FreeBSD VuXML

Documenting security issues in FreeBSD and the FreeBSD Ports Collection

Security issues that affect the FreeBSD operating system or applications in the FreeBSD Ports Collection are documented using the Vulnerabilities and Exposures Markup Language (VuXML). The current VuXML document that serves as the source for the content of this site can be found:

Please report security issues to the FreeBSD Security Team at . Full contact details, including information handling policies and PGP key, can be found on the FreeBSD Security page.

VuXML ID index


VuXML ID Topic
002432c8-ef6a-11ea-ba8f-08002728f74c Django -- multiple vulnerabilities
00263aa3-67a8-11d8-80e3-0020ed76ef5a mailman XSS in user options page
002b4b05-35dd-11e9-94a8-000ffec0b3e1 drupal -- Drupal core - Highly critical - Remote Code Execution
0032400f-624f-11ea-b495-000d3ab229d6 Node.js -- multiple vulnerabilities
004d8c23-c710-11e8-98c7-000c29434208 Django -- password hash disclosure
004debf9-1d16-11e8-b6aa-4ccc6adda413 libsndfile -- out-of-bounds read memory access
005dfb48-990d-11ed-b9d3-589cfc0f81b0 phpmyfaq -- multiple vulnerabilities
00644f03-fb58-11d8-9837-000c41e2cdad imlib -- BMP decoder heap buffer overflow
006bee4e-4c49-11e8-9c32-54ee754af08e chromium -- vulnerability
006e3b7c-d7d7-11e5-b85f-0018fe623f2b jasper -- multiple vulnerabilities
00784d6e-f4ce-11da-87a1-000c6ec775d9 squirrelmail -- plugin.php local file inclusion vulnerability
007e7e77-2f06-11ef-8a0f-a8a1599412c6 chromium -- multiple security fixes
00919005-96a3-11ed-86e9-d4c9ef517024 Apache httpd -- Multiple vulnerabilities
00b0d8cd-7097-11e2-98d9-003067c2616f OpenSSL -- TLS 1.1, 1.2 denial of service
00b296b6-7db1-11e0-96b7-00300582f9fc Apache APR -- DoS vulnerabilities
00cb1469-4afc-11e6-97ea-002590263bf5 atutor -- multiple vulnerabilities
00d6040a-b8e0-11dd-a578-0030843d3802 mantis -- session hijacking vulnerability
00dadbf0-6f61-11e5-a2a1-002590263bf5 p5-UI-Dialog -- shell command execution vulnerability
00e4050b-56c1-11e7-8e66-08606e46faad pear-Horde_Image -- DoS vulnerability
00ec1be1-22bb-11e6-9ead-6805ca0b3d42 phpmyadmin -- XSS and sensitive data leakage
00f30cba-4d23-11ea-86ba-641c67a117d8 libexif -- privilege escalation
01018916-c47c-11e8-8b07-00e04c1ea73d Serendipity -- multiple vulnerabilities
012809ce-83f3-11ea-92ab-00163e433440 OpenSSL remote denial of service vulnerability
012b495c-9d51-11de-8d20-001bd3385381 cyrus-imapd -- Potential buffer overflow in Sieve
0132ca5b-5d11-11ec-8be6-d4c9ef517024 OpenSSL -- Certificate validation issue
01356ccc-6a87-11da-b96e-000fb586ba73 horde -- Cross site scripting vulnerabilities in several of Horde's templates
0137167b-6dca-11e8-a671-001999f8d30b asterisk -- PJSIP endpoint presence disclosure when using ACL
013fa252-0724-11d9-b45d-000c41e2cdad mod_dav -- lock related denial-of-service
0163b498-af54-11d9-acd0-000854d03344 axel -- remote buffer overflow
0167f5ad-64ea-11e4-98c1-00269ee29e57 Konversation -- out-of-bounds read on a heap-allocated array
017a493f-7db6-11e5-a762-14dae9d210b8 openafs -- information disclosure
01823528-a4c1-11ed-b6af-b42e991fc52e kafka -- Denial Of Service vulnerability
018a84d0-2548-11df-b4a3-00e0815b8da8 sudo -- Privilege escalation with sudoedit
01974420-dfaf-11eb-ba49-001b217b3468 Gitlab -- vulnerability
01a197ca-67f1-11e7-a266-28924a333806 evince and atril -- command injection vulnerability in CBT handler
01bb84e2-bd88-11d9-a281-02e018374e71 groff -- pic2graph and eqn2graph are vulnerable to symlink attack through temporary files
01bce4c6-6571-11e5-9909-002590263bf5 codeigniter -- mysql database driver vulnerability
01bde18a-2e09-11ea-a935-001b217b3468 Gitlab -- Multiple Vulnerabilities
01c231cd-4393-11d9-8bb9-00065be4b5b6 mysql -- GRANT access restriction problem
01c57d20-ea26-11de-bd39-00248c9b4be7 mozilla -- multiple vulnerabilities
01cf67b3-dc3b-11e2-a6cd-c48508086173 cURL library -- heap corruption in curl_easy_unescape
01d3ab7d-9c43-11e0-bc0f-0014a5e3cda6 ejabberd -- remote denial of service vulnerability
01d729ca-1143-11e6-b55e-b499baebfeaf OpenSSL -- multiple vulnerabilities
01eeea33-1afa-11ee-8a9b-b42e991fc52e phpldapadmin -- XSS vulnerability
01ffd06a-36ed-11eb-b655-3065ec8fd3ec chromium -- multiple vulnerabilities
022255be-0895-11e5-a242-5404a68ad561 avidemux26 -- multiple vulnerabilities in bundled FFmpeg
02274fd9-6bc5-11d9-8edb-000a95bc6fae realplayer -- arbitrary file deletion and other vulnerabilities
022a4c77-2da4-11e1-b356-00215c6a37bb proftpd -- arbitrary code execution vulnerability with chroot
022baf71-38e6-11dd-8d34-00e0815b8da8 Courier Authentication Library -- SQL Injection
022dde12-8f4a-11ec-83ac-080027415d17 cyrus-sasl -- Escape password for SQL insert/update commands
024edd06-c933-11dc-810c-0016179b2dd5 xfce -- multiple vulnerabilities
02562a78-e6b7-11ed-b0ce-b42e991fc52e cloud-init -- sensitive data exposure in cloud-init logs
026759e0-1ba3-11e5-b43d-002590263bf5 elasticsearch -- remote OS command execution via Groovy scripting engine
027380b7-3404-11d9-ac1b-000d614f7fad hafiye -- lack of terminal escape sequence filtering
0274a9f1-0759-11da-bc08-0001020eed82 postnuke -- multiple vulnerabilities
027af74d-eb56-11e3-9032-000c2980a9f3 gnutls -- client-side memory corruption
0282269d-bbee-11e6-b1cf-14dae9d210b8 FreeBSD -- link_ntoa(3) buffer overflow
0297b260-2b3b-11e6-ae88-002590263bf5 ikiwiki -- XSS vulnerability
02bc9b7c-e019-11d9-a8bd-000cf18bbe54 acroread -- XML External Entity vulnerability
02be46c1-f7cc-11ee-aa6b-b42e991fc52e jose -- DoS vulnerability
02bee9ae-c5d1-409b-8a79-983a88861509 libraw -- Out-of-bounds Read
02db20d7-e34a-11e3-bd92-bcaec565249c openjpeg -- Multiple vulnerabilities
02e33cd1-c655-11ee-8613-08002784c58d curl -- OCSP verification bypass with TLS session reuse
02e51cb3-d7e4-11ed-9f7a-5404a68ad561 traefik -- Use of vulnerable Go modules net/http, net/textproto
02eedd3c-c6b5-11dc-93b6-000e35248ad7 libxine -- buffer overflow vulnerability
02fb9764-1893-11ed-9b22-002590c1f29c FreeBSD -- Memory disclosure by stale virtual memory mapping
0309c898-3aed-11eb-af2a-080027dbe4b7 glpi -- Improve encryption algorithm
03140526-1250-11de-a964-0030843d3802 zabbix -- php frontend multiple vulnerabilities
03159886-a8a3-11e3-8f36-0025905a4771 asterisk -- multiple vulnerabilities
03175e62-5494-11e4-9cc1-bc5ff4fb5e7b OpenSSL -- multiple vulnerabilities
032643d7-0ba7-11ec-a689-080027e50e6d Python -- multiple vulnerabilities
032aa524-5854-11e6-b334-002590263bf5 xen-kernel -- x86: Privilege escalation in PV guests
03532a19-d68e-11e6-9171-14dae9d210b8 lynx -- multiple vulnerabilities
035d17b2-484a-11d9-813c-00065be4b5b6 mysql -- erroneous access restrictions applied to table renames
03653079-8594-11d9-afa0-003048705d5a phpbb -- multiple information disclosure vulnerabilities
036d6c38-1c5b-11e6-b9e0-20cf30e32f6d Bugzilla security issues
038a5808-24b3-11e5-b0c8-bf4d8935d4fa roundcube -- multiple vulnerabilities
039d057e-544e-11e1-9fb7-003067b2972c surf -- private information disclosure
03bb8373-2026-11ed-9d70-080027240888 drupal9 -- multiple vulnerabilities
03bf5157-d145-11ee-acee-001b217b3468 Gitlab -- Vulnerabilities
03d22656-2690-11de-8226-0030843d3802 drupal6-cck -- cross-site scripting
03e48bf5-a96d-11e3-a556-3c970e169bc2 samba -- multiple vulnerabilities
03e54e42-7ac6-11e5-b35a-002590263bf5 Joomla! -- Core - ACL Violation vulnerabilities
04042f95-14b8-4382-a8b9-b30e365776cf puppet26 -- multiple vulnerabilities
040707f9-0b2a-11eb-8834-00155d01f202 mozjpeg -- heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file
040e69f1-6831-11ee-b06f-0050569ceb3a Account takeover via Kanban feature in GLPI
04104985-d846-11de-84e4-00215af774f0 cacti -- cross-site scripting issues
0417d41a-8175-11ef-a5dc-b42e991fc52e firefox -- multiple vulnerabilities
04320e7d-ea66-11e2-a96e-60a44c524f57 libzrtpcpp -- multiple security vulnerabilities
043d3a78-f245-4938-9bc7-3d0d35dd94bf wordpress -- multiple vulnerabilities
04422df1-40d8-11ed-9be7-454b1dd82c64 Gitlab -- Multiple vulnerabilities
044cff62-ed8b-4e72-b102-18a7d58a669f bro -- integer overflow allows remote DOS
045944a0-6bca-11d9-aaa6-000a95bc6fae sudo -- environmental variable CDPATH is not cleared
045e46e8-abe6-11ea-99cb-10bf48e1088e tcpreplay -- Multiple vulnerabilities
046fedd1-bd01-11e5-bbf4-5404a68ad561 ffmpeg -- remote attacker can access local files
048c77df-3211-11e1-9583-14dae938ec40 zabbix-frontend -- multiple XSS vulnerabilities
0491d15a-5875-11df-8d80-0015587e2cc1 lxr -- multiple XSS vulnerabilities
049332d2-f6e1-11e2-82f3-000c29ee3065 wordpress -- multiple vulnerabilities
04b7d46c-7226-11e0-813a-6c626dd55a41 Mozilla -- multiple vulnerabilities
04c6187d-2d8f-11dd-98c9-00163e000016 linux-flashplugin -- unspecified remote code execution vulnerability
04c9c3f8-5ed3-11ef-8262-b0416f0c4c67 Jinja2 -- Vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter
04cc7bd2-3686-11e7-aa64-080027ef73ec OpenVPN -- two remote denial-of-service vulnerabilities
04cf89e3-5854-11e6-b334-002590263bf5 xen-kernel -- x86: Missing SMAP whitelisting in 32-bit exception / event delivery
04d2cf7f-2942-11ec-b48c-1c1b0d9ea7e6 Apache OpenOffice -- multiple vulnerabilities.
04e78f32-04b2-4c23-bfae-72600842d317 electron29 -- use after free in Dawn
04f29189-1a05-11e7-bc6e-b499baebfeaf cURL -- potential memory disclosure
04fe6c8d-2a34-4009-a81e-e7a7e759b5d2 cURL -- multiple vulnerabilities
04fecc47-dad2-11ec-8fbd-d4c9ef517024 MariaDB -- Multiple vulnerabilities
0502c1cb-8f81-11df-a0bb-0050568452ac codeigniter -- file upload class vulnerability
050eba46-7638-11ed-820d-080027d3a315 Python -- multiple vulnerabilities
0512b761-70fb-40d3-9954-aa4565528fa8 kstars -- exploitable set-user-ID application fliccd
0519db18-cf15-11e5-805c-5453ed2e2b49 py-pillow -- Integer overflow in Resample.c
0523fb7e-8444-4e86-812d-8de05f6f0dce libutp -- remote denial of service or arbitrary code execution
0537afa3-3ce0-11e7-bf9d-001999f8d30b asterisk -- Buffer Overrun in PJSIP transaction layer
05463e0a-abd3-4fa4-bd5f-cd5ed132d4c6 mozilla -- multiple vulnerabilities
0569146e-bdef-11e9-bd31-8de4a4470bbb Nokogiri -- injection vulnerability
056ea107-5729-11ea-a2f3-001cc0382b2f Mbed TLS -- Cache attack against RSA key import in SGX
057bf770-cac4-11e0-aea3-00215c6a37bb php -- multiple vulnerabilities
057e6616-1885-11e7-bb4d-a0d3c19bfa21 NVIDIA UNIX driver -- multiple vulnerabilities in the kernel mode layer handler
0592f49f-b3b8-4260-b648-d1718762656c mozilla -- multiple vulnerabilities
059a99a9-45e0-492b-b9f9-5a79573c8eb6 electron29 -- multiple vulnerabilities
05b7180b-e571-11ee-a1c0-0050569f0b83 www/varnish7 -- Denial of Service
05cd9f82-5426-11ef-8a0f-a8a1599412c6 chromium -- multiple security fixes
05da6b56-3e66-4306-9ea3-89fafe939726 mozilla -- multiple vulnerabilities
05dc6efa-2370-11e3-95b7-00e0814cab4e django -- denial-of-service via large passwords
05dcf751-0733-11d9-b45d-000c41e2cdad cups -- print queue browser denial-of-service
05eeb7e9-b987-11e5-83ef-14dae9d210b8 isc-dhcpd -- Denial of Service
063399fc-f6d6-11dc-bcee-001c2514716c bzip2 -- crash with certain malformed archive files
0640198a-d117-11de-b667-0030843d3802 wordpress -- multiple vulnerabilities
06404241-b306-11d9-a788-0001020eed82 kdelibs -- kimgio input validation errors
064225c5-1f53-11d9-836a-0090962cff2a squid -- NTLM authentication denial-of-service vulnerability
06428d91-152e-11ee-8b14-dbdd62da85fb OpenEXR -- heap buffer overflow in internal_huf_decompress
0642b064-56c4-11e4-8b87-bcaec565249c libxml2 -- Denial of service
06492bd5-085a-4cc0-9743-e30164bdcb1c py-flask-security -- user redirect to arbitrary URL vulnerability
0652005e-ca96-11e5-96d6-14dae9d210b8 salt -- code execution
06574c62-5854-11e6-b334-002590263bf5 xen-tools -- virtio: unbounded memory allocation issue
065890c3-725e-11e9-b0e1-6cc21735f730 PostgreSQL -- Selectivity estimators bypass row security policies
065b3b72-c5ab-11e8-9ae2-001b217b3468 Gitlab -- multiple vulnerabilities
0679deeb-8eaf-11db-abc9-0003476f14d3 sql-ledger -- multiple vulnerabilities
06a12e26-142e-11e0-bea2-0015f2db7bde webkit-gtk2 -- Multiple vulnerabilities
06a5abd4-6bc2-11eb-b292-90e2baa3bafc mod_dav_svn -- server crash
06a6b2cf-484b-11d9-813c-00065be4b5b6 mysql -- ALTER MERGE denial of service vulnerability
06ab7724-0fd7-427e-a5ce-fe436302b10c jenkins -- multiple vulnerabilities
06c4a79b-981d-11e8-b460-9c5c8e75236a cgit -- directory traversal vulnerability
06eac338-9ddf-11dd-813f-000e35248ad7 libxine -- denial of service vulnerability
06ed6a49-bad4-11ec-9cfe-0800270512f4 Ruby -- Buffer overrun in String-to-Float conversion
06f142ff-4df3-11d9-a9e7-0001020eed82 wget -- multiple vulnerabilities
06f9174f-190f-11de-b2f0-001c2514716c phpmyadmin -- insufficient output sanitizing when generating configuration file
06f931c0-0be0-11e7-b4bf-5404a68ad561 irssi -- use-after-free potential code execution
06fefd2f-728f-11e5-a371-14dae9d210b8 miniupnpc -- buffer overflow
0700e76c-3eb0-11ea-8478-3085a9a95629 Pillow -- Multiple vulnerabilities
070b5b22-6d74-11dd-aa18-0030843d3802 drupal -- multiple vulnerabilities
07234e78-e899-11e1-b38d-0023ae8e59f0 databases/postgresql*-server -- multiple vulnerabilities
072a53e0-0397-11dd-bd06-0017319806e7 postfix-policyd-weight -- working directory symlink vulnerability
074cb225-bb2d-11e8-90e1-fcaa147e860e moodle -- multiple vulnerabilities
075952fe-267e-11e5-9d03-3c970e169bc2 openssl -- alternate chains certificate forgery vulnerability
0762fa72-e530-11e9-86e9-001b217b3468 Gitlab -- Disclosure Vulnerabilities
0765de84-a6c1-11e4-a0c1-c485083ca99c glibc -- gethostbyname buffer overflow
07718e2b-d29d-11e5-a95f-b499baebfeaf nghttp2 -- Out of memory in nghttpd, nghttp, and libnghttp2_asio
077bbadf-f2f4-11e6-92a7-902b34361349 diffoscope -- arbitrary file write
077c2dca-8f9a-11db-ab33-000e0c2e438a openssl -- Incorrect PKCS#1 v1.5 padding validation in crypto(3)
07888b49-35c4-11e6-8e82-002590263bf5 flash -- multiple vulnerabilities
0792e7a7-8e37-11d8-90d1-0020ed76ef5a CVS path validation errors
079b3641-c4bd-11eb-a22a-693f0544ae52 go -- multiple vulnerabilities
07a1a76c-734b-11e5-ae81-14dae9d210b8 mbedTLS/PolarSSL -- DoS and possible remote code execution
07aecafa-3b12-11eb-af2a-080027dbe4b7 glpi -- Reflexive XSS in Dropdown menus
07bb3bd2-a920-11dd-8503-0211060005df qemu -- Heap overflow in Cirrus emulation
07c0d782-f758-11ec-acaa-901b0e9408dc py-matrix-synapse -- unbounded recursion in urlpreview
07c7ae7a-224b-11eb-aa6e-e0d55e2a8bf9 raptor2 -- buffer overflow
07d04eef-d8e2-11e6-a071-001e67f15f5a lshell -- Shell autocomplete reveals forbidden directories
07ead557-a220-11da-b410-000e0c2e438a WebCalendar -- unauthorized access vulnerability
07ee8c14-68f1-11ee-8290-a8a1599412c6 chromium -- multiple vulnerabilities
07f0ea8c-356a-11ef-ac6d-a0423f48a938 frr - Multiple vulnerabilities
07f3fe15-a9de-11d9-a788-0001020eed82 php -- readfile() DoS vulnerability
080936ba-fbb7-11ee-abc8-6960f2492b1d PuTTY and embedders (f.i., filezilla) -- biased RNG with NIST P521/ecdsa-sha2-nistp521 signatures permits recovering private key
0809ce7d-f672-4924-9b3b-7c74bc279b83 gtar -- GNU TAR safer_name_suffix Remote Denial of Service Vulnerability
0822a4cf-9318-11e8-8d88-00e04c1ea73d mantis -- multiple vulnerabilities
0832ee18-cf77-11dc-8c6a-00304881ac9a jetty -- multiple vulnerability
0838733d-1698-11dc-a197-0011098b2f36 wordpress -- XMLRPC SQL Injection
0844632f-5e78-11e6-a6c3-14dae9d210b8 FreeBSD -- integer overflow in IP_MSFILTER
0844671c-5a09-11ed-856e-d4c9ef517024 OpenSSL -- Buffer overflows in Email verification
085399ab-dfd7-11ea-96e4-80ee73bc7b66 net/rsync -- multiple zlib issues
0859e6d5-0415-11ed-a53b-6c3be5272acd Grafana -- OAuth Account Takeover
085a087b-3897-11e8-ac53-d8cb8abf62dd Gitlab -- multiple vulnerabilities
08664d42-7989-11e6-b7a8-74d02b9a84d5 h2o -- fix DoS attack vector
086c96cd-d0cb-11ea-b922-5404a68ad561 libsndfile -- out-of-bounds read memory access
0871d18b-9638-11e3-a371-6805ca0b3d42 phpMyAdmin -- Self-XSS due to unescaped HTML output in import.
0882f019-bd60-11eb-9bdd-8c164567ca3c NGINX -- 1-byte memory overwrite in resolver
088b8b7d-446c-11ef-b611-84a93843eb75 Apache httpd -- Source code disclosure with handlers configured via AddType
0899c0d3-80f2-11ea-bafd-815569f3852d ansible - win_unzip path normalization
08a125f3-e35a-11e7-a293-54e1ad3d6335 libXfont -- permission bypass when opening files through symlinks
08a2df48-6c6a-11e7-9b01-2047478f2f70 collectd5 -- Denial of service by sending a signed network packet to a server which is not set up to check signatures
08ac7b8b-bb30-11da-b2fb-000e0c2e438a sendmail -- race condition vulnerability
08b553ed-537a-11eb-be6e-0022489ad614 Node.js -- January 2021 Security Releases
08d11134-79c5-11e5-8987-6805ca0b3d42 phpMyAdmin -- Content spoofing vulnerability
08de38d2-e2d0-11ea-9538-0c9d925bbbc0 adns -- multiple vulnerabilities
08df5d46-1baf-11da-8038-0040f42d58c6 urban -- stack overflow vulnerabilities
08f5c27d-4326-11ea-af8b-00155d0a0200 OpenSMTPd -- critical LPE / RCE vulnerability
08fba28b-6f9f-11ea-bd0b-001b217b3468 Gitlab -- Multiple Vulnerabilities
0904e81f-a89d-11e8-afbb-bc5ff4f77b71 node.js -- multiple vulnerabilities
09066828-2ef1-11dd-a0d8-0016d325a0ed ikiwiki -- empty password security hole
090763f6-7030-11ea-93dd-080027846a02 mediawiki -- multiple vulnerabilities
092156c9-04d7-11e6-b1ce-002590263bf5 dhcpcd -- remote code execution/denial of service
0925716f-34e2-11e2-aa75-003067c2616f opera -- execution of arbitrary code
093584f2-3f14-11e6-b3c8-14dae9d210b8 libtorrent-rasterbar -- denial of service
093a6baf-9f99-11eb-b150-000c292ee6b8 Consul -- Multiple vulnerabilities
09429f7c-fd6e-11da-b1cd-0050bf27ba24 horde -- multiple parameter cross site scripting vulnerabilities
094e4a5b-6511-11ed-8c5e-206a8a720317 krb5 -- Integer overflow vulnerabilities in PAC parsing
094fb2ec-9aa3-11eb-83cb-0800278d94f0 gitea -- multiple vulnerabilities
09639ccc-3abb-11db-81e1-000e0c2e438a hlstats -- multiple cross site scripting vulnerabilities
096ab080-907c-11ec-bb14-002324b2fba8 go -- multiple vulnerabilities
0981958a-f733-11e3-8276-071f1604ef8a iodined -- authentication bypass
09849e71-bb12-11e7-8357-3065ec6f3643 wget -- Stack overflow in HTTP protocol handling
09910d76-4c82-11df-83fb-0015587e2cc1 fetchmail -- denial of service vulnerability
0998e79d-0055-11e3-905b-0025905a4771 mozilla -- multiple vulnerabilities
09b7cd39-47bd-11ee-8e38-002590c1f29c FreeBSD -- OpenSSH pre-authentication double free
09c87973-8b9d-11e1-b393-20cf30e32f6d bugzilla -- multiple vulnerabilities
09c92f3a-fd49-11da-995c-605724cdf281 WebCalendar -- information disclosure vulnerability
09d418db-70fd-11d8-873f-0020ed76ef5a Apache 1.3 IP address access control failure on some 64-bit platforms
09db2844-0b21-11da-bc08-0001020eed82 gaim -- AIM/ICQ non-UTF-8 filename crash
09ea1b08-1d3e-4bf2-91a1-d6573f4da3d8 jenkins -- Buffer corruption in bundled Jetty
09eef008-3b16-11eb-af2a-080027dbe4b7 glpi -- Unauthenticated Stored XSS
09f47c51-c1a6-11e3-a5ac-001b21614864 libaudiofile -- heap-based overflow in Microsoft ADPCM compression module
09fff0d9-4126-11e5-9f01-14dae9d210b8 py-foolscap -- local file inclusion
0a0670a1-3e1a-11ed-b48b-e0d55e2a8bf9 expat -- Heap use-after-free vulnerability
0a305431-bc98-11ea-a051-001b217b3468 Gitlab -- Multiple Vulnerabilities
0a38a0d9-757f-4ac3-9561-b439e933dfa9 py39-celery -- command injection vulnerability
0a48e552-e470-11ee-99b3-589cfc0f81b0 amavisd-new -- multipart boundary confusion
0a50bb48-625f-11ec-a1fb-080027cb2f6f mediawiki -- multiple vulnerabilities
0a5cf6d8-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- SCTP SCTP_SS_VALUE kernel memory corruption and disclosure
0a799a8e-c9d4-11e2-a424-14dae938ec40 irc/bitchx -- multiple vulnerabilities
0a7a5dfb-aba4-11ed-be2c-001cc0382b2f GnuTLS -- timing sidechannel in RSA decryption
0a80f159-629b-11ed-9ca2-6c3be5272acd Grafana -- Username enumeration
0a82ac0c-1886-11df-b0d1-0015f2db7bde gnome-screensaver -- Multiple monitor hotplug issues
0a82bc4d-a129-11ef-8351-589cfc0f81b0 icinga2 -- TLS Certificate Validation Bypass
0a8ebf4a-5660-11eb-b4e2-001b217b3468 Gitlab -- vulnerability
0a9e2b72-4cb7-11e1-9146-14dae9ebcf89 mozilla -- multiple vulnerabilities
0aad3ce5-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- SCTP stream reset vulnerability
0ab423e7-3822-11db-81e1-000e0c2e438a joomla -- multiple vulnerabilities
0ab66088-4aa5-11e6-a7bd-14dae9d210b8 tiff -- buffer overflow
0ac1aace-f7b9-11da-9156-000e0c2e438a ypserv -- Inoperative access controls in ypserv
0ac68e68-d32b-11dd-b540-d1288664c17e ampache -- insecure temporary file usage
0ac89b39-f829-11db-b55c-000e0c6d38a9 qemu -- several vulnerabilities
0add6e6b-6883-11eb-b0cb-f8b156c2bfe9 sympa -- Unauthorised full access via SOAP API due to illegal cookie
0ae56f3e-488c-11ed-bb31-b42e99a1b9c3 strongswan -- DOS attack vulnerability
0aee2f13-ec1d-11e8-8c92-6805ca2fa271 powerdns -- Multiple vulnerabilities
0afe8b29-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Integer overflow in IGMP protocol
0b040e24-f751-11e4-b24d-5453ed2e2b49 libssh -- null pointer dereference
0b0ad196-1ee8-4a98-89b1-4d5d82af49a9 jenkins -- DoS vulnerability in bundled XStream library
0b2b4b4d-a07c-11da-be0a-000c6ec775d9 postgresql81-server -- SET ROLE privilege escalation
0b535cd0-9b90-11e0-800a-00215c6a37bb Dokuwiki -- cross site scripting vulnerability
0b53f5f7-ca8a-11e0-aea3-00215c6a37bb dovecot -- denial of service vulnerability
0b628470-e9a6-11da-b9f4-00123ffe8333 coppermine -- Multiple File Extensions Vulnerability
0b65f297-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Insecure default GELI keyfile permissions
0b79743b-3ab7-11db-81e1-000e0c2e438a gtetrinet -- remote code execution
0b85b1cd-e468-11ed-834b-6c3be5272acd Grafana -- Critical vulnerability in golang
0b8d01a4-a0d2-11e6-9ca2-d050996490d0 BIND -- Remote Denial of Service vulnerability
0b8d7194-ca88-11e3-9d8d-c80aa9043978 OpenSSL -- Remote Data Injection / DoS
0b9af110-d529-11e6-ae1b-002590263bf5 tomcat -- multiple vulnerabilities
0b9f4b5e-5d82-11e7-85df-14dae9d5a9d2 tor -- security regression
0ba61fcc-3b38-11eb-af2a-080027dbe4b7 glpi -- SQL Injection in Search API
0baadc45-92d0-11e6-8011-005056925db4 Axis2 -- Cross-site scripting (XSS) vulnerability
0baee383-356c-11e7-b9a9-50e549ebab6c kauth: Local privilege escalation
0bb55a18-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Denial of Service with IPv6 Router Advertisements
0bb7677d-52f3-11d9-a9e7-0001020eed82 krb5 -- heap buffer overflow vulnerability in libkadm5srv
0bc67930-d5c3-11e1-bef6-0024e81297ae dns/bind9* -- Heavy DNSSEC Validation Load Can Cause a 'Bad Cache' Assertion Failure
0bd7f07b-dc22-11ed-bf28-589cfc0f81b0 libxml2 -- multiple vulnerabilities
0bf376b7-cc6b-11e2-a424-14dae938ec40 net/openafs -- buffer overflow
0bf816f6-3cfe-11ec-86cd-dca632b19f10 advancecomp -- multiple vulnerabilities
0bf9d7fb-05b3-11da-bc08-0001020eed82 mambo -- multiple vulnerabilities
0bfcae0b-947f-11ea-92ab-00163e433440 FreeBSD -- Insufficient cryptodev MAC key length check
0bfda05f-2e6f-11e5-a4a5-002590263bf5 cacti -- Multiple XSS and SQL injection vulnerabilities
0c064c43-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Resource exhaustion due to sessions stuck in LAST_ACK state
0c0dc409-1c5e-11da-92ce-0048543d60ce squid -- Possible Denial Of Service Vulnerability in store.c
0c14dfa7-879e-11e1-a2a0-00500802d8f7 nginx -- Buffer overflow in the ngx_http_mp4_module
0c2c4d84-42a2-11e5-9daa-14dae9d210b8 freeradius3 -- insufficient validation on packets
0c2db2aa-5584-11e7-9a7d-b499baebfeaf Apache httpd -- several vulnerabilities
0c367e98-0415-11ed-a53b-6c3be5272acd Grafana -- Stored XSS
0c39bafc-6771-11e3-868f-0025905a4771 asterisk -- multiple vulnerabilities
0c4d5973-f2ab-11d8-9837-000c41e2cdad mysql -- mysqlhotcopy insecure temporary file creation
0c52abde-717b-11ed-98ca-40b034429ecf rpm4 -- Multiple Vulnerabilities
0c5369fc-d671-11e6-a9a5-b499baebfeaf GnuTLS -- Memory corruption vulnerabilities
0c592c4a-1bcc-11d9-a3ec-00061bd2d56f cyrus-sasl -- potential buffer overflow in DIGEST-MD5 plugin
0c5cf7c4-856e-11e4-a089-60a44c524f57 otrs -- Incomplete Access Control
0c6759dd-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- shell injection vulnerability in patch(1)
0c6b008d-35c4-11e6-8e82-002590263bf5 flash -- multiple vulnerabilities
0c6f3fde-9c51-11d8-9366-0020ed76ef5a Midnight Commander buffer overflows, format string bugs, and insecure temporary file handling
0c7a3ee2-3654-11e1-b404-20cf30e32f6d bugzilla -- multiple vulnerabilities
0ca24682-3f03-11e6-b3c8-14dae9d210b8 openssl -- denial of service
0cb0afd9-86b8-11e5-bf60-080027ef73ec PuTTY -- memory corruption in terminal emulator's erase character handling
0cb9d5bb-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Resource exhaustion in TCP reassembly
0cbf0fa6-dcb7-469c-b87a-f94cffd94583 cURL -- Multiple vulnerabilities
0cc7e547-6a0a-11ea-92ab-00163e433440 FreeBSD -- Incorrect user-controlled pointer use in epair
0cea6e0a-7a39-4dac-b3ec-dbc13d404f76 mozilla -- multiple vulnerabilities
0cee4f9c-5efb-4770-b917-f4e4569e8bec electron26 -- multiple vulnerabilities
0cf3480d-5fdf-11d9-b721-00065be4b5b6 helvis -- arbitrary file deletion problem
0d0237d0-7f68-11de-984d-0011098ad87f SquirrelMail -- Plug-ins compromise
0d090952-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- shell injection vulnerability in patch(1)
0d0f3050-1f69-11e5-9ba9-d050996490d0 ntp -- control message remote Denial of Service vulnerability
0d3547ab-9b69-11e1-bdb1-525401003090 PivotX -- 'ajaxhelper.php' Cross Site Scripting Vulnerability
0d369972-d4ba-11e7-bfca-005056925db4 borgbackup -- remote users can override repository restrictions
0d3a5148-f512-11d8-9837-000c41e2cdad SpamAssassin -- denial-of-service in tokenize_headers
0d3f99f7-b30c-11e9-a87f-a4badb2f4699 FreeBSD -- File description reference count leak
0d4c31ac-cb91-11d8-8898-000d6111a684 Remote code injection in phpMyAdmin
0d530174-6eef-11e1-afd6-14dae9ebcf89 asterisk -- multiple vulnerabilities
0d57c1d9-03f4-11e0-bf50-001a926c7637 krb5 -- multiple checksum handling vulnerabilities
0d584493-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- routed(8) remote denial of service vulnerability
0d6efbe3-52d9-11ec-9472-e3667ed6088e mailman < 2.1.38 -- CSRF vulnerability of list mod or member against list admin page
0d724b05-687f-4527-9c03-af34d3b094ec ImageMagick -- multiple vulnerabilities
0d732fd1-27e0-11e5-a4a5-002590263bf5 xen-tools -- HVM qemu unexpectedly enabling emulated VGA graphics backends
0d7d104c-c6fb-11ed-8a4b-080027f5fec9 curl -- multiple vulnerabilities
0d9ba03b-0dbb-42b4-ae0f-60e27af78e22 sympa -- buffer overflow in "queue"
0da404ad-1891-11e5-a1cf-002590263bf5 chicken -- Potential buffer overrun in string-translate*
0da4db89-84bf-11ee-8290-a8a1599412c6 chromium -- multiple security fixes
0da8a68e-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Multiple integer overflows in expat (libbsdxml) XML parser
0dad9114-60cc-11e4-9e84-0022156e8794 jenkins -- slave-originated arbitrary code execution on master servers
0db46f84-b9fa-11ec-89df-080027240888 Django -- multiple vulnerabilities
0dc8be9e-19af-11e6-8de0-080027ef73ec OpenVPN -- Buffer overflow in PAM authentication and DoS through port sharing
0dc91089-ca41-11df-aade-0050568f000c FreeBSD -- Unvalidated input in nfsclient
0dccaa28-7f3c-11dd-8de5-0030843d3802 python -- multiple vulnerabilities
0dcf68fa-5c31-11ec-875e-901b0e9408dc Matrix clients -- several vulnerabilities
0ddb57a9-da20-4e99-b048-4366092f3d31 bzip2 -- integer overflow vulnerability
0dfa5dde-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Local privilege escalation in IRET handler
0e0385d1-9ed5-11e5-8f5c-002590263bf5 redmine -- multiple vulnerabilities
0e06013e-6a06-11ea-92ab-00163e433440 FreeBSD -- TCP IPv6 SYN cache kernel information disclosure
0e154a9c-5d7a-11d8-80e3-0020ed76ef5a seti@home remotely exploitable buffer overflow
0e1e3789-d87f-11dd-8ecd-00163e000016 vim -- multiple vulnerabilities in the netrw module
0e254b4a-1f37-11ee-a475-080027f5fec9 redis -- Heap overflow in the cjson and cmsgpack libraries
0e30e802-a9db-11dd-93a2-000bcdf0a03b opera -- multiple vulnerabilities
0e38b8f8-75dd-11eb-83f2-8c164567ca3c redis -- Integer overflow on 32-bit systems
0e3dfdde-35c4-11e6-8e82-002590263bf5 flash -- multiple vulnerabilities
0e425bb7-64f2-11e5-b2fd-00262d5ed8ee chromium -- multiple vulnerabilities
0e43a14d-3f3f-11dc-a79a-0016179b2dd5 xpdf -- stack based buffer overflow
0e561173-0fa9-11ec-a2fa-080027948c12 Python -- multiple vulnerabilities
0e561c06-d13a-11eb-92be-0800273f11ea gitea -- multiple vulnerabilities
0e575ed3-0764-11dc-a80b-0016179b2dd5 squirrelmail -- Cross site scripting in HTML filter
0e5d6969-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- rpcbind(8) remote denial of service [REVISED]
0e73964d-053a-481a-bf1c-202948d68484 electron29 -- multiple vulnerabilities
0e8e1212-0ce5-11e1-849b-003067b2972c linux-flashplugin -- multiple vulnerabilities
0e8f496a-b498-11e8-bdcf-74d435e60b7c py-asyncssh -- Allows bypass of authentication
0eab001a-9708-11ec-96c9-589cfc0f81b0 typo3 -- XSS vulnerability in svg-sanitize
0ebc6e78-7ac6-11e5-b35a-002590263bf5 Joomla! -- Core - SQL Injection/ACL Violation vulnerabilities
0ecc1f55-45d0-11e5-adde-14dae9d210b8 unreal -- denial of service
0ed71663-c369-11ea-b53c-d4c9ef517024 MySQL -- Multiple vulnerabilities
0ef3398e-da21-11ee-b23a-080027a5b8e9 Django -- multiple vulnerabilities
0f020b7b-e033-11e1-90a2-000c299b62e1 FreeBSD -- named(8) DNSSEC validation Denial of Service
0f154810-16e4-11e5-a1cf-002590263bf5 rubygem-paperclip -- validation bypass vulnerability
0f31b4e9-c827-11e9-9626-589cfc01894a Mozilla -- Stored passwords in 'Saved Logins' can be copied without master password entry
0f37d765-c5d4-11db-9f82-000e0c2e438a OpenSSL -- Multiple problems in crypto(3)
0f445859-7f0e-11ee-94b4-6cc21735f730 postgresql-server -- Buffer overrun from integer overflow in array modification
0f488b7b-bbb9-11e4-903c-080027ef73ec e2fsprogs -- buffer overflow if s_first_meta_bg too big
0f51f2c9-8956-11dd-a6fe-0030843d3802 proftpd -- Long Command Processing Vulnerability
0f5a2b4d-694b-11d9-a9e7-0001020eed82 awstats -- remote command execution vulnerability
0f62be39-e8e0-11e1-bea0-002354ed89bc OpenTTD -- Denial of Service
0f66b901-715c-11e7-ad1f-bcaec565249c webkit2-gtk3 -- multiple vulnerabilities
0f7598cc-9fe2-11ee-b47f-901b0e9408dc nebula -- security fix for terrapin vulnerability
0f798bd6-8325-11ea-9a78-08002728f74c libntlm -- buffer overflow vulnerability
0f8bf913-7efa-11ec-8c04-2cf05d620ecc polkit -- Local Privilege Escalation
0f99a30c-7b4b-11ed-9168-080027f5fec9 curl -- multiple vulnerabilities
0fa15e08-92ec-11e1-a94a-00215c6a37bb samba -- incorrect permission checks vulnerability
0fcd3af0-a0fe-11e6-b1cf-14dae9d210b8 FreeBSD -- OpenSSL Remote DoS vulnerability
0fe70bcd-2ce3-46c9-a64b-4a7da097db07 python -- possible integer overflow vulnerability
0fe73a4a-1b18-11de-8226-0030843d3802 pivot-weblog -- file deletion vulnerability
0ff0e9a6-4ee0-11d9-a9e7-0001020eed82 phpmyadmin -- command execution vulnerability
0ff80f41-aefe-11ec-b4b6-d05099c0c059 gitea -- Improper/incorrect authorization
100a9ed2-ee56-11dd-ab4f-0030843d3802 tor -- unspecified memory corruption vulnerability
101f0aae-52d1-11e2-87fe-f4ce46b9ace8 puppet -- multiple vulnerabilities
1020d401-6d2d-11eb-ab0b-001b217b3468 Gitlab -- Multiple Vulnerabilities
10214bda-0902-4e3b-a2f9-9a68ef206a73 libbson -- Denial of Service
1033750f-cab4-11d9-9aed-000e0c2e438a oops -- format string vulnerability
103a47d5-27e7-11e5-a4a5-002590263bf5 xen-kernel -- Certain domctl operations may be abused to lock up the host
103bf96a-6211-45ab-b567-1555ebb3a86a firefox -- Arbitrary code execution through unsanitized browser UI
104beb63-af4d-11da-8414-0013d4a4a40e mplayer -- heap overflow in the ASF demuxer
10720fe8-51e0-11e1-91c1-00215c6a37bb drupal -- multiple vulnerabilities
107692a1-ee6c-11d9-8310-0001020eed82 acroread -- insecure temporary file creation
107c7a76-beaa-11eb-b87a-901b0ef719ab FreeBSD -- Missing message validation in libradius(3)
107e2ee5-f941-11da-b1fa-020039488e34 libxine -- buffer overflow vulnerability
108a4be3-e612-11e9-9963-5f1753e0aca0 unbound -- parsing vulnerability
1091d2d1-cb2e-11e5-b14b-bcaec565249c webkit -- UI spoof
10968dfd-a687-11e6-b2d3-60a44ce6887b gitlab -- Directory traversal via "import/export" feature
1098a15b-b0f6-42b7-b5c7-8a8646e8be07 mozilla -- multiple vulnerabilities
10a24ce0-ab68-11ea-b9b8-641c67a117d8 znc -- Authenticated users can trigger an application crash
10a6d0aa-0b1c-11e5-bb90-002590263bf5 libzmq4 -- V3 protocol handler vulnerable to downgrade attacks
10bf8eed-b14d-11e5-9728-002590263bf5 qemu -- denial of service vulnerability in e1000 NIC support
10c0fabc-b5da-11e7-816e-00bd5d1fff09 h2o -- DoS in workers
10d14955-0e45-11e5-b6a8-002590263bf5 strongswan -- Information Leak Vulnerability
10d73529-7f4b-11e4-af66-00215af774f0 unbound -- can be tricked into following an endless series of delegations, this consumes a lot of resources
10dee731-c069-11ee-9190-84a93843eb75 OpenSSL -- Multiple vulnerabilities
10e1d580-d174-11e9-a87f-a4badb2f4699 xymon-server -- multiple vulnerabilities
10e3ed8a-db7f-11ea-8bdf-643150d3111d puppetdb -- Multiple vulnerabilities
10e86b16-6836-11ee-b06f-0050569ceb3a Unallowed PHP script execution in GLPI
10f7bc76-0335-4a88-b391-0b05b3a8ce1c NSS -- MD5 downgrade in TLS 1.2 signatures
10f7f782-901c-11e6-a590-14dae9d210b8 ImageMagick -- multiple vulnerabilities
10fd731c-8088-11e9-b6ae-001871ec5271 cyrus-imapd -- buffer overrun in httpd
1110e286-dc08-11ea-beed-e09467587c17 chromium -- multiple vulnerabilities
111aefca-2213-11e9-9c8d-6805ca0b3d42 phpMyAdmin -- File disclosure and SQL injection
111f1f84-1d14-4ff2-a9ea-cf07119c0d3b libyaml heap overflow resulting in possible code execution
11292460-3f2f-11e9-adcb-001b217b3468 Gitlab -- Multiple vulnerabilities
11325357-1d3c-11eb-ab74-4c72b94353b5 wordpress -- multiple issues
11351c82-9909-11e5-a9c8-14dae9d5a9d2 piwik -- multiple vulnerabilities
1135e939-62b4-11ec-b8e2-1c1b0d9ea7e6 opengrok -- Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok.
1138b39e-6abb-11e9-a685-001b217b3468 Gitlab -- Multiple vulnerabilities
113cd7e9-a4e2-11de-84af-001195e39404 fwbuilder -- security issue in temporary file handling
114d70f3-3d16-11d9-8818-008088034841 Cyrus IMAPd -- PARTIAL command out of bounds memory corruption
115a1389-858e-11e0-a76c-000743057ca2 Pubcookie Login Server -- XSS vulnerability
116b0820-d59c-11da-8098-00123ffe8333 lifetype -- ADOdb "server.php" Insecure Test Script Security Issue
11982747-544c-11ee-ac3e-a04a5edf46d9 routinator -- multiple vulnerabilities
11a84092-8f9f-11db-ab33-000e0c2e438a gzip -- multiple vulnerabilities
11bbccbc-03ee-11e0-bcdb-001fc61c2a55 krb5 -- multiple checksum handling vulnerabilities
11c52bc6-97aa-11e5-b8df-14dae9d210b8 django -- information leak vulnerability
11dc3890-0e64-11e8-99b0-d017c2987f9a OpenJPEG -- multiple vulnerabilities
11e36890-d28c-11ec-a06f-d4c9ef517024 curl -- Multiple vulnerabilities
11fcfa8f-ac64-11ea-9dab-000d3ab229d6 Node.js -- June 2020 Security Releases
12156786-b18a-11eb-8cba-080027b00c2e cyrus-imapd -- Remote authenticated users could bypass intended access restrictions on certain server annotations.
121fec01-c042-11e9-a73f-b36f5969f162 nghttp2 -- multiple vulnerabilities
1225549f-ca91-11e2-b3b8-f0def16c5c1b passenger -- security vulnerability
1225c888-56ea-11ed-b5c3-3065ec8fd3ec chromium -- Type confusion in V8
12488805-6773-11dc-8be8-02e0185f8d72 coppermine -- multiple vulnerabilities
1257718e-be97-458a-9744-d938b592db42 node -- access to unintended files
125f5958-b611-11e6-a9a5-b499baebfeaf Roundcube -- arbitrary command execution
12741b1f-04f9-11ee-8290-a8a1599412c6 chromium -- multiple vulnerabilities
127674c6-4a27-11ed-9f93-002b67dfc673 roundcube-thunderbird_labels -- RCE with custom label titles
128deba6-ff56-11eb-8514-3065ec8fd3ec chromium -- multiple vulnerabilities
12b1a62d-6056-4d90-9e21-45fcde6abae4 gallery -- remote code injection via HTTP_POST_VARS
12b336c6-fe36-11dc-b09c-001c2514716c mozilla -- multiple vulnerabilities
12b7286f-16a2-11dc-b803-0016179b2dd5 webmin -- cross site scripting vulnerability
12b7b4cf-1d53-11d9-814e-0001020eed82 wordpress -- XSS in administration panel
12bd6ecf-c430-11db-95c5-000c6ec775d9 mozilla -- multiple vulnerabilities
12c7b7ae-ec90-11d8-b913-000c41e2cdad popfile file disclosure
12d1b5a6-e39d-11e5-9f77-5453ed2e2b49 websvn -- reflected cross-site scripting
12d266b6-363f-11dc-b6c9-000c6ec775d9 opera -- multiple vulnerabilities
12e3feab-a29f-11ef-af48-6cc21735f730 PostgreSQL -- SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID
12efc567-9879-11dd-a5e7-0030843d3802 drupal -- multiple vulnerabilities
12f9d9e9-9e1e-11da-b410-000e0c2e438a phpicalendar -- cross site scripting vulnerability
13031d98-9bd1-11e2-a7be-8c705af55518 FreeBSD -- BIND remote denial of service
131bd7c4-64a3-11d9-829a-000a95bc6fae libxine -- DVD subpicture decoder heap overflow
13320091-52a6-11e2-a289-1c4bd681f0cf otrs -- XSS vulnerability
1340fcc1-2953-11e9-bc44-a4badb296695 mail/dovecot -- Suitable client certificate can be used to login as other user
13419364-1685-11e4-bf04-60a44c524f57 i2p -- Multiple Vulnerabilities
134acaa2-51ef-11e2-8e34-0022156e8794 tomcat -- denial of service
1374b96c-a1c2-11db-9ddc-0011098b2f36 sircd -- remote reverse DNS buffer overflow
1384f2fd-b1be-11e5-9728-002590263bf5 qemu -- denial of service vulnerability in Rocker switch emulation
13960f55-8d35-11e9-9ba0-4c72b94353b5 mybb -- vulnerabilities
1396a74a-4997-11e9-b5f1-83edb3f89ba1 Rails -- Action View vulnerabilities
13a8c4bf-cb2b-48ec-b49c-a3875c72b3e8 electron{26,27,28} -- Use after free in Web Audio
13b0c8c8-bee0-11dd-a708-001fc66e7203 p5-File-Path -- rmtree allows creation of setuid files
13bf0602-c08a-11e2-bb21-083e8ed0f47b plib -- buffer overflow
13c54e6d-5c45-11eb-b4e2-001b217b3468 nokogiri -- Security vulnerability
13ca36b8-6141-11eb-8a36-7085c2fb2c14 pngcheck -- Buffer-overrun vulnerability
13d37672-9791-11eb-b87a-901b0ef719ab FreeBSD -- Memory disclosure by stale virtual memory mapping
13d6d997-f455-11dd-8516-001b77d09812 sudo -- certain authorized users could run commands as any user
13d83980-9f18-11ee-8e38-002590c1f29c FreeBSD -- Prefix Truncation Attack in the SSH protocol
140a14b5-d615-11e8-b3cb-00e04c1ea73d drupal -- Drupal Core - Multiple Vulnerabilities
140a20e1-8769-11ed-b074-002b67dfc673 webtrees -- vulnerability
141f2a22-a6a7-11ef-b282-0c9d92850f7a xorg server -- _XkbSetCompatMap vulnerability
142353df-b5cc-11d9-a788-0001020eed82 gaim -- remote DoS on receiving malformed HTML
142c538e-b18f-40a1-afac-c479effadd5c openvpn -- two security fixes
1431a25c-8a70-11eb-bd16-0800278d94f0 gitea -- quoting in markdown text
1431f2d6-a06e-11e2-b9e0-001636d274f3 NVIDIA UNIX driver -- ARGB cursor buffer overflow in "NoScanout" mode
143ec3d6-b7cf-11e7-ac58-b499baebfeaf cURL -- out of bounds read
143f6932-fedb-11e1-ad4a-003067b2972c bacula -- Console ACL Bypass
144836e3-2358-11ef-996e-40b034455553 minio -- privilege escalation via permissions inheritance
144e524a-77eb-11df-ae06-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
1455c86c-26c2-11e7-9daa-6cf0497db129 drupal8 -- Drupal Core - Critical - Access Bypass
145a3e17-cea2-11e9-81e2-005056a311d1 samba -- combination of parameters and permissions can allow user to escape from the share path definition
145ce848-1165-11ec-ac7e-08002789875b Python -- multiple vulnerabilities
1460aa25-e6ab-11e8-a733-e0d55e2a8bf9 kio-extras -- HTML Thumbnailer automatic remote file access
147353a3-c33b-46d1-b751-e72c0d7f29df electron{25,26} -- use after free in Garbage Collection
1489df94-6bcb-11d9-a21e-000a95bc6fae opera -- multiple vulnerabilities in Java implementation
14908bda-232b-11ef-b621-00155d645102 cyrus-imapd -- unbounded memory allocation
1495f931-8522-11e0-a1c1-00215c6a37bb pureftpd -- multiple vulnerabilities
14a37474-1383-11e0-8a58-00215c6a37bb django -- multiple vulnerabilities
14a3b376-b30a-11e9-a87f-a4badb2f4699 FreeBSD -- Privilege escalation in cd(4) driver
14a6f516-502f-11e0-b448-bbfa2731f9c7 postfix -- plaintext command injection with SMTP over TLS
14ab174c-40ef-11de-9fd5-001bd3385381 cyrus-sasl -- buffer overflow vulnerability
14ad2a28-66d2-11dc-b25f-02e0185f8d72 konquerer -- address bar spoofing
14d846d6-27b3-11e5-a15a-50af736ef1c0 pivotx -- cross-site scripting (XSS) vulnerability
14ea4458-e5cd-11e6-b56d-38d547003487 wordpress -- multiple vulnerabilities
150d1538-23fa-11e5-a4a5-002590263bf5 squid -- Improper Protection of Alternate Path with CONNECT requests
150e4548-8950-11dd-a6fe-0030843d3802 phpmyadmin -- Cross-Site Scripting Vulnerability
15236023-a21b-11e2-a460-208984377b34 linux-flashplugin -- multiple vulnerabilities
152acff3-b1bd-11e5-9728-002590263bf5 qemu -- denial of service vulnerability in Q35 chipset emulation
152b27f0-a158-11de-990c-e5b1d4c882e0 nginx -- remote denial of service vulnerability
152e4c7e-2a2e-11e2-99c7-00a0d181e71d tomcat -- authentication weaknesses
15485ae8-9848-11dc-9e48-0016179b2dd5 phpmyadmin -- Cross Site Scripting
1567be8c-0a15-11ee-8290-a8a1599412c6 chromium -- multiple vulnerabilities
157ce083-d145-11ec-ab9b-6cc21735f730 PostgreSQL Server -- execute arbitrary SQL code as DBA user
1583640d-be20-11dd-a578-0030843d3802 samba -- potential leakage of arbitrary memory contents
15888c7e-e659-11ec-b7fe-10c37b4ac2ea go -- multiple vulnerabilities
15a04b9f-47cb-11e7-a853-001fbc0f280f ansible -- Input validation flaw in jinja2 templating system
15a62f22-098a-443b-94e2-2d26c375b993 osip -- Improper Restriction of Operations within the Bounds of a Memory Buffer
15d398ea-4f73-11ef-8a0f-a8a1599412c6 chromium -- multiple security fixes
15dae5cc-9ee6-4577-a93e-2ab57780e707 py39-sentry-sdk -- sensitive cookies leak
15e0e963-02ed-11d9-a209-00061bc2ad93 mpg123 buffer overflow
15e74795-0fd7-11ec-9f2e-dca632b19f10 libpano13 -- arbitrary memory access through format string vulnerability
15ec9123-7061-11dc-b372-001921ab2fa4 id3lib -- insecure temporary file creation
15ee0e93-4bbb-11e9-9ba0-4c72b94353b5 wordpress -- multiple issues
1606b03b-ac57-11eb-9bdd-8c164567ca3c redis -- multiple vulnerabilities
1613db79-8e52-11da-8426-000fea0a9611 kpopup -- local root exploit and local denial of service
162a675b-6251-11ee-8e38-002590c1f29c FreeBSD -- arm64 boot CPUs may lack speculative execution protections
1650cee2-a320-11ea-a090-08002734b9ed gitea -- multiple vulnerabilities
1657a3e6-4585-11e2-a396-10bf48230856 linux-flashplugin -- multiple vulnerabilities
165e8951-4be0-11e7-a539-0050569f7e80 irssi -- remote DoS
167953a4-b01c-11df-9a98-0015587e2cc1 quagga -- stack overflow and DoS vulnerabilities
168190df-3e9a-11dd-87bc-000ea69a5213 fetchmail -- potential crash in -v -v verbose mode
16846d1e-f1de-11e1-8bd8-0022156e8794 Java 1.7 -- security manager bypass
1685144e-63ff-11ea-a93a-080027846a02 Django -- potential SQL injection vulnerability
169f422f-bd88-11d9-a281-02e018374e71 groff -- groffer uses temporary files unsafely
16aed7b7-344a-11ea-9cdb-001b217b3468 phpMyAdmin -- SQL injection
16f7ec68-5cce-11ed-9be7-454b1dd82c64 Gitlab -- Multiple vulnerabilities
16fb4f83-a2ab-11e7-9c14-009c02a2ab30 ImageMagick -- denial of service via a crafted font file
17083017-d993-43eb-8aaf-7138f4486d1c py39-unicorn -- sandbox escape and arbitrary code execution vulnerability
1709084d-4d21-11db-b48d-00508d6a62df plans -- multiple vulnerabilities
17133e7e-d764-11e7-b5af-a4badb2f4699 varnish -- information disclosure vulnerability
171afa61-3eba-11ef-a58f-080027836e8b Django -- multiple vulnerabilities
172acf78-780c-11dc-b3f4-0016179b2dd5 png -- multiple vulnerabilities
172b22cb-d3f6-11e5-ac9e-485d605f4717 firefox -- Same-origin-policy violation using Service Workers with plugins
17326fd5-fcfb-11e2-9bb9-6805ca0b3d42 phpMyAdmin -- clickJacking protection can be bypassed
174b8864-6237-11e1-be18-14dae938ec40 databases/postgresql*-client -- multiple vulnerabilities
174e466b-1d48-11eb-bd0f-001b217b3468 Gitlab -- Multiple vulnerabilities
1753f0ff-8dd5-11e3-9b45-b4b52fce4ce8 mozilla -- multiple vulnerabilities
1766359c-ad6e-11eb-b2a4-080027e50e6d Django -- multiple vulnerabilities
17702e54-3da0-11ec-b7e0-3085a9a95629 pyrad -- multiple vulnerabilities
177fa455-48fc-4ded-ba1b-9975caa7f62a bro -- Unsafe integer conversions can cause unintentional code paths to be executed
178ba4ea-fd40-11e1-b2ae-001fd0af1a4c mod_pagespeed -- multiple vulnerabilities
17a30a24-c579-11ec-bbbd-0800270512f4 eb -- Potential buffer overrun vulnerability
17cb6ff3-7670-11e8-8854-6805ca0b3d42 phpmyadmin -- remote code inclusion and XSS scripting
17dfd984-feba-11e3-b938-5404a68ad561 mencoder -- potential buffer overrun when processing malicious lzo compressed input
17efbe19-4e72-426a-8016-2b4e001c1378 py-wagtail -- stored XSS vulnerability
17f369dc-d7e7-11e1-90a2-000c299b62e1 nsd -- Denial of Service
17f53c1d-2ae9-11db-a6e2-000e0c2e438a postgresql -- encoding based SQL injection
1800886c-3dde-11e1-89b4-001ec9578670 isc-dhcp-server -- DoS in DHCPv6
180e9a38-060f-4c16-a6b7-49f3505ff22a kernel -- information disclosure when using HTT
181beef6-2482-11e9-b4a3-00155d006b02 turnserver -- multiple vulnerabilities
181f5e49-b71d-4527-9464-d4624d69acc3 py-treq -- sensitive information leak vulnerability
18201a1c-d59a-11e5-8fa8-14dae9d210b8 adminer -- XSS vulnerability
18211552-f650-4d86-ba4f-e6d5cbfcdbeb mozilla -- multiple vulnerabilities
1827f213-633e-11e2-8d93-c8600054b392 drupal -- multiple vulnerabilities
1839f78c-9f2b-11e3-980f-20cf30e32f6d subversion -- mod_dav_svn vulnerability
183d700e-ec70-487e-a9c4-632324afa934 ImageMagick -- multiple vulnerabilities
18449f92-ab39-11e6-8011-005056925db4 libwww -- multiple vulnerabilities
184ab9e0-64cd-11d9-9e1e-c296ac722cb3 squid -- buffer overflow vulnerability in gopherToHTML
184f5d0b-0fe8-11d9-8a8a-000c41e2cdad subversion -- WebDAV fails to protect metadata
18529cb0-3e9c-11ed-9bc7-3065ec8fd3ec chromium -- multiple vulnerabilities
185ff22e-c066-11e1-b5e0-000c299b62e1 FreeBSD -- Incorrect crypt() hashing
187ab98e-2953-4495-b379-4060bd4b75ee py27-setuptools44 -- denial of service vulnerability
1886e195-8b87-11e5-90e7-b499baebfeaf libpng buffer overflow in png_set_PLTE
18974c8a-1fbd-11d9-814e-0001020eed82 apache13-modssl -- format string vulnerability in proxy support
18a14baa-5ee5-11db-ae08-0008743bf21a ingo -- local arbitrary shell command execution
18ac074c-579f-11ec-aac7-3065ec8fd3ec chromium -- multiple vulnerabilities
18b3c61b-83de-11e5-905b-ac9e174be3af OpenOffice 4.1.1 -- multiple vulnerabilities
18ce9a90-f269-11e1-be53-080027ef73ec fetchmail -- chosen plaintext attack against SSL CBC initialization vectors
18dc48fe-ca42-11df-aade-0050568f000c FreeBSD -- Integer overflow in bzip2 decompression
18dffa02-946a-11e1-be9d-000c29cc39d3 WebCalendar -- multiple vulnerabilities
18e3a5be-81f9-11db-95a2-0012f06707f0 ImageMagick -- SGI Image File heap overflow vulnerability
18e5428f-ae7c-11d9-837d-000e0c2e438a jdk -- jar directory traversal vulnerability
18ed9650-a1d6-11e9-9b17-fcaa147e860e python 3.6 -- multiple vulnerabilities
18f39fb6-7400-4063-acaf-0806e92c094f Mozilla -- SVG Animation Remote Code Execution
190176ce-3b3a-11eb-af2a-080027dbe4b7 glpi -- Insecure Direct Object Reference on ajax/comments.ph
19047673-c680-11ee-86bb-a8a1599412c6 chromium -- multiple security fixes
19207592-5f17-11db-ae08-0008743bf21a drupal -- HTML attribute injection
19259833-26b1-11eb-a239-1c697a013f4b mantis -- multiple vulnerabilities
192609c8-0c51-11df-82a0-00248c9b4be7 irc-ratbox -- multiple vulnerabilities
19419b3b-92bd-11df-b140-0015f2db7bde webkit-gtk2 -- Multiple vulnerabilities
19518d22-2d05-11d9-8943-0050fc56d258 putty -- buffer overflow vulnerability in ssh2 support
1959e847-d4f0-11e3-84b0-0018fe623f2b OpenSSL -- NULL pointer dereference / DoS
196b31b8-aa9a-11ea-a59a-6451062f0f7a Flash Player -- arbitrary code execution
19751e06-c798-11e2-a373-000c29833058 znc -- null pointer dereference in webadmin module
197f444f-e8ef-11d9-b875-0001020eed82 bzip2 -- denial of service and permission race vulnerabilities
1986449a-8b74-40fa-b7cc-0d8def8aad65 openvpn -- denial of service: malicious authenticated "tap" client can deplete server virtual memory
1989b511-ae62-11d9-a788-0001020eed82 mozilla -- code execution through javascript: favicons
198a120d-c22d-11ea-9172-4c72b94353b5 mybb -- multible vulnerabilities
198d82f3-8777-11e7-950a-e8e0b747a45a dnsdist -- multiple vulnerabilities
198e6220-ac8b-11e9-a1c7-b499baebfeaf MySQL -- Multiple vulerabilities
1999a215-fc6b-11e8-8a95-ac1f6b67e138 couchdb -- administrator privilege escalation
199cdb4d-690d-11ee-9ed0-001fc69cd6dc x11/libXpm multiple vulnerabilities
19a92df1-548d-11db-8f1a-000a48049292 tin -- buffer overflow vulnerabilities
19b052c9-c533-11e7-8da5-001999f8d30b asterisk -- Buffer overflow in pjproject header parsing can cause crash in Asterisk
19b17ab4-51e0-11db-a5ae-00508d6a62df phpmyadmin -- XSRF vulnerabilities
19d35b0f-ba73-11e6-b1cf-14dae9d210b8 ImageMagick -- heap overflow vulnerability
19d648e0-ab69-11e9-bfef-000ffec0b3e1 drupal -- Drupal core - Access bypass
19e6dd1b-c6a5-11ee-9cd0-6cc21735f730 postgresql-server -- non-owner REFRESH MATERIALIZED VIEW CONCURRENTLY executes arbitrary SQL
1a0704e7-0edf-11e0-becc-0022156e8794 php-imap -- Denial of Service
1a0de610-a761-11e3-95fe-bcaec565249c freetype2 -- Out of bounds read/write
1a0e4cc6-29bf-11de-bdeb-0030843d3802 phpmyadmin -- insufficient output sanitizing when generating configuration file
1a15b928-5011-4953-8133-d49e24902fe1 py-WsgiDAV -- XSS vulnerability
1a216dfd-f710-11da-9156-000e0c2e438a freeradius -- authentication bypass vulnerability
1a2aa04f-3718-11e6-b3c8-14dae9d210b8 libxslt -- Denial of Service
1a32e8ee-3edb-11d9-8699-00065be4b5b6 ProZilla -- server response buffer overflow vulnerabilities
1a3bd81f-1b25-11df-bd1a-002170daae37 lighttpd -- denial of service vulnerability
1a448eb7-6988-11d8-873f-0020ed76ef5a mod_python denial-of-service vulnerability in parse_qs
1a6b7641-aed2-4ba1-96f4-c282d5b09c37 zeek -- Various vulnerabilities
1a6bbb95-24b8-11e6-bd31-3065ec8fd3ec chromium -- multiple vulnerabilities
1a71a972-8ee7-11e6-a590-14dae9d210b8 FreeBSD -- Multiple libarchive vulnerabilities
1a75c84a-11c8-11e8-83e7-485b3931c969 bitmessage -- remote code execution vulnerability
1a802ba9-f444-11e6-9940-b499baebfeaf openssl -- crash on handshake
1a818749-d646-11dc-8959-000bcdc1757a zenphoto -- XSS vulnerability
1a9f678d-48ca-11df-85f8-000c29a67389 sudo -- Privilege escalation with sudoedit
1aa7a094-1147-11ea-b537-001b217b3468 Gitlab -- Multiple Vulnerabilities
1aaaa5c6-804d-11ec-8be6-d4c9ef517024 OpenSSL -- BN_mod_exp incorrect results on MIPS
1ab7357f-a3c2-406a-89fb-fd00e49a71b5 zeek -- potential DoS vulnerabilities
1ac77649-0908-11dd-974d-000fea2763ce lighttpd -- OpenSSL Error Queue Denial of Service Vulnerability
1ac858b0-3fae-11e1-a127-0013d3ccd9df OpenTTD -- Denial of service (server) via slow read attack
1acf9ec5-877d-11e0-b937-001372fd0af2 drupal6 -- multiple vulnerabilities
1ad3d264-e36b-11ee-9c27-40b034429ecf typo3-{11,12} -- multiple vulnerabilities
1ae613c3-5728-11e2-9483-14dae938ec40 freetype -- Multiple vulnerabilities
1af16f2b-023c-11ef-8791-6805ca2fa271 powerdns-recursor -- denial of service
1afe9552-5ee3-11ea-9b6d-901b0e934d69 py-matrix-synapse -- users of single-sign-on are vulnerable to phishing
1b043693-8617-11db-93b2-000e35248ad7 libxine -- multiple buffer overflow vulnerabilities
1b0d2938-0766-11e6-94fa-002590263bf5 libtasn1 -- denial of service parsing malicious DER certificates
1b15a554-c981-11ed-bb39-901b0e9408dc tailscale -- security vulnerability in Tailscale SSH
1b27af46-d6f6-11e0-89a6-080027ef73ec ca_root_nss -- extraction of explicitly-untrusted certificates into trust bundle
1b2a8e8a-9fd5-11ee-86bb-a8a1599412c6 chromium -- security fix
1b38aec4-4149-4c7d-851c-3c4de3a1fbd0 py39-setuptools -- denial of service vulnerability
1b3f854b-e4bd-11de-b276-000d8787e1be freeradius -- remote packet of death vulnerability
1b61ecef-cdb9-11e6-a9a5-b499baebfeaf PHP -- multiple vulnerabilities
1b6a10e9-4b7b-11e9-9e89-54e1ad3d6335 libXdmcp -- insufficient entropy generating session keys
1b70bef4-649f-11d9-a30e-000a95bc6fae libxine -- multiple buffer overflows in RTSP
1b725079-9ef6-11da-b410-000e0c2e438a sudo -- arbitrary command execution
1b769b72-582b-11e2-b66b-00e0814cab4e django -- multiple vulnerabilities
1b93f6fe-e1c1-11e2-948d-6805ca0b3d42 phpMyAdmin -- Global variable scope injection
1b9b199f-5efd-11e2-a1ee-c48508086173 ettercap -- buffer overflow in target list parsing
1ba034fb-ca38-11ed-b242-d4c9ef517024 OpenSSL -- Excessive Resource Usage Verifying X.509 Policy Constraints
1ba21ff1-e672-11eb-a686-3065ec8fd3ec chromium -- multiple vulnerabilities
1bb2826b-7229-11eb-8386-001999f8d30b asterisk -- Remote Crash Vulnerability in PJSIP channel driver
1bc07be0-b514-11ee-86bb-a8a1599412c6 chromium -- multiple security fixes
1bcfd963-e483-41b8-ab8e-bad5c3ce49c9 brotli -- buffer overflow
1bdd4db6-2223-11ec-91be-001b217b3468 Gitlab -- vulnerabilities
1c0def84-5fb1-11db-b2e9-0008c79fa3d2 asterisk -- remote heap overwrite vulnerability
1c21f6a3-9415-11e9-95ec-6805ca2fa271 powerdns -- multiple vulnerabilities
1c27a706-e3aa-11e8-b77a-6cc21735f730 PostgreSQL -- SQL injection in pg_upgrade and pg_dump
1c2a9d76-9d98-43c3-8f5d-8c059b104d99 jenkins -- multiple issues
1c3142a3-4ab2-11da-932d-00055d790c25 squid -- FTP server response handling denial of service
1c4cab30-5468-11e1-9fb7-003067b2972c bip -- buffer overflow
1c5abbe2-8d7f-11e1-a374-14dae9ebcf89 asterisk -- multiple vulnerabilities
1c5f3fd7-54bf-11ed-8d1e-005056a311d1 samba -- buffer overflow in Heimdal unwrap_des3()
1c7cfd05-aaee-11e4-83b4-14dae9d210b8 Xymon -- buffer overrun
1c840eb9-fb32-11e3-866e-b499baab0cbe gnupg -- possible DoS using garbled compressed data packets
1c8a039b-7b23-11e2-b17b-20cf30e32f6d bugzilla -- multiple vulnerabilities
1c9178aa-2709-11ea-9673-4c72b94353b5 typo3 -- multiple vulnerabilities
1c948fd3-dac0-11e9-81b2-0011d823eebd Mbed TLS -- Side channel attack on deterministic ECDSA
1ca8228f-858d-11e0-a76c-000743057ca2 mod_pubcookie -- Empty Authentication Security Advisory
1cae628c-3569-11e0-8e81-0022190034c0 rubygem-mail -- Remote Arbitrary Shell Command Injection Vulnerability
1cb0af4e-d641-4f99-9432-297a89447a97 webkit-gtk3 -- Multiple vulnerabilities
1cd0c17a-17c0-11ed-91a5-080027f5fec9 gnutls -- double free vulnerability
1cd3ca42-33e6-11e2-a255-5404a67eef98 lighttpd -- remote DoS in header parsing
1cd565da-455e-41b7-a5b9-86ad8e81e33e seatd-launch -- remove files with escalated privileges with SUID
1cd87e2a-81e3-11df-81d8-00262d5ed8ee mDNSResponder -- corrupted stack crash when parsing bad resolv.conf
1cd89254-b2db-11e9-8001-001b217b3468 Gitlab -- Multiple Vulnerabilities
1ce95bc7-3278-11e8-b527-00012e582166 webkit2-gtk3 -- multiple vulnerabilities
1cecd5e0-c372-11e5-96d6-14dae9d210b8 xymon-server -- multiple vulnerabilities
1cf00643-ed8a-11d9-8310-0001020eed82 cacti -- multiple vulnerabilities
1cf65085-a760-41d2-9251-943e1af62eb8 X.org libraries -- multiple vulnerabilities
1d0f6852-33d8-11e6-a671-60a44ce6887b Python -- Integer overflow in zipimport module
1d193bba-03f6-11e0-bf50-001a926c7637 krb5 -- RFC 3961 key-derivation checksum handling vulnerability
1d23109a-9005-11e2-9602-d43d7e0c7c02 php5 -- Multiple vulnerabilities
1d33cdee-7f6b-11e7-a9b5-3debb10a6871 Mercurial -- multiple vulnerabilities
1d3677a8-9143-42d8-84a3-0585644dff4b h2o -- uninitialised memory access in HTTP3
1d3a2737-7eb7-11d9-acf7-000854d03344 unace -- multiple vulnerabilities
1d567278-87a5-11e4-879c-000c292ee6b8 git -- Arbitrary command execution on case-insensitive filesystems
1d56cfc5-3970-11eb-929d-d4c9ef517024 OpenSSL -- NULL pointer de-reference
1d6410e8-06c1-11ec-a35d-03ca114d16d6 fetchmail -- STARTTLS bypass vulnerabilities
1d651770-f4f5-11eb-ba49-001b217b3468 Gitlab -- Gitlab
1d8ff4a2-0445-11e0-8e32-000f20797ede mozilla -- multiple vulnerabilities
1d951e85-ffdb-11e7-8b91-e8e0b747a45a chromium -- multiple vulnerabilities
1d96305d-6ae6-11dd-91d5-000c29d47fd7 Bugzilla -- Directory Traversal in importxml.pl
1daea60a-4719-11da-b5c6-0004614cc33d ruby -- vulnerability in the safe level settings
1db1ed59-af07-11d8-acb9-000d610a3b12 buffer cache invalidation implementation issues
1db7ecf5-fd24-11d9-b4d6-0007e900f87b clamav -- multiple remote buffer overflows
1dd84344-a7da-11ed-86e9-d4c9ef517024 LibreSSL -- Arbitrary memory read
1ddab5cb-14c9-4632-959f-802c412a9593 jenkins -- multiple vulnerabilities
1e1421f0-8d6f-11e0-89b4-001ec9578670 BIND -- Large RRSIG RRsets and Negative Caching DoS
1e14d46f-af1f-11e1-b242-00215af774f0 quagga -- BGP OPEN denial of service vulnerability
1e232a0c-eb57-11e4-b595-4061861086c1 Several vulnerabilities found in PHP
1e37fa3e-5988-4991-808f-eae98047e2af py-httpie -- exposure of sensitive information vulnerabilities
1e54d140-8493-11e8-a795-0028f8d09152 couchdb -- multiple vulnerabilities
1e606080-3293-11da-ac91-020039488e34 uim -- privilege escalation vulnerability
1e63db88-1050-11e5-a4df-c485083ca99c Adobe Flash Player -- critical vulnerabilities
1e6c4008-245f-11d9-b584-0050fc56d258 gaim -- buffer overflow in MSN protocol support
1e71e366-080b-4e8f-a9e6-150bf698186b chromium -- multiple security fixes
1e7b316b-c6a8-11ea-a7d5-001999f8d30b VirtualBox -- Multiple vulnerabilities
1e7f0c11-673a-11e5-98c8-60a44c524f57 otrs -- Scheduler Process ID File Access
1e7fa41b-f6ca-4fe8-bd46-0e176b42b14f libssh -- Unsanitized location in scp could lead to unwanted command execution
1e8031be-4258-11de-b67a-0030843d3802 php -- ini database truncation inside dba_replace() function
1e8e63c0-478a-11dd-a88d-000ea69a5213 fetchmail -- potential crash in -v -v verbose mode (revised patch)
1ea05bb8-5d74-11ec-bb1e-001517a2e1a4 serviio -- affected by log4j vulnerability
1eb4d32c-a245-11ef-998c-2cf05da270f3 Gitlab -- vulnerabilities
1ec1c59b-0e98-11e8-83e7-485b3931c969 bchunk -- heap-based buffer overflow and crash
1ecc0d3f-ae8e-11e1-965b-0024e88a8c98 dns/bind9* -- zero-length RDATA can cause named to terminate, reveal memory
1ece5591-4ea9-11ea-86f0-001b217b3468 Gitlab -- Vulnerability
1ecf4ca1-f7ad-11d8-96c9-00061bc2ad93 moinmoin -- ACL group bypass
1ed03222-3c65-11dc-b3d3-0016179b2dd5 vim -- Command Format String Vulnerability
1edae47e-1cdd-11ea-8c2a-08002743b791 samba -- multiple vulnerabilities
1ee26d45-6ddb-11ee-9898-00e081b7aa2d jenkins -- HTTP/2 denial of service vulnerability in bundled Jetty
1f02af5d-c566-11e7-a12d-6cc21735f730 PostgreSQL vulnerabilities
1f0421b1-8398-11ed-973d-002b67dfc673 freerdp -- multiple vulnerabilities
1f0d0024-ac9c-11ee-8e91-1c697a013f4b mantis -- multiple vulnerabilities
1f1124fe-de5c-11e5-8fa8-14dae9d210b8 tomcat -- multiple vulnerabilities
1f2fdcff-ae60-11d9-a788-0001020eed82 firefox -- arbitrary code execution in sidebar panel
1f5b711b-3d0e-11dc-b3d3-0016179b2dd5 drupal -- Multiple cross-site scripting vulnerabilities
1f655433-551b-11eb-9cda-589cfc0f81b0 phpmyfaq -- XSS vulnerability
1f6d97da-8f72-11eb-b3f1-005056a311d1 samba -- Multiple Vulnerabilities
1f6e2ade-35c2-11da-811d-0050bf27ba24 imap-uw -- mailbox name handling remote buffer vulnerability
1f6ee708-0d22-11e1-b5bd-14dae938ec40 phpmyadmin -- Local file inclusion
1f738bda-c6ac-11d8-8898-000d6111a684 Remote Denial of Service of HTTP server and client
1f826757-26be-11d9-ad2d-0050fc56d258 rssh -- format string vulnerability
1f8d5806-ac51-11e8-9cb6-10c37b4ac2ea grafana -- LDAP and OAuth login vulnerability
1f8de723-dab3-11e7-b5af-a4badb2f4699 FreeBSD -- WPA2 protocol vulnerability
1f922de0-3fe5-11d9-a9e7-0001020eed82 unarj -- directory traversal vulnerability
1f935f61-075d-11db-822b-728b50d539a3 Joomla -- multiple vulnerabilities
1f9e2376-c52f-11dd-8cbc-00163e000016 php5 -- potential magic_quotes_gpc vulnerability
1fa4c9f1-cfca-11da-a672-000e0c2e438a FreeBSD -- FPU information disclosure
1fade8a3-e9e8-11e0-9580-4061862b8c22 Mozilla -- multiple vulnerabilities
1fb13175-ed52-11ea-8b93-001b217b3468 Gitlab -- multiple vulnerabilities
1fbd6db1-a4e4-11e5-b864-14dae9d210b8 py-amf -- input sanitization errors
1fccb25e-8451-438c-a2b9-6a021e4d7a31 nghttp2 -- Denial of service due to NULL pointer dereference
1fe40200-6823-11ee-b06f-0050569ceb3a GLPI vulnerable to unauthorized access to KnowbaseItem data
1fe734bf-4a06-11db-b48d-00508d6a62df opera -- RSA Signature Forgery
1febd09b-7716-11ef-9a62-002590c1f29c FreeBSD -- bhyve(8) out-of-bounds read access via XHCI emulation
20006b5f-a0bc-11eb-8ae6-fc4dd43e2b6a Apache Maven -- multiple vulnerabilities
2001103a-6bbd-11d9-851d-000a95bc6fae imlib -- xpm heap buffer overflows and integer overflows
2004616d-f66c-11e5-b94c-001999f8d30b Botan BER Decoder vulnerabilities
20302cbc-6834-11ee-b06f-0050569ceb3a Users login enumeration by unauthenticated user in GLPI
2040c7f5-1e3a-11e8-8ae9-0050569f0b83 isc-dhcp -- Multiple vulnerabilities
204f1a7a-43df-412f-ad25-7dbe88f54fa4 zeek -- potential DoS vulnerabilty
206f9826-a06d-4927-9a85-771c37010b32 node.js -- DoS Vulnerability
2070c79a-8e1e-11e2-b34d-000c2957946c ModSecurity -- XML External Entity Processing Vulnerability
207f8ff3-f697-11d8-81b0-000347a4fa7d nss -- exploitable buffer overflow in SSLv2 protocol handler
20923a0d-82ba-11e1-8d7b-003067b2972c linux-flashplugin -- multiple vulnerabilities
209f0d75-4b5c-11dc-a6cd-000fb5066b20 flyspray -- authentication bypass
20a1881e-8a9e-11e8-bddf-d017c2ca229d jenkins -- multiple vulnerabilities
20a4eb11-8ea3-11dc-a396-0016179b2dd5 tikiwiki -- multiple vulnerabilities
20b3ab21-c9df-11eb-8558-3065ec8fd3ec chromium -- multiple vulnerabilities
20b46222-c12b-11ea-abe8-08002728f74c kramdown -- template option vulnerability
20b4f284-2bfc-11de-bdeb-0030843d3802 freetype2 -- multiple vulnerabilities
20b92374-d62a-11e9-af73-001b217e4ee5 ISC KEA -- Multiple vulnerabilities
20be2982-4aae-11d8-96f2-0020ed76ef5a fsp buffer overflow and directory traversal vulnerabilities
20c9bb14-81e6-11d9-a9e7-0001020eed82 opera -- "data:" URI handler spoofing vulnerability
20d16518-2477-11d9-814e-0001020eed82 mpg123 -- buffer overflow in URL handling
20dfd134-1d39-11d9-9be9-000c6e8f12ef freeradius -- denial-of-service vulnerability
20e23b65-a52e-11e3-ae3a-00224d7c32a2 xmms -- Integer Overflow And Underflow Vulnerabilities
210f80b9-ede4-11e4-81c4-00262d5ed8ee chromium -- multiple vulnerabilities
214e8e07-d369-11dd-b800-001b77d09812 vinagre -- format string vulnerability
215e740e-9c56-11e5-90e7-b499baebfeaf libressl -- NULL pointer dereference
2184ccad-1a10-11e5-b43d-002590263bf5 logstash -- Remote command execution in Logstash zabbix and nagios_nsca outputs
21944144-1b90-11ea-a2d4-001b217b3468 Gitlab -- Multiple Vulnerabilities
219aaa1e-2aff-11ef-ab37-5404a68ad561 traefik -- Unexpected behavior with IPv4-mapped IPv6 addresses
21a854cc-cac1-11ee-b7a7-353f1e043d9a DNSSEC validators -- denial-of-service/CPU exhaustion from KeyTrap and NSEC3 vulnerabilities
21b7c550-2a22-11db-a6e2-000e0c2e438a squirrelmail -- random variable overwrite vulnerability
21bc4d71-9ed8-11e5-8f5c-002590263bf5 redmine -- information leak vulnerability
21c223f2-d596-11da-8098-00123ffe8333 ethereal -- Multiple Protocol Dissector Vulnerabilities
21c59f5e-7cc5-11e2-9c11-080027a5ec9a django -- multiple vulnerabilities
21ce1840-6107-11e4-9e84-0022156e8794 twiki -- remote Perl code execution
21d59ea3-8559-11ea-a5e2-d4c9ef517024 MySQL Server -- Multiple vulerabilities
21e5abe3-b0c6-11e5-8d13-bc5ff45d0f28 qemu -- buffer overflow vulnerability in virtio-serial message exchanges
21ec4428-bdaa-11eb-a04e-641c67a117d8 libzmq4 -- Denial of Service
21f12de8-b1db-11ed-b0f4-002590f2a714 git -- "git apply" overwriting paths outside the working tree
21f43976-1887-11ed-9911-40b034429ecf rsync -- client-side arbitrary file write vulnerability
21f505f4-6a1c-11ef-b611-84a93843eb75 OpenSSL -- Multiple vulnerabilities
2220827b-c732-11ec-b272-901b0e934d69 hiredis -- integer/buffer overflow
2225c5b4-1e5a-44fc-9920-b3201c384a15 mozilla -- multiple vulnerabilities
22283b8c-13c5-11e8-a861-20cf30e32f6d Bugzilla security issues
22373c43-d728-11e6-a9a5-b499baebfeaf MySQL -- multiple vulnerabilities
22438240-1bd0-11e8-a2ec-6cc21735f730 shibboleth-sp -- vulnerable to forged user attribute data
225bc349-ce10-11dd-a721-0030843d3802 opera -- multiple vulnerabilities
2264566a-a890-46eb-a895-7881dd220bd0 electron26 -- Out of bounds memory access in V8
2272e6f1-f029-11ea-838a-0011d823eebd GnuTLS -- null pointer dereference
2273879e-8a2f-11dd-a6fe-0030843d3802 mozilla -- multiple vulnerabilities
227475c2-09cb-11db-9156-000e0c2e438a webmin, usermin -- arbitrary file disclosure vulnerability
22775cdd-395a-11e6-b3c8-14dae9d210b8 piwik -- XSS vulnerability
229577a8-0936-11db-bf72-00046151137e phpmyadmin -- cross site scripting vulnerability
22ae307a-1ac4-11ea-b267-001cc0382b2f Ghostscript -- Security bypass vulnerabilities
22b41bc5-4279-11ea-b184-f8b156ac3ff9 FreeBSD -- libfetch buffer overflow
22b90fe6-258e-11e9-9c8d-6805ca0b3d42 p5-Email-Address-List -- DDoS related vulnerability
22bc5327-f33f-11e8-be46-0019dbb15b3f payara -- Code execution via crafted PUT requests to JSPs
22c6b826-cee0-11da-8578-00123ffe8333 plone -- "member_id" Parameter Portrait Manipulation Vulnerability
22dc4a22-d1e5-11e4-879c-00e0814cab4e jenkins -- multiple vulnerabilities
22df5074-71cd-11ee-85eb-84a93843eb75 MySQL -- Multiple vulnerabilities
22f00553-a09d-11d9-a788-0001020eed82 portupgrade -- insecure temporary file handling vulnerability
22f28bb3-8d98-11e7-8c37-e8e0b747a45a libgcrypt -- side-channel attack vulnerability
22fffa69-46fa-11ee-8290-a8a1599412c6 chromium -- use after free in MediaStream
2310b814-a652-11e8-805b-a4badb2f4699 FreeBSD -- L1 Terminal Fault (L1TF) Kernel Information Disclosure
23232028-1ba4-11e5-b43d-002590263bf5 elasticsearch -- security fix for shared file-system repositories
2327234d-fc4b-11ea-adef-641c67a117d8 py-matrix-synapse -- malformed events may prevent users from joining federated rooms
2328adef-157c-11d9-8402-000d93664d5c racoon -- improper certificate handling
23413442-c8ea-11e8-b35c-001b217b3468 Gitlab -- multiple vulnerabilities
23573650-f99a-11da-994e-00142a5f241c dokuwiki -- multiple vulnerabilities
2368755b-83f6-11ef-8d2e-a04a5edf46d9 Unbound -- Denial of service attack
237a201c-888b-487f-84d3-7d92266381d6 mozilla -- multiple vulnerabilities
2383767c-d224-11e8-9623-a4badb2f4699 libssh -- authentication bypass vulnerability
238ae7de-dba2-11e8-b713-b499baebfeaf OpenSSL -- Multiple vulnerabilities in 1.1 branch
23a667c7-0b28-11eb-8834-00155d01f202 libjpeg-turbo -- Issue in the PPM reader causing a buffer overrun in cjpeg, TJBench, or the tjLoadImage() function.
23ab5c3e-79c3-11e4-8b1e-d050992ecde8 OpenVPN -- denial of service security vulnerability
23af0425-9eac-11e5-b937-00e0814cab4e jenkins -- multiple vulnerabilities
23afd91f-676b-11da-99f6-00123ffe8333 phpmyadmin -- register_globals emulation "import_blacklist" manipulation
23c8423e-9bff-11e0-8ea2-0019d18c446a Piwik -- remote command execution vulnerability
23f59689-0152-42d3-9ade-1658d6380567 mozilla -- use-after-free in compositor
23f65f58-a261-11e9-b444-002590acae31 GnuPG -- denial of service
23fb5a04-722b-11d9-9e1e-c296ac722cb3 squid -- buffer overflow in WCCP recvfrom() call
24049967-88ec-11ec-88f5-901b0e934d69 py-twisted -- cookie and authorization headers are leaked when following cross-origin redirects
240ac24c-dff3-11dd-a765-0030843d3802 mysql -- remote dos via malformed password packet
2430e9c3-8741-11de-938e-003048590f9e wordpress -- remote admin password reset vulnerability
24375796-7cbc-11ef-a3a9-001cc0382b2f cups-filters -- remote code execution
2438d4af-1538-11e5-a106-3c970e169bc2 cURL -- Multiple Vulnerability
244c8288-cc4a-11e6-a475-bcaec524bf84 upnp -- multiple vulnerabilities
245629d4-991e-11e9-82aa-6cc21735f730 PostgreSQL -- Stack-based buffer overflow via setting a password
246174d3-e979-11ed-8290-a8a1599412c6 chromium -- multiple vulnerabilities
24673ed7-2bf3-11e7-b291-b499baebfeaf LibreSSL -- TLS verification vulnerability
2482c798-93c6-11e6-846f-bc5ff4fb5ea1 flash -- multiple vulnerabilities
249a8c42-6973-11d9-ae49-000c41e2cdad zgv -- exploitable heap overflows
24a82876-002e-11e8-9a95-0cc47a02c232 powerdns-recursor -- insufficient validation of DNSSEC signatures
24a9bd2b-bb43-11ec-af81-0897988a1c07 Composer -- Command injection vulnerability
24aa9970-9ccd-11de-af10-000c29a67389 silc-toolkit -- Format string vulnerabilities
24ace516-fad7-11ea-8d8c-005056a311d1 samba -- Unauthenticated domain takeover via netlogon
24b64fb0-af1d-11dd-8a16-001b1116b350 clamav -- off-by-one heap overflow in VBA project parser
24bde04f-1a10-11e5-b43d-002590263bf5 logstash -- Directory traversal vulnerability in the file output plugin
24c88add-4a3e-11ef-86d7-001b217b3468 Gitlab -- Vulnerabilities
24ce5597-acab-11e4-a847-206a8a720317 krb5 -- Vulnerabilities in kadmind, libgssrpc, gss_process_context_token VU#540092
24da150a-33e0-4fee-b4ee-2c6b377d3395 py39-setuptools58 -- denial of service vulnerability
24e4d383-7b3e-11e5-a250-68b599b52a02 wireshark -- Pcapng file parser crash
24ec781b-8c11-11dd-9923-0016d325a0ed bitlbee -- account recreation security issues
24eee285-09c7-11da-bc08-0001020eed82 xpdf -- disk fill DoS vulnerability
24f6b1eb-43d5-11db-81e1-000e0c2e438a win32-codecs -- multiple vulnerabilities
2506f558-6a8a-11da-b96e-000fb586ba73 mnemo -- Cross site scripting vulnerabilities in several of the notepad name and note data fields
2523bc76-4f01-11ed-929b-002590f2a714 git -- Multiple vulnerabilities
252f40cb-618c-47f4-a2cf-1abf30cffbbe py-Flask-Cors -- directory traversal vulnerability
253486f5-947d-11ea-92ab-00163e433440 FreeBSD -- Improper checking in SCTP-AUTH shared key update
253c6889-06f0-11e6-925f-6805ca0b3d42 ansible -- use of predictable paths in lxc_container
253ea131-bd12-11d8-b071-00e08110b673 Gallery 1.4.3 and ealier user authentication bypass
2544f543-c178-11de-b175-001cc0377035 elinks -- buffer overflow vulnerability
255bf44c-d298-11ee-9c27-40b034429ecf dns/c-ares -- malformatted file causes application crash
25673e6e-786b-11df-a921-0245fb008c0b ziproxy -- security vulnerability in PNG decoder
257e1bf0-682f-11ee-b06f-0050569ceb3a GLPI vulnerable to SQL injection via dashboard administration
25858c37-bdab-11da-b7d4-00123ffe8333 linux-realplayer -- buffer overrun
25872b25-da2d-11ed-b715-a1e76793953b ghostscript -- exploitable buffer overflow in (T)BCP in PS interpreter
25b78bdd-25b8-11ec-a341-d4c9ef517024 Apache httpd -- Multiple vulnerabilities
25b78f04-59c8-11e4-b711-6805ca0b3d42 phpMyAdmin -- XSS vulnerabilities in SQL debug output and server monitor page.
25be46f0-f25d-11ec-b62a-00e081b7aa2d jenkins -- multiple vulnerabilities
25e0593d-13c0-11e5-9afb-3c970e169bc2 tomcat -- multiple vulnerabilities
25e5205b-1447-11e6-9ead-6805ca0b3d42 squid -- multiple vulnerabilities
25eb365c-fd11-11dd-8424-c213de35965d dia -- remote command execution vulnerability
25ed4ff8-8940-11df-a339-0026189baca3 bogofilter -- heap underrun on malformed base64 input
25efe05c-7ffc-11ea-b594-3065ec8fd3ec chromium -- use after free
25f73c47-68a8-4a30-9cbc-1ca5eea4d6ba GraphicsMagick -- multiple vulnerabilities
26125e09-69ca-11ef-8a0f-a8a1599412c6 chromium -- multiple security fixes
261ca31c-179f-11e8-b8b9-6805ca0b3d42 phpMyAdmin -- self XSS in central columns feature
262b92fe-81c8-11e1-8899-001ec9578670 png -- memory corruption/possible remote code execution
264749ae-d565-11e4-b545-00269ee29e57 libzip -- integer overflow
265c8b00-d2d0-11d8-b479-02e0185c0b53 multiple vulnerabilities in ethereal
2675f0db-baa5-11ea-aa12-80ee73419af3 xrdp -- Local users can perform a buffer overflow attack against the xrdp-sesman service and then inpersonate it
2689f4cb-ec4c-11d8-9440-000347a4fa7d rsync -- path sanitizing vulnerability
268a4289-fc84-11e8-be12-a4badb2f4699 FreeBSD -- Multiple vulnerabilities in NFS server code
26a08c77-32da-4dd7-a884-a76fc49aa824 tomcat -- Tomcat Manager cross-site scripting
26b1100a-5a27-11ed-abfe-29ac76ec31b5 go -- syscall, os/exec: unsanitized NUL in environment variables
26c9e8c6-1c99-11d9-814e-0001020eed82 sharutils -- buffer overflows
26e1c48a-9fa7-11df-81b5-00e0814cab4e Piwik -- Local File Inclusion Vulnerability
26f2123b-c6c6-11ec-b66f-3065ec8fd3ec chromium -- multiple vulnerabilities
2701611f-df5c-11d9-b875-0001020eed82 gaim -- Yahoo! remote crash vulnerability
271498a9-2cd4-11da-a263-0001020eed82 clamav -- arbitrary code execution and DoS vulnerabilities
27180c99-9b5c-11e6-b799-19bef72f4b7c node.js -- multiple vulnerabilities
27229c67-b8ff-11e7-9f79-ac9e174be3af Apache OpenOffice -- multiple vulnerabilities
2730c668-0b1c-11e7-8d52-6cf0497db129 drupal8 -- multiple vulnerabilities
2739b88b-4b88-11eb-a4c0-08002734b9ed gitea -- multiple vulnerabilities
273c6c43-e3ad-11e9-8af7-08002720423d mongodb -- Our init scripts check /proc/[pid]/stat should validate that `(${procname})` is the process' command name.
273cc1a3-0d6b-11d9-8a8a-000c41e2cdad lha -- numerous vulnerabilities when extracting archives
2747fc39-915b-11dc-9239-001c2514716c xpdf -- multiple remote Stream.CC vulnerabilities
2748fdde-3a3c-11de-bbc5-00e0815b8da8 quagga -- Denial of Service
274922b8-ad20-11df-af1f-00e0814cab4e phpmyadmin -- Several XSS vulnerabilities
275b845e-f56c-11db-8163-000e0c2e438a FreeBSD -- IPv6 Routing Header 0 is dangerous
27616957-b084-11ea-937b-b42e99a1b9c3 dbus file descriptor leak
2780e442-fc59-11e4-b18b-6805ca1d3bb1 qemu, xen and VirtualBox OSE -- possible VM escape and code execution ("VENOM")
278561d7-b261-11eb-b788-901b0e934d69 py-matrix-synapse -- malicious push rules may be used for a denial of service attack.
2797b27a-f55b-11d8-81b0-000347a4fa7d kdelibs -- konqueror cross-domain cookie injection
279e5f4b-d823-11e2-928e-08002798f6ff apache-xml-security-c -- heap overflow
279f682c-0e9e-11e8-83e7-485b3931c969 bchunk -- access violation near NULL on destination operand and crash
27a230a2-3b11-11eb-af2a-080027dbe4b7 glpi -- multiple related stored XSS vulnerabilities
27a70a01-5f6c-11da-8d54-000cf18bbe54 ghostscript -- insecure temporary file creation vulnerability
27aa2253-4c72-11ec-b6b9-e86a64caca56 py-matrix-synapse -- several vulnerabilities
27b12d04-4722-11e9-8b7c-b5e01141761f RubyGems -- multiple vulnerabilities
27b38d85-c891-11e7-a7bd-cd1209e563f2 rubygem-geminabox -- XSS vulnerabilities
27b9b2f0-8081-11e4-b4ca-bcaec565249c xserver -- multiple issue with X client request handling
27bf9378-8ffd-11ec-8be6-d4c9ef517024 MariaDB -- Multiple vulnerabilities
27c331d5-64c7-11d8-80e3-0020ed76ef5a Vulnerabilities in H.323 implementations
27c822a0-addc-11ed-a9ee-dca632b19f10 Rundeck3 -- Log4J RCE vulnerability
27cc4258-0805-11ed-8ac1-3065ec8fd3ec chromium -- multiple vulnerabilities
27d01223-c457-11dd-a721-0030843d3802 php -- multiple vulnerabilities
27d39055-b61b-11ec-9ebc-1c697aa5a594 FreeBSD -- Potential jail escape vulnerabilities in netmap
27d78386-d35f-11dd-b800-001b77d09812 awstats -- multiple XSS vulnerabilities
27eee66d-9474-44a5-b830-21ec12a1c307 jenkins -- Remote code execution vulnerability in remoting module
27f742f6-03f4-11e5-aab1-d050996490d0 cURL -- sensitive HTTP server headers also sent to proxies
27fed73e-484f-11e5-825f-c80aa9043978 OpenSSH -- PermitRootLogin may allow password connections with 'without-password'
28022228-5a0e-11df-942d-0015587e2cc1 wireshark -- DOCSIS dissector denial of service
2823048d-9f8f-11ec-8c9c-001b217b3468 Gitlab -- multiple vulnerabilities
2826317b-10ec-11e7-944e-000c292e4fd8 samba -- symlink race allows access outside share definition
282dfea0-3378-11d9-b404-000c6e8f12ef apache2 multiple space header denial-of-service vulnerability
28481349-7e20-4f80-ae1e-e6bf48d4f17c Sane -- Multiple Vulnerabilities
288f7cee-ced6-11e7-8ae9-0050569f0b83 procmail -- Heap-based buffer overflow
289269f1-0def-11e8-99b0-d017c2987f9a LibreOffice -- Remote arbitrary file disclosure vulnerability via WEBSERVICE formula
2892a8e2-3d68-11e2-8e01-0800273fe665 dns/bind9* -- servers using DNS64 can be crashed by a crafted query
2899da38-7300-11ed-92ce-3065ec8fd3ec chromium -- Type confusion in V8
28a37df6-ba1a-4eed-bb64-623fc8e8dfd0 py39-py -- Regular expression Denial of Service vulnerability
28a7310f-9855-11df-8d36-001aa0166822 apache -- Remote DoS bug in mod_cache and mod_dav
28ab7ddf-61ab-11d9-a9e7-0001020eed82 dillo -- format string vulnerability
28b42ef5-80cd-440c-904b-b7fbca74c73d electron{26,27} -- multiple vulnerabilities
28b69630-9b10-11ed-97a6-6805ca2fa271 powerdns-recursor -- denial of service
28bb6ee5-9b5c-11e6-b799-19bef72f4b7c node.js -- ares_create_query single byte out of buffer write
28bf62ef-5e2c-11e6-a15f-00248c0c745d piwik -- XSS vulnerability
28c575fa-784e-11e3-8249-001cc0380077 libXfont -- Stack buffer overflow in parsing of BDF font files in libXfont
28c9243a-72ed-11da-8c1d-000e0c2e438a phpbb -- multiple vulnerabilities
28e93883-539f-11d9-a9e7-0001020eed82 acroread5 -- mailListIsPdf() buffer overflow vulnerability
28ffa931-a510-11ef-8109-b42e991fc52e mongodb -- Buffer over-reads in MongoDB Server
290351c9-6f5c-11e5-a2a1-002590263bf5 devel/ipython -- multiple vulnerabilities
29083f8e-2ca8-11e5-86ff-14dae9d210b8 apache22 -- chunk header parsing defect
290d81b9-80f1-11d8-9645-0020ed76ef5a oftpd denial-of-service vulnerability (PORT command)
29194cb8-6e9f-11e1-8376-f0def16c5c1b nginx -- potential information leak
291d0953-47c1-11ee-8e38-002590c1f29c FreeBSD -- Potential remote code execution via ssh-agent forwarding
2920c449-4850-11e5-825f-c80aa9043978 OpenSSH -- PAM vulnerabilities
29255141-c3df-11dd-a721-0030843d3802 mantis -- multiple vulnerabilities
293f40a0-ffa1-11e8-b258-0011d823eebd Mbed TLS -- Local timing attack on RSA decryption
296ecb59-0f6b-11df-8bab-0019996bc1f7 squid -- Denial of Service vulnerability in DNS handling
297117ba-f92d-11e5-92ce-002590263bf5 squid -- multiple vulnerabilities
298829e2-ccce-11e7-92e4-000c29649f92 mediawiki -- multiple vulnerabilities
2991178f-cbe8-11ed-956f-7054d21a9e2a py39-Elixir -- weak use of cryptography
299e3f81-aee7-11dc-b781-0016179b2dd5 e2fsprogs -- heap buffer overflow
29b13a34-b1d2-11ea-a11c-4437e6ad11c4 Machine-in-the-middle response injection attack when using STARTTLS with IMAP, POP3, and SMTP
29b7e3f4-b6a9-11df-ae63-f255a795cb21 lftp -- multiple HTTP client download filename vulnerability
29b7f0be-1fb7-11eb-b9d4-001999f8d30b asterisk -- Outbound INVITE loop on challenge with different nonce
29d34524-0542-11e9-a444-080027fee39c gitea -- privilege escalation, XSS
29dd0065-81fa-11d9-a9e7-0001020eed82 kdelibs -- insecure temporary file creation
29edd807-438d-11d9-8bb9-00065be4b5b6 mysql -- FTS request denial of service vulnerability
29f050e9-3ef4-4c5f-8204-503b41caf181 electron24 -- multiple vulnerabilities
29f5bfc5-ce04-11dd-a721-0030843d3802 mozilla -- multiple vulnerabilities
2a093853-2495-11e2-b0c7-000d601460a4 ruby -- $SAFE escaping vulnerability about Exception#to_s/NameError#to_s
2a1b931f-2b86-11ec-8acd-c80aa9043978 OpenSSH -- OpenSSH 6.2 through 8.7 failed to correctly initialise supplemental groups when executing an AuthorizedKeysCommand or AuthorizedPrincipalsCommand
2a314635-be46-11ec-a06f-d4c9ef517024 Nextcloud Calendar -- SMTP Command Injection
2a3588b4-ab12-11ea-a051-001b217b3468 NPM -- Multiple vulnerabilities
2a3bc6ac-e7c6-11e7-a90b-001999f8d30b asterisk -- Crash in PJSIP resource when missing a contact header
2a41233d-10e7-11e0-becc-0022156e8794 php-zip -- multiple Denial of Service vulnerabilities
2a470712-d351-11ee-86bb-a8a1599412c6 chromium -- multiple security fixes
2a4a112a-7c1b-11e5-bd77-0800275369e2 lldpd -- Buffer overflow/Denial of service
2a4bcd7d-bbb8-11e4-903c-080027ef73ec e2fsprogs -- potential buffer overflow in closefs()
2a526c78-84ab-11e6-a4a1-60a44ce6887b libgd -- integer overflow which could lead to heap buffer overflow
2a6106c6-73e5-11ec-8fa2-0800270512f4 clamav -- invalid pointer read that may cause a crash
2a6a966f-1774-11df-b5c1-0026189baca3 fetchmail -- heap overflow on verbose X.509 display
2a7bdc56-d7a3-11e6-ae1b-002590263bf5 flash -- multiple vulnerabilities
2a86f45a-fc3c-11e8-a414-00155d006b02 node.js -- multiple vulnerabilities
2a8b79c3-1b6e-11e9-8cf4-1c39475b9f84 Helm -- client unpacking chart that contains malicious content
2a8b7d21-1ecc-11e5-a4a5-002590263bf5 wesnoth -- disclosure of .pbl files with lowercase, uppercase, and mixed-case extension
2a92555f-a6f8-11e8-8acd-10c37b4ac2ea links -- denial of service
2a96e498-3234-4950-a9ad-419bc84a839d tiff -- multiple vulnerabilities
2aa9967c-27e0-11e8-9ae1-080027ac955c e2fsprogs -- potential buffer overrun bugs in the blkid library and in the fsck program
2acdf364-9f8d-4aaf-8d1b-867fdfd771c6 py-kerberos -- DoS and MitM vulnerabilities
2ad25820-c71a-4e6c-bb99-770c66fe496d py-Scrapy -- credentials leak vulnerability
2adc3e78-22d1-11e2-b9f0-d0df9acfd7e5 drupal7 -- multiple vulnerabilities
2ae114de-c064-11e1-b5e0-000c299b62e1 FreeBSD -- OpenSSL multiple vulnerabilities
2ae24334-f2e6-11e2-8346-001e8c75030d subversion -- remotely triggerable "Assertion failed" DoS vulnerability or read overflow.
2af10639-4299-11ea-aab1-98fa9bfec35a pkg -- vulnerability in libfetch
2b20fd5f-552e-11e1-9fb7-003067b2972c WebCalendar -- Persistent XSS
2b2b333b-6bd3-11d9-95f8-000a95bc6fae mc -- multiple vulnerabilities
2b2f6092-0694-11e3-9e8e-000c29f6ae42 puppet -- multiple vulnerabilities
2b386075-1d9c-11e8-b6aa-4ccc6adda413 libsndfile -- multiple vulnerabilities
2b3b4c27-b0c7-11e5-8d13-bc5ff45d0f28 qemu -- buffer overflow vulnerability in VNC
2b4c8e1f-1609-11e6-b55e-b499baebfeaf libarchive -- RCE vulnerability
2b4d5288-447e-11d9-9ebb-000854d03344 rockdodger -- buffer overflows
2b5fc9c4-eaca-46e0-83d0-9b10c51c4b1b zeek -- potential DoS vulnerabilities
2b63e964-eb04-11e6-9ac1-a4badb2f4699 mantis -- XSS vulnerability
2b68c86a-32d5-11ef-8a0f-a8a1599412c6 chromium -- multiple security fixes
2b6e47b1-0598-11da-86bc-000e0c2e438a ipsec -- Incorrect key usage in AES-XCBC-MAC
2b6ed5c7-1a7f-11e0-b61d-000c29d1636d php -- multiple vulnerabilities
2b841f88-2e8d-11e2-ad21-20cf30e32f6d bugzilla -- multiple vulnerabilities
2b8cad90-f289-11e1-a215-14dae9ebcf89 mozilla -- multiple vulnerabilities
2bab995f-36d4-11ea-9dad-002590acae31 Template::Toolkit -- Directory traversal on write
2bad8b5d-66fb-11e9-9815-78acc0a3b880 drupal -- Drupal core - Moderately critical
2bc376c0-977e-11ee-b4bc-b42e991fc52e apache -- Apache ZooKeeper: Authorization bypass in SASL Quorum Peer Authentication
2bc960c4-e665-11dd-afcd-00e0815b8da8 optipng -- arbitrary code execution via crafted BMP image
2bc96f18-683f-11dc-82b6-02e0185f8d72 samba -- nss_info plugin privilege escalation vulnerability
2bcd2d24-24ca-11d8-82e5-0020ed76ef5a Buffer overflow in pam_smb password handling
2bcd6ba4-d8e2-42e5-9033-b50b722821fb electron{22,24,25} -- Heap buffer overflow in vp8 encoding in libvpx
2be7c122-0614-11db-9156-000e0c2e438a hashcash -- heap overflow vulnerability
2bf56269-90f8-4a82-b82f-c0e289f2a0dc jenkins -- multiple vulnerabilities
2bffdf2f-9d45-11e7-a25c-471bafc3262f rubygem-geminabox -- XSS & CSRF vulnerabilities
2c12ae0c-c38d-11e0-8eb7-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
2c25e762-6bb9-11d9-93db-000a95bc6fae quake2 -- multiple critical vulnerabilities
2c2d1c39-1396-459a-91f5-ca03ee7c64c6 mozilla -- multiple vulnerabilities
2c2d4e83-2370-11e0-a91b-00e0815b8da8 tarsnap -- cryptographic nonce reuse
2c493ac8-205e-11e5-a4a5-002590263bf5 ansible -- remote code execution vulnerability
2c4f4688-298b-11dc-a197-0011098b2f36 typespeed -- arbitrary code execution
2c5757f4-88bf-11d9-8720-0007e900f87b sup -- format string vulnerability
2c57c47e-8bb3-4694-83c8-9fc3abad3964 mozilla -- multiple vulnerabilities
2c5b9cd7-f7e6-11ea-88f8-901b0ef719ab FreeBSD -- bhyve privilege escalation via VMCS access
2c5e7e23-5248-11e5-9ad8-14dae9d210b8 bind -- denial of service vulnerability
2c6acefd-8194-11d8-9645-0020ed76ef5a setsockopt(2) IPv6 sockets input validation error
2c6af5c3-4d36-11ec-a539-0800270512f4 rubygem-cgi -- buffer overrun in CGI.escape_html
2c8a84d9-5bee-11db-a5ae-00508d6a62df vtiger -- multiple remote file inclusion vulnerabilities
2c8bd00d-ada2-11e7-82af-8dbff7d75206 rubygems -- deserialization vulnerability
2c92fdd3-896c-4a5a-a0d8-52acee69182d zeek -- Various vulnerabilities
2c948527-d823-11e6-9171-14dae9d210b8 FreeBSD -- OpenSSH multiple vulnerabilities
2cabfbab-8bfb-11e5-bd18-002590263bf5 xen-kernel -- CPU lockup during exception delivery
2cb21232-fb32-11ea-a929-a4bf014bf5f7 Python -- multiple vulnerabilities
2ccd71bd-426b-11ec-87db-6cc21735f730 PostgreSQL -- Possible man-in-the-middle attacks
2cceb80e-c482-4cfd-81b3-2088d2c0ad53 gcab -- stack overflow
2cda5c88-add4-11ec-9bc8-6805ca2fa271 powerdns -- denial of service
2cde1892-913e-11e1-b44c-001fd0af1a4c php -- multiple vulnerabilities
2ce1a2f1-0177-11ef-a45e-08002784c58d ruby -- Arbitrary memory address read vulnerability with Regex search
2d299950-ddb0-11e5-8fa8-14dae9d210b8 moodle -- multiple vulnerabilities
2d2dcbb4-906c-11dc-a951-0016179b2dd5 phpmyadmin -- cross-site scripting vulnerability
2d4076eb-f679-11e9-a87f-a4badb2f4699 varnish -- Information Disclosure Vulnerability
2d56308b-c0a8-11e6-a9a5-b499baebfeaf PHP -- Multiple vulnerabilities
2d56c7f4-b354-428f-8f48-38150c607a05 mozilla -- multiple vulnerabilities
2d6de6a8-fb78-4149-aeda-77fc8f140f06 smart_proxy_dynflow -- authentication bypass vulnerability
2d8cf857-81ea-11d9-a9e7-0001020eed82 gftp -- directory traversal vulnerability
2d9ad236-4d26-11db-b48d-00508d6a62df freeciv -- Denial of Service Vulnerabilities
2da3cb25-6571-11e9-8e67-206a8a720317 FreeBSD -- EAP-pwd missing commit validation
2da838f9-9168-11e8-8c75-d8cb8abf62dd Gitlab -- multiple vulnerabilities
2db97aa6-be81-11da-9b82-0050bf27ba24 horde -- remote code execution vulnerability in the help viewer
2dc764fa-40c0-11dc-aeac-02e0185f8d72 FreeBSD -- Buffer overflow in tcpdump(1)
2dc8927b-54e0-11eb-9342-1c697a013f4b mantis -- multiple vulnerabilities
2dd7e97e-d5e8-11e5-bcbd-bc5ff45d0f28 glibc -- getaddrinfo stack-based buffer overflow
2ddbfd29-a455-11dd-a55e-00163e000016 libspf2 -- Buffer overflow
2dde5a56-6ab1-11e8-b639-6451062f0f7a Flash Player -- multiple vulnerabilities
2de14f7a-dad9-11d8-b59a-00061bc2ad93 Multiple Potential Buffer Overruns in Samba
2def7c4b-736f-4754-9f03-236fcb586d91 py-wagtail -- DoS vulnerability
2df297a2-dc74-11da-a22b-000c6ec775d9 awstats -- arbitrary command execution vulnerability
2e116ba5-f7c3-11d9-928e-000b5d7e6dd5 kdebase -- Kate backup file permission leak
2e129846-8fbb-11d8-8b29-0020ed76ef5a MySQL insecure temporary file creation (mysqlbug)
2e25d38b-54d1-11d9-b612-000c6e8f12ef jabberd -- denial-of-service vulnerability
2e28cefb-2aee-11da-a263-0001020eed82 firefox & mozilla -- command line URL shell command injection
2e3bea0c-f110-11ee-bc57-00e081b7aa2d jenkins -- HTTP/2 denial of service vulnerability in bundled Jetty
2e4fbc9a-9d23-11e6-a298-14dae9d210b8 sudo -- Potential bypass of sudo_noexec.so via wordexp()
2e5715f8-67f7-11e3-9811-b499baab0cbe gnupg -- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis attack
2e7e9072-73a0-11e1-a883-001cc0a36e12 libtasn1 -- ASN.1 length decoding vulnerability
2e8cdd36-c3cc-11e5-b5fe-002590263bf5 sudo -- potential privilege escalation via symlink misconfiguration
2e8fe57e-2b46-11e6-ae88-002590263bf5 openafs -- local DoS vulnerability
2ea6ce3d-6afd-11e2-9d4e-bcaec524bf84 upnp -- multiple vulnerabilities
2ecb7b20-d97e-11e0-b2e2-00215c6a37bb OpenSSL -- multiple vulnerabilities
2eccb24f-61c0-11e0-b199-0015f2db7bde xrdb -- root hole via rogue hostname
2ecd02e2-e864-11da-b9f4-00123ffe8333 phpmyadmin -- XSRF vulnerabilities
2ed7e8db-e234-11ea-9392-002590bc43be sysutils/openzfs-kmod -- critical permissions issues
2eda0c54-34ab-11e0-8103-00215c6a37bb opera -- multiple vulnerabilities
2eeb6652-a7a6-11e4-96ba-001999f8d30b asterisk -- File descriptor leak when incompatible codecs are offered
2eebebff-cd3b-11e2-8f09-001b38c3836c xorg -- protocol handling issues in X Window System client libraries
2eec1e85-faf3-11ea-8ac0-4437e6ad11c4 tt-rss -- multiple vulnerabilities
2f0cb4bb-416d-11da-99fe-000854d03344 xloadimage -- buffer overflows in NIFF image title handling
2f22927f-26ea-11ee-8290-a8a1599412c6 chromium -- multiple vulnerabilities
2f38c6a2-04a4-11ee-8cb0-e41f13b9c674 qpress -- directory traversal
2f3cd69e-7dee-11eb-b92e-0022489ad614 Node.js -- February 2021 Security Releases
2f4fd3aa-32f8-4116-92f2-68f05398348e bro -- multiple memory allocation issues
2f75141c-da1d-11e4-8d32-5404a68ad561 Several vulnerabilities in libav
2f794295-7b69-11dd-80ba-000bcdf0a03b FreeBSD -- Remote kernel panics on IPv6 connections
2f7f4db2-8819-11e5-ab94-002590263bf5 p5-HTML-Scrubber -- XSS vulnerability
2f82696c-adad-447b-9938-c99441805fa3 chromium -- multiple security fixes
2f90556f-18c6-11e4-9cc4-5453ed2e2b49 kdelibs -- KAuth PID Reuse Flaw
2fb13238-872d-11ef-bd1e-b42e991fc52e firefox -- use-after-free code execution
2fbe16c2-cab6-11d9-9aed-000e0c2e438a freeradius -- sql injection and denial of service vulnerability
2fbfd455-f2d0-11e2-8a46-000d601460a4 suPHP -- Privilege escalation
2fcca7e4-b1d7-11ed-b0f4-002590f2a714 git -- Heap overflow in `git archive`, `git log --format` leading to RCE
2fda6bd2-c53c-11de-b157-001999392805 opera -- multiple vulnerabilities
2fdb053c-ca25-11ed-9d7e-080027f5fec9 rack -- possible denial of service vulnerability in header parsing
2fe004f5-83fd-11ee-9f5d-31909fb2f495 openvpn -- 2.6.0...2.6.6 --fragment option division by zero crash, and TLS data leak
2fe40238-480f-11e5-adde-14dae9d210b8 tarsnap -- buffer overflow and local DoS
2fe4b57f-d110-11e1-ac76-10bf48230856 Dokuwiki -- cross site scripting vulnerability
2ffb1b0d-ecf5-11dd-abae-00219b0fc4d8 glpi -- SQL Injection
3000acee-c45d-11eb-904f-14dae9d5a9d2 aiohttp -- open redirect vulnerability
3003ba60-6cec-11eb-8815-040e3c1b8a02 oauth2-proxy -- domain whitelist could be used as redirect
30149157-f926-11e1-95cd-001fd0af1a4c wordpress -- multiple unspecified privilege escalation bugs
301a01b7-d50e-11e7-ac58-b499baebfeaf cURL -- Multiple vulnerabilities
301b04d7-881c-11e5-ab94-002590263bf5 xen-tools -- libxl fails to honour readonly flag on disks with qemu-xen
30211c45-e52a-11de-b5cd-00e0815b8da8 dovecot -- Insecure directory permissions
302fc846-860f-482e-a8f6-ee9f254dfacf electron25 -- multiple vulnerabilities
3030ae22-1c7f-11d9-81a4-0050fc56d258 mail-notification -- denial-of-service vulnerability
30394651-13e1-11dd-bab7-0016179b2dd5 gnupg -- memory corruption vulnerability
3042c33a-f237-11df-9d02-0018fe623f2b openssl -- TLS extension parsing race condition
304409c3-c3ef-11e0-8aa5-485d60cb5385 libXfont -- possible local privilege escalation
304d92c3-00c5-11ef-bd52-080027bff743 sdl2_sound -- multiple vulnerabilities
305ceb2c-9df8-11ef-a660-d85ed309193e x11vnc -- access to shared memory segments
30704aba-1da4-11e8-b6aa-4ccc6adda413 libsndfile -- out-of-bounds reads
30866e6c-3c6d-11dd-98c9-00163e000016 vim -- Vim Shell Command Injection Vulnerabilities
3092668e-97e4-11ef-bdd9-4ccc6adda413 qt5-webengine -- Multiple vulnerabilities
309542b5-50b9-11e1-b0d8-00151735203a bugzilla -- multiple vulnerabilities
309c35f4-7c9f-11ec-a739-206a8a720317 aide -- heap-based buffer overflow
30a04ab4-ed7b-11e2-8643-8c705af55518 squid -- denial of service
30acb8ae-9d46-11dc-9114-001c2514716c rubygem-rails -- session-fixation vulnerability
30c0f878-b03e-11e8-be8a-0011d823eebd Ghostscript -- arbitrary code execution
30c560ff-e0df-11dc-891a-02061b08fc24 opera -- multiple vulnerabilities
30cb4522-b94d-11e0-8182-485d60cb5385 libsoup -- unintentionally allow access to entire local filesystem
30ce591c-947b-11ea-92ab-00163e433440 FreeBSD -- Insufficient packet length validation in libalias
30cea6be-1d0c-11d9-814e-0001020eed82 CUPS -- local information disclosure
30cf9485-1c2c-11d9-9ecb-000c6e8f12ef zinf -- potential buffer overflow playlist support
30e4ed7b-1ca6-11da-bc01-000e0c2e438a bind9 -- denial of service
30f5ca1d-a90b-11dc-bf13-0211060005df qemu -- Translation Block Local Denial of Service Vulnerability
31001c6b-63e7-11e7-85aa-a4badb2f4699 irssi -- multiple vulnerabilities
310ca30e-a951-11ed-8314-a8a1599412c6 chromium -- multiple vulnerabilities
310d0087-0fde-4929-a41f-96f17c5adffe xloadimage -- arbitrary command execution when handling compressed files
3110b29e-c82d-4287-9f6c-db82bb883b1e zeek -- potential DoS vulnerabilities
3117e6cd-1772-11ee-9cd6-001b217b3468 Gitlab -- Vulnerabilities
311e4b1c-f8ee-11e6-9940-b499baebfeaf cURL -- ocsp status validation error
313078e3-26e2-11e8-9920-6451062f0f7a Flash Player -- multiple vulnerabilities
31344707-5d87-11eb-929d-d4c9ef517024 MySQL -- Multiple vulnerabilities
313da7dc-763b-11df-bcce-0018f3e2eb82 tiff -- buffer overflow vulnerability
313e9557-41e8-11e6-ab34-002590263bf5 wireshark -- multiple vulnerabilities
31435fbc-ae73-11dc-a5f9-001a4d49522b peercast -- buffer overflow vulnerability
3145faf1-974c-11e0-869e-000c29249b2e ikiwiki -- tty hijacking via ikiwiki-mass-rebuild
314830d8-bf91-11e5-96d6-14dae9d210b8 bind -- denial of service vulnerability
3149ab1c-c8b9-11de-b87b-0011098ad87f vlc -- stack overflow in MPA, AVI and ASF demuxer
3159cd70-4aaa-11e6-a7bd-14dae9d210b8 libreoffice -- use-after-free vulnerability
31617e47-7eec-4c60-9fdf-8aee61622bab electron{27,28} -- Out of bounds memory access in V8
3166222b-c6a4-11e5-96d6-14dae9d210b8 owncloud -- multiple vulnerabilities
316b3c3e-0e98-11e8-8d41-97657151f8c2 exim -- a buffer overflow vulnerability, remote code execution
316e1c9b-671c-11d8-9aad-000a95bc6fae hsftp format string vulnerabilities
317487c6-85ca-11eb-80fa-14dae938ec40 squashfs-tools -- Integer overflow
31952117-3d17-11d9-8818-008088034841 Cyrus IMAPd -- APPEND command uses undefined programming construct
31a7ffb1-a80a-11eb-b159-f8b156c2bfe9 sympa -- Inappropriate use of the cookie parameter can be a security threat. This parameter may also not provide sufficient security.
31ad2f10-7711-11eb-b87a-901b0ef719ab FreeBSD -- jail_remove(2) fails to kill all jailed processes
31b045e7-ae75-11dc-a5f9-001a4d49522b opera -- multiple vulnerabilities
31b145f2-d9d3-49a9-8023-11cf742205dc PHP5 -- Heap corruption in XML parser
31bb1b8d-d6dc-11ee-86bb-a8a1599412c6 chromium -- multiple security fixes
31c09848-1829-11e4-bf04-60a44c524f57 tor -- traffic confirmation attack
31d9fbb4-9d09-11dc-a29d-0016d325a0ed ikiwiki -- improper symlink verification vulnerability
31db9a18-e289-11e1-a57d-080027a27dbf rubygem-rails -- multiple vulnerabilities
31de2e13-00d2-11e5-a072-d050996490d0 php -- multiple vulnerabilities
31ea7f73-5c55-11e5-8607-74d02b9a84d5 h2o -- directory traversal vulnerability
31f45d06-7f0e-11ee-94b4-6cc21735f730 postgresql-server -- Memory disclosure in aggregate function calls
320a19f7-1ddd-11ef-a2ae-8c164567ca3c nginx -- Multiple Vulnerabilities in HTTP/3
32166082-53fa-41fa-b081-207e7a989a0a NSS -- multiple vulnerabilities
322d4ff6-85c3-11d8-a41f-0020ed76ef5a Midnight Commander buffer overflow during symlink resolution
323784cf-48a6-11d9-a9e7-0001020eed82 viewcvs -- information leakage
323f900d-ac6d-11ec-a0b8-3065ec8fd3ec chromium -- V8 type confusion
3243e839-f489-11d8-9837-000c41e2cdad fidogate -- write files as `news' user
32498c8f-fc84-11e8-be12-a4badb2f4699 FreeBSD -- Insufficient bounds checking in bhyve(8) device model
326b2f3e-6fc7-4661-955d-a772760db9cf py-tflite -- buffer overflow vulnerability
326c517a-d029-11d9-9aed-000e0c2e438a phpbb -- multiple vulnerabilities
3284d948-140c-4a3e-aa76-3b440e2006a8 firefox -- Crash in TransportSecurityInfo due to cached data
329ecd60-aaf7-11ea-8659-10bf48e1088e libadplug -- Various vulnerabilities
32a4896a-56da-11ee-9186-001b217b3468 Gitlab -- vulnerability
32b05547-6913-11e0-bdc4-001b2134ef46 linux-flashplugin -- remote code execution vulnerability
32c92a75-aa71-11ea-92ab-00163e433440 FreeBSD -- USB HID descriptor parsing error
32d38cbb-2632-11dc-94da-0016179b2dd5 flac123 -- stack overflow in comment parsing
32d4f0f1-85c3-11d9-b6dc-0007e900f747 mkbold-mkitalic -- format string vulnerability
32db37a5-50c3-11db-acf3-000c6ec775d9 openssh -- multiple vulnerabilities
3310014a-5ef9-11ed-812b-206a8a720317 sudo -- Potential out-of-bounds write for small passwords
33174280-43fa-11e8-aad5-6cf0497db129 drupal -- Drupal core - Moderately critical
331eabb3-85b1-466a-a2af-66ac864d395a wolfssl -- leakage of private key information
33236f80-a11d-11ef-a964-1c697a616631 Intel CPUs -- multiple vulnerabilities
3338f87c-3d5f-11e1-a00a-000c6eb41cf7 PowerDNS -- Denial of Service Vulnerability
333f655a-b93a-11e5-9efa-5453ed2e2b49 p5-PathTools -- File::Spec::canonpath loses taint
33459061-a1d6-11e5-8794-bcaec565249c freeimage -- multiple integer overflows
3350275d-cd5a-11e8-a7be-3497f683cb16 jenkins -- multiple vulnerabilities
33557582-3958-11ec-90ba-001b217b3468 Gitlab -- Multiple Vulnerabilities
3364d497-e4e6-11e4-a265-c485083ca99c Adobe Flash Player -- critical vulnerabilities
337960ec-b5dc-11e8-ac58-a4badb2f4699 Plex Media Server -- Information Disclosure Vulnerability
3383e706-4fc3-11df-83fb-0015587e2cc1 tomcat -- information disclosure vulnerability
33888815-631e-4bba-b776-a9b46fe177b5 phpmyfaq -- multiple issues
3388eff9-5d6e-11d8-80e3-0020ed76ef5a Samba 3.0.x password initialization bug
338d1723-5f03-11d9-92a7-000bdb1444a4 horde -- XSS vulnerabilities
33922b84-5f09-11ee-b63d-0897988a1c07 Remote Code Execution via web-accessible composer
3394bc2b-9da4-11e9-951e-14dae9d5a9d2 SDL2_image -- multiple vulnerabilities
339fbbc1-4d23-11db-b48d-00508d6a62df freeciv -- Packet Parsing Denial of Service Vulnerability
33ab4a47-bfc1-11d8-b00e-000347a4fa7d Several vulnerabilities found in PHPNuke
33ba2241-c68e-11ee-9ef3-001999f8d30b Composer -- Code execution and possible privilege escalation
33c05d57-bf6e-11ea-ba1e-0800273f78d3 Python -- multiple vulnerabilities
33c384f3-5af6-4662-9741-0acb21c7e499 mini_httpd -- disclose arbitrary files is some circumstances
33edcc56-83f2-11ea-92ab-00163e433440 FreeBSD -- ipfw invalid mbuf handling
34134fd4-5d81-11d8-80e3-0020ed76ef5a pine insecure URL handling
342176a8-f464-11e1-8bd8-0022156e8794 GNU gatekeeper -- denial of service
342d2e48-26db-11db-9275-000475abc56f clamav -- heap overflow vulnerability
34414a1e-e377-11db-b8ab-000c76189c4c zope -- cross-site scripting vulnerability
3446e45d-a51b-486f-9b0e-e4402d91fed6 electron22 -- multiple vulnerabilities
348bfa69-25a2-11e5-ade1-0011d823eebd Adobe Flash Player -- critical vulnerabilities
348ee234-d541-11ed-ad86-a134a566f1e6 go -- multiple vulnerabilities
3497d7be-2fef-45f4-8162-9063751b573a fetchmail -- remote root/code injection from malicious POP3 server
34a3f9b5-dab3-11e7-b5af-a4badb2f4699 FreeBSD -- Kernel data leak via ptrace(PT_LWPINFO)
34c93ae8-7e6f-11db-bf00-02e081235dab gnupg -- buffer overflow
34ce5817-8d56-11e0-b5a2-6c626dd55a41 asterisk -- Remote crash vulnerability
34e0316a-aa91-11df-8c2e-001517289bf8 ruby -- UTF-7 encoding XSS vulnerability in WEBrick
34e60332-2448-4ed6-93f0-12713749f250 libvpx -- multiple buffer overflows
34e8ccf5-7d71-11e0-9d83-000c29cc39d3 Zend Framework -- potential SQL injection when using PDO_MySql
34f98d06-eb56-11ee-8007-6805ca2fa271 quiche -- Multiple Vulnerabilities
3507bfb3-85d5-11ec-8c9c-001b217b3468 Gitlab -- multiple vulnerabilities
350a5bd9-520b-11db-8f1a-000a48049292 MT -- Search Unspecified XSS
3531141d-a708-477c-954a-2a0549e49ca9 salt -- Maliciously crafted minion IDs can cause unwanted directory traversals on the Salt-master
35431f79-fe3e-11e4-ba63-000c292ee6b8 ipsec-tools -- Memory leak leading to denial of service
3546a833-03ea-11dc-a51d-0019b95d4f14 samba -- multiple vulnerabilities
3551e106-1b17-11ec-a8a7-704d7b472482 chromium -- multiple vulnerabilities
3563fae5-f60c-11e8-b513-5404a68ad561 uriparser -- Multiple vulnerabilities
3567456a-6b17-41f7-ba7f-5cd3efb2b7c9 electron{27,28} -- Use after free in Mojo
356b02e9-1954-11e7-9608-001999f8d30b asterisk -- Buffer overflow in CDR's set user
359e1548-a652-11e8-805b-a4badb2f4699 FreeBSD -- Resource exhaustion in IP fragment reassembly
359f615d-a9e1-11e1-8a66-14dae9ebcf89 asterisk -- multiple vulnerabilities
35aef72c-5c8e-11eb-8309-4ccc6adda413 chocolate-doom -- Arbitrary code execution
35c0b572-125a-11de-a964-0030843d3802 roundcube -- webmail script insertion and php code injection
35d1e192-628e-11ed-8c5e-641c67a117d8 ipython -- Execution with Unnecessary Privileges
35e54755-54e4-11dd-ad8b-0030843d3802 phpmyadmin -- cross site request forgery vulnerabilities
35ecdcbe-3501-11e0-afcd-0015f2db7bde webkit-gtk2 -- Multiple vurnabilities.
35f2679f-52d7-11db-8f1a-000a48049292 postnuke -- admin section SQL injection
35f6093c-73c3-11d9-8a93-00065be4b5b6 newsgrab -- directory traversal vulnerability
35f6fdf8-a425-11d8-9c6d-0020ed76ef5a Cyrus IMAP pre-authentication heap overflow vulnerability
36034227-cf81-11e5-9c2b-00262d5ed8ee chromium -- multiple vulnerabilities
36235c38-e0a8-11e1-9f4d-002354ed89bc automake -- Insecure 'distcheck' recipe granted world-writable distdir
36494478-6a88-11da-b96e-000fb586ba73 kronolith -- Cross site scripting vulnerabilities in several of the calendar name and event data fields
36533a59-2770-11e2-bb44-003067b2972c linux-flashplugin -- multiple vulnerabilities
36594c54-7be7-11e0-9838-0022156e8794 Exim -- remote code execution and information disclosure
3679fd10-c5d1-11e5-b85f-0018fe623f2b openssl -- multiple vulnerabilities
3680b234-b6f0-11e4-b7cc-d050992ecde8 unzip -- heap based buffer overflow in iconv patch
36858e78-3963-11e4-ad84-000c29f6ae42 security/ossec-hids-* -- root escalation via temp files
3686917b-164d-11e6-94fa-002590263bf5 wordpress -- multiple vulnerabilities
368993bb-d685-11e5-8858-00262d5ed8ee chromium -- same origin bypass
3693eca5-f0d3-453c-9558-2353150495bb electron22 -- multiple vulnerabilities
36a2a89e-7ee1-4ea4-ae22-7ca38019c8d0 Loofah -- XSS vulnerability
36a35d83-c560-11eb-84ab-e0d55e2a8bf9 polkit -- local privilege escalation using polkit_system_bus_name_get_creds_sync
36a37c92-44b1-11ee-b091-6162c1274384 gitea -- information disclosure
36b905ad-7fbb-11e9-8a5f-c85b76ce9b5a sqlite3 -- use after free
36bd352d-299b-11e5-86ff-14dae9d210b8 mysql -- SSL Downgrade
36cf7670-2774-11e6-af29-f0def16c5c1b nginx -- a specially crafted request might result in worker process crash
36d10af7-248d-11ed-856e-d4c9ef517024 MariaDB -- Multiple vulnerabilities
36def7ba-6d2b-11ea-b115-643150d3111d puppetserver and puppetdb -- Puppet Server and PuppetDB may leak sensitive information via metrics API
36ef8753-d86f-11e7-ad28-0025908740c2 tor -- Use-after-free in onion service v2
36f9ac43-b2ac-11e3-8752-080027ef73ec mail/trojita -- may leak mail contents (not user credentials) over unencrypted connection
36ff7a74-47b1-11e8-a7d6-54e1ad544088 chromium -- vulnerability
371bbea9-3836-4832-9e70-e8e928727f8c chromium -- multiple vulnerabilities
373e412e-f748-11df-96cd-0015f2db7bde OpenTTD -- Denial of service (server/client) via invalid read
3746de31-0a1a-11e8-83e7-485b3931c969 shadowsocks-libev -- command injection via shell metacharacters
374793ad-2720-4c4a-b86c-fc4a1780deac py-psutil -- double free vulnerability
37528379-76a8-11e9-a4fd-00012e582166 Rust -- violation of Rust's safety guarantees
37569eb7-0125-11e5-9d98-080027ef73ec dnsmasq -- data exposure and denial of service
3761df02-0f9c-11e0-becc-0022156e8794 php -- NULL byte poisoning
376df2f1-1295-11ec-859e-000c292ee6b8 consul -- rpc: authorize raft requests
37940643-be1b-11dd-a578-0030843d3802 hplip -- hpssd Denial of Service
379788f3-2900-11e5-a4a5-002590263bf5 freeradius -- insufficient CRL application vulnerability
37a365ed-1269-11de-a964-0030843d3802 gstreamer-plugins-good -- multiple memory overflows
37a5c10f-bf56-11da-b0e9-00123ffe8333 freeradius -- EAP-MSCHAPv2 Authentication Bypass
37a8603d-4494-11de-bea7-000c29a67389 nsd -- buffer overflow vulnerability
37a87ade-a59f-11e4-958e-0011d823eebd Adobe Flash Player -- critical vulnerability
37d106a8-15a4-483e-8247-fcb68b16eaf8 Dovecot -- Multiple vulnerabilities
37e30313-9d8c-11db-858b-0060084a00e5 fetchmail -- crashes when refusing a message bound for an MDA
37ed8e9c-2651-11e5-86ff-14dae9d210b8 django -- multiple vulnerabilities
380e8c56-8e32-11e1-9580-4061862b8c22 mozilla -- multiple vulnerabilities
381183e8-3798-11e5-9970-14dae9d210b8 net-snmp -- snmp_pdu_parse() function incomplete initialization
38195f00-b215-11e1-8132-003067b2972c linux-flashplugin -- multiple vulnerabilities
381deebb-f5c9-11e9-9c4f-74d435e60b7c file -- Heap buffer overflow possible
38242d51-3e58-11e4-ac2f-bcaec565249c dbus -- multiple vulnerabilities
3831292b-a29d-11ef-af48-6cc21735f730 PostgreSQL -- PostgreSQL row security below e.g. subqueries disregards user ID changes
3837f462-5d6b-11d8-80e3-0020ed76ef5a Buffer overflows in XFree86 servers
383931ba-1818-11e9-92ea-448a5b29e8a9 py-matrix-synapse -- undisclosed vulnerability
3849e28f-8693-11e8-9610-9c5c8e75236a curl -- SMTP send heap buffer overflow
384fc0b2-0144-11e5-8fda-002590263bf5 davmail -- fix potential CVE-2014-3566 vulnerability (POODLE)
38560d79-0e42-11e1-902b-20cf30e32f6d Apache APR -- DoS vulnerabilities
386a14bb-1a21-41c6-a2cf-08d79213379b zeek -- potential DoS vulnerabilities
387bbade-5d1d-11eb-bf20-4437e6ad11c4 mutt -- denial of service
3886cafe-668c-11e2-94b8-1c4bd681f0cf django-cms -- XSS Vulnerability
388d9ee4-7f22-11dd-a66a-0019666436c2 mysql -- MyISAM table privileges security bypass vulnerability
388e6557-8c80-11ee-9ee3-84a93843eb75 MariaDB -- Denial-of-Service vulnerability
388ebb5b-3c95-11eb-929d-d4c9ef517024 Unbound/NSD -- Denial of service vulnerability
388eefc0-c93f-11ee-92ce-4ccc6adda413 readstat -- Heap buffer overflow in readstat_convert
3897a2f8-1d57-11d9-bc4a-000c41e2cdad tiff -- multiple integer overflows
38a4a043-e937-11eb-9b84-d4c9ef517024 MySQL -- Multiple vulnerabilities
38bdf10e-2293-11e0-bfa4-001676740879 tor -- remote code execution and crash
38c676bd-9def-11ea-a94c-3065ec8fd3ec chromium -- multiple vulnerabilities
38c76fcf-1744-11da-978e-0001020eed82 pam_ldap -- authentication bypass vulnerability
38d2df4d-b143-11e9-87e7-901b0e934d69 py-matrix-synapse -- multiple vulnerabilities
38daea4f-2851-11e2-9483-14dae938ec40 opera -- multiple vulnerabilities
38f213b6-8f3d-4067-91ef-bf14de7ba518 libXpm -- Issues handling XPM files
38f2e3a0-b61e-11ec-9ebc-1c697aa5a594 FreeBSD -- zlib compression out-of-bounds write
38fdf07b-e8ec-11ea-8bbe-e0d55e2a8bf9 ark -- extraction outside of extraction directory
38fec4bd-90f7-11e8-aafb-1c39475b9f84 Fix a buffer overflow in the tiff reader
3904f759-5659-11e5-a207-6805ca0b3d42 phpMyAdmin -- reCaptcha bypass
392b5b1d-9471-11dc-9db7-001c2514716c php -- multiple security vulnerabilities
3934cc60-f0fa-4eca-be09-c8bd7ae42871 Salt -- multiple vulnerabilities
395e0faa-ffa7-11e0-8ac4-6c626dd55a41 phpmyfaq -- Remote PHP Code Injection Vulnerability
395ed9d5-3cca-11e9-9ba0-4c72b94353b5 mybb -- vulnerabilities
396ee517-a607-11d9-ac72-000bdb1444a4 horde -- Horde Page Title Cross-Site Scripting Vulnerability
3987c5d1-47a9-11df-a0d5-0016d32f24fb KDM -- local privilege escalation vulnerability
39953788-6bbb-11d9-8bc9-000a95bc6fae egroupware -- arbitrary file download in JiNN
39988ee8-1918-11dc-b6bd-0016179b2dd5 cups -- Incomplete SSL Negotiation Denial of Service
399f4cd7-4d59-11de-8811-0030843d3802 eggdrop -- denial of service vulnerability
39a25a63-eb5c-11de-b650-00215c6a37bb php -- multiple vulnerabilities
39a30e0a-0c34-431b-9dce-b87cab02412a Sanitize -- XSS vulnerability
39bc2294-ff32-4972-9ecb-b9f40b4ccb74 Mozilla -- multiple vulnerabilities
39bd57e6-5d83-11d8-80e3-0020ed76ef5a pine remotely exploitable vulnerabilities
39f6cbff-b30a-11e9-a87f-a4badb2f4699 FreeBSD -- telnet(1) client multiple vulnerabilities
3a023570-91ab-11ed-8950-001b217b3468 Gitlab -- Multiple Vulnerabilities
3a1474ba-f646-11e9-b0af-b888e347c638 sudo -- Potential bypass of Runas user restrictions
3a1dc8c8-bb27-11ec-98d1-d43d7eed0ce2 Subversion -- Multiple vulnerabilities in server code
3a408f6f-9c52-11d8-9366-0020ed76ef5a libpng denial-of-service
3a429192-c36a-11e2-97a9-6805ca0b3d42 RT -- multiple vulnerabilities
3a469cbc-7a66-11eb-bd3f-08002728f74c jasper -- multiple vulnerabilities
3a4a3e9c-a1fe-11dd-81be-001c2514716c wordpress -- snoopy "_httpsrequest()" shell command execution vulnerability
3a63f478-3b10-11eb-af2a-080027dbe4b7 glpi -- bypass of the open redirect protection
3a65d33b-5950-11e2-b66b-00e0814cab4e jenkins -- HTTP access to the server to retrieve the master cryptographic key
3a66cb69-716f-11e8-be54-3085a9a47796 slurm -- insecure handling of user_name and gid fields
3a6960ef-c8a8-11e1-9924-001fd0af1a4c puppet -- multiple vulnerabilities
3a7c5fc4-b50c-11df-977b-ecc31dd8ad06 p5-libwww -- possibility to remote servers to create file with a .(dot) character
3a81017a-8154-11dc-9283-0016179b2dd5 ldapscripts -- Command Line User Credentials Disclosure
3a888a1e-b321-11e4-83b2-206a8a720317 krb5 -- Vulnerabilities in kadmind, libgssrpc, gss_process_context_token VU#540092
3aa27226-f86f-11e8-a085-3497f683cb16 jenkins -- multiple vulnerabilities
3aa8b781-d2c4-11e5-b2bd-002590263bf5 horde -- XSS vulnerabilities
3ac80dd2-14df-11dc-bcfc-0016179b2dd5 mplayer -- cddb stack overflow
3ae078ca-c7eb-11e6-ae1b-002590263bf5 xen-kernel -- x86 PV guests may be able to mask interrupts
3ae106e2-d521-11e6-ae1b-002590263bf5 tomcat -- multiple vulnerabilities
3ae21918-31e3-11e8-927b-e8e0b747a45a chromium -- vulnerability
3b018063-4358-11ef-b611-84a93843eb75 MySQL -- Multiple vulnerabilities
3b14b2b4-9014-11ee-98b3-001b217b3468 Gitlab -- Vulnerabilities
3b18e237-2f15-11de-9672-0030843d3802 mozilla -- multiple vulnerabilities
3b260179-e464-460d-bf9f-d5cda6204020 racoon -- remote denial-of-service
3b2ee737-c12d-11e9-aabc-0800274e5f20 gitea -- multiple vulnerabilities
3b3676be-52e1-11d9-a9e7-0001020eed82 samba -- integer overflow vulnerability
3b40bf2c-ad83-11e4-a2b2-0026551a22dc PostgreSQL -- multiple buffer overflows and memory issues
3b47104f-1461-11ed-a0c5-080027240888 Django -- multiple vulnerabilities
3b4a6982-0b24-11da-bc08-0001020eed82 libgadu -- multiple vulnerabilities
3b50881d-1860-4721-aab1-503290e23f6c Ruby -- unsafe tainted string vulnerability
3b5c2362-bd07-11e5-b7ef-5453ed2e2b49 libproxy -- stack-based buffer overflow
3b776502-f601-44e0-87cd-b63f1b9ae42a sugarcrm -- multiple vulnerabilities
3b7967f1-49e8-11df-83fb-0015587e2cc1 irssi -- multiple vulnerabilities
3b7c7f6c-7102-11d8-873f-0020ed76ef5a wu-ftpd ftpaccess `restricted-uid'/`restricted-gid' directive may be bypassed
3b86583a-66a7-11e3-868f-0025905a4771 phpmyfaq -- arbitrary PHP code execution vulnerability
3b903bf3-7f94-11e9-8a5f-c85b76ce9b5a suricata -- buffer over-read
3b9590a1-e358-11e7-a293-54e1ad3d6335 libXfont -- multiple memory leaks
3ba1ca94-a563-11ec-8be6-d4c9ef517024 Weechat -- Possible man-in-the-middle attack in TLS connection to servers
3ba87032-7fbd-11e9-8a5f-c85b76ce9b5a serendipity -- XSS
3bb451fc-db64-11e7-ac58-b499baebfeaf OpenSSL -- multiple vulnerabilities
3bbbe3aa-fbeb-11e1-8bd8-0022156e8794 freeradius -- arbitrary code execution for TLS-based authentication
3bc5691e-38dd-11da-92f5-020039488e34 libxine -- format string vulnerability
3bd3c9f8-41ee-11ec-9bac-589cfc007716 puppet -- Unsafe HTTP Redirect
3bf157fa-e1c6-11d9-b875-0001020eed82 sudo -- local race condition vulnerability
3bf6795c-d44c-4033-9b37-ed2e30f34fca electron23 -- multiple vulnerabilities
3c0237f5-420e-11e7-82c5-14dae9d210b8 FreeBSD -- Multiple vulnerabilities of ntp
3c10ccdf-6a09-11ea-92ab-00163e433440 FreeBSD -- Insufficient oce(4) ioctl(2) privilege checking
3c1a672e-e508-11de-9f4a-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
3c2549b3-3bed-11e7-a9f0-a4badb296695 Joomla3 -- SQL Injection
3c259621-5d4a-11e5-9ad8-14dae9d210b8 openslp -- denial of service vulnerability
3c2eea8c-99bf-11e8-8bee-a4badb2f4699 FreeBSD -- Resource exhaustion in TCP reassembly
3c3d3dcb-bef7-4d20-9580-b4216b5ff6a2 electron22 -- multiple vulnerabilities
3c4693de-ccf7-11e6-a9a5-b499baebfeaf phpmailer -- Remote Code Execution
3c5579f7-294a-11e4-99f6-00e0814cab4e django -- multiple vulnerabilities
3c5a4fe0-9ebb-11e9-9169-fcaa147e860e mediawiki -- multiple vulnerabilities
3c6f8270-3210-4e2f-ba72-a9cdca7417a0 jenkins -- multiple vulnerabilities
3c77f139-3a09-11eb-929d-d4c9ef517024 cURL -- Multiple vulnerabilities
3c7911c9-8a29-11ea-8d8c-005056a311d1 samba -- multiple vulnerabilities
3c7ba82a-d3fb-11ea-9aba-0c9d925bbbc0 xorg-server -- Pixel Data Uninitialized Memory Information Disclosure
3c7d565a-6c64-11e0-813a-6c626dd55a41 Asterisk -- multiple vulnerabilities
3c7edc7a-f680-11e9-a87f-a4badb2f4699 FreeBSD -- Multiple vulnerabilities in bzip2
3c8d1e5b-b673-11e1-be25-14dae9ebcf89 asterisk -- remote crash vulnerability
3c90e093-7c6e-11e2-809b-6c626d99876c FreeBSD -- glob(3) related resource exhaustion
3c957a3e-2978-11e1-89b4-001ec9578670 typo3 -- Remote Code Execution
3c9b7698-84da-11e8-8c75-d8cb8abf62dd Libgit2 -- multiple vulnerabilities
3cac007f-b27e-11eb-97a0-e09467587c17 chromium -- multiple vulnerabilities
3caf4e6c-4cef-11e6-a15f-00248c0c745d typo3 -- Missing access check in Extbase
3cb6f059-c69d-11db-9f82-000e0c2e438a bind -- Multiple Denial of Service vulnerabilities
3cb88bb2-67a6-11d8-80e3-0020ed76ef5a mailman XSS in admin script
3cc84400-6576-11d9-a9e7-0001020eed82 mpg123 -- buffer overflow vulnerability
3cd46257-bbc5-11e7-a3bc-e8e0b747a45a chromium -- Stack overflow in V8
3cde510a-7135-11ed-a28b-bff032704f00 Gitlab -- Multiple Vulnerabilities
3ce8c7e2-66cf-11dc-b25f-02e0185f8d72 mozilla -- code execution via Quicktime media-link files
3cf8ea44-1029-11ef-9f97-a8a1599412c6 chromium -- multiple security fixes
3d02520d-b309-11e9-a87f-a4badb2f4699 FreeBSD -- IPv6 fragment reassembly panic in pf(4)
3d0428b2-fdfb-11e4-894f-d050996490d0 clamav -- multiple vulnerabilities
3d0a3eb0-9ca3-11ed-a925-3065ec8fd3ec chromium -- multiple vulnerabilities
3d0e724e-129b-11dc-9f79-0016179b2dd5 phppgadmin -- cross site scripting vulnerability
3d0eeef8-0cf9-11e8-99b0-d017c2987f9a Mailman -- Cross-site scripting (XSS) vulnerability in the web UI
3d1372e1-7822-4fd8-b56e-5ee832afbd96 wolfssl -- DDoS amplification in DTLS
3d19c776-68e7-11ea-91db-0050562a4d7b www/py-bleach -- multiple vulnerabilities
3d1e9267-073f-11d9-b45d-000c41e2cdad gdk-pixbuf -- image decoding vulnerabilities
3d39e927-29a2-11e5-86ff-14dae9d210b8 php -- use-after-free vulnerability
3d5581ff-d388-11ed-8581-a8a1599412c6 chromium -- multiple vulnerabilities
3d55b961-9a2e-11e1-a2ef-001fd0af1a4c rubygem-mail -- multiple vulnerabilities
3d657340-27ea-11e5-a4a5-002590263bf5 xen-tools -- Unmediated PCI register access in qemu
3d675519-5654-11e5-9ad8-14dae9d210b8 php -- multiple vulnerabilities
3d6be69b-d365-11e6-a071-001e67f15f5a Irssi -- multiple vulnerabilities
3d73e384-ad1f-11ed-983c-83fe35862e3a go -- multiple vulnerabilities
3d7dfd63-823b-11ea-b3a8-240a644dd835 Client/server denial of service when handling AES-CTR ciphers
3d8d3548-9d02-11db-a541-000ae42e9b93 drupal -- multiple vulnerabilities
3d915d96-0b1f-11ec-8d9f-080027415d17 cyrus-imapd -- multiple-minute daemon hang via input that is mishandled during hash-table interaction
3d950687-b4c9-4a86-8478-c56743547af8 ffmpeg -- multiple vulnerabilities
3d95c9a7-7d5c-11e3-a8c1-206a8a720317 ntpd DRDoS / Amplification Attack using ntpdc monlist command
3d9f6260-881d-11e5-ab94-002590263bf5 xen-kernel -- Uncontrolled creation of large page mappings by PV guests
3da0352f-2397-11ea-966e-000ffec0b3e1 drupal -- Drupal Core - Multiple Vulnerabilities
3dabf5b8-47c0-11ee-8e38-002590c1f29c FreeBSD -- Remote denial of service in IPv6 fragment reassembly
3dac84c9-bce1-4199-9784-d68af1eb7b2e libtremor -- multiple vulnerabilities
3dada2d5-4e17-4e39-97dd-14fdbd4356fb null -- Routinator terminates when RTR connection is reset too quickly after opening
3dbe9492-f7b8-11e7-a12d-6cc21735f730 shibboleth-sp -- vulnerable to forged user attribute data
3dd46e05-9fb0-11e9-bf65-00012e582166 webkit2-gtk3 -- Multiple vulnerabilities
3dd6ccf4-a3c6-11e7-a52e-0800279f2ff8 OpenVPN -- out-of-bounds write in legacy key-method 1
3dd7eb58-80ae-11db-b4ec-000854d03344 gtar -- GNUTYPE_NAMES directory traversal vulnerability
3ddcb42b-5b78-11e6-b334-002590263bf5 moodle -- multiple vulnerabilities
3de342fb-40be-11dc-aeac-02e0185f8d72 FreeBSD -- Predictable query ids in named(8)
3de36a19-429d-11e5-9daa-14dae9d210b8 gnutls -- MD5 downgrade in TLS signatures
3de49331-0dec-422c-93e5-e4719e9869c5 openvpn -- potential denial-of-service on servers in TCP mode
3decc87d-2498-11e2-b0c7-000d601460a4 ruby -- Unintentional file creation caused by inserting an illegal NUL character
3df5a920-6edc-11e9-a44b-0050562a4d7b comms/hylafax -- Malformed fax sender remote code execution in JPEG support
3e0072d4-d05b-11d9-9aed-000e0c2e438a net-snmp -- fixproc insecure temporary file creation
3e01aad2-680e-11eb-83e2-e09467587c17 chromium -- heap buffer overflow in V8
3e0507c6-9614-11e3-b3a5-00e0814cab4e jenkins -- multiple vulnerabilities
3e08047f-5a6c-11e6-a6c3-14dae9d210b8 p5-XSLoader -- local arbitrary code execution
3e0ca488-b3f6-11eb-a5f7-a0f3c100ae18 ImageMagick6 -- multiple vulnerabilities
3e0da406-aece-11e9-8d41-97657151f8c2 Exim -- RCE in ${sort} expansion
3e2c9b63-223c-4575-af5c-816acb14e445 rdesktop - critical - Remote Code Execution
3e2e9b44-25ce-11e7-a175-939b30e0836d cURL -- TLS session resumption client cert bypass (again)
3e33a0bb-6b2f-11e3-b042-20cf30e32f6d OpenX -- SQL injection vulnerability
3e3c860d-7dae-11d9-a9e7-0001020eed82 emacs -- movemail format string vulnerability
3e41c1a6-10bc-11e9-bd85-fcaa147e860e Django -- Content spoofing possibility in the default 404 page
3e44c35f-6cf4-11ef-b813-4ccc6adda413 exiv2 -- Out-of-bounds read in AsfVideo::streamProperties
3e4ffe76-e0d4-11d8-9b0a-000347a4fa7d SoX buffer overflows when handling .WAV files
3e5b8bd3-0c32-452f-a60e-beab7b762351 transmission-daemon -- vulnerable to dns rebinding attacks
3e738678-7582-11ef-bece-2cf05da270f3 Gitlab -- vulnerabilities
3e748551-c732-45f6-bd88-928da16f23a8 webkit2-gtk3 -- Multiple vulnerabilities
3e8b7f8a-49b0-11e4-b711-6805ca0b3d42 phpMyAdmin -- XSS vulnerabilities
3e917407-4b3f-11ef-8e49-001999f8d30b Mailpit -- Content Security Policy XSS
3e9624b3-e92b-4460-8a5a-93247c52c5a1 zeek -- Remote crash vulnerability
3e9be8c4-8192-11d8-9645-0020ed76ef5a ecartis buffer overflows and input validation bugs
3e9d2fde-0567-11ec-b69d-4062311215d5 FreeBSD -- Remote code execution in ggatec(8)
3eb0ccc2-8c6a-11e5-8519-005056ac623e strongswan -- authentication bypass vulnerability in the eap-mschapv2 plugin
3eb2c100-738b-11e0-89f4-001e90d46635 Postfix -- memory corruption vulnerability
3ebb2dc8-4609-11e1-9f47-00e0815b8da8 Wireshark -- Multiple vulnerabilities
3ebd4cb5-657f-11de-883a-00e0815b8da8 nagios -- Command Injection Vulnerability
3ec2e0bc-9ed7-11e5-8f5c-002590263bf5 redmine -- open redirect vulnerability
3ec6ab59-1e0c-11eb-a428-3065ec8fd3ec chromium -- multiple vulnerabilities
3ec8f43b-e8ef-11d9-b875-0001020eed82 kernel -- TCP connection stall denial of service
3eccc968-ab17-11ed-bd9e-589cfc0f81b0 phpmyfaq -- multiple vulnerabilities
3ee577a9-aad4-11ee-86bb-a8a1599412c6 chromium -- multiple security fixes
3ee6e521-0d32-11e8-99b0-d017c2987f9a mpv -- arbitrary code execution via crafted website
3efc106e-c451-11dd-a721-0030843d3802 dovecot-managesieve -- Script Name Directory Traversal Vulnerability
3eff66c5-66c9-11e7-aa1d-3d2e663cef42 node.js -- multiple vulnerabilities
3f09ca29-0e48-11e4-b17a-6805ca0b3d42 phpMyAdmin -- multiple XSS vulnerabilities, missing validation
3f1df2f9-cd22-11e0-9bb2-00215c6a37bb PHP -- crypt() returns only the salt for MD5
3f321a5a-b33b-11ec-80c2-1bb2c6a00592 dnsmasq -- heap use-after-free in dhcp6_no_relay
3f332f16-9b6b-11e2-8fe9-08002798f6ff PostgreSQL -- anonymous remote access data corruption vulnerability
3f3837cc-48fb-4414-aa46-5b1c23c9feae krb5 -- Multiple vulnerabilities
3f4ac724-fa8b-11d9-afcf-0060084a00e5 fetchmail -- denial of service/crash from malicious POP3 server
3f6d6181-79b2-4d33-bb1e-5d3f9df0c1d1 py39-redis -- can send response data to the client of an unrelated request
3f6de636-8cdb-11e7-9c71-f0def1fd7ea2 rubygems -- multiple vulnerabilities
3f851b22-89fb-11db-a937-003048116330 proftpd -- remote code execution vulnerabilities
3f98ccb3-6b8a-11e9-9b5c-a4badb296695 Dovecot -- Multiple vulnerabilities
3f9b6943-ba58-11ed-bbbd-00e0670f2660 strongSwan -- certificate verification vulnerability
3fa2b372-a9f5-11d9-a788-0001020eed82 gaim -- remote DoS on receiving malformed HTML
3fadb7c6-7b0a-11e0-89b4-001ec9578670 mediawiki -- multiple vulnerabilities
3fadd7e4-f8fb-45a0-a218-8fd6423c338f graylog -- include log4j patches
3fb06284-b1b7-11e5-9728-002590263bf5 qemu -- denial of service vulnerability in MSI-X support
3fbf9db2-658b-11d9-abad-000a95bc6fae mozilla -- heap overflow in NNTP handler
3fcab88b-47bc-11ee-8e38-002590c1f29c FreeBSD -- GELI silently omits the keyfile if read from stdin
3fcb70a4-e22d-11ea-98b2-080027846a02 Python -- multiple vulnerabilities
3fcd52b2-4510-11e6-a15f-00248c0c745d ruby-saml -- XML signature wrapping attack
3fd040be-4f0b-11e1-9e32-0025900931f8 php -- arbitrary remote code execution vulnerability
3ff95dd3-c291-11df-b0dc-00215c6a37bb django -- cross-site scripting vulnerability
400d9d22-d6c5-11da-a14b-00123ffe8333 trac -- Wiki Macro Script Insertion Vulnerability
40173815-6827-11ee-b06f-0050569ceb3a GLPI vulnerable to unauthorized access to User data
40194e1c-6d89-11ea-8082-80ee73419af3 rubygem-json -- Unsafe Objection Creation Vulnerability in JSON (Additional fix)
402ae710-26a2-11dd-ae05-825f4c35000a peercast -- arbitrary code execution
402fccd0-5b6d-11ee-9898-00e081b7aa2d jenkins -- multiple vulnerabilities
4033d826-87dd-11e4-9079-3c970e169bc2 ntp -- multiple vulnerabilities
40497e81-fee3-4e54-9d5f-175a5c633b73 libtremor -- memory corruption
405446f4-b1b3-11e5-9728-002590263bf5 qemu and xen-tools -- denial of service vulnerabilities in AMD PC-Net II NIC support
40544e8c-9f7b-11e0-9bec-6c626dd55a41 Asterisk -- multiple vulnerabilities
40549bbf-43b5-11d9-a9e7-0001020eed82 zip -- long path buffer overflow
4055aee5-f4c6-11e7-95f2-005056925db4 awstats -- remote code execution
4061a4b2-4fb1-11ee-acc7-0151f07bc899 gitea -- block user account creation from blocked email domains
406636fe-055d-11e5-aab1-d050996490d0 krb5 -- requires_preauth bypass in PKINIT-enabled KDC
406779fd-ca3b-11df-aade-0050568f000c FreeBSD -- SSL protocol flaw
40774927-f6b4-11dd-94d9-0030843d3802 phplist -- local file inclusion vulnerability
4084168e-b531-11e5-a98c-0011d823eebd mbedTLS/PolarSSL -- SLOTH attack on TLS 1.2 server authentication
40856a51-e1d9-11d9-b875-0001020eed82 opera -- "javascript:" URL cross-site scripting vulnerability
408f6ebf-d152-11da-962f-000b972eb521 cyrus-sasl -- DIGEST-MD5 Pre-Authentication Denial of Service
4091069e-860b-11e9-a05f-001b217b3468 Gitlab -- Multiple Vulnerabilities
40a0185f-ec32-11da-be02-000c6ec775d9 drupal -- multiple vulnerabilities
40a3bca2-6809-11d9-a9e7-0001020eed82 cups-base -- HPGL buffer overflow vulnerability
40a844bf-c430-11e8-96dc-000743165db0 bitcoin -- Denial of Service and Possible Mining Inflation
40a8d798-4615-11e7-8080-a4badb2f4699 heimdal -- bypass of capath policy
40b481a9-9df7-11eb-9bc3-8c164582fbac mdbook -- XSS in mdBook's search page
40bfab16-a68b-11ea-9ea5-001b217b3468 Gitlab -- Multiple Vulnerabilities
40d92cc5-1e2b-11e9-bef6-6805ca2fa271 powerdns-recursor -- multiple vulnerabilities
40e2c35e-db99-11ec-b0cf-3065ec8fd3ec chromium -- multiple vulnerabilities
40fcf20f-8891-11d8-90d1-0020ed76ef5a racoon remote denial of service vulnerability (IKE Generic Payload Header)
4108cc57-54d7-11e2-9483-14dae938ec40 ircd-ratbox and charybdis -- remote DoS vulnerability
411ecb79-f9bc-11e0-a7e6-6c626dd55a41 piwik -- unknown critical vulnerabilities
414c18bf-3653-11e7-9550-6cc21735f730 PostgreSQL vulnerabilities
414e6a41-7204-11e2-8599-001060e06fd4 linux-flashplugin -- multiple vulnerabilities
4158c57e-5d39-11e3-bc1e-6cf0490a8c18 Joomla! -- Core XSS Vulnerabilities
416ca0f4-3fe0-11e9-bbdd-6805ca0b3d42 rt -- XSS via jQuery
4175c811-f690-4898-87c5-755b3cf1bac6 ntp -- stack-based buffer overflow
417de1e6-c31b-11eb-9633-b42e99a1b9c3 lasso -- signature checking failure
418c172b-b96f-11e7-b627-d43d7e971a1b GitLab -- multiple vulnerabilities
41af0277-47bf-11ee-8e38-002590c1f29c FreeBSD -- Network authentication attack via pam_krb5
41bc849f-d5ef-11eb-ae37-589cfc007716 PuppetDB -- SQL Injection
41c1cd6f-2645-11e9-b5f1-080027fee39c gitea -- multiple vulnerabilities
41c60e16-2405-11ee-a0d1-84a93843eb75 OpenSSL -- AES-SIV implementation ignores empty associated data entries
41c96ffd-29a6-4dcc-9a88-65f5038fa6eb perl -- multiple vulnerabilities
41d2f3e6-f680-11e9-a87f-a4badb2f4699 FreeBSD -- ICMPv6 / MLDv2 out-of-bounds memory access
41da2ba4-a24e-11db-bd24-000f3dcc6a5d cacti -- Multiple vulnerabilities
41f4baac-bf77-11e9-8d2f-5404a68ad561 traefik -- Denial of service in HTTP/2
41f8af15-c8b9-11e6-ae1b-002590263bf5 squid -- multiple vulnerabilities
41fe4724-06a2-11e7-8e3e-5453ed2e2b49 kde-runtime -- kdesu: displayed command truncated by unicode string terminator
4200d5f5-b985-11ea-b08a-f8b156b6dcc8 libvorbis -- two vulnerabilities
420243e9-a840-11e7-b5af-a4badb2f4699 FreeBSD -- heimdal KDC-REP service name validation vulnerability
421c0af9-b206-11ed-9fe5-f4a47516fb57 libde256 -- multiple vulnerabilities
4238151d-207a-11d9-bfe2-0090962cff2a mod_ssl -- SSLCipherSuite bypass
425b9538-ce5f-11ed-ade3-d4c9ef517024 OpenSSL -- Multiple vulnerabilities
425f2143-8876-4b0a-af84-e0238c5c2062 jenkins -- Arbitrary file read vulnerability in workspace browsers
4260eacb-26b8-11d9-9289-000c41e2cdad gaim -- multiple buffer overflows
42675046-fa70-11e9-ba4e-901b0e934d69 py-matrix-synapse -- missing signature checks on some federation APIs
427b0f58-644c-11e8-9e1b-e8e0b747a45a chromium -- multiple vulnerabilities
4281b712-ad6b-4c21-8f66-619a9150691f electron25 -- Use after free in extensions vulnerability
42852f72-6bd3-11e5-9909-002590263bf5 OpenSMTPD -- multiple vulnerabilities
42880202-c81c-11e6-a9a5-b499baebfeaf cURL -- buffer overflow
428922c9-b07e-11ed-8700-5404a68ad561 traefik -- Use of vulnerable Go module x/net/http2
429249d2-67a7-11d8-80e3-0020ed76ef5a mailman XSS in create script
42926d7b-0da3-11eb-8dbd-6451062f0f7a Flash Player -- arbitrary code execution
42a2c82a-75b9-11e1-89b4-001ec9578670 quagga -- multiple vulnerabilities
42a4d82d-4603-11ec-8be6-d4c9ef517024 Roundcube -- Multiple vulnerabilities
42c2c422-df55-11e5-b2bd-002590263bf5 wireshark -- multiple vulnerabilities
42c98cef-62b1-4b8b-9065-f4621e08d526 libvpx -- out-of-bounds write
42cbd1e8-b152-11e5-9728-002590263bf5 qemu -- denial of service vulnerability in virtio-net support
42d42090-9a4d-11e3-b029-08002798f6ff PostgreSQL -- multiple privilege issues
42ec2207-7e85-11ef-89a4-b42e991fc52e sqlite -- use-after-free bug in jsonparseaddnodearray
43024078-9b63-11df-8983-001d60d86f38 libmspack -- infinite loop denial of service
432bf98d-9e25-11da-b410-000e0c2e438a kpdf -- heap based buffer overflow
4344861a-be0b-11ea-9172-4c72b94353b5 Anydesk -- Multiple Vulnerabilities
4364e1f1-0f44-11e4-b090-20cf30e32f6d apache24 -- several vulnerabilities
436d7f93-9cf0-11ea-82b8-4c72b94353b5 piwigo -- Multible Vulnerabilities
43768ff3-c683-11ee-97d0-001b217b3468 Libgit2 -- multiple vulnerabilities
43770b1c-72f6-11da-8c1d-000e0c2e438a nbd-server -- buffer overflow vulnerability
437a68cf-b752-11de-b6eb-00e0815b8da8 php5 -- Multiple security issues
43891162-2d5e-11e5-a4a5-002590263bf5 moodle -- multiple vulnerabilities
439f3f81-7a49-11ed-97ac-589cfc0f81b0 phpmyfaq -- multiple vulnerabilities
43a1b8f9-3451-4f3c-b4fc-730c0f5876c1 sam2p -- multiple issues
43a7b0a7-f9bc-11d9-b473-00061bc2ad93 PowerDNS -- LDAP backend fails to escape all queries
43ac9d42-1b9a-11e5-b43d-002590263bf5 elasticsearch and logstash -- remote OS command execution via dynamic scripting
43ae57f6-92ab-11ec-81b4-2cf05d620ecc Qt5 -- QProcess unexpected search path
43cb40b3-c8c2-11da-a672-000e0c2e438a f2c -- insecure temporary files
43d1c381-a3e5-4a1d-b3ed-f37b61a451af electron28 -- multiple vulnerabilities
43e9ffd4-d6e0-11ed-956f-7054d21a9e2a py39-pycares -- domain hijacking vulnerability
43eaa656-80bc-11e6-bf52-b499baebfeaf OpenSSL -- multiple vulnerabilities
43ee6c1d-29ee-11e9-82a1-001b217b3468 Gitlab -- Multiple vulnerabilities
43f1c867-654a-11e6-8286-00248c0c745d Rails 4 -- Possible XSS Vulnerability in Action View
43f84437-73ab-11ec-a587-001b217b3468 Gitlab -- Multiple Vulnerabilities
4405e9ad-97fe-11ee-86bb-a8a1599412c6 chromium -- multiple security fixes
441e1e1a-27a5-11ee-a156-080027f5fec9 samba -- multiple vulnerabilities
44224e08-8306-11dc-9283-0016179b2dd5 opera -- multiple vulnerabilities
44449bf7-c69b-11db-9f82-000e0c2e438a gtar -- name mangling symlink vulnerability
4451a4c9-c05e-11dc-982e-001372fd0af2 drupal -- cross site request forgery
445ed958-b0d9-11dd-a55e-00163e000016 faad2 -- heap overflow vulnerability
4464212e-4acd-11e5-934b-002590263bf5 go -- multiple vulnerabilities
4465c897-ee5c-11de-b6ef-00215c6a37bb monkey -- improper input validation vulnerability
446dbecb-9edc-11d8-9366-0020ed76ef5a heimdal kadmind remote heap buffer overflow
4472ab39-6c66-11e6-9ca5-50e549ebab6c kdelibs -- directory traversal vulnerability
448047e9-030e-4ce4-910b-f21a3ad5d9a0 shotwell -- not verifying certificates
44864c84-d3b8-11e8-b3cb-00e04c1ea73d matomo -- XSS vulnerability
44989c29-67d1-11e6-8b1d-c86000169601 fontconfig -- insufficiently cache file validation
44b6dfbf-4ef7-4d52-ad52-2b1b05d81272 mozilla -- multiple vulnerabilities
44c8694a-12f9-11dd-9b26-001c2514716c extman -- password bypass vulnerability
44ccfab0-3564-11e0-8e81-0022190034c0 exim -- local privilege escalation
44d0f8dc-6607-11e3-bb11-0025900931f8 zabbix -- shell command injection vulnerability
44d9daee-940c-4179-86bb-6e3ffd617869 mozilla -- multiple vulnerabilities
44e5f5bd-4d76-11da-bf37-000fb586ba73 pear-PEAR -- PEAR installer arbitrary code execution vulnerability
44e7764c-2614-11da-9e1e-c296ac722cb3 squid -- possible denial of service condition regarding NTLM authentication
44ee8160-c453-11dd-a721-0030843d3802 mgetty+sendfax -- symlink attack via insecure temporary files
44fb0302-9d38-11dc-9114-001c2514716c rubygem-rails -- JSON XSS vulnerability
450b76ee-5068-11db-a5ae-00508d6a62df dokuwiki -- multiple vulnerabilities
45117749-df55-11e5-b2bd-002590263bf5 wireshark -- multiple vulnerabilities
451a6c79-c92b-11e4-a835-000c292ee6b8 sympa -- Remote attackers can read arbitrary files
45298931-b3bf-11dd-80f8-001cc0377035 gnutls -- X.509 certificate chain validation vulnerability
452d16bb-920d-11ea-9d20-18a6f7016652 qutebrowser -- Reloading page with certificate errors shows a green URL
453aa0fc-2d91-11ef-8a0f-a8a1599412c6 chromium -- multiple security fixes
4548ec97-4d38-11ec-a539-0800270512f4 rubygem-cgi -- cookie prefix spoofing in CGI::Cookie.parse
45500f74-5947-11dc-87c1-000e2e5785ad fetchmail -- denial of service on reject of local warning message
456375e1-cd09-11ea-9172-4c72b94353b5 pango -- buffer overflow
45671c0e-a652-11e8-805b-a4badb2f4699 FreeBSD -- Unauthenticated EAPOL-Key Decryption Vulnerability
457ce015-67fa-11e7-867f-b499baebfeaf Apache httpd -- multiple vulnerabilities
4582948a-9716-11de-83a5-001999392805 opera -- multiple vulnerabilities
458df97f-1440-11eb-aaec-e0d55e2a8bf9 freetype2 -- heap buffer overlfow
4593cb09-4c81-11d9-983e-000c6e8f12ef konqueror -- Password Disclosure for SMB Shares
459df1ba-051c-11ea-9673-4c72b94353b5 wordpress -- multiple issues
45a72180-a640-11ec-a08b-85298243e224 openvpn -- Potential authentication by-pass with multiple deferred authentication plug-ins
45a95fdd-f680-11e9-a87f-a4badb2f4699 FreeBSD -- Insufficient message length validation in bsnmp library
45b75152-ae5f-11d9-a788-0001020eed82 mozilla -- javascript "lambda" replace exposes memory contents
45b8716b-c707-11eb-b9a0-6805ca0b3d42 pglogical -- shell command injection in pglogical.create_subscription()
45b8e2eb-7056-11e8-8fab-63ca6e0e13a2 node.js -- multiple vulnerabilities
45bea6b5-8855-11e9-8d41-97657151f8c2 Exim -- RCE in deliver_message() function
45ca25b5-ba4d-11e6-ae1b-002590263bf5 xen-kernel -- x86: Disallow L3 recursive pagetable for 32-bit PV guests
45d89773-5b64-11e9-80ed-d43d7ef03aa6 Flash Player -- multiple vulnerabilities
45f102cd-4456-11e0-9580-4061862b8c22 mozilla -- multiple vulnerabilities
4622635f-37a1-11e5-9970-14dae9d210b8 net-snmp -- snmptrapd crash
462e2d6c-8017-11e1-a571-bcaec565249c freetype -- multiple vulnerabilities
46419e8c-65d9-11ef-ac06-b0416f0c4c67 Configobj -- Regular Expression Denial of Service attack
4645b98c-e46e-11da-9ae7-00123fcc6e5c vnc -- authentication bypass vulnerability
465db5b6-9c6d-11eb-8e8a-bc542f4bd1dd xorg-server -- Input validation failures in X server XInput extension
466ba8bd-d033-11ed-addf-080027eda32c mediawiki -- multiple vulnerabilities
4671cdc9-7c6d-11e2-809b-6c626d99876c FreeBSD -- BIND remote DoS with deliberately crafted DNS64 query
467b7cbe-257d-11e9-8573-001b217b3468 Gitlab -- Multiple vulnerabilities
4684a426-774d-4390-aa19-b8dd481c4c94 wireshark -- multiple security issues
46a29f83-cb47-11ee-b609-002590c1f29c FreeBSD -- jail(2) information leak
46aeba13-64a1-11e1-bc16-0023ae8e59f0 openx -- undisclosed security issue
46b922a8-c69c-11db-9f82-000e0c2e438a FreeBSD -- Jail rc.d script privilege escalation
46e1ece5-48bd-11e9-9c40-080027ac955c PuTTY -- security fixes in new release
46f7b598-a781-11da-906a-fde5cdde365e bugzilla -- multiple vulnerabilities
47157c14-9013-11e6-a590-14dae9d210b8 mupdf -- multiple vulnerabilities
47197b47-6a1a-11ec-8be6-d4c9ef517024 Roundcube -- XSS vulnerability
4729c849-4897-11e6-b704-000c292e4fd8 samba -- client side SMB2/3 required signing can be downgraded
473b6a9e-8493-11e7-b24b-6cf0497db129 drupal -- Drupal Core - Multiple Vulnerabilities
4740174c-82bb-11e8-a29a-00e04c1ea73d wordpress -- multiple issues
475f952c-9b29-11e9-a8a5-6805ca0b38e8 irssi -- Use after free when sending SASL login to the server
47695a9c-5377-11ec-8be6-d4c9ef517024 NSS -- Memory corruption
4769914e-b844-11de-b159-0030843d3802 phpmyadmin -- XSS and SQL injection vulnerabilities
4775c807-8f30-11dd-821f-001cc0377035 mysql -- command line client input validation vulnerability
47873d72-14eb-11e7-970f-002590263bf5 xen-tools -- xenstore denial of service via repeated update
478d4102-2319-4026-b3b2-a57c48f159ac ansible -- information disclosure flaw
479c5b91-b6cc-11e6-a04e-3417eb99b9a0 wget -- Access List Bypass / Race Condition
479df73e-2838-11ef-9cab-4ccc6adda413 plasma[56]-plasma-workspace -- Unauthorized users can access session manager
479efd57-516e-11e3-9b62-000c292e4fd8 samba -- Private key in key.pem world readable
479fdfda-6659-11eb-83e2-e09467587c17 www/chromium -- multiple vulnerabilities
47aa4343-44fa-11e5-9daa-14dae9d210b8 mod_jk -- information disclosure
47b4e713-6513-11e3-868f-0025905a4771 PHP5 -- memory corruption in openssl_x509_parse()
47b571f2-157b-11ec-ae98-704d7b472482 chromium -- multiple vulnerabilities
47bdabcf-3cf9-11da-baa2-0004614cc33d gallery2 -- file disclosure vulnerability
47e2e52c-975c-11e7-942d-5404a68a61a2 emacs -- enriched text remote code execution vulnerability
47f13540-c4cb-4971-8dc6-28d0dabfd9cd nut -- upsd can be remotely crashed
48103b0a-ca3f-11df-aade-0050568f000c FreeBSD -- ntpd mode 7 denial of service
48108fb0-751c-4cbb-8f33-09239ead4b55 NSS -- RSA Signature Forgery
482456fb-e9af-11ec-93b6-318d1419ea39 Security Vulnerability found in ExifTool leading to RCE
482bb980-99a3-11ee-b5f7-6bd56600d90c gitea -- missing permission checks
482d40cb-f9a3-11e5-92ce-002590263bf5 php -- multiple vulnerabilities
484d3f5e-653a-11e9-b0e3-1c39475b9f84 Istio -- Security vulnerabilities
48504af7-07ad-11e5-879c-00e0814cab4e django -- Fixed session flushing in the cached_db backend
48514901-711d-11eb-9846-e09467587c17 chromium -- multiple vulnerabilities
4867ae85-608d-11db-8faf-000c6ec775d9 opera -- URL parsing heap overflow vulnerability
486aff57-9ecd-11da-b410-000e0c2e438a postgresql -- character conversion and tsearch2 vulnerabilities
4872d9a7-4128-11dc-bdb0-0016179b2dd5 joomla -- multiple vulnerabilities
48894ca9-3e6f-11e8-92f0-f0def167eeea roundcube -- IMAP command injection vulnerability
48a59c96-9c6e-11d9-a040-000a95bc6fae wine -- information disclosure due to insecure temporary file handling
48aab1d0-4252-11de-b67a-0030843d3802 libwmf -- integer overflow vulnerability
48bcb4b2-e708-11e1-a59d-000d601460a4 typo3 -- Multiple vulernabilities in TYPO3 Core
48cca164-e269-11e7-be51-6599c735afc8 global -- gozilla vulnerability
48e14d86-42f1-11de-ad22-000e35248ad7 libxine -- multiple vulnerabilities
48e6d514-5568-11ef-af48-6cc21735f730 PostgreSQL -- Prevent unauthorized code execution during pg_dump
48e83187-b6e9-11e6-b6cf-5453ed2e2b49 p7zip -- Null pointer dereference
4910d161-58a4-11e5-9ad8-14dae9d210b8 openldap -- denial of service vulnerability
4913886c-e875-11da-b9f4-00123ffe8333 MySQL -- Information Disclosure and Buffer Overflow Vulnerabilities
49211361-ba4d-11e6-ae1b-002590263bf5 xen-kernel -- x86: Mishandling of instruction pointer truncation during emulation
492f8896-70fa-11d8-873f-0020ed76ef5a Apache 2 mod_ssl denial-of-service
49314321-7fd4-11e1-9582-001b2134ef46 mutt-devel -- failure to check SMTP TLS server certificate
49346de2-b015-11eb-9bdf-f8b156b6dcc8 FLAC -- out-of-bounds read
495b46fd-a30f-11e1-82c9-d0df9acfd7e5 foswiki -- Script Insertion Vulnerability via unchecked user registration fields
496160d3-d3be-11e6-ae1b-002590263bf5 codeigniter -- multiple vulnerabilities
497b82e0-f9a0-11e5-92ce-002590263bf5 pcre -- heap overflow vulnerability
498a8731-7cfc-11dc-96e6-0012f06707f0 phpmyadmin -- cross-site scripting vulnerability
499b22a3-f680-11e9-a87f-a4badb2f4699 FreeBSD -- Insufficient validation of guest-supplied data (e1000 device)
499f6b41-58db-4f98-b8e7-da8c18985eda quassel -- multiple vulnerabilities
49a6026a-52a3-11e2-a289-1c4bd681f0cf otrs -- XSS vulnerability in Internet Explorer
49ad1bf8-5d7e-11d8-80e3-0020ed76ef5a ChiTeX/ChiLaTeX unsafe set-user-id root
49adfbe5-e7d1-11ec-8fbd-d4c9ef517024 Apache httpd -- Multiple vulnerabilities
49b61ab6-0d04-11ea-87ca-001999f8d30b asterisk -- AMI user could execute system commands
49beb00f-a6e1-4a42-93df-9cb14b4c2bee Mozilla -- multiple vulnerabilities
49c35943-0eeb-421c-af4f-78e04582e5fb seatd-launch -- privilege escalation with SUID
49cbe200-f92a-11e8-a89d-d43d7ef03aa6 Flash Player -- multiple vulnerabilities
49d9c28c-fbad-11e4-b0fb-00269ee29e57 Quassel IRC -- SQL injection vulnerability
49dd9362-4473-48ae-8fac-e1b69db2dedf electron{27,28} -- Out of bounds memory access in V8
49def4b7-9ed6-11e5-8f5c-002590263bf5 redmine -- information leak vulnerability
49e8f2ee-8147-11de-a994-0030843d3802 mozilla -- multiple vulnerabilities
49ef501c-62b6-11ef-bba5-2cf05da270f3 Gitlab -- vulnerabilities
4a026b6c-f2b8-11ee-8e76-a8a1599412c6 chromium -- multiple security fixes
4a088d67-3af2-11e7-9d75-c86000169601 freetype2 -- buffer overflows
4a08a4fb-f152-11ed-9c88-001b217b3468 Gitlab -- Vulnerability
4a0b334d-8d8d-11d9-afa0-003048705d5a phpbb -- Insuffient check against HTML code in usercp_register.php
4a0d9b53-395d-11e6-b3c8-14dae9d210b8 libarchive -- multiple vulnerabilities
4a10902f-8a48-11ea-8668-e0d55e2a8bf9 vlc -- Multiple vulnerabilities fixed in VLC media player
4a114331-0d24-11e4-8dd2-5453ed2e2b49 kdelibs4 -- KMail/KIO POP3 SSL Man-in-the-middle Flaw
4a1ca8a4-bd82-11e2-b7a0-d43d7e0c7c02 mozilla -- multiple vulnerabilities
4a1e2bad-0836-11ef-9fd2-1c697a616631 R -- arbitrary code execution vulnerability
4a21ce2c-bb13-11df-8e32-000f20797ede mozilla -- multiple vulnerabilities
4a338d17-412d-11dc-bdb0-0016179b2dd5 fsplib -- multiple vulnerabilities
4a3482da-3624-11e0-b995-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
4a4712ae-7299-11ee-85eb-84a93843eb75 OpenSSL -- potential loss of confidentiality
4a4e9f88-491c-11e4-ae2c-c80aa9043978 bash -- out-of-bounds memory access in parser
4a638895-41b7-11de-b1cc-00219b0fc4d8 mod_perl -- cross-site scripting
4a67450a-e044-11e7-accc-001999f8d30b asterisk -- Remote Crash Vulnerability in RTCP Stack
4a88e3ed-00d3-11e5-a072-d050996490d0 pcre -- multiple vulnerabilities
4a8a98ab-f745-11e1-8bd8-0022156e8794 moinmoin -- cross-site scripting via RST parser
4a99d61c-f23a-11dd-9f55-0030843d3802 perl -- Directory Permissions Race Condition
4aab7bcd-b294-11dc-a6f0-00a0cce0781e gallery2 -- multiple vulnerabilities
4aae54be-ba4d-11e6-ae1b-002590263bf5 xen-kernel -- x86 HVM: Overflow of sh_ctxt->seg_reg[]
4ab29e12-e787-11df-adfa-00e0815b8da8 Mailman -- cross-site scripting in web interface
4ab413ea-66ce-11e0-bf05-d445f3aa24f0 krb5 -- MITKRB5-SA-2011-002, KDC vulnerable to hang when using LDAP back end
4ade0c4d-7e83-11ee-9a8c-00155d01f201 libsndfile_project -- Integer overflow in dataend calculation
4ae135f7-85cd-4c32-ad94-358271b31f7f zeek -- potential denial of service issues
4ae68e7c-dda4-11e0-a906-00215c6a37bb roundcube -- XSS vulnerability
4aec9d58-ce7b-11d8-858d-000d610a3b12 Format string vulnerability in SSLtelnet
4af3241d-1f0c-11e9-b4bd-d43d7eed0ce2 www/mod_dav_svn -- Malicious SVN clients can crash mod_dav_svn.
4af92a40-db33-11e6-ae1b-002590263bf5 groovy -- remote execution of untrusted code/DoS vulnerability
4afacca1-eb9d-11d9-a8bd-000cf18bbe54 phpbb -- remote PHP code execution vulnerability
4b09378e-addb-11dd-a578-0030843d3802 vlc -- cue processing stack overflow
4b172278-3f46-11de-becb-001cc0377035 pango -- integer overflow
4b1ac5a3-5bd4-11ec-8602-589cfc007716 OpenSearch -- Log4Shell
4b228e69-22e1-4019-afd0-8aa716d0ec0b wireshark -- multiple security issues
4b3a7e70-afce-11e5-b864-14dae9d210b8 mono -- DoS and code execution
4b3a8e7d-9372-11ef-87ad-a8a15998b5cb hwloc2 -- Denial of service or other unspecified impacts
4b448a96-ff73-11e2-b28d-080027ef73ec PuTTY -- Four security holes in versions before 0.63
4b478274-47a0-11ec-bd24-6c3be5272acd Grafana -- XSS
4b60c3d9-8640-11ed-a762-482ae324f959 netdata -- multiple vulnerabilities with streaming
4b636f50-f011-11ed-bbae-6cc21735f730 postgresql-server -- Row security policies disregard user ID changes after inlining
4b673ae7-5f9a-11dc-84dd-000102cc8983 lighttpd -- FastCGI header overrun in mod_fastcgi
4b68d917-e705-11dd-afcd-00e0815b8da8 Teamspeak Server -- Directory Traversal Vulnerability
4b6cb45d-881e-447a-a4e0-c97a954ea758 bzip2 -- multiple issues
4b738d54-2427-11e2-9817-c8600054b392 RT -- Multiple Vulnerabilities
4b79538b-a450-11e2-9898-001060e06fd4 FreeBSD -- Multiple Denial of Service vulnerabilities with named(8)
4b7dbfab-4c6b-11e1-bc16-0023ae8e59f0 apache -- multiple vulnerabilities
4b7ed61f-7bbf-11ef-9369-2cf05da270f3 Gitlab -- vulnerabilities
4b8b748e-2a24-11e2-bb44-003067b2972c linux-flashplugin -- multiple vulnerabilities
4b9393b8-7c0c-11e5-a010-080027ddead3 xscreensaver - lock bypass
4b98613c-0078-11e9-b05b-00e04c1ea73d wordpress -- multiple issues
4b9c1c17-587c-11ed-856e-d4c9ef517024 MySQL -- Multiple vulnerabilities
4b9ca994-e3d9-11e6-813d-e8e0b747a45a chromium -- multiple vulnerabilities
4bae544d-06a3-4352-938c-b3bcbca89298 ffmpeg -- multiple vulnerabilities
4bb56d2f-a5b0-11ea-a860-08002728f74c nghttp2 -- DoS vulnerability
4bc66a81-89d2-4696-a04b-defd2eb77783 vscode -- VS Code Remote Code Execution Vulnerability
4bd33bc5-0cd6-11e0-bfa4-001676740879 tor -- remote crash and potential remote code execution
4bf57137-ba4d-11e6-ae1b-002590263bf5 xen-kernel -- use after free in FIFO event channel code
4bfcd857-c628-11da-b2fb-000e0c2e438a kaffeine -- buffer overflow vulnerability
4c005a5e-2541-4d95-80a0-00c76919aa66 fd_set -- bitmap index overflow in multiple applications
4c017345-1d89-11e0-bbee-0014a5e3cda6 MoinMoin -- cross-site scripting vulnerabilities
4c11b51e-cd8d-11e8-b0cb-a0f3c100ae18 Memory leak bug in Toxcore
4c1ac2dd-c788-11e1-be25-14dae9ebcf89 asterisk -- multiple vulnerabilities
4c26f668-0fd2-11ed-a83d-001b217b3468 Gitlab -- multiple vulnerabilities
4c52ec3c-86f3-11ea-b5b4-641c67a117d8 py-bleach -- regular expression denial-of-service
4c53f007-f2ed-11e1-a215-14dae9ebcf89 asterisk -- multiple vulnerabilities
4c69240f-f02c-11ea-838a-0011d823eebd Mbed TLS -- Local side channel attack on classical CBC decryption in (D)TLS
4c8c2218-b120-11ee-90ec-001b217b3468 Gitlab -- vulnerabilities
4c8d1d72-9b38-11e5-aece-d050996490d0 openssl -- multiple vulnerabilities
4c9159ea-d4c9-11eb-aeee-8c164582fbac Ansible -- Templating engine bug
4c96ecf2-5fd9-11e6-a6c3-14dae9d210b8 FreeBSD -- bsnmpd remote denial of service vulnerability
4ca26574-2a2c-11e2-99c7-00a0d181e71d tomcat -- Denial of Service
4ca5894c-f7f1-11ea-8ff8-0022489ad614 Node.js -- September 2020 Security Releases
4caf01e2-30e6-11e5-a4a5-002590263bf5 libidn -- out-of-bounds read issue with invalid UTF-8 input
4cb165f0-6e48-423e-8147-92255d35c0f7 NSS -- multiple vulnerabilities
4cb49a23-6c89-11e8-8b33-e8e0b747a45a chromium -- Incorrect handling of CSP header
4cb9c513-03ef-11dc-a51d-0019b95d4f14 png -- DoS crash vulnerability
4ccbd40d-03f7-11e0-bf50-001a926c7637 krb5 -- client impersonation vulnerability
4ccee784-a721-11e0-89b4-001ec9578670 BIND -- Remote DoS with certain RPZ configurations
4cd857d9-26d2-4417-b765-69701938f9e0 libraw -- denial of service and remote code execution
4cd9b19f-f66d-11e5-b94c-001999f8d30b Multiple vulnerabilities in Botan
4cdfe875-e8d6-11e1-bea0-002354ed89bc Wireshark -- Multiple vulnerabilities
4ce3c20b-124b-11de-a964-0030843d3802 phppgadmin -- directory traversal with register_globals enabled
4ce7c28a-11ac-11ea-b537-001b217b3468 Gitlab -- Multiple Vulnerabilities
4d087b35-0990-11e3-a9f4-bcaec565249c gstreamer-ffmpeg -- Multiple vulnerabilities in bundled libav
4d11d37e-9a8d-11ea-b9b8-641c67a117d8 Zabbix -- Remote code execution
4d1d2f6d-ec94-11e1-8bd8-0022156e8794 jabberd -- domain spoofing in server dialback protocol
4d2f9d09-ddb7-11e6-a9a5-b499baebfeaf mysql -- multiple vulnerabilities
4d3d4f64-f680-11e9-a87f-a4badb2f4699 FreeBSD -- IPv6 remote Denial-of-Service
4d49f4ba-071f-11d9-b45d-000c41e2cdad apache -- ap_resolve_env buffer overflow
4d4caee0-b939-11dd-a578-0030843d3802 streamripper -- multiple buffer overflows
4d6076fe-ee7a-11de-9cd0-001a926c7637 fuser -- missing user's privileges check
4d6b5ea9-bc64-4e77-a7ee-d62ba68a80dd chromium -- multiple vulnerabilities
4d763c65-9246-11ec-9aa3-4ccc6adda413 libmysoft -- Heap-based buffer overflow vulnerability
4d7cf654-ba4d-11e6-ae1b-002590263bf5 xen-kernel -- CR0.TS and CR0.EM not always honored for x86 HVM guests
4d837296-cc28-11d8-a54c-02e0185c0b53 GNATS local privilege elevation
4d87d357-202c-11e3-be06-000c29ee3065 FreeBSD -- Insufficient credential checks in network ioctl(2)
4da51989-5a8b-4eb9-b442-46d94ec0802d h2o -- Malformed HTTP/1.1 causes Out-of-Memory Denial of Service
4db1669c-8589-11db-ac4f-02e081235dab gnupg -- remotely controllable function pointer
4db8a0f4-27e9-11e5-a4a5-002590263bf5 xen-tools -- PCI MSI mask bits inadvertently exposed to guests
4dd575b8-8f82-11e3-bb11-0025905a4771 phpmyfaq -- multiple vulnerabilities
4ddc78dc-300a-11e1-a2aa-0016ce01e285 krb5-appl -- telnetd code execution vulnerability
4dfafa16-24ba-11e6-bd31-3065ec8fd3ec chromium -- multiple vulnerabilities
4e07d94f-75a5-11e8-85d1-a4badb2f4699 FreeBSD -- Lazy FPU State Restore Information Disclosure
4e1997e8-5de0-11e9-b95c-b499baebfeaf MySQL -- multiple vulnerabilities
4e1f4abc-6837-11e3-9cda-3c970e169bc2 cURL library -- cert name check ignore with GnuTLS
4e210d72-1c5c-11da-92ce-0048543d60ce squid -- Denial Of Service Vulnerability in sslConnectTimeout
4e23644c-cb93-4f83-9e20-5bc07ad9b39f mod_pagespeed -- critical cross-site scripting (XSS) vulnerability
4e306850-811f-11de-8a67-000c29a67389 silc-client -- Format string vulnerability
4e3e8a50-65c1-11e5-948e-bcaec565249c flash -- multiple vulnerabilities
4e3fa78b-1577-11ea-b66e-080027bdabe8 Django -- multiple vulnerabilities
4e45c45b-629e-11ee-8290-a8a1599412c6 chromium -- type confusion in v8
4e4bd2c2-6bd5-11d9-9e1e-c296ac722cb3 squid -- HTTP response splitting cache pollution attack
4e536c14-9791-11e4-977d-d050992ecde8 OpenSSL -- multiple vulnerabilities
4e60d660-6298-11ed-9ca2-6c3be5272acd Grafana -- Plugin signature bypass
4e6875a2-a126-11ea-b385-08002728f74c kaminari -- potential XSS vulnerability
4e8344a3-ca52-11de-8ee8-00215c6a37bb gd -- '_gdGetColors' remote buffer overflow vulnerability
4e95eb4e-b737-11e3-87cd-f0def10dca57 Icinga -- buffer overflow in classic web interface
4e9e410b-d462-11e2-8d57-080027019be0 dbus -- local dos
4ea1082a-1259-11ec-b4fa-dd5a552bdd17 go -- archive/zip: overflow in preallocation check can cause OOM panic
4ea507d1-9da8-11e9-a759-001b217b3468 Gitlab -- Multiple Vulnerabilities
4eae4f46-b5ce-11e5-8a2b-d050996490d0 ntp -- denial of service vulnerability
4eb5dccb-923c-4f18-9cd4-b53f9e28d4d7 py-Scrapy -- DoS vulnerability
4ebaa983-3299-11ed-95f8-901b0e9408dc dendrite -- Signature checks not applied to some retrieved missing events
4ebdd56b-fe72-11ee-bc57-00e081b7aa2d jenkins -- Terrapin SSH vulnerability in Jenkins CLI client
4ed0e43c-5cef-11eb-bafd-3065ec8fd3ec chromium -- multiple vulnerabilities
4edaa9f4-6b51-11ef-9a62-002590c1f29c FreeBSD -- bhyve(8) privileged guest escape via USB controller
4edbea45-cb0c-11ee-86bb-a8a1599412c6 chromium -- security fix
4ee322e9-e363-11ed-b934-b42e991fc52e jellyfin -- Multiple vulnerabilities
4ee7fa77-19a6-11ee-8a05-080027eda32c Django -- multiple vulnerabilities
4eeb93bf-f204-11ec-8fbd-d4c9ef517024 OpenSSL -- Command injection vulnerability
4f00dac0-1e18-4481-95af-7aaad63fd303 mozilla -- multiple vulnerabilities
4f15ca7b-23ae-11eb-9f59-1c1b0d9ea7e6 Apache OpenOffice -- Unrestricted actions leads to arbitrary code execution in crafted documents
4f254817-6318-11ee-b2ff-080027de9982 Django -- multiple vulnerabilities
4f370c80-79ce-11ee-be8e-589cfc0f81b0 phpmyfaq -- multiple vulnerabilities
4f6c4c07-3179-11ef-9da5-1c697a616631 emacs -- Arbitrary shell code evaluation vulnerability
4f7c6af3-6a2c-4ead-8453-04e509688d45 salt -- multiple vulnerabilities
4f838b74-50a1-11de-b01f-001c2514716c dokuwiki -- Local File Inclusion with register_globals on
4f8665d0-0465-11e9-b77a-6cc21735f730 shibboleth-sp -- crashes on malformed date/time content
4f8ffb9c-f388-4fbd-b90f-b3131559d888 xorg-server -- multiple vulnerabilities
4f99e2ef-f725-11e1-8bd8-0022156e8794 moinmoin -- wrong processing of group membership
4faac805-6be0-11e9-a685-001b217b3468 Gitlab -- Information Disclosure
4fb43b2f-46a9-11dd-9d38-00163e000016 FreeType 2 -- Multiple Vulnerabilities
4fb45a1c-c5d0-11e2-8400-001b216147b0 couchdb -- DOM based Cross-Site Scripting via Futon UI
4fb5d2cd-4c77-11df-83fb-0015587e2cc1 png -- libpng decompression denial of service
4fba07ca-13aa-11eb-b31e-d4c9ef517024 MySQL -- Multiple vulnerabilities
4fc2df49-6279-11e7-be0f-6cf0497db129 drupal -- Drupal Core - Multiple Vulnerabilities
4fce9635-28c0-11ec-9ba8-002324b2fba8 go -- misc/wasm, cmd/link: do not let command line arguments overwrite global data
4fd7a2fc-5860-11ee-a1b3-dca632daf43b graphics/webp heap buffer overflow
4ffb633c-0a3b-11e7-a9f2-0011d823eebd Flash Player -- multiple vulnerabilities
4ffcccae-e924-11ed-9c88-001b217b3468 Gitlab -- Multiple Vulnerabilities
50127e44-7b88-4ade-8e12-5d57320823f1 salt -- multiple vulnerabilities
501ee07a-5640-11e0-985a-001b2134ef46 linux-flashplugin -- remote code execution vulnerability
50210bc1-54ef-11e8-95d9-9c5c8e75236a wavpack -- multiple vulnerabilities
5023f559-27e2-11e5-a4a5-002590263bf5 xen-kernel -- Information leak via internal x86 system device emulation
50259d8b-243e-11eb-8bae-b42e99975750 salt -- multiple vulnerabilities
5027b62e-f680-11e9-a87f-a4badb2f4699 FreeBSD -- kernel memory disclosure from /dev/midistat
5028c1ae-1890-11ed-9b22-002590c1f29c FreeBSD -- Out of bound read in elf_note_prpsinfo()
502ba001-7ffa-11eb-911c-0800278d94f0 gitea -- multiple vulnerabilities
502c9f72-99b3-11ee-86bb-a8a1599412c6 chromium -- multiple security fixes
5033e2fc-98ec-4ef5-8e0b-87cfbbc73081 php-gd and gd -- Buffer over-read into uninitialized memory
50383bde-b25b-11de-8c83-02e0185f8d72 FreeBSD -- Devfs / VFS NULL pointer race condition
50394bc9-c5fa-11e5-96a5-d93b343d1ff7 prosody -- user impersonation vulnerability
5039ae61-2c9f-11db-8401-000ae42e9b93 globus -- Multiple tmpfile races
5044bd23-08cb-11e8-b08f-00012e582166 palemoon -- multiple vulnerabilities
50457509-d05e-11d9-9aed-000e0c2e438a phpSysInfo -- cross site scripting vulnerability
5048ed45-b0f1-11ed-ab04-9106b1b896dd gitea -- password hash quality
5053420c-4935-11df-83fb-0015587e2cc1 mahara -- sql injection vulnerability
505904d3-ea95-11e4-beaf-bcaec565249c wordpress -- multiple vulnerabilities
50744596-368f-11d9-a9e7-0001020eed82 proxytunnel -- format string vulnerability
50751310-a763-11e6-a881-b499baebfeaf openssl -- multiple vulnerabilities
50776801-4183-11e7-b291-b499baebfeaf ImageMagick -- multiple vulnerabilities
508da89c-78b9-11ed-854f-5404a68ad561 traefik -- multiple vulnerabilities
50a1bbc9-fb80-11e9-9e70-005056a311d1 samba -- multiple vulnerabilities
50ac2e96-ba4d-11e6-ae1b-002590263bf5 xen-kernel -- x86 null segments not always treated as unusable
50ad9a9a-1e28-11e9-98d7-0050562a4d7b www/py-requests -- Information disclosure vulnerability
50d233d9-374b-46ce-922d-4e6b3f777bef poppler -- Poppler Multiple Vulnerabilities
50e59056-87f2-11eb-b6a2-001b217b3468 Gitlab -- Multiple vulnerabilities
50ec3a01-ad77-11eb-8528-8c164582fbac Ansible -- Insecure Temporary File
510b630e-c43b-11e0-916c-00e0815b8da8 isc-dhcp-server -- server halt upon processing certain packets
5114cd11-6571-11e5-9909-002590263bf5 codeigniter -- SQL injection vulnerability
512c0ffd-cd39-4da4-b2dc-81ff4ba8e238 mozilla -- multiple vulnerabilities
512d1301-49b9-11e4-ae2c-c80aa9043978 bash -- remote code execution
51358314-bec8-11e5-82cd-bcaec524bf84 claws-mail -- no bounds checking on the output buffer in conv_jistoeuc, conv_euctojis, conv_sjistoeuc
5140dc69-b65e-11e1-9425-001b21614864 ImageMagick -- multiple vulnerabilities
51436b4c-1250-11dd-bab7-0016179b2dd5 postgresql -- multiple vulnerabilities
51496cbc-7a0e-11ec-a323-3065ec8fd3ec chromium -- multiple vulnerabilities
51498ee4-39a1-11ef-b609-002590c1f29c Request Tracker -- information exposure vulnerability
515b4327-cf8a-11e5-96d6-14dae9d210b8 dnscrypt-proxy -- code execution
515df85a-5cd7-11ec-a16d-001517a2e1a4 bastillion -- log4j vulnerability
5179d85c-8683-11de-91b9-0022157515b2 fetchmail -- improper SSL certificate subject verification
518a119c-a864-11eb-8ddb-001b217b3468 Gitlab -- Vulnerabilities
5192e7ca-7d4f-11d9-a9e7-0001020eed82 mod_python -- information leakage vulnerability
5198ef84-4fdc-11df-83fb-0015587e2cc1 cacti -- SQL injection and command execution vulnerabilities
51a59f36-3c58-11ee-b32e-080027f5fec9 clamav -- Possible denial of service vulnerability in the HFS+ file parser
51b51d4a-7c0f-11dc-9e47-0011d861d5e2 phpmyadmin -- cross-site scripting vulnerability
51d1282d-420e-11e7-82c5-14dae9d210b8 FreeBSD -- ipfilter(4) fragment handling panic
51d1d428-42f0-11de-ad22-000e35248ad7 libxine -- multiple vulnerabilities
521ce804-52fd-11e8-9123-a4badb2f4699 FreeBSD -- Mishandling of x86 debug exceptions
52311651-f100-4720-8c62-0887dad6d321 py-tensorflow -- unchecked argument causing crash
5237f5d7-c020-11e5-b397-d050996490d0 ntp -- multiple vulnerabilities
5238ac45-9d8c-11db-858b-0060084a00e5 fetchmail -- TLS enforcement problem/MITM attack/password exposure
523bb0b7-ba4d-11e6-ae1b-002590263bf5 xen-kernel -- x86 task switch to VM86 mode mis-handled
523fad14-eb9d-11d9-a8bd-000cf18bbe54 pear-XML_RPC -- arbitrary remote code execution
524bd03a-bb75-11eb-bf35-080027f515ea libxml2 -- Possible denial of service
526d9642-3ae7-11e9-a669-8c164582fbac slixmpp -- improper access control
52ba7713-9d42-11da-8c1d-000e0c2e438a pf -- IP fragment handling panic
52bbc7e8-f13c-11e3-bc09-bcaec565249c dbus -- local DoS
52bd2d59-4ab5-4bef-a599-7aac4e92238b vault -- unauthenticated license read
52f10525-caff-11e7-b590-6451062f0f7a Flash Player -- multiple vulnerabilities
52f4b48b-4ac3-11e7-99aa-e8e0b747a45a chromium -- multiple vulnerabilities
5300711b-4e61-11e5-9ad8-14dae9d210b8 graphviz -- format string vulnerability
531aae08-97f0-11e7-aadd-6451062f0f7a Flash Player -- multiple vulnerabilities
53252879-cf11-11e5-805c-5453ed2e2b49 py-pillow -- Buffer overflow in TIFF decoding code
533d20e7-f71f-11df-9ae1-000bcdf0a03b proftpd -- remote code execution vulnerability
5360a659-131c-11d9-bc4a-000c41e2cdad mozilla -- hostname spoofing bug
53802164-3f7e-11dd-90ea-0019666436c2 ruby -- multiple integer and buffer overflow vulnerabilities
53a0ddef-0208-11e2-8afa-0024e830109b dns/bind9* -- Several vulnerabilities
53b3474c-f680-11e9-a87f-a4badb2f4699 FreeBSD -- Reference count overflow in mqueue filesystem 32-bit compat
53bde960-356b-11e0-8e81-0022190034c0 mupdf -- Remote System Access
53caf29b-9180-11ed-acbe-b42e991fc52e cassandra3 -- multiple vulnerabilities
53dbd096-ba4d-11e6-ae1b-002590263bf5 xen-kernel -- x86 segment base write emulation lacking canonical address checks
53e531a7-e559-11e0-b481-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
53e711ed-8972-11d9-9ff8-00306e01dda2 phpbb -- privilege elevation and path disclosure
53e9efa1-4be7-11eb-8558-3085a9a47796 InspIRCd websocket module double free vulnerability
53eb9e1e-7014-11e8-8b1f-3065ec8fd3ec password-store -- GPG parsing vulnerabilities
53fbffe6-ebf7-11eb-aef1-0897988a1c07 asterisk -- pjproject/pjsip: crash when SSL socket destroyed during handshake
54006796-cf7b-11ed-a5d5-001b217b3468 Gitlab -- Multiple Vulnerabilities
54075861-a95a-11e5-8b40-20cf30e32f6d Bugzilla security issues
54075e39-04ac-11e1-a94e-bcaec565249c freetype -- Some type 1 fonts handling vulnerabilities
5415f1b3-f33d-11e1-8bd8-0022156e8794 wireshark -- denial of service in DRDA dissector
541696ed-8d12-11ed-af80-ecf4bbc0bda0 devel/viewvc-devel is vulnerable to cross-site scripting
5418b360-29cc-11ed-a6d4-6805ca2fa271 powerdns-recursor -- denial of service
54237182-9635-4a8b-92d7-33bfaeed84cd ruby-gems -- Algorithmic Complexity Vulnerability
5436f9a2-2190-11ec-a90b-0cc47a49470e ha -- Directory traversals
543b5939-2067-11e5-a4a5-002590263bf5 turnserver -- SQL injection vulnerability
546d4dd4-10ea-11e9-b407-080027ef1a23 chromium -- multiple vulnerabilities
546deeea-3fc6-11e6-a671-60a44ce6887b SQLite3 -- Tempdir Selection Vulnerability
547fbd98-8b1f-11e5-b48b-bcaec565249c flash -- multiple vulnerabilities
5486669e-ea9f-11de-bd9c-00215c6a37bb tptest -- pwd Remote Stack Buffer Overflow
548a4163-6821-11ee-b06f-0050569ceb3a GLPI vulnerable to SQL injection through Computer Virtual Machine information
548f74bd-993c-11e5-956b-00262d5ed8ee chromium -- multiple vulnerabilities
54976998-f248-11e8-81e2-005056a311d1 samba -- multiple vulnerabilities
549787c1-8916-11e2-8549-68b599b52a02 libpurple -- multiple vulnerabilities
549a2771-49cc-11e4-ae2c-c80aa9043978 jenkins -- remote execution, privilege escalation, XSS, password exposure, ACL hole, DoS
54a69cf7-b2ef-11e4-b1f1-bcaec565249c xorg-server -- Information leak in the XkbSetGeometry request of X servers.
54e50cd9-c1a8-11e6-ae1b-002590263bf5 wordpress -- multiple vulnerabilities
54e5573a-6834-11ee-b06f-0050569ceb3a Phishing through a login page malicious URL in GLPI
54f72962-c7ba-11dd-a721-0030843d3802 phpmyadmin -- cross-site request forgery vulnerability
55041d37-ff62-11d9-a9a5-000ae4641456 jabberd -- 3 buffer overflows
553224e7-4325-11d9-a3d5-000c6e8f12ef jabberd -- remote buffer overflow vulnerability
55363e65-0e71-11e5-8027-00167671dd1d strongswan -- Denial-of-service and potential remote code execution vulnerability
5536c8e4-36b3-11e2-a633-902b343deec9 FreeBSD -- Linux compatibility layer input validation error
5536ea5f-6814-11e9-a8f7-0050562a4d7b buildbot -- CRLF injection in Buildbot login and logout redirect code
553ec4ed-38d6-11e0-94b1-000c29ba66d2 tomcat -- Cross-site scripting vulnerability
5555120d-ba4d-11e6-ae1b-002590263bf5 xen-kernel -- guest 32-bit ELF symbol table load leaking host data
55571619-454e-4769-b1e5-28354659e152 bro -- invalid memory access or heap buffer over-read
55587adb-b49d-11e1-8df1-0004aca374af mantis -- multiple vulnerabilities
5558dded-a870-4fbe-8b0a-ba198db47007 electron{25,26} -- multiple vulnerabilities
555ac165-2bee-11dd-bbdc-00e0815b8da8 spamdyke -- open relay
555af074-22b9-11e8-9799-54ee754af08e chromium -- vulnerability
555b244e-6b20-4546-851f-d8eb7d6c1ffa mozilla -- multiple vulnerabilities
555cd806-b031-11e7-a369-14dae9d59f67 Multiple exploitable heap-based buffer overflow vulnerabilities exists in FreeXL 1.0.3
55616fda-a2d0-11dd-a9f9-0030843d3802 openx -- sql injection vulnerability
556d2286-5a51-11e6-a6c3-14dae9d210b8 gd -- multiple vulnerabilities
556fdf03-6785-11ed-953b-002b67dfc673 Tomcat -- Request Smuggling
559e00b7-6a4d-11e2-b6b0-10bf48230856 wordpress -- multiple vulnerabilities
559f3d1b-cb1d-11e5-80a4-001999f8d30b asterisk -- Multiple vulnerabilities
55a528e8-9787-11e0-b24a-001b2134ef46 linux-flashplugin -- remote code execution vulnerability
55b498e2-e56c-11e1-bbd5-001c25e46b1d Several vulnerabilities found in IcedTea-Web
55c4233e-1844-11e8-a712-0025908740c2 tomcat -- Security constraints ignored or applied too late
55c43f5b-5190-11e5-9ad8-14dae9d210b8 powerdns -- denial of service
55cff5d2-e95c-11ec-ae20-001999f8d30b XFCE -- Allows executing malicious .desktop files pointing to remote code
55d4a92f-c75f-43e8-ab1f-4a0efc9795c4 electron29 -- multiple vulnerabilities
55facdb0-2c24-11eb-9aac-08002734b9ed gitea -- multiple vulnerabilities
562a3fdf-16d6-11d9-bc4a-000c41e2cdad php -- vulnerability in RFC 1867 file upload processing
562cf6c4-b9f1-11dc-a302-000102cc8983 linux-flashplugin -- multiple vulnerabilities
5631ae98-be9e-11e3-b5e3-c80aa9043978 OpenSSL -- Remote Information Disclosure
56562efb-d5e4-11e5-b2bd-002590263bf5 squid -- SSL/TLS processing remote DoS
56665ccb-8723-11e5-9b13-14dae9d210b8 powerdns -- Denial of Service
5666688f-803b-4cf0-9cb1-08c088f2225a chromium -- multiple vulnerabilities
56778a31-c2a1-11e9-9051-4c72b94353b5 nsd -- Stack-based Buffer Overflow
5678da43-ea99-11db-a802-000fea2763ce lighttpd -- DOS when access files with mtime 0
567beb1e-7e0a-11e4-b9cc-bcaec565249c freetype -- Out of bounds stack-based read/write
56971fa6-641c-11d9-a097-000854d03344 xshisen -- local buffer overflows
56abf87b-96ad-11eb-a218-001b217b3468 Gitlab -- Multiple vulnerabilities
56ba4513-a1be-11eb-9072-d4c9ef517024 MySQL -- Multiple vulnerabilities
56ba8728-f987-11de-b28d-00215c6a37bb PEAR -- Net_Ping and Net_Traceroute remote arbitrary command injection
56cfe192-329f-11df-abb2-000f20797ede mozilla -- multiple vulnerabilities
56d76414-6b50-11ef-9a62-002590c1f29c FreeBSD -- bhyve(8) privileged guest escape via TPM device passthrough
56f0f11e-ba4d-11e6-ae1b-002590263bf5 xen-kernel -- x86 64-bit bit test instruction emulation broken
56f4b3a6-c82c-11e0-a498-00215c6a37bb Samba -- cross site scripting and request forgery vulnerabilities
57027417-ab7f-11eb-9596-080027f515ea RDoc -- command injection vulnerability
570706ff-7ee0-11ea-bd0b-001b217b3468 Gitlab -- Multiple Vulnerabilities
5709d244-4873-11e3-8a46-000d601460a4 OpenSSH -- Memory corruption in sshd
5713bfda-e27d-11e4-b2ce-5453ed2e2b49 qt4-imageformats, qt4-gui, qt5-gui -- Multiple Vulnerabilities in Qt Image Format Handling
5721ae65-b30a-11e9-a87f-a4badb2f4699 FreeBSD -- pts(4) write-after-free
5729b8ed-5d75-11d8-80e3-0020ed76ef5a rsync buffer overflow in server mode
57325ecf-facc-11e4-968f-b888e347c638 dcraw -- integer overflow condition
574028b4-a181-455b-a78b-ec5c62781235 electron29 -- multiple vulnerabilities
574f7bc9-a141-11ef-84e9-901b0e9408dc Matrix clients -- mxc uri validation in js sdk
5752a0df-60c5-4876-a872-f12f9a02fa05 gallery -- cross-site scripting
57561cfc-f24b-11ee-9730-001fc69cd6dc xorg server -- Multiple vulnerabilities
57573136-920e-11e0-bdc9-001b2134ef46 linux-flashplugin -- cross-site scripting vulnerability
57580fcc-1a61-11e8-97e0-00e04c1ea73d drupal -- Drupal Core - Multiple Vulnerabilities
57600032-34fe-11e7-8965-bcaec524bf84 libetpan -- null dereference vulnerability in MIME parsing component
5764c634-10d2-11e6-94fa-002590263bf5 php -- multiple vulnerabilities
57652765-18aa-11e2-8382-00a0d181e71d xlockmore -- local exploit
576aa394-1d85-11ec-8b7d-4f5b624574e2 webkit2-gtk3 -- multiple vulnerabilities
5776cc4f-5717-11ef-b611-84a93843eb75 Roundcube -- Multiple vulnerabilities
5786185a-9a43-11e8-b34b-6cc21735f730 xml-security-c -- crashes on malformed KeyInfo content
5789a92e-5d7f-11d8-80e3-0020ed76ef5a pine remotely exploitable buffer overflow in newmail.c
578f6322-c450-11dd-a721-0030843d3802 habari -- Cross-Site Scripting Vulnerability
5796858d-db0b-11dd-aa56-000bcdf0a03b FreeBSD -- arc4random(9) predictable sequence vulnerability
5797c807-4279-11ea-b184-f8b156ac3ff9 FreeBSD -- Missing IPsec anti-replay window check
579c7489-c23d-454a-b0fc-ed9d80ea46e0 electron22 -- multiple vulnerabilities
57a0242d-8c4e-11da-8ddf-000ae42e9b93 sge -- local root exploit in bundled rsh executable
57a700f9-12c0-11e2-9f86-001d923933b6 dns/bind9* -- crash on deliberately constructed combination of records
57ae52f7-b9cc-11db-bf0f-0013720b182d samba -- format string bug in afsacl.so VFS plugin
57aec168-453e-11e8-8777-b499baebfeaf MySQL -- multiple vulnerabilities
57b1ee25-1a7c-11ec-9376-0800272221cc libssh -- possible heap-buffer overflow vulnerability
57b3aba7-1e25-11e6-8dd3-002590263bf5 expat -- denial of service vulnerability on malformed input
57bb5e3d-3c4f-11e5-a4d4-001e8c75030d subversion -- multiple vulnerabilities
57c1c2ee-7914-11ea-90bf-0800276545c1 Squid -- multiple vulnerabilities
57c705d6-12ae-11dd-bab7-0016179b2dd5 png -- unknown chunk processing uninitialized memory access
57df803e-af34-11e2-8d62-6cf0490a8c18 Joomla! -- XXS and DDoS vulnerabilities
57f1a624-6197-11e1-b98c-bcaec565249c libxml2 -- heap buffer overflow
57facd35-ddf6-11e6-915d-001b3856973b icoutils -- check_offset overflow on 64-bit systems
58033a95-bba8-11e4-88ae-d050992ecde8 bind -- denial of service vulnerability
5804b9d4-a959-11e4-9363-20cf30e32f6d apache24 -- several vulnerabilities
580cc46b-bb1e-11e3-b144-2c4138874f7d LibYAML input sanitization errors
58247a96-01c8-11da-bc08-0001020eed82 phpmyadmin -- cross site scripting vulnerability
58253655-d82c-11e1-907c-20cf30e32f6d bugzilla -- multiple vulnerabilities
584c506d-0e98-11e0-b59b-0050569b2d21 redmine -- multiple vulnerabilities
58528a94-5100-4208-a04d-edc01598cf01 strongswan - denial-of-service vulnerability in the gmp plugin/denial-of-service vulnerability in the in-memory certificate cache
58685e23-ba4d-11e6-ae1b-002590263bf5 xen-tools -- qemu incautious about shared ring processing
58750d49-7302-11ef-8c95-195d300202b3 OpenSSH -- Pre-authentication async signal safety issue
587ed8ac-5957-11ef-854a-001e676bf734 OpenHAB CometVisu addon -- Multiple vulnerabilities
58997463-e012-11dd-a765-0030843d3802 verlihub -- insecure temporary file usage and arbitrary command execution
589d8053-0b03-11dd-b4ef-00e07dc4ec84 clamav -- Multiple Vulnerabilities
589de937-343f-11ef-8a7b-001b217b3468 Gitlab -- Vulnerabilities
58a3c266-db01-11dd-ae30-001cc0377035 php5-gd -- uninitialized memory information disclosure vulnerability
58a738d4-57af-11ee-8c58-b42e991fc52e libwebp heap buffer overflow
58b22f3a-bc71-11eb-b9c9-6cc21735f730 PG Partition Manager -- arbitrary code execution
58c15292-7b61-11e2-95da-001e8c1a8a0e nss-pam-ldapd -- file descriptor buffer overflow
58d6ed66-c2e8-11eb-9fb0-6451062f0f7a libX11 -- Arbitrary code execution
58fafead-cd13-472f-a9bd-d0173ba1b04c libofx -- exploitable buffer overflow
58fc2752-5f74-11d9-a9e7-0001020eed82 pcal -- buffer overflow vulnerabilities
5914705c-ab03-11e9-a4f9-080027ac955c PuTTY 0.72 -- buffer overflow in SSH-1 and integer overflow in SSH client
591a706b-5cdc-11ea-9a0a-206a8a720317 ntp -- Multiple vulnerabilities
592815da-9eed-11da-b410-000e0c2e438a mantis -- "view_filters_page.php" cross site scripting vulnerability
594ad3c5-a39b-11da-926c-0800209adf0e SSH.COM SFTP server -- format string vulnerability
594eb447-e398-11d9-a8bd-000cf18bbe54 ruby -- arbitrary command execution on XMLRPC server
5951fb49-1ba2-11e5-b43d-002590263bf5 elasticsearch -- cross site scripting vulnerability in the CORS functionality
597d02ce-a66c-11ea-af32-080027846a02 Django -- multiple vulnerabilities
597e2bee-68ea-11d9-a9e7-0001020eed82 ImageMagick -- PSD handler heap overflow vulnerability
5999fc39-72d0-4b99-851c-ade7ff7125c3 electron25 -- multiple vulnerabilities
59a0af97-dbd4-11e5-8fa8-14dae9d210b8 drupal -- multiple vulnerabilities
59a43a73-3786-11ee-94b4-6cc21735f730 postgresql-server -- MERGE fails to enforce UPDATE or SELECT row security policies
59ab72fb-bccf-11eb-a38d-6805ca1caf5c Prometheus -- arbitrary redirects
59ada6e5-676a-11da-99f6-00123ffe8333 phpmyadmin -- XSS vulnerabilities
59b68b1e-9c78-11e1-b5e0-000c299b62e1 php -- multiple vulnerabilities
59c284f4-8d2e-11ed-9ce0-b42e991fc52e net-mgmt/cacti is vulnerable to remote command injection
59c5f255-b309-11e9-a87f-a4badb2f4699 FreeBSD -- ICMP/ICMP6 packet filter bypass in pf
59e7163c-cf84-11e2-907b-0025905a4770 php5 -- Heap based buffer overflow in quoted_printable_encode
59e72db2-cae6-11e3-8420-00e0814cab4e django -- multiple vulnerabilities
59e7af2d-8db7-11de-883b-001e3300a30d pidgin -- MSN overflow parsing SLP messages
59e7eb28-b309-11e5-af83-80ee73b5dcf5 kea -- unexpected termination while handling a malformed packet
59f79c99-ba4d-11e6-ae1b-002590263bf5 xen-tools -- delimiter injection vulnerabilities in pygrub
59fabdf2-9549-11ea-9448-08002728f74c typo3 -- multiple vulnerabilities
5a016dd0-8aa8-490e-a596-55f4cc17e4ef rails -- multiple vulnerabilities
5a021595-fba9-11dd-86f3-0030843d3802 pycrypto -- ARC2 module buffer overflow
5a1589ad-68f9-11e8-83f5-d8cb8abf62dd Libgit2 -- Fixing insufficient validation of submodule names
5a1c2e06-3fb7-11ed-a402-b42e991fc52e unbound -- Non-Responsive Delegation Attack
5a1d5d74-29a0-11e5-86ff-14dae9d210b8 php -- arbitrary code execution
5a1f1a86-8f4c-11e7-b5af-a4badb2f4699 gdk-pixbuf -- multiple vulnerabilities
5a35bc56-7027-11e4-a4a3-001999f8d30b yii -- Remote arbitrary PHP code execution
5a39a22e-5478-11db-8f1a-000a48049292 mono -- "System.CodeDom.Compiler" Insecure Temporary Creation
5a45649a-4777-11ea-bdec-08002728f74c Django -- potential SQL injection vulnerability
5a5422fd-7e1a-11d9-a9e7-0001020eed82 powerdns -- DoS vulnerability
5a668ab3-8d86-11eb-b8d6-d4c9ef517024 OpenSSL -- Multiple vulnerabilities
5a757a31-f98e-4bd4-8a85-f1c0f3409769 pango -- remote DoS vulnerability
5a771686-9e33-11e8-8b2d-9cf7a8059466 chicken -- multiple vulnerabilities
5a7d4110-0b7a-11e1-846b-00235409fd3e libxml -- Stack consumption vulnerability
5a945904-73b1-11db-91d2-0002a5c2f4ef unzoo -- Directory Traversal Vulnerability
5a97805e-93ef-4dcb-8d5e-dbcac263bfc2 libsndfile -- multiple vulnerabilities
5a9b3d70-48e2-4267-b196-83064cb14fe0 shotwell -- failure to encrypt authentication
5a9bbb6e-32d3-11e8-a769-6daaba161086 node.js -- multiple vulnerabilities
5aaa257e-772d-11e3-a65a-3c970e169bc2 openssl -- multiple vulnerabilities
5aaf534c-a069-11ec-acdc-14dae9d5a9d2 Teeworlds -- Buffer Overflow
5ab54ea0-fa94-11ec-996c-080027b24e86 mediawiki -- multiple vulnerabilities
5ab9fb2a-23a5-11e0-a835-0003ba02bf30 asterisk -- Exploitable Stack Buffer Overflow
5abfee2d-5d82-11d8-80e3-0020ed76ef5a pine remote denial-of-service attack
5ac53801-ec2e-11e3-9cf3-3c970e169bc2 OpenSSL -- multiple vulnerabilities
5acd95db-3b16-11eb-af2a-080027dbe4b7 glpi -- leakage issue with knowledge base
5ad3e437-e527-4514-b9ed-280b2ca1a8c9 openvpn -- multiple TCP clients connecting with the same certificate at the same time can crash the server
5aefc41e-d304-4ec8-8c82-824f84f08244 mozilla -- multiple vulnerabilities
5af511e5-e928-11e5-92ce-002590263bf5 php7 -- multiple vulnerabilities
5af6378b-bd88-4997-bccc-b9ba2daecdd2 kamailio - buffer overflow
5afcc9a4-7e04-11ee-8e38-002590c1f29c FreeBSD -- libc stdio buffer overflow
5afd64ae-122a-11ef-8eed-1c697a616631 Intel CPUs -- multiple vulnerabilities
5b0ae405-cdc7-11ed-bb39-901b0e9408dc Matrix clients -- Prototype pollution in matrix-js-sdk
5b1463dd-dab3-11e7-b5af-a4badb2f4699 FreeBSD -- POSIX shm allows jails to access global namespace
5b1631dc-eafd-11e6-9ac1-a4badb2f4699 freeimage -- code execution vulnerability
5b218581-9372-11e9-8fc4-5404a68ad561 vlc -- Double free in Matroska demuxer
5b2eac07-8b4d-11ed-8b23-a0f3c100ae18 rxvt-unicode is vulnerable to a remote code execution
5b397852-b1d0-11ea-a11c-4437e6ad11c4 IMAP fcc/postpone machine-in-the-middle attack
5b47b70d-8ba9-11db-81d5-00123ffe8333 dbus -- match_rule_equal() Weakness
5b47c279-8cb5-11dc-8878-0016179b2dd5 perl -- regular expressions unicode data buffer overflow
5b5cf6e5-5b51-11eb-95ac-7f9491278677 dnsmasq -- DNS cache poisoning, and DNSSEC buffer overflow, vulnerabilities
5b6bc863-89dc-11ea-af8b-00155d0a0200 ceph14 -- multiple security issues
5b72b1ff-877c-11eb-bd4f-2f1d57dafe46 dnsmasq -- cache poisoning vulnerability in certain configurations
5b74a5bc-348f-11e5-ba05-c80aa9043978 OpenSSH -- MaxAuthTries limit bypass via duplicates in KbdInteractiveDevices
5b8c6e1e-770f-11eb-b87a-901b0ef719ab FreeBSD -- Xen grant mapping error handling issues
5b8d8dee-6088-11ed-8c5e-641c67a117d8 varnish -- HTTP/2 Request Forgery Vulnerability
5b8f9a02-ec93-11d8-b913-000c41e2cdad gaim remotely exploitable vulnerabilities in MSN component
5bd6811f-1c75-11e3-ba72-98fc11cdc4f5 linux-flashplugin -- multiple vulnerabilities
5be19b0d-fb85-11ec-95cd-080027b24e86 Django -- multiple vulnerabilities
5bf1a715-cc57-440f-b0a5-6406961c54a7 squid -- denial-of-service vulnerabilities
5bf6ed6d-9002-4f43-ad63-458f59e45384 jenkins -- multiple vulnerabilities
5c288f68-c7ca-4c0d-b7dc-1ec6295200b3 chromium -- multiple vulnerabilities
5c34664f-2c2b-11e3-87c2-00215af774f0 xinetd -- ignores user and group directives for TCPMUX services
5c399624-2bef-11e5-86ff-14dae9d210b8 zenphoto -- multiple vulnerabilities
5c554c0f-c69a-11db-9f82-000e0c2e438a FreeBSD -- Kernel memory disclosure in firewire(4)
5c5f19ce-43af-11e1-89b4-001ec9578670 OpenSSL -- DTLS Denial of Service
5c6f7482-3ced-11e8-b157-6451062f0f7a Flash Player -- multiple vulnerabilities
5c7bb4dd-6a56-11d9-97ec-000c6e8f12ef konversation -- shell script command injection
5c9a2769-5ade-11db-a5ae-00508d6a62df google-earth -- heap overflow in the KML engine
5cb18881-7604-11e6-b362-001999f8d30b asterisk -- RTP Resource Exhaustion
5ccb1c14-e357-11dd-a765-0030843d3802 mplayer -- vulnerability in STR files processor
5ccbb2f8-c798-11e7-a633-009c02a2ab30 ffmpeg -- multiple vulnerabilities
5cfa9d0c-73d7-4642-af4f-28fbed9e9404 jenkins -- multiple vulnerabilities
5d1b1a0a-fd36-11ed-a0d1-84a93843eb75 MariaDB -- Nullpointer dereference
5d1d4473-b40d-11e5-9728-002590263bf5 xen-tools -- libxl leak of pv kernel and initrd on error
5d1e4f6a-ee4f-11ec-86c2-485b3931c969 Tor - Unspecified high severity vulnerability
5d280761-6bcf-11e5-9909-002590263bf5 mbedTLS/PolarSSL -- multiple vulnerabilities
5d36ef32-a9cf-11d8-9c6d-0020ed76ef5a subversion date parsing vulnerability
5d374b01-c3ee-11e0-8aa5-485d60cb5385 freetype2 -- execute arbitrary code or cause denial of service
5d374fbb-bae3-45db-afc0-795684ac7353 jenkins -- Path traversal vulnerability allows access to files outside plugin resources
5d425189-7a03-11d9-a9e7-0001020eed82 postgresql -- privilege escalation vulnerability
5d433534-f41c-402e-ade5-e0a2259a7cb6 curl -- cURL/libcURL Location: Redirect URLs Security Bypass
5d51d245-00ca-11da-bc08-0001020eed82 ethereal -- multiple protocol dissectors vulnerabilities
5d5e5cda-38e6-11eb-bbbf-001b217b3468 Gitlab -- Multiple vulnerabilities
5d5ed535-3653-11df-9edc-000f20797ede firefox -- WOFF heap corruption due to integer overflow
5d62950f-3bb5-11e7-93f7-d43d7e971a1b gitlab -- Various security issues
5d6a204f-c60b-11e5-bf36-6805ca0b3d42 phpmyadmin -- Multiple full path disclosure vulnerabilities
5d72701a-f601-11d9-bcd1-02061b08fc24 firefox & mozilla -- multiple vulnerabilities
5d7939f6-5989-11ef-9793-b42e991fc52e firefox -- multiple vulnerabilities
5d85976a-9011-11e1-b5e0-000c299b62e1 net-snmp -- Remote DoS
5d8c0876-2716-11e9-9446-b7f8544ce15c typo3 -- multiple vulnerabilities
5d8e56c3-9e67-4d5b-81c9-3a409dfd705f flash -- multiple vulnerabilities
5d8ef725-7228-11eb-8386-001999f8d30b asterisk -- Remote attacker could prematurely tear down SRTP calls
5d91370b-61fd-11eb-b87a-901b0ef719ab FreeBSD -- Xen guests can triger backend Out Of Memory
5d921a8c-3a43-11ef-b611-84a93843eb75 Apache httpd -- source code disclosure
5da8b1e6-0591-11ef-9e00-080027957747 GLPI -- multiple vulnerabilities
5dd39f26-ed68-11e5-92ce-002590263bf5 hadoop2 -- unauthorized disclosure of data vulnerability
5ddbe47b-1891-11ed-9b22-002590c1f29c FreeBSD -- AIO credential reference count leak
5def3175-f3f9-4476-ba40-b46627cc638c PHP5 -- Integer overflow in Calendar module
5df757ef-a564-11ec-85fa-a0369f7f7be0 wordpress -- multiple issues
5df8bd95-8290-11e7-93af-005056925db4 Zabbix -- Remote code execution
5e0a038a-ca30-416d-a2f5-38cbf5e7df33 mozilla -- multiple vulnerabilities
5e135178-8aeb-11e4-801f-0022156e8794 wordpress -- multiple vulnerabilities
5e1440c6-95af-11ec-b320-f8b156b6dcc8 flac -- fix encoder bug
5e257b0d-e466-11ed-834b-6c3be5272acd Grafana -- Exposure of sensitive information to an unauthorized actor
5e35cfba-9994-11e9-b07f-df5abf8b84d6 TYPO3 -- multiple vulnerabilities
5e439ee7-d3bd-11e6-ae1b-002590263bf5 codeigniter -- multiple vulnerabilities
5e4d7172-66b8-11ef-b104-b42e991fc52e firefox -- multiple vulnerabilities
5e647ca3-2aea-11e2-b745-001fd0af1a4c ruby -- Hash-flooding DoS vulnerability for ruby 1.9
5e7f58c3-b3f8-4258-aeb8-795e5e940ff8 mplayer heap overflow in http requests
5e92e8a2-5d7b-11d8-80e3-0020ed76ef5a icecast 1.x multiple vulnerabilities
5ebfe901-a3cb-11d9-b248-000854d03344 hashcash -- format string vulnerability
5ecfb588-d2f4-11ee-ad82-dbdfaa8acfc2 gitea -- Fix XSS vulnerabilities
5ed094a0-0150-11e7-ae1b-002590263bf5 ikiwiki -- multiple vulnerabilities
5ed2f96b-33b7-4863-8c6b-540d22344424 imap-uw -- University of Washington IMAP c-client Remote Format String Vulnerability
5ed7102e-6454-11e9-9a3a-001cc0382b2f Ghostscript -- Security bypass vulnerability
5ef12755-1c6c-11dd-851d-0016d325a0ed swfdec -- exposure of sensitive information
5ef14250-f47c-11eb-8f13-5b4de959822e Prosody -- Remote Information Disclosure
5efd7a93-2dfb-11e9-9549-e980e869c2e9 OpenJPEG -- integer overflow
5f003a08-ba3c-11d9-837d-000e0c2e438a sharutils -- unshar insecure temporary file creation
5f030587-e39a-11de-881e-001aa0166822 expat2 -- Parser crash with specially formatted UTF-8 sequences
5f0dd349-40a2-11ea-8d8c-005056a311d1 samba -- multiple vulnerabilities
5f276780-b6ce-11e5-9731-5453ed2e2b49 pygments -- shell injection vulnerability
5f29c2e4-9f6a-11d8-abbc-00e08110b673 exim buffer overflow when verify = header_syntax is used
5f2a0c40-1322-11db-bd23-000475abc56f zope -- information disclosure vulnerability
5f326d75-1db9-11e2-bc8f-d0df9acfd7e5 django -- multiple vulnerabilities
5f39d80f-107c-11eb-8b47-641c67a117d8 py-matrix-synapse -- XSS vulnerability
5f453b69-abab-4e76-b6e5-2ed0bafcaee3 firefox -- integer overflow in createImageBitmap()
5f52d646-c31f-11eb-8dcf-001b217b3468 Gitlab -- Multiple Vulnerabilities
5f608c68-276c-11ef-8caa-0897988a1c07 Composer -- Multiple command injections via malicious git/hg branch names
5f7ed6ea-70a7-11ed-92ce-3065ec8fd3ec chromium -- multiple vulnerabilities
5fa332b9-4269-11ee-8290-a8a1599412c6 chromium -- multiple vulnerabilities
5fa68bd9-95d9-11ed-811a-080027f5fec9 redis -- multiple vulnerabilities
5fa90ee6-bc9e-11eb-a287-e0d55e2a8bf9 texproc/expat2 -- billion laugh attack
5fde5c30-0f4e-11da-bc01-000e0c2e438a tor -- diffie-hellman handshake flaw
5fe7e27a-64cb-11d9-9e1e-c296ac722cb3 squid -- denial of service with forged WCCP messages
5fee3f02-de37-11e4-b7c3-001999f8d30b asterisk -- TLS Certificate Common name NULL byte exploit
5ff40cb4-8b92-11e2-bdb6-001060e06fd4 linux-flashplugin -- multiple vulnerabilities
6001cfc6-9f0f-4fae-9b4f-9b8fae001425 PowerDNS -- Insufficient validation in the HTTP remote backend
60129efe-656d-11e9-8e67-206a8a720317 FreeBSD -- EAP-pwd side-channel attack
6025d173-4279-11ea-b184-f8b156ac3ff9 FreeBSD -- kernel stack data disclosure
603fe0a1-bb26-11e6-8e5a-3065ec8fd3ec chromium -- multiple vulnerabilities
603fe36d-ec9d-11d8-b913-000c41e2cdad kdelibs insecure temporary file handling
6056bf68-f570-4e70-b740-b9f606971283 palemoon -- multiple vulnerabilities
60624f63-9180-11ed-acbe-b42e991fc52e cassandra3 -- arbitrary code execution
607d2108-a0e4-423a-bf78-846f2a8f01b0 puppet -- Multiple Vulnerabilities
607f4d44-0158-11e5-8fda-002590263bf5 cassandra -- remote execution of arbitrary code
607f8b57-7454-42c6-a88a-8706f327076d icu -- multiple vulnerabilities
608ed765-c700-11e3-848c-20cf30e32f6d bugzilla -- Cross-Site Request Forgery
6091d1d8-4347-11ef-a4d4-080027957747 GLPI -- multiple vulnerabilities
60931f98-55a7-11e7-8514-589cfc0654e1 Dropbear -- two vulnerabilities
609c790e-ce0a-11dd-a721-0030843d3802 drupal -- multiple vulnerabilities
60ab0e93-c60b-11e5-bf36-6805ca0b3d42 phpmyadmin -- Unsafe generation of XSRF/CSRF token
60bfa396-c702-11e3-848c-20cf30e32f6d bugzilla -- Social Engineering
60cb2055-b1b8-11e5-9728-002590263bf5 qemu -- denial of service vulnerability in USB EHCI emulation support
60d4d31a-a573-41bd-8c1e-5af7513c1ee9 zeek -- potential DoS vulnerabilities
60de13d5-95f0-11e1-806a-001143cd36d8 php -- vulnerability in certain CGI-based setups
60e1792b-c380-11dc-821a-000bcdc1757a geeklog xss vulnerability
60e26a40-3b25-11da-9484-00123ffe8333 openssl -- potential SSL 2.0 rollback
60e991ac-c013-11e9-b662-001cc0382b2f CUPS -- multiple vulnerabilities
60eb344e-6eb1-11e1-8ad7-00e0815b8da8 OpenSSL -- CMS and S/MIME Bleichenbacher attack
60f81af3-7690-11e1-9423-00235a5f2c9a raptor/raptor2 -- XXE in RDF/XML File Interpretation
60f8fe7b-3cfb-11da-baa2-0004614cc33d WebCalendar -- remote file inclusion vulnerability
610101ea-5b6a-11e6-b334-002590263bf5 wireshark -- multiple vulnerabilities
6107efb9-aae3-11da-aea1-000854d03344 gtar -- invalid headers buffer overflow
610bc692-a2ad-11dc-900c-000bcdc1757a GNU finger vulnerability
610de647-af8d-11e3-a25b-b4b52fce4ce8 mozilla -- multiple vulnerabilities
6111ecb8-b20d-11da-b2fb-000e0c2e438a nfs -- remote denial of service
6129fdc7-6462-456d-a3ef-8fc3fbf44d16 openvpn -- arbitrary code execution on client through malicious or compromised server
612a34ec-81dc-11da-a043-0002a5c3d308 clamav -- possible heap overflow in the UPX code
613193a0-c1b4-11e8-ae2d-54e1ad3d6335 spamassassin -- multiple vulnerabilities
61349f77-c620-11da-b2fb-000e0c2e438a thunderbird -- javascript execution
613e45d1-6154-11e3-9b62-000c292e4fd8 samba -- multiple vulnerabilities
61480a9a-22b2-11d9-814e-0001020eed82 cabextract -- insecure directory handling
61534682-b8f4-11da-8e62-000e0c33c2dc xorg-server -- privilege escalation
6167b341-250c-11e6-a6fb-003048f2e514 cacti -- multiple vulnerabilities
616cf823-f48b-11d8-9837-000c41e2cdad courier-imap -- format string vulnerability in debug mode
6171eb07-d8a9-11e5-b2bd-002590263bf5 libsrtp -- DoS via crafted RTP header vulnerability
617959ce-a5f6-11e1-a284-0023ae8e59f0 haproxy -- buffer overflow
617a4021-8bf0-11dc-bffa-0016179b2dd5 perdition -- str_vwrite format string vulnerability
618010ff-3044-11eb-8112-000c292ee6b8 nomad -- multiple vulnerabilities
6190c0cd-b945-11ea-9401-2dcf562daa69 PuTTY -- Release 0.74 fixes two security vulnerabilities
6192ae3d-9595-11d9-a9e0-0001020eed82 phpmyadmin -- increased privilege vulnerability
6193b3f6-548c-11eb-ba01-206a8a720317 sudo -- Potential information leak in sudoedit
619ef337-949a-11d9-b813-00d05964249f mysql-server -- multiple remote vulnerabilities
61b07d71-ce0e-11dd-a721-0030843d3802 mediawiki -- multiple vulnerabilities
61bc44ce-9f5a-11ea-aff3-f8b156c2bfe9 sympa - Security flaws in setuid wrappers
61bce714-ca0c-11ec-9cfc-10c37b4ac2ea go -- multiple vulnerabilities
61d89849-43cb-11eb-aba5-00a09858faf5 powerdns -- Various issues in GSS-TSIG support
61db9b88-d091-11e9-8d41-97657151f8c2 Exim -- RCE with root privileges in TLS SNI handler
61f416ff-aa00-11ec-b439-000d3a450398 tcpslice -- heap-based use-after-free in extract_slice()
61fe903b-bc2e-11ee-b06e-001b217b3468 Gitlab -- vulnerabilities
620685d6-0aa3-11ea-9673-4c72b94353b5 squid -- Vulnerable to HTTP Digest Authentication
620cf713-5a99-11e3-878d-20cf30e32f6d monitorix -- serious bug in the built-in HTTP server
62239968-2f2a-11d9-a9e7-0001020eed82 gd -- integer overflow
62287f51-d43d-11e4-879c-00e0814cab4e django -- multiple vulnerabilities
622b5c47-855b-11ea-a5e2-d4c9ef517024 MySQL Client -- Multiple vulerabilities
622bc638-be27-11dd-a578-0030843d3802 wordpress -- header rss feed script insertion vulnerability
622e14b1-b40c-11e2-8441-00e0814cab4e jenkins -- multiple vulnerabilities
6241b5df-42a1-11e5-93ad-002590263bf5 mediawiki -- multiple vulnerabilities
624b45c0-c7f3-11e6-ae1b-002590263bf5 Joomla! -- multiple vulnerabilities
624fe633-9006-11d9-a22c-0001020eed82 libexif -- buffer overflow vulnerability
62642942-590f-11eb-a0dc-8c164582fbac Ghostscript -- SAFER Sandbox Breakout
6294f75f-03f2-11e5-aab1-d050996490d0 cURL -- multiple vulnerabilities
62ab8707-b1bc-11e5-9728-002590263bf5 qemu -- denial of service vulnerability in Human Monitor Interface support
62b8f253-12d9-11dc-a35c-001485ab073e typo3 -- email header injection
62c0dbbd-bfce-11e5-b5fe-002590263bf5 cgit -- multiple vulnerabilities
62d45229-4fa0-11e6-9d13-206a8a720317 krb5 -- KDC denial of service vulnerability
62da9702-b4cc-11eb-b9c9-6cc21735f730 PostgreSQL server -- two security issues
62e0fbe5-5798-11de-bb78-001cc0377035 ruby -- BigDecimal denial of service vulnerability
62f2182c-5f7a-11ea-abb7-001b217b3468 Gitlab -- Multiple Vulnerabilities
62f36dfd-ff56-11e1-8821-001b2134ef46 vlc -- arbitrary code execution in Real RTSP and MMS support
630c8c08-880f-11e2-807f-d43d7e0c7c02 mozilla -- use-after-free in HTML Editor
6318b303-3507-11e4-b76c-0011d823eebd trafficserver -- unspecified vulnerability
631c4710-9be5-4a80-9310-eb2847fe24dd jenkins -- multiple vulnerabilities
631fc042-b636-11e5-83ef-14dae9d210b8 polkit -- multiple vulnerabilities
632c98be-aad2-4af2-849f-41a6862afd6a p5-Imager -- possibly exploitable buffer overflow
63347ee7-6841-11dc-82b6-02e0185f8d72 wordpress -- remote sql injection vulnerability
633716fa-1f8f-11dd-b143-0211d880e350 vorbis-tools -- Speex header processing vulnerability
63527d0d-b9de-11e4-8a48-206a8a720317 krb5 1.12 -- New release/fix multiple vulnerabilities
6355efdb-4d4d-11de-8811-0030843d3802 libsndfile -- multiple vulnerabilities
635bf5f4-26b7-11d9-9289-000c41e2cdad gaim -- malicious smiley themes
63bd4bad-dffe-11d9-b875-0001020eed82 gzip -- directory traversal and permission race vulnerabilities
63e36475-119f-11e9-aba7-080027fee39c gitea -- insufficient privilege check
63eb2b11-e802-11e7-a58c-6805ca0b3d42 phpMyAdmin -- XSRF/CSRF vulnerability
63fe4189-9f97-11da-ac32-0001020eed82 gnupg -- false positive signature verification
6410f91d-1214-4f92-b7e0-852e39e265f9 electron30 -- multiple vulnerabilities
641859e8-eca1-11d8-b913-000c41e2cdad Mutiple browser frame injection vulnerability
641cd669-bc37-11ea-babf-6805ca2fa271 powerdns-recursor -- access restriction bypass
641e8609-cab5-11d9-9aed-000e0c2e438a ppxp -- local root exploit
6431c4db-deb4-11de-9078-0030843d3802 opera -- multiple vulnerabilities
64575bb6-e188-11ea-beed-e09467587c17 chromium -- heap buffer overflow
64691c49-4b22-11e0-a226-00e0815b8da8 mailman -- XSS vulnerability
646923b0-41c7-11ec-a3b2-005056a311d1 samba -- Multiple Vulnerabilities
647ac600-cc70-11ec-9cfc-10c37b4ac2ea gogs -- XSS in issue attachments
648a432c-a71f-11ed-86e9-d4c9ef517024 OpenSSL -- Multiple vulnerabilities
64988354-0889-11eb-a01b-e09467587c17 chromium -- multiple vulnerabilities
64be967a-d379-11e6-a071-001e67f15f5a libvncserver -- multiple buffer overflows
64bf6234-520d-11db-8f1a-000a48049292 gnutls -- RSA Signature Forgery Vulnerability
64c8cc2a-59b1-11d9-8a99-000c6e8f12ef libxine -- buffer-overflow vulnerability in aiff support
64e299b6-d12b-4a7a-a94f-ab133703925a vscode -- Visual Studio Code for Linux Remote Code Execution Vulnerability
64e6006e-f009-11e4-98c6-000c292ee6b8 powerdns -- Label decompression bug can cause crashes or CPU spikes
64ee858e-e035-4bb4-9c77-2468963dddb8 libvorbis -- multiple vulnerabilities
64f24a1e-66cf-11e0-9deb-f345f3aa24f0 krb5 -- MITKRB5-SA-2011-001, kpropd denial of service
64f8b72d-9c4e-11e1-9c94-000bcdf0a03b libpurple -- Invalid memory dereference in the XMPP protocol plug-in by processing serie of specially-crafted file transfer requests
650734b2-7665-4170-9a0a-eeced5e10a5e graylog -- remote code execution in log4j from user-controlled log input
651996e0-fe07-11d9-8329-000e0c2e438a apache -- http request smuggling
652064ef-056f-11ee-8e16-6c3be5272acd Grafana -- Grafana DS proxy race condition
653606e9-f6ac-11dd-94d9-0030843d3802 typo3 -- multiple vulnerabilities
653a8059-7c49-11e6-9242-3065ec8fd3ec chromium -- multiple vulnerabilities
6540c8f0-dca3-11e5-8fa8-14dae9d210b8 pitivi -- code execution
65539c54-2517-11e2-b9d6-20cf30e32f6d apache22 -- several vulnerabilities
655ee1ec-511b-11dd-80ba-000bcdf0a03b FreeBSD -- DNS cache poisoning
656b0152-faa9-4755-b08d-aee4a774bd04 zeek -- potential DoS vulnerabilities
65847d9d-7f3e-11ec-8624-b42e991fc52e mustache - Possible Remote Code Execution
658b9198-8106-4c3d-a2aa-dc4a0a7cc3b6 zeek -- potential DoS vulnerabilities
6596bb80-d026-11d9-9aed-000e0c2e438a shtool -- insecure temporary file creation
65a17a3f-ed6e-11d8-aff1-00061bc2ad93 Arbitrary code execution via a format string vulnerability in jftpgw
65a8f773-4a37-11db-a4cc-000a48049292 zope -- restructuredText "csv_table" Information Disclosure
65b14d39-d01f-419c-b0b8-5df60b929973 ffmpeg -- multiple vulnerabilities
65b25acc-e63b-11e1-b81c-001b77d09812 rssh -- arbitrary command execution
65bb1858-27de-11e6-b714-74d02b9a84d5 h2o -- use after free on premature connection close
65c8ecf9-2adb-11db-a6e2-000e0c2e438a postgresql -- multiple vulnerabilities
65d16342-3ec8-11e0-9df7-001c42d23634 asterisk -- Exploitable Stack and Heap Array Overflows
65e99f52-1c5f-11d9-bc4a-000c41e2cdad squid -- SNMP module denial-of-service vulnerability
65f05b71-0e3c-11ec-b335-d4c9ef517024 WeeChat -- Crash when decoding a malformed websocket frame in relay plugin.
65fab89f-2231-46db-8541-978f4e87f32a gitlab -- Remote code execution on project import
6601127c-9e09-11e1-b5e0-000c299b62e1 socat -- Heap-based buffer overflow
6601c08d-a46c-11ec-8be6-d4c9ef517024 Apache httpd -- Multiple vulnerabilities
660ebbf5-daeb-11e5-b2bd-002590263bf5 squid -- remote DoS in HTTP response processing
661bd031-c37d-11e2-addb-60a44c524f57 otrs -- XSS vulnerability
66657bd5-ac92-11dd-b541-001f3b19d541 emacs -- run-python vulnerability
666b8c9e-8212-11db-851e-0016179b2dd5 tdiary -- cross site scripting vulnerability
66759ce6-7530-11df-9c33-000c29ba66d2 moodle -- multiple vulnerabilities
6678211c-bd47-11ed-beb0-1c1b0d9ea7e6 Apache OpenOffice -- master password vulnerabilities
66907dab-6bb2-11ef-b813-4ccc6adda413 qt5-webengine -- Multiple vulnerabilities
6693bad2-ca50-11de-8ee8-00215c6a37bb typo3 -- multiple vulnerabilities in TYPO3 Core
669f3fe8-a07a-11ea-b83e-f0def1f5c5a2 FreeRDP -- multiple vulnerabilities
66a770b4-e008-11dd-a765-0030843d3802 mysql -- empty bit-string literal denial of service
66ba5931-9ed5-11e5-8f5c-002590263bf5 redmine -- XSS vulnerability
66cf7c43-5be3-11ec-a587-001b217b3468 Solr -- Apache Log4J
66d1c277-652a-11eb-bb3f-001b217b3468 Gitlab -- Multiple vulnerabilities
66d77c58-3b1d-11e6-8e82-002590263bf5 php -- multiple vulnerabilities
66dbb2ee-99b8-45b2-bb3e-640caea67a60 leafnode -- fetchnews denial-of-service triggered by transmission abort/timeout
66e4dc99-28b3-11ea-8dde-08002728f74c rack -- information leak / session hijack vulnerability
67057b48-41f4-11ed-86c3-080027881239 mediawiki -- multiple vulnerabilities
670d732a-cdd4-11e3-aac2-0022fb6fcf92 mohawk -- multiple vulnerabilities
672eeea9-a070-4f88-b0f1-007e90a2cbc3 jenkins -- multiple vulnerabilities
6733e1bf-125f-11de-a964-0030843d3802 ffmpeg -- 4xm processing memory corruption vulnerability
6738977b-e9a5-11da-b9f4-00123ffe8333 coppermine -- "file" Local File Inclusion Vulnerability
673aec6f-1cae-11da-bc01-000e0c2e438a htdig -- cross site scripting vulnerability
673dce46-46d0-11e7-a539-0050569f7e80 FreeRADIUS -- TLS resumption authentication bypass
674ed047-be0a-11eb-b927-3065ec8fd3ec chromium -- multiple vulnerabilities
67516177-88ec-11e1-9a10-0023ae8e59f0 typo -- Cross-Site Scripting
675e5098-3b15-11eb-af2a-080027dbe4b7 glpi -- Unauthenticated File Deletion
676ca486-9c1e-11ea-8b5e-b42e99a1b9c3 Apache Tomcat Remote Code Execution via session persistence
676d4f16-4fb3-11ed-a374-8c164567ca3c nginx -- Two vulnerabilities
67710833-1626-11d9-bc4a-000c41e2cdad Boundary checking errors in syscons
67765237-8470-11ea-a283-b42e99a1b9c3 malicious URLs can cause git to send a stored credential to wrong server
6779e82f-b60b-11da-913d-000ae42e9b93 drupal -- multiple vulnerabilities
67a1c3ae-ad69-11df-9be6-0015587e2cc1 corkscrew -- buffer overflow vulnerability
67b050ae-ec82-11ea-9071-10c37b4ac2ea go -- net/http/cgi, net/http/fcgi: Cross-Site Scripting (XSS) when Content-Type is not specified
67b3fef2-2bea-11e5-86ff-14dae9d210b8 groovy -- remote execution of untrusted code
67b514c3-ba8f-11df-8f6e-000c29a67389 sudo -- Flaw in Runas group matching
67bd39ba-12b5-11dd-bab7-0016179b2dd5 firefox -- javascript garbage collector vulnerability
67c05283-5d62-11d8-80e3-0020ed76ef5a Buffer overflow in Mutt 1.4
67c2eb06-5579-4595-801b-30355be24654 lizard -- Negative size passed to memcpy resulting in memory corruption
67dbe99f-0f09-11db-94f8-00e029485e38 shoutcast -- cross-site scripting, information exposure
67dbeeb6-80f4-11ea-bafd-815569f3852d ansible - subversion password leak from PID
67fe5e5b-549f-4a2a-9834-53f60eaa415e py-Scrapy -- exposure of sensitive information vulnerability
67feba97-b1b5-11e5-9728-002590263bf5 qemu -- denial of service vulnerability in VNC
6809c6db-bdeb-11e5-b5fe-002590263bf5 go -- information disclosure vulnerability
6821a2db-4ab7-11da-932d-00055d790c25 PHP -- multiple vulnerabilities
68222076-010b-11da-bc08-0001020eed82 tiff -- buffer overflow vulnerability
68233cba-7774-11d8-89ed-0020ed76ef5a OpenSSL ChangeCipherSpec denial-of-service vulnerability
683c714d-2d91-11e9-bf3e-a4badb2f4699 FreeBSD -- System call kernel data register leak
6842ac7e-d250-11ea-b9b7-08002728f74c jasper -- multiple vulnerabilities
6851f3bb-6833-11ee-b06f-0050569ceb3a Sensitive fields enumeration through API in GLPI
6856d798-d950-11e9-aae4-f079596b62f9 expat2 -- Fix extraction of namespace prefixes from XML names
68611303-149e-11e7-b9bb-6805ca0b3d42 phpMyAdmin -- bypass 'no password' restriction
6876b163-8708-11e7-8568-e8e0b747a45a pspp -- multiple vulnerabilities
6877e164-6296-11ed-9ca2-6c3be5272acd Grafana -- Data source and plugin proxy endpoints leaking authentication tokens to some destination plugins
68847b20-8ddc-11e5-b69c-c86000169601 gdm -- lock screen bypass when holding escape key
688e73a2-e514-11e3-a52a-98fc11cdc4f5 linux-flashplugin -- multiple vulnerabilities
68958e18-ed94-11ed-9688-b42e991fc52e glpi -- multiple vulnerabilities
689c2bf7-0701-11e3-9a25-002590860428 GnuPG and Libgcrypt -- side-channel attack vulnerability
68ae70c5-c5e5-11ee-9768-08002784c58d clamav -- Multiple vulnerabilities
68b29058-d348-11e7-b9fe-c13eb7bcbf4f exim -- remote code execution, deny of service in BDAT
68bda678-caab-11de-a97e-be89dfd1042e p5-HTML-Parser -- denial of service
68c1f75b-8824-11e2-9996-c48508086173 perl -- denial of service via algorithmic complexity attack on hashing routines
68c7187a-abd2-11df-9be6-0015587e2cc1 slim -- insecure PATH assignment
68fcee9b-5259-11ed-89c9-0800276af896 Cleartext leak in libudisks
6900e6f1-4a79-11e5-9ad8-14dae9d210b8 pcre -- heap overflow vulnerability
69048656-2187-11e4-802c-20cf30e32f6d serf -- SSL Certificate Null Byte Poisoning
6905f05f-a0c9-11e8-8335-8c164535ad80 jenkins -- multiple vulnerabilities
6916ea94-4628-11ec-bbe2-0800270512f4 rubygem-date -- Regular Expression Denial of Service Vunlerability of Date Parsing Methods
691ed622-e499-11d9-a8bd-000cf18bbe54 tor -- information disclosure
6926d038-1db4-11ef-9f97-a8a1599412c6 chromium -- security fix
692a5fd5-bb25-4df4-8a0e-eb91581f2531 py-flask-caching -- remote code execution or local privilege escalation vulnerabilities
692ab645-bf5d-11de-849b-00151797c2d4 squidGuard -- multiple vulnerabilities
694da5b4-5877-11df-8d80-0015587e2cc1 mediawiki -- authenticated CSRF vulnerability
6954a2b0-bda8-11eb-a04e-641c67a117d8 libzmq4 -- Stack overflow
695b2310-3b3a-11eb-af2a-080027dbe4b7 glpi -- Insecure Direct Object Reference on ajax/getDropdownValue.php
696053c6-0f50-11df-a628-001517351c22 bugzilla -- information leak
6972668d-cdb7-11e6-a9a5-b499baebfeaf PHP -- multiple vulnerabilities
69815a1d-c31d-11eb-9633-b42e99a1b9c3 SOGo -- SAML user authentication impersonation
698403a7-803d-11e5-ab94-002590263bf5 codeigniter -- multiple vulnerabilities
69a20ce4-dfee-11dd-a765-0030843d3802 imap-uw -- imap c-client buffer overflow
69bfc852-9bd0-11e2-a7be-8c705af55518 FreeBSD -- OpenSSL multiple vulnerabilities
69cf62a8-a0aa-11ea-9ea5-001b217b3468 Gitlab -- Multiple Vulnerabilities
69cfa386-7cd0-11e7-867f-b499baebfeaf cURL -- multiple vulnerabilities
6a0129bf-54ad-11e9-987c-1c39475b9f84 Kubectl -- Potential directory traversal
6a09c80e-6ec7-442a-bc65-d72ce69fd887 mozilla -- multiple vulnerabilities
6a131fbf-ec76-11e7-aa65-001b216d295b The Bouncy Castle Crypto APIs: CVE-2017-13098 ("ROBOT")
6a164d84-2f7f-11d9-a9e7-0001020eed82 postgresql-contrib -- insecure temporary file creation
6a177c87-9933-11e7-93f7-d43d7e971a1b GitLab -- multiple vulnerabilities
6a245f31-4254-11de-b67a-0030843d3802 libwmf -- embedded GD library Use-After-Free vulnerability
6a2cfcdc-9dea-11e6-a298-14dae9d210b8 FreeBSD -- OpenSSH Remote Denial of Service vulnerability
6a308e8e-b1b4-11da-b2fb-000e0c2e438a openssh -- remote denial of service
6a31cbe3-1695-11dc-a197-0011098b2f36 wordpress -- unmoderated comments disclosure
6a33477e-3a9c-11d9-84ad-000c6e8f12ef phpMyAdmin -- cross-site scripting vulnerabilities
6a384960-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- Deadlock in the NFS server
6a3c3e5c-66cb-11e0-a116-c535f3aa24f0 krb5 -- MITKRB5-SA-2011-004, kadmind invalid pointer free() [CVE-2011-0285]
6a449a37-1570-11e8-8e00-000c294a5758 strongswan - Insufficient input validation in RSASSA-PSS signature parser
6a467439-3b38-11eb-af2a-080027dbe4b7 glpi -- Any CalDAV calendars is read-only for every authenticated user
6a4805d5-5aaf-11eb-a21d-79f5bc5ef6a9 go -- cmd/go: packages using cgo can cause arbitrary code execution at build time; crypto/elliptic: incorrect operations on the P-224 curve
6a4bfe75-692a-11e0-bce7-001eecdd401a VLC -- Heap corruption in MP4 demultiplexer
6a5174bd-c580-11da-9110-00123ffe8333 clamav -- Multiple Vulnerabilities
6a523dba-eeab-11dd-ab4f-0030843d3802 moinmoin -- multiple cross site scripting vulnerabilities
6a5d15b6-b661-11ea-8015-e09467587c17 chromium -- multiple vulnerabilities
6a6ad6cb-5c6c-11ef-b456-001e676bf734 Dovecot -- DoS
6a72eff7-ccd6-11ea-9172-4c72b94353b5 Apache Tomcat -- Multiple Vulnerabilities
6a7c2ab0-00dd-11ea-83ce-705a0f828759 php -- env_path_info underflow in fpm_main.c can lead to RCE
6a806960-3016-44ed-8575-8614a7cb57c7 rails -- multiple vulnerabilities
6a851dc0-cfd2-11ee-ac09-6c3be5272acd Grafana -- Email verification is not required after email change
6aa2d135-b40e-11e5-9728-002590263bf5 xen-kernel -- ioreq handling possibly susceptible to multiple read issue
6aa3322f-b150-11e5-9728-002590263bf5 qemu -- denial of service vulnerabilities in NE2000 NIC support
6aa398d0-1c4d-11e9-96dd-a4badb296695 joomla3 -- vulnerabilitiesw
6aa956fb-d97f-11e6-a071-001e67f15f5a RabbitMQ -- Authentication vulnerability
6ac79ed8-ccc2-11e5-932b-5404a68ad561 ffmpeg -- remote denial of service in JPEG2000 decoder
6ad18fe5-f469-11e1-920d-20cf30e32f6d bugzilla -- multiple vulnerabilities
6ad309d9-fb03-11e3-bebd-000c2980a9f3 samba -- multiple vulnerabilities
6adca5e9-95d2-11e2-8549-68b599b52a02 firebird -- Remote Stack Buffer Overflow
6ade62d9-0f62-11ea-9673-4c72b94353b5 clamav -- Denial-of-Service (DoS) vulnerability
6adf6ce0-44a6-11eb-95b7-001999f8d30b asterisk -- Remote crash in res_pjsip_diversion
6ae7cef2-a6ae-11dc-95e6-000c29c5647f jetty -- multiple vulnerabilities
6afa87d3-764b-11d9-b0e7-0000e249a0a2 python -- SimpleXMLRPCServer.py allows unrestricted traversal
6b0215ae-8f26-11da-8c1d-000e0c2e438a cpio -- multiple vulnerabilities
6b04476f-601c-11ed-92ce-3065ec8fd3ec chromium -- multiple vulnerabilities
6b110175-246d-11e6-8dd3-002590263bf5 php -- multiple vulnerabilities
6b1d8a39-ddb3-11e5-8fa8-14dae9d210b8 django -- regression in permissions model
6b2cba6a-c6a5-11ee-97d0-001b217b3468 Gitlab -- vulnerabilities
6b3374d4-6b0b-11e5-9909-002590263bf5 plone -- multiple vulnerabilities
6b3591ea-e2d2-11e5-a6be-5453ed2e2b49 libssh -- weak Diffie-Hellman secret generation
6b3b1b97-207c-11e2-a03f-c8600054b392 mozilla -- multiple vulnerabilities
6b4b0b3f-8127-11d9-a9e7-0001020eed82 postgresql -- multiple buffer overflows in PL/PgSQL parser
6b575419-14cf-11df-a628-001517351c22 otrs -- SQL injection
6b591e05-971c-4077-8ae4-1310554971b7 electron31 -- multiple vulnerabilities
6b6ca5b6-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- devfs rules not applied by default for jails
6b6de127-db0b-11ea-ba1e-1c39475b9f84 bftpd -- Multiple vulnerabilities
6b771fe2-b84e-11e5-92f9-485d605f4717 php -- multiple vulnerabilities
6b856e00-b30a-11e9-a87f-a4badb2f4699 FreeBSD -- Kernel memory disclosure in freebsd32_ioctl
6b8cadce-db0b-11dd-aa56-000bcdf0a03b FreeBSD -- IPv6 Neighbor Discovery Protocol routing vulnerability
6b90acba-6a0a-11ea-92ab-00163e433440 FreeBSD -- Kernel memory disclosure with nested jails
6b97436c-ce1e-11e2-9cb2-6805ca0b3d42 phpMyAdmin -- XSS due to unescaped HTML output in Create View page
6bacd9fd-ca56-11ed-bc52-589cfc0f81b0 phpmyfaq -- multiple vulnerabilities
6bb6188c-17b2-11de-ae4d-0030843d3802 amarok -- multiple vulnerabilities
6bc6eed2-9cca-11e5-8c2b-c335fa8985d7 libraw -- memory objects not properly initialized
6bd2773c-cf1a-11ed-bd44-080027f5fec9 rubygem-time -- ReDoS vulnerability
6bf55af9-973b-11ea-9f2c-38d547003487 salt -- multiple vulnerabilities in salt-master process
6bf71117-c0c9-11e8-b760-6023b685b1ee mantis -- XSS vulnerability
6bff5ca6-b61a-11ea-aef4-08002728f74c curl -- multiple vulnerabilities
6c083cf8-4830-11e4-ae2c-c80aa9043978 fish -- local privilege escalation and remote code execution
6c1de144-056f-11ee-8e16-6c3be5272acd Grafana -- Broken access control: viewer can send test alerts
6c22bb39-0a9a-11ec-a265-001b217b3468 Gitlab -- Vulnerabilities
6c2d4f29-af3e-11d9-837d-000e0c2e438a gld -- format string and buffer overflow vulnerabilities
6c4db192-cb23-11df-9c1b-0011098ad87f horde-imp -- XSS vulnerability
6c72b13f-4d1d-11ee-a7f1-080027f5fec9 redis -- Possible bypassing ACL configuration
6c7661ff-7912-11d8-9645-0020ed76ef5a uudeview buffer overflows
6c7d9a35-2608-11e1-89b4-001ec9578670 krb5 -- KDC null pointer dereference in TGS handling
6c808811-bb9a-11e5-a65c-485d605f4717 h2o -- directory traversal vulnerability
6c8ad3e8-0a30-11e1-9580-4061862b8c22 mozilla -- multiple vulnerabilities
6ca7eddd-d436-486a-b169-b948436bcf14 libvpx -- buffer overflow in vp9_init_context_buffers
6cc06eec-c60b-11e5-bf36-6805ca0b3d42 phpmyadmin -- Multiple XSS vulnerabilities
6cc63bf5-a727-4155-8ec4-68b626475e68 xorg-server -- Security issue in the X server
6cec1b0a-da15-467d-8691-1dea392d4c8d mozilla -- multiple vulnerabilities
6d08fa63-83bf-11e3-bdba-080027ef73ec HTMLDOC -- buffer overflow issues when reading AFM files and parsing page sizes
6d0bf320-ca39-11e2-9673-001e8c75030d devel/subversion -- contrib hook-scripts can allow arbitrary code execution
6d1761d2-0b23-11da-bc08-0001020eed82 gaim -- AIM/ICQ away message buffer overflow
6d18fe19-ee67-11d9-8310-0001020eed82 clamav -- MS-Expand file handling DoS vulnerability
6d21a287-fce0-11e0-a828-00235a5f2c9a kdelibs4, rekonq -- input validation failure
6d25c306-f3bb-11e5-92ce-002590263bf5 salt -- Insecure configuration of PAM external authentication service
6d31ef38-df85-11ee-abf1-6c3be5272acd Grafana -- Data source permission escalation
6d329b64-6bbb-11e1-9166-001e4f0fb9b1 portaudit -- auditfile remote code execution
6d334fdb-f7e7-11ea-88f8-901b0ef719ab FreeBSD -- ftpd privilege escalation via ftpchroot feature
6d337396-0e4a-11e8-94c0-5453ed2e2b49 p7zip -- heap-based buffer overflow
6d33b3e5-ea03-11e5-85be-14dae9d210b8 node -- multiple vulnerabilities
6d402857-2fba-11e6-9f31-5404a68ad561 VLC -- Possibly remote code execution via crafted file
6d472244-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- TCP reassembly vulnerability
6d4e4759-7b67-11dd-80ba-000bcdf0a03b FreeBSD -- amd64 swapgs local privilege escalation
6d52bda1-2e54-11e8-a68f-485b3931c969 SQLite -- Corrupt DB can cause a NULL pointer dereference
6d554d6e-5638-11eb-9d36-5404a68ad561 wavpack -- integer overflow in pack_utils.c
6d5f1b0b-b865-48d5-935b-3fb6ebb425fc Apache Ant leaks sensitive information via the java.io.tmpdir
6d68618a-7199-11db-a2ad-000c6ec775d9 bugzilla -- multiple vulnerabilities
6d78202e-e2f9-11da-8674-00123ffe8333 phpldapadmin -- Cross-Site Scripting and Script Insertion vulnerabilities
6d82c5e9-fc24-11ee-a689-04421a1baf97 php -- Multiple vulnerabilities
6d8505f0-0614-11e6-b39c-00262d5ed8ee chromium -- multiple vulnerabilities
6d85dc62-f2bd-11dd-9f55-0030843d3802 drupal -- multiple vulnerabilities
6d87c2e9-c64d-11e2-9c22-50465d9ff992 socat -- FD leak
6d9a28f8-8152-11da-817c-0001020eed82 milter-bogom -- headerless message crash
6d9c6aae-5eb1-11ee-8290-a8a1599412c6 chromium -- multiple vulnerabilities
6d9eadaf-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- sendmail improper close-on-exec flag handling
6da45e38-5b55-11e6-8859-000c292ee6b8 collectd -- Network plugin heap overflow
6da7344b-128a-11db-b25f-00e00c69a70d drupal -- multiple vulnerabilities
6dbae1a8-a4e6-11e5-b864-14dae9d210b8 cups-filters -- code execution
6dc3c61c-e866-4c27-93f7-ae50908594fd jenkins -- multiple issues
6dccc186-b824-11ed-b695-6c3be5272acd Grafana -- Stored XSS in text panel plugin
6dd5e45c-f084-11e1-8d0f-406186f3d89d coppermine -- Multiple vulnerabilities
6df56c60-3738-11e6-a671-60a44ce6887b wget -- HTTP to FTP redirection file name confusion vulnerability
6e04048b-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- ktrace kernel memory disclosure
6e099997-25d8-11dc-878b-000c29c5647f gd -- multiple vulnerabilities
6e0ebb4a-5e75-11ee-a365-001b217b3468 Gitlab -- vulnerabilities
6e27f3b6-189b-11da-b6be-0090274e8dbb fswiki -- command injection vulnerability
6e33f4ab-efed-11d9-8310-0001020eed82 bugzilla -- multiple vulnerabilities
6e3b12e2-6ce3-11da-b90c-000e0c2e438a mantis -- "view_filters_page.php" cross-site scripting vulnerability
6e3b700a-7ca3-11ea-b594-3065ec8fd3ec chromium -- multiple vulnerabilities
6e4e35c3-5fd1-11e7-9def-b499baebfeaf smarty3 -- shell injection in math
6e4e8e87-9fb8-4e32-9f8e-9b4303f4bfd5 chromium -- multiple vulnerabilities
6e58e1e9-2636-413e-9f84-4c0e21143628 libssh2 -- multiple issues
6e5a9afd-12d3-11e2-b47d-c8600054b392 mozilla -- multiple vulnerabilities
6e65dfea-b614-11e9-a3a2-1506e15611cc Django -- multiple vulnerabilities
6e6a6b8a-2fde-11d9-b3a2-0050fc56d258 apache mod_include buffer overflow vulnerability
6e740881-0cae-11d9-8a8a-000c41e2cdad mozilla -- automated file upload
6e7ad1d7-4e27-11e1-8e12-90e6ba8a36a2 mathopd -- directory traversal vulnerability
6e80bd9b-7e9b-11e7-abfe-90e2baa3bafc subversion -- Arbitrary code execution vulnerability
6e83b2f3-e4e3-11e6-9ac1-a4badb2f4699 nfsen -- remote command execution
6e87b696-ca3e-11df-aade-0050568f000c FreeBSD -- Inappropriate directory permissions in freebsd-update(8)
6e8b9c75-6179-11ef-8a7d-b42e991fc52e mcpp -- Heap-based buffer overflow
6e8f54af-a07d-11de-a649-000c2955660f ikiwiki -- insufficient blacklisting in teximg plugin
6e8f9003-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- Incorrect error handling in PAM policy parser
6ea60e00-cf13-11e5-805c-5453ed2e2b49 py-imaging, py-pillow -- Buffer overflow in FLI decoding code
6eb1dc51-1244-11dd-bab7-0016179b2dd5 phpmyadmin -- Username/Password Session File Information Disclosure
6eb580d7-a29c-11dc-8919-001c2514716c Squid -- Denial of Service Vulnerability
6eb6a442-629a-11ed-9ca2-6c3be5272acd Grafana -- Privilege escalation
6eb9cf14-bab0-11ec-8f59-4437e6ad11c4 mutt -- mutt_decode_uuencoded() can read past the of the input line
6ec9f210-0404-11e6-9aee-bc5ff4fb5ea1 dhcpcd -- remote code execution/denial of service
6ecd0b42-ce77-11dc-89b1-000e35248ad7 libxine -- buffer overflow vulnerability
6ed5c5e3-a840-11e7-b5af-a4badb2f4699 FreeBSD -- OpenSSH Denial of Service vulnerability
6eddfa51-fb44-11e9-86e9-001b217b3468 Gitlab -- Disclosure Vulnerabilities
6f0327d4-9902-4042-9b68-6fc2266944bc chromium -- multiple vulnerabilities
6f0529e2-2e82-11e6-b2ec-b499baebfeaf OpenSSL -- vulnerability in DSA signing
6f0b0cbf-1274-11e8-8b5b-4ccc6adda413 libraw -- multiple DoS vulnerabilities
6f0c2d1b-c60b-11e5-bf36-6805ca0b3d42 phpmyadmin -- Insecure password generation in JavaScript
6f15730d-94ea-11e9-a83e-641c67a117d8 znc -- privilege escalation
6f170cf2-e6b7-11e8-a9a8-b499baebfeaf OpenSSL -- timing vulnerability
6f2545bb-65e8-11ef-8a0f-a8a1599412c6 chromium -- multiple security fixes
6f33d38b-aa18-11eb-b3f1-005056a311d1 samba -- negative idmap cache entries vulnerability
6f358f5a-c7ea-11de-a9f3-0030843d3802 KDE -- multiple vulnerabilities
6f4d96c0-4062-11e7-b291-b499baebfeaf samba -- remote code execution vulnerability
6f5192f5-75a7-11ed-83c0-411d43ce7fe4 go -- multiple vulnerabilities
6f6518ab-6830-11ee-b06f-0050569ceb3a Account takeover via SQL Injection in UI layout preferences in GLPI
6f6c9420-6297-11ed-9ca2-6c3be5272acd Grafana -- Data source and plugin proxy endpoints leaking authentication tokens to some destination plugins
6f736456-c060-11dc-982e-001372fd0af2 drupal -- cross site scripting (utf8)
6f825fa4-5560-11e4-a4c3-00a0986f28c4 drupal7 -- SQL injection
6f91a709-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- iconv(3) NULL pointer dereference and out-of-bounds array access
6f955451-ba54-11d8-b88c-000d610a3b12 Buffer overflow in Squid NTLM authentication helper
6faa7feb-d3fa-11ea-9aba-0c9d925bbbc0 libX11 -- Heap corruption in the X input method client in libX11
6fae2d6c-1f38-11ee-a475-080027f5fec9 redis -- heap overflow in COMMAND GETKEYS and ACL evaluation
6fae9fe1-5048-11e6-8aa7-3065ec8fd3ec chromium -- multiple vulnerabilities
6fb521b0-d388-11e3-a790-000c2980a9f3 strongswan -- Remote Authentication Bypass
6fb8a90f-c9d5-4d14-b940-aed3d63c2edc The GIMP -- Use after Free vulnerability
6fd02439-5d70-11d8-80e3-0020ed76ef5a Several remotely exploitable buffer overflows in gaim
6fd773d3-bc5a-11ea-b38d-f0def1d0c3ea trafficserver -- resource consumption
6fe72178-b2e3-11e6-8b2a-6805ca0b3d42 phpMyAdmin -- multiple vulnerabilities
6fea7103-2ea4-11ed-b403-3dae8ac60d3e go -- multiple vulnerabilities
6ff570cb-b418-11e2-b279-20cf30e32f6d strongSwan -- ECDSA signature verification issue
7003b62d-7252-46ff-a9df-1b1900f1e65b RabbitMQ -- Denial of Service via improper input validation
700d43b4-a42a-11d8-9c6d-0020ed76ef5a Cyrus IMSPd multiple vulnerabilities
70111759-1dae-11ea-966a-206a8a720317 spamassassin -- multiple vulnerabilities
70140f20-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- Multiple vulnerabilities in file(1) and libmagic(3)
7015ab21-9230-490f-a2fe-f7557e3de25d electron{26,27} -- multiple vulnerabilities
7033b42d-ef09-11e5-b766-14dae9d210b8 pcre -- stack buffer overflow
70372cda-6771-11de-883a-00e0815b8da8 nfsen -- remote command execution
703c4761-b61d-11ec-9ebc-1c697aa5a594 FreeBSD -- mpr/mps/mpt driver ioctl heap out-of-bounds write
705b759c-7293-11e5-a371-14dae9d210b8 pear-twig -- remote code execution
705e003a-7f36-11d8-9645-0020ed76ef5a squid ACL bypass due to URL decoding bug
7062bce0-1b17-11ec-9d9d-0022489ad614 Node.js -- August 2021 Security Releases (2)
706c9eef-a077-11dd-b413-001372fd0af2 drupal -- multiple vulnerabilities
708c65a5-7c58-11de-a994-0030843d3802 mono -- XML signature HMAC truncation spoofing
709e025a-de8b-11e6-a9a5-b499baebfeaf PHP -- undisclosed vulnerabilities
70ae62b0-16b0-11dc-b803-0016179b2dd5 c-ares -- DNS Cache Poisoning Vulnerability
70b62f5e-9e2e-11d9-a256-0001020eed82 clamav -- zip handling DoS vulnerability
70b72a52-9e54-11e3-babe-60a44c524f57 otrs -- XSS Issue
70b774a8-05bc-11e9-87ad-001b217b3468 Gitlab -- Arbitrary File read in Gitlab project import
70c44cd0-e717-11e5-85be-14dae9d210b8 quagga -- stack based buffer overflow vulnerability
70c59485-ee5a-11d9-8310-0001020eed82 acroread -- buffer overflow vulnerability
70c85c93-743c-11e6-a590-14dae9d210b8 inspircd -- authentication bypass vulnerability
70cf37c8-939b-11ef-87ad-a8a15998b5cb tnef -- Invalid read and write operations, controlled by an attacker
70d0d2ec-cb62-11ed-956f-7054d21a9e2a py39-rencode -- infinite loop that could lead to Denial of Service
70e71a24-0151-11ec-bf0c-080027eedc6a bouncycastle15 -- bcrypt password checking vulnerability
70f5b3c6-80f0-11d8-9645-0020ed76ef5a Critical SQL injection in phpBB
70fc13d9-4ab4-11da-932d-00055d790c25 skype -- multiple buffer overflow vulnerabilities
71273c4d-a6ec-11df-8a8d-0008743bf21a opera -- multiple vulnerabilities
7128fb45-2633-11dc-94da-0016179b2dd5 vlc -- format string vulnerability and integer overflow
7132c842-58e2-11df-8d80-0015587e2cc1 spamass-milter -- remote command execution vulnerability
7136e6b7-e1b3-11e7-a4d3-000c292ee6b8 jenkins -- Two startup race conditions
713c3913-8c2b-11d9-b58c-0001020eed82 ImageMagick -- format string vulnerability
714b033a-2b09-11e9-8bc3-610fd6e6cd05 curl -- multiple vulnerabilities
714c1406-e4cf-11de-883a-003048590f9e rt -- Session fixation vulnerability
714e6c35-c75b-11ea-aa29-d74973d1f9f3 OpenEXR/ilmbase 2.5.2 -- patch release with various bug/security fixes
71597e3e-f6b8-11dd-94d9-0030843d3802 websvn -- multiple vulnerabilities
71612099-1e93-11e0-a587-001b77d09812 subversion -- multiple DoS
717efd8a-6821-11ee-b06f-0050569ceb3a GLPI vulnerable to unauthorized access to Dashboard data
7184f92e-8bb8-11e1-8d7b-003067b2972c OpenSSL -- integer conversions result in memory corruption
719f06af-e45e-11ea-95a1-c3b8167b8026 chrony <= 3.5.1 data corruption through symlink vulnerability writing the pidfile
71ad81da-4414-11e4-a33e-3c970e169bc2 bash -- remote code execution vulnerability
71af4ded-8864-11e5-af1b-001999f8d30b owncloudclient -- Improper validation of certificates when using self-signed certificates
71b24d99-c60b-11e5-bf36-6805ca0b3d42 phpmyadmin -- Unsafe comparison of XSRF/CSRF token
71c71ce0-0805-11eb-a3a4-0019dbb15b3f payara -- multiple vulnerabilities
71d903fc-602d-11dc-898c-001921ab2fa4 php -- multiple vulnerabilities
71ebbc50-01c1-11e7-ae1b-002590263bf5 codeigniter -- multiple vulnerabilities
720505fe-593f-11ec-9ba8-002324b2fba8 go -- multiple vulnerabilities
720590df-10eb-11e9-b407-080027ef1a23 chromium -- Use after free in PDFium
7217f6e8-3ff4-4387-845d-d1744bb7f95e chromium -- multiple security fixes
7229d900-88af-11d8-90d1-0020ed76ef5a mksnap_ffs clears file system options
7240de58-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- Kernel memory disclosure in control messages and SCTP
724e6f93-8f2a-11dd-821f-001cc0377035 mplayer -- multiple integer overflows
7257b26f-0597-11da-86bc-000e0c2e438a devfs -- ruleset bypass
72583cb3-a7f9-11ed-bd9e-589cfc0f81b0 phpMyAdmin -- XSS vulnerability in drag-and-drop upload
725ab25a-987b-11e1-a2ef-001fd0af1a4c p5-Config-IniFiles -- unsafe temporary file creation
7262f826-795e-11ec-8be6-d4c9ef517024 MySQL -- Multiple vulnerabilities
726dd9bd-8f25-11da-8c1d-000e0c2e438a ee -- temporary file privilege escalation
72709326-81f7-11eb-950a-00155d646401 go -- encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader; archive/zip: panic when calling Reader.Open
7274e0cc-575f-41bc-8619-14a41b3c2ad0 xorg-server -- multiple vulnerabilities
7280c3f6-a99a-11e2-8cef-6805ca0b3d42 phpMyAdmin -- XSS due to unescaped HTML output in GIS visualisation page
7289187b-66a5-11da-99f6-00123ffe8333 trac -- search module SQL injection vulnerability
7289214f-7c55-11e1-ab3b-000bcdf0a03b libpurple -- Remote DoS via an MSN OIM message that lacks UTF-8 encoding
729008b9-54bf-11ef-a61b-2cf05da270f3 Gitlab -- Vulnerabilities
72999d57-d6f6-11db-961b-005056847b26 WebCalendar -- "noSet" variable overwrite vulnerability
729c4a9f-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- Denial of Service in TCP packet processing
72a5579e-c765-11e9-8052-0028f8d09152 h2o -- multiple HTTP/2 vulnerabilities
72a6e3be-483a-11e9-92d7-f1590402501e Jupyter notebook -- cross-site inclusion (XSSI) vulnerability
72bf9e21-03df-11e3-bd8d-080027ef73ec polarssl -- denial of service vulnerability
72bfbb09-5a6a-11e6-a6c3-14dae9d210b8 perl -- local arbitrary code execution
72c145df-a1e0-11e5-8ad0-00262d5ed8ee chromium -- multiple vulnerabilities
72cba7b0-13cd-11de-a964-0030843d3802 netatalk -- arbitrary command execution in papd daemon
72cdf2ab-5b87-11dc-812d-0011098b2f36 lsh -- multiple vulnerabilities
72d6d757-c197-11ee-86bb-a8a1599412c6 chromium -- multiple security fixes
72d8df84-ea6d-11da-8a53-00123ffe8333 cscope -- buffer overflow vulnerabilities
72da8af6-7c75-11d9-8cc5-000854d03344 enscript -- multiple vulnerabilities
72ee7111-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- rtsold(8) remote buffer overflow vulnerability
72ee9707-d7b2-11e4-8d8e-f8b156b6dcc8 cpio -- multiple vulnerabilities
72f21372-55e4-11db-a5ae-00508d6a62df torrentflux -- User-Agent XSS Vulnerability
72f35727-ce83-11e2-be04-005056a37f68 dns/bind9* -- A recursive resolver can be crashed by a query for a malformed zone
72f71e26-4f69-11e6-ac37-ac9e174be3af Apache OpenOffice 4.1.2 -- Memory Corruption Vulnerability (Impress Presentations)
72fccfdf-2061-11e5-a4a5-002590263bf5 ansible -- multiple vulnerabilities
72fff788-e561-11e7-8097-0800271d4b9c rsync -- multiple vulnerabilities
730db824-e216-11d8-9b0a-000347a4fa7d Mozilla / Firefox user interface spoofing vulnerability
730e922f-20e7-11ec-a574-080027eedc6a nexus2-oss -- Apache ActiveMQ JMX vulnerability
7313b0e3-27b4-11e5-a15a-50af736ef1c0 pivotx -- Multiple unrestricted file upload vulnerabilities
7314942b-0889-46f0-b02b-2c60aabe4a82 chromium -- multiple security fixes
731cdeaa-3564-11e5-9970-14dae9d210b8 bind -- denial of service vulnerability
732282a5-5a10-11ee-bca0-001999f8d30b Mailpit affected by vulnerability in included go markdown module
7329938b-a4e6-11e5-b864-14dae9d210b8 cups-filters -- code execution
733afd81-01cf-11ec-aec9-0800273f11ea gitea -- multiple vulnerabilities
734233f4-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- routed(8) remote denial of service vulnerability
734b8f46-773d-4fef-bed3-61114fe8e4c5 libX11 -- Sub-object overflows
73634294-0fa7-11e0-becc-0022156e8794 php -- open_basedir bypass
736e55bc-39bb-11de-a493-001b77d09812 cups -- remote code execution and DNS rebinding
738e8ae1-46dd-11e7-a539-0050569f7e80 duo -- Two-factor authentication bypass
738f8f9e-d661-11dd-a765-0030843d3802 mysql -- MyISAM table privileges security bypass vulnerability for symlinked paths
738fc80d-5f13-4ccb-aa9a-7965699e5a10 mozilla -- use-after-free
7392e1e3-4eb9-11ed-856e-d4c9ef517024 OpenSSL -- Potential NULL encryption in NID_undef with Custom Cipher
739329c8-d8f0-11dc-ac2f-0016d325a0ed ikiwiki -- javascript insertion via uris
73964eac-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- memory leak in sandboxed namei lookup
739948e3-78bf-11e8-b23c-080027ac955c mailman -- hardening against malicious listowners injecting evil HTML scripts
739b94a4-838b-11de-938e-003048590f9e joomla15 -- com_mailto Timeout Issue
739bb51d-7e82-11d8-9645-0020ed76ef5a racoon security association deletion vulnerability
73a697d7-1d0f-11ef-a490-84a93843eb75 OpenSSL -- Use after free vulnerability
73b1e734-c74e-11e9-8052-0028f8d09152 h2o -- multiple HTTP/2 vulnerabilities
73e9a137-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- Denial of service attack against sshd(8)
73ea0706-9c57-11d8-9366-0020ed76ef5a rsync path traversal issue
73ec1008-72f0-11dd-874b-0030843d3802 opera -- multiple vulnerabilities
73efb1b7-07ec-11e2-a391-000c29033c32 eperl -- Remote code execution
73f53712-d028-11db-8c07-0211d85f11fb ktorrent -- multiple vulnerabilities
740badcb-c60b-11e5-bf36-6805ca0b3d42 phpmyadmin -- Multiple full path disclosure vulnerabilities
741c3957-1d69-11d9-a804-0050fc56d258 icecast -- HTTP header overflow
741f8841-9c6b-11d9-9dbe-000a95bc6fae firefox -- arbitrary code execution from sidebar panel
742279d6-bdbe-11ed-a179-2b68e9d12706 go -- crypto/elliptic: incorrect P-256 ScalarMult and ScalarBaseMult results
742563d4-d776-11e4-b595-4061861086c1 Several vulnerabilities found in PHP
742eb9e4-e3cb-4f5a-b94e-0e9a39420600 ruby-gems -- Algorithmic Complexity Vulnerability
74389f22-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- Kernel stack disclosure in setlogin(2) / getlogin(2)
744ec9d7-fe0f-11ec-bcd2-3065ec8fd3ec chromium -- multiple vulnerabilities
7453c85d-7830-11dc-b4c8-0016179b2dd5 nagios-plugins -- Long Location Header Buffer Overflow Vulnerability
7467c611-b490-11ee-b903-001fc69cd6dc xorg server -- Multiple vulnerabilities
746ca1ac-21ec-11d9-9289-000c41e2cdad ifmail -- unsafe set-user-ID application
746d04dc-507e-4450-911f-4c41e48bb07a bro -- out of bounds write allows remote DOS
7480b6ac-adf1-443e-a33c-3a3c0becba1e jenkins -- multiple vulnerabilities
7488378d-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- Remote command execution in ftp(1)
748aa89f-d529-11e1-82ab-001fd0af1a4c rubygem-activerecord -- multiple vulnerabilities
749b5587-2da1-11e3-b1a9-b499baab0cbe gnupg -- possible infinite recursion in the compressed packet parser
74a9541d-5d6c-11d8-80e3-0020ed76ef5a clamav remote denial-of-service
74b7403c-c4d5-11da-b2fb-000e0c2e438a mediawiki -- cross site scripting vulnerability
74bbde13-ec17-11ea-88f8-901b0ef719ab FreeBSD -- IPv6 Hop-by-Hop options use-after-free bug
74bf1594-8493-11dd-bb64-0030843d3802 phpmyadmin -- Code execution vulnerability
74c86a29-81ef-11d9-a9e7-0001020eed82 bidwatcher -- format string vulnerability
74d06b67-d2cf-11d8-b479-02e0185c0b53 multiple vulnerabilities in ethereal
74daa370-2797-11e8-95ec-a4badb2f4699 FreeBSD -- Speculative Execution Vulnerabilities
74db0d02-b140-4c32-aac6-1f1e81e1ad30 dovecot -- multiple vulnerabilities
74ded00e-6007-11e6-a6c3-14dae9d210b8 FreeBSD -- Buffer overflow in stdio
74ff10f6-520f-11db-8f1a-000a48049292 cscope -- Buffer Overflow Vulnerabilities
75091516-6f4b-4059-9884-6727023dc366 NSS -- multiple vulnerabilities
751823d4-f189-11de-9344-00248c9b4be7 drupal -- multiple cross-site scripting
75231c63-f6a2-499d-8e27-787773bda284 bugzilla -- multiple vulnerabilities
752ce039-5242-11df-9139-00242b513d7c vlc -- unintended code execution with specially crafted data
753f8185-5ba9-42a4-be02-3f55ee580093 phpMyAdmin -- XSS attack in database search
7557a2b1-5d63-11d8-80e3-0020ed76ef5a Apache-SSL optional client certificate vulnerability
755fa519-80a9-11dd-8de5-0030843d3802 neon -- NULL pointer dereference in Digest domain support
756a8631-0b84-11e8-a986-6451062f0f7a Flash Player -- multiple vulnerabilities
756db070-b9d4-11d9-ae81-000ae42e9b93 coppermine -- IP spoofing and XSS vulnerability
75770425-67a2-11d8-80e3-0020ed76ef5a SQL injection vulnerability in phpnuke
757e6ee8-ff91-11e8-a148-001b217b3468 Gitlab -- Arbitrary File read in GitLab project import with Git LFS
757ee63b-269a-11ec-a616-6c3be5272acd Grafana -- Snapshot authentication bypass
7580f00e-280c-11e0-b7c8-00215c6a37bb dokuwiki -- multiple privilege escalation vulnerabilities
759059ac-dab3-11e7-b5af-a4badb2f4699 FreeBSD -- Information leak in kldstat(2)
759a5599-3ce8-11ee-a0d1-84a93843eb75 MySQL -- Multiple vulnerabilities
759b8dfe-3972-11d9-a9e7-0001020eed82 Overflow error in fetch
75aae50b-9e3c-11eb-9bc3-8c164582fbac AccountsService -- Insufficient path check in user_change_icon_file_authorized_cb()
75c073cc-1a1d-11ed-bea0-48ee0c739857 XFCE tumbler -- Vulnerability in the GStreamer plugin
75c24c1d-b688-11dd-88fd-001c2514716c dovecot -- ACL plugin bypass vulnerabilities
75d72e03-b137-11ea-8659-901b0ef719ab BIND -- Remote Denial of Service vulnerability
75dd622c-d5fd-11e7-b9fe-c13eb7bcbf4f exim -- remote DoS attack in BDAT processing
75e26236-ce9e-11e0-b26a-00215c6a37bb phpMyAdmin -- multiple XSS vulnerabilities
75f2382e-b586-11dd-95f9-00e0815b8da8 syslog-ng2 -- startup directory leakage in the chroot environment
75f39413-7a00-11e5-a2a1-002590263bf5 drupal -- open redirect vulnerability
762b7d4a-ec19-11ea-88f8-901b0ef719ab FreeBSD -- dhclient heap overflow
762d1c6d-0722-11d9-b45d-000c41e2cdad apache -- apr_uri_parse IPv6 address handling vulnerability
76301302-1d59-11d9-814e-0001020eed82 xerces-c2 -- Attribute blowup denial-of-service
764344fb-8214-11e2-9273-902b343deec9 sudo -- Authentication bypass when clock is reset
76487640-ea29-11eb-a686-3065ec8fd3ec chromium -- multiple vulnerabilities
76562594-1f19-11db-b7d4-0008743bf21a ruby -- multiple vulnerabilities
7656fc62-a7a7-11e4-96ba-001999f8d30b asterisk -- Mitigation for libcURL HTTP request injection vulnerability
765d165b-fbfe-11e6-aae7-5404a68ad561 MPD -- buffer overflows in http output
765feb7d-a0d1-11e6-a881-b499baebfeaf cURL -- multiple vulnerabilities
76700d2f-d959-11ea-b53c-d4c9ef517024 Apache httpd -- Multiple vulnerabilities
767dfb2d-3c9e-11ef-a829-5404a68ad561 traefik -- Bypassing IP allow-lists via HTTP/3 early data requests
768cfe70-ca40-11df-aade-0050568f000c FreeBSD -- OPIE off-by-one stack overflow
76904dce-ccf3-11d8-babb-000854d03344 Pavuk HTTP Location header overflow
7694927f-c60b-11e5-bf36-6805ca0b3d42 phpmyadmin -- XSS vulnerability in normalization page
7695b0af-958f-11ec-9aa3-4ccc6adda413 cryptopp -- ElGamal implementation allows plaintext recovery
769a4f60-9056-4c27-89a1-1758a59a21f8 zeek -- Vulnerability due to memory leak
769ba449-79e1-11e6-bf75-3065ec8fd3ec chromium -- multiple vulnerabilities
76a07f31-a860-11eb-8ddb-001b217b3468 Carrierwave -- Multiple vulnerabilities
76adaab0-e4e3-11d9-b875-0001020eed82 ethereal -- multiple protocol dissectors vulnerabilities
76b085e2-9d33-11e7-9260-000c292ee6b8 Apache -- HTTP OPTIONS method can leak server memory
76b5068c-8436-11eb-9469-080027f515ea OpenSSH -- Double-free memory corruption in ssh-agent
76b597e4-e9c6-11df-9e10-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
76c2110b-9e97-11ee-ae23-a0f3c100ae18 slurm-wlm -- Several security issues
76c7a0f5-5928-11e4-adc7-001999f8d30b asterisk -- Asterisk Susceptibility to POODLE Vulnerability
76c8b690-340b-11eb-a2b7-54e1ad3d6335 xorg-server -- Multiple input validation failures in X server XKB extension
76d80b33-7211-11e7-998a-08606e47f965 jabberd -- authentication bypass vulnerability
76e0b133-6bfd-11d9-a5df-00065be4b5b6 newsfetch -- server response buffer overflow vulnerability
76e0bb86-b4cb-11eb-b9c9-6cc21735f730 PostgreSQL -- Memory disclosure in partitioned-table UPDATE ... RETURNING
76e2fcce-92d2-11ed-a635-080027f5fec9 emacs -- arbitary shell command execution vulnerability of ctags
76e59f55-4f7a-4887-bcb0-11604004163a libxml2 -- Multiple Issues
76ff65f4-17ca-4d3f-864a-a3d6026194fb mozilla -- multiple vulnerabilities
7700061f-34f7-11e9-b95c-b499baebfeaf OpenSSL -- Padding oracle vulnerability
770d7e91-72af-11e7-998a-08606e47f965 proftpd -- user chroot escape vulnerability
770d88cc-f6dc-4385-bdfe-497f8080c3fb electron22 -- multiple vulnerabilities
7721562b-e20a-11e6-b2e2-6805ca0b3d42 phpMyAdmin -- Multiple vulnerabilities
773ce35b-eabb-47e0-98ca-669b2b98107a electron{24,25} -- multiple vulnerabilities
773e7eb2-af19-4fc7-be7f-0f6a2523b98b electron31 -- multiple vulnerabilities
77420ebb-0cf4-11d9-8a8a-000c41e2cdad mysql -- heap buffer overflow with prepared statements
7761288c-d148-11e7-87e5-00e04c1ea73d mybb -- multiple vulnerabilities
7762d7ad-2e38-41d2-9785-c51f653ba8bd botan2 -- ECDSA side channel
7764b219-8148-11e8-aa4d-000e0cd7b374 zziplib - multiple vulnerabilities
77687355-52aa-11ea-b115-643150d3111d puppet6 -- Arbitrary Catalog Retrieval
776aaafc-939f-11ef-87ad-a8a15998b5cb tnef -- An attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message
777d7b9e-ab02-11e3-841e-60a44c524f57 wemux -- read-only can be bypassed
777edbbe-2230-11ec-8869-704d7b472482 chromium -- multiple vulnerabilities
77896891-b08a-11ea-937b-b42e99a1b9c3 vlc heap-based buffer overflow
779a2d55-8ba8-11db-81d5-00123ffe8333 evince -- Buffer Overflow Vulnerability
77a6f1c9-d7d2-11ee-bb12-001b217b3468 NodeJS -- Vulnerabilities
77b784bb-3dc6-11e4-b191-f0def16c5c1b nginx -- inject commands into SSL session vulnerability
77b7ffb7-e937-11e5-8bed-5404a68ad561 jpgraph2 -- XSS vulnerability
77b877aa-ec18-11ea-88f8-901b0ef719ab FreeBSD -- SCTP socket use-after-free bug
77b9f9bc-7fdf-11df-8a8d-0008743bf21a opera -- Data URIs can be used to allow cross-site scripting
77bb0541-c1aa-11e3-a5ac-001b21614864 dbus-glib -- privledge escalation
77c14729-dc5e-11de-92ae-02e0184b8d35 libtool -- Library Search Path Privilege Escalation Issue
77cceaef-e9a4-11da-b9f4-00123ffe8333 coppermine -- File Inclusion Vulnerabilities
77e0b631-e6cf-11e5-85be-14dae9d210b8 pidgin-otr -- use after free
77e2e631-e742-11e3-9a25-5404a6a6412c mumble -- multiple vulnerabilities
77f67b46-bd75-11e8-81b6-001999f8d30b asterisk -- Remote crash vulnerability in HTTP websocket upgrade
77fc311d-7e62-11ee-8290-a8a1599412c6 chromium -- security update
7801b1e1-99b4-42ac-ab22-7646235e7c16 aacplusenc -- denial of service
78348ea2-ec91-11d8-b913-000c41e2cdad acroread uudecoder input validation error
7844789a-9b1f-11ed-9a3f-b42e991fc52e net/krill -- DoS vulnerability
7850a238-680a-11d9-a9e7-0001020eed82 cups-lpr -- lppasswd multiple vulnerabilities
785c86b1-27d6-11e5-a4a5-002590263bf5 xen-kernel -- arm: vgic-v2: GICD_SGIR is not properly emulated
7862213c-5152-11e9-8b26-a4badb296695 dovecot -- Buffer overflow reading extension header
786a7d87-f826-11e6-9436-14dae9d5a9d2 fbsdmon -- information disclosure vulnerability
787d21b9-ca38-11e2-9673-001e8c75030d devel/subversion -- fsfs repositories can be corrupted by newline characters in filenames
787ef75e-44da-11e5-93ad-002590263bf5 php5 -- multiple vulnerabilities
7884d56f-f7a1-11d8-9837-000c41e2cdad gnomevfs -- unsafe URI handling
78992249-947c-11ea-92ab-00163e433440 FreeBSD -- Memory disclosure vulnerability in libalias
78abc022-0fee-11e6-9a1c-0014a5a57822 mercurial -- arbitrary code execution vulnerability
78ad2525-9d0c-11db-a5f6-000c6ec775d9 opera -- multiple vulnerabilities
78b4ebfb-c60b-11e5-bf36-6805ca0b3d42 phpmyadmin -- Full path disclosure vulnerability in SQL parser
78c25ed7-f3f9-11e0-8b5c-b482fe3f522d OpenTTD -- Buffer overflows in savegame loading
78c39232-a345-11e1-9d81-d0df9acfd7e5 sympa -- Multiple Security Bypass Vulnerabilities
78cc8a46-3e56-11e1-89b4-001ec9578670 OpenSSL -- multiple vulnerabilities
78e6c113-91c1-11ef-a904-2cf05da270f3 Gitlab -- vulnerabilities
78f06a6c-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- SCTP ICMPv6 error message vulnerability
78f2e491-312d-11ee-85f2-bd89b893fcb4 go -- multiple vulnerabilities
78f456fd-9c87-11dd-a55e-00163e000016 linux-flashplugin -- multiple vulnerabilities
78f5606b-f9d1-11dd-b79c-0030843d3802 tor -- multiple vulnerabilities
7913fe6d-2c6e-40ba-a7d7-35696f3db2b6 vscode -- Visual Studio Code Information Disclosure Vulnerability
791841a3-d484-4878-8909-92ef9ce424f4 patch -- multiple vulnerabilities
791a09c5-a086-11ed-954d-b42e991fc52e prometheus2 -- basic authentication bypass
791e8f79-e7d1-11e9-8b31-206a8a720317 Xpdf -- Multiple Vulnerabilities
79217c9b-e1d9-11d9-b875-0001020eed82 opera -- XMLHttpRequest security bypass
7927165a-0126-11e5-9d98-080027ef73ec dnsmasq -- remotely exploitable buffer overflow in release candidate
792bc222-c5d7-11db-9f82-000e0c2e438a libarchive -- Infinite loop in corrupt archives handling in libarchive
7932548e-3427-11e6-8e82-002590263bf5 drupal -- multiple vulnerabilities
793a0072-7822-11e9-81e2-005056a311d1 samba -- multiple vulnerabilities
793fb19c-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Linux compatibility layer incorrect futex handling
7943794f-707f-4e31-9fea-3bbf1ddcedc1 mozilla -- multiple vulnerabilities
7943e521-f648-11e2-8607-3c970e169bc2 bind -- denial of service vulnerability
79514fcd-feb4-11ed-92b5-b42e991fc52e Kanboard -- Clipboard based cross-site scripting (blocked with default CSP) in Kanboard
795442e7-c355-11e9-8224-5404a68ad561 vlc -- multiple vulnerabilities
795ccee1-c7ed-11e7-ad7d-001e2a3f778d konversation -- crash in IRC message parsing
79630c0c-8dcc-45d0-9908-4087fe1d618c squirrelmail -- XSS and remote code injection vulnerabilities
79789daa-8af8-4e21-a47f-e8a645752bdb ruby -- Object taint bypassing in DL and Fiddle in Ruby
79818ef9-2d10-11e2-9160-00262d5ed8ee typo3 -- Multiple vulnerabilities in TYPO3 Core
798f63e0-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Linux compatibility layer setgroups(2) system call
79b1f4ee-860a-11ef-b2dc-cbccbf25b7ea gitea -- token missing access control for packages
79b616d0-66d1-11dc-b25f-02e0185f8d72 kdm -- passwordless login vulnerability
79b65dc5-749f-11ec-8be6-d4c9ef517024 WordPress -- Multiple Vulnerabilities
79bbb8f8-f049-11e6-8a6a-bcaec565249c gtk-vnc -- bounds checking vulnerabilities
79bbec7e-8141-11e7-b5af-a4badb2f4699 FreeRadius -- Multiple vulnerabilities
79c1154d-d5a5-11da-8098-00123ffe8333 cacti -- ADOdb "server.php" Insecure Test Script Security Issue
79c68ef7-c8ae-4ade-91b4-4b8221b7c72a firefox -- Cross-origin restriction bypass using Fetch
79dfc135-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- TCP MD5 signature denial of service
79ea6066-b40e-11ec-8b93-080027b24e86 mediawiki -- multiple vulnerabilities
79f401cd-27e6-11e5-a4a5-002590263bf5 xen-tools -- Unmediated PCI command register access in qemu
79fa9f23-9725-11eb-b530-7085c2fb2c14 upnp -- stack overflow vulnerability
7a09a8df-ca41-11df-aade-0050568f000c FreeBSD -- Lost mbuf flag resulting in data corruption
7a1ab8d4-35c1-11de-9672-0030843d3802 drupal -- cross site scripting
7a1b2624-6a89-11ee-af06-5404a68ad561 traefik -- Resource exhaustion by malicious HTTP/2 client
7a282e49-95b6-11e2-8433-0800273fe665 dns/bind9* -- Malicious Regex Can Cause Memory Exhaustion
7a2e0063-0e4e-11e8-94c0-5453ed2e2b49 p7zip-codec-rar -- insufficient error handling
7a31dfba-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Insecure default snmpd.config permissions
7a31e0de-5b6d-11e6-b334-002590263bf5 bind -- denial of service vulnerability
7a425536-74f7-4ce4-9768-0079a9d44d11 zeek -- potential DoS vulnerabilities
7a42852d-0347-11ef-9f97-a8a1599412c6 chromium -- multiple security fixes
7a4f2aca-9d40-11da-8c1d-000e0c2e438a FreeBSD -- Local kernel memory disclosure
7a59e283-c60b-11e5-bf36-6805ca0b3d42 phpmyadmin -- XSS vulnerability in SQL editor
7a7129ef-e790-11ee-a1c0-0050569f0b83 security/shibboleth-idp -- CAS service SSRF
7a7891fc-6318-447a-ba45-31d525ec11a0 jenkins -- multiple vulnerabilities
7a7c5853-10a3-11dd-8eb8-00163e000016 libxine -- array index vulnerability
7a8a74d1-9c34-11e4-a40b-5453ed2e2b49 kde-runtime -- incorrect CBC encryption handling
7a8b6170-a889-11ed-bbae-6cc21735f730 PostgreSQL server -- Client memory disclosure when connecting, with Kerberos, to modified server.
7a921e9e-68b1-11d9-9e1e-c296ac722cb3 squid -- no sanity check of usernames in squid_ldap_auth
7a92e958-5207-11e7-8d7c-6805ca0b3d42 rt and dependent modules -- multiple security vulnerabilities
7a9d5dfe-c507-11d8-8898-000d6111a684 isc-dhcp3-server buffer overflow in logging mechanism
7ac28df1-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Linux compatibility layer issetugid(2) system call
7ade3c38-6d1f-11ef-ae11-b42e991fc52e firefox -- Potential memory corruption and exploitable crash
7ae0be99-d8bb-11e6-9b7f-d43d7e971a1b phpmailer -- Remote Code Execution
7ae61870-9dd2-4884-a2f2-f19bb5784d09 mozilla -- multiple vulnerabilities
7af2fb85-8584-11e0-96b7-00300582f9fc ViewVC -- user-reachable override of cvsdb row limit
7afc5e56-156d-11e8-95f2-005056925db4 irssi -- multiple vulnerabilities
7b0208ff-3f65-4e16-8d4d-48fd9851f085 leafnode fetchnews denial-of-service triggered by missing header
7b1a4a27-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Multiple OpenSSL vulnerabilities
7b35a77a-0151-11e7-ae1b-002590263bf5 ikiwiki -- authentication bypass vulnerability
7b55f5c2-c58b-11da-9110-00123ffe8333 phpmyadmin -- 'set_theme' Cross-Site Scripting
7b5a8e3b-52cc-11e8-8c7a-9c5c8e75236a wget -- cookie injection vulnerability
7b630362-f468-11ea-a96c-08002728f74c Rails -- Potential XSS vulnerability
7b6a11b5-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Incorrect argument validation in sysarch(2)
7b81fc47-239f-11d9-814e-0001020eed82 apache2 -- SSL remote DoS
7b929503-911d-11ed-a925-3065ec8fd3ec chromium -- multiple vulnerabilities
7b97b32e-27c4-11ea-9673-4c72b94353b5 wordpress -- multiple issues
7ba5a3d0-4b18-11e9-adcb-001b217b3468 Gitlab -- Vulnerability
7ba65bfd-2a40-11e1-b96e-00215af774f0 unbound -- denial of service vulnerabilities from nonstandard redirection and denial of existence
7bb127c1-a5aa-11db-9ddc-0011098b2f36 joomla -- multiple remote vulnerabilities
7bba5b3b-1b7f-11ec-b335-d4c9ef517024 mod_auth_mellon -- Redirect URL validation bypass
7bbc0e8c-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Buffer overflow in keyboard driver
7bbc3016-de63-11e5-8fa8-14dae9d210b8 tomcat -- multiple vulnerabilities
7be92050-a450-11e2-9898-001060e06fd4 libxml -- Integer overflow
7bfd797c-716d-11e4-b008-001999f8d30b asterisk -- Multiple vulnerabilities
7c0bac69-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Incorrect argument handling in sendmsg(2)
7c0d71a9-9d48-11eb-97a0-e09467587c17 chromium -- multiple vulnerabilities
7c0fecd6-f42f-11e1-b17b-000c2977ec30 mediawiki -- multiple vulnerabilities
7c188c55-0cb0-11d9-8a8a-000c41e2cdad mozilla -- NULL bytes in FTP URLs
7c217849-f7d7-11ee-a490-84a93843eb75 OpenSSL -- Unbounded memory growth with session handling in TLSv1.3
7c27192f-0bc3-11e7-9940-b499baebfeaf mysql -- denial of service vulnerability
7c3a02b9-3273-4426-a0ba-f90fad2ff72e mozilla -- multiple vulnerabilities
7c492ea2-3566-11e0-8e81-0022190034c0 plone -- Remote Security Bypass
7c555ce3-658d-4589-83dd-4b6a31c5d610 RabbitMQ-C -- integer overflow leads to heap corruption
7c5bd5b8-d652-11dd-a765-0030843d3802 mplayer -- twinvq processing buffer overflow vulnerability
7c5d64dd-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Kernel stack disclosure in Linux compatibility layer
7c63775e-be31-11e5-b5fe-002590263bf5 libarchive -- multiple vulnerabilities
7c750960-b129-11e8-9fcd-080027f43a02 Information disclosure - Gitea leaks email addresses
7c75d48c-429b-11db-afae-000c6ec775d9 linux-flashplugin7 -- arbitrary code execution vulnerabilities
7c769c89-53c2-11e1-8e52-00163e22ef61 glpi -- remote attack via crafted POST request
7c920bb7-4b5f-11e1-9f47-00e0815b8da8 sudo -- format string vulnerability
7ca2a709-103b-11dc-8e82-00001cd613f9 findutils -- GNU locate heap buffer overrun
7cad4795-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Kernel stack disclosure in 4.3BSD compatibility layer
7caebe30-d7f1-11e6-a9a5-b499baebfeaf openssl -- timing attack vulnerability
7cb12ee0-4a13-11ed-8ad9-3065ec8fd3ec chromium -- mulitple vulnerabilities
7cc003cb-83b9-11ee-957d-b42e991fc52e typo3 -- Multiple vulnerabilities
7ccd4def-c1be-11e3-9d09-000c2980a9f3 OpenSSL -- Local Information Disclosure
7cf058d8-158d-11e7-ba2c-e8e0b747a45a chromium -- multiple vulnerabilities
7cfcea05-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Multiple ntp vulnerabilities
7d08e608-5e95-11e6-b334-002590263bf5 BIND,Knot,NSD,PowerDNS -- denial over service via oversized zone transfers
7d09b9ee-e0ba-11e5-abc4-6fb07af136d2 exim -- local privillege escalation
7d138476-7710-11e7-88a1-e8e0b747a45a chromium -- multiple vulnerabilities
7d2336c2-4607-11e1-9f47-00e0815b8da8 spamdyke -- Buffer Overflow Vulnerabilities
7d239578-7ff2-11dd-8de5-0030843d3802 horde -- multiple vulnerabilities
7d2aac52-9c6b-11d9-99a7-000a95bc6fae mozilla -- heap buffer overflow in GIF image processing
7d3d94d3-2810-11ec-9c51-3065ec8fd3ec chromium -- multiple vulnerabilities
7d40edd1-901e-11e6-a590-14dae9d210b8 VirtualBox -- undisclosed vulnerabilities
7d4f4955-600a-11e6-a6c3-14dae9d210b8 FreeBSD -- Heap vulnerability in bspatch
7d52081f-2795-11da-bc01-000e0c2e438a squirrelmail -- _$POST variable handling allows for various attacks
7d53d8da-d07a-11e9-8f1a-001999f8d30b asterisk -- Remote Crash Vulnerability in audio transcoding
7d631146-5769-11ef-b618-1c697a616631 AMD CPUs -- Guest Memory Vulnerabilities
7d64d00c-43e3-11e6-ab34-002590263bf5 quassel -- remote denial of service
7d6be8d4-f812-11ed-a7ff-589cfc0f81b0 phpmyfaq -- multiple vulnerabilities
7d7221ee-d334-11ea-bc50-080027846a02 Python -- multiple vulnerabilities
7d7e05fb-64da-435a-84fb-4061493b89b9 kanboard -- multiple privilege escalation vulnerabilities
7da0417f-6b24-11e8-84cc-002590acae31 gnupg -- unsanitized output (CVE-2018-12020)
7da1da96-24bb-11e6-bd31-3065ec8fd3ec chromium -- multiple vulnerabilities
7dbb7197-7b68-11dd-80ba-000bcdf0a03b FreeBSD -- nmount(2) local arbitrary code execution
7dfed67b-20aa-11e3-b8d8-0025905a4771 mozilla -- multiple vulnerabilities
7e01df39-db7e-11e5-b937-00e0814cab4e jenkins -- multiple vulnerabilities
7e079ce2-6b51-11ef-9a62-002590c1f29c FreeBSD -- umtx Kernel panic or Use-After-Free
7e1a508f-7167-47b0-b9fc-95f541933a86 electron26 -- multiple vulnerabilities
7e36c369-10c0-11e6-94fa-002590263bf5 wireshark -- multiple vulnerabilities
7e3d3e9a-7d8f-11e7-a02b-d43d7ef03aa6 Flash Player -- multiple vulnerabilities
7e4e5c53-a56c-11e0-b180-00216aa06fc2 phpmyadmin -- multiple vulnerabilities
7e53f9cc-656d-11e9-8e67-206a8a720317 FreeBSD -- SAE side-channel attacks
7e580822-8cd8-11d9-8c81-000a95bc6fae postnuke -- cross-site scripting (XSS) vulnerabilities
7e61a839-b714-11e3-8195-001966155bea file -- out-of-bounds access in search rules with offsets from input file
7e61cf44-6549-11e6-8286-00248c0c745d Rails 4 -- Unsafe Query Generation Risk in Active Record
7e69f00d-632a-11e0-9f3a-001d092480a4 isc-dhcp-client -- dhclient does not strip or escape shell meta-characters
7e6e932f-617b-11ef-8a7d-b42e991fc52e firefox -- Multiple vulnerabilities
7e97b288-c7ca-11d9-9e1e-c296ac722cb3 squid -- DNS lookup spoofing vulnerability
7e9cc7fd-6b3e-46c5-ad6d-409d90d41bbf RabbitMQ-C -- auth credentials visible in commandline tool options
7ed5779c-e4c7-11eb-91d7-08002728f74c Ruby -- multiple vulnerabilities
7ed7c36f-ddaf-11e5-b2bd-002590263bf5 xen-kernel -- PV superpage functionality missing sanity checks
7edac52a-66cd-11e0-9398-5d45f3aa24f0 krb5 -- MITKRB5-SA-2011-003, KDC vulnerable to double-free when PKINIT enabled
7f0fbb30-e462-11e5-a3f3-080027ef73ec PuTTY - old-style scp downloads may allow remote code execution
7f13607b-6948-11d9-8937-00065be4b5b6 newspost -- server response buffer overflow vulnerability
7f163c81-3b12-11eb-af2a-080027dbe4b7 glpi -- SQL injection for all usages of "Clone" feature
7f242313-aea5-11eb-8151-67f74cf7c704 go -- net/http: ReadRequest can stack overflow due to recursion with very large headers
7f3fdef7-51d2-11da-8e93-0010dc4afb40 p5-Mail-SpamAssassin -- long message header denial of service
7f448dc1-82ca-11e1-b393-20cf30e32f6d bugzilla Cross-Site Request Forgery
7f5ccb1d-439b-11e1-bc16-0023ae8e59f0 tomcat -- Denial of Service
7f6108d2-cea8-11e0-9d58-0800279895ea apache -- Range header DoS vulnerability
7f6146aa-2157-11e9-9ba0-4c72b94353b5 gitea -- multiple vulnerabilities
7f645ee5-7681-11e5-8519-005056ac623e Git -- Execute arbitrary code
7f6dd1bd-7d99-11d9-a9e7-0001020eed82 ngircd -- buffer overflow vulnerability
7f7d6412-bae5-11e9-be92-3085a9a95629 doas -- Prevent passing of environment variables
7f829d44-7509-11ea-b47c-589cfc0f81b0 HAproxy -- serious vulnerability affecting the HPACK decoder used for HTTP/2
7f8cecea-f199-11da-8422-00123ffe8333 MySQL -- SQL-injection security vulnerability
7f8d5435-125a-11ed-9a69-10c37b4ac2ea go -- decoding big.Float and big.Rat can panic
7f9b696f-f11b-11e6-b50e-5404a68ad561 ffmpeg -- heap overflow in lavf/mov.c
7fadc049-2ba0-11dc-9377-0016179b2dd5 wireshark -- Multiple problems
7fb9e739-0e6d-11e1-87cd-00235a5f2c9a kdeutils4 -- Directory traversal vulnerability
7fbfe159-3438-11d9-a9e7-0001020eed82 squirrelmail -- cross site scripting vulnerability
7fc3e827-64a5-11e8-aedb-00224d821998 strongswan -- Fix Denial-of-Service Vulnerability strongSwan (CVE-2018-10811, CVE-2018-5388)
7fcf1727-be71-11db-b2ec-000c6ec775d9 php -- multiple vulnerabilities
7fda7920-7603-11e6-b362-001999f8d30b asterisk -- Crash on ACK from unknown endpoint
7fe5b84a-78eb-11e2-8441-00e0814cab4e jenkins -- multiple vulnerabilities
7fe7df75-6568-11e6-a590-14dae9d210b8 End of Life Ports
7fff2b16-b0ee-11e6-86b8-589cfc054129 wireshark -- multiple vulnerabilities
800e8bd5-3acb-11dd-8842-001302a18722 xorg -- multiple vulnerabilities
8012a79d-5d21-11db-bb8d-00123ffe8333 clamav -- CHM unpacker and PE rebuilding vulnerabilities
8015600f-2c80-11e0-9cc1-00163e5bf4f9 maradns -- denial of service when resolving a long DNS hostname
802961eb-7a89-11ef-bdd7-a0423f48a938 frr - BGP
803879e9-4195-11e7-9b08-080027ef73ec OpenEXR -- multiple remote code execution and denial of service vulnerabilities
805603a1-3e7a-11df-a5a1-0050568452ac dojo -- cross-site scripting and other vulnerabilities
8057d198-4d26-11ef-8e64-641c67a117d8 znc -- remote code execution vulnerability
8065d37b-8e7c-4707-a608-1b0a2b8509c3 mozilla -- multiple vulnerabilities
80771b89-f57b-11e2-bf21-b499baab0cbe gnupg -- side channel attack on RSA secret keys
80815c47-e84f-11ee-8e76-a8a1599412c6 chromium -- multiple security fixes
8091fcea-f35e-11d8-81b0-000347a4fa7d a2ps -- insecure command line argument handling
8092b820-1d6f-11dc-a0b2-001921ab2fa4 p5-Mail-SpamAssassin -- local user symlink-attack DoS vulnerability
80a897a2-c1a6-11e6-ae1b-002590263bf5 xen-kernel -- x86 CMPXCHG8B emulation fails to ignore operand size override
80aa98e0-97b4-11de-b946-0030843d3802 dnsmasq -- TFTP server remote code injection vulnerability
80ad6d6c-b398-457f-b88f-bf6be0bbad44 electron27 -- multiple vulnerabilities
80adc394-ddaf-11e5-b2bd-002590263bf5 xen-kernel -- VMX: intercept issue with INVLPG on non-canonical address
80af2677-d6c0-11e2-8f5e-001966155bea tor -- guard discovery
80b6d6cc-c970-11df-bb18-0015587e2cc1 openx -- remote code execution vulnerability
80c66af0-d1c5-449e-bd31-63b12525ff88 ffmpeg -- out-of-bounds array access
80e057e7-2f0a-11ed-978f-fcaa147e860e Python -- multiple vulnerabilities
80e846ff-27eb-11e5-a4a5-002590263bf5 xen-kernel -- GNTTABOP_swap_grant_ref operation misbehavior
80f13884-4d4c-11de-8811-0030843d3802 slim -- local disclosure of X authority magic cookie
80f9dbd3-8eec-11eb-b9e8-3525f51429a0 nettle 3.7.2 -- fix serious ECDSA signature verify bug
80fbe184-2358-11ef-996e-40b034455553 minio -- unintentional information disclosure
810a5197-e0d9-11dc-891a-02061b08fc24 mozilla -- multiple vulnerabilities
810df820-3664-11e1-8fe3-00215c6a37bb WordPress -- cross site scripting vulnerability
81313647-2d03-11d8-9355-0020ed76ef5a ElGamal sign+encrypt keys created by GnuPG can be compromised
81326883-2905-11e5-a4a5-002590263bf5 devel/ipython -- CSRF possible remote execution vulnerability
81433129-2916-11e7-ad3e-00e04c1ea73d weechat -- multiple vulnerabilities
814af1be-ec63-11ee-8e76-a8a1599412c6 chromium -- multiple security fixes
815bf172-ab9e-4c4b-9662-d18b0054330d electron{31,32} -- multiple vulnerabilities
815dbcf9-a2d6-11e3-8088-002590860428 file -- denial of service
816fdd8b-3d14-11d9-8818-008088034841 Cyrus IMAPd -- IMAPMAGICPLUS preauthentification overflow
81826d12-317a-11e2-9186-406186f3d89d weechat -- Arbitrary shell command execution via scripts
818b2bcb-a46f-11e9-bed9-001999f8d30b asterisk -- Remote crash vulnerability with MESSAGE messages
81946ace-6961-4488-a164-22d58ebc8d66 rails-html-sanitizer -- possible XSS vulnerability
81b4c118-c586-11e4-8495-6805ca0b3d42 phpMyAdmin -- Risk of BREACH attack due to reflected parameter
81d9dc0c-1988-11df-8e66-0019996bc1f7 squid -- Denial of Service vulnerability in HTCP
81da673e-dfe1-11e2-9389-08002798f6ff apache-xml-security-c -- heap overflow during XPointer evaluation
81e2b308-4a6c-11e4-b711-6805ca0b3d42 rt42 -- vulnerabilities related to shellshock
81f127a8-0038-11da-86bc-000e0c2e438a vim -- vulnerabilities in modeline handling: glob, expand
81f1fdc2-7ec7-11e3-a6c6-00163e1ed244 virtualbox-ose -- local vulnerability
81f866ad-41a4-11e3-a4af-0025905a4771 mozilla -- multiple vulnerabilities
81f9d6a4-ddaf-11e5-b2bd-002590263bf5 xen-kernel -- VMX: guest user mode may crash guest with non-canonical RIP
81fc1076-1286-11e4-bebd-000c2980a9f3 tomcat -- multiple vulnerabilities
81fc7705-b002-11e6-b20a-14dae9d5a9d2 teeworlds -- Remote code execution
81fcc2f9-e15a-11e9-abbf-800dd28b22bd mantis -- multiple vulnerabilities
821afaa2-9e9a-11dc-a7e3-0016360406fa liveMedia -- DoS vulnerability
8247af0d-183b-11ef-9f97-a8a1599412c6 chromium -- multiple security fixes
82595123-e8b8-11e4-a008-047d7b492d07 libtasn1 -- stack-based buffer overflow in asn1_der_decoding
82752070-0349-11e7-b48d-00e04c1ea73d wordpress -- multiple vulnerabilities
827b95ff-290e-11ed-a2e7-6c3be5272acd Grafana -- Unauthorized file disclosure
827bc2b7-95ed-11df-9160-00e0815b8da8 git -- buffer overflow vulnerability
82830965-3073-11ef-a17d-5404a68ad561 traefik -- Azure Identity Libraries Elevation of Privilege Vulnerability
82894193-ffd4-11e7-8b91-e8e0b747a45a chromium -- out of bounds read
82a41084-6ce7-11da-b90c-000e0c2e438a mantis -- "t_core_path" file inclusion vulnerability
82b3ca2a-8c07-11e5-bd18-002590263bf5 moodle -- multiple vulnerabilities
82b55df8-4d5a-11de-8811-0030843d3802 openssl -- denial of service in DTLS implementation
82b702e0-1907-11e6-857b-00221503d280 imagemagick -- buffer overflow
82c07dfa-9016-11e9-af2f-712c38aa3e4c GraphicsMagick -- multiple vulnerabilities
82cfd919-8213-11e2-9273-902b343deec9 sudo -- Potential bypass of tty_tickets constraints
8301c04d-71df-11e5-9fcb-00262d5ed8ee chromium -- multiple vulnerabilities
83041ca7-d690-11e6-9171-14dae9d210b8 libdwarf -- multiple vulnerabilities
8305e215-1080-11e5-8ba2-000c2980a9f3 openssl -- multiple vulnerabilities
830855f3-ffcc-11ec-9d41-d05099c8b5a7 mat2 -- directory traversal/arbitrary file read during ZIP file processing
83117378-f773-4617-bf74-477d569dcd74 chromium -- multiple security fixes
83119e27-5d7c-11d8-80e3-0020ed76ef5a nap allows arbitrary file access
831a6a66-79fa-11d9-a9e7-0001020eed82 ethereal -- multiple protocol dissectors vulnerabilities
832e9d75-5bfc-11d9-a9e7-0001020eed82 kdelibs3 -- konqueror FTP command injection vulnerability
832fd11b-3b11-11eb-af2a-080027dbe4b7 glpi -- Remote Code Execution (RCE) via the backup functionality
83350009-881e-11e5-ab94-002590263bf5 xen-kernel -- Long latency populate-on-demand operation is not preemptible
8337251b-b07b-11ee-b0d7-84a93843eb75 OpenSSL -- Vector register corruption on PowerPC
8338a20f-9573-11d8-9366-0020ed76ef5a xchat remotely exploitable buffer overflow (Socks5)
833b469b-5247-11ee-9667-080027f5fec9 curl -- HTTP headers eat all memory
83421018-b3ef-11da-a32d-000c6ec775d9 linux-flashplugin -- arbitrary code execution vulnerability
834591a9-c82f-11e0-897d-6c626dd55a41 mozilla -- multiple vulnerabilities
83466f76-aefe-11ec-b4b6-d05099c0c059 gitea -- Open Redirect on login
835256b8-46ed-11d9-8ce0-00065be4b5b6 mysql -- mysql_real_connect buffer overflow vulnerability
83574d5a-f828-11dd-9fdf-0050568452ac codeigniter -- arbitrary script execution in the new Form Validation class
83725c91-7c7e-11de-9672-00e0815b8da8 BIND -- Dynamic update message remote DoS
8375a73f-01bf-11da-bc08-0001020eed82 gnupg -- OpenPGP symmetric encryption vulnerability
837b9fb2-0595-11da-86bc-000e0c2e438a zlib -- buffer overflow vulnerability
838fa84a-0e25-11e5-90e4-d050996490d0 redis -- EVAL Lua Sandbox Escape
83a28417-27e3-11e5-a4a5-002590263bf5 xen-kernel -- Hypervisor memory corruption due to x86 emulator flaw
83a418cc-2182-11e4-802c-20cf30e32f6d subversion -- several vulnerabilities
83a548b5-4fa5-11e8-9a8e-001e2a3f778d KWallet-PAM -- Access to privileged files
83a7a720-07d8-11e5-9a28-001e67150279 rest-client -- session fixation vulnerability
83b29e3f-886f-439f-b9a8-72e014479ff9 py-dparse -- REDoS vulnerability
83b38a2c-413e-11e5-bfcf-6805ca0b3d42 RT -- two XSS vulnerabilities
83d7d149-b965-11de-a515-0022156e8794 Enhanced cTorrent -- stack-based overflow
83eb9374-7b97-11ed-be8f-3065ec8fd3ec chromium -- multiple vulnerabilities
83f9e943-e664-11e1-a66d-080027ef73ec fetchmail -- two vulnerabilities in NTLM authentication
84065569-7fb4-11e2-9c5a-000d601460a4 otrs -- XSS vulnerability could lead to remote code execution
84147b46-e876-486d-b746-339ee45a8bb9 flash -- remote code execution
84203724-296b-11e4-bebd-000c2980a9f3 file -- buffer overruns and missing buffer size tests
84237895-8f39-11d8-8b29-0020ed76ef5a neon format string vulnerabilities
8429711b-76ca-474e-94a0-6b980f1e2d47 mozilla -- Speculative execution side-channel attack
842bafdd-be2f-11dd-a578-0030843d3802 openoffice -- arbitrary code execution vulnerabilities
842cd117-ba54-11e5-9728-002590263bf5 prosody -- multiple vulnerabilities
843a4641-9816-11e2-9c51-080027019be0 libxml2 -- cpu consumption Dos
8441957c-f9b4-11e0-a78a-bcaec565249c Xorg server -- two vulnerabilities in X server lock handling code
84479a62-ca5f-11d9-b772-000c29b00e99 fswiki -- XSS problem in file upload form
844cf3f5-9259-4b3e-ac9e-13ca17333ed7 ruby -- DoS vulnerability in REXML
845f8430-d0ee-4134-ae35-480a3e139b8a py39-joblib -- arbitrary code execution
84630f4a-cd8c-11da-b7b9-000c6ec775d9 mozilla -- multiple vulnerabilities
8469d41c-a960-11e4-b18e-bcaec55be5e5 rabbitmq -- Security issues in management plugin
8471bb85-6fb0-11d8-873f-0020ed76ef5a GNU Anubis buffer overflows and format string vulnerabilities
847ade05-6717-11d8-b321-000a95bc6fae libxml2 stack buffer overflow in URI parsing
847f16e5-9406-11ed-a925-3065ec8fd3ec security/tor -- SOCKS4(a) inversion bug
848539dc-0458-11df-8dd7-002170daae37 dokuwiki -- multiple vulnerabilities
848bdd06-f93a-11eb-9f7d-206a8a720317 x11/cde -- Local privilege escalation via CDE dtsession
84ab03b6-6c20-11ed-b519-080027f5fec9 rubygem-cgi -- HTTP response splitting vulnerability
84ab58cf-e4ac-11d8-9b0a-000347a4fa7d gnutls -- certificate chain verification DoS
84c7ea88-bf04-4bdc-973b-36744bf540ab flash -- multiple vulnerabilities
84ca56be-e1de-11e8-bcfd-00e04c1ea73d NGINX -- Multiple vulnerabilities
84ce26c3-5769-11e9-abd6-001b217b3468 clamav -- multiple vulnerabilities
84d3fbb2-e607-11db-8a32-000c76189c4c mcweject -- exploitable buffer overflow
84dc49b0-b267-11e5-8a5b-00262d5ed8ee mini_httpd -- buffer overflow via snprintf
84fdd1bb-9d37-11e5-8f5c-002590263bf5 passenger -- client controlled header overwriting
8505e013-c2b3-11e4-875d-000c6e25e3e9 chromium -- multiple vulnerabilities
85069fb6-e15b-11d9-83cf-0010dc5df42d razor-agents -- denial of service vulnerability
8514b6e7-6f0f-11dd-b3db-001c2514716c joomla -- flaw in the reset token validation
851a0eea-88aa-11e5-90e7-b499baebfeaf MySQL - Multiple vulnerabilities
851ce3e4-8b03-11ef-84e9-901b0e9408dc element-web -- Potential exposure of access token via authenticated media
85349584-3ba4-11eb-919d-08002728f74c jasper -- heap overflow vulnerability
854c2afb-4424-11ed-af97-adcabf310f9b go -- multiple vulnerabilities
855cd9fa-c452-11da-8bff-000ae42e9b93 pubcookie-login-server -- cross site scripting vulnerability
856a6f84-8b30-11de-8062-00e0815b8da8 GnuTLS -- improper SSL certificate verification
856b88bf-7984-11e6-81e7-d050996490d0 mysql -- Remote Root Code Execution
8579074c-839f-11ec-a3b2-005056a311d1 samba -- Multiple Vulnerabilities
857be71a-a4b0-11ec-95fc-3065ec8fd3ec chromium -- multiple vulnerabilities
8581189c-bd5f-11de-8709-0017a4cccfc6 Xpdf -- Multiple Vulnerabilities
85851e4f-67d9-11e7-bc37-00505689d4ae samba -- Orpheus Lyre mutual authentication validation bypass
85b0bbc8-a7a5-11dd-8283-001c2514716c phpmyadmin -- Cross-Site Scripting Vulnerability
85d76f02-5380-11d9-a9e7-0001020eed82 mplayer -- multiple vulnerabilities
85d976be-93e3-11ec-aaad-14dae9d5a9d2 The Update Framwork -- path traversal vulnerability
85e19dff-e606-11d8-9b0a-000347a4fa7d ripMIME -- decoding bug allowing content filter bypass
85e2c7eb-b74b-11e7-8546-5cf3fcfdd1f1 irssi -- multiple vulnerabilities
85eb4e46-cf16-11e5-840f-485d605f4717 php -- multiple vulnerabilities
85ebfa0c-5d8d-11e7-93f7-d43d7e971a1b GitLab -- Various security issues
85edfb6a-43a5-11d9-a9e7-0001020eed82 sudoscript -- signal delivery vulnerability
85f33a8d-492f-11e2-aa75-003067c2616f opera -- execution of arbitrary code
85fca718-99f6-11ea-bf1d-08002728f74c Rails -- multiple vulnerabilities
8604121c-7fc2-11ea-bcac-7781e90b0c8f openvpn -- illegal client float can break VPN session for other users
86224a04-26de-11ea-97f2-001a8c5c04b6 cacti -- multiple vulnerabilities
86291013-16e6-11e8-ae9f-d43d7e971a1b GitLab -- multiple vulnerabilities
862d6ab3-c75e-11e6-9f98-20cf30e32f6d Apache httpd -- several vulnerabilities
863f95d3-3df1-11dc-b3d3-0016179b2dd5 mutt -- buffer overflow vulnerability
864e6f75-2372-11e5-86ff-14dae9d210b8 node, iojs, and v8 -- denial of service
86526ba4-53c8-11db-8f1a-000a48049292 phpbb -- NULL byte injection vulnerability
8656cf5f-4170-11e6-8dfe-002590263bf5 moodle -- multiple vulnerabilities
8657eedd-b423-11ec-9559-001b217b3468 Gitlab -- multiple vulnerabilities
865863af-fb5e-11e4-8fda-002590263bf5 py-salt -- potential shell injection vulnerabilities
8665ebb9-2237-11da-978e-0001020eed82 firefox & mozilla -- buffer overflow vulnerability
8675efd5-e22c-11e1-a808-002354ed89bc sudosh -- buffer overflow
8685d412-8468-11df-8d45-001d7d9eb79a kvirc -- multiple vulnerabilities
8688d5cd-328c-11da-a263-0001020eed82 cfengine -- arbitrary file overwriting vulnerability
86a4d810-1884-11dd-a914-0016179b2dd5 mt-daapd -- integer overflow
86a98b57-fb8e-11d8-9343-000a95bc6fae krb5 -- double-free vulnerabilities
86ada694-8b30-11de-b9d0-000c6e274733 memcached -- memcached stats maps Information Disclosure Weakness
86b8b655-4d1a-11df-83fb-0015587e2cc1 krb5 -- KDC double free vulnerability
86baa0d4-c997-11e0-8a8e-00151735203a OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system
86c05550-12c1-11dd-bab7-0016179b2dd5 mksh -- TTY attachment privilege escalation
86c330fe-bbae-4ca7-85f7-5321e627a4eb gitea -- multiple issues
86c3c66e-b2f5-11e5-863a-b499baebfeaf unzip -- multiple vulnerabilities
86c89abf-2d91-11e9-bf3e-a4badb2f4699 FreeBSD -- File description reference count leak
86cc5c6f-d2b4-11da-a672-000e0c2e438a crossfire-server -- denial of service and remote code execution vulnerability
8706e097-6db7-11ee-8744-080027f5fec9 redis -- Possible bypassing Unix socket permissions
870d59b0-c6c4-11ea-8015-e09467587c17 chromium -- multiple vulnerabilities
87106b67-be13-11dd-a578-0030843d3802 cups -- potential buffer overflow in PNG reading code
8719b935-8bae-41ad-92ba-3c826f651219 python 2.7 -- multiple vulnerabilities
871d93f9-06aa-11ed-8d5f-080027f5fec9 redis -- Potential remote code execution vulnerability
87261557-a450-11e2-9898-001060e06fd4 FreeBSD -- Network ACL mishandling in mountd(8)
872623af-39ec-11dc-b8cc-000fea449b8a tomcat -- multiple vulnerabilities
87270ba5-03d3-11ea-b81f-3085a9a95629 urllib3 -- multiple vulnerabilities
8727b513-855b-11ef-9e50-6805ca2fa271 powerdns-recursor -- denial of service
872ae5be-29c0-11de-bdeb-0030843d3802 ziproxy -- multiple vulnerability
873a6542-5b8d-11da-b96e-000fb586ba73 horde -- Cross site scripting vulnerabilities in MIME viewers
8745c67e-7dd1-4165-96e2-fcf9da2dc5b5 gsoap -- remote code execution via via overflow
875e4cf8-3f0e-11e6-b3c8-14dae9d210b8 dnsmasq -- denial of service
876768aa-ab1e-11e5-8a30-5453ed2e2b49 dpkg -- stack-based buffer overflow
87679fcb-be60-11e9-9051-4c72b94353b5 NGINX -- Multiple vulnerabilities
877e918e-5362-11d9-96d4-00065be4b5b6 mpg123 -- playlist processing buffer overflow vulnerability
87917d6f-ba76-11de-bac2-001a4d563a0f django -- denial-of-service attack
879b0242-c5b6-11e0-abd1-0017f22d6707 dtc -- multiple vulnerabilities
87a07de1-e55e-4d51-bb64-8d117829a26a mail/dovecot -- multiple vulnerabilities
87cc48fd-5fdd-11d8-80e3-0020ed76ef5a mnGoSearch buffer overflow in UdmDocToTextBuf()
880552c4-f63f-11eb-9d56-7186043316e9 go -- net/http: panic due to racy read of persistConn after handler panic
880bca8f-e201-11e9-8af7-08002720423d mongodb -- Attach IDs to users
8816bf3a-7929-11df-bcce-0018f3e2eb82 tiff -- Multiple integer overflows
88188a8c-eff6-11d9-8310-0001020eed82 phppgadmin -- "formLanguage" local file inclusion vulnerability
88260dfe-3d21-11dc-b3d3-0016179b2dd5 phpsysinfo -- url Cross-Site Scripting
8827134c-1a8f-11eb-9bb0-08002725d892 tmux -- stack overflow in CSI parsing
882a38f9-17dd-11ec-b335-d4c9ef517024 Apache httpd -- multiple vulnerabilities
882ef43b-901f-11d9-a22c-0001020eed82 phpmyadmin -- arbitrary file include and XSS vulnerabilities
8838abf0-bc47-11ec-b516-0897988a1c07 Asterisk -- multiple vulnerabilities
884fced7-7f1c-11dd-a66a-0019666436c2 wordpress -- remote privilege escalation
88754d55-521a-11ee-8290-a8a1599412c6 chromium -- multiple vulnerabilities
88760f4d-8ef7-11ea-a66d-4b2ef158be83 mailman -- arbitrary content injection vulnerability via options or private archive login pages
887eb570-27d3-11ee-adba-c80aa9043978 OpenSSH -- remote code execution via a forwarded agent socket
888a0262-f0d9-11e3-ba0c-b4b52fce4ce8 mozilla -- multiple vulnerabilities
889061af-c427-11d9-ac59-02061b08fc24 gaim -- remote crash on some protocols
8899298f-5a92-11eb-8558-3085a9a47796 cloud-init -- Wrong access permissions of authorized keys
889e35f4-f6a0-11e8-82dc-fcaa147e860e moodle -- Login CSRF vulnerability
88a77ad8-77b1-11e7-b5af-a4badb2f4699 Varnish -- Denial of service vulnerability
88d00176-058e-11ea-bd1c-3065ec8fd3ec chromium -- multiple vulnerabilities
88dfd92f-3b9c-11eb-929d-d4c9ef517024 LibreSSL -- NULL pointer dereference
88f75070-abcf-11e5-83d3-6805ca0b3d42 phpMyAdmin -- path disclosure vulnerability
88ff90f2-6e43-11d9-8c87-000a95bc6fae mod_dosevasive -- insecure temporary file creation
890b6b22-70fa-11e4-91ae-5453ed2e2b49 kwebkitpart, kde-runtime -- insufficient input validation
894f2491-6834-11ee-b06f-0050569ceb3a glpi-project -- SQL injection in ITIL actors in GLPI
8950ac62-1d30-11dd-9388-0211060005df qemu -- "drive_init()" Disk Format Security Bypass
89709e58-d497-11e3-a3d5-5453ed2e2b49 qt4-xml -- XML Entity Expansion Denial of Service
897e1962-5d5a-11ec-a3ed-040e3c3cf7e7 Privoxy -- Multiple vulnerabilities (memory leak, XSS)
89ca6f7d-4f00-11e8-9b1d-00e04c1ea73d drupal -- Drupal Core - Multiple Vulnerabilities
89cf8cd2-0698-11e7-aa3f-001b216d295b Several Security Defects in the Bouncy Castle Crypto APIs
89d4ed09-c3d7-11e5-b5fe-002590263bf5 privoxy -- multiple vulnerabilities
89d5bca6-0150-11ec-bf0c-080027eedc6a The Bouncy Castle Crypto APIs -- EC math vulnerability
89db3b31-a4c3-11e3-978f-f0def16c5c1b nginx -- SPDY memory corruption
89fdbd85-ebd2-11ed-9c88-001b217b3468 Gitlab -- Multiple Vulnerabilities
89ff45e3-1a57-11e4-bebd-000c2980a9f3 samba -- remote code execution
8a0cd618-22a0-11ed-b1e7-001b217b3468 Gitlab -- Remote Code Execution
8a1d0e63-1e07-11e5-b43d-002590263bf5 pcre -- Heap Overflow Vulnerability in find_fixedlength()
8a34d9e6-c662-11df-b2e1-001b2134ef46 linux-flashplugin -- remote code execution
8a3ece40-3315-11da-a263-0001020eed82 picasm -- buffer overflow vulnerability
8a4aba2d-f33e-11e8-9416-001b217b3468 Gitlab -- Multiple vulnerabilities
8a560bcf-b14b-11e5-9728-002590263bf5 qemu -- denial of service vulnerability in VNC
8a5770b4-54b5-11db-a5ae-00508d6a62df mambo -- multiple SQL injection vulnerabilities
8a835235-ae84-11dc-a5f9-001a4d49522b wireshark -- multiple vulnerabilities
8a90dc87-89f9-11e5-a408-00248c0c745d PHPmailer -- SMTP injection vulnerability
8a9f86de-d080-11e9-9051-4c72b94353b5 wordpress -- multiple issues
8aa6340d-e7c6-41e0-b2a3-3c9e9930312a py39-redis -- can send response data to the client of an unrelated request
8ad1c404-3e78-11df-a5a1-0050568452ac Zend Framework -- security issues in bundled Dojo library
8aff07eb-1dbd-11e4-b6ba-3c970e169bc2 OpenSSL -- multiple vulnerabilities
8b03d274-56ca-489e-821a-cf32f07643f0 jenkins -- multiple vulnerabilities
8b0e94cc-b5cd-11d9-a788-0001020eed82 gaim -- AIM/ICQ remote denial of service vulnerability
8b1a50ab-8a8e-11e8-add2-b499baebfeaf Apache httpd -- multiple vulnerabilities
8b1f53f3-2da5-11e5-86ff-14dae9d210b8 php-phar -- multiple vulnerabilities
8b20d716-49df-11ea-9f7b-206a8a720317 ksh93 -- certain environment variables interpreted as arithmetic expressions on startup, leading to code injection
8b20f21a-8113-11ef-b988-08002784c58d redis,valkey -- Multiple vulnerabilities
8b27f1bc-c509-11e5-a95f-b499baebfeaf curl -- Credentials not checked
8b3be705-eba7-11ee-99b3-589cfc0f81b0 phpmyfaq -- multiple vulnerabilities
8b3ecff5-c9b2-11e4-b71f-00bd5af88c00 Adobe Flash Player -- critical vulnerabilities
8b491182-f842-11dd-94d9-0030843d3802 firefox -- multiple vulnerabilities
8b571fb2-f311-11eb-b12b-fc4dd43e2b6a tomcat -- JNDI Realm Authentication Weakness in multiple versions
8b61308b-322a-11ea-b34b-1de6fb24355d e2fsprogs -- rehash.c/pass 3a mutate_name() code execution vulnerability
8b683bea-d49c-11da-a672-000e0c2e438a asterisk -- denial of service vulnerability, local system access
8b812395-c739-11e8-ab5b-9c5c8e75236a clamav -- multiple vulnerabilities
8b97d289-d8cf-11e2-a1f5-60a44c524f57 otrs -- information disclosure
8b986a05-4dbe-11e0-8b9a-02e0184b8d35 avahi -- denial of service
8ba23a62-997d-11eb-9f0e-0800278d94f0 gitea -- multiple vulnerabilities
8ba2819c-0e9d-11e8-83e7-485b3931c969 bchunk -- heap-based buffer overflow (with invalid free) and crash
8ba8278d-db06-11eb-ba49-001b217b3468 Gitlab -- Multiple Vulnerabilities
8be2e304-cce6-11da-a3b1-00123ffe8333 mailman -- Private Archive Script Cross-Site Scripting
8be8ca39-ae70-4422-bf1a-d8fae6911c5e chromium -- multiple vulnerabilities
8bec3994-104d-11ed-a7ac-0800273f11ea gitea -- multiple issues
8bf856ea-7df7-11eb-9aad-001b217b3468 Gitlab -- Multiple vulnerabilities
8c08ab4c-d06c-11e8-b35c-001b217b3468 Libgit2 -- multiple vulnerabilities
8c1a271d-56cf-11e7-b9fe-c13eb7bcbf4f exim -- Privilege escalation via multiple memory leaks
8c1da77d-d3e9-11d9-8ffb-00061bc2ad93 xloadimage -- buffer overflow in FACES image handling
8c2b2f11-0ebe-11e6-b55e-b499baebfeaf MySQL -- multiple vulnerabilities
8c2ea875-9499-11df-8e32-000f20797ede mozilla -- multiple vulnerabilities
8c31b288-27ec-11e5-a4a5-002590263bf5 xen-kernel -- vulnerability in the iret hypercall handler
8c33b299-163b-11d9-ac1b-000d614f7fad getmail -- symlink vulnerability during maildir delivery
8c342a6c-563f-11ef-a77e-901b0e9408dc soft-serve -- Remote code execution vulnerability
8c451386-dff3-11dd-a765-0030843d3802 mysql -- privilege escalation and overwrite of the system table information
8c5205b4-11a0-11de-a964-0030843d3802 opera -- multiple vulnerabilities
8c5ad0cf-ba37-11d9-837d-000e0c2e438a rsnapshot -- local privilege escalation
8c773d7f-6cbb-11e2-b242-c8600054b392 mysql/mariadb/percona server -- multiple vulnerabilities
8c83145d-2c95-11e1-89b4-001ec9578670 phpMyAdmin -- Multiple XSS
8c8fa44d-ad15-11e2-8cea-6805ca0b3d42 phpMyAdmin -- Multiple security vulnerabilities
8c93e997-30e0-11e0-b300-485d605f4717 wordpress -- SQL injection vulnerability
8c98e643-6008-11ea-af63-38d547003487 salt -- salt-api vulnerability
8c9b48d1-3715-11e3-a624-00262d8b701d dropbear -- exposure of sensitive information, DoS
8caa5d60-a174-11ef-9a62-002590c1f29c FreeBSD -- Unbounded allocation in ctl(4) CAM Target Layer
8cbd9c08-f8b9-11e6-ae1b-002590263bf5 xen-tools -- cirrus_bitblt_cputovideo does not check if memory region is safe
8cbf4d65-af9a-11df-89b8-00151735203a bugzilla -- information disclosure, denial of service
8ccff771-ceca-43a0-85ad-3e595e73b425 py39-sqlalchemy11 -- multiple SQL Injection vulnerabilities
8cdd38c7-8ebb-11ee-86bb-a8a1599412c6 chromium -- multiple security fixes
8cf25a29-e063-11e7-9b2c-001e672571bc rubygem-passenger -- arbitrary file read vulnerability
8cf54d73-d591-11e5-8fa8-14dae9d210b8 adminer -- XSS vulnerability
8cfb6f42-d2b0-11da-a672-000e0c2e438a p5-DBI -- insecure temporary file creation vulnerability
8d04cfbd-344d-11e0-8669-0025222482c5 mediawiki -- multiple vulnerabilities
8d075001-a9ce-11d8-9c6d-0020ed76ef5a neon date parsing vulnerability
8d10038e-515c-11df-83fb-0015587e2cc1 joomla -- multiple vulnerabilities
8d17229f-3054-11eb-a455-ac1f6b16e566 consul -- Fix Consul Connect CA private key configuration
8d1f9adf-6b4f-11ef-9a62-002590c1f29c FreeBSD -- Multiple vulnerabilities in libnv
8d20bd48-a4f3-11ec-90de-1c697aa5a594 FreeBSD-kernel -- Multiple WiFi issues
8d2af843-7d8e-11e9-8464-c85b76ce9b5a OCaml -- Multiple Security Vulnerabilities
8d2c0ce1-08b6-11dd-94b4-0016d325a0ed ikiwiki -- cross site request forging
8d2d6bbd-2a02-11e5-a0af-bcaec565249c Adobe Flash Player -- critical vulnerabilities
8d3838b0-6ca8-11ed-92ce-3065ec8fd3ec chromium -- multiple vulnerabilities
8d3bae09-fd28-11e7-95f2-005056925db4 unbound -- vulnerability in the processing of wildcard synthesized NSEC records
8d4ae57d-d2ab-11da-a672-000e0c2e438a xine -- multiple remote string vulnerabilities
8d5180a6-86fe-11e6-8d93-00248c0c745d PHP -- multiple vulnerabilities
8d5368ef-40fe-11e6-b2ec-b499baebfeaf Python -- smtplib StartTLS stripping vulnerability
8d65aa3b-31ce-11ec-8c32-a14e8e520dc7 mailman -- brute-force vuln on list admin password, and CSRF vuln in releases before 2.1.35
8d823883-0ca9-11d9-8a8a-000c41e2cdad mozilla -- built-in CA certificates may be overridden
8d85d600-84a9-11ea-97b9-08002728f74c Wagtail -- XSS vulnerability
8da79498-e6f6-11ea-8cbf-54e1ad3d6335 libX11 -- Doublefree in locale handlng code
8db24888-b2f5-11e6-8153-00248c0c745d Drupal Code -- Multiple Vulnerabilities
8db2f8b2-9e12-11ea-9e83-0cc47ac16c9d qmail -- 64 bit integer overflows with possible remote code execution on large SMTP requests
8db74c04-d794-11ea-88f8-901b0ef719ab FreeBSD -- sendmsg(2) privilege escalation
8db8d62a-b08b-11e6-8eba-d050996490d0 ntp -- multiple vulnerabilities
8dbf7894-a9a8-11d9-a788-0001020eed82 squid -- DoS on failed PUT/POST requests vulnerability
8dd438ed-a338-11ed-b48b-589cfc0f81b0 Asterisk -- multiple vulnerabilities
8dd9722c-8e97-11dc-b8f6-001c2514716c cups -- off-by-one buffer overflow
8defa0f9-ee8a-11e1-8bd8-0022156e8794 squidclamav -- Denial of Service
8e01ab5b-0949-11dc-8163-000e0c2e438a FreeBSD -- heap overflow in file(1)
8e02441d-d39c-11db-a6da-0003476f14d3 sql-ledger -- security bypass vulnerability
8e0e86ff-48b5-11e4-ab80-000c29f6ae42 rsyslog -- remote syslog PRI vulnerability
8e0e8b56-11c6-11ef-9f97-a8a1599412c6 chromium -- multiple security fixes
8e150606-08c9-11ed-856e-d4c9ef517024 MySQL -- Multiple vulnerabilities
8e20430d-a72b-11ed-a04f-40b034455553 MinIO -- unprivileged users can create service accounts for admin users
8e2e6ad8-1720-11d9-9fb9-00902788733b tor -- remote DoS and loss of anonymity
8e3f1812-54d9-11ea-8d49-d4c9ef517024 WeeChat -- Multiple vulnerabilities
8e48365a-214d-11e9-9f8a-0050562a4d7b libzmq4 -- Remote Code Execution Vulnerability
8e561cfe-3c59-11ee-b32e-080027f5fec9 clamav -- Possible denial of service vulnerability in the AutoIt file parser
8e5e6d42-a0fa-11e3-b09a-080027f2d077 Python -- buffer overflow in socket.recvfrom_into()
8e670b85-706e-11eb-abb2-08002728f74c Rails -- multiple vulnerabilities
8e6f684b-f333-11ee-a573-84a93843eb75 Apache httpd -- multiple vulnerabilities
8e7bbddd-8338-11e7-867f-b499baebfeaf libsoup -- stack based buffer overflow
8e887b71-d769-11e4-b1c2-20cf30e32f6d subversion -- DoS vulnerabilities
8e89a89a-fd15-11e7-bdf6-00e04c1ea73d phpbb3 -- multiple issues
8e8b8b94-7f1d-11dd-a66a-0019666436c2 rubygem-rails -- SQL injection vulnerability
8e986b2b-1baa-11e8-a944-54ee754af08e chromium -- multiple vulnerabilities
8e9c3f5a-715b-4336-8d05-19babef55e9e jenkins -- multiple vulnerabilities
8ea24413-1b15-11ee-9331-570525adb7f1 gitea -- avoid open HTTP redirects
8eaaf135-1893-11ed-9b22-002590c1f29c FreeBSD -- Missing bounds check in 9p message handling
8eabaad9-641f-11d9-92a7-000a95bc6fae hylafax -- unauthorized login vulnerability
8eb69cd0-c2ec-11eb-b6e7-8c164567ca3c redis -- integer overflow
8eb78cdc-e9ec-11e5-85be-14dae9d210b8 dropbear -- authorized_keys command= bypass
8ec7d426-055d-46bc-8f5a-a9d73a5a71ab minio -- Server Side Request Forgery
8ecaaca2-cc07-11d8-858d-000d610a3b12 Linux binary compatibility mode input validation error
8edeb3c1-bfe7-11ed-96f5-3497f65b111b Apache httpd -- Multiple vulnerabilities
8eed0c5c-3482-11eb-b87a-901b0ef719ab FreeBSD -- ICMPv6 use-after-free in error message handling
8eee06d4-c21d-4f07-a669-455151ff426f mozilla -- multiple vulnerabilities
8eefa87f-31f1-496d-bf8e-2b465b6e4e8a zeek -- potential DoS vulnerabilities
8eefff69-997f-11ee-8e38-002590c1f29c FreeBSD -- NFS client data corruption and kernel memory disclosure
8efe93e2-ee62-11d9-8310-0001020eed82 zlib -- buffer overflow vulnerability
8f10fa04-cf6a-11e5-96d6-14dae9d210b8 graphite2 -- code execution vulnerability
8f128c72-ecf9-11e8-aa00-6451062f0f7a Flash Player -- arbitrary code execution
8f353420-4197-11e8-8777-b499baebfeaf OpenSSL -- Cache timing vulnerability
8f483746-d45d-11dd-84ec-001fc66e7203 roundcube -- remote execution of arbitrary code
8f5c9dd6-5cac-11e5-9ad8-14dae9d210b8 p7zip -- directory traversal vulnerability
8f5dd74b-2c61-11da-a263-0001020eed82 firefox & mozilla -- multiple vulnerabilities
8f86d8b5-6025-11d9-a9e7-0001020eed82 tiff -- tiffdump integer overflow vulnerability
8fafbef4-b1d9-11ed-b0f4-002590f2a714 git -- gitattributes parsing integer overflow
8fb61d94-771b-11ef-9a62-002590c1f29c FreeBSD -- ktrace(2) fails to detach when executing a setuid binary
8fbd4187-0f18-11e5-b6a8-002590263bf5 pgbouncer -- remote denial of service
8fbe81f7-6eb5-11ef-b7bd-00505632d232 netatalk3 -- multiple WolfSSL vulnerabilities
8fc55043-cb1e-11df-9c1b-0011098ad87f horde-base -- XSS and CSRF vulnerabilities
8fc615cc-8a66-11e8-8c75-d8cb8abf62dd Gitlab -- Remote Code Execution Vulnerability in GitLab Projects Import
8fd4f40a-4b7d-11ee-aa2a-080027de9982 Django -- multiple vulnerabilities
8fe4f296-a3ec-11ef-8c1c-a8a1599412c6 chromium -- multiple security fixes
8fedf75c-ef2f-11e6-900e-003048f78448 optipng -- multiple vulnerabilities
8ff84335-a7da-11e2-b3f5-003067c2616f jasper -- buffer overflow
9000591b-483b-45ac-9c87-b3df3a4198ec electron{25,26} -- Use after free in Site Isolation
9003b500-31e3-11e3-b0d0-20cf30e32f6d mod_fcgid -- possible heap buffer overwrite
90064567-28b1-11db-844d-000c6ec775d9 rubygem-rails -- evaluation of ruby code
903654bd-1927-11dc-b8a0-02e0185f8d72 clamav -- multiple vulnerabilities
904d78b8-0f7e-11e4-8b71-5453ed2e2b49 qt4-imageformats, qt5-gui -- DoS vulnerability in the GIF image handler
9065b930-3d8b-11e3-bd1a-e840f2096bd0 gnutls -- denial of service
9082a85a-88ae-11d8-90d1-0020ed76ef5a jailed processes can attach to other jails
908f4cf2-1e8b-11e0-a587-001b77d09812 sudo -- local privilege escalation
909a80ba-6294-11ed-9ca2-6c3be5272acd Grafana -- Improper authentication
909be51b-9b3b-11e8-add2-b499baebfeaf MySQL -- multiple vulnerabilities
90b27045-9530-11e3-9d09-000c2980a9f3 lighttpd -- multiple vulnerabilities
90becf7c-1acf-11e7-970f-002590263bf5 xen-kernel -- broken check in memory_exchange() permits PV guest breakout
90c48c04-d549-4fc0-a503-4775e32d438e chromium -- multiple vulnerabilities
90c8385a-dc9f-11e5-8fa8-14dae9d210b8 giflib -- heap overflow
90ca3ba5-19e6-11e4-8616-001b3856973b gpgme -- heap-based buffer overflow in gpgsm status handler
90cc1494-10ac-11e1-b3ec-0024e830109b BIND -- Remote DOS
90d2e58f-b25a-11de-8c83-02e0185f8d72 FreeBSD -- kqueue pipe race conditions
90db9983-2f53-11dd-a0d8-0016d325a0ed ikiwiki -- cleartext passwords
910486d5-ba4d-11dd-8f23-0019666436c2 imlib2 -- XPM processing buffer overflow vulnerability
9118961b-9fa5-11e6-a265-3065ec8fd3ec chromium -- multiple vulnerabilities
912cb7f7-27df-11e5-a4a5-002590263bf5 xen-kernel -- arm: vgic: incorrect rate limiting of guest triggered logging
915855ad-283d-4597-b01e-e0bf611db78b libspf2 -- Integer Underflow Remote Code Execution
9164f51e-ae20-11e7-a633-009c02a2ab30 Python 2.7 -- multiple vulnerabilities
9168253c-5a6d-11d9-a9e7-0001020eed82 a2ps -- insecure temporary file creation
917e5519-9fdd-11e7-8b58-e8e0b747a45a chromium -- multiple vulnerabilities
918a5d1f-9d40-11e5-8f5c-002590263bf5 KeePassX -- information disclosure
918f38cd-f71e-11e1-8bd8-0022156e8794 php5 -- header splitting attack via carriage-return character
91929399-249e-11ef-9296-b42e991fc52e kanboard -- Project Takeover via IDOR in ProjectPermissionController
91955195-9ebb-11ee-bc14-a703705db3a6 putty -- add protocol extension against 'Terrapin attack'
91a2066b-5ab6-11de-bc9b-0030843d3802 cscope -- buffer overflow
91a337d8-83ed-11e6-bf52-b499baebfeaf OpenSSL -- multiple vulnerabilities
91afa94c-c452-11da-8bff-000ae42e9b93 mod_pubcookie -- cross site scripting vulnerability
91be81e7-3fea-11e1-afc7-2c4138874f7d Multiple implementations -- DoS via hash algorithm collision
91c606fc-b5d0-11d9-a788-0001020eed82 mplayer & libxine -- MMS and Real RTSP buffer overflow vulnerabilities
91ce95d5-cd15-4105-b942-af5ccc7144c1 clamav -- multiple vulnerabilities
91e039ed-d689-11e6-9171-14dae9d210b8 hdf5 -- multiple vulnerabilities
91ecb546-b1e6-11e3-980f-20cf30e32f6d apache -- several vulnerabilities
91ed69f9-72c7-11dc-981a-001921ab2fa4 firebird -- multiple remote buffer overflow vulnerabilities
91f1adc7-b3e9-11d9-a788-0001020eed82 kdewebdev -- kommander untrusted code execution vulnerability
92140bc9-7bde-11da-8ec4-0002b3b60e4c bogofilter -- heap corruption through malformed input
92243b6a-5775-4aea-8727-a938058df5ba webkit2-gtk3 -- Multiple vulnerabilities
92268205-1947-11d9-bc4a-000c41e2cdad cyrus-sasl -- dynamic library loading and set-user-ID applications
9227dcaf-827f-11dd-9cd7-0050568452ac twiki -- Arbitrary code execution in session files
922d2398-9e2d-11de-a998-0030843d3802 mozilla firefox -- multiple vulnerabilities
92442c4b-6f4a-11db-bd28-0012f06707f0 Imlib2 -- multiple image file processing vulnerabilities
9245681c-7c3c-11e7-b5af-a4badb2f4699 sqlite3 -- heap-buffer overflow
924bd4f8-11e7-11e9-9fe8-5404a68ad561 uriparser -- Out-of-bounds read
924cb116-4d35-11ee-8e38-002590c1f29c FreeBSD -- Wi-Fi encryption bypass
9272a5b0-6b40-11e5-bd7f-bcaec565249c gdk-pixbuf2 -- head overflow and DoS
927743d4-5ca9-11d9-a9e7-0001020eed82 up-imapproxy -- multiple vulnerabilities
928d5c59-2a5a-11e8-a712-0025908740c2 SquirrelMail -- post-authentication access privileges
92a4d881-c6cf-11ec-a06f-d4c9ef517024 cURL -- Multiple vulnerabilities
92a6efd0-e40d-11e8-ada4-408d5cf35399 lighttpd - use-after-free vulnerabilities
92ad12b8-ec09-11eb-aef1-0897988a1c07 pjsip -- Race condition in SSL socket server
92b8b284-a3a2-41b1-956c-f9cf8b74f500 dovecot -- abort of SASL authentication results in a memory leak
92ca92c1-d859-11de-89f9-001517351c22 bugzilla -- information leak
92cd1c03-2940-11ef-bc02-001b217b3468 Gitlab -- Vulnerabilities
92cda470-30cb-11e5-a4a5-002590263bf5 sox -- input sanitization errors
92d44f83-a7bf-41cf-91ee-3d1b8ecf579f mozilla -- multiple vulnerabilities
92e345d0-304d-11e7-8359-e8e0b747a45a chromium -- race condition vulnerability
92f30415-9935-11e2-ad4c-080027ef73ec OpenVPN -- potential side-channel/timing attack when comparing HMACs
92f4191a-6d25-11e7-93f7-d43d7e971a1b GitLab -- Various security issues
92f86b93-923f-11dc-a2bf-02e081235dab net-snmp -- denial of service via GETBULK request
92fc2e2b-c383-11e4-8ef7-080027ef73ec PuTTY -- fails to scrub private keys from memory after use
92fd40eb-c458-11da-9c79-00123ffe8333 samba -- Exposure of machine account credentials in winbind log files
930def19-3e05-11ec-9ba8-002324b2fba8 go -- multiple vulnerabilities
9314058e-5204-11e7-b712-b1a44a034d72 cURL -- URL file scheme drive letter buffer overflow
93167bef-9752-11e9-b61c-b885849ded8e libxslt -- security framework bypass
933654ce-17b8-11e8-90b8-001999f8d30b asterisk -- multiple vulnerabilities
9347d82d-9a66-11db-b271-000e35248ad7 w3m -- format string vulnerability
934b1de4-00d7-11da-bc08-0001020eed82 opera -- image dragging vulnerability
93688f8f-4935-11e1-89b4-001ec9578670 postfixadmin -- Multiple Vulnerabilities
937aa1d6-685e-11ec-a636-000c29061ce6 OpenDMARC - Multiple vulnerabilities
937adf01-b64a-11dd-a55e-00163e000016 openfire -- multiple vulnerabilities
937d5911-5f16-11db-ae08-0008743bf21a drupal -- cross site request forgeries
938f357c-16dd-11d9-bc4a-000c41e2cdad bmon -- unsafe set-user-ID application
9393213d-489b-11e5-b8c7-d050996490d0 drupal -- multiple vulnerabilities
939a7086-9ed6-11e5-8f5c-002590263bf5 redmine -- potential XSS vulnerability
93a1c9a7-5bef-11ec-a47a-001517a2e1a4 openhab -- log4j remote code injection
93ba13f8-5c41-11db-a5ae-00508d6a62df tkdiff -- temporary file symlink privilege escalation
93be487e-211f-11e1-89b4-001ec9578670 isc-dhcp-server -- Remote DoS
93c12fe5-7716-11ef-9a62-002590c1f29c FreeBSD -- Integer overflow in libnv
93d6162f-1153-11d9-bc4a-000c41e2cdad mozilla -- multiple heap buffer overflows
93db4f92-9997-4f4f-8614-3963d9e2b0ec py-slixmpp -- incomplete SSL certificate validation
93eadedb-c6a6-11e5-96d6-14dae9d210b8 nghttp2 -- use after free
93eb0e48-14ba-11ec-875e-901b0e9408dc Matrix clients -- several vulnerabilities
93ee802e-ebde-11e5-92ce-002590263bf5 git -- potential code execution
93f8e0ff-f33d-11e8-be46-0019dbb15b3f payara -- Default typing issue in Jackson Databind
94234e00-be8a-11db-b2ec-000c6ec775d9 rar -- password prompt buffer overflow vulnerability
942433db-c661-11e6-ae1b-002590263bf5 xen-kernel -- x86: Mishandling of SYSCALL singlestep during emulation
94268da0-8118-11e4-a180-001999f8d30b asterisk -- Remote Crash Vulnerability in WebSocket Server
942fff11-5ac4-11ec-89ea-c85b76ce9b5a p7zip -- usage of uninitialized memory
943d23b6-e65e-11eb-ad30-0800273f11ea gitea -- multiple vulnerabilities
943f8915-6c5d-11ef-810a-f8b46a88f42c binutils -- Multiple vulnerabilities
9442a811-dab3-11e7-b5af-a4badb2f4699 FreeBSD -- OpenSSL multiple vulnerabilities
9448a82f-6878-11e1-865f-00e0814cab4e jenkins -- XSS vulnerability
94599fe0-5ca3-11e8-8be1-d05099c0ae8c BIND -- multiple vulnerabilities
9471ec47-05a2-11e5-8fda-002590263bf5 proxychains-ng -- current path as the first directory for the library search path
947f4b14-1c89-11da-bc01-000e0c2e438a bind -- buffer overrun vulnerability
948921ad-afbc-11da-bad9-02e081235dab GnuPG does not detect injection of unsigned data
94976433-9c74-11e2-a9fc-d43d7e0c7c02 mozilla -- multiple vulnerabilities
949c470e-528f-11d9-ac20-00065be4b5b6 golddig -- local buffer overflow vulnerabilities
94b6264a-5140-11e3-8b22-f0def16c5c1b nginx -- Request line parsing vulnerability
94c6951a-0d04-11ea-87ca-001999f8d30b asterisk -- Re-invite with T.38 and malformed SDP causes crash
94d441d2-5497-11ef-9d2f-080027836e8b Django -- multiple vulnerabilities
94d63fd7-508b-11e9-9ba0-4c72b94353b5 drupal -- Drupal core - Moderately critical - Cross Site Scripting
94edff42-d93d-11de-a434-0211d880e350 libvorbis -- multiple vulnerabilities
94ffc0d9-1915-11eb-b809-b42e991fc52e motion -- Denial of Service
950b2d60-f2a9-11e5-b4a9-ac220bdcec59 activemq -- Web Console Clickjacking
95176ba5-9796-11ed-bfbf-080027f5fec9 rack -- Multiple vulnerabilities
951b513a-9f42-436d-888d-2162615d0fe4 py-pymatgen -- regular expression denial of service
9532a361-b84d-11ee-b0d7-84a93843eb75 TinyMCE -- mXSS in multiple plugins
953911fe-51ef-11e2-8e34-0022156e8794 tomcat -- bypass of CSRF prevention filter
953aaa57-6bce-11e5-9909-002590263bf5 mbedTLS/PolarSSL -- multiple vulnerabilities
9548d6ed-b1da-11ed-b0f4-002590f2a714 git -- Local clone-based data exfiltration with non-local transports
9557dc72-64da-11e8-bc32-d8cb8abf62dd Gitlab -- multiple vulnerabilities
9558d49c-534c-11e8-8177-d43d7ef03aa6 Flash Player -- arbitrary code execution
955eb3cc-ce0b-11ed-825f-6c3be5272acd Grafana -- Stored XSS in Graphite FunctionDescription tooltip
955f377e-7bc3-11ec-a51c-7533f219d428 Security Vulnerability found in ExifTool
95602550-76cf-11e5-a2a1-002590263bf5 codeigniter -- multiple XSS vulnerabilities
9575259a-92d5-11e4-bce6-d050992ecde8 file -- multiple vulnerabilities
958b9cee-79da-11e6-bf75-3065ec8fd3ec chromium -- multiple vulnerabilities
9595d002-edeb-4602-be2d-791cd654247e jenkins -- multiple vulnerabilities
959d384d-6b59-11dd-9d79-001fc61c2a55 ruby -- DNS spoofing vulnerability
95a69d1a-52a5-11e2-a289-1c4bd681f0cf otrs -- XSS vulnerability in Firefox and Opera
95a74a48-2691-11e7-9e2d-e8e0b747a45a chromium -- multiple vulnerabilities
95b01379-9d52-11e7-a25c-471bafc3262f ruby -- multiple vulnerabilities
95b92e3b-d451-11e5-9794-e8e0b747a45a libgcrypt -- side-channel attack on ECDH
95c4ec45-6831-11ee-b06f-0050569ceb3a Account takeover through API in GLPI
95d9d986-1078-11eb-ab74-4c72b94353b5 drupal -- Multiple Vulnerabilities
95dad123-180e-11ee-86ba-080027eda32c mediawiki -- multiple vulnerabilities
95e6e6ca-3986-11ed-8e0c-6c3be5272acd Grafana -- Privilege escalation
95ee401d-cc6a-11ec-9cfc-10c37b4ac2ea gitea -- Escape git fetch remote
95ee96f2-e488-11d9-bf22-080020c11455 linux-realplayer -- RealText parsing heap overflow
95eee71d-3068-11e5-a9b5-bcaec565249c gdk-pixbuf2 -- heap overflow and DoS affecting Firefox and other programs
95f306a6-0aee-11eb-add4-08002728f74c Rails -- Possible XSS vulnerability
95fde6bc-6821-11ee-b06f-0050569ceb3a GLPI vulnerable to unauthenticated access to Dashboard data
96266fc9-1200-43b5-8393-4c51f54bb7bc electron32 -- multiple vulnerabilities
964161cd-6715-11da-99f6-00123ffe8333 ffmpeg -- libavcodec buffer overflow vulnerability
964c5460-9c66-11ec-ad3a-001999f8d30b asterisk -- multiple vulnerabilities
967b852b-1e28-11e6-8dd3-002590263bf5 hostapd and wpa_supplicant -- psk configuration parameter update allowing arbitrary data to be written
96811d4a-04ec-11ec-9b84-d4c9ef517024 OpenSSL -- multiple vulnerabilities
968d1e74-1740-11e5-a643-40a8f0757fb4 p5-Dancer -- possible to abuse session cookie values
96948a6a-e239-11d9-83cf-0010dc5df42d cacti -- potential SQL injection and cross site scripting attacks
96a21236-707b-11eb-96d8-d4c9ef517024 OpenSSL -- Multiple vulnerabilities
96a41723-133a-11ed-be3b-3065ec8fd3ec chromium -- multiple vulnerabilities
96b2d4db-ddd2-11ed-b6ea-080027f5fec9 redis -- HINCRBYFLOAT can be used to crash a redis-server process
96ba2dae-4ab0-11d8-96f2-0020ed76ef5a L2TP, ISAKMP, and RADIUS parsing vulnerabilities in tcpdump
96d6809a-81df-46d4-87ed-2f78c79f06b1 zeek -- potential DoS vulnerabilities
96d84238-b500-490b-b6aa-2b77090a0410 xorg-server -- Overlay Window Use-After-Free
96df5fd0-8900-11d9-aa18-0001020eed82 curl -- authentication buffer overflow vulnerability
96e776c7-e75c-11df-8f26-00151735203a OTRS -- Multiple XSS and denial of service vulnerabilities
96eab874-9c79-11e8-b34b-6cc21735f730 PostgreSQL -- two vulnerabilities
96eca031-1313-4daf-9be2-9d6e1c4f1eb5 mozilla -- multiple vulnerabilities
96ed277b-60e0-11db-ad2d-0016179b2dd5 Serendipity -- XSS Vulnerabilities
96f6bf10-a731-11e6-95ca-0011d823eebd flash -- multiple vulnerabilities
96fb446d-ac7b-11ea-8b5e-b42e99a1b9c3 LibreOffice Security Advisory
96fdbf5b-2cfd-11d8-9355-0020ed76ef5a Mathopd buffer overflow
9704930c-3bb7-11e7-93f7-d43d7e971a1b gitlab -- Various security issues
970dcbe0-a947-41a4-abe9-7aaba87f41fe electron25 -- multiple vulnerabilities
9720bb39-f82a-402f-9fe4-e2c875bdda83 jenkins -- multiple vulnerabilities
972568d6-3485-40ab-80ff-994a8aaf9683 xorg-server -- Multiple vulnerabilities
972697a7-9a42-11d9-a256-0001020eed82 kdelibs -- local DCOP denial of service vulnerability
972837fc-c304-11e3-8758-00262d5ed8ee ChaSen -- buffer overflow
972ba0e8-8b8a-11ec-b369-6c3be5272acd Node.js -- January 2022 Security Releases
972fe546-1fb6-11eb-b9d4-001999f8d30b asterisk -- Remote crash in res_pjsip_session
9733c480-ebff-11e3-970b-206a8a720317 gnutls -- client-side memory corruption
974a6d32-3fda-11e8-aea4-001b216d295b ipsec-tools -- remotely exploitable computational-complexity attack
9750cf22-216d-11da-bc01-000e0c2e438a unzip -- permission race vulnerability
976567f6-05c5-11e6-94fa-002590263bf5 hostapd and wpa_supplicant -- multiple vulnerabilities
976d7bf9-38ea-11ec-b3b0-3065ec8fd3ec chromium -- multiple vulnerabilities
9770d6ac-614d-11e5-b379-14dae9d210b8 libssh2 -- denial of service vulnerability
978b0f76-122d-11e4-afe3-bc5ff4fb5e7b mozilla -- multiple vulnerabilities
979dc373-d27d-11ee-8b84-b42e991fc52e suricata -- multiple vulnerabilities
97a24d2e-f74c-11e5-8458-6cc21735f730 PostgreSQL -- minor security problems.
97c1b0f7-47b9-11ee-8e38-002590c1f29c FreeBSD -- Multiple vulnerabilities in Heimdal
97c22a94-5b8b-11e2-b131-000c299b62e1 nagios -- buffer overflow in history.cgi
97c3a452-6e36-11d9-8324-000a95bc6fae bugzilla -- cross-site scripting vulnerability
97d45e95-3ffc-11da-a263-0001020eed82 snort -- Back Orifice preprocessor buffer overflow vulnerability
97e86d10-2ea7-11e6-ae88-002590263bf5 roundcube -- XSS vulnerability
97edf5ab-b319-11d9-837d-000e0c2e438a junkbuster -- heap corruption vulnerability and configuration modification vulnerability
97f09f2f-ca3f-11df-aade-0050568f000c FreeBSD -- ZFS ZIL playback with insecure permissions
97fcc60a-6ec0-11ea-a84a-4c72b94353b5 phpMyAdmin -- SQL injection
98044aba-6d72-11eb-aed7-1b1b8a70cc8b openexr, ilmbase -- security fixes related to reading corrupted input files
98092444-5645-11e5-9ad8-14dae9d210b8 screen -- stack overflow
982872f1-7dd3-11e7-9736-6cc21735f730 PostgreSQL vulnerabilities
9855ac8e-2aec-11db-a6e2-000e0c2e438a alsaplayer -- multiple vulnerabilities
985bfcf0-e1d7-11d9-b875-0001020eed82 opera -- redirection cross-site scripting vulnerability
985d4d6c-cfbd-11e3-a003-b4b52fce4ce8 mozilla -- multiple vulnerabilities
98690c45-0361-11e2-a391-000c29033c32 ImageMagick and GraphicsMagick -- DoS via specially crafted PNG file
98b603c8-9ff3-11e8-ad63-6451062f0f7a Flash Player -- multiple vulnerabilities
98b71436-656d-11e9-8e67-206a8a720317 FreeBSD -- SAE confirm missing state validation
98bd69c3-834b-11d8-a41f-0020ed76ef5a Courier mail services: remotely exploitable buffer overflows
98dd7788-3d13-11dc-b3d3-0016179b2dd5 drupal -- Cross site request forgeries
98f1241f-8c09-4237-ad0d-67fb4158ea7a Mozilla -- multiple vulnerabilities
98f78c7a-a08e-11ed-946e-002b67dfc673 Plex Media Server -- security vulnerability
99015cf5-c4dd-11da-b2fb-000e0c2e438a mediawiki -- hardcoded placeholder string security bypass vulnerability
99021f88-ca3c-11df-be21-00e018aa7788 phpmyfaq -- cross site scripting vulnerabilities
99029172-8253-407d-9d8b-2cfeab9abf81 mozilla -- multiple vulnerabilities
9908a1cc-35ad-424d-be0b-7e56abd5931a sympa -- Denial of service caused by malformed CSRF token
990cf07e-6988-11d9-a9e7-0001020eed82 cups-base -- CUPS server remote DoS vulnerability
99230277-8fb4-11d8-8b29-0020ed76ef5a ident2 double byte buffer overflow
996518f3-6ef9-11ef-b01b-08002784c58d clamav -- Multiple vulnerabilities
996bce94-d23d-11e4-9463-9cb654ea3e1c libuv -- incorrect revocation order while relinquishing privileges
996c219c-bbb1-11e4-88ae-d050992ecde8 samba -- Unexpected code execution in smbd
99858b7c-7ece-11df-a007-000f20797ede mozilla -- multiple vulnerabilities
998ca824-ef55-11e9-b81f-3085a9a95629 Pillow -- Allocation of resources without limits or throttling
99a5590c-857e-11e0-96b7-00300582f9fc Apache APR -- DoS vulnerabilities
99b5cfa5-d3d2-11d9-8ffb-00061bc2ad93 yamt -- buffer overflow and directory traversal issues
99bc2966-55be-4411-825f-b04017a4c100 electron{22,24} -- multiple vulnerabilities
99bff2bd-4852-11ec-a828-6c3be5272acd Grafana -- Incorrect Access Control
99d3a8a5-c13c-11e5-96d6-14dae9d210b8 imlib2 -- denial of service vulnerabilities
9a035a56-eff0-11d9-8310-0001020eed82 ekg -- insecure temporary file creation
9a09eaa2-6448-11ea-abb7-001b217b3468 Gitlab -- Vulnerability
9a0a892e-05d8-11e3-ba09-000c29784fd1 lcms2 -- Null Pointer Dereference Denial of Service Vulnerability
9a447f78-d0f8-11ea-9837-e09467587c17 chromium -- multiple vulnerabilities
9a57c607-3cab-11e3-b4d9-bcaec565249c xorg-server -- use-after-free
9a71953a-474a-11e5-adde-14dae9d210b8 libpgf -- use-after-free
9a777c23-b310-11e0-832d-00215c6a37bb rsync -- incremental recursion memory corruption vulnerability
9a8514f3-2ab8-11ec-b3a1-8c164582fbac Ansible -- Ansible user credentials disclosure in ansible-connection module
9a8fecef-92c0-11df-b140-0015f2db7bde vte -- Classic terminal title set+query attack
9ab3a22c-feb8-11e3-b938-5404a68ad561 mplayer -- potential buffer overrun when processing malicious lzo compressed input
9ac0f9c4-492b-11df-83fb-0015587e2cc1 krb5 -- multiple denial of service vulnerabilities
9ad8993e-b1ba-11e5-9728-002590263bf5 qemu -- denial of service vulnerability in VMWARE VMXNET3 NIC support
9ae2c00f-97d0-11eb-8cd6-080027f515ea clamav -- Multiple vulnerabilites
9aecb94c-c1ad-11e3-a5ac-001b21614864 cURL -- inappropriate GSSAPI delegation
9b037a0d-ef2c-11e2-b4a0-8c705af55518 gallery -- multiple vulnerabilities
9b0d9832-47c1-11ee-8e38-002590c1f29c FreeBSD -- Network authentication attack via pam_krb5
9b1699ff-d84c-11eb-92d6-1b6ff3dfe4d3 mantis -- multiple vulnerabilities
9b19b6df-a4be-11e8-9366-0028f8d09152 couchdb -- administrator privilege escalation
9b2a5e88-02b8-11e2-92d1-000d601460a4 php5 -- Denial of Service in php_date_parse_tzfile()
9b4806c1-257f-11ec-9db5-0800270512f4 redis -- multiple vulnerabilities
9b4facec-6761-11da-99f6-00123ffe8333 curl -- URL buffer overflow vulnerability
9b5162de-6f39-11e8-818e-e8e0b747a45a libgcrypt -- side-channel attack vulnerability
9b5a905f-e556-452f-a00c-8f070a086181 libtiff -- Improper Input Validation
9b60bba1-cf18-11ed-bd44-080027f5fec9 rubygem-uri -- ReDoS vulnerability
9b7053fd-3ab5-11da-9484-00123ffe8333 phpmyadmin -- local file inclusion vulnerability
9b718b82-8ef5-11dc-8e42-001c2514716c gallery2 -- multiple vulnerabilities
9b7491fb-f253-11e9-a50c-000c29c4dc65 python 3.7 -- multiple vulnerabilities
9b8a52fc-89c1-11e9-9ba0-4c72b94353b5 drupal -- Drupal core - Moderately critical
9b973e97-0a99-11e7-ace7-080027ef73ec PuTTY -- integer overflow permits memory overwrite by forwarded ssh-agent connections
9b9a5f6e-1755-11ed-adef-589cfc01894a wolfssl -- multiple issues
9bad457e-b396-4452-8773-15bec67e1ceb jenkins -- Jenkins core bundles vulnerable version of the commons-httpclient library
9bad5ab1-f3f6-11e0-8b5c-b482fe3f522d OpenTTD -- Multiple buffer overflows in validation of external data
9bc14850-a070-11e6-a881-b499baebfeaf MySQL -- multiple vulnerabilities
9bcfd7b6-bcda-11df-9a6a-0015f2db7bde webkit-gtk2 -- Multiple vulnerabilities
9bcff2c4-1779-11ef-b489-b42e991fc52e Openfire administration console authentication bypass
9bd5e47b-6b50-11ef-9a62-002590c1f29c FreeBSD -- Multiple issues in ctl(4) CAM Target Layer
9bdd8eb5-564a-11e5-9ad8-14dae9d210b8 wireshark -- multiple vulnerabilities
9be819c6-4633-11d9-a9e7-0001020eed82 bnc -- remotely exploitable buffer overflow in getnickuserhost
9bed230f-ffc8-11ee-8e76-a8a1599412c6 chromium -- multiple security fixes
9c00d446-8208-11dc-9283-0016179b2dd5 drupal --- multiple vulnerabilities
9c016563-f582-11e7-b33c-6451062f0f7a Flash Player -- information disclosure
9c03845c-7398-11eb-bc0e-2cf05d620ecc raptor2 -- malformed input file can lead to a segfault
9c133aa0-12bd-11dd-bab7-0016179b2dd5 serendipity -- multiple cross site scripting vulnerabilities
9c135c7e-9fa4-11e6-a265-3065ec8fd3ec chromium -- multiple vulnerabilities
9c1495ac-8d8c-4789-a0f3-8ca6b476619c mozilla -- multiple vulnerabilities
9c196cfd-2ccc-11e6-94b0-0011d823eebd gnutls -- file overwrite by setuid programs
9c1cea79-548a-11da-b53f-0004614cc33d phpSysInfo -- "register_globals" emulation layer overwrite vulnerability
9c2460a4-f6b1-11dd-94d9-0030843d3802 squid -- remote denial of service vulnerability
9c36d41c-11df-11ea-9b6d-901b0e934d69 py-matrix-synapse -- incomplete cleanup of 3rd-party-IDs on user deactivation
9c399521-5f80-11ed-8ac4-b42e991fc52e darkhttpd -- DOS vulnerability
9c7177ff-1fe1-11e5-9a01-bcaec565249c libxml2 -- Enforce the reader to run in constant memory
9c7b6c20-a324-11e4-879c-00e0814cab4e django -- multiple vulnerabilities
9c88d8a8-8372-11e2-a010-20cf30e32f6d apache22 -- several vulnerabilities
9c9023ff-9057-11e9-b764-00505632d232 netatalk3 -- remote code execution vulnerability
9c990e67-6e30-11ec-82db-b42e991fc52e routinator -- multiple vulnerabilities
9c9ee9a6-ac5e-11ed-9323-080027d3a315 Django -- multiple vulnerabilities
9ca85b7c-1b31-11eb-8762-005056a311d1 samba -- Multiple Vulnerabilities
9cb57a06-7517-11ea-b594-3065ec8fd3ec chromium -- multiple vulnerabilities
9cbbc506-93c1-11ee-8e38-002590c1f29c FreeBSD -- TCP spoofing vulnerability in pf(4)
9ccfee39-3c3b-11df-9edc-000f20797ede mozilla -- multiple vulnerabilities
9cd52bc6-a213-11da-b410-000e0c2e438a abiword, koffice -- stack based buffer overflow vulnerabilities
9cfbca7f-efb7-11dc-be01-0211060005df qemu -- unchecked block read/write vulnerability
9d04936c-75f1-4a2c-9ade-4c1708be5df9 mozilla -- multiple vulnerabilities
9d15355b-ce7c-11e4-9db0-d050992ecde8 OpenSSL -- multiple vulnerabilities
9d271bab-da22-11eb-86f0-94c691a700a6 jenkins -- multiple vulnerabilities
9d3020e4-a2c4-11dd-a9f9-0030843d3802 flyspray -- multiple vulnerabilities
9d3428d4-f98c-11e8-a148-001b217b3468 Gitlab -- Multiple vulnerabilities
9d6a48a7-4dad-11ea-8a1d-7085c25400ea grub2-bhyve -- multiple privilege escalations
9d732078-32c7-11e5-b263-00262d5ed8ee chromium -- multiple vulnerabilities
9d7a2b54-4468-11ec-8532-0d24c37c72c8 mailman -- 2.1.37 fixes XSS via user options, and moderator offline brute-force vuln against list admin password
9d8e9952-5a42-11ef-a219-1c697a616631 Intel CPUs -- multiple vulnerabilities
9d9e9439-959e-11ed-b464-b42e991fc52e security/keycloak -- Multiple possible DoS attacks
9da3834b-6a50-11e1-91af-003067b2972c linux-flashplugin -- multiple vulnerabilities
9dae9d62-205f-11e5-a4a5-002590263bf5 ansible -- code execution from compromised remote host data or untrusted local data
9db93f3d-c725-11ec-9618-000d3ac47524 Rails -- XSS vulnerabilities
9dd761ff-30cb-11e5-a4a5-002590263bf5 sox -- memory corruption vulnerabilities
9dda3ff1-2b02-11db-a6e2-000e0c2e438a x11vnc -- authentication bypass vulnerability
9dde9dac-08f4-11e1-af36-003067b2972c caml-light -- insecure use of temporary files
9de4c1c1-b9ee-11e9-82aa-6cc21735f730 PostgresSQL -- TYPE in pg_temp execute arbitrary SQL during `SECURITY DEFINER` execution
9defb2d6-1404-11e4-8cae-20cf30e32f6d bugzilla -- Cross Site Request Forgery
9dfb63b8-8f36-11e2-b34d-000c2957946c www/mod_security -- NULL pointer dereference DoS
9dfe61c8-4d15-11e8-8f2f-d8cb8abf62dd Gitlab -- multiple vulnerabilities
9e0c6f7a-d46d-11e9-a1c7-b499baebfeaf OpenSSL -- Multiple vulnerabilities
9e205ef5-a649-11e8-b1f6-6805ca0b3d42 phpmyadmin -- XSS in the import dialog
9e2d0dcf-9926-11e8-a92d-0050562a4d7b py-cryptography -- tag forgery vulnerability
9e2fdfc7-e237-4393-9fa5-2d50908c66b3 xorg-server -- Multiple vulnerabilities
9e50dcc3-740b-11e6-94a2-080027ef73ec mailman -- CSRF hardening in parts of the web interface
9e5bbffc-d8ac-11e5-b2bd-002590263bf5 bsh -- remote code execution vulnerability
9e6640fe-be3a-11e6-b04f-001999f8d30b asterisk -- Crash on SDP offer or answer from endpoint using Opus
9e7306b9-a5c3-11e5-b864-14dae9d210b8 quassel -- remote denial of service
9e8f0766-7d21-11eb-a2be-001999f8d30b asterisk -- Crash when negotiating T.38 with a zero port
9eb01384-d793-11ea-88f8-901b0ef719ab FreeBSD -- Potential memory corruption in USB network device drivers
9ee01e60-6045-43df-98e5-a794007e54ef syncthing -- crash due to malformed relay protocol message
9ee72858-4159-11e5-93ad-002590263bf5 froxlor -- database password information leak
9eeccbf3-6e26-11ec-bb10-3065ec8fd3ec chromium -- multiple vulnerabilities
9f0a405e-4edd-11d9-a9e7-0001020eed82 phpmyadmin -- file disclosure vulnerability
9f14cb36-b6fc-11e0-a044-445c73746d79 opensaml2 -- unauthenticated login
9f15c2da-947e-11ea-92ab-00163e433440 FreeBSD -- Use after free in cryptodev module
9f27ac74-cdee-11eb-930d-fc4dd43e2b6a ircII -- denial of service
9f581778-e3d4-11dc-bb89-000bcdc1757a coppermine -- multiple vulnerabilities
9f65d382-56a4-11e7-83e3-080027ef73ec OpenVPN -- several vulnerabilities
9f7a0f39-ddc0-11e7-b5af-a4badb2f4699 FreeBSD -- OpenSSL multiple vulnerabilities
9f7ae7ea-da93-4f86-b257-ba76707f6d5d zeek -- Various vulnerabilities
9f971cea-03f5-11e0-bf50-001a926c7637 krb5 -- unkeyed PAC checksum handling vulnerability
9fa1a0ac-b2e0-11e3-bb07-6cf0490a8c18 Joomla! -- Core - Multiple Vulnerabilities
9fa7b139-c1e9-409e-bed0-006aadcf5845 xorg-server -- Multiple security issues in X server extensions
9fae0f1f-df82-11d9-b875-0001020eed82 tcpdump -- infinite loops in protocol decoding
9fb4e57b-d65a-11e9-8a5f-e5c82b486287 curl -- multiple vulnerabilities
9fba80e0-a771-11eb-97a0-e09467587c17 chromium -- multiple vulnerabilities
9fbaefb3-837e-11ea-b5b4-641c67a117d8 py-twisted -- multiple vulnerabilities
9fccad5a-7096-11d8-873f-0020ed76ef5a mpg123 vulnerabilities
9ff4c91e-328c-11d9-a9e7-0001020eed82 libxml -- remote buffer overflows
9fff8dc8-7aa7-11da-bf72-00123f589060 apache -- mod_imap cross-site scripting flaw
a003b74f-d7b3-11ea-9df1-001b217b3468 Gitlab -- Multiple Vulnerabilities
a005aea9-47bb-11ee-8e38-002590c1f29c FreeBSD -- Stack overflow in ping(8)
a0089e18-fc9e-11e4-bc58-001e67150279 rubygems -- request hijacking vulnerability
a00c76d9-0c05-4d99-bef7-ae4521cb2a4d zeek -- potential DoS vulnerabilty
a0128291-7690-11e6-95a8-0011d823eebd gnutls -- OCSP validation issue
a0182578-6e00-11e5-a90c-0026551a22dc PostgreSQL -- minor security problems.
a02c9595-e018-11dd-a765-0030843d3802 pdfjam -- insecure temporary files
a0321b74-031d-485c-bb76-edd75256a6f0 jenkins -- Stored XSS vulnerability
a03636f4-a29f-11ef-af48-6cc21735f730 PostgreSQL -- PL/Perl environment variable changes execute arbitrary code
a03b2d9e-b3f2-428c-8f66-21092ed2ba94 electron{23,24} -- multiple vulnerabilities
a03e043a-67f1-11e7-beff-6451062f0f7a Flash Player -- multiple vulnerabilities
a04247f1-8d9c-11e1-93c7-00215c6a37bb Dokuwiki -- cross site scripting vulnerability
a04a3c13-4932-11df-83fb-0015587e2cc1 ejabberd -- queue overload denial of service vulnerability
a0509648-65ce-4a1b-855e-520a75bd2549 py-cinder -- unauthorized data access
a051a4ec-3aa1-4dd1-9bdc-a61eb5700153 leafnode fetchnews denial-of-service triggered by truncated transmission
a058d6fa-7325-11dc-ae10-0016179b2dd5 tcl/tk -- buffer overflow in ReadImage function
a0602fa0-5c1c-11e9-abd6-001b217b3468 Gitlab -- Group Runner Registration Token Exposure
a0a4e24c-4760-11e5-9391-3c970e169bc2 vlc -- arbitrary pointer dereference vulnerability
a0afb4b9-89a1-11dd-a65b-00163e000016 squirrelmail -- Session hijacking vulnerability
a0c45e53-ae51-11e4-8ac7-d050992ecde8 openldap -- two remote denial of service vulnerabilities
a0c65049-bddd-11e2-a0f6-001060e06fd4 linux-flashplugin -- multiple vulnerabilities
a0d77bc8-c6a7-11e5-96d6-14dae9d210b8 typo3 -- multiple vulnerabilities
a0e74731-181b-11e5-a1cf-002590263bf5 cacti -- multiple security vulnerabilities
a0e92718-6603-11db-ab90-000e35fd8194 mysql -- database "case-sensitive" privilege escalation
a1050b8b-6db3-11e1-8b37-0011856a6e37 mozilla -- multiple vulnerabilities
a1126054-b57c-11dd-8892-0017319806e7 enscript -- arbitrary code execution vulnerability
a1134048-10c6-11e6-94fa-002590263bf5 libksba -- local denial of service vulnerabilities
a11e7dd1-bed4-11ee-bdd6-4ccc6adda413 qt5-webengine -- Multiple vulnerabilities
a12494c1-2af4-11e5-86ff-14dae9d210b8 apache24 -- multiple vulnerabilities
a130bd8c-eafe-11e6-9ac1-a4badb2f4699 libebml -- multiple vulnerabilities
a1323a76-28f1-11ed-a72a-002590c1f29c FreeBSD -- zlib heap buffer overflow
a13500d0-0570-11e5-aab1-d050996490d0 wireshark -- multiple vulnerabilities
a1360138-d446-11ec-8ea1-10c37b4ac2ea go -- syscall.Faccessat checks wrong group on Linux
a14dee30-e3d7-11e1-a084-50e5492bd3dc libcloud -- possible SSL MITM due to invalid regexp used to validate target server hostname
a163baff-3fe1-11d9-a9e7-0001020eed82 unarj -- long filename buffer overflow
a183acb5-1414-11e8-9542-002590acae31 p5-Mojolicious -- cookie-handling vulnerability
a1a1f81c-7c13-11ee-bcf1-f8b156b6dcc8 vorbistools -- heap buffer overflow in oggenc
a1d0911f-987a-11e1-a2ef-001fd0af1a4c node -- private information disclosure
a1de4ae9-6fda-11e9-9ba0-4c72b94353b5 gitea -- multiple vulnerabilities
a1e03a3d-7be0-11eb-b392-20cf30e32f6d salt -- multiple vulnerabilities
a1e27775-7a61-11ee-8290-a8a1599412c6 chromium -- multiple vulnerabilities
a1ef3fc0-8ad0-11dc-9490-0016179b2dd5 dircproxy -- remote denial of service
a20082c3-6255-11d8-80e3-0020ed76ef5a metamail format string bugs and buffer overflows
a2074ac6-124c-11de-a964-0030843d3802 php-mbstring -- php mbstring buffer overflow vulnerability
a207bbd8-6572-11e9-8e67-206a8a720317 FreeBSD -- EAP-pwd message reassembly issue with unexpected fragment
a21037d5-2c38-11de-ab3b-0017a4cccfc6 xpdf -- multiple vulnerabilities
a228c7a0-ba66-11e6-b1cf-14dae9d210b8 qemu -- denial of service vulnerability
a233d51f-5d4c-11e5-9ad8-14dae9d210b8 openjpeg -- use-after-free vulnerability
a23871f6-059b-11eb-8758-e0d55e2a8bf9 upnp -- denial of service (crash)
a23ebf36-e8b6-4665-b0f3-4c977f9a145c security/py-ecdsa -- multiple issues
a250539d-d1d4-4591-afd3-c8bdfac335d8 jenkins -- multiple vulnerabilities
a2565962-1156-11eb-9c9c-d4c9ef517024 MariaDB -- Undisclosed vulnerability
a258604d-f2aa-11e5-b4a9-ac220bdcec59 activemq -- Unsafe deserialization
a2589511-d6ba-11e7-88dd-00e04c1ea73d wordpress -- multiple issues
a25b323a-bed9-11ee-bdd6-4ccc6adda413 qt6-webengine -- Multiple vulnerabilities
a25ea27b-bced-11ec-87b5-3065ec8fd3ec chromium -- multiple vulnerabilities
a264b1b0-5726-11e2-9483-14dae938ec40 moinmoin -- Multiple vulnerabilities
a267cd6c-b0c4-11e5-8d13-bc5ff45d0f28 qemu -- stack buffer overflow while parsing SCSI commands
a268ef4a-0b35-11d9-8a8a-000c41e2cdad sudo -- sudoedit information disclosure
a27b0bb6-84fc-11ea-b5b4-641c67a117d8 Python -- Regular Expression DoS attack against client
a27d234a-c7f2-11e6-ae1b-002590263bf5 Joomla! -- multiple vulnerabilities
a28e8b7e-fc70-11ec-856e-d4c9ef517024 OpenSSL -- AES OCB fails to encrypt some bytes
a2a2b34d-52b4-11eb-87cb-001b217b3468 Gitlab -- multiple vulnerabilities
a2aa24fd-00d4-11da-bc08-0001020eed82 opera -- download dialog spoofing vulnerability
a2c4d3d5-4c7b-11df-83fb-0015587e2cc1 pidgin -- multiple remote denial of service vulnerabilities
a2caf7bd-a719-11ea-a857-e09467587c17 chromium -- multiple vulnerabilities
a2cb7c31-9c79-11ea-a9c2-d05099c0ae8c unbound -- mutliple vulnerabilities
a2d4a330-4d54-11de-8811-0030843d3802 wireshark -- PCNFSD Dissector Denial of Service Vulnerability
a2f35081-8a02-11e8-8fa5-4437e6ad11c4 mutt -- remote code injection and path traversal vulnerability
a2ff483f-a5c6-11e2-9601-000d601460a4 sieve-connect -- TLS hostname verification was not occurring
a2ffb627-9c53-11d8-9366-0020ed76ef5a lha buffer overflows and path traversal issues
a30573dc-4893-11df-a5f9-001641aeabdf krb5 -- remote denial of service vulnerability
a30e5e44-5440-11d9-9e1e-c296ac722cb3 squid -- confusing results on empty acl declarations
a30f1a12-117f-4dac-a1d0-d65eaf084953 electron{25,26} -- use after free in WebAudio
a32ef450-9781-414b-a944-39f2f61677f2 py-cryptography -- allows programmers to misuse an API
a3314314-f731-11df-a757-0011098ad87f horde-base -- XSS: VCARD attachments vulnerability
a33addf6-74e6-11e4-a615-f8b156b6dcc8 flac -- Multiple vulnerabilities
a3473f5a-a739-11e6-afaa-e8e0b747a45a chromium -- multiple vulnerabilities
a3495e61-047f-11eb-86ea-001b217b3468 Gitlab -- multiple vulnerabilities
a35f415d-572a-11e5-b0a4-f8b156b6dcc8 vorbis-tools, opus-tools -- multiple vulnerabilities
a3764767-f31e-11e7-95f2-005056925db4 irssi -- multiple vulnerabilities
a3929112-181b-11e5-a1cf-002590263bf5 cacti -- Multiple XSS and SQL injection vulnerabilities
a395397c-c7c8-11d9-9e1e-c296ac722cb3 squid -- possible abuse of cachemgr.cgi
a3a1caf5-6ba1-11ef-b9e8-b42e991fc52e firefox -- multiple vulnerabilities
a3b10c9b-99d9-11ed-aa55-d05099fed512 shells/fish -- arbitrary code execution via git
a3c2dee5-cdb9-11e2-b9ce-080027019be0 telepathy-gabble -- TLS verification bypass
a3cef1e6-51d8-11eb-9b8d-08002728f74c CairoSVG -- Regular Expression Denial of Service vulnerability
a3e24de7-3f0c-11e9-87d1-00012e582166 py-gunicorn -- CWE-113 vulnerability
a40ec970-0efa-11e5-90e4-d050996490d0 cups -- multiple vulnerabilities
a413ed94-836e-11d9-a9e7-0001020eed82 putty -- pscp/psftp heap corruption vulnerabilities
a430e15d-f93f-11e5-92ce-002590263bf5 moodle -- multiple vulnerabilities
a431676c-f86c-4371-b48a-b7d2b0bec3a3 electron29 -- setuid() does not affect libuv's internal io_uring
a4372a68-652c-11e0-a25a-00151735203a OTRS -- Several XSS attacks possible
a4460ac7-192c-11e5-9c01-bcaec55be5e5 devel/ipython -- remote execution
a449c604-a43a-11e9-b422-fcaa147e860e python 3.7 -- multiple vulnerabilities
a4598875-ec91-11e1-8bd8-0022156e8794 rssh -- configuration restrictions bypass
a45d945a-cc2c-4cd7-a941-fb58fdb1b01e jenkins -- Privilege escalation vulnerability in bundled Spring Security library
a460035e-d111-11e1-aff7-001fd056c417 libjpeg-turbo -- heap-based buffer overflow
a467d0f9-8875-11dc-b3ba-0016179b2dd5 wordpress -- cross-site scripting
a4746a86-4c89-11df-83fb-0015587e2cc1 e107 -- code execution and XSS vulnerabilities
a478421e-2059-11e5-a4a5-002590263bf5 ansible -- enable host key checking in paramiko connection type
a479a725-9adb-11e6-a298-14dae9d210b8 FreeBSD -- bhyve - privilege escalation vulnerability
a47af810-3a17-11e1-a1be-00e0815b8da8 spamdyke -- STARTTLS Plaintext Injection Vulnerability
a4815970-c5cc-11d8-8898-000d6111a684 rssh -- file name disclosure bug
a48d4478-e23f-4085-8ae4-6b3a7b6f016b wordpress -- multiple issues
a4955b32-ed84-11d9-8310-0001020eed82 wordpress -- multiple vulnerabilities
a4a809d8-25c8-11e1-b531-00215c6a37bb opera -- multiple vulnerabilities
a4b7def1-e165-11e6-9d84-90e2ba9881c8 Intel(R) NVMUpdate -- Intel(R) Ethernet Controller X710/XL710 NVM Security Vulnerability
a4bd3039-9a48-11d9-a256-0001020eed82 xv -- filename handling format string vulnerability
a4c9e12d-88b7-11e3-8ada-10bf48e1088e socat -- buffer overflow with data from command line
a4d71e4c-7bf4-11e2-84cd-d43d7e0c7c02 drupal7 -- Denial of service
a4eb38ea-cc06-11e8-ada4-408d5cf35399 tinc -- Buffer overflow
a4ed6632-5aa9-11e2-8fcb-c8600054b392 mozilla -- multiple vulnerabilities
a4f08579-516c-11e3-9b62-000c292e4fd8 samba -- ACLs are not checked on opening an alternate data stream on a file or directory
a4f2416c-02a0-11ed-b817-10c37b4ac2ea go -- multiple vulnerabilities
a4f8bb03-f52f-11ed-9859-080027083a05 curl -- multiple vulnerabilities
a4fd8f53-05eb-11d9-b45d-000c41e2cdad mozilla -- SOAPParameter integer overflow
a4ff3673-d742-4b83-8c2b-3ddafe732034 minio -- User privilege escalation
a505d397-0758-11e7-8d8b-e8e0b747a45a chromium -- multiple vulnerabilities
a512a412-3a33-11ea-af63-0800274e5f20 gitea -- multiple vulnerabilities
a51ad838-2077-48b2-a136-e888a7db5f8d openvpn -- denial of service: client certificate validation can disconnect unrelated clients
a522d6ac-4aed-11e6-97ea-002590263bf5 flash -- multiple vulnerabilities
a52a7172-c92e-11e5-96d6-14dae9d210b8 socat -- diffie hellman parameter was not prime
a537b449-2b19-11e2-b339-90e6ba652cce DomainKeys Identified Mail (DKIM) Verifiers may inappropriately convey message trust
a5403af6-225e-48ba-b233-bd95ad26434a py-Scrapy -- cookie injection vulnerability
a550d62c-f78d-4407-97d9-93876b6741b9 zeek -- several potential DoS vulnerabilities
a5681027-8e03-11e9-85f4-6805ca0b3d42 phpMyAdmin -- CSRF vulnerability in login form
a56a72bb-9f72-11d8-9585-0020ed76ef5a phpBB session table exhaustion
a5742055-300a-11d9-a9e7-0001020eed82 p5-Archive-Zip -- virus detection evasion
a57472ba-4d84-11ee-bf05-000c29de725b Python -- multiple vulnerabilities
a5856eba-a015-11e4-a680-1c6f65c3c4ff polarssl -- Remote attack using crafted certificates
a58f3fde-e4e0-11ec-8340-2d623369b8b5 e2fsprogs -- out-of-bounds read/write vulnerability
a592e991-a919-11e2-ade0-8c705af55518 roundcube -- arbitrary file disclosure vulnerability
a5934ba8-a376-11e5-85e9-14dae9d210b8 java -- multiple vulnerabilities
a5956603-7e4f-11ee-9df6-84a93843eb75 OpenSSL -- DoS in DH generation
a59afa47-c930-11dc-810c-0016179b2dd5 claws-mail -- insecure temporary file creation
a59e263a-45cd-11e5-adde-14dae9d210b8 freexl -- integer overflow
a5b24a6b-c37c-11e2-addb-60a44c524f57 otrs -- information disclosure
a5bb7ea0-3e58-11e7-94a2-00e04c1ea73d Wordpress -- multiple vulnerabilities
a5c204b5-4153-11e6-8dfe-002590263bf5 hive -- authorization logic vulnerability
a5c64f6f-2af3-11ef-a77e-901b0e9408dc go -- multiple vulnerabilities
a5cf3ecd-38db-11e8-8b7f-a4badb2f469b FreeBSD -- vt console memory disclosure
a5d4a82a-7153-11e4-88c7-6805ca0b3d42 phpMyAdmin -- XSS and information disclosure vulnerabilities
a5de43ed-bc49-11ec-b516-0897988a1c07 Asterisk -- func_odbc: Possible SQL Injection
a5e13973-6c75-11ef-858b-23eeba13701a forgejo -- multiple vulnerabilities
a5eb760a-753c-11d9-a36f-000a95bc6fae perl -- vulnerabilities in PERLIO_DEBUG handling
a5f160fa-deee-11e4-99f8-080027ef73ec mailman -- path traversal vulnerability
a5f667db-7596-11dc-8b7a-0019b944b34e xfs -- multiple vulnerabilities
a60a2e95-acba-4b11-bc32-ffb47364e07d libgd -- Denial of servica via double free
a60cc0e4-c7aa-11ed-8a4b-080027f5fec9 redis -- specially crafted MSETNX command can lead to denial-of-service
a612c25f-788a-11ee-8d57-001b217b3468 Gitlab -- Vulnerabilities
a61374fc-3a4d-11e6-a671-60a44ce6887b Python -- HTTP Header Injection in Python urllib
a61ef21b-a29e-11ef-af48-6cc21735f730 PostgreSQL -- libpq retains an error message from man-in-the-middle
a62c0c50-8aa0-11ee-ac0d-00e0670f2660 strongSwan -- vulnerability in charon-tkm
a633651b-b309-11e9-a87f-a4badb2f4699 FreeBSD -- Microarchitectural Data Sampling (MDS)
a636fc26-00d9-11e6-b704-000c292e4fd8 samba -- multiple vulnerabilities
a63b15f9-97ff-11dc-9e48-0016179b2dd5 samba -- multiple vulnerabilities
a63f2c06-726b-11e5-a12b-bcaec565249c flash -- multiple vulnerabilities
a6427195-c2c7-11d9-89f7-02061b08fc24 mozilla -- privilege escalation via non-DOM property overrides
a64aa22f-61ec-11e9-85b9-a4badb296695 dovecot -- json encoder crash
a6605f4b-4067-11de-b444-001372fd0af2 drupal -- cross-site scripting
a66f9be2-d519-11e7-9866-c85b763a2f96 xrdp -- local user can cause a denial of service
a6713190-dfea-11dd-a765-0030843d3802 imap-uw -- local buffer overflow vulnerabilities
a67c122a-b693-11e8-ac58-a4badb2f4699 FreeBSD -- Improper ELF header parsing
a67e358c-0bf6-11ec-875e-901b0e9408dc py-matrix-synapse -- several vulnerabilities
a6860b11-0dee-11eb-94ff-6805ca2fa271 powerdns-recursor -- cache pollution
a692bffe-b6ad-11e7-a1c2-e8e0b747a45a chromium -- multiple vulnerabilities
a6986f0f-3ac0-11ee-9a88-206a8a720317 krb5 -- Double-free in KDC TGS processing
a6a9f9d5-205c-11e5-a4a5-002590263bf5 ansible -- local symlink exploits
a6cc5753-f29e-11e5-b4a9-ac220bdcec59 activemq -- Web Console Cross-Site Scripting
a6cd01fa-11bd-11e6-bb3c-9cb654ea3e1c jansson -- local denial of service vulnerabilities
a6cf65ad-37d2-11ea-a1c7-b499baebfeaf MySQL -- Multiple vulerabilities
a6d5d4c1-0564-11ec-b69d-4062311215d5 FreeBSD -- Missing error handling in bhyve(8) device models
a6d9da4a-5d5e-11db-8faf-000c6ec775d9 NVIDIA UNIX driver -- arbitrary root code execution vulnerability
a6eb239f-adbe-11e4-9fce-080027593b9a chromium -- multiple vulnerabilities
a7003121-56bf-11e7-8e66-08606e46faad pear-Horde_Image -- remote code execution vulnerability
a7062952-9023-11d9-a22c-0001020eed82 phpmyadmin -- information disclosure vulnerability
a7080c30-91a2-11dc-b2eb-00b0d07e6c7e mt-daapd -- denial of service vulnerability
a711de5c-05fa-11d9-a9b2-00061bc2ad93 samba3 DoS attack
a713c0f9-ec54-11d8-9440-000347a4fa7d ImageMagick png vulnerability fix
a71e7440-1ba3-11e5-b43d-002590263bf5 elasticsearch -- directory traversal attack with site plugins
a733b5ca-06eb-11e6-817f-3085a9a4510d proftpd -- vulnerability in mod_tls
a73518da-b2fa-11e7-98ef-d43d7ef03aa6 Flash Player -- Remote code execution
a736deab-5d7d-11d8-80e3-0020ed76ef5a CCE contains exploitable buffer overflows
a737eb11-5cfc-11e9-ab87-8cec4bf8fcfb wget -- security flaw in caching credentials passed as a part of the URL
a73aba9a-effe-11e6-ae1b-002590263bf5 xen-tools -- oob access in cirrus bitblt copy
a75929bd-b6a4-11ed-bad6-080027f5fec9 emacs -- multiple vulnerabilities
a763a0e7-c3d9-11e5-b5fe-002590263bf5 privoxy -- multiple vulnerabilities
a7706414-1be7-11e2-9aad-902b343deec9 Wireshark -- Multiple Vulnerabilities
a7732806-0b2a-11ec-836b-3065ec8fd3ec chromium -- multiple vulnerabilities
a77849a5-696f-11d9-ae49-000c41e2cdad mozilla -- insecure permissions for some downloaded files
a78299e7-9ef3-11da-b410-000e0c2e438a libtomcrypt -- weak signature scheme with ECC keys
a7975581-ee26-11e1-8bd8-0022156e8794 inn -- plaintext command injection into encrypted channel
a7a4e96c-ba50-11e5-9728-002590263bf5 kibana4 -- XSS vulnerability
a7b97d26-9792-11eb-b87a-901b0ef719ab FreeBSD -- jail escape possible by mounting over jail root
a7bfd423-484f-11d9-a9e7-0001020eed82 cscope -- symlink attack vulnerability
a7c60af1-b3f1-11eb-a5f7-a0f3c100ae18 ImageMagick7 -- multiple vulnerabilities
a7dd4c2d-77e4-46de-81a2-c453c317f9de couchdb -- user privilege escalation
a7e0d783-131b-11d9-bc4a-000c41e2cdad mozilla -- users may be lured into bypassing security dialogs
a7f2e9c6-de20-11e5-8458-6cc21735f730 xerces-c3 -- Parser Crashes on Malformed Input
a80c6273-988c-11ec-83ac-080027415d17 cyrus-sasl -- Fix off by one error
a81161d2-790f-11e1-ac16-e0cb4e266481 phpMyAdmin -- Path disclosure due to missing verification of file presence
a8118db0-cac2-11ec-9288-0800270512f4 rainloop -- cross-site-scripting (XSS) vulnerability
a813a219-d2d4-11da-a672-000e0c2e438a zgv, xzgv -- heap overflow vulnerability
a81746a1-c2c7-11d9-89f7-02061b08fc24 mozilla -- "Wrapped" javascript: urls bypass security checks
a8326b61-eda0-4c03-9a5b-49ebd8f41c1a electron{26,27} -- multiple vulnerabilities
a83f25df-d775-11e0-8bf1-003067b2972c XSS issue in MantisBT
a8448963-e6f5-11ee-a784-dca632daf43b databases/mongodb* -- Improper Certificate Validation
a851b305-1bc3-11e3-95b7-00e0814cab4e django -- multiple vulnerabilities
a863aa74-24be-11da-8882-000e0c33c2dc X11 server -- pixmap allocation vulnerability
a8654f1d-770d-11eb-b87a-901b0ef719ab FreeBSD -- login.access fails to apply rules
a8674c14-83d7-11db-88d5-0012f06707f0 ruby -- cgi.rb library Denial of Service
a86f30e7-dce7-11da-bf3f-02e081235dab fswiki -- XSS vulnerability
a876df84-0fef-11db-ac96-000c6ec775d9 twiki -- multiple file extensions file upload vulnerability
a8818f7f-9182-11e2-9bdf-d48564727302 optipng -- use-after-free vulnerability
a8864f8f-aa9e-11e1-a284-0023ae8e59f0 databases/postgresql*-server -- crypt vulnerabilities
a891c5b4-3d7a-4de9-9c71-eef3fd698c77 mozilla -- multiple vulnerabilities
a89b76a7-f6bd-11dd-94d9-0030843d3802 amaya -- multiple buffer overflow vulnerabilities
a8af7d70-8007-11db-b280-0008743bf21a kronolith -- arbitrary local file inclusion vulnerability
a8ba7358-4b02-11e9-9ba0-4c72b94353b5 gitea -- XSS vulnerability
a8c8001b-216c-11e7-80aa-005056925db4 dovecot -- Dovecot DoS when passdb dict was used for authentication
a8d8713e-dc83-11da-a22b-000c6ec775d9 mysql50-server -- COM_TABLE_DUMP arbitrary code execution
a8d87c7a-d1b1-11e9-a616-0992a4564e7c oniguruma -- multiple vulnerabilities
a8d94711-0d03-11ea-87ca-001999f8d30b asterisk -- SIP request can change address of a SIP peer
a8de962a-cf15-11e5-805c-5453ed2e2b49 py-imaging, py-pillow -- Buffer overflow in PCD decoder
a8e9d834-a916-11e6-b9b4-bcaec524bf84 lives -- insecure files permissions
a8ec4db7-a398-11e5-85e9-14dae9d210b8 bind -- multiple vulnerabilities
a8f25565-109e-11e8-8d41-97657151f8c2 uwsgi -- a stack-based buffer overflow
a8fb8e3a-730d-11ee-ab61-b42e991fc52e squid -- Multiple vulnerabilities
a90d040e-f5b0-11e9-acc4-4576b265fda6 Loofah -- XSS vulnerability
a928960a-2bdc-11e5-86ff-14dae9d210b8 libav -- divide by zero
a92dcc5c-e05c-11e9-b589-10c37b4ac2ea go -- invalid headers are normalized, allowing request smuggling
a92ed304-716c-11e4-b008-001999f8d30b asterisk -- Multiple vulnerabilities
a9350df8-5157-11e5-b5c1-e8e0b747a45a chromium -- multiple vulnerabilities
a93c3287-d8fd-11e6-be5c-001fbc0f280f Ansible -- Command execution on Ansible controller from host
a95092a6-f8f1-11e0-a7ea-00215c6a37bb asterisk -- remote crash vulnerability in SIP channel driver
a955cdb7-d089-11ea-8c6f-080027eedc6a FreeRDP -- Integer overflow in RDPEGFX channel
a994ff7d-5b3f-11ec-8398-6c3be5272acd Grafana -- Directory Traversal
a99923a9-768c-11e9-885a-6451062f0f7a Flash Player -- arbitrary code execution
a9bcaf57-4a7b-11e6-97f7-5453ed2e2b49 p7zip -- heap overflow vulnerability
a9c51caf-6603-11db-ab90-000e35fd8194 mysql -- database suid privilege escalation
a9c5e89d-2d15-11ec-8363-0022489ad614 Node.js -- October 2021 Security Releases
a9c6e9be-61fb-11eb-b87a-901b0ef719ab FreeBSD -- Uninitialized kernel stack leaks in several file systems
a9d456b4-fe4c-11e4-ad15-00262d5ed8ee chromium -- multiple vulnerabilities
a9e466e8-4144-11e8-a292-00e04c1ea73d drupal -- Drupal Core - Multiple Vulnerabilities
a9eeb3a3-ca5e-11ea-930b-080027846a02 Python -- multiple vulnerabilities
a9f60ce8-a4e0-11e5-b864-14dae9d210b8 joomla -- multiple vulnerabilities
aa1aefe3-6e37-47db-bfda-343ef4acb1b5 Mozilla -- multiple vulnerabilities
aa1c7af9-570e-11ef-a43e-b42e991fc52e mozilla firefox -- protocol information guessing
aa2b65e4-2f63-11ef-9cab-4ccc6adda413 qt5-webengine -- Multiple vulnerabilities
aa4d3d73-ef17-11e1-b593-00269ef07d24 Calligra, KOffice -- input validation failure
aa4f86af-3172-11e2-ad21-20cf30e32f6d YUI JavaScript library -- JavaScript injection exploits in Flash components
aa5bc971-d635-11e0-b3cf-080027ef73ec nss/ca_root_nss -- fraudulent certificates issued by DigiNotar.nl
aa646c01-ea0d-11eb-9b84-d4c9ef517024 cURL -- Multiple vulnerabilities
aa71daaa-9f8c-11e1-bd0a-0082a0c18826 pidgin-otr -- format string vulnerability
aa743ee4-0f16-11e8-8fd2-10bf48e1088e electrum -- JSONRPC vulnerability
aa7764af-0b5e-4ddc-bc65-38ad697a484f rubygem-dragonfly -- arbitrary code execution
aaa9f3db-13b5-4a0e-9ed7-e5ab287098fa mozilla -- multiple vulnerabilities
aaab03be-932d-11e7-92d8-4b26fc968492 Django -- possible XSS in traceback section of technical 500 debug page
aab187d4-e0f3-11df-b1ea-001999392805 opera -- multiple vulnerabilities
aaba17aa-782e-4843-8a79-7756cfa2bf89 jenkins -- multiple vulnerabilities
aae2ab45-2d21-4cd5-a53b-07ec933400ac electron24 -- multiple vulnerabilities
aae8fecf-888e-11ea-9714-08002718de91 py-yaml -- FullLoader (still) exploitable for arbitrary command execution
aaea7b7c-4887-11ee-b164-001b217b3468 Gitlab -- Vulnerabilities
aaedf196-6436-11e7-8b49-002590263bf5 codeigniter -- input validation bypass
ab02f981-ab9e-11e6-ae1b-002590263bf5 moodle -- multiple vulnerabilities
ab04cb0b-c533-11e7-8da5-001999f8d30b asterisk -- Buffer overflow in CDR's set user
ab099d2c-8c8c-11e9-8ba7-6451062f0f7a Flash Player -- arbitrary code execution
ab0bab3c-2927-11ee-8608-07b8d3947721 gitea -- Disallow dangerous URL schemes
ab254c9d-9c36-11ef-8c1c-a8a1599412c6 chromium -- multiple security fixes
ab2575d6-39f0-11dc-b8cc-000fea449b8a tomcat -- XSS vulnerability in sample applications
ab2d7f62-af9d-11ec-a0b8-3065ec8fd3ec chromium -- multiple vulnerabilities
ab38d9f8-b787-11e8-8e7a-00e04c1ea73d mybb -- vulnerabilities
ab3e98d9-8175-11e4-907d-d050992ecde8 bind -- denial of service vulnerability
ab437561-47c0-11ee-8e38-002590c1f29c FreeBSD -- bhyve privileged guest escape via fwctl
ab4e6f65-a142-11ef-84e9-901b0e9408dc element-web -- several vulnerabilities
ab804e60-d693-11e6-9171-14dae9d210b8 moinmoin -- XSS vulnerabilities
ab881a74-c016-4e6d-9f7d-68c8e7cedafb xorg-server -- Multiple Issues
ab8dbe98-6be4-11db-ae91-0012f06707f0 ruby -- cgi.rb library Denial of Service
ab947396-9018-11e6-a590-14dae9d210b8 openoffice -- information disclosure vulnerability
ab9be2c8-ef91-11e0-ad5a-00215c6a37bb quagga -- multiple vulnerabilities
ab9c559e-115a-11d9-bc4a-000c41e2cdad mozilla -- BMP decoder vulnerabilities
aba28514-a414-11ef-98e7-84a93843eb75 Vaultwarden -- Multiple vulnerabilities
abaaecda-ea16-43e2-bad0-d34a9ac576b1 Dovecot -- improper input validation
abad20bf-c1b4-11e3-a5ac-001b21614864 OpenLDAP -- incorrect handling of NULL in certificate Common Name
abc3ef37-95d4-11ea-9004-25fadb81abf4 json-c -- integer overflow and out-of-bounds write via a large JSON file
abcacb5a-e7f1-11dd-afcd-00e0815b8da8 ipset-tools -- Denial of Service Vulnerabilities
abcc5ad3-7e6a-11e7-93f7-d43d7e971a1b GitLab -- two vulnerabilities
abe47a5a-e23c-11d8-9b0a-000347a4fa7d Mozilla certificate spoofing
abeb9b64-ce50-11db-bc24-0016179b2dd5 mplayer -- DMO File Parsing Buffer Overflow Vulnerability
abed4ff0-7da1-4236-880d-de33e4895315 moinmoin -- multiple vulnerabilities
abef280d-d829-11e2-b71c-8c705af55518 FreeBSD -- Privilege escalation via mmap
abfc932e-1ba8-11e8-a944-54ee754af08e chromium -- vulnerability
ac025402-4cbc-4177-bd99-c20c03a07f23 electron{29,30} -- multiple vulnerabilities
ac0900df-31d0-11e6-8e82-002590263bf5 botan -- multiple vulnerabilities
ac18046c-9b08-11e6-8011-005056925db4 Axis2 -- Security vulnerabilities on dependency Apache HttpClient
ac256985-b6a9-11e6-a3bf-206a8a720317 subversion -- Unrestricted XML entity expansion in mod_dontdothat and Subversionclients using http(s)
ac4b9d18-67a9-11d8-80e3-0020ed76ef5a fetchmail -- denial-of-service vulnerability
ac5ec8e3-3c6c-11e5-b921-00a0986f28c4 wordpress -- Multiple vulnerability
ac619d06-3ef8-11d9-8741-c942c075aa41 jdk/jre -- Security Vulnerability With Java Plugin
ac7da39b-4405-11e8-afbe-6805ca0b3d42 phpmyadmin -- CSRF vulnerability allowing arbitrary SQL execution
ac91cf5e-d098-11ec-bead-3065ec8fd3ec chromium -- multiple vulnerabilities
ac98d090-45cc-11e5-adde-14dae9d210b8 freexl -- multiple vulnerabilities
aca0d7e0-e38a-11e1-999b-e0cb4e266481 phpMyAdmin -- Path disclosure due to missing library
acab2f88-7490-11e1-865f-00e0814cab4e Apache Traffic Server -- heap overflow vulnerability
acb4eab6-3f6d-11ef-8657-001b217b3468 Gitlab -- vulnerabilities
acd5d037-1c33-11e5-be9c-6805ca1d3bb1 qemu -- Heap overflow in QEMU PCNET controller, allowing guest to host escape (CVE-2015-3209)
acf80afa-c3ef-11dd-a721-0030843d3802 vlc -- arbitrary code execution in the RealMedia processor
ad05a737-14bd-11ee-8290-a8a1599412c6 chromium -- multiple vulnerabilities
ad08d14b-ca3d-11df-aade-0050568f000c FreeBSD -- Improper environment sanitization in rtld(1)
ad2eeab6-ca68-4f06-9325-1937b237df60 consul -- vulnerability in embedded DNS library
ad2f3337-26bf-11d9-9289-000c41e2cdad xpdf -- integer overflow vulnerabilities
ad3451b9-23e0-11ea-8b36-f1925a339a82 e2fsprogs -- maliciously corrupted file systems can trigger buffer overruns in the quota code used by e2fsck
ad37a349-ebb7-11ec-b9f7-21427354249d mitmproxy -- Insufficient Protection against HTTP Request Smuggling
ad479f89-9020-11e6-a590-14dae9d210b8 file-roller -- path traversal vulnerability
ad4a00fa-0157-11dd-8bd3-001372ae3ab9 opera -- multiple vulnerabilities
ad4d3871-1a0d-11e5-b43d-002590263bf5 logstash-forwarder and logstash -- susceptibility to POODLE vulnerability
ad4f6ca4-6720-11d8-9fb5-000a95bc6fae lbreakout2 vulnerability in environment variable handling
ad5e70bb-c429-11d9-ac59-02061b08fc24 gaim -- MSN remote DoS vulnerability
ad61657d-26b9-11d9-9289-000c41e2cdad gaim -- Content-Length header denial-of-service vulnerability
ad747a01-1fee-11e4-8ff1-f0def16c5c1b nginx -- inject commands into SSL session vulnerability
ad74a1bd-16d2-11d9-bc4a-000c41e2cdad php -- php_variables memory disclosure
ad792169-2aa4-11eb-ab71-0022489ad614 Node.js -- November 2020 Security Releases
ad82b0e9-c3d6-11e5-b5fe-002590263bf5 privoxy -- malicious server spoofing as proxy vulnerability
ad91ee9b-d599-11e5-8fa8-14dae9d210b8 adminer -- XSS vulnerability
ad9b77f6-4163-11e6-b05b-14dae9d210b8 icingaweb2 -- remote code execution
ad9d2518-3471-4737-b60b-9a1f51023b28 mailman -- password disclosure
ada8db8a-8471-11e9-8170-0050562a4d7b buildbot -- OAuth Authentication Vulnerability
adbb32d9-7ac5-11e5-b35a-002590263bf5 Joomla! -- Core - XSS Vulnerability
adcbdba2-4c27-11e3-9848-98fc11cdc4f5 linux-flashplugin -- multiple vulnerabilities
adccefd1-7080-11e6-a2cb-c80aa9043978 openssh -- sshd -- remote valid user discovery and PAM /bin/login attack
add683be-bd76-11ec-a06f-d4c9ef517024 MySQL -- Multiple vulnerabilities
addad6de-d752-11e7-99bf-00e04c1ea73d mybb -- multiple vulnerabilities
addc71b8-6024-11ef-86a1-8c164567ca3c nginx -- Vulnerability in the ngx_http_mp4_module
adffe51e-9df5-11ef-a660-d85ed309193e lrzsz -- Integer overflow in zmodem, crash and information leak
adffe823-e692-4921-ae9c-0b825c218372 graphite2 -- multiple vulnerabilities
ae0e5835-3cad-11e0-b654-00215c6a37bb PivotX -- administrator password reset vulnerability
ae0ee356-6ae1-11ee-bfb6-8c164567ca3c libcue -- out-of-bounds array access
ae132c6c-d716-11ed-956f-7054d21a9e2a py-tensorflow -- denial of service vulnerability
ae2e7871-80f6-11ea-bafd-815569f3852d ansible - Vault password leak from temporary file
ae2fa87c-4bca-4138-8be1-67ce2a19b3a8 rubygem-actionpack -- Denial of Service
ae377aeb-9ed4-11e5-8f5c-002590263bf5 redmine -- CSRF protection bypass
ae5722a6-f5f0-11ec-856e-d4c9ef517024 cURL -- Multiple vulnerabilities
ae599263-bca2-11ea-b78f-b42e99a1b9c3 samba -- Multiple Vulnerabilities
ae6ec9b8-2f43-4d02-8129-c6a3a53ef09d xview -- multiple buffer overflows in xv_parse_one
ae7124ff-547c-11db-8f1a-000a48049292 openldap -- slapd acl selfwrite Security Issue
ae7b7f65-05c7-11d9-b45d-000c41e2cdad webmin -- insecure temporary file creation at installation time
ae8b1445-6833-11ee-b06f-0050569ceb3a Privilege Escalation from technician to super-admin in GLPI
ae8c09cb-32da-11e5-a4a5-002590263bf5 elasticsearch -- directory traversal attack via snapshot API
ae9cb9b8-a203-11e6-a265-3065ec8fd3ec chromium -- out-of-bounds memory access
ae9fb0d7-c4dc-11da-b2fb-000e0c2e438a netpbm -- buffer overflow in pnmtopng
aea8d90e-b0c1-11e5-8d13-bc5ff45d0f28 qemu -- code execution on host machine
aeb4c85b-3600-11ed-b52d-589cfc007716 puppetdb -- Potential SQL injection
aeb7874e-8df1-11e6-a082-5404a68ad561 mkvtoolnix -- code execution via specially crafted files
aeb962f6-ab8d-11e2-b3f5-003067c2616f tinc -- Buffer overflow
aec9cbe0-3b0f-11eb-af2a-080027dbe4b7 glpi -- able to read any token through API user endpoint
aecee357-739e-11e1-a883-001cc0a36e12 gnutls -- possible overflow/Denial of service vulnerabilities
aed343b4-5480-11da-b579-001125afbed7 Macromedia flash player -- swf file handling arbitrary code
aed44c4e-c067-11e1-b5e0-000c299b62e1 FreeBSD -- Privilege escalation when returning from kernel
af0296be-2455-11d8-82e5-0020ed76ef5a fetchmail -- address parsing vulnerability
af065e47-5d62-11ee-bbae-1c61b4739ac9 xrdp -- unchecked access to font glyph info
af19ecd0-0f6a-11e7-970f-002590263bf5 xen-tools -- Cirrus VGA Heap overflow via display refresh
af2745c0-c3e0-11dd-a721-0030843d3802 mantis -- php code execution vulnerability
af38cfec-27e7-11e5-a4a5-002590263bf5 xen-tools -- Potential unintended writes to host MSI message data field via qemu
af485ef4-1c58-11e8-8477-d05099c0ae8c ntp -- multiple vulnerabilities
af61b271-9e47-4db0-a0f6-29fb032236a3 zookeeper -- Denial Of Service
af747389-42ba-11d9-bd37-00065be4b5b6 mod_access_referer -- null pointer dereference vulnerability
af7fbd91-29a1-11e5-86ff-14dae9d210b8 php -- use-after-free vulnerability
af8dba15-f4cc-11da-87a1-000c6ec775d9 dokuwiki -- spellchecker remote PHP code execution
af8e3a0c-5009-11dc-8a43-003048705d5a rsync -- off by one stack overflow
af9018b6-a4f5-11da-bb41-0011433a9404 squirrelmail -- multiple vulnerabilities
afa018d9-8557-11ea-a5e2-d4c9ef517024 Nextcloud -- multiple vulnerabilities
afc60484-0652-440e-b01a-5ef814747f06 ruby -- multiple vulnerabilities
afdc7579-d023-11eb-bcad-3065ec8fd3ec chromium -- multiple vulnerabilities
afdf500f-c1f6-11db-95c5-000c6ec775d9 snort -- DCE/RPC preprocessor vulnerability
b018121b-7a4b-11e6-bf52-b499baebfeaf cURL -- Escape and unescape integer overflows
b019585a-bfea-11ec-b46c-b42e991fc52e zgrep -- arbitrary file write
b02c1d80-e1bb-11d9-b875-0001020eed82 trac -- file upload/download vulnerability
b036faba-edd8-11e8-b3b7-00e04c1ea73d phpmailer -- Multiple vulnerability
b0374722-3912-11ef-a77e-901b0e9408dc go -- net/http: denial of service due to improper 100-continue handling
b058380e-21a4-11ef-8a0f-a8a1599412c6 chromium -- multiple security fixes
b060ee50-daba-11e3-99f2-bcaec565249c libXfont -- X Font Service Protocol and Font metadata file handling issues
b0628e53-092a-4037-938b-29805a7cd31b mercurial -- multiple issues
b073677f-253a-41f9-bf2b-2d16072a25f6 minio -- MITM attack
b07bdd3c-0809-11eb-a3a4-0019dbb15b3f Payara -- path trasversal flaw via either loc/con parameters in Eclipse Mojarra
b07f3254-f83a-11dd-85a4-ea653f0746ab pyblosxom -- atom flavor multiple XML injection vulnerabilities
b088bf48-da3b-11da-93e0-00123ffe8333 clamav -- Freshclam HTTP Header Buffer Overflow Vulnerability
b0911985-6e2a-11d9-9557-000a95bc6fae web browsers -- window injection vulnerabilities
b092bd4f-1b16-11ec-9d9d-0022489ad614 Node.js -- August 2021 Security Releases
b09d77d0-b27c-48ae-b69b-9641bb68b39e electron -- vulnerability
b0c83e1a-8153-11ec-84f9-641c67a117d8 varnish -- Request Smuggling Vulnerability
b0d61f73-0e11-11db-a47b-000c2957fdf1 trac -- reStructuredText breach of privacy and denial of service vulnerability
b0da85af-21a3-4c15-a137-fe9e4bc86002 ffmpeg -- multiple vulnerabilities
b0e1fa2b-9c86-11ed-9296-002b67dfc673 re2c -- uncontrolled recursion
b0e54dc1-45d2-11e5-adde-14dae9d210b8 django -- multiple vulnerabilities
b0e76877-67a8-11d8-80e3-0020ed76ef5a mailman denial-of-service vulnerability in MailCommandHandler
b0f3ab1f-1f3b-11e2-8fe9-0022156e8794 Exim -- remote code execution
b0f49cb9-6736-11ec-9eea-589cfc007716 OpenSearch -- Log4Shell
b10d1afa-6087-11ed-8c5e-641c67a117d8 varnish -- Request Smuggling Vulnerability
b1194286-958e-11eb-9c34-080027f515ea curl -- Automatic referer leaks credentials
b11ab01b-6e19-11e6-ab24-080027ef73ec mailman -- CSRF protection enhancements
b12a341a-0932-11ea-bf09-080027e0baa0 gitea -- multiple vulnerabilities
b13414c9-50ba-11e0-975a-000c29cc39d3 hiawatha -- integer overflow in Content-Length header parsing
b13af778-f4fc-11e4-a95d-ac9e174be3af Vulnerability in HWP document filter
b14a6ddc-6821-11ee-b06f-0050569ceb3a GLPI vulnerable to reflected XSS in search pages
b162b218-c547-4ba2-ae31-6fdcb61bc763 puppet -- Unauthenticated Remote Code Execution Vulnerability
b168ddea-105a-11db-ac96-000c6ec775d9 samba -- memory exhaustion DoS in smbd
b17bce48-b7c6-11ed-b304-080027f5fec9 redis -- multiple vulnerabilities
b17c86b9-e52e-11e9-86e9-001b217b3468 Gitlab -- Multiple Vulnerabilities
b180d1fb-dac6-11e6-ae1b-002590263bf5 wordpress -- multiple vulnerabilities
b19da422-1e02-11e5-b43d-002590263bf5 cups-filters -- buffer overflow in texttopdf size allocation
b1aa54ae-74cb-42a0-b462-cbb6831c5c50 RabbitMQ -- Denial of Service in AMQP1.0 plugin
b1ac663f-3aa9-11ee-b887-b42e991fc52e typo3 -- multiple vulnerabilities
b1b039ec-dbfc-11ee-9165-901b0e9408dc go -- multiple vulnerabilities
b1b5c125-2308-11dc-b91a-001921ab2fa4 evolution-data-server -- remote execution of arbitrary code vulnerability
b1b6d623-83e4-11ec-90de-1c697aa5a594 FreeBSD -- vt console buffer overflow
b1bcab7d-1880-11dd-a914-0016179b2dd5 sdl_image -- buffer overflow vulnerabilities
b1ca65e6-5aaf-11de-bc9b-0030843d3802 pidgin -- multiple vulnerabilities
b1d6b383-dd51-11ea-a688-7b12871ef3ad ilmbase, openexr -- v2.5.3 is a patch release with various bug/security fixes
b1e8c810-01d0-11da-bc08-0001020eed82 sylpheed -- MIME-encoded file name buffer overflow vulnerability
b1f7d52f-fc42-48e8-8403-87d4c9d26229 mozilla -- multiple vulnerabilities
b202e4ce-3114-11e5-aa32-0026551a22dc shibboleth-sp -- DoS vulnerability
b206dd82-ac67-11d9-a788-0001020eed82 openoffice -- DOC document heap overflow vulnerability
b21790a5-02fb-11dd-bd06-0017319806e7 powerdns-recursor -- DNS cache poisoning
b22b016b-b633-11e5-83ef-14dae9d210b8 librsync -- collision vulnerability
b22d6d4c-53b9-11e9-9310-28d244aee256 znc -- Denial of Service
b2383758-5f15-11db-ae08-0008743bf21a drupal -- multiple XSS vulnerabilities
b2407db1-d79f-11ec-a15f-589cfc0f81b0 clamav -- Multiple vulnerabilities
b2487d9a-0c30-11e6-acd0-d050996490d0 ntp -- multiple vulnerabilities
b2571f88-a867-11dc-a6f0-00a0cce0781e smbftpd -- format string vulnerability
b2765c89-a052-11ee-bed2-596753f1a87c gitea -- Prefix Truncation Attack against ChaCha20-Poly1305 and Encrypt-then-MAC aka Terrapin
b278783f-5c1d-11ed-a21f-001fc69cd6dc pixman -- heap overflow
b2789b2d-d521-11e9-86e9-001b217b3468 Gitlab -- Multiple Vulnerabilities
b28adc5b-6693-11e7-ad43-f0def16c5c1b nginx -- a specially crafted request might result in an integer overflow
b2952517-07e5-4d19-8850-21c5b7e0623f libzip -- denial of service
b299417a-5725-11ec-a587-001b217b3468 Gitlab -- Multiple Vulnerabilities
b2a1a3b5-ed95-11d9-8310-0001020eed82 net-snmp -- remote DoS vulnerability
b2a40507-5c88-11e0-9e85-00215af774f0 quagga -- two DoS vulnerabilities
b2a4c5f1-f1fe-11ec-bcd2-3065ec8fd3ec chromium -- multiple vulnerabilities
b2b83761-6a09-11ea-92ab-00163e433440 FreeBSD -- Insufficient ixl(4) ioctl(2) privilege checking
b2caae55-dc38-11ee-96dc-001b217b3468 Gitlab -- Vulnerabilities
b2cfb400-1df0-11d9-a859-0050fc56d258 icecast -- Cross-Site Scripting Vulnerability
b2d248ad-88f6-11d9-aa18-0001020eed82 cyrus-imapd -- multiple buffer overflow vulnerabilities
b2e6d1d6-1339-11d9-bc4a-000c41e2cdad mozilla -- scripting vulnerabilities
b2eaa7c2-e64a-11df-bc65-0022156e8794 Wireshark -- DoS in the BER-based dissectors
b2f09169-55af-11e0-9d6f-000f20797ede mozilla -- update to HTTPS certificate blacklist
b2f1f86f-20e6-11ec-a574-080027eedc6a nexus2-oss -- NXRM2 Directory Traversal vulnerability
b2f4ab91-0e6b-11e9-8700-001b217b3468 Gitlab -- Multiple vulnerabilities
b2f9573a-008c-11ea-9801-10c37b4ac2ea nexus2-oss -- Multiple vulerabilities
b2ff68b2-9f29-11db-a4e4-0211d87675b7 mplayer -- buffer overflow in the code for RealMedia RTSP streams.
b318dc8c-6756-11db-83c3-000c6ec775d9 screen -- combined UTF-8 characters vulnerability
b31a1088-460f-11de-a11a-0022156e8794 GnuTLS -- multiple vulnerabilities
b31f7029-817c-4c1f-b7d3-252de5283393 py-suds -- vulnerable to symlink attacks
b330db5f-7225-11eb-8386-001999f8d30b asterisk -- Remote crash in res_pjsip_diversion
b339992e-6059-11ef-8a0f-a8a1599412c6 chromium -- multiple security fixes
b33fb1e0-4c37-11e7-afeb-0011d823eebd GnuTLS -- Denial of service vulnerability
b3435b68-9ee8-11e1-997c-002354ed89bc sudo -- netmask vulnerability
b34c1947-a749-11ed-b24b-1c61b4739ac9 TightVNC -- Muliple Vulnerabilities
b3531fe1-2b03-11df-b6db-00248c9b4be7 drupal -- multiple vulnerabilities
b360b120-74b1-11ea-a84a-4c72b94353b5 Apache -- Multiple vulnerabilities
b3695b08-3b3a-11eb-af2a-080027dbe4b7 glpi -- Public GLPIKEY can be used to decrypt any data
b371db92-fe34-11ea-b90e-6805ca2fa271 powerdns -- Leaking uninitialised memory through crafted zone records
b384cc5b-8d56-11e1-8d7b-003067b2972c wordpress -- multiple vulnerabilities
b38e8150-0535-11e8-96ab-0800271d4b9c tiff -- multiple vulnerabilities
b396cf6c-62e6-11e7-9def-b499baebfeaf oniguruma -- multiple vulnerabilities
b39bdc06-ee42-11dc-8678-00a0cce0781e dovecot -- security hole in blocking passdbs
b3aae7ea-3aef-11eb-af2a-080027dbe4b7 glpi -- SQL injection for all helpdesk instances
b3affee8-04d1-11ef-8928-901b0ef714d4 py-social-auth-app-django -- Improper Handling of Case Sensitivity
b3b8d491-0fbb-11e3-8c50-1c6f65c11ee6 cacti -- allow remote attackers to execute arbitrary SQL commands
b3cd00f7-c0c5-452d-87bc-086c5635333e mailman -- generated passwords are poor quality
b3e04661-2a0a-11e8-9e63-3085a9a47796 slurm-wlm -- SQL Injection attacks against SlurmDBD
b3edc7d9-9af5-4daf-88f1-61f68f4308c2 Jupyter Notebook -- vulnerability
b3f77aae-241c-11ee-9684-c11c23f7b0f9 gitea -- multiple issues
b3f9f8ef-b1bb-11e5-9728-002590263bf5 qemu -- denial of service vulnerability in MegaRAID SAS HBA emulation
b3fcb387-de4b-11e2-b1c6-0025905a4771 mozilla -- multiple vulnerabilities
b3fd12ea-917a-11ed-acbe-b42e991fc52e cassandra3 -- jBCrypt integer overflow
b4051b52-58fa-11e2-853b-00262d5ed8ee rubygem-rails -- SQL injection vulnerability
b428e6b3-926c-11e1-8d7b-003067b2972c portupgrade-devel -- lack of distfile checksums
b42e8c32-34f6-11dc-9bc9-001921ab2fa4 linux-flashplugin -- critical vulnerabilities
b43004b8-6a53-11df-bc7b-0245fb008c0b ziproxy -- atypical huge picture files vulnerability
b4578647-c12b-11e5-96d6-14dae9d210b8 bind -- denial of service vulnerability
b464f61b-84c7-4e1c-8ad4-6cf9efffd025 clamav -- multiple vulnerabilities
b46f3a1e-a052-11de-a649-000c2955660f xapian-omega -- cross-site scripting vulnerability
b471130b-fb86-11eb-87db-6cc21735f730 PostgreSQL server -- Memory disclosure in certain queries
b4892b5b-fb1c-11d9-96ba-00909925db3e egroupware -- multiple cross-site scripting (XSS) and SQL injection vulnerabilities
b48e7b14-052a-11ea-a1de-53b029d2b061 libmad -- multiple vulnerabilities
b495af21-9e10-11ea-9e83-0cc47ac16c9d qmail -- 64 bit integer overflows with possible remote code execution on large SMTP requests
b4af3ede-36e9-11d9-a9e7-0001020eed82 twiki -- arbitrary shell command execution
b4b7ec7d-ca27-11e7-a12d-6cc21735f730 shibboleth2-sp -- "Dynamic" metadata provider plugin issue
b4d94fa0-6e38-11d9-9e1e-c296ac722cb3 squid -- possible cache-poisoning via malformed HTTP responses
b4db7d78-bb62-4f4c-9326-6e9fc2ddd400 jenkins -- CSRF protection bypass vulnerability
b4e5f782-442d-11ea-9ba9-206a8a720317 sudo -- Potential bypass of Runas user restrictions
b4ecf774-eb01-11e6-9ac1-a4badb2f4699 guile2 -- multiple vulnerabilities
b4ef02f4-549f-11ed-8ad9-3065ec8fd3ec chromium -- multiple vulnerabilities
b4f0ad36-94a5-11e8-9007-080027ac955c mailman -- content spoofing with invalid list names in web UI
b4f8be9e-56b2-11e1-9fb7-003067b2972c Python -- DoS via malformed XML-RPC / HTTP POST request
b50913ce-f4a7-11e1-b135-003067b2972c bitcoin -- denial of service
b50cbbc0-7fb2-11e2-9c5a-000d601460a4 otrs -- XSS vulnerability in Internet Explorer could lead to remote code execution
b50f53ce-2151-11e6-8dd3-002590263bf5 mediawiki -- multiple vulnerabilities
b51cfaea-e919-11ec-9fba-080027240888 py-numpy -- Missing return-value validation of the function PyArray_DescrNew
b51d5391-bb76-11ea-9172-4c72b94353b5 drupal -- Multiple Vulnerabilities
b51d9e83-de08-11e8-9416-001b217b3468 Gitlab -- SSRF in Kubernetes integration
b53bbf58-257f-11e6-9f4d-20cf30e32f6d openvswitch -- MPLS buffer overflow
b54abe9d-7024-4d10-98b2-180cf1717766 py-beaker -- arbitrary code execution vulnerability
b5508c08-547a-11ee-85eb-84a93843eb75 Roundcube -- XSS vulnerability
b55ecf12-5d98-11e5-9909-002590263bf5 remind -- buffer overflow with malicious reminder file input
b56fe6bb-b1b1-11e5-9728-002590263bf5 qemu -- denial of service vulnerabilities in eepro100 NIC support
b57f690e-ecc9-11e4-876c-00262d5ed8ee chromium -- multiple vulnerabilities
b582a85a-ba4a-11ec-8d1e-3065ec8fd3ec Chromium -- mulitple vulnerabilities
b58ff497-6977-11d9-ae49-000c41e2cdad tiff -- divide-by-zero denial-of-service
b59847e0-346d-11ed-8fe9-3065ec8fd3ec chromium -- multiple vulnerabilities
b5a49db7-72fc-11da-9827-021106004fd6 scponly -- local privilege escalation exploits
b5e22ec5-bc4b-11ee-b0b5-b42e991fc52e rclone -- Multiple vulnerabilities
b5e654c3-5644-11e5-9ad8-14dae9d210b8 libvncserver -- memory corruption
b5fc63ad-c4c3-11da-9699-00123ffe8333 dia -- XFig Import Plugin Buffer Overflow
b5ffaa2a-ee50-4498-af99-61bc1b163c00 leafnode -- denial of service vulnerability
b6069837-aadc-11df-82df-0015f2db7bde OpenTTD -- Denial of service (server) via infinite loop
b62c80c2-b81a-11da-bec5-00123ffe8333 heimdal -- Multiple vulnerabilities
b63421b6-a1e0-11e7-ac58-b499baebfeaf weechat -- crash in logger plugin
b6402385-533b-11e6-a7bd-14dae9d210b8 php -- multiple vulnerabilities
b64481d9-eff4-11d9-8310-0001020eed82 pear-XML_RPC -- information disclosure vulnerabilities
b64a7389-7c27-11e6-8aaa-5404a68ad561 Remote-Code-Execution vulnerability in mysql and its variants CVE 2016-6662
b64edef7-3b10-11eb-af2a-080027dbe4b7 glpi -- weak csrf tokens
b6587341-4d88-11e4-aef9-20cf30e32f6d Bugzilla multiple security issues
b65e4914-b3bc-11e5-8255-5453ed2e2b49 tiff -- out-of-bounds read in CIE Lab image format
b6612eee-df5f-11d9-b875-0001020eed82 gaim -- MSN Remote DoS vulnerability
b665668a-91db-4f13-8113-9e4b5b0e47f7 jenkins -- remote code execution via unsafe deserialization
b66583ae-5aee-4cd5-bb31-b2d397f8b6b3 librsvg2 -- multiple vulnerabilities
b67d768c-1f53-11ee-82ed-4ccc6adda413 librecad -- out-of-bounds read in importshp plugin
b68cc195-cae7-11e9-86e9-001b217b3468 Gitlab -- Multiple Vulnerabilities
b69292e8-e798-11e8-ae07-6451062f0f7a Flash Player -- information disclosure
b692a49c-9ae7-4958-af21-cbf8f5b819ea py-impacket -- multiple path traversal vulnerabilities
b6939d5b-64a1-11d9-9106-000a95bc6fae libxine -- multiple vulnerabilities in VideoCD handling
b6a84729-6bd0-11ed-8d9a-b42e991fc52e advancecomp -- Multiple vulnerabilities
b6beb137-9dc0-11e2-882f-20cf30e32f6d Subversion -- multiple vulnerabilities
b6c18956-5fa3-11db-ad2d-0016179b2dd5 plone -- unprotected MembershipTool methods
b6c875f1-1d76-11ec-ae80-704d7b472482 chromium -- use after free in Portals
b6cad7f3-fb59-11d8-9837-000c41e2cdad ImageMagick -- BMP decoder buffer overflow
b6da24da-23f7-11e5-a4a5-002590263bf5 squid -- client-first SSL-bump does not correctly validate X509 server certificate
b6dd9d93-e09b-11ee-92fc-1c697a616631 Intel CPUs -- multiple vulnerabilities
b6ef8a53-8062-11ec-9af3-fb232efe4d2e OpenEXR -- Heap-buffer-overflow in Imf_3_1::LineCompositeTask::execute
b6f6da57-680a-11dc-b350-001921ab2fa4 clamav -- multiple remote Denial of Service vulnerabilities
b6f7ad7d-9b19-11ed-9a3f-b42e991fc52e net/eternalterminal -- Multiple vulnerabilities
b70b880f-5727-11ea-a2f3-001cc0382b2f Mbed TLS -- Side channel attack on ECDSA
b71d7193-3c54-11e9-a3f9-00155d006b02 Node.js -- multiple vulnerabilities
b72bad1c-20ed-11e3-be06-000c29ee3065 FreeBSD -- Cross-mount links between nullfs(5) mounts
b73335a5-3bbe-11dc-8e83-0016179b2dd5 libvorbis -- Multiple memory corruption flaws
b73d1f2a-96de-11ef-9e71-00d8612f03c8 librewolf -- Undefined behavior in selection node cache
b747783f-5fb6-11e9-b2ac-08002705f877 gitea -- remote code execution
b747b2a9-7be0-11da-8ec4-0002b3b60e4c bogofilter -- heap corruption through excessively long words
b74a8076-9b1f-11df-9f58-021e8c343e76 isolate -- local root exploit
b77b5646-a778-11e7-ac58-b499baebfeaf dnsmasq -- multiple vulnerabilities
b79ec16b-9da7-11e9-a0ea-a92fe7db4867 ettercap -- out-of-bound read vulnerability
b7a7576d-8e0a-11e3-9976-9c4e36909cc0 linux-flashplugin -- multiple vulnerabilities
b7abdb0f-3b15-11eb-af2a-080027dbe4b7 glpi -- Multiple SQL Injections Stemming From isNameQuoted()
b7cb488c-8349-11d8-a41f-0020ed76ef5a isakmpd payload handling denial-of-service vulnerabilities
b7cff5a9-31cc-11e8-8f07-b499baebfeaf OpenSSL -- multiple vulnerabilities
b7d56d0b-7a11-11e6-af78-589cfc0654e1 openjpeg -- multiple vulnerabilities
b7d785ea-656d-11e5-9909-002590263bf5 codeigniter -- SQL injection vulnerability
b7d89082-e7c0-11e7-ac58-b499baebfeaf MariaDB -- unspecified vulnerability
b7dc4dde-2e48-43f9-967a-c68461537cf2 dovecot -- null pointer deref in notify with empty headers
b7e23050-2d5d-4e61-9b48-62e89db222ca mozilla -- multiple vulnerabilities
b805d7b4-9c0c-11e9-97f0-000c29e96db4 Django -- Incorrect HTTP detection with reverse-proxy connecting via HTTPS
b808c3a8-ae30-11e5-b864-14dae9d210b8 inspircd -- DoS
b80f039d-579e-4b82-95ad-b534a709f220 bro -- "Magellan" remote code execution vulnerability in bundled sqlite
b81ad6d6-8633-11eb-99c5-e09467587c17 chromium -- multiple vulnerabilities
b8321d76-24e7-4b72-a01d-d12c4445d826 mozilla -- multiple vulnerabilities
b84a992a-12ab-11dd-bab7-0016179b2dd5 openfire -- unspecified denial of service
b84dbd94-e894-4c91-b8cd-d328537b1b2b ncurses -- multiple issues
b857606c-0266-11ef-8681-001b217b3468 Gitlab -- vulnerabilities
b88aa380-1442-11ef-a490-84a93843eb75 OpenSSL -- Denial of Service vulnerability
b8943e61-6e68-11d9-a9e7-0001020eed82 evolution -- arbitrary code execution vulnerability
b8a0fea2-9be9-11ed-8acf-0800277bb8a8 gitea -- information disclosure
b8a52e5a-483d-11ee-971d-3df00e0f9020 Borg (Backup) -- flaw in cryptographic authentication scheme in Borg allowed an attacker to fake archives and indirectly cause backup data loss.
b8ae4659-a0da-11e1-a294-bcaec565249c libxml2 -- An off-by-one out-of-bounds write by XPointer
b8c0cbca-472d-11ec-83dc-3065ec8fd3ec chromium -- multiple vulnerabilities
b8e361b8-b7ff-11da-8414-0013d4a4a40e curl -- TFTP packet buffer overflow vulnerability
b8ea5b66-deff-11ea-adef-641c67a117d8 snmptt -- malicious shell code
b8ee7a81-a879-4358-9b30-7dd1bd4c14b1 libevent -- multiple vulnerabilities
b9044cc2-8aa5-11db-bd0d-00123ffe8333 wv2 -- Integer Overflow Vulnerability
b905dff4-e227-11ea-b0ea-08002728f74c curl -- expired pointer dereference vulnerability
b9077cc4-6d04-4bcb-a37a-9ceaebfdcc9e ganglia -- buffer overflow vulnerability
b91234e7-9a8b-11e1-b666-001636d274f3 NVIDIA UNIX driver -- access to arbitrary system memory
b9210706-feb0-11ec-81fa-1c697a616631 Node.js -- July 7th 2022 Security Releases
b927b654-7146-11ec-ad4b-5404a68ad561 uriparser -- Multiple vulnerabilities
b9281fb9-61b2-11e0-b1ce-0019d1a7ece2 tinyproxy -- ACL lists ineffective when range is configured
b950a83b-789e-11e8-8545-d8cb8abf62dd Gitlab -- multiple vulnerabilities
b9591212-dba7-11e8-9416-001b217b3468 Gitlab -- multiple vulnerabilities
b95e5674-b4d6-11e7-b895-0cc47a494882 arj -- multiple vulnerabilities
b971d2a6-1670-11da-978e-0001020eed82 pcre -- regular expression buffer overflow
b973a763-7936-11e5-a2a1-002590263bf5 mediawiki -- multiple vulnerabilities
b975763f-5210-11db-8f1a-000a48049292 freetype -- LWFN Files Buffer Overflow Vulnerability
b9837fa1-cd72-11ec-98f1-6805ca0b3d42 rsyslog8 -- heap buffer overflow on receiving TCP syslog
b99492b2-362b-11eb-9f86-08002734b9ed gitea -- multiple vulnerabilities
b99f99f6-021e-11ed-8c6f-000c29ffbb6c git -- privilege escalation
b9a347ac-8671-11e2-b73c-0019d18c446a typo3 -- Multiple vulnerabilities in TYPO3 Core
b9c525d9-9198-11e8-beba-080027ef1a23 chromium -- multiple vulnerabilities
b9ec7fe3-a38a-11de-9c6b-003048818f40 bugzilla -- two SQL injections, sensitive data exposure
b9f3ffa3-dd6c-11e0-b7fc-000a5e1e33c6 libsndfile -- PAF file processing integer overflow
ba005226-fb5b-11d8-9837-000c41e2cdad imlib2 -- BMP decoder buffer overflow
ba04a373-7d20-11e3-8992-00132034b086 nagios -- denial of service vulnerability
ba13dc13-340d-11d9-ac1b-000d614f7fad samba -- potential remote DoS vulnerability
ba326a36-5f02-452d-a215-31e7b06d5edf Wesnoth -- Remote information disclosure
ba4f9b19-ed9d-11e4-9118-bcaec565249c wordpress -- cross-site scripting vulnerability
ba51c2f7-5b43-11e1-8288-00262d5ed8ee plib -- remote code execution via buffer overflow
ba61ce15-8a7b-11df-87ec-0050569b2d21 redmine -- multiple vulnerabilities
ba6d0c9b-f5f6-4b9b-a6de-3cce93c83220 Loofah -- XSS vulnerability
ba73f494-65a8-11de-aef5-001c2514716c phpmyadmin -- XSS vulnerability
ba796b98-b61c-11ec-9ebc-1c697aa5a594 FreeBSD -- Bhyve e82545 device emulation out-of-bounds write
ba94433c-7890-11ed-859e-1c61b4739ac9 xrdp -- multiple vulnerabilities
bab05188-5d4b-11e5-9ad8-14dae9d210b8 optipng -- use-after-free vulnerability
bab29816-ff93-11e8-b05b-00e04c1ea73d typo3 -- multiple vulnerabilities
bad1b090-a7ca-11de-873f-0030843d3802 drupal -- multiple vulnerabilities
bad59128-c188-11e8-9d40-f0def10dca57 wesnoth -- Code Injection vulnerability
bad6588e-2fe0-11ee-a0d1-84a93843eb75 OpenSSL -- Excessive time spent checking DH q parameter value
baece347-c489-11dd-a721-0030843d3802 wireshark -- SMTP Processing Denial of Service Vulnerability
baf37cd2-8351-11e1-894e-00215c6a37bb samba -- "root" credential remote code execution
baf74e0b-497a-11da-a4f4-0060084a00e5 fetchmail -- fetchmailconf local password exposure
bb022643-84fb-11e6-a4a1-60a44ce6887b django -- CSRF protection bypass on a site with Google Analytics
bb0a8795-15dc-11df-bf0a-002170daae37 wireshark -- LWRES vulnerability
bb0ef21d-0e1b-461b-bc3d-9cba39948888 rails -- multiple vulnerabilities
bb33981a-7ac6-11da-bf72-00123f589060 perl, webmin, usermin -- perl format string integer wrap vulnerability
bb389137-21fb-11e1-89b4-001ec9578670 asterisk -- Multiple Vulnerabilities
bb49f1fa-00da-11ef-92b7-589cfc023192 GLPI -- multiple vulnerabilities
bb4e9a44-dff2-11dd-a765-0030843d3802 mysql -- renaming of arbitrary tables by authenticated users
bb528d7c-e2c6-11ed-a3e6-589cfc0f81b0 phpmyfaq -- multiple vulnerabilities
bb53af7b-f7e4-11ea-88f8-901b0ef719ab FreeBSD -- ure device driver susceptible to packet-in-packet attack
bb7d4791-a5bf-11e5-a0e5-00262d5ed8ee chromium -- multiple vulnerabilities
bb961ff3-b3a4-11e5-8255-5453ed2e2b49 cacti -- SQL injection vulnerabilities
bb99f803-5fde-11d9-b721-00065be4b5b6 helvis -- information leak vulnerabilities
bba3f684-9b1d-11ed-9a3f-b42e991fc52e www/awstats -- Partial absolute pathname
bba850fd-770e-11eb-b87a-901b0ef719ab FreeBSD -- jail_attach(2) relies on the caller to change the cwd
bbb18fcb-7f0d-11ee-94b4-6cc21735f730 postgresql-server -- Role pg_cancel_backend can signal certain superuser processes
bbc0db92-084c-11e5-bb90-002590263bf5 hostapd and wpa_supplicant -- multiple vulnerabilities
bbc97005-b14e-11e5-9728-002590263bf5 qemu -- denial of service vulnerability in IDE disk/CD/DVD-ROM emulation
bbcb1584-c068-11ee-bdd6-4ccc6adda413 qt6-webengine -- Multiple vulnerabilities
bbd5f486-24f1-11e1-95bc-080027ef73ec PuTTY -- Password vulnerability
bbdb9713-8e09-11e9-87bc-002590acae31 Vim/NeoVim -- Security vulnerability
bc19dcca-7b13-11e6-b99e-589cfc0654e1 dropbear -- multiple vulnerabilities
bc20510f-4dd4-11dd-93e7-0211d880e350 poppler -- uninitialized pointer
bc43a578-14ec-11ed-856e-d4c9ef517024 Unbound -- Multiple vulnerabilities
bc4898d5-a794-11e6-b2d3-60a44ce6887b Pillow -- multiple vulnerabilities
bc4a7efa-7d9a-11d9-a9e7-0001020eed82 ngircd -- format string vulnerability
bc6a7e79-e111-11dd-afcd-00e0815b8da8 cgiwrap -- XSS Vulnerability
bc7aff8c-d806-11ea-a5aa-0800272260e5 go -- encoding/binary: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
bc83cfc9-42cf-4b00-97ad-d352ba0c5e2b zeek -- null-pointer dereference vulnerability
bc90e894-264b-11ee-a468-80fa5b29d485 virtualbox-ose -- multiple vulnerabilities
bcad3faa-b40c-11e5-9728-002590263bf5 xen-kernel -- XENMEM_exchange error handling issues
bcbd3fe0-2b46-11e6-ae88-002590263bf5 openafs -- multiple vulnerabilities
bcc8b21e-7122-11ef-bece-2cf05da270f3 Gitlab -- vulnerabilities
bcdeb6d2-f02d-11ea-838a-0011d823eebd Mbed TLS -- Local side channel attack on RSA and static Diffie-Hellman
bce1f76d-82d0-11de-88ea-001a4d49522b subversion -- heap overflow vulnerability
bce47c89-4d3f-11e7-8080-a4badb2f4699 roundcube -- arbitrary password resets
bcee3989-d106-4f60-948f-835375634710 varnish -- Varnish HTTP Request Parsing Denial of Service
bcf27002-94c3-11d9-a9e0-0001020eed82 grip -- CDDB response multiple matches buffer overflow vulnerability
bcf56a42-9df8-11e8-afb0-589cfc0f81b0 gitea -- TOTP passcode reuse
bd159669-0808-11eb-a3a4-0019dbb15b3f Payara -- A Polymorphic Typing issue in FasterXML jackson-databind
bd1ab7a5-0e01-11e5-9976-a0f3c100ae18 tidy -- heap-buffer-overflow
bd349f7a-b3b9-11e5-8255-5453ed2e2b49 tiff -- out-of-bounds read in tif_getimage.c
bd579366-5290-11d9-ac20-00065be4b5b6 greed -- insecure GRX file processing
bd60922b-fb8d-11d8-a13e-000a95bc6fae krb5 -- ASN.1 decoder denial-of-service vulnerability
bd62c640-9bb9-11e4-a5ad-000c297fb80f mozilla -- multiple vulnerabilities
bd6cf187-8710-11e8-833d-18a6f7016652 qutebrowser -- Remote code execution due to CSRF
bd730827-dfe0-11dd-a765-0030843d3802 libcdaudio -- remote buffer overflow and code execution
bd7592a1-cbfd-11ee-a42a-5404a6f3ca32 gitea -- Prevent anonymous container access
bd760627-3493-11e0-8103-00215c6a37bb django -- multiple vulnerabilities
bd92f1ab-690c-11ee-9ed0-001fc69cd6dc 11/libX11 multiple vulnerabilities
bd940aba-7467-11ef-a5c4-08002784c58d SnappyMail -- multiple mXSS in HTML sanitizer
bd98066d-4ea4-11eb-b412-e86a64caca56 mail/dovecot -- multiple vulnerabilities
bd9fc2bf-5ffe-11d9-a11a-000a95bc6fae vim -- vulnerabilities in modeline handling
bdab0acd-d4cd-11e1-8a1c-14dae9ebcf89 php -- potential overflow in _php_stream_scandir
bdad9ada-8a52-11d9-9e53-000a95bc6fae lighttpd -- script source disclosure vulnerability
bdaecfad-3117-11ec-b3b0-3065ec8fd3ec chromium -- multiple vulnerabilities
bdccd14b-5aac-11de-a438-003048590f9e joomla -- multiple vulnerabilities
bdcd041e-5811-4da3-9243-573a9890fdb1 electron{27,28} -- Object lifecycle issue in V8
bdd1537b-354c-11d9-a9e7-0001020eed82 sudo -- privilege escalation with bash scripts
bddadaa4-9227-11eb-99c5-e09467587c17 chromium -- multiple vulnerabilities
bdec8dc2-0b3b-11e1-b722-001cc0476564 gnutls -- client session resumption vulnerability
bdfa6c04-027a-11ef-9c21-901b0e9408dc py-matrix-synapse -- weakness in auth chain indexing allows DoS
be088777-6085-11ea-8609-08002731610e gitea -- multiple vulnerabilities
be0e3817-3bfe-11e9-9cd6-001999f8d30b asterisk -- Remote crash vulnerability with SDP protocol violation
be1aada2-be6c-11e8-8fc6-000c29434208 mediawiki -- multiple vulnerabilities
be233fc6-bae7-11ed-a4fb-080027f5fec9 curl -- multiple vulnerabilities
be261737-c535-11e7-8da5-001999f8d30b asterisk -- Memory/File Descriptor/RTP leak in pjsip session resource
be3069c9-67e7-11e5-9909-002590263bf5 james -- multiple vulnerabilities
be38245e-44d9-11e8-a292-00e04c1ea73d wordpress -- multiple issues
be3dfe33-410b-11e0-9e02-00215c6a37bb openldap -- two security bypass vulnerabilities
be4b0529-dbaf-11dc-9791-000ea6702141 clamav -- ClamAV libclamav PE File Integer Overflow Vulnerability
be4ccb7b-c48b-11da-ae12-0002b3b60e4c openvpn -- LD_PRELOAD code execution on client through malicious or compromised server
be5421ab-1b56-11e4-a767-5453ed2e2b49 krfb -- Possible Denial of Service or code execution via integer overflow
be543d74-539a-11d9-a9e7-0001020eed82 ecartis -- unauthorised access to admin interface
be63533c-9ed7-11e5-8f5c-002590263bf5 redmine -- multiple vulnerabilities
be72e773-1131-11e6-94fa-002590263bf5 gitlab -- privilege escalation via "impersonate" feature
be77eff6-ca91-11e0-aea3-00215c6a37bb rubygem-rails -- multiple vulnerabilities
be927298-6f97-11de-b444-001372fd0af2 drupal -- multiple vulnerabilities
bea52545-f4a7-11ed-8290-a8a1599412c6 chromium -- multiple vulnerabilities
bea84a7a-e0c9-11e7-b4f3-11baa0c2df21 node.js -- Data Confidentiality/Integrity Vulnerability, December 2017
beab40bf-c1ca-4d2b-ad46-2f14bac8a968 Ruby Activemodel Gem -- Circumvention of attr_protected
beb36f39-4d74-11ee-985e-bff341e78d94 go -- multiple vulnerabilities
beb3d5fc-7ac5-11e5-b35a-002590263bf5 Joomla! -- Core - Unauthorized Login vulnerability
beb6f4a8-add5-11de-8b55-0030843d3802 mybb -- multiple vulnerabilities
bec38383-e6cb-11de-bdd4-000c2930e89b pligg -- Cross-Site Scripting and Cross-Site Request Forgery
bed545c6-bdb8-11ed-bca8-a33124f1beb1 mantis -- multiple vulnerabilities
bed5d41a-f2b4-11ea-a878-e09467587c17 chromium -- multiple vulnerabilities
bf171509-68dd-11e0-afe6-0003ba02bf30 rt -- multiple vulnerabilities
bf1d9331-21b6-11e5-86ff-14dae9d210b8 cups-filters -- texttopdf integer overflow
bf1f47c4-7f1b-11ea-bf94-001cc0382b2f Mbed TLS -- Side channel attack on ECDSA
bf266183-cec7-11e7-af2d-2047478f2f70 frr -- BGP Mishandled attribute length on Error
bf2b9c56-b93e-11e8-b2a8-a4badb296695 joomla3 -- vulnerabilitiesw
bf2e7483-d3fa-440d-8c6e-8f1f2f018818 linux_base -- vulnerabilities in Red Hat 7.1 libraries
bf545001-b96d-42e4-9d2e-60fdee204a43 h2o -- HTTP/2 Rapid Reset attack vulnerability
bf7912f5-c1a8-11e3-a5ac-001b21614864 nas -- multiple vulnerabilities
bfb36941-84fa-11d8-a41f-0020ed76ef5a Incorrect cross-realm trust handling in Heimdal
bfbbd505-3bd6-409c-8c67-445d3635cf4b xli -- integer overflows in image size calculations
bfca647c-0456-11ee-bafd-b42e991fc52e Kanboard -- Multiple vulnerabilities
bfcc23b6-3b27-11e6-8e82-002590263bf5 wordpress -- multiple vulnerabilities
bfd5d004-81d4-11e8-a29a-00e04c1ea73d mybb -- vulnerabilities
bfd6eef4-8c94-11dc-8c55-001c2514716c pcre -- arbitrary code execution
bfda2d80-0858-11e8-ad5c-0021ccb9e74d GIMP - Heap Buffer Overflow Vulnerability
bfda39de-7467-11d9-9e1e-c296ac722cb3 squid -- correct handling of oversized HTTP reply headers
bfdbc7ec-9c3f-11e0-9bec-6c626dd55a41 Samba -- Denial of service - memory corruption
bfe218a5-4218-11de-b67a-0030843d3802 moinmoin -- cross-site scripting vulnerabilities
bfe9c75e-5028-11e0-b2d2-00215c6a37bb asterisk -- Multiple Vulnerabilities
bfea59e0-41ee-11ec-9bac-589cfc007716 puppet -- Silent Configuration Failure
bfecf7c1-af47-11e1-9580-4061862b8c22 mozilla -- multiple vulnerabilities
bffa40db-ad50-11eb-86b8-080027846a02 Python -- multiple vulnerabilities
c01170bf-4990-11da-a1b8-000854d03344 lynx -- remote buffer overflow
c0171f59-ea8a-11da-be02-000c6ec775d9 frontpage -- cross site scripting vulnerability
c01a25f5-8f20-11da-8c1d-000e0c2e438a texindex -- temporary file privilege escalation
c02b8db5-771b-11ef-9a62-002590c1f29c FreeBSD -- NFS client accepts file names containing path separators
c039a761-2c29-11e6-8912-3065ec8fd3ec chromium -- multiple vulnerabilities
c04dc18f-fcde-11e7-bdf6-00e04c1ea73d wordpress -- multiple issues
c0869649-5a0c-11df-942d-0015587e2cc1 piwik -- cross site scripting vulnerability
c092be0e-f7cc-11ee-aa6b-b42e991fc52e forgejo -- HTTP/2 CONTINUATION flood in net/http
c0a269d5-3d16-11d9-8818-008088034841 Cyrus IMAPd -- FETCH command out of bounds memory corruption
c0b13887-be44-11e6-b04f-001999f8d30b asterisk -- Authentication Bypass
c0c1834c-9761-11eb-acfd-0022489ad614 Node.js -- April 2021 Security Releases
c0c31b27-bff3-11e3-9d09-000c2980a9f3 openafs -- Denial of Service
c0c5afef-38db-11e8-8b7f-a4badb2f469b FreeBSD -- ipsec crash or denial of service
c0cae920-c4e9-11e4-898e-90e6ba741e35 mono -- TLS bugs
c0dae634-4820-4505-850d-b1c975d0f67d tomcat -- Remote Code Execution
c0e76d33-8821-11e5-ab94-002590263bf5 xen-tools -- populate-on-demand balloon size inaccuracy can crash guests
c0ef061a-c7f0-11e6-ae1b-002590263bf5 Joomla! -- multiple vulnerabilities
c0ef849e-84ac-11e3-bec4-9c4e36909cc0 linux-flashplugin -- multiple vulnerabilities
c0f122e2-3897-11e3-a084-3c970e169bc2 pycrypto -- PRNG reseed race condition
c0fd7890-4346-11db-89cc-000ae42e9b93 drupal-pubcookie -- authentication may be bypassed
c110eda2-e995-11db-a944-0012f06707f0 freeradius -- EAP-TTLS Tunnel Memory Leak Remote DOS Vulnerability
c115271d-602b-11dc-898c-001921ab2fa4 apache -- multiple vulnerabilities
c11629d3-c8ad-11e6-ae1b-002590263bf5 vim -- arbitrary command execution
c11ee146-c266-11ea-8659-901b0ef719ab FreeBSD -- IPv6 socket option race condition and use after free
c1202de8-4b29-11ea-9673-4c72b94353b5 NGINX -- HTTP request smuggling
c1265e85-7c95-11e7-93af-005056925db4 Axis2 -- Security vulnerability on dependency Apache Commons FileUpload
c13a8c17-cbeb-11ed-956f-7054d21a9e2a py39-lmdb -- multiple vulnerabilities
c14aa48c-5ab7-11de-bc9b-0030843d3802 cscope -- multiple buffer overflows
c1630aa3-7970-11e8-8634-dcfe074bd614 SQLite -- Corrupt DB can cause a NULL pointer dereference
c174118e-1b11-11ec-9d9d-0022489ad614 Node.js -- July 2021 Security Releases
c175d72f-3773-11df-8bb8-0211d880e350 gtar -- buffer overflow in rmt client
c1930f45-6982-11e4-80e1-bcaec565249c dbus -- incomplete fix for CVE-2014-3636 part A
c1a8ed1c-2814-4260-82aa-9e37c83aac93 py-cryptography -- includes a vulnerable copy of OpenSSL
c1b2b492-6999-11ec-a50c-001cc0382b2f Mbed TLS -- Potential double-free after an out of memory error
c1c18ee1-c711-11e5-96d6-14dae9d210b8 nginx -- multiple vulnerabilities
c1d97a8b-05ed-11d9-b45d-000c41e2cdad mozilla -- POP client heap overflow
c1da8b75-6aef-11e5-9909-002590263bf5 php -- multiple vulnerabilities
c1dc55dc-9556-11e6-b154-3065ec8fd3ec Tor -- remote denial of service
c1e5f35e-f93d-11e1-b07f-00235a5f2c9a emacs -- remote code execution vulnerability
c1ef9b33-72a6-11de-82ea-0030843d3802 mozilla -- corrupt JIT state after deep return from native function
c218873d-d444-11e6-84ef-f0def167eeea Use-After-Free Vulnerability in pcsc-lite
c21f4e61-6570-11e5-9909-002590263bf5 codeigniter -- multiple vulnerabilities
c223b00d-e272-11df-8e32-000f20797ede mozilla -- Heap buffer overflow mixing document.write and DOM insertion
c2431c4e-622c-4d92-996d-d8b5258ae8c9 electron{27,28} -- multiple vulnerabilities
c253c4aa-5126-11ed-8a21-589cfc0f81b0 phpmyfaq -- CSRF vulnerability
c2576e14-36e2-11e9-9eda-206a8a720317 ntp -- Crafted null dereference attack from a trusted source with an authenticated mode 6 packet
c27bc173-d7aa-11db-b141-0016179b2dd5 Squid -- TRACE method handling denial of service
c28ee9cd-916e-4dcf-8ed3-e97e5846db6c typo3 -- Cross-Site Scripting Vulnerability in TYPO3 Core
c28f4705-043f-11da-bc08-0001020eed82 proftpd -- format string vulnerabilities
c290f093-c89e-11e6-821e-68f7288bdf41 Pligg CMS -- XSS Vulnerability
c294c2e6-b309-11e9-a87f-a4badb2f4699 FreeBSD -- Resource exhaustion in non-default RACK TCP stack
c2a7de31-5b42-11ec-8398-6c3be5272acd Grafana -- Directory Traversal
c2a89e8f-44e9-11ed-9215-00e081b7aa2d jenkins -- XSS vulnerability
c2ad8700-de25-11ee-9190-84a93843eb75 Unbound -- Denial-of-Service vulnerability
c2b1652c-e647-11e5-85be-14dae9d210b8 libotr -- integer overflow
c2c89dea-2859-4231-8f3b-012be0d475ff py-django-photologue -- XSS vulnerability
c2c8c84b-e734-11e3-9a25-5404a6a6412c mumble -- NULL pointer dereference and heap-based buffer overflow
c2d1693b-73cb-11e9-a1c7-b499baebfeaf PHP -- Multiple vulnerabilities in EXIF module
c2e10368-77ab-11d8-b9e8-00e04ccb0a62 ModSecurity for Apache 2.x remote off-by-one overflow
c2ea3b31-9d75-11e7-bb13-001999f8d30b asterisk -- RTP/RTCP information leak
c2eac2b5-9a7d-11df-8e32-000f20797ede firefox -- Dangling pointer crash regression from plugin parameter array fix
c2efcd46-9ed5-11e5-8f5c-002590263bf5 redmine -- open redirect vulnerability
c2f107e1-2493-11e8-b3e8-001cc0382b2f mbed TLS (PolarSSL) -- remote code execution
c2fcbec2-5daa-11e5-9909-002590263bf5 moodle -- multiple vulnerabilities
c2fdb3bc-7d72-11da-b96e-000fb586ba73 rxvt-unicode -- restore permissions on tty devices
c30c3a2e-4fb1-11e4-b275-14dae9d210b8 foreman-proxy SSL verification issue
c32285fe-fde4-11e9-9525-000c29c4dc65 mediawiki -- multiple vulnerabilities
c329712a-6b5b-11dd-9d79-001fc61c2a55 ruby -- multiple vulnerabilities in safe level
c3600a64-64ea-11ea-bdff-e0d55e2a8bf9 Okular -- Local binary execution via action links
c360d057-ea8b-11e9-859b-b885849ded8e mod_perl2 -- execute arbitrary Perl code
c3610f39-18f1-11ed-9854-641c67a117d8 varnish -- Denial of Service Vulnerability
c365536d-e3cf-11eb-9d8d-b37b683944c2 go -- crypto/tls: clients can panic when provided a certificate of the wrong type for the negotiated parameters
c368155a-fa83-11e4-bc58-001e67150279 rubygem-redcarpet -- XSS vulnerability
c37de843-488e-11e2-a5c9-0019996bc1f7 squid -- denial of service
c389d06d-ee57-11db-bd51-0016179b2dd5 claws-mail -- APOP vulnerability
c3aba586-ea77-11dd-9d1e-000bcdc1757a openfire -- multiple vulnerabilities
c3c6c4a3-f47d-11eb-b632-3065ec8fd3ec chromium -- multiple vulnerabilities
c3d43001-8064-11e4-801f-0022156e8794 mutt -- denial of service via crafted mail message
c3fb48cc-a2ff-11ed-8fbc-6cf0490a8c18 Spotipy -- Path traversal vulnerability
c40ca16c-4d9f-4d70-8b6c-4d53aeb8ead4 cURL -- uninitialized random vulnerability
c418d472-6bd1-11d9-93ca-000a95bc6fae perl -- File::Path insecure file/directory permissions
c41bedfd-b3f9-11e7-ac58-b499baebfeaf MySQL -- multiple vulnerabilities
c428de09-ed69-11e5-92ce-002590263bf5 kamailio -- SEAS Module Heap overflow
c4292768-5273-4f17-a267-c5fe35125ce4 NSS -- multiple vulnerabilities
c444c8b7-7169-11de-9ab7-000c29a67389 isc-dhcp-client -- Stack overflow vulnerability
c4571ca8-053d-44c9-ab3c-89b1372ad0a5 chrony -- multiple vulnerabilities
c470bcc7-33fe-11e5-a4a5-002590263bf5 logstash -- SSL/TLS vulnerability with Lumberjack input
c470db07-1098-11e5-b6a8-002590263bf5 security/ossec-hids-* -- root escalation via syscheck feature
c480eb5e-7f00-11d8-868e-000347dd607f ezbounce remote format string vulnerability
c4892644-f8c6-11e3-9f45-6805ca0b3d42 phpMyAdmin -- two XSS vulnerabilities due to unescaped db/table names
c49a880d-a5bb-11ed-aab5-080027de9982 Django -- multiple vulnerabilities
c4a18a12-77fc-11e5-a687-206a8a720317 ntp -- 13 low- and medium-severity vulnerabilities
c4ac9c79-ab37-11ea-8b5e-b42e99a1b9c3 several security issues in sqlite3
c4b025bb-f05d-11d8-9837-000c41e2cdad tnftpd -- remotely exploitable vulnerability
c4b7badf-24ca-11d8-82e5-0020ed76ef5a Buffer overflows in libmcrypt
c4ba95b2-39ce-11dd-98c9-00163e000016 moinmoin -- superuser privilege escalation
c4d2f950-8c27-11eb-a3ae-0800278d94f0 gitea -- multiple vulnerabilities
c4d412c8-f4d1-11e2-b86c-000c295229d5 openafs -- single-DES cell-wide key brute force vulnerability
c4e9a427-9fc2-11e8-802a-000c29a1e3ec samba -- multiple vulnerabilities
c4f067b9-dc4a-11df-8e32-000f20797ede mozilla -- multiple vulnerabilities
c4f31e16-6e33-11dd-8eb7-0011098ad87f cdf3 -- Buffer overflow vulnerability
c4f39920-781f-4aeb-b6af-17ed566c4272 mozilla -- multiple vulnerabilities
c5415838-2f52-11ef-9cab-4ccc6adda413 qt6-webengine -- Multiple vulnerabilities
c5519420-cec2-11d8-8898-000d6111a684 "Content-Type" XSS vulnerability affecting other webmail systems
c551ae17-7f00-11d8-868e-000347dd607f multiple vulnerabilities in phpBB
c55f9ed0-56a7-11da-a3f0-00123ffe8333 phpmyadmin -- HTTP Response Splitting vulnerability
c561ce49-eabc-11eb-9c3f-0800270512f4 redis -- Integer overflow issues with BITFIELD command on 32-bit systems
c564f9bd-8ba7-11e4-801f-0022156e8794 png -- heap overflow for 32-bit builds
c599f95c-8ee5-11e7-8be8-001999f8d30b asterisk -- Unauthorized data disclosure and shell access command injection in app_minivm
c5ab620f-4576-4ad5-b51f-93e4fec9cd0e wireshark -- multiple security issues
c5af0747-1262-11de-a964-0030843d3802 libsndfile -- CAF processing integer overflow vulnerability
c5bd8a25-99a6-11e9-a598-f079596b62f9 expat2 -- Fix extraction of namespace prefixes from XML names
c5bd9068-440f-11ea-9cdb-001b217b3468 Gitlab -- Multiple Vulnerabilities
c5c17ead-8f23-11da-8c1d-000e0c2e438a cvsbug -- race condition
c5c6e293-9cc7-11e6-823f-b8aeed92ecc4 urllib3 -- certificate verification failure
c5d79773-8801-11e7-93f7-d43d7e971a1b phpmailer -- XSS in code example and default exeception handler
c5ec57a9-9c2b-11ea-82b8-4c72b94353b5 drupal -- Multiple Vulnerabilities
c602c791-0cf4-11e8-a2ec-6cc21735f730 PostgreSQL vulnerabilities
c60804f1-126f-11e8-8b5b-4ccc6adda413 libraw -- multiple DoS vulnerabilities
c611be81-fbc2-11da-9156-000e0c2e438a sendmail -- Incorrect multipart message handling
c61ca9cb-64c3-11dd-954d-006097bcc5f4 openvpn-devel -- arbitrary code execution
c62285cb-cb46-11ee-b609-002590c1f29c FreeBSD -- bhyveload(8) host file access
c623f058-10e7-11e0-becc-0022156e8794 php-filter -- Denial of Service
c62dc69f-05c8-11d9-b45d-000c41e2cdad openoffice -- document disclosure
c651c898-e90d-11e1-b230-0024e830109b libotr -- buffer overflows
c6521b04-314b-11e1-9cf4-5404a67eef98 lighttpd -- remote DoS in HTTP authentication
c66a5632-708a-4727-8236-d65b2d5b2739 mozilla -- multiple vulnerabilities
c67069dc-0986-11e5-bb90-002590263bf5 testdisk -- buffer overflow with malicious disk image
c676bb1b-e3f8-11ed-b37b-901b0e9408dc element-web -- matrix-react-sdk vulnerable to HTML injection in search results via plaintext message highlighting
c682923d-b444-11ed-9268-b42e991fc52e freerdp -- clients using `/parallel` command line switch might read uninitialized data
c685edd9-c045-11ea-8898-001cc0382b2f Mbed TLS -- Side-channel attack on ECC key import and validation
c6861494-1ffb-11e7-934d-d05099c0ae8c BIND -- multiple vulnerabilities
c6932dd4-eaff-11e6-9ac1-a4badb2f4699 chicken -- multiple vulnerabilities
c6b9aee8-3071-11da-af18-000ae4641456 phpmyfaq -- SQL injection, takeover, path disclosure, remote code execution
c6d1a8a6-8a91-11e8-be4d-005056925db4 znc -- multiple vulnerabilities
c6e31869-f99f-11e4-9f91-6805ca0b3d42 phpMyAdmin -- XSRF and man-in-the-middle vulnerabilities
c6f03ea6-12de-11ef-83d8-4ccc6adda413 qt6-webengine -- Multiple vulnerabilities
c6f19fe6-d42a-11e9-b4f9-6451062f0f7a Flash Player -- multiple vulnerabilities
c6f4177c-8e29-11ef-98e7-84a93843eb75 OpenSSL -- OOB memory access vulnerability
c6fb2734-e835-11e8-b14b-001999f8d30b asterisk -- Remote crash vulnerability DNS SRV and NAPTR lookups
c6fbd447-59ed-11e0-8d04-0015f2db7bde gdm -- privilege escalation vulnerability
c702944a-db0f-11dd-aa56-000bcdf0a03b FreeBSD -- netgraph / bluetooth privilege escalation
c70c3dc3-258c-11ee-b37b-901b0e9408dc element-web -- Cross site scripting in Export Chat feature
c71cdc95-3c18-45b7-866a-af28b59aabb5 mozilla -- multiple vulnerabilities
c71ed065-0600-11eb-8758-e0d55e2a8bf9 kdeconnect -- packet manipulation can be exploited in a Denial of Service attack
c72a2494-c08b-11e2-bb21-083e8ed0f47b plib -- stack-based buffer overflow
c73305ae-8cd7-11d9-9873-000a95bc6fae realplayer -- remote heap overflow
c742dbe8-3704-11ef-9e6e-b42e991fc52e netatalk3 -- Multiple vulnerabilities
c7526a14-c4dc-11da-9699-00123ffe8333 mplayer -- Multiple integer overflows
c7617931-8985-11ea-93ef-b42e99a1b9c3 nested filters leads to stack overflow
c7656d4c-cb60-11e6-a9a5-b499baebfeaf phpmailer -- Remote Code Execution
c7855866-c511-11eb-ae1d-b42e991fc52e tauthon -- Regular Expression Denial of Service
c79eb109-a754-45d7-b552-a42099eb2265 Ruby -- Denial of Service and Unsafe Object Creation Vulnerability in JSON
c7a135f4-66a4-11e8-9e63-3085a9a47796 Git -- Fix memory out-of-bounds and remote code execution vulnerabilities (CVE-2018-11233 and CVE-2018-11235)
c7b1af20-f34f-11e8-9cde-e0d55e2a8bf9 messagelib -- HTML email can open browser window automatically
c7b5d72b-886a-11e3-9533-60a44c524f57 otrs -- multiple vulnerabilities
c7c09579-b466-11da-82d0-0050bf27ba24 horde -- "url" disclosure of sensitive information vulnerability
c7cad0f0-671a-11d8-bdeb-000a95bc6fae Darwin Streaming Server denial-of-service vulnerability
c7ccc33f-7d31-11d9-a9e7-0001020eed82 mailman -- directory traversal vulnerability
c7ec6375-c3cf-11eb-904f-14dae9d5a9d2 PyYAML -- arbitrary code execution
c7fa3618-d5ff-11e1-90a2-000c299b62e1 isc-dhcp -- multiple vulnerabilities
c80a3d93-8632-11e1-a374-14dae9ebcf89 phpmyfaq -- Remote PHP Code Execution Vulnerability
c80b27a2-3165-11e5-8a1d-14dae9d210b8 wordpress -- XSS vulnerability
c80ce2dd-e831-11ec-bcd2-3065ec8fd3ec chromium -- multiple vulnerabilities
c8174b63-0d3a-11e6-b06e-d43d7eed0ce2 subversion -- multiple vulnerabilities
c82ecac5-6e3f-11e8-8777-b499baebfeaf OpenSSL -- Client DoS due to large DH parameter
c848059a-318b-11ec-aa15-0800270512f4 fail2ban -- possible RCE vulnerability in mailing action using mailutils
c84dc9ad-41f7-11dd-a4f9-00163e000016 apache -- multiple vulnerabilities
c86bfee3-4441-11ea-8be3-54e1ad3d6335 spamassassin -- Nefarious rule configuration files can run system commands
c87aa2d2-c3c4-11de-ab08-000f20797ede mozilla -- multiple vulnerabilities
c8842a84-9ddd-11e5-8c2f-c485083ca99c flash -- multiple vulnerabilities
c89a3ebb-ae07-11dd-b4b2-001f3c8eabeb trac -- potential DOS vulnerability
c8b334e0-6e83-4575-81d1-f9d5803ceb07 chromium -- multiple vulnerabilities
c8c31c41-49ed-11df-83fb-0015587e2cc1 curl -- libcurl buffer overflow vulnerability
c8c927e5-2891-11e0-8f26-00151735203a bugzilla -- multiple serious vulnerabilities
c8d902b1-8550-11e6-81e7-d050996490d0 BIND -- Remote Denial of Service vulnerability
c8eb4c40-47bd-11ee-8e38-002590c1f29c FreeBSD -- Multiple vulnerabilities in OpenSSL
c905298c-2274-11db-896e-000ae42e9b93 drupal -- XSS vulnerability
c906e0a4-efa6-11e1-8fbf-001b77d09812 roundcube -- cross-site scripting in HTML email messages
c9075321-f483-11e5-92ce-002590263bf5 bind -- denial of service vulnerability
c9221ec9-17a2-11ec-b335-d4c9ef517024 cURL -- Multiple vulnerabilities
c9263916-006f-11df-94cb-0050568452ac Zend Framework -- multiple vulnerabilities
c93533a3-24f1-11e5-8b74-3c970e169bc2 bind -- denial of service vulnerability
c9387e4d-2f5f-11ec-8be6-d4c9ef517024 MySQL -- Multiple vulnerabilities
c93c9395-25e1-11e5-a4a5-002590263bf5 wpa_supplicant -- WPS_NFC option payload length validation vulnerability
c93e4d41-75c5-11dc-b903-0016179b2dd5 jdk/jre -- Applet Caching May Allow Network Access Restrictions to be Circumvented
c9460380-81e3-11e7-93af-005056925db4 Supervisord -- An authenticated client can run arbitrary shell commands via malicious XML-RPC requests
c95836a0-2b3b-11e9-9838-8c164567ca3c unit -- heap memory buffer overflow
c96d416a-eae7-4d5d-bc84-40deca9329fb mozilla -- multiple vulnerabilities
c97219b6-843d-11e2-b131-000c299b62e1 stunnel -- Remote Code Execution
c97a4ecf-cc25-11ee-b0ee-0050569f0b83 nginx-devel -- Multiple Vulnerabilities in HTTP/3
c97a940b-c392-11e9-bb38-000d3ab229d6 Node.js -- multiple vulnerabilities
c97d7a37-2233-11df-96dd-001b2134ef46 openoffice.org -- multiple vulnerabilities
c9a6ae4a-df8b-11df-9573-00262d5ed8ee monotone -- remote denial of service in default setup
c9b3324f-8e03-4ae3-89ce-8098cdc5bfa9 py-markdown2 -- regular expression denial of service vulnerability
c9c14242-6843-11dc-82b6-02e0185f8d72 mediawiki -- cross site scripting vulnerability
c9c252f5-2def-11e6-ae88-002590263bf5 expat -- multiple vulnerabilities
c9c3374d-c2c1-11e4-b236-5453ed2e2b49 qt4-gui, qt5-gui -- DoS vulnerability in the BMP image handler
c9c46fbf-7b83-11e4-a96e-6805ca0b3d42 phpMyAdmin -- XSS and DoS vulnerabilities
c9c6c2f8-cd54-11e9-af89-080027ef1a23 libgcrypt -- ECDSA timing attack
c9d2e361-32fb-11db-a6e2-000e0c2e438a sppp -- buffer overflow vulnerability
c9e2a1a7-caa1-11eb-904f-14dae9d5a9d2 dragonfly -- argument injection
c9ff1150-5d63-11ee-bbae-1c61b4739ac9 xrdp -- Improper handling of session establishment errors allows bypassing OS-level session restrictions
ca05d9da-ac1d-4113-8a05-ffe9cd0d6160 sinatra -- XSS vulnerability
ca0841ff-1254-11de-a964-0030843d3802 proftpd -- multiple sql injection vulnerabilities
ca139c7f-2a8c-11e5-a4a5-002590263bf5 libwmf -- multiple vulnerabilities
ca16fd0b-5fd1-11e6-a6f2-6cc21735f730 PostgreSQL -- Denial-of-Service and Code Injection Vulnerabilities
ca21f5e7-7228-11eb-8386-001999f8d30b asterisk -- An unsuspecting user could crash Asterisk with multiple hold/unhold requests
ca3fe5b3-185e-11ea-9673-4c72b94353b5 phpmyadmin -- multiple vulnerabilities
ca44b64c-4453-11e4-9ea1-c485083ca99c Flash player -- Multiple security vulnerabilities in www/linux-*-flashplugin11
ca4d63fb-f15c-11e2-b183-20cf30e32f6d apache24 -- several vulnerabilities
ca543e06-207a-11d9-814e-0001020eed82 cacti -- SQL injection
ca595a25-91d8-11ea-b470-080027846a02 Python -- CRLF injection via the host part of the url passed to urlopen()
ca5cb202-4f51-11e6-b2ec-b499baebfeaf MySQL -- Multiple vulnerabilities
ca5d3272-59e3-11e2-853b-00262d5ed8ee rubygem-rails -- multiple vulnerabilities
ca5f3bbc-7a62-11ef-9533-f875a43e1796 expat -- multiple vulnerabilities
ca6c8f35-0a5f-11d9-ad6f-00061bc2ad93 apache -- heap overflow in mod_proxy
ca8327f7-a5a5-11ea-a860-08002728f74c websocket-extensions -- ReDoS vulnerability
ca8e56d5-e856-11dc-b5af-0017319806e7 ghostscript -- zseticcspace() function buffer overflow vulnerability
ca982e2d-61a9-11ec-8be6-d4c9ef517024 Apache httpd -- Multiple vulnerabilities
ca9ce879-5ebb-11d9-a01c-0050569f0001 exim -- two buffer overflow vulnerabilities
caa98ffd-0a92-40d0-b234-fd79b429157e cURL -- URL request injection vulnerability
cacaffbc-5e64-11d8-80e3-0020ed76ef5a GNU libtool insecure temporary file handling
cad045c0-81a5-11d8-9645-0020ed76ef5a zebra/quagga denial of service vulnerability
cae01d7b-110d-11df-955a-00219b0fc4d8 apache -- Prevent chunk-size integer overflow on platforms where sizeof(int) < sizeof(long)
caf545f2-c0d9-11e9-9051-4c72b94353b5 Apache -- Multiple vulnerabilities
cb0183bb-45f6-11ea-a1c7-b499baebfeaf MariaDB -- Vulnerability in C API
cb09a7aa-5344-11e6-a7bd-14dae9d210b8 xercesi-c3 -- multiple vulnerabilities
cb0bf1ec-bb92-11e6-a9a5-b499baebfeaf Apache httpd -- denial of service in HTTP/2
cb116651-79db-4c09-93a2-c38f9df46724 django -- multiple vulnerabilities
cb13a765-a277-11eb-97a0-e09467587c17 chromium -- multiple vulnerabilities
cb22a9a6-c907-11ee-8d1c-40b034429ecf p5-Spreadsheet-ParseExcel -- Remote Code Execution Vulnerability
cb252f01-7c43-11e3-b0a6-005056a37f68 bind -- denial of service vulnerability
cb3f036d-8c7f-11e6-924a-60a44ce6887b libvncserver -- multiple security vulnerabilities
cb470368-94d2-11d9-a9e0-0001020eed82 ethereal -- multiple protocol dissectors vulnerabilities
cb5189eb-572f-11e6-b334-002590263bf5 libidn -- multiple vulnerabilities
cb539d4e-cd68-11e8-8819-00e04c1ea73d gitea -- multiple vulnerabilities
cb6c6c29-9c4f-11d8-9366-0020ed76ef5a proftpd IP address access control list breakage
cb84b940-add5-11ec-9bc8-6805ca2fa271 powerdns-recursor -- denial of service
cb902a77-3f43-11ed-9402-901b0e9408dc Matrix clients -- several vulnerabilities
cb9d2fcd-eb47-11e4-b03e-002590263bf5 wpa_supplicant -- P2P SSID processing vulnerability
cba246d2-f483-11e5-92ce-002590263bf5 bind -- denial of service vulnerability
cbceeb49-3bc7-11e6-8e82-002590263bf5 Apache Commons FileUpload -- denial of service (DoS) vulnerability
cbe1a0f9-27e9-11e5-a4a5-002590263bf5 xen-tools -- Guest triggerable qemu MSI-X pass-through error messages
cbfa8bd7-24b6-11e5-86ff-14dae9d210b8 haproxy -- information leak vulnerability
cbfc1591-c8c0-11ee-b45a-589cfc0f81b0 phpmyfaq -- multiple vulnerabilities
cbfd1874-efea-11eb-8fe9-036bd763ff35 fetchmail -- 6.4.19 and older denial of service or information disclosure
cbfde1cd-87eb-11d9-aa18-0001020eed82 mozilla -- arbitrary code execution vulnerability
cc068959-ce2b-42eb-81ed-055551fe0e51 electron32 -- multiple vulnerabilities
cc0fb686-6550-11d8-80e3-0020ed76ef5a file disclosure in phpMyAdmin
cc1ac01e-86b0-11ef-9369-2cf05da270f3 Gitlab -- vulnerabilities
cc1fd3da-b8fd-4f4d-a092-c38541c0f993 vault -- User Enumeration via LDAP auth
cc294a2c-a232-11e4-8e9f-0011d823eebd Adobe Flash Player -- multiple vulnerabilities
cc3bfec6-56cd-11e0-9668-001fd0d616cf php -- crash on crafted tag in exif
cc42db1c-c65f-11ec-ad96-0800270512f4 redis -- Multiple vulnerabilities
cc47fafe-f823-11dd-94d9-0030843d3802 typo3 -- cross-site scripting and information disclosure
cc4ce06b-e01c-11d9-a8bd-000cf18bbe54 p5-Mail-SpamAssassin -- denial of service vulnerability
cc553d79-e1f0-4b94-89f2-bacad42ee826 mosquitto -- NULL pointer dereference
cc627e6c-3b89-11e4-b629-6805ca0b3d42 phpMyAdmin -- XSRF/CSRF due to DOM based XSS in the micro history feature
cc7548ef-06e1-11e5-8fda-002590263bf5 libmspack -- frame_end overflow which could cause infinite loop
cc7c85d9-f30a-11eb-b12b-fc4dd43e2b6a tomcat -- Remote Denial of Service in multiple versions
cc9043cf-7f7a-426e-b2cc-8d1980618113 ruby -- Heap Overflow in Floating Point Parsing
cca97f5f-7435-11db-91de-0008743bf21a proftpd -- Remote Code Execution Vulnerability
ccace707-a8d8-11e7-ac58-b499baebfeaf cURL -- out of bounds read
ccaea96b-7dcd-11ec-93df-00224d821998 strongswan - Incorrect Handling of Early EAP-Success Messages
ccd325d2-fa08-11d9-bc08-0001020eed82 isc-dhcpd -- format string vulnerabilities
ccd698df-8e20-11d8-90d1-0020ed76ef5a racoon remote denial of service vulnerability (ISAKMP header length field)
cce76eca-ca16-11eb-9b84-d4c9ef517024 Apache httpd -- Multiple vulnerabilities
ccefac3e-2aed-11e3-af10-000c29789cb5 polarssl -- Timing attack against protected RSA-CRT implementation
cd286cc5-b762-11d9-bfb7-000c6ec775d9 ImageMagick -- ReadPNMImage() heap overflow vulnerability
cd2dc126-cfe4-11ea-9172-4c72b94353b5 Cacti -- multiple vulnerabilities
cd409df7-f483-11e5-92ce-002590263bf5 bind -- denial of service vulnerability
cd68ff50-362b-11e0-ad36-00215c6a37bb phpMyAdmin -- multiple vulnerabilities
cd7e260a-6bff-11d9-a5df-00065be4b5b6 newsgrab -- insecure file and directory creation
cd81806c-26e7-4d4a-8425-02724a2f48af mozilla -- multiple vulnerabilities
cd864f1a-8e5a-11ea-b5b4-641c67a117d8 cacti -- XSS exposure
cd944b3f-51f6-11e7-b7b2-001c25e46b1d Flash Player -- multiple vulnerabilities
cd97c7ca-f079-11ea-9c31-001b216d295b Multi-link PPP protocol daemon MPD5 remotely exploitable crash
cda2f3c2-6c8b-11e7-867f-b499baebfeaf MySQL -- multiple vulnerabilities
cda566a0-2df0-4eb0-b70e-ed7a6fb0ab3c puppet27 and puppet -- multiple vulnerabilities
cdb10765-6879-11eb-a7d8-08002734b9ed gitea -- multiple vulnerabilities
cdb4d962-34f9-11e8-92db-080027907385 moodle -- multiple vulnerabilities
cdb5338d-04ec-11ee-9c88-001b217b3468 Gitlab -- Vulnerability
cdb5e0e3-fafc-11ee-9c21-901b0e9408dc go -- http2: close connections when receiving too many headers
cdc4ff0e-d736-11e1-8221-e0cb4e266481 p5-RT-Authen-ExternalAuth -- privilege escalation
cdc685b5-1724-49a1-ad57-2eaab68e9cc0 py-pygments -- multiple DoS vulnerabilities
cddde37a-39b5-11dc-b3da-001921ab2fa4 dokuwiki -- XSS vulnerability in spellchecker backend
cdeb34e6-d00d-11e0-987e-00215c6a37bb stunnel -- heap corruption vulnerability
cdf14b68-3ff9-11d9-8405-00065be4b5b6 Open DC Hub -- remote buffer overflow vulnerability
cdf18ed9-7f4a-11d8-9645-0020ed76ef5a multiple vulnerabilities in ethereal
cdff0af2-1492-11e5-a1cf-002590263bf5 php5 -- multiple vulnerabilities
ce0c8590-b628-11ea-9d28-3c970ee9157c CUPS -- memory corruption
ce0f52e1-a174-11ef-9a62-002590c1f29c FreeBSD -- Certificate revocation list fetch(1) option fails
ce109fd4-67f3-11d9-a9e7-0001020eed82 mysql-scripts -- mysqlaccess insecure temporary file creation
ce231189-ce56-11e9-9fa0-0050569f0b83 www/varnish6 -- Denial of Service
ce29ce1d-971a-11dd-ab7e-001c2514716c cups -- multiple vulnerabilities
ce2f2ade-e7df-11dc-a701-000bcdc1757a phpmyadmin -- SQL injection vulnerability
ce39379f-7eb7-11e8-ab03-00bd7f19ff09 h2o -- heap buffer overflow during logging
ce46b93a-80f2-11d8-9645-0020ed76ef5a Buffer overflows and format string bugs in Emil
ce4b3af8-0b7c-11e1-846b-00235409fd3e libxml -- Multiple use-after-free vulnerabilities
ce502902-ca39-11e2-9673-001e8c75030d devel/subversion -- svnserve remotely triggerable DoS
ce658051-27ea-11e5-a4a5-002590263bf5 xen-kernel -- Information leak through XEN_DOMCTL_gettscinfo
ce680f0a-eea6-11e1-8bd8-0022156e8794 squidclamav -- cross-site scripting in default virus warning pages
ce6ac624-aec8-11d9-a788-0001020eed82 firefox -- PLUGINSPAGE privileged javascript execution
ce6ce2f8-34ac-11e0-8103-00215c6a37bb awstats -- arbitrary commands execution vulnerability
ce6db19b-976e-11ea-93c4-08002728f74c Rails -- remote code execution vulnerability
ce79167f-ee1c-11eb-9785-b42e99a1b9c3 powerdns -- remotely triggered crash
ce808022-8ee6-11e6-a590-14dae9d210b8 FreeBSD -- Heap overflow vulnerability in bspatch
ce82bfeb-d276-11e1-92c6-14dae938ec40 dns/nsd -- DoS vulnerability from non-standard DNS packet
cebd05d6-ed7b-11e7-95f2-005056925db4 OTRS -- Multiple vulnerabilities
cebed39d-9e6f-11e2-b3f5-003067c2616f opera -- moderately severe issue
cec4d01a-7ac5-11e5-b35a-002590263bf5 Joomla! -- Core - Remote File Execution/Denial of Service vulnerabilities
cecbc674-8b83-11ec-b369-6c3be5272acd Grafana -- XSS
ced2d47e-8469-11ea-a283-b42e99a1b9c3 malicious URLs may present credentials to wrong server
cee3d12f-bf41-11e7-bced-00e04c1ea73d wordpress -- multiple issues
cf0fb426-3f96-11d8-b096-0020ed76ef5a ProFTPD ASCII translation bug resulting in remote root compromise
cf133acc-82e7-4755-a66a-5ddf90dacbe6 graphite2 -- out-of-bounds write with malicious font
cf2105c6-551b-11e9-b95c-b499baebfeaf Apache -- Multiple vulnerabilities
cf39ddf8-21be-11eb-8b47-641c67a117d8 jupyter notebook -- open redirect vulnerability
cf3b9a96-f7bb-11da-9156-000e0c2e438a smbfs -- chroot escape
cf40e8b7-264d-11ee-a468-80fa5b29d485 virtualbox-ose -- multiple vulnerabilities
cf484358-b5d6-11dc-8de0-001c2514716c dovecot -- Specific LDAP + auth cache configuration may mix up user logins
cf495fd4-fdcd-11dd-9a86-0050568452ac Zend Framework -- Local File Inclusion vulnerability in Zend_View::render()
cf6f3465-e996-4672-9458-ce803f29fdb7 py-markdown2 -- XSS vulnerability
cf86c644-cb6c-11db-8e9d-000c6ec775d9 mod_jk -- long URL stack overflow vulnerability
cf91c1e4-2b6d-11de-931b-00e0815b8da8 ejabberd -- cross-site scripting vulnerability
cf96cd8d-48fb-11e0-98a6-0050569b2d21 redmine -- XSS vulnerability
cfa0be42-3cd7-11eb-9de7-641c67a117d8 py-matrix-synapse -- DoS on Federation API
cfb12f02-06e1-11e5-8fda-002590263bf5 cabextract -- directory traversal with UTF-8 symbols in filenames
cfd2a634-3785-11ee-94b4-6cc21735f730 postgresql-server -- Extension script @substitutions@ within quoting allow SQL injection
cfe17ca6-6858-4805-ba1d-a60a61ec9b4d phpBB IP address spoofing
cff0b2e2-0716-11eb-9e5d-08002728f74c libexif -- multiple vulnerabilities
d001c189-2793-11ec-8fb1-206a8a720317 Apache httpd -- Path Traversal and Remote Code Execution
d0034536-ff24-11e4-a072-d050996490d0 proftpd -- arbitrary code execution vulnerability with chroot
d01d10c7-de2d-11e0-b215-00215c6a37bb django -- multiple vulnerabilities
d022754d-8839-11d9-aa18-0001020eed82 mozilla -- insecure temporary directory vulnerability
d02f6b01-1a3f-11e5-8bd6-c485083ca99c Adobe Flash Player -- critical vulnerabilities
d057c5e6-5b20-11e4-bebd-000c2980a9f3 libpurple/pidgin -- multiple vulnerabilities
d08f6002-c588-11e4-8495-6805ca0b3d42 rt -- Remote DoS, Information disclosure and Session Hijackingvulnerabilities
d0ac9a17-5e68-11ef-b8cc-b42e991fc52e mozilla products -- spoofing attack
d0b12952-cb86-11e6-906f-0cc47a065786 h2o -- Use-after-free vulnerability
d0be41fe-2a20-4633-b057-4e8b25c41780 bro -- array bounds and potential DOS issues
d0be8e1f-b19a-11ea-94aa-b827eb2f57d4 MongoDB -- Ensure RoleGraph can serialize authentication restrictions to BSON
d0c97697-df2c-4b8b-bff2-cec24dc35af8 mozilla -- multiple vulnerabilities
d0da046a-81e6-11ed-96ca-0800277bb8a8 gitea -- multiple issues
d10b49b2-8d02-49e8-afde-0844626317af mozilla -- multiple vulnerabilities
d10fc771-958f-11eb-9c34-080027f515ea curl -- TLS 1.3 session ticket proxy host mixup
d153c4d2-50f8-11eb-8046-3065ec8fd3ec chromium -- multiple vulnerabilities
d1681df3-421e-4a63-95b4-a3d6e29d395d electron{23,24} -- multiple vulnerabilities
d177d9f9-e317-11d9-8088-00123f0f7307 nwclient -- multiple vulnerabilities
d1853110-07f4-4645-895b-6fd462ad0589 mozilla -- multiple vulnerabilities
d18f431d-d360-11eb-a32c-00a0989e4ec1 dovecot -- multiple vulnerabilities
d193aa9f-3f8c-11e9-9a24-6805ca0b38e8 rssh - multiple vulnerabilities
d1ac6a6a-bea8-11eb-b87a-901b0ef719ab FreeBSD-kernel -- SMAP bypass
d1b20e09-dbdf-432b-83c7-89f0af76324a electron27 -- multiple vulnerabilities
d1b35142-ff4a-11ec-8be3-001b217b3468 Gitlab -- multiple vulnerabilities
d1bbc235-c0c9-45cd-8d2d-c1b8fd22e616 imap-uw -- authentication bypass when CRAM-MD5 is enabled
d1be3d73-6737-11ec-9eea-589cfc007716 OpenSearch -- Log4Shell
d1c39c8e-05ab-4739-870f-765490fa2052 openvpn -- denial of service: undecryptable packet from authorized client can disconnect unrelated clients
d1ce8a4f-c235-11dd-8cbc-00163e000016 squirrelmail -- Cross site scripting vulnerability
d1dfc4c7-8791-11e3-a371-6805ca0b3d42 rt42 -- denial-of-service attack via the email gateway
d1e9d8c5-839b-11e8-9610-9c5c8e75236a clamav -- multiple vulnerabilities
d1ef1138-d273-11ea-a757-e0d55e2a8bf9 ark -- directory traversal
d1f5e12a-fd5a-11e3-a108-080027ef73ec LZO -- potential buffer overrun when processing malicious input data
d2073237-5b52-11e3-80f7-c86000cbc6ec OpenTTD -- Denial of service using forcefully crashed aircrafts
d2102505-f03d-11d8-81b0-000347a4fa7d cvs -- numerous vulnerabilities
d222241d-91cc-11ea-82b8-4c72b94353b5 glpi -- stored XSS
d226626c-857f-11e0-95cc-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
d2293e22-4390-42c2-a323-34cca2066000 py39-sqlalchemy12 -- multiple SQL Injection vulnerabilities
d22b336d-0567-11ec-b69d-4062311215d5 FreeBSD -- libfetch out of bounds read
d23119df-335d-11e2-b64c-c8600054b392 mozilla -- multiple vulnerabilities
d2505ec7-78ea-11ee-9131-6f01853956d5 open-vm-tools -- Multiple vulnerabilities
d2723b0f-58d9-11ef-b611-84a93843eb75 Vaultwarden -- Multiple vulnerabilities
d2992bc2-ed18-11ee-96dc-001b217b3468 Gitlab -- vulnerabilities
d29dc506-8aa6-11db-bd0d-00123ffe8333 wv -- Multiple Integer Overflow Vulnerabilities
d2a43243-087b-11db-bc36-0008743bf21a mutt -- Remote Buffer Overflow Vulnerability
d2a84feb-ebe0-11e5-92ce-002590263bf5 git -- integer overflow
d2a892b9-2605-11e4-9da0-00a0986f28c4 PHP multiple vulnerabilities
d2ad7647-6dd9-11ee-85eb-84a93843eb75 Roundcube -- XSS vulnerability in SVG
d2b48d30-ea97-11db-a802-000fea2763ce lighttpd -- Remote DOS in CRLF parsing
d2b80c7c-3aae-11da-9484-00123ffe8333 zope -- expose RestructuredText functionality to untrusted users
d2b8a963-3d59-11dc-b3d3-0016179b2dd5 p5-Net-DNS -- multiple Vulnerabilities
d2c2952d-85a1-11dc-bfff-003048705d5a py-django -- denial of service vulnerability
d2c2c815-3793-11ea-8be3-54e1ad3d6335 drm graphics drivers -- potential information disclusure via local access
d2c6173f-e43b-11ed-a1d7-002590f2a714 git -- Multiple vulnerabilities
d3180f02-031e-11ec-875f-0800273f11ea gitea -- multiple vulnerabilities
d3216606-2b47-11e5-a668-080027ef73ec PolarSSL -- Security Fix Backports
d331f691-71f4-11ea-8bb5-6cc21735f730 PostgresSQL -- ALTER ... DEPENDS ON EXTENSION is missing authorization checks
d3324c55-3f11-11e4-ad16-001999f8d30b squid -- Buffer overflow in SNMP processing
d3324fdb-6bf0-11e5-bc5e-00505699053e ZendFramework1 -- SQL injection vulnerability
d337b206-200f-11dc-a197-0011098b2f36 xpcd -- buffer overflow
d34bef0b-f312-11eb-b12b-fc4dd43e2b6a tomcat -- HTTP request smuggling in multiple versions
d3527663-4ccb-11db-b48d-00508d6a62df eyeOS -- multiple XSS security bugs
d35373ae-4d34-11ee-8e38-002590c1f29c FreeBSD -- pf incorrectly handles multiple IPv6 fragment headers
d357f6bb-0af4-4ac9-b096-eeec183ad829 chromium -- multiple vulnerabilities
d371b627-6ed5-11d9-bd18-000a95bc6fae zhcon -- unauthorized file access
d37407bd-5c5f-11ea-bb2a-8c164582fbac TiMidity++ -- Multiple vulnerabilities
d379aa14-8729-11ed-b988-080027d3a315 mediawiki -- multiple vulnerabilities
d3847eba-114b-11ef-9c21-901b0e9408dc go -- net: malformed DNS message can cause infinite loop
d38bbb79-14f3-11e9-9ce2-28d244aee256 irssi -- Use after free
d38e1810-9ef7-11da-b410-000e0c2e438a tor -- malicious tor server can locate a hidden service
d3921810-3c80-11e1-97e8-00215c6a37bb php -- multiple vulnerabilities
d395e44f-6f4f-11e4-a444-00262d5ed8ee chromium -- multiple vulnerabilities
d3a98c2d-5da1-11e5-9909-002590263bf5 squid -- TLS/SSL parser denial of service vulnerability
d3d02d3a-2242-11e9-b95c-b499baebfeaf MySQL -- multiple vulnerabilities
d3e023fb-6e88-11ec-b948-080027240888 Django -- multiple vulnerabilities
d3e96508-056b-4259-88ad-50dc8d1978a6 Ruby -- XSS exploit of RDoc documentation generated by rdoc
d3f3e818-8d10-11ea-8668-e0d55e2a8bf9 taglib -- heap-based buffer over-read via a crafted audio file
d3f60db0-3aea-11eb-af2a-080027dbe4b7 glpi -- Account takeover vulnerability
d40c66cb-27e4-11e5-a4a5-002590263bf5 xen-kernel and xen-tools -- Long latency MMIO mapping operations are not preemptible
d4284c2e-8b83-11ec-b369-6c3be5272acd Grafana -- CSRF
d42e5b66-6ea0-11df-9c8d-00e0815b8da8 sudo -- Secure path vulnerability
d4379f59-3e9b-49eb-933b-61de4d0b0fdb Ruby -- OpenSSL Hostname Verification Vulnerability
d44129d6-b22e-4e9c-b200-6a46e8bd3e60 libsamplerate -- multiple vulnerabilities
d455708a-e3d3-11e6-9940-b499baebfeaf OpenSSL -- multiple vulnerabilities
d459c914-4100-11ed-9bc7-3065ec8fd3ec chromium -- multiple vulnerabilities
d45ad7ae-5d56-11e5-9ad8-14dae9d210b8 shutter -- arbitrary code execution
d460b640-4cdf-11ea-a59e-6451062f0f7a Flash Player -- arbitrary code execution
d46ed7b8-1912-11e5-9fdf-00262d5ed8ee www/chromium -- multiple vulnerabilities
d47b7ae7-fe1d-4f7f-919a-480ca8035f00 zeek -- potential DoS vulnerability
d47e9d19-5016-11d9-9b5f-0050569f0001 php -- multiple vulnerabilities
d487d4fc-43a8-11ed-8b01-b42e991fc52e zydis -- heap buffer overflow
d48a2224-9b4c-11ef-bdd9-4ccc6adda413 gstreamer1-rtsp-server -- Potential Denial-of-Service (DoS) with specially crafted client requests
d49f86ab-d9c7-11eb-a200-00155d01f201 Exiv2 -- Multiple vulnerabilities
d4a358d3-e09a-11dd-a765-0030843d3802 nagios -- web interface privilege escalation vulnerability
d4a7054a-6d96-11d9-a9e7-0001020eed82 yamt -- arbitrary command execution vulnerability
d4bd4046-93a6-11d9-8378-000bdb1444a4 rxvt-unicode -- buffer overflow vulnerability
d4c70df5-335d-11da-9c70-0040f42d58c6 weex -- remote format string vulnerability
d4c7e9a9-d893-11e6-9b4d-d050996490d0 BIND -- multiple vulnerabilities
d4cc994f-b61d-11ec-9ebc-1c697aa5a594 FreeBSD -- 802.11 heap buffer overflow
d4d21998-bdc4-4a09-9849-2898d9b41459 zeek -- several vulnerabilities
d4f45676-9d33-11e4-8275-000c292e4fd8 samba -- Elevation of privilege to Active Directory Domain Controller
d4fc4599-8f75-11e9-8d9f-3065ec8fd3ec chromium -- use after free
d5026193-6fa2-11ef-99bc-1c697a616631 Intel CPUs -- multiple vulnerabilities
d50a50a2-2f3e-11e8-86f8-00e04c1ea73d mybb -- multiple vulnerabilities
d51a7e6e-c546-11d9-9aed-000e0c2e438a cdrdao -- unspecified privilege escalation vulnerability
d51b52cf-c199-11e9-b13f-001b217b3468 Libgit2 -- multiple vulnerabilities
d51ced72-4212-11e6-942d-bc5ff45d0f28 xen-kernel -- x86 shadow pagetables: address width overflow
d53c30c1-0d7b-11ef-ba02-6cc21735f730 PostgreSQL server -- Potentially allowing authenicated database users to see data that they shouldn't.
d55e1b4d-eadc-11ed-9cc0-080027de9982 Django -- multiple vulnerabilities
d560b346-08a2-11e0-bcca-0050568452ac YUI JavaScript library -- JavaScript injection exploits in Flash components
d58455cc-159e-11ef-83d8-4ccc6adda413 qt5-webengine -- Multiple vulnerabilities
d58726ff-ef5e-11ee-8d8e-080027a5b8e9 mediawiki -- multiple vulnerabilities
d59ebed4-34be-11e6-be25-3065ec8fd3ec chromium -- multiple vulnerabilities
d5b6d151-1887-11e8-94f7-9c5c8e75236a squid -- Vulnerable to Denial of Service attack
d5e0317e-5e45-11e2-a113-c48508086173 java 7.x -- security manager bypass
d5e1aac8-db0b-11dd-ae30-001cc0377035 xterm -- DECRQSS remote command execution vulnerability
d5fead4f-8efa-11ea-a5c8-08002728f74c Wagtail -- potential timing attack vulnerability
d60199df-7fb3-11e2-9c5a-000d601460a4 otrs -- XSS vulnerability in Firefox and Opera could lead to remote code execution
d605edb1-1616-11e5-a000-d050996490d0 drupal -- multiple vulnerabilities
d62ec98e-97d8-11e5-8c0e-080027b00c2e cyrus-imapd -- integer overflow in the start_octet addition
d6540411-9e10-11ea-9e83-0cc47ac16c9d qmail -- 64 bit integer overflows with possible remote code execution on large SMTP requests
d656296b-33ff-11d9-a9e7-0001020eed82 ruby -- CGI DoS
d658042c-1c98-11ed-95f8-901b0e9408dc dendrite -- Incorrect parsing of the event default power level in event auth
d670a953-b2a1-11e7-a633-009c02a2ab30 WPA packet number reuse with replayed messages and key reinstallation
d67b517d-8214-11de-88ea-001a4d49522b bugzilla -- product name information leak
d68df01b-564e-11e5-9ad8-14dae9d210b8 ganglia-webfrontend -- auth bypass
d696473f-9f32-42c5-a106-bf4536fb1f74 Django -- information leakage
d6b092bd-61e1-11da-b64c-0001020eed82 opera -- multiple vulnerabilities
d6bbf2d8-2cfc-11e6-800b-080027468580 iperf3 -- buffer overflow
d6c19e8c-6806-11ee-9464-b42e991fc52e curl -- SOCKS5 heap buffer overflow
d6c51737-a84b-11e5-8f5c-002590263bf5 librsvg2 -- denial of service vulnerability
d6d088c9-5064-11ed-bade-080027881239 Python -- multiple vulnerabilities
d6f76976-e86d-4f9a-9362-76c849b10db2 jenkins -- multiple vulnerabilities
d706a3a3-4a7c-11e6-97f7-5453ed2e2b49 p7zip -- out-of-bounds read vulnerability
d70c9e18-f340-11e8-be46-0019dbb15b3f payara -- Multiple vulnerabilities
d713d709-4cc9-11ed-a621-0800277bb8a8 gitea -- multiple issues
d71831ef-e6f8-11e5-85be-14dae9d210b8 ricochet -- information disclosure
d71d154a-8b83-11ec-b369-6c3be5272acd Grafana -- Teams API IDOR
d71da236-9a94-11dd-8f42-001c2514716c libxml2 -- two vulnerabilities
d73bc4e6-e7c4-11ea-a878-e09467587c17 chromium -- multiple vulnerabilities
d74371d2-4fee-11e9-a5cd-1df8a848de3d Python -- NULL pointer dereference vulnerability
d754b7d2-b6a7-11df-826c-e464a695cb21 wget -- multiple HTTP client download filename vulnerability
d76961da-56f6-11e5-934b-002590263bf5 pgbouncer -- failed auth_query lookup leads to connection as auth_user
d778ddb0-2338-11ea-a1c7-b499baebfeaf OpenSSL -- Overflow vulnerability
d77ceb8c-bb13-11e7-8357-3065ec6f3643 wget -- Heap overflow in HTTP protocol handling
d79fc873-b5f9-11e0-89b4-001ec9578670 phpmyadmin -- multiple vulnerabilities
d7a43ee6-d2d5-11e2-9894-002590082ac6 owncloud -- Multiple security vulnerabilities
d7af61c8-2cc0-11d8-9355-0020ed76ef5a lftp HTML parsing vulnerability
d7b9a28d-238c-11e5-86ff-14dae9d210b8 bitcoin -- denial of service
d7c1d00d-9d2e-11da-8c1d-000e0c2e438a ipfw -- IP fragment denial of service
d7cd5015-08c9-11da-bc08-0001020eed82 gforge -- XSS and email flood vulnerabilities
d7d1cc94-b971-11e7-af3a-f1035dd0da62 Node.js -- remote DOS security vulnerability
d7dbd2db-599c-11e1-a2fb-14dae9ebcf89 mozilla -- heap-buffer overflow
d7efc2ad-37af-11ef-b611-84a93843eb75 Apache httpd -- Multiple vulnerabilities
d821956f-1753-11ee-ad66-1c61b4739ac9 SoftEtherVPN -- multiple vulnerabilities
d82bcd2b-5cd6-421c-8179-b3ff0231029f py-tflite -- denial of service vulnerability
d835c54f-a4bd-11ed-b6af-b42e991fc52e node_exporter -- bypass security with cache poisoning
d8382a69-4728-11e8-ba83-0011d823eebd mbed TLS (PolarSSL) -- multiple vulnerabilities
d843a984-7f22-484f-ba81-483ddbe30dc3 ledger -- multiple vulnerabilities
d846af5b-00f4-11e2-b6d0-00e0814cab4e jenkins -- multiple vulnerabilities
d864a0a7-6f27-11dd-acfe-00104b9e1a4a gnutls -- "gnutls_handshake()" Denial of Service
d86890da-f498-11e4-99aa-bcaec565249c wordpress -- 2 cross-site scripting vulnerabilities
d86becfe-05a4-11ee-9d4a-080027eda32c Python -- multiple vulnerabilities
d8769838-8814-11d8-90d1-0020ed76ef5a racoon fails to verify signature during Phase 1
d881d254-70c6-11e2-862d-080027a5ec9a libexif -- multiple remote vulnerabilities
d887b3d9-7366-11ea-b81a-001cc0382b2f GnuTLS -- flaw in DTLS protocol implementation
d889d32c-ecd9-11e8-9416-001b217b3468 Gitlab -- Multiple vulnerabilities
d8972bcd-1b64-11ee-9cd6-001b217b3468 Gitlab -- Vulnerabilities
d8c901ff-0f0f-11e1-902b-20cf30e32f6d Apache 1.3 -- mod_proxy reverse proxy exposure
d8e1aadd-ee68-11d9-8310-0001020eed82 clamav -- cabinet file handling DoS vulnerability
d8e55d65-81d6-11d9-a9e7-0001020eed82 opera -- kfmclient exec command execution vulnerability
d8e7e854-17fa-11e9-bef6-6805ca2fa271 botan2 -- Side channel during ECC key generation
d8fbf13a-6215-11db-a59e-0211d85f11fb kdelibs -- integer overflow in khtml
d905b219-c1ca-11e9-8c46-0c9d925bbbc0 xdm -- remote denial of service
d923fb0c-8c2f-11ec-aa85-0800270512f4 zsh -- Arbitrary command execution vulnerability
d9307a41-c4d7-11da-b2fb-000e0c2e438a zoo -- stack based buffer overflow
d9360908-9d52-11e4-87fd-10bf48e1088e unzip -- input sanitization errors
d9405748-1342-11dc-a35c-001485ab073e mod_jk -- information disclosure
d944719e-42f4-4864-89ed-f045b541919f gtar -- Directory traversal vulnerability
d94c08d2-d079-11e9-8f1a-001999f8d30b asterisk -- Crash when negotiating for T.38 with a declined stream
d9649816-5e0d-11e3-8d23-3c970e169bc2 drupal -- multiple vulnerabilities
d9867f50-54d0-11dc-b80b-0016179b2dd5 claws-mail -- POP3 Format String Vulnerability
d9b01c08-59b3-11de-828e-00e0815b8da8 git -- denial of service vulnerability
d9b43004-f5fd-4807-b1d7-dbf66455b244 mozilla -- multiple vulnerabilities
d9dbe6e8-84da-11e3-98bd-080027f2d077 varnish -- DoS vulnerability in Varnish HTTP cache
d9dc2697-dadf-11da-912f-00123ffe8333 phpwebftp -- "language" Local File Inclusion
d9e01c35-2531-11e7-b291-b499baebfeaf MySQL -- multiple vulnerabilities
d9e154c9-7de9-11ed-adca-080027d3a315 typo3 -- multiple vulnerabilities
d9e1b569-c3d8-11e5-b5fe-002590263bf5 privoxy -- multiple vulnerabilities
d9e82328-a129-11e7-987e-4f174049b30a perl -- multiple vulnerabilities
d9f686f3-fde0-48dc-ab0a-01c2fe3e0529 py-matrix-synapse -- multiple vulnerabilities
d9f96741-47bd-4426-9aba-8736c0971b24 libraw -- buffer overflow
d9f99491-1656-11e6-94fa-002590263bf5 perl5 -- taint mechanism bypass vulnerability
d9fe59ea-1940-11e8-9eb8-5404a68ad561 cvs -- Remote code execution via ssh command injection
da185955-5738-11de-b857-000f20797ede mozilla -- multiple vulnerabilities
da1d5d2e-3eca-11e7-8861-0018fe623f2b miniupnpc -- integer signedness error
da317bc9-59a6-11e1-bc16-0023ae8e59f0 piwik -- xss and click-jacking issues
da3d381b-0ee6-11e0-becc-0022156e8794 pecl-phar -- format string vulnerability
da434a78-e342-4d9a-87e2-7497e5f117ba ffmpeg -- use-after-free
da451130-365d-11e5-a4a5-002590263bf5 qemu, xen-tools -- QEMU heap overflow flaw with certain ATAPI commands
da459dbc-5586-11e9-abd6-001b217b3468 Gitlab -- Multiple vulnerabilities
da4adc02-07f4-11ef-960d-5404a68ad561 hcode -- buffer overflow in mail.c
da4b89ad-b28f-11e3-99ca-f0def16c5c1b nginx-devel -- SPDY heap buffer overflow
da5c4072-8082-11dd-9c8c-001c2514716c clamav -- CHM Processing Denial of Service
da634091-a84a-11e5-8f5c-002590263bf5 librsvg2 -- denial of service vulnerability
da690355-1159-11d9-bc4a-000c41e2cdad mozilla -- vCard stack buffer overflow
da6f265b-8f3d-11d8-8b29-0020ed76ef5a kdepim exploitable buffer overflow in VCF reader
da70d472-af59-11e7-ace2-f8b156b439c5 xen-kernel -- multiple vulnerabilities
da9e6438-bfc0-11d8-b00e-000347a4fa7d MoinMoin administrative group name privilege escalation vulnerability
daa8a49b-99b9-11e4-8f66-3085a9a4510d libevent -- integer overflow in evbuffers
daadef86-a366-11e5-8b40-20cf30e32f6d subversion -- multiple vulnerabilities
dad6294c-f7c1-11ee-bb77-001b217b3468 Gitlab -- Patch Release: 16.10.2, 16.9.4, 16.8.6
dade3316-9d31-11da-8c1d-000e0c2e438a IEEE 802.11 -- buffer overflow
daf045d7-b211-11dd-a987-000c29ca8953 net-snmp -- DoS for SNMP agent via crafted GETBULK request
daf0a339-9850-11e2-879e-d43d7e0c7c02 asterisk -- multiple vulnerabilities
dafa13a8-6e9b-11e4-8ef7-5453ed2e2b49 kde-workspace -- privilege escalation
db04bf07-9cc8-11e5-8c2b-c335fa8985d7 libraw -- index overflow in smal_decode_segment
db0c4b00-a24c-11e2-9601-000d601460a4 rubygem-rails -- multiple vulnerabilities
db1d3340-e83b-11e1-999b-e0cb4e266481 phpMyAdmin -- Multiple XSS in Table operations, Database structure, Trigger and Visualize GIS data pages
db2acdac-b5a7-11e8-8f6f-00e04c1ea73d mybb -- vulnerabilities
db3301be-e01c-11e5-b2bd-002590263bf5 cacti -- multiple vulnerabilities
db33e250-74f7-11ee-8290-a8a1599412c6 chromium -- multiple vulnerabilities
db449245-870d-11dc-a3ec-001921ab2fa4 openldap -- multiple remote denial of service vulnerabilities
db4b2f27-252a-11eb-865c-00155d646400 go -- math/big: panic during recursive division of very large numbers; cmd/go: arbitrary code execution at build time through cgo
db570002-ce06-11e7-804e-c85b763a2f96 cacti -- multiple vulnerabilities
db895ed0-6298-11ed-9ca2-6c3be5272acd Grafana -- Privilege escalation
db8fa362-0ccb-4aa8-9220-72b7763e9a4a jenkins -- multiple vulnerabilities
dba5d1c9-9f29-11e1-b511-003067c2616f OpenSSL -- DTLS and TLS 1.1, 1.2 denial of service
dbd1f627-c43b-11e9-a923-9c5c8e75236a clamav -- multiple vulnerabilities
dbdac023-80e1-11e2-9a29-001060e06fd4 linux-flashplugin -- multiple vulnerabilities
dbe8c5bd-8d3f-11ef-8d2e-a04a5edf46d9 oauth2-proxy -- multiple vulnerabilities
dbf338d0-dce5-11e1-b655-14dae9ebcf89 mozilla -- multiple vulnerabilities
dbf9e66c-bd50-11e4-a7ba-206a8a720317 krb5 1.11 -- New release/fix multiple vulnerabilities
dc0c201c-31da-11e8-ac53-d8cb8abf62dd Gitlab -- multiple vulnerabilities
dc132c91-2b71-11eb-8cfd-4437e6ad11c4 mutt -- authentication credentials being sent over an unencrypted connection
dc2d76df-a595-11e4-9363-20cf30e32f6d Bugzilla multiple security issues
dc33795f-ced7-11ed-b1fe-6805ca2fa271 powerdns-recursor -- denial of service
dc3c66e8-6a18-11e7-93af-005056925db4 Cacti -- Cross-site scripting (XSS) vulnerability in link.php
dc49f6dc-99d2-11ed-86e9-d4c9ef517024 MySQL -- Multiple vulnerabilities
dc57ad48-ecbb-439b-a4d0-5869be47684e vlc -- Use after free vulnerability
dc596a17-7a9e-11e6-b034-f0def167eeea Remote-Code-Execution vulnerability in mysql and its variants CVE 2016-6662
dc8741b9-c5d5-11e0-8a8e-00151735203a bugzilla -- multiple vulnerabilities
dc880d6c-195d-11e7-8c63-0800277dcc69 django -- multiple vulnerabilities
dc8c08c7-1e7c-11db-88cf-000c6ec775d9 apache -- mod_rewrite buffer overflow vulnerability
dc8cff4c-4063-11ea-8a94-3497f6939fdd webkit-gtk3 -- Multiple vulnerabilities
dc930435-d59f-11da-8098-00123ffe8333 amaya -- Attribute Value Buffer Overflow Vulnerabilities
dc96ac1f-86b1-11e0-9e85-00215af774f0 Unbound -- an empty error packet handling assertion failure
dc9e5237-c197-11ee-86bb-a8a1599412c6 chromium -- multiple security fixes
dc9f8335-2b3b-11e0-a91b-00e0815b8da8 isc-dhcp-server -- DHCPv6 crash
dca0a345-ed81-11d9-8310-0001020eed82 wordpress -- multiple vulnerabilities
dca7ced0-2796-11e8-95ec-a4badb2f4699 FreeBSD -- ipsec validation and use-after-free
dd116b19-64b3-11e3-868f-0025905a4771 mozilla -- multiple vulnerabilities
dd271de6-b444-11ed-9268-b42e991fc52e freerdp -- clients using the `/video` command line switch might read uninitialized data
dd343a2b-7ee7-11e9-a290-8ddc52868fa9 curl -- multiple vulnerabilities
dd48d9b9-5e7e-11e6-a6c3-14dae9d210b8 FreeBSD -- Kernel memory disclosure in sctp(4)
dd563930-d59a-11e5-8fa8-14dae9d210b8 adminer -- remote code execution
dd644964-e10e-11e7-8097-0800271d4b9c ruby -- Command injection vulnerability in Net::FTP
dd698b76-42f7-11e1-a1b6-14dae9ebcf89 asterisk -- SRTP Video Remote Crash Vulnerability
dd7aa4f1-102f-11d9-8a8a-000c41e2cdad php -- memory_limit related vulnerability
dd7f29cc-3ee9-11e5-93ad-002590263bf5 lighttpd -- Log injection vulnerability in mod_auth
dd8f2394-fd08-11de-b425-00215c6a37bb powerdns-recursor -- multiple vulnerabilities
dd943fbb-d0fe-11df-95a8-00219b0fc4d8 apr -- multiple vunerabilities
ddd3fcc9-2bdd-11ee-9af4-589cfc0f81b0 phpmyfaq -- multiple vulnerabilities
ddd48087-bd86-11e9-b13f-001b217b3468 Gitlab -- Multiple Vulnerabilities
ddecde18-e33b-11e7-a293-54e1ad3d6335 libXcursor -- integer overflow that can lead to heap buffer overflow
de11a8fb-2eda-11e9-8fb5-6451062f0f7a Flash Player -- information disclosure
de16b056-132e-11d9-bc4a-000c41e2cdad samba -- remote file disclosure
de2bc01f-dc44-11e1-9f4d-002354ed89bc Apache -- Insecure LD_LIBRARY_PATH handling
de2fab2d-0a37-11dc-aae2-00304881ac9a FreeType 2 -- Heap overflow vulnerability
de4d4110-ebce-11dc-ae14-0016179b2dd5 mplayer -- multiple vulnerabilities
de6d01d5-9c44-11e6-ba67-0011d823eebd flash -- remote code execution
de6d8290-aef7-11e1-898f-14dae938ec40 mail/sympa* -- Multiple vulnerabilities in Sympa archive management
de7a2b32-bd7d-11e7-b627-d43d7e971a1b PHP -- denial of service attack
de970aef-d60e-466b-8e30-1ae945a047f1 py39-configobj -- vulnerable to Regular Expression Denial of Service
dea7df85-d96c-11dc-9bfc-000e0c092e7a cacti -- Multiple security vulnerabilities have been discovered
deaba148-7ac5-11e5-b35a-002590263bf5 Joomla! -- Core - Open Redirect vulnerability
deb4f633-de1d-11e8-a9fb-080027f43a02 gitea -- remote code exeution
deb6e164-b30b-11e9-a87f-a4badb2f4699 FreeBSD -- Reference count overflow in mqueue filesystem
debbb39c-fdb3-11d9-a30d-00b0d09acbfc nbsmtp -- format string vulnerability
debf6353-5753-4e9a-b710-a83ecdd743de jenkins -- multiple vulnerabilities
dec3164f-3121-45ef-af18-bb113ac5082f sqlite -- multiple vulnerabilities
dec6b8e9-c9fe-11ed-bb39-901b0e9408dc dino -- Insufficient message sender validation in Dino
dec7e4b6-961a-11eb-9c34-080027f515ea ruby -- XML round-trip vulnerability in REXML
dee44ba9-08ab-11e2-a044-d0df9acfd7e5 OpenX -- SQL injection vulnerability
defce068-39aa-11de-a493-001b77d09812 wireshark -- multiple vulnerabilities
df0144fb-295e-11e7-970f-002590263bf5 codeigniter -- multiple vulnerabilities
df0a2fd1-4c92-11ee-8290-a8a1599412c6 chromium -- multiple vulnerabilities
df29c391-1046-11ed-a7ac-0800273f11ea gitea -- multiple issues
df328fac-f942-11e5-92ce-002590263bf5 py-djblets -- Self-XSS vulnerability
df333ede-a8ce-11d8-9c6d-0020ed76ef5a URI handler vulnerabilities in several browsers
df3db21d-1a4d-4c78-acf7-4639e5a795e0 jenkins -- multiple vulnerabilities
df428c01-ed91-11e2-9466-98fc11cdc4f5 linux-flashplugin -- multiple vulnerabilities
df45b4bd-0b7f-11e7-970f-002590263bf5 moodle -- multiple vulnerabilities
df4a7d21-4b17-11dc-9fc2-001372ae3ab9 opera -- Vulnerability in javascript handling
df502a2f-61f6-11e6-a461-643150d3111d puppet-agent MCollective plugin -- Remote Code Execution vulnerability
df587aa2-b5a5-11e5-9728-002590263bf5 dhcpcd -- multiple vulnerabilities
df71f5aa-6831-11ee-b06f-0050569ceb3a File deletion through document upload process in GLPI
df794e5d-3975-11ec-84e8-0800273f11ea gitea -- multiple vulnerabilities
dfb71c00-9d44-11da-8c1d-000e0c2e438a FreeBSD -- Infinite loop in SACK handling
dfc1daa8-61de-11da-b64c-0001020eed82 opera -- command line URL shell command injection
dfe0cdc1-baf2-11e5-863a-b499baebfeaf openssh -- information disclosure
dfe40cff-9c3f-11e0-9bec-6c626dd55a41 mozilla -- multiple vulnerabilities
e00304d2-bbed-11e6-b1cf-14dae9d210b8 FreeBSD -- Possible login(1) argument injection in telnetd(8)
e0070221-2dd8-11d9-a9e7-0001020eed82 wzdftpd -- remote DoS
e00d8b94-c88a-11e5-b5fe-002590263bf5 gdcm -- multiple vulnerabilities
e00ed3d9-1c27-11e9-a257-000ffec0b3e1 drupal -- Drupal core - Arbitrary PHP code execution
e020b0fd-1751-11ef-a490-84a93843eb75 Roundcube -- Cross-site scripting vulnerabilities
e02c572f-2af0-11e2-bb44-003067b2972c weechat -- Crash or freeze when decoding IRC colors in strings
e02e6a4e-6b26-11df-96b2-0015587e2cc1 cacti -- multiple vulnerabilities
e0382fde-4bb0-11e9-adcb-001b217b3468 Gitlab -- Vulnerability
e050119b-3856-11df-b2b2-002170daae37 postgresql -- bitsubstr overflow
e05bfc92-0763-11e6-94fa-002590263bf5 squid -- multiple vulnerabilities
e07a7754-12a4-4661-b852-fd221d68955f electron25 -- multiple vulnerabilities
e08c596e-cb28-11df-9c1b-0011098ad87f horde-gollem -- XSS vulnerability
e0914087-9a09-11ec-9e61-3065ec8fd3ec chromium -- multiple vulnerabilities
e0a969e4-a512-11e1-90b4-e0cb4e266481 RT -- Multiple Vulnerabilities
e0ab1773-07c1-46c6-9170-4c5e81c00927 curl -- multiple vulnerabilities
e0b342a1-d2ae-11da-a672-000e0c2e438a wordpress -- full path disclosure
e0f26ac5-6a17-11ed-93e7-901b0e9408dc tailscale -- Security vulnerability in the client
e0f6215b-c59e-11ee-a6db-080027a5b8e9 Django -- multiple vulnerabilities
e1085b15-f609-11e5-a230-0014a5a57822 mercurial -- multiple vulnerabilities
e1100e63-92f7-11e7-bd95-e8e0b747a45a chromium -- multiple vulnerabilities
e1156e90-7ad6-11de-b26a-0048543d60ce squid -- several remote denial of service vulnerabilities
e11955ca-187c-11e2-be36-00215af774f0 xinetd -- attackers can bypass access restrictions if tcpmux-servers service enabled
e12432af-8e73-11ec-8bc4-3065ec8fd3ec chromium -- multiple vulnerabilities
e135f0c9-375f-11e3-80b7-20cf30e32f6d bugzilla -- multiple vulnerabilities
e1387e95-08d0-11ed-be26-001999f8d30b VirtualBox -- Multiple vulnerabilities
e14b9870-62a4-11ee-897b-000bab9f87f1 Request Tracker -- multiple vulnerabilities
e15a22ce-f16f-446b-9ca7-6859350c2e75 quagga -- several security issues
e15ba624-cca8-11ee-84ca-b42e991fc52e powerdns-recursor -- Multiple Vulnerabilities
e15f2356-9139-11de-8f42-001aa0166822 apache22 -- several vulnerabilities
e16293f0-26b7-11d9-9289-000c41e2cdad gaim -- heap overflow exploitable by malicious GroupWise server
e17384ef-c5e8-4b5d-bb62-c13405e7f1f7 chromium -- multiple security fixes
e177c410-1943-11e0-9d1c-000c29ba66d2 mediawiki -- Clickjacking vulnerabilities
e182c076-c189-11e8-a6d2-b499baebfeaf Apache -- Denial of service vulnerability in HTTP/2
e190ca65-3636-11dc-a697-000c6ec775d9 mozilla -- multiple vulnerabilities
e195679d-045b-4953-bb33-be0073ba2ac6 libxml2 -- multiple vulnerabilities
e19e74a4-a712-11df-b234-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
e1aa3bdd-839a-4a77-8617-cca439a8f9fc rubygem-ruby_parser -- insecure tmp file usage
e1b5318c-aa4d-11e5-8f5c-002590263bf5 mantis -- information disclosure vulnerability
e1b77733-a982-442e-8796-a200571bfcf2 py-ansible -- multiple vulnerabilities
e1c71d8d-64d9-11e6-b38a-25a46b33f2ed gnupg -- attacker who obtains 4640 bits from the RNG can trivially predict the next 160 bits of output
e1cb9dc9-daa9-44db-adde-e94d900e2f7f cacti -- Cross Site Scripting issue
e1d3a580-cd8b-11ea-bad0-08002728f74c Wagtail -- XSS vulnerability
e1de77e8-c45e-48d7-8866-5a6f943046de SquirrelMail -- post-authentication remote code execution
e1f67063-aab4-11e6-b2d3-60a44ce6887b ImageMagick7 -- multiple vulnerabilities
e1f99d59-81aa-4662-bf62-c1076f5016c8 py-graphite-web -- Multiple vulnerabilities
e1ff4c5e-d687-11e6-9171-14dae9d210b8 End of Life Ports
e206df57-f97b-11e4-b799-c485083ca99c Adobe Flash Player -- critical vulnerabilities
e21474c6-031a-11e6-aa86-001999f8d30b PJSIP -- TCP denial of service in PJProject
e21c7c7a-0116-11e3-9e83-3c970e169bc2 samba -- denial of service vulnerability
e2476979-da74-11da-a67b-0013d4a4a40e firefox -- denial of service vulnerability
e24797af-803d-11dc-b787-003048705d5a firefox -- OnUnload Javascript browser entrapment vulnerability
e24fb8f8-c39a-11eb-9370-b42e99a1b9c3 isc-dhcp -- remotely exploitable vulnerability
e24fd421-8128-11ea-aa57-000ffec73f06 drupal -- Drupal Core - Moderately critical - Third-party library
e25566d5-6d3f-11d8-83a4-000a95bc6fae multiple buffer overflows in xboing
e261e71c-6250-11ee-8e38-002590c1f29c FreeBSD -- copy_file_range insufficient capability rights check
e264e74e-ffe0-11e7-8b91-e8e0b747a45a chromium -- multiple vulnerabilities
e2748c9d-3483-11eb-b87a-901b0ef719ab FreeBSD -- Multiple vulnerabilities in rtsold
e27a1af3-8d21-11e0-a45d-001e8c75030d Subversion -- multiple vulnerabilities
e27ca763-4721-11e0-bdc4-001e8c75030d subversion -- remote HTTP DoS vulnerability
e285a1f4-4568-11dd-ae96-0030843d3802 phpmyadmin -- Cross Site Scripting Vulnerabilities
e289f7fd-88ac-11d8-90d1-0020ed76ef5a many out-of-sequence TCP packets denial-of-service
e2a8e2bd-b808-11ed-b695-6c3be5272acd Grafana -- Stored XSS in geomap panel plugin via attribution
e2a92664-1d60-11db-88cf-000c6ec775d9 mozilla -- multiple vulnerabilities
e2af876f-a7c8-11ec-9a2a-002324b2fba8 go -- multiple vulnerabilities
e2b564fc-7462-11ea-af63-38d547003487 cacti -- multiple vulnerabilities
e2e7faf9-1b51-11ed-ae46-002b67dfc673 Tomcat -- XSS in examples web application
e2e8d374-2e40-11db-b683-0008743bf21a horde -- Phishing and Cross-Site Scripting Vulnerabilities
e2f981f1-ad9e-11ee-8b55-4ccc6adda413 QtNetwork -- potential buffer overflow
e2fb85ce-9a3c-11ee-af26-001b217b3468 Gitlab -- vulnerabilities
e2fca11b-4212-11e6-942d-bc5ff45d0f28 xen-tools -- Unsanitised guest input in libxl device handling code
e308c61a-2060-11e5-a4a5-002590263bf5 ansible -- multiple vulnerabilities
e309a2c7-598b-4fa6-a398-bc72fbd1d167 rubygem-doorkeeper -- token revocation vulnerability
e30e0c99-a1b7-11e4-b85c-00262d5ed8ee chromium -- multiple vulnerabilities
e319da0b-a228-11da-b410-000e0c2e438a gedit -- format string vulnerability
e31a8f8e-47bf-11ee-8e38-002590c1f29c FreeBSD -- ssh-add does not honor per-hop destination constraints
e31d44a2-21e3-11d9-9289-000c41e2cdad imwheel -- insecure handling of PID file
e3200958-dd6c-11e6-ae1b-002590263bf5 powerdns -- multiple vulnerabilities
e3244a7b-5603-11e3-878d-20cf30e32f6d subversion -- multiple vulnerabilities
e329550b-54f7-11db-a5ae-00508d6a62df php -- _ecalloc Integer Overflow Vulnerability
e333084c-9588-4eee-8bdc-323e02cb4fe0 zeek -- Various vulnerabilities
e33880ed-5802-11ec-8398-6c3be5272acd Grafana -- Path Traversal
e3445736-fd01-11e7-ac58-b499baebfeaf MySQL -- multiple vulnerabilities
e34d0c2e-9efb-11da-b410-000e0c2e438a rssh -- privilege escalation vulnerability
e358b470-b37d-4e47-bc8a-2cd9adbeb63c jenkins -- Denial of service vulnerability in bundled Jetty
e359051d-90bd-11e5-bd18-002590263bf5 a2ps -- format string vulnerability
e375ff3f-7fec-11e8-8088-28d244aee256 expat -- multiple vulnerabilities
e3792855-881f-11e5-ab94-002590263bf5 xen-kernel -- leak of per-domain profiling-related vcpu pointer array
e37a0a7b-e1a7-11ea-9538-0c9d925bbbc0 security/trousers -- several vulnerabilities
e387834a-17ef-11e6-9947-7054d2909b71 jenkins -- multiple vulnerabilities
e3894955-7227-11eb-8386-001999f8d30b asterisk -- Remote crash possible when negotiating T.38
e39caf05-2d6f-11df-aec2-000c29ba66d2 egroupware -- two vulnerabilities
e3aacd6d-3d01-434c-9330-bc9efd40350f webkit-gtk -- Multiple vulnerabilities
e3cf89f0-53da-11d9-92b7-ceadd4ac2edd phpbb -- arbitrary command execution and other vulnerabilities
e3e266e9-5473-11d9-a9e7-0001020eed82 xpdf -- buffer overflow vulnerability
e3e30d99-58a8-4a3f-8059-a8b7cd59b881 openfire -- Openfire No Password Changes Security Bypass
e3e68fe8-d9cb-4ba8-b09c-9e3a28588eb7 firefox -- Heap buffer overflow rasterizing paths in SVG with Skia
e3e788aa-e9fd-11e2-a96e-60a44c524f57 otrs -- Sql Injection + Xss Issue
e3ec8b30-757b-11ec-922f-654747404482 Prosody XMPP server advisory 2022-01-13
e3eeda2e-1d67-11e8-a2ec-6cc21735f730 PostgreSQL vulnerabilities
e3f0374a-7ad6-11e2-84cd-d43d7e0c7c02 mozilla -- multiple vulnerabilities
e3f64457-cccd-11e2-af76-206a8a720317 krb5 -- UDP ping-pong vulnerability in the kpasswd (password changing) service. [CVE-2002-2443]
e3ff776b-2ba6-11e1-93c6-0011856a6e37 mozilla -- multiple vulnerabilities
e4133d8b-ab33-451a-bc68-3719de73d54a routinator -- potential DOS attack
e4181981-ccf1-11ed-956f-7054d21a9e2a py39-sqlalchemy10 -- multiple SQL Injection vulnerabilities
e418b8f0-9abb-420b-a7f1-1d8231b352e2 webkit2-gtk3 -- Denial of service
e426eda9-dae1-11e4-8107-94de806b0af9 Dulwich -- Remote code execution
e43b210a-4212-11e6-942d-bc5ff45d0f28 xen-kernel -- x86 software guest page walk PS bit handling flaw
e4403051-a667-11eb-b9c9-6cc21735f730 sbibboleth-sp -- denial of service vulnerability
e44e5ace-6820-11ee-b06f-0050569ceb3a GLPI vulnerable to SQL injection via inventory agent request
e44fe906-df27-11e0-a333-001cc0a36e12 phpMyAdmin -- multiple XSS vulnerabilities
e454ca2f-f88d-11e0-b566-00163e01a509 PivotX -- Remote File Inclusion Vulnerability of TimThumb
e457978b-5484-11e8-9b85-54ee754af08e chromium -- multiple vulnerabilities
e45c3669-caf2-11e9-851a-dcf3aaa3f3ff webkit2-gtk3 -- Multiple vulnerabilities
e4644df8-e7da-11e5-829d-c80aa9043978 openssh -- command injection when X11Forwarding is enabled
e464f777-719e-11ef-8a0f-a8a1599412c6 chromium -- multiple security fixes
e465159c-4817-11e1-89b4-001ec9578670 mpack -- Information disclosure
e47ab5db-c333-11e6-ae1b-002590263bf5 atheme-services -- multiple vulnerabilities
e480ccb2-6bc8-11d9-8dbe-000a95bc6fae fcron -- multiple vulnerabilities
e4833927-86e5-11e0-a6b4-000a5e1e33c6 Erlang -- ssh library uses a weak random number generator
e48355d7-1548-11e7-8611-0090f5f2f347 id Tech 3 -- remote code execution vulnerability
e4848ca4-8820-11e5-ab94-002590263bf5 xen-kernel -- some pmu and profiling hypercalls log without rate limiting
e4bc323f-cc73-11e6-b704-000c292e4fd8 samba -- multiple vulnerabilities
e4bc70fc-5a2f-11e6-a1bc-589cfc0654e1 Vulnerabilities in Curl
e4c62abd-5065-11db-a5ae-00508d6a62df tikiwiki -- multiple vulnerabilities
e4cd0b38-c9f9-11eb-87e1-08002750c711 cacti -- SQL Injection was possible due to incorrect validation order
e4d93d07-297a-11ed-95f8-901b0e9408dc Matrix clients -- several vulnerabilities
e4d9dffb-2a32-11ea-9693-e1b3f6feec79 OpenEXR -- heap buffer overflow, and out-of-memory bugs
e4dac715-c818-11df-a92c-0015587e2cc1 squid -- Denial of service vulnerability in request handling
e4dd787e-0ea9-11e8-95f2-005056925db4 libtorrent -- remote DoS
e4fcf020-0447-11e0-becc-0022156e8794 exim -- local privilege escalation
e500b9bf-ca3e-11df-aade-0050568f000c FreeBSD -- BIND named(8) cache poisoning with DNSSEC validation
e5090d2a-dbbe-11df-82f8-0015f2db7bde Webkit-gtk2 -- Multiple Vulnabilities
e50a7476-bb2d-11da-b2fb-000e0c2e438a ipsec -- reply attack vulnerability
e50b04e8-9c55-11d8-9366-0020ed76ef5a xine-lib arbitrary file overwrite
e5186c65-d729-11e6-a9a5-b499baebfeaf mysql -- multiple vulnerabilities
e51d5b1a-4638-11e1-9f47-00e0815b8da8 FreeBSD -- pam_ssh() does not validate service names
e53a908d-a645-11e8-8acd-10c37b4ac2ea gogs -- open redirect vulnerability
e5423caf-8fb8-11e5-918c-bcaec565249c libxml2 -- multiple vulnerabilities
e543c6f8-abf2-11e4-8ac7-d050992ecde8 unzip -- out of boundary access issues in test_compr_eb
e546c7ce-ce46-11db-bc24-0016179b2dd5 trac -- cross site scripting vulnerability
e550fc62-069a-11e7-8e3e-5453ed2e2b49 kdepimlibs -- directory traversal on KTNEF
e55f948f-d729-11e0-abd1-0017f22d6707 security/cfs -- buffer overflow
e56f2f7c-410e-11e9-b95c-b499baebfeaf OpenSSL -- ChaCha20-Poly1305 nonce vulnerability
e589ae90-4212-11e6-942d-bc5ff45d0f28 xen-tools -- Unsanitised driver domain input in libxl device handling
e595e170-6771-11dc-8be8-02e0185f8d72 openoffice -- arbitrary command execution vulnerability
e59cb761-5ad8-11ea-abb7-001b217b3468 Solr -- multiple vulnerabilities
e59fed96-60da-11ee-9102-000c29de725b mediawiki -- multiple vulnerabilities
e5a9de5f-c6bc-11dc-b9f1-00a0cce0781e IRC Services-- Denial of Service Vulnerability
e5afdf63-1746-11da-978e-0001020eed82 evolution -- remote format string vulnerabilities
e5d117b3-2153-4129-81ed-42b0221afa78 py39-OWSLib -- arbitrary file read vulnerability
e5d2442d-5e76-11e6-a6c3-14dae9d210b8 FreeBSD -- Incorrect privilege validation in the NFS server
e5d29309-e0db-11dc-97b2-001c2514716c openldap -- modrdn Denial of Service vulnerability
e5dcb942-ba6f-11e6-b1cf-14dae9d210b8 py-cryptography -- vulnerable HKDF key generation
e5e2883d-ceb9-11d8-8898-000d6111a684 MySQL authentication bypass / buffer overflow
e5ec2767-d529-11e6-ae1b-002590263bf5 tomcat -- information disclosure vulnerability
e60169c4-aa86-46b0-8ae2-0d81f683df09 mozilla -- multiple vulnerabilities
e60d9e65-3f6b-11e4-ad16-001999f8d30b asterisk -- Remotely triggered crash
e61af8f4-455d-4f99-8d81-fbb004929dab electron31 -- multiple vulnerabilities
e6281d88-a7a7-11ed-8d6a-6c3be5272acd Grafana -- Spoofing originalUrl of snapshots
e6296105-449b-11db-ba89-000c6ec775d9 mozilla -- multiple vulnerabilities
e65ad1bf-0d8b-11da-90d0-00304823c0d3 pear-XML_RPC -- remote PHP code injection vulnerability
e666498a-852a-11e0-8f78-080027ef73ec Opera -- code injection vulnerability through broken frameset handling
e66a5440-7258-11e9-b0e1-6cc21735f730 PostgreSQL -- Memory disclosure in partition routing
e66a6e2f-b0d5-11e2-9164-0016e6dcb562 FreeBSD -- NFS remote denial of service
e6839625-fdfa-11e2-9430-20cf30e32f6d typo3 -- Multiple vulnerabilities in TYPO3 Core
e68d3db1-fd04-11ea-a67f-e09467587c17 chromium -- multiple vulnerabilities
e69af246-0ae2-11e5-90e4-d050996490d0 pcre -- multiple vulnerabilities
e69ba632-326f-11d9-b5b7-000854d03344 ez-ipupdate -- format string vulnerability
e6a7636a-02d0-11e4-88b6-080027671656 dbus -- multiple vulnerabilities
e6b974ab-9d35-11e5-8f5c-002590263bf5 Salt -- information disclosure
e6b994e2-2891-11ed-9be7-454b1dd82c64 Gitlab -- multiple vulnerabilities
e6ccaf8a-6c63-11e7-9b01-2047478f2f70 strongswan -- multiple vulnerabilities
e6ce6f50-4212-11e6-942d-bc5ff45d0f28 xen-tools -- QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks
e6f0edd8-0b40-11d9-8a8a-000c41e2cdad gnu-radius -- SNMP-related denial-of-service
e7002b26-caaa-11e6-a76a-9f7324e5534e exim -- DKIM private key leak
e7028e1d-3f9b-11e6-81f9-6805ca0b3d42 phpMyAdmin -- multiple vulnerabilities
e714b7d2-39f6-4992-9f48-e6b2f5f949df GraphicsMagick -- SVG/Rendering vulnerability
e71fd9d3-af47-11e7-a633-009c02a2ab30 nss -- Use-after-free in TLS 1.2 generating handshake hashes
e722e3c6-bbee-11e6-b1cf-14dae9d210b8 FreeBSD -- bhyve(8) virtual machine escape
e72a8864-e0bc-11e7-b627-d43d7e971a1b GitLab -- multiple vulnerabilities
e72d5bf5-07a0-11e8-8248-0021ccb9e74d w3m - multiple vulnerabilities
e72fd82b-fa01-11d9-bc08-0001020eed82 dnrd -- remote buffer and stack overflow vulnerabilities
e7392840-c520-11e9-a4ef-0800274e5f20 gitea -- multiple vulnerabilities
e73c688b-f7e6-11ea-88f8-901b0ef719ab FreeBSD -- bhyve SVM guest escape
e74da31b-276a-4a22-9772-17dd42b97559 electron{27,28} -- vulnerability in libxml2
e75a96df-73ca-11e5-9b45-b499baebfeaf LibreSSL -- Memory leak and buffer overflow
e77befb5-f3f9-11e0-8b5c-b482fe3f522d OpenTTD -- Denial of service via improperly validated commands
e78261e4-803d-11e6-a590-14dae9d210b8 irssi -- heap corruption and missing boundary checks
e7841611-b808-11ed-b695-6c3be5272acd Grafana -- Stored XSS in TraceView panel
e78732b2-8528-11e8-9c42-6451062f0f7a Flash Player -- multiple vulnerabilities
e78bfc9d-cb1e-11e5-b251-0050562a4d7b py-rsa -- Bleichenbacher'06 signature forgery vulnerability
e79876e4-5061-11db-a5ae-00508d6a62df punbb -- NULL byte injection vulnerability
e79cc4e2-12d7-11ef-83d8-4ccc6adda413 qt6-base (core module) -- Invalid pointer in QStringConverter
e7b69694-b3b5-11e9-9bb6-0800274e5f20 gitea -- multiple vulnerabilities
e7b7f2b5-177a-11e5-ad33-f8d111029e6a chicken -- buffer overrun in substring-index[-ci]
e7bb3885-da40-11e3-9ecb-2c4138874f7d libxml2 -- lack of end-of-document check DoS
e7bc2b99-485a-11ea-bff9-9c5c8e75236a clamav -- Denial-of-Service (DoS) vulnerability
e7bc5600-eaa0-11de-bd9c-00215c6a37bb postgresql -- multiple vulnerabilities
e7d91a3c-a7c9-11df-870c-00242b513d7c vlc -- invalid id3v2 tags may lead to invalid memory dereferencing
e7dcd69d-8ee6-11e6-a590-14dae9d210b8 FreeBSD -- Multiple portsnap vulnerabilities
e7fd27b2-3ae9-11e1-8b5c-00262d5ed8ee torcs -- untrusted local library loading
e80073d7-f8ba-11eb-b141-589cfc007716 xtrlock -- xtrlock does not block multitouch events
e800cd4b-4212-11e6-942d-bc5ff45d0f28 xen-tools -- Unrestricted qemu logging
e811aaf1-f015-11d8-876f-00902714cc7c Ruby insecure file permissions in the CGI session management
e831dd5a-7d8e-4818-aa1f-17dd495584ec py-httpx -- input validation vulnerability
e837390d-0ceb-46b8-9b32-29c1195f5dc7 solr -- Code execution via entity expansion
e839ca04-b40d-11e5-9728-002590263bf5 xen-kernel -- information leak in legacy x86 FPU/XMM initialization
e8483115-8b8e-11ea-bdcf-001b217b3468 Gitlab -- Multiple Vulnerabilities
e848a92f-0e7d-11de-92de-000bcdc1757a epiphany -- untrusted search path vulnerability
e852f43c-846e-11ec-b043-3065ec8fd3ec chromium -- multiple vulnerabilities
e86b8e4d-d551-11ed-8d1e-005056a311d1 samba -- multiple vulnerabilities
e86fbb5f-0d04-11da-bc08-0001020eed82 awstats -- arbitrary code execution vulnerability
e879ca68-e01b-11d9-a8bd-000cf18bbe54 squirrelmail -- Several cross site scripting vulnerabilities
e87a9326-dd35-49fc-b20b-f57cbebaae87 py-nicotine-plus -- Denial of service vulnerability
e87c2647-a188-11eb-8806-1c1b0d9ea7e6 All versions of Apache OpenOffice through 4.1.9 can open non-http(s) hyperlinks. If the link is specifically crafted this could lead to untrusted code execution.
e8a6a16d-e498-11dc-bb89-000bcdc1757a libxine -- buffer overflow vulnerability
e8b20517-dbb6-11ed-bf28-589cfc0f81b0 mod_gnutls -- Infinite Loop on request read timeout
e8b6605b-d29f-11e5-8458-6cc21735f730 PostgreSQL -- Security Fixes for Regular Expressions, PL/Java.
e8bcac84-2d5c-11e9-9a74-e0d55e2a8bf9 kf5-kauth -- Insecure handling of arguments in helpers
e8d4800f-1547-11d9-90a3-00010327614a distcc -- incorrect parsing of IP access control rules
e917caba-e291-11e9-89f1-152fed202bb7 Exim -- heap-based buffer overflow in string_vformat leading to RCE
e91cf90c-d6dd-11e7-9d10-001999f8d30b asterisk -- DOS Vulnerability in Asterisk chan_skinny
e9200f8e-fd34-11eb-afb1-c85b76ce9b5a lynx -- SSL certificate validation error
e92d8f6b-a1c0-11db-9ddc-0011098b2f36 sircd -- remote operator privilege escalation vulnerability
e936d612-253f-11da-bc01-000e0c2e438a apache -- Certificate Revocation List (CRL) off-by-one vulnerability
e93bc5b0-bb2e-11da-b2fb-000e0c2e438a OPIE -- arbitrary password change
e94cb43d-0c4a-11db-9016-0050bf27ba24 horde -- various problems in dereferrer
e969e6cb-8911-11db-9d01-0016179b2dd5 tnftpd -- Remote root Exploit
e97a8852-32dd-4291-ba4d-92711daff056 py-bleach -- unsanitized character entities
e991ef79-e920-11e5-92ce-002590263bf5 php5 -- multiple vulnerabilities
e9aa0e4c-ea8b-11e8-a5b7-00e04c1ea73d powerdns-recursor -- Multiple vulnerabilities
e9ccdb28-9802-11e4-9d9c-bcaec565249c WebKit-gtk -- Multiple vulnerabilities
e9d1e040-42c9-11e6-9608-20cf30e32f6d apache24 -- X509 Client certificate based authentication can be bypassed when HTTP/2 is used
e9d2e981-a46d-11e9-bed9-001999f8d30b asterisk -- Remote Crash Vulnerability in chan_sip channel driver
e9ecaceb-db0d-11dd-aa56-000bcdf0a03b FreeBSD -- Cross-site request forgery in ftpd(8)
e9f9d232-0cb2-11d9-8a8a-000c41e2cdad mozilla -- security icon spoofing
e9fca207-e399-11de-881e-001aa0166822 expat2 -- buffer over-read and crash
ea05c456-a4fd-11ec-90de-1c697aa5a594 OpenSSL -- Infinite loop in BN_mod_sqrt parsing certificates
ea09c5df-4362-11db-81e1-000e0c2e438a php -- multiple vulnerabilities
ea0f45e2-6c4b-11e2-98d9-003067c2616f opera -- execution of arbitrary code
ea1d2530-72ce-11e5-a2a1-002590263bf5 magento -- multiple vulnerabilities
ea2411a4-08e8-11de-b88a-0022157515b2 pngcrush -- libpng Uninitialised Pointer Arrays Vulnerability
ea2ddc49-3e8e-11e1-8095-5404a67eef98 ffmpeg -- multiple vulnerabilities
ea4a2dfc-f761-11ee-af2c-589cfc0f81b0 wordpress -- XSS
ea893f06-5a92-11e5-98c0-20cf30e32f6d Bugzilla security issues
ea9d1fd2-5d24-11ee-8507-b42e991fc52e routinator -- Possible path traversal when storing RRDP responses
eab68cff-bc0c-11e6-b2ca-001b3856973b cryptopp -- multiple vulnerabilities
eab8c3bd-e50c-11de-9cd0-001a926c7637 ruby -- heap overflow vulnerability
eab964f8-d632-11ea-9172-4c72b94353b5 typo3 -- multiple vulnerabilities
eae8e3cf-9dfe-11e2-ac7f-001fd056c417 otrs -- Information disclosure and Data manipulation
eaf3b255-5245-11e5-9ad8-14dae9d210b8 bind -- denial of service vulnerability
eafa3aec-211b-4dd4-9b8a-a664a3f0917a w3m -- multiple vulnerabilities
eb03d642-6724-472d-b038-f2bf074e1fc8 tcpdump -- multiple vulnerabilities
eb12ebee-b7af-11e1-b5e0-000c299b62e1 clamav -- multiple vulnerabilities
eb2845c4-43ce-11eb-aba5-00a09858faf5 postsrsd -- Denial of service vulnerability
eb29a575-3381-11da-8340-000e0c2e438a qpopper -- multiple privilege escalation vulnerabilities
eb426e82-ab68-11e3-9d09-000c2980a9f3 mutt -- denial of service, potential remote code execution
eb437e17-66a1-11ef-ac08-75165d18d8d2 forgejo -- The scope of application tokens was not verified when writing containers or Conan packages.
eb5124a4-8a20-11db-b033-00123ffe8333 clamav -- Multipart Nestings Denial of Service
eb5c615d-a173-11ef-9a62-002590c1f29c FreeBSD -- Multiple issues in the bhyve hypervisor
eb69bcf2-18ef-4aa2-bb0c-83b263364089 ruby -- multiple vulnerabilities
eb888ce5-1f19-11e9-be05-4c72b94353b5 Apache -- vulnerability
eb8a8978-8dd5-49ce-87f4-49667b2166dd rubygem-rails -- multiple vulnerabilities
eb9212f7-526b-11de-bbf2-001b77d09812 apr -- multiple vulnerabilities
eb9a3c57-ff9e-11ed-a0d1-84a93843eb75 OpenSSL -- Possible DoS translating ASN.1 identifiers
eba70db4-6640-11e1-98af-00262d8b701d dropbear -- arbitrary code execution
eba9aa94-549c-11e1-b6b7-0011856a6e37 mozilla -- use-after-free in nsXBLDocumentInfo::ReadPrototypeBindings
ebd84c96-dd7e-11e4-854e-3c970e169bc2 ntp -- multiple vulnerabilities
ebd877b9-7ef4-4375-b1fd-c67780581898 ruby -- Hostname check bypassing vulnerability in SSL client
ebdf65c7-2ca6-11d8-9355-0020ed76ef5a qpopper format string vulnerability
ebeed063-b328-11de-b6a5-0030843d3802 virtualbox -- privilege escalation
ebffe27a-f48c-11d8-9837-000c41e2cdad qt -- image loader vulnerabilities
ec04f3d0-8cd9-11eb-bb9f-206a8a720317 spamassassin -- Malicious rule configuration (.cf) files can be configured to run system commands
ec09baa3-a9f5-11d9-a788-0001020eed82 gaim -- remote DoS on receiving certain messages over IRC
ec1df2a1-8ee6-11e7-8be8-001999f8d30b asterisk -- Remote Crash Vulerability in res_pjsip
ec255bd8-02c6-11e2-92d1-000d601460a4 php5-sqlite -- open_basedir bypass
ec2d1cfd-7ac5-11e5-b35a-002590263bf5 Joomla! -- Core - CSRF Protection vulnerabilities
ec2f2ff5-f710-11da-9156-000e0c2e438a freeradius -- multiple vulnerabilities
ec34d0c2-1799-11e2-b4ab-000c29033c32 Zend Framework -- Multiple vulnerabilities via XXE injection
ec41c3e2-129c-11dd-bab7-0016179b2dd5 python -- Integer Signedness Error in zlib Module
ec49f6b5-ee39-11e8-b2f4-74d435b63d51 php-imap -- imap_open allows to run arbitrary shell commands via mailbox parameter
ec5072b0-d43a-11e8-a6d2-b499baebfeaf MySQL -- multiple vulnerabilities
ec63bc8e-f092-11ed-85ca-001517a2e1a4 piwigo -- SQL injection
ec6a2a1e-429d-11e5-9daa-14dae9d210b8 gnutls -- double free in certificate DN decoding
ec6aeb8e-41e4-11e7-aa00-5404a68ad561 vlc -- remote code execution via crafted subtitles
ec89dc70-2515-11e2-8eda-000a5e1e33c6 webmin -- potential XSS attack via real name field
ec8e4040-afcd-11ee-86bb-a8a1599412c6 chromium -- security fix
ec8f449f-40ed-11df-9edc-000f20797ede firefox -- Re-use of freed object due to scope confusion
ec994672-5284-49a5-a7fc-93c02126e5fb electron29 -- multiple vulnerabilities
eca2d861-76f4-42ed-89d2-23a2cb396c87 poppler -- multiple denial of service issues
eca6195a-c233-11d9-804c-02061b08fc24 mozilla -- code execution via javascript: IconURL vulnerability
ecad44b9-e663-11dd-afcd-00e0815b8da8 git -- gitweb privilege escalation
ecafc4af-fe8a-11ee-890c-08002784c58d clamav -- Possible crash in the HTML file parser that could cause a denial-of-service (DoS) condition
ecb7fdec-0b82-11ea-874d-0c9d925bbbc0 drm graphics drivers -- Local privilege escalation and denial of service
ecc268f2-8fc2-11e5-918c-bcaec565249c libxslt -- DoS vulnerability due to type confusing error
ece65d3b-c20c-11e9-8af4-bcaec55be5e5 webmin -- unauthenticated remote code execution
ecea9e92-0be5-4931-88da-8772d044972a mcollective -- cert valication issue
ecedde1c-5128-11dd-a4e1-0030843d3802 drupal -- multiple vulnerabilities
ecf68408-a9f5-11d9-a788-0001020eed82 gaim -- jabber remote crash
ecf9a798-9aa9-11ef-a8f0-a8a15998b5cb libqb -- Buffer overflow
ecffb881-a7a7-11ed-8d6a-6c3be5272acd Grafana -- Stored XSS in ResourcePicker component
ed0ecad5-531d-11e5-9850-bcaec565249c gdk-pixbuf2 -- integer overflows
ed10ed3f-fddc-11e8-94cf-6805ca0b3d42 phpMyAdmin -- multiple vulnerabilities
ed124f8c-82a2-11db-b46b-0012f06707f0 libmusicbrainz -- multiple buffer overflow vulnerabilities
ed18aa92-e4f4-11e9-b6fa-3085a9a95629 cacti -- Authenticated users may bypass authorization checks
ed1d404d-2784-11d9-b954-000bdb1444a4 horde -- cross-site scripting vulnerability in help window
ed3bf433-5d92-11e7-aa14-e8e0b747a45a libgcrypt -- side-channel attack on RSA secret keys
ed529baa-21c6-11db-b625-02e081235dab gnupg -- 2 more possible memory allocation attacks
ed536336-1c57-11e1-86f4-e0cb4e266481 phpMyAdmin -- Multiple XSS
ed688880-00c4-11ef-92b7-589cfc023192 GLPI -- multiple vulnerabilities
ed73829d-af6d-11e7-a633-009c02a2ab30 FFmpeg -- multiple vulnerabilities
ed7fa1b4-ff59-11df-9759-080027284eaa proftpd -- Compromised source packages backdoor
ed8a4215-675c-11ec-8dd4-a0f3c100ae18 Pillow -- Regular Expression Denial of Service (ReDoS)
ed8cbad5-21a8-11ea-9b6d-901b0e934d69 py-matrix-synapse -- multiple vulnerabilities
ed8d5535-ca78-11e9-980b-999ff59c22ea RDoc -- multiple jQuery vulnerabilities
eda151d8-4638-11e1-9f47-00e0815b8da8 FreeBSD -- pam_ssh improperly grants access when user account has unencrypted SSH private keys
edabe438-542f-11db-a5ae-00508d6a62df php -- open_basedir Race Condition Vulnerability
edc0bf7e-05a1-11ea-9dfa-f8b156ac3ff9 FreeBSD -- Machine Check Exception on Page Size Change
edd201a5-8fc3-11e2-b131-000c299b62e1 piwigo -- CSRF/Path Traversal
ede832bf-6576-11ec-a636-000c29061ce6 OpenDMARC - Remote denial of service
edef3f2f-82cf-11df-bcce-0018f3e2eb82 png -- libpng decompression buffer overflow
edf064fb-b30b-11e9-a87f-a4badb2f4699 FreeBSD -- Bhyve out-of-bounds read in XHCI device
edf47177-fe3f-11e0-a207-0014a5e3cda6 phpLDAPadmin -- Remote PHP code injection vulnerability
edf61c61-0f07-11d9-8393-000103ccf9d6 php -- strip_tags cross-site scripting vulnerability
ee23aa09-a175-11de-96c0-0011098ad87f horde-base -- multiple vulnerabilities
ee261034-b95e-4479-b947-08b0877e029f php72 -- use of freed hash key
ee26f513-826e-11ec-8be6-d4c9ef517024 Rust -- Race condition enabling symlink following
ee50726e-0319-11e6-aa86-001999f8d30b asterisk -- Long Contact URIs in REGISTER requests can crash Asterisk
ee6936da-0ddd-11ef-9c21-901b0e9408dc tailscale -- Insufficient inbound packet filtering in subnet routers and exit nodes
ee6b5956-6a89-11da-b96e-000fb586ba73 nag -- Cross site scripting vulnerabilities in several of the tasklist name and task data fields
ee6fa2bd-406a-11dd-936a-0015af872849 php -- input validation error in safe_mode
ee7b4f9d-66c8-11e4-9ae1-e8e0b722a85e wget -- path traversal vulnerability in recursive FTP mode
ee7bdf7f-11bb-4eea-b054-c692ab848c20 OpenSMTPD -- multiple vulnerabilities
ee890be3-a1ec-11ed-a81d-001b217b3468 Gitlab -- Multiple Vulnerabilities
ee99899d-4347-11e5-93ad-002590263bf5 qemu, xen-tools -- use-after-free in QEMU/Xen block unplug protocol
eeae6cce-d05c-11d9-9aed-000e0c2e438a mysql-server -- insecure temporary file creation
eeb1c128-33e7-11d9-a9e7-0001020eed82 ImageMagick -- EXIF parser buffer overflow
eeca52dc-866c-11eb-b8d6-d4c9ef517024 LibreSSL -- use-after-free
eeebd55d-6a88-11da-b96e-000fb586ba73 turba -- Cross site scripting vulnerabilities in several of the address book name and contact data fields
eeec4e6f-fa71-11ea-9bb7-d4c9ef517024 Nextcloud -- Password share by mail not hashed
eef0d2d9-78c0-441e-8b03-454c5baebe20 jenkins -- multiple vulnerabilities
eef56761-11eb-11e1-bb94-001c140104d4 hiawatha -- memory leak in PreventSQLi routine
ef0033ad-5823-11e6-80cc-001517f335e2 lighttpd - multiple vulnerabilities
ef013039-89cd-11e8-84e9-00e04c1ea73d typo3 -- multiple vulnerabilities
ef253f8b-0727-11d9-b45d-000c41e2cdad xpm -- image decoding vulnerabilities
ef2ffb03-f2b0-11db-ad25-0010b5a0a860 mod_perl -- remote DoS in PATH_INFO parsing
ef3306fc-8f9b-11db-ab33-000e0c2e438a bind9 -- Denial of Service in named(8)
ef3423e4-d056-11e7-a52c-002590263bf5 codeigniter -- input validation bypass
ef410571-a541-11d9-a788-0001020eed82 wu-ftpd -- remote globbing DoS vulnerability
ef417da3-1640-11e2-999b-e0cb4e266481 phpMyAdmin -- Multiple XSS due to unescaped HTML output in Trigger, Procedure and Event pages and Fetching the version information from a non-SSL site is vulnerable to a MITM attack
ef434839-a6a4-11e5-8275-000c292e4fd8 samba -- multiple vulnerabilities
ef5b4f5f-a658-11ea-80d7-001cc0382b2f GnuTLS -- flaw in TLS session ticket key construction
ef70b201-645d-11e6-9cdc-6805ca0b3d42 phpmyadmin -- multiple vulnerabilities
ef9d041e-27e2-11e5-a4a5-002590263bf5 xen-kernel -- Information leak through version information hypercall
efa1344b-5477-11d9-a9e7-0001020eed82 ethereal -- multiple vulnerabilities
efa663eb-8754-11e3-9a47-00163e1ed244 strongswan -- multiple DoS vulnerabilities
efaa4071-b700-11e2-b1b9-f0def16c5c1b nginx -- multiple vulnerabilities
efb965be-a2c0-11eb-8956-1951a8617e30 openvpn -- deferred authentication can be bypassed in specific circumstances
efc4819b-0b2d-11d9-bfe1-000bdb1444a4 imp3 -- XSS hole in the HTML viewer
efd03116-c2a9-11ea-82bc-b42e99a1b9c3 webkit2-gtk3 -- multible vulnerabilities
efd4537e-a5e8-11ef-bedb-180373b66b37 Vaultwarden -- Multiple vulnerabilities
efdd0edc-da3d-11e3-9ecb-2c4138874f7d libxml2 -- entity substitution DoS
efe43d2b-8f35-11e8-b9e8-dcfe074bd614 Memory leak in different components
f00acdec-b59f-11e8-805d-001e2a3f778d X11 Session -- SDDM allows unauthorised unlocking
f00b65d8-7ccb-11eb-b3be-e09467587c17 chromium -- multiple vulnerabilities
f00d1873-b138-11ea-8659-901b0ef719ab BIND -- Remote Denial of Service vulnerability
f01292a0-db3c-11e1-a84b-00e0814cab4e django -- multiple vulnerabilities
f0250129-fdb8-41ed-aa9e-661ff5026845 vscode -- VS Code Information Disclosure Vulnerability
f0416fb5-3130-11e9-a5ba-e0d55e883e26 msmtp -- certificate-verification issue
f04cc5cb-2d0b-11d8-beaf-000a95c4d922 bind8 negative cache poison attack
f04f840d-0840-11ea-8d66-75d3253ef913 libidn2 -- roundtrip check vulnerability
f05dbd1f-2599-11ec-91be-001b217b3468 Bacula-Web -- Multiple Vulnerabilities
f0683976-5779-11ea-8a77-1c872ccb1e42 OpenSMTPd -- LPE and RCE in OpenSMTPD's default install
f06f20dc-4347-11e5-93ad-002590263bf5 qemu, xen-tools -- QEMU leak of uninitialized heap memory in rtl8139 device model
f0798a6a-bbdb-11ed-ba99-080027f5fec9 rack -- possible DoS vulnerability in multipart MIME parsing
f07c8f87-8e65-11ef-81b8-659bf0027d16 forgejo -- multiple vulnerabilities
f0806cad-c7f1-11e6-ae1b-002590263bf5 Joomla! -- multiple vulnerabilities
f08e2c15-ffc9-11e0-b0f3-bcaec565249c cacti -- Multiple vulnerabilities
f0b9049f-88c4-11e5-aed7-00262d5ed8ee chromium -- multiple vulnerabilities
f0ba7008-2bbd-11ef-b4ca-814a3d504243 forgejo -- multiple issues
f0db930b-496b-11d9-bf86-0050569f0001 squid -- possible information disclosure
f0e45968-faff-11ec-856e-d4c9ef517024 OpenSSL -- Heap memory corruption with RSA private key operation
f0f97b94-3f95-11de-a3fd-0030843d3802 ghostscript -- buffer overflow vulnerability
f0fa19dd-c060-11dc-982e-001372fd0af2 drupal -- cross site scripting (register_globals)
f1075415-f5e9-11e6-a4e2-5404a68ad561 wavpack -- multiple invalid memory reads
f109b02f-f5a4-11e3-82e9-00a098b18457 asterisk -- multiple vulnerabilities
f113bbeb-e3ac-11dc-bb89-000bcdc1757a moinmoin -- multiple vulnerabilities
f115f693-36b2-11e2-a633-902b343deec9 FreeBSD -- Insufficient message length validation for EAP-TLS messages
f11b219a-44b6-11d9-ae2f-021106004fd6 rssh & scponly -- arbitrary command execution
f11d3b22-88c6-11da-a7b2-0060084a00e5 fetchmail -- crash when bouncing a message
f12368a8-1e05-11ed-a1ef-3065ec8fd3ec chromium -- multiple vulnerabilities
f1331504-8849-11df-89b8-00151735203a bugzilla -- information disclosure
f140cff0-771a-11ef-9a62-002590c1f29c FreeBSD -- pf incorrectly matches different ICMPv6 states in the state table
f14ad681-5b88-11dc-812d-0011098b2f36 rkhunter -- insecure temporary file creation
f14ce57f-6dc8-11e8-a671-001999f8d30b asterisk -- Infinite loop when reading iostreams
f154a3c7-f7f4-11df-b617-00e0815b8da8 isc-dhcp-server -- Empty link-address denial of service
f161a5ad-c9bd-11ee-b7a7-353f1e043d9a openexr -- Heap Overflow in Scanline Deep Data Parsing
f1692469-45ce-11e5-adde-14dae9d210b8 jasper -- multiple vulnerabilities
f1892066-0e74-11de-92de-000bcdc1757a apache -- Cross-site scripting vulnerability
f1a00122-3797-11ef-b611-84a93843eb75 OpenSSH -- Race condition resulting in potential remote code execution
f1bf28c5-d447-11e5-b2bd-002590263bf5 xdelta3 -- buffer overflow vulnerability
f1c219ba-3f14-11e6-b3c8-14dae9d210b8 haproxy -- denial of service
f1c4d133-e6d3-11db-99ea-0060084a00e5 fetchmail -- insecure APOP authentication
f1deed23-27ec-11e5-a4a5-002590263bf5 xen-tools -- xl command line config handling stack overflow
f1e0164e-b67b-11dd-a55e-00163e000016 libxml2 -- multiple vulnerabilities
f1f163ce-9e09-11da-b410-000e0c2e438a phpicalendar -- file disclosure vulnerability
f1f637d1-39eb-11ed-ab44-080027f5fec9 redis -- Potential remote code execution vulnerability
f1f6f6da-9d2f-11dc-9114-001c2514716c firefox -- multiple remote unspecified memory corruption vulnerabilities
f2043ff6-2916-11ed-a1ef-3065ec8fd3ec chromium -- multiple vulnerabilities
f20eb9a4-dfea-11ea-a9b8-9c5c8e84d621 ceph14 -- HTTP header injection via CORS ExposeHeader tag
f2144530-936f-11e9-8fc4-5404a68ad561 vlc -- Buffer overflow vulnerability
f22144d7-bad1-11ec-9cfe-0800270512f4 Ruby -- Double free in Regexp compilation
f2217cdf-01e4-11e6-b1ce-002590263bf5 go -- remote denial of service
f235fe7a-b9ca-11db-bf0f-0013720b182d samba -- potential Denial of Service bug in smbd
f241641e-f5ea-11d9-a6db-000d608ed240 drupal -- PHP code execution vulnerabilities
f2596f27-db4c-11eb-8bc6-c556d71493c9 openexr v3.0.5 -- fixes miscellaneous security issues
f25a34b1-910d-11ee-a1a2-641c67a117d8 varnish -- HTTP/2 Rapid Reset Attack
f28476f7-b166-11ea-8775-507b9d01076a Several issues in Lynis
f29fea8f-b19f-11dd-a55e-00163e000016 mozilla -- multiple vulnerabilities
f2b1da2e-6178-11ef-8a7d-b42e991fc52e md4c -- DoS attack
f2b43905-3545-11e0-8e81-0022190034c0 openoffice.org -- Multiple vulnerabilities
f2d4f879-0d7c-11e6-925f-6805ca0b3d42 logstash -- password disclosure vulnerability
f2d5e56e-67eb-11d9-a9e7-0001020eed82 unrtf -- buffer overflow vulnerability
f2d6a5e1-26b9-11d9-9289-000c41e2cdad gaim -- MSN denial-of-service vulnerabilities
f2d8342f-1134-11ef-8791-6805ca2fa271 dnsdist -- Transfer requests received over DoH can lead to a denial of service
f3017ce1-32a4-11d9-a9e7-0001020eed82 socat -- format string vulnerability
f3148a05-0fa7-11e0-becc-0022156e8794 php -- corruption of $GLOBALS and $this variables via extract() method
f32b1fbd-264d-11ee-a468-80fa5b29d485 virtualbox-ose -- multiple vulnerabilities
f353525a-d8b8-11e6-a071-001e67f15f5a lshell -- Multiple security issues
f358de71-bf64-11dc-928b-0016179b2dd5 maradns -- CNAME record resource rotation denial of service
f36bbd66-aa44-11e5-8f5c-002590263bf5 mediawiki -- multiple vulnerabilities
f3778328-d288-4b39-86a4-65877331eaf7 Adobe Flash Player -- critical vulnerabilities
f38187e7-2f6e-11e8-8f07-b499baebfeaf apache -- multiple vulnerabilities
f38c87a5-4a3e-11da-8ba2-0004614cc33d base -- PHP SQL injection vulnerability
f38d25ac-2b7a-11ed-a1ef-3065ec8fd3ec chromium -- insufficient data validation in Mojo
f393b5a7-1535-11ef-8064-c5610a6efffb Arti -- Security issues related to circuit construction
f3a35fb8-2d70-47c9-a516-6aad7eb222b1 electron{22,23,24,25} -- multiple vulnerabilities
f3cf4b33-6013-11eb-9a0e-206a8a720317 sudo -- Multiple vulnerabilities
f3d24aee-e5ad-11e2-b183-20cf30e32f6d apache22 -- several vulnerabilities
f3d3f621-38d8-11d9-8fff-000c6e8f12ef smbd -- buffer-overrun vulnerability
f3d86439-9def-11eb-97a0-e09467587c17 chromium -- multiple vulnerabilities
f3eec2b5-8cd8-11d9-8066-000a95bc6fae postnuke -- SQL injection vulnerabilities
f3fc2b50-d36a-11eb-a32c-00a0989e4ec1 dovecot-pigeonhole -- Sieve excessive resource usage
f40f07aa-c00f-11e7-ac58-b499baebfeaf OpenSSL -- Multiple vulnerabilities
f414d69f-e43d-11ec-9ea4-001b217b3468 Gitlab -- multiple vulnerabilities
f418cd50-561a-49a2-a133-965d03ede72a py-ansible -- data leak vulnerability
f41e3e54-076b-11e7-a9f2-0011d823eebd mbed TLS (PolarSSL) -- multiple vulnerabilities
f4428842-a583-4a4c-89b7-297c3459a1c3 bogofilter -- RFC 2047 decoder denial-of-service vulnerability
f4464e49-7e04-11ee-8e38-002590c1f29c FreeBSD -- Incorrect libcap_net limitation list manipulation
f450587b-d7bd-11e4-b5a4-14dae9d5a9d2 osc -- shell command injection via crafted _service files
f45c0049-be72-11e1-a284-0023ae8e59f0 pycrypto -- vulnerable ElGamal key generation
f46c4c6a-ba25-11e1-806a-001143cd36d8 joomla -- Privilege Escalation
f471032a-8700-11e6-8d93-00248c0c745d PHP -- multiple vulnerabilities
f4722927-1375-11eb-8711-3065ec8fd3ec chromium -- multiple vulnerabilities
f47f2746-12c5-11dd-bab7-0016179b2dd5 mailman -- script insertion vulnerability
f4876dd4-9ca8-11e8-aa17-0011d823eebd mbed TLS -- plaintext recovery vulnerabilities
f49ba347-2190-11dd-907c-001c2514716c django -- XSS vulnerability
f4a0212f-f797-11e2-9bb9-6805ca0b3d42 phpMyAdmin -- multiple vulnerabilities
f4a94232-7864-4afb-bbf9-ff2dc8e288d1 py-cinder -- data leak
f4af098d-d921-11da-ad4a-00123ffe8333 jabberd -- SASL Negotiation Denial of Service Vulnerability
f4b15f7d-d33a-4cd0-a97b-709d6af0e43e minio -- policy restriction issue
f4b95430-51d8-11da-8e93-0010dc4afb40 flyspray -- cross-site scripting vulnerabilities
f4bf713f-6ac7-4b76-8980-47bf90c5419f memcached -- multiple vulnerabilities
f4c54b81-bcc8-11eb-a7a6-080027f515ea binutils -- excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section()
f4ce64c2-5bd4-11e5-9040-3c970e169bc2 wordpress -- multiple vulnerabilities
f4d638b9-e6e5-4dbe-8c70-571dbc116174 curl -- password overflow vulnerability
f4eb9a25-fde0-11e6-9ad0-b8aeed92ecc4 potrace -- multiple memory failure
f4f15051-4574-11ed-81a1-080027881239 Django -- multiple vulnerabilities
f4ff7434-9505-11db-9ddc-0011098b2f36 plone -- user can masquerade as a group
f5035ead-688b-11e6-8b1d-c86000169601 eog -- out-of-bounds write
f504a8d2-e105-11ed-85f6-84a93843eb75 MySQL -- Multiple vulnerabilities
f5225b23-192d-11e5-a1cf-002590263bf5 rubygem-bson -- DoS and possible injection
f524d8e0-3d83-11e2-807a-080027ef73ec bogofilter -- heap corruption by invalid base64 input
f52e3a8d-3f7e-11e7-97a9-a0d3c19bfa21 NVIDIA UNIX driver -- multiple vulnerabilities in the kernel mode layer handler
f53dab71-1b15-11ec-9d9d-0022489ad614 Node.js -- July 2021 Security Releases (2)
f53dd5cc-527f-11e7-a772-e8e0b747a45a chromium -- multiple vulnerabilities
f54584bc-7d2b-11e2-9bd1-206a8a720317 krb5 -- null pointer dereference in the KDC PKINIT code [CVE-2013-1415]
f5524753-67b1-4c88-8114-29c2d258b383 mini_httpd,thttpd -- Buffer overflow in htpasswd
f5561ade-846c-11e4-b7a7-20cf30e32f6d subversion -- DoS vulnerabilities
f55921aa-10c9-11ec-8647-00e0670f2660 MPD5 PPPoE Server remotely exploitable crash
f56390a4-4638-11e1-9f47-00e0815b8da8 FreeBSD -- Buffer overflow in handling of UNIX socket addresses
f56669f5-d799-4ff5-9174-64a6d571c451 bro -- Null pointer dereference and Signed integer overflow
f599dfc4-3ec2-11e2-8ae1-001a8056d0b5 tomcat -- bypass of security constraints
f59af308-07f3-11ea-8c56-f8b156b6dcc8 GNU cpio -- multiple vulnerabilities
f59c4c53-c55f-43fe-9920-82b9d1ea9c3d zeek -- Remote crash vulnerability
f59dda75-5ff4-11de-a13e-00e0815b8da8 tor-devel -- DNS resolution vulnerability
f5a48a7a-61d3-11ed-9094-589cfc0f81b0 phpmyfaq -- multiple vulnerabilities
f5a76faf-244c-11dd-b143-0211d880e350 libvorbis -- various security issues
f5abafc0-fcf6-11ea-8758-e0d55e2a8bf9 libxml -- multiple vulnerabilities
f5b29ec0-71f9-11dc-8c6a-00304881ac9a ImageMagick -- multiple vulnerabilities
f5b8b670-465c-11e5-a49d-bcaec565249c gdk-pixbuf2 -- heap overflow and DoS
f5c4d7f7-9f4b-11dd-bab1-001999392805 opera -- multiple vulnerabilities
f5c58fc1-49c0-11dd-b0ba-00163e000016 py-pylons -- Path traversal bug
f5d0cfe7-6ba6-11ef-858b-23eeba13701a gitea -- multiple issues
f5e52bf5-fc77-11db-8163-000e0c2e438a php -- multiple vulnerabilities
f5f00804-a03b-11e1-a284-0023ae8e59f0 inspircd -- buffer overflow
f5f0a640-bae8-11e9-bb3a-001e2a3f778d KDE Frameworks -- malicious .desktop files execute code
f5fa174d-19de-11ef-83d8-4ccc6adda413 QtNetworkAuth -- predictable seeding of PRNG in QAbstractOAuth
f60561e7-e23e-11ea-be64-507b9d01076a Icinga Web 2 -- directory traversal vulnerability
f622608c-c53c-11e7-a633-009c02a2ab30 roundcube -- file disclosure vulnerability
f62bba56-b309-11e9-a87f-a4badb2f4699 FreeBSD -- iconv buffer overflow
f6377f08-12a7-11dd-bab7-0016179b2dd5 php -- integer overflow vulnerability
f63bf080-619d-11e1-91af-003067b2972c linux-flashplugin -- multiple vulnerabilities
f6429c24-4fc9-11df-83fb-0015587e2cc1 moodle -- multiple vulnerabilities
f6447303-9ec9-11da-b410-000e0c2e438a heartbeat -- insecure temporary file creation vulnerability
f645aa90-a3e8-11e3-a422-3c970e169bc2 gnutls -- multiple certificate verification issues
f650d5b8-ae62-11d9-a788-0001020eed82 mozilla -- privilege escalation via DOM property overrides
f6565fbf-ab9e-11e6-ae1b-002590263bf5 moodle -- multiple vulnerabilities
f661184a-eb90-11ee-92fc-1c697a616631 emacs -- multiple vulnerabilities
f6680c03-0bd8-11d9-8a8a-000c41e2cdad tiff -- RLE decoder heap overflows
f66e011d-13ff-11da-af41-0004614cc33d elm -- remote buffer overflow in Expires header
f671c282-95ef-11eb-9c34-080027f515ea python -- Information disclosure via pydoc -p: /getfile?key=path allows to read arbitrary file on the filesystem
f682a506-df7c-11e5-81e4-6805ca0b3d42 phpmyadmin -- multiple XSS and a man-in-the-middle vulnerability
f68bb358-be8e-11ed-9215-00e081b7aa2d jenkins -- multiple vulnerabilities
f69415aa-086e-11ef-9f97-a8a1599412c6 chromium -- multiple security fixes
f69e1f09-e39b-11e5-9f77-5453ed2e2b49 websvn -- information disclosure
f6a014cd-d268-11e4-8339-001e679db764 GNU binutils -- multiple vulnerabilities
f6bff909-4a26-11db-a4cc-000a48049292 libmms -- stack-based buffer overflow
f6d6308a-f2ec-11e8-b005-6805ca2fa271 powerdns-recursor -- Crafted query can cause a denial of service
f6ea18bb-65b9-11e9-8b31-002590045d9c py-yaml -- arbitrary code execution
f6eb2279-ca3f-11df-aade-0050568f000c FreeBSD -- Insufficient environment sanitization in jail(8)
f6f19735-9245-4918-8a60-87948ebb4907 wireshark -- multiple vulnerabilities
f70ab05e-be06-11eb-b983-000c294bb613 drupal7 -- fix possible CSS
f70d09cb-0c46-11db-aac7-000c6ec775d9 mambo -- SQL injection vulnerabilities
f70f8860-e8ee-11d9-b875-0001020eed82 kernel -- ipfw packet matching errors with address tables
f714b4c9-a6c1-11e5-88d7-047d7b492d07 libvirt -- ACL bypass using ../ to access beyond storage pool
f714d8ab-028e-11e7-8042-50e549ebab6c kio: Information Leak when accessing https when using a malicious PAC file
f72d98d1-0b7e-11e7-970f-002590263bf5 moodle -- multiple vulnerabilities
f74dc01b-0e83-11da-bc08-0001020eed82 acroread -- plug-in buffer overflow vulnerability
f755545e-6fcd-11d9-abec-00061bd2d56f xpdf -- makeFileKey2() buffer overflow vulnerability
f75722ce-31b0-11ed-8b56-0800277bb8a8 gitea -- multiple issues
f762ccbb-baed-11dc-a302-000102cc8983 linux-realplayer -- multiple vulnerabilities
f767d615-01db-47e9-b4ab-07bb8d3409fd py39-cinder -- insecure-credentials flaw
f771880c-31cf-11e6-8e82-002590263bf5 botan -- cryptographic vulnerability
f7809d9e-6af0-11e2-8e32-080027d768d3 poweradmin -- multiple XSS vulnerabilities
f78eac48-c3d1-4666-8de5-63ceea25a578 mozilla -- multiple vulnerabilities
f7a00ad7-ae75-11eb-8113-08002728f74c Rails -- multiple vulnerabilities
f7a02651-c798-11ea-81d6-6805cabe6ebb clamav -- multiple vulnerabilities
f7a3b18c-624c-4703-9756-b6b27429e5b0 leafnode denial-of-service triggered by article request
f7a97d43-c039-11ea-a051-001b217b3468 Gitlab -- Multiple Vulnerabilities
f7a9e415-bdca-11e4-970c-000c292ee6b8 php5 -- multiple vulnerabilities
f7b3d1eb-f738-11e5-a710-0011d823eebd flash -- multiple vulnerabilities
f7ba20aa-6b5a-11dd-9d79-001fc61c2a55 ruby -- DoS vulnerability in WEBrick
f7c5b3a9-b9fb-11ed-99c6-001b217b3468 Gitlab -- Multiple Vulnerabilities
f7c87a8a-55d5-11e2-a255-c8600054b392 asterisk -- multiple vulnerabilities
f7d79fac-cd49-11e4-898f-bcaec565249c libXfont -- BDF parsing issues
f7d838f2-9039-11e0-a051-080027ef73ec fetchmail -- STARTTLS denial of service
f7dd2d09-625e-11e6-828b-fcaa14edc6a6 TeamSpeak Server 3 -- Multiple vulnerabilities including Remote Code Execution
f7e8d2ca-410e-40b2-8748-3abd021e44a9 xtrlock -- X display locking bypass
f7e9a1cc-0931-11ee-94b4-6cc21735f730 xmltooling -- remote resource access
f7eb0b23-7099-11da-a15c-0060084a00e5 fetchmail -- null pointer dereference in multidrop mode with headerless email
f7fcb75c-e537-11e9-863e-b9b7af01ba9e ruby -- multiple vulnerabilities
f82c85d8-1c6e-11df-abb2-000f20797ede mozilla -- multiple vulnerabilities
f838dcb4-656f-11e5-9909-002590263bf5 codeigniter -- multiple vulnerabilities
f848ef90-1848-11ef-9850-001b217b3468 Gitlab -- Vulnerabilities
f84ab297-2285-11ec-9e79-08002789875b mediawiki -- multiple vulnerabilities
f8536143-9bc4-11d9-b8b3-000a95bc6fae sylpheed -- buffer overflow in header processing
f8551668-de09-4d7b-9720-f1360929df07 tcpdump ISAKMP payload handling remote denial-of-service
f85fa236-e2a6-412e-b5c7-c42120892de5 chromium -- multiple vulnerabilities
f866d2af-bbba-11df-8a8d-0008743bf21a vim6 -- heap-based overflow while parsing shell metacharacters
f86d0e5d-7467-11e7-93af-005056925db4 Cacti -- Cross-site scripting (XSS) vulnerability in auth_profile.php
f87a9376-0943-11e6-8fc4-00a0986f28c4 phpmyfaq -- cross-site request forgery vulnerability
f8a913cc-1322-11e3-8ffa-20cf30e32f6d svnserve is vulnerable to a local privilege escalation vulnerability via symlink attack.
f8b0f83c-8bb3-11dc-bffa-0016179b2dd5 gftp -- multiple vulnerabilities
f8b46415-c264-11ea-8659-901b0ef719ab FreeBSD -- posix_spawnp(3) buffer overflow
f8c2f741-6be1-11ee-b33a-a04a5edf46d9 moonlight-embedded -- multiple vulnerabilities
f8c37915-7ac5-11e5-b35a-002590263bf5 Joomla! -- Core - XSS Vulnerability
f8c88d50-5fb3-11e4-81bd-5453ed2e2b49 libssh -- PRNG state reuse on forking servers
f8d3689e-6770-11dc-8be8-02e0185f8d72 bugzilla -- "createmailregexp" security bypass vulnerability
f8e1e2a6-9791-11eb-b87a-901b0ef719ab FreeBSD -- double free in accept_filter(9) socket configuration interface
f8e72cd4-c66a-11e7-bb17-e8e0b747a45a chromium -- multiple vulnerabilities
f8fe2905-0918-11e9-a550-00262d164c21 rpm4 -- regression in -setperms, -setugids and -restore
f900bda8-0472-11db-bbf7-000c6ec775d9 gnupg -- user id integer overflow vulnerability
f90bf863-e43c-4db3-b5a8-d9603684657a electron{27,28,29} -- multiple vulnerabilities
f90fce70-ecfa-4f4d-9ee8-c476dbf4bf0e mozilla -- data: URL can inherit wrong origin after an HTTP redirect
f9140ad4-4920-11ed-a07e-080027f5fec9 samba -- Multiple vulnerabilities
f923205f-6e66-11ee-85eb-84a93843eb75 Apache httpd -- Multiple vulnerabilities
f9258873-2ee2-11e0-afcd-0015f2db7bde vlc -- Insufficient input validation in MKV demuxer
f927e06c-1109-11e4-b090-20cf30e32f6d apache22 -- several vulnerabilities
f929b172-369e-11ea-9cdb-001b217b3468 Gitlab -- Private objects exposed through project import
f92e1bbc-5e18-11d9-839a-0050da134090 tnftp -- mget does not check for directory escapes
f93be979-a992-11d8-aecc-000d610a3b12 cvs pserver remote heap buffer overflow
f947aa26-b2f9-11eb-a5f7-a0f3c100ae18 Pillow -- multiple vulnerabilities
f94befcd-1289-11e2-a25e-525400272390 gitolite -- path traversal vulnerability
f95a9005-88ae-11d8-90d1-0020ed76ef5a shmat reference counting bug
f96044a2-7df9-414b-9f6b-6e5b85d06c86 Rails -- Active Job vulnerability
f969bad7-46fc-11e3-b6ee-00269ee29e57 Quassel IRC -- SQL injection vulnerability
f98dea27-d687-11dd-abd1-0050568452ac twiki -- multiple vulnerabilities
f9ada0b5-3d80-11ed-9330-080027f5fec9 squid -- Exposure of sensitive information in cache manager
f9c388c5-a256-11e4-992a-7b2a515a1247 LibreSSL -- DTLS vulnerability
f9c5a410-9b4e-11ea-ac3f-6805ca2fa271 powerdns-recursor -- multiple vulnerabilities
f9cfdb00-7f43-11ef-9b27-592d55dd336d Slixmpp -- Lack of SSL Certificate hostname validation in XMLStream
f9d73a20-b5f0-11e8-b1da-6451062f0f7a Flash Player -- information disclosure
f9e3e60b-e650-11d8-9b0a-000347a4fa7d libpng stack-based buffer overflow and other code concerns
f9e6c0d1-e4cc-11e5-b2bd-002590263bf5 django -- multiple vulnerabilities
f9e96930-e6df-11dc-8c6a-00304881ac9a pcre -- buffer overflow vulnerability
f9f5c5a2-17b5-11e8-90b8-001999f8d30b asterisk and pjsip -- multiple vulnerabilities
f9f76a50-9642-11e7-ab09-080027b00c2e cyrus-imapd -- broken "other users" behaviour
f9fa7adc-ee51-11ea-a240-002590acae31 gnupg -- AEAD key import overflow
fa175f30-8c75-11e6-924a-60a44ce6887b redis -- sensitive information leak through command history file
fa194483-dabd-11e8-bf39-5404a68ad561 liveMedia -- potential remote code execution
fa239535-30f6-11ee-aef9-001b217b3468 Gitlab -- Vulnerabilities
fa2f386f-4814-11e1-89b4-001ec9578670 acroread9 -- Multiple Vulnerabilities
fa6a4a69-03d1-11e9-be12-a4badb2f4699 FreeBSD -- bootpd buffer overflow
fa708908-a8c7-11dc-b41d-000fb5066b20 drupal -- SQL injection vulnerability
fab87bff-3ce5-11e7-bf9d-001999f8d30b asterisk -- Memory exhaustion on short SCCP packets
faca0843-6281-11da-8630-00123ffe8333 drupal -- multiple vulnerabilities
faccf131-00d9-11ef-92b7-589cfc023192 GLPI -- multiple vulnerabilities
faf7c1d0-f5bb-47b4-a6a8-ef57317b9766 ffmpeg -- multiple vulnerabilities
fafaef4d-f364-4a07-bbdd-bf53448c593c chromium -- multiple security fixes
fb03b1c6-8a8a-11d9-81f7-02023f003c9f uim -- privilege escalation vulnerability
fb0b5574-4e64-11ef-8a0f-a8a1599412c6 chromium -- multiple security fixes
fb2475c2-9125-11e5-bd18-002590263bf5 kibana4 -- CSRF vulnerability
fb25333d-442f-11e4-98f3-5453ed2e2b49 krfb -- Multiple security issues in bundled libvncserver
fb26f78a-26a9-11e8-a1c2-00505689d4ae samba -- multiple vulnerabilities
fb30db8f-62af-11e9-b0de-001cc0382b2f GnuTLS -- double free, invalid pointer access
fb3455be-ebf6-11eb-aef1-0897988a1c07 asterisk -- Remote crash when using IAX2 channel driver
fb3668df-32d7-11e5-a4a5-002590263bf5 elasticsearch -- remote code execution via transport protocol
fb521119-9bc4-11d8-9366-0020ed76ef5a pound remotely exploitable vulnerability
fb5e227e-b8c6-11d8-b88c-000d610a3b12 jailed processes can manipulate host routing tables
fb672330-02db-11dd-bd06-0017319806e7 suphp -- multiple local privilege escalation vulnerabilities
fb67567a-5d95-11eb-a955-08002728f74c pysaml2 -- multiple vulnerabilities
fb6e53ae-9df6-11eb-ba8c-001b217b3468 Gitlab -- Vulnerabilities
fb74eacc-ec8a-11e6-bc8a-0011d823eebd tiff -- multiple vulnerabilities
fb754341-c3e2-11e5-b5fe-002590263bf5 wordpress -- XSS vulnerability
fb84d5dd-9528-11dd-9a00-001999392805 opera -- multiple vulnerabilities
fb911e31-8ceb-11dd-bb29-000c6e274733 lighttpd -- multiple vulnerabilities
fb9ba490-5cc4-11ec-aac7-3065ec8fd3ec chromium -- multiple vulnerabilities
fba75b43-c588-11da-9110-00123ffe8333 phpmyadmin -- XSS vulnerabilities
fbb01289-2645-11e4-bc44-6805ca0b3d42 phpMyAdmin -- XSS vulnerabilities
fbb5a260-f00f-11ed-bbae-6cc21735f730 postgresql-server -- CREATE SCHEMA ... schema elements defeats protective search_path changes
fbc2c629-0dc5-11ef-9850-001b217b3468 Gitlab -- vulnerabilities
fbc8413f-2f7a-11de-9a3f-001b77d09812 FreeBSD -- remotely exploitable crash in OpenSSL
fbca6863-e2ad-11ea-9d39-00a09858faf5 textproc/elasticsearch6 -- field disclosure flaw
fbcba194-ac7d-11ea-8b5e-b42e99a1b9c3 Intel CPU issues
fbd7aa81-2cc1-11dd-8cfb-00e0815b8da8 Nagios -- Cross Site Scripting Vulnerability
fbe10a8a-05a1-11ea-9dfa-f8b156ac3ff9 FreeBSD -- Intel CPU Microcode Update
fc07c9ca-22ce-11d9-814e-0001020eed82 phpmyadmin -- remote command execution vulnerability
fc1bcbca-c88b-11eb-9120-f02f74d0e4bd dino -- Path traversal in Dino file transfers
fc1f6658-4f53-11e5-934b-002590263bf5 ghostscript -- denial of service (crash) via crafted Postscript files
fc1f8795-881d-11e5-ab94-002590263bf5 xen-kernel -- leak of main per-domain vcpu pointer array
fc28df92-b233-11e3-99ca-f0def16c5c1b nginx -- SPDY heap buffer overflow
fc2a9541-8893-11ec-9d01-80ee73419af3 xrdp -- privilege escalation
fc38cd83-00b3-11e5-8ebd-0026551a22dc PostgreSQL -- minor security problems.
fc4d0ae8-3fa3-11de-a3fd-0030843d3802 moinmoin -- multiple cross site scripting vulnerabilities
fc5231b6-c066-11e1-b5e0-000c299b62e1 FreeBSD -- Incorrect handling of zero-length RDATA fields in named(8)
fc55e396-6deb-11df-8b8e-000c29ba66d2 mediawiki -- two security vulnerabilities
fc75570a-b417-11eb-a23d-c7ab331fd711 Prosody -- multiple vulnerabilities
fc7e6a42-6012-11d9-a9e7-0001020eed82 tiff -- directory entry count integer overflow vulnerability
fc91f2ef-fd7b-11e9-a1c7-b499baebfeaf MySQL -- Multiple vulerabilities
fc99c736-3499-11d9-98a7-0090962cff2a gnats -- format string vulnerability
fc9c217e-3791-11dc-bb1a-000fea449b8a lighttpd -- multiple vulnerabilities
fc9e73b2-8685-11dd-bb64-0030843d3802 gallery -- multiple vulnerabilities
fcb0e00f-d7d3-49b6-a4a1-852528230912 electron31 -- multiple vulnerabilities
fcb90eb0-2ace-11db-a6e2-000e0c2e438a mysql -- format string vulnerability
fcba5764-506a-11db-a5ae-00508d6a62df dokuwiki -- multiple vulnerabilities
fcbf56dd-e667-11de-920a-00248c9b4be7 piwik -- php code execution
fcc39d22-5777-11df-bf33-001a92771ec2 redmine -- multiple vulnerabilities
fce67546-d2e7-11e2-a9bf-98fc11cdc4f5 linux-flashplugin -- multiple vulnerabilities
fce7a6e7-bc5d-11ea-b38d-f0def1d0c3ea coturn -- information leakage
fceb2b08-cb76-11ec-a06f-d4c9ef517024 OpenSSL -- Multiple vulnerabilities
fcedcdbb-c86e-11e6-b1cf-14dae9d210b8 FreeBSD -- Multiple vulnerabilities of ntp
fcfdabb7-f14d-4e61-a7d5-cfefb4b99b15 Ruby Rack Gem -- Multiple Issues
fd10aa77-fb5e-11e9-af7b-0800274e5f20 gitea -- information disclosure
fd24a530-c202-11eb-b217-b42e99639323 wayland -- integer overflow
fd2bf3b5-1001-11e3-ba94-0025905a4771 asterisk -- multiple vulnerabilities
fd2e0ca8-e3ae-11e9-8af7-08002720423d mongodb -- Bump Windows package dependencies
fd3401a1-b6df-4577-917a-2c22fee99d34 chromium -- multiple security fixes
fd376b8b-41e1-11d8-b096-0020ed76ef5a Buffer overflow in INN control message handling
fd47fcfe-ec69-4000-b9ce-e5e62102c1c7 couchdb -- information sharing via couchjs processes
fd538d14-5778-4764-b321-2ddd61a8a58f keycloak -- Missing server identity checks when sending mails via SMTPS
fd64188d-a71d-11e0-89b4-001ec9578670 BIND -- Remote DoS against authoritative and recursive servers
fd792048-ad91-11ed-a879-080027f5fec9 clamav -- Multiple vulnerabilities
fd87a250-ff78-11ed-8290-a8a1599412c6 chromium -- multiple vulnerabilities
fd8bac56-c444-11e1-864b-001cc0877741 phpList -- SQL injection and XSS vulnerability
fdad8a87-7f94-11d9-a9e7-0001020eed82 awstats -- arbitrary command execution
fdbe9aec-118b-11ee-908a-6c3be5272acd Grafana -- Account takeover / authentication bypass
fdc49972-3ca7-11eb-929d-d4c9ef517024 p11-kit -- Multiple vulnerabilities
fdca9418-06f0-11ee-abe2-ecf4bbefc954 acme.sh -- closes potential remote vuln
fdd1c316-5a3d-11e1-8d3e-e0cb4e266481 phpMyAdmin -- XSS in replication setup
fde53204-7ea6-11d8-9645-0020ed76ef5a insecure temporary file creation in xine-check, xine-bugreport
fdf72a0e-8371-11e4-bc20-001636d274f3 NVIDIA UNIX driver -- remote denial of service or arbitrary code execution
fe12ef83-8b47-11e8-96cc-001a4a7ec6be mutt/neomutt -- multiple vulnerabilities
fe15f30a-b4c9-11ec-94a3-3065ec8fd3ec chromium -- Type confusion in V8
fe2b6597-c9a4-11dc-8da8-0008a18a9961 xorg -- multiple vulnerabilities
fe4c84fc-bdb5-11da-b7d4-00123ffe8333 linux-realplayer -- heap overflow
fe5c1e7a-7eed-11ef-9533-f875a43e1796 php -- Multiple vulnerabilities
fe7031d3-3000-4b43-9fa6-52c2b624b8f9 zeek -- potential DoS vulnerability
fe7ac70a-792b-11ee-bf9a-a04a5edf46d9 PptiPNG -- Global-buffer-overflow
fe7e322f-522d-11e9-98b5-216e512dad89 Jupyter notebook -- open redirect vulnerability
fe818607-b5ff-11e8-856b-485b3931c969 Containous Traefik -- exposes the configuration and secret
fe83eb5b-55e1-11db-a5ae-00508d6a62df python -- buffer overrun in repr() for unicode strings
fe853666-56ce-11e0-9668-001fd0d616cf php -- ZipArchive segfault with FL_UNCHANGED on empty archive
fe903533-ff96-4c7a-bd3e-4d40efa71897 gforge -- directory traversal vulnerability
fe910ed6-f88d-11e4-9ae3-0050562a4d7b suricata -- TLS/DER Parser Bug (DoS)
fe93803c-883f-11e8-9f0c-001b216d295b Several Security Defects in the Bouncy Castle Crypto APIs
fe971a0f-1246-11dd-bab7-0016179b2dd5 phpmyadmin -- Shared Host Information Disclosure
fe99d3ca-a63a-11e8-a7c6-54e1ad3d6335 libX11 -- Multiple vulnerabilities
feb8afdc-b3e5-11ea-9df5-08002728f74c Rails -- permission vulnerability
fedf7e71-61bd-49ec-aaf0-6da14bdbb319 zeek -- potential DoS vulnerability
fee7e059-acec-11dc-807f-001b246e4fdf ganglia-webfrontend -- XSS vulnerabilities
fee94342-4638-11e1-9f47-00e0815b8da8 FreeBSD -- errors handling corrupt compress file in compress(1) and gzip(1)
fef03980-e4c6-11e5-b2bd-002590263bf5 wordpress -- multiple vulnerabilities
fefcd340-624f-11ee-8e38-002590c1f29c FreeBSD -- msdosfs data disclosure
fefd93d8-8af5-11db-9d01-0016179b2dd5 tdiary -- injection vulnerability
ff00f2ce-c54c-11d8-b708-00061bc2ad93 XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0
ff0acfb4-3efa-11e5-93ad-002590263bf5 pcre -- heap overflow vulnerability in '(?|' situations
ff304c35-fb5b-11dc-91c1-00e0815b8da8 silc -- pkcs_decode buffer overflow
ff50192c-19eb-11e9-8573-001b217b3468 Gitlab -- Arbitrary repo read in Gitlab project import
ff5606f7-8a45-11ec-8be6-d4c9ef517024 MariaDB -- Multiple vulnerabilities
ff6519ad-18e5-11df-9bdd-001b2134ef46 linux-flashplugin -- multiple vulnerabilities
ff65eecb-91e4-11dc-bd6c-0016179b2dd5 flac -- media file processing integer overflow vulnerabilities
ff76f0e0-3f11-11e6-b3c8-14dae9d210b8 expat2 -- denial of service
ff824eea-c69c-11e5-96d6-14dae9d210b8 radicale -- multiple vulnerabilities
ff82610f-b309-11e9-a87f-a4badb2f4699 FreeBSD -- Kernel stack disclosure in UFS/FFS
ff8b419a-0ffa-11e0-becc-0022156e8794 Drupal Views plugin -- cross-site scripting
ff98087f-0a8f-11e4-b00b-5453ed2e2b49 postfixadmin -- SQL injection vulnerability
ffa15b3b-e6f6-11ea-8cbf-54e1ad3d6335 xorg-server -- Multiple input validation failures in X server extensions
ffa364e1-ebf5-11eb-aef1-0897988a1c07 asterisk -- Remote Crash Vulnerability in PJSIP channel driver
ffa7c6e4-bb29-11e3-8136-60a44c524f57 otrs -- Clickjacking issue
ffa8ca79-4afb-11e6-97ea-002590263bf5 atutor -- multiple vulnerabilities
ffb82d3a-610f-11da-8823-00123ffe8333 mambo -- "register_globals" emulation layer overwrite vulnerability
ffba6ab0-90b5-11dc-9835-003048705d5a plone -- unsafe data interpreted as pickles
ffc73e87-87f0-11e9-ad56-fcaa147e860e Django -- AdminURLFieldWidget XSS
ffc80e58-0dcb-11ea-9673-4c72b94353b5 unbound -- parsing vulnerability
ffcbd42d-a8c5-11dc-bec2-02e0185f8d72 samba -- buffer overflow vulnerability
ffe2d86c-07d9-11e5-9a28-001e67150279 rest-client -- plaintext password disclosure
ffeb25d0-ac94-11e8-ab15-d8cb8abf62dd Gitlab -- multiple vulnerabilities
fffa9257-3c17-11db-86ab-00123ffe8333 mailman -- Multiple Vulnerabilities
fffacc93-16cb-11d9-bc4a-000c41e2cdad xv -- exploitable buffer overflows