its Sync trait. | 2020-12-22T12:00:00Z | 2023-06-13T13:10:24Z |
| ID | Description | Published | Updated |
|---|---|---|---|
| alsa-2021:4142 | Low: pcs security, bug fix, and enhancement update | 2021-11-09T08:21:49Z | 2021-11-12T10:21:02Z |
| alsa-2021:4586 | Moderate: gcc-toolset-11-gcc security update | 2021-11-10T08:32:49Z | 2021-11-12T16:17:39Z |
| alsa-2021:4591 | Moderate: gcc-toolset-11-annobin security update | 2021-11-10T08:38:54Z | 2021-11-12T16:17:39Z |
| alsa-2021:4592 | Moderate: gcc-toolset-10-annobin security update | 2021-11-10T08:39:32Z | 2021-11-12T16:17:39Z |
| alsa-2021:4593 | Moderate: annobin security update | 2021-11-10T08:39:41Z | 2021-11-12T16:17:39Z |
| alsa-2021:4594 | Moderate: gcc-toolset-11-binutils security update | 2021-11-10T08:40:25Z | 2021-11-12T16:17:39Z |
| alsa-2021:4585 | Moderate: gcc-toolset-10-gcc security update | 2021-11-10T08:31:42Z | 2021-11-12T16:20:50Z |
| alsa-2021:4135 | Important: java-17-openjdk security update | 2021-11-09T19:26:37Z | 2021-11-12T16:36:03Z |
| alsa-2021:4622 | Important: freerdp security update | 2021-11-11T09:34:33Z | 2021-11-12T17:48:53Z |
| alsa-2021:4270 | Moderate: rust-toolset:rhel8 security, bug fix, and enhancement update | 2021-11-09T08:54:06Z | 2021-11-12T17:54:17Z |
| alsa-2021:4590 | Moderate: rust-toolset:rhel8 security update | 2021-11-10T08:37:57Z | 2021-11-12T17:54:17Z |
| alsa-2021:4647 | Important: kernel security update | 2021-11-15T09:57:15Z | 2021-11-15T18:21:40Z |
| alsa-2021:4595 | Moderate: binutils security update | 2021-11-10T08:41:52Z | 2021-11-16T08:43:55Z |
| alsa-2021:4649 | Moderate: gcc-toolset-10-binutils security update | 2021-11-15T10:00:59Z | 2021-11-16T08:43:55Z |
| alsa-2021:4399 | Moderate: python3 security update | 2021-11-09T09:17:02Z | 2021-11-18T09:21:01Z |
| alsa-2021:4587 | Moderate: gcc security update | 2021-11-10T08:34:56Z | 2021-11-18T09:31:35Z |
| alsa-2021:4743 | Moderate: llvm-toolset:rhel8 security update | 2021-11-18T16:29:15Z | 2021-11-21T06:08:08Z |
| alsa-2021:4826 | Important: mailman:2.1 security update | 2021-11-23T20:17:35Z | 2021-11-24T20:52:59Z |
| alsa-2021:4916 | Important: mailman:2.1 security update | 2021-12-02T15:57:01Z | 2021-12-03T11:06:49Z |
| alsa-2021:4903 | Critical: nss security update | 2021-12-01T17:52:10Z | 2021-12-03T21:33:22Z |
| alsa-2021:5013 | Important: firefox security update | 2021-12-08T09:42:58Z | 2021-12-08T21:17:36Z |
| alsa-2021:5045 | Important: thunderbird security update | 2021-12-09T12:14:59Z | 2021-12-10T10:58:24Z |
| alsa-2021:5082 | Important: samba security update | 2021-12-13T08:15:38Z | 2021-12-13T23:46:50Z |
| alsa-2021:1846 | Moderate: idm:DL1 and idm:client security, bug fix, and enhancement update | 2021-05-18T06:14:07Z | 2021-12-15T23:07:56Z |
| alsa-2021:1983 | Important: idm:DL1 security update | 2021-05-18T17:07:31Z | 2021-12-15T23:07:56Z |
| alsa-2021:5142 | Moderate: idm:DL1 security update | 2021-12-15T07:39:49Z | 2021-12-15T23:07:56Z |
| alsa-2021:4156 | Moderate: go-toolset:rhel8 security, bug fix, and enhancement update | 2021-11-09T08:25:49Z | 2021-12-16T11:29:11Z |
| alsa-2021:5160 | Important: go-toolset:rhel8 security and bug fix update | 2021-12-15T16:11:05Z | 2021-12-16T11:29:11Z |
| alsa-2021:5171 | Moderate: nodejs:16 security, bug fix, and enhancement update | 2021-12-15T19:09:29Z | 2021-12-16T11:29:15Z |
| alsa-2021:2375 | Important: postgresql:13 security update | 2021-06-10T09:54:30Z | 2021-12-22T08:23:18Z |