002432c8-ef6a-11ea-ba8f-08002728f74c |
Django -- multiple vulnerabilities |
00263aa3-67a8-11d8-80e3-0020ed76ef5a |
mailman XSS in user options page |
002b4b05-35dd-11e9-94a8-000ffec0b3e1 |
drupal -- Drupal core - Highly critical - Remote Code Execution |
0032400f-624f-11ea-b495-000d3ab229d6 |
Node.js -- multiple vulnerabilities |
004d8c23-c710-11e8-98c7-000c29434208 |
Django -- password hash disclosure |
004debf9-1d16-11e8-b6aa-4ccc6adda413 |
libsndfile -- out-of-bounds read memory access |
005dfb48-990d-11ed-b9d3-589cfc0f81b0 |
phpmyfaq -- multiple vulnerabilities |
00644f03-fb58-11d8-9837-000c41e2cdad |
imlib -- BMP decoder heap buffer overflow |
006bee4e-4c49-11e8-9c32-54ee754af08e |
chromium -- vulnerability |
006e3b7c-d7d7-11e5-b85f-0018fe623f2b |
jasper -- multiple vulnerabilities |
00784d6e-f4ce-11da-87a1-000c6ec775d9 |
squirrelmail -- plugin.php local file inclusion vulnerability |
007e7e77-2f06-11ef-8a0f-a8a1599412c6 |
chromium -- multiple security fixes |
00919005-96a3-11ed-86e9-d4c9ef517024 |
Apache httpd -- Multiple vulnerabilities |
00b0d8cd-7097-11e2-98d9-003067c2616f |
OpenSSL -- TLS 1.1, 1.2 denial of service |
00b296b6-7db1-11e0-96b7-00300582f9fc |
Apache APR -- DoS vulnerabilities |
00cb1469-4afc-11e6-97ea-002590263bf5 |
atutor -- multiple vulnerabilities |
00d6040a-b8e0-11dd-a578-0030843d3802 |
mantis -- session hijacking vulnerability |
00dadbf0-6f61-11e5-a2a1-002590263bf5 |
p5-UI-Dialog -- shell command execution vulnerability |
00e4050b-56c1-11e7-8e66-08606e46faad |
pear-Horde_Image -- DoS vulnerability |
00ec1be1-22bb-11e6-9ead-6805ca0b3d42 |
phpmyadmin -- XSS and sensitive data leakage |
00f30cba-4d23-11ea-86ba-641c67a117d8 |
libexif -- privilege escalation |
01018916-c47c-11e8-8b07-00e04c1ea73d |
Serendipity -- multiple vulnerabilities |
012809ce-83f3-11ea-92ab-00163e433440 |
OpenSSL remote denial of service vulnerability |
012b495c-9d51-11de-8d20-001bd3385381 |
cyrus-imapd -- Potential buffer overflow in Sieve |
0132ca5b-5d11-11ec-8be6-d4c9ef517024 |
OpenSSL -- Certificate validation issue |
01356ccc-6a87-11da-b96e-000fb586ba73 |
horde -- Cross site scripting vulnerabilities in several of Horde's templates |
0137167b-6dca-11e8-a671-001999f8d30b |
asterisk -- PJSIP endpoint presence disclosure when using ACL |
013fa252-0724-11d9-b45d-000c41e2cdad |
mod_dav -- lock related denial-of-service |
0163b498-af54-11d9-acd0-000854d03344 |
axel -- remote buffer overflow |
0167f5ad-64ea-11e4-98c1-00269ee29e57 |
Konversation -- out-of-bounds read on a heap-allocated array |
017a493f-7db6-11e5-a762-14dae9d210b8 |
openafs -- information disclosure |
01823528-a4c1-11ed-b6af-b42e991fc52e |
kafka -- Denial Of Service vulnerability |
018a84d0-2548-11df-b4a3-00e0815b8da8 |
sudo -- Privilege escalation with sudoedit |
01974420-dfaf-11eb-ba49-001b217b3468 |
Gitlab -- vulnerability |
01a197ca-67f1-11e7-a266-28924a333806 |
evince and atril -- command injection vulnerability in CBT handler |
01bb84e2-bd88-11d9-a281-02e018374e71 |
groff -- pic2graph and eqn2graph are vulnerable to symlink attack through temporary files |
01bce4c6-6571-11e5-9909-002590263bf5 |
codeigniter -- mysql database driver vulnerability |
01bde18a-2e09-11ea-a935-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
01c231cd-4393-11d9-8bb9-00065be4b5b6 |
mysql -- GRANT access restriction problem |
01c57d20-ea26-11de-bd39-00248c9b4be7 |
mozilla -- multiple vulnerabilities |
01cf67b3-dc3b-11e2-a6cd-c48508086173 |
cURL library -- heap corruption in curl_easy_unescape |
01d3ab7d-9c43-11e0-bc0f-0014a5e3cda6 |
ejabberd -- remote denial of service vulnerability |
01d729ca-1143-11e6-b55e-b499baebfeaf |
OpenSSL -- multiple vulnerabilities |
01eeea33-1afa-11ee-8a9b-b42e991fc52e |
phpldapadmin -- XSS vulnerability |
01ffd06a-36ed-11eb-b655-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
022255be-0895-11e5-a242-5404a68ad561 |
avidemux26 -- multiple vulnerabilities in bundled FFmpeg |
02274fd9-6bc5-11d9-8edb-000a95bc6fae |
realplayer -- arbitrary file deletion and other vulnerabilities |
022a4c77-2da4-11e1-b356-00215c6a37bb |
proftpd -- arbitrary code execution vulnerability with chroot |
022baf71-38e6-11dd-8d34-00e0815b8da8 |
Courier Authentication Library -- SQL Injection |
022dde12-8f4a-11ec-83ac-080027415d17 |
cyrus-sasl -- Escape password for SQL insert/update commands |
024edd06-c933-11dc-810c-0016179b2dd5 |
xfce -- multiple vulnerabilities |
02562a78-e6b7-11ed-b0ce-b42e991fc52e |
cloud-init -- sensitive data exposure in cloud-init logs |
026759e0-1ba3-11e5-b43d-002590263bf5 |
elasticsearch -- remote OS command execution via Groovy scripting engine |
027380b7-3404-11d9-ac1b-000d614f7fad |
hafiye -- lack of terminal escape sequence filtering |
0274a9f1-0759-11da-bc08-0001020eed82 |
postnuke -- multiple vulnerabilities |
027af74d-eb56-11e3-9032-000c2980a9f3 |
gnutls -- client-side memory corruption |
0282269d-bbee-11e6-b1cf-14dae9d210b8 |
FreeBSD -- link_ntoa(3) buffer overflow |
0297b260-2b3b-11e6-ae88-002590263bf5 |
ikiwiki -- XSS vulnerability |
02bc9b7c-e019-11d9-a8bd-000cf18bbe54 |
acroread -- XML External Entity vulnerability |
02be46c1-f7cc-11ee-aa6b-b42e991fc52e |
jose -- DoS vulnerability |
02bee9ae-c5d1-409b-8a79-983a88861509 |
libraw -- Out-of-bounds Read |
02db20d7-e34a-11e3-bd92-bcaec565249c |
openjpeg -- Multiple vulnerabilities |
02e33cd1-c655-11ee-8613-08002784c58d |
curl -- OCSP verification bypass with TLS session reuse |
02e51cb3-d7e4-11ed-9f7a-5404a68ad561 |
traefik -- Use of vulnerable Go modules net/http, net/textproto |
02eedd3c-c6b5-11dc-93b6-000e35248ad7 |
libxine -- buffer overflow vulnerability |
02fb9764-1893-11ed-9b22-002590c1f29c |
FreeBSD -- Memory disclosure by stale virtual memory mapping |
0309c898-3aed-11eb-af2a-080027dbe4b7 |
glpi -- Improve encryption algorithm |
03140526-1250-11de-a964-0030843d3802 |
zabbix -- php frontend multiple vulnerabilities |
03159886-a8a3-11e3-8f36-0025905a4771 |
asterisk -- multiple vulnerabilities |
03175e62-5494-11e4-9cc1-bc5ff4fb5e7b |
OpenSSL -- multiple vulnerabilities |
032643d7-0ba7-11ec-a689-080027e50e6d |
Python -- multiple vulnerabilities |
032aa524-5854-11e6-b334-002590263bf5 |
xen-kernel -- x86: Privilege escalation in PV guests |
03532a19-d68e-11e6-9171-14dae9d210b8 |
lynx -- multiple vulnerabilities |
035d17b2-484a-11d9-813c-00065be4b5b6 |
mysql -- erroneous access restrictions applied to table renames |
03653079-8594-11d9-afa0-003048705d5a |
phpbb -- multiple information disclosure vulnerabilities |
036d6c38-1c5b-11e6-b9e0-20cf30e32f6d |
Bugzilla security issues |
038a5808-24b3-11e5-b0c8-bf4d8935d4fa |
roundcube -- multiple vulnerabilities |
039d057e-544e-11e1-9fb7-003067b2972c |
surf -- private information disclosure |
03bb8373-2026-11ed-9d70-080027240888 |
drupal9 -- multiple vulnerabilities |
03bf5157-d145-11ee-acee-001b217b3468 |
Gitlab -- Vulnerabilities |
03d22656-2690-11de-8226-0030843d3802 |
drupal6-cck -- cross-site scripting |
03e48bf5-a96d-11e3-a556-3c970e169bc2 |
samba -- multiple vulnerabilities |
03e54e42-7ac6-11e5-b35a-002590263bf5 |
Joomla! -- Core - ACL Violation vulnerabilities |
04042f95-14b8-4382-a8b9-b30e365776cf |
puppet26 -- multiple vulnerabilities |
040707f9-0b2a-11eb-8834-00155d01f202 |
mozjpeg -- heap-based buffer over-read in get_rgb_row() in rdppm.c via a malformed PPM input file |
040e69f1-6831-11ee-b06f-0050569ceb3a |
Account takeover via Kanban feature in GLPI |
04104985-d846-11de-84e4-00215af774f0 |
cacti -- cross-site scripting issues |
0417d41a-8175-11ef-a5dc-b42e991fc52e |
firefox -- multiple vulnerabilities |
04320e7d-ea66-11e2-a96e-60a44c524f57 |
libzrtpcpp -- multiple security vulnerabilities |
043d3a78-f245-4938-9bc7-3d0d35dd94bf |
wordpress -- multiple vulnerabilities |
04422df1-40d8-11ed-9be7-454b1dd82c64 |
Gitlab -- Multiple vulnerabilities |
044cff62-ed8b-4e72-b102-18a7d58a669f |
bro -- integer overflow allows remote DOS |
045944a0-6bca-11d9-aaa6-000a95bc6fae |
sudo -- environmental variable CDPATH is not cleared |
045e46e8-abe6-11ea-99cb-10bf48e1088e |
tcpreplay -- Multiple vulnerabilities |
046fedd1-bd01-11e5-bbf4-5404a68ad561 |
ffmpeg -- remote attacker can access local files |
048c77df-3211-11e1-9583-14dae938ec40 |
zabbix-frontend -- multiple XSS vulnerabilities |
0491d15a-5875-11df-8d80-0015587e2cc1 |
lxr -- multiple XSS vulnerabilities |
049332d2-f6e1-11e2-82f3-000c29ee3065 |
wordpress -- multiple vulnerabilities |
04b7d46c-7226-11e0-813a-6c626dd55a41 |
Mozilla -- multiple vulnerabilities |
04c6187d-2d8f-11dd-98c9-00163e000016 |
linux-flashplugin -- unspecified remote code execution vulnerability |
04c9c3f8-5ed3-11ef-8262-b0416f0c4c67 |
Jinja2 -- Vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter |
04cc7bd2-3686-11e7-aa64-080027ef73ec |
OpenVPN -- two remote denial-of-service vulnerabilities |
04cf89e3-5854-11e6-b334-002590263bf5 |
xen-kernel -- x86: Missing SMAP whitelisting in 32-bit exception / event delivery |
04d2cf7f-2942-11ec-b48c-1c1b0d9ea7e6 |
Apache OpenOffice -- multiple vulnerabilities. |
04e78f32-04b2-4c23-bfae-72600842d317 |
electron29 -- use after free in Dawn |
04f29189-1a05-11e7-bc6e-b499baebfeaf |
cURL -- potential memory disclosure |
04fe6c8d-2a34-4009-a81e-e7a7e759b5d2 |
cURL -- multiple vulnerabilities |
04fecc47-dad2-11ec-8fbd-d4c9ef517024 |
MariaDB -- Multiple vulnerabilities |
0502c1cb-8f81-11df-a0bb-0050568452ac |
codeigniter -- file upload class vulnerability |
050eba46-7638-11ed-820d-080027d3a315 |
Python -- multiple vulnerabilities |
0512b761-70fb-40d3-9954-aa4565528fa8 |
kstars -- exploitable set-user-ID application fliccd |
0519db18-cf15-11e5-805c-5453ed2e2b49 |
py-pillow -- Integer overflow in Resample.c |
0523fb7e-8444-4e86-812d-8de05f6f0dce |
libutp -- remote denial of service or arbitrary code execution |
0537afa3-3ce0-11e7-bf9d-001999f8d30b |
asterisk -- Buffer Overrun in PJSIP transaction layer |
05463e0a-abd3-4fa4-bd5f-cd5ed132d4c6 |
mozilla -- multiple vulnerabilities |
0569146e-bdef-11e9-bd31-8de4a4470bbb |
Nokogiri -- injection vulnerability |
056ea107-5729-11ea-a2f3-001cc0382b2f |
Mbed TLS -- Cache attack against RSA key import in SGX |
057bf770-cac4-11e0-aea3-00215c6a37bb |
php -- multiple vulnerabilities |
057e6616-1885-11e7-bb4d-a0d3c19bfa21 |
NVIDIA UNIX driver -- multiple vulnerabilities in the kernel mode layer handler |
0592f49f-b3b8-4260-b648-d1718762656c |
mozilla -- multiple vulnerabilities |
059a99a9-45e0-492b-b9f9-5a79573c8eb6 |
electron29 -- multiple vulnerabilities |
05b7180b-e571-11ee-a1c0-0050569f0b83 |
www/varnish7 -- Denial of Service |
05cd9f82-5426-11ef-8a0f-a8a1599412c6 |
chromium -- multiple security fixes |
05da6b56-3e66-4306-9ea3-89fafe939726 |
mozilla -- multiple vulnerabilities |
05dc6efa-2370-11e3-95b7-00e0814cab4e |
django -- denial-of-service via large passwords |
05dcf751-0733-11d9-b45d-000c41e2cdad |
cups -- print queue browser denial-of-service |
05eeb7e9-b987-11e5-83ef-14dae9d210b8 |
isc-dhcpd -- Denial of Service |
063399fc-f6d6-11dc-bcee-001c2514716c |
bzip2 -- crash with certain malformed archive files |
0640198a-d117-11de-b667-0030843d3802 |
wordpress -- multiple vulnerabilities |
06404241-b306-11d9-a788-0001020eed82 |
kdelibs -- kimgio input validation errors |
064225c5-1f53-11d9-836a-0090962cff2a |
squid -- NTLM authentication denial-of-service vulnerability |
06428d91-152e-11ee-8b14-dbdd62da85fb |
OpenEXR -- heap buffer overflow in internal_huf_decompress |
0642b064-56c4-11e4-8b87-bcaec565249c |
libxml2 -- Denial of service |
06492bd5-085a-4cc0-9743-e30164bdcb1c |
py-flask-security -- user redirect to arbitrary URL vulnerability |
0652005e-ca96-11e5-96d6-14dae9d210b8 |
salt -- code execution |
06574c62-5854-11e6-b334-002590263bf5 |
xen-tools -- virtio: unbounded memory allocation issue |
065890c3-725e-11e9-b0e1-6cc21735f730 |
PostgreSQL -- Selectivity estimators bypass row security policies |
065b3b72-c5ab-11e8-9ae2-001b217b3468 |
Gitlab -- multiple vulnerabilities |
0679deeb-8eaf-11db-abc9-0003476f14d3 |
sql-ledger -- multiple vulnerabilities |
06a12e26-142e-11e0-bea2-0015f2db7bde |
webkit-gtk2 -- Multiple vulnerabilities |
06a5abd4-6bc2-11eb-b292-90e2baa3bafc |
mod_dav_svn -- server crash |
06a6b2cf-484b-11d9-813c-00065be4b5b6 |
mysql -- ALTER MERGE denial of service vulnerability |
06ab7724-0fd7-427e-a5ce-fe436302b10c |
jenkins -- multiple vulnerabilities |
06c4a79b-981d-11e8-b460-9c5c8e75236a |
cgit -- directory traversal vulnerability |
06eac338-9ddf-11dd-813f-000e35248ad7 |
libxine -- denial of service vulnerability |
06ed6a49-bad4-11ec-9cfe-0800270512f4 |
Ruby -- Buffer overrun in String-to-Float conversion |
06f142ff-4df3-11d9-a9e7-0001020eed82 |
wget -- multiple vulnerabilities |
06f9174f-190f-11de-b2f0-001c2514716c |
phpmyadmin -- insufficient output sanitizing when generating configuration file |
06f931c0-0be0-11e7-b4bf-5404a68ad561 |
irssi -- use-after-free potential code execution |
06fefd2f-728f-11e5-a371-14dae9d210b8 |
miniupnpc -- buffer overflow |
0700e76c-3eb0-11ea-8478-3085a9a95629 |
Pillow -- Multiple vulnerabilities |
070b5b22-6d74-11dd-aa18-0030843d3802 |
drupal -- multiple vulnerabilities |
07234e78-e899-11e1-b38d-0023ae8e59f0 |
databases/postgresql*-server -- multiple vulnerabilities |
072a53e0-0397-11dd-bd06-0017319806e7 |
postfix-policyd-weight -- working directory symlink vulnerability |
074cb225-bb2d-11e8-90e1-fcaa147e860e |
moodle -- multiple vulnerabilities |
075952fe-267e-11e5-9d03-3c970e169bc2 |
openssl -- alternate chains certificate forgery vulnerability |
0762fa72-e530-11e9-86e9-001b217b3468 |
Gitlab -- Disclosure Vulnerabilities |
0765de84-a6c1-11e4-a0c1-c485083ca99c |
glibc -- gethostbyname buffer overflow |
07718e2b-d29d-11e5-a95f-b499baebfeaf |
nghttp2 -- Out of memory in nghttpd, nghttp, and libnghttp2_asio |
077bbadf-f2f4-11e6-92a7-902b34361349 |
diffoscope -- arbitrary file write |
077c2dca-8f9a-11db-ab33-000e0c2e438a |
openssl -- Incorrect PKCS#1 v1.5 padding validation in crypto(3) |
07888b49-35c4-11e6-8e82-002590263bf5 |
flash -- multiple vulnerabilities |
0792e7a7-8e37-11d8-90d1-0020ed76ef5a |
CVS path validation errors |
079b3641-c4bd-11eb-a22a-693f0544ae52 |
go -- multiple vulnerabilities |
07a1a76c-734b-11e5-ae81-14dae9d210b8 |
mbedTLS/PolarSSL -- DoS and possible remote code execution |
07aecafa-3b12-11eb-af2a-080027dbe4b7 |
glpi -- Reflexive XSS in Dropdown menus |
07bb3bd2-a920-11dd-8503-0211060005df |
qemu -- Heap overflow in Cirrus emulation |
07c0d782-f758-11ec-acaa-901b0e9408dc |
py-matrix-synapse -- unbounded recursion in urlpreview |
07c7ae7a-224b-11eb-aa6e-e0d55e2a8bf9 |
raptor2 -- buffer overflow |
07d04eef-d8e2-11e6-a071-001e67f15f5a |
lshell -- Shell autocomplete reveals forbidden directories |
07ead557-a220-11da-b410-000e0c2e438a |
WebCalendar -- unauthorized access vulnerability |
07ee8c14-68f1-11ee-8290-a8a1599412c6 |
chromium -- multiple vulnerabilities |
07f0ea8c-356a-11ef-ac6d-a0423f48a938 |
frr - Multiple vulnerabilities |
07f3fe15-a9de-11d9-a788-0001020eed82 |
php -- readfile() DoS vulnerability |
080936ba-fbb7-11ee-abc8-6960f2492b1d |
PuTTY and embedders (f.i., filezilla) -- biased RNG with NIST P521/ecdsa-sha2-nistp521 signatures permits recovering private key |
0809ce7d-f672-4924-9b3b-7c74bc279b83 |
gtar -- GNU TAR safer_name_suffix Remote Denial of Service Vulnerability |
0822a4cf-9318-11e8-8d88-00e04c1ea73d |
mantis -- multiple vulnerabilities |
0832ee18-cf77-11dc-8c6a-00304881ac9a |
jetty -- multiple vulnerability |
0838733d-1698-11dc-a197-0011098b2f36 |
wordpress -- XMLRPC SQL Injection |
0844632f-5e78-11e6-a6c3-14dae9d210b8 |
FreeBSD -- integer overflow in IP_MSFILTER |
0844671c-5a09-11ed-856e-d4c9ef517024 |
OpenSSL -- Buffer overflows in Email verification |
085399ab-dfd7-11ea-96e4-80ee73bc7b66 |
net/rsync -- multiple zlib issues |
0859e6d5-0415-11ed-a53b-6c3be5272acd |
Grafana -- OAuth Account Takeover |
085a087b-3897-11e8-ac53-d8cb8abf62dd |
Gitlab -- multiple vulnerabilities |
08664d42-7989-11e6-b7a8-74d02b9a84d5 |
h2o -- fix DoS attack vector |
086c96cd-d0cb-11ea-b922-5404a68ad561 |
libsndfile -- out-of-bounds read memory access |
0871d18b-9638-11e3-a371-6805ca0b3d42 |
phpMyAdmin -- Self-XSS due to unescaped HTML output in import. |
0882f019-bd60-11eb-9bdd-8c164567ca3c |
NGINX -- 1-byte memory overwrite in resolver |
088b8b7d-446c-11ef-b611-84a93843eb75 |
Apache httpd -- Source code disclosure with handlers configured via AddType |
0899c0d3-80f2-11ea-bafd-815569f3852d |
ansible - win_unzip path normalization |
08a125f3-e35a-11e7-a293-54e1ad3d6335 |
libXfont -- permission bypass when opening files through symlinks |
08a2df48-6c6a-11e7-9b01-2047478f2f70 |
collectd5 -- Denial of service by sending a signed network packet to a server which is not set up to check signatures |
08ac7b8b-bb30-11da-b2fb-000e0c2e438a |
sendmail -- race condition vulnerability |
08b553ed-537a-11eb-be6e-0022489ad614 |
Node.js -- January 2021 Security Releases |
08d11134-79c5-11e5-8987-6805ca0b3d42 |
phpMyAdmin -- Content spoofing vulnerability |
08de38d2-e2d0-11ea-9538-0c9d925bbbc0 |
adns -- multiple vulnerabilities |
08df5d46-1baf-11da-8038-0040f42d58c6 |
urban -- stack overflow vulnerabilities |
08f5c27d-4326-11ea-af8b-00155d0a0200 |
OpenSMTPd -- critical LPE / RCE vulnerability |
08fba28b-6f9f-11ea-bd0b-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
0904e81f-a89d-11e8-afbb-bc5ff4f77b71 |
node.js -- multiple vulnerabilities |
09066828-2ef1-11dd-a0d8-0016d325a0ed |
ikiwiki -- empty password security hole |
090763f6-7030-11ea-93dd-080027846a02 |
mediawiki -- multiple vulnerabilities |
092156c9-04d7-11e6-b1ce-002590263bf5 |
dhcpcd -- remote code execution/denial of service |
0925716f-34e2-11e2-aa75-003067c2616f |
opera -- execution of arbitrary code |
093584f2-3f14-11e6-b3c8-14dae9d210b8 |
libtorrent-rasterbar -- denial of service |
093a6baf-9f99-11eb-b150-000c292ee6b8 |
Consul -- Multiple vulnerabilities |
09429f7c-fd6e-11da-b1cd-0050bf27ba24 |
horde -- multiple parameter cross site scripting vulnerabilities |
094e4a5b-6511-11ed-8c5e-206a8a720317 |
krb5 -- Integer overflow vulnerabilities in PAC parsing |
094fb2ec-9aa3-11eb-83cb-0800278d94f0 |
gitea -- multiple vulnerabilities |
09639ccc-3abb-11db-81e1-000e0c2e438a |
hlstats -- multiple cross site scripting vulnerabilities |
096ab080-907c-11ec-bb14-002324b2fba8 |
go -- multiple vulnerabilities |
0981958a-f733-11e3-8276-071f1604ef8a |
iodined -- authentication bypass |
09849e71-bb12-11e7-8357-3065ec6f3643 |
wget -- Stack overflow in HTTP protocol handling |
09910d76-4c82-11df-83fb-0015587e2cc1 |
fetchmail -- denial of service vulnerability |
0998e79d-0055-11e3-905b-0025905a4771 |
mozilla -- multiple vulnerabilities |
09b7cd39-47bd-11ee-8e38-002590c1f29c |
FreeBSD -- OpenSSH pre-authentication double free |
09c87973-8b9d-11e1-b393-20cf30e32f6d |
bugzilla -- multiple vulnerabilities |
09c92f3a-fd49-11da-995c-605724cdf281 |
WebCalendar -- information disclosure vulnerability |
09d418db-70fd-11d8-873f-0020ed76ef5a |
Apache 1.3 IP address access control failure on some 64-bit platforms |
09db2844-0b21-11da-bc08-0001020eed82 |
gaim -- AIM/ICQ non-UTF-8 filename crash |
09ea1b08-1d3e-4bf2-91a1-d6573f4da3d8 |
jenkins -- Buffer corruption in bundled Jetty |
09eef008-3b16-11eb-af2a-080027dbe4b7 |
glpi -- Unauthenticated Stored XSS |
09f47c51-c1a6-11e3-a5ac-001b21614864 |
libaudiofile -- heap-based overflow in Microsoft ADPCM compression module |
09fff0d9-4126-11e5-9f01-14dae9d210b8 |
py-foolscap -- local file inclusion |
0a0670a1-3e1a-11ed-b48b-e0d55e2a8bf9 |
expat -- Heap use-after-free vulnerability |
0a305431-bc98-11ea-a051-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
0a38a0d9-757f-4ac3-9561-b439e933dfa9 |
py39-celery -- command injection vulnerability |
0a48e552-e470-11ee-99b3-589cfc0f81b0 |
amavisd-new -- multipart boundary confusion |
0a50bb48-625f-11ec-a1fb-080027cb2f6f |
mediawiki -- multiple vulnerabilities |
0a5cf6d8-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- SCTP SCTP_SS_VALUE kernel memory corruption and disclosure |
0a799a8e-c9d4-11e2-a424-14dae938ec40 |
irc/bitchx -- multiple vulnerabilities |
0a7a5dfb-aba4-11ed-be2c-001cc0382b2f |
GnuTLS -- timing sidechannel in RSA decryption |
0a80f159-629b-11ed-9ca2-6c3be5272acd |
Grafana -- Username enumeration |
0a82ac0c-1886-11df-b0d1-0015f2db7bde |
gnome-screensaver -- Multiple monitor hotplug issues |
0a82bc4d-a129-11ef-8351-589cfc0f81b0 |
icinga2 -- TLS Certificate Validation Bypass |
0a8ebf4a-5660-11eb-b4e2-001b217b3468 |
Gitlab -- vulnerability |
0a9e2b72-4cb7-11e1-9146-14dae9ebcf89 |
mozilla -- multiple vulnerabilities |
0aad3ce5-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- SCTP stream reset vulnerability |
0ab423e7-3822-11db-81e1-000e0c2e438a |
joomla -- multiple vulnerabilities |
0ab66088-4aa5-11e6-a7bd-14dae9d210b8 |
tiff -- buffer overflow |
0ac1aace-f7b9-11da-9156-000e0c2e438a |
ypserv -- Inoperative access controls in ypserv |
0ac68e68-d32b-11dd-b540-d1288664c17e |
ampache -- insecure temporary file usage |
0ac89b39-f829-11db-b55c-000e0c6d38a9 |
qemu -- several vulnerabilities |
0add6e6b-6883-11eb-b0cb-f8b156c2bfe9 |
sympa -- Unauthorised full access via SOAP API due to illegal cookie |
0ae56f3e-488c-11ed-bb31-b42e99a1b9c3 |
strongswan -- DOS attack vulnerability |
0aee2f13-ec1d-11e8-8c92-6805ca2fa271 |
powerdns -- Multiple vulnerabilities |
0afe8b29-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Integer overflow in IGMP protocol |
0b040e24-f751-11e4-b24d-5453ed2e2b49 |
libssh -- null pointer dereference |
0b0ad196-1ee8-4a98-89b1-4d5d82af49a9 |
jenkins -- DoS vulnerability in bundled XStream library |
0b2b4b4d-a07c-11da-be0a-000c6ec775d9 |
postgresql81-server -- SET ROLE privilege escalation |
0b535cd0-9b90-11e0-800a-00215c6a37bb |
Dokuwiki -- cross site scripting vulnerability |
0b53f5f7-ca8a-11e0-aea3-00215c6a37bb |
dovecot -- denial of service vulnerability |
0b628470-e9a6-11da-b9f4-00123ffe8333 |
coppermine -- Multiple File Extensions Vulnerability |
0b65f297-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Insecure default GELI keyfile permissions |
0b79743b-3ab7-11db-81e1-000e0c2e438a |
gtetrinet -- remote code execution |
0b85b1cd-e468-11ed-834b-6c3be5272acd |
Grafana -- Critical vulnerability in golang |
0b8d01a4-a0d2-11e6-9ca2-d050996490d0 |
BIND -- Remote Denial of Service vulnerability |
0b8d7194-ca88-11e3-9d8d-c80aa9043978 |
OpenSSL -- Remote Data Injection / DoS |
0b9af110-d529-11e6-ae1b-002590263bf5 |
tomcat -- multiple vulnerabilities |
0b9f4b5e-5d82-11e7-85df-14dae9d5a9d2 |
tor -- security regression |
0ba61fcc-3b38-11eb-af2a-080027dbe4b7 |
glpi -- SQL Injection in Search API |
0baadc45-92d0-11e6-8011-005056925db4 |
Axis2 -- Cross-site scripting (XSS) vulnerability |
0baee383-356c-11e7-b9a9-50e549ebab6c |
kauth: Local privilege escalation |
0bb55a18-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Denial of Service with IPv6 Router Advertisements |
0bb7677d-52f3-11d9-a9e7-0001020eed82 |
krb5 -- heap buffer overflow vulnerability in libkadm5srv |
0bc67930-d5c3-11e1-bef6-0024e81297ae |
dns/bind9* -- Heavy DNSSEC Validation Load Can Cause a 'Bad Cache' Assertion Failure |
0bd7f07b-dc22-11ed-bf28-589cfc0f81b0 |
libxml2 -- multiple vulnerabilities |
0bf376b7-cc6b-11e2-a424-14dae938ec40 |
net/openafs -- buffer overflow |
0bf816f6-3cfe-11ec-86cd-dca632b19f10 |
advancecomp -- multiple vulnerabilities |
0bf9d7fb-05b3-11da-bc08-0001020eed82 |
mambo -- multiple vulnerabilities |
0bfcae0b-947f-11ea-92ab-00163e433440 |
FreeBSD -- Insufficient cryptodev MAC key length check |
0bfda05f-2e6f-11e5-a4a5-002590263bf5 |
cacti -- Multiple XSS and SQL injection vulnerabilities |
0c064c43-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Resource exhaustion due to sessions stuck in LAST_ACK state |
0c0dc409-1c5e-11da-92ce-0048543d60ce |
squid -- Possible Denial Of Service Vulnerability in store.c |
0c14dfa7-879e-11e1-a2a0-00500802d8f7 |
nginx -- Buffer overflow in the ngx_http_mp4_module |
0c2c4d84-42a2-11e5-9daa-14dae9d210b8 |
freeradius3 -- insufficient validation on packets |
0c2db2aa-5584-11e7-9a7d-b499baebfeaf |
Apache httpd -- several vulnerabilities |
0c367e98-0415-11ed-a53b-6c3be5272acd |
Grafana -- Stored XSS |
0c39bafc-6771-11e3-868f-0025905a4771 |
asterisk -- multiple vulnerabilities |
0c4d5973-f2ab-11d8-9837-000c41e2cdad |
mysql -- mysqlhotcopy insecure temporary file creation |
0c52abde-717b-11ed-98ca-40b034429ecf |
rpm4 -- Multiple Vulnerabilities |
0c5369fc-d671-11e6-a9a5-b499baebfeaf |
GnuTLS -- Memory corruption vulnerabilities |
0c592c4a-1bcc-11d9-a3ec-00061bd2d56f |
cyrus-sasl -- potential buffer overflow in DIGEST-MD5 plugin |
0c5cf7c4-856e-11e4-a089-60a44c524f57 |
otrs -- Incomplete Access Control |
0c6759dd-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- shell injection vulnerability in patch(1) |
0c6b008d-35c4-11e6-8e82-002590263bf5 |
flash -- multiple vulnerabilities |
0c6f3fde-9c51-11d8-9366-0020ed76ef5a |
Midnight Commander buffer overflows, format string bugs, and insecure temporary file handling |
0c7a3ee2-3654-11e1-b404-20cf30e32f6d |
bugzilla -- multiple vulnerabilities |
0ca24682-3f03-11e6-b3c8-14dae9d210b8 |
openssl -- denial of service |
0cb0afd9-86b8-11e5-bf60-080027ef73ec |
PuTTY -- memory corruption in terminal emulator's erase character handling |
0cb9d5bb-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Resource exhaustion in TCP reassembly |
0cbf0fa6-dcb7-469c-b87a-f94cffd94583 |
cURL -- Multiple vulnerabilities |
0cc7e547-6a0a-11ea-92ab-00163e433440 |
FreeBSD -- Incorrect user-controlled pointer use in epair |
0cea6e0a-7a39-4dac-b3ec-dbc13d404f76 |
mozilla -- multiple vulnerabilities |
0cee4f9c-5efb-4770-b917-f4e4569e8bec |
electron26 -- multiple vulnerabilities |
0cf3480d-5fdf-11d9-b721-00065be4b5b6 |
helvis -- arbitrary file deletion problem |
0d0237d0-7f68-11de-984d-0011098ad87f |
SquirrelMail -- Plug-ins compromise |
0d090952-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- shell injection vulnerability in patch(1) |
0d0f3050-1f69-11e5-9ba9-d050996490d0 |
ntp -- control message remote Denial of Service vulnerability |
0d3547ab-9b69-11e1-bdb1-525401003090 |
PivotX -- 'ajaxhelper.php' Cross Site Scripting Vulnerability |
0d369972-d4ba-11e7-bfca-005056925db4 |
borgbackup -- remote users can override repository restrictions |
0d3a5148-f512-11d8-9837-000c41e2cdad |
SpamAssassin -- denial-of-service in tokenize_headers |
0d3f99f7-b30c-11e9-a87f-a4badb2f4699 |
FreeBSD -- File description reference count leak |
0d4c31ac-cb91-11d8-8898-000d6111a684 |
Remote code injection in phpMyAdmin |
0d530174-6eef-11e1-afd6-14dae9ebcf89 |
asterisk -- multiple vulnerabilities |
0d57c1d9-03f4-11e0-bf50-001a926c7637 |
krb5 -- multiple checksum handling vulnerabilities |
0d584493-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- routed(8) remote denial of service vulnerability |
0d6efbe3-52d9-11ec-9472-e3667ed6088e |
mailman < 2.1.38 -- CSRF vulnerability of list mod or member against list admin page |
0d724b05-687f-4527-9c03-af34d3b094ec |
ImageMagick -- multiple vulnerabilities |
0d732fd1-27e0-11e5-a4a5-002590263bf5 |
xen-tools -- HVM qemu unexpectedly enabling emulated VGA graphics backends |
0d7d104c-c6fb-11ed-8a4b-080027f5fec9 |
curl -- multiple vulnerabilities |
0d9ba03b-0dbb-42b4-ae0f-60e27af78e22 |
sympa -- buffer overflow in "queue" |
0da404ad-1891-11e5-a1cf-002590263bf5 |
chicken -- Potential buffer overrun in string-translate* |
0da4db89-84bf-11ee-8290-a8a1599412c6 |
chromium -- multiple security fixes |
0da8a68e-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Multiple integer overflows in expat (libbsdxml) XML parser |
0dad9114-60cc-11e4-9e84-0022156e8794 |
jenkins -- slave-originated arbitrary code execution on master servers |
0db46f84-b9fa-11ec-89df-080027240888 |
Django -- multiple vulnerabilities |
0dc8be9e-19af-11e6-8de0-080027ef73ec |
OpenVPN -- Buffer overflow in PAM authentication and DoS through port sharing |
0dc91089-ca41-11df-aade-0050568f000c |
FreeBSD -- Unvalidated input in nfsclient |
0dccaa28-7f3c-11dd-8de5-0030843d3802 |
python -- multiple vulnerabilities |
0dcf68fa-5c31-11ec-875e-901b0e9408dc |
Matrix clients -- several vulnerabilities |
0ddb57a9-da20-4e99-b048-4366092f3d31 |
bzip2 -- integer overflow vulnerability |
0dfa5dde-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Local privilege escalation in IRET handler |
0e0385d1-9ed5-11e5-8f5c-002590263bf5 |
redmine -- multiple vulnerabilities |
0e06013e-6a06-11ea-92ab-00163e433440 |
FreeBSD -- TCP IPv6 SYN cache kernel information disclosure |
0e154a9c-5d7a-11d8-80e3-0020ed76ef5a |
seti@home remotely exploitable buffer overflow |
0e1e3789-d87f-11dd-8ecd-00163e000016 |
vim -- multiple vulnerabilities in the netrw module |
0e254b4a-1f37-11ee-a475-080027f5fec9 |
redis -- Heap overflow in the cjson and cmsgpack libraries |
0e30e802-a9db-11dd-93a2-000bcdf0a03b |
opera -- multiple vulnerabilities |
0e38b8f8-75dd-11eb-83f2-8c164567ca3c |
redis -- Integer overflow on 32-bit systems |
0e3dfdde-35c4-11e6-8e82-002590263bf5 |
flash -- multiple vulnerabilities |
0e425bb7-64f2-11e5-b2fd-00262d5ed8ee |
chromium -- multiple vulnerabilities |
0e43a14d-3f3f-11dc-a79a-0016179b2dd5 |
xpdf -- stack based buffer overflow |
0e561173-0fa9-11ec-a2fa-080027948c12 |
Python -- multiple vulnerabilities |
0e561c06-d13a-11eb-92be-0800273f11ea |
gitea -- multiple vulnerabilities |
0e575ed3-0764-11dc-a80b-0016179b2dd5 |
squirrelmail -- Cross site scripting in HTML filter |
0e5d6969-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- rpcbind(8) remote denial of service [REVISED] |
0e73964d-053a-481a-bf1c-202948d68484 |
electron29 -- multiple vulnerabilities |
0e8e1212-0ce5-11e1-849b-003067b2972c |
linux-flashplugin -- multiple vulnerabilities |
0e8f496a-b498-11e8-bdcf-74d435e60b7c |
py-asyncssh -- Allows bypass of authentication |
0eab001a-9708-11ec-96c9-589cfc0f81b0 |
typo3 -- XSS vulnerability in svg-sanitize |
0ebc6e78-7ac6-11e5-b35a-002590263bf5 |
Joomla! -- Core - SQL Injection/ACL Violation vulnerabilities |
0ecc1f55-45d0-11e5-adde-14dae9d210b8 |
unreal -- denial of service |
0ed71663-c369-11ea-b53c-d4c9ef517024 |
MySQL -- Multiple vulnerabilities |
0ef3398e-da21-11ee-b23a-080027a5b8e9 |
Django -- multiple vulnerabilities |
0f020b7b-e033-11e1-90a2-000c299b62e1 |
FreeBSD -- named(8) DNSSEC validation Denial of Service |
0f154810-16e4-11e5-a1cf-002590263bf5 |
rubygem-paperclip -- validation bypass vulnerability |
0f31b4e9-c827-11e9-9626-589cfc01894a |
Mozilla -- Stored passwords in 'Saved Logins' can be copied without master password entry |
0f37d765-c5d4-11db-9f82-000e0c2e438a |
OpenSSL -- Multiple problems in crypto(3) |
0f445859-7f0e-11ee-94b4-6cc21735f730 |
postgresql-server -- Buffer overrun from integer overflow in array modification |
0f488b7b-bbb9-11e4-903c-080027ef73ec |
e2fsprogs -- buffer overflow if s_first_meta_bg too big |
0f51f2c9-8956-11dd-a6fe-0030843d3802 |
proftpd -- Long Command Processing Vulnerability |
0f5a2b4d-694b-11d9-a9e7-0001020eed82 |
awstats -- remote command execution vulnerability |
0f62be39-e8e0-11e1-bea0-002354ed89bc |
OpenTTD -- Denial of Service |
0f66b901-715c-11e7-ad1f-bcaec565249c |
webkit2-gtk3 -- multiple vulnerabilities |
0f7598cc-9fe2-11ee-b47f-901b0e9408dc |
nebula -- security fix for terrapin vulnerability |
0f798bd6-8325-11ea-9a78-08002728f74c |
libntlm -- buffer overflow vulnerability |
0f8bf913-7efa-11ec-8c04-2cf05d620ecc |
polkit -- Local Privilege Escalation |
0f99a30c-7b4b-11ed-9168-080027f5fec9 |
curl -- multiple vulnerabilities |
0fa15e08-92ec-11e1-a94a-00215c6a37bb |
samba -- incorrect permission checks vulnerability |
0fcd3af0-a0fe-11e6-b1cf-14dae9d210b8 |
FreeBSD -- OpenSSL Remote DoS vulnerability |
0fe70bcd-2ce3-46c9-a64b-4a7da097db07 |
python -- possible integer overflow vulnerability |
0fe73a4a-1b18-11de-8226-0030843d3802 |
pivot-weblog -- file deletion vulnerability |
0ff0e9a6-4ee0-11d9-a9e7-0001020eed82 |
phpmyadmin -- command execution vulnerability |
0ff80f41-aefe-11ec-b4b6-d05099c0c059 |
gitea -- Improper/incorrect authorization |
100a9ed2-ee56-11dd-ab4f-0030843d3802 |
tor -- unspecified memory corruption vulnerability |
101f0aae-52d1-11e2-87fe-f4ce46b9ace8 |
puppet -- multiple vulnerabilities |
1020d401-6d2d-11eb-ab0b-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
10214bda-0902-4e3b-a2f9-9a68ef206a73 |
libbson -- Denial of Service |
1033750f-cab4-11d9-9aed-000e0c2e438a |
oops -- format string vulnerability |
103a47d5-27e7-11e5-a4a5-002590263bf5 |
xen-kernel -- Certain domctl operations may be abused to lock up the host |
103bf96a-6211-45ab-b567-1555ebb3a86a |
firefox -- Arbitrary code execution through unsanitized browser UI |
104beb63-af4d-11da-8414-0013d4a4a40e |
mplayer -- heap overflow in the ASF demuxer |
10720fe8-51e0-11e1-91c1-00215c6a37bb |
drupal -- multiple vulnerabilities |
107692a1-ee6c-11d9-8310-0001020eed82 |
acroread -- insecure temporary file creation |
107c7a76-beaa-11eb-b87a-901b0ef719ab |
FreeBSD -- Missing message validation in libradius(3) |
107e2ee5-f941-11da-b1fa-020039488e34 |
libxine -- buffer overflow vulnerability |
108a4be3-e612-11e9-9963-5f1753e0aca0 |
unbound -- parsing vulnerability |
1091d2d1-cb2e-11e5-b14b-bcaec565249c |
webkit -- UI spoof |
10968dfd-a687-11e6-b2d3-60a44ce6887b |
gitlab -- Directory traversal via "import/export" feature |
1098a15b-b0f6-42b7-b5c7-8a8646e8be07 |
mozilla -- multiple vulnerabilities |
10a24ce0-ab68-11ea-b9b8-641c67a117d8 |
znc -- Authenticated users can trigger an application crash |
10a6d0aa-0b1c-11e5-bb90-002590263bf5 |
libzmq4 -- V3 protocol handler vulnerable to downgrade attacks |
10bf8eed-b14d-11e5-9728-002590263bf5 |
qemu -- denial of service vulnerability in e1000 NIC support |
10c0fabc-b5da-11e7-816e-00bd5d1fff09 |
h2o -- DoS in workers |
10d14955-0e45-11e5-b6a8-002590263bf5 |
strongswan -- Information Leak Vulnerability |
10d73529-7f4b-11e4-af66-00215af774f0 |
unbound -- can be tricked into following an endless series of delegations, this consumes a lot of resources |
10dee731-c069-11ee-9190-84a93843eb75 |
OpenSSL -- Multiple vulnerabilities |
10e1d580-d174-11e9-a87f-a4badb2f4699 |
xymon-server -- multiple vulnerabilities |
10e3ed8a-db7f-11ea-8bdf-643150d3111d |
puppetdb -- Multiple vulnerabilities |
10e86b16-6836-11ee-b06f-0050569ceb3a |
Unallowed PHP script execution in GLPI |
10f7bc76-0335-4a88-b391-0b05b3a8ce1c |
NSS -- MD5 downgrade in TLS 1.2 signatures |
10f7f782-901c-11e6-a590-14dae9d210b8 |
ImageMagick -- multiple vulnerabilities |
10fd731c-8088-11e9-b6ae-001871ec5271 |
cyrus-imapd -- buffer overrun in httpd |
1110e286-dc08-11ea-beed-e09467587c17 |
chromium -- multiple vulnerabilities |
111aefca-2213-11e9-9c8d-6805ca0b3d42 |
phpMyAdmin -- File disclosure and SQL injection |
111f1f84-1d14-4ff2-a9ea-cf07119c0d3b |
libyaml heap overflow resulting in possible code execution |
11292460-3f2f-11e9-adcb-001b217b3468 |
Gitlab -- Multiple vulnerabilities |
11325357-1d3c-11eb-ab74-4c72b94353b5 |
wordpress -- multiple issues |
11351c82-9909-11e5-a9c8-14dae9d5a9d2 |
piwik -- multiple vulnerabilities |
1135e939-62b4-11ec-b8e2-1c1b0d9ea7e6 |
opengrok -- Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. |
1138b39e-6abb-11e9-a685-001b217b3468 |
Gitlab -- Multiple vulnerabilities |
113cd7e9-a4e2-11de-84af-001195e39404 |
fwbuilder -- security issue in temporary file handling |
114d70f3-3d16-11d9-8818-008088034841 |
Cyrus IMAPd -- PARTIAL command out of bounds memory corruption |
115a1389-858e-11e0-a76c-000743057ca2 |
Pubcookie Login Server -- XSS vulnerability |
116b0820-d59c-11da-8098-00123ffe8333 |
lifetype -- ADOdb "server.php" Insecure Test Script Security Issue |
11982747-544c-11ee-ac3e-a04a5edf46d9 |
routinator -- multiple vulnerabilities |
11a84092-8f9f-11db-ab33-000e0c2e438a |
gzip -- multiple vulnerabilities |
11bbccbc-03ee-11e0-bcdb-001fc61c2a55 |
krb5 -- multiple checksum handling vulnerabilities |
11c52bc6-97aa-11e5-b8df-14dae9d210b8 |
django -- information leak vulnerability |
11dc3890-0e64-11e8-99b0-d017c2987f9a |
OpenJPEG -- multiple vulnerabilities |
11e36890-d28c-11ec-a06f-d4c9ef517024 |
curl -- Multiple vulnerabilities |
11fcfa8f-ac64-11ea-9dab-000d3ab229d6 |
Node.js -- June 2020 Security Releases |
12156786-b18a-11eb-8cba-080027b00c2e |
cyrus-imapd -- Remote authenticated users could bypass intended access restrictions on certain server annotations. |
121fec01-c042-11e9-a73f-b36f5969f162 |
nghttp2 -- multiple vulnerabilities |
1225549f-ca91-11e2-b3b8-f0def16c5c1b |
passenger -- security vulnerability |
1225c888-56ea-11ed-b5c3-3065ec8fd3ec |
chromium -- Type confusion in V8 |
12488805-6773-11dc-8be8-02e0185f8d72 |
coppermine -- multiple vulnerabilities |
1257718e-be97-458a-9744-d938b592db42 |
node -- access to unintended files |
125f5958-b611-11e6-a9a5-b499baebfeaf |
Roundcube -- arbitrary command execution |
12741b1f-04f9-11ee-8290-a8a1599412c6 |
chromium -- multiple vulnerabilities |
127674c6-4a27-11ed-9f93-002b67dfc673 |
roundcube-thunderbird_labels -- RCE with custom label titles |
128deba6-ff56-11eb-8514-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
12b1a62d-6056-4d90-9e21-45fcde6abae4 |
gallery -- remote code injection via HTTP_POST_VARS |
12b336c6-fe36-11dc-b09c-001c2514716c |
mozilla -- multiple vulnerabilities |
12b7286f-16a2-11dc-b803-0016179b2dd5 |
webmin -- cross site scripting vulnerability |
12b7b4cf-1d53-11d9-814e-0001020eed82 |
wordpress -- XSS in administration panel |
12bd6ecf-c430-11db-95c5-000c6ec775d9 |
mozilla -- multiple vulnerabilities |
12c7b7ae-ec90-11d8-b913-000c41e2cdad |
popfile file disclosure |
12d1b5a6-e39d-11e5-9f77-5453ed2e2b49 |
websvn -- reflected cross-site scripting |
12d266b6-363f-11dc-b6c9-000c6ec775d9 |
opera -- multiple vulnerabilities |
12e3feab-a29f-11ef-af48-6cc21735f730 |
PostgreSQL -- SET ROLE, SET SESSION AUTHORIZATION reset to wrong user ID |
12efc567-9879-11dd-a5e7-0030843d3802 |
drupal -- multiple vulnerabilities |
12f9d9e9-9e1e-11da-b410-000e0c2e438a |
phpicalendar -- cross site scripting vulnerability |
13031d98-9bd1-11e2-a7be-8c705af55518 |
FreeBSD -- BIND remote denial of service |
131bd7c4-64a3-11d9-829a-000a95bc6fae |
libxine -- DVD subpicture decoder heap overflow |
13320091-52a6-11e2-a289-1c4bd681f0cf |
otrs -- XSS vulnerability |
1340fcc1-2953-11e9-bc44-a4badb296695 |
mail/dovecot -- Suitable client certificate can be used to login as other user |
13419364-1685-11e4-bf04-60a44c524f57 |
i2p -- Multiple Vulnerabilities |
134acaa2-51ef-11e2-8e34-0022156e8794 |
tomcat -- denial of service |
1374b96c-a1c2-11db-9ddc-0011098b2f36 |
sircd -- remote reverse DNS buffer overflow |
1384f2fd-b1be-11e5-9728-002590263bf5 |
qemu -- denial of service vulnerability in Rocker switch emulation |
13960f55-8d35-11e9-9ba0-4c72b94353b5 |
mybb -- vulnerabilities |
1396a74a-4997-11e9-b5f1-83edb3f89ba1 |
Rails -- Action View vulnerabilities |
13a8c4bf-cb2b-48ec-b49c-a3875c72b3e8 |
electron{26,27,28} -- Use after free in Web Audio |
13b0c8c8-bee0-11dd-a708-001fc66e7203 |
p5-File-Path -- rmtree allows creation of setuid files |
13bf0602-c08a-11e2-bb21-083e8ed0f47b |
plib -- buffer overflow |
13c54e6d-5c45-11eb-b4e2-001b217b3468 |
nokogiri -- Security vulnerability |
13ca36b8-6141-11eb-8a36-7085c2fb2c14 |
pngcheck -- Buffer-overrun vulnerability |
13d37672-9791-11eb-b87a-901b0ef719ab |
FreeBSD -- Memory disclosure by stale virtual memory mapping |
13d6d997-f455-11dd-8516-001b77d09812 |
sudo -- certain authorized users could run commands as any user |
13d83980-9f18-11ee-8e38-002590c1f29c |
FreeBSD -- Prefix Truncation Attack in the SSH protocol |
140a14b5-d615-11e8-b3cb-00e04c1ea73d |
drupal -- Drupal Core - Multiple Vulnerabilities |
140a20e1-8769-11ed-b074-002b67dfc673 |
webtrees -- vulnerability |
141f2a22-a6a7-11ef-b282-0c9d92850f7a |
xorg server -- _XkbSetCompatMap vulnerability |
142353df-b5cc-11d9-a788-0001020eed82 |
gaim -- remote DoS on receiving malformed HTML |
142c538e-b18f-40a1-afac-c479effadd5c |
openvpn -- two security fixes |
1431a25c-8a70-11eb-bd16-0800278d94f0 |
gitea -- quoting in markdown text |
1431f2d6-a06e-11e2-b9e0-001636d274f3 |
NVIDIA UNIX driver -- ARGB cursor buffer overflow in "NoScanout" mode |
143ec3d6-b7cf-11e7-ac58-b499baebfeaf |
cURL -- out of bounds read |
143f6932-fedb-11e1-ad4a-003067b2972c |
bacula -- Console ACL Bypass |
144836e3-2358-11ef-996e-40b034455553 |
minio -- privilege escalation via permissions inheritance |
144e524a-77eb-11df-ae06-001b2134ef46 |
linux-flashplugin -- multiple vulnerabilities |
1455c86c-26c2-11e7-9daa-6cf0497db129 |
drupal8 -- Drupal Core - Critical - Access Bypass |
145a3e17-cea2-11e9-81e2-005056a311d1 |
samba -- combination of parameters and permissions can allow user to escape from the share path definition |
145ce848-1165-11ec-ac7e-08002789875b |
Python -- multiple vulnerabilities |
1460aa25-e6ab-11e8-a733-e0d55e2a8bf9 |
kio-extras -- HTML Thumbnailer automatic remote file access |
147353a3-c33b-46d1-b751-e72c0d7f29df |
electron{25,26} -- use after free in Garbage Collection |
1489df94-6bcb-11d9-a21e-000a95bc6fae |
opera -- multiple vulnerabilities in Java implementation |
14908bda-232b-11ef-b621-00155d645102 |
cyrus-imapd -- unbounded memory allocation |
1495f931-8522-11e0-a1c1-00215c6a37bb |
pureftpd -- multiple vulnerabilities |
14a37474-1383-11e0-8a58-00215c6a37bb |
django -- multiple vulnerabilities |
14a3b376-b30a-11e9-a87f-a4badb2f4699 |
FreeBSD -- Privilege escalation in cd(4) driver |
14a6f516-502f-11e0-b448-bbfa2731f9c7 |
postfix -- plaintext command injection with SMTP over TLS |
14ab174c-40ef-11de-9fd5-001bd3385381 |
cyrus-sasl -- buffer overflow vulnerability |
14ad2a28-66d2-11dc-b25f-02e0185f8d72 |
konquerer -- address bar spoofing |
14d846d6-27b3-11e5-a15a-50af736ef1c0 |
pivotx -- cross-site scripting (XSS) vulnerability |
14ea4458-e5cd-11e6-b56d-38d547003487 |
wordpress -- multiple vulnerabilities |
150d1538-23fa-11e5-a4a5-002590263bf5 |
squid -- Improper Protection of Alternate Path with CONNECT requests |
150e4548-8950-11dd-a6fe-0030843d3802 |
phpmyadmin -- Cross-Site Scripting Vulnerability |
15236023-a21b-11e2-a460-208984377b34 |
linux-flashplugin -- multiple vulnerabilities |
152acff3-b1bd-11e5-9728-002590263bf5 |
qemu -- denial of service vulnerability in Q35 chipset emulation |
152b27f0-a158-11de-990c-e5b1d4c882e0 |
nginx -- remote denial of service vulnerability |
152e4c7e-2a2e-11e2-99c7-00a0d181e71d |
tomcat -- authentication weaknesses |
15485ae8-9848-11dc-9e48-0016179b2dd5 |
phpmyadmin -- Cross Site Scripting |
1567be8c-0a15-11ee-8290-a8a1599412c6 |
chromium -- multiple vulnerabilities |
157ce083-d145-11ec-ab9b-6cc21735f730 |
PostgreSQL Server -- execute arbitrary SQL code as DBA user |
1583640d-be20-11dd-a578-0030843d3802 |
samba -- potential leakage of arbitrary memory contents |
15888c7e-e659-11ec-b7fe-10c37b4ac2ea |
go -- multiple vulnerabilities |
15a04b9f-47cb-11e7-a853-001fbc0f280f |
ansible -- Input validation flaw in jinja2 templating system |
15a62f22-098a-443b-94e2-2d26c375b993 |
osip -- Improper Restriction of Operations within the Bounds of a Memory Buffer |
15d398ea-4f73-11ef-8a0f-a8a1599412c6 |
chromium -- multiple security fixes |
15dae5cc-9ee6-4577-a93e-2ab57780e707 |
py39-sentry-sdk -- sensitive cookies leak |
15e0e963-02ed-11d9-a209-00061bc2ad93 |
mpg123 buffer overflow |
15e74795-0fd7-11ec-9f2e-dca632b19f10 |
libpano13 -- arbitrary memory access through format string vulnerability |
15ec9123-7061-11dc-b372-001921ab2fa4 |
id3lib -- insecure temporary file creation |
15ee0e93-4bbb-11e9-9ba0-4c72b94353b5 |
wordpress -- multiple issues |
1606b03b-ac57-11eb-9bdd-8c164567ca3c |
redis -- multiple vulnerabilities |
1613db79-8e52-11da-8426-000fea0a9611 |
kpopup -- local root exploit and local denial of service |
162a675b-6251-11ee-8e38-002590c1f29c |
FreeBSD -- arm64 boot CPUs may lack speculative execution protections |
1650cee2-a320-11ea-a090-08002734b9ed |
gitea -- multiple vulnerabilities |
1657a3e6-4585-11e2-a396-10bf48230856 |
linux-flashplugin -- multiple vulnerabilities |
165e8951-4be0-11e7-a539-0050569f7e80 |
irssi -- remote DoS |
167953a4-b01c-11df-9a98-0015587e2cc1 |
quagga -- stack overflow and DoS vulnerabilities |
168190df-3e9a-11dd-87bc-000ea69a5213 |
fetchmail -- potential crash in -v -v verbose mode |
16846d1e-f1de-11e1-8bd8-0022156e8794 |
Java 1.7 -- security manager bypass |
1685144e-63ff-11ea-a93a-080027846a02 |
Django -- potential SQL injection vulnerability |
169f422f-bd88-11d9-a281-02e018374e71 |
groff -- groffer uses temporary files unsafely |
16aed7b7-344a-11ea-9cdb-001b217b3468 |
phpMyAdmin -- SQL injection |
16f7ec68-5cce-11ed-9be7-454b1dd82c64 |
Gitlab -- Multiple vulnerabilities |
16fb4f83-a2ab-11e7-9c14-009c02a2ab30 |
ImageMagick -- denial of service via a crafted font file |
17083017-d993-43eb-8aaf-7138f4486d1c |
py39-unicorn -- sandbox escape and arbitrary code execution vulnerability |
1709084d-4d21-11db-b48d-00508d6a62df |
plans -- multiple vulnerabilities |
17133e7e-d764-11e7-b5af-a4badb2f4699 |
varnish -- information disclosure vulnerability |
171afa61-3eba-11ef-a58f-080027836e8b |
Django -- multiple vulnerabilities |
172acf78-780c-11dc-b3f4-0016179b2dd5 |
png -- multiple vulnerabilities |
172b22cb-d3f6-11e5-ac9e-485d605f4717 |
firefox -- Same-origin-policy violation using Service Workers with plugins |
17326fd5-fcfb-11e2-9bb9-6805ca0b3d42 |
phpMyAdmin -- clickJacking protection can be bypassed |
174b8864-6237-11e1-be18-14dae938ec40 |
databases/postgresql*-client -- multiple vulnerabilities |
174e466b-1d48-11eb-bd0f-001b217b3468 |
Gitlab -- Multiple vulnerabilities |
1753f0ff-8dd5-11e3-9b45-b4b52fce4ce8 |
mozilla -- multiple vulnerabilities |
1766359c-ad6e-11eb-b2a4-080027e50e6d |
Django -- multiple vulnerabilities |
17702e54-3da0-11ec-b7e0-3085a9a95629 |
pyrad -- multiple vulnerabilities |
177fa455-48fc-4ded-ba1b-9975caa7f62a |
bro -- Unsafe integer conversions can cause unintentional code paths to be executed |
178ba4ea-fd40-11e1-b2ae-001fd0af1a4c |
mod_pagespeed -- multiple vulnerabilities |
17a30a24-c579-11ec-bbbd-0800270512f4 |
eb -- Potential buffer overrun vulnerability |
17cb6ff3-7670-11e8-8854-6805ca0b3d42 |
phpmyadmin -- remote code inclusion and XSS scripting |
17dfd984-feba-11e3-b938-5404a68ad561 |
mencoder -- potential buffer overrun when processing malicious lzo compressed input |
17efbe19-4e72-426a-8016-2b4e001c1378 |
py-wagtail -- stored XSS vulnerability |
17f369dc-d7e7-11e1-90a2-000c299b62e1 |
nsd -- Denial of Service |
17f53c1d-2ae9-11db-a6e2-000e0c2e438a |
postgresql -- encoding based SQL injection |
1800886c-3dde-11e1-89b4-001ec9578670 |
isc-dhcp-server -- DoS in DHCPv6 |
180e9a38-060f-4c16-a6b7-49f3505ff22a |
kernel -- information disclosure when using HTT |
181beef6-2482-11e9-b4a3-00155d006b02 |
turnserver -- multiple vulnerabilities |
181f5e49-b71d-4527-9464-d4624d69acc3 |
py-treq -- sensitive information leak vulnerability |
18201a1c-d59a-11e5-8fa8-14dae9d210b8 |
adminer -- XSS vulnerability |
18211552-f650-4d86-ba4f-e6d5cbfcdbeb |
mozilla -- multiple vulnerabilities |
1827f213-633e-11e2-8d93-c8600054b392 |
drupal -- multiple vulnerabilities |
1839f78c-9f2b-11e3-980f-20cf30e32f6d |
subversion -- mod_dav_svn vulnerability |
183d700e-ec70-487e-a9c4-632324afa934 |
ImageMagick -- multiple vulnerabilities |
18449f92-ab39-11e6-8011-005056925db4 |
libwww -- multiple vulnerabilities |
184ab9e0-64cd-11d9-9e1e-c296ac722cb3 |
squid -- buffer overflow vulnerability in gopherToHTML |
184f5d0b-0fe8-11d9-8a8a-000c41e2cdad |
subversion -- WebDAV fails to protect metadata |
18529cb0-3e9c-11ed-9bc7-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
185ff22e-c066-11e1-b5e0-000c299b62e1 |
FreeBSD -- Incorrect crypt() hashing |
187ab98e-2953-4495-b379-4060bd4b75ee |
py27-setuptools44 -- denial of service vulnerability |
1886e195-8b87-11e5-90e7-b499baebfeaf |
libpng buffer overflow in png_set_PLTE |
18974c8a-1fbd-11d9-814e-0001020eed82 |
apache13-modssl -- format string vulnerability in proxy support |
18a14baa-5ee5-11db-ae08-0008743bf21a |
ingo -- local arbitrary shell command execution |
18ac074c-579f-11ec-aac7-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
18b3c61b-83de-11e5-905b-ac9e174be3af |
OpenOffice 4.1.1 -- multiple vulnerabilities |
18ce9a90-f269-11e1-be53-080027ef73ec |
fetchmail -- chosen plaintext attack against SSL CBC initialization vectors |
18dc48fe-ca42-11df-aade-0050568f000c |
FreeBSD -- Integer overflow in bzip2 decompression |
18dffa02-946a-11e1-be9d-000c29cc39d3 |
WebCalendar -- multiple vulnerabilities |
18e3a5be-81f9-11db-95a2-0012f06707f0 |
ImageMagick -- SGI Image File heap overflow vulnerability |
18e5428f-ae7c-11d9-837d-000e0c2e438a |
jdk -- jar directory traversal vulnerability |
18ed9650-a1d6-11e9-9b17-fcaa147e860e |
python 3.6 -- multiple vulnerabilities |
18f39fb6-7400-4063-acaf-0806e92c094f |
Mozilla -- SVG Animation Remote Code Execution |
190176ce-3b3a-11eb-af2a-080027dbe4b7 |
glpi -- Insecure Direct Object Reference on ajax/comments.ph |
19047673-c680-11ee-86bb-a8a1599412c6 |
chromium -- multiple security fixes |
19207592-5f17-11db-ae08-0008743bf21a |
drupal -- HTML attribute injection |
19259833-26b1-11eb-a239-1c697a013f4b |
mantis -- multiple vulnerabilities |
192609c8-0c51-11df-82a0-00248c9b4be7 |
irc-ratbox -- multiple vulnerabilities |
19419b3b-92bd-11df-b140-0015f2db7bde |
webkit-gtk2 -- Multiple vulnerabilities |
19518d22-2d05-11d9-8943-0050fc56d258 |
putty -- buffer overflow vulnerability in ssh2 support |
1959e847-d4f0-11e3-84b0-0018fe623f2b |
OpenSSL -- NULL pointer dereference / DoS |
196b31b8-aa9a-11ea-a59a-6451062f0f7a |
Flash Player -- arbitrary code execution |
19751e06-c798-11e2-a373-000c29833058 |
znc -- null pointer dereference in webadmin module |
197f444f-e8ef-11d9-b875-0001020eed82 |
bzip2 -- denial of service and permission race vulnerabilities |
1986449a-8b74-40fa-b7cc-0d8def8aad65 |
openvpn -- denial of service: malicious authenticated "tap" client can deplete server virtual memory |
1989b511-ae62-11d9-a788-0001020eed82 |
mozilla -- code execution through javascript: favicons |
198a120d-c22d-11ea-9172-4c72b94353b5 |
mybb -- multible vulnerabilities |
198d82f3-8777-11e7-950a-e8e0b747a45a |
dnsdist -- multiple vulnerabilities |
198e6220-ac8b-11e9-a1c7-b499baebfeaf |
MySQL -- Multiple vulerabilities |
1999a215-fc6b-11e8-8a95-ac1f6b67e138 |
couchdb -- administrator privilege escalation |
199cdb4d-690d-11ee-9ed0-001fc69cd6dc |
x11/libXpm multiple vulnerabilities |
19a92df1-548d-11db-8f1a-000a48049292 |
tin -- buffer overflow vulnerabilities |
19b052c9-c533-11e7-8da5-001999f8d30b |
asterisk -- Buffer overflow in pjproject header parsing can cause crash in Asterisk |
19b17ab4-51e0-11db-a5ae-00508d6a62df |
phpmyadmin -- XSRF vulnerabilities |
19d35b0f-ba73-11e6-b1cf-14dae9d210b8 |
ImageMagick -- heap overflow vulnerability |
19d648e0-ab69-11e9-bfef-000ffec0b3e1 |
drupal -- Drupal core - Access bypass |
19e6dd1b-c6a5-11ee-9cd0-6cc21735f730 |
postgresql-server -- non-owner REFRESH MATERIALIZED VIEW CONCURRENTLY executes arbitrary SQL |
1a0704e7-0edf-11e0-becc-0022156e8794 |
php-imap -- Denial of Service |
1a0de610-a761-11e3-95fe-bcaec565249c |
freetype2 -- Out of bounds read/write |
1a0e4cc6-29bf-11de-bdeb-0030843d3802 |
phpmyadmin -- insufficient output sanitizing when generating configuration file |
1a15b928-5011-4953-8133-d49e24902fe1 |
py-WsgiDAV -- XSS vulnerability |
1a216dfd-f710-11da-9156-000e0c2e438a |
freeradius -- authentication bypass vulnerability |
1a2aa04f-3718-11e6-b3c8-14dae9d210b8 |
libxslt -- Denial of Service |
1a32e8ee-3edb-11d9-8699-00065be4b5b6 |
ProZilla -- server response buffer overflow vulnerabilities |
1a3bd81f-1b25-11df-bd1a-002170daae37 |
lighttpd -- denial of service vulnerability |
1a448eb7-6988-11d8-873f-0020ed76ef5a |
mod_python denial-of-service vulnerability in parse_qs |
1a6b7641-aed2-4ba1-96f4-c282d5b09c37 |
zeek -- Various vulnerabilities |
1a6bbb95-24b8-11e6-bd31-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
1a71a972-8ee7-11e6-a590-14dae9d210b8 |
FreeBSD -- Multiple libarchive vulnerabilities |
1a75c84a-11c8-11e8-83e7-485b3931c969 |
bitmessage -- remote code execution vulnerability |
1a802ba9-f444-11e6-9940-b499baebfeaf |
openssl -- crash on handshake |
1a818749-d646-11dc-8959-000bcdc1757a |
zenphoto -- XSS vulnerability |
1a9f678d-48ca-11df-85f8-000c29a67389 |
sudo -- Privilege escalation with sudoedit |
1aa7a094-1147-11ea-b537-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
1aaaa5c6-804d-11ec-8be6-d4c9ef517024 |
OpenSSL -- BN_mod_exp incorrect results on MIPS |
1ab7357f-a3c2-406a-89fb-fd00e49a71b5 |
zeek -- potential DoS vulnerabilities |
1ac77649-0908-11dd-974d-000fea2763ce |
lighttpd -- OpenSSL Error Queue Denial of Service Vulnerability |
1ac858b0-3fae-11e1-a127-0013d3ccd9df |
OpenTTD -- Denial of service (server) via slow read attack |
1acf9ec5-877d-11e0-b937-001372fd0af2 |
drupal6 -- multiple vulnerabilities |
1ad3d264-e36b-11ee-9c27-40b034429ecf |
typo3-{11,12} -- multiple vulnerabilities |
1ae613c3-5728-11e2-9483-14dae938ec40 |
freetype -- Multiple vulnerabilities |
1af16f2b-023c-11ef-8791-6805ca2fa271 |
powerdns-recursor -- denial of service |
1afe9552-5ee3-11ea-9b6d-901b0e934d69 |
py-matrix-synapse -- users of single-sign-on are vulnerable to phishing |
1b043693-8617-11db-93b2-000e35248ad7 |
libxine -- multiple buffer overflow vulnerabilities |
1b0d2938-0766-11e6-94fa-002590263bf5 |
libtasn1 -- denial of service parsing malicious DER certificates |
1b15a554-c981-11ed-bb39-901b0e9408dc |
tailscale -- security vulnerability in Tailscale SSH |
1b27af46-d6f6-11e0-89a6-080027ef73ec |
ca_root_nss -- extraction of explicitly-untrusted certificates into trust bundle |
1b2a8e8a-9fd5-11ee-86bb-a8a1599412c6 |
chromium -- security fix |
1b38aec4-4149-4c7d-851c-3c4de3a1fbd0 |
py39-setuptools -- denial of service vulnerability |
1b3f854b-e4bd-11de-b276-000d8787e1be |
freeradius -- remote packet of death vulnerability |
1b61ecef-cdb9-11e6-a9a5-b499baebfeaf |
PHP -- multiple vulnerabilities |
1b6a10e9-4b7b-11e9-9e89-54e1ad3d6335 |
libXdmcp -- insufficient entropy generating session keys |
1b70bef4-649f-11d9-a30e-000a95bc6fae |
libxine -- multiple buffer overflows in RTSP |
1b725079-9ef6-11da-b410-000e0c2e438a |
sudo -- arbitrary command execution |
1b769b72-582b-11e2-b66b-00e0814cab4e |
django -- multiple vulnerabilities |
1b93f6fe-e1c1-11e2-948d-6805ca0b3d42 |
phpMyAdmin -- Global variable scope injection |
1b9b199f-5efd-11e2-a1ee-c48508086173 |
ettercap -- buffer overflow in target list parsing |
1ba034fb-ca38-11ed-b242-d4c9ef517024 |
OpenSSL -- Excessive Resource Usage Verifying X.509 Policy Constraints |
1ba21ff1-e672-11eb-a686-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
1bb2826b-7229-11eb-8386-001999f8d30b |
asterisk -- Remote Crash Vulnerability in PJSIP channel driver |
1bc07be0-b514-11ee-86bb-a8a1599412c6 |
chromium -- multiple security fixes |
1bcfd963-e483-41b8-ab8e-bad5c3ce49c9 |
brotli -- buffer overflow |
1bdd4db6-2223-11ec-91be-001b217b3468 |
Gitlab -- vulnerabilities |
1c0def84-5fb1-11db-b2e9-0008c79fa3d2 |
asterisk -- remote heap overwrite vulnerability |
1c21f6a3-9415-11e9-95ec-6805ca2fa271 |
powerdns -- multiple vulnerabilities |
1c27a706-e3aa-11e8-b77a-6cc21735f730 |
PostgreSQL -- SQL injection in pg_upgrade and pg_dump |
1c2a9d76-9d98-43c3-8f5d-8c059b104d99 |
jenkins -- multiple issues |
1c3142a3-4ab2-11da-932d-00055d790c25 |
squid -- FTP server response handling denial of service |
1c4cab30-5468-11e1-9fb7-003067b2972c |
bip -- buffer overflow |
1c5abbe2-8d7f-11e1-a374-14dae9ebcf89 |
asterisk -- multiple vulnerabilities |
1c5f3fd7-54bf-11ed-8d1e-005056a311d1 |
samba -- buffer overflow in Heimdal unwrap_des3() |
1c7cfd05-aaee-11e4-83b4-14dae9d210b8 |
Xymon -- buffer overrun |
1c840eb9-fb32-11e3-866e-b499baab0cbe |
gnupg -- possible DoS using garbled compressed data packets |
1c8a039b-7b23-11e2-b17b-20cf30e32f6d |
bugzilla -- multiple vulnerabilities |
1c9178aa-2709-11ea-9673-4c72b94353b5 |
typo3 -- multiple vulnerabilities |
1c948fd3-dac0-11e9-81b2-0011d823eebd |
Mbed TLS -- Side channel attack on deterministic ECDSA |
1ca8228f-858d-11e0-a76c-000743057ca2 |
mod_pubcookie -- Empty Authentication Security Advisory |
1cae628c-3569-11e0-8e81-0022190034c0 |
rubygem-mail -- Remote Arbitrary Shell Command Injection Vulnerability |
1cb0af4e-d641-4f99-9432-297a89447a97 |
webkit-gtk3 -- Multiple vulnerabilities |
1cd0c17a-17c0-11ed-91a5-080027f5fec9 |
gnutls -- double free vulnerability |
1cd3ca42-33e6-11e2-a255-5404a67eef98 |
lighttpd -- remote DoS in header parsing |
1cd565da-455e-41b7-a5b9-86ad8e81e33e |
seatd-launch -- remove files with escalated privileges with SUID |
1cd87e2a-81e3-11df-81d8-00262d5ed8ee |
mDNSResponder -- corrupted stack crash when parsing bad resolv.conf |
1cd89254-b2db-11e9-8001-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
1ce95bc7-3278-11e8-b527-00012e582166 |
webkit2-gtk3 -- multiple vulnerabilities |
1cecd5e0-c372-11e5-96d6-14dae9d210b8 |
xymon-server -- multiple vulnerabilities |
1cf00643-ed8a-11d9-8310-0001020eed82 |
cacti -- multiple vulnerabilities |
1cf65085-a760-41d2-9251-943e1af62eb8 |
X.org libraries -- multiple vulnerabilities |
1d0f6852-33d8-11e6-a671-60a44ce6887b |
Python -- Integer overflow in zipimport module |
1d193bba-03f6-11e0-bf50-001a926c7637 |
krb5 -- RFC 3961 key-derivation checksum handling vulnerability |
1d23109a-9005-11e2-9602-d43d7e0c7c02 |
php5 -- Multiple vulnerabilities |
1d33cdee-7f6b-11e7-a9b5-3debb10a6871 |
Mercurial -- multiple vulnerabilities |
1d3677a8-9143-42d8-84a3-0585644dff4b |
h2o -- uninitialised memory access in HTTP3 |
1d3a2737-7eb7-11d9-acf7-000854d03344 |
unace -- multiple vulnerabilities |
1d567278-87a5-11e4-879c-000c292ee6b8 |
git -- Arbitrary command execution on case-insensitive filesystems |
1d56cfc5-3970-11eb-929d-d4c9ef517024 |
OpenSSL -- NULL pointer de-reference |
1d6410e8-06c1-11ec-a35d-03ca114d16d6 |
fetchmail -- STARTTLS bypass vulnerabilities |
1d651770-f4f5-11eb-ba49-001b217b3468 |
Gitlab -- Gitlab |
1d8ff4a2-0445-11e0-8e32-000f20797ede |
mozilla -- multiple vulnerabilities |
1d951e85-ffdb-11e7-8b91-e8e0b747a45a |
chromium -- multiple vulnerabilities |
1d96305d-6ae6-11dd-91d5-000c29d47fd7 |
Bugzilla -- Directory Traversal in importxml.pl |
1daea60a-4719-11da-b5c6-0004614cc33d |
ruby -- vulnerability in the safe level settings |
1db1ed59-af07-11d8-acb9-000d610a3b12 |
buffer cache invalidation implementation issues |
1db7ecf5-fd24-11d9-b4d6-0007e900f87b |
clamav -- multiple remote buffer overflows |
1dd84344-a7da-11ed-86e9-d4c9ef517024 |
LibreSSL -- Arbitrary memory read |
1ddab5cb-14c9-4632-959f-802c412a9593 |
jenkins -- multiple vulnerabilities |
1e1421f0-8d6f-11e0-89b4-001ec9578670 |
BIND -- Large RRSIG RRsets and Negative Caching DoS |
1e14d46f-af1f-11e1-b242-00215af774f0 |
quagga -- BGP OPEN denial of service vulnerability |
1e232a0c-eb57-11e4-b595-4061861086c1 |
Several vulnerabilities found in PHP |
1e37fa3e-5988-4991-808f-eae98047e2af |
py-httpie -- exposure of sensitive information vulnerabilities |
1e54d140-8493-11e8-a795-0028f8d09152 |
couchdb -- multiple vulnerabilities |
1e606080-3293-11da-ac91-020039488e34 |
uim -- privilege escalation vulnerability |
1e63db88-1050-11e5-a4df-c485083ca99c |
Adobe Flash Player -- critical vulnerabilities |
1e6c4008-245f-11d9-b584-0050fc56d258 |
gaim -- buffer overflow in MSN protocol support |
1e71e366-080b-4e8f-a9e6-150bf698186b |
chromium -- multiple security fixes |
1e7b316b-c6a8-11ea-a7d5-001999f8d30b |
VirtualBox -- Multiple vulnerabilities |
1e7f0c11-673a-11e5-98c8-60a44c524f57 |
otrs -- Scheduler Process ID File Access |
1e7fa41b-f6ca-4fe8-bd46-0e176b42b14f |
libssh -- Unsanitized location in scp could lead to unwanted command execution |
1e8031be-4258-11de-b67a-0030843d3802 |
php -- ini database truncation inside dba_replace() function |
1e8e63c0-478a-11dd-a88d-000ea69a5213 |
fetchmail -- potential crash in -v -v verbose mode (revised patch) |
1ea05bb8-5d74-11ec-bb1e-001517a2e1a4 |
serviio -- affected by log4j vulnerability |
1eb4d32c-a245-11ef-998c-2cf05da270f3 |
Gitlab -- vulnerabilities |
1ec1c59b-0e98-11e8-83e7-485b3931c969 |
bchunk -- heap-based buffer overflow and crash |
1ecc0d3f-ae8e-11e1-965b-0024e88a8c98 |
dns/bind9* -- zero-length RDATA can cause named to terminate, reveal memory |
1ece5591-4ea9-11ea-86f0-001b217b3468 |
Gitlab -- Vulnerability |
1ecf4ca1-f7ad-11d8-96c9-00061bc2ad93 |
moinmoin -- ACL group bypass |
1ed03222-3c65-11dc-b3d3-0016179b2dd5 |
vim -- Command Format String Vulnerability |
1edae47e-1cdd-11ea-8c2a-08002743b791 |
samba -- multiple vulnerabilities |
1ee26d45-6ddb-11ee-9898-00e081b7aa2d |
jenkins -- HTTP/2 denial of service vulnerability in bundled Jetty |
1f02af5d-c566-11e7-a12d-6cc21735f730 |
PostgreSQL vulnerabilities |
1f0421b1-8398-11ed-973d-002b67dfc673 |
freerdp -- multiple vulnerabilities |
1f0d0024-ac9c-11ee-8e91-1c697a013f4b |
mantis -- multiple vulnerabilities |
1f1124fe-de5c-11e5-8fa8-14dae9d210b8 |
tomcat -- multiple vulnerabilities |
1f2fdcff-ae60-11d9-a788-0001020eed82 |
firefox -- arbitrary code execution in sidebar panel |
1f5b711b-3d0e-11dc-b3d3-0016179b2dd5 |
drupal -- Multiple cross-site scripting vulnerabilities |
1f655433-551b-11eb-9cda-589cfc0f81b0 |
phpmyfaq -- XSS vulnerability |
1f6d97da-8f72-11eb-b3f1-005056a311d1 |
samba -- Multiple Vulnerabilities |
1f6e2ade-35c2-11da-811d-0050bf27ba24 |
imap-uw -- mailbox name handling remote buffer vulnerability |
1f6ee708-0d22-11e1-b5bd-14dae938ec40 |
phpmyadmin -- Local file inclusion |
1f738bda-c6ac-11d8-8898-000d6111a684 |
Remote Denial of Service of HTTP server and client |
1f826757-26be-11d9-ad2d-0050fc56d258 |
rssh -- format string vulnerability |
1f8d5806-ac51-11e8-9cb6-10c37b4ac2ea |
grafana -- LDAP and OAuth login vulnerability |
1f8de723-dab3-11e7-b5af-a4badb2f4699 |
FreeBSD -- WPA2 protocol vulnerability |
1f922de0-3fe5-11d9-a9e7-0001020eed82 |
unarj -- directory traversal vulnerability |
1f935f61-075d-11db-822b-728b50d539a3 |
Joomla -- multiple vulnerabilities |
1f9e2376-c52f-11dd-8cbc-00163e000016 |
php5 -- potential magic_quotes_gpc vulnerability |
1fa4c9f1-cfca-11da-a672-000e0c2e438a |
FreeBSD -- FPU information disclosure |
1fade8a3-e9e8-11e0-9580-4061862b8c22 |
Mozilla -- multiple vulnerabilities |
1fb13175-ed52-11ea-8b93-001b217b3468 |
Gitlab -- multiple vulnerabilities |
1fbd6db1-a4e4-11e5-b864-14dae9d210b8 |
py-amf -- input sanitization errors |
1fccb25e-8451-438c-a2b9-6a021e4d7a31 |
nghttp2 -- Denial of service due to NULL pointer dereference |
1fe40200-6823-11ee-b06f-0050569ceb3a |
GLPI vulnerable to unauthorized access to KnowbaseItem data |
1fe734bf-4a06-11db-b48d-00508d6a62df |
opera -- RSA Signature Forgery |
1febd09b-7716-11ef-9a62-002590c1f29c |
FreeBSD -- bhyve(8) out-of-bounds read access via XHCI emulation |
20006b5f-a0bc-11eb-8ae6-fc4dd43e2b6a |
Apache Maven -- multiple vulnerabilities |
2001103a-6bbd-11d9-851d-000a95bc6fae |
imlib -- xpm heap buffer overflows and integer overflows |
2004616d-f66c-11e5-b94c-001999f8d30b |
Botan BER Decoder vulnerabilities |
20302cbc-6834-11ee-b06f-0050569ceb3a |
Users login enumeration by unauthenticated user in GLPI |
2040c7f5-1e3a-11e8-8ae9-0050569f0b83 |
isc-dhcp -- Multiple vulnerabilities |
204f1a7a-43df-412f-ad25-7dbe88f54fa4 |
zeek -- potential DoS vulnerabilty |
206f9826-a06d-4927-9a85-771c37010b32 |
node.js -- DoS Vulnerability |
2070c79a-8e1e-11e2-b34d-000c2957946c |
ModSecurity -- XML External Entity Processing Vulnerability |
207f8ff3-f697-11d8-81b0-000347a4fa7d |
nss -- exploitable buffer overflow in SSLv2 protocol handler |
20923a0d-82ba-11e1-8d7b-003067b2972c |
linux-flashplugin -- multiple vulnerabilities |
209f0d75-4b5c-11dc-a6cd-000fb5066b20 |
flyspray -- authentication bypass |
20a1881e-8a9e-11e8-bddf-d017c2ca229d |
jenkins -- multiple vulnerabilities |
20a4eb11-8ea3-11dc-a396-0016179b2dd5 |
tikiwiki -- multiple vulnerabilities |
20b3ab21-c9df-11eb-8558-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
20b46222-c12b-11ea-abe8-08002728f74c |
kramdown -- template option vulnerability |
20b4f284-2bfc-11de-bdeb-0030843d3802 |
freetype2 -- multiple vulnerabilities |
20b92374-d62a-11e9-af73-001b217e4ee5 |
ISC KEA -- Multiple vulnerabilities |
20be2982-4aae-11d8-96f2-0020ed76ef5a |
fsp buffer overflow and directory traversal vulnerabilities |
20c9bb14-81e6-11d9-a9e7-0001020eed82 |
opera -- "data:" URI handler spoofing vulnerability |
20d16518-2477-11d9-814e-0001020eed82 |
mpg123 -- buffer overflow in URL handling |
20dfd134-1d39-11d9-9be9-000c6e8f12ef |
freeradius -- denial-of-service vulnerability |
20e23b65-a52e-11e3-ae3a-00224d7c32a2 |
xmms -- Integer Overflow And Underflow Vulnerabilities |
210f80b9-ede4-11e4-81c4-00262d5ed8ee |
chromium -- multiple vulnerabilities |
214e8e07-d369-11dd-b800-001b77d09812 |
vinagre -- format string vulnerability |
215e740e-9c56-11e5-90e7-b499baebfeaf |
libressl -- NULL pointer dereference |
2184ccad-1a10-11e5-b43d-002590263bf5 |
logstash -- Remote command execution in Logstash zabbix and nagios_nsca outputs |
21944144-1b90-11ea-a2d4-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
219aaa1e-2aff-11ef-ab37-5404a68ad561 |
traefik -- Unexpected behavior with IPv4-mapped IPv6 addresses |
21a854cc-cac1-11ee-b7a7-353f1e043d9a |
DNSSEC validators -- denial-of-service/CPU exhaustion from KeyTrap and NSEC3 vulnerabilities |
21b7c550-2a22-11db-a6e2-000e0c2e438a |
squirrelmail -- random variable overwrite vulnerability |
21bc4d71-9ed8-11e5-8f5c-002590263bf5 |
redmine -- information leak vulnerability |
21c223f2-d596-11da-8098-00123ffe8333 |
ethereal -- Multiple Protocol Dissector Vulnerabilities |
21c59f5e-7cc5-11e2-9c11-080027a5ec9a |
django -- multiple vulnerabilities |
21ce1840-6107-11e4-9e84-0022156e8794 |
twiki -- remote Perl code execution |
21d59ea3-8559-11ea-a5e2-d4c9ef517024 |
MySQL Server -- Multiple vulerabilities |
21e5abe3-b0c6-11e5-8d13-bc5ff45d0f28 |
qemu -- buffer overflow vulnerability in virtio-serial message exchanges |
21ec4428-bdaa-11eb-a04e-641c67a117d8 |
libzmq4 -- Denial of Service |
21f12de8-b1db-11ed-b0f4-002590f2a714 |
git -- "git apply" overwriting paths outside the working tree |
21f43976-1887-11ed-9911-40b034429ecf |
rsync -- client-side arbitrary file write vulnerability |
21f505f4-6a1c-11ef-b611-84a93843eb75 |
OpenSSL -- Multiple vulnerabilities |
2220827b-c732-11ec-b272-901b0e934d69 |
hiredis -- integer/buffer overflow |
2225c5b4-1e5a-44fc-9920-b3201c384a15 |
mozilla -- multiple vulnerabilities |
22283b8c-13c5-11e8-a861-20cf30e32f6d |
Bugzilla security issues |
22373c43-d728-11e6-a9a5-b499baebfeaf |
MySQL -- multiple vulnerabilities |
22438240-1bd0-11e8-a2ec-6cc21735f730 |
shibboleth-sp -- vulnerable to forged user attribute data |
225bc349-ce10-11dd-a721-0030843d3802 |
opera -- multiple vulnerabilities |
2264566a-a890-46eb-a895-7881dd220bd0 |
electron26 -- Out of bounds memory access in V8 |
2272e6f1-f029-11ea-838a-0011d823eebd |
GnuTLS -- null pointer dereference |
2273879e-8a2f-11dd-a6fe-0030843d3802 |
mozilla -- multiple vulnerabilities |
227475c2-09cb-11db-9156-000e0c2e438a |
webmin, usermin -- arbitrary file disclosure vulnerability |
22775cdd-395a-11e6-b3c8-14dae9d210b8 |
piwik -- XSS vulnerability |
229577a8-0936-11db-bf72-00046151137e |
phpmyadmin -- cross site scripting vulnerability |
22ae307a-1ac4-11ea-b267-001cc0382b2f |
Ghostscript -- Security bypass vulnerabilities |
22b41bc5-4279-11ea-b184-f8b156ac3ff9 |
FreeBSD -- libfetch buffer overflow |
22b90fe6-258e-11e9-9c8d-6805ca0b3d42 |
p5-Email-Address-List -- DDoS related vulnerability |
22bc5327-f33f-11e8-be46-0019dbb15b3f |
payara -- Code execution via crafted PUT requests to JSPs |
22c6b826-cee0-11da-8578-00123ffe8333 |
plone -- "member_id" Parameter Portrait Manipulation Vulnerability |
22dc4a22-d1e5-11e4-879c-00e0814cab4e |
jenkins -- multiple vulnerabilities |
22df5074-71cd-11ee-85eb-84a93843eb75 |
MySQL -- Multiple vulnerabilities |
22f00553-a09d-11d9-a788-0001020eed82 |
portupgrade -- insecure temporary file handling vulnerability |
22f28bb3-8d98-11e7-8c37-e8e0b747a45a |
libgcrypt -- side-channel attack vulnerability |
22fffa69-46fa-11ee-8290-a8a1599412c6 |
chromium -- use after free in MediaStream |
2310b814-a652-11e8-805b-a4badb2f4699 |
FreeBSD -- L1 Terminal Fault (L1TF) Kernel Information Disclosure |
23232028-1ba4-11e5-b43d-002590263bf5 |
elasticsearch -- security fix for shared file-system repositories |
2327234d-fc4b-11ea-adef-641c67a117d8 |
py-matrix-synapse -- malformed events may prevent users from joining federated rooms |
2328adef-157c-11d9-8402-000d93664d5c |
racoon -- improper certificate handling |
23413442-c8ea-11e8-b35c-001b217b3468 |
Gitlab -- multiple vulnerabilities |
23573650-f99a-11da-994e-00142a5f241c |
dokuwiki -- multiple vulnerabilities |
2368755b-83f6-11ef-8d2e-a04a5edf46d9 |
Unbound -- Denial of service attack |
237a201c-888b-487f-84d3-7d92266381d6 |
mozilla -- multiple vulnerabilities |
2383767c-d224-11e8-9623-a4badb2f4699 |
libssh -- authentication bypass vulnerability |
238ae7de-dba2-11e8-b713-b499baebfeaf |
OpenSSL -- Multiple vulnerabilities in 1.1 branch |
23a667c7-0b28-11eb-8834-00155d01f202 |
libjpeg-turbo -- Issue in the PPM reader causing a buffer overrun in cjpeg, TJBench, or the tjLoadImage() function. |
23ab5c3e-79c3-11e4-8b1e-d050992ecde8 |
OpenVPN -- denial of service security vulnerability |
23af0425-9eac-11e5-b937-00e0814cab4e |
jenkins -- multiple vulnerabilities |
23afd91f-676b-11da-99f6-00123ffe8333 |
phpmyadmin -- register_globals emulation "import_blacklist" manipulation |
23c8423e-9bff-11e0-8ea2-0019d18c446a |
Piwik -- remote command execution vulnerability |
23f59689-0152-42d3-9ade-1658d6380567 |
mozilla -- use-after-free in compositor |
23f65f58-a261-11e9-b444-002590acae31 |
GnuPG -- denial of service |
23fb5a04-722b-11d9-9e1e-c296ac722cb3 |
squid -- buffer overflow in WCCP recvfrom() call |
24049967-88ec-11ec-88f5-901b0e934d69 |
py-twisted -- cookie and authorization headers are leaked when following cross-origin redirects |
240ac24c-dff3-11dd-a765-0030843d3802 |
mysql -- remote dos via malformed password packet |
2430e9c3-8741-11de-938e-003048590f9e |
wordpress -- remote admin password reset vulnerability |
24375796-7cbc-11ef-a3a9-001cc0382b2f |
cups-filters -- remote code execution |
2438d4af-1538-11e5-a106-3c970e169bc2 |
cURL -- Multiple Vulnerability |
244c8288-cc4a-11e6-a475-bcaec524bf84 |
upnp -- multiple vulnerabilities |
245629d4-991e-11e9-82aa-6cc21735f730 |
PostgreSQL -- Stack-based buffer overflow via setting a password |
246174d3-e979-11ed-8290-a8a1599412c6 |
chromium -- multiple vulnerabilities |
24673ed7-2bf3-11e7-b291-b499baebfeaf |
LibreSSL -- TLS verification vulnerability |
2482c798-93c6-11e6-846f-bc5ff4fb5ea1 |
flash -- multiple vulnerabilities |
249a8c42-6973-11d9-ae49-000c41e2cdad |
zgv -- exploitable heap overflows |
24a82876-002e-11e8-9a95-0cc47a02c232 |
powerdns-recursor -- insufficient validation of DNSSEC signatures |
24a9bd2b-bb43-11ec-af81-0897988a1c07 |
Composer -- Command injection vulnerability |
24aa9970-9ccd-11de-af10-000c29a67389 |
silc-toolkit -- Format string vulnerabilities |
24ace516-fad7-11ea-8d8c-005056a311d1 |
samba -- Unauthenticated domain takeover via netlogon |
24b64fb0-af1d-11dd-8a16-001b1116b350 |
clamav -- off-by-one heap overflow in VBA project parser |
24bde04f-1a10-11e5-b43d-002590263bf5 |
logstash -- Directory traversal vulnerability in the file output plugin |
24c88add-4a3e-11ef-86d7-001b217b3468 |
Gitlab -- Vulnerabilities |
24ce5597-acab-11e4-a847-206a8a720317 |
krb5 -- Vulnerabilities in kadmind, libgssrpc, gss_process_context_token VU#540092 |
24da150a-33e0-4fee-b4ee-2c6b377d3395 |
py39-setuptools58 -- denial of service vulnerability |
24e4d383-7b3e-11e5-a250-68b599b52a02 |
wireshark -- Pcapng file parser crash |
24ec781b-8c11-11dd-9923-0016d325a0ed |
bitlbee -- account recreation security issues |
24eee285-09c7-11da-bc08-0001020eed82 |
xpdf -- disk fill DoS vulnerability |
24f6b1eb-43d5-11db-81e1-000e0c2e438a |
win32-codecs -- multiple vulnerabilities |
2506f558-6a8a-11da-b96e-000fb586ba73 |
mnemo -- Cross site scripting vulnerabilities in several of the notepad name and note data fields |
2523bc76-4f01-11ed-929b-002590f2a714 |
git -- Multiple vulnerabilities |
252f40cb-618c-47f4-a2cf-1abf30cffbbe |
py-Flask-Cors -- directory traversal vulnerability |
253486f5-947d-11ea-92ab-00163e433440 |
FreeBSD -- Improper checking in SCTP-AUTH shared key update |
253c6889-06f0-11e6-925f-6805ca0b3d42 |
ansible -- use of predictable paths in lxc_container |
253ea131-bd12-11d8-b071-00e08110b673 |
Gallery 1.4.3 and ealier user authentication bypass |
2544f543-c178-11de-b175-001cc0377035 |
elinks -- buffer overflow vulnerability |
255bf44c-d298-11ee-9c27-40b034429ecf |
dns/c-ares -- malformatted file causes application crash |
25673e6e-786b-11df-a921-0245fb008c0b |
ziproxy -- security vulnerability in PNG decoder |
257e1bf0-682f-11ee-b06f-0050569ceb3a |
GLPI vulnerable to SQL injection via dashboard administration |
25858c37-bdab-11da-b7d4-00123ffe8333 |
linux-realplayer -- buffer overrun |
25872b25-da2d-11ed-b715-a1e76793953b |
ghostscript -- exploitable buffer overflow in (T)BCP in PS interpreter |
25b78bdd-25b8-11ec-a341-d4c9ef517024 |
Apache httpd -- Multiple vulnerabilities |
25b78f04-59c8-11e4-b711-6805ca0b3d42 |
phpMyAdmin -- XSS vulnerabilities in SQL debug output and server monitor page. |
25be46f0-f25d-11ec-b62a-00e081b7aa2d |
jenkins -- multiple vulnerabilities |
25e0593d-13c0-11e5-9afb-3c970e169bc2 |
tomcat -- multiple vulnerabilities |
25e5205b-1447-11e6-9ead-6805ca0b3d42 |
squid -- multiple vulnerabilities |
25eb365c-fd11-11dd-8424-c213de35965d |
dia -- remote command execution vulnerability |
25ed4ff8-8940-11df-a339-0026189baca3 |
bogofilter -- heap underrun on malformed base64 input |
25efe05c-7ffc-11ea-b594-3065ec8fd3ec |
chromium -- use after free |
25f73c47-68a8-4a30-9cbc-1ca5eea4d6ba |
GraphicsMagick -- multiple vulnerabilities |
26125e09-69ca-11ef-8a0f-a8a1599412c6 |
chromium -- multiple security fixes |
261ca31c-179f-11e8-b8b9-6805ca0b3d42 |
phpMyAdmin -- self XSS in central columns feature |
262b92fe-81c8-11e1-8899-001ec9578670 |
png -- memory corruption/possible remote code execution |
264749ae-d565-11e4-b545-00269ee29e57 |
libzip -- integer overflow |
265c8b00-d2d0-11d8-b479-02e0185c0b53 |
multiple vulnerabilities in ethereal |
2675f0db-baa5-11ea-aa12-80ee73419af3 |
xrdp -- Local users can perform a buffer overflow attack against the xrdp-sesman service and then inpersonate it |
2689f4cb-ec4c-11d8-9440-000347a4fa7d |
rsync -- path sanitizing vulnerability |
268a4289-fc84-11e8-be12-a4badb2f4699 |
FreeBSD -- Multiple vulnerabilities in NFS server code |
26a08c77-32da-4dd7-a884-a76fc49aa824 |
tomcat -- Tomcat Manager cross-site scripting |
26b1100a-5a27-11ed-abfe-29ac76ec31b5 |
go -- syscall, os/exec: unsanitized NUL in environment variables |
26c9e8c6-1c99-11d9-814e-0001020eed82 |
sharutils -- buffer overflows |
26e1c48a-9fa7-11df-81b5-00e0814cab4e |
Piwik -- Local File Inclusion Vulnerability |
26f2123b-c6c6-11ec-b66f-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
2701611f-df5c-11d9-b875-0001020eed82 |
gaim -- Yahoo! remote crash vulnerability |
271498a9-2cd4-11da-a263-0001020eed82 |
clamav -- arbitrary code execution and DoS vulnerabilities |
27180c99-9b5c-11e6-b799-19bef72f4b7c |
node.js -- multiple vulnerabilities |
27229c67-b8ff-11e7-9f79-ac9e174be3af |
Apache OpenOffice -- multiple vulnerabilities |
2730c668-0b1c-11e7-8d52-6cf0497db129 |
drupal8 -- multiple vulnerabilities |
2739b88b-4b88-11eb-a4c0-08002734b9ed |
gitea -- multiple vulnerabilities |
273c6c43-e3ad-11e9-8af7-08002720423d |
mongodb -- Our init scripts check /proc/[pid]/stat should validate that `(${procname})` is the process' command name. |
273cc1a3-0d6b-11d9-8a8a-000c41e2cdad |
lha -- numerous vulnerabilities when extracting archives |
2747fc39-915b-11dc-9239-001c2514716c |
xpdf -- multiple remote Stream.CC vulnerabilities |
2748fdde-3a3c-11de-bbc5-00e0815b8da8 |
quagga -- Denial of Service |
274922b8-ad20-11df-af1f-00e0814cab4e |
phpmyadmin -- Several XSS vulnerabilities |
275b845e-f56c-11db-8163-000e0c2e438a |
FreeBSD -- IPv6 Routing Header 0 is dangerous |
27616957-b084-11ea-937b-b42e99a1b9c3 |
dbus file descriptor leak |
2780e442-fc59-11e4-b18b-6805ca1d3bb1 |
qemu, xen and VirtualBox OSE -- possible VM escape and code execution ("VENOM") |
278561d7-b261-11eb-b788-901b0e934d69 |
py-matrix-synapse -- malicious push rules may be used for a denial of service attack. |
2797b27a-f55b-11d8-81b0-000347a4fa7d |
kdelibs -- konqueror cross-domain cookie injection |
279e5f4b-d823-11e2-928e-08002798f6ff |
apache-xml-security-c -- heap overflow |
279f682c-0e9e-11e8-83e7-485b3931c969 |
bchunk -- access violation near NULL on destination operand and crash |
27a230a2-3b11-11eb-af2a-080027dbe4b7 |
glpi -- multiple related stored XSS vulnerabilities |
27a70a01-5f6c-11da-8d54-000cf18bbe54 |
ghostscript -- insecure temporary file creation vulnerability |
27aa2253-4c72-11ec-b6b9-e86a64caca56 |
py-matrix-synapse -- several vulnerabilities |
27b12d04-4722-11e9-8b7c-b5e01141761f |
RubyGems -- multiple vulnerabilities |
27b38d85-c891-11e7-a7bd-cd1209e563f2 |
rubygem-geminabox -- XSS vulnerabilities |
27b9b2f0-8081-11e4-b4ca-bcaec565249c |
xserver -- multiple issue with X client request handling |
27bf9378-8ffd-11ec-8be6-d4c9ef517024 |
MariaDB -- Multiple vulnerabilities |
27c331d5-64c7-11d8-80e3-0020ed76ef5a |
Vulnerabilities in H.323 implementations |
27c822a0-addc-11ed-a9ee-dca632b19f10 |
Rundeck3 -- Log4J RCE vulnerability |
27cc4258-0805-11ed-8ac1-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
27d01223-c457-11dd-a721-0030843d3802 |
php -- multiple vulnerabilities |
27d39055-b61b-11ec-9ebc-1c697aa5a594 |
FreeBSD -- Potential jail escape vulnerabilities in netmap |
27d78386-d35f-11dd-b800-001b77d09812 |
awstats -- multiple XSS vulnerabilities |
27eee66d-9474-44a5-b830-21ec12a1c307 |
jenkins -- Remote code execution vulnerability in remoting module |
27f742f6-03f4-11e5-aab1-d050996490d0 |
cURL -- sensitive HTTP server headers also sent to proxies |
27fed73e-484f-11e5-825f-c80aa9043978 |
OpenSSH -- PermitRootLogin may allow password connections with 'without-password' |
28022228-5a0e-11df-942d-0015587e2cc1 |
wireshark -- DOCSIS dissector denial of service |
2823048d-9f8f-11ec-8c9c-001b217b3468 |
Gitlab -- multiple vulnerabilities |
2826317b-10ec-11e7-944e-000c292e4fd8 |
samba -- symlink race allows access outside share definition |
282dfea0-3378-11d9-b404-000c6e8f12ef |
apache2 multiple space header denial-of-service vulnerability |
28481349-7e20-4f80-ae1e-e6bf48d4f17c |
Sane -- Multiple Vulnerabilities |
288f7cee-ced6-11e7-8ae9-0050569f0b83 |
procmail -- Heap-based buffer overflow |
289269f1-0def-11e8-99b0-d017c2987f9a |
LibreOffice -- Remote arbitrary file disclosure vulnerability via WEBSERVICE formula |
2892a8e2-3d68-11e2-8e01-0800273fe665 |
dns/bind9* -- servers using DNS64 can be crashed by a crafted query |
2899da38-7300-11ed-92ce-3065ec8fd3ec |
chromium -- Type confusion in V8 |
28a37df6-ba1a-4eed-bb64-623fc8e8dfd0 |
py39-py -- Regular expression Denial of Service vulnerability |
28a7310f-9855-11df-8d36-001aa0166822 |
apache -- Remote DoS bug in mod_cache and mod_dav |
28ab7ddf-61ab-11d9-a9e7-0001020eed82 |
dillo -- format string vulnerability |
28b42ef5-80cd-440c-904b-b7fbca74c73d |
electron{26,27} -- multiple vulnerabilities |
28b69630-9b10-11ed-97a6-6805ca2fa271 |
powerdns-recursor -- denial of service |
28bb6ee5-9b5c-11e6-b799-19bef72f4b7c |
node.js -- ares_create_query single byte out of buffer write |
28bf62ef-5e2c-11e6-a15f-00248c0c745d |
piwik -- XSS vulnerability |
28c575fa-784e-11e3-8249-001cc0380077 |
libXfont -- Stack buffer overflow in parsing of BDF font files in libXfont |
28c9243a-72ed-11da-8c1d-000e0c2e438a |
phpbb -- multiple vulnerabilities |
28e93883-539f-11d9-a9e7-0001020eed82 |
acroread5 -- mailListIsPdf() buffer overflow vulnerability |
28ffa931-a510-11ef-8109-b42e991fc52e |
mongodb -- Buffer over-reads in MongoDB Server |
290351c9-6f5c-11e5-a2a1-002590263bf5 |
devel/ipython -- multiple vulnerabilities |
29083f8e-2ca8-11e5-86ff-14dae9d210b8 |
apache22 -- chunk header parsing defect |
290d81b9-80f1-11d8-9645-0020ed76ef5a |
oftpd denial-of-service vulnerability (PORT command) |
29194cb8-6e9f-11e1-8376-f0def16c5c1b |
nginx -- potential information leak |
291d0953-47c1-11ee-8e38-002590c1f29c |
FreeBSD -- Potential remote code execution via ssh-agent forwarding |
2920c449-4850-11e5-825f-c80aa9043978 |
OpenSSH -- PAM vulnerabilities |
29255141-c3df-11dd-a721-0030843d3802 |
mantis -- multiple vulnerabilities |
293f40a0-ffa1-11e8-b258-0011d823eebd |
Mbed TLS -- Local timing attack on RSA decryption |
296ecb59-0f6b-11df-8bab-0019996bc1f7 |
squid -- Denial of Service vulnerability in DNS handling |
297117ba-f92d-11e5-92ce-002590263bf5 |
squid -- multiple vulnerabilities |
298829e2-ccce-11e7-92e4-000c29649f92 |
mediawiki -- multiple vulnerabilities |
2991178f-cbe8-11ed-956f-7054d21a9e2a |
py39-Elixir -- weak use of cryptography |
299e3f81-aee7-11dc-b781-0016179b2dd5 |
e2fsprogs -- heap buffer overflow |
29b13a34-b1d2-11ea-a11c-4437e6ad11c4 |
Machine-in-the-middle response injection attack when using STARTTLS with IMAP, POP3, and SMTP |
29b7e3f4-b6a9-11df-ae63-f255a795cb21 |
lftp -- multiple HTTP client download filename vulnerability |
29b7f0be-1fb7-11eb-b9d4-001999f8d30b |
asterisk -- Outbound INVITE loop on challenge with different nonce |
29d34524-0542-11e9-a444-080027fee39c |
gitea -- privilege escalation, XSS |
29dd0065-81fa-11d9-a9e7-0001020eed82 |
kdelibs -- insecure temporary file creation |
29edd807-438d-11d9-8bb9-00065be4b5b6 |
mysql -- FTS request denial of service vulnerability |
29f050e9-3ef4-4c5f-8204-503b41caf181 |
electron24 -- multiple vulnerabilities |
29f5bfc5-ce04-11dd-a721-0030843d3802 |
mozilla -- multiple vulnerabilities |
2a093853-2495-11e2-b0c7-000d601460a4 |
ruby -- $SAFE escaping vulnerability about Exception#to_s/NameError#to_s |
2a1b931f-2b86-11ec-8acd-c80aa9043978 |
OpenSSH -- OpenSSH 6.2 through 8.7 failed to correctly initialise supplemental groups when executing an AuthorizedKeysCommand or AuthorizedPrincipalsCommand |
2a314635-be46-11ec-a06f-d4c9ef517024 |
Nextcloud Calendar -- SMTP Command Injection |
2a3588b4-ab12-11ea-a051-001b217b3468 |
NPM -- Multiple vulnerabilities |
2a3bc6ac-e7c6-11e7-a90b-001999f8d30b |
asterisk -- Crash in PJSIP resource when missing a contact header |
2a41233d-10e7-11e0-becc-0022156e8794 |
php-zip -- multiple Denial of Service vulnerabilities |
2a470712-d351-11ee-86bb-a8a1599412c6 |
chromium -- multiple security fixes |
2a4a112a-7c1b-11e5-bd77-0800275369e2 |
lldpd -- Buffer overflow/Denial of service |
2a4bcd7d-bbb8-11e4-903c-080027ef73ec |
e2fsprogs -- potential buffer overflow in closefs() |
2a526c78-84ab-11e6-a4a1-60a44ce6887b |
libgd -- integer overflow which could lead to heap buffer overflow |
2a6106c6-73e5-11ec-8fa2-0800270512f4 |
clamav -- invalid pointer read that may cause a crash |
2a6a966f-1774-11df-b5c1-0026189baca3 |
fetchmail -- heap overflow on verbose X.509 display |
2a7bdc56-d7a3-11e6-ae1b-002590263bf5 |
flash -- multiple vulnerabilities |
2a86f45a-fc3c-11e8-a414-00155d006b02 |
node.js -- multiple vulnerabilities |
2a8b79c3-1b6e-11e9-8cf4-1c39475b9f84 |
Helm -- client unpacking chart that contains malicious content |
2a8b7d21-1ecc-11e5-a4a5-002590263bf5 |
wesnoth -- disclosure of .pbl files with lowercase, uppercase, and mixed-case extension |
2a92555f-a6f8-11e8-8acd-10c37b4ac2ea |
links -- denial of service |
2a96e498-3234-4950-a9ad-419bc84a839d |
tiff -- multiple vulnerabilities |
2aa9967c-27e0-11e8-9ae1-080027ac955c |
e2fsprogs -- potential buffer overrun bugs in the blkid library and in the fsck program |
2acdf364-9f8d-4aaf-8d1b-867fdfd771c6 |
py-kerberos -- DoS and MitM vulnerabilities |
2ad25820-c71a-4e6c-bb99-770c66fe496d |
py-Scrapy -- credentials leak vulnerability |
2adc3e78-22d1-11e2-b9f0-d0df9acfd7e5 |
drupal7 -- multiple vulnerabilities |
2ae114de-c064-11e1-b5e0-000c299b62e1 |
FreeBSD -- OpenSSL multiple vulnerabilities |
2ae24334-f2e6-11e2-8346-001e8c75030d |
subversion -- remotely triggerable "Assertion failed" DoS vulnerability or read overflow. |
2af10639-4299-11ea-aab1-98fa9bfec35a |
pkg -- vulnerability in libfetch |
2b20fd5f-552e-11e1-9fb7-003067b2972c |
WebCalendar -- Persistent XSS |
2b2b333b-6bd3-11d9-95f8-000a95bc6fae |
mc -- multiple vulnerabilities |
2b2f6092-0694-11e3-9e8e-000c29f6ae42 |
puppet -- multiple vulnerabilities |
2b386075-1d9c-11e8-b6aa-4ccc6adda413 |
libsndfile -- multiple vulnerabilities |
2b3b4c27-b0c7-11e5-8d13-bc5ff45d0f28 |
qemu -- buffer overflow vulnerability in VNC |
2b4c8e1f-1609-11e6-b55e-b499baebfeaf |
libarchive -- RCE vulnerability |
2b4d5288-447e-11d9-9ebb-000854d03344 |
rockdodger -- buffer overflows |
2b5fc9c4-eaca-46e0-83d0-9b10c51c4b1b |
zeek -- potential DoS vulnerabilities |
2b63e964-eb04-11e6-9ac1-a4badb2f4699 |
mantis -- XSS vulnerability |
2b68c86a-32d5-11ef-8a0f-a8a1599412c6 |
chromium -- multiple security fixes |
2b6e47b1-0598-11da-86bc-000e0c2e438a |
ipsec -- Incorrect key usage in AES-XCBC-MAC |
2b6ed5c7-1a7f-11e0-b61d-000c29d1636d |
php -- multiple vulnerabilities |
2b841f88-2e8d-11e2-ad21-20cf30e32f6d |
bugzilla -- multiple vulnerabilities |
2b8cad90-f289-11e1-a215-14dae9ebcf89 |
mozilla -- multiple vulnerabilities |
2bab995f-36d4-11ea-9dad-002590acae31 |
Template::Toolkit -- Directory traversal on write |
2bad8b5d-66fb-11e9-9815-78acc0a3b880 |
drupal -- Drupal core - Moderately critical |
2bc376c0-977e-11ee-b4bc-b42e991fc52e |
apache -- Apache ZooKeeper: Authorization bypass in SASL Quorum Peer Authentication |
2bc960c4-e665-11dd-afcd-00e0815b8da8 |
optipng -- arbitrary code execution via crafted BMP image |
2bc96f18-683f-11dc-82b6-02e0185f8d72 |
samba -- nss_info plugin privilege escalation vulnerability |
2bcd2d24-24ca-11d8-82e5-0020ed76ef5a |
Buffer overflow in pam_smb password handling |
2bcd6ba4-d8e2-42e5-9033-b50b722821fb |
electron{22,24,25} -- Heap buffer overflow in vp8 encoding in libvpx |
2be7c122-0614-11db-9156-000e0c2e438a |
hashcash -- heap overflow vulnerability |
2bf56269-90f8-4a82-b82f-c0e289f2a0dc |
jenkins -- multiple vulnerabilities |
2bffdf2f-9d45-11e7-a25c-471bafc3262f |
rubygem-geminabox -- XSS & CSRF vulnerabilities |
2c12ae0c-c38d-11e0-8eb7-001b2134ef46 |
linux-flashplugin -- multiple vulnerabilities |
2c25e762-6bb9-11d9-93db-000a95bc6fae |
quake2 -- multiple critical vulnerabilities |
2c2d1c39-1396-459a-91f5-ca03ee7c64c6 |
mozilla -- multiple vulnerabilities |
2c2d4e83-2370-11e0-a91b-00e0815b8da8 |
tarsnap -- cryptographic nonce reuse |
2c493ac8-205e-11e5-a4a5-002590263bf5 |
ansible -- remote code execution vulnerability |
2c4f4688-298b-11dc-a197-0011098b2f36 |
typespeed -- arbitrary code execution |
2c5757f4-88bf-11d9-8720-0007e900f87b |
sup -- format string vulnerability |
2c57c47e-8bb3-4694-83c8-9fc3abad3964 |
mozilla -- multiple vulnerabilities |
2c5b9cd7-f7e6-11ea-88f8-901b0ef719ab |
FreeBSD -- bhyve privilege escalation via VMCS access |
2c5e7e23-5248-11e5-9ad8-14dae9d210b8 |
bind -- denial of service vulnerability |
2c6acefd-8194-11d8-9645-0020ed76ef5a |
setsockopt(2) IPv6 sockets input validation error |
2c6af5c3-4d36-11ec-a539-0800270512f4 |
rubygem-cgi -- buffer overrun in CGI.escape_html |
2c8a84d9-5bee-11db-a5ae-00508d6a62df |
vtiger -- multiple remote file inclusion vulnerabilities |
2c8bd00d-ada2-11e7-82af-8dbff7d75206 |
rubygems -- deserialization vulnerability |
2c92fdd3-896c-4a5a-a0d8-52acee69182d |
zeek -- Various vulnerabilities |
2c948527-d823-11e6-9171-14dae9d210b8 |
FreeBSD -- OpenSSH multiple vulnerabilities |
2cabfbab-8bfb-11e5-bd18-002590263bf5 |
xen-kernel -- CPU lockup during exception delivery |
2cb21232-fb32-11ea-a929-a4bf014bf5f7 |
Python -- multiple vulnerabilities |
2ccd71bd-426b-11ec-87db-6cc21735f730 |
PostgreSQL -- Possible man-in-the-middle attacks |
2cceb80e-c482-4cfd-81b3-2088d2c0ad53 |
gcab -- stack overflow |
2cda5c88-add4-11ec-9bc8-6805ca2fa271 |
powerdns -- denial of service |
2cde1892-913e-11e1-b44c-001fd0af1a4c |
php -- multiple vulnerabilities |
2ce1a2f1-0177-11ef-a45e-08002784c58d |
ruby -- Arbitrary memory address read vulnerability with Regex search |
2d299950-ddb0-11e5-8fa8-14dae9d210b8 |
moodle -- multiple vulnerabilities |
2d2dcbb4-906c-11dc-a951-0016179b2dd5 |
phpmyadmin -- cross-site scripting vulnerability |
2d4076eb-f679-11e9-a87f-a4badb2f4699 |
varnish -- Information Disclosure Vulnerability |
2d56308b-c0a8-11e6-a9a5-b499baebfeaf |
PHP -- Multiple vulnerabilities |
2d56c7f4-b354-428f-8f48-38150c607a05 |
mozilla -- multiple vulnerabilities |
2d6de6a8-fb78-4149-aeda-77fc8f140f06 |
smart_proxy_dynflow -- authentication bypass vulnerability |
2d8cf857-81ea-11d9-a9e7-0001020eed82 |
gftp -- directory traversal vulnerability |
2d9ad236-4d26-11db-b48d-00508d6a62df |
freeciv -- Denial of Service Vulnerabilities |
2da3cb25-6571-11e9-8e67-206a8a720317 |
FreeBSD -- EAP-pwd missing commit validation |
2da838f9-9168-11e8-8c75-d8cb8abf62dd |
Gitlab -- multiple vulnerabilities |
2db97aa6-be81-11da-9b82-0050bf27ba24 |
horde -- remote code execution vulnerability in the help viewer |
2dc764fa-40c0-11dc-aeac-02e0185f8d72 |
FreeBSD -- Buffer overflow in tcpdump(1) |
2dc8927b-54e0-11eb-9342-1c697a013f4b |
mantis -- multiple vulnerabilities |
2dd7e97e-d5e8-11e5-bcbd-bc5ff45d0f28 |
glibc -- getaddrinfo stack-based buffer overflow |
2ddbfd29-a455-11dd-a55e-00163e000016 |
libspf2 -- Buffer overflow |
2dde5a56-6ab1-11e8-b639-6451062f0f7a |
Flash Player -- multiple vulnerabilities |
2de14f7a-dad9-11d8-b59a-00061bc2ad93 |
Multiple Potential Buffer Overruns in Samba |
2def7c4b-736f-4754-9f03-236fcb586d91 |
py-wagtail -- DoS vulnerability |
2df297a2-dc74-11da-a22b-000c6ec775d9 |
awstats -- arbitrary command execution vulnerability |
2e116ba5-f7c3-11d9-928e-000b5d7e6dd5 |
kdebase -- Kate backup file permission leak |
2e129846-8fbb-11d8-8b29-0020ed76ef5a |
MySQL insecure temporary file creation (mysqlbug) |
2e25d38b-54d1-11d9-b612-000c6e8f12ef |
jabberd -- denial-of-service vulnerability |
2e28cefb-2aee-11da-a263-0001020eed82 |
firefox & mozilla -- command line URL shell command injection |
2e3bea0c-f110-11ee-bc57-00e081b7aa2d |
jenkins -- HTTP/2 denial of service vulnerability in bundled Jetty |
2e4fbc9a-9d23-11e6-a298-14dae9d210b8 |
sudo -- Potential bypass of sudo_noexec.so via wordexp() |
2e5715f8-67f7-11e3-9811-b499baab0cbe |
gnupg -- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis attack |
2e7e9072-73a0-11e1-a883-001cc0a36e12 |
libtasn1 -- ASN.1 length decoding vulnerability |
2e8cdd36-c3cc-11e5-b5fe-002590263bf5 |
sudo -- potential privilege escalation via symlink misconfiguration |
2e8fe57e-2b46-11e6-ae88-002590263bf5 |
openafs -- local DoS vulnerability |
2ea6ce3d-6afd-11e2-9d4e-bcaec524bf84 |
upnp -- multiple vulnerabilities |
2ecb7b20-d97e-11e0-b2e2-00215c6a37bb |
OpenSSL -- multiple vulnerabilities |
2eccb24f-61c0-11e0-b199-0015f2db7bde |
xrdb -- root hole via rogue hostname |
2ecd02e2-e864-11da-b9f4-00123ffe8333 |
phpmyadmin -- XSRF vulnerabilities |
2ed7e8db-e234-11ea-9392-002590bc43be |
sysutils/openzfs-kmod -- critical permissions issues |
2eda0c54-34ab-11e0-8103-00215c6a37bb |
opera -- multiple vulnerabilities |
2eeb6652-a7a6-11e4-96ba-001999f8d30b |
asterisk -- File descriptor leak when incompatible codecs are offered |
2eebebff-cd3b-11e2-8f09-001b38c3836c |
xorg -- protocol handling issues in X Window System client libraries |
2eec1e85-faf3-11ea-8ac0-4437e6ad11c4 |
tt-rss -- multiple vulnerabilities |
2f0cb4bb-416d-11da-99fe-000854d03344 |
xloadimage -- buffer overflows in NIFF image title handling |
2f22927f-26ea-11ee-8290-a8a1599412c6 |
chromium -- multiple vulnerabilities |
2f38c6a2-04a4-11ee-8cb0-e41f13b9c674 |
qpress -- directory traversal |
2f3cd69e-7dee-11eb-b92e-0022489ad614 |
Node.js -- February 2021 Security Releases |
2f4fd3aa-32f8-4116-92f2-68f05398348e |
bro -- multiple memory allocation issues |
2f75141c-da1d-11e4-8d32-5404a68ad561 |
Several vulnerabilities in libav |
2f794295-7b69-11dd-80ba-000bcdf0a03b |
FreeBSD -- Remote kernel panics on IPv6 connections |
2f7f4db2-8819-11e5-ab94-002590263bf5 |
p5-HTML-Scrubber -- XSS vulnerability |
2f82696c-adad-447b-9938-c99441805fa3 |
chromium -- multiple security fixes |
2f90556f-18c6-11e4-9cc4-5453ed2e2b49 |
kdelibs -- KAuth PID Reuse Flaw |
2fb13238-872d-11ef-bd1e-b42e991fc52e |
firefox -- use-after-free code execution |
2fbe16c2-cab6-11d9-9aed-000e0c2e438a |
freeradius -- sql injection and denial of service vulnerability |
2fbfd455-f2d0-11e2-8a46-000d601460a4 |
suPHP -- Privilege escalation |
2fcca7e4-b1d7-11ed-b0f4-002590f2a714 |
git -- Heap overflow in `git archive`, `git log --format` leading to RCE |
2fda6bd2-c53c-11de-b157-001999392805 |
opera -- multiple vulnerabilities |
2fdb053c-ca25-11ed-9d7e-080027f5fec9 |
rack -- possible denial of service vulnerability in header parsing |
2fe004f5-83fd-11ee-9f5d-31909fb2f495 |
openvpn -- 2.6.0...2.6.6 --fragment option division by zero crash, and TLS data leak |
2fe40238-480f-11e5-adde-14dae9d210b8 |
tarsnap -- buffer overflow and local DoS |
2fe4b57f-d110-11e1-ac76-10bf48230856 |
Dokuwiki -- cross site scripting vulnerability |
2ffb1b0d-ecf5-11dd-abae-00219b0fc4d8 |
glpi -- SQL Injection |
3000acee-c45d-11eb-904f-14dae9d5a9d2 |
aiohttp -- open redirect vulnerability |
3003ba60-6cec-11eb-8815-040e3c1b8a02 |
oauth2-proxy -- domain whitelist could be used as redirect |
30149157-f926-11e1-95cd-001fd0af1a4c |
wordpress -- multiple unspecified privilege escalation bugs |
301a01b7-d50e-11e7-ac58-b499baebfeaf |
cURL -- Multiple vulnerabilities |
301b04d7-881c-11e5-ab94-002590263bf5 |
xen-tools -- libxl fails to honour readonly flag on disks with qemu-xen |
30211c45-e52a-11de-b5cd-00e0815b8da8 |
dovecot -- Insecure directory permissions |
302fc846-860f-482e-a8f6-ee9f254dfacf |
electron25 -- multiple vulnerabilities |
3030ae22-1c7f-11d9-81a4-0050fc56d258 |
mail-notification -- denial-of-service vulnerability |
30394651-13e1-11dd-bab7-0016179b2dd5 |
gnupg -- memory corruption vulnerability |
3042c33a-f237-11df-9d02-0018fe623f2b |
openssl -- TLS extension parsing race condition |
304409c3-c3ef-11e0-8aa5-485d60cb5385 |
libXfont -- possible local privilege escalation |
304d92c3-00c5-11ef-bd52-080027bff743 |
sdl2_sound -- multiple vulnerabilities |
305ceb2c-9df8-11ef-a660-d85ed309193e |
x11vnc -- access to shared memory segments |
30704aba-1da4-11e8-b6aa-4ccc6adda413 |
libsndfile -- out-of-bounds reads |
30866e6c-3c6d-11dd-98c9-00163e000016 |
vim -- Vim Shell Command Injection Vulnerabilities |
3092668e-97e4-11ef-bdd9-4ccc6adda413 |
qt5-webengine -- Multiple vulnerabilities |
309542b5-50b9-11e1-b0d8-00151735203a |
bugzilla -- multiple vulnerabilities |
309c35f4-7c9f-11ec-a739-206a8a720317 |
aide -- heap-based buffer overflow |
30a04ab4-ed7b-11e2-8643-8c705af55518 |
squid -- denial of service |
30acb8ae-9d46-11dc-9114-001c2514716c |
rubygem-rails -- session-fixation vulnerability |
30c0f878-b03e-11e8-be8a-0011d823eebd |
Ghostscript -- arbitrary code execution |
30c560ff-e0df-11dc-891a-02061b08fc24 |
opera -- multiple vulnerabilities |
30cb4522-b94d-11e0-8182-485d60cb5385 |
libsoup -- unintentionally allow access to entire local filesystem |
30ce591c-947b-11ea-92ab-00163e433440 |
FreeBSD -- Insufficient packet length validation in libalias |
30cea6be-1d0c-11d9-814e-0001020eed82 |
CUPS -- local information disclosure |
30cf9485-1c2c-11d9-9ecb-000c6e8f12ef |
zinf -- potential buffer overflow playlist support |
30e4ed7b-1ca6-11da-bc01-000e0c2e438a |
bind9 -- denial of service |
30f5ca1d-a90b-11dc-bf13-0211060005df |
qemu -- Translation Block Local Denial of Service Vulnerability |
31001c6b-63e7-11e7-85aa-a4badb2f4699 |
irssi -- multiple vulnerabilities |
310ca30e-a951-11ed-8314-a8a1599412c6 |
chromium -- multiple vulnerabilities |
310d0087-0fde-4929-a41f-96f17c5adffe |
xloadimage -- arbitrary command execution when handling compressed files |
3110b29e-c82d-4287-9f6c-db82bb883b1e |
zeek -- potential DoS vulnerabilities |
3117e6cd-1772-11ee-9cd6-001b217b3468 |
Gitlab -- Vulnerabilities |
311e4b1c-f8ee-11e6-9940-b499baebfeaf |
cURL -- ocsp status validation error |
313078e3-26e2-11e8-9920-6451062f0f7a |
Flash Player -- multiple vulnerabilities |
31344707-5d87-11eb-929d-d4c9ef517024 |
MySQL -- Multiple vulnerabilities |
313da7dc-763b-11df-bcce-0018f3e2eb82 |
tiff -- buffer overflow vulnerability |
313e9557-41e8-11e6-ab34-002590263bf5 |
wireshark -- multiple vulnerabilities |
31435fbc-ae73-11dc-a5f9-001a4d49522b |
peercast -- buffer overflow vulnerability |
3145faf1-974c-11e0-869e-000c29249b2e |
ikiwiki -- tty hijacking via ikiwiki-mass-rebuild |
314830d8-bf91-11e5-96d6-14dae9d210b8 |
bind -- denial of service vulnerability |
3149ab1c-c8b9-11de-b87b-0011098ad87f |
vlc -- stack overflow in MPA, AVI and ASF demuxer |
3159cd70-4aaa-11e6-a7bd-14dae9d210b8 |
libreoffice -- use-after-free vulnerability |
31617e47-7eec-4c60-9fdf-8aee61622bab |
electron{27,28} -- Out of bounds memory access in V8 |
3166222b-c6a4-11e5-96d6-14dae9d210b8 |
owncloud -- multiple vulnerabilities |
316b3c3e-0e98-11e8-8d41-97657151f8c2 |
exim -- a buffer overflow vulnerability, remote code execution |
316e1c9b-671c-11d8-9aad-000a95bc6fae |
hsftp format string vulnerabilities |
317487c6-85ca-11eb-80fa-14dae938ec40 |
squashfs-tools -- Integer overflow |
31952117-3d17-11d9-8818-008088034841 |
Cyrus IMAPd -- APPEND command uses undefined programming construct |
31a7ffb1-a80a-11eb-b159-f8b156c2bfe9 |
sympa -- Inappropriate use of the cookie parameter can be a security threat. This parameter may also not provide sufficient security. |
31ad2f10-7711-11eb-b87a-901b0ef719ab |
FreeBSD -- jail_remove(2) fails to kill all jailed processes |
31b045e7-ae75-11dc-a5f9-001a4d49522b |
opera -- multiple vulnerabilities |
31b145f2-d9d3-49a9-8023-11cf742205dc |
PHP5 -- Heap corruption in XML parser |
31bb1b8d-d6dc-11ee-86bb-a8a1599412c6 |
chromium -- multiple security fixes |
31c09848-1829-11e4-bf04-60a44c524f57 |
tor -- traffic confirmation attack |
31d9fbb4-9d09-11dc-a29d-0016d325a0ed |
ikiwiki -- improper symlink verification vulnerability |
31db9a18-e289-11e1-a57d-080027a27dbf |
rubygem-rails -- multiple vulnerabilities |
31de2e13-00d2-11e5-a072-d050996490d0 |
php -- multiple vulnerabilities |
31ea7f73-5c55-11e5-8607-74d02b9a84d5 |
h2o -- directory traversal vulnerability |
31f45d06-7f0e-11ee-94b4-6cc21735f730 |
postgresql-server -- Memory disclosure in aggregate function calls |
320a19f7-1ddd-11ef-a2ae-8c164567ca3c |
nginx -- Multiple Vulnerabilities in HTTP/3 |
32166082-53fa-41fa-b081-207e7a989a0a |
NSS -- multiple vulnerabilities |
322d4ff6-85c3-11d8-a41f-0020ed76ef5a |
Midnight Commander buffer overflow during symlink resolution |
323784cf-48a6-11d9-a9e7-0001020eed82 |
viewcvs -- information leakage |
323f900d-ac6d-11ec-a0b8-3065ec8fd3ec |
chromium -- V8 type confusion |
3243e839-f489-11d8-9837-000c41e2cdad |
fidogate -- write files as `news' user |
32498c8f-fc84-11e8-be12-a4badb2f4699 |
FreeBSD -- Insufficient bounds checking in bhyve(8) device model |
326b2f3e-6fc7-4661-955d-a772760db9cf |
py-tflite -- buffer overflow vulnerability |
326c517a-d029-11d9-9aed-000e0c2e438a |
phpbb -- multiple vulnerabilities |
3284d948-140c-4a3e-aa76-3b440e2006a8 |
firefox -- Crash in TransportSecurityInfo due to cached data |
329ecd60-aaf7-11ea-8659-10bf48e1088e |
libadplug -- Various vulnerabilities |
32a4896a-56da-11ee-9186-001b217b3468 |
Gitlab -- vulnerability |
32b05547-6913-11e0-bdc4-001b2134ef46 |
linux-flashplugin -- remote code execution vulnerability |
32c92a75-aa71-11ea-92ab-00163e433440 |
FreeBSD -- USB HID descriptor parsing error |
32d38cbb-2632-11dc-94da-0016179b2dd5 |
flac123 -- stack overflow in comment parsing |
32d4f0f1-85c3-11d9-b6dc-0007e900f747 |
mkbold-mkitalic -- format string vulnerability |
32db37a5-50c3-11db-acf3-000c6ec775d9 |
openssh -- multiple vulnerabilities |
3310014a-5ef9-11ed-812b-206a8a720317 |
sudo -- Potential out-of-bounds write for small passwords |
33174280-43fa-11e8-aad5-6cf0497db129 |
drupal -- Drupal core - Moderately critical |
331eabb3-85b1-466a-a2af-66ac864d395a |
wolfssl -- leakage of private key information |
33236f80-a11d-11ef-a964-1c697a616631 |
Intel CPUs -- multiple vulnerabilities |
3338f87c-3d5f-11e1-a00a-000c6eb41cf7 |
PowerDNS -- Denial of Service Vulnerability |
333f655a-b93a-11e5-9efa-5453ed2e2b49 |
p5-PathTools -- File::Spec::canonpath loses taint |
33459061-a1d6-11e5-8794-bcaec565249c |
freeimage -- multiple integer overflows |
3350275d-cd5a-11e8-a7be-3497f683cb16 |
jenkins -- multiple vulnerabilities |
33557582-3958-11ec-90ba-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
3364d497-e4e6-11e4-a265-c485083ca99c |
Adobe Flash Player -- critical vulnerabilities |
337960ec-b5dc-11e8-ac58-a4badb2f4699 |
Plex Media Server -- Information Disclosure Vulnerability |
3383e706-4fc3-11df-83fb-0015587e2cc1 |
tomcat -- information disclosure vulnerability |
33888815-631e-4bba-b776-a9b46fe177b5 |
phpmyfaq -- multiple issues |
3388eff9-5d6e-11d8-80e3-0020ed76ef5a |
Samba 3.0.x password initialization bug |
338d1723-5f03-11d9-92a7-000bdb1444a4 |
horde -- XSS vulnerabilities |
33922b84-5f09-11ee-b63d-0897988a1c07 |
Remote Code Execution via web-accessible composer |
3394bc2b-9da4-11e9-951e-14dae9d5a9d2 |
SDL2_image -- multiple vulnerabilities |
339fbbc1-4d23-11db-b48d-00508d6a62df |
freeciv -- Packet Parsing Denial of Service Vulnerability |
33ab4a47-bfc1-11d8-b00e-000347a4fa7d |
Several vulnerabilities found in PHPNuke |
33ba2241-c68e-11ee-9ef3-001999f8d30b |
Composer -- Code execution and possible privilege escalation |
33c05d57-bf6e-11ea-ba1e-0800273f78d3 |
Python -- multiple vulnerabilities |
33c384f3-5af6-4662-9741-0acb21c7e499 |
mini_httpd -- disclose arbitrary files is some circumstances |
33edcc56-83f2-11ea-92ab-00163e433440 |
FreeBSD -- ipfw invalid mbuf handling |
34134fd4-5d81-11d8-80e3-0020ed76ef5a |
pine insecure URL handling |
342176a8-f464-11e1-8bd8-0022156e8794 |
GNU gatekeeper -- denial of service |
342d2e48-26db-11db-9275-000475abc56f |
clamav -- heap overflow vulnerability |
34414a1e-e377-11db-b8ab-000c76189c4c |
zope -- cross-site scripting vulnerability |
3446e45d-a51b-486f-9b0e-e4402d91fed6 |
electron22 -- multiple vulnerabilities |
348bfa69-25a2-11e5-ade1-0011d823eebd |
Adobe Flash Player -- critical vulnerabilities |
348ee234-d541-11ed-ad86-a134a566f1e6 |
go -- multiple vulnerabilities |
3497d7be-2fef-45f4-8162-9063751b573a |
fetchmail -- remote root/code injection from malicious POP3 server |
34a3f9b5-dab3-11e7-b5af-a4badb2f4699 |
FreeBSD -- Kernel data leak via ptrace(PT_LWPINFO) |
34c93ae8-7e6f-11db-bf00-02e081235dab |
gnupg -- buffer overflow |
34ce5817-8d56-11e0-b5a2-6c626dd55a41 |
asterisk -- Remote crash vulnerability |
34e0316a-aa91-11df-8c2e-001517289bf8 |
ruby -- UTF-7 encoding XSS vulnerability in WEBrick |
34e60332-2448-4ed6-93f0-12713749f250 |
libvpx -- multiple buffer overflows |
34e8ccf5-7d71-11e0-9d83-000c29cc39d3 |
Zend Framework -- potential SQL injection when using PDO_MySql |
34f98d06-eb56-11ee-8007-6805ca2fa271 |
quiche -- Multiple Vulnerabilities |
3507bfb3-85d5-11ec-8c9c-001b217b3468 |
Gitlab -- multiple vulnerabilities |
350a5bd9-520b-11db-8f1a-000a48049292 |
MT -- Search Unspecified XSS |
3531141d-a708-477c-954a-2a0549e49ca9 |
salt -- Maliciously crafted minion IDs can cause unwanted directory traversals on the Salt-master |
35431f79-fe3e-11e4-ba63-000c292ee6b8 |
ipsec-tools -- Memory leak leading to denial of service |
3546a833-03ea-11dc-a51d-0019b95d4f14 |
samba -- multiple vulnerabilities |
3551e106-1b17-11ec-a8a7-704d7b472482 |
chromium -- multiple vulnerabilities |
3563fae5-f60c-11e8-b513-5404a68ad561 |
uriparser -- Multiple vulnerabilities |
3567456a-6b17-41f7-ba7f-5cd3efb2b7c9 |
electron{27,28} -- Use after free in Mojo |
356b02e9-1954-11e7-9608-001999f8d30b |
asterisk -- Buffer overflow in CDR's set user |
359e1548-a652-11e8-805b-a4badb2f4699 |
FreeBSD -- Resource exhaustion in IP fragment reassembly |
359f615d-a9e1-11e1-8a66-14dae9ebcf89 |
asterisk -- multiple vulnerabilities |
35aef72c-5c8e-11eb-8309-4ccc6adda413 |
chocolate-doom -- Arbitrary code execution |
35c0b572-125a-11de-a964-0030843d3802 |
roundcube -- webmail script insertion and php code injection |
35d1e192-628e-11ed-8c5e-641c67a117d8 |
ipython -- Execution with Unnecessary Privileges |
35e54755-54e4-11dd-ad8b-0030843d3802 |
phpmyadmin -- cross site request forgery vulnerabilities |
35ecdcbe-3501-11e0-afcd-0015f2db7bde |
webkit-gtk2 -- Multiple vurnabilities. |
35f2679f-52d7-11db-8f1a-000a48049292 |
postnuke -- admin section SQL injection |
35f6093c-73c3-11d9-8a93-00065be4b5b6 |
newsgrab -- directory traversal vulnerability |
35f6fdf8-a425-11d8-9c6d-0020ed76ef5a |
Cyrus IMAP pre-authentication heap overflow vulnerability |
36034227-cf81-11e5-9c2b-00262d5ed8ee |
chromium -- multiple vulnerabilities |
36235c38-e0a8-11e1-9f4d-002354ed89bc |
automake -- Insecure 'distcheck' recipe granted world-writable distdir |
36494478-6a88-11da-b96e-000fb586ba73 |
kronolith -- Cross site scripting vulnerabilities in several of the calendar name and event data fields |
36533a59-2770-11e2-bb44-003067b2972c |
linux-flashplugin -- multiple vulnerabilities |
36594c54-7be7-11e0-9838-0022156e8794 |
Exim -- remote code execution and information disclosure |
3679fd10-c5d1-11e5-b85f-0018fe623f2b |
openssl -- multiple vulnerabilities |
3680b234-b6f0-11e4-b7cc-d050992ecde8 |
unzip -- heap based buffer overflow in iconv patch |
36858e78-3963-11e4-ad84-000c29f6ae42 |
security/ossec-hids-* -- root escalation via temp files |
3686917b-164d-11e6-94fa-002590263bf5 |
wordpress -- multiple vulnerabilities |
368993bb-d685-11e5-8858-00262d5ed8ee |
chromium -- same origin bypass |
3693eca5-f0d3-453c-9558-2353150495bb |
electron22 -- multiple vulnerabilities |
36a2a89e-7ee1-4ea4-ae22-7ca38019c8d0 |
Loofah -- XSS vulnerability |
36a35d83-c560-11eb-84ab-e0d55e2a8bf9 |
polkit -- local privilege escalation using polkit_system_bus_name_get_creds_sync |
36a37c92-44b1-11ee-b091-6162c1274384 |
gitea -- information disclosure |
36b905ad-7fbb-11e9-8a5f-c85b76ce9b5a |
sqlite3 -- use after free |
36bd352d-299b-11e5-86ff-14dae9d210b8 |
mysql -- SSL Downgrade |
36cf7670-2774-11e6-af29-f0def16c5c1b |
nginx -- a specially crafted request might result in worker process crash |
36d10af7-248d-11ed-856e-d4c9ef517024 |
MariaDB -- Multiple vulnerabilities |
36def7ba-6d2b-11ea-b115-643150d3111d |
puppetserver and puppetdb -- Puppet Server and PuppetDB may leak sensitive information via metrics API |
36ef8753-d86f-11e7-ad28-0025908740c2 |
tor -- Use-after-free in onion service v2 |
36f9ac43-b2ac-11e3-8752-080027ef73ec |
mail/trojita -- may leak mail contents (not user credentials) over unencrypted connection |
36ff7a74-47b1-11e8-a7d6-54e1ad544088 |
chromium -- vulnerability |
371bbea9-3836-4832-9e70-e8e928727f8c |
chromium -- multiple vulnerabilities |
373e412e-f748-11df-96cd-0015f2db7bde |
OpenTTD -- Denial of service (server/client) via invalid read |
3746de31-0a1a-11e8-83e7-485b3931c969 |
shadowsocks-libev -- command injection via shell metacharacters |
374793ad-2720-4c4a-b86c-fc4a1780deac |
py-psutil -- double free vulnerability |
37528379-76a8-11e9-a4fd-00012e582166 |
Rust -- violation of Rust's safety guarantees |
37569eb7-0125-11e5-9d98-080027ef73ec |
dnsmasq -- data exposure and denial of service |
3761df02-0f9c-11e0-becc-0022156e8794 |
php -- NULL byte poisoning |
376df2f1-1295-11ec-859e-000c292ee6b8 |
consul -- rpc: authorize raft requests |
37940643-be1b-11dd-a578-0030843d3802 |
hplip -- hpssd Denial of Service |
379788f3-2900-11e5-a4a5-002590263bf5 |
freeradius -- insufficient CRL application vulnerability |
37a365ed-1269-11de-a964-0030843d3802 |
gstreamer-plugins-good -- multiple memory overflows |
37a5c10f-bf56-11da-b0e9-00123ffe8333 |
freeradius -- EAP-MSCHAPv2 Authentication Bypass |
37a8603d-4494-11de-bea7-000c29a67389 |
nsd -- buffer overflow vulnerability |
37a87ade-a59f-11e4-958e-0011d823eebd |
Adobe Flash Player -- critical vulnerability |
37d106a8-15a4-483e-8247-fcb68b16eaf8 |
Dovecot -- Multiple vulnerabilities |
37e30313-9d8c-11db-858b-0060084a00e5 |
fetchmail -- crashes when refusing a message bound for an MDA |
37ed8e9c-2651-11e5-86ff-14dae9d210b8 |
django -- multiple vulnerabilities |
380e8c56-8e32-11e1-9580-4061862b8c22 |
mozilla -- multiple vulnerabilities |
381183e8-3798-11e5-9970-14dae9d210b8 |
net-snmp -- snmp_pdu_parse() function incomplete initialization |
38195f00-b215-11e1-8132-003067b2972c |
linux-flashplugin -- multiple vulnerabilities |
381deebb-f5c9-11e9-9c4f-74d435e60b7c |
file -- Heap buffer overflow possible |
38242d51-3e58-11e4-ac2f-bcaec565249c |
dbus -- multiple vulnerabilities |
3831292b-a29d-11ef-af48-6cc21735f730 |
PostgreSQL -- PostgreSQL row security below e.g. subqueries disregards user ID changes |
3837f462-5d6b-11d8-80e3-0020ed76ef5a |
Buffer overflows in XFree86 servers |
383931ba-1818-11e9-92ea-448a5b29e8a9 |
py-matrix-synapse -- undisclosed vulnerability |
3849e28f-8693-11e8-9610-9c5c8e75236a |
curl -- SMTP send heap buffer overflow |
384fc0b2-0144-11e5-8fda-002590263bf5 |
davmail -- fix potential CVE-2014-3566 vulnerability (POODLE) |
38560d79-0e42-11e1-902b-20cf30e32f6d |
Apache APR -- DoS vulnerabilities |
386a14bb-1a21-41c6-a2cf-08d79213379b |
zeek -- potential DoS vulnerabilities |
387bbade-5d1d-11eb-bf20-4437e6ad11c4 |
mutt -- denial of service |
3886cafe-668c-11e2-94b8-1c4bd681f0cf |
django-cms -- XSS Vulnerability |
388d9ee4-7f22-11dd-a66a-0019666436c2 |
mysql -- MyISAM table privileges security bypass vulnerability |
388e6557-8c80-11ee-9ee3-84a93843eb75 |
MariaDB -- Denial-of-Service vulnerability |
388ebb5b-3c95-11eb-929d-d4c9ef517024 |
Unbound/NSD -- Denial of service vulnerability |
388eefc0-c93f-11ee-92ce-4ccc6adda413 |
readstat -- Heap buffer overflow in readstat_convert |
3897a2f8-1d57-11d9-bc4a-000c41e2cdad |
tiff -- multiple integer overflows |
38a4a043-e937-11eb-9b84-d4c9ef517024 |
MySQL -- Multiple vulnerabilities |
38bdf10e-2293-11e0-bfa4-001676740879 |
tor -- remote code execution and crash |
38c676bd-9def-11ea-a94c-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
38c76fcf-1744-11da-978e-0001020eed82 |
pam_ldap -- authentication bypass vulnerability |
38d2df4d-b143-11e9-87e7-901b0e934d69 |
py-matrix-synapse -- multiple vulnerabilities |
38daea4f-2851-11e2-9483-14dae938ec40 |
opera -- multiple vulnerabilities |
38f213b6-8f3d-4067-91ef-bf14de7ba518 |
libXpm -- Issues handling XPM files |
38f2e3a0-b61e-11ec-9ebc-1c697aa5a594 |
FreeBSD -- zlib compression out-of-bounds write |
38fdf07b-e8ec-11ea-8bbe-e0d55e2a8bf9 |
ark -- extraction outside of extraction directory |
38fec4bd-90f7-11e8-aafb-1c39475b9f84 |
Fix a buffer overflow in the tiff reader |
3904f759-5659-11e5-a207-6805ca0b3d42 |
phpMyAdmin -- reCaptcha bypass |
392b5b1d-9471-11dc-9db7-001c2514716c |
php -- multiple security vulnerabilities |
3934cc60-f0fa-4eca-be09-c8bd7ae42871 |
Salt -- multiple vulnerabilities |
395e0faa-ffa7-11e0-8ac4-6c626dd55a41 |
phpmyfaq -- Remote PHP Code Injection Vulnerability |
395ed9d5-3cca-11e9-9ba0-4c72b94353b5 |
mybb -- vulnerabilities |
396ee517-a607-11d9-ac72-000bdb1444a4 |
horde -- Horde Page Title Cross-Site Scripting Vulnerability |
3987c5d1-47a9-11df-a0d5-0016d32f24fb |
KDM -- local privilege escalation vulnerability |
39953788-6bbb-11d9-8bc9-000a95bc6fae |
egroupware -- arbitrary file download in JiNN |
39988ee8-1918-11dc-b6bd-0016179b2dd5 |
cups -- Incomplete SSL Negotiation Denial of Service |
399f4cd7-4d59-11de-8811-0030843d3802 |
eggdrop -- denial of service vulnerability |
39a25a63-eb5c-11de-b650-00215c6a37bb |
php -- multiple vulnerabilities |
39a30e0a-0c34-431b-9dce-b87cab02412a |
Sanitize -- XSS vulnerability |
39bc2294-ff32-4972-9ecb-b9f40b4ccb74 |
Mozilla -- multiple vulnerabilities |
39bd57e6-5d83-11d8-80e3-0020ed76ef5a |
pine remotely exploitable vulnerabilities |
39f6cbff-b30a-11e9-a87f-a4badb2f4699 |
FreeBSD -- telnet(1) client multiple vulnerabilities |
3a023570-91ab-11ed-8950-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
3a1474ba-f646-11e9-b0af-b888e347c638 |
sudo -- Potential bypass of Runas user restrictions |
3a1dc8c8-bb27-11ec-98d1-d43d7eed0ce2 |
Subversion -- Multiple vulnerabilities in server code |
3a408f6f-9c52-11d8-9366-0020ed76ef5a |
libpng denial-of-service |
3a429192-c36a-11e2-97a9-6805ca0b3d42 |
RT -- multiple vulnerabilities |
3a469cbc-7a66-11eb-bd3f-08002728f74c |
jasper -- multiple vulnerabilities |
3a4a3e9c-a1fe-11dd-81be-001c2514716c |
wordpress -- snoopy "_httpsrequest()" shell command execution vulnerability |
3a63f478-3b10-11eb-af2a-080027dbe4b7 |
glpi -- bypass of the open redirect protection |
3a65d33b-5950-11e2-b66b-00e0814cab4e |
jenkins -- HTTP access to the server to retrieve the master cryptographic key |
3a66cb69-716f-11e8-be54-3085a9a47796 |
slurm -- insecure handling of user_name and gid fields |
3a6960ef-c8a8-11e1-9924-001fd0af1a4c |
puppet -- multiple vulnerabilities |
3a7c5fc4-b50c-11df-977b-ecc31dd8ad06 |
p5-libwww -- possibility to remote servers to create file with a .(dot) character |
3a81017a-8154-11dc-9283-0016179b2dd5 |
ldapscripts -- Command Line User Credentials Disclosure |
3a888a1e-b321-11e4-83b2-206a8a720317 |
krb5 -- Vulnerabilities in kadmind, libgssrpc, gss_process_context_token VU#540092 |
3aa27226-f86f-11e8-a085-3497f683cb16 |
jenkins -- multiple vulnerabilities |
3aa8b781-d2c4-11e5-b2bd-002590263bf5 |
horde -- XSS vulnerabilities |
3ac80dd2-14df-11dc-bcfc-0016179b2dd5 |
mplayer -- cddb stack overflow |
3ae078ca-c7eb-11e6-ae1b-002590263bf5 |
xen-kernel -- x86 PV guests may be able to mask interrupts |
3ae106e2-d521-11e6-ae1b-002590263bf5 |
tomcat -- multiple vulnerabilities |
3ae21918-31e3-11e8-927b-e8e0b747a45a |
chromium -- vulnerability |
3b018063-4358-11ef-b611-84a93843eb75 |
MySQL -- Multiple vulnerabilities |
3b14b2b4-9014-11ee-98b3-001b217b3468 |
Gitlab -- Vulnerabilities |
3b18e237-2f15-11de-9672-0030843d3802 |
mozilla -- multiple vulnerabilities |
3b260179-e464-460d-bf9f-d5cda6204020 |
racoon -- remote denial-of-service |
3b2ee737-c12d-11e9-aabc-0800274e5f20 |
gitea -- multiple vulnerabilities |
3b3676be-52e1-11d9-a9e7-0001020eed82 |
samba -- integer overflow vulnerability |
3b40bf2c-ad83-11e4-a2b2-0026551a22dc |
PostgreSQL -- multiple buffer overflows and memory issues |
3b47104f-1461-11ed-a0c5-080027240888 |
Django -- multiple vulnerabilities |
3b4a6982-0b24-11da-bc08-0001020eed82 |
libgadu -- multiple vulnerabilities |
3b50881d-1860-4721-aab1-503290e23f6c |
Ruby -- unsafe tainted string vulnerability |
3b5c2362-bd07-11e5-b7ef-5453ed2e2b49 |
libproxy -- stack-based buffer overflow |
3b776502-f601-44e0-87cd-b63f1b9ae42a |
sugarcrm -- multiple vulnerabilities |
3b7967f1-49e8-11df-83fb-0015587e2cc1 |
irssi -- multiple vulnerabilities |
3b7c7f6c-7102-11d8-873f-0020ed76ef5a |
wu-ftpd ftpaccess `restricted-uid'/`restricted-gid' directive may be bypassed |
3b86583a-66a7-11e3-868f-0025905a4771 |
phpmyfaq -- arbitrary PHP code execution vulnerability |
3b903bf3-7f94-11e9-8a5f-c85b76ce9b5a |
suricata -- buffer over-read |
3b9590a1-e358-11e7-a293-54e1ad3d6335 |
libXfont -- multiple memory leaks |
3ba1ca94-a563-11ec-8be6-d4c9ef517024 |
Weechat -- Possible man-in-the-middle attack in TLS connection to servers |
3ba87032-7fbd-11e9-8a5f-c85b76ce9b5a |
serendipity -- XSS |
3bb451fc-db64-11e7-ac58-b499baebfeaf |
OpenSSL -- multiple vulnerabilities |
3bbbe3aa-fbeb-11e1-8bd8-0022156e8794 |
freeradius -- arbitrary code execution for TLS-based authentication |
3bc5691e-38dd-11da-92f5-020039488e34 |
libxine -- format string vulnerability |
3bd3c9f8-41ee-11ec-9bac-589cfc007716 |
puppet -- Unsafe HTTP Redirect |
3bf157fa-e1c6-11d9-b875-0001020eed82 |
sudo -- local race condition vulnerability |
3bf6795c-d44c-4033-9b37-ed2e30f34fca |
electron23 -- multiple vulnerabilities |
3c0237f5-420e-11e7-82c5-14dae9d210b8 |
FreeBSD -- Multiple vulnerabilities of ntp |
3c10ccdf-6a09-11ea-92ab-00163e433440 |
FreeBSD -- Insufficient oce(4) ioctl(2) privilege checking |
3c1a672e-e508-11de-9f4a-001b2134ef46 |
linux-flashplugin -- multiple vulnerabilities |
3c2549b3-3bed-11e7-a9f0-a4badb296695 |
Joomla3 -- SQL Injection |
3c259621-5d4a-11e5-9ad8-14dae9d210b8 |
openslp -- denial of service vulnerability |
3c2eea8c-99bf-11e8-8bee-a4badb2f4699 |
FreeBSD -- Resource exhaustion in TCP reassembly |
3c3d3dcb-bef7-4d20-9580-b4216b5ff6a2 |
electron22 -- multiple vulnerabilities |
3c4693de-ccf7-11e6-a9a5-b499baebfeaf |
phpmailer -- Remote Code Execution |
3c5579f7-294a-11e4-99f6-00e0814cab4e |
django -- multiple vulnerabilities |
3c5a4fe0-9ebb-11e9-9169-fcaa147e860e |
mediawiki -- multiple vulnerabilities |
3c6f8270-3210-4e2f-ba72-a9cdca7417a0 |
jenkins -- multiple vulnerabilities |
3c77f139-3a09-11eb-929d-d4c9ef517024 |
cURL -- Multiple vulnerabilities |
3c7911c9-8a29-11ea-8d8c-005056a311d1 |
samba -- multiple vulnerabilities |
3c7ba82a-d3fb-11ea-9aba-0c9d925bbbc0 |
xorg-server -- Pixel Data Uninitialized Memory Information Disclosure |
3c7d565a-6c64-11e0-813a-6c626dd55a41 |
Asterisk -- multiple vulnerabilities |
3c7edc7a-f680-11e9-a87f-a4badb2f4699 |
FreeBSD -- Multiple vulnerabilities in bzip2 |
3c8d1e5b-b673-11e1-be25-14dae9ebcf89 |
asterisk -- remote crash vulnerability |
3c90e093-7c6e-11e2-809b-6c626d99876c |
FreeBSD -- glob(3) related resource exhaustion |
3c957a3e-2978-11e1-89b4-001ec9578670 |
typo3 -- Remote Code Execution |
3c9b7698-84da-11e8-8c75-d8cb8abf62dd |
Libgit2 -- multiple vulnerabilities |
3cac007f-b27e-11eb-97a0-e09467587c17 |
chromium -- multiple vulnerabilities |
3caf4e6c-4cef-11e6-a15f-00248c0c745d |
typo3 -- Missing access check in Extbase |
3cb6f059-c69d-11db-9f82-000e0c2e438a |
bind -- Multiple Denial of Service vulnerabilities |
3cb88bb2-67a6-11d8-80e3-0020ed76ef5a |
mailman XSS in admin script |
3cc84400-6576-11d9-a9e7-0001020eed82 |
mpg123 -- buffer overflow vulnerability |
3cd46257-bbc5-11e7-a3bc-e8e0b747a45a |
chromium -- Stack overflow in V8 |
3cde510a-7135-11ed-a28b-bff032704f00 |
Gitlab -- Multiple Vulnerabilities |
3ce8c7e2-66cf-11dc-b25f-02e0185f8d72 |
mozilla -- code execution via Quicktime media-link files |
3cf8ea44-1029-11ef-9f97-a8a1599412c6 |
chromium -- multiple security fixes |
3d02520d-b309-11e9-a87f-a4badb2f4699 |
FreeBSD -- IPv6 fragment reassembly panic in pf(4) |
3d0428b2-fdfb-11e4-894f-d050996490d0 |
clamav -- multiple vulnerabilities |
3d0a3eb0-9ca3-11ed-a925-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
3d0e724e-129b-11dc-9f79-0016179b2dd5 |
phppgadmin -- cross site scripting vulnerability |
3d0eeef8-0cf9-11e8-99b0-d017c2987f9a |
Mailman -- Cross-site scripting (XSS) vulnerability in the web UI |
3d1372e1-7822-4fd8-b56e-5ee832afbd96 |
wolfssl -- DDoS amplification in DTLS |
3d19c776-68e7-11ea-91db-0050562a4d7b |
www/py-bleach -- multiple vulnerabilities |
3d1e9267-073f-11d9-b45d-000c41e2cdad |
gdk-pixbuf -- image decoding vulnerabilities |
3d39e927-29a2-11e5-86ff-14dae9d210b8 |
php -- use-after-free vulnerability |
3d5581ff-d388-11ed-8581-a8a1599412c6 |
chromium -- multiple vulnerabilities |
3d55b961-9a2e-11e1-a2ef-001fd0af1a4c |
rubygem-mail -- multiple vulnerabilities |
3d657340-27ea-11e5-a4a5-002590263bf5 |
xen-tools -- Unmediated PCI register access in qemu |
3d675519-5654-11e5-9ad8-14dae9d210b8 |
php -- multiple vulnerabilities |
3d6be69b-d365-11e6-a071-001e67f15f5a |
Irssi -- multiple vulnerabilities |
3d73e384-ad1f-11ed-983c-83fe35862e3a |
go -- multiple vulnerabilities |
3d7dfd63-823b-11ea-b3a8-240a644dd835 |
Client/server denial of service when handling AES-CTR ciphers |
3d8d3548-9d02-11db-a541-000ae42e9b93 |
drupal -- multiple vulnerabilities |
3d915d96-0b1f-11ec-8d9f-080027415d17 |
cyrus-imapd -- multiple-minute daemon hang via input that is mishandled during hash-table interaction |
3d950687-b4c9-4a86-8478-c56743547af8 |
ffmpeg -- multiple vulnerabilities |
3d95c9a7-7d5c-11e3-a8c1-206a8a720317 |
ntpd DRDoS / Amplification Attack using ntpdc monlist command |
3d9f6260-881d-11e5-ab94-002590263bf5 |
xen-kernel -- Uncontrolled creation of large page mappings by PV guests |
3da0352f-2397-11ea-966e-000ffec0b3e1 |
drupal -- Drupal Core - Multiple Vulnerabilities |
3dabf5b8-47c0-11ee-8e38-002590c1f29c |
FreeBSD -- Remote denial of service in IPv6 fragment reassembly |
3dac84c9-bce1-4199-9784-d68af1eb7b2e |
libtremor -- multiple vulnerabilities |
3dada2d5-4e17-4e39-97dd-14fdbd4356fb |
null -- Routinator terminates when RTR connection is reset too quickly after opening |
3dbe9492-f7b8-11e7-a12d-6cc21735f730 |
shibboleth-sp -- vulnerable to forged user attribute data |
3dd46e05-9fb0-11e9-bf65-00012e582166 |
webkit2-gtk3 -- Multiple vulnerabilities |
3dd6ccf4-a3c6-11e7-a52e-0800279f2ff8 |
OpenVPN -- out-of-bounds write in legacy key-method 1 |
3dd7eb58-80ae-11db-b4ec-000854d03344 |
gtar -- GNUTYPE_NAMES directory traversal vulnerability |
3ddcb42b-5b78-11e6-b334-002590263bf5 |
moodle -- multiple vulnerabilities |
3de342fb-40be-11dc-aeac-02e0185f8d72 |
FreeBSD -- Predictable query ids in named(8) |
3de36a19-429d-11e5-9daa-14dae9d210b8 |
gnutls -- MD5 downgrade in TLS signatures |
3de49331-0dec-422c-93e5-e4719e9869c5 |
openvpn -- potential denial-of-service on servers in TCP mode |
3decc87d-2498-11e2-b0c7-000d601460a4 |
ruby -- Unintentional file creation caused by inserting an illegal NUL character |
3df5a920-6edc-11e9-a44b-0050562a4d7b |
comms/hylafax -- Malformed fax sender remote code execution in JPEG support |
3e0072d4-d05b-11d9-9aed-000e0c2e438a |
net-snmp -- fixproc insecure temporary file creation |
3e01aad2-680e-11eb-83e2-e09467587c17 |
chromium -- heap buffer overflow in V8 |
3e0507c6-9614-11e3-b3a5-00e0814cab4e |
jenkins -- multiple vulnerabilities |
3e08047f-5a6c-11e6-a6c3-14dae9d210b8 |
p5-XSLoader -- local arbitrary code execution |
3e0ca488-b3f6-11eb-a5f7-a0f3c100ae18 |
ImageMagick6 -- multiple vulnerabilities |
3e0da406-aece-11e9-8d41-97657151f8c2 |
Exim -- RCE in ${sort} expansion |
3e2c9b63-223c-4575-af5c-816acb14e445 |
rdesktop - critical - Remote Code Execution |
3e2e9b44-25ce-11e7-a175-939b30e0836d |
cURL -- TLS session resumption client cert bypass (again) |
3e33a0bb-6b2f-11e3-b042-20cf30e32f6d |
OpenX -- SQL injection vulnerability |
3e3c860d-7dae-11d9-a9e7-0001020eed82 |
emacs -- movemail format string vulnerability |
3e41c1a6-10bc-11e9-bd85-fcaa147e860e |
Django -- Content spoofing possibility in the default 404 page |
3e44c35f-6cf4-11ef-b813-4ccc6adda413 |
exiv2 -- Out-of-bounds read in AsfVideo::streamProperties |
3e4ffe76-e0d4-11d8-9b0a-000347a4fa7d |
SoX buffer overflows when handling .WAV files |
3e5b8bd3-0c32-452f-a60e-beab7b762351 |
transmission-daemon -- vulnerable to dns rebinding attacks |
3e738678-7582-11ef-bece-2cf05da270f3 |
Gitlab -- vulnerabilities |
3e748551-c732-45f6-bd88-928da16f23a8 |
webkit2-gtk3 -- Multiple vulnerabilities |
3e8b7f8a-49b0-11e4-b711-6805ca0b3d42 |
phpMyAdmin -- XSS vulnerabilities |
3e917407-4b3f-11ef-8e49-001999f8d30b |
Mailpit -- Content Security Policy XSS |
3e9624b3-e92b-4460-8a5a-93247c52c5a1 |
zeek -- Remote crash vulnerability |
3e9be8c4-8192-11d8-9645-0020ed76ef5a |
ecartis buffer overflows and input validation bugs |
3e9d2fde-0567-11ec-b69d-4062311215d5 |
FreeBSD -- Remote code execution in ggatec(8) |
3eb0ccc2-8c6a-11e5-8519-005056ac623e |
strongswan -- authentication bypass vulnerability in the eap-mschapv2 plugin |
3eb2c100-738b-11e0-89f4-001e90d46635 |
Postfix -- memory corruption vulnerability |
3ebb2dc8-4609-11e1-9f47-00e0815b8da8 |
Wireshark -- Multiple vulnerabilities |
3ebd4cb5-657f-11de-883a-00e0815b8da8 |
nagios -- Command Injection Vulnerability |
3ec2e0bc-9ed7-11e5-8f5c-002590263bf5 |
redmine -- open redirect vulnerability |
3ec6ab59-1e0c-11eb-a428-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
3ec8f43b-e8ef-11d9-b875-0001020eed82 |
kernel -- TCP connection stall denial of service |
3eccc968-ab17-11ed-bd9e-589cfc0f81b0 |
phpmyfaq -- multiple vulnerabilities |
3ee577a9-aad4-11ee-86bb-a8a1599412c6 |
chromium -- multiple security fixes |
3ee6e521-0d32-11e8-99b0-d017c2987f9a |
mpv -- arbitrary code execution via crafted website |
3efc106e-c451-11dd-a721-0030843d3802 |
dovecot-managesieve -- Script Name Directory Traversal Vulnerability |
3eff66c5-66c9-11e7-aa1d-3d2e663cef42 |
node.js -- multiple vulnerabilities |
3f09ca29-0e48-11e4-b17a-6805ca0b3d42 |
phpMyAdmin -- multiple XSS vulnerabilities, missing validation |
3f1df2f9-cd22-11e0-9bb2-00215c6a37bb |
PHP -- crypt() returns only the salt for MD5 |
3f321a5a-b33b-11ec-80c2-1bb2c6a00592 |
dnsmasq -- heap use-after-free in dhcp6_no_relay |
3f332f16-9b6b-11e2-8fe9-08002798f6ff |
PostgreSQL -- anonymous remote access data corruption vulnerability |
3f3837cc-48fb-4414-aa46-5b1c23c9feae |
krb5 -- Multiple vulnerabilities |
3f4ac724-fa8b-11d9-afcf-0060084a00e5 |
fetchmail -- denial of service/crash from malicious POP3 server |
3f6d6181-79b2-4d33-bb1e-5d3f9df0c1d1 |
py39-redis -- can send response data to the client of an unrelated request |
3f6de636-8cdb-11e7-9c71-f0def1fd7ea2 |
rubygems -- multiple vulnerabilities |
3f851b22-89fb-11db-a937-003048116330 |
proftpd -- remote code execution vulnerabilities |
3f98ccb3-6b8a-11e9-9b5c-a4badb296695 |
Dovecot -- Multiple vulnerabilities |
3f9b6943-ba58-11ed-bbbd-00e0670f2660 |
strongSwan -- certificate verification vulnerability |
3fa2b372-a9f5-11d9-a788-0001020eed82 |
gaim -- remote DoS on receiving malformed HTML |
3fadb7c6-7b0a-11e0-89b4-001ec9578670 |
mediawiki -- multiple vulnerabilities |
3fadd7e4-f8fb-45a0-a218-8fd6423c338f |
graylog -- include log4j patches |
3fb06284-b1b7-11e5-9728-002590263bf5 |
qemu -- denial of service vulnerability in MSI-X support |
3fbf9db2-658b-11d9-abad-000a95bc6fae |
mozilla -- heap overflow in NNTP handler |
3fcab88b-47bc-11ee-8e38-002590c1f29c |
FreeBSD -- GELI silently omits the keyfile if read from stdin |
3fcb70a4-e22d-11ea-98b2-080027846a02 |
Python -- multiple vulnerabilities |
3fcd52b2-4510-11e6-a15f-00248c0c745d |
ruby-saml -- XML signature wrapping attack |
3fd040be-4f0b-11e1-9e32-0025900931f8 |
php -- arbitrary remote code execution vulnerability |
3ff95dd3-c291-11df-b0dc-00215c6a37bb |
django -- cross-site scripting vulnerability |
400d9d22-d6c5-11da-a14b-00123ffe8333 |
trac -- Wiki Macro Script Insertion Vulnerability |
40173815-6827-11ee-b06f-0050569ceb3a |
GLPI vulnerable to unauthorized access to User data |
40194e1c-6d89-11ea-8082-80ee73419af3 |
rubygem-json -- Unsafe Objection Creation Vulnerability in JSON (Additional fix) |
402ae710-26a2-11dd-ae05-825f4c35000a |
peercast -- arbitrary code execution |
402fccd0-5b6d-11ee-9898-00e081b7aa2d |
jenkins -- multiple vulnerabilities |
4033d826-87dd-11e4-9079-3c970e169bc2 |
ntp -- multiple vulnerabilities |
40497e81-fee3-4e54-9d5f-175a5c633b73 |
libtremor -- memory corruption |
405446f4-b1b3-11e5-9728-002590263bf5 |
qemu and xen-tools -- denial of service vulnerabilities in AMD PC-Net II NIC support |
40544e8c-9f7b-11e0-9bec-6c626dd55a41 |
Asterisk -- multiple vulnerabilities |
40549bbf-43b5-11d9-a9e7-0001020eed82 |
zip -- long path buffer overflow |
4055aee5-f4c6-11e7-95f2-005056925db4 |
awstats -- remote code execution |
4061a4b2-4fb1-11ee-acc7-0151f07bc899 |
gitea -- block user account creation from blocked email domains |
406636fe-055d-11e5-aab1-d050996490d0 |
krb5 -- requires_preauth bypass in PKINIT-enabled KDC |
406779fd-ca3b-11df-aade-0050568f000c |
FreeBSD -- SSL protocol flaw |
40774927-f6b4-11dd-94d9-0030843d3802 |
phplist -- local file inclusion vulnerability |
4084168e-b531-11e5-a98c-0011d823eebd |
mbedTLS/PolarSSL -- SLOTH attack on TLS 1.2 server authentication |
40856a51-e1d9-11d9-b875-0001020eed82 |
opera -- "javascript:" URL cross-site scripting vulnerability |
408f6ebf-d152-11da-962f-000b972eb521 |
cyrus-sasl -- DIGEST-MD5 Pre-Authentication Denial of Service |
4091069e-860b-11e9-a05f-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
40a0185f-ec32-11da-be02-000c6ec775d9 |
drupal -- multiple vulnerabilities |
40a3bca2-6809-11d9-a9e7-0001020eed82 |
cups-base -- HPGL buffer overflow vulnerability |
40a844bf-c430-11e8-96dc-000743165db0 |
bitcoin -- Denial of Service and Possible Mining Inflation |
40a8d798-4615-11e7-8080-a4badb2f4699 |
heimdal -- bypass of capath policy |
40b481a9-9df7-11eb-9bc3-8c164582fbac |
mdbook -- XSS in mdBook's search page |
40bfab16-a68b-11ea-9ea5-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
40d92cc5-1e2b-11e9-bef6-6805ca2fa271 |
powerdns-recursor -- multiple vulnerabilities |
40e2c35e-db99-11ec-b0cf-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
40fcf20f-8891-11d8-90d1-0020ed76ef5a |
racoon remote denial of service vulnerability (IKE Generic Payload Header) |
4108cc57-54d7-11e2-9483-14dae938ec40 |
ircd-ratbox and charybdis -- remote DoS vulnerability |
411ecb79-f9bc-11e0-a7e6-6c626dd55a41 |
piwik -- unknown critical vulnerabilities |
414c18bf-3653-11e7-9550-6cc21735f730 |
PostgreSQL vulnerabilities |
414e6a41-7204-11e2-8599-001060e06fd4 |
linux-flashplugin -- multiple vulnerabilities |
4158c57e-5d39-11e3-bc1e-6cf0490a8c18 |
Joomla! -- Core XSS Vulnerabilities |
416ca0f4-3fe0-11e9-bbdd-6805ca0b3d42 |
rt -- XSS via jQuery |
4175c811-f690-4898-87c5-755b3cf1bac6 |
ntp -- stack-based buffer overflow |
417de1e6-c31b-11eb-9633-b42e99a1b9c3 |
lasso -- signature checking failure |
418c172b-b96f-11e7-b627-d43d7e971a1b |
GitLab -- multiple vulnerabilities |
41af0277-47bf-11ee-8e38-002590c1f29c |
FreeBSD -- Network authentication attack via pam_krb5 |
41bc849f-d5ef-11eb-ae37-589cfc007716 |
PuppetDB -- SQL Injection |
41c1cd6f-2645-11e9-b5f1-080027fee39c |
gitea -- multiple vulnerabilities |
41c60e16-2405-11ee-a0d1-84a93843eb75 |
OpenSSL -- AES-SIV implementation ignores empty associated data entries |
41c96ffd-29a6-4dcc-9a88-65f5038fa6eb |
perl -- multiple vulnerabilities |
41d2f3e6-f680-11e9-a87f-a4badb2f4699 |
FreeBSD -- ICMPv6 / MLDv2 out-of-bounds memory access |
41da2ba4-a24e-11db-bd24-000f3dcc6a5d |
cacti -- Multiple vulnerabilities |
41f4baac-bf77-11e9-8d2f-5404a68ad561 |
traefik -- Denial of service in HTTP/2 |
41f8af15-c8b9-11e6-ae1b-002590263bf5 |
squid -- multiple vulnerabilities |
41fe4724-06a2-11e7-8e3e-5453ed2e2b49 |
kde-runtime -- kdesu: displayed command truncated by unicode string terminator |
4200d5f5-b985-11ea-b08a-f8b156b6dcc8 |
libvorbis -- two vulnerabilities |
420243e9-a840-11e7-b5af-a4badb2f4699 |
FreeBSD -- heimdal KDC-REP service name validation vulnerability |
421c0af9-b206-11ed-9fe5-f4a47516fb57 |
libde256 -- multiple vulnerabilities |
4238151d-207a-11d9-bfe2-0090962cff2a |
mod_ssl -- SSLCipherSuite bypass |
425b9538-ce5f-11ed-ade3-d4c9ef517024 |
OpenSSL -- Multiple vulnerabilities |
425f2143-8876-4b0a-af84-e0238c5c2062 |
jenkins -- Arbitrary file read vulnerability in workspace browsers |
4260eacb-26b8-11d9-9289-000c41e2cdad |
gaim -- multiple buffer overflows |
42675046-fa70-11e9-ba4e-901b0e934d69 |
py-matrix-synapse -- missing signature checks on some federation APIs |
427b0f58-644c-11e8-9e1b-e8e0b747a45a |
chromium -- multiple vulnerabilities |
4281b712-ad6b-4c21-8f66-619a9150691f |
electron25 -- Use after free in extensions vulnerability |
42852f72-6bd3-11e5-9909-002590263bf5 |
OpenSMTPD -- multiple vulnerabilities |
42880202-c81c-11e6-a9a5-b499baebfeaf |
cURL -- buffer overflow |
428922c9-b07e-11ed-8700-5404a68ad561 |
traefik -- Use of vulnerable Go module x/net/http2 |
429249d2-67a7-11d8-80e3-0020ed76ef5a |
mailman XSS in create script |
42926d7b-0da3-11eb-8dbd-6451062f0f7a |
Flash Player -- arbitrary code execution |
42a2c82a-75b9-11e1-89b4-001ec9578670 |
quagga -- multiple vulnerabilities |
42a4d82d-4603-11ec-8be6-d4c9ef517024 |
Roundcube -- Multiple vulnerabilities |
42c2c422-df55-11e5-b2bd-002590263bf5 |
wireshark -- multiple vulnerabilities |
42c98cef-62b1-4b8b-9065-f4621e08d526 |
libvpx -- out-of-bounds write |
42cbd1e8-b152-11e5-9728-002590263bf5 |
qemu -- denial of service vulnerability in virtio-net support |
42d42090-9a4d-11e3-b029-08002798f6ff |
PostgreSQL -- multiple privilege issues |
42ec2207-7e85-11ef-89a4-b42e991fc52e |
sqlite -- use-after-free bug in jsonparseaddnodearray |
43024078-9b63-11df-8983-001d60d86f38 |
libmspack -- infinite loop denial of service |
432bf98d-9e25-11da-b410-000e0c2e438a |
kpdf -- heap based buffer overflow |
4344861a-be0b-11ea-9172-4c72b94353b5 |
Anydesk -- Multiple Vulnerabilities |
4364e1f1-0f44-11e4-b090-20cf30e32f6d |
apache24 -- several vulnerabilities |
436d7f93-9cf0-11ea-82b8-4c72b94353b5 |
piwigo -- Multible Vulnerabilities |
43768ff3-c683-11ee-97d0-001b217b3468 |
Libgit2 -- multiple vulnerabilities |
43770b1c-72f6-11da-8c1d-000e0c2e438a |
nbd-server -- buffer overflow vulnerability |
437a68cf-b752-11de-b6eb-00e0815b8da8 |
php5 -- Multiple security issues |
43891162-2d5e-11e5-a4a5-002590263bf5 |
moodle -- multiple vulnerabilities |
439f3f81-7a49-11ed-97ac-589cfc0f81b0 |
phpmyfaq -- multiple vulnerabilities |
43a1b8f9-3451-4f3c-b4fc-730c0f5876c1 |
sam2p -- multiple issues |
43a7b0a7-f9bc-11d9-b473-00061bc2ad93 |
PowerDNS -- LDAP backend fails to escape all queries |
43ac9d42-1b9a-11e5-b43d-002590263bf5 |
elasticsearch and logstash -- remote OS command execution via dynamic scripting |
43ae57f6-92ab-11ec-81b4-2cf05d620ecc |
Qt5 -- QProcess unexpected search path |
43cb40b3-c8c2-11da-a672-000e0c2e438a |
f2c -- insecure temporary files |
43d1c381-a3e5-4a1d-b3ed-f37b61a451af |
electron28 -- multiple vulnerabilities |
43e9ffd4-d6e0-11ed-956f-7054d21a9e2a |
py39-pycares -- domain hijacking vulnerability |
43eaa656-80bc-11e6-bf52-b499baebfeaf |
OpenSSL -- multiple vulnerabilities |
43ee6c1d-29ee-11e9-82a1-001b217b3468 |
Gitlab -- Multiple vulnerabilities |
43f1c867-654a-11e6-8286-00248c0c745d |
Rails 4 -- Possible XSS Vulnerability in Action View |
43f84437-73ab-11ec-a587-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
4405e9ad-97fe-11ee-86bb-a8a1599412c6 |
chromium -- multiple security fixes |
441e1e1a-27a5-11ee-a156-080027f5fec9 |
samba -- multiple vulnerabilities |
44224e08-8306-11dc-9283-0016179b2dd5 |
opera -- multiple vulnerabilities |
44449bf7-c69b-11db-9f82-000e0c2e438a |
gtar -- name mangling symlink vulnerability |
4451a4c9-c05e-11dc-982e-001372fd0af2 |
drupal -- cross site request forgery |
445ed958-b0d9-11dd-a55e-00163e000016 |
faad2 -- heap overflow vulnerability |
4464212e-4acd-11e5-934b-002590263bf5 |
go -- multiple vulnerabilities |
4465c897-ee5c-11de-b6ef-00215c6a37bb |
monkey -- improper input validation vulnerability |
446dbecb-9edc-11d8-9366-0020ed76ef5a |
heimdal kadmind remote heap buffer overflow |
4472ab39-6c66-11e6-9ca5-50e549ebab6c |
kdelibs -- directory traversal vulnerability |
448047e9-030e-4ce4-910b-f21a3ad5d9a0 |
shotwell -- not verifying certificates |
44864c84-d3b8-11e8-b3cb-00e04c1ea73d |
matomo -- XSS vulnerability |
44989c29-67d1-11e6-8b1d-c86000169601 |
fontconfig -- insufficiently cache file validation |
44b6dfbf-4ef7-4d52-ad52-2b1b05d81272 |
mozilla -- multiple vulnerabilities |
44c8694a-12f9-11dd-9b26-001c2514716c |
extman -- password bypass vulnerability |
44ccfab0-3564-11e0-8e81-0022190034c0 |
exim -- local privilege escalation |
44d0f8dc-6607-11e3-bb11-0025900931f8 |
zabbix -- shell command injection vulnerability |
44d9daee-940c-4179-86bb-6e3ffd617869 |
mozilla -- multiple vulnerabilities |
44e5f5bd-4d76-11da-bf37-000fb586ba73 |
pear-PEAR -- PEAR installer arbitrary code execution vulnerability |
44e7764c-2614-11da-9e1e-c296ac722cb3 |
squid -- possible denial of service condition regarding NTLM authentication |
44ee8160-c453-11dd-a721-0030843d3802 |
mgetty+sendfax -- symlink attack via insecure temporary files |
44fb0302-9d38-11dc-9114-001c2514716c |
rubygem-rails -- JSON XSS vulnerability |
450b76ee-5068-11db-a5ae-00508d6a62df |
dokuwiki -- multiple vulnerabilities |
45117749-df55-11e5-b2bd-002590263bf5 |
wireshark -- multiple vulnerabilities |
451a6c79-c92b-11e4-a835-000c292ee6b8 |
sympa -- Remote attackers can read arbitrary files |
45298931-b3bf-11dd-80f8-001cc0377035 |
gnutls -- X.509 certificate chain validation vulnerability |
452d16bb-920d-11ea-9d20-18a6f7016652 |
qutebrowser -- Reloading page with certificate errors shows a green URL |
453aa0fc-2d91-11ef-8a0f-a8a1599412c6 |
chromium -- multiple security fixes |
4548ec97-4d38-11ec-a539-0800270512f4 |
rubygem-cgi -- cookie prefix spoofing in CGI::Cookie.parse |
45500f74-5947-11dc-87c1-000e2e5785ad |
fetchmail -- denial of service on reject of local warning message |
456375e1-cd09-11ea-9172-4c72b94353b5 |
pango -- buffer overflow |
45671c0e-a652-11e8-805b-a4badb2f4699 |
FreeBSD -- Unauthenticated EAPOL-Key Decryption Vulnerability |
457ce015-67fa-11e7-867f-b499baebfeaf |
Apache httpd -- multiple vulnerabilities |
4582948a-9716-11de-83a5-001999392805 |
opera -- multiple vulnerabilities |
458df97f-1440-11eb-aaec-e0d55e2a8bf9 |
freetype2 -- heap buffer overlfow |
4593cb09-4c81-11d9-983e-000c6e8f12ef |
konqueror -- Password Disclosure for SMB Shares |
459df1ba-051c-11ea-9673-4c72b94353b5 |
wordpress -- multiple issues |
45a72180-a640-11ec-a08b-85298243e224 |
openvpn -- Potential authentication by-pass with multiple deferred authentication plug-ins |
45a95fdd-f680-11e9-a87f-a4badb2f4699 |
FreeBSD -- Insufficient message length validation in bsnmp library |
45b75152-ae5f-11d9-a788-0001020eed82 |
mozilla -- javascript "lambda" replace exposes memory contents |
45b8716b-c707-11eb-b9a0-6805ca0b3d42 |
pglogical -- shell command injection in pglogical.create_subscription() |
45b8e2eb-7056-11e8-8fab-63ca6e0e13a2 |
node.js -- multiple vulnerabilities |
45bea6b5-8855-11e9-8d41-97657151f8c2 |
Exim -- RCE in deliver_message() function |
45ca25b5-ba4d-11e6-ae1b-002590263bf5 |
xen-kernel -- x86: Disallow L3 recursive pagetable for 32-bit PV guests |
45d89773-5b64-11e9-80ed-d43d7ef03aa6 |
Flash Player -- multiple vulnerabilities |
45f102cd-4456-11e0-9580-4061862b8c22 |
mozilla -- multiple vulnerabilities |
4622635f-37a1-11e5-9970-14dae9d210b8 |
net-snmp -- snmptrapd crash |
462e2d6c-8017-11e1-a571-bcaec565249c |
freetype -- multiple vulnerabilities |
46419e8c-65d9-11ef-ac06-b0416f0c4c67 |
Configobj -- Regular Expression Denial of Service attack |
4645b98c-e46e-11da-9ae7-00123fcc6e5c |
vnc -- authentication bypass vulnerability |
465db5b6-9c6d-11eb-8e8a-bc542f4bd1dd |
xorg-server -- Input validation failures in X server XInput extension |
466ba8bd-d033-11ed-addf-080027eda32c |
mediawiki -- multiple vulnerabilities |
4671cdc9-7c6d-11e2-809b-6c626d99876c |
FreeBSD -- BIND remote DoS with deliberately crafted DNS64 query |
467b7cbe-257d-11e9-8573-001b217b3468 |
Gitlab -- Multiple vulnerabilities |
4684a426-774d-4390-aa19-b8dd481c4c94 |
wireshark -- multiple security issues |
46a29f83-cb47-11ee-b609-002590c1f29c |
FreeBSD -- jail(2) information leak |
46aeba13-64a1-11e1-bc16-0023ae8e59f0 |
openx -- undisclosed security issue |
46b922a8-c69c-11db-9f82-000e0c2e438a |
FreeBSD -- Jail rc.d script privilege escalation |
46e1ece5-48bd-11e9-9c40-080027ac955c |
PuTTY -- security fixes in new release |
46f7b598-a781-11da-906a-fde5cdde365e |
bugzilla -- multiple vulnerabilities |
47157c14-9013-11e6-a590-14dae9d210b8 |
mupdf -- multiple vulnerabilities |
47197b47-6a1a-11ec-8be6-d4c9ef517024 |
Roundcube -- XSS vulnerability |
4729c849-4897-11e6-b704-000c292e4fd8 |
samba -- client side SMB2/3 required signing can be downgraded |
473b6a9e-8493-11e7-b24b-6cf0497db129 |
drupal -- Drupal Core - Multiple Vulnerabilities |
4740174c-82bb-11e8-a29a-00e04c1ea73d |
wordpress -- multiple issues |
475f952c-9b29-11e9-a8a5-6805ca0b38e8 |
irssi -- Use after free when sending SASL login to the server |
47695a9c-5377-11ec-8be6-d4c9ef517024 |
NSS -- Memory corruption |
4769914e-b844-11de-b159-0030843d3802 |
phpmyadmin -- XSS and SQL injection vulnerabilities |
4775c807-8f30-11dd-821f-001cc0377035 |
mysql -- command line client input validation vulnerability |
47873d72-14eb-11e7-970f-002590263bf5 |
xen-tools -- xenstore denial of service via repeated update |
478d4102-2319-4026-b3b2-a57c48f159ac |
ansible -- information disclosure flaw |
479c5b91-b6cc-11e6-a04e-3417eb99b9a0 |
wget -- Access List Bypass / Race Condition |
479df73e-2838-11ef-9cab-4ccc6adda413 |
plasma[56]-plasma-workspace -- Unauthorized users can access session manager |
479efd57-516e-11e3-9b62-000c292e4fd8 |
samba -- Private key in key.pem world readable |
479fdfda-6659-11eb-83e2-e09467587c17 |
www/chromium -- multiple vulnerabilities |
47aa4343-44fa-11e5-9daa-14dae9d210b8 |
mod_jk -- information disclosure |
47b4e713-6513-11e3-868f-0025905a4771 |
PHP5 -- memory corruption in openssl_x509_parse() |
47b571f2-157b-11ec-ae98-704d7b472482 |
chromium -- multiple vulnerabilities |
47bdabcf-3cf9-11da-baa2-0004614cc33d |
gallery2 -- file disclosure vulnerability |
47e2e52c-975c-11e7-942d-5404a68a61a2 |
emacs -- enriched text remote code execution vulnerability |
47f13540-c4cb-4971-8dc6-28d0dabfd9cd |
nut -- upsd can be remotely crashed |
48103b0a-ca3f-11df-aade-0050568f000c |
FreeBSD -- ntpd mode 7 denial of service |
48108fb0-751c-4cbb-8f33-09239ead4b55 |
NSS -- RSA Signature Forgery |
482456fb-e9af-11ec-93b6-318d1419ea39 |
Security Vulnerability found in ExifTool leading to RCE |
482bb980-99a3-11ee-b5f7-6bd56600d90c |
gitea -- missing permission checks |
482d40cb-f9a3-11e5-92ce-002590263bf5 |
php -- multiple vulnerabilities |
484d3f5e-653a-11e9-b0e3-1c39475b9f84 |
Istio -- Security vulnerabilities |
48504af7-07ad-11e5-879c-00e0814cab4e |
django -- Fixed session flushing in the cached_db backend |
48514901-711d-11eb-9846-e09467587c17 |
chromium -- multiple vulnerabilities |
4867ae85-608d-11db-8faf-000c6ec775d9 |
opera -- URL parsing heap overflow vulnerability |
486aff57-9ecd-11da-b410-000e0c2e438a |
postgresql -- character conversion and tsearch2 vulnerabilities |
4872d9a7-4128-11dc-bdb0-0016179b2dd5 |
joomla -- multiple vulnerabilities |
48894ca9-3e6f-11e8-92f0-f0def167eeea |
roundcube -- IMAP command injection vulnerability |
48a59c96-9c6e-11d9-a040-000a95bc6fae |
wine -- information disclosure due to insecure temporary file handling |
48aab1d0-4252-11de-b67a-0030843d3802 |
libwmf -- integer overflow vulnerability |
48bcb4b2-e708-11e1-a59d-000d601460a4 |
typo3 -- Multiple vulernabilities in TYPO3 Core |
48cca164-e269-11e7-be51-6599c735afc8 |
global -- gozilla vulnerability |
48e14d86-42f1-11de-ad22-000e35248ad7 |
libxine -- multiple vulnerabilities |
48e6d514-5568-11ef-af48-6cc21735f730 |
PostgreSQL -- Prevent unauthorized code execution during pg_dump |
48e83187-b6e9-11e6-b6cf-5453ed2e2b49 |
p7zip -- Null pointer dereference |
4910d161-58a4-11e5-9ad8-14dae9d210b8 |
openldap -- denial of service vulnerability |
4913886c-e875-11da-b9f4-00123ffe8333 |
MySQL -- Information Disclosure and Buffer Overflow Vulnerabilities |
49211361-ba4d-11e6-ae1b-002590263bf5 |
xen-kernel -- x86: Mishandling of instruction pointer truncation during emulation |
492f8896-70fa-11d8-873f-0020ed76ef5a |
Apache 2 mod_ssl denial-of-service |
49314321-7fd4-11e1-9582-001b2134ef46 |
mutt-devel -- failure to check SMTP TLS server certificate |
49346de2-b015-11eb-9bdf-f8b156b6dcc8 |
FLAC -- out-of-bounds read |
495b46fd-a30f-11e1-82c9-d0df9acfd7e5 |
foswiki -- Script Insertion Vulnerability via unchecked user registration fields |
496160d3-d3be-11e6-ae1b-002590263bf5 |
codeigniter -- multiple vulnerabilities |
497b82e0-f9a0-11e5-92ce-002590263bf5 |
pcre -- heap overflow vulnerability |
498a8731-7cfc-11dc-96e6-0012f06707f0 |
phpmyadmin -- cross-site scripting vulnerability |
499b22a3-f680-11e9-a87f-a4badb2f4699 |
FreeBSD -- Insufficient validation of guest-supplied data (e1000 device) |
499f6b41-58db-4f98-b8e7-da8c18985eda |
quassel -- multiple vulnerabilities |
49a6026a-52a3-11e2-a289-1c4bd681f0cf |
otrs -- XSS vulnerability in Internet Explorer |
49ad1bf8-5d7e-11d8-80e3-0020ed76ef5a |
ChiTeX/ChiLaTeX unsafe set-user-id root |
49adfbe5-e7d1-11ec-8fbd-d4c9ef517024 |
Apache httpd -- Multiple vulnerabilities |
49b61ab6-0d04-11ea-87ca-001999f8d30b |
asterisk -- AMI user could execute system commands |
49beb00f-a6e1-4a42-93df-9cb14b4c2bee |
Mozilla -- multiple vulnerabilities |
49c35943-0eeb-421c-af4f-78e04582e5fb |
seatd-launch -- privilege escalation with SUID |
49cbe200-f92a-11e8-a89d-d43d7ef03aa6 |
Flash Player -- multiple vulnerabilities |
49d9c28c-fbad-11e4-b0fb-00269ee29e57 |
Quassel IRC -- SQL injection vulnerability |
49dd9362-4473-48ae-8fac-e1b69db2dedf |
electron{27,28} -- Out of bounds memory access in V8 |
49def4b7-9ed6-11e5-8f5c-002590263bf5 |
redmine -- information leak vulnerability |
49e8f2ee-8147-11de-a994-0030843d3802 |
mozilla -- multiple vulnerabilities |
49ef501c-62b6-11ef-bba5-2cf05da270f3 |
Gitlab -- vulnerabilities |
4a026b6c-f2b8-11ee-8e76-a8a1599412c6 |
chromium -- multiple security fixes |
4a088d67-3af2-11e7-9d75-c86000169601 |
freetype2 -- buffer overflows |
4a08a4fb-f152-11ed-9c88-001b217b3468 |
Gitlab -- Vulnerability |
4a0b334d-8d8d-11d9-afa0-003048705d5a |
phpbb -- Insuffient check against HTML code in usercp_register.php |
4a0d9b53-395d-11e6-b3c8-14dae9d210b8 |
libarchive -- multiple vulnerabilities |
4a10902f-8a48-11ea-8668-e0d55e2a8bf9 |
vlc -- Multiple vulnerabilities fixed in VLC media player |
4a114331-0d24-11e4-8dd2-5453ed2e2b49 |
kdelibs4 -- KMail/KIO POP3 SSL Man-in-the-middle Flaw |
4a1ca8a4-bd82-11e2-b7a0-d43d7e0c7c02 |
mozilla -- multiple vulnerabilities |
4a1e2bad-0836-11ef-9fd2-1c697a616631 |
R -- arbitrary code execution vulnerability |
4a21ce2c-bb13-11df-8e32-000f20797ede |
mozilla -- multiple vulnerabilities |
4a338d17-412d-11dc-bdb0-0016179b2dd5 |
fsplib -- multiple vulnerabilities |
4a3482da-3624-11e0-b995-001b2134ef46 |
linux-flashplugin -- multiple vulnerabilities |
4a4712ae-7299-11ee-85eb-84a93843eb75 |
OpenSSL -- potential loss of confidentiality |
4a4e9f88-491c-11e4-ae2c-c80aa9043978 |
bash -- out-of-bounds memory access in parser |
4a638895-41b7-11de-b1cc-00219b0fc4d8 |
mod_perl -- cross-site scripting |
4a67450a-e044-11e7-accc-001999f8d30b |
asterisk -- Remote Crash Vulnerability in RTCP Stack |
4a88e3ed-00d3-11e5-a072-d050996490d0 |
pcre -- multiple vulnerabilities |
4a8a98ab-f745-11e1-8bd8-0022156e8794 |
moinmoin -- cross-site scripting via RST parser |
4a99d61c-f23a-11dd-9f55-0030843d3802 |
perl -- Directory Permissions Race Condition |
4aab7bcd-b294-11dc-a6f0-00a0cce0781e |
gallery2 -- multiple vulnerabilities |
4aae54be-ba4d-11e6-ae1b-002590263bf5 |
xen-kernel -- x86 HVM: Overflow of sh_ctxt->seg_reg[] |
4ab29e12-e787-11df-adfa-00e0815b8da8 |
Mailman -- cross-site scripting in web interface |
4ab413ea-66ce-11e0-bf05-d445f3aa24f0 |
krb5 -- MITKRB5-SA-2011-002, KDC vulnerable to hang when using LDAP back end |
4ade0c4d-7e83-11ee-9a8c-00155d01f201 |
libsndfile_project -- Integer overflow in dataend calculation |
4ae135f7-85cd-4c32-ad94-358271b31f7f |
zeek -- potential denial of service issues |
4ae68e7c-dda4-11e0-a906-00215c6a37bb |
roundcube -- XSS vulnerability |
4aec9d58-ce7b-11d8-858d-000d610a3b12 |
Format string vulnerability in SSLtelnet |
4af3241d-1f0c-11e9-b4bd-d43d7eed0ce2 |
www/mod_dav_svn -- Malicious SVN clients can crash mod_dav_svn. |
4af92a40-db33-11e6-ae1b-002590263bf5 |
groovy -- remote execution of untrusted code/DoS vulnerability |
4afacca1-eb9d-11d9-a8bd-000cf18bbe54 |
phpbb -- remote PHP code execution vulnerability |
4b09378e-addb-11dd-a578-0030843d3802 |
vlc -- cue processing stack overflow |
4b172278-3f46-11de-becb-001cc0377035 |
pango -- integer overflow |
4b1ac5a3-5bd4-11ec-8602-589cfc007716 |
OpenSearch -- Log4Shell |
4b228e69-22e1-4019-afd0-8aa716d0ec0b |
wireshark -- multiple security issues |
4b3a7e70-afce-11e5-b864-14dae9d210b8 |
mono -- DoS and code execution |
4b3a8e7d-9372-11ef-87ad-a8a15998b5cb |
hwloc2 -- Denial of service or other unspecified impacts |
4b448a96-ff73-11e2-b28d-080027ef73ec |
PuTTY -- Four security holes in versions before 0.63 |
4b478274-47a0-11ec-bd24-6c3be5272acd |
Grafana -- XSS |
4b60c3d9-8640-11ed-a762-482ae324f959 |
netdata -- multiple vulnerabilities with streaming |
4b636f50-f011-11ed-bbae-6cc21735f730 |
postgresql-server -- Row security policies disregard user ID changes after inlining |
4b673ae7-5f9a-11dc-84dd-000102cc8983 |
lighttpd -- FastCGI header overrun in mod_fastcgi |
4b68d917-e705-11dd-afcd-00e0815b8da8 |
Teamspeak Server -- Directory Traversal Vulnerability |
4b6cb45d-881e-447a-a4e0-c97a954ea758 |
bzip2 -- multiple issues |
4b738d54-2427-11e2-9817-c8600054b392 |
RT -- Multiple Vulnerabilities |
4b79538b-a450-11e2-9898-001060e06fd4 |
FreeBSD -- Multiple Denial of Service vulnerabilities with named(8) |
4b7dbfab-4c6b-11e1-bc16-0023ae8e59f0 |
apache -- multiple vulnerabilities |
4b7ed61f-7bbf-11ef-9369-2cf05da270f3 |
Gitlab -- vulnerabilities |
4b8b748e-2a24-11e2-bb44-003067b2972c |
linux-flashplugin -- multiple vulnerabilities |
4b9393b8-7c0c-11e5-a010-080027ddead3 |
xscreensaver - lock bypass |
4b98613c-0078-11e9-b05b-00e04c1ea73d |
wordpress -- multiple issues |
4b9c1c17-587c-11ed-856e-d4c9ef517024 |
MySQL -- Multiple vulnerabilities |
4b9ca994-e3d9-11e6-813d-e8e0b747a45a |
chromium -- multiple vulnerabilities |
4bae544d-06a3-4352-938c-b3bcbca89298 |
ffmpeg -- multiple vulnerabilities |
4bb56d2f-a5b0-11ea-a860-08002728f74c |
nghttp2 -- DoS vulnerability |
4bc66a81-89d2-4696-a04b-defd2eb77783 |
vscode -- VS Code Remote Code Execution Vulnerability |
4bd33bc5-0cd6-11e0-bfa4-001676740879 |
tor -- remote crash and potential remote code execution |
4bf57137-ba4d-11e6-ae1b-002590263bf5 |
xen-kernel -- use after free in FIFO event channel code |
4bfcd857-c628-11da-b2fb-000e0c2e438a |
kaffeine -- buffer overflow vulnerability |
4c005a5e-2541-4d95-80a0-00c76919aa66 |
fd_set -- bitmap index overflow in multiple applications |
4c017345-1d89-11e0-bbee-0014a5e3cda6 |
MoinMoin -- cross-site scripting vulnerabilities |
4c11b51e-cd8d-11e8-b0cb-a0f3c100ae18 |
Memory leak bug in Toxcore |
4c1ac2dd-c788-11e1-be25-14dae9ebcf89 |
asterisk -- multiple vulnerabilities |
4c26f668-0fd2-11ed-a83d-001b217b3468 |
Gitlab -- multiple vulnerabilities |
4c52ec3c-86f3-11ea-b5b4-641c67a117d8 |
py-bleach -- regular expression denial-of-service |
4c53f007-f2ed-11e1-a215-14dae9ebcf89 |
asterisk -- multiple vulnerabilities |
4c69240f-f02c-11ea-838a-0011d823eebd |
Mbed TLS -- Local side channel attack on classical CBC decryption in (D)TLS |
4c8c2218-b120-11ee-90ec-001b217b3468 |
Gitlab -- vulnerabilities |
4c8d1d72-9b38-11e5-aece-d050996490d0 |
openssl -- multiple vulnerabilities |
4c9159ea-d4c9-11eb-aeee-8c164582fbac |
Ansible -- Templating engine bug |
4c96ecf2-5fd9-11e6-a6c3-14dae9d210b8 |
FreeBSD -- bsnmpd remote denial of service vulnerability |
4ca26574-2a2c-11e2-99c7-00a0d181e71d |
tomcat -- Denial of Service |
4ca5894c-f7f1-11ea-8ff8-0022489ad614 |
Node.js -- September 2020 Security Releases |
4caf01e2-30e6-11e5-a4a5-002590263bf5 |
libidn -- out-of-bounds read issue with invalid UTF-8 input |
4cb165f0-6e48-423e-8147-92255d35c0f7 |
NSS -- multiple vulnerabilities |
4cb49a23-6c89-11e8-8b33-e8e0b747a45a |
chromium -- Incorrect handling of CSP header |
4cb9c513-03ef-11dc-a51d-0019b95d4f14 |
png -- DoS crash vulnerability |
4ccbd40d-03f7-11e0-bf50-001a926c7637 |
krb5 -- client impersonation vulnerability |
4ccee784-a721-11e0-89b4-001ec9578670 |
BIND -- Remote DoS with certain RPZ configurations |
4cd857d9-26d2-4417-b765-69701938f9e0 |
libraw -- denial of service and remote code execution |
4cd9b19f-f66d-11e5-b94c-001999f8d30b |
Multiple vulnerabilities in Botan |
4cdfe875-e8d6-11e1-bea0-002354ed89bc |
Wireshark -- Multiple vulnerabilities |
4ce3c20b-124b-11de-a964-0030843d3802 |
phppgadmin -- directory traversal with register_globals enabled |
4ce7c28a-11ac-11ea-b537-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
4d087b35-0990-11e3-a9f4-bcaec565249c |
gstreamer-ffmpeg -- Multiple vulnerabilities in bundled libav |
4d11d37e-9a8d-11ea-b9b8-641c67a117d8 |
Zabbix -- Remote code execution |
4d1d2f6d-ec94-11e1-8bd8-0022156e8794 |
jabberd -- domain spoofing in server dialback protocol |
4d2f9d09-ddb7-11e6-a9a5-b499baebfeaf |
mysql -- multiple vulnerabilities |
4d3d4f64-f680-11e9-a87f-a4badb2f4699 |
FreeBSD -- IPv6 remote Denial-of-Service |
4d49f4ba-071f-11d9-b45d-000c41e2cdad |
apache -- ap_resolve_env buffer overflow |
4d4caee0-b939-11dd-a578-0030843d3802 |
streamripper -- multiple buffer overflows |
4d6076fe-ee7a-11de-9cd0-001a926c7637 |
fuser -- missing user's privileges check |
4d6b5ea9-bc64-4e77-a7ee-d62ba68a80dd |
chromium -- multiple vulnerabilities |
4d763c65-9246-11ec-9aa3-4ccc6adda413 |
libmysoft -- Heap-based buffer overflow vulnerability |
4d7cf654-ba4d-11e6-ae1b-002590263bf5 |
xen-kernel -- CR0.TS and CR0.EM not always honored for x86 HVM guests |
4d837296-cc28-11d8-a54c-02e0185c0b53 |
GNATS local privilege elevation |
4d87d357-202c-11e3-be06-000c29ee3065 |
FreeBSD -- Insufficient credential checks in network ioctl(2) |
4da51989-5a8b-4eb9-b442-46d94ec0802d |
h2o -- Malformed HTTP/1.1 causes Out-of-Memory Denial of Service |
4db1669c-8589-11db-ac4f-02e081235dab |
gnupg -- remotely controllable function pointer |
4db8a0f4-27e9-11e5-a4a5-002590263bf5 |
xen-tools -- PCI MSI mask bits inadvertently exposed to guests |
4dd575b8-8f82-11e3-bb11-0025905a4771 |
phpmyfaq -- multiple vulnerabilities |
4ddc78dc-300a-11e1-a2aa-0016ce01e285 |
krb5-appl -- telnetd code execution vulnerability |
4dfafa16-24ba-11e6-bd31-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
4e07d94f-75a5-11e8-85d1-a4badb2f4699 |
FreeBSD -- Lazy FPU State Restore Information Disclosure |
4e1997e8-5de0-11e9-b95c-b499baebfeaf |
MySQL -- multiple vulnerabilities |
4e1f4abc-6837-11e3-9cda-3c970e169bc2 |
cURL library -- cert name check ignore with GnuTLS |
4e210d72-1c5c-11da-92ce-0048543d60ce |
squid -- Denial Of Service Vulnerability in sslConnectTimeout |
4e23644c-cb93-4f83-9e20-5bc07ad9b39f |
mod_pagespeed -- critical cross-site scripting (XSS) vulnerability |
4e306850-811f-11de-8a67-000c29a67389 |
silc-client -- Format string vulnerability |
4e3e8a50-65c1-11e5-948e-bcaec565249c |
flash -- multiple vulnerabilities |
4e3fa78b-1577-11ea-b66e-080027bdabe8 |
Django -- multiple vulnerabilities |
4e45c45b-629e-11ee-8290-a8a1599412c6 |
chromium -- type confusion in v8 |
4e4bd2c2-6bd5-11d9-9e1e-c296ac722cb3 |
squid -- HTTP response splitting cache pollution attack |
4e536c14-9791-11e4-977d-d050992ecde8 |
OpenSSL -- multiple vulnerabilities |
4e60d660-6298-11ed-9ca2-6c3be5272acd |
Grafana -- Plugin signature bypass |
4e6875a2-a126-11ea-b385-08002728f74c |
kaminari -- potential XSS vulnerability |
4e8344a3-ca52-11de-8ee8-00215c6a37bb |
gd -- '_gdGetColors' remote buffer overflow vulnerability |
4e95eb4e-b737-11e3-87cd-f0def10dca57 |
Icinga -- buffer overflow in classic web interface |
4e9e410b-d462-11e2-8d57-080027019be0 |
dbus -- local dos |
4ea1082a-1259-11ec-b4fa-dd5a552bdd17 |
go -- archive/zip: overflow in preallocation check can cause OOM panic |
4ea507d1-9da8-11e9-a759-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
4eae4f46-b5ce-11e5-8a2b-d050996490d0 |
ntp -- denial of service vulnerability |
4eb5dccb-923c-4f18-9cd4-b53f9e28d4d7 |
py-Scrapy -- DoS vulnerability |
4ebaa983-3299-11ed-95f8-901b0e9408dc |
dendrite -- Signature checks not applied to some retrieved missing events |
4ebdd56b-fe72-11ee-bc57-00e081b7aa2d |
jenkins -- Terrapin SSH vulnerability in Jenkins CLI client |
4ed0e43c-5cef-11eb-bafd-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
4edaa9f4-6b51-11ef-9a62-002590c1f29c |
FreeBSD -- bhyve(8) privileged guest escape via USB controller |
4edbea45-cb0c-11ee-86bb-a8a1599412c6 |
chromium -- security fix |
4ee322e9-e363-11ed-b934-b42e991fc52e |
jellyfin -- Multiple vulnerabilities |
4ee7fa77-19a6-11ee-8a05-080027eda32c |
Django -- multiple vulnerabilities |
4eeb93bf-f204-11ec-8fbd-d4c9ef517024 |
OpenSSL -- Command injection vulnerability |
4f00dac0-1e18-4481-95af-7aaad63fd303 |
mozilla -- multiple vulnerabilities |
4f15ca7b-23ae-11eb-9f59-1c1b0d9ea7e6 |
Apache OpenOffice -- Unrestricted actions leads to arbitrary code execution in crafted documents |
4f254817-6318-11ee-b2ff-080027de9982 |
Django -- multiple vulnerabilities |
4f370c80-79ce-11ee-be8e-589cfc0f81b0 |
phpmyfaq -- multiple vulnerabilities |
4f6c4c07-3179-11ef-9da5-1c697a616631 |
emacs -- Arbitrary shell code evaluation vulnerability |
4f7c6af3-6a2c-4ead-8453-04e509688d45 |
salt -- multiple vulnerabilities |
4f838b74-50a1-11de-b01f-001c2514716c |
dokuwiki -- Local File Inclusion with register_globals on |
4f8665d0-0465-11e9-b77a-6cc21735f730 |
shibboleth-sp -- crashes on malformed date/time content |
4f8ffb9c-f388-4fbd-b90f-b3131559d888 |
xorg-server -- multiple vulnerabilities |
4f99e2ef-f725-11e1-8bd8-0022156e8794 |
moinmoin -- wrong processing of group membership |
4faac805-6be0-11e9-a685-001b217b3468 |
Gitlab -- Information Disclosure |
4fb43b2f-46a9-11dd-9d38-00163e000016 |
FreeType 2 -- Multiple Vulnerabilities |
4fb45a1c-c5d0-11e2-8400-001b216147b0 |
couchdb -- DOM based Cross-Site Scripting via Futon UI |
4fb5d2cd-4c77-11df-83fb-0015587e2cc1 |
png -- libpng decompression denial of service |
4fba07ca-13aa-11eb-b31e-d4c9ef517024 |
MySQL -- Multiple vulnerabilities |
4fc2df49-6279-11e7-be0f-6cf0497db129 |
drupal -- Drupal Core - Multiple Vulnerabilities |
4fce9635-28c0-11ec-9ba8-002324b2fba8 |
go -- misc/wasm, cmd/link: do not let command line arguments overwrite global data |
4fd7a2fc-5860-11ee-a1b3-dca632daf43b |
graphics/webp heap buffer overflow |
4ffb633c-0a3b-11e7-a9f2-0011d823eebd |
Flash Player -- multiple vulnerabilities |
4ffcccae-e924-11ed-9c88-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
50127e44-7b88-4ade-8e12-5d57320823f1 |
salt -- multiple vulnerabilities |
501ee07a-5640-11e0-985a-001b2134ef46 |
linux-flashplugin -- remote code execution vulnerability |
50210bc1-54ef-11e8-95d9-9c5c8e75236a |
wavpack -- multiple vulnerabilities |
5023f559-27e2-11e5-a4a5-002590263bf5 |
xen-kernel -- Information leak via internal x86 system device emulation |
50259d8b-243e-11eb-8bae-b42e99975750 |
salt -- multiple vulnerabilities |
5027b62e-f680-11e9-a87f-a4badb2f4699 |
FreeBSD -- kernel memory disclosure from /dev/midistat |
5028c1ae-1890-11ed-9b22-002590c1f29c |
FreeBSD -- Out of bound read in elf_note_prpsinfo() |
502ba001-7ffa-11eb-911c-0800278d94f0 |
gitea -- multiple vulnerabilities |
502c9f72-99b3-11ee-86bb-a8a1599412c6 |
chromium -- multiple security fixes |
5033e2fc-98ec-4ef5-8e0b-87cfbbc73081 |
php-gd and gd -- Buffer over-read into uninitialized memory |
50383bde-b25b-11de-8c83-02e0185f8d72 |
FreeBSD -- Devfs / VFS NULL pointer race condition |
50394bc9-c5fa-11e5-96a5-d93b343d1ff7 |
prosody -- user impersonation vulnerability |
5039ae61-2c9f-11db-8401-000ae42e9b93 |
globus -- Multiple tmpfile races |
5044bd23-08cb-11e8-b08f-00012e582166 |
palemoon -- multiple vulnerabilities |
50457509-d05e-11d9-9aed-000e0c2e438a |
phpSysInfo -- cross site scripting vulnerability |
5048ed45-b0f1-11ed-ab04-9106b1b896dd |
gitea -- password hash quality |
5053420c-4935-11df-83fb-0015587e2cc1 |
mahara -- sql injection vulnerability |
505904d3-ea95-11e4-beaf-bcaec565249c |
wordpress -- multiple vulnerabilities |
50744596-368f-11d9-a9e7-0001020eed82 |
proxytunnel -- format string vulnerability |
50751310-a763-11e6-a881-b499baebfeaf |
openssl -- multiple vulnerabilities |
50776801-4183-11e7-b291-b499baebfeaf |
ImageMagick -- multiple vulnerabilities |
508da89c-78b9-11ed-854f-5404a68ad561 |
traefik -- multiple vulnerabilities |
50a1bbc9-fb80-11e9-9e70-005056a311d1 |
samba -- multiple vulnerabilities |
50ac2e96-ba4d-11e6-ae1b-002590263bf5 |
xen-kernel -- x86 null segments not always treated as unusable |
50ad9a9a-1e28-11e9-98d7-0050562a4d7b |
www/py-requests -- Information disclosure vulnerability |
50d233d9-374b-46ce-922d-4e6b3f777bef |
poppler -- Poppler Multiple Vulnerabilities |
50e59056-87f2-11eb-b6a2-001b217b3468 |
Gitlab -- Multiple vulnerabilities |
50ec3a01-ad77-11eb-8528-8c164582fbac |
Ansible -- Insecure Temporary File |
510b630e-c43b-11e0-916c-00e0815b8da8 |
isc-dhcp-server -- server halt upon processing certain packets |
5114cd11-6571-11e5-9909-002590263bf5 |
codeigniter -- SQL injection vulnerability |
512c0ffd-cd39-4da4-b2dc-81ff4ba8e238 |
mozilla -- multiple vulnerabilities |
512d1301-49b9-11e4-ae2c-c80aa9043978 |
bash -- remote code execution |
51358314-bec8-11e5-82cd-bcaec524bf84 |
claws-mail -- no bounds checking on the output buffer in conv_jistoeuc, conv_euctojis, conv_sjistoeuc |
5140dc69-b65e-11e1-9425-001b21614864 |
ImageMagick -- multiple vulnerabilities |
51436b4c-1250-11dd-bab7-0016179b2dd5 |
postgresql -- multiple vulnerabilities |
51496cbc-7a0e-11ec-a323-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
51498ee4-39a1-11ef-b609-002590c1f29c |
Request Tracker -- information exposure vulnerability |
515b4327-cf8a-11e5-96d6-14dae9d210b8 |
dnscrypt-proxy -- code execution |
515df85a-5cd7-11ec-a16d-001517a2e1a4 |
bastillion -- log4j vulnerability |
5179d85c-8683-11de-91b9-0022157515b2 |
fetchmail -- improper SSL certificate subject verification |
518a119c-a864-11eb-8ddb-001b217b3468 |
Gitlab -- Vulnerabilities |
5192e7ca-7d4f-11d9-a9e7-0001020eed82 |
mod_python -- information leakage vulnerability |
5198ef84-4fdc-11df-83fb-0015587e2cc1 |
cacti -- SQL injection and command execution vulnerabilities |
51a59f36-3c58-11ee-b32e-080027f5fec9 |
clamav -- Possible denial of service vulnerability in the HFS+ file parser |
51b51d4a-7c0f-11dc-9e47-0011d861d5e2 |
phpmyadmin -- cross-site scripting vulnerability |
51d1282d-420e-11e7-82c5-14dae9d210b8 |
FreeBSD -- ipfilter(4) fragment handling panic |
51d1d428-42f0-11de-ad22-000e35248ad7 |
libxine -- multiple vulnerabilities |
521ce804-52fd-11e8-9123-a4badb2f4699 |
FreeBSD -- Mishandling of x86 debug exceptions |
52311651-f100-4720-8c62-0887dad6d321 |
py-tensorflow -- unchecked argument causing crash |
5237f5d7-c020-11e5-b397-d050996490d0 |
ntp -- multiple vulnerabilities |
5238ac45-9d8c-11db-858b-0060084a00e5 |
fetchmail -- TLS enforcement problem/MITM attack/password exposure |
523bb0b7-ba4d-11e6-ae1b-002590263bf5 |
xen-kernel -- x86 task switch to VM86 mode mis-handled |
523fad14-eb9d-11d9-a8bd-000cf18bbe54 |
pear-XML_RPC -- arbitrary remote code execution |
524bd03a-bb75-11eb-bf35-080027f515ea |
libxml2 -- Possible denial of service |
526d9642-3ae7-11e9-a669-8c164582fbac |
slixmpp -- improper access control |
52ba7713-9d42-11da-8c1d-000e0c2e438a |
pf -- IP fragment handling panic |
52bbc7e8-f13c-11e3-bc09-bcaec565249c |
dbus -- local DoS |
52bd2d59-4ab5-4bef-a599-7aac4e92238b |
vault -- unauthenticated license read |
52f10525-caff-11e7-b590-6451062f0f7a |
Flash Player -- multiple vulnerabilities |
52f4b48b-4ac3-11e7-99aa-e8e0b747a45a |
chromium -- multiple vulnerabilities |
5300711b-4e61-11e5-9ad8-14dae9d210b8 |
graphviz -- format string vulnerability |
531aae08-97f0-11e7-aadd-6451062f0f7a |
Flash Player -- multiple vulnerabilities |
53252879-cf11-11e5-805c-5453ed2e2b49 |
py-pillow -- Buffer overflow in TIFF decoding code |
533d20e7-f71f-11df-9ae1-000bcdf0a03b |
proftpd -- remote code execution vulnerability |
5360a659-131c-11d9-bc4a-000c41e2cdad |
mozilla -- hostname spoofing bug |
53802164-3f7e-11dd-90ea-0019666436c2 |
ruby -- multiple integer and buffer overflow vulnerabilities |
53a0ddef-0208-11e2-8afa-0024e830109b |
dns/bind9* -- Several vulnerabilities |
53b3474c-f680-11e9-a87f-a4badb2f4699 |
FreeBSD -- Reference count overflow in mqueue filesystem 32-bit compat |
53bde960-356b-11e0-8e81-0022190034c0 |
mupdf -- Remote System Access |
53caf29b-9180-11ed-acbe-b42e991fc52e |
cassandra3 -- multiple vulnerabilities |
53dbd096-ba4d-11e6-ae1b-002590263bf5 |
xen-kernel -- x86 segment base write emulation lacking canonical address checks |
53e531a7-e559-11e0-b481-001b2134ef46 |
linux-flashplugin -- multiple vulnerabilities |
53e711ed-8972-11d9-9ff8-00306e01dda2 |
phpbb -- privilege elevation and path disclosure |
53e9efa1-4be7-11eb-8558-3085a9a47796 |
InspIRCd websocket module double free vulnerability |
53eb9e1e-7014-11e8-8b1f-3065ec8fd3ec |
password-store -- GPG parsing vulnerabilities |
53fbffe6-ebf7-11eb-aef1-0897988a1c07 |
asterisk -- pjproject/pjsip: crash when SSL socket destroyed during handshake |
54006796-cf7b-11ed-a5d5-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
54075861-a95a-11e5-8b40-20cf30e32f6d |
Bugzilla security issues |
54075e39-04ac-11e1-a94e-bcaec565249c |
freetype -- Some type 1 fonts handling vulnerabilities |
5415f1b3-f33d-11e1-8bd8-0022156e8794 |
wireshark -- denial of service in DRDA dissector |
541696ed-8d12-11ed-af80-ecf4bbc0bda0 |
devel/viewvc-devel is vulnerable to cross-site scripting |
5418b360-29cc-11ed-a6d4-6805ca2fa271 |
powerdns-recursor -- denial of service |
54237182-9635-4a8b-92d7-33bfaeed84cd |
ruby-gems -- Algorithmic Complexity Vulnerability |
5436f9a2-2190-11ec-a90b-0cc47a49470e |
ha -- Directory traversals |
543b5939-2067-11e5-a4a5-002590263bf5 |
turnserver -- SQL injection vulnerability |
546d4dd4-10ea-11e9-b407-080027ef1a23 |
chromium -- multiple vulnerabilities |
546deeea-3fc6-11e6-a671-60a44ce6887b |
SQLite3 -- Tempdir Selection Vulnerability |
547fbd98-8b1f-11e5-b48b-bcaec565249c |
flash -- multiple vulnerabilities |
5486669e-ea9f-11de-bd9c-00215c6a37bb |
tptest -- pwd Remote Stack Buffer Overflow |
548a4163-6821-11ee-b06f-0050569ceb3a |
GLPI vulnerable to SQL injection through Computer Virtual Machine information |
548f74bd-993c-11e5-956b-00262d5ed8ee |
chromium -- multiple vulnerabilities |
54976998-f248-11e8-81e2-005056a311d1 |
samba -- multiple vulnerabilities |
549787c1-8916-11e2-8549-68b599b52a02 |
libpurple -- multiple vulnerabilities |
549a2771-49cc-11e4-ae2c-c80aa9043978 |
jenkins -- remote execution, privilege escalation, XSS, password exposure, ACL hole, DoS |
54a69cf7-b2ef-11e4-b1f1-bcaec565249c |
xorg-server -- Information leak in the XkbSetGeometry request of X servers. |
54e50cd9-c1a8-11e6-ae1b-002590263bf5 |
wordpress -- multiple vulnerabilities |
54e5573a-6834-11ee-b06f-0050569ceb3a |
Phishing through a login page malicious URL in GLPI |
54f72962-c7ba-11dd-a721-0030843d3802 |
phpmyadmin -- cross-site request forgery vulnerability |
55041d37-ff62-11d9-a9a5-000ae4641456 |
jabberd -- 3 buffer overflows |
553224e7-4325-11d9-a3d5-000c6e8f12ef |
jabberd -- remote buffer overflow vulnerability |
55363e65-0e71-11e5-8027-00167671dd1d |
strongswan -- Denial-of-service and potential remote code execution vulnerability |
5536c8e4-36b3-11e2-a633-902b343deec9 |
FreeBSD -- Linux compatibility layer input validation error |
5536ea5f-6814-11e9-a8f7-0050562a4d7b |
buildbot -- CRLF injection in Buildbot login and logout redirect code |
553ec4ed-38d6-11e0-94b1-000c29ba66d2 |
tomcat -- Cross-site scripting vulnerability |
5555120d-ba4d-11e6-ae1b-002590263bf5 |
xen-kernel -- guest 32-bit ELF symbol table load leaking host data |
55571619-454e-4769-b1e5-28354659e152 |
bro -- invalid memory access or heap buffer over-read |
55587adb-b49d-11e1-8df1-0004aca374af |
mantis -- multiple vulnerabilities |
5558dded-a870-4fbe-8b0a-ba198db47007 |
electron{25,26} -- multiple vulnerabilities |
555ac165-2bee-11dd-bbdc-00e0815b8da8 |
spamdyke -- open relay |
555af074-22b9-11e8-9799-54ee754af08e |
chromium -- vulnerability |
555b244e-6b20-4546-851f-d8eb7d6c1ffa |
mozilla -- multiple vulnerabilities |
555cd806-b031-11e7-a369-14dae9d59f67 |
Multiple exploitable heap-based buffer overflow vulnerabilities exists in FreeXL 1.0.3 |
55616fda-a2d0-11dd-a9f9-0030843d3802 |
openx -- sql injection vulnerability |
556d2286-5a51-11e6-a6c3-14dae9d210b8 |
gd -- multiple vulnerabilities |
556fdf03-6785-11ed-953b-002b67dfc673 |
Tomcat -- Request Smuggling |
559e00b7-6a4d-11e2-b6b0-10bf48230856 |
wordpress -- multiple vulnerabilities |
559f3d1b-cb1d-11e5-80a4-001999f8d30b |
asterisk -- Multiple vulnerabilities |
55a528e8-9787-11e0-b24a-001b2134ef46 |
linux-flashplugin -- remote code execution vulnerability |
55b498e2-e56c-11e1-bbd5-001c25e46b1d |
Several vulnerabilities found in IcedTea-Web |
55c4233e-1844-11e8-a712-0025908740c2 |
tomcat -- Security constraints ignored or applied too late |
55c43f5b-5190-11e5-9ad8-14dae9d210b8 |
powerdns -- denial of service |
55cff5d2-e95c-11ec-ae20-001999f8d30b |
XFCE -- Allows executing malicious .desktop files pointing to remote code |
55d4a92f-c75f-43e8-ab1f-4a0efc9795c4 |
electron29 -- multiple vulnerabilities |
55facdb0-2c24-11eb-9aac-08002734b9ed |
gitea -- multiple vulnerabilities |
562a3fdf-16d6-11d9-bc4a-000c41e2cdad |
php -- vulnerability in RFC 1867 file upload processing |
562cf6c4-b9f1-11dc-a302-000102cc8983 |
linux-flashplugin -- multiple vulnerabilities |
5631ae98-be9e-11e3-b5e3-c80aa9043978 |
OpenSSL -- Remote Information Disclosure |
56562efb-d5e4-11e5-b2bd-002590263bf5 |
squid -- SSL/TLS processing remote DoS |
56665ccb-8723-11e5-9b13-14dae9d210b8 |
powerdns -- Denial of Service |
5666688f-803b-4cf0-9cb1-08c088f2225a |
chromium -- multiple vulnerabilities |
56778a31-c2a1-11e9-9051-4c72b94353b5 |
nsd -- Stack-based Buffer Overflow |
5678da43-ea99-11db-a802-000fea2763ce |
lighttpd -- DOS when access files with mtime 0 |
567beb1e-7e0a-11e4-b9cc-bcaec565249c |
freetype -- Out of bounds stack-based read/write |
56971fa6-641c-11d9-a097-000854d03344 |
xshisen -- local buffer overflows |
56abf87b-96ad-11eb-a218-001b217b3468 |
Gitlab -- Multiple vulnerabilities |
56ba4513-a1be-11eb-9072-d4c9ef517024 |
MySQL -- Multiple vulnerabilities |
56ba8728-f987-11de-b28d-00215c6a37bb |
PEAR -- Net_Ping and Net_Traceroute remote arbitrary command injection |
56cfe192-329f-11df-abb2-000f20797ede |
mozilla -- multiple vulnerabilities |
56d76414-6b50-11ef-9a62-002590c1f29c |
FreeBSD -- bhyve(8) privileged guest escape via TPM device passthrough |
56f0f11e-ba4d-11e6-ae1b-002590263bf5 |
xen-kernel -- x86 64-bit bit test instruction emulation broken |
56f4b3a6-c82c-11e0-a498-00215c6a37bb |
Samba -- cross site scripting and request forgery vulnerabilities |
57027417-ab7f-11eb-9596-080027f515ea |
RDoc -- command injection vulnerability |
570706ff-7ee0-11ea-bd0b-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
5709d244-4873-11e3-8a46-000d601460a4 |
OpenSSH -- Memory corruption in sshd |
5713bfda-e27d-11e4-b2ce-5453ed2e2b49 |
qt4-imageformats, qt4-gui, qt5-gui -- Multiple Vulnerabilities in Qt Image Format Handling |
5721ae65-b30a-11e9-a87f-a4badb2f4699 |
FreeBSD -- pts(4) write-after-free |
5729b8ed-5d75-11d8-80e3-0020ed76ef5a |
rsync buffer overflow in server mode |
57325ecf-facc-11e4-968f-b888e347c638 |
dcraw -- integer overflow condition |
574028b4-a181-455b-a78b-ec5c62781235 |
electron29 -- multiple vulnerabilities |
574f7bc9-a141-11ef-84e9-901b0e9408dc |
Matrix clients -- mxc uri validation in js sdk |
5752a0df-60c5-4876-a872-f12f9a02fa05 |
gallery -- cross-site scripting |
57561cfc-f24b-11ee-9730-001fc69cd6dc |
xorg server -- Multiple vulnerabilities |
57573136-920e-11e0-bdc9-001b2134ef46 |
linux-flashplugin -- cross-site scripting vulnerability |
57580fcc-1a61-11e8-97e0-00e04c1ea73d |
drupal -- Drupal Core - Multiple Vulnerabilities |
57600032-34fe-11e7-8965-bcaec524bf84 |
libetpan -- null dereference vulnerability in MIME parsing component |
5764c634-10d2-11e6-94fa-002590263bf5 |
php -- multiple vulnerabilities |
57652765-18aa-11e2-8382-00a0d181e71d |
xlockmore -- local exploit |
576aa394-1d85-11ec-8b7d-4f5b624574e2 |
webkit2-gtk3 -- multiple vulnerabilities |
5776cc4f-5717-11ef-b611-84a93843eb75 |
Roundcube -- Multiple vulnerabilities |
5786185a-9a43-11e8-b34b-6cc21735f730 |
xml-security-c -- crashes on malformed KeyInfo content |
5789a92e-5d7f-11d8-80e3-0020ed76ef5a |
pine remotely exploitable buffer overflow in newmail.c |
578f6322-c450-11dd-a721-0030843d3802 |
habari -- Cross-Site Scripting Vulnerability |
5796858d-db0b-11dd-aa56-000bcdf0a03b |
FreeBSD -- arc4random(9) predictable sequence vulnerability |
5797c807-4279-11ea-b184-f8b156ac3ff9 |
FreeBSD -- Missing IPsec anti-replay window check |
579c7489-c23d-454a-b0fc-ed9d80ea46e0 |
electron22 -- multiple vulnerabilities |
57a0242d-8c4e-11da-8ddf-000ae42e9b93 |
sge -- local root exploit in bundled rsh executable |
57a700f9-12c0-11e2-9f86-001d923933b6 |
dns/bind9* -- crash on deliberately constructed combination of records |
57ae52f7-b9cc-11db-bf0f-0013720b182d |
samba -- format string bug in afsacl.so VFS plugin |
57aec168-453e-11e8-8777-b499baebfeaf |
MySQL -- multiple vulnerabilities |
57b1ee25-1a7c-11ec-9376-0800272221cc |
libssh -- possible heap-buffer overflow vulnerability |
57b3aba7-1e25-11e6-8dd3-002590263bf5 |
expat -- denial of service vulnerability on malformed input |
57bb5e3d-3c4f-11e5-a4d4-001e8c75030d |
subversion -- multiple vulnerabilities |
57c1c2ee-7914-11ea-90bf-0800276545c1 |
Squid -- multiple vulnerabilities |
57c705d6-12ae-11dd-bab7-0016179b2dd5 |
png -- unknown chunk processing uninitialized memory access |
57df803e-af34-11e2-8d62-6cf0490a8c18 |
Joomla! -- XXS and DDoS vulnerabilities |
57f1a624-6197-11e1-b98c-bcaec565249c |
libxml2 -- heap buffer overflow |
57facd35-ddf6-11e6-915d-001b3856973b |
icoutils -- check_offset overflow on 64-bit systems |
58033a95-bba8-11e4-88ae-d050992ecde8 |
bind -- denial of service vulnerability |
5804b9d4-a959-11e4-9363-20cf30e32f6d |
apache24 -- several vulnerabilities |
580cc46b-bb1e-11e3-b144-2c4138874f7d |
LibYAML input sanitization errors |
58247a96-01c8-11da-bc08-0001020eed82 |
phpmyadmin -- cross site scripting vulnerability |
58253655-d82c-11e1-907c-20cf30e32f6d |
bugzilla -- multiple vulnerabilities |
584c506d-0e98-11e0-b59b-0050569b2d21 |
redmine -- multiple vulnerabilities |
58528a94-5100-4208-a04d-edc01598cf01 |
strongswan - denial-of-service vulnerability in the gmp plugin/denial-of-service vulnerability in the in-memory certificate cache |
58685e23-ba4d-11e6-ae1b-002590263bf5 |
xen-tools -- qemu incautious about shared ring processing |
58750d49-7302-11ef-8c95-195d300202b3 |
OpenSSH -- Pre-authentication async signal safety issue |
587ed8ac-5957-11ef-854a-001e676bf734 |
OpenHAB CometVisu addon -- Multiple vulnerabilities |
58997463-e012-11dd-a765-0030843d3802 |
verlihub -- insecure temporary file usage and arbitrary command execution |
589d8053-0b03-11dd-b4ef-00e07dc4ec84 |
clamav -- Multiple Vulnerabilities |
589de937-343f-11ef-8a7b-001b217b3468 |
Gitlab -- Vulnerabilities |
58a3c266-db01-11dd-ae30-001cc0377035 |
php5-gd -- uninitialized memory information disclosure vulnerability |
58a738d4-57af-11ee-8c58-b42e991fc52e |
libwebp heap buffer overflow |
58b22f3a-bc71-11eb-b9c9-6cc21735f730 |
PG Partition Manager -- arbitrary code execution |
58c15292-7b61-11e2-95da-001e8c1a8a0e |
nss-pam-ldapd -- file descriptor buffer overflow |
58d6ed66-c2e8-11eb-9fb0-6451062f0f7a |
libX11 -- Arbitrary code execution |
58fafead-cd13-472f-a9bd-d0173ba1b04c |
libofx -- exploitable buffer overflow |
58fc2752-5f74-11d9-a9e7-0001020eed82 |
pcal -- buffer overflow vulnerabilities |
5914705c-ab03-11e9-a4f9-080027ac955c |
PuTTY 0.72 -- buffer overflow in SSH-1 and integer overflow in SSH client |
591a706b-5cdc-11ea-9a0a-206a8a720317 |
ntp -- Multiple vulnerabilities |
592815da-9eed-11da-b410-000e0c2e438a |
mantis -- "view_filters_page.php" cross site scripting vulnerability |
594ad3c5-a39b-11da-926c-0800209adf0e |
SSH.COM SFTP server -- format string vulnerability |
594eb447-e398-11d9-a8bd-000cf18bbe54 |
ruby -- arbitrary command execution on XMLRPC server |
5951fb49-1ba2-11e5-b43d-002590263bf5 |
elasticsearch -- cross site scripting vulnerability in the CORS functionality |
597d02ce-a66c-11ea-af32-080027846a02 |
Django -- multiple vulnerabilities |
597e2bee-68ea-11d9-a9e7-0001020eed82 |
ImageMagick -- PSD handler heap overflow vulnerability |
5999fc39-72d0-4b99-851c-ade7ff7125c3 |
electron25 -- multiple vulnerabilities |
59a0af97-dbd4-11e5-8fa8-14dae9d210b8 |
drupal -- multiple vulnerabilities |
59a43a73-3786-11ee-94b4-6cc21735f730 |
postgresql-server -- MERGE fails to enforce UPDATE or SELECT row security policies |
59ab72fb-bccf-11eb-a38d-6805ca1caf5c |
Prometheus -- arbitrary redirects |
59ada6e5-676a-11da-99f6-00123ffe8333 |
phpmyadmin -- XSS vulnerabilities |
59b68b1e-9c78-11e1-b5e0-000c299b62e1 |
php -- multiple vulnerabilities |
59c284f4-8d2e-11ed-9ce0-b42e991fc52e |
net-mgmt/cacti is vulnerable to remote command injection |
59c5f255-b309-11e9-a87f-a4badb2f4699 |
FreeBSD -- ICMP/ICMP6 packet filter bypass in pf |
59e7163c-cf84-11e2-907b-0025905a4770 |
php5 -- Heap based buffer overflow in quoted_printable_encode |
59e72db2-cae6-11e3-8420-00e0814cab4e |
django -- multiple vulnerabilities |
59e7af2d-8db7-11de-883b-001e3300a30d |
pidgin -- MSN overflow parsing SLP messages |
59e7eb28-b309-11e5-af83-80ee73b5dcf5 |
kea -- unexpected termination while handling a malformed packet |
59f79c99-ba4d-11e6-ae1b-002590263bf5 |
xen-tools -- delimiter injection vulnerabilities in pygrub |
59fabdf2-9549-11ea-9448-08002728f74c |
typo3 -- multiple vulnerabilities |
5a016dd0-8aa8-490e-a596-55f4cc17e4ef |
rails -- multiple vulnerabilities |
5a021595-fba9-11dd-86f3-0030843d3802 |
pycrypto -- ARC2 module buffer overflow |
5a1589ad-68f9-11e8-83f5-d8cb8abf62dd |
Libgit2 -- Fixing insufficient validation of submodule names |
5a1c2e06-3fb7-11ed-a402-b42e991fc52e |
unbound -- Non-Responsive Delegation Attack |
5a1d5d74-29a0-11e5-86ff-14dae9d210b8 |
php -- arbitrary code execution |
5a1f1a86-8f4c-11e7-b5af-a4badb2f4699 |
gdk-pixbuf -- multiple vulnerabilities |
5a35bc56-7027-11e4-a4a3-001999f8d30b |
yii -- Remote arbitrary PHP code execution |
5a39a22e-5478-11db-8f1a-000a48049292 |
mono -- "System.CodeDom.Compiler" Insecure Temporary Creation |
5a45649a-4777-11ea-bdec-08002728f74c |
Django -- potential SQL injection vulnerability |
5a5422fd-7e1a-11d9-a9e7-0001020eed82 |
powerdns -- DoS vulnerability |
5a668ab3-8d86-11eb-b8d6-d4c9ef517024 |
OpenSSL -- Multiple vulnerabilities |
5a757a31-f98e-4bd4-8a85-f1c0f3409769 |
pango -- remote DoS vulnerability |
5a771686-9e33-11e8-8b2d-9cf7a8059466 |
chicken -- multiple vulnerabilities |
5a7d4110-0b7a-11e1-846b-00235409fd3e |
libxml -- Stack consumption vulnerability |
5a945904-73b1-11db-91d2-0002a5c2f4ef |
unzoo -- Directory Traversal Vulnerability |
5a97805e-93ef-4dcb-8d5e-dbcac263bfc2 |
libsndfile -- multiple vulnerabilities |
5a9b3d70-48e2-4267-b196-83064cb14fe0 |
shotwell -- failure to encrypt authentication |
5a9bbb6e-32d3-11e8-a769-6daaba161086 |
node.js -- multiple vulnerabilities |
5aaa257e-772d-11e3-a65a-3c970e169bc2 |
openssl -- multiple vulnerabilities |
5aaf534c-a069-11ec-acdc-14dae9d5a9d2 |
Teeworlds -- Buffer Overflow |
5ab54ea0-fa94-11ec-996c-080027b24e86 |
mediawiki -- multiple vulnerabilities |
5ab9fb2a-23a5-11e0-a835-0003ba02bf30 |
asterisk -- Exploitable Stack Buffer Overflow |
5abfee2d-5d82-11d8-80e3-0020ed76ef5a |
pine remote denial-of-service attack |
5ac53801-ec2e-11e3-9cf3-3c970e169bc2 |
OpenSSL -- multiple vulnerabilities |
5acd95db-3b16-11eb-af2a-080027dbe4b7 |
glpi -- leakage issue with knowledge base |
5ad3e437-e527-4514-b9ed-280b2ca1a8c9 |
openvpn -- multiple TCP clients connecting with the same certificate at the same time can crash the server |
5aefc41e-d304-4ec8-8c82-824f84f08244 |
mozilla -- multiple vulnerabilities |
5af511e5-e928-11e5-92ce-002590263bf5 |
php7 -- multiple vulnerabilities |
5af6378b-bd88-4997-bccc-b9ba2daecdd2 |
kamailio - buffer overflow |
5afcc9a4-7e04-11ee-8e38-002590c1f29c |
FreeBSD -- libc stdio buffer overflow |
5afd64ae-122a-11ef-8eed-1c697a616631 |
Intel CPUs -- multiple vulnerabilities |
5b0ae405-cdc7-11ed-bb39-901b0e9408dc |
Matrix clients -- Prototype pollution in matrix-js-sdk |
5b1463dd-dab3-11e7-b5af-a4badb2f4699 |
FreeBSD -- POSIX shm allows jails to access global namespace |
5b1631dc-eafd-11e6-9ac1-a4badb2f4699 |
freeimage -- code execution vulnerability |
5b218581-9372-11e9-8fc4-5404a68ad561 |
vlc -- Double free in Matroska demuxer |
5b2eac07-8b4d-11ed-8b23-a0f3c100ae18 |
rxvt-unicode is vulnerable to a remote code execution |
5b397852-b1d0-11ea-a11c-4437e6ad11c4 |
IMAP fcc/postpone machine-in-the-middle attack |
5b47b70d-8ba9-11db-81d5-00123ffe8333 |
dbus -- match_rule_equal() Weakness |
5b47c279-8cb5-11dc-8878-0016179b2dd5 |
perl -- regular expressions unicode data buffer overflow |
5b5cf6e5-5b51-11eb-95ac-7f9491278677 |
dnsmasq -- DNS cache poisoning, and DNSSEC buffer overflow, vulnerabilities |
5b6bc863-89dc-11ea-af8b-00155d0a0200 |
ceph14 -- multiple security issues |
5b72b1ff-877c-11eb-bd4f-2f1d57dafe46 |
dnsmasq -- cache poisoning vulnerability in certain configurations |
5b74a5bc-348f-11e5-ba05-c80aa9043978 |
OpenSSH -- MaxAuthTries limit bypass via duplicates in KbdInteractiveDevices |
5b8c6e1e-770f-11eb-b87a-901b0ef719ab |
FreeBSD -- Xen grant mapping error handling issues |
5b8d8dee-6088-11ed-8c5e-641c67a117d8 |
varnish -- HTTP/2 Request Forgery Vulnerability |
5b8f9a02-ec93-11d8-b913-000c41e2cdad |
gaim remotely exploitable vulnerabilities in MSN component |
5bd6811f-1c75-11e3-ba72-98fc11cdc4f5 |
linux-flashplugin -- multiple vulnerabilities |
5be19b0d-fb85-11ec-95cd-080027b24e86 |
Django -- multiple vulnerabilities |
5bf1a715-cc57-440f-b0a5-6406961c54a7 |
squid -- denial-of-service vulnerabilities |
5bf6ed6d-9002-4f43-ad63-458f59e45384 |
jenkins -- multiple vulnerabilities |
5c288f68-c7ca-4c0d-b7dc-1ec6295200b3 |
chromium -- multiple vulnerabilities |
5c34664f-2c2b-11e3-87c2-00215af774f0 |
xinetd -- ignores user and group directives for TCPMUX services |
5c399624-2bef-11e5-86ff-14dae9d210b8 |
zenphoto -- multiple vulnerabilities |
5c554c0f-c69a-11db-9f82-000e0c2e438a |
FreeBSD -- Kernel memory disclosure in firewire(4) |
5c5f19ce-43af-11e1-89b4-001ec9578670 |
OpenSSL -- DTLS Denial of Service |
5c6f7482-3ced-11e8-b157-6451062f0f7a |
Flash Player -- multiple vulnerabilities |
5c7bb4dd-6a56-11d9-97ec-000c6e8f12ef |
konversation -- shell script command injection |
5c9a2769-5ade-11db-a5ae-00508d6a62df |
google-earth -- heap overflow in the KML engine |
5cb18881-7604-11e6-b362-001999f8d30b |
asterisk -- RTP Resource Exhaustion |
5ccb1c14-e357-11dd-a765-0030843d3802 |
mplayer -- vulnerability in STR files processor |
5ccbb2f8-c798-11e7-a633-009c02a2ab30 |
ffmpeg -- multiple vulnerabilities |
5cfa9d0c-73d7-4642-af4f-28fbed9e9404 |
jenkins -- multiple vulnerabilities |
5d1b1a0a-fd36-11ed-a0d1-84a93843eb75 |
MariaDB -- Nullpointer dereference |
5d1d4473-b40d-11e5-9728-002590263bf5 |
xen-tools -- libxl leak of pv kernel and initrd on error |
5d1e4f6a-ee4f-11ec-86c2-485b3931c969 |
Tor - Unspecified high severity vulnerability |
5d280761-6bcf-11e5-9909-002590263bf5 |
mbedTLS/PolarSSL -- multiple vulnerabilities |
5d36ef32-a9cf-11d8-9c6d-0020ed76ef5a |
subversion date parsing vulnerability |
5d374b01-c3ee-11e0-8aa5-485d60cb5385 |
freetype2 -- execute arbitrary code or cause denial of service |
5d374fbb-bae3-45db-afc0-795684ac7353 |
jenkins -- Path traversal vulnerability allows access to files outside plugin resources |
5d425189-7a03-11d9-a9e7-0001020eed82 |
postgresql -- privilege escalation vulnerability |
5d433534-f41c-402e-ade5-e0a2259a7cb6 |
curl -- cURL/libcURL Location: Redirect URLs Security Bypass |
5d51d245-00ca-11da-bc08-0001020eed82 |
ethereal -- multiple protocol dissectors vulnerabilities |
5d5e5cda-38e6-11eb-bbbf-001b217b3468 |
Gitlab -- Multiple vulnerabilities |
5d5ed535-3653-11df-9edc-000f20797ede |
firefox -- WOFF heap corruption due to integer overflow |
5d62950f-3bb5-11e7-93f7-d43d7e971a1b |
gitlab -- Various security issues |
5d6a204f-c60b-11e5-bf36-6805ca0b3d42 |
phpmyadmin -- Multiple full path disclosure vulnerabilities |
5d72701a-f601-11d9-bcd1-02061b08fc24 |
firefox & mozilla -- multiple vulnerabilities |
5d7939f6-5989-11ef-9793-b42e991fc52e |
firefox -- multiple vulnerabilities |
5d85976a-9011-11e1-b5e0-000c299b62e1 |
net-snmp -- Remote DoS |
5d8c0876-2716-11e9-9446-b7f8544ce15c |
typo3 -- multiple vulnerabilities |
5d8e56c3-9e67-4d5b-81c9-3a409dfd705f |
flash -- multiple vulnerabilities |
5d8ef725-7228-11eb-8386-001999f8d30b |
asterisk -- Remote attacker could prematurely tear down SRTP calls |
5d91370b-61fd-11eb-b87a-901b0ef719ab |
FreeBSD -- Xen guests can triger backend Out Of Memory |
5d921a8c-3a43-11ef-b611-84a93843eb75 |
Apache httpd -- source code disclosure |
5da8b1e6-0591-11ef-9e00-080027957747 |
GLPI -- multiple vulnerabilities |
5dd39f26-ed68-11e5-92ce-002590263bf5 |
hadoop2 -- unauthorized disclosure of data vulnerability |
5ddbe47b-1891-11ed-9b22-002590c1f29c |
FreeBSD -- AIO credential reference count leak |
5def3175-f3f9-4476-ba40-b46627cc638c |
PHP5 -- Integer overflow in Calendar module |
5df757ef-a564-11ec-85fa-a0369f7f7be0 |
wordpress -- multiple issues |
5df8bd95-8290-11e7-93af-005056925db4 |
Zabbix -- Remote code execution |
5e0a038a-ca30-416d-a2f5-38cbf5e7df33 |
mozilla -- multiple vulnerabilities |
5e135178-8aeb-11e4-801f-0022156e8794 |
wordpress -- multiple vulnerabilities |
5e1440c6-95af-11ec-b320-f8b156b6dcc8 |
flac -- fix encoder bug |
5e257b0d-e466-11ed-834b-6c3be5272acd |
Grafana -- Exposure of sensitive information to an unauthorized actor |
5e35cfba-9994-11e9-b07f-df5abf8b84d6 |
TYPO3 -- multiple vulnerabilities |
5e439ee7-d3bd-11e6-ae1b-002590263bf5 |
codeigniter -- multiple vulnerabilities |
5e4d7172-66b8-11ef-b104-b42e991fc52e |
firefox -- multiple vulnerabilities |
5e647ca3-2aea-11e2-b745-001fd0af1a4c |
ruby -- Hash-flooding DoS vulnerability for ruby 1.9 |
5e7f58c3-b3f8-4258-aeb8-795e5e940ff8 |
mplayer heap overflow in http requests |
5e92e8a2-5d7b-11d8-80e3-0020ed76ef5a |
icecast 1.x multiple vulnerabilities |
5ebfe901-a3cb-11d9-b248-000854d03344 |
hashcash -- format string vulnerability |
5ecfb588-d2f4-11ee-ad82-dbdfaa8acfc2 |
gitea -- Fix XSS vulnerabilities |
5ed094a0-0150-11e7-ae1b-002590263bf5 |
ikiwiki -- multiple vulnerabilities |
5ed2f96b-33b7-4863-8c6b-540d22344424 |
imap-uw -- University of Washington IMAP c-client Remote Format String Vulnerability |
5ed7102e-6454-11e9-9a3a-001cc0382b2f |
Ghostscript -- Security bypass vulnerability |
5ef12755-1c6c-11dd-851d-0016d325a0ed |
swfdec -- exposure of sensitive information |
5ef14250-f47c-11eb-8f13-5b4de959822e |
Prosody -- Remote Information Disclosure |
5efd7a93-2dfb-11e9-9549-e980e869c2e9 |
OpenJPEG -- integer overflow |
5f003a08-ba3c-11d9-837d-000e0c2e438a |
sharutils -- unshar insecure temporary file creation |
5f030587-e39a-11de-881e-001aa0166822 |
expat2 -- Parser crash with specially formatted UTF-8 sequences |
5f0dd349-40a2-11ea-8d8c-005056a311d1 |
samba -- multiple vulnerabilities |
5f276780-b6ce-11e5-9731-5453ed2e2b49 |
pygments -- shell injection vulnerability |
5f29c2e4-9f6a-11d8-abbc-00e08110b673 |
exim buffer overflow when verify = header_syntax is used |
5f2a0c40-1322-11db-bd23-000475abc56f |
zope -- information disclosure vulnerability |
5f326d75-1db9-11e2-bc8f-d0df9acfd7e5 |
django -- multiple vulnerabilities |
5f39d80f-107c-11eb-8b47-641c67a117d8 |
py-matrix-synapse -- XSS vulnerability |
5f453b69-abab-4e76-b6e5-2ed0bafcaee3 |
firefox -- integer overflow in createImageBitmap() |
5f52d646-c31f-11eb-8dcf-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
5f608c68-276c-11ef-8caa-0897988a1c07 |
Composer -- Multiple command injections via malicious git/hg branch names |
5f7ed6ea-70a7-11ed-92ce-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
5fa332b9-4269-11ee-8290-a8a1599412c6 |
chromium -- multiple vulnerabilities |
5fa68bd9-95d9-11ed-811a-080027f5fec9 |
redis -- multiple vulnerabilities |
5fa90ee6-bc9e-11eb-a287-e0d55e2a8bf9 |
texproc/expat2 -- billion laugh attack |
5fde5c30-0f4e-11da-bc01-000e0c2e438a |
tor -- diffie-hellman handshake flaw |
5fe7e27a-64cb-11d9-9e1e-c296ac722cb3 |
squid -- denial of service with forged WCCP messages |
5fee3f02-de37-11e4-b7c3-001999f8d30b |
asterisk -- TLS Certificate Common name NULL byte exploit |
5ff40cb4-8b92-11e2-bdb6-001060e06fd4 |
linux-flashplugin -- multiple vulnerabilities |
6001cfc6-9f0f-4fae-9b4f-9b8fae001425 |
PowerDNS -- Insufficient validation in the HTTP remote backend |
60129efe-656d-11e9-8e67-206a8a720317 |
FreeBSD -- EAP-pwd side-channel attack |
6025d173-4279-11ea-b184-f8b156ac3ff9 |
FreeBSD -- kernel stack data disclosure |
603fe0a1-bb26-11e6-8e5a-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
603fe36d-ec9d-11d8-b913-000c41e2cdad |
kdelibs insecure temporary file handling |
6056bf68-f570-4e70-b740-b9f606971283 |
palemoon -- multiple vulnerabilities |
60624f63-9180-11ed-acbe-b42e991fc52e |
cassandra3 -- arbitrary code execution |
607d2108-a0e4-423a-bf78-846f2a8f01b0 |
puppet -- Multiple Vulnerabilities |
607f4d44-0158-11e5-8fda-002590263bf5 |
cassandra -- remote execution of arbitrary code |
607f8b57-7454-42c6-a88a-8706f327076d |
icu -- multiple vulnerabilities |
608ed765-c700-11e3-848c-20cf30e32f6d |
bugzilla -- Cross-Site Request Forgery |
6091d1d8-4347-11ef-a4d4-080027957747 |
GLPI -- multiple vulnerabilities |
60931f98-55a7-11e7-8514-589cfc0654e1 |
Dropbear -- two vulnerabilities |
609c790e-ce0a-11dd-a721-0030843d3802 |
drupal -- multiple vulnerabilities |
60ab0e93-c60b-11e5-bf36-6805ca0b3d42 |
phpmyadmin -- Unsafe generation of XSRF/CSRF token |
60bfa396-c702-11e3-848c-20cf30e32f6d |
bugzilla -- Social Engineering |
60cb2055-b1b8-11e5-9728-002590263bf5 |
qemu -- denial of service vulnerability in USB EHCI emulation support |
60d4d31a-a573-41bd-8c1e-5af7513c1ee9 |
zeek -- potential DoS vulnerabilities |
60de13d5-95f0-11e1-806a-001143cd36d8 |
php -- vulnerability in certain CGI-based setups |
60e1792b-c380-11dc-821a-000bcdc1757a |
geeklog xss vulnerability |
60e26a40-3b25-11da-9484-00123ffe8333 |
openssl -- potential SSL 2.0 rollback |
60e991ac-c013-11e9-b662-001cc0382b2f |
CUPS -- multiple vulnerabilities |
60eb344e-6eb1-11e1-8ad7-00e0815b8da8 |
OpenSSL -- CMS and S/MIME Bleichenbacher attack |
60f81af3-7690-11e1-9423-00235a5f2c9a |
raptor/raptor2 -- XXE in RDF/XML File Interpretation |
60f8fe7b-3cfb-11da-baa2-0004614cc33d |
WebCalendar -- remote file inclusion vulnerability |
610101ea-5b6a-11e6-b334-002590263bf5 |
wireshark -- multiple vulnerabilities |
6107efb9-aae3-11da-aea1-000854d03344 |
gtar -- invalid headers buffer overflow |
610bc692-a2ad-11dc-900c-000bcdc1757a |
GNU finger vulnerability |
610de647-af8d-11e3-a25b-b4b52fce4ce8 |
mozilla -- multiple vulnerabilities |
6111ecb8-b20d-11da-b2fb-000e0c2e438a |
nfs -- remote denial of service |
6129fdc7-6462-456d-a3ef-8fc3fbf44d16 |
openvpn -- arbitrary code execution on client through malicious or compromised server |
612a34ec-81dc-11da-a043-0002a5c3d308 |
clamav -- possible heap overflow in the UPX code |
613193a0-c1b4-11e8-ae2d-54e1ad3d6335 |
spamassassin -- multiple vulnerabilities |
61349f77-c620-11da-b2fb-000e0c2e438a |
thunderbird -- javascript execution |
613e45d1-6154-11e3-9b62-000c292e4fd8 |
samba -- multiple vulnerabilities |
61480a9a-22b2-11d9-814e-0001020eed82 |
cabextract -- insecure directory handling |
61534682-b8f4-11da-8e62-000e0c33c2dc |
xorg-server -- privilege escalation |
6167b341-250c-11e6-a6fb-003048f2e514 |
cacti -- multiple vulnerabilities |
616cf823-f48b-11d8-9837-000c41e2cdad |
courier-imap -- format string vulnerability in debug mode |
6171eb07-d8a9-11e5-b2bd-002590263bf5 |
libsrtp -- DoS via crafted RTP header vulnerability |
617959ce-a5f6-11e1-a284-0023ae8e59f0 |
haproxy -- buffer overflow |
617a4021-8bf0-11dc-bffa-0016179b2dd5 |
perdition -- str_vwrite format string vulnerability |
618010ff-3044-11eb-8112-000c292ee6b8 |
nomad -- multiple vulnerabilities |
6190c0cd-b945-11ea-9401-2dcf562daa69 |
PuTTY -- Release 0.74 fixes two security vulnerabilities |
6192ae3d-9595-11d9-a9e0-0001020eed82 |
phpmyadmin -- increased privilege vulnerability |
6193b3f6-548c-11eb-ba01-206a8a720317 |
sudo -- Potential information leak in sudoedit |
619ef337-949a-11d9-b813-00d05964249f |
mysql-server -- multiple remote vulnerabilities |
61b07d71-ce0e-11dd-a721-0030843d3802 |
mediawiki -- multiple vulnerabilities |
61bc44ce-9f5a-11ea-aff3-f8b156c2bfe9 |
sympa - Security flaws in setuid wrappers |
61bce714-ca0c-11ec-9cfc-10c37b4ac2ea |
go -- multiple vulnerabilities |
61d89849-43cb-11eb-aba5-00a09858faf5 |
powerdns -- Various issues in GSS-TSIG support |
61db9b88-d091-11e9-8d41-97657151f8c2 |
Exim -- RCE with root privileges in TLS SNI handler |
61f416ff-aa00-11ec-b439-000d3a450398 |
tcpslice -- heap-based use-after-free in extract_slice() |
61fe903b-bc2e-11ee-b06e-001b217b3468 |
Gitlab -- vulnerabilities |
620685d6-0aa3-11ea-9673-4c72b94353b5 |
squid -- Vulnerable to HTTP Digest Authentication |
620cf713-5a99-11e3-878d-20cf30e32f6d |
monitorix -- serious bug in the built-in HTTP server |
62239968-2f2a-11d9-a9e7-0001020eed82 |
gd -- integer overflow |
62287f51-d43d-11e4-879c-00e0814cab4e |
django -- multiple vulnerabilities |
622b5c47-855b-11ea-a5e2-d4c9ef517024 |
MySQL Client -- Multiple vulerabilities |
622bc638-be27-11dd-a578-0030843d3802 |
wordpress -- header rss feed script insertion vulnerability |
622e14b1-b40c-11e2-8441-00e0814cab4e |
jenkins -- multiple vulnerabilities |
6241b5df-42a1-11e5-93ad-002590263bf5 |
mediawiki -- multiple vulnerabilities |
624b45c0-c7f3-11e6-ae1b-002590263bf5 |
Joomla! -- multiple vulnerabilities |
624fe633-9006-11d9-a22c-0001020eed82 |
libexif -- buffer overflow vulnerability |
62642942-590f-11eb-a0dc-8c164582fbac |
Ghostscript -- SAFER Sandbox Breakout |
6294f75f-03f2-11e5-aab1-d050996490d0 |
cURL -- multiple vulnerabilities |
62ab8707-b1bc-11e5-9728-002590263bf5 |
qemu -- denial of service vulnerability in Human Monitor Interface support |
62b8f253-12d9-11dc-a35c-001485ab073e |
typo3 -- email header injection |
62c0dbbd-bfce-11e5-b5fe-002590263bf5 |
cgit -- multiple vulnerabilities |
62d45229-4fa0-11e6-9d13-206a8a720317 |
krb5 -- KDC denial of service vulnerability |
62da9702-b4cc-11eb-b9c9-6cc21735f730 |
PostgreSQL server -- two security issues |
62e0fbe5-5798-11de-bb78-001cc0377035 |
ruby -- BigDecimal denial of service vulnerability |
62f2182c-5f7a-11ea-abb7-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
62f36dfd-ff56-11e1-8821-001b2134ef46 |
vlc -- arbitrary code execution in Real RTSP and MMS support |
630c8c08-880f-11e2-807f-d43d7e0c7c02 |
mozilla -- use-after-free in HTML Editor |
6318b303-3507-11e4-b76c-0011d823eebd |
trafficserver -- unspecified vulnerability |
631c4710-9be5-4a80-9310-eb2847fe24dd |
jenkins -- multiple vulnerabilities |
631fc042-b636-11e5-83ef-14dae9d210b8 |
polkit -- multiple vulnerabilities |
632c98be-aad2-4af2-849f-41a6862afd6a |
p5-Imager -- possibly exploitable buffer overflow |
63347ee7-6841-11dc-82b6-02e0185f8d72 |
wordpress -- remote sql injection vulnerability |
633716fa-1f8f-11dd-b143-0211d880e350 |
vorbis-tools -- Speex header processing vulnerability |
63527d0d-b9de-11e4-8a48-206a8a720317 |
krb5 1.12 -- New release/fix multiple vulnerabilities |
6355efdb-4d4d-11de-8811-0030843d3802 |
libsndfile -- multiple vulnerabilities |
635bf5f4-26b7-11d9-9289-000c41e2cdad |
gaim -- malicious smiley themes |
63bd4bad-dffe-11d9-b875-0001020eed82 |
gzip -- directory traversal and permission race vulnerabilities |
63e36475-119f-11e9-aba7-080027fee39c |
gitea -- insufficient privilege check |
63eb2b11-e802-11e7-a58c-6805ca0b3d42 |
phpMyAdmin -- XSRF/CSRF vulnerability |
63fe4189-9f97-11da-ac32-0001020eed82 |
gnupg -- false positive signature verification |
6410f91d-1214-4f92-b7e0-852e39e265f9 |
electron30 -- multiple vulnerabilities |
641859e8-eca1-11d8-b913-000c41e2cdad |
Mutiple browser frame injection vulnerability |
641cd669-bc37-11ea-babf-6805ca2fa271 |
powerdns-recursor -- access restriction bypass |
641e8609-cab5-11d9-9aed-000e0c2e438a |
ppxp -- local root exploit |
6431c4db-deb4-11de-9078-0030843d3802 |
opera -- multiple vulnerabilities |
64575bb6-e188-11ea-beed-e09467587c17 |
chromium -- heap buffer overflow |
64691c49-4b22-11e0-a226-00e0815b8da8 |
mailman -- XSS vulnerability |
646923b0-41c7-11ec-a3b2-005056a311d1 |
samba -- Multiple Vulnerabilities |
647ac600-cc70-11ec-9cfc-10c37b4ac2ea |
gogs -- XSS in issue attachments |
648a432c-a71f-11ed-86e9-d4c9ef517024 |
OpenSSL -- Multiple vulnerabilities |
64988354-0889-11eb-a01b-e09467587c17 |
chromium -- multiple vulnerabilities |
64be967a-d379-11e6-a071-001e67f15f5a |
libvncserver -- multiple buffer overflows |
64bf6234-520d-11db-8f1a-000a48049292 |
gnutls -- RSA Signature Forgery Vulnerability |
64c8cc2a-59b1-11d9-8a99-000c6e8f12ef |
libxine -- buffer-overflow vulnerability in aiff support |
64e299b6-d12b-4a7a-a94f-ab133703925a |
vscode -- Visual Studio Code for Linux Remote Code Execution Vulnerability |
64e6006e-f009-11e4-98c6-000c292ee6b8 |
powerdns -- Label decompression bug can cause crashes or CPU spikes |
64ee858e-e035-4bb4-9c77-2468963dddb8 |
libvorbis -- multiple vulnerabilities |
64f24a1e-66cf-11e0-9deb-f345f3aa24f0 |
krb5 -- MITKRB5-SA-2011-001, kpropd denial of service |
64f8b72d-9c4e-11e1-9c94-000bcdf0a03b |
libpurple -- Invalid memory dereference in the XMPP protocol plug-in by processing serie of specially-crafted file transfer requests |
650734b2-7665-4170-9a0a-eeced5e10a5e |
graylog -- remote code execution in log4j from user-controlled log input |
651996e0-fe07-11d9-8329-000e0c2e438a |
apache -- http request smuggling |
652064ef-056f-11ee-8e16-6c3be5272acd |
Grafana -- Grafana DS proxy race condition |
653606e9-f6ac-11dd-94d9-0030843d3802 |
typo3 -- multiple vulnerabilities |
653a8059-7c49-11e6-9242-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
6540c8f0-dca3-11e5-8fa8-14dae9d210b8 |
pitivi -- code execution |
65539c54-2517-11e2-b9d6-20cf30e32f6d |
apache22 -- several vulnerabilities |
655ee1ec-511b-11dd-80ba-000bcdf0a03b |
FreeBSD -- DNS cache poisoning |
656b0152-faa9-4755-b08d-aee4a774bd04 |
zeek -- potential DoS vulnerabilities |
65847d9d-7f3e-11ec-8624-b42e991fc52e |
mustache - Possible Remote Code Execution |
658b9198-8106-4c3d-a2aa-dc4a0a7cc3b6 |
zeek -- potential DoS vulnerabilities |
6596bb80-d026-11d9-9aed-000e0c2e438a |
shtool -- insecure temporary file creation |
65a17a3f-ed6e-11d8-aff1-00061bc2ad93 |
Arbitrary code execution via a format string vulnerability in jftpgw |
65a8f773-4a37-11db-a4cc-000a48049292 |
zope -- restructuredText "csv_table" Information Disclosure |
65b14d39-d01f-419c-b0b8-5df60b929973 |
ffmpeg -- multiple vulnerabilities |
65b25acc-e63b-11e1-b81c-001b77d09812 |
rssh -- arbitrary command execution |
65bb1858-27de-11e6-b714-74d02b9a84d5 |
h2o -- use after free on premature connection close |
65c8ecf9-2adb-11db-a6e2-000e0c2e438a |
postgresql -- multiple vulnerabilities |
65d16342-3ec8-11e0-9df7-001c42d23634 |
asterisk -- Exploitable Stack and Heap Array Overflows |
65e99f52-1c5f-11d9-bc4a-000c41e2cdad |
squid -- SNMP module denial-of-service vulnerability |
65f05b71-0e3c-11ec-b335-d4c9ef517024 |
WeeChat -- Crash when decoding a malformed websocket frame in relay plugin. |
65fab89f-2231-46db-8541-978f4e87f32a |
gitlab -- Remote code execution on project import |
6601127c-9e09-11e1-b5e0-000c299b62e1 |
socat -- Heap-based buffer overflow |
6601c08d-a46c-11ec-8be6-d4c9ef517024 |
Apache httpd -- Multiple vulnerabilities |
660ebbf5-daeb-11e5-b2bd-002590263bf5 |
squid -- remote DoS in HTTP response processing |
661bd031-c37d-11e2-addb-60a44c524f57 |
otrs -- XSS vulnerability |
66657bd5-ac92-11dd-b541-001f3b19d541 |
emacs -- run-python vulnerability |
666b8c9e-8212-11db-851e-0016179b2dd5 |
tdiary -- cross site scripting vulnerability |
66759ce6-7530-11df-9c33-000c29ba66d2 |
moodle -- multiple vulnerabilities |
6678211c-bd47-11ed-beb0-1c1b0d9ea7e6 |
Apache OpenOffice -- master password vulnerabilities |
66907dab-6bb2-11ef-b813-4ccc6adda413 |
qt5-webengine -- Multiple vulnerabilities |
6693bad2-ca50-11de-8ee8-00215c6a37bb |
typo3 -- multiple vulnerabilities in TYPO3 Core |
669f3fe8-a07a-11ea-b83e-f0def1f5c5a2 |
FreeRDP -- multiple vulnerabilities |
66a770b4-e008-11dd-a765-0030843d3802 |
mysql -- empty bit-string literal denial of service |
66ba5931-9ed5-11e5-8f5c-002590263bf5 |
redmine -- XSS vulnerability |
66cf7c43-5be3-11ec-a587-001b217b3468 |
Solr -- Apache Log4J |
66d1c277-652a-11eb-bb3f-001b217b3468 |
Gitlab -- Multiple vulnerabilities |
66d77c58-3b1d-11e6-8e82-002590263bf5 |
php -- multiple vulnerabilities |
66dbb2ee-99b8-45b2-bb3e-640caea67a60 |
leafnode -- fetchnews denial-of-service triggered by transmission abort/timeout |
66e4dc99-28b3-11ea-8dde-08002728f74c |
rack -- information leak / session hijack vulnerability |
67057b48-41f4-11ed-86c3-080027881239 |
mediawiki -- multiple vulnerabilities |
670d732a-cdd4-11e3-aac2-0022fb6fcf92 |
mohawk -- multiple vulnerabilities |
672eeea9-a070-4f88-b0f1-007e90a2cbc3 |
jenkins -- multiple vulnerabilities |
6733e1bf-125f-11de-a964-0030843d3802 |
ffmpeg -- 4xm processing memory corruption vulnerability |
6738977b-e9a5-11da-b9f4-00123ffe8333 |
coppermine -- "file" Local File Inclusion Vulnerability |
673aec6f-1cae-11da-bc01-000e0c2e438a |
htdig -- cross site scripting vulnerability |
673dce46-46d0-11e7-a539-0050569f7e80 |
FreeRADIUS -- TLS resumption authentication bypass |
674ed047-be0a-11eb-b927-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
67516177-88ec-11e1-9a10-0023ae8e59f0 |
typo -- Cross-Site Scripting |
675e5098-3b15-11eb-af2a-080027dbe4b7 |
glpi -- Unauthenticated File Deletion |
676ca486-9c1e-11ea-8b5e-b42e99a1b9c3 |
Apache Tomcat Remote Code Execution via session persistence |
676d4f16-4fb3-11ed-a374-8c164567ca3c |
nginx -- Two vulnerabilities |
67710833-1626-11d9-bc4a-000c41e2cdad |
Boundary checking errors in syscons |
67765237-8470-11ea-a283-b42e99a1b9c3 |
malicious URLs can cause git to send a stored credential to wrong server |
6779e82f-b60b-11da-913d-000ae42e9b93 |
drupal -- multiple vulnerabilities |
67a1c3ae-ad69-11df-9be6-0015587e2cc1 |
corkscrew -- buffer overflow vulnerability |
67b050ae-ec82-11ea-9071-10c37b4ac2ea |
go -- net/http/cgi, net/http/fcgi: Cross-Site Scripting (XSS) when Content-Type is not specified |
67b3fef2-2bea-11e5-86ff-14dae9d210b8 |
groovy -- remote execution of untrusted code |
67b514c3-ba8f-11df-8f6e-000c29a67389 |
sudo -- Flaw in Runas group matching |
67bd39ba-12b5-11dd-bab7-0016179b2dd5 |
firefox -- javascript garbage collector vulnerability |
67c05283-5d62-11d8-80e3-0020ed76ef5a |
Buffer overflow in Mutt 1.4 |
67c2eb06-5579-4595-801b-30355be24654 |
lizard -- Negative size passed to memcpy resulting in memory corruption |
67dbe99f-0f09-11db-94f8-00e029485e38 |
shoutcast -- cross-site scripting, information exposure |
67dbeeb6-80f4-11ea-bafd-815569f3852d |
ansible - subversion password leak from PID |
67fe5e5b-549f-4a2a-9834-53f60eaa415e |
py-Scrapy -- exposure of sensitive information vulnerability |
67feba97-b1b5-11e5-9728-002590263bf5 |
qemu -- denial of service vulnerability in VNC |
6809c6db-bdeb-11e5-b5fe-002590263bf5 |
go -- information disclosure vulnerability |
6821a2db-4ab7-11da-932d-00055d790c25 |
PHP -- multiple vulnerabilities |
68222076-010b-11da-bc08-0001020eed82 |
tiff -- buffer overflow vulnerability |
68233cba-7774-11d8-89ed-0020ed76ef5a |
OpenSSL ChangeCipherSpec denial-of-service vulnerability |
683c714d-2d91-11e9-bf3e-a4badb2f4699 |
FreeBSD -- System call kernel data register leak |
6842ac7e-d250-11ea-b9b7-08002728f74c |
jasper -- multiple vulnerabilities |
6851f3bb-6833-11ee-b06f-0050569ceb3a |
Sensitive fields enumeration through API in GLPI |
6856d798-d950-11e9-aae4-f079596b62f9 |
expat2 -- Fix extraction of namespace prefixes from XML names |
68611303-149e-11e7-b9bb-6805ca0b3d42 |
phpMyAdmin -- bypass 'no password' restriction |
6876b163-8708-11e7-8568-e8e0b747a45a |
pspp -- multiple vulnerabilities |
6877e164-6296-11ed-9ca2-6c3be5272acd |
Grafana -- Data source and plugin proxy endpoints leaking authentication tokens to some destination plugins |
68847b20-8ddc-11e5-b69c-c86000169601 |
gdm -- lock screen bypass when holding escape key |
688e73a2-e514-11e3-a52a-98fc11cdc4f5 |
linux-flashplugin -- multiple vulnerabilities |
68958e18-ed94-11ed-9688-b42e991fc52e |
glpi -- multiple vulnerabilities |
689c2bf7-0701-11e3-9a25-002590860428 |
GnuPG and Libgcrypt -- side-channel attack vulnerability |
68ae70c5-c5e5-11ee-9768-08002784c58d |
clamav -- Multiple vulnerabilities |
68b29058-d348-11e7-b9fe-c13eb7bcbf4f |
exim -- remote code execution, deny of service in BDAT |
68bda678-caab-11de-a97e-be89dfd1042e |
p5-HTML-Parser -- denial of service |
68c1f75b-8824-11e2-9996-c48508086173 |
perl -- denial of service via algorithmic complexity attack on hashing routines |
68c7187a-abd2-11df-9be6-0015587e2cc1 |
slim -- insecure PATH assignment |
68fcee9b-5259-11ed-89c9-0800276af896 |
Cleartext leak in libudisks |
6900e6f1-4a79-11e5-9ad8-14dae9d210b8 |
pcre -- heap overflow vulnerability |
69048656-2187-11e4-802c-20cf30e32f6d |
serf -- SSL Certificate Null Byte Poisoning |
6905f05f-a0c9-11e8-8335-8c164535ad80 |
jenkins -- multiple vulnerabilities |
6916ea94-4628-11ec-bbe2-0800270512f4 |
rubygem-date -- Regular Expression Denial of Service Vunlerability of Date Parsing Methods |
691ed622-e499-11d9-a8bd-000cf18bbe54 |
tor -- information disclosure |
6926d038-1db4-11ef-9f97-a8a1599412c6 |
chromium -- security fix |
692a5fd5-bb25-4df4-8a0e-eb91581f2531 |
py-flask-caching -- remote code execution or local privilege escalation vulnerabilities |
692ab645-bf5d-11de-849b-00151797c2d4 |
squidGuard -- multiple vulnerabilities |
694da5b4-5877-11df-8d80-0015587e2cc1 |
mediawiki -- authenticated CSRF vulnerability |
6954a2b0-bda8-11eb-a04e-641c67a117d8 |
libzmq4 -- Stack overflow |
695b2310-3b3a-11eb-af2a-080027dbe4b7 |
glpi -- Insecure Direct Object Reference on ajax/getDropdownValue.php |
696053c6-0f50-11df-a628-001517351c22 |
bugzilla -- information leak |
6972668d-cdb7-11e6-a9a5-b499baebfeaf |
PHP -- multiple vulnerabilities |
69815a1d-c31d-11eb-9633-b42e99a1b9c3 |
SOGo -- SAML user authentication impersonation |
698403a7-803d-11e5-ab94-002590263bf5 |
codeigniter -- multiple vulnerabilities |
69a20ce4-dfee-11dd-a765-0030843d3802 |
imap-uw -- imap c-client buffer overflow |
69bfc852-9bd0-11e2-a7be-8c705af55518 |
FreeBSD -- OpenSSL multiple vulnerabilities |
69cf62a8-a0aa-11ea-9ea5-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
69cfa386-7cd0-11e7-867f-b499baebfeaf |
cURL -- multiple vulnerabilities |
6a0129bf-54ad-11e9-987c-1c39475b9f84 |
Kubectl -- Potential directory traversal |
6a09c80e-6ec7-442a-bc65-d72ce69fd887 |
mozilla -- multiple vulnerabilities |
6a131fbf-ec76-11e7-aa65-001b216d295b |
The Bouncy Castle Crypto APIs: CVE-2017-13098 ("ROBOT") |
6a164d84-2f7f-11d9-a9e7-0001020eed82 |
postgresql-contrib -- insecure temporary file creation |
6a177c87-9933-11e7-93f7-d43d7e971a1b |
GitLab -- multiple vulnerabilities |
6a245f31-4254-11de-b67a-0030843d3802 |
libwmf -- embedded GD library Use-After-Free vulnerability |
6a2cfcdc-9dea-11e6-a298-14dae9d210b8 |
FreeBSD -- OpenSSH Remote Denial of Service vulnerability |
6a308e8e-b1b4-11da-b2fb-000e0c2e438a |
openssh -- remote denial of service |
6a31cbe3-1695-11dc-a197-0011098b2f36 |
wordpress -- unmoderated comments disclosure |
6a33477e-3a9c-11d9-84ad-000c6e8f12ef |
phpMyAdmin -- cross-site scripting vulnerabilities |
6a384960-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Deadlock in the NFS server |
6a3c3e5c-66cb-11e0-a116-c535f3aa24f0 |
krb5 -- MITKRB5-SA-2011-004, kadmind invalid pointer free() [CVE-2011-0285] |
6a449a37-1570-11e8-8e00-000c294a5758 |
strongswan - Insufficient input validation in RSASSA-PSS signature parser |
6a467439-3b38-11eb-af2a-080027dbe4b7 |
glpi -- Any CalDAV calendars is read-only for every authenticated user |
6a4805d5-5aaf-11eb-a21d-79f5bc5ef6a9 |
go -- cmd/go: packages using cgo can cause arbitrary code execution at build time; crypto/elliptic: incorrect operations on the P-224 curve |
6a4bfe75-692a-11e0-bce7-001eecdd401a |
VLC -- Heap corruption in MP4 demultiplexer |
6a5174bd-c580-11da-9110-00123ffe8333 |
clamav -- Multiple Vulnerabilities |
6a523dba-eeab-11dd-ab4f-0030843d3802 |
moinmoin -- multiple cross site scripting vulnerabilities |
6a5d15b6-b661-11ea-8015-e09467587c17 |
chromium -- multiple vulnerabilities |
6a6ad6cb-5c6c-11ef-b456-001e676bf734 |
Dovecot -- DoS |
6a72eff7-ccd6-11ea-9172-4c72b94353b5 |
Apache Tomcat -- Multiple Vulnerabilities |
6a7c2ab0-00dd-11ea-83ce-705a0f828759 |
php -- env_path_info underflow in fpm_main.c can lead to RCE |
6a806960-3016-44ed-8575-8614a7cb57c7 |
rails -- multiple vulnerabilities |
6a851dc0-cfd2-11ee-ac09-6c3be5272acd |
Grafana -- Email verification is not required after email change |
6aa2d135-b40e-11e5-9728-002590263bf5 |
xen-kernel -- ioreq handling possibly susceptible to multiple read issue |
6aa3322f-b150-11e5-9728-002590263bf5 |
qemu -- denial of service vulnerabilities in NE2000 NIC support |
6aa398d0-1c4d-11e9-96dd-a4badb296695 |
joomla3 -- vulnerabilitiesw |
6aa956fb-d97f-11e6-a071-001e67f15f5a |
RabbitMQ -- Authentication vulnerability |
6ac79ed8-ccc2-11e5-932b-5404a68ad561 |
ffmpeg -- remote denial of service in JPEG2000 decoder |
6ad18fe5-f469-11e1-920d-20cf30e32f6d |
bugzilla -- multiple vulnerabilities |
6ad309d9-fb03-11e3-bebd-000c2980a9f3 |
samba -- multiple vulnerabilities |
6adca5e9-95d2-11e2-8549-68b599b52a02 |
firebird -- Remote Stack Buffer Overflow |
6ade62d9-0f62-11ea-9673-4c72b94353b5 |
clamav -- Denial-of-Service (DoS) vulnerability |
6adf6ce0-44a6-11eb-95b7-001999f8d30b |
asterisk -- Remote crash in res_pjsip_diversion |
6ae7cef2-a6ae-11dc-95e6-000c29c5647f |
jetty -- multiple vulnerabilities |
6afa87d3-764b-11d9-b0e7-0000e249a0a2 |
python -- SimpleXMLRPCServer.py allows unrestricted traversal |
6b0215ae-8f26-11da-8c1d-000e0c2e438a |
cpio -- multiple vulnerabilities |
6b04476f-601c-11ed-92ce-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
6b110175-246d-11e6-8dd3-002590263bf5 |
php -- multiple vulnerabilities |
6b1d8a39-ddb3-11e5-8fa8-14dae9d210b8 |
django -- regression in permissions model |
6b2cba6a-c6a5-11ee-97d0-001b217b3468 |
Gitlab -- vulnerabilities |
6b3374d4-6b0b-11e5-9909-002590263bf5 |
plone -- multiple vulnerabilities |
6b3591ea-e2d2-11e5-a6be-5453ed2e2b49 |
libssh -- weak Diffie-Hellman secret generation |
6b3b1b97-207c-11e2-a03f-c8600054b392 |
mozilla -- multiple vulnerabilities |
6b4b0b3f-8127-11d9-a9e7-0001020eed82 |
postgresql -- multiple buffer overflows in PL/PgSQL parser |
6b575419-14cf-11df-a628-001517351c22 |
otrs -- SQL injection |
6b591e05-971c-4077-8ae4-1310554971b7 |
electron31 -- multiple vulnerabilities |
6b6ca5b6-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- devfs rules not applied by default for jails |
6b6de127-db0b-11ea-ba1e-1c39475b9f84 |
bftpd -- Multiple vulnerabilities |
6b771fe2-b84e-11e5-92f9-485d605f4717 |
php -- multiple vulnerabilities |
6b856e00-b30a-11e9-a87f-a4badb2f4699 |
FreeBSD -- Kernel memory disclosure in freebsd32_ioctl |
6b8cadce-db0b-11dd-aa56-000bcdf0a03b |
FreeBSD -- IPv6 Neighbor Discovery Protocol routing vulnerability |
6b90acba-6a0a-11ea-92ab-00163e433440 |
FreeBSD -- Kernel memory disclosure with nested jails |
6b97436c-ce1e-11e2-9cb2-6805ca0b3d42 |
phpMyAdmin -- XSS due to unescaped HTML output in Create View page |
6bacd9fd-ca56-11ed-bc52-589cfc0f81b0 |
phpmyfaq -- multiple vulnerabilities |
6bb6188c-17b2-11de-ae4d-0030843d3802 |
amarok -- multiple vulnerabilities |
6bc6eed2-9cca-11e5-8c2b-c335fa8985d7 |
libraw -- memory objects not properly initialized |
6bd2773c-cf1a-11ed-bd44-080027f5fec9 |
rubygem-time -- ReDoS vulnerability |
6bf55af9-973b-11ea-9f2c-38d547003487 |
salt -- multiple vulnerabilities in salt-master process |
6bf71117-c0c9-11e8-b760-6023b685b1ee |
mantis -- XSS vulnerability |
6bff5ca6-b61a-11ea-aef4-08002728f74c |
curl -- multiple vulnerabilities |
6c083cf8-4830-11e4-ae2c-c80aa9043978 |
fish -- local privilege escalation and remote code execution |
6c1de144-056f-11ee-8e16-6c3be5272acd |
Grafana -- Broken access control: viewer can send test alerts |
6c22bb39-0a9a-11ec-a265-001b217b3468 |
Gitlab -- Vulnerabilities |
6c2d4f29-af3e-11d9-837d-000e0c2e438a |
gld -- format string and buffer overflow vulnerabilities |
6c4db192-cb23-11df-9c1b-0011098ad87f |
horde-imp -- XSS vulnerability |
6c72b13f-4d1d-11ee-a7f1-080027f5fec9 |
redis -- Possible bypassing ACL configuration |
6c7661ff-7912-11d8-9645-0020ed76ef5a |
uudeview buffer overflows |
6c7d9a35-2608-11e1-89b4-001ec9578670 |
krb5 -- KDC null pointer dereference in TGS handling |
6c808811-bb9a-11e5-a65c-485d605f4717 |
h2o -- directory traversal vulnerability |
6c8ad3e8-0a30-11e1-9580-4061862b8c22 |
mozilla -- multiple vulnerabilities |
6ca7eddd-d436-486a-b169-b948436bcf14 |
libvpx -- buffer overflow in vp9_init_context_buffers |
6cc06eec-c60b-11e5-bf36-6805ca0b3d42 |
phpmyadmin -- Multiple XSS vulnerabilities |
6cc63bf5-a727-4155-8ec4-68b626475e68 |
xorg-server -- Security issue in the X server |
6cec1b0a-da15-467d-8691-1dea392d4c8d |
mozilla -- multiple vulnerabilities |
6d08fa63-83bf-11e3-bdba-080027ef73ec |
HTMLDOC -- buffer overflow issues when reading AFM files and parsing page sizes |
6d0bf320-ca39-11e2-9673-001e8c75030d |
devel/subversion -- contrib hook-scripts can allow arbitrary code execution |
6d1761d2-0b23-11da-bc08-0001020eed82 |
gaim -- AIM/ICQ away message buffer overflow |
6d18fe19-ee67-11d9-8310-0001020eed82 |
clamav -- MS-Expand file handling DoS vulnerability |
6d21a287-fce0-11e0-a828-00235a5f2c9a |
kdelibs4, rekonq -- input validation failure |
6d25c306-f3bb-11e5-92ce-002590263bf5 |
salt -- Insecure configuration of PAM external authentication service |
6d31ef38-df85-11ee-abf1-6c3be5272acd |
Grafana -- Data source permission escalation |
6d329b64-6bbb-11e1-9166-001e4f0fb9b1 |
portaudit -- auditfile remote code execution |
6d334fdb-f7e7-11ea-88f8-901b0ef719ab |
FreeBSD -- ftpd privilege escalation via ftpchroot feature |
6d337396-0e4a-11e8-94c0-5453ed2e2b49 |
p7zip -- heap-based buffer overflow |
6d33b3e5-ea03-11e5-85be-14dae9d210b8 |
node -- multiple vulnerabilities |
6d402857-2fba-11e6-9f31-5404a68ad561 |
VLC -- Possibly remote code execution via crafted file |
6d472244-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- TCP reassembly vulnerability |
6d4e4759-7b67-11dd-80ba-000bcdf0a03b |
FreeBSD -- amd64 swapgs local privilege escalation |
6d52bda1-2e54-11e8-a68f-485b3931c969 |
SQLite -- Corrupt DB can cause a NULL pointer dereference |
6d554d6e-5638-11eb-9d36-5404a68ad561 |
wavpack -- integer overflow in pack_utils.c |
6d5f1b0b-b865-48d5-935b-3fb6ebb425fc |
Apache Ant leaks sensitive information via the java.io.tmpdir |
6d68618a-7199-11db-a2ad-000c6ec775d9 |
bugzilla -- multiple vulnerabilities |
6d78202e-e2f9-11da-8674-00123ffe8333 |
phpldapadmin -- Cross-Site Scripting and Script Insertion vulnerabilities |
6d82c5e9-fc24-11ee-a689-04421a1baf97 |
php -- Multiple vulnerabilities |
6d8505f0-0614-11e6-b39c-00262d5ed8ee |
chromium -- multiple vulnerabilities |
6d85dc62-f2bd-11dd-9f55-0030843d3802 |
drupal -- multiple vulnerabilities |
6d87c2e9-c64d-11e2-9c22-50465d9ff992 |
socat -- FD leak |
6d9a28f8-8152-11da-817c-0001020eed82 |
milter-bogom -- headerless message crash |
6d9c6aae-5eb1-11ee-8290-a8a1599412c6 |
chromium -- multiple vulnerabilities |
6d9eadaf-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- sendmail improper close-on-exec flag handling |
6da45e38-5b55-11e6-8859-000c292ee6b8 |
collectd -- Network plugin heap overflow |
6da7344b-128a-11db-b25f-00e00c69a70d |
drupal -- multiple vulnerabilities |
6dbae1a8-a4e6-11e5-b864-14dae9d210b8 |
cups-filters -- code execution |
6dc3c61c-e866-4c27-93f7-ae50908594fd |
jenkins -- multiple issues |
6dccc186-b824-11ed-b695-6c3be5272acd |
Grafana -- Stored XSS in text panel plugin |
6dd5e45c-f084-11e1-8d0f-406186f3d89d |
coppermine -- Multiple vulnerabilities |
6df56c60-3738-11e6-a671-60a44ce6887b |
wget -- HTTP to FTP redirection file name confusion vulnerability |
6e04048b-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- ktrace kernel memory disclosure |
6e099997-25d8-11dc-878b-000c29c5647f |
gd -- multiple vulnerabilities |
6e0ebb4a-5e75-11ee-a365-001b217b3468 |
Gitlab -- vulnerabilities |
6e27f3b6-189b-11da-b6be-0090274e8dbb |
fswiki -- command injection vulnerability |
6e33f4ab-efed-11d9-8310-0001020eed82 |
bugzilla -- multiple vulnerabilities |
6e3b12e2-6ce3-11da-b90c-000e0c2e438a |
mantis -- "view_filters_page.php" cross-site scripting vulnerability |
6e3b700a-7ca3-11ea-b594-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
6e4e35c3-5fd1-11e7-9def-b499baebfeaf |
smarty3 -- shell injection in math |
6e4e8e87-9fb8-4e32-9f8e-9b4303f4bfd5 |
chromium -- multiple vulnerabilities |
6e58e1e9-2636-413e-9f84-4c0e21143628 |
libssh2 -- multiple issues |
6e5a9afd-12d3-11e2-b47d-c8600054b392 |
mozilla -- multiple vulnerabilities |
6e65dfea-b614-11e9-a3a2-1506e15611cc |
Django -- multiple vulnerabilities |
6e6a6b8a-2fde-11d9-b3a2-0050fc56d258 |
apache mod_include buffer overflow vulnerability |
6e740881-0cae-11d9-8a8a-000c41e2cdad |
mozilla -- automated file upload |
6e7ad1d7-4e27-11e1-8e12-90e6ba8a36a2 |
mathopd -- directory traversal vulnerability |
6e80bd9b-7e9b-11e7-abfe-90e2baa3bafc |
subversion -- Arbitrary code execution vulnerability |
6e83b2f3-e4e3-11e6-9ac1-a4badb2f4699 |
nfsen -- remote command execution |
6e87b696-ca3e-11df-aade-0050568f000c |
FreeBSD -- Inappropriate directory permissions in freebsd-update(8) |
6e8b9c75-6179-11ef-8a7d-b42e991fc52e |
mcpp -- Heap-based buffer overflow |
6e8f54af-a07d-11de-a649-000c2955660f |
ikiwiki -- insufficient blacklisting in teximg plugin |
6e8f9003-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Incorrect error handling in PAM policy parser |
6ea60e00-cf13-11e5-805c-5453ed2e2b49 |
py-imaging, py-pillow -- Buffer overflow in FLI decoding code |
6eb1dc51-1244-11dd-bab7-0016179b2dd5 |
phpmyadmin -- Username/Password Session File Information Disclosure |
6eb580d7-a29c-11dc-8919-001c2514716c |
Squid -- Denial of Service Vulnerability |
6eb6a442-629a-11ed-9ca2-6c3be5272acd |
Grafana -- Privilege escalation |
6eb9cf14-bab0-11ec-8f59-4437e6ad11c4 |
mutt -- mutt_decode_uuencoded() can read past the of the input line |
6ec9f210-0404-11e6-9aee-bc5ff4fb5ea1 |
dhcpcd -- remote code execution/denial of service |
6ecd0b42-ce77-11dc-89b1-000e35248ad7 |
libxine -- buffer overflow vulnerability |
6ed5c5e3-a840-11e7-b5af-a4badb2f4699 |
FreeBSD -- OpenSSH Denial of Service vulnerability |
6eddfa51-fb44-11e9-86e9-001b217b3468 |
Gitlab -- Disclosure Vulnerabilities |
6f0327d4-9902-4042-9b68-6fc2266944bc |
chromium -- multiple vulnerabilities |
6f0529e2-2e82-11e6-b2ec-b499baebfeaf |
OpenSSL -- vulnerability in DSA signing |
6f0b0cbf-1274-11e8-8b5b-4ccc6adda413 |
libraw -- multiple DoS vulnerabilities |
6f0c2d1b-c60b-11e5-bf36-6805ca0b3d42 |
phpmyadmin -- Insecure password generation in JavaScript |
6f15730d-94ea-11e9-a83e-641c67a117d8 |
znc -- privilege escalation |
6f170cf2-e6b7-11e8-a9a8-b499baebfeaf |
OpenSSL -- timing vulnerability |
6f2545bb-65e8-11ef-8a0f-a8a1599412c6 |
chromium -- multiple security fixes |
6f33d38b-aa18-11eb-b3f1-005056a311d1 |
samba -- negative idmap cache entries vulnerability |
6f358f5a-c7ea-11de-a9f3-0030843d3802 |
KDE -- multiple vulnerabilities |
6f4d96c0-4062-11e7-b291-b499baebfeaf |
samba -- remote code execution vulnerability |
6f5192f5-75a7-11ed-83c0-411d43ce7fe4 |
go -- multiple vulnerabilities |
6f6518ab-6830-11ee-b06f-0050569ceb3a |
Account takeover via SQL Injection in UI layout preferences in GLPI |
6f6c9420-6297-11ed-9ca2-6c3be5272acd |
Grafana -- Data source and plugin proxy endpoints leaking authentication tokens to some destination plugins |
6f736456-c060-11dc-982e-001372fd0af2 |
drupal -- cross site scripting (utf8) |
6f825fa4-5560-11e4-a4c3-00a0986f28c4 |
drupal7 -- SQL injection |
6f91a709-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- iconv(3) NULL pointer dereference and out-of-bounds array access |
6f955451-ba54-11d8-b88c-000d610a3b12 |
Buffer overflow in Squid NTLM authentication helper |
6faa7feb-d3fa-11ea-9aba-0c9d925bbbc0 |
libX11 -- Heap corruption in the X input method client in libX11 |
6fae2d6c-1f38-11ee-a475-080027f5fec9 |
redis -- heap overflow in COMMAND GETKEYS and ACL evaluation |
6fae9fe1-5048-11e6-8aa7-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
6fb521b0-d388-11e3-a790-000c2980a9f3 |
strongswan -- Remote Authentication Bypass |
6fb8a90f-c9d5-4d14-b940-aed3d63c2edc |
The GIMP -- Use after Free vulnerability |
6fd02439-5d70-11d8-80e3-0020ed76ef5a |
Several remotely exploitable buffer overflows in gaim |
6fd773d3-bc5a-11ea-b38d-f0def1d0c3ea |
trafficserver -- resource consumption |
6fe72178-b2e3-11e6-8b2a-6805ca0b3d42 |
phpMyAdmin -- multiple vulnerabilities |
6fea7103-2ea4-11ed-b403-3dae8ac60d3e |
go -- multiple vulnerabilities |
6ff570cb-b418-11e2-b279-20cf30e32f6d |
strongSwan -- ECDSA signature verification issue |
7003b62d-7252-46ff-a9df-1b1900f1e65b |
RabbitMQ -- Denial of Service via improper input validation |
700d43b4-a42a-11d8-9c6d-0020ed76ef5a |
Cyrus IMSPd multiple vulnerabilities |
70111759-1dae-11ea-966a-206a8a720317 |
spamassassin -- multiple vulnerabilities |
70140f20-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Multiple vulnerabilities in file(1) and libmagic(3) |
7015ab21-9230-490f-a2fe-f7557e3de25d |
electron{26,27} -- multiple vulnerabilities |
7033b42d-ef09-11e5-b766-14dae9d210b8 |
pcre -- stack buffer overflow |
70372cda-6771-11de-883a-00e0815b8da8 |
nfsen -- remote command execution |
703c4761-b61d-11ec-9ebc-1c697aa5a594 |
FreeBSD -- mpr/mps/mpt driver ioctl heap out-of-bounds write |
705b759c-7293-11e5-a371-14dae9d210b8 |
pear-twig -- remote code execution |
705e003a-7f36-11d8-9645-0020ed76ef5a |
squid ACL bypass due to URL decoding bug |
7062bce0-1b17-11ec-9d9d-0022489ad614 |
Node.js -- August 2021 Security Releases (2) |
706c9eef-a077-11dd-b413-001372fd0af2 |
drupal -- multiple vulnerabilities |
708c65a5-7c58-11de-a994-0030843d3802 |
mono -- XML signature HMAC truncation spoofing |
709e025a-de8b-11e6-a9a5-b499baebfeaf |
PHP -- undisclosed vulnerabilities |
70ae62b0-16b0-11dc-b803-0016179b2dd5 |
c-ares -- DNS Cache Poisoning Vulnerability |
70b62f5e-9e2e-11d9-a256-0001020eed82 |
clamav -- zip handling DoS vulnerability |
70b72a52-9e54-11e3-babe-60a44c524f57 |
otrs -- XSS Issue |
70b774a8-05bc-11e9-87ad-001b217b3468 |
Gitlab -- Arbitrary File read in Gitlab project import |
70c44cd0-e717-11e5-85be-14dae9d210b8 |
quagga -- stack based buffer overflow vulnerability |
70c59485-ee5a-11d9-8310-0001020eed82 |
acroread -- buffer overflow vulnerability |
70c85c93-743c-11e6-a590-14dae9d210b8 |
inspircd -- authentication bypass vulnerability |
70cf37c8-939b-11ef-87ad-a8a15998b5cb |
tnef -- Invalid read and write operations, controlled by an attacker |
70d0d2ec-cb62-11ed-956f-7054d21a9e2a |
py39-rencode -- infinite loop that could lead to Denial of Service |
70e71a24-0151-11ec-bf0c-080027eedc6a |
bouncycastle15 -- bcrypt password checking vulnerability |
70f5b3c6-80f0-11d8-9645-0020ed76ef5a |
Critical SQL injection in phpBB |
70fc13d9-4ab4-11da-932d-00055d790c25 |
skype -- multiple buffer overflow vulnerabilities |
71273c4d-a6ec-11df-8a8d-0008743bf21a |
opera -- multiple vulnerabilities |
7128fb45-2633-11dc-94da-0016179b2dd5 |
vlc -- format string vulnerability and integer overflow |
7132c842-58e2-11df-8d80-0015587e2cc1 |
spamass-milter -- remote command execution vulnerability |
7136e6b7-e1b3-11e7-a4d3-000c292ee6b8 |
jenkins -- Two startup race conditions |
713c3913-8c2b-11d9-b58c-0001020eed82 |
ImageMagick -- format string vulnerability |
714b033a-2b09-11e9-8bc3-610fd6e6cd05 |
curl -- multiple vulnerabilities |
714c1406-e4cf-11de-883a-003048590f9e |
rt -- Session fixation vulnerability |
714e6c35-c75b-11ea-aa29-d74973d1f9f3 |
OpenEXR/ilmbase 2.5.2 -- patch release with various bug/security fixes |
71597e3e-f6b8-11dd-94d9-0030843d3802 |
websvn -- multiple vulnerabilities |
71612099-1e93-11e0-a587-001b77d09812 |
subversion -- multiple DoS |
717efd8a-6821-11ee-b06f-0050569ceb3a |
GLPI vulnerable to unauthorized access to Dashboard data |
7184f92e-8bb8-11e1-8d7b-003067b2972c |
OpenSSL -- integer conversions result in memory corruption |
719f06af-e45e-11ea-95a1-c3b8167b8026 |
chrony <= 3.5.1 data corruption through symlink vulnerability writing the pidfile |
71ad81da-4414-11e4-a33e-3c970e169bc2 |
bash -- remote code execution vulnerability |
71af4ded-8864-11e5-af1b-001999f8d30b |
owncloudclient -- Improper validation of certificates when using self-signed certificates |
71b24d99-c60b-11e5-bf36-6805ca0b3d42 |
phpmyadmin -- Unsafe comparison of XSRF/CSRF token |
71c71ce0-0805-11eb-a3a4-0019dbb15b3f |
payara -- multiple vulnerabilities |
71d903fc-602d-11dc-898c-001921ab2fa4 |
php -- multiple vulnerabilities |
71ebbc50-01c1-11e7-ae1b-002590263bf5 |
codeigniter -- multiple vulnerabilities |
720505fe-593f-11ec-9ba8-002324b2fba8 |
go -- multiple vulnerabilities |
720590df-10eb-11e9-b407-080027ef1a23 |
chromium -- Use after free in PDFium |
7217f6e8-3ff4-4387-845d-d1744bb7f95e |
chromium -- multiple security fixes |
7229d900-88af-11d8-90d1-0020ed76ef5a |
mksnap_ffs clears file system options |
7240de58-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Kernel memory disclosure in control messages and SCTP |
724e6f93-8f2a-11dd-821f-001cc0377035 |
mplayer -- multiple integer overflows |
7257b26f-0597-11da-86bc-000e0c2e438a |
devfs -- ruleset bypass |
72583cb3-a7f9-11ed-bd9e-589cfc0f81b0 |
phpMyAdmin -- XSS vulnerability in drag-and-drop upload |
725ab25a-987b-11e1-a2ef-001fd0af1a4c |
p5-Config-IniFiles -- unsafe temporary file creation |
7262f826-795e-11ec-8be6-d4c9ef517024 |
MySQL -- Multiple vulnerabilities |
726dd9bd-8f25-11da-8c1d-000e0c2e438a |
ee -- temporary file privilege escalation |
72709326-81f7-11eb-950a-00155d646401 |
go -- encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader; archive/zip: panic when calling Reader.Open |
7274e0cc-575f-41bc-8619-14a41b3c2ad0 |
xorg-server -- multiple vulnerabilities |
7280c3f6-a99a-11e2-8cef-6805ca0b3d42 |
phpMyAdmin -- XSS due to unescaped HTML output in GIS visualisation page |
7289187b-66a5-11da-99f6-00123ffe8333 |
trac -- search module SQL injection vulnerability |
7289214f-7c55-11e1-ab3b-000bcdf0a03b |
libpurple -- Remote DoS via an MSN OIM message that lacks UTF-8 encoding |
729008b9-54bf-11ef-a61b-2cf05da270f3 |
Gitlab -- Vulnerabilities |
72999d57-d6f6-11db-961b-005056847b26 |
WebCalendar -- "noSet" variable overwrite vulnerability |
729c4a9f-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Denial of Service in TCP packet processing |
72a5579e-c765-11e9-8052-0028f8d09152 |
h2o -- multiple HTTP/2 vulnerabilities |
72a6e3be-483a-11e9-92d7-f1590402501e |
Jupyter notebook -- cross-site inclusion (XSSI) vulnerability |
72bf9e21-03df-11e3-bd8d-080027ef73ec |
polarssl -- denial of service vulnerability |
72bfbb09-5a6a-11e6-a6c3-14dae9d210b8 |
perl -- local arbitrary code execution |
72c145df-a1e0-11e5-8ad0-00262d5ed8ee |
chromium -- multiple vulnerabilities |
72cba7b0-13cd-11de-a964-0030843d3802 |
netatalk -- arbitrary command execution in papd daemon |
72cdf2ab-5b87-11dc-812d-0011098b2f36 |
lsh -- multiple vulnerabilities |
72d6d757-c197-11ee-86bb-a8a1599412c6 |
chromium -- multiple security fixes |
72d8df84-ea6d-11da-8a53-00123ffe8333 |
cscope -- buffer overflow vulnerabilities |
72da8af6-7c75-11d9-8cc5-000854d03344 |
enscript -- multiple vulnerabilities |
72ee7111-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- rtsold(8) remote buffer overflow vulnerability |
72ee9707-d7b2-11e4-8d8e-f8b156b6dcc8 |
cpio -- multiple vulnerabilities |
72f21372-55e4-11db-a5ae-00508d6a62df |
torrentflux -- User-Agent XSS Vulnerability |
72f35727-ce83-11e2-be04-005056a37f68 |
dns/bind9* -- A recursive resolver can be crashed by a query for a malformed zone |
72f71e26-4f69-11e6-ac37-ac9e174be3af |
Apache OpenOffice 4.1.2 -- Memory Corruption Vulnerability (Impress Presentations) |
72fccfdf-2061-11e5-a4a5-002590263bf5 |
ansible -- multiple vulnerabilities |
72fff788-e561-11e7-8097-0800271d4b9c |
rsync -- multiple vulnerabilities |
730db824-e216-11d8-9b0a-000347a4fa7d |
Mozilla / Firefox user interface spoofing vulnerability |
730e922f-20e7-11ec-a574-080027eedc6a |
nexus2-oss -- Apache ActiveMQ JMX vulnerability |
7313b0e3-27b4-11e5-a15a-50af736ef1c0 |
pivotx -- Multiple unrestricted file upload vulnerabilities |
7314942b-0889-46f0-b02b-2c60aabe4a82 |
chromium -- multiple security fixes |
731cdeaa-3564-11e5-9970-14dae9d210b8 |
bind -- denial of service vulnerability |
732282a5-5a10-11ee-bca0-001999f8d30b |
Mailpit affected by vulnerability in included go markdown module |
7329938b-a4e6-11e5-b864-14dae9d210b8 |
cups-filters -- code execution |
733afd81-01cf-11ec-aec9-0800273f11ea |
gitea -- multiple vulnerabilities |
734233f4-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- routed(8) remote denial of service vulnerability |
734b8f46-773d-4fef-bed3-61114fe8e4c5 |
libX11 -- Sub-object overflows |
73634294-0fa7-11e0-becc-0022156e8794 |
php -- open_basedir bypass |
736e55bc-39bb-11de-a493-001b77d09812 |
cups -- remote code execution and DNS rebinding |
738e8ae1-46dd-11e7-a539-0050569f7e80 |
duo -- Two-factor authentication bypass |
738f8f9e-d661-11dd-a765-0030843d3802 |
mysql -- MyISAM table privileges security bypass vulnerability for symlinked paths |
738fc80d-5f13-4ccb-aa9a-7965699e5a10 |
mozilla -- use-after-free |
7392e1e3-4eb9-11ed-856e-d4c9ef517024 |
OpenSSL -- Potential NULL encryption in NID_undef with Custom Cipher |
739329c8-d8f0-11dc-ac2f-0016d325a0ed |
ikiwiki -- javascript insertion via uris |
73964eac-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- memory leak in sandboxed namei lookup |
739948e3-78bf-11e8-b23c-080027ac955c |
mailman -- hardening against malicious listowners injecting evil HTML scripts |
739b94a4-838b-11de-938e-003048590f9e |
joomla15 -- com_mailto Timeout Issue |
739bb51d-7e82-11d8-9645-0020ed76ef5a |
racoon security association deletion vulnerability |
73a697d7-1d0f-11ef-a490-84a93843eb75 |
OpenSSL -- Use after free vulnerability |
73b1e734-c74e-11e9-8052-0028f8d09152 |
h2o -- multiple HTTP/2 vulnerabilities |
73e9a137-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Denial of service attack against sshd(8) |
73ea0706-9c57-11d8-9366-0020ed76ef5a |
rsync path traversal issue |
73ec1008-72f0-11dd-874b-0030843d3802 |
opera -- multiple vulnerabilities |
73efb1b7-07ec-11e2-a391-000c29033c32 |
eperl -- Remote code execution |
73f53712-d028-11db-8c07-0211d85f11fb |
ktorrent -- multiple vulnerabilities |
740badcb-c60b-11e5-bf36-6805ca0b3d42 |
phpmyadmin -- Multiple full path disclosure vulnerabilities |
741c3957-1d69-11d9-a804-0050fc56d258 |
icecast -- HTTP header overflow |
741f8841-9c6b-11d9-9dbe-000a95bc6fae |
firefox -- arbitrary code execution from sidebar panel |
742279d6-bdbe-11ed-a179-2b68e9d12706 |
go -- crypto/elliptic: incorrect P-256 ScalarMult and ScalarBaseMult results |
742563d4-d776-11e4-b595-4061861086c1 |
Several vulnerabilities found in PHP |
742eb9e4-e3cb-4f5a-b94e-0e9a39420600 |
ruby-gems -- Algorithmic Complexity Vulnerability |
74389f22-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Kernel stack disclosure in setlogin(2) / getlogin(2) |
744ec9d7-fe0f-11ec-bcd2-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
7453c85d-7830-11dc-b4c8-0016179b2dd5 |
nagios-plugins -- Long Location Header Buffer Overflow Vulnerability |
7467c611-b490-11ee-b903-001fc69cd6dc |
xorg server -- Multiple vulnerabilities |
746ca1ac-21ec-11d9-9289-000c41e2cdad |
ifmail -- unsafe set-user-ID application |
746d04dc-507e-4450-911f-4c41e48bb07a |
bro -- out of bounds write allows remote DOS |
7480b6ac-adf1-443e-a33c-3a3c0becba1e |
jenkins -- multiple vulnerabilities |
7488378d-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Remote command execution in ftp(1) |
748aa89f-d529-11e1-82ab-001fd0af1a4c |
rubygem-activerecord -- multiple vulnerabilities |
749b5587-2da1-11e3-b1a9-b499baab0cbe |
gnupg -- possible infinite recursion in the compressed packet parser |
74a9541d-5d6c-11d8-80e3-0020ed76ef5a |
clamav remote denial-of-service |
74b7403c-c4d5-11da-b2fb-000e0c2e438a |
mediawiki -- cross site scripting vulnerability |
74bbde13-ec17-11ea-88f8-901b0ef719ab |
FreeBSD -- IPv6 Hop-by-Hop options use-after-free bug |
74bf1594-8493-11dd-bb64-0030843d3802 |
phpmyadmin -- Code execution vulnerability |
74c86a29-81ef-11d9-a9e7-0001020eed82 |
bidwatcher -- format string vulnerability |
74d06b67-d2cf-11d8-b479-02e0185c0b53 |
multiple vulnerabilities in ethereal |
74daa370-2797-11e8-95ec-a4badb2f4699 |
FreeBSD -- Speculative Execution Vulnerabilities |
74db0d02-b140-4c32-aac6-1f1e81e1ad30 |
dovecot -- multiple vulnerabilities |
74ded00e-6007-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Buffer overflow in stdio |
74ff10f6-520f-11db-8f1a-000a48049292 |
cscope -- Buffer Overflow Vulnerabilities |
75091516-6f4b-4059-9884-6727023dc366 |
NSS -- multiple vulnerabilities |
751823d4-f189-11de-9344-00248c9b4be7 |
drupal -- multiple cross-site scripting |
75231c63-f6a2-499d-8e27-787773bda284 |
bugzilla -- multiple vulnerabilities |
752ce039-5242-11df-9139-00242b513d7c |
vlc -- unintended code execution with specially crafted data |
753f8185-5ba9-42a4-be02-3f55ee580093 |
phpMyAdmin -- XSS attack in database search |
7557a2b1-5d63-11d8-80e3-0020ed76ef5a |
Apache-SSL optional client certificate vulnerability |
755fa519-80a9-11dd-8de5-0030843d3802 |
neon -- NULL pointer dereference in Digest domain support |
756a8631-0b84-11e8-a986-6451062f0f7a |
Flash Player -- multiple vulnerabilities |
756db070-b9d4-11d9-ae81-000ae42e9b93 |
coppermine -- IP spoofing and XSS vulnerability |
75770425-67a2-11d8-80e3-0020ed76ef5a |
SQL injection vulnerability in phpnuke |
757e6ee8-ff91-11e8-a148-001b217b3468 |
Gitlab -- Arbitrary File read in GitLab project import with Git LFS |
757ee63b-269a-11ec-a616-6c3be5272acd |
Grafana -- Snapshot authentication bypass |
7580f00e-280c-11e0-b7c8-00215c6a37bb |
dokuwiki -- multiple privilege escalation vulnerabilities |
759059ac-dab3-11e7-b5af-a4badb2f4699 |
FreeBSD -- Information leak in kldstat(2) |
759a5599-3ce8-11ee-a0d1-84a93843eb75 |
MySQL -- Multiple vulnerabilities |
759b8dfe-3972-11d9-a9e7-0001020eed82 |
Overflow error in fetch |
75aae50b-9e3c-11eb-9bc3-8c164582fbac |
AccountsService -- Insufficient path check in user_change_icon_file_authorized_cb() |
75c073cc-1a1d-11ed-bea0-48ee0c739857 |
XFCE tumbler -- Vulnerability in the GStreamer plugin |
75c24c1d-b688-11dd-88fd-001c2514716c |
dovecot -- ACL plugin bypass vulnerabilities |
75d72e03-b137-11ea-8659-901b0ef719ab |
BIND -- Remote Denial of Service vulnerability |
75dd622c-d5fd-11e7-b9fe-c13eb7bcbf4f |
exim -- remote DoS attack in BDAT processing |
75e26236-ce9e-11e0-b26a-00215c6a37bb |
phpMyAdmin -- multiple XSS vulnerabilities |
75f2382e-b586-11dd-95f9-00e0815b8da8 |
syslog-ng2 -- startup directory leakage in the chroot environment |
75f39413-7a00-11e5-a2a1-002590263bf5 |
drupal -- open redirect vulnerability |
762b7d4a-ec19-11ea-88f8-901b0ef719ab |
FreeBSD -- dhclient heap overflow |
762d1c6d-0722-11d9-b45d-000c41e2cdad |
apache -- apr_uri_parse IPv6 address handling vulnerability |
76301302-1d59-11d9-814e-0001020eed82 |
xerces-c2 -- Attribute blowup denial-of-service |
764344fb-8214-11e2-9273-902b343deec9 |
sudo -- Authentication bypass when clock is reset |
76487640-ea29-11eb-a686-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
76562594-1f19-11db-b7d4-0008743bf21a |
ruby -- multiple vulnerabilities |
7656fc62-a7a7-11e4-96ba-001999f8d30b |
asterisk -- Mitigation for libcURL HTTP request injection vulnerability |
765d165b-fbfe-11e6-aae7-5404a68ad561 |
MPD -- buffer overflows in http output |
765feb7d-a0d1-11e6-a881-b499baebfeaf |
cURL -- multiple vulnerabilities |
76700d2f-d959-11ea-b53c-d4c9ef517024 |
Apache httpd -- Multiple vulnerabilities |
767dfb2d-3c9e-11ef-a829-5404a68ad561 |
traefik -- Bypassing IP allow-lists via HTTP/3 early data requests |
768cfe70-ca40-11df-aade-0050568f000c |
FreeBSD -- OPIE off-by-one stack overflow |
76904dce-ccf3-11d8-babb-000854d03344 |
Pavuk HTTP Location header overflow |
7694927f-c60b-11e5-bf36-6805ca0b3d42 |
phpmyadmin -- XSS vulnerability in normalization page |
7695b0af-958f-11ec-9aa3-4ccc6adda413 |
cryptopp -- ElGamal implementation allows plaintext recovery |
769a4f60-9056-4c27-89a1-1758a59a21f8 |
zeek -- Vulnerability due to memory leak |
769ba449-79e1-11e6-bf75-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
76a07f31-a860-11eb-8ddb-001b217b3468 |
Carrierwave -- Multiple vulnerabilities |
76adaab0-e4e3-11d9-b875-0001020eed82 |
ethereal -- multiple protocol dissectors vulnerabilities |
76b085e2-9d33-11e7-9260-000c292ee6b8 |
Apache -- HTTP OPTIONS method can leak server memory |
76b5068c-8436-11eb-9469-080027f515ea |
OpenSSH -- Double-free memory corruption in ssh-agent |
76b597e4-e9c6-11df-9e10-001b2134ef46 |
linux-flashplugin -- multiple vulnerabilities |
76c2110b-9e97-11ee-ae23-a0f3c100ae18 |
slurm-wlm -- Several security issues |
76c7a0f5-5928-11e4-adc7-001999f8d30b |
asterisk -- Asterisk Susceptibility to POODLE Vulnerability |
76c8b690-340b-11eb-a2b7-54e1ad3d6335 |
xorg-server -- Multiple input validation failures in X server XKB extension |
76d80b33-7211-11e7-998a-08606e47f965 |
jabberd -- authentication bypass vulnerability |
76e0b133-6bfd-11d9-a5df-00065be4b5b6 |
newsfetch -- server response buffer overflow vulnerability |
76e0bb86-b4cb-11eb-b9c9-6cc21735f730 |
PostgreSQL -- Memory disclosure in partitioned-table UPDATE ... RETURNING |
76e2fcce-92d2-11ed-a635-080027f5fec9 |
emacs -- arbitary shell command execution vulnerability of ctags |
76e59f55-4f7a-4887-bcb0-11604004163a |
libxml2 -- Multiple Issues |
76ff65f4-17ca-4d3f-864a-a3d6026194fb |
mozilla -- multiple vulnerabilities |
7700061f-34f7-11e9-b95c-b499baebfeaf |
OpenSSL -- Padding oracle vulnerability |
770d7e91-72af-11e7-998a-08606e47f965 |
proftpd -- user chroot escape vulnerability |
770d88cc-f6dc-4385-bdfe-497f8080c3fb |
electron22 -- multiple vulnerabilities |
7721562b-e20a-11e6-b2e2-6805ca0b3d42 |
phpMyAdmin -- Multiple vulnerabilities |
773ce35b-eabb-47e0-98ca-669b2b98107a |
electron{24,25} -- multiple vulnerabilities |
773e7eb2-af19-4fc7-be7f-0f6a2523b98b |
electron31 -- multiple vulnerabilities |
77420ebb-0cf4-11d9-8a8a-000c41e2cdad |
mysql -- heap buffer overflow with prepared statements |
7761288c-d148-11e7-87e5-00e04c1ea73d |
mybb -- multiple vulnerabilities |
7762d7ad-2e38-41d2-9785-c51f653ba8bd |
botan2 -- ECDSA side channel |
7764b219-8148-11e8-aa4d-000e0cd7b374 |
zziplib - multiple vulnerabilities |
77687355-52aa-11ea-b115-643150d3111d |
puppet6 -- Arbitrary Catalog Retrieval |
776aaafc-939f-11ef-87ad-a8a15998b5cb |
tnef -- An attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message |
777d7b9e-ab02-11e3-841e-60a44c524f57 |
wemux -- read-only can be bypassed |
777edbbe-2230-11ec-8869-704d7b472482 |
chromium -- multiple vulnerabilities |
77896891-b08a-11ea-937b-b42e99a1b9c3 |
vlc heap-based buffer overflow |
779a2d55-8ba8-11db-81d5-00123ffe8333 |
evince -- Buffer Overflow Vulnerability |
77a6f1c9-d7d2-11ee-bb12-001b217b3468 |
NodeJS -- Vulnerabilities |
77b784bb-3dc6-11e4-b191-f0def16c5c1b |
nginx -- inject commands into SSL session vulnerability |
77b7ffb7-e937-11e5-8bed-5404a68ad561 |
jpgraph2 -- XSS vulnerability |
77b877aa-ec18-11ea-88f8-901b0ef719ab |
FreeBSD -- SCTP socket use-after-free bug |
77b9f9bc-7fdf-11df-8a8d-0008743bf21a |
opera -- Data URIs can be used to allow cross-site scripting |
77bb0541-c1aa-11e3-a5ac-001b21614864 |
dbus-glib -- privledge escalation |
77c14729-dc5e-11de-92ae-02e0184b8d35 |
libtool -- Library Search Path Privilege Escalation Issue |
77cceaef-e9a4-11da-b9f4-00123ffe8333 |
coppermine -- File Inclusion Vulnerabilities |
77e0b631-e6cf-11e5-85be-14dae9d210b8 |
pidgin-otr -- use after free |
77e2e631-e742-11e3-9a25-5404a6a6412c |
mumble -- multiple vulnerabilities |
77f67b46-bd75-11e8-81b6-001999f8d30b |
asterisk -- Remote crash vulnerability in HTTP websocket upgrade |
77fc311d-7e62-11ee-8290-a8a1599412c6 |
chromium -- security update |
7801b1e1-99b4-42ac-ab22-7646235e7c16 |
aacplusenc -- denial of service |
78348ea2-ec91-11d8-b913-000c41e2cdad |
acroread uudecoder input validation error |
7844789a-9b1f-11ed-9a3f-b42e991fc52e |
net/krill -- DoS vulnerability |
7850a238-680a-11d9-a9e7-0001020eed82 |
cups-lpr -- lppasswd multiple vulnerabilities |
785c86b1-27d6-11e5-a4a5-002590263bf5 |
xen-kernel -- arm: vgic-v2: GICD_SGIR is not properly emulated |
7862213c-5152-11e9-8b26-a4badb296695 |
dovecot -- Buffer overflow reading extension header |
786a7d87-f826-11e6-9436-14dae9d5a9d2 |
fbsdmon -- information disclosure vulnerability |
787d21b9-ca38-11e2-9673-001e8c75030d |
devel/subversion -- fsfs repositories can be corrupted by newline characters in filenames |
787ef75e-44da-11e5-93ad-002590263bf5 |
php5 -- multiple vulnerabilities |
7884d56f-f7a1-11d8-9837-000c41e2cdad |
gnomevfs -- unsafe URI handling |
78992249-947c-11ea-92ab-00163e433440 |
FreeBSD -- Memory disclosure vulnerability in libalias |
78abc022-0fee-11e6-9a1c-0014a5a57822 |
mercurial -- arbitrary code execution vulnerability |
78ad2525-9d0c-11db-a5f6-000c6ec775d9 |
opera -- multiple vulnerabilities |
78b4ebfb-c60b-11e5-bf36-6805ca0b3d42 |
phpmyadmin -- Full path disclosure vulnerability in SQL parser |
78c25ed7-f3f9-11e0-8b5c-b482fe3f522d |
OpenTTD -- Buffer overflows in savegame loading |
78c39232-a345-11e1-9d81-d0df9acfd7e5 |
sympa -- Multiple Security Bypass Vulnerabilities |
78cc8a46-3e56-11e1-89b4-001ec9578670 |
OpenSSL -- multiple vulnerabilities |
78e6c113-91c1-11ef-a904-2cf05da270f3 |
Gitlab -- vulnerabilities |
78f06a6c-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- SCTP ICMPv6 error message vulnerability |
78f2e491-312d-11ee-85f2-bd89b893fcb4 |
go -- multiple vulnerabilities |
78f456fd-9c87-11dd-a55e-00163e000016 |
linux-flashplugin -- multiple vulnerabilities |
78f5606b-f9d1-11dd-b79c-0030843d3802 |
tor -- multiple vulnerabilities |
7913fe6d-2c6e-40ba-a7d7-35696f3db2b6 |
vscode -- Visual Studio Code Information Disclosure Vulnerability |
791841a3-d484-4878-8909-92ef9ce424f4 |
patch -- multiple vulnerabilities |
791a09c5-a086-11ed-954d-b42e991fc52e |
prometheus2 -- basic authentication bypass |
791e8f79-e7d1-11e9-8b31-206a8a720317 |
Xpdf -- Multiple Vulnerabilities |
79217c9b-e1d9-11d9-b875-0001020eed82 |
opera -- XMLHttpRequest security bypass |
7927165a-0126-11e5-9d98-080027ef73ec |
dnsmasq -- remotely exploitable buffer overflow in release candidate |
792bc222-c5d7-11db-9f82-000e0c2e438a |
libarchive -- Infinite loop in corrupt archives handling in libarchive |
7932548e-3427-11e6-8e82-002590263bf5 |
drupal -- multiple vulnerabilities |
793a0072-7822-11e9-81e2-005056a311d1 |
samba -- multiple vulnerabilities |
793fb19c-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Linux compatibility layer incorrect futex handling |
7943794f-707f-4e31-9fea-3bbf1ddcedc1 |
mozilla -- multiple vulnerabilities |
7943e521-f648-11e2-8607-3c970e169bc2 |
bind -- denial of service vulnerability |
79514fcd-feb4-11ed-92b5-b42e991fc52e |
Kanboard -- Clipboard based cross-site scripting (blocked with default CSP) in Kanboard |
795442e7-c355-11e9-8224-5404a68ad561 |
vlc -- multiple vulnerabilities |
795ccee1-c7ed-11e7-ad7d-001e2a3f778d |
konversation -- crash in IRC message parsing |
79630c0c-8dcc-45d0-9908-4087fe1d618c |
squirrelmail -- XSS and remote code injection vulnerabilities |
79789daa-8af8-4e21-a47f-e8a645752bdb |
ruby -- Object taint bypassing in DL and Fiddle in Ruby |
79818ef9-2d10-11e2-9160-00262d5ed8ee |
typo3 -- Multiple vulnerabilities in TYPO3 Core |
798f63e0-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Linux compatibility layer setgroups(2) system call |
79b1f4ee-860a-11ef-b2dc-cbccbf25b7ea |
gitea -- token missing access control for packages |
79b616d0-66d1-11dc-b25f-02e0185f8d72 |
kdm -- passwordless login vulnerability |
79b65dc5-749f-11ec-8be6-d4c9ef517024 |
WordPress -- Multiple Vulnerabilities |
79bbb8f8-f049-11e6-8a6a-bcaec565249c |
gtk-vnc -- bounds checking vulnerabilities |
79bbec7e-8141-11e7-b5af-a4badb2f4699 |
FreeRadius -- Multiple vulnerabilities |
79c1154d-d5a5-11da-8098-00123ffe8333 |
cacti -- ADOdb "server.php" Insecure Test Script Security Issue |
79c68ef7-c8ae-4ade-91b4-4b8221b7c72a |
firefox -- Cross-origin restriction bypass using Fetch |
79dfc135-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- TCP MD5 signature denial of service |
79ea6066-b40e-11ec-8b93-080027b24e86 |
mediawiki -- multiple vulnerabilities |
79f401cd-27e6-11e5-a4a5-002590263bf5 |
xen-tools -- Unmediated PCI command register access in qemu |
79fa9f23-9725-11eb-b530-7085c2fb2c14 |
upnp -- stack overflow vulnerability |
7a09a8df-ca41-11df-aade-0050568f000c |
FreeBSD -- Lost mbuf flag resulting in data corruption |
7a1ab8d4-35c1-11de-9672-0030843d3802 |
drupal -- cross site scripting |
7a1b2624-6a89-11ee-af06-5404a68ad561 |
traefik -- Resource exhaustion by malicious HTTP/2 client |
7a282e49-95b6-11e2-8433-0800273fe665 |
dns/bind9* -- Malicious Regex Can Cause Memory Exhaustion |
7a2e0063-0e4e-11e8-94c0-5453ed2e2b49 |
p7zip-codec-rar -- insufficient error handling |
7a31dfba-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Insecure default snmpd.config permissions |
7a31e0de-5b6d-11e6-b334-002590263bf5 |
bind -- denial of service vulnerability |
7a425536-74f7-4ce4-9768-0079a9d44d11 |
zeek -- potential DoS vulnerabilities |
7a42852d-0347-11ef-9f97-a8a1599412c6 |
chromium -- multiple security fixes |
7a4f2aca-9d40-11da-8c1d-000e0c2e438a |
FreeBSD -- Local kernel memory disclosure |
7a59e283-c60b-11e5-bf36-6805ca0b3d42 |
phpmyadmin -- XSS vulnerability in SQL editor |
7a7129ef-e790-11ee-a1c0-0050569f0b83 |
security/shibboleth-idp -- CAS service SSRF |
7a7891fc-6318-447a-ba45-31d525ec11a0 |
jenkins -- multiple vulnerabilities |
7a7c5853-10a3-11dd-8eb8-00163e000016 |
libxine -- array index vulnerability |
7a8a74d1-9c34-11e4-a40b-5453ed2e2b49 |
kde-runtime -- incorrect CBC encryption handling |
7a8b6170-a889-11ed-bbae-6cc21735f730 |
PostgreSQL server -- Client memory disclosure when connecting, with Kerberos, to modified server. |
7a921e9e-68b1-11d9-9e1e-c296ac722cb3 |
squid -- no sanity check of usernames in squid_ldap_auth |
7a92e958-5207-11e7-8d7c-6805ca0b3d42 |
rt and dependent modules -- multiple security vulnerabilities |
7a9d5dfe-c507-11d8-8898-000d6111a684 |
isc-dhcp3-server buffer overflow in logging mechanism |
7ac28df1-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Linux compatibility layer issetugid(2) system call |
7ade3c38-6d1f-11ef-ae11-b42e991fc52e |
firefox -- Potential memory corruption and exploitable crash |
7ae0be99-d8bb-11e6-9b7f-d43d7e971a1b |
phpmailer -- Remote Code Execution |
7ae61870-9dd2-4884-a2f2-f19bb5784d09 |
mozilla -- multiple vulnerabilities |
7af2fb85-8584-11e0-96b7-00300582f9fc |
ViewVC -- user-reachable override of cvsdb row limit |
7afc5e56-156d-11e8-95f2-005056925db4 |
irssi -- multiple vulnerabilities |
7b0208ff-3f65-4e16-8d4d-48fd9851f085 |
leafnode fetchnews denial-of-service triggered by missing header |
7b1a4a27-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Multiple OpenSSL vulnerabilities |
7b35a77a-0151-11e7-ae1b-002590263bf5 |
ikiwiki -- authentication bypass vulnerability |
7b55f5c2-c58b-11da-9110-00123ffe8333 |
phpmyadmin -- 'set_theme' Cross-Site Scripting |
7b5a8e3b-52cc-11e8-8c7a-9c5c8e75236a |
wget -- cookie injection vulnerability |
7b630362-f468-11ea-a96c-08002728f74c |
Rails -- Potential XSS vulnerability |
7b6a11b5-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Incorrect argument validation in sysarch(2) |
7b81fc47-239f-11d9-814e-0001020eed82 |
apache2 -- SSL remote DoS |
7b929503-911d-11ed-a925-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
7b97b32e-27c4-11ea-9673-4c72b94353b5 |
wordpress -- multiple issues |
7ba5a3d0-4b18-11e9-adcb-001b217b3468 |
Gitlab -- Vulnerability |
7ba65bfd-2a40-11e1-b96e-00215af774f0 |
unbound -- denial of service vulnerabilities from nonstandard redirection and denial of existence |
7bb127c1-a5aa-11db-9ddc-0011098b2f36 |
joomla -- multiple remote vulnerabilities |
7bba5b3b-1b7f-11ec-b335-d4c9ef517024 |
mod_auth_mellon -- Redirect URL validation bypass |
7bbc0e8c-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Buffer overflow in keyboard driver |
7bbc3016-de63-11e5-8fa8-14dae9d210b8 |
tomcat -- multiple vulnerabilities |
7be92050-a450-11e2-9898-001060e06fd4 |
libxml -- Integer overflow |
7bfd797c-716d-11e4-b008-001999f8d30b |
asterisk -- Multiple vulnerabilities |
7c0bac69-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Incorrect argument handling in sendmsg(2) |
7c0d71a9-9d48-11eb-97a0-e09467587c17 |
chromium -- multiple vulnerabilities |
7c0fecd6-f42f-11e1-b17b-000c2977ec30 |
mediawiki -- multiple vulnerabilities |
7c188c55-0cb0-11d9-8a8a-000c41e2cdad |
mozilla -- NULL bytes in FTP URLs |
7c217849-f7d7-11ee-a490-84a93843eb75 |
OpenSSL -- Unbounded memory growth with session handling in TLSv1.3 |
7c27192f-0bc3-11e7-9940-b499baebfeaf |
mysql -- denial of service vulnerability |
7c3a02b9-3273-4426-a0ba-f90fad2ff72e |
mozilla -- multiple vulnerabilities |
7c492ea2-3566-11e0-8e81-0022190034c0 |
plone -- Remote Security Bypass |
7c555ce3-658d-4589-83dd-4b6a31c5d610 |
RabbitMQ-C -- integer overflow leads to heap corruption |
7c5bd5b8-d652-11dd-a765-0030843d3802 |
mplayer -- twinvq processing buffer overflow vulnerability |
7c5d64dd-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Kernel stack disclosure in Linux compatibility layer |
7c63775e-be31-11e5-b5fe-002590263bf5 |
libarchive -- multiple vulnerabilities |
7c750960-b129-11e8-9fcd-080027f43a02 |
Information disclosure - Gitea leaks email addresses |
7c75d48c-429b-11db-afae-000c6ec775d9 |
linux-flashplugin7 -- arbitrary code execution vulnerabilities |
7c769c89-53c2-11e1-8e52-00163e22ef61 |
glpi -- remote attack via crafted POST request |
7c920bb7-4b5f-11e1-9f47-00e0815b8da8 |
sudo -- format string vulnerability |
7ca2a709-103b-11dc-8e82-00001cd613f9 |
findutils -- GNU locate heap buffer overrun |
7cad4795-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Kernel stack disclosure in 4.3BSD compatibility layer |
7caebe30-d7f1-11e6-a9a5-b499baebfeaf |
openssl -- timing attack vulnerability |
7cb12ee0-4a13-11ed-8ad9-3065ec8fd3ec |
chromium -- mulitple vulnerabilities |
7cc003cb-83b9-11ee-957d-b42e991fc52e |
typo3 -- Multiple vulnerabilities |
7ccd4def-c1be-11e3-9d09-000c2980a9f3 |
OpenSSL -- Local Information Disclosure |
7cf058d8-158d-11e7-ba2c-e8e0b747a45a |
chromium -- multiple vulnerabilities |
7cfcea05-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Multiple ntp vulnerabilities |
7d08e608-5e95-11e6-b334-002590263bf5 |
BIND,Knot,NSD,PowerDNS -- denial over service via oversized zone transfers |
7d09b9ee-e0ba-11e5-abc4-6fb07af136d2 |
exim -- local privillege escalation |
7d138476-7710-11e7-88a1-e8e0b747a45a |
chromium -- multiple vulnerabilities |
7d2336c2-4607-11e1-9f47-00e0815b8da8 |
spamdyke -- Buffer Overflow Vulnerabilities |
7d239578-7ff2-11dd-8de5-0030843d3802 |
horde -- multiple vulnerabilities |
7d2aac52-9c6b-11d9-99a7-000a95bc6fae |
mozilla -- heap buffer overflow in GIF image processing |
7d3d94d3-2810-11ec-9c51-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
7d40edd1-901e-11e6-a590-14dae9d210b8 |
VirtualBox -- undisclosed vulnerabilities |
7d4f4955-600a-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Heap vulnerability in bspatch |
7d52081f-2795-11da-bc01-000e0c2e438a |
squirrelmail -- _$POST variable handling allows for various attacks |
7d53d8da-d07a-11e9-8f1a-001999f8d30b |
asterisk -- Remote Crash Vulnerability in audio transcoding |
7d631146-5769-11ef-b618-1c697a616631 |
AMD CPUs -- Guest Memory Vulnerabilities |
7d64d00c-43e3-11e6-ab34-002590263bf5 |
quassel -- remote denial of service |
7d6be8d4-f812-11ed-a7ff-589cfc0f81b0 |
phpmyfaq -- multiple vulnerabilities |
7d7221ee-d334-11ea-bc50-080027846a02 |
Python -- multiple vulnerabilities |
7d7e05fb-64da-435a-84fb-4061493b89b9 |
kanboard -- multiple privilege escalation vulnerabilities |
7da0417f-6b24-11e8-84cc-002590acae31 |
gnupg -- unsanitized output (CVE-2018-12020) |
7da1da96-24bb-11e6-bd31-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
7dbb7197-7b68-11dd-80ba-000bcdf0a03b |
FreeBSD -- nmount(2) local arbitrary code execution |
7dfed67b-20aa-11e3-b8d8-0025905a4771 |
mozilla -- multiple vulnerabilities |
7e01df39-db7e-11e5-b937-00e0814cab4e |
jenkins -- multiple vulnerabilities |
7e079ce2-6b51-11ef-9a62-002590c1f29c |
FreeBSD -- umtx Kernel panic or Use-After-Free |
7e1a508f-7167-47b0-b9fc-95f541933a86 |
electron26 -- multiple vulnerabilities |
7e36c369-10c0-11e6-94fa-002590263bf5 |
wireshark -- multiple vulnerabilities |
7e3d3e9a-7d8f-11e7-a02b-d43d7ef03aa6 |
Flash Player -- multiple vulnerabilities |
7e4e5c53-a56c-11e0-b180-00216aa06fc2 |
phpmyadmin -- multiple vulnerabilities |
7e53f9cc-656d-11e9-8e67-206a8a720317 |
FreeBSD -- SAE side-channel attacks |
7e580822-8cd8-11d9-8c81-000a95bc6fae |
postnuke -- cross-site scripting (XSS) vulnerabilities |
7e61a839-b714-11e3-8195-001966155bea |
file -- out-of-bounds access in search rules with offsets from input file |
7e61cf44-6549-11e6-8286-00248c0c745d |
Rails 4 -- Unsafe Query Generation Risk in Active Record |
7e69f00d-632a-11e0-9f3a-001d092480a4 |
isc-dhcp-client -- dhclient does not strip or escape shell meta-characters |
7e6e932f-617b-11ef-8a7d-b42e991fc52e |
firefox -- Multiple vulnerabilities |
7e97b288-c7ca-11d9-9e1e-c296ac722cb3 |
squid -- DNS lookup spoofing vulnerability |
7e9cc7fd-6b3e-46c5-ad6d-409d90d41bbf |
RabbitMQ-C -- auth credentials visible in commandline tool options |
7ed5779c-e4c7-11eb-91d7-08002728f74c |
Ruby -- multiple vulnerabilities |
7ed7c36f-ddaf-11e5-b2bd-002590263bf5 |
xen-kernel -- PV superpage functionality missing sanity checks |
7edac52a-66cd-11e0-9398-5d45f3aa24f0 |
krb5 -- MITKRB5-SA-2011-003, KDC vulnerable to double-free when PKINIT enabled |
7f0fbb30-e462-11e5-a3f3-080027ef73ec |
PuTTY - old-style scp downloads may allow remote code execution |
7f13607b-6948-11d9-8937-00065be4b5b6 |
newspost -- server response buffer overflow vulnerability |
7f163c81-3b12-11eb-af2a-080027dbe4b7 |
glpi -- SQL injection for all usages of "Clone" feature |
7f242313-aea5-11eb-8151-67f74cf7c704 |
go -- net/http: ReadRequest can stack overflow due to recursion with very large headers |
7f3fdef7-51d2-11da-8e93-0010dc4afb40 |
p5-Mail-SpamAssassin -- long message header denial of service |
7f448dc1-82ca-11e1-b393-20cf30e32f6d |
bugzilla Cross-Site Request Forgery |
7f5ccb1d-439b-11e1-bc16-0023ae8e59f0 |
tomcat -- Denial of Service |
7f6108d2-cea8-11e0-9d58-0800279895ea |
apache -- Range header DoS vulnerability |
7f6146aa-2157-11e9-9ba0-4c72b94353b5 |
gitea -- multiple vulnerabilities |
7f645ee5-7681-11e5-8519-005056ac623e |
Git -- Execute arbitrary code |
7f6dd1bd-7d99-11d9-a9e7-0001020eed82 |
ngircd -- buffer overflow vulnerability |
7f7d6412-bae5-11e9-be92-3085a9a95629 |
doas -- Prevent passing of environment variables |
7f829d44-7509-11ea-b47c-589cfc0f81b0 |
HAproxy -- serious vulnerability affecting the HPACK decoder used for HTTP/2 |
7f8cecea-f199-11da-8422-00123ffe8333 |
MySQL -- SQL-injection security vulnerability |
7f8d5435-125a-11ed-9a69-10c37b4ac2ea |
go -- decoding big.Float and big.Rat can panic |
7f9b696f-f11b-11e6-b50e-5404a68ad561 |
ffmpeg -- heap overflow in lavf/mov.c |
7fadc049-2ba0-11dc-9377-0016179b2dd5 |
wireshark -- Multiple problems |
7fb9e739-0e6d-11e1-87cd-00235a5f2c9a |
kdeutils4 -- Directory traversal vulnerability |
7fbfe159-3438-11d9-a9e7-0001020eed82 |
squirrelmail -- cross site scripting vulnerability |
7fc3e827-64a5-11e8-aedb-00224d821998 |
strongswan -- Fix Denial-of-Service Vulnerability strongSwan (CVE-2018-10811, CVE-2018-5388) |
7fcf1727-be71-11db-b2ec-000c6ec775d9 |
php -- multiple vulnerabilities |
7fda7920-7603-11e6-b362-001999f8d30b |
asterisk -- Crash on ACK from unknown endpoint |
7fe5b84a-78eb-11e2-8441-00e0814cab4e |
jenkins -- multiple vulnerabilities |
7fe7df75-6568-11e6-a590-14dae9d210b8 |
End of Life Ports |
7fff2b16-b0ee-11e6-86b8-589cfc054129 |
wireshark -- multiple vulnerabilities |
800e8bd5-3acb-11dd-8842-001302a18722 |
xorg -- multiple vulnerabilities |
8012a79d-5d21-11db-bb8d-00123ffe8333 |
clamav -- CHM unpacker and PE rebuilding vulnerabilities |
8015600f-2c80-11e0-9cc1-00163e5bf4f9 |
maradns -- denial of service when resolving a long DNS hostname |
802961eb-7a89-11ef-bdd7-a0423f48a938 |
frr - BGP |
803879e9-4195-11e7-9b08-080027ef73ec |
OpenEXR -- multiple remote code execution and denial of service vulnerabilities |
805603a1-3e7a-11df-a5a1-0050568452ac |
dojo -- cross-site scripting and other vulnerabilities |
8057d198-4d26-11ef-8e64-641c67a117d8 |
znc -- remote code execution vulnerability |
8065d37b-8e7c-4707-a608-1b0a2b8509c3 |
mozilla -- multiple vulnerabilities |
80771b89-f57b-11e2-bf21-b499baab0cbe |
gnupg -- side channel attack on RSA secret keys |
80815c47-e84f-11ee-8e76-a8a1599412c6 |
chromium -- multiple security fixes |
8091fcea-f35e-11d8-81b0-000347a4fa7d |
a2ps -- insecure command line argument handling |
8092b820-1d6f-11dc-a0b2-001921ab2fa4 |
p5-Mail-SpamAssassin -- local user symlink-attack DoS vulnerability |
80a897a2-c1a6-11e6-ae1b-002590263bf5 |
xen-kernel -- x86 CMPXCHG8B emulation fails to ignore operand size override |
80aa98e0-97b4-11de-b946-0030843d3802 |
dnsmasq -- TFTP server remote code injection vulnerability |
80ad6d6c-b398-457f-b88f-bf6be0bbad44 |
electron27 -- multiple vulnerabilities |
80adc394-ddaf-11e5-b2bd-002590263bf5 |
xen-kernel -- VMX: intercept issue with INVLPG on non-canonical address |
80af2677-d6c0-11e2-8f5e-001966155bea |
tor -- guard discovery |
80b6d6cc-c970-11df-bb18-0015587e2cc1 |
openx -- remote code execution vulnerability |
80c66af0-d1c5-449e-bd31-63b12525ff88 |
ffmpeg -- out-of-bounds array access |
80e057e7-2f0a-11ed-978f-fcaa147e860e |
Python -- multiple vulnerabilities |
80e846ff-27eb-11e5-a4a5-002590263bf5 |
xen-kernel -- GNTTABOP_swap_grant_ref operation misbehavior |
80f13884-4d4c-11de-8811-0030843d3802 |
slim -- local disclosure of X authority magic cookie |
80f9dbd3-8eec-11eb-b9e8-3525f51429a0 |
nettle 3.7.2 -- fix serious ECDSA signature verify bug |
80fbe184-2358-11ef-996e-40b034455553 |
minio -- unintentional information disclosure |
810a5197-e0d9-11dc-891a-02061b08fc24 |
mozilla -- multiple vulnerabilities |
810df820-3664-11e1-8fe3-00215c6a37bb |
WordPress -- cross site scripting vulnerability |
81313647-2d03-11d8-9355-0020ed76ef5a |
ElGamal sign+encrypt keys created by GnuPG can be compromised |
81326883-2905-11e5-a4a5-002590263bf5 |
devel/ipython -- CSRF possible remote execution vulnerability |
81433129-2916-11e7-ad3e-00e04c1ea73d |
weechat -- multiple vulnerabilities |
814af1be-ec63-11ee-8e76-a8a1599412c6 |
chromium -- multiple security fixes |
815bf172-ab9e-4c4b-9662-d18b0054330d |
electron{31,32} -- multiple vulnerabilities |
815dbcf9-a2d6-11e3-8088-002590860428 |
file -- denial of service |
816fdd8b-3d14-11d9-8818-008088034841 |
Cyrus IMAPd -- IMAPMAGICPLUS preauthentification overflow |
81826d12-317a-11e2-9186-406186f3d89d |
weechat -- Arbitrary shell command execution via scripts |
818b2bcb-a46f-11e9-bed9-001999f8d30b |
asterisk -- Remote crash vulnerability with MESSAGE messages |
81946ace-6961-4488-a164-22d58ebc8d66 |
rails-html-sanitizer -- possible XSS vulnerability |
81b4c118-c586-11e4-8495-6805ca0b3d42 |
phpMyAdmin -- Risk of BREACH attack due to reflected parameter |
81d9dc0c-1988-11df-8e66-0019996bc1f7 |
squid -- Denial of Service vulnerability in HTCP |
81da673e-dfe1-11e2-9389-08002798f6ff |
apache-xml-security-c -- heap overflow during XPointer evaluation |
81e2b308-4a6c-11e4-b711-6805ca0b3d42 |
rt42 -- vulnerabilities related to shellshock |
81f127a8-0038-11da-86bc-000e0c2e438a |
vim -- vulnerabilities in modeline handling: glob, expand |
81f1fdc2-7ec7-11e3-a6c6-00163e1ed244 |
virtualbox-ose -- local vulnerability |
81f866ad-41a4-11e3-a4af-0025905a4771 |
mozilla -- multiple vulnerabilities |
81f9d6a4-ddaf-11e5-b2bd-002590263bf5 |
xen-kernel -- VMX: guest user mode may crash guest with non-canonical RIP |
81fc1076-1286-11e4-bebd-000c2980a9f3 |
tomcat -- multiple vulnerabilities |
81fc7705-b002-11e6-b20a-14dae9d5a9d2 |
teeworlds -- Remote code execution |
81fcc2f9-e15a-11e9-abbf-800dd28b22bd |
mantis -- multiple vulnerabilities |
821afaa2-9e9a-11dc-a7e3-0016360406fa |
liveMedia -- DoS vulnerability |
8247af0d-183b-11ef-9f97-a8a1599412c6 |
chromium -- multiple security fixes |
82595123-e8b8-11e4-a008-047d7b492d07 |
libtasn1 -- stack-based buffer overflow in asn1_der_decoding |
82752070-0349-11e7-b48d-00e04c1ea73d |
wordpress -- multiple vulnerabilities |
827b95ff-290e-11ed-a2e7-6c3be5272acd |
Grafana -- Unauthorized file disclosure |
827bc2b7-95ed-11df-9160-00e0815b8da8 |
git -- buffer overflow vulnerability |
82830965-3073-11ef-a17d-5404a68ad561 |
traefik -- Azure Identity Libraries Elevation of Privilege Vulnerability |
82894193-ffd4-11e7-8b91-e8e0b747a45a |
chromium -- out of bounds read |
82a41084-6ce7-11da-b90c-000e0c2e438a |
mantis -- "t_core_path" file inclusion vulnerability |
82b3ca2a-8c07-11e5-bd18-002590263bf5 |
moodle -- multiple vulnerabilities |
82b55df8-4d5a-11de-8811-0030843d3802 |
openssl -- denial of service in DTLS implementation |
82b702e0-1907-11e6-857b-00221503d280 |
imagemagick -- buffer overflow |
82c07dfa-9016-11e9-af2f-712c38aa3e4c |
GraphicsMagick -- multiple vulnerabilities |
82cfd919-8213-11e2-9273-902b343deec9 |
sudo -- Potential bypass of tty_tickets constraints |
8301c04d-71df-11e5-9fcb-00262d5ed8ee |
chromium -- multiple vulnerabilities |
83041ca7-d690-11e6-9171-14dae9d210b8 |
libdwarf -- multiple vulnerabilities |
8305e215-1080-11e5-8ba2-000c2980a9f3 |
openssl -- multiple vulnerabilities |
830855f3-ffcc-11ec-9d41-d05099c8b5a7 |
mat2 -- directory traversal/arbitrary file read during ZIP file processing |
83117378-f773-4617-bf74-477d569dcd74 |
chromium -- multiple security fixes |
83119e27-5d7c-11d8-80e3-0020ed76ef5a |
nap allows arbitrary file access |
831a6a66-79fa-11d9-a9e7-0001020eed82 |
ethereal -- multiple protocol dissectors vulnerabilities |
832e9d75-5bfc-11d9-a9e7-0001020eed82 |
kdelibs3 -- konqueror FTP command injection vulnerability |
832fd11b-3b11-11eb-af2a-080027dbe4b7 |
glpi -- Remote Code Execution (RCE) via the backup functionality |
83350009-881e-11e5-ab94-002590263bf5 |
xen-kernel -- Long latency populate-on-demand operation is not preemptible |
8337251b-b07b-11ee-b0d7-84a93843eb75 |
OpenSSL -- Vector register corruption on PowerPC |
8338a20f-9573-11d8-9366-0020ed76ef5a |
xchat remotely exploitable buffer overflow (Socks5) |
833b469b-5247-11ee-9667-080027f5fec9 |
curl -- HTTP headers eat all memory |
83421018-b3ef-11da-a32d-000c6ec775d9 |
linux-flashplugin -- arbitrary code execution vulnerability |
834591a9-c82f-11e0-897d-6c626dd55a41 |
mozilla -- multiple vulnerabilities |
83466f76-aefe-11ec-b4b6-d05099c0c059 |
gitea -- Open Redirect on login |
835256b8-46ed-11d9-8ce0-00065be4b5b6 |
mysql -- mysql_real_connect buffer overflow vulnerability |
83574d5a-f828-11dd-9fdf-0050568452ac |
codeigniter -- arbitrary script execution in the new Form Validation class |
83725c91-7c7e-11de-9672-00e0815b8da8 |
BIND -- Dynamic update message remote DoS |
8375a73f-01bf-11da-bc08-0001020eed82 |
gnupg -- OpenPGP symmetric encryption vulnerability |
837b9fb2-0595-11da-86bc-000e0c2e438a |
zlib -- buffer overflow vulnerability |
838fa84a-0e25-11e5-90e4-d050996490d0 |
redis -- EVAL Lua Sandbox Escape |
83a28417-27e3-11e5-a4a5-002590263bf5 |
xen-kernel -- Hypervisor memory corruption due to x86 emulator flaw |
83a418cc-2182-11e4-802c-20cf30e32f6d |
subversion -- several vulnerabilities |
83a548b5-4fa5-11e8-9a8e-001e2a3f778d |
KWallet-PAM -- Access to privileged files |
83a7a720-07d8-11e5-9a28-001e67150279 |
rest-client -- session fixation vulnerability |
83b29e3f-886f-439f-b9a8-72e014479ff9 |
py-dparse -- REDoS vulnerability |
83b38a2c-413e-11e5-bfcf-6805ca0b3d42 |
RT -- two XSS vulnerabilities |
83d7d149-b965-11de-a515-0022156e8794 |
Enhanced cTorrent -- stack-based overflow |
83eb9374-7b97-11ed-be8f-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
83f9e943-e664-11e1-a66d-080027ef73ec |
fetchmail -- two vulnerabilities in NTLM authentication |
84065569-7fb4-11e2-9c5a-000d601460a4 |
otrs -- XSS vulnerability could lead to remote code execution |
84147b46-e876-486d-b746-339ee45a8bb9 |
flash -- remote code execution |
84203724-296b-11e4-bebd-000c2980a9f3 |
file -- buffer overruns and missing buffer size tests |
84237895-8f39-11d8-8b29-0020ed76ef5a |
neon format string vulnerabilities |
8429711b-76ca-474e-94a0-6b980f1e2d47 |
mozilla -- Speculative execution side-channel attack |
842bafdd-be2f-11dd-a578-0030843d3802 |
openoffice -- arbitrary code execution vulnerabilities |
842cd117-ba54-11e5-9728-002590263bf5 |
prosody -- multiple vulnerabilities |
843a4641-9816-11e2-9c51-080027019be0 |
libxml2 -- cpu consumption Dos |
8441957c-f9b4-11e0-a78a-bcaec565249c |
Xorg server -- two vulnerabilities in X server lock handling code |
84479a62-ca5f-11d9-b772-000c29b00e99 |
fswiki -- XSS problem in file upload form |
844cf3f5-9259-4b3e-ac9e-13ca17333ed7 |
ruby -- DoS vulnerability in REXML |
845f8430-d0ee-4134-ae35-480a3e139b8a |
py39-joblib -- arbitrary code execution |
84630f4a-cd8c-11da-b7b9-000c6ec775d9 |
mozilla -- multiple vulnerabilities |
8469d41c-a960-11e4-b18e-bcaec55be5e5 |
rabbitmq -- Security issues in management plugin |
8471bb85-6fb0-11d8-873f-0020ed76ef5a |
GNU Anubis buffer overflows and format string vulnerabilities |
847ade05-6717-11d8-b321-000a95bc6fae |
libxml2 stack buffer overflow in URI parsing |
847f16e5-9406-11ed-a925-3065ec8fd3ec |
security/tor -- SOCKS4(a) inversion bug |
848539dc-0458-11df-8dd7-002170daae37 |
dokuwiki -- multiple vulnerabilities |
848bdd06-f93a-11eb-9f7d-206a8a720317 |
x11/cde -- Local privilege escalation via CDE dtsession |
84ab03b6-6c20-11ed-b519-080027f5fec9 |
rubygem-cgi -- HTTP response splitting vulnerability |
84ab58cf-e4ac-11d8-9b0a-000347a4fa7d |
gnutls -- certificate chain verification DoS |
84c7ea88-bf04-4bdc-973b-36744bf540ab |
flash -- multiple vulnerabilities |
84ca56be-e1de-11e8-bcfd-00e04c1ea73d |
NGINX -- Multiple vulnerabilities |
84ce26c3-5769-11e9-abd6-001b217b3468 |
clamav -- multiple vulnerabilities |
84d3fbb2-e607-11db-8a32-000c76189c4c |
mcweject -- exploitable buffer overflow |
84dc49b0-b267-11e5-8a5b-00262d5ed8ee |
mini_httpd -- buffer overflow via snprintf |
84fdd1bb-9d37-11e5-8f5c-002590263bf5 |
passenger -- client controlled header overwriting |
8505e013-c2b3-11e4-875d-000c6e25e3e9 |
chromium -- multiple vulnerabilities |
85069fb6-e15b-11d9-83cf-0010dc5df42d |
razor-agents -- denial of service vulnerability |
8514b6e7-6f0f-11dd-b3db-001c2514716c |
joomla -- flaw in the reset token validation |
851a0eea-88aa-11e5-90e7-b499baebfeaf |
MySQL - Multiple vulnerabilities |
851ce3e4-8b03-11ef-84e9-901b0e9408dc |
element-web -- Potential exposure of access token via authenticated media |
85349584-3ba4-11eb-919d-08002728f74c |
jasper -- heap overflow vulnerability |
854c2afb-4424-11ed-af97-adcabf310f9b |
go -- multiple vulnerabilities |
855cd9fa-c452-11da-8bff-000ae42e9b93 |
pubcookie-login-server -- cross site scripting vulnerability |
856a6f84-8b30-11de-8062-00e0815b8da8 |
GnuTLS -- improper SSL certificate verification |
856b88bf-7984-11e6-81e7-d050996490d0 |
mysql -- Remote Root Code Execution |
8579074c-839f-11ec-a3b2-005056a311d1 |
samba -- Multiple Vulnerabilities |
857be71a-a4b0-11ec-95fc-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
8581189c-bd5f-11de-8709-0017a4cccfc6 |
Xpdf -- Multiple Vulnerabilities |
85851e4f-67d9-11e7-bc37-00505689d4ae |
samba -- Orpheus Lyre mutual authentication validation bypass |
85b0bbc8-a7a5-11dd-8283-001c2514716c |
phpmyadmin -- Cross-Site Scripting Vulnerability |
85d76f02-5380-11d9-a9e7-0001020eed82 |
mplayer -- multiple vulnerabilities |
85d976be-93e3-11ec-aaad-14dae9d5a9d2 |
The Update Framwork -- path traversal vulnerability |
85e19dff-e606-11d8-9b0a-000347a4fa7d |
ripMIME -- decoding bug allowing content filter bypass |
85e2c7eb-b74b-11e7-8546-5cf3fcfdd1f1 |
irssi -- multiple vulnerabilities |
85eb4e46-cf16-11e5-840f-485d605f4717 |
php -- multiple vulnerabilities |
85ebfa0c-5d8d-11e7-93f7-d43d7e971a1b |
GitLab -- Various security issues |
85edfb6a-43a5-11d9-a9e7-0001020eed82 |
sudoscript -- signal delivery vulnerability |
85f33a8d-492f-11e2-aa75-003067c2616f |
opera -- execution of arbitrary code |
85fca718-99f6-11ea-bf1d-08002728f74c |
Rails -- multiple vulnerabilities |
8604121c-7fc2-11ea-bcac-7781e90b0c8f |
openvpn -- illegal client float can break VPN session for other users |
86224a04-26de-11ea-97f2-001a8c5c04b6 |
cacti -- multiple vulnerabilities |
86291013-16e6-11e8-ae9f-d43d7e971a1b |
GitLab -- multiple vulnerabilities |
862d6ab3-c75e-11e6-9f98-20cf30e32f6d |
Apache httpd -- several vulnerabilities |
863f95d3-3df1-11dc-b3d3-0016179b2dd5 |
mutt -- buffer overflow vulnerability |
864e6f75-2372-11e5-86ff-14dae9d210b8 |
node, iojs, and v8 -- denial of service |
86526ba4-53c8-11db-8f1a-000a48049292 |
phpbb -- NULL byte injection vulnerability |
8656cf5f-4170-11e6-8dfe-002590263bf5 |
moodle -- multiple vulnerabilities |
8657eedd-b423-11ec-9559-001b217b3468 |
Gitlab -- multiple vulnerabilities |
865863af-fb5e-11e4-8fda-002590263bf5 |
py-salt -- potential shell injection vulnerabilities |
8665ebb9-2237-11da-978e-0001020eed82 |
firefox & mozilla -- buffer overflow vulnerability |
8675efd5-e22c-11e1-a808-002354ed89bc |
sudosh -- buffer overflow |
8685d412-8468-11df-8d45-001d7d9eb79a |
kvirc -- multiple vulnerabilities |
8688d5cd-328c-11da-a263-0001020eed82 |
cfengine -- arbitrary file overwriting vulnerability |
86a4d810-1884-11dd-a914-0016179b2dd5 |
mt-daapd -- integer overflow |
86a98b57-fb8e-11d8-9343-000a95bc6fae |
krb5 -- double-free vulnerabilities |
86ada694-8b30-11de-b9d0-000c6e274733 |
memcached -- memcached stats maps Information Disclosure Weakness |
86b8b655-4d1a-11df-83fb-0015587e2cc1 |
krb5 -- KDC double free vulnerability |
86baa0d4-c997-11e0-8a8e-00151735203a |
OTRS -- Vulnerabilities in OTRS-Core allows read access to any file on local file system |
86c05550-12c1-11dd-bab7-0016179b2dd5 |
mksh -- TTY attachment privilege escalation |
86c330fe-bbae-4ca7-85f7-5321e627a4eb |
gitea -- multiple issues |
86c3c66e-b2f5-11e5-863a-b499baebfeaf |
unzip -- multiple vulnerabilities |
86c89abf-2d91-11e9-bf3e-a4badb2f4699 |
FreeBSD -- File description reference count leak |
86cc5c6f-d2b4-11da-a672-000e0c2e438a |
crossfire-server -- denial of service and remote code execution vulnerability |
8706e097-6db7-11ee-8744-080027f5fec9 |
redis -- Possible bypassing Unix socket permissions |
870d59b0-c6c4-11ea-8015-e09467587c17 |
chromium -- multiple vulnerabilities |
87106b67-be13-11dd-a578-0030843d3802 |
cups -- potential buffer overflow in PNG reading code |
8719b935-8bae-41ad-92ba-3c826f651219 |
python 2.7 -- multiple vulnerabilities |
871d93f9-06aa-11ed-8d5f-080027f5fec9 |
redis -- Potential remote code execution vulnerability |
87261557-a450-11e2-9898-001060e06fd4 |
FreeBSD -- Network ACL mishandling in mountd(8) |
872623af-39ec-11dc-b8cc-000fea449b8a |
tomcat -- multiple vulnerabilities |
87270ba5-03d3-11ea-b81f-3085a9a95629 |
urllib3 -- multiple vulnerabilities |
8727b513-855b-11ef-9e50-6805ca2fa271 |
powerdns-recursor -- denial of service |
872ae5be-29c0-11de-bdeb-0030843d3802 |
ziproxy -- multiple vulnerability |
873a6542-5b8d-11da-b96e-000fb586ba73 |
horde -- Cross site scripting vulnerabilities in MIME viewers |
8745c67e-7dd1-4165-96e2-fcf9da2dc5b5 |
gsoap -- remote code execution via via overflow |
875e4cf8-3f0e-11e6-b3c8-14dae9d210b8 |
dnsmasq -- denial of service |
876768aa-ab1e-11e5-8a30-5453ed2e2b49 |
dpkg -- stack-based buffer overflow |
87679fcb-be60-11e9-9051-4c72b94353b5 |
NGINX -- Multiple vulnerabilities |
877e918e-5362-11d9-96d4-00065be4b5b6 |
mpg123 -- playlist processing buffer overflow vulnerability |
87917d6f-ba76-11de-bac2-001a4d563a0f |
django -- denial-of-service attack |
879b0242-c5b6-11e0-abd1-0017f22d6707 |
dtc -- multiple vulnerabilities |
87a07de1-e55e-4d51-bb64-8d117829a26a |
mail/dovecot -- multiple vulnerabilities |
87cc48fd-5fdd-11d8-80e3-0020ed76ef5a |
mnGoSearch buffer overflow in UdmDocToTextBuf() |
880552c4-f63f-11eb-9d56-7186043316e9 |
go -- net/http: panic due to racy read of persistConn after handler panic |
880bca8f-e201-11e9-8af7-08002720423d |
mongodb -- Attach IDs to users |
8816bf3a-7929-11df-bcce-0018f3e2eb82 |
tiff -- Multiple integer overflows |
88188a8c-eff6-11d9-8310-0001020eed82 |
phppgadmin -- "formLanguage" local file inclusion vulnerability |
88260dfe-3d21-11dc-b3d3-0016179b2dd5 |
phpsysinfo -- url Cross-Site Scripting |
8827134c-1a8f-11eb-9bb0-08002725d892 |
tmux -- stack overflow in CSI parsing |
882a38f9-17dd-11ec-b335-d4c9ef517024 |
Apache httpd -- multiple vulnerabilities |
882ef43b-901f-11d9-a22c-0001020eed82 |
phpmyadmin -- arbitrary file include and XSS vulnerabilities |
8838abf0-bc47-11ec-b516-0897988a1c07 |
Asterisk -- multiple vulnerabilities |
884fced7-7f1c-11dd-a66a-0019666436c2 |
wordpress -- remote privilege escalation |
88754d55-521a-11ee-8290-a8a1599412c6 |
chromium -- multiple vulnerabilities |
88760f4d-8ef7-11ea-a66d-4b2ef158be83 |
mailman -- arbitrary content injection vulnerability via options or private archive login pages |
887eb570-27d3-11ee-adba-c80aa9043978 |
OpenSSH -- remote code execution via a forwarded agent socket |
888a0262-f0d9-11e3-ba0c-b4b52fce4ce8 |
mozilla -- multiple vulnerabilities |
889061af-c427-11d9-ac59-02061b08fc24 |
gaim -- remote crash on some protocols |
8899298f-5a92-11eb-8558-3085a9a47796 |
cloud-init -- Wrong access permissions of authorized keys |
889e35f4-f6a0-11e8-82dc-fcaa147e860e |
moodle -- Login CSRF vulnerability |
88a77ad8-77b1-11e7-b5af-a4badb2f4699 |
Varnish -- Denial of service vulnerability |
88d00176-058e-11ea-bd1c-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
88dfd92f-3b9c-11eb-929d-d4c9ef517024 |
LibreSSL -- NULL pointer dereference |
88f75070-abcf-11e5-83d3-6805ca0b3d42 |
phpMyAdmin -- path disclosure vulnerability |
88ff90f2-6e43-11d9-8c87-000a95bc6fae |
mod_dosevasive -- insecure temporary file creation |
890b6b22-70fa-11e4-91ae-5453ed2e2b49 |
kwebkitpart, kde-runtime -- insufficient input validation |
894f2491-6834-11ee-b06f-0050569ceb3a |
glpi-project -- SQL injection in ITIL actors in GLPI |
8950ac62-1d30-11dd-9388-0211060005df |
qemu -- "drive_init()" Disk Format Security Bypass |
89709e58-d497-11e3-a3d5-5453ed2e2b49 |
qt4-xml -- XML Entity Expansion Denial of Service |
897e1962-5d5a-11ec-a3ed-040e3c3cf7e7 |
Privoxy -- Multiple vulnerabilities (memory leak, XSS) |
89ca6f7d-4f00-11e8-9b1d-00e04c1ea73d |
drupal -- Drupal Core - Multiple Vulnerabilities |
89cf8cd2-0698-11e7-aa3f-001b216d295b |
Several Security Defects in the Bouncy Castle Crypto APIs |
89d4ed09-c3d7-11e5-b5fe-002590263bf5 |
privoxy -- multiple vulnerabilities |
89d5bca6-0150-11ec-bf0c-080027eedc6a |
The Bouncy Castle Crypto APIs -- EC math vulnerability |
89db3b31-a4c3-11e3-978f-f0def16c5c1b |
nginx -- SPDY memory corruption |
89fdbd85-ebd2-11ed-9c88-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
89ff45e3-1a57-11e4-bebd-000c2980a9f3 |
samba -- remote code execution |
8a0cd618-22a0-11ed-b1e7-001b217b3468 |
Gitlab -- Remote Code Execution |
8a1d0e63-1e07-11e5-b43d-002590263bf5 |
pcre -- Heap Overflow Vulnerability in find_fixedlength() |
8a34d9e6-c662-11df-b2e1-001b2134ef46 |
linux-flashplugin -- remote code execution |
8a3ece40-3315-11da-a263-0001020eed82 |
picasm -- buffer overflow vulnerability |
8a4aba2d-f33e-11e8-9416-001b217b3468 |
Gitlab -- Multiple vulnerabilities |
8a560bcf-b14b-11e5-9728-002590263bf5 |
qemu -- denial of service vulnerability in VNC |
8a5770b4-54b5-11db-a5ae-00508d6a62df |
mambo -- multiple SQL injection vulnerabilities |
8a835235-ae84-11dc-a5f9-001a4d49522b |
wireshark -- multiple vulnerabilities |
8a90dc87-89f9-11e5-a408-00248c0c745d |
PHPmailer -- SMTP injection vulnerability |
8a9f86de-d080-11e9-9051-4c72b94353b5 |
wordpress -- multiple issues |
8aa6340d-e7c6-41e0-b2a3-3c9e9930312a |
py39-redis -- can send response data to the client of an unrelated request |
8ad1c404-3e78-11df-a5a1-0050568452ac |
Zend Framework -- security issues in bundled Dojo library |
8aff07eb-1dbd-11e4-b6ba-3c970e169bc2 |
OpenSSL -- multiple vulnerabilities |
8b03d274-56ca-489e-821a-cf32f07643f0 |
jenkins -- multiple vulnerabilities |
8b0e94cc-b5cd-11d9-a788-0001020eed82 |
gaim -- AIM/ICQ remote denial of service vulnerability |
8b1a50ab-8a8e-11e8-add2-b499baebfeaf |
Apache httpd -- multiple vulnerabilities |
8b1f53f3-2da5-11e5-86ff-14dae9d210b8 |
php-phar -- multiple vulnerabilities |
8b20d716-49df-11ea-9f7b-206a8a720317 |
ksh93 -- certain environment variables interpreted as arithmetic expressions on startup, leading to code injection |
8b20f21a-8113-11ef-b988-08002784c58d |
redis,valkey -- Multiple vulnerabilities |
8b27f1bc-c509-11e5-a95f-b499baebfeaf |
curl -- Credentials not checked |
8b3be705-eba7-11ee-99b3-589cfc0f81b0 |
phpmyfaq -- multiple vulnerabilities |
8b3ecff5-c9b2-11e4-b71f-00bd5af88c00 |
Adobe Flash Player -- critical vulnerabilities |
8b491182-f842-11dd-94d9-0030843d3802 |
firefox -- multiple vulnerabilities |
8b571fb2-f311-11eb-b12b-fc4dd43e2b6a |
tomcat -- JNDI Realm Authentication Weakness in multiple versions |
8b61308b-322a-11ea-b34b-1de6fb24355d |
e2fsprogs -- rehash.c/pass 3a mutate_name() code execution vulnerability |
8b683bea-d49c-11da-a672-000e0c2e438a |
asterisk -- denial of service vulnerability, local system access |
8b812395-c739-11e8-ab5b-9c5c8e75236a |
clamav -- multiple vulnerabilities |
8b97d289-d8cf-11e2-a1f5-60a44c524f57 |
otrs -- information disclosure |
8b986a05-4dbe-11e0-8b9a-02e0184b8d35 |
avahi -- denial of service |
8ba23a62-997d-11eb-9f0e-0800278d94f0 |
gitea -- multiple vulnerabilities |
8ba2819c-0e9d-11e8-83e7-485b3931c969 |
bchunk -- heap-based buffer overflow (with invalid free) and crash |
8ba8278d-db06-11eb-ba49-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
8be2e304-cce6-11da-a3b1-00123ffe8333 |
mailman -- Private Archive Script Cross-Site Scripting |
8be8ca39-ae70-4422-bf1a-d8fae6911c5e |
chromium -- multiple vulnerabilities |
8bec3994-104d-11ed-a7ac-0800273f11ea |
gitea -- multiple issues |
8bf856ea-7df7-11eb-9aad-001b217b3468 |
Gitlab -- Multiple vulnerabilities |
8c08ab4c-d06c-11e8-b35c-001b217b3468 |
Libgit2 -- multiple vulnerabilities |
8c1a271d-56cf-11e7-b9fe-c13eb7bcbf4f |
exim -- Privilege escalation via multiple memory leaks |
8c1da77d-d3e9-11d9-8ffb-00061bc2ad93 |
xloadimage -- buffer overflow in FACES image handling |
8c2b2f11-0ebe-11e6-b55e-b499baebfeaf |
MySQL -- multiple vulnerabilities |
8c2ea875-9499-11df-8e32-000f20797ede |
mozilla -- multiple vulnerabilities |
8c31b288-27ec-11e5-a4a5-002590263bf5 |
xen-kernel -- vulnerability in the iret hypercall handler |
8c33b299-163b-11d9-ac1b-000d614f7fad |
getmail -- symlink vulnerability during maildir delivery |
8c342a6c-563f-11ef-a77e-901b0e9408dc |
soft-serve -- Remote code execution vulnerability |
8c451386-dff3-11dd-a765-0030843d3802 |
mysql -- privilege escalation and overwrite of the system table information |
8c5205b4-11a0-11de-a964-0030843d3802 |
opera -- multiple vulnerabilities |
8c5ad0cf-ba37-11d9-837d-000e0c2e438a |
rsnapshot -- local privilege escalation |
8c773d7f-6cbb-11e2-b242-c8600054b392 |
mysql/mariadb/percona server -- multiple vulnerabilities |
8c83145d-2c95-11e1-89b4-001ec9578670 |
phpMyAdmin -- Multiple XSS |
8c8fa44d-ad15-11e2-8cea-6805ca0b3d42 |
phpMyAdmin -- Multiple security vulnerabilities |
8c93e997-30e0-11e0-b300-485d605f4717 |
wordpress -- SQL injection vulnerability |
8c98e643-6008-11ea-af63-38d547003487 |
salt -- salt-api vulnerability |
8c9b48d1-3715-11e3-a624-00262d8b701d |
dropbear -- exposure of sensitive information, DoS |
8caa5d60-a174-11ef-9a62-002590c1f29c |
FreeBSD -- Unbounded allocation in ctl(4) CAM Target Layer |
8cbd9c08-f8b9-11e6-ae1b-002590263bf5 |
xen-tools -- cirrus_bitblt_cputovideo does not check if memory region is safe |
8cbf4d65-af9a-11df-89b8-00151735203a |
bugzilla -- information disclosure, denial of service |
8ccff771-ceca-43a0-85ad-3e595e73b425 |
py39-sqlalchemy11 -- multiple SQL Injection vulnerabilities |
8cdd38c7-8ebb-11ee-86bb-a8a1599412c6 |
chromium -- multiple security fixes |
8cf25a29-e063-11e7-9b2c-001e672571bc |
rubygem-passenger -- arbitrary file read vulnerability |
8cf54d73-d591-11e5-8fa8-14dae9d210b8 |
adminer -- XSS vulnerability |
8cfb6f42-d2b0-11da-a672-000e0c2e438a |
p5-DBI -- insecure temporary file creation vulnerability |
8d04cfbd-344d-11e0-8669-0025222482c5 |
mediawiki -- multiple vulnerabilities |
8d075001-a9ce-11d8-9c6d-0020ed76ef5a |
neon date parsing vulnerability |
8d10038e-515c-11df-83fb-0015587e2cc1 |
joomla -- multiple vulnerabilities |
8d17229f-3054-11eb-a455-ac1f6b16e566 |
consul -- Fix Consul Connect CA private key configuration |
8d1f9adf-6b4f-11ef-9a62-002590c1f29c |
FreeBSD -- Multiple vulnerabilities in libnv |
8d20bd48-a4f3-11ec-90de-1c697aa5a594 |
FreeBSD-kernel -- Multiple WiFi issues |
8d2af843-7d8e-11e9-8464-c85b76ce9b5a |
OCaml -- Multiple Security Vulnerabilities |
8d2c0ce1-08b6-11dd-94b4-0016d325a0ed |
ikiwiki -- cross site request forging |
8d2d6bbd-2a02-11e5-a0af-bcaec565249c |
Adobe Flash Player -- critical vulnerabilities |
8d3838b0-6ca8-11ed-92ce-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
8d3bae09-fd28-11e7-95f2-005056925db4 |
unbound -- vulnerability in the processing of wildcard synthesized NSEC records |
8d4ae57d-d2ab-11da-a672-000e0c2e438a |
xine -- multiple remote string vulnerabilities |
8d5180a6-86fe-11e6-8d93-00248c0c745d |
PHP -- multiple vulnerabilities |
8d5368ef-40fe-11e6-b2ec-b499baebfeaf |
Python -- smtplib StartTLS stripping vulnerability |
8d65aa3b-31ce-11ec-8c32-a14e8e520dc7 |
mailman -- brute-force vuln on list admin password, and CSRF vuln in releases before 2.1.35 |
8d823883-0ca9-11d9-8a8a-000c41e2cdad |
mozilla -- built-in CA certificates may be overridden |
8d85d600-84a9-11ea-97b9-08002728f74c |
Wagtail -- XSS vulnerability |
8da79498-e6f6-11ea-8cbf-54e1ad3d6335 |
libX11 -- Doublefree in locale handlng code |
8db24888-b2f5-11e6-8153-00248c0c745d |
Drupal Code -- Multiple Vulnerabilities |
8db2f8b2-9e12-11ea-9e83-0cc47ac16c9d |
qmail -- 64 bit integer overflows with possible remote code execution on large SMTP requests |
8db74c04-d794-11ea-88f8-901b0ef719ab |
FreeBSD -- sendmsg(2) privilege escalation |
8db8d62a-b08b-11e6-8eba-d050996490d0 |
ntp -- multiple vulnerabilities |
8dbf7894-a9a8-11d9-a788-0001020eed82 |
squid -- DoS on failed PUT/POST requests vulnerability |
8dd438ed-a338-11ed-b48b-589cfc0f81b0 |
Asterisk -- multiple vulnerabilities |
8dd9722c-8e97-11dc-b8f6-001c2514716c |
cups -- off-by-one buffer overflow |
8defa0f9-ee8a-11e1-8bd8-0022156e8794 |
squidclamav -- Denial of Service |
8e01ab5b-0949-11dc-8163-000e0c2e438a |
FreeBSD -- heap overflow in file(1) |
8e02441d-d39c-11db-a6da-0003476f14d3 |
sql-ledger -- security bypass vulnerability |
8e0e86ff-48b5-11e4-ab80-000c29f6ae42 |
rsyslog -- remote syslog PRI vulnerability |
8e0e8b56-11c6-11ef-9f97-a8a1599412c6 |
chromium -- multiple security fixes |
8e150606-08c9-11ed-856e-d4c9ef517024 |
MySQL -- Multiple vulnerabilities |
8e20430d-a72b-11ed-a04f-40b034455553 |
MinIO -- unprivileged users can create service accounts for admin users |
8e2e6ad8-1720-11d9-9fb9-00902788733b |
tor -- remote DoS and loss of anonymity |
8e3f1812-54d9-11ea-8d49-d4c9ef517024 |
WeeChat -- Multiple vulnerabilities |
8e48365a-214d-11e9-9f8a-0050562a4d7b |
libzmq4 -- Remote Code Execution Vulnerability |
8e561cfe-3c59-11ee-b32e-080027f5fec9 |
clamav -- Possible denial of service vulnerability in the AutoIt file parser |
8e5e6d42-a0fa-11e3-b09a-080027f2d077 |
Python -- buffer overflow in socket.recvfrom_into() |
8e670b85-706e-11eb-abb2-08002728f74c |
Rails -- multiple vulnerabilities |
8e6f684b-f333-11ee-a573-84a93843eb75 |
Apache httpd -- multiple vulnerabilities |
8e7bbddd-8338-11e7-867f-b499baebfeaf |
libsoup -- stack based buffer overflow |
8e887b71-d769-11e4-b1c2-20cf30e32f6d |
subversion -- DoS vulnerabilities |
8e89a89a-fd15-11e7-bdf6-00e04c1ea73d |
phpbb3 -- multiple issues |
8e8b8b94-7f1d-11dd-a66a-0019666436c2 |
rubygem-rails -- SQL injection vulnerability |
8e986b2b-1baa-11e8-a944-54ee754af08e |
chromium -- multiple vulnerabilities |
8e9c3f5a-715b-4336-8d05-19babef55e9e |
jenkins -- multiple vulnerabilities |
8ea24413-1b15-11ee-9331-570525adb7f1 |
gitea -- avoid open HTTP redirects |
8eaaf135-1893-11ed-9b22-002590c1f29c |
FreeBSD -- Missing bounds check in 9p message handling |
8eabaad9-641f-11d9-92a7-000a95bc6fae |
hylafax -- unauthorized login vulnerability |
8eb69cd0-c2ec-11eb-b6e7-8c164567ca3c |
redis -- integer overflow |
8eb78cdc-e9ec-11e5-85be-14dae9d210b8 |
dropbear -- authorized_keys command= bypass |
8ec7d426-055d-46bc-8f5a-a9d73a5a71ab |
minio -- Server Side Request Forgery |
8ecaaca2-cc07-11d8-858d-000d610a3b12 |
Linux binary compatibility mode input validation error |
8edeb3c1-bfe7-11ed-96f5-3497f65b111b |
Apache httpd -- Multiple vulnerabilities |
8eed0c5c-3482-11eb-b87a-901b0ef719ab |
FreeBSD -- ICMPv6 use-after-free in error message handling |
8eee06d4-c21d-4f07-a669-455151ff426f |
mozilla -- multiple vulnerabilities |
8eefa87f-31f1-496d-bf8e-2b465b6e4e8a |
zeek -- potential DoS vulnerabilities |
8eefff69-997f-11ee-8e38-002590c1f29c |
FreeBSD -- NFS client data corruption and kernel memory disclosure |
8efe93e2-ee62-11d9-8310-0001020eed82 |
zlib -- buffer overflow vulnerability |
8f10fa04-cf6a-11e5-96d6-14dae9d210b8 |
graphite2 -- code execution vulnerability |
8f128c72-ecf9-11e8-aa00-6451062f0f7a |
Flash Player -- arbitrary code execution |
8f353420-4197-11e8-8777-b499baebfeaf |
OpenSSL -- Cache timing vulnerability |
8f483746-d45d-11dd-84ec-001fc66e7203 |
roundcube -- remote execution of arbitrary code |
8f5c9dd6-5cac-11e5-9ad8-14dae9d210b8 |
p7zip -- directory traversal vulnerability |
8f5dd74b-2c61-11da-a263-0001020eed82 |
firefox & mozilla -- multiple vulnerabilities |
8f86d8b5-6025-11d9-a9e7-0001020eed82 |
tiff -- tiffdump integer overflow vulnerability |
8fafbef4-b1d9-11ed-b0f4-002590f2a714 |
git -- gitattributes parsing integer overflow |
8fb61d94-771b-11ef-9a62-002590c1f29c |
FreeBSD -- ktrace(2) fails to detach when executing a setuid binary |
8fbd4187-0f18-11e5-b6a8-002590263bf5 |
pgbouncer -- remote denial of service |
8fbe81f7-6eb5-11ef-b7bd-00505632d232 |
netatalk3 -- multiple WolfSSL vulnerabilities |
8fc55043-cb1e-11df-9c1b-0011098ad87f |
horde-base -- XSS and CSRF vulnerabilities |
8fc615cc-8a66-11e8-8c75-d8cb8abf62dd |
Gitlab -- Remote Code Execution Vulnerability in GitLab Projects Import |
8fd4f40a-4b7d-11ee-aa2a-080027de9982 |
Django -- multiple vulnerabilities |
8fe4f296-a3ec-11ef-8c1c-a8a1599412c6 |
chromium -- multiple security fixes |
8fedf75c-ef2f-11e6-900e-003048f78448 |
optipng -- multiple vulnerabilities |
8ff84335-a7da-11e2-b3f5-003067c2616f |
jasper -- buffer overflow |
9000591b-483b-45ac-9c87-b3df3a4198ec |
electron{25,26} -- Use after free in Site Isolation |
9003b500-31e3-11e3-b0d0-20cf30e32f6d |
mod_fcgid -- possible heap buffer overwrite |
90064567-28b1-11db-844d-000c6ec775d9 |
rubygem-rails -- evaluation of ruby code |
903654bd-1927-11dc-b8a0-02e0185f8d72 |
clamav -- multiple vulnerabilities |
904d78b8-0f7e-11e4-8b71-5453ed2e2b49 |
qt4-imageformats, qt5-gui -- DoS vulnerability in the GIF image handler |
9065b930-3d8b-11e3-bd1a-e840f2096bd0 |
gnutls -- denial of service |
9082a85a-88ae-11d8-90d1-0020ed76ef5a |
jailed processes can attach to other jails |
908f4cf2-1e8b-11e0-a587-001b77d09812 |
sudo -- local privilege escalation |
909a80ba-6294-11ed-9ca2-6c3be5272acd |
Grafana -- Improper authentication |
909be51b-9b3b-11e8-add2-b499baebfeaf |
MySQL -- multiple vulnerabilities |
90b27045-9530-11e3-9d09-000c2980a9f3 |
lighttpd -- multiple vulnerabilities |
90becf7c-1acf-11e7-970f-002590263bf5 |
xen-kernel -- broken check in memory_exchange() permits PV guest breakout |
90c48c04-d549-4fc0-a503-4775e32d438e |
chromium -- multiple vulnerabilities |
90c8385a-dc9f-11e5-8fa8-14dae9d210b8 |
giflib -- heap overflow |
90ca3ba5-19e6-11e4-8616-001b3856973b |
gpgme -- heap-based buffer overflow in gpgsm status handler |
90cc1494-10ac-11e1-b3ec-0024e830109b |
BIND -- Remote DOS |
90d2e58f-b25a-11de-8c83-02e0185f8d72 |
FreeBSD -- kqueue pipe race conditions |
90db9983-2f53-11dd-a0d8-0016d325a0ed |
ikiwiki -- cleartext passwords |
910486d5-ba4d-11dd-8f23-0019666436c2 |
imlib2 -- XPM processing buffer overflow vulnerability |
9118961b-9fa5-11e6-a265-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
912cb7f7-27df-11e5-a4a5-002590263bf5 |
xen-kernel -- arm: vgic: incorrect rate limiting of guest triggered logging |
915855ad-283d-4597-b01e-e0bf611db78b |
libspf2 -- Integer Underflow Remote Code Execution |
9164f51e-ae20-11e7-a633-009c02a2ab30 |
Python 2.7 -- multiple vulnerabilities |
9168253c-5a6d-11d9-a9e7-0001020eed82 |
a2ps -- insecure temporary file creation |
917e5519-9fdd-11e7-8b58-e8e0b747a45a |
chromium -- multiple vulnerabilities |
918a5d1f-9d40-11e5-8f5c-002590263bf5 |
KeePassX -- information disclosure |
918f38cd-f71e-11e1-8bd8-0022156e8794 |
php5 -- header splitting attack via carriage-return character |
91929399-249e-11ef-9296-b42e991fc52e |
kanboard -- Project Takeover via IDOR in ProjectPermissionController |
91955195-9ebb-11ee-bc14-a703705db3a6 |
putty -- add protocol extension against 'Terrapin attack' |
91a2066b-5ab6-11de-bc9b-0030843d3802 |
cscope -- buffer overflow |
91a337d8-83ed-11e6-bf52-b499baebfeaf |
OpenSSL -- multiple vulnerabilities |
91afa94c-c452-11da-8bff-000ae42e9b93 |
mod_pubcookie -- cross site scripting vulnerability |
91be81e7-3fea-11e1-afc7-2c4138874f7d |
Multiple implementations -- DoS via hash algorithm collision |
91c606fc-b5d0-11d9-a788-0001020eed82 |
mplayer & libxine -- MMS and Real RTSP buffer overflow vulnerabilities |
91ce95d5-cd15-4105-b942-af5ccc7144c1 |
clamav -- multiple vulnerabilities |
91e039ed-d689-11e6-9171-14dae9d210b8 |
hdf5 -- multiple vulnerabilities |
91ecb546-b1e6-11e3-980f-20cf30e32f6d |
apache -- several vulnerabilities |
91ed69f9-72c7-11dc-981a-001921ab2fa4 |
firebird -- multiple remote buffer overflow vulnerabilities |
91f1adc7-b3e9-11d9-a788-0001020eed82 |
kdewebdev -- kommander untrusted code execution vulnerability |
92140bc9-7bde-11da-8ec4-0002b3b60e4c |
bogofilter -- heap corruption through malformed input |
92243b6a-5775-4aea-8727-a938058df5ba |
webkit2-gtk3 -- Multiple vulnerabilities |
92268205-1947-11d9-bc4a-000c41e2cdad |
cyrus-sasl -- dynamic library loading and set-user-ID applications |
9227dcaf-827f-11dd-9cd7-0050568452ac |
twiki -- Arbitrary code execution in session files |
922d2398-9e2d-11de-a998-0030843d3802 |
mozilla firefox -- multiple vulnerabilities |
92442c4b-6f4a-11db-bd28-0012f06707f0 |
Imlib2 -- multiple image file processing vulnerabilities |
9245681c-7c3c-11e7-b5af-a4badb2f4699 |
sqlite3 -- heap-buffer overflow |
924bd4f8-11e7-11e9-9fe8-5404a68ad561 |
uriparser -- Out-of-bounds read |
924cb116-4d35-11ee-8e38-002590c1f29c |
FreeBSD -- Wi-Fi encryption bypass |
9272a5b0-6b40-11e5-bd7f-bcaec565249c |
gdk-pixbuf2 -- head overflow and DoS |
927743d4-5ca9-11d9-a9e7-0001020eed82 |
up-imapproxy -- multiple vulnerabilities |
928d5c59-2a5a-11e8-a712-0025908740c2 |
SquirrelMail -- post-authentication access privileges |
92a4d881-c6cf-11ec-a06f-d4c9ef517024 |
cURL -- Multiple vulnerabilities |
92a6efd0-e40d-11e8-ada4-408d5cf35399 |
lighttpd - use-after-free vulnerabilities |
92ad12b8-ec09-11eb-aef1-0897988a1c07 |
pjsip -- Race condition in SSL socket server |
92b8b284-a3a2-41b1-956c-f9cf8b74f500 |
dovecot -- abort of SASL authentication results in a memory leak |
92ca92c1-d859-11de-89f9-001517351c22 |
bugzilla -- information leak |
92cd1c03-2940-11ef-bc02-001b217b3468 |
Gitlab -- Vulnerabilities |
92cda470-30cb-11e5-a4a5-002590263bf5 |
sox -- input sanitization errors |
92d44f83-a7bf-41cf-91ee-3d1b8ecf579f |
mozilla -- multiple vulnerabilities |
92e345d0-304d-11e7-8359-e8e0b747a45a |
chromium -- race condition vulnerability |
92f30415-9935-11e2-ad4c-080027ef73ec |
OpenVPN -- potential side-channel/timing attack when comparing HMACs |
92f4191a-6d25-11e7-93f7-d43d7e971a1b |
GitLab -- Various security issues |
92f86b93-923f-11dc-a2bf-02e081235dab |
net-snmp -- denial of service via GETBULK request |
92fc2e2b-c383-11e4-8ef7-080027ef73ec |
PuTTY -- fails to scrub private keys from memory after use |
92fd40eb-c458-11da-9c79-00123ffe8333 |
samba -- Exposure of machine account credentials in winbind log files |
930def19-3e05-11ec-9ba8-002324b2fba8 |
go -- multiple vulnerabilities |
9314058e-5204-11e7-b712-b1a44a034d72 |
cURL -- URL file scheme drive letter buffer overflow |
93167bef-9752-11e9-b61c-b885849ded8e |
libxslt -- security framework bypass |
933654ce-17b8-11e8-90b8-001999f8d30b |
asterisk -- multiple vulnerabilities |
9347d82d-9a66-11db-b271-000e35248ad7 |
w3m -- format string vulnerability |
934b1de4-00d7-11da-bc08-0001020eed82 |
opera -- image dragging vulnerability |
93688f8f-4935-11e1-89b4-001ec9578670 |
postfixadmin -- Multiple Vulnerabilities |
937aa1d6-685e-11ec-a636-000c29061ce6 |
OpenDMARC - Multiple vulnerabilities |
937adf01-b64a-11dd-a55e-00163e000016 |
openfire -- multiple vulnerabilities |
937d5911-5f16-11db-ae08-0008743bf21a |
drupal -- cross site request forgeries |
938f357c-16dd-11d9-bc4a-000c41e2cdad |
bmon -- unsafe set-user-ID application |
9393213d-489b-11e5-b8c7-d050996490d0 |
drupal -- multiple vulnerabilities |
939a7086-9ed6-11e5-8f5c-002590263bf5 |
redmine -- potential XSS vulnerability |
93a1c9a7-5bef-11ec-a47a-001517a2e1a4 |
openhab -- log4j remote code injection |
93ba13f8-5c41-11db-a5ae-00508d6a62df |
tkdiff -- temporary file symlink privilege escalation |
93be487e-211f-11e1-89b4-001ec9578670 |
isc-dhcp-server -- Remote DoS |
93c12fe5-7716-11ef-9a62-002590c1f29c |
FreeBSD -- Integer overflow in libnv |
93d6162f-1153-11d9-bc4a-000c41e2cdad |
mozilla -- multiple heap buffer overflows |
93db4f92-9997-4f4f-8614-3963d9e2b0ec |
py-slixmpp -- incomplete SSL certificate validation |
93eadedb-c6a6-11e5-96d6-14dae9d210b8 |
nghttp2 -- use after free |
93eb0e48-14ba-11ec-875e-901b0e9408dc |
Matrix clients -- several vulnerabilities |
93ee802e-ebde-11e5-92ce-002590263bf5 |
git -- potential code execution |
93f8e0ff-f33d-11e8-be46-0019dbb15b3f |
payara -- Default typing issue in Jackson Databind |
94234e00-be8a-11db-b2ec-000c6ec775d9 |
rar -- password prompt buffer overflow vulnerability |
942433db-c661-11e6-ae1b-002590263bf5 |
xen-kernel -- x86: Mishandling of SYSCALL singlestep during emulation |
94268da0-8118-11e4-a180-001999f8d30b |
asterisk -- Remote Crash Vulnerability in WebSocket Server |
942fff11-5ac4-11ec-89ea-c85b76ce9b5a |
p7zip -- usage of uninitialized memory |
943d23b6-e65e-11eb-ad30-0800273f11ea |
gitea -- multiple vulnerabilities |
943f8915-6c5d-11ef-810a-f8b46a88f42c |
binutils -- Multiple vulnerabilities |
9442a811-dab3-11e7-b5af-a4badb2f4699 |
FreeBSD -- OpenSSL multiple vulnerabilities |
9448a82f-6878-11e1-865f-00e0814cab4e |
jenkins -- XSS vulnerability |
94599fe0-5ca3-11e8-8be1-d05099c0ae8c |
BIND -- multiple vulnerabilities |
9471ec47-05a2-11e5-8fda-002590263bf5 |
proxychains-ng -- current path as the first directory for the library search path |
947f4b14-1c89-11da-bc01-000e0c2e438a |
bind -- buffer overrun vulnerability |
948921ad-afbc-11da-bad9-02e081235dab |
GnuPG does not detect injection of unsigned data |
94976433-9c74-11e2-a9fc-d43d7e0c7c02 |
mozilla -- multiple vulnerabilities |
949c470e-528f-11d9-ac20-00065be4b5b6 |
golddig -- local buffer overflow vulnerabilities |
94b6264a-5140-11e3-8b22-f0def16c5c1b |
nginx -- Request line parsing vulnerability |
94c6951a-0d04-11ea-87ca-001999f8d30b |
asterisk -- Re-invite with T.38 and malformed SDP causes crash |
94d441d2-5497-11ef-9d2f-080027836e8b |
Django -- multiple vulnerabilities |
94d63fd7-508b-11e9-9ba0-4c72b94353b5 |
drupal -- Drupal core - Moderately critical - Cross Site Scripting |
94edff42-d93d-11de-a434-0211d880e350 |
libvorbis -- multiple vulnerabilities |
94ffc0d9-1915-11eb-b809-b42e991fc52e |
motion -- Denial of Service |
950b2d60-f2a9-11e5-b4a9-ac220bdcec59 |
activemq -- Web Console Clickjacking |
95176ba5-9796-11ed-bfbf-080027f5fec9 |
rack -- Multiple vulnerabilities |
951b513a-9f42-436d-888d-2162615d0fe4 |
py-pymatgen -- regular expression denial of service |
9532a361-b84d-11ee-b0d7-84a93843eb75 |
TinyMCE -- mXSS in multiple plugins |
953911fe-51ef-11e2-8e34-0022156e8794 |
tomcat -- bypass of CSRF prevention filter |
953aaa57-6bce-11e5-9909-002590263bf5 |
mbedTLS/PolarSSL -- multiple vulnerabilities |
9548d6ed-b1da-11ed-b0f4-002590f2a714 |
git -- Local clone-based data exfiltration with non-local transports |
9557dc72-64da-11e8-bc32-d8cb8abf62dd |
Gitlab -- multiple vulnerabilities |
9558d49c-534c-11e8-8177-d43d7ef03aa6 |
Flash Player -- arbitrary code execution |
955eb3cc-ce0b-11ed-825f-6c3be5272acd |
Grafana -- Stored XSS in Graphite FunctionDescription tooltip |
955f377e-7bc3-11ec-a51c-7533f219d428 |
Security Vulnerability found in ExifTool |
95602550-76cf-11e5-a2a1-002590263bf5 |
codeigniter -- multiple XSS vulnerabilities |
9575259a-92d5-11e4-bce6-d050992ecde8 |
file -- multiple vulnerabilities |
958b9cee-79da-11e6-bf75-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
9595d002-edeb-4602-be2d-791cd654247e |
jenkins -- multiple vulnerabilities |
959d384d-6b59-11dd-9d79-001fc61c2a55 |
ruby -- DNS spoofing vulnerability |
95a69d1a-52a5-11e2-a289-1c4bd681f0cf |
otrs -- XSS vulnerability in Firefox and Opera |
95a74a48-2691-11e7-9e2d-e8e0b747a45a |
chromium -- multiple vulnerabilities |
95b01379-9d52-11e7-a25c-471bafc3262f |
ruby -- multiple vulnerabilities |
95b92e3b-d451-11e5-9794-e8e0b747a45a |
libgcrypt -- side-channel attack on ECDH |
95c4ec45-6831-11ee-b06f-0050569ceb3a |
Account takeover through API in GLPI |
95d9d986-1078-11eb-ab74-4c72b94353b5 |
drupal -- Multiple Vulnerabilities |
95dad123-180e-11ee-86ba-080027eda32c |
mediawiki -- multiple vulnerabilities |
95e6e6ca-3986-11ed-8e0c-6c3be5272acd |
Grafana -- Privilege escalation |
95ee401d-cc6a-11ec-9cfc-10c37b4ac2ea |
gitea -- Escape git fetch remote |
95ee96f2-e488-11d9-bf22-080020c11455 |
linux-realplayer -- RealText parsing heap overflow |
95eee71d-3068-11e5-a9b5-bcaec565249c |
gdk-pixbuf2 -- heap overflow and DoS affecting Firefox and other programs |
95f306a6-0aee-11eb-add4-08002728f74c |
Rails -- Possible XSS vulnerability |
95fde6bc-6821-11ee-b06f-0050569ceb3a |
GLPI vulnerable to unauthenticated access to Dashboard data |
96266fc9-1200-43b5-8393-4c51f54bb7bc |
electron32 -- multiple vulnerabilities |
964161cd-6715-11da-99f6-00123ffe8333 |
ffmpeg -- libavcodec buffer overflow vulnerability |
964c5460-9c66-11ec-ad3a-001999f8d30b |
asterisk -- multiple vulnerabilities |
967b852b-1e28-11e6-8dd3-002590263bf5 |
hostapd and wpa_supplicant -- psk configuration parameter update allowing arbitrary data to be written |
96811d4a-04ec-11ec-9b84-d4c9ef517024 |
OpenSSL -- multiple vulnerabilities |
968d1e74-1740-11e5-a643-40a8f0757fb4 |
p5-Dancer -- possible to abuse session cookie values |
96948a6a-e239-11d9-83cf-0010dc5df42d |
cacti -- potential SQL injection and cross site scripting attacks |
96a21236-707b-11eb-96d8-d4c9ef517024 |
OpenSSL -- Multiple vulnerabilities |
96a41723-133a-11ed-be3b-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
96b2d4db-ddd2-11ed-b6ea-080027f5fec9 |
redis -- HINCRBYFLOAT can be used to crash a redis-server process |
96ba2dae-4ab0-11d8-96f2-0020ed76ef5a |
L2TP, ISAKMP, and RADIUS parsing vulnerabilities in tcpdump |
96d6809a-81df-46d4-87ed-2f78c79f06b1 |
zeek -- potential DoS vulnerabilities |
96d84238-b500-490b-b6aa-2b77090a0410 |
xorg-server -- Overlay Window Use-After-Free |
96df5fd0-8900-11d9-aa18-0001020eed82 |
curl -- authentication buffer overflow vulnerability |
96e776c7-e75c-11df-8f26-00151735203a |
OTRS -- Multiple XSS and denial of service vulnerabilities |
96eab874-9c79-11e8-b34b-6cc21735f730 |
PostgreSQL -- two vulnerabilities |
96eca031-1313-4daf-9be2-9d6e1c4f1eb5 |
mozilla -- multiple vulnerabilities |
96ed277b-60e0-11db-ad2d-0016179b2dd5 |
Serendipity -- XSS Vulnerabilities |
96f6bf10-a731-11e6-95ca-0011d823eebd |
flash -- multiple vulnerabilities |
96fb446d-ac7b-11ea-8b5e-b42e99a1b9c3 |
LibreOffice Security Advisory |
96fdbf5b-2cfd-11d8-9355-0020ed76ef5a |
Mathopd buffer overflow |
9704930c-3bb7-11e7-93f7-d43d7e971a1b |
gitlab -- Various security issues |
970dcbe0-a947-41a4-abe9-7aaba87f41fe |
electron25 -- multiple vulnerabilities |
9720bb39-f82a-402f-9fe4-e2c875bdda83 |
jenkins -- multiple vulnerabilities |
972568d6-3485-40ab-80ff-994a8aaf9683 |
xorg-server -- Multiple vulnerabilities |
972697a7-9a42-11d9-a256-0001020eed82 |
kdelibs -- local DCOP denial of service vulnerability |
972837fc-c304-11e3-8758-00262d5ed8ee |
ChaSen -- buffer overflow |
972ba0e8-8b8a-11ec-b369-6c3be5272acd |
Node.js -- January 2022 Security Releases |
972fe546-1fb6-11eb-b9d4-001999f8d30b |
asterisk -- Remote crash in res_pjsip_session |
9733c480-ebff-11e3-970b-206a8a720317 |
gnutls -- client-side memory corruption |
974a6d32-3fda-11e8-aea4-001b216d295b |
ipsec-tools -- remotely exploitable computational-complexity attack |
9750cf22-216d-11da-bc01-000e0c2e438a |
unzip -- permission race vulnerability |
976567f6-05c5-11e6-94fa-002590263bf5 |
hostapd and wpa_supplicant -- multiple vulnerabilities |
976d7bf9-38ea-11ec-b3b0-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
9770d6ac-614d-11e5-b379-14dae9d210b8 |
libssh2 -- denial of service vulnerability |
978b0f76-122d-11e4-afe3-bc5ff4fb5e7b |
mozilla -- multiple vulnerabilities |
979dc373-d27d-11ee-8b84-b42e991fc52e |
suricata -- multiple vulnerabilities |
97a24d2e-f74c-11e5-8458-6cc21735f730 |
PostgreSQL -- minor security problems. |
97c1b0f7-47b9-11ee-8e38-002590c1f29c |
FreeBSD -- Multiple vulnerabilities in Heimdal |
97c22a94-5b8b-11e2-b131-000c299b62e1 |
nagios -- buffer overflow in history.cgi |
97c3a452-6e36-11d9-8324-000a95bc6fae |
bugzilla -- cross-site scripting vulnerability |
97d45e95-3ffc-11da-a263-0001020eed82 |
snort -- Back Orifice preprocessor buffer overflow vulnerability |
97e86d10-2ea7-11e6-ae88-002590263bf5 |
roundcube -- XSS vulnerability |
97edf5ab-b319-11d9-837d-000e0c2e438a |
junkbuster -- heap corruption vulnerability and configuration modification vulnerability |
97f09f2f-ca3f-11df-aade-0050568f000c |
FreeBSD -- ZFS ZIL playback with insecure permissions |
97fcc60a-6ec0-11ea-a84a-4c72b94353b5 |
phpMyAdmin -- SQL injection |
98044aba-6d72-11eb-aed7-1b1b8a70cc8b |
openexr, ilmbase -- security fixes related to reading corrupted input files |
98092444-5645-11e5-9ad8-14dae9d210b8 |
screen -- stack overflow |
982872f1-7dd3-11e7-9736-6cc21735f730 |
PostgreSQL vulnerabilities |
9855ac8e-2aec-11db-a6e2-000e0c2e438a |
alsaplayer -- multiple vulnerabilities |
985bfcf0-e1d7-11d9-b875-0001020eed82 |
opera -- redirection cross-site scripting vulnerability |
985d4d6c-cfbd-11e3-a003-b4b52fce4ce8 |
mozilla -- multiple vulnerabilities |
98690c45-0361-11e2-a391-000c29033c32 |
ImageMagick and GraphicsMagick -- DoS via specially crafted PNG file |
98b603c8-9ff3-11e8-ad63-6451062f0f7a |
Flash Player -- multiple vulnerabilities |
98b71436-656d-11e9-8e67-206a8a720317 |
FreeBSD -- SAE confirm missing state validation |
98bd69c3-834b-11d8-a41f-0020ed76ef5a |
Courier mail services: remotely exploitable buffer overflows |
98dd7788-3d13-11dc-b3d3-0016179b2dd5 |
drupal -- Cross site request forgeries |
98f1241f-8c09-4237-ad0d-67fb4158ea7a |
Mozilla -- multiple vulnerabilities |
98f78c7a-a08e-11ed-946e-002b67dfc673 |
Plex Media Server -- security vulnerability |
99015cf5-c4dd-11da-b2fb-000e0c2e438a |
mediawiki -- hardcoded placeholder string security bypass vulnerability |
99021f88-ca3c-11df-be21-00e018aa7788 |
phpmyfaq -- cross site scripting vulnerabilities |
99029172-8253-407d-9d8b-2cfeab9abf81 |
mozilla -- multiple vulnerabilities |
9908a1cc-35ad-424d-be0b-7e56abd5931a |
sympa -- Denial of service caused by malformed CSRF token |
990cf07e-6988-11d9-a9e7-0001020eed82 |
cups-base -- CUPS server remote DoS vulnerability |
99230277-8fb4-11d8-8b29-0020ed76ef5a |
ident2 double byte buffer overflow |
996518f3-6ef9-11ef-b01b-08002784c58d |
clamav -- Multiple vulnerabilities |
996bce94-d23d-11e4-9463-9cb654ea3e1c |
libuv -- incorrect revocation order while relinquishing privileges |
996c219c-bbb1-11e4-88ae-d050992ecde8 |
samba -- Unexpected code execution in smbd |
99858b7c-7ece-11df-a007-000f20797ede |
mozilla -- multiple vulnerabilities |
998ca824-ef55-11e9-b81f-3085a9a95629 |
Pillow -- Allocation of resources without limits or throttling |
99a5590c-857e-11e0-96b7-00300582f9fc |
Apache APR -- DoS vulnerabilities |
99b5cfa5-d3d2-11d9-8ffb-00061bc2ad93 |
yamt -- buffer overflow and directory traversal issues |
99bc2966-55be-4411-825f-b04017a4c100 |
electron{22,24} -- multiple vulnerabilities |
99bff2bd-4852-11ec-a828-6c3be5272acd |
Grafana -- Incorrect Access Control |
99d3a8a5-c13c-11e5-96d6-14dae9d210b8 |
imlib2 -- denial of service vulnerabilities |
9a035a56-eff0-11d9-8310-0001020eed82 |
ekg -- insecure temporary file creation |
9a09eaa2-6448-11ea-abb7-001b217b3468 |
Gitlab -- Vulnerability |
9a0a892e-05d8-11e3-ba09-000c29784fd1 |
lcms2 -- Null Pointer Dereference Denial of Service Vulnerability |
9a447f78-d0f8-11ea-9837-e09467587c17 |
chromium -- multiple vulnerabilities |
9a57c607-3cab-11e3-b4d9-bcaec565249c |
xorg-server -- use-after-free |
9a71953a-474a-11e5-adde-14dae9d210b8 |
libpgf -- use-after-free |
9a777c23-b310-11e0-832d-00215c6a37bb |
rsync -- incremental recursion memory corruption vulnerability |
9a8514f3-2ab8-11ec-b3a1-8c164582fbac |
Ansible -- Ansible user credentials disclosure in ansible-connection module |
9a8fecef-92c0-11df-b140-0015f2db7bde |
vte -- Classic terminal title set+query attack |
9ab3a22c-feb8-11e3-b938-5404a68ad561 |
mplayer -- potential buffer overrun when processing malicious lzo compressed input |
9ac0f9c4-492b-11df-83fb-0015587e2cc1 |
krb5 -- multiple denial of service vulnerabilities |
9ad8993e-b1ba-11e5-9728-002590263bf5 |
qemu -- denial of service vulnerability in VMWARE VMXNET3 NIC support |
9ae2c00f-97d0-11eb-8cd6-080027f515ea |
clamav -- Multiple vulnerabilites |
9aecb94c-c1ad-11e3-a5ac-001b21614864 |
cURL -- inappropriate GSSAPI delegation |
9b037a0d-ef2c-11e2-b4a0-8c705af55518 |
gallery -- multiple vulnerabilities |
9b0d9832-47c1-11ee-8e38-002590c1f29c |
FreeBSD -- Network authentication attack via pam_krb5 |
9b1699ff-d84c-11eb-92d6-1b6ff3dfe4d3 |
mantis -- multiple vulnerabilities |
9b19b6df-a4be-11e8-9366-0028f8d09152 |
couchdb -- administrator privilege escalation |
9b2a5e88-02b8-11e2-92d1-000d601460a4 |
php5 -- Denial of Service in php_date_parse_tzfile() |
9b4806c1-257f-11ec-9db5-0800270512f4 |
redis -- multiple vulnerabilities |
9b4facec-6761-11da-99f6-00123ffe8333 |
curl -- URL buffer overflow vulnerability |
9b5162de-6f39-11e8-818e-e8e0b747a45a |
libgcrypt -- side-channel attack vulnerability |
9b5a905f-e556-452f-a00c-8f070a086181 |
libtiff -- Improper Input Validation |
9b60bba1-cf18-11ed-bd44-080027f5fec9 |
rubygem-uri -- ReDoS vulnerability |
9b7053fd-3ab5-11da-9484-00123ffe8333 |
phpmyadmin -- local file inclusion vulnerability |
9b718b82-8ef5-11dc-8e42-001c2514716c |
gallery2 -- multiple vulnerabilities |
9b7491fb-f253-11e9-a50c-000c29c4dc65 |
python 3.7 -- multiple vulnerabilities |
9b8a52fc-89c1-11e9-9ba0-4c72b94353b5 |
drupal -- Drupal core - Moderately critical |
9b973e97-0a99-11e7-ace7-080027ef73ec |
PuTTY -- integer overflow permits memory overwrite by forwarded ssh-agent connections |
9b9a5f6e-1755-11ed-adef-589cfc01894a |
wolfssl -- multiple issues |
9bad457e-b396-4452-8773-15bec67e1ceb |
jenkins -- Jenkins core bundles vulnerable version of the commons-httpclient library |
9bad5ab1-f3f6-11e0-8b5c-b482fe3f522d |
OpenTTD -- Multiple buffer overflows in validation of external data |
9bc14850-a070-11e6-a881-b499baebfeaf |
MySQL -- multiple vulnerabilities |
9bcfd7b6-bcda-11df-9a6a-0015f2db7bde |
webkit-gtk2 -- Multiple vulnerabilities |
9bcff2c4-1779-11ef-b489-b42e991fc52e |
Openfire administration console authentication bypass |
9bd5e47b-6b50-11ef-9a62-002590c1f29c |
FreeBSD -- Multiple issues in ctl(4) CAM Target Layer |
9bdd8eb5-564a-11e5-9ad8-14dae9d210b8 |
wireshark -- multiple vulnerabilities |
9be819c6-4633-11d9-a9e7-0001020eed82 |
bnc -- remotely exploitable buffer overflow in getnickuserhost |
9bed230f-ffc8-11ee-8e76-a8a1599412c6 |
chromium -- multiple security fixes |
9c00d446-8208-11dc-9283-0016179b2dd5 |
drupal --- multiple vulnerabilities |
9c016563-f582-11e7-b33c-6451062f0f7a |
Flash Player -- information disclosure |
9c03845c-7398-11eb-bc0e-2cf05d620ecc |
raptor2 -- malformed input file can lead to a segfault |
9c133aa0-12bd-11dd-bab7-0016179b2dd5 |
serendipity -- multiple cross site scripting vulnerabilities |
9c135c7e-9fa4-11e6-a265-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
9c1495ac-8d8c-4789-a0f3-8ca6b476619c |
mozilla -- multiple vulnerabilities |
9c196cfd-2ccc-11e6-94b0-0011d823eebd |
gnutls -- file overwrite by setuid programs |
9c1cea79-548a-11da-b53f-0004614cc33d |
phpSysInfo -- "register_globals" emulation layer overwrite vulnerability |
9c2460a4-f6b1-11dd-94d9-0030843d3802 |
squid -- remote denial of service vulnerability |
9c36d41c-11df-11ea-9b6d-901b0e934d69 |
py-matrix-synapse -- incomplete cleanup of 3rd-party-IDs on user deactivation |
9c399521-5f80-11ed-8ac4-b42e991fc52e |
darkhttpd -- DOS vulnerability |
9c7177ff-1fe1-11e5-9a01-bcaec565249c |
libxml2 -- Enforce the reader to run in constant memory |
9c7b6c20-a324-11e4-879c-00e0814cab4e |
django -- multiple vulnerabilities |
9c88d8a8-8372-11e2-a010-20cf30e32f6d |
apache22 -- several vulnerabilities |
9c9023ff-9057-11e9-b764-00505632d232 |
netatalk3 -- remote code execution vulnerability |
9c990e67-6e30-11ec-82db-b42e991fc52e |
routinator -- multiple vulnerabilities |
9c9ee9a6-ac5e-11ed-9323-080027d3a315 |
Django -- multiple vulnerabilities |
9ca85b7c-1b31-11eb-8762-005056a311d1 |
samba -- Multiple Vulnerabilities |
9cb57a06-7517-11ea-b594-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
9cbbc506-93c1-11ee-8e38-002590c1f29c |
FreeBSD -- TCP spoofing vulnerability in pf(4) |
9ccfee39-3c3b-11df-9edc-000f20797ede |
mozilla -- multiple vulnerabilities |
9cd52bc6-a213-11da-b410-000e0c2e438a |
abiword, koffice -- stack based buffer overflow vulnerabilities |
9cfbca7f-efb7-11dc-be01-0211060005df |
qemu -- unchecked block read/write vulnerability |
9d04936c-75f1-4a2c-9ade-4c1708be5df9 |
mozilla -- multiple vulnerabilities |
9d15355b-ce7c-11e4-9db0-d050992ecde8 |
OpenSSL -- multiple vulnerabilities |
9d271bab-da22-11eb-86f0-94c691a700a6 |
jenkins -- multiple vulnerabilities |
9d3020e4-a2c4-11dd-a9f9-0030843d3802 |
flyspray -- multiple vulnerabilities |
9d3428d4-f98c-11e8-a148-001b217b3468 |
Gitlab -- Multiple vulnerabilities |
9d6a48a7-4dad-11ea-8a1d-7085c25400ea |
grub2-bhyve -- multiple privilege escalations |
9d732078-32c7-11e5-b263-00262d5ed8ee |
chromium -- multiple vulnerabilities |
9d7a2b54-4468-11ec-8532-0d24c37c72c8 |
mailman -- 2.1.37 fixes XSS via user options, and moderator offline brute-force vuln against list admin password |
9d8e9952-5a42-11ef-a219-1c697a616631 |
Intel CPUs -- multiple vulnerabilities |
9d9e9439-959e-11ed-b464-b42e991fc52e |
security/keycloak -- Multiple possible DoS attacks |
9da3834b-6a50-11e1-91af-003067b2972c |
linux-flashplugin -- multiple vulnerabilities |
9dae9d62-205f-11e5-a4a5-002590263bf5 |
ansible -- code execution from compromised remote host data or untrusted local data |
9db93f3d-c725-11ec-9618-000d3ac47524 |
Rails -- XSS vulnerabilities |
9dd761ff-30cb-11e5-a4a5-002590263bf5 |
sox -- memory corruption vulnerabilities |
9dda3ff1-2b02-11db-a6e2-000e0c2e438a |
x11vnc -- authentication bypass vulnerability |
9dde9dac-08f4-11e1-af36-003067b2972c |
caml-light -- insecure use of temporary files |
9de4c1c1-b9ee-11e9-82aa-6cc21735f730 |
PostgresSQL -- TYPE in pg_temp execute arbitrary SQL during `SECURITY DEFINER` execution |
9defb2d6-1404-11e4-8cae-20cf30e32f6d |
bugzilla -- Cross Site Request Forgery |
9dfb63b8-8f36-11e2-b34d-000c2957946c |
www/mod_security -- NULL pointer dereference DoS |
9dfe61c8-4d15-11e8-8f2f-d8cb8abf62dd |
Gitlab -- multiple vulnerabilities |
9e0c6f7a-d46d-11e9-a1c7-b499baebfeaf |
OpenSSL -- Multiple vulnerabilities |
9e205ef5-a649-11e8-b1f6-6805ca0b3d42 |
phpmyadmin -- XSS in the import dialog |
9e2d0dcf-9926-11e8-a92d-0050562a4d7b |
py-cryptography -- tag forgery vulnerability |
9e2fdfc7-e237-4393-9fa5-2d50908c66b3 |
xorg-server -- Multiple vulnerabilities |
9e50dcc3-740b-11e6-94a2-080027ef73ec |
mailman -- CSRF hardening in parts of the web interface |
9e5bbffc-d8ac-11e5-b2bd-002590263bf5 |
bsh -- remote code execution vulnerability |
9e6640fe-be3a-11e6-b04f-001999f8d30b |
asterisk -- Crash on SDP offer or answer from endpoint using Opus |
9e7306b9-a5c3-11e5-b864-14dae9d210b8 |
quassel -- remote denial of service |
9e8f0766-7d21-11eb-a2be-001999f8d30b |
asterisk -- Crash when negotiating T.38 with a zero port |
9eb01384-d793-11ea-88f8-901b0ef719ab |
FreeBSD -- Potential memory corruption in USB network device drivers |
9ee01e60-6045-43df-98e5-a794007e54ef |
syncthing -- crash due to malformed relay protocol message |
9ee72858-4159-11e5-93ad-002590263bf5 |
froxlor -- database password information leak |
9eeccbf3-6e26-11ec-bb10-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
9f0a405e-4edd-11d9-a9e7-0001020eed82 |
phpmyadmin -- file disclosure vulnerability |
9f14cb36-b6fc-11e0-a044-445c73746d79 |
opensaml2 -- unauthenticated login |
9f15c2da-947e-11ea-92ab-00163e433440 |
FreeBSD -- Use after free in cryptodev module |
9f27ac74-cdee-11eb-930d-fc4dd43e2b6a |
ircII -- denial of service |
9f581778-e3d4-11dc-bb89-000bcdc1757a |
coppermine -- multiple vulnerabilities |
9f65d382-56a4-11e7-83e3-080027ef73ec |
OpenVPN -- several vulnerabilities |
9f7a0f39-ddc0-11e7-b5af-a4badb2f4699 |
FreeBSD -- OpenSSL multiple vulnerabilities |
9f7ae7ea-da93-4f86-b257-ba76707f6d5d |
zeek -- Various vulnerabilities |
9f971cea-03f5-11e0-bf50-001a926c7637 |
krb5 -- unkeyed PAC checksum handling vulnerability |
9fa1a0ac-b2e0-11e3-bb07-6cf0490a8c18 |
Joomla! -- Core - Multiple Vulnerabilities |
9fa7b139-c1e9-409e-bed0-006aadcf5845 |
xorg-server -- Multiple security issues in X server extensions |
9fae0f1f-df82-11d9-b875-0001020eed82 |
tcpdump -- infinite loops in protocol decoding |
9fb4e57b-d65a-11e9-8a5f-e5c82b486287 |
curl -- multiple vulnerabilities |
9fba80e0-a771-11eb-97a0-e09467587c17 |
chromium -- multiple vulnerabilities |
9fbaefb3-837e-11ea-b5b4-641c67a117d8 |
py-twisted -- multiple vulnerabilities |
9fccad5a-7096-11d8-873f-0020ed76ef5a |
mpg123 vulnerabilities |
9ff4c91e-328c-11d9-a9e7-0001020eed82 |
libxml -- remote buffer overflows |
9fff8dc8-7aa7-11da-bf72-00123f589060 |
apache -- mod_imap cross-site scripting flaw |
a003b74f-d7b3-11ea-9df1-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
a005aea9-47bb-11ee-8e38-002590c1f29c |
FreeBSD -- Stack overflow in ping(8) |
a0089e18-fc9e-11e4-bc58-001e67150279 |
rubygems -- request hijacking vulnerability |
a00c76d9-0c05-4d99-bef7-ae4521cb2a4d |
zeek -- potential DoS vulnerabilty |
a0128291-7690-11e6-95a8-0011d823eebd |
gnutls -- OCSP validation issue |
a0182578-6e00-11e5-a90c-0026551a22dc |
PostgreSQL -- minor security problems. |
a02c9595-e018-11dd-a765-0030843d3802 |
pdfjam -- insecure temporary files |
a0321b74-031d-485c-bb76-edd75256a6f0 |
jenkins -- Stored XSS vulnerability |
a03636f4-a29f-11ef-af48-6cc21735f730 |
PostgreSQL -- PL/Perl environment variable changes execute arbitrary code |
a03b2d9e-b3f2-428c-8f66-21092ed2ba94 |
electron{23,24} -- multiple vulnerabilities |
a03e043a-67f1-11e7-beff-6451062f0f7a |
Flash Player -- multiple vulnerabilities |
a04247f1-8d9c-11e1-93c7-00215c6a37bb |
Dokuwiki -- cross site scripting vulnerability |
a04a3c13-4932-11df-83fb-0015587e2cc1 |
ejabberd -- queue overload denial of service vulnerability |
a0509648-65ce-4a1b-855e-520a75bd2549 |
py-cinder -- unauthorized data access |
a051a4ec-3aa1-4dd1-9bdc-a61eb5700153 |
leafnode fetchnews denial-of-service triggered by truncated transmission |
a058d6fa-7325-11dc-ae10-0016179b2dd5 |
tcl/tk -- buffer overflow in ReadImage function |
a0602fa0-5c1c-11e9-abd6-001b217b3468 |
Gitlab -- Group Runner Registration Token Exposure |
a0a4e24c-4760-11e5-9391-3c970e169bc2 |
vlc -- arbitrary pointer dereference vulnerability |
a0afb4b9-89a1-11dd-a65b-00163e000016 |
squirrelmail -- Session hijacking vulnerability |
a0c45e53-ae51-11e4-8ac7-d050992ecde8 |
openldap -- two remote denial of service vulnerabilities |
a0c65049-bddd-11e2-a0f6-001060e06fd4 |
linux-flashplugin -- multiple vulnerabilities |
a0d77bc8-c6a7-11e5-96d6-14dae9d210b8 |
typo3 -- multiple vulnerabilities |
a0e74731-181b-11e5-a1cf-002590263bf5 |
cacti -- multiple security vulnerabilities |
a0e92718-6603-11db-ab90-000e35fd8194 |
mysql -- database "case-sensitive" privilege escalation |
a1050b8b-6db3-11e1-8b37-0011856a6e37 |
mozilla -- multiple vulnerabilities |
a1126054-b57c-11dd-8892-0017319806e7 |
enscript -- arbitrary code execution vulnerability |
a1134048-10c6-11e6-94fa-002590263bf5 |
libksba -- local denial of service vulnerabilities |
a11e7dd1-bed4-11ee-bdd6-4ccc6adda413 |
qt5-webengine -- Multiple vulnerabilities |
a12494c1-2af4-11e5-86ff-14dae9d210b8 |
apache24 -- multiple vulnerabilities |
a130bd8c-eafe-11e6-9ac1-a4badb2f4699 |
libebml -- multiple vulnerabilities |
a1323a76-28f1-11ed-a72a-002590c1f29c |
FreeBSD -- zlib heap buffer overflow |
a13500d0-0570-11e5-aab1-d050996490d0 |
wireshark -- multiple vulnerabilities |
a1360138-d446-11ec-8ea1-10c37b4ac2ea |
go -- syscall.Faccessat checks wrong group on Linux |
a14dee30-e3d7-11e1-a084-50e5492bd3dc |
libcloud -- possible SSL MITM due to invalid regexp used to validate target server hostname |
a163baff-3fe1-11d9-a9e7-0001020eed82 |
unarj -- long filename buffer overflow |
a183acb5-1414-11e8-9542-002590acae31 |
p5-Mojolicious -- cookie-handling vulnerability |
a1a1f81c-7c13-11ee-bcf1-f8b156b6dcc8 |
vorbistools -- heap buffer overflow in oggenc |
a1d0911f-987a-11e1-a2ef-001fd0af1a4c |
node -- private information disclosure |
a1de4ae9-6fda-11e9-9ba0-4c72b94353b5 |
gitea -- multiple vulnerabilities |
a1e03a3d-7be0-11eb-b392-20cf30e32f6d |
salt -- multiple vulnerabilities |
a1e27775-7a61-11ee-8290-a8a1599412c6 |
chromium -- multiple vulnerabilities |
a1ef3fc0-8ad0-11dc-9490-0016179b2dd5 |
dircproxy -- remote denial of service |
a20082c3-6255-11d8-80e3-0020ed76ef5a |
metamail format string bugs and buffer overflows |
a2074ac6-124c-11de-a964-0030843d3802 |
php-mbstring -- php mbstring buffer overflow vulnerability |
a207bbd8-6572-11e9-8e67-206a8a720317 |
FreeBSD -- EAP-pwd message reassembly issue with unexpected fragment |
a21037d5-2c38-11de-ab3b-0017a4cccfc6 |
xpdf -- multiple vulnerabilities |
a228c7a0-ba66-11e6-b1cf-14dae9d210b8 |
qemu -- denial of service vulnerability |
a233d51f-5d4c-11e5-9ad8-14dae9d210b8 |
openjpeg -- use-after-free vulnerability |
a23871f6-059b-11eb-8758-e0d55e2a8bf9 |
upnp -- denial of service (crash) |
a23ebf36-e8b6-4665-b0f3-4c977f9a145c |
security/py-ecdsa -- multiple issues |
a250539d-d1d4-4591-afd3-c8bdfac335d8 |
jenkins -- multiple vulnerabilities |
a2565962-1156-11eb-9c9c-d4c9ef517024 |
MariaDB -- Undisclosed vulnerability |
a258604d-f2aa-11e5-b4a9-ac220bdcec59 |
activemq -- Unsafe deserialization |
a2589511-d6ba-11e7-88dd-00e04c1ea73d |
wordpress -- multiple issues |
a25b323a-bed9-11ee-bdd6-4ccc6adda413 |
qt6-webengine -- Multiple vulnerabilities |
a25ea27b-bced-11ec-87b5-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
a264b1b0-5726-11e2-9483-14dae938ec40 |
moinmoin -- Multiple vulnerabilities |
a267cd6c-b0c4-11e5-8d13-bc5ff45d0f28 |
qemu -- stack buffer overflow while parsing SCSI commands |
a268ef4a-0b35-11d9-8a8a-000c41e2cdad |
sudo -- sudoedit information disclosure |
a27b0bb6-84fc-11ea-b5b4-641c67a117d8 |
Python -- Regular Expression DoS attack against client |
a27d234a-c7f2-11e6-ae1b-002590263bf5 |
Joomla! -- multiple vulnerabilities |
a28e8b7e-fc70-11ec-856e-d4c9ef517024 |
OpenSSL -- AES OCB fails to encrypt some bytes |
a2a2b34d-52b4-11eb-87cb-001b217b3468 |
Gitlab -- multiple vulnerabilities |
a2aa24fd-00d4-11da-bc08-0001020eed82 |
opera -- download dialog spoofing vulnerability |
a2c4d3d5-4c7b-11df-83fb-0015587e2cc1 |
pidgin -- multiple remote denial of service vulnerabilities |
a2caf7bd-a719-11ea-a857-e09467587c17 |
chromium -- multiple vulnerabilities |
a2cb7c31-9c79-11ea-a9c2-d05099c0ae8c |
unbound -- mutliple vulnerabilities |
a2d4a330-4d54-11de-8811-0030843d3802 |
wireshark -- PCNFSD Dissector Denial of Service Vulnerability |
a2f35081-8a02-11e8-8fa5-4437e6ad11c4 |
mutt -- remote code injection and path traversal vulnerability |
a2ff483f-a5c6-11e2-9601-000d601460a4 |
sieve-connect -- TLS hostname verification was not occurring |
a2ffb627-9c53-11d8-9366-0020ed76ef5a |
lha buffer overflows and path traversal issues |
a30573dc-4893-11df-a5f9-001641aeabdf |
krb5 -- remote denial of service vulnerability |
a30e5e44-5440-11d9-9e1e-c296ac722cb3 |
squid -- confusing results on empty acl declarations |
a30f1a12-117f-4dac-a1d0-d65eaf084953 |
electron{25,26} -- use after free in WebAudio |
a32ef450-9781-414b-a944-39f2f61677f2 |
py-cryptography -- allows programmers to misuse an API |
a3314314-f731-11df-a757-0011098ad87f |
horde-base -- XSS: VCARD attachments vulnerability |
a33addf6-74e6-11e4-a615-f8b156b6dcc8 |
flac -- Multiple vulnerabilities |
a3473f5a-a739-11e6-afaa-e8e0b747a45a |
chromium -- multiple vulnerabilities |
a3495e61-047f-11eb-86ea-001b217b3468 |
Gitlab -- multiple vulnerabilities |
a35f415d-572a-11e5-b0a4-f8b156b6dcc8 |
vorbis-tools, opus-tools -- multiple vulnerabilities |
a3764767-f31e-11e7-95f2-005056925db4 |
irssi -- multiple vulnerabilities |
a3929112-181b-11e5-a1cf-002590263bf5 |
cacti -- Multiple XSS and SQL injection vulnerabilities |
a395397c-c7c8-11d9-9e1e-c296ac722cb3 |
squid -- possible abuse of cachemgr.cgi |
a3a1caf5-6ba1-11ef-b9e8-b42e991fc52e |
firefox -- multiple vulnerabilities |
a3b10c9b-99d9-11ed-aa55-d05099fed512 |
shells/fish -- arbitrary code execution via git |
a3c2dee5-cdb9-11e2-b9ce-080027019be0 |
telepathy-gabble -- TLS verification bypass |
a3cef1e6-51d8-11eb-9b8d-08002728f74c |
CairoSVG -- Regular Expression Denial of Service vulnerability |
a3e24de7-3f0c-11e9-87d1-00012e582166 |
py-gunicorn -- CWE-113 vulnerability |
a40ec970-0efa-11e5-90e4-d050996490d0 |
cups -- multiple vulnerabilities |
a413ed94-836e-11d9-a9e7-0001020eed82 |
putty -- pscp/psftp heap corruption vulnerabilities |
a430e15d-f93f-11e5-92ce-002590263bf5 |
moodle -- multiple vulnerabilities |
a431676c-f86c-4371-b48a-b7d2b0bec3a3 |
electron29 -- setuid() does not affect libuv's internal io_uring |
a4372a68-652c-11e0-a25a-00151735203a |
OTRS -- Several XSS attacks possible |
a4460ac7-192c-11e5-9c01-bcaec55be5e5 |
devel/ipython -- remote execution |
a449c604-a43a-11e9-b422-fcaa147e860e |
python 3.7 -- multiple vulnerabilities |
a4598875-ec91-11e1-8bd8-0022156e8794 |
rssh -- configuration restrictions bypass |
a45d945a-cc2c-4cd7-a941-fb58fdb1b01e |
jenkins -- Privilege escalation vulnerability in bundled Spring Security library |
a460035e-d111-11e1-aff7-001fd056c417 |
libjpeg-turbo -- heap-based buffer overflow |
a467d0f9-8875-11dc-b3ba-0016179b2dd5 |
wordpress -- cross-site scripting |
a4746a86-4c89-11df-83fb-0015587e2cc1 |
e107 -- code execution and XSS vulnerabilities |
a478421e-2059-11e5-a4a5-002590263bf5 |
ansible -- enable host key checking in paramiko connection type |
a479a725-9adb-11e6-a298-14dae9d210b8 |
FreeBSD -- bhyve - privilege escalation vulnerability |
a47af810-3a17-11e1-a1be-00e0815b8da8 |
spamdyke -- STARTTLS Plaintext Injection Vulnerability |
a4815970-c5cc-11d8-8898-000d6111a684 |
rssh -- file name disclosure bug |
a48d4478-e23f-4085-8ae4-6b3a7b6f016b |
wordpress -- multiple issues |
a4955b32-ed84-11d9-8310-0001020eed82 |
wordpress -- multiple vulnerabilities |
a4a809d8-25c8-11e1-b531-00215c6a37bb |
opera -- multiple vulnerabilities |
a4b7def1-e165-11e6-9d84-90e2ba9881c8 |
Intel(R) NVMUpdate -- Intel(R) Ethernet Controller X710/XL710 NVM Security Vulnerability |
a4bd3039-9a48-11d9-a256-0001020eed82 |
xv -- filename handling format string vulnerability |
a4c9e12d-88b7-11e3-8ada-10bf48e1088e |
socat -- buffer overflow with data from command line |
a4d71e4c-7bf4-11e2-84cd-d43d7e0c7c02 |
drupal7 -- Denial of service |
a4eb38ea-cc06-11e8-ada4-408d5cf35399 |
tinc -- Buffer overflow |
a4ed6632-5aa9-11e2-8fcb-c8600054b392 |
mozilla -- multiple vulnerabilities |
a4f08579-516c-11e3-9b62-000c292e4fd8 |
samba -- ACLs are not checked on opening an alternate data stream on a file or directory |
a4f2416c-02a0-11ed-b817-10c37b4ac2ea |
go -- multiple vulnerabilities |
a4f8bb03-f52f-11ed-9859-080027083a05 |
curl -- multiple vulnerabilities |
a4fd8f53-05eb-11d9-b45d-000c41e2cdad |
mozilla -- SOAPParameter integer overflow |
a4ff3673-d742-4b83-8c2b-3ddafe732034 |
minio -- User privilege escalation |
a505d397-0758-11e7-8d8b-e8e0b747a45a |
chromium -- multiple vulnerabilities |
a512a412-3a33-11ea-af63-0800274e5f20 |
gitea -- multiple vulnerabilities |
a51ad838-2077-48b2-a136-e888a7db5f8d |
openvpn -- denial of service: client certificate validation can disconnect unrelated clients |
a522d6ac-4aed-11e6-97ea-002590263bf5 |
flash -- multiple vulnerabilities |
a52a7172-c92e-11e5-96d6-14dae9d210b8 |
socat -- diffie hellman parameter was not prime |
a537b449-2b19-11e2-b339-90e6ba652cce |
DomainKeys Identified Mail (DKIM) Verifiers may inappropriately convey message trust |
a5403af6-225e-48ba-b233-bd95ad26434a |
py-Scrapy -- cookie injection vulnerability |
a550d62c-f78d-4407-97d9-93876b6741b9 |
zeek -- several potential DoS vulnerabilities |
a5681027-8e03-11e9-85f4-6805ca0b3d42 |
phpMyAdmin -- CSRF vulnerability in login form |
a56a72bb-9f72-11d8-9585-0020ed76ef5a |
phpBB session table exhaustion |
a5742055-300a-11d9-a9e7-0001020eed82 |
p5-Archive-Zip -- virus detection evasion |
a57472ba-4d84-11ee-bf05-000c29de725b |
Python -- multiple vulnerabilities |
a5856eba-a015-11e4-a680-1c6f65c3c4ff |
polarssl -- Remote attack using crafted certificates |
a58f3fde-e4e0-11ec-8340-2d623369b8b5 |
e2fsprogs -- out-of-bounds read/write vulnerability |
a592e991-a919-11e2-ade0-8c705af55518 |
roundcube -- arbitrary file disclosure vulnerability |
a5934ba8-a376-11e5-85e9-14dae9d210b8 |
java -- multiple vulnerabilities |
a5956603-7e4f-11ee-9df6-84a93843eb75 |
OpenSSL -- DoS in DH generation |
a59afa47-c930-11dc-810c-0016179b2dd5 |
claws-mail -- insecure temporary file creation |
a59e263a-45cd-11e5-adde-14dae9d210b8 |
freexl -- integer overflow |
a5b24a6b-c37c-11e2-addb-60a44c524f57 |
otrs -- information disclosure |
a5bb7ea0-3e58-11e7-94a2-00e04c1ea73d |
Wordpress -- multiple vulnerabilities |
a5c204b5-4153-11e6-8dfe-002590263bf5 |
hive -- authorization logic vulnerability |
a5c64f6f-2af3-11ef-a77e-901b0e9408dc |
go -- multiple vulnerabilities |
a5cf3ecd-38db-11e8-8b7f-a4badb2f469b |
FreeBSD -- vt console memory disclosure |
a5d4a82a-7153-11e4-88c7-6805ca0b3d42 |
phpMyAdmin -- XSS and information disclosure vulnerabilities |
a5de43ed-bc49-11ec-b516-0897988a1c07 |
Asterisk -- func_odbc: Possible SQL Injection |
a5e13973-6c75-11ef-858b-23eeba13701a |
forgejo -- multiple vulnerabilities |
a5eb760a-753c-11d9-a36f-000a95bc6fae |
perl -- vulnerabilities in PERLIO_DEBUG handling |
a5f160fa-deee-11e4-99f8-080027ef73ec |
mailman -- path traversal vulnerability |
a5f667db-7596-11dc-8b7a-0019b944b34e |
xfs -- multiple vulnerabilities |
a60a2e95-acba-4b11-bc32-ffb47364e07d |
libgd -- Denial of servica via double free |
a60cc0e4-c7aa-11ed-8a4b-080027f5fec9 |
redis -- specially crafted MSETNX command can lead to denial-of-service |
a612c25f-788a-11ee-8d57-001b217b3468 |
Gitlab -- Vulnerabilities |
a61374fc-3a4d-11e6-a671-60a44ce6887b |
Python -- HTTP Header Injection in Python urllib |
a61ef21b-a29e-11ef-af48-6cc21735f730 |
PostgreSQL -- libpq retains an error message from man-in-the-middle |
a62c0c50-8aa0-11ee-ac0d-00e0670f2660 |
strongSwan -- vulnerability in charon-tkm |
a633651b-b309-11e9-a87f-a4badb2f4699 |
FreeBSD -- Microarchitectural Data Sampling (MDS) |
a636fc26-00d9-11e6-b704-000c292e4fd8 |
samba -- multiple vulnerabilities |
a63b15f9-97ff-11dc-9e48-0016179b2dd5 |
samba -- multiple vulnerabilities |
a63f2c06-726b-11e5-a12b-bcaec565249c |
flash -- multiple vulnerabilities |
a6427195-c2c7-11d9-89f7-02061b08fc24 |
mozilla -- privilege escalation via non-DOM property overrides |
a64aa22f-61ec-11e9-85b9-a4badb296695 |
dovecot -- json encoder crash |
a6605f4b-4067-11de-b444-001372fd0af2 |
drupal -- cross-site scripting |
a66f9be2-d519-11e7-9866-c85b763a2f96 |
xrdp -- local user can cause a denial of service |
a6713190-dfea-11dd-a765-0030843d3802 |
imap-uw -- local buffer overflow vulnerabilities |
a67c122a-b693-11e8-ac58-a4badb2f4699 |
FreeBSD -- Improper ELF header parsing |
a67e358c-0bf6-11ec-875e-901b0e9408dc |
py-matrix-synapse -- several vulnerabilities |
a6860b11-0dee-11eb-94ff-6805ca2fa271 |
powerdns-recursor -- cache pollution |
a692bffe-b6ad-11e7-a1c2-e8e0b747a45a |
chromium -- multiple vulnerabilities |
a6986f0f-3ac0-11ee-9a88-206a8a720317 |
krb5 -- Double-free in KDC TGS processing |
a6a9f9d5-205c-11e5-a4a5-002590263bf5 |
ansible -- local symlink exploits |
a6cc5753-f29e-11e5-b4a9-ac220bdcec59 |
activemq -- Web Console Cross-Site Scripting |
a6cd01fa-11bd-11e6-bb3c-9cb654ea3e1c |
jansson -- local denial of service vulnerabilities |
a6cf65ad-37d2-11ea-a1c7-b499baebfeaf |
MySQL -- Multiple vulerabilities |
a6d5d4c1-0564-11ec-b69d-4062311215d5 |
FreeBSD -- Missing error handling in bhyve(8) device models |
a6d9da4a-5d5e-11db-8faf-000c6ec775d9 |
NVIDIA UNIX driver -- arbitrary root code execution vulnerability |
a6eb239f-adbe-11e4-9fce-080027593b9a |
chromium -- multiple vulnerabilities |
a7003121-56bf-11e7-8e66-08606e46faad |
pear-Horde_Image -- remote code execution vulnerability |
a7062952-9023-11d9-a22c-0001020eed82 |
phpmyadmin -- information disclosure vulnerability |
a7080c30-91a2-11dc-b2eb-00b0d07e6c7e |
mt-daapd -- denial of service vulnerability |
a711de5c-05fa-11d9-a9b2-00061bc2ad93 |
samba3 DoS attack |
a713c0f9-ec54-11d8-9440-000347a4fa7d |
ImageMagick png vulnerability fix |
a71e7440-1ba3-11e5-b43d-002590263bf5 |
elasticsearch -- directory traversal attack with site plugins |
a733b5ca-06eb-11e6-817f-3085a9a4510d |
proftpd -- vulnerability in mod_tls |
a73518da-b2fa-11e7-98ef-d43d7ef03aa6 |
Flash Player -- Remote code execution |
a736deab-5d7d-11d8-80e3-0020ed76ef5a |
CCE contains exploitable buffer overflows |
a737eb11-5cfc-11e9-ab87-8cec4bf8fcfb |
wget -- security flaw in caching credentials passed as a part of the URL |
a73aba9a-effe-11e6-ae1b-002590263bf5 |
xen-tools -- oob access in cirrus bitblt copy |
a75929bd-b6a4-11ed-bad6-080027f5fec9 |
emacs -- multiple vulnerabilities |
a763a0e7-c3d9-11e5-b5fe-002590263bf5 |
privoxy -- multiple vulnerabilities |
a7706414-1be7-11e2-9aad-902b343deec9 |
Wireshark -- Multiple Vulnerabilities |
a7732806-0b2a-11ec-836b-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
a77849a5-696f-11d9-ae49-000c41e2cdad |
mozilla -- insecure permissions for some downloaded files |
a78299e7-9ef3-11da-b410-000e0c2e438a |
libtomcrypt -- weak signature scheme with ECC keys |
a7975581-ee26-11e1-8bd8-0022156e8794 |
inn -- plaintext command injection into encrypted channel |
a7a4e96c-ba50-11e5-9728-002590263bf5 |
kibana4 -- XSS vulnerability |
a7b97d26-9792-11eb-b87a-901b0ef719ab |
FreeBSD -- jail escape possible by mounting over jail root |
a7bfd423-484f-11d9-a9e7-0001020eed82 |
cscope -- symlink attack vulnerability |
a7c60af1-b3f1-11eb-a5f7-a0f3c100ae18 |
ImageMagick7 -- multiple vulnerabilities |
a7dd4c2d-77e4-46de-81a2-c453c317f9de |
couchdb -- user privilege escalation |
a7e0d783-131b-11d9-bc4a-000c41e2cdad |
mozilla -- users may be lured into bypassing security dialogs |
a7f2e9c6-de20-11e5-8458-6cc21735f730 |
xerces-c3 -- Parser Crashes on Malformed Input |
a80c6273-988c-11ec-83ac-080027415d17 |
cyrus-sasl -- Fix off by one error |
a81161d2-790f-11e1-ac16-e0cb4e266481 |
phpMyAdmin -- Path disclosure due to missing verification of file presence |
a8118db0-cac2-11ec-9288-0800270512f4 |
rainloop -- cross-site-scripting (XSS) vulnerability |
a813a219-d2d4-11da-a672-000e0c2e438a |
zgv, xzgv -- heap overflow vulnerability |
a81746a1-c2c7-11d9-89f7-02061b08fc24 |
mozilla -- "Wrapped" javascript: urls bypass security checks |
a8326b61-eda0-4c03-9a5b-49ebd8f41c1a |
electron{26,27} -- multiple vulnerabilities |
a83f25df-d775-11e0-8bf1-003067b2972c |
XSS issue in MantisBT |
a8448963-e6f5-11ee-a784-dca632daf43b |
databases/mongodb* -- Improper Certificate Validation |
a851b305-1bc3-11e3-95b7-00e0814cab4e |
django -- multiple vulnerabilities |
a863aa74-24be-11da-8882-000e0c33c2dc |
X11 server -- pixmap allocation vulnerability |
a8654f1d-770d-11eb-b87a-901b0ef719ab |
FreeBSD -- login.access fails to apply rules |
a8674c14-83d7-11db-88d5-0012f06707f0 |
ruby -- cgi.rb library Denial of Service |
a86f30e7-dce7-11da-bf3f-02e081235dab |
fswiki -- XSS vulnerability |
a876df84-0fef-11db-ac96-000c6ec775d9 |
twiki -- multiple file extensions file upload vulnerability |
a8818f7f-9182-11e2-9bdf-d48564727302 |
optipng -- use-after-free vulnerability |
a8864f8f-aa9e-11e1-a284-0023ae8e59f0 |
databases/postgresql*-server -- crypt vulnerabilities |
a891c5b4-3d7a-4de9-9c71-eef3fd698c77 |
mozilla -- multiple vulnerabilities |
a89b76a7-f6bd-11dd-94d9-0030843d3802 |
amaya -- multiple buffer overflow vulnerabilities |
a8af7d70-8007-11db-b280-0008743bf21a |
kronolith -- arbitrary local file inclusion vulnerability |
a8ba7358-4b02-11e9-9ba0-4c72b94353b5 |
gitea -- XSS vulnerability |
a8c8001b-216c-11e7-80aa-005056925db4 |
dovecot -- Dovecot DoS when passdb dict was used for authentication |
a8d8713e-dc83-11da-a22b-000c6ec775d9 |
mysql50-server -- COM_TABLE_DUMP arbitrary code execution |
a8d87c7a-d1b1-11e9-a616-0992a4564e7c |
oniguruma -- multiple vulnerabilities |
a8d94711-0d03-11ea-87ca-001999f8d30b |
asterisk -- SIP request can change address of a SIP peer |
a8de962a-cf15-11e5-805c-5453ed2e2b49 |
py-imaging, py-pillow -- Buffer overflow in PCD decoder |
a8e9d834-a916-11e6-b9b4-bcaec524bf84 |
lives -- insecure files permissions |
a8ec4db7-a398-11e5-85e9-14dae9d210b8 |
bind -- multiple vulnerabilities |
a8f25565-109e-11e8-8d41-97657151f8c2 |
uwsgi -- a stack-based buffer overflow |
a8fb8e3a-730d-11ee-ab61-b42e991fc52e |
squid -- Multiple vulnerabilities |
a90d040e-f5b0-11e9-acc4-4576b265fda6 |
Loofah -- XSS vulnerability |
a928960a-2bdc-11e5-86ff-14dae9d210b8 |
libav -- divide by zero |
a92dcc5c-e05c-11e9-b589-10c37b4ac2ea |
go -- invalid headers are normalized, allowing request smuggling |
a92ed304-716c-11e4-b008-001999f8d30b |
asterisk -- Multiple vulnerabilities |
a9350df8-5157-11e5-b5c1-e8e0b747a45a |
chromium -- multiple vulnerabilities |
a93c3287-d8fd-11e6-be5c-001fbc0f280f |
Ansible -- Command execution on Ansible controller from host |
a95092a6-f8f1-11e0-a7ea-00215c6a37bb |
asterisk -- remote crash vulnerability in SIP channel driver |
a955cdb7-d089-11ea-8c6f-080027eedc6a |
FreeRDP -- Integer overflow in RDPEGFX channel |
a994ff7d-5b3f-11ec-8398-6c3be5272acd |
Grafana -- Directory Traversal |
a99923a9-768c-11e9-885a-6451062f0f7a |
Flash Player -- arbitrary code execution |
a9bcaf57-4a7b-11e6-97f7-5453ed2e2b49 |
p7zip -- heap overflow vulnerability |
a9c51caf-6603-11db-ab90-000e35fd8194 |
mysql -- database suid privilege escalation |
a9c5e89d-2d15-11ec-8363-0022489ad614 |
Node.js -- October 2021 Security Releases |
a9c6e9be-61fb-11eb-b87a-901b0ef719ab |
FreeBSD -- Uninitialized kernel stack leaks in several file systems |
a9d456b4-fe4c-11e4-ad15-00262d5ed8ee |
chromium -- multiple vulnerabilities |
a9e466e8-4144-11e8-a292-00e04c1ea73d |
drupal -- Drupal Core - Multiple Vulnerabilities |
a9eeb3a3-ca5e-11ea-930b-080027846a02 |
Python -- multiple vulnerabilities |
a9f60ce8-a4e0-11e5-b864-14dae9d210b8 |
joomla -- multiple vulnerabilities |
aa1aefe3-6e37-47db-bfda-343ef4acb1b5 |
Mozilla -- multiple vulnerabilities |
aa1c7af9-570e-11ef-a43e-b42e991fc52e |
mozilla firefox -- protocol information guessing |
aa2b65e4-2f63-11ef-9cab-4ccc6adda413 |
qt5-webengine -- Multiple vulnerabilities |
aa4d3d73-ef17-11e1-b593-00269ef07d24 |
Calligra, KOffice -- input validation failure |
aa4f86af-3172-11e2-ad21-20cf30e32f6d |
YUI JavaScript library -- JavaScript injection exploits in Flash components |
aa5bc971-d635-11e0-b3cf-080027ef73ec |
nss/ca_root_nss -- fraudulent certificates issued by DigiNotar.nl |
aa646c01-ea0d-11eb-9b84-d4c9ef517024 |
cURL -- Multiple vulnerabilities |
aa71daaa-9f8c-11e1-bd0a-0082a0c18826 |
pidgin-otr -- format string vulnerability |
aa743ee4-0f16-11e8-8fd2-10bf48e1088e |
electrum -- JSONRPC vulnerability |
aa7764af-0b5e-4ddc-bc65-38ad697a484f |
rubygem-dragonfly -- arbitrary code execution |
aaa9f3db-13b5-4a0e-9ed7-e5ab287098fa |
mozilla -- multiple vulnerabilities |
aaab03be-932d-11e7-92d8-4b26fc968492 |
Django -- possible XSS in traceback section of technical 500 debug page |
aab187d4-e0f3-11df-b1ea-001999392805 |
opera -- multiple vulnerabilities |
aaba17aa-782e-4843-8a79-7756cfa2bf89 |
jenkins -- multiple vulnerabilities |
aae2ab45-2d21-4cd5-a53b-07ec933400ac |
electron24 -- multiple vulnerabilities |
aae8fecf-888e-11ea-9714-08002718de91 |
py-yaml -- FullLoader (still) exploitable for arbitrary command execution |
aaea7b7c-4887-11ee-b164-001b217b3468 |
Gitlab -- Vulnerabilities |
aaedf196-6436-11e7-8b49-002590263bf5 |
codeigniter -- input validation bypass |
ab02f981-ab9e-11e6-ae1b-002590263bf5 |
moodle -- multiple vulnerabilities |
ab04cb0b-c533-11e7-8da5-001999f8d30b |
asterisk -- Buffer overflow in CDR's set user |
ab099d2c-8c8c-11e9-8ba7-6451062f0f7a |
Flash Player -- arbitrary code execution |
ab0bab3c-2927-11ee-8608-07b8d3947721 |
gitea -- Disallow dangerous URL schemes |
ab254c9d-9c36-11ef-8c1c-a8a1599412c6 |
chromium -- multiple security fixes |
ab2575d6-39f0-11dc-b8cc-000fea449b8a |
tomcat -- XSS vulnerability in sample applications |
ab2d7f62-af9d-11ec-a0b8-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
ab38d9f8-b787-11e8-8e7a-00e04c1ea73d |
mybb -- vulnerabilities |
ab3e98d9-8175-11e4-907d-d050992ecde8 |
bind -- denial of service vulnerability |
ab437561-47c0-11ee-8e38-002590c1f29c |
FreeBSD -- bhyve privileged guest escape via fwctl |
ab4e6f65-a142-11ef-84e9-901b0e9408dc |
element-web -- several vulnerabilities |
ab804e60-d693-11e6-9171-14dae9d210b8 |
moinmoin -- XSS vulnerabilities |
ab881a74-c016-4e6d-9f7d-68c8e7cedafb |
xorg-server -- Multiple Issues |
ab8dbe98-6be4-11db-ae91-0012f06707f0 |
ruby -- cgi.rb library Denial of Service |
ab947396-9018-11e6-a590-14dae9d210b8 |
openoffice -- information disclosure vulnerability |
ab9be2c8-ef91-11e0-ad5a-00215c6a37bb |
quagga -- multiple vulnerabilities |
ab9c559e-115a-11d9-bc4a-000c41e2cdad |
mozilla -- BMP decoder vulnerabilities |
aba28514-a414-11ef-98e7-84a93843eb75 |
Vaultwarden -- Multiple vulnerabilities |
abaaecda-ea16-43e2-bad0-d34a9ac576b1 |
Dovecot -- improper input validation |
abad20bf-c1b4-11e3-a5ac-001b21614864 |
OpenLDAP -- incorrect handling of NULL in certificate Common Name |
abc3ef37-95d4-11ea-9004-25fadb81abf4 |
json-c -- integer overflow and out-of-bounds write via a large JSON file |
abcacb5a-e7f1-11dd-afcd-00e0815b8da8 |
ipset-tools -- Denial of Service Vulnerabilities |
abcc5ad3-7e6a-11e7-93f7-d43d7e971a1b |
GitLab -- two vulnerabilities |
abe47a5a-e23c-11d8-9b0a-000347a4fa7d |
Mozilla certificate spoofing |
abeb9b64-ce50-11db-bc24-0016179b2dd5 |
mplayer -- DMO File Parsing Buffer Overflow Vulnerability |
abed4ff0-7da1-4236-880d-de33e4895315 |
moinmoin -- multiple vulnerabilities |
abef280d-d829-11e2-b71c-8c705af55518 |
FreeBSD -- Privilege escalation via mmap |
abfc932e-1ba8-11e8-a944-54ee754af08e |
chromium -- vulnerability |
ac025402-4cbc-4177-bd99-c20c03a07f23 |
electron{29,30} -- multiple vulnerabilities |
ac0900df-31d0-11e6-8e82-002590263bf5 |
botan -- multiple vulnerabilities |
ac18046c-9b08-11e6-8011-005056925db4 |
Axis2 -- Security vulnerabilities on dependency Apache HttpClient |
ac256985-b6a9-11e6-a3bf-206a8a720317 |
subversion -- Unrestricted XML entity expansion in mod_dontdothat and Subversionclients using http(s) |
ac4b9d18-67a9-11d8-80e3-0020ed76ef5a |
fetchmail -- denial-of-service vulnerability |
ac5ec8e3-3c6c-11e5-b921-00a0986f28c4 |
wordpress -- Multiple vulnerability |
ac619d06-3ef8-11d9-8741-c942c075aa41 |
jdk/jre -- Security Vulnerability With Java Plugin |
ac7da39b-4405-11e8-afbe-6805ca0b3d42 |
phpmyadmin -- CSRF vulnerability allowing arbitrary SQL execution |
ac91cf5e-d098-11ec-bead-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
ac98d090-45cc-11e5-adde-14dae9d210b8 |
freexl -- multiple vulnerabilities |
aca0d7e0-e38a-11e1-999b-e0cb4e266481 |
phpMyAdmin -- Path disclosure due to missing library |
acab2f88-7490-11e1-865f-00e0814cab4e |
Apache Traffic Server -- heap overflow vulnerability |
acb4eab6-3f6d-11ef-8657-001b217b3468 |
Gitlab -- vulnerabilities |
acd5d037-1c33-11e5-be9c-6805ca1d3bb1 |
qemu -- Heap overflow in QEMU PCNET controller, allowing guest to host escape (CVE-2015-3209) |
acf80afa-c3ef-11dd-a721-0030843d3802 |
vlc -- arbitrary code execution in the RealMedia processor |
ad05a737-14bd-11ee-8290-a8a1599412c6 |
chromium -- multiple vulnerabilities |
ad08d14b-ca3d-11df-aade-0050568f000c |
FreeBSD -- Improper environment sanitization in rtld(1) |
ad2eeab6-ca68-4f06-9325-1937b237df60 |
consul -- vulnerability in embedded DNS library |
ad2f3337-26bf-11d9-9289-000c41e2cdad |
xpdf -- integer overflow vulnerabilities |
ad3451b9-23e0-11ea-8b36-f1925a339a82 |
e2fsprogs -- maliciously corrupted file systems can trigger buffer overruns in the quota code used by e2fsck |
ad37a349-ebb7-11ec-b9f7-21427354249d |
mitmproxy -- Insufficient Protection against HTTP Request Smuggling |
ad479f89-9020-11e6-a590-14dae9d210b8 |
file-roller -- path traversal vulnerability |
ad4a00fa-0157-11dd-8bd3-001372ae3ab9 |
opera -- multiple vulnerabilities |
ad4d3871-1a0d-11e5-b43d-002590263bf5 |
logstash-forwarder and logstash -- susceptibility to POODLE vulnerability |
ad4f6ca4-6720-11d8-9fb5-000a95bc6fae |
lbreakout2 vulnerability in environment variable handling |
ad5e70bb-c429-11d9-ac59-02061b08fc24 |
gaim -- MSN remote DoS vulnerability |
ad61657d-26b9-11d9-9289-000c41e2cdad |
gaim -- Content-Length header denial-of-service vulnerability |
ad747a01-1fee-11e4-8ff1-f0def16c5c1b |
nginx -- inject commands into SSL session vulnerability |
ad74a1bd-16d2-11d9-bc4a-000c41e2cdad |
php -- php_variables memory disclosure |
ad792169-2aa4-11eb-ab71-0022489ad614 |
Node.js -- November 2020 Security Releases |
ad82b0e9-c3d6-11e5-b5fe-002590263bf5 |
privoxy -- malicious server spoofing as proxy vulnerability |
ad91ee9b-d599-11e5-8fa8-14dae9d210b8 |
adminer -- XSS vulnerability |
ad9b77f6-4163-11e6-b05b-14dae9d210b8 |
icingaweb2 -- remote code execution |
ad9d2518-3471-4737-b60b-9a1f51023b28 |
mailman -- password disclosure |
ada8db8a-8471-11e9-8170-0050562a4d7b |
buildbot -- OAuth Authentication Vulnerability |
adbb32d9-7ac5-11e5-b35a-002590263bf5 |
Joomla! -- Core - XSS Vulnerability |
adcbdba2-4c27-11e3-9848-98fc11cdc4f5 |
linux-flashplugin -- multiple vulnerabilities |
adccefd1-7080-11e6-a2cb-c80aa9043978 |
openssh -- sshd -- remote valid user discovery and PAM /bin/login attack |
add683be-bd76-11ec-a06f-d4c9ef517024 |
MySQL -- Multiple vulnerabilities |
addad6de-d752-11e7-99bf-00e04c1ea73d |
mybb -- multiple vulnerabilities |
addc71b8-6024-11ef-86a1-8c164567ca3c |
nginx -- Vulnerability in the ngx_http_mp4_module |
adffe51e-9df5-11ef-a660-d85ed309193e |
lrzsz -- Integer overflow in zmodem, crash and information leak |
adffe823-e692-4921-ae9c-0b825c218372 |
graphite2 -- multiple vulnerabilities |
ae0e5835-3cad-11e0-b654-00215c6a37bb |
PivotX -- administrator password reset vulnerability |
ae0ee356-6ae1-11ee-bfb6-8c164567ca3c |
libcue -- out-of-bounds array access |
ae132c6c-d716-11ed-956f-7054d21a9e2a |
py-tensorflow -- denial of service vulnerability |
ae2e7871-80f6-11ea-bafd-815569f3852d |
ansible - Vault password leak from temporary file |
ae2fa87c-4bca-4138-8be1-67ce2a19b3a8 |
rubygem-actionpack -- Denial of Service |
ae377aeb-9ed4-11e5-8f5c-002590263bf5 |
redmine -- CSRF protection bypass |
ae5722a6-f5f0-11ec-856e-d4c9ef517024 |
cURL -- Multiple vulnerabilities |
ae599263-bca2-11ea-b78f-b42e99a1b9c3 |
samba -- Multiple Vulnerabilities |
ae6ec9b8-2f43-4d02-8129-c6a3a53ef09d |
xview -- multiple buffer overflows in xv_parse_one |
ae7124ff-547c-11db-8f1a-000a48049292 |
openldap -- slapd acl selfwrite Security Issue |
ae7b7f65-05c7-11d9-b45d-000c41e2cdad |
webmin -- insecure temporary file creation at installation time |
ae8b1445-6833-11ee-b06f-0050569ceb3a |
Privilege Escalation from technician to super-admin in GLPI |
ae8c09cb-32da-11e5-a4a5-002590263bf5 |
elasticsearch -- directory traversal attack via snapshot API |
ae9cb9b8-a203-11e6-a265-3065ec8fd3ec |
chromium -- out-of-bounds memory access |
ae9fb0d7-c4dc-11da-b2fb-000e0c2e438a |
netpbm -- buffer overflow in pnmtopng |
aea8d90e-b0c1-11e5-8d13-bc5ff45d0f28 |
qemu -- code execution on host machine |
aeb4c85b-3600-11ed-b52d-589cfc007716 |
puppetdb -- Potential SQL injection |
aeb7874e-8df1-11e6-a082-5404a68ad561 |
mkvtoolnix -- code execution via specially crafted files |
aeb962f6-ab8d-11e2-b3f5-003067c2616f |
tinc -- Buffer overflow |
aec9cbe0-3b0f-11eb-af2a-080027dbe4b7 |
glpi -- able to read any token through API user endpoint |
aecee357-739e-11e1-a883-001cc0a36e12 |
gnutls -- possible overflow/Denial of service vulnerabilities |
aed343b4-5480-11da-b579-001125afbed7 |
Macromedia flash player -- swf file handling arbitrary code |
aed44c4e-c067-11e1-b5e0-000c299b62e1 |
FreeBSD -- Privilege escalation when returning from kernel |
af0296be-2455-11d8-82e5-0020ed76ef5a |
fetchmail -- address parsing vulnerability |
af065e47-5d62-11ee-bbae-1c61b4739ac9 |
xrdp -- unchecked access to font glyph info |
af19ecd0-0f6a-11e7-970f-002590263bf5 |
xen-tools -- Cirrus VGA Heap overflow via display refresh |
af2745c0-c3e0-11dd-a721-0030843d3802 |
mantis -- php code execution vulnerability |
af38cfec-27e7-11e5-a4a5-002590263bf5 |
xen-tools -- Potential unintended writes to host MSI message data field via qemu |
af485ef4-1c58-11e8-8477-d05099c0ae8c |
ntp -- multiple vulnerabilities |
af61b271-9e47-4db0-a0f6-29fb032236a3 |
zookeeper -- Denial Of Service |
af747389-42ba-11d9-bd37-00065be4b5b6 |
mod_access_referer -- null pointer dereference vulnerability |
af7fbd91-29a1-11e5-86ff-14dae9d210b8 |
php -- use-after-free vulnerability |
af8dba15-f4cc-11da-87a1-000c6ec775d9 |
dokuwiki -- spellchecker remote PHP code execution |
af8e3a0c-5009-11dc-8a43-003048705d5a |
rsync -- off by one stack overflow |
af9018b6-a4f5-11da-bb41-0011433a9404 |
squirrelmail -- multiple vulnerabilities |
afa018d9-8557-11ea-a5e2-d4c9ef517024 |
Nextcloud -- multiple vulnerabilities |
afc60484-0652-440e-b01a-5ef814747f06 |
ruby -- multiple vulnerabilities |
afdc7579-d023-11eb-bcad-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
afdf500f-c1f6-11db-95c5-000c6ec775d9 |
snort -- DCE/RPC preprocessor vulnerability |
b018121b-7a4b-11e6-bf52-b499baebfeaf |
cURL -- Escape and unescape integer overflows |
b019585a-bfea-11ec-b46c-b42e991fc52e |
zgrep -- arbitrary file write |
b02c1d80-e1bb-11d9-b875-0001020eed82 |
trac -- file upload/download vulnerability |
b036faba-edd8-11e8-b3b7-00e04c1ea73d |
phpmailer -- Multiple vulnerability |
b0374722-3912-11ef-a77e-901b0e9408dc |
go -- net/http: denial of service due to improper 100-continue handling |
b058380e-21a4-11ef-8a0f-a8a1599412c6 |
chromium -- multiple security fixes |
b060ee50-daba-11e3-99f2-bcaec565249c |
libXfont -- X Font Service Protocol and Font metadata file handling issues |
b0628e53-092a-4037-938b-29805a7cd31b |
mercurial -- multiple issues |
b073677f-253a-41f9-bf2b-2d16072a25f6 |
minio -- MITM attack |
b07bdd3c-0809-11eb-a3a4-0019dbb15b3f |
Payara -- path trasversal flaw via either loc/con parameters in Eclipse Mojarra |
b07f3254-f83a-11dd-85a4-ea653f0746ab |
pyblosxom -- atom flavor multiple XML injection vulnerabilities |
b088bf48-da3b-11da-93e0-00123ffe8333 |
clamav -- Freshclam HTTP Header Buffer Overflow Vulnerability |
b0911985-6e2a-11d9-9557-000a95bc6fae |
web browsers -- window injection vulnerabilities |
b092bd4f-1b16-11ec-9d9d-0022489ad614 |
Node.js -- August 2021 Security Releases |
b09d77d0-b27c-48ae-b69b-9641bb68b39e |
electron -- vulnerability |
b0c83e1a-8153-11ec-84f9-641c67a117d8 |
varnish -- Request Smuggling Vulnerability |
b0d61f73-0e11-11db-a47b-000c2957fdf1 |
trac -- reStructuredText breach of privacy and denial of service vulnerability |
b0da85af-21a3-4c15-a137-fe9e4bc86002 |
ffmpeg -- multiple vulnerabilities |
b0e1fa2b-9c86-11ed-9296-002b67dfc673 |
re2c -- uncontrolled recursion |
b0e54dc1-45d2-11e5-adde-14dae9d210b8 |
django -- multiple vulnerabilities |
b0e76877-67a8-11d8-80e3-0020ed76ef5a |
mailman denial-of-service vulnerability in MailCommandHandler |
b0f3ab1f-1f3b-11e2-8fe9-0022156e8794 |
Exim -- remote code execution |
b0f49cb9-6736-11ec-9eea-589cfc007716 |
OpenSearch -- Log4Shell |
b10d1afa-6087-11ed-8c5e-641c67a117d8 |
varnish -- Request Smuggling Vulnerability |
b1194286-958e-11eb-9c34-080027f515ea |
curl -- Automatic referer leaks credentials |
b11ab01b-6e19-11e6-ab24-080027ef73ec |
mailman -- CSRF protection enhancements |
b12a341a-0932-11ea-bf09-080027e0baa0 |
gitea -- multiple vulnerabilities |
b13414c9-50ba-11e0-975a-000c29cc39d3 |
hiawatha -- integer overflow in Content-Length header parsing |
b13af778-f4fc-11e4-a95d-ac9e174be3af |
Vulnerability in HWP document filter |
b14a6ddc-6821-11ee-b06f-0050569ceb3a |
GLPI vulnerable to reflected XSS in search pages |
b162b218-c547-4ba2-ae31-6fdcb61bc763 |
puppet -- Unauthenticated Remote Code Execution Vulnerability |
b168ddea-105a-11db-ac96-000c6ec775d9 |
samba -- memory exhaustion DoS in smbd |
b17bce48-b7c6-11ed-b304-080027f5fec9 |
redis -- multiple vulnerabilities |
b17c86b9-e52e-11e9-86e9-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
b180d1fb-dac6-11e6-ae1b-002590263bf5 |
wordpress -- multiple vulnerabilities |
b19da422-1e02-11e5-b43d-002590263bf5 |
cups-filters -- buffer overflow in texttopdf size allocation |
b1aa54ae-74cb-42a0-b462-cbb6831c5c50 |
RabbitMQ -- Denial of Service in AMQP1.0 plugin |
b1ac663f-3aa9-11ee-b887-b42e991fc52e |
typo3 -- multiple vulnerabilities |
b1b039ec-dbfc-11ee-9165-901b0e9408dc |
go -- multiple vulnerabilities |
b1b5c125-2308-11dc-b91a-001921ab2fa4 |
evolution-data-server -- remote execution of arbitrary code vulnerability |
b1b6d623-83e4-11ec-90de-1c697aa5a594 |
FreeBSD -- vt console buffer overflow |
b1bcab7d-1880-11dd-a914-0016179b2dd5 |
sdl_image -- buffer overflow vulnerabilities |
b1ca65e6-5aaf-11de-bc9b-0030843d3802 |
pidgin -- multiple vulnerabilities |
b1d6b383-dd51-11ea-a688-7b12871ef3ad |
ilmbase, openexr -- v2.5.3 is a patch release with various bug/security fixes |
b1e8c810-01d0-11da-bc08-0001020eed82 |
sylpheed -- MIME-encoded file name buffer overflow vulnerability |
b1f7d52f-fc42-48e8-8403-87d4c9d26229 |
mozilla -- multiple vulnerabilities |
b202e4ce-3114-11e5-aa32-0026551a22dc |
shibboleth-sp -- DoS vulnerability |
b206dd82-ac67-11d9-a788-0001020eed82 |
openoffice -- DOC document heap overflow vulnerability |
b21790a5-02fb-11dd-bd06-0017319806e7 |
powerdns-recursor -- DNS cache poisoning |
b22b016b-b633-11e5-83ef-14dae9d210b8 |
librsync -- collision vulnerability |
b22d6d4c-53b9-11e9-9310-28d244aee256 |
znc -- Denial of Service |
b2383758-5f15-11db-ae08-0008743bf21a |
drupal -- multiple XSS vulnerabilities |
b2407db1-d79f-11ec-a15f-589cfc0f81b0 |
clamav -- Multiple vulnerabilities |
b2487d9a-0c30-11e6-acd0-d050996490d0 |
ntp -- multiple vulnerabilities |
b2571f88-a867-11dc-a6f0-00a0cce0781e |
smbftpd -- format string vulnerability |
b2765c89-a052-11ee-bed2-596753f1a87c |
gitea -- Prefix Truncation Attack against ChaCha20-Poly1305 and Encrypt-then-MAC aka Terrapin |
b278783f-5c1d-11ed-a21f-001fc69cd6dc |
pixman -- heap overflow |
b2789b2d-d521-11e9-86e9-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
b28adc5b-6693-11e7-ad43-f0def16c5c1b |
nginx -- a specially crafted request might result in an integer overflow |
b2952517-07e5-4d19-8850-21c5b7e0623f |
libzip -- denial of service |
b299417a-5725-11ec-a587-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
b2a1a3b5-ed95-11d9-8310-0001020eed82 |
net-snmp -- remote DoS vulnerability |
b2a40507-5c88-11e0-9e85-00215af774f0 |
quagga -- two DoS vulnerabilities |
b2a4c5f1-f1fe-11ec-bcd2-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
b2b83761-6a09-11ea-92ab-00163e433440 |
FreeBSD -- Insufficient ixl(4) ioctl(2) privilege checking |
b2caae55-dc38-11ee-96dc-001b217b3468 |
Gitlab -- Vulnerabilities |
b2cfb400-1df0-11d9-a859-0050fc56d258 |
icecast -- Cross-Site Scripting Vulnerability |
b2d248ad-88f6-11d9-aa18-0001020eed82 |
cyrus-imapd -- multiple buffer overflow vulnerabilities |
b2e6d1d6-1339-11d9-bc4a-000c41e2cdad |
mozilla -- scripting vulnerabilities |
b2eaa7c2-e64a-11df-bc65-0022156e8794 |
Wireshark -- DoS in the BER-based dissectors |
b2f09169-55af-11e0-9d6f-000f20797ede |
mozilla -- update to HTTPS certificate blacklist |
b2f1f86f-20e6-11ec-a574-080027eedc6a |
nexus2-oss -- NXRM2 Directory Traversal vulnerability |
b2f4ab91-0e6b-11e9-8700-001b217b3468 |
Gitlab -- Multiple vulnerabilities |
b2f9573a-008c-11ea-9801-10c37b4ac2ea |
nexus2-oss -- Multiple vulerabilities |
b2ff68b2-9f29-11db-a4e4-0211d87675b7 |
mplayer -- buffer overflow in the code for RealMedia RTSP streams. |
b318dc8c-6756-11db-83c3-000c6ec775d9 |
screen -- combined UTF-8 characters vulnerability |
b31a1088-460f-11de-a11a-0022156e8794 |
GnuTLS -- multiple vulnerabilities |
b31f7029-817c-4c1f-b7d3-252de5283393 |
py-suds -- vulnerable to symlink attacks |
b330db5f-7225-11eb-8386-001999f8d30b |
asterisk -- Remote crash in res_pjsip_diversion |
b339992e-6059-11ef-8a0f-a8a1599412c6 |
chromium -- multiple security fixes |
b33fb1e0-4c37-11e7-afeb-0011d823eebd |
GnuTLS -- Denial of service vulnerability |
b3435b68-9ee8-11e1-997c-002354ed89bc |
sudo -- netmask vulnerability |
b34c1947-a749-11ed-b24b-1c61b4739ac9 |
TightVNC -- Muliple Vulnerabilities |
b3531fe1-2b03-11df-b6db-00248c9b4be7 |
drupal -- multiple vulnerabilities |
b360b120-74b1-11ea-a84a-4c72b94353b5 |
Apache -- Multiple vulnerabilities |
b3695b08-3b3a-11eb-af2a-080027dbe4b7 |
glpi -- Public GLPIKEY can be used to decrypt any data |
b371db92-fe34-11ea-b90e-6805ca2fa271 |
powerdns -- Leaking uninitialised memory through crafted zone records |
b384cc5b-8d56-11e1-8d7b-003067b2972c |
wordpress -- multiple vulnerabilities |
b38e8150-0535-11e8-96ab-0800271d4b9c |
tiff -- multiple vulnerabilities |
b396cf6c-62e6-11e7-9def-b499baebfeaf |
oniguruma -- multiple vulnerabilities |
b39bdc06-ee42-11dc-8678-00a0cce0781e |
dovecot -- security hole in blocking passdbs |
b3aae7ea-3aef-11eb-af2a-080027dbe4b7 |
glpi -- SQL injection for all helpdesk instances |
b3affee8-04d1-11ef-8928-901b0ef714d4 |
py-social-auth-app-django -- Improper Handling of Case Sensitivity |
b3b8d491-0fbb-11e3-8c50-1c6f65c11ee6 |
cacti -- allow remote attackers to execute arbitrary SQL commands |
b3cd00f7-c0c5-452d-87bc-086c5635333e |
mailman -- generated passwords are poor quality |
b3e04661-2a0a-11e8-9e63-3085a9a47796 |
slurm-wlm -- SQL Injection attacks against SlurmDBD |
b3edc7d9-9af5-4daf-88f1-61f68f4308c2 |
Jupyter Notebook -- vulnerability |
b3f77aae-241c-11ee-9684-c11c23f7b0f9 |
gitea -- multiple issues |
b3f9f8ef-b1bb-11e5-9728-002590263bf5 |
qemu -- denial of service vulnerability in MegaRAID SAS HBA emulation |
b3fcb387-de4b-11e2-b1c6-0025905a4771 |
mozilla -- multiple vulnerabilities |
b3fd12ea-917a-11ed-acbe-b42e991fc52e |
cassandra3 -- jBCrypt integer overflow |
b4051b52-58fa-11e2-853b-00262d5ed8ee |
rubygem-rails -- SQL injection vulnerability |
b428e6b3-926c-11e1-8d7b-003067b2972c |
portupgrade-devel -- lack of distfile checksums |
b42e8c32-34f6-11dc-9bc9-001921ab2fa4 |
linux-flashplugin -- critical vulnerabilities |
b43004b8-6a53-11df-bc7b-0245fb008c0b |
ziproxy -- atypical huge picture files vulnerability |
b4578647-c12b-11e5-96d6-14dae9d210b8 |
bind -- denial of service vulnerability |
b464f61b-84c7-4e1c-8ad4-6cf9efffd025 |
clamav -- multiple vulnerabilities |
b46f3a1e-a052-11de-a649-000c2955660f |
xapian-omega -- cross-site scripting vulnerability |
b471130b-fb86-11eb-87db-6cc21735f730 |
PostgreSQL server -- Memory disclosure in certain queries |
b4892b5b-fb1c-11d9-96ba-00909925db3e |
egroupware -- multiple cross-site scripting (XSS) and SQL injection vulnerabilities |
b48e7b14-052a-11ea-a1de-53b029d2b061 |
libmad -- multiple vulnerabilities |
b495af21-9e10-11ea-9e83-0cc47ac16c9d |
qmail -- 64 bit integer overflows with possible remote code execution on large SMTP requests |
b4af3ede-36e9-11d9-a9e7-0001020eed82 |
twiki -- arbitrary shell command execution |
b4b7ec7d-ca27-11e7-a12d-6cc21735f730 |
shibboleth2-sp -- "Dynamic" metadata provider plugin issue |
b4d94fa0-6e38-11d9-9e1e-c296ac722cb3 |
squid -- possible cache-poisoning via malformed HTTP responses |
b4db7d78-bb62-4f4c-9326-6e9fc2ddd400 |
jenkins -- CSRF protection bypass vulnerability |
b4e5f782-442d-11ea-9ba9-206a8a720317 |
sudo -- Potential bypass of Runas user restrictions |
b4ecf774-eb01-11e6-9ac1-a4badb2f4699 |
guile2 -- multiple vulnerabilities |
b4ef02f4-549f-11ed-8ad9-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
b4f0ad36-94a5-11e8-9007-080027ac955c |
mailman -- content spoofing with invalid list names in web UI |
b4f8be9e-56b2-11e1-9fb7-003067b2972c |
Python -- DoS via malformed XML-RPC / HTTP POST request |
b50913ce-f4a7-11e1-b135-003067b2972c |
bitcoin -- denial of service |
b50cbbc0-7fb2-11e2-9c5a-000d601460a4 |
otrs -- XSS vulnerability in Internet Explorer could lead to remote code execution |
b50f53ce-2151-11e6-8dd3-002590263bf5 |
mediawiki -- multiple vulnerabilities |
b51cfaea-e919-11ec-9fba-080027240888 |
py-numpy -- Missing return-value validation of the function PyArray_DescrNew |
b51d5391-bb76-11ea-9172-4c72b94353b5 |
drupal -- Multiple Vulnerabilities |
b51d9e83-de08-11e8-9416-001b217b3468 |
Gitlab -- SSRF in Kubernetes integration |
b53bbf58-257f-11e6-9f4d-20cf30e32f6d |
openvswitch -- MPLS buffer overflow |
b54abe9d-7024-4d10-98b2-180cf1717766 |
py-beaker -- arbitrary code execution vulnerability |
b5508c08-547a-11ee-85eb-84a93843eb75 |
Roundcube -- XSS vulnerability |
b55ecf12-5d98-11e5-9909-002590263bf5 |
remind -- buffer overflow with malicious reminder file input |
b56fe6bb-b1b1-11e5-9728-002590263bf5 |
qemu -- denial of service vulnerabilities in eepro100 NIC support |
b57f690e-ecc9-11e4-876c-00262d5ed8ee |
chromium -- multiple vulnerabilities |
b582a85a-ba4a-11ec-8d1e-3065ec8fd3ec |
Chromium -- mulitple vulnerabilities |
b58ff497-6977-11d9-ae49-000c41e2cdad |
tiff -- divide-by-zero denial-of-service |
b59847e0-346d-11ed-8fe9-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
b5a49db7-72fc-11da-9827-021106004fd6 |
scponly -- local privilege escalation exploits |
b5e22ec5-bc4b-11ee-b0b5-b42e991fc52e |
rclone -- Multiple vulnerabilities |
b5e654c3-5644-11e5-9ad8-14dae9d210b8 |
libvncserver -- memory corruption |
b5fc63ad-c4c3-11da-9699-00123ffe8333 |
dia -- XFig Import Plugin Buffer Overflow |
b5ffaa2a-ee50-4498-af99-61bc1b163c00 |
leafnode -- denial of service vulnerability |
b6069837-aadc-11df-82df-0015f2db7bde |
OpenTTD -- Denial of service (server) via infinite loop |
b62c80c2-b81a-11da-bec5-00123ffe8333 |
heimdal -- Multiple vulnerabilities |
b63421b6-a1e0-11e7-ac58-b499baebfeaf |
weechat -- crash in logger plugin |
b6402385-533b-11e6-a7bd-14dae9d210b8 |
php -- multiple vulnerabilities |
b64481d9-eff4-11d9-8310-0001020eed82 |
pear-XML_RPC -- information disclosure vulnerabilities |
b64a7389-7c27-11e6-8aaa-5404a68ad561 |
Remote-Code-Execution vulnerability in mysql and its variants CVE 2016-6662 |
b64edef7-3b10-11eb-af2a-080027dbe4b7 |
glpi -- weak csrf tokens |
b6587341-4d88-11e4-aef9-20cf30e32f6d |
Bugzilla multiple security issues |
b65e4914-b3bc-11e5-8255-5453ed2e2b49 |
tiff -- out-of-bounds read in CIE Lab image format |
b6612eee-df5f-11d9-b875-0001020eed82 |
gaim -- MSN Remote DoS vulnerability |
b665668a-91db-4f13-8113-9e4b5b0e47f7 |
jenkins -- remote code execution via unsafe deserialization |
b66583ae-5aee-4cd5-bb31-b2d397f8b6b3 |
librsvg2 -- multiple vulnerabilities |
b67d768c-1f53-11ee-82ed-4ccc6adda413 |
librecad -- out-of-bounds read in importshp plugin |
b68cc195-cae7-11e9-86e9-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
b69292e8-e798-11e8-ae07-6451062f0f7a |
Flash Player -- information disclosure |
b692a49c-9ae7-4958-af21-cbf8f5b819ea |
py-impacket -- multiple path traversal vulnerabilities |
b6939d5b-64a1-11d9-9106-000a95bc6fae |
libxine -- multiple vulnerabilities in VideoCD handling |
b6a84729-6bd0-11ed-8d9a-b42e991fc52e |
advancecomp -- Multiple vulnerabilities |
b6beb137-9dc0-11e2-882f-20cf30e32f6d |
Subversion -- multiple vulnerabilities |
b6c18956-5fa3-11db-ad2d-0016179b2dd5 |
plone -- unprotected MembershipTool methods |
b6c875f1-1d76-11ec-ae80-704d7b472482 |
chromium -- use after free in Portals |
b6cad7f3-fb59-11d8-9837-000c41e2cdad |
ImageMagick -- BMP decoder buffer overflow |
b6da24da-23f7-11e5-a4a5-002590263bf5 |
squid -- client-first SSL-bump does not correctly validate X509 server certificate |
b6dd9d93-e09b-11ee-92fc-1c697a616631 |
Intel CPUs -- multiple vulnerabilities |
b6ef8a53-8062-11ec-9af3-fb232efe4d2e |
OpenEXR -- Heap-buffer-overflow in Imf_3_1::LineCompositeTask::execute |
b6f6da57-680a-11dc-b350-001921ab2fa4 |
clamav -- multiple remote Denial of Service vulnerabilities |
b6f7ad7d-9b19-11ed-9a3f-b42e991fc52e |
net/eternalterminal -- Multiple vulnerabilities |
b70b880f-5727-11ea-a2f3-001cc0382b2f |
Mbed TLS -- Side channel attack on ECDSA |
b71d7193-3c54-11e9-a3f9-00155d006b02 |
Node.js -- multiple vulnerabilities |
b72bad1c-20ed-11e3-be06-000c29ee3065 |
FreeBSD -- Cross-mount links between nullfs(5) mounts |
b73335a5-3bbe-11dc-8e83-0016179b2dd5 |
libvorbis -- Multiple memory corruption flaws |
b73d1f2a-96de-11ef-9e71-00d8612f03c8 |
librewolf -- Undefined behavior in selection node cache |
b747783f-5fb6-11e9-b2ac-08002705f877 |
gitea -- remote code execution |
b747b2a9-7be0-11da-8ec4-0002b3b60e4c |
bogofilter -- heap corruption through excessively long words |
b74a8076-9b1f-11df-9f58-021e8c343e76 |
isolate -- local root exploit |
b77b5646-a778-11e7-ac58-b499baebfeaf |
dnsmasq -- multiple vulnerabilities |
b79ec16b-9da7-11e9-a0ea-a92fe7db4867 |
ettercap -- out-of-bound read vulnerability |
b7a7576d-8e0a-11e3-9976-9c4e36909cc0 |
linux-flashplugin -- multiple vulnerabilities |
b7abdb0f-3b15-11eb-af2a-080027dbe4b7 |
glpi -- Multiple SQL Injections Stemming From isNameQuoted() |
b7cb488c-8349-11d8-a41f-0020ed76ef5a |
isakmpd payload handling denial-of-service vulnerabilities |
b7cff5a9-31cc-11e8-8f07-b499baebfeaf |
OpenSSL -- multiple vulnerabilities |
b7d56d0b-7a11-11e6-af78-589cfc0654e1 |
openjpeg -- multiple vulnerabilities |
b7d785ea-656d-11e5-9909-002590263bf5 |
codeigniter -- SQL injection vulnerability |
b7d89082-e7c0-11e7-ac58-b499baebfeaf |
MariaDB -- unspecified vulnerability |
b7dc4dde-2e48-43f9-967a-c68461537cf2 |
dovecot -- null pointer deref in notify with empty headers |
b7e23050-2d5d-4e61-9b48-62e89db222ca |
mozilla -- multiple vulnerabilities |
b805d7b4-9c0c-11e9-97f0-000c29e96db4 |
Django -- Incorrect HTTP detection with reverse-proxy connecting via HTTPS |
b808c3a8-ae30-11e5-b864-14dae9d210b8 |
inspircd -- DoS |
b80f039d-579e-4b82-95ad-b534a709f220 |
bro -- "Magellan" remote code execution vulnerability in bundled sqlite |
b81ad6d6-8633-11eb-99c5-e09467587c17 |
chromium -- multiple vulnerabilities |
b8321d76-24e7-4b72-a01d-d12c4445d826 |
mozilla -- multiple vulnerabilities |
b84a992a-12ab-11dd-bab7-0016179b2dd5 |
openfire -- unspecified denial of service |
b84dbd94-e894-4c91-b8cd-d328537b1b2b |
ncurses -- multiple issues |
b857606c-0266-11ef-8681-001b217b3468 |
Gitlab -- vulnerabilities |
b88aa380-1442-11ef-a490-84a93843eb75 |
OpenSSL -- Denial of Service vulnerability |
b8943e61-6e68-11d9-a9e7-0001020eed82 |
evolution -- arbitrary code execution vulnerability |
b8a0fea2-9be9-11ed-8acf-0800277bb8a8 |
gitea -- information disclosure |
b8a52e5a-483d-11ee-971d-3df00e0f9020 |
Borg (Backup) -- flaw in cryptographic authentication scheme in Borg allowed an attacker to fake archives and indirectly cause backup data loss. |
b8ae4659-a0da-11e1-a294-bcaec565249c |
libxml2 -- An off-by-one out-of-bounds write by XPointer |
b8c0cbca-472d-11ec-83dc-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
b8e361b8-b7ff-11da-8414-0013d4a4a40e |
curl -- TFTP packet buffer overflow vulnerability |
b8ea5b66-deff-11ea-adef-641c67a117d8 |
snmptt -- malicious shell code |
b8ee7a81-a879-4358-9b30-7dd1bd4c14b1 |
libevent -- multiple vulnerabilities |
b9044cc2-8aa5-11db-bd0d-00123ffe8333 |
wv2 -- Integer Overflow Vulnerability |
b905dff4-e227-11ea-b0ea-08002728f74c |
curl -- expired pointer dereference vulnerability |
b9077cc4-6d04-4bcb-a37a-9ceaebfdcc9e |
ganglia -- buffer overflow vulnerability |
b91234e7-9a8b-11e1-b666-001636d274f3 |
NVIDIA UNIX driver -- access to arbitrary system memory |
b9210706-feb0-11ec-81fa-1c697a616631 |
Node.js -- July 7th 2022 Security Releases |
b927b654-7146-11ec-ad4b-5404a68ad561 |
uriparser -- Multiple vulnerabilities |
b9281fb9-61b2-11e0-b1ce-0019d1a7ece2 |
tinyproxy -- ACL lists ineffective when range is configured |
b950a83b-789e-11e8-8545-d8cb8abf62dd |
Gitlab -- multiple vulnerabilities |
b9591212-dba7-11e8-9416-001b217b3468 |
Gitlab -- multiple vulnerabilities |
b95e5674-b4d6-11e7-b895-0cc47a494882 |
arj -- multiple vulnerabilities |
b971d2a6-1670-11da-978e-0001020eed82 |
pcre -- regular expression buffer overflow |
b973a763-7936-11e5-a2a1-002590263bf5 |
mediawiki -- multiple vulnerabilities |
b975763f-5210-11db-8f1a-000a48049292 |
freetype -- LWFN Files Buffer Overflow Vulnerability |
b9837fa1-cd72-11ec-98f1-6805ca0b3d42 |
rsyslog8 -- heap buffer overflow on receiving TCP syslog |
b99492b2-362b-11eb-9f86-08002734b9ed |
gitea -- multiple vulnerabilities |
b99f99f6-021e-11ed-8c6f-000c29ffbb6c |
git -- privilege escalation |
b9a347ac-8671-11e2-b73c-0019d18c446a |
typo3 -- Multiple vulnerabilities in TYPO3 Core |
b9c525d9-9198-11e8-beba-080027ef1a23 |
chromium -- multiple vulnerabilities |
b9ec7fe3-a38a-11de-9c6b-003048818f40 |
bugzilla -- two SQL injections, sensitive data exposure |
b9f3ffa3-dd6c-11e0-b7fc-000a5e1e33c6 |
libsndfile -- PAF file processing integer overflow |
ba005226-fb5b-11d8-9837-000c41e2cdad |
imlib2 -- BMP decoder buffer overflow |
ba04a373-7d20-11e3-8992-00132034b086 |
nagios -- denial of service vulnerability |
ba13dc13-340d-11d9-ac1b-000d614f7fad |
samba -- potential remote DoS vulnerability |
ba326a36-5f02-452d-a215-31e7b06d5edf |
Wesnoth -- Remote information disclosure |
ba4f9b19-ed9d-11e4-9118-bcaec565249c |
wordpress -- cross-site scripting vulnerability |
ba51c2f7-5b43-11e1-8288-00262d5ed8ee |
plib -- remote code execution via buffer overflow |
ba61ce15-8a7b-11df-87ec-0050569b2d21 |
redmine -- multiple vulnerabilities |
ba6d0c9b-f5f6-4b9b-a6de-3cce93c83220 |
Loofah -- XSS vulnerability |
ba73f494-65a8-11de-aef5-001c2514716c |
phpmyadmin -- XSS vulnerability |
ba796b98-b61c-11ec-9ebc-1c697aa5a594 |
FreeBSD -- Bhyve e82545 device emulation out-of-bounds write |
ba94433c-7890-11ed-859e-1c61b4739ac9 |
xrdp -- multiple vulnerabilities |
bab05188-5d4b-11e5-9ad8-14dae9d210b8 |
optipng -- use-after-free vulnerability |
bab29816-ff93-11e8-b05b-00e04c1ea73d |
typo3 -- multiple vulnerabilities |
bad1b090-a7ca-11de-873f-0030843d3802 |
drupal -- multiple vulnerabilities |
bad59128-c188-11e8-9d40-f0def10dca57 |
wesnoth -- Code Injection vulnerability |
bad6588e-2fe0-11ee-a0d1-84a93843eb75 |
OpenSSL -- Excessive time spent checking DH q parameter value |
baece347-c489-11dd-a721-0030843d3802 |
wireshark -- SMTP Processing Denial of Service Vulnerability |
baf37cd2-8351-11e1-894e-00215c6a37bb |
samba -- "root" credential remote code execution |
baf74e0b-497a-11da-a4f4-0060084a00e5 |
fetchmail -- fetchmailconf local password exposure |
bb022643-84fb-11e6-a4a1-60a44ce6887b |
django -- CSRF protection bypass on a site with Google Analytics |
bb0a8795-15dc-11df-bf0a-002170daae37 |
wireshark -- LWRES vulnerability |
bb0ef21d-0e1b-461b-bc3d-9cba39948888 |
rails -- multiple vulnerabilities |
bb33981a-7ac6-11da-bf72-00123f589060 |
perl, webmin, usermin -- perl format string integer wrap vulnerability |
bb389137-21fb-11e1-89b4-001ec9578670 |
asterisk -- Multiple Vulnerabilities |
bb49f1fa-00da-11ef-92b7-589cfc023192 |
GLPI -- multiple vulnerabilities |
bb4e9a44-dff2-11dd-a765-0030843d3802 |
mysql -- renaming of arbitrary tables by authenticated users |
bb528d7c-e2c6-11ed-a3e6-589cfc0f81b0 |
phpmyfaq -- multiple vulnerabilities |
bb53af7b-f7e4-11ea-88f8-901b0ef719ab |
FreeBSD -- ure device driver susceptible to packet-in-packet attack |
bb7d4791-a5bf-11e5-a0e5-00262d5ed8ee |
chromium -- multiple vulnerabilities |
bb961ff3-b3a4-11e5-8255-5453ed2e2b49 |
cacti -- SQL injection vulnerabilities |
bb99f803-5fde-11d9-b721-00065be4b5b6 |
helvis -- information leak vulnerabilities |
bba3f684-9b1d-11ed-9a3f-b42e991fc52e |
www/awstats -- Partial absolute pathname |
bba850fd-770e-11eb-b87a-901b0ef719ab |
FreeBSD -- jail_attach(2) relies on the caller to change the cwd |
bbb18fcb-7f0d-11ee-94b4-6cc21735f730 |
postgresql-server -- Role pg_cancel_backend can signal certain superuser processes |
bbc0db92-084c-11e5-bb90-002590263bf5 |
hostapd and wpa_supplicant -- multiple vulnerabilities |
bbc97005-b14e-11e5-9728-002590263bf5 |
qemu -- denial of service vulnerability in IDE disk/CD/DVD-ROM emulation |
bbcb1584-c068-11ee-bdd6-4ccc6adda413 |
qt6-webengine -- Multiple vulnerabilities |
bbd5f486-24f1-11e1-95bc-080027ef73ec |
PuTTY -- Password vulnerability |
bbdb9713-8e09-11e9-87bc-002590acae31 |
Vim/NeoVim -- Security vulnerability |
bc19dcca-7b13-11e6-b99e-589cfc0654e1 |
dropbear -- multiple vulnerabilities |
bc20510f-4dd4-11dd-93e7-0211d880e350 |
poppler -- uninitialized pointer |
bc43a578-14ec-11ed-856e-d4c9ef517024 |
Unbound -- Multiple vulnerabilities |
bc4898d5-a794-11e6-b2d3-60a44ce6887b |
Pillow -- multiple vulnerabilities |
bc4a7efa-7d9a-11d9-a9e7-0001020eed82 |
ngircd -- format string vulnerability |
bc6a7e79-e111-11dd-afcd-00e0815b8da8 |
cgiwrap -- XSS Vulnerability |
bc7aff8c-d806-11ea-a5aa-0800272260e5 |
go -- encoding/binary: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs |
bc83cfc9-42cf-4b00-97ad-d352ba0c5e2b |
zeek -- null-pointer dereference vulnerability |
bc90e894-264b-11ee-a468-80fa5b29d485 |
virtualbox-ose -- multiple vulnerabilities |
bcad3faa-b40c-11e5-9728-002590263bf5 |
xen-kernel -- XENMEM_exchange error handling issues |
bcbd3fe0-2b46-11e6-ae88-002590263bf5 |
openafs -- multiple vulnerabilities |
bcc8b21e-7122-11ef-bece-2cf05da270f3 |
Gitlab -- vulnerabilities |
bcdeb6d2-f02d-11ea-838a-0011d823eebd |
Mbed TLS -- Local side channel attack on RSA and static Diffie-Hellman |
bce1f76d-82d0-11de-88ea-001a4d49522b |
subversion -- heap overflow vulnerability |
bce47c89-4d3f-11e7-8080-a4badb2f4699 |
roundcube -- arbitrary password resets |
bcee3989-d106-4f60-948f-835375634710 |
varnish -- Varnish HTTP Request Parsing Denial of Service |
bcf27002-94c3-11d9-a9e0-0001020eed82 |
grip -- CDDB response multiple matches buffer overflow vulnerability |
bcf56a42-9df8-11e8-afb0-589cfc0f81b0 |
gitea -- TOTP passcode reuse |
bd159669-0808-11eb-a3a4-0019dbb15b3f |
Payara -- A Polymorphic Typing issue in FasterXML jackson-databind |
bd1ab7a5-0e01-11e5-9976-a0f3c100ae18 |
tidy -- heap-buffer-overflow |
bd349f7a-b3b9-11e5-8255-5453ed2e2b49 |
tiff -- out-of-bounds read in tif_getimage.c |
bd579366-5290-11d9-ac20-00065be4b5b6 |
greed -- insecure GRX file processing |
bd60922b-fb8d-11d8-a13e-000a95bc6fae |
krb5 -- ASN.1 decoder denial-of-service vulnerability |
bd62c640-9bb9-11e4-a5ad-000c297fb80f |
mozilla -- multiple vulnerabilities |
bd6cf187-8710-11e8-833d-18a6f7016652 |
qutebrowser -- Remote code execution due to CSRF |
bd730827-dfe0-11dd-a765-0030843d3802 |
libcdaudio -- remote buffer overflow and code execution |
bd7592a1-cbfd-11ee-a42a-5404a6f3ca32 |
gitea -- Prevent anonymous container access |
bd760627-3493-11e0-8103-00215c6a37bb |
django -- multiple vulnerabilities |
bd92f1ab-690c-11ee-9ed0-001fc69cd6dc |
11/libX11 multiple vulnerabilities |
bd940aba-7467-11ef-a5c4-08002784c58d |
SnappyMail -- multiple mXSS in HTML sanitizer |
bd98066d-4ea4-11eb-b412-e86a64caca56 |
mail/dovecot -- multiple vulnerabilities |
bd9fc2bf-5ffe-11d9-a11a-000a95bc6fae |
vim -- vulnerabilities in modeline handling |
bdab0acd-d4cd-11e1-8a1c-14dae9ebcf89 |
php -- potential overflow in _php_stream_scandir |
bdad9ada-8a52-11d9-9e53-000a95bc6fae |
lighttpd -- script source disclosure vulnerability |
bdaecfad-3117-11ec-b3b0-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
bdccd14b-5aac-11de-a438-003048590f9e |
joomla -- multiple vulnerabilities |
bdcd041e-5811-4da3-9243-573a9890fdb1 |
electron{27,28} -- Object lifecycle issue in V8 |
bdd1537b-354c-11d9-a9e7-0001020eed82 |
sudo -- privilege escalation with bash scripts |
bddadaa4-9227-11eb-99c5-e09467587c17 |
chromium -- multiple vulnerabilities |
bdec8dc2-0b3b-11e1-b722-001cc0476564 |
gnutls -- client session resumption vulnerability |
bdfa6c04-027a-11ef-9c21-901b0e9408dc |
py-matrix-synapse -- weakness in auth chain indexing allows DoS |
be088777-6085-11ea-8609-08002731610e |
gitea -- multiple vulnerabilities |
be0e3817-3bfe-11e9-9cd6-001999f8d30b |
asterisk -- Remote crash vulnerability with SDP protocol violation |
be1aada2-be6c-11e8-8fc6-000c29434208 |
mediawiki -- multiple vulnerabilities |
be233fc6-bae7-11ed-a4fb-080027f5fec9 |
curl -- multiple vulnerabilities |
be261737-c535-11e7-8da5-001999f8d30b |
asterisk -- Memory/File Descriptor/RTP leak in pjsip session resource |
be3069c9-67e7-11e5-9909-002590263bf5 |
james -- multiple vulnerabilities |
be38245e-44d9-11e8-a292-00e04c1ea73d |
wordpress -- multiple issues |
be3dfe33-410b-11e0-9e02-00215c6a37bb |
openldap -- two security bypass vulnerabilities |
be4b0529-dbaf-11dc-9791-000ea6702141 |
clamav -- ClamAV libclamav PE File Integer Overflow Vulnerability |
be4ccb7b-c48b-11da-ae12-0002b3b60e4c |
openvpn -- LD_PRELOAD code execution on client through malicious or compromised server |
be5421ab-1b56-11e4-a767-5453ed2e2b49 |
krfb -- Possible Denial of Service or code execution via integer overflow |
be543d74-539a-11d9-a9e7-0001020eed82 |
ecartis -- unauthorised access to admin interface |
be63533c-9ed7-11e5-8f5c-002590263bf5 |
redmine -- multiple vulnerabilities |
be72e773-1131-11e6-94fa-002590263bf5 |
gitlab -- privilege escalation via "impersonate" feature |
be77eff6-ca91-11e0-aea3-00215c6a37bb |
rubygem-rails -- multiple vulnerabilities |
be927298-6f97-11de-b444-001372fd0af2 |
drupal -- multiple vulnerabilities |
bea52545-f4a7-11ed-8290-a8a1599412c6 |
chromium -- multiple vulnerabilities |
bea84a7a-e0c9-11e7-b4f3-11baa0c2df21 |
node.js -- Data Confidentiality/Integrity Vulnerability, December 2017 |
beab40bf-c1ca-4d2b-ad46-2f14bac8a968 |
Ruby Activemodel Gem -- Circumvention of attr_protected |
beb36f39-4d74-11ee-985e-bff341e78d94 |
go -- multiple vulnerabilities |
beb3d5fc-7ac5-11e5-b35a-002590263bf5 |
Joomla! -- Core - Unauthorized Login vulnerability |
beb6f4a8-add5-11de-8b55-0030843d3802 |
mybb -- multiple vulnerabilities |
bec38383-e6cb-11de-bdd4-000c2930e89b |
pligg -- Cross-Site Scripting and Cross-Site Request Forgery |
bed545c6-bdb8-11ed-bca8-a33124f1beb1 |
mantis -- multiple vulnerabilities |
bed5d41a-f2b4-11ea-a878-e09467587c17 |
chromium -- multiple vulnerabilities |
bf171509-68dd-11e0-afe6-0003ba02bf30 |
rt -- multiple vulnerabilities |
bf1d9331-21b6-11e5-86ff-14dae9d210b8 |
cups-filters -- texttopdf integer overflow |
bf1f47c4-7f1b-11ea-bf94-001cc0382b2f |
Mbed TLS -- Side channel attack on ECDSA |
bf266183-cec7-11e7-af2d-2047478f2f70 |
frr -- BGP Mishandled attribute length on Error |
bf2b9c56-b93e-11e8-b2a8-a4badb296695 |
joomla3 -- vulnerabilitiesw |
bf2e7483-d3fa-440d-8c6e-8f1f2f018818 |
linux_base -- vulnerabilities in Red Hat 7.1 libraries |
bf545001-b96d-42e4-9d2e-60fdee204a43 |
h2o -- HTTP/2 Rapid Reset attack vulnerability |
bf7912f5-c1a8-11e3-a5ac-001b21614864 |
nas -- multiple vulnerabilities |
bfb36941-84fa-11d8-a41f-0020ed76ef5a |
Incorrect cross-realm trust handling in Heimdal |
bfbbd505-3bd6-409c-8c67-445d3635cf4b |
xli -- integer overflows in image size calculations |
bfca647c-0456-11ee-bafd-b42e991fc52e |
Kanboard -- Multiple vulnerabilities |
bfcc23b6-3b27-11e6-8e82-002590263bf5 |
wordpress -- multiple vulnerabilities |
bfd5d004-81d4-11e8-a29a-00e04c1ea73d |
mybb -- vulnerabilities |
bfd6eef4-8c94-11dc-8c55-001c2514716c |
pcre -- arbitrary code execution |
bfda2d80-0858-11e8-ad5c-0021ccb9e74d |
GIMP - Heap Buffer Overflow Vulnerability |
bfda39de-7467-11d9-9e1e-c296ac722cb3 |
squid -- correct handling of oversized HTTP reply headers |
bfdbc7ec-9c3f-11e0-9bec-6c626dd55a41 |
Samba -- Denial of service - memory corruption |
bfe218a5-4218-11de-b67a-0030843d3802 |
moinmoin -- cross-site scripting vulnerabilities |
bfe9c75e-5028-11e0-b2d2-00215c6a37bb |
asterisk -- Multiple Vulnerabilities |
bfea59e0-41ee-11ec-9bac-589cfc007716 |
puppet -- Silent Configuration Failure |
bfecf7c1-af47-11e1-9580-4061862b8c22 |
mozilla -- multiple vulnerabilities |
bffa40db-ad50-11eb-86b8-080027846a02 |
Python -- multiple vulnerabilities |
c01170bf-4990-11da-a1b8-000854d03344 |
lynx -- remote buffer overflow |
c0171f59-ea8a-11da-be02-000c6ec775d9 |
frontpage -- cross site scripting vulnerability |
c01a25f5-8f20-11da-8c1d-000e0c2e438a |
texindex -- temporary file privilege escalation |
c02b8db5-771b-11ef-9a62-002590c1f29c |
FreeBSD -- NFS client accepts file names containing path separators |
c039a761-2c29-11e6-8912-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
c04dc18f-fcde-11e7-bdf6-00e04c1ea73d |
wordpress -- multiple issues |
c0869649-5a0c-11df-942d-0015587e2cc1 |
piwik -- cross site scripting vulnerability |
c092be0e-f7cc-11ee-aa6b-b42e991fc52e |
forgejo -- HTTP/2 CONTINUATION flood in net/http |
c0a269d5-3d16-11d9-8818-008088034841 |
Cyrus IMAPd -- FETCH command out of bounds memory corruption |
c0b13887-be44-11e6-b04f-001999f8d30b |
asterisk -- Authentication Bypass |
c0c1834c-9761-11eb-acfd-0022489ad614 |
Node.js -- April 2021 Security Releases |
c0c31b27-bff3-11e3-9d09-000c2980a9f3 |
openafs -- Denial of Service |
c0c5afef-38db-11e8-8b7f-a4badb2f469b |
FreeBSD -- ipsec crash or denial of service |
c0cae920-c4e9-11e4-898e-90e6ba741e35 |
mono -- TLS bugs |
c0dae634-4820-4505-850d-b1c975d0f67d |
tomcat -- Remote Code Execution |
c0e76d33-8821-11e5-ab94-002590263bf5 |
xen-tools -- populate-on-demand balloon size inaccuracy can crash guests |
c0ef061a-c7f0-11e6-ae1b-002590263bf5 |
Joomla! -- multiple vulnerabilities |
c0ef849e-84ac-11e3-bec4-9c4e36909cc0 |
linux-flashplugin -- multiple vulnerabilities |
c0f122e2-3897-11e3-a084-3c970e169bc2 |
pycrypto -- PRNG reseed race condition |
c0fd7890-4346-11db-89cc-000ae42e9b93 |
drupal-pubcookie -- authentication may be bypassed |
c110eda2-e995-11db-a944-0012f06707f0 |
freeradius -- EAP-TTLS Tunnel Memory Leak Remote DOS Vulnerability |
c115271d-602b-11dc-898c-001921ab2fa4 |
apache -- multiple vulnerabilities |
c11629d3-c8ad-11e6-ae1b-002590263bf5 |
vim -- arbitrary command execution |
c11ee146-c266-11ea-8659-901b0ef719ab |
FreeBSD -- IPv6 socket option race condition and use after free |
c1202de8-4b29-11ea-9673-4c72b94353b5 |
NGINX -- HTTP request smuggling |
c1265e85-7c95-11e7-93af-005056925db4 |
Axis2 -- Security vulnerability on dependency Apache Commons FileUpload |
c13a8c17-cbeb-11ed-956f-7054d21a9e2a |
py39-lmdb -- multiple vulnerabilities |
c14aa48c-5ab7-11de-bc9b-0030843d3802 |
cscope -- multiple buffer overflows |
c1630aa3-7970-11e8-8634-dcfe074bd614 |
SQLite -- Corrupt DB can cause a NULL pointer dereference |
c174118e-1b11-11ec-9d9d-0022489ad614 |
Node.js -- July 2021 Security Releases |
c175d72f-3773-11df-8bb8-0211d880e350 |
gtar -- buffer overflow in rmt client |
c1930f45-6982-11e4-80e1-bcaec565249c |
dbus -- incomplete fix for CVE-2014-3636 part A |
c1a8ed1c-2814-4260-82aa-9e37c83aac93 |
py-cryptography -- includes a vulnerable copy of OpenSSL |
c1b2b492-6999-11ec-a50c-001cc0382b2f |
Mbed TLS -- Potential double-free after an out of memory error |
c1c18ee1-c711-11e5-96d6-14dae9d210b8 |
nginx -- multiple vulnerabilities |
c1d97a8b-05ed-11d9-b45d-000c41e2cdad |
mozilla -- POP client heap overflow |
c1da8b75-6aef-11e5-9909-002590263bf5 |
php -- multiple vulnerabilities |
c1dc55dc-9556-11e6-b154-3065ec8fd3ec |
Tor -- remote denial of service |
c1e5f35e-f93d-11e1-b07f-00235a5f2c9a |
emacs -- remote code execution vulnerability |
c1ef9b33-72a6-11de-82ea-0030843d3802 |
mozilla -- corrupt JIT state after deep return from native function |
c218873d-d444-11e6-84ef-f0def167eeea |
Use-After-Free Vulnerability in pcsc-lite |
c21f4e61-6570-11e5-9909-002590263bf5 |
codeigniter -- multiple vulnerabilities |
c223b00d-e272-11df-8e32-000f20797ede |
mozilla -- Heap buffer overflow mixing document.write and DOM insertion |
c2431c4e-622c-4d92-996d-d8b5258ae8c9 |
electron{27,28} -- multiple vulnerabilities |
c253c4aa-5126-11ed-8a21-589cfc0f81b0 |
phpmyfaq -- CSRF vulnerability |
c2576e14-36e2-11e9-9eda-206a8a720317 |
ntp -- Crafted null dereference attack from a trusted source with an authenticated mode 6 packet |
c27bc173-d7aa-11db-b141-0016179b2dd5 |
Squid -- TRACE method handling denial of service |
c28ee9cd-916e-4dcf-8ed3-e97e5846db6c |
typo3 -- Cross-Site Scripting Vulnerability in TYPO3 Core |
c28f4705-043f-11da-bc08-0001020eed82 |
proftpd -- format string vulnerabilities |
c290f093-c89e-11e6-821e-68f7288bdf41 |
Pligg CMS -- XSS Vulnerability |
c294c2e6-b309-11e9-a87f-a4badb2f4699 |
FreeBSD -- Resource exhaustion in non-default RACK TCP stack |
c2a7de31-5b42-11ec-8398-6c3be5272acd |
Grafana -- Directory Traversal |
c2a89e8f-44e9-11ed-9215-00e081b7aa2d |
jenkins -- XSS vulnerability |
c2ad8700-de25-11ee-9190-84a93843eb75 |
Unbound -- Denial-of-Service vulnerability |
c2b1652c-e647-11e5-85be-14dae9d210b8 |
libotr -- integer overflow |
c2c89dea-2859-4231-8f3b-012be0d475ff |
py-django-photologue -- XSS vulnerability |
c2c8c84b-e734-11e3-9a25-5404a6a6412c |
mumble -- NULL pointer dereference and heap-based buffer overflow |
c2d1693b-73cb-11e9-a1c7-b499baebfeaf |
PHP -- Multiple vulnerabilities in EXIF module |
c2e10368-77ab-11d8-b9e8-00e04ccb0a62 |
ModSecurity for Apache 2.x remote off-by-one overflow |
c2ea3b31-9d75-11e7-bb13-001999f8d30b |
asterisk -- RTP/RTCP information leak |
c2eac2b5-9a7d-11df-8e32-000f20797ede |
firefox -- Dangling pointer crash regression from plugin parameter array fix |
c2efcd46-9ed5-11e5-8f5c-002590263bf5 |
redmine -- open redirect vulnerability |
c2f107e1-2493-11e8-b3e8-001cc0382b2f |
mbed TLS (PolarSSL) -- remote code execution |
c2fcbec2-5daa-11e5-9909-002590263bf5 |
moodle -- multiple vulnerabilities |
c2fdb3bc-7d72-11da-b96e-000fb586ba73 |
rxvt-unicode -- restore permissions on tty devices |
c30c3a2e-4fb1-11e4-b275-14dae9d210b8 |
foreman-proxy SSL verification issue |
c32285fe-fde4-11e9-9525-000c29c4dc65 |
mediawiki -- multiple vulnerabilities |
c329712a-6b5b-11dd-9d79-001fc61c2a55 |
ruby -- multiple vulnerabilities in safe level |
c3600a64-64ea-11ea-bdff-e0d55e2a8bf9 |
Okular -- Local binary execution via action links |
c360d057-ea8b-11e9-859b-b885849ded8e |
mod_perl2 -- execute arbitrary Perl code |
c3610f39-18f1-11ed-9854-641c67a117d8 |
varnish -- Denial of Service Vulnerability |
c365536d-e3cf-11eb-9d8d-b37b683944c2 |
go -- crypto/tls: clients can panic when provided a certificate of the wrong type for the negotiated parameters |
c368155a-fa83-11e4-bc58-001e67150279 |
rubygem-redcarpet -- XSS vulnerability |
c37de843-488e-11e2-a5c9-0019996bc1f7 |
squid -- denial of service |
c389d06d-ee57-11db-bd51-0016179b2dd5 |
claws-mail -- APOP vulnerability |
c3aba586-ea77-11dd-9d1e-000bcdc1757a |
openfire -- multiple vulnerabilities |
c3c6c4a3-f47d-11eb-b632-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
c3d43001-8064-11e4-801f-0022156e8794 |
mutt -- denial of service via crafted mail message |
c3fb48cc-a2ff-11ed-8fbc-6cf0490a8c18 |
Spotipy -- Path traversal vulnerability |
c40ca16c-4d9f-4d70-8b6c-4d53aeb8ead4 |
cURL -- uninitialized random vulnerability |
c418d472-6bd1-11d9-93ca-000a95bc6fae |
perl -- File::Path insecure file/directory permissions |
c41bedfd-b3f9-11e7-ac58-b499baebfeaf |
MySQL -- multiple vulnerabilities |
c428de09-ed69-11e5-92ce-002590263bf5 |
kamailio -- SEAS Module Heap overflow |
c4292768-5273-4f17-a267-c5fe35125ce4 |
NSS -- multiple vulnerabilities |
c444c8b7-7169-11de-9ab7-000c29a67389 |
isc-dhcp-client -- Stack overflow vulnerability |
c4571ca8-053d-44c9-ab3c-89b1372ad0a5 |
chrony -- multiple vulnerabilities |
c470bcc7-33fe-11e5-a4a5-002590263bf5 |
logstash -- SSL/TLS vulnerability with Lumberjack input |
c470db07-1098-11e5-b6a8-002590263bf5 |
security/ossec-hids-* -- root escalation via syscheck feature |
c480eb5e-7f00-11d8-868e-000347dd607f |
ezbounce remote format string vulnerability |
c4892644-f8c6-11e3-9f45-6805ca0b3d42 |
phpMyAdmin -- two XSS vulnerabilities due to unescaped db/table names |
c49a880d-a5bb-11ed-aab5-080027de9982 |
Django -- multiple vulnerabilities |
c4a18a12-77fc-11e5-a687-206a8a720317 |
ntp -- 13 low- and medium-severity vulnerabilities |
c4ac9c79-ab37-11ea-8b5e-b42e99a1b9c3 |
several security issues in sqlite3 |
c4b025bb-f05d-11d8-9837-000c41e2cdad |
tnftpd -- remotely exploitable vulnerability |
c4b7badf-24ca-11d8-82e5-0020ed76ef5a |
Buffer overflows in libmcrypt |
c4ba95b2-39ce-11dd-98c9-00163e000016 |
moinmoin -- superuser privilege escalation |
c4d2f950-8c27-11eb-a3ae-0800278d94f0 |
gitea -- multiple vulnerabilities |
c4d412c8-f4d1-11e2-b86c-000c295229d5 |
openafs -- single-DES cell-wide key brute force vulnerability |
c4e9a427-9fc2-11e8-802a-000c29a1e3ec |
samba -- multiple vulnerabilities |
c4f067b9-dc4a-11df-8e32-000f20797ede |
mozilla -- multiple vulnerabilities |
c4f31e16-6e33-11dd-8eb7-0011098ad87f |
cdf3 -- Buffer overflow vulnerability |
c4f39920-781f-4aeb-b6af-17ed566c4272 |
mozilla -- multiple vulnerabilities |
c5415838-2f52-11ef-9cab-4ccc6adda413 |
qt6-webengine -- Multiple vulnerabilities |
c5519420-cec2-11d8-8898-000d6111a684 |
"Content-Type" XSS vulnerability affecting other webmail systems |
c551ae17-7f00-11d8-868e-000347dd607f |
multiple vulnerabilities in phpBB |
c55f9ed0-56a7-11da-a3f0-00123ffe8333 |
phpmyadmin -- HTTP Response Splitting vulnerability |
c561ce49-eabc-11eb-9c3f-0800270512f4 |
redis -- Integer overflow issues with BITFIELD command on 32-bit systems |
c564f9bd-8ba7-11e4-801f-0022156e8794 |
png -- heap overflow for 32-bit builds |
c599f95c-8ee5-11e7-8be8-001999f8d30b |
asterisk -- Unauthorized data disclosure and shell access command injection in app_minivm |
c5ab620f-4576-4ad5-b51f-93e4fec9cd0e |
wireshark -- multiple security issues |
c5af0747-1262-11de-a964-0030843d3802 |
libsndfile -- CAF processing integer overflow vulnerability |
c5bd8a25-99a6-11e9-a598-f079596b62f9 |
expat2 -- Fix extraction of namespace prefixes from XML names |
c5bd9068-440f-11ea-9cdb-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
c5c17ead-8f23-11da-8c1d-000e0c2e438a |
cvsbug -- race condition |
c5c6e293-9cc7-11e6-823f-b8aeed92ecc4 |
urllib3 -- certificate verification failure |
c5d79773-8801-11e7-93f7-d43d7e971a1b |
phpmailer -- XSS in code example and default exeception handler |
c5ec57a9-9c2b-11ea-82b8-4c72b94353b5 |
drupal -- Multiple Vulnerabilities |
c602c791-0cf4-11e8-a2ec-6cc21735f730 |
PostgreSQL vulnerabilities |
c60804f1-126f-11e8-8b5b-4ccc6adda413 |
libraw -- multiple DoS vulnerabilities |
c611be81-fbc2-11da-9156-000e0c2e438a |
sendmail -- Incorrect multipart message handling |
c61ca9cb-64c3-11dd-954d-006097bcc5f4 |
openvpn-devel -- arbitrary code execution |
c62285cb-cb46-11ee-b609-002590c1f29c |
FreeBSD -- bhyveload(8) host file access |
c623f058-10e7-11e0-becc-0022156e8794 |
php-filter -- Denial of Service |
c62dc69f-05c8-11d9-b45d-000c41e2cdad |
openoffice -- document disclosure |
c651c898-e90d-11e1-b230-0024e830109b |
libotr -- buffer overflows |
c6521b04-314b-11e1-9cf4-5404a67eef98 |
lighttpd -- remote DoS in HTTP authentication |
c66a5632-708a-4727-8236-d65b2d5b2739 |
mozilla -- multiple vulnerabilities |
c67069dc-0986-11e5-bb90-002590263bf5 |
testdisk -- buffer overflow with malicious disk image |
c676bb1b-e3f8-11ed-b37b-901b0e9408dc |
element-web -- matrix-react-sdk vulnerable to HTML injection in search results via plaintext message highlighting |
c682923d-b444-11ed-9268-b42e991fc52e |
freerdp -- clients using `/parallel` command line switch might read uninitialized data |
c685edd9-c045-11ea-8898-001cc0382b2f |
Mbed TLS -- Side-channel attack on ECC key import and validation |
c6861494-1ffb-11e7-934d-d05099c0ae8c |
BIND -- multiple vulnerabilities |
c6932dd4-eaff-11e6-9ac1-a4badb2f4699 |
chicken -- multiple vulnerabilities |
c6b9aee8-3071-11da-af18-000ae4641456 |
phpmyfaq -- SQL injection, takeover, path disclosure, remote code execution |
c6d1a8a6-8a91-11e8-be4d-005056925db4 |
znc -- multiple vulnerabilities |
c6e31869-f99f-11e4-9f91-6805ca0b3d42 |
phpMyAdmin -- XSRF and man-in-the-middle vulnerabilities |
c6f03ea6-12de-11ef-83d8-4ccc6adda413 |
qt6-webengine -- Multiple vulnerabilities |
c6f19fe6-d42a-11e9-b4f9-6451062f0f7a |
Flash Player -- multiple vulnerabilities |
c6f4177c-8e29-11ef-98e7-84a93843eb75 |
OpenSSL -- OOB memory access vulnerability |
c6fb2734-e835-11e8-b14b-001999f8d30b |
asterisk -- Remote crash vulnerability DNS SRV and NAPTR lookups |
c6fbd447-59ed-11e0-8d04-0015f2db7bde |
gdm -- privilege escalation vulnerability |
c702944a-db0f-11dd-aa56-000bcdf0a03b |
FreeBSD -- netgraph / bluetooth privilege escalation |
c70c3dc3-258c-11ee-b37b-901b0e9408dc |
element-web -- Cross site scripting in Export Chat feature |
c71cdc95-3c18-45b7-866a-af28b59aabb5 |
mozilla -- multiple vulnerabilities |
c71ed065-0600-11eb-8758-e0d55e2a8bf9 |
kdeconnect -- packet manipulation can be exploited in a Denial of Service attack |
c72a2494-c08b-11e2-bb21-083e8ed0f47b |
plib -- stack-based buffer overflow |
c73305ae-8cd7-11d9-9873-000a95bc6fae |
realplayer -- remote heap overflow |
c742dbe8-3704-11ef-9e6e-b42e991fc52e |
netatalk3 -- Multiple vulnerabilities |
c7526a14-c4dc-11da-9699-00123ffe8333 |
mplayer -- Multiple integer overflows |
c7617931-8985-11ea-93ef-b42e99a1b9c3 |
nested filters leads to stack overflow |
c7656d4c-cb60-11e6-a9a5-b499baebfeaf |
phpmailer -- Remote Code Execution |
c7855866-c511-11eb-ae1d-b42e991fc52e |
tauthon -- Regular Expression Denial of Service |
c79eb109-a754-45d7-b552-a42099eb2265 |
Ruby -- Denial of Service and Unsafe Object Creation Vulnerability in JSON |
c7a135f4-66a4-11e8-9e63-3085a9a47796 |
Git -- Fix memory out-of-bounds and remote code execution vulnerabilities (CVE-2018-11233 and CVE-2018-11235) |
c7b1af20-f34f-11e8-9cde-e0d55e2a8bf9 |
messagelib -- HTML email can open browser window automatically |
c7b5d72b-886a-11e3-9533-60a44c524f57 |
otrs -- multiple vulnerabilities |
c7c09579-b466-11da-82d0-0050bf27ba24 |
horde -- "url" disclosure of sensitive information vulnerability |
c7cad0f0-671a-11d8-bdeb-000a95bc6fae |
Darwin Streaming Server denial-of-service vulnerability |
c7ccc33f-7d31-11d9-a9e7-0001020eed82 |
mailman -- directory traversal vulnerability |
c7ec6375-c3cf-11eb-904f-14dae9d5a9d2 |
PyYAML -- arbitrary code execution |
c7fa3618-d5ff-11e1-90a2-000c299b62e1 |
isc-dhcp -- multiple vulnerabilities |
c80a3d93-8632-11e1-a374-14dae9ebcf89 |
phpmyfaq -- Remote PHP Code Execution Vulnerability |
c80b27a2-3165-11e5-8a1d-14dae9d210b8 |
wordpress -- XSS vulnerability |
c80ce2dd-e831-11ec-bcd2-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
c8174b63-0d3a-11e6-b06e-d43d7eed0ce2 |
subversion -- multiple vulnerabilities |
c82ecac5-6e3f-11e8-8777-b499baebfeaf |
OpenSSL -- Client DoS due to large DH parameter |
c848059a-318b-11ec-aa15-0800270512f4 |
fail2ban -- possible RCE vulnerability in mailing action using mailutils |
c84dc9ad-41f7-11dd-a4f9-00163e000016 |
apache -- multiple vulnerabilities |
c86bfee3-4441-11ea-8be3-54e1ad3d6335 |
spamassassin -- Nefarious rule configuration files can run system commands |
c87aa2d2-c3c4-11de-ab08-000f20797ede |
mozilla -- multiple vulnerabilities |
c8842a84-9ddd-11e5-8c2f-c485083ca99c |
flash -- multiple vulnerabilities |
c89a3ebb-ae07-11dd-b4b2-001f3c8eabeb |
trac -- potential DOS vulnerability |
c8b334e0-6e83-4575-81d1-f9d5803ceb07 |
chromium -- multiple vulnerabilities |
c8c31c41-49ed-11df-83fb-0015587e2cc1 |
curl -- libcurl buffer overflow vulnerability |
c8c927e5-2891-11e0-8f26-00151735203a |
bugzilla -- multiple serious vulnerabilities |
c8d902b1-8550-11e6-81e7-d050996490d0 |
BIND -- Remote Denial of Service vulnerability |
c8eb4c40-47bd-11ee-8e38-002590c1f29c |
FreeBSD -- Multiple vulnerabilities in OpenSSL |
c905298c-2274-11db-896e-000ae42e9b93 |
drupal -- XSS vulnerability |
c906e0a4-efa6-11e1-8fbf-001b77d09812 |
roundcube -- cross-site scripting in HTML email messages |
c9075321-f483-11e5-92ce-002590263bf5 |
bind -- denial of service vulnerability |
c9221ec9-17a2-11ec-b335-d4c9ef517024 |
cURL -- Multiple vulnerabilities |
c9263916-006f-11df-94cb-0050568452ac |
Zend Framework -- multiple vulnerabilities |
c93533a3-24f1-11e5-8b74-3c970e169bc2 |
bind -- denial of service vulnerability |
c9387e4d-2f5f-11ec-8be6-d4c9ef517024 |
MySQL -- Multiple vulnerabilities |
c93c9395-25e1-11e5-a4a5-002590263bf5 |
wpa_supplicant -- WPS_NFC option payload length validation vulnerability |
c93e4d41-75c5-11dc-b903-0016179b2dd5 |
jdk/jre -- Applet Caching May Allow Network Access Restrictions to be Circumvented |
c9460380-81e3-11e7-93af-005056925db4 |
Supervisord -- An authenticated client can run arbitrary shell commands via malicious XML-RPC requests |
c95836a0-2b3b-11e9-9838-8c164567ca3c |
unit -- heap memory buffer overflow |
c96d416a-eae7-4d5d-bc84-40deca9329fb |
mozilla -- multiple vulnerabilities |
c97219b6-843d-11e2-b131-000c299b62e1 |
stunnel -- Remote Code Execution |
c97a4ecf-cc25-11ee-b0ee-0050569f0b83 |
nginx-devel -- Multiple Vulnerabilities in HTTP/3 |
c97a940b-c392-11e9-bb38-000d3ab229d6 |
Node.js -- multiple vulnerabilities |
c97d7a37-2233-11df-96dd-001b2134ef46 |
openoffice.org -- multiple vulnerabilities |
c9a6ae4a-df8b-11df-9573-00262d5ed8ee |
monotone -- remote denial of service in default setup |
c9b3324f-8e03-4ae3-89ce-8098cdc5bfa9 |
py-markdown2 -- regular expression denial of service vulnerability |
c9c14242-6843-11dc-82b6-02e0185f8d72 |
mediawiki -- cross site scripting vulnerability |
c9c252f5-2def-11e6-ae88-002590263bf5 |
expat -- multiple vulnerabilities |
c9c3374d-c2c1-11e4-b236-5453ed2e2b49 |
qt4-gui, qt5-gui -- DoS vulnerability in the BMP image handler |
c9c46fbf-7b83-11e4-a96e-6805ca0b3d42 |
phpMyAdmin -- XSS and DoS vulnerabilities |
c9c6c2f8-cd54-11e9-af89-080027ef1a23 |
libgcrypt -- ECDSA timing attack |
c9d2e361-32fb-11db-a6e2-000e0c2e438a |
sppp -- buffer overflow vulnerability |
c9e2a1a7-caa1-11eb-904f-14dae9d5a9d2 |
dragonfly -- argument injection |
c9ff1150-5d63-11ee-bbae-1c61b4739ac9 |
xrdp -- Improper handling of session establishment errors allows bypassing OS-level session restrictions |
ca05d9da-ac1d-4113-8a05-ffe9cd0d6160 |
sinatra -- XSS vulnerability |
ca0841ff-1254-11de-a964-0030843d3802 |
proftpd -- multiple sql injection vulnerabilities |
ca139c7f-2a8c-11e5-a4a5-002590263bf5 |
libwmf -- multiple vulnerabilities |
ca16fd0b-5fd1-11e6-a6f2-6cc21735f730 |
PostgreSQL -- Denial-of-Service and Code Injection Vulnerabilities |
ca21f5e7-7228-11eb-8386-001999f8d30b |
asterisk -- An unsuspecting user could crash Asterisk with multiple hold/unhold requests |
ca3fe5b3-185e-11ea-9673-4c72b94353b5 |
phpmyadmin -- multiple vulnerabilities |
ca44b64c-4453-11e4-9ea1-c485083ca99c |
Flash player -- Multiple security vulnerabilities in www/linux-*-flashplugin11 |
ca4d63fb-f15c-11e2-b183-20cf30e32f6d |
apache24 -- several vulnerabilities |
ca543e06-207a-11d9-814e-0001020eed82 |
cacti -- SQL injection |
ca595a25-91d8-11ea-b470-080027846a02 |
Python -- CRLF injection via the host part of the url passed to urlopen() |
ca5cb202-4f51-11e6-b2ec-b499baebfeaf |
MySQL -- Multiple vulnerabilities |
ca5d3272-59e3-11e2-853b-00262d5ed8ee |
rubygem-rails -- multiple vulnerabilities |
ca5f3bbc-7a62-11ef-9533-f875a43e1796 |
expat -- multiple vulnerabilities |
ca6c8f35-0a5f-11d9-ad6f-00061bc2ad93 |
apache -- heap overflow in mod_proxy |
ca8327f7-a5a5-11ea-a860-08002728f74c |
websocket-extensions -- ReDoS vulnerability |
ca8e56d5-e856-11dc-b5af-0017319806e7 |
ghostscript -- zseticcspace() function buffer overflow vulnerability |
ca982e2d-61a9-11ec-8be6-d4c9ef517024 |
Apache httpd -- Multiple vulnerabilities |
ca9ce879-5ebb-11d9-a01c-0050569f0001 |
exim -- two buffer overflow vulnerabilities |
caa98ffd-0a92-40d0-b234-fd79b429157e |
cURL -- URL request injection vulnerability |
cacaffbc-5e64-11d8-80e3-0020ed76ef5a |
GNU libtool insecure temporary file handling |
cad045c0-81a5-11d8-9645-0020ed76ef5a |
zebra/quagga denial of service vulnerability |
cae01d7b-110d-11df-955a-00219b0fc4d8 |
apache -- Prevent chunk-size integer overflow on platforms where sizeof(int) < sizeof(long) |
caf545f2-c0d9-11e9-9051-4c72b94353b5 |
Apache -- Multiple vulnerabilities |
cb0183bb-45f6-11ea-a1c7-b499baebfeaf |
MariaDB -- Vulnerability in C API |
cb09a7aa-5344-11e6-a7bd-14dae9d210b8 |
xercesi-c3 -- multiple vulnerabilities |
cb0bf1ec-bb92-11e6-a9a5-b499baebfeaf |
Apache httpd -- denial of service in HTTP/2 |
cb116651-79db-4c09-93a2-c38f9df46724 |
django -- multiple vulnerabilities |
cb13a765-a277-11eb-97a0-e09467587c17 |
chromium -- multiple vulnerabilities |
cb22a9a6-c907-11ee-8d1c-40b034429ecf |
p5-Spreadsheet-ParseExcel -- Remote Code Execution Vulnerability |
cb252f01-7c43-11e3-b0a6-005056a37f68 |
bind -- denial of service vulnerability |
cb3f036d-8c7f-11e6-924a-60a44ce6887b |
libvncserver -- multiple security vulnerabilities |
cb470368-94d2-11d9-a9e0-0001020eed82 |
ethereal -- multiple protocol dissectors vulnerabilities |
cb5189eb-572f-11e6-b334-002590263bf5 |
libidn -- multiple vulnerabilities |
cb539d4e-cd68-11e8-8819-00e04c1ea73d |
gitea -- multiple vulnerabilities |
cb6c6c29-9c4f-11d8-9366-0020ed76ef5a |
proftpd IP address access control list breakage |
cb84b940-add5-11ec-9bc8-6805ca2fa271 |
powerdns-recursor -- denial of service |
cb902a77-3f43-11ed-9402-901b0e9408dc |
Matrix clients -- several vulnerabilities |
cb9d2fcd-eb47-11e4-b03e-002590263bf5 |
wpa_supplicant -- P2P SSID processing vulnerability |
cba246d2-f483-11e5-92ce-002590263bf5 |
bind -- denial of service vulnerability |
cbceeb49-3bc7-11e6-8e82-002590263bf5 |
Apache Commons FileUpload -- denial of service (DoS) vulnerability |
cbe1a0f9-27e9-11e5-a4a5-002590263bf5 |
xen-tools -- Guest triggerable qemu MSI-X pass-through error messages |
cbfa8bd7-24b6-11e5-86ff-14dae9d210b8 |
haproxy -- information leak vulnerability |
cbfc1591-c8c0-11ee-b45a-589cfc0f81b0 |
phpmyfaq -- multiple vulnerabilities |
cbfd1874-efea-11eb-8fe9-036bd763ff35 |
fetchmail -- 6.4.19 and older denial of service or information disclosure |
cbfde1cd-87eb-11d9-aa18-0001020eed82 |
mozilla -- arbitrary code execution vulnerability |
cc068959-ce2b-42eb-81ed-055551fe0e51 |
electron32 -- multiple vulnerabilities |
cc0fb686-6550-11d8-80e3-0020ed76ef5a |
file disclosure in phpMyAdmin |
cc1ac01e-86b0-11ef-9369-2cf05da270f3 |
Gitlab -- vulnerabilities |
cc1fd3da-b8fd-4f4d-a092-c38541c0f993 |
vault -- User Enumeration via LDAP auth |
cc294a2c-a232-11e4-8e9f-0011d823eebd |
Adobe Flash Player -- multiple vulnerabilities |
cc3bfec6-56cd-11e0-9668-001fd0d616cf |
php -- crash on crafted tag in exif |
cc42db1c-c65f-11ec-ad96-0800270512f4 |
redis -- Multiple vulnerabilities |
cc47fafe-f823-11dd-94d9-0030843d3802 |
typo3 -- cross-site scripting and information disclosure |
cc4ce06b-e01c-11d9-a8bd-000cf18bbe54 |
p5-Mail-SpamAssassin -- denial of service vulnerability |
cc553d79-e1f0-4b94-89f2-bacad42ee826 |
mosquitto -- NULL pointer dereference |
cc627e6c-3b89-11e4-b629-6805ca0b3d42 |
phpMyAdmin -- XSRF/CSRF due to DOM based XSS in the micro history feature |
cc7548ef-06e1-11e5-8fda-002590263bf5 |
libmspack -- frame_end overflow which could cause infinite loop |
cc7c85d9-f30a-11eb-b12b-fc4dd43e2b6a |
tomcat -- Remote Denial of Service in multiple versions |
cc9043cf-7f7a-426e-b2cc-8d1980618113 |
ruby -- Heap Overflow in Floating Point Parsing |
cca97f5f-7435-11db-91de-0008743bf21a |
proftpd -- Remote Code Execution Vulnerability |
ccace707-a8d8-11e7-ac58-b499baebfeaf |
cURL -- out of bounds read |
ccaea96b-7dcd-11ec-93df-00224d821998 |
strongswan - Incorrect Handling of Early EAP-Success Messages |
ccd325d2-fa08-11d9-bc08-0001020eed82 |
isc-dhcpd -- format string vulnerabilities |
ccd698df-8e20-11d8-90d1-0020ed76ef5a |
racoon remote denial of service vulnerability (ISAKMP header length field) |
cce76eca-ca16-11eb-9b84-d4c9ef517024 |
Apache httpd -- Multiple vulnerabilities |
ccefac3e-2aed-11e3-af10-000c29789cb5 |
polarssl -- Timing attack against protected RSA-CRT implementation |
cd286cc5-b762-11d9-bfb7-000c6ec775d9 |
ImageMagick -- ReadPNMImage() heap overflow vulnerability |
cd2dc126-cfe4-11ea-9172-4c72b94353b5 |
Cacti -- multiple vulnerabilities |
cd409df7-f483-11e5-92ce-002590263bf5 |
bind -- denial of service vulnerability |
cd68ff50-362b-11e0-ad36-00215c6a37bb |
phpMyAdmin -- multiple vulnerabilities |
cd7e260a-6bff-11d9-a5df-00065be4b5b6 |
newsgrab -- insecure file and directory creation |
cd81806c-26e7-4d4a-8425-02724a2f48af |
mozilla -- multiple vulnerabilities |
cd864f1a-8e5a-11ea-b5b4-641c67a117d8 |
cacti -- XSS exposure |
cd944b3f-51f6-11e7-b7b2-001c25e46b1d |
Flash Player -- multiple vulnerabilities |
cd97c7ca-f079-11ea-9c31-001b216d295b |
Multi-link PPP protocol daemon MPD5 remotely exploitable crash |
cda2f3c2-6c8b-11e7-867f-b499baebfeaf |
MySQL -- multiple vulnerabilities |
cda566a0-2df0-4eb0-b70e-ed7a6fb0ab3c |
puppet27 and puppet -- multiple vulnerabilities |
cdb10765-6879-11eb-a7d8-08002734b9ed |
gitea -- multiple vulnerabilities |
cdb4d962-34f9-11e8-92db-080027907385 |
moodle -- multiple vulnerabilities |
cdb5338d-04ec-11ee-9c88-001b217b3468 |
Gitlab -- Vulnerability |
cdb5e0e3-fafc-11ee-9c21-901b0e9408dc |
go -- http2: close connections when receiving too many headers |
cdc4ff0e-d736-11e1-8221-e0cb4e266481 |
p5-RT-Authen-ExternalAuth -- privilege escalation |
cdc685b5-1724-49a1-ad57-2eaab68e9cc0 |
py-pygments -- multiple DoS vulnerabilities |
cddde37a-39b5-11dc-b3da-001921ab2fa4 |
dokuwiki -- XSS vulnerability in spellchecker backend |
cdeb34e6-d00d-11e0-987e-00215c6a37bb |
stunnel -- heap corruption vulnerability |
cdf14b68-3ff9-11d9-8405-00065be4b5b6 |
Open DC Hub -- remote buffer overflow vulnerability |
cdf18ed9-7f4a-11d8-9645-0020ed76ef5a |
multiple vulnerabilities in ethereal |
cdff0af2-1492-11e5-a1cf-002590263bf5 |
php5 -- multiple vulnerabilities |
ce0c8590-b628-11ea-9d28-3c970ee9157c |
CUPS -- memory corruption |
ce0f52e1-a174-11ef-9a62-002590c1f29c |
FreeBSD -- Certificate revocation list fetch(1) option fails |
ce109fd4-67f3-11d9-a9e7-0001020eed82 |
mysql-scripts -- mysqlaccess insecure temporary file creation |
ce231189-ce56-11e9-9fa0-0050569f0b83 |
www/varnish6 -- Denial of Service |
ce29ce1d-971a-11dd-ab7e-001c2514716c |
cups -- multiple vulnerabilities |
ce2f2ade-e7df-11dc-a701-000bcdc1757a |
phpmyadmin -- SQL injection vulnerability |
ce39379f-7eb7-11e8-ab03-00bd7f19ff09 |
h2o -- heap buffer overflow during logging |
ce46b93a-80f2-11d8-9645-0020ed76ef5a |
Buffer overflows and format string bugs in Emil |
ce4b3af8-0b7c-11e1-846b-00235409fd3e |
libxml -- Multiple use-after-free vulnerabilities |
ce502902-ca39-11e2-9673-001e8c75030d |
devel/subversion -- svnserve remotely triggerable DoS |
ce658051-27ea-11e5-a4a5-002590263bf5 |
xen-kernel -- Information leak through XEN_DOMCTL_gettscinfo |
ce680f0a-eea6-11e1-8bd8-0022156e8794 |
squidclamav -- cross-site scripting in default virus warning pages |
ce6ac624-aec8-11d9-a788-0001020eed82 |
firefox -- PLUGINSPAGE privileged javascript execution |
ce6ce2f8-34ac-11e0-8103-00215c6a37bb |
awstats -- arbitrary commands execution vulnerability |
ce6db19b-976e-11ea-93c4-08002728f74c |
Rails -- remote code execution vulnerability |
ce79167f-ee1c-11eb-9785-b42e99a1b9c3 |
powerdns -- remotely triggered crash |
ce808022-8ee6-11e6-a590-14dae9d210b8 |
FreeBSD -- Heap overflow vulnerability in bspatch |
ce82bfeb-d276-11e1-92c6-14dae938ec40 |
dns/nsd -- DoS vulnerability from non-standard DNS packet |
cebd05d6-ed7b-11e7-95f2-005056925db4 |
OTRS -- Multiple vulnerabilities |
cebed39d-9e6f-11e2-b3f5-003067c2616f |
opera -- moderately severe issue |
cec4d01a-7ac5-11e5-b35a-002590263bf5 |
Joomla! -- Core - Remote File Execution/Denial of Service vulnerabilities |
cecbc674-8b83-11ec-b369-6c3be5272acd |
Grafana -- XSS |
ced2d47e-8469-11ea-a283-b42e99a1b9c3 |
malicious URLs may present credentials to wrong server |
cee3d12f-bf41-11e7-bced-00e04c1ea73d |
wordpress -- multiple issues |
cf0fb426-3f96-11d8-b096-0020ed76ef5a |
ProFTPD ASCII translation bug resulting in remote root compromise |
cf133acc-82e7-4755-a66a-5ddf90dacbe6 |
graphite2 -- out-of-bounds write with malicious font |
cf2105c6-551b-11e9-b95c-b499baebfeaf |
Apache -- Multiple vulnerabilities |
cf39ddf8-21be-11eb-8b47-641c67a117d8 |
jupyter notebook -- open redirect vulnerability |
cf3b9a96-f7bb-11da-9156-000e0c2e438a |
smbfs -- chroot escape |
cf40e8b7-264d-11ee-a468-80fa5b29d485 |
virtualbox-ose -- multiple vulnerabilities |
cf484358-b5d6-11dc-8de0-001c2514716c |
dovecot -- Specific LDAP + auth cache configuration may mix up user logins |
cf495fd4-fdcd-11dd-9a86-0050568452ac |
Zend Framework -- Local File Inclusion vulnerability in Zend_View::render() |
cf6f3465-e996-4672-9458-ce803f29fdb7 |
py-markdown2 -- XSS vulnerability |
cf86c644-cb6c-11db-8e9d-000c6ec775d9 |
mod_jk -- long URL stack overflow vulnerability |
cf91c1e4-2b6d-11de-931b-00e0815b8da8 |
ejabberd -- cross-site scripting vulnerability |
cf96cd8d-48fb-11e0-98a6-0050569b2d21 |
redmine -- XSS vulnerability |
cfa0be42-3cd7-11eb-9de7-641c67a117d8 |
py-matrix-synapse -- DoS on Federation API |
cfb12f02-06e1-11e5-8fda-002590263bf5 |
cabextract -- directory traversal with UTF-8 symbols in filenames |
cfd2a634-3785-11ee-94b4-6cc21735f730 |
postgresql-server -- Extension script @substitutions@ within quoting allow SQL injection |
cfe17ca6-6858-4805-ba1d-a60a61ec9b4d |
phpBB IP address spoofing |
cff0b2e2-0716-11eb-9e5d-08002728f74c |
libexif -- multiple vulnerabilities |
d001c189-2793-11ec-8fb1-206a8a720317 |
Apache httpd -- Path Traversal and Remote Code Execution |
d0034536-ff24-11e4-a072-d050996490d0 |
proftpd -- arbitrary code execution vulnerability with chroot |
d01d10c7-de2d-11e0-b215-00215c6a37bb |
django -- multiple vulnerabilities |
d022754d-8839-11d9-aa18-0001020eed82 |
mozilla -- insecure temporary directory vulnerability |
d02f6b01-1a3f-11e5-8bd6-c485083ca99c |
Adobe Flash Player -- critical vulnerabilities |
d057c5e6-5b20-11e4-bebd-000c2980a9f3 |
libpurple/pidgin -- multiple vulnerabilities |
d08f6002-c588-11e4-8495-6805ca0b3d42 |
rt -- Remote DoS, Information disclosure and Session Hijackingvulnerabilities |
d0ac9a17-5e68-11ef-b8cc-b42e991fc52e |
mozilla products -- spoofing attack |
d0b12952-cb86-11e6-906f-0cc47a065786 |
h2o -- Use-after-free vulnerability |
d0be41fe-2a20-4633-b057-4e8b25c41780 |
bro -- array bounds and potential DOS issues |
d0be8e1f-b19a-11ea-94aa-b827eb2f57d4 |
MongoDB -- Ensure RoleGraph can serialize authentication restrictions to BSON |
d0c97697-df2c-4b8b-bff2-cec24dc35af8 |
mozilla -- multiple vulnerabilities |
d0da046a-81e6-11ed-96ca-0800277bb8a8 |
gitea -- multiple issues |
d10b49b2-8d02-49e8-afde-0844626317af |
mozilla -- multiple vulnerabilities |
d10fc771-958f-11eb-9c34-080027f515ea |
curl -- TLS 1.3 session ticket proxy host mixup |
d153c4d2-50f8-11eb-8046-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
d1681df3-421e-4a63-95b4-a3d6e29d395d |
electron{23,24} -- multiple vulnerabilities |
d177d9f9-e317-11d9-8088-00123f0f7307 |
nwclient -- multiple vulnerabilities |
d1853110-07f4-4645-895b-6fd462ad0589 |
mozilla -- multiple vulnerabilities |
d18f431d-d360-11eb-a32c-00a0989e4ec1 |
dovecot -- multiple vulnerabilities |
d193aa9f-3f8c-11e9-9a24-6805ca0b38e8 |
rssh - multiple vulnerabilities |
d1ac6a6a-bea8-11eb-b87a-901b0ef719ab |
FreeBSD-kernel -- SMAP bypass |
d1b20e09-dbdf-432b-83c7-89f0af76324a |
electron27 -- multiple vulnerabilities |
d1b35142-ff4a-11ec-8be3-001b217b3468 |
Gitlab -- multiple vulnerabilities |
d1bbc235-c0c9-45cd-8d2d-c1b8fd22e616 |
imap-uw -- authentication bypass when CRAM-MD5 is enabled |
d1be3d73-6737-11ec-9eea-589cfc007716 |
OpenSearch -- Log4Shell |
d1c39c8e-05ab-4739-870f-765490fa2052 |
openvpn -- denial of service: undecryptable packet from authorized client can disconnect unrelated clients |
d1ce8a4f-c235-11dd-8cbc-00163e000016 |
squirrelmail -- Cross site scripting vulnerability |
d1dfc4c7-8791-11e3-a371-6805ca0b3d42 |
rt42 -- denial-of-service attack via the email gateway |
d1e9d8c5-839b-11e8-9610-9c5c8e75236a |
clamav -- multiple vulnerabilities |
d1ef1138-d273-11ea-a757-e0d55e2a8bf9 |
ark -- directory traversal |
d1f5e12a-fd5a-11e3-a108-080027ef73ec |
LZO -- potential buffer overrun when processing malicious input data |
d2073237-5b52-11e3-80f7-c86000cbc6ec |
OpenTTD -- Denial of service using forcefully crashed aircrafts |
d2102505-f03d-11d8-81b0-000347a4fa7d |
cvs -- numerous vulnerabilities |
d222241d-91cc-11ea-82b8-4c72b94353b5 |
glpi -- stored XSS |
d226626c-857f-11e0-95cc-001b2134ef46 |
linux-flashplugin -- multiple vulnerabilities |
d2293e22-4390-42c2-a323-34cca2066000 |
py39-sqlalchemy12 -- multiple SQL Injection vulnerabilities |
d22b336d-0567-11ec-b69d-4062311215d5 |
FreeBSD -- libfetch out of bounds read |
d23119df-335d-11e2-b64c-c8600054b392 |
mozilla -- multiple vulnerabilities |
d2505ec7-78ea-11ee-9131-6f01853956d5 |
open-vm-tools -- Multiple vulnerabilities |
d2723b0f-58d9-11ef-b611-84a93843eb75 |
Vaultwarden -- Multiple vulnerabilities |
d2992bc2-ed18-11ee-96dc-001b217b3468 |
Gitlab -- vulnerabilities |
d29dc506-8aa6-11db-bd0d-00123ffe8333 |
wv -- Multiple Integer Overflow Vulnerabilities |
d2a43243-087b-11db-bc36-0008743bf21a |
mutt -- Remote Buffer Overflow Vulnerability |
d2a84feb-ebe0-11e5-92ce-002590263bf5 |
git -- integer overflow |
d2a892b9-2605-11e4-9da0-00a0986f28c4 |
PHP multiple vulnerabilities |
d2ad7647-6dd9-11ee-85eb-84a93843eb75 |
Roundcube -- XSS vulnerability in SVG |
d2b48d30-ea97-11db-a802-000fea2763ce |
lighttpd -- Remote DOS in CRLF parsing |
d2b80c7c-3aae-11da-9484-00123ffe8333 |
zope -- expose RestructuredText functionality to untrusted users |
d2b8a963-3d59-11dc-b3d3-0016179b2dd5 |
p5-Net-DNS -- multiple Vulnerabilities |
d2c2952d-85a1-11dc-bfff-003048705d5a |
py-django -- denial of service vulnerability |
d2c2c815-3793-11ea-8be3-54e1ad3d6335 |
drm graphics drivers -- potential information disclusure via local access |
d2c6173f-e43b-11ed-a1d7-002590f2a714 |
git -- Multiple vulnerabilities |
d3180f02-031e-11ec-875f-0800273f11ea |
gitea -- multiple vulnerabilities |
d3216606-2b47-11e5-a668-080027ef73ec |
PolarSSL -- Security Fix Backports |
d331f691-71f4-11ea-8bb5-6cc21735f730 |
PostgresSQL -- ALTER ... DEPENDS ON EXTENSION is missing authorization checks |
d3324c55-3f11-11e4-ad16-001999f8d30b |
squid -- Buffer overflow in SNMP processing |
d3324fdb-6bf0-11e5-bc5e-00505699053e |
ZendFramework1 -- SQL injection vulnerability |
d337b206-200f-11dc-a197-0011098b2f36 |
xpcd -- buffer overflow |
d34bef0b-f312-11eb-b12b-fc4dd43e2b6a |
tomcat -- HTTP request smuggling in multiple versions |
d3527663-4ccb-11db-b48d-00508d6a62df |
eyeOS -- multiple XSS security bugs |
d35373ae-4d34-11ee-8e38-002590c1f29c |
FreeBSD -- pf incorrectly handles multiple IPv6 fragment headers |
d357f6bb-0af4-4ac9-b096-eeec183ad829 |
chromium -- multiple vulnerabilities |
d371b627-6ed5-11d9-bd18-000a95bc6fae |
zhcon -- unauthorized file access |
d37407bd-5c5f-11ea-bb2a-8c164582fbac |
TiMidity++ -- Multiple vulnerabilities |
d379aa14-8729-11ed-b988-080027d3a315 |
mediawiki -- multiple vulnerabilities |
d3847eba-114b-11ef-9c21-901b0e9408dc |
go -- net: malformed DNS message can cause infinite loop |
d38bbb79-14f3-11e9-9ce2-28d244aee256 |
irssi -- Use after free |
d38e1810-9ef7-11da-b410-000e0c2e438a |
tor -- malicious tor server can locate a hidden service |
d3921810-3c80-11e1-97e8-00215c6a37bb |
php -- multiple vulnerabilities |
d395e44f-6f4f-11e4-a444-00262d5ed8ee |
chromium -- multiple vulnerabilities |
d3a98c2d-5da1-11e5-9909-002590263bf5 |
squid -- TLS/SSL parser denial of service vulnerability |
d3d02d3a-2242-11e9-b95c-b499baebfeaf |
MySQL -- multiple vulnerabilities |
d3e023fb-6e88-11ec-b948-080027240888 |
Django -- multiple vulnerabilities |
d3e96508-056b-4259-88ad-50dc8d1978a6 |
Ruby -- XSS exploit of RDoc documentation generated by rdoc |
d3f3e818-8d10-11ea-8668-e0d55e2a8bf9 |
taglib -- heap-based buffer over-read via a crafted audio file |
d3f60db0-3aea-11eb-af2a-080027dbe4b7 |
glpi -- Account takeover vulnerability |
d40c66cb-27e4-11e5-a4a5-002590263bf5 |
xen-kernel and xen-tools -- Long latency MMIO mapping operations are not preemptible |
d4284c2e-8b83-11ec-b369-6c3be5272acd |
Grafana -- CSRF |
d42e5b66-6ea0-11df-9c8d-00e0815b8da8 |
sudo -- Secure path vulnerability |
d4379f59-3e9b-49eb-933b-61de4d0b0fdb |
Ruby -- OpenSSL Hostname Verification Vulnerability |
d44129d6-b22e-4e9c-b200-6a46e8bd3e60 |
libsamplerate -- multiple vulnerabilities |
d455708a-e3d3-11e6-9940-b499baebfeaf |
OpenSSL -- multiple vulnerabilities |
d459c914-4100-11ed-9bc7-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
d45ad7ae-5d56-11e5-9ad8-14dae9d210b8 |
shutter -- arbitrary code execution |
d460b640-4cdf-11ea-a59e-6451062f0f7a |
Flash Player -- arbitrary code execution |
d46ed7b8-1912-11e5-9fdf-00262d5ed8ee |
www/chromium -- multiple vulnerabilities |
d47b7ae7-fe1d-4f7f-919a-480ca8035f00 |
zeek -- potential DoS vulnerability |
d47e9d19-5016-11d9-9b5f-0050569f0001 |
php -- multiple vulnerabilities |
d487d4fc-43a8-11ed-8b01-b42e991fc52e |
zydis -- heap buffer overflow |
d48a2224-9b4c-11ef-bdd9-4ccc6adda413 |
gstreamer1-rtsp-server -- Potential Denial-of-Service (DoS) with specially crafted client requests |
d49f86ab-d9c7-11eb-a200-00155d01f201 |
Exiv2 -- Multiple vulnerabilities |
d4a358d3-e09a-11dd-a765-0030843d3802 |
nagios -- web interface privilege escalation vulnerability |
d4a7054a-6d96-11d9-a9e7-0001020eed82 |
yamt -- arbitrary command execution vulnerability |
d4bd4046-93a6-11d9-8378-000bdb1444a4 |
rxvt-unicode -- buffer overflow vulnerability |
d4c70df5-335d-11da-9c70-0040f42d58c6 |
weex -- remote format string vulnerability |
d4c7e9a9-d893-11e6-9b4d-d050996490d0 |
BIND -- multiple vulnerabilities |
d4cc994f-b61d-11ec-9ebc-1c697aa5a594 |
FreeBSD -- 802.11 heap buffer overflow |
d4d21998-bdc4-4a09-9849-2898d9b41459 |
zeek -- several vulnerabilities |
d4f45676-9d33-11e4-8275-000c292e4fd8 |
samba -- Elevation of privilege to Active Directory Domain Controller |
d4fc4599-8f75-11e9-8d9f-3065ec8fd3ec |
chromium -- use after free |
d5026193-6fa2-11ef-99bc-1c697a616631 |
Intel CPUs -- multiple vulnerabilities |
d50a50a2-2f3e-11e8-86f8-00e04c1ea73d |
mybb -- multiple vulnerabilities |
d51a7e6e-c546-11d9-9aed-000e0c2e438a |
cdrdao -- unspecified privilege escalation vulnerability |
d51b52cf-c199-11e9-b13f-001b217b3468 |
Libgit2 -- multiple vulnerabilities |
d51ced72-4212-11e6-942d-bc5ff45d0f28 |
xen-kernel -- x86 shadow pagetables: address width overflow |
d53c30c1-0d7b-11ef-ba02-6cc21735f730 |
PostgreSQL server -- Potentially allowing authenicated database users to see data that they shouldn't. |
d55e1b4d-eadc-11ed-9cc0-080027de9982 |
Django -- multiple vulnerabilities |
d560b346-08a2-11e0-bcca-0050568452ac |
YUI JavaScript library -- JavaScript injection exploits in Flash components |
d58455cc-159e-11ef-83d8-4ccc6adda413 |
qt5-webengine -- Multiple vulnerabilities |
d58726ff-ef5e-11ee-8d8e-080027a5b8e9 |
mediawiki -- multiple vulnerabilities |
d59ebed4-34be-11e6-be25-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
d5b6d151-1887-11e8-94f7-9c5c8e75236a |
squid -- Vulnerable to Denial of Service attack |
d5e0317e-5e45-11e2-a113-c48508086173 |
java 7.x -- security manager bypass |
d5e1aac8-db0b-11dd-ae30-001cc0377035 |
xterm -- DECRQSS remote command execution vulnerability |
d5fead4f-8efa-11ea-a5c8-08002728f74c |
Wagtail -- potential timing attack vulnerability |
d60199df-7fb3-11e2-9c5a-000d601460a4 |
otrs -- XSS vulnerability in Firefox and Opera could lead to remote code execution |
d605edb1-1616-11e5-a000-d050996490d0 |
drupal -- multiple vulnerabilities |
d62ec98e-97d8-11e5-8c0e-080027b00c2e |
cyrus-imapd -- integer overflow in the start_octet addition |
d6540411-9e10-11ea-9e83-0cc47ac16c9d |
qmail -- 64 bit integer overflows with possible remote code execution on large SMTP requests |
d656296b-33ff-11d9-a9e7-0001020eed82 |
ruby -- CGI DoS |
d658042c-1c98-11ed-95f8-901b0e9408dc |
dendrite -- Incorrect parsing of the event default power level in event auth |
d670a953-b2a1-11e7-a633-009c02a2ab30 |
WPA packet number reuse with replayed messages and key reinstallation |
d67b517d-8214-11de-88ea-001a4d49522b |
bugzilla -- product name information leak |
d68df01b-564e-11e5-9ad8-14dae9d210b8 |
ganglia-webfrontend -- auth bypass |
d696473f-9f32-42c5-a106-bf4536fb1f74 |
Django -- information leakage |
d6b092bd-61e1-11da-b64c-0001020eed82 |
opera -- multiple vulnerabilities |
d6bbf2d8-2cfc-11e6-800b-080027468580 |
iperf3 -- buffer overflow |
d6c19e8c-6806-11ee-9464-b42e991fc52e |
curl -- SOCKS5 heap buffer overflow |
d6c51737-a84b-11e5-8f5c-002590263bf5 |
librsvg2 -- denial of service vulnerability |
d6d088c9-5064-11ed-bade-080027881239 |
Python -- multiple vulnerabilities |
d6f76976-e86d-4f9a-9362-76c849b10db2 |
jenkins -- multiple vulnerabilities |
d706a3a3-4a7c-11e6-97f7-5453ed2e2b49 |
p7zip -- out-of-bounds read vulnerability |
d70c9e18-f340-11e8-be46-0019dbb15b3f |
payara -- Multiple vulnerabilities |
d713d709-4cc9-11ed-a621-0800277bb8a8 |
gitea -- multiple issues |
d71831ef-e6f8-11e5-85be-14dae9d210b8 |
ricochet -- information disclosure |
d71d154a-8b83-11ec-b369-6c3be5272acd |
Grafana -- Teams API IDOR |
d71da236-9a94-11dd-8f42-001c2514716c |
libxml2 -- two vulnerabilities |
d73bc4e6-e7c4-11ea-a878-e09467587c17 |
chromium -- multiple vulnerabilities |
d74371d2-4fee-11e9-a5cd-1df8a848de3d |
Python -- NULL pointer dereference vulnerability |
d754b7d2-b6a7-11df-826c-e464a695cb21 |
wget -- multiple HTTP client download filename vulnerability |
d76961da-56f6-11e5-934b-002590263bf5 |
pgbouncer -- failed auth_query lookup leads to connection as auth_user |
d778ddb0-2338-11ea-a1c7-b499baebfeaf |
OpenSSL -- Overflow vulnerability |
d77ceb8c-bb13-11e7-8357-3065ec6f3643 |
wget -- Heap overflow in HTTP protocol handling |
d79fc873-b5f9-11e0-89b4-001ec9578670 |
phpmyadmin -- multiple vulnerabilities |
d7a43ee6-d2d5-11e2-9894-002590082ac6 |
owncloud -- Multiple security vulnerabilities |
d7af61c8-2cc0-11d8-9355-0020ed76ef5a |
lftp HTML parsing vulnerability |
d7b9a28d-238c-11e5-86ff-14dae9d210b8 |
bitcoin -- denial of service |
d7c1d00d-9d2e-11da-8c1d-000e0c2e438a |
ipfw -- IP fragment denial of service |
d7cd5015-08c9-11da-bc08-0001020eed82 |
gforge -- XSS and email flood vulnerabilities |
d7d1cc94-b971-11e7-af3a-f1035dd0da62 |
Node.js -- remote DOS security vulnerability |
d7dbd2db-599c-11e1-a2fb-14dae9ebcf89 |
mozilla -- heap-buffer overflow |
d7efc2ad-37af-11ef-b611-84a93843eb75 |
Apache httpd -- Multiple vulnerabilities |
d821956f-1753-11ee-ad66-1c61b4739ac9 |
SoftEtherVPN -- multiple vulnerabilities |
d82bcd2b-5cd6-421c-8179-b3ff0231029f |
py-tflite -- denial of service vulnerability |
d835c54f-a4bd-11ed-b6af-b42e991fc52e |
node_exporter -- bypass security with cache poisoning |
d8382a69-4728-11e8-ba83-0011d823eebd |
mbed TLS (PolarSSL) -- multiple vulnerabilities |
d843a984-7f22-484f-ba81-483ddbe30dc3 |
ledger -- multiple vulnerabilities |
d846af5b-00f4-11e2-b6d0-00e0814cab4e |
jenkins -- multiple vulnerabilities |
d864a0a7-6f27-11dd-acfe-00104b9e1a4a |
gnutls -- "gnutls_handshake()" Denial of Service |
d86890da-f498-11e4-99aa-bcaec565249c |
wordpress -- 2 cross-site scripting vulnerabilities |
d86becfe-05a4-11ee-9d4a-080027eda32c |
Python -- multiple vulnerabilities |
d8769838-8814-11d8-90d1-0020ed76ef5a |
racoon fails to verify signature during Phase 1 |
d881d254-70c6-11e2-862d-080027a5ec9a |
libexif -- multiple remote vulnerabilities |
d887b3d9-7366-11ea-b81a-001cc0382b2f |
GnuTLS -- flaw in DTLS protocol implementation |
d889d32c-ecd9-11e8-9416-001b217b3468 |
Gitlab -- Multiple vulnerabilities |
d8972bcd-1b64-11ee-9cd6-001b217b3468 |
Gitlab -- Vulnerabilities |
d8c901ff-0f0f-11e1-902b-20cf30e32f6d |
Apache 1.3 -- mod_proxy reverse proxy exposure |
d8e1aadd-ee68-11d9-8310-0001020eed82 |
clamav -- cabinet file handling DoS vulnerability |
d8e55d65-81d6-11d9-a9e7-0001020eed82 |
opera -- kfmclient exec command execution vulnerability |
d8e7e854-17fa-11e9-bef6-6805ca2fa271 |
botan2 -- Side channel during ECC key generation |
d8fbf13a-6215-11db-a59e-0211d85f11fb |
kdelibs -- integer overflow in khtml |
d905b219-c1ca-11e9-8c46-0c9d925bbbc0 |
xdm -- remote denial of service |
d923fb0c-8c2f-11ec-aa85-0800270512f4 |
zsh -- Arbitrary command execution vulnerability |
d9307a41-c4d7-11da-b2fb-000e0c2e438a |
zoo -- stack based buffer overflow |
d9360908-9d52-11e4-87fd-10bf48e1088e |
unzip -- input sanitization errors |
d9405748-1342-11dc-a35c-001485ab073e |
mod_jk -- information disclosure |
d944719e-42f4-4864-89ed-f045b541919f |
gtar -- Directory traversal vulnerability |
d94c08d2-d079-11e9-8f1a-001999f8d30b |
asterisk -- Crash when negotiating for T.38 with a declined stream |
d9649816-5e0d-11e3-8d23-3c970e169bc2 |
drupal -- multiple vulnerabilities |
d9867f50-54d0-11dc-b80b-0016179b2dd5 |
claws-mail -- POP3 Format String Vulnerability |
d9b01c08-59b3-11de-828e-00e0815b8da8 |
git -- denial of service vulnerability |
d9b43004-f5fd-4807-b1d7-dbf66455b244 |
mozilla -- multiple vulnerabilities |
d9dbe6e8-84da-11e3-98bd-080027f2d077 |
varnish -- DoS vulnerability in Varnish HTTP cache |
d9dc2697-dadf-11da-912f-00123ffe8333 |
phpwebftp -- "language" Local File Inclusion |
d9e01c35-2531-11e7-b291-b499baebfeaf |
MySQL -- multiple vulnerabilities |
d9e154c9-7de9-11ed-adca-080027d3a315 |
typo3 -- multiple vulnerabilities |
d9e1b569-c3d8-11e5-b5fe-002590263bf5 |
privoxy -- multiple vulnerabilities |
d9e82328-a129-11e7-987e-4f174049b30a |
perl -- multiple vulnerabilities |
d9f686f3-fde0-48dc-ab0a-01c2fe3e0529 |
py-matrix-synapse -- multiple vulnerabilities |
d9f96741-47bd-4426-9aba-8736c0971b24 |
libraw -- buffer overflow |
d9f99491-1656-11e6-94fa-002590263bf5 |
perl5 -- taint mechanism bypass vulnerability |
d9fe59ea-1940-11e8-9eb8-5404a68ad561 |
cvs -- Remote code execution via ssh command injection |
da185955-5738-11de-b857-000f20797ede |
mozilla -- multiple vulnerabilities |
da1d5d2e-3eca-11e7-8861-0018fe623f2b |
miniupnpc -- integer signedness error |
da317bc9-59a6-11e1-bc16-0023ae8e59f0 |
piwik -- xss and click-jacking issues |
da3d381b-0ee6-11e0-becc-0022156e8794 |
pecl-phar -- format string vulnerability |
da434a78-e342-4d9a-87e2-7497e5f117ba |
ffmpeg -- use-after-free |
da451130-365d-11e5-a4a5-002590263bf5 |
qemu, xen-tools -- QEMU heap overflow flaw with certain ATAPI commands |
da459dbc-5586-11e9-abd6-001b217b3468 |
Gitlab -- Multiple vulnerabilities |
da4adc02-07f4-11ef-960d-5404a68ad561 |
hcode -- buffer overflow in mail.c |
da4b89ad-b28f-11e3-99ca-f0def16c5c1b |
nginx-devel -- SPDY heap buffer overflow |
da5c4072-8082-11dd-9c8c-001c2514716c |
clamav -- CHM Processing Denial of Service |
da634091-a84a-11e5-8f5c-002590263bf5 |
librsvg2 -- denial of service vulnerability |
da690355-1159-11d9-bc4a-000c41e2cdad |
mozilla -- vCard stack buffer overflow |
da6f265b-8f3d-11d8-8b29-0020ed76ef5a |
kdepim exploitable buffer overflow in VCF reader |
da70d472-af59-11e7-ace2-f8b156b439c5 |
xen-kernel -- multiple vulnerabilities |
da9e6438-bfc0-11d8-b00e-000347a4fa7d |
MoinMoin administrative group name privilege escalation vulnerability |
daa8a49b-99b9-11e4-8f66-3085a9a4510d |
libevent -- integer overflow in evbuffers |
daadef86-a366-11e5-8b40-20cf30e32f6d |
subversion -- multiple vulnerabilities |
dad6294c-f7c1-11ee-bb77-001b217b3468 |
Gitlab -- Patch Release: 16.10.2, 16.9.4, 16.8.6 |
dade3316-9d31-11da-8c1d-000e0c2e438a |
IEEE 802.11 -- buffer overflow |
daf045d7-b211-11dd-a987-000c29ca8953 |
net-snmp -- DoS for SNMP agent via crafted GETBULK request |
daf0a339-9850-11e2-879e-d43d7e0c7c02 |
asterisk -- multiple vulnerabilities |
dafa13a8-6e9b-11e4-8ef7-5453ed2e2b49 |
kde-workspace -- privilege escalation |
db04bf07-9cc8-11e5-8c2b-c335fa8985d7 |
libraw -- index overflow in smal_decode_segment |
db0c4b00-a24c-11e2-9601-000d601460a4 |
rubygem-rails -- multiple vulnerabilities |
db1d3340-e83b-11e1-999b-e0cb4e266481 |
phpMyAdmin -- Multiple XSS in Table operations, Database structure, Trigger and Visualize GIS data pages |
db2acdac-b5a7-11e8-8f6f-00e04c1ea73d |
mybb -- vulnerabilities |
db3301be-e01c-11e5-b2bd-002590263bf5 |
cacti -- multiple vulnerabilities |
db33e250-74f7-11ee-8290-a8a1599412c6 |
chromium -- multiple vulnerabilities |
db449245-870d-11dc-a3ec-001921ab2fa4 |
openldap -- multiple remote denial of service vulnerabilities |
db4b2f27-252a-11eb-865c-00155d646400 |
go -- math/big: panic during recursive division of very large numbers; cmd/go: arbitrary code execution at build time through cgo |
db570002-ce06-11e7-804e-c85b763a2f96 |
cacti -- multiple vulnerabilities |
db895ed0-6298-11ed-9ca2-6c3be5272acd |
Grafana -- Privilege escalation |
db8fa362-0ccb-4aa8-9220-72b7763e9a4a |
jenkins -- multiple vulnerabilities |
dba5d1c9-9f29-11e1-b511-003067c2616f |
OpenSSL -- DTLS and TLS 1.1, 1.2 denial of service |
dbd1f627-c43b-11e9-a923-9c5c8e75236a |
clamav -- multiple vulnerabilities |
dbdac023-80e1-11e2-9a29-001060e06fd4 |
linux-flashplugin -- multiple vulnerabilities |
dbe8c5bd-8d3f-11ef-8d2e-a04a5edf46d9 |
oauth2-proxy -- multiple vulnerabilities |
dbf338d0-dce5-11e1-b655-14dae9ebcf89 |
mozilla -- multiple vulnerabilities |
dbf9e66c-bd50-11e4-a7ba-206a8a720317 |
krb5 1.11 -- New release/fix multiple vulnerabilities |
dc0c201c-31da-11e8-ac53-d8cb8abf62dd |
Gitlab -- multiple vulnerabilities |
dc132c91-2b71-11eb-8cfd-4437e6ad11c4 |
mutt -- authentication credentials being sent over an unencrypted connection |
dc2d76df-a595-11e4-9363-20cf30e32f6d |
Bugzilla multiple security issues |
dc33795f-ced7-11ed-b1fe-6805ca2fa271 |
powerdns-recursor -- denial of service |
dc3c66e8-6a18-11e7-93af-005056925db4 |
Cacti -- Cross-site scripting (XSS) vulnerability in link.php |
dc49f6dc-99d2-11ed-86e9-d4c9ef517024 |
MySQL -- Multiple vulnerabilities |
dc57ad48-ecbb-439b-a4d0-5869be47684e |
vlc -- Use after free vulnerability |
dc596a17-7a9e-11e6-b034-f0def167eeea |
Remote-Code-Execution vulnerability in mysql and its variants CVE 2016-6662 |
dc8741b9-c5d5-11e0-8a8e-00151735203a |
bugzilla -- multiple vulnerabilities |
dc880d6c-195d-11e7-8c63-0800277dcc69 |
django -- multiple vulnerabilities |
dc8c08c7-1e7c-11db-88cf-000c6ec775d9 |
apache -- mod_rewrite buffer overflow vulnerability |
dc8cff4c-4063-11ea-8a94-3497f6939fdd |
webkit-gtk3 -- Multiple vulnerabilities |
dc930435-d59f-11da-8098-00123ffe8333 |
amaya -- Attribute Value Buffer Overflow Vulnerabilities |
dc96ac1f-86b1-11e0-9e85-00215af774f0 |
Unbound -- an empty error packet handling assertion failure |
dc9e5237-c197-11ee-86bb-a8a1599412c6 |
chromium -- multiple security fixes |
dc9f8335-2b3b-11e0-a91b-00e0815b8da8 |
isc-dhcp-server -- DHCPv6 crash |
dca0a345-ed81-11d9-8310-0001020eed82 |
wordpress -- multiple vulnerabilities |
dca7ced0-2796-11e8-95ec-a4badb2f4699 |
FreeBSD -- ipsec validation and use-after-free |
dd116b19-64b3-11e3-868f-0025905a4771 |
mozilla -- multiple vulnerabilities |
dd271de6-b444-11ed-9268-b42e991fc52e |
freerdp -- clients using the `/video` command line switch might read uninitialized data |
dd343a2b-7ee7-11e9-a290-8ddc52868fa9 |
curl -- multiple vulnerabilities |
dd48d9b9-5e7e-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Kernel memory disclosure in sctp(4) |
dd563930-d59a-11e5-8fa8-14dae9d210b8 |
adminer -- remote code execution |
dd644964-e10e-11e7-8097-0800271d4b9c |
ruby -- Command injection vulnerability in Net::FTP |
dd698b76-42f7-11e1-a1b6-14dae9ebcf89 |
asterisk -- SRTP Video Remote Crash Vulnerability |
dd7aa4f1-102f-11d9-8a8a-000c41e2cdad |
php -- memory_limit related vulnerability |
dd7f29cc-3ee9-11e5-93ad-002590263bf5 |
lighttpd -- Log injection vulnerability in mod_auth |
dd8f2394-fd08-11de-b425-00215c6a37bb |
powerdns-recursor -- multiple vulnerabilities |
dd943fbb-d0fe-11df-95a8-00219b0fc4d8 |
apr -- multiple vunerabilities |
ddd3fcc9-2bdd-11ee-9af4-589cfc0f81b0 |
phpmyfaq -- multiple vulnerabilities |
ddd48087-bd86-11e9-b13f-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
ddecde18-e33b-11e7-a293-54e1ad3d6335 |
libXcursor -- integer overflow that can lead to heap buffer overflow |
de11a8fb-2eda-11e9-8fb5-6451062f0f7a |
Flash Player -- information disclosure |
de16b056-132e-11d9-bc4a-000c41e2cdad |
samba -- remote file disclosure |
de2bc01f-dc44-11e1-9f4d-002354ed89bc |
Apache -- Insecure LD_LIBRARY_PATH handling |
de2fab2d-0a37-11dc-aae2-00304881ac9a |
FreeType 2 -- Heap overflow vulnerability |
de4d4110-ebce-11dc-ae14-0016179b2dd5 |
mplayer -- multiple vulnerabilities |
de6d01d5-9c44-11e6-ba67-0011d823eebd |
flash -- remote code execution |
de6d8290-aef7-11e1-898f-14dae938ec40 |
mail/sympa* -- Multiple vulnerabilities in Sympa archive management |
de7a2b32-bd7d-11e7-b627-d43d7e971a1b |
PHP -- denial of service attack |
de970aef-d60e-466b-8e30-1ae945a047f1 |
py39-configobj -- vulnerable to Regular Expression Denial of Service |
dea7df85-d96c-11dc-9bfc-000e0c092e7a |
cacti -- Multiple security vulnerabilities have been discovered |
deaba148-7ac5-11e5-b35a-002590263bf5 |
Joomla! -- Core - Open Redirect vulnerability |
deb4f633-de1d-11e8-a9fb-080027f43a02 |
gitea -- remote code exeution |
deb6e164-b30b-11e9-a87f-a4badb2f4699 |
FreeBSD -- Reference count overflow in mqueue filesystem |
debbb39c-fdb3-11d9-a30d-00b0d09acbfc |
nbsmtp -- format string vulnerability |
debf6353-5753-4e9a-b710-a83ecdd743de |
jenkins -- multiple vulnerabilities |
dec3164f-3121-45ef-af18-bb113ac5082f |
sqlite -- multiple vulnerabilities |
dec6b8e9-c9fe-11ed-bb39-901b0e9408dc |
dino -- Insufficient message sender validation in Dino |
dec7e4b6-961a-11eb-9c34-080027f515ea |
ruby -- XML round-trip vulnerability in REXML |
dee44ba9-08ab-11e2-a044-d0df9acfd7e5 |
OpenX -- SQL injection vulnerability |
defce068-39aa-11de-a493-001b77d09812 |
wireshark -- multiple vulnerabilities |
df0144fb-295e-11e7-970f-002590263bf5 |
codeigniter -- multiple vulnerabilities |
df0a2fd1-4c92-11ee-8290-a8a1599412c6 |
chromium -- multiple vulnerabilities |
df29c391-1046-11ed-a7ac-0800273f11ea |
gitea -- multiple issues |
df328fac-f942-11e5-92ce-002590263bf5 |
py-djblets -- Self-XSS vulnerability |
df333ede-a8ce-11d8-9c6d-0020ed76ef5a |
URI handler vulnerabilities in several browsers |
df3db21d-1a4d-4c78-acf7-4639e5a795e0 |
jenkins -- multiple vulnerabilities |
df428c01-ed91-11e2-9466-98fc11cdc4f5 |
linux-flashplugin -- multiple vulnerabilities |
df45b4bd-0b7f-11e7-970f-002590263bf5 |
moodle -- multiple vulnerabilities |
df4a7d21-4b17-11dc-9fc2-001372ae3ab9 |
opera -- Vulnerability in javascript handling |
df502a2f-61f6-11e6-a461-643150d3111d |
puppet-agent MCollective plugin -- Remote Code Execution vulnerability |
df587aa2-b5a5-11e5-9728-002590263bf5 |
dhcpcd -- multiple vulnerabilities |
df71f5aa-6831-11ee-b06f-0050569ceb3a |
File deletion through document upload process in GLPI |
df794e5d-3975-11ec-84e8-0800273f11ea |
gitea -- multiple vulnerabilities |
dfb71c00-9d44-11da-8c1d-000e0c2e438a |
FreeBSD -- Infinite loop in SACK handling |
dfc1daa8-61de-11da-b64c-0001020eed82 |
opera -- command line URL shell command injection |
dfe0cdc1-baf2-11e5-863a-b499baebfeaf |
openssh -- information disclosure |
dfe40cff-9c3f-11e0-9bec-6c626dd55a41 |
mozilla -- multiple vulnerabilities |
e00304d2-bbed-11e6-b1cf-14dae9d210b8 |
FreeBSD -- Possible login(1) argument injection in telnetd(8) |
e0070221-2dd8-11d9-a9e7-0001020eed82 |
wzdftpd -- remote DoS |
e00d8b94-c88a-11e5-b5fe-002590263bf5 |
gdcm -- multiple vulnerabilities |
e00ed3d9-1c27-11e9-a257-000ffec0b3e1 |
drupal -- Drupal core - Arbitrary PHP code execution |
e020b0fd-1751-11ef-a490-84a93843eb75 |
Roundcube -- Cross-site scripting vulnerabilities |
e02c572f-2af0-11e2-bb44-003067b2972c |
weechat -- Crash or freeze when decoding IRC colors in strings |
e02e6a4e-6b26-11df-96b2-0015587e2cc1 |
cacti -- multiple vulnerabilities |
e0382fde-4bb0-11e9-adcb-001b217b3468 |
Gitlab -- Vulnerability |
e050119b-3856-11df-b2b2-002170daae37 |
postgresql -- bitsubstr overflow |
e05bfc92-0763-11e6-94fa-002590263bf5 |
squid -- multiple vulnerabilities |
e07a7754-12a4-4661-b852-fd221d68955f |
electron25 -- multiple vulnerabilities |
e08c596e-cb28-11df-9c1b-0011098ad87f |
horde-gollem -- XSS vulnerability |
e0914087-9a09-11ec-9e61-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
e0a969e4-a512-11e1-90b4-e0cb4e266481 |
RT -- Multiple Vulnerabilities |
e0ab1773-07c1-46c6-9170-4c5e81c00927 |
curl -- multiple vulnerabilities |
e0b342a1-d2ae-11da-a672-000e0c2e438a |
wordpress -- full path disclosure |
e0f26ac5-6a17-11ed-93e7-901b0e9408dc |
tailscale -- Security vulnerability in the client |
e0f6215b-c59e-11ee-a6db-080027a5b8e9 |
Django -- multiple vulnerabilities |
e1085b15-f609-11e5-a230-0014a5a57822 |
mercurial -- multiple vulnerabilities |
e1100e63-92f7-11e7-bd95-e8e0b747a45a |
chromium -- multiple vulnerabilities |
e1156e90-7ad6-11de-b26a-0048543d60ce |
squid -- several remote denial of service vulnerabilities |
e11955ca-187c-11e2-be36-00215af774f0 |
xinetd -- attackers can bypass access restrictions if tcpmux-servers service enabled |
e12432af-8e73-11ec-8bc4-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
e135f0c9-375f-11e3-80b7-20cf30e32f6d |
bugzilla -- multiple vulnerabilities |
e1387e95-08d0-11ed-be26-001999f8d30b |
VirtualBox -- Multiple vulnerabilities |
e14b9870-62a4-11ee-897b-000bab9f87f1 |
Request Tracker -- multiple vulnerabilities |
e15a22ce-f16f-446b-9ca7-6859350c2e75 |
quagga -- several security issues |
e15ba624-cca8-11ee-84ca-b42e991fc52e |
powerdns-recursor -- Multiple Vulnerabilities |
e15f2356-9139-11de-8f42-001aa0166822 |
apache22 -- several vulnerabilities |
e16293f0-26b7-11d9-9289-000c41e2cdad |
gaim -- heap overflow exploitable by malicious GroupWise server |
e17384ef-c5e8-4b5d-bb62-c13405e7f1f7 |
chromium -- multiple security fixes |
e177c410-1943-11e0-9d1c-000c29ba66d2 |
mediawiki -- Clickjacking vulnerabilities |
e182c076-c189-11e8-a6d2-b499baebfeaf |
Apache -- Denial of service vulnerability in HTTP/2 |
e190ca65-3636-11dc-a697-000c6ec775d9 |
mozilla -- multiple vulnerabilities |
e195679d-045b-4953-bb33-be0073ba2ac6 |
libxml2 -- multiple vulnerabilities |
e19e74a4-a712-11df-b234-001b2134ef46 |
linux-flashplugin -- multiple vulnerabilities |
e1aa3bdd-839a-4a77-8617-cca439a8f9fc |
rubygem-ruby_parser -- insecure tmp file usage |
e1b5318c-aa4d-11e5-8f5c-002590263bf5 |
mantis -- information disclosure vulnerability |
e1b77733-a982-442e-8796-a200571bfcf2 |
py-ansible -- multiple vulnerabilities |
e1c71d8d-64d9-11e6-b38a-25a46b33f2ed |
gnupg -- attacker who obtains 4640 bits from the RNG can trivially predict the next 160 bits of output |
e1cb9dc9-daa9-44db-adde-e94d900e2f7f |
cacti -- Cross Site Scripting issue |
e1d3a580-cd8b-11ea-bad0-08002728f74c |
Wagtail -- XSS vulnerability |
e1de77e8-c45e-48d7-8866-5a6f943046de |
SquirrelMail -- post-authentication remote code execution |
e1f67063-aab4-11e6-b2d3-60a44ce6887b |
ImageMagick7 -- multiple vulnerabilities |
e1f99d59-81aa-4662-bf62-c1076f5016c8 |
py-graphite-web -- Multiple vulnerabilities |
e1ff4c5e-d687-11e6-9171-14dae9d210b8 |
End of Life Ports |
e206df57-f97b-11e4-b799-c485083ca99c |
Adobe Flash Player -- critical vulnerabilities |
e21474c6-031a-11e6-aa86-001999f8d30b |
PJSIP -- TCP denial of service in PJProject |
e21c7c7a-0116-11e3-9e83-3c970e169bc2 |
samba -- denial of service vulnerability |
e2476979-da74-11da-a67b-0013d4a4a40e |
firefox -- denial of service vulnerability |
e24797af-803d-11dc-b787-003048705d5a |
firefox -- OnUnload Javascript browser entrapment vulnerability |
e24fb8f8-c39a-11eb-9370-b42e99a1b9c3 |
isc-dhcp -- remotely exploitable vulnerability |
e24fd421-8128-11ea-aa57-000ffec73f06 |
drupal -- Drupal Core - Moderately critical - Third-party library |
e25566d5-6d3f-11d8-83a4-000a95bc6fae |
multiple buffer overflows in xboing |
e261e71c-6250-11ee-8e38-002590c1f29c |
FreeBSD -- copy_file_range insufficient capability rights check |
e264e74e-ffe0-11e7-8b91-e8e0b747a45a |
chromium -- multiple vulnerabilities |
e2748c9d-3483-11eb-b87a-901b0ef719ab |
FreeBSD -- Multiple vulnerabilities in rtsold |
e27a1af3-8d21-11e0-a45d-001e8c75030d |
Subversion -- multiple vulnerabilities |
e27ca763-4721-11e0-bdc4-001e8c75030d |
subversion -- remote HTTP DoS vulnerability |
e285a1f4-4568-11dd-ae96-0030843d3802 |
phpmyadmin -- Cross Site Scripting Vulnerabilities |
e289f7fd-88ac-11d8-90d1-0020ed76ef5a |
many out-of-sequence TCP packets denial-of-service |
e2a8e2bd-b808-11ed-b695-6c3be5272acd |
Grafana -- Stored XSS in geomap panel plugin via attribution |
e2a92664-1d60-11db-88cf-000c6ec775d9 |
mozilla -- multiple vulnerabilities |
e2af876f-a7c8-11ec-9a2a-002324b2fba8 |
go -- multiple vulnerabilities |
e2b564fc-7462-11ea-af63-38d547003487 |
cacti -- multiple vulnerabilities |
e2e7faf9-1b51-11ed-ae46-002b67dfc673 |
Tomcat -- XSS in examples web application |
e2e8d374-2e40-11db-b683-0008743bf21a |
horde -- Phishing and Cross-Site Scripting Vulnerabilities |
e2f981f1-ad9e-11ee-8b55-4ccc6adda413 |
QtNetwork -- potential buffer overflow |
e2fb85ce-9a3c-11ee-af26-001b217b3468 |
Gitlab -- vulnerabilities |
e2fca11b-4212-11e6-942d-bc5ff45d0f28 |
xen-tools -- Unsanitised guest input in libxl device handling code |
e308c61a-2060-11e5-a4a5-002590263bf5 |
ansible -- multiple vulnerabilities |
e309a2c7-598b-4fa6-a398-bc72fbd1d167 |
rubygem-doorkeeper -- token revocation vulnerability |
e30e0c99-a1b7-11e4-b85c-00262d5ed8ee |
chromium -- multiple vulnerabilities |
e319da0b-a228-11da-b410-000e0c2e438a |
gedit -- format string vulnerability |
e31a8f8e-47bf-11ee-8e38-002590c1f29c |
FreeBSD -- ssh-add does not honor per-hop destination constraints |
e31d44a2-21e3-11d9-9289-000c41e2cdad |
imwheel -- insecure handling of PID file |
e3200958-dd6c-11e6-ae1b-002590263bf5 |
powerdns -- multiple vulnerabilities |
e3244a7b-5603-11e3-878d-20cf30e32f6d |
subversion -- multiple vulnerabilities |
e329550b-54f7-11db-a5ae-00508d6a62df |
php -- _ecalloc Integer Overflow Vulnerability |
e333084c-9588-4eee-8bdc-323e02cb4fe0 |
zeek -- Various vulnerabilities |
e33880ed-5802-11ec-8398-6c3be5272acd |
Grafana -- Path Traversal |
e3445736-fd01-11e7-ac58-b499baebfeaf |
MySQL -- multiple vulnerabilities |
e34d0c2e-9efb-11da-b410-000e0c2e438a |
rssh -- privilege escalation vulnerability |
e358b470-b37d-4e47-bc8a-2cd9adbeb63c |
jenkins -- Denial of service vulnerability in bundled Jetty |
e359051d-90bd-11e5-bd18-002590263bf5 |
a2ps -- format string vulnerability |
e375ff3f-7fec-11e8-8088-28d244aee256 |
expat -- multiple vulnerabilities |
e3792855-881f-11e5-ab94-002590263bf5 |
xen-kernel -- leak of per-domain profiling-related vcpu pointer array |
e37a0a7b-e1a7-11ea-9538-0c9d925bbbc0 |
security/trousers -- several vulnerabilities |
e387834a-17ef-11e6-9947-7054d2909b71 |
jenkins -- multiple vulnerabilities |
e3894955-7227-11eb-8386-001999f8d30b |
asterisk -- Remote crash possible when negotiating T.38 |
e39caf05-2d6f-11df-aec2-000c29ba66d2 |
egroupware -- two vulnerabilities |
e3aacd6d-3d01-434c-9330-bc9efd40350f |
webkit-gtk -- Multiple vulnerabilities |
e3cf89f0-53da-11d9-92b7-ceadd4ac2edd |
phpbb -- arbitrary command execution and other vulnerabilities |
e3e266e9-5473-11d9-a9e7-0001020eed82 |
xpdf -- buffer overflow vulnerability |
e3e30d99-58a8-4a3f-8059-a8b7cd59b881 |
openfire -- Openfire No Password Changes Security Bypass |
e3e68fe8-d9cb-4ba8-b09c-9e3a28588eb7 |
firefox -- Heap buffer overflow rasterizing paths in SVG with Skia |
e3e788aa-e9fd-11e2-a96e-60a44c524f57 |
otrs -- Sql Injection + Xss Issue |
e3ec8b30-757b-11ec-922f-654747404482 |
Prosody XMPP server advisory 2022-01-13 |
e3eeda2e-1d67-11e8-a2ec-6cc21735f730 |
PostgreSQL vulnerabilities |
e3f0374a-7ad6-11e2-84cd-d43d7e0c7c02 |
mozilla -- multiple vulnerabilities |
e3f64457-cccd-11e2-af76-206a8a720317 |
krb5 -- UDP ping-pong vulnerability in the kpasswd (password changing) service. [CVE-2002-2443] |
e3ff776b-2ba6-11e1-93c6-0011856a6e37 |
mozilla -- multiple vulnerabilities |
e4133d8b-ab33-451a-bc68-3719de73d54a |
routinator -- potential DOS attack |
e4181981-ccf1-11ed-956f-7054d21a9e2a |
py39-sqlalchemy10 -- multiple SQL Injection vulnerabilities |
e418b8f0-9abb-420b-a7f1-1d8231b352e2 |
webkit2-gtk3 -- Denial of service |
e426eda9-dae1-11e4-8107-94de806b0af9 |
Dulwich -- Remote code execution |
e43b210a-4212-11e6-942d-bc5ff45d0f28 |
xen-kernel -- x86 software guest page walk PS bit handling flaw |
e4403051-a667-11eb-b9c9-6cc21735f730 |
sbibboleth-sp -- denial of service vulnerability |
e44e5ace-6820-11ee-b06f-0050569ceb3a |
GLPI vulnerable to SQL injection via inventory agent request |
e44fe906-df27-11e0-a333-001cc0a36e12 |
phpMyAdmin -- multiple XSS vulnerabilities |
e454ca2f-f88d-11e0-b566-00163e01a509 |
PivotX -- Remote File Inclusion Vulnerability of TimThumb |
e457978b-5484-11e8-9b85-54ee754af08e |
chromium -- multiple vulnerabilities |
e45c3669-caf2-11e9-851a-dcf3aaa3f3ff |
webkit2-gtk3 -- Multiple vulnerabilities |
e4644df8-e7da-11e5-829d-c80aa9043978 |
openssh -- command injection when X11Forwarding is enabled |
e464f777-719e-11ef-8a0f-a8a1599412c6 |
chromium -- multiple security fixes |
e465159c-4817-11e1-89b4-001ec9578670 |
mpack -- Information disclosure |
e47ab5db-c333-11e6-ae1b-002590263bf5 |
atheme-services -- multiple vulnerabilities |
e480ccb2-6bc8-11d9-8dbe-000a95bc6fae |
fcron -- multiple vulnerabilities |
e4833927-86e5-11e0-a6b4-000a5e1e33c6 |
Erlang -- ssh library uses a weak random number generator |
e48355d7-1548-11e7-8611-0090f5f2f347 |
id Tech 3 -- remote code execution vulnerability |
e4848ca4-8820-11e5-ab94-002590263bf5 |
xen-kernel -- some pmu and profiling hypercalls log without rate limiting |
e4bc323f-cc73-11e6-b704-000c292e4fd8 |
samba -- multiple vulnerabilities |
e4bc70fc-5a2f-11e6-a1bc-589cfc0654e1 |
Vulnerabilities in Curl |
e4c62abd-5065-11db-a5ae-00508d6a62df |
tikiwiki -- multiple vulnerabilities |
e4cd0b38-c9f9-11eb-87e1-08002750c711 |
cacti -- SQL Injection was possible due to incorrect validation order |
e4d93d07-297a-11ed-95f8-901b0e9408dc |
Matrix clients -- several vulnerabilities |
e4d9dffb-2a32-11ea-9693-e1b3f6feec79 |
OpenEXR -- heap buffer overflow, and out-of-memory bugs |
e4dac715-c818-11df-a92c-0015587e2cc1 |
squid -- Denial of service vulnerability in request handling |
e4dd787e-0ea9-11e8-95f2-005056925db4 |
libtorrent -- remote DoS |
e4fcf020-0447-11e0-becc-0022156e8794 |
exim -- local privilege escalation |
e500b9bf-ca3e-11df-aade-0050568f000c |
FreeBSD -- BIND named(8) cache poisoning with DNSSEC validation |
e5090d2a-dbbe-11df-82f8-0015f2db7bde |
Webkit-gtk2 -- Multiple Vulnabilities |
e50a7476-bb2d-11da-b2fb-000e0c2e438a |
ipsec -- reply attack vulnerability |
e50b04e8-9c55-11d8-9366-0020ed76ef5a |
xine-lib arbitrary file overwrite |
e5186c65-d729-11e6-a9a5-b499baebfeaf |
mysql -- multiple vulnerabilities |
e51d5b1a-4638-11e1-9f47-00e0815b8da8 |
FreeBSD -- pam_ssh() does not validate service names |
e53a908d-a645-11e8-8acd-10c37b4ac2ea |
gogs -- open redirect vulnerability |
e5423caf-8fb8-11e5-918c-bcaec565249c |
libxml2 -- multiple vulnerabilities |
e543c6f8-abf2-11e4-8ac7-d050992ecde8 |
unzip -- out of boundary access issues in test_compr_eb |
e546c7ce-ce46-11db-bc24-0016179b2dd5 |
trac -- cross site scripting vulnerability |
e550fc62-069a-11e7-8e3e-5453ed2e2b49 |
kdepimlibs -- directory traversal on KTNEF |
e55f948f-d729-11e0-abd1-0017f22d6707 |
security/cfs -- buffer overflow |
e56f2f7c-410e-11e9-b95c-b499baebfeaf |
OpenSSL -- ChaCha20-Poly1305 nonce vulnerability |
e589ae90-4212-11e6-942d-bc5ff45d0f28 |
xen-tools -- Unsanitised driver domain input in libxl device handling |
e595e170-6771-11dc-8be8-02e0185f8d72 |
openoffice -- arbitrary command execution vulnerability |
e59cb761-5ad8-11ea-abb7-001b217b3468 |
Solr -- multiple vulnerabilities |
e59fed96-60da-11ee-9102-000c29de725b |
mediawiki -- multiple vulnerabilities |
e5a9de5f-c6bc-11dc-b9f1-00a0cce0781e |
IRC Services-- Denial of Service Vulnerability |
e5afdf63-1746-11da-978e-0001020eed82 |
evolution -- remote format string vulnerabilities |
e5d117b3-2153-4129-81ed-42b0221afa78 |
py39-OWSLib -- arbitrary file read vulnerability |
e5d2442d-5e76-11e6-a6c3-14dae9d210b8 |
FreeBSD -- Incorrect privilege validation in the NFS server |
e5d29309-e0db-11dc-97b2-001c2514716c |
openldap -- modrdn Denial of Service vulnerability |
e5dcb942-ba6f-11e6-b1cf-14dae9d210b8 |
py-cryptography -- vulnerable HKDF key generation |
e5e2883d-ceb9-11d8-8898-000d6111a684 |
MySQL authentication bypass / buffer overflow |
e5ec2767-d529-11e6-ae1b-002590263bf5 |
tomcat -- information disclosure vulnerability |
e60169c4-aa86-46b0-8ae2-0d81f683df09 |
mozilla -- multiple vulnerabilities |
e60d9e65-3f6b-11e4-ad16-001999f8d30b |
asterisk -- Remotely triggered crash |
e61af8f4-455d-4f99-8d81-fbb004929dab |
electron31 -- multiple vulnerabilities |
e6281d88-a7a7-11ed-8d6a-6c3be5272acd |
Grafana -- Spoofing originalUrl of snapshots |
e6296105-449b-11db-ba89-000c6ec775d9 |
mozilla -- multiple vulnerabilities |
e65ad1bf-0d8b-11da-90d0-00304823c0d3 |
pear-XML_RPC -- remote PHP code injection vulnerability |
e666498a-852a-11e0-8f78-080027ef73ec |
Opera -- code injection vulnerability through broken frameset handling |
e66a5440-7258-11e9-b0e1-6cc21735f730 |
PostgreSQL -- Memory disclosure in partition routing |
e66a6e2f-b0d5-11e2-9164-0016e6dcb562 |
FreeBSD -- NFS remote denial of service |
e6839625-fdfa-11e2-9430-20cf30e32f6d |
typo3 -- Multiple vulnerabilities in TYPO3 Core |
e68d3db1-fd04-11ea-a67f-e09467587c17 |
chromium -- multiple vulnerabilities |
e69af246-0ae2-11e5-90e4-d050996490d0 |
pcre -- multiple vulnerabilities |
e69ba632-326f-11d9-b5b7-000854d03344 |
ez-ipupdate -- format string vulnerability |
e6a7636a-02d0-11e4-88b6-080027671656 |
dbus -- multiple vulnerabilities |
e6b974ab-9d35-11e5-8f5c-002590263bf5 |
Salt -- information disclosure |
e6b994e2-2891-11ed-9be7-454b1dd82c64 |
Gitlab -- multiple vulnerabilities |
e6ccaf8a-6c63-11e7-9b01-2047478f2f70 |
strongswan -- multiple vulnerabilities |
e6ce6f50-4212-11e6-942d-bc5ff45d0f28 |
xen-tools -- QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks |
e6f0edd8-0b40-11d9-8a8a-000c41e2cdad |
gnu-radius -- SNMP-related denial-of-service |
e7002b26-caaa-11e6-a76a-9f7324e5534e |
exim -- DKIM private key leak |
e7028e1d-3f9b-11e6-81f9-6805ca0b3d42 |
phpMyAdmin -- multiple vulnerabilities |
e714b7d2-39f6-4992-9f48-e6b2f5f949df |
GraphicsMagick -- SVG/Rendering vulnerability |
e71fd9d3-af47-11e7-a633-009c02a2ab30 |
nss -- Use-after-free in TLS 1.2 generating handshake hashes |
e722e3c6-bbee-11e6-b1cf-14dae9d210b8 |
FreeBSD -- bhyve(8) virtual machine escape |
e72a8864-e0bc-11e7-b627-d43d7e971a1b |
GitLab -- multiple vulnerabilities |
e72d5bf5-07a0-11e8-8248-0021ccb9e74d |
w3m - multiple vulnerabilities |
e72fd82b-fa01-11d9-bc08-0001020eed82 |
dnrd -- remote buffer and stack overflow vulnerabilities |
e7392840-c520-11e9-a4ef-0800274e5f20 |
gitea -- multiple vulnerabilities |
e73c688b-f7e6-11ea-88f8-901b0ef719ab |
FreeBSD -- bhyve SVM guest escape |
e74da31b-276a-4a22-9772-17dd42b97559 |
electron{27,28} -- vulnerability in libxml2 |
e75a96df-73ca-11e5-9b45-b499baebfeaf |
LibreSSL -- Memory leak and buffer overflow |
e77befb5-f3f9-11e0-8b5c-b482fe3f522d |
OpenTTD -- Denial of service via improperly validated commands |
e78261e4-803d-11e6-a590-14dae9d210b8 |
irssi -- heap corruption and missing boundary checks |
e7841611-b808-11ed-b695-6c3be5272acd |
Grafana -- Stored XSS in TraceView panel |
e78732b2-8528-11e8-9c42-6451062f0f7a |
Flash Player -- multiple vulnerabilities |
e78bfc9d-cb1e-11e5-b251-0050562a4d7b |
py-rsa -- Bleichenbacher'06 signature forgery vulnerability |
e79876e4-5061-11db-a5ae-00508d6a62df |
punbb -- NULL byte injection vulnerability |
e79cc4e2-12d7-11ef-83d8-4ccc6adda413 |
qt6-base (core module) -- Invalid pointer in QStringConverter |
e7b69694-b3b5-11e9-9bb6-0800274e5f20 |
gitea -- multiple vulnerabilities |
e7b7f2b5-177a-11e5-ad33-f8d111029e6a |
chicken -- buffer overrun in substring-index[-ci] |
e7bb3885-da40-11e3-9ecb-2c4138874f7d |
libxml2 -- lack of end-of-document check DoS |
e7bc2b99-485a-11ea-bff9-9c5c8e75236a |
clamav -- Denial-of-Service (DoS) vulnerability |
e7bc5600-eaa0-11de-bd9c-00215c6a37bb |
postgresql -- multiple vulnerabilities |
e7d91a3c-a7c9-11df-870c-00242b513d7c |
vlc -- invalid id3v2 tags may lead to invalid memory dereferencing |
e7dcd69d-8ee6-11e6-a590-14dae9d210b8 |
FreeBSD -- Multiple portsnap vulnerabilities |
e7fd27b2-3ae9-11e1-8b5c-00262d5ed8ee |
torcs -- untrusted local library loading |
e80073d7-f8ba-11eb-b141-589cfc007716 |
xtrlock -- xtrlock does not block multitouch events |
e800cd4b-4212-11e6-942d-bc5ff45d0f28 |
xen-tools -- Unrestricted qemu logging |
e811aaf1-f015-11d8-876f-00902714cc7c |
Ruby insecure file permissions in the CGI session management |
e831dd5a-7d8e-4818-aa1f-17dd495584ec |
py-httpx -- input validation vulnerability |
e837390d-0ceb-46b8-9b32-29c1195f5dc7 |
solr -- Code execution via entity expansion |
e839ca04-b40d-11e5-9728-002590263bf5 |
xen-kernel -- information leak in legacy x86 FPU/XMM initialization |
e8483115-8b8e-11ea-bdcf-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
e848a92f-0e7d-11de-92de-000bcdc1757a |
epiphany -- untrusted search path vulnerability |
e852f43c-846e-11ec-b043-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
e86b8e4d-d551-11ed-8d1e-005056a311d1 |
samba -- multiple vulnerabilities |
e86fbb5f-0d04-11da-bc08-0001020eed82 |
awstats -- arbitrary code execution vulnerability |
e879ca68-e01b-11d9-a8bd-000cf18bbe54 |
squirrelmail -- Several cross site scripting vulnerabilities |
e87a9326-dd35-49fc-b20b-f57cbebaae87 |
py-nicotine-plus -- Denial of service vulnerability |
e87c2647-a188-11eb-8806-1c1b0d9ea7e6 |
All versions of Apache OpenOffice through 4.1.9 can open non-http(s) hyperlinks. If the link is specifically crafted this could lead to untrusted code execution. |
e8a6a16d-e498-11dc-bb89-000bcdc1757a |
libxine -- buffer overflow vulnerability |
e8b20517-dbb6-11ed-bf28-589cfc0f81b0 |
mod_gnutls -- Infinite Loop on request read timeout |
e8b6605b-d29f-11e5-8458-6cc21735f730 |
PostgreSQL -- Security Fixes for Regular Expressions, PL/Java. |
e8bcac84-2d5c-11e9-9a74-e0d55e2a8bf9 |
kf5-kauth -- Insecure handling of arguments in helpers |
e8d4800f-1547-11d9-90a3-00010327614a |
distcc -- incorrect parsing of IP access control rules |
e917caba-e291-11e9-89f1-152fed202bb7 |
Exim -- heap-based buffer overflow in string_vformat leading to RCE |
e91cf90c-d6dd-11e7-9d10-001999f8d30b |
asterisk -- DOS Vulnerability in Asterisk chan_skinny |
e9200f8e-fd34-11eb-afb1-c85b76ce9b5a |
lynx -- SSL certificate validation error |
e92d8f6b-a1c0-11db-9ddc-0011098b2f36 |
sircd -- remote operator privilege escalation vulnerability |
e936d612-253f-11da-bc01-000e0c2e438a |
apache -- Certificate Revocation List (CRL) off-by-one vulnerability |
e93bc5b0-bb2e-11da-b2fb-000e0c2e438a |
OPIE -- arbitrary password change |
e94cb43d-0c4a-11db-9016-0050bf27ba24 |
horde -- various problems in dereferrer |
e969e6cb-8911-11db-9d01-0016179b2dd5 |
tnftpd -- Remote root Exploit |
e97a8852-32dd-4291-ba4d-92711daff056 |
py-bleach -- unsanitized character entities |
e991ef79-e920-11e5-92ce-002590263bf5 |
php5 -- multiple vulnerabilities |
e9aa0e4c-ea8b-11e8-a5b7-00e04c1ea73d |
powerdns-recursor -- Multiple vulnerabilities |
e9ccdb28-9802-11e4-9d9c-bcaec565249c |
WebKit-gtk -- Multiple vulnerabilities |
e9d1e040-42c9-11e6-9608-20cf30e32f6d |
apache24 -- X509 Client certificate based authentication can be bypassed when HTTP/2 is used |
e9d2e981-a46d-11e9-bed9-001999f8d30b |
asterisk -- Remote Crash Vulnerability in chan_sip channel driver |
e9ecaceb-db0d-11dd-aa56-000bcdf0a03b |
FreeBSD -- Cross-site request forgery in ftpd(8) |
e9f9d232-0cb2-11d9-8a8a-000c41e2cdad |
mozilla -- security icon spoofing |
e9fca207-e399-11de-881e-001aa0166822 |
expat2 -- buffer over-read and crash |
ea05c456-a4fd-11ec-90de-1c697aa5a594 |
OpenSSL -- Infinite loop in BN_mod_sqrt parsing certificates |
ea09c5df-4362-11db-81e1-000e0c2e438a |
php -- multiple vulnerabilities |
ea0f45e2-6c4b-11e2-98d9-003067c2616f |
opera -- execution of arbitrary code |
ea1d2530-72ce-11e5-a2a1-002590263bf5 |
magento -- multiple vulnerabilities |
ea2411a4-08e8-11de-b88a-0022157515b2 |
pngcrush -- libpng Uninitialised Pointer Arrays Vulnerability |
ea2ddc49-3e8e-11e1-8095-5404a67eef98 |
ffmpeg -- multiple vulnerabilities |
ea4a2dfc-f761-11ee-af2c-589cfc0f81b0 |
wordpress -- XSS |
ea893f06-5a92-11e5-98c0-20cf30e32f6d |
Bugzilla security issues |
ea9d1fd2-5d24-11ee-8507-b42e991fc52e |
routinator -- Possible path traversal when storing RRDP responses |
eab68cff-bc0c-11e6-b2ca-001b3856973b |
cryptopp -- multiple vulnerabilities |
eab8c3bd-e50c-11de-9cd0-001a926c7637 |
ruby -- heap overflow vulnerability |
eab964f8-d632-11ea-9172-4c72b94353b5 |
typo3 -- multiple vulnerabilities |
eae8e3cf-9dfe-11e2-ac7f-001fd056c417 |
otrs -- Information disclosure and Data manipulation |
eaf3b255-5245-11e5-9ad8-14dae9d210b8 |
bind -- denial of service vulnerability |
eafa3aec-211b-4dd4-9b8a-a664a3f0917a |
w3m -- multiple vulnerabilities |
eb03d642-6724-472d-b038-f2bf074e1fc8 |
tcpdump -- multiple vulnerabilities |
eb12ebee-b7af-11e1-b5e0-000c299b62e1 |
clamav -- multiple vulnerabilities |
eb2845c4-43ce-11eb-aba5-00a09858faf5 |
postsrsd -- Denial of service vulnerability |
eb29a575-3381-11da-8340-000e0c2e438a |
qpopper -- multiple privilege escalation vulnerabilities |
eb426e82-ab68-11e3-9d09-000c2980a9f3 |
mutt -- denial of service, potential remote code execution |
eb437e17-66a1-11ef-ac08-75165d18d8d2 |
forgejo -- The scope of application tokens was not verified when writing containers or Conan packages. |
eb5124a4-8a20-11db-b033-00123ffe8333 |
clamav -- Multipart Nestings Denial of Service |
eb5c615d-a173-11ef-9a62-002590c1f29c |
FreeBSD -- Multiple issues in the bhyve hypervisor |
eb69bcf2-18ef-4aa2-bb0c-83b263364089 |
ruby -- multiple vulnerabilities |
eb888ce5-1f19-11e9-be05-4c72b94353b5 |
Apache -- vulnerability |
eb8a8978-8dd5-49ce-87f4-49667b2166dd |
rubygem-rails -- multiple vulnerabilities |
eb9212f7-526b-11de-bbf2-001b77d09812 |
apr -- multiple vulnerabilities |
eb9a3c57-ff9e-11ed-a0d1-84a93843eb75 |
OpenSSL -- Possible DoS translating ASN.1 identifiers |
eba70db4-6640-11e1-98af-00262d8b701d |
dropbear -- arbitrary code execution |
eba9aa94-549c-11e1-b6b7-0011856a6e37 |
mozilla -- use-after-free in nsXBLDocumentInfo::ReadPrototypeBindings |
ebd84c96-dd7e-11e4-854e-3c970e169bc2 |
ntp -- multiple vulnerabilities |
ebd877b9-7ef4-4375-b1fd-c67780581898 |
ruby -- Hostname check bypassing vulnerability in SSL client |
ebdf65c7-2ca6-11d8-9355-0020ed76ef5a |
qpopper format string vulnerability |
ebeed063-b328-11de-b6a5-0030843d3802 |
virtualbox -- privilege escalation |
ebffe27a-f48c-11d8-9837-000c41e2cdad |
qt -- image loader vulnerabilities |
ec04f3d0-8cd9-11eb-bb9f-206a8a720317 |
spamassassin -- Malicious rule configuration (.cf) files can be configured to run system commands |
ec09baa3-a9f5-11d9-a788-0001020eed82 |
gaim -- remote DoS on receiving certain messages over IRC |
ec1df2a1-8ee6-11e7-8be8-001999f8d30b |
asterisk -- Remote Crash Vulerability in res_pjsip |
ec255bd8-02c6-11e2-92d1-000d601460a4 |
php5-sqlite -- open_basedir bypass |
ec2d1cfd-7ac5-11e5-b35a-002590263bf5 |
Joomla! -- Core - CSRF Protection vulnerabilities |
ec2f2ff5-f710-11da-9156-000e0c2e438a |
freeradius -- multiple vulnerabilities |
ec34d0c2-1799-11e2-b4ab-000c29033c32 |
Zend Framework -- Multiple vulnerabilities via XXE injection |
ec41c3e2-129c-11dd-bab7-0016179b2dd5 |
python -- Integer Signedness Error in zlib Module |
ec49f6b5-ee39-11e8-b2f4-74d435b63d51 |
php-imap -- imap_open allows to run arbitrary shell commands via mailbox parameter |
ec5072b0-d43a-11e8-a6d2-b499baebfeaf |
MySQL -- multiple vulnerabilities |
ec63bc8e-f092-11ed-85ca-001517a2e1a4 |
piwigo -- SQL injection |
ec6a2a1e-429d-11e5-9daa-14dae9d210b8 |
gnutls -- double free in certificate DN decoding |
ec6aeb8e-41e4-11e7-aa00-5404a68ad561 |
vlc -- remote code execution via crafted subtitles |
ec89dc70-2515-11e2-8eda-000a5e1e33c6 |
webmin -- potential XSS attack via real name field |
ec8e4040-afcd-11ee-86bb-a8a1599412c6 |
chromium -- security fix |
ec8f449f-40ed-11df-9edc-000f20797ede |
firefox -- Re-use of freed object due to scope confusion |
ec994672-5284-49a5-a7fc-93c02126e5fb |
electron29 -- multiple vulnerabilities |
eca2d861-76f4-42ed-89d2-23a2cb396c87 |
poppler -- multiple denial of service issues |
eca6195a-c233-11d9-804c-02061b08fc24 |
mozilla -- code execution via javascript: IconURL vulnerability |
ecad44b9-e663-11dd-afcd-00e0815b8da8 |
git -- gitweb privilege escalation |
ecafc4af-fe8a-11ee-890c-08002784c58d |
clamav -- Possible crash in the HTML file parser that could cause a denial-of-service (DoS) condition |
ecb7fdec-0b82-11ea-874d-0c9d925bbbc0 |
drm graphics drivers -- Local privilege escalation and denial of service |
ecc268f2-8fc2-11e5-918c-bcaec565249c |
libxslt -- DoS vulnerability due to type confusing error |
ece65d3b-c20c-11e9-8af4-bcaec55be5e5 |
webmin -- unauthenticated remote code execution |
ecea9e92-0be5-4931-88da-8772d044972a |
mcollective -- cert valication issue |
ecedde1c-5128-11dd-a4e1-0030843d3802 |
drupal -- multiple vulnerabilities |
ecf68408-a9f5-11d9-a788-0001020eed82 |
gaim -- jabber remote crash |
ecf9a798-9aa9-11ef-a8f0-a8a15998b5cb |
libqb -- Buffer overflow |
ecffb881-a7a7-11ed-8d6a-6c3be5272acd |
Grafana -- Stored XSS in ResourcePicker component |
ed0ecad5-531d-11e5-9850-bcaec565249c |
gdk-pixbuf2 -- integer overflows |
ed10ed3f-fddc-11e8-94cf-6805ca0b3d42 |
phpMyAdmin -- multiple vulnerabilities |
ed124f8c-82a2-11db-b46b-0012f06707f0 |
libmusicbrainz -- multiple buffer overflow vulnerabilities |
ed18aa92-e4f4-11e9-b6fa-3085a9a95629 |
cacti -- Authenticated users may bypass authorization checks |
ed1d404d-2784-11d9-b954-000bdb1444a4 |
horde -- cross-site scripting vulnerability in help window |
ed3bf433-5d92-11e7-aa14-e8e0b747a45a |
libgcrypt -- side-channel attack on RSA secret keys |
ed529baa-21c6-11db-b625-02e081235dab |
gnupg -- 2 more possible memory allocation attacks |
ed536336-1c57-11e1-86f4-e0cb4e266481 |
phpMyAdmin -- Multiple XSS |
ed688880-00c4-11ef-92b7-589cfc023192 |
GLPI -- multiple vulnerabilities |
ed73829d-af6d-11e7-a633-009c02a2ab30 |
FFmpeg -- multiple vulnerabilities |
ed7fa1b4-ff59-11df-9759-080027284eaa |
proftpd -- Compromised source packages backdoor |
ed8a4215-675c-11ec-8dd4-a0f3c100ae18 |
Pillow -- Regular Expression Denial of Service (ReDoS) |
ed8cbad5-21a8-11ea-9b6d-901b0e934d69 |
py-matrix-synapse -- multiple vulnerabilities |
ed8d5535-ca78-11e9-980b-999ff59c22ea |
RDoc -- multiple jQuery vulnerabilities |
eda151d8-4638-11e1-9f47-00e0815b8da8 |
FreeBSD -- pam_ssh improperly grants access when user account has unencrypted SSH private keys |
edabe438-542f-11db-a5ae-00508d6a62df |
php -- open_basedir Race Condition Vulnerability |
edc0bf7e-05a1-11ea-9dfa-f8b156ac3ff9 |
FreeBSD -- Machine Check Exception on Page Size Change |
edd201a5-8fc3-11e2-b131-000c299b62e1 |
piwigo -- CSRF/Path Traversal |
ede832bf-6576-11ec-a636-000c29061ce6 |
OpenDMARC - Remote denial of service |
edef3f2f-82cf-11df-bcce-0018f3e2eb82 |
png -- libpng decompression buffer overflow |
edf064fb-b30b-11e9-a87f-a4badb2f4699 |
FreeBSD -- Bhyve out-of-bounds read in XHCI device |
edf47177-fe3f-11e0-a207-0014a5e3cda6 |
phpLDAPadmin -- Remote PHP code injection vulnerability |
edf61c61-0f07-11d9-8393-000103ccf9d6 |
php -- strip_tags cross-site scripting vulnerability |
ee23aa09-a175-11de-96c0-0011098ad87f |
horde-base -- multiple vulnerabilities |
ee261034-b95e-4479-b947-08b0877e029f |
php72 -- use of freed hash key |
ee26f513-826e-11ec-8be6-d4c9ef517024 |
Rust -- Race condition enabling symlink following |
ee50726e-0319-11e6-aa86-001999f8d30b |
asterisk -- Long Contact URIs in REGISTER requests can crash Asterisk |
ee6936da-0ddd-11ef-9c21-901b0e9408dc |
tailscale -- Insufficient inbound packet filtering in subnet routers and exit nodes |
ee6b5956-6a89-11da-b96e-000fb586ba73 |
nag -- Cross site scripting vulnerabilities in several of the tasklist name and task data fields |
ee6fa2bd-406a-11dd-936a-0015af872849 |
php -- input validation error in safe_mode |
ee7b4f9d-66c8-11e4-9ae1-e8e0b722a85e |
wget -- path traversal vulnerability in recursive FTP mode |
ee7bdf7f-11bb-4eea-b054-c692ab848c20 |
OpenSMTPD -- multiple vulnerabilities |
ee890be3-a1ec-11ed-a81d-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
ee99899d-4347-11e5-93ad-002590263bf5 |
qemu, xen-tools -- use-after-free in QEMU/Xen block unplug protocol |
eeae6cce-d05c-11d9-9aed-000e0c2e438a |
mysql-server -- insecure temporary file creation |
eeb1c128-33e7-11d9-a9e7-0001020eed82 |
ImageMagick -- EXIF parser buffer overflow |
eeca52dc-866c-11eb-b8d6-d4c9ef517024 |
LibreSSL -- use-after-free |
eeebd55d-6a88-11da-b96e-000fb586ba73 |
turba -- Cross site scripting vulnerabilities in several of the address book name and contact data fields |
eeec4e6f-fa71-11ea-9bb7-d4c9ef517024 |
Nextcloud -- Password share by mail not hashed |
eef0d2d9-78c0-441e-8b03-454c5baebe20 |
jenkins -- multiple vulnerabilities |
eef56761-11eb-11e1-bb94-001c140104d4 |
hiawatha -- memory leak in PreventSQLi routine |
ef0033ad-5823-11e6-80cc-001517f335e2 |
lighttpd - multiple vulnerabilities |
ef013039-89cd-11e8-84e9-00e04c1ea73d |
typo3 -- multiple vulnerabilities |
ef253f8b-0727-11d9-b45d-000c41e2cdad |
xpm -- image decoding vulnerabilities |
ef2ffb03-f2b0-11db-ad25-0010b5a0a860 |
mod_perl -- remote DoS in PATH_INFO parsing |
ef3306fc-8f9b-11db-ab33-000e0c2e438a |
bind9 -- Denial of Service in named(8) |
ef3423e4-d056-11e7-a52c-002590263bf5 |
codeigniter -- input validation bypass |
ef410571-a541-11d9-a788-0001020eed82 |
wu-ftpd -- remote globbing DoS vulnerability |
ef417da3-1640-11e2-999b-e0cb4e266481 |
phpMyAdmin -- Multiple XSS due to unescaped HTML output in Trigger, Procedure and Event pages and Fetching the version information from a non-SSL site is vulnerable to a MITM attack |
ef434839-a6a4-11e5-8275-000c292e4fd8 |
samba -- multiple vulnerabilities |
ef5b4f5f-a658-11ea-80d7-001cc0382b2f |
GnuTLS -- flaw in TLS session ticket key construction |
ef70b201-645d-11e6-9cdc-6805ca0b3d42 |
phpmyadmin -- multiple vulnerabilities |
ef9d041e-27e2-11e5-a4a5-002590263bf5 |
xen-kernel -- Information leak through version information hypercall |
efa1344b-5477-11d9-a9e7-0001020eed82 |
ethereal -- multiple vulnerabilities |
efa663eb-8754-11e3-9a47-00163e1ed244 |
strongswan -- multiple DoS vulnerabilities |
efaa4071-b700-11e2-b1b9-f0def16c5c1b |
nginx -- multiple vulnerabilities |
efb965be-a2c0-11eb-8956-1951a8617e30 |
openvpn -- deferred authentication can be bypassed in specific circumstances |
efc4819b-0b2d-11d9-bfe1-000bdb1444a4 |
imp3 -- XSS hole in the HTML viewer |
efd03116-c2a9-11ea-82bc-b42e99a1b9c3 |
webkit2-gtk3 -- multible vulnerabilities |
efd4537e-a5e8-11ef-bedb-180373b66b37 |
Vaultwarden -- Multiple vulnerabilities |
efdd0edc-da3d-11e3-9ecb-2c4138874f7d |
libxml2 -- entity substitution DoS |
efe43d2b-8f35-11e8-b9e8-dcfe074bd614 |
Memory leak in different components |
f00acdec-b59f-11e8-805d-001e2a3f778d |
X11 Session -- SDDM allows unauthorised unlocking |
f00b65d8-7ccb-11eb-b3be-e09467587c17 |
chromium -- multiple vulnerabilities |
f00d1873-b138-11ea-8659-901b0ef719ab |
BIND -- Remote Denial of Service vulnerability |
f01292a0-db3c-11e1-a84b-00e0814cab4e |
django -- multiple vulnerabilities |
f0250129-fdb8-41ed-aa9e-661ff5026845 |
vscode -- VS Code Information Disclosure Vulnerability |
f0416fb5-3130-11e9-a5ba-e0d55e883e26 |
msmtp -- certificate-verification issue |
f04cc5cb-2d0b-11d8-beaf-000a95c4d922 |
bind8 negative cache poison attack |
f04f840d-0840-11ea-8d66-75d3253ef913 |
libidn2 -- roundtrip check vulnerability |
f05dbd1f-2599-11ec-91be-001b217b3468 |
Bacula-Web -- Multiple Vulnerabilities |
f0683976-5779-11ea-8a77-1c872ccb1e42 |
OpenSMTPd -- LPE and RCE in OpenSMTPD's default install |
f06f20dc-4347-11e5-93ad-002590263bf5 |
qemu, xen-tools -- QEMU leak of uninitialized heap memory in rtl8139 device model |
f0798a6a-bbdb-11ed-ba99-080027f5fec9 |
rack -- possible DoS vulnerability in multipart MIME parsing |
f07c8f87-8e65-11ef-81b8-659bf0027d16 |
forgejo -- multiple vulnerabilities |
f0806cad-c7f1-11e6-ae1b-002590263bf5 |
Joomla! -- multiple vulnerabilities |
f08e2c15-ffc9-11e0-b0f3-bcaec565249c |
cacti -- Multiple vulnerabilities |
f0b9049f-88c4-11e5-aed7-00262d5ed8ee |
chromium -- multiple vulnerabilities |
f0ba7008-2bbd-11ef-b4ca-814a3d504243 |
forgejo -- multiple issues |
f0db930b-496b-11d9-bf86-0050569f0001 |
squid -- possible information disclosure |
f0e45968-faff-11ec-856e-d4c9ef517024 |
OpenSSL -- Heap memory corruption with RSA private key operation |
f0f97b94-3f95-11de-a3fd-0030843d3802 |
ghostscript -- buffer overflow vulnerability |
f0fa19dd-c060-11dc-982e-001372fd0af2 |
drupal -- cross site scripting (register_globals) |
f1075415-f5e9-11e6-a4e2-5404a68ad561 |
wavpack -- multiple invalid memory reads |
f109b02f-f5a4-11e3-82e9-00a098b18457 |
asterisk -- multiple vulnerabilities |
f113bbeb-e3ac-11dc-bb89-000bcdc1757a |
moinmoin -- multiple vulnerabilities |
f115f693-36b2-11e2-a633-902b343deec9 |
FreeBSD -- Insufficient message length validation for EAP-TLS messages |
f11b219a-44b6-11d9-ae2f-021106004fd6 |
rssh & scponly -- arbitrary command execution |
f11d3b22-88c6-11da-a7b2-0060084a00e5 |
fetchmail -- crash when bouncing a message |
f12368a8-1e05-11ed-a1ef-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
f1331504-8849-11df-89b8-00151735203a |
bugzilla -- information disclosure |
f140cff0-771a-11ef-9a62-002590c1f29c |
FreeBSD -- pf incorrectly matches different ICMPv6 states in the state table |
f14ad681-5b88-11dc-812d-0011098b2f36 |
rkhunter -- insecure temporary file creation |
f14ce57f-6dc8-11e8-a671-001999f8d30b |
asterisk -- Infinite loop when reading iostreams |
f154a3c7-f7f4-11df-b617-00e0815b8da8 |
isc-dhcp-server -- Empty link-address denial of service |
f161a5ad-c9bd-11ee-b7a7-353f1e043d9a |
openexr -- Heap Overflow in Scanline Deep Data Parsing |
f1692469-45ce-11e5-adde-14dae9d210b8 |
jasper -- multiple vulnerabilities |
f1892066-0e74-11de-92de-000bcdc1757a |
apache -- Cross-site scripting vulnerability |
f1a00122-3797-11ef-b611-84a93843eb75 |
OpenSSH -- Race condition resulting in potential remote code execution |
f1bf28c5-d447-11e5-b2bd-002590263bf5 |
xdelta3 -- buffer overflow vulnerability |
f1c219ba-3f14-11e6-b3c8-14dae9d210b8 |
haproxy -- denial of service |
f1c4d133-e6d3-11db-99ea-0060084a00e5 |
fetchmail -- insecure APOP authentication |
f1deed23-27ec-11e5-a4a5-002590263bf5 |
xen-tools -- xl command line config handling stack overflow |
f1e0164e-b67b-11dd-a55e-00163e000016 |
libxml2 -- multiple vulnerabilities |
f1f163ce-9e09-11da-b410-000e0c2e438a |
phpicalendar -- file disclosure vulnerability |
f1f637d1-39eb-11ed-ab44-080027f5fec9 |
redis -- Potential remote code execution vulnerability |
f1f6f6da-9d2f-11dc-9114-001c2514716c |
firefox -- multiple remote unspecified memory corruption vulnerabilities |
f2043ff6-2916-11ed-a1ef-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
f20eb9a4-dfea-11ea-a9b8-9c5c8e84d621 |
ceph14 -- HTTP header injection via CORS ExposeHeader tag |
f2144530-936f-11e9-8fc4-5404a68ad561 |
vlc -- Buffer overflow vulnerability |
f22144d7-bad1-11ec-9cfe-0800270512f4 |
Ruby -- Double free in Regexp compilation |
f2217cdf-01e4-11e6-b1ce-002590263bf5 |
go -- remote denial of service |
f235fe7a-b9ca-11db-bf0f-0013720b182d |
samba -- potential Denial of Service bug in smbd |
f241641e-f5ea-11d9-a6db-000d608ed240 |
drupal -- PHP code execution vulnerabilities |
f2596f27-db4c-11eb-8bc6-c556d71493c9 |
openexr v3.0.5 -- fixes miscellaneous security issues |
f25a34b1-910d-11ee-a1a2-641c67a117d8 |
varnish -- HTTP/2 Rapid Reset Attack |
f28476f7-b166-11ea-8775-507b9d01076a |
Several issues in Lynis |
f29fea8f-b19f-11dd-a55e-00163e000016 |
mozilla -- multiple vulnerabilities |
f2b1da2e-6178-11ef-8a7d-b42e991fc52e |
md4c -- DoS attack |
f2b43905-3545-11e0-8e81-0022190034c0 |
openoffice.org -- Multiple vulnerabilities |
f2d4f879-0d7c-11e6-925f-6805ca0b3d42 |
logstash -- password disclosure vulnerability |
f2d5e56e-67eb-11d9-a9e7-0001020eed82 |
unrtf -- buffer overflow vulnerability |
f2d6a5e1-26b9-11d9-9289-000c41e2cdad |
gaim -- MSN denial-of-service vulnerabilities |
f2d8342f-1134-11ef-8791-6805ca2fa271 |
dnsdist -- Transfer requests received over DoH can lead to a denial of service |
f3017ce1-32a4-11d9-a9e7-0001020eed82 |
socat -- format string vulnerability |
f3148a05-0fa7-11e0-becc-0022156e8794 |
php -- corruption of $GLOBALS and $this variables via extract() method |
f32b1fbd-264d-11ee-a468-80fa5b29d485 |
virtualbox-ose -- multiple vulnerabilities |
f353525a-d8b8-11e6-a071-001e67f15f5a |
lshell -- Multiple security issues |
f358de71-bf64-11dc-928b-0016179b2dd5 |
maradns -- CNAME record resource rotation denial of service |
f36bbd66-aa44-11e5-8f5c-002590263bf5 |
mediawiki -- multiple vulnerabilities |
f3778328-d288-4b39-86a4-65877331eaf7 |
Adobe Flash Player -- critical vulnerabilities |
f38187e7-2f6e-11e8-8f07-b499baebfeaf |
apache -- multiple vulnerabilities |
f38c87a5-4a3e-11da-8ba2-0004614cc33d |
base -- PHP SQL injection vulnerability |
f38d25ac-2b7a-11ed-a1ef-3065ec8fd3ec |
chromium -- insufficient data validation in Mojo |
f393b5a7-1535-11ef-8064-c5610a6efffb |
Arti -- Security issues related to circuit construction |
f3a35fb8-2d70-47c9-a516-6aad7eb222b1 |
electron{22,23,24,25} -- multiple vulnerabilities |
f3cf4b33-6013-11eb-9a0e-206a8a720317 |
sudo -- Multiple vulnerabilities |
f3d24aee-e5ad-11e2-b183-20cf30e32f6d |
apache22 -- several vulnerabilities |
f3d3f621-38d8-11d9-8fff-000c6e8f12ef |
smbd -- buffer-overrun vulnerability |
f3d86439-9def-11eb-97a0-e09467587c17 |
chromium -- multiple vulnerabilities |
f3eec2b5-8cd8-11d9-8066-000a95bc6fae |
postnuke -- SQL injection vulnerabilities |
f3fc2b50-d36a-11eb-a32c-00a0989e4ec1 |
dovecot-pigeonhole -- Sieve excessive resource usage |
f40f07aa-c00f-11e7-ac58-b499baebfeaf |
OpenSSL -- Multiple vulnerabilities |
f414d69f-e43d-11ec-9ea4-001b217b3468 |
Gitlab -- multiple vulnerabilities |
f418cd50-561a-49a2-a133-965d03ede72a |
py-ansible -- data leak vulnerability |
f41e3e54-076b-11e7-a9f2-0011d823eebd |
mbed TLS (PolarSSL) -- multiple vulnerabilities |
f4428842-a583-4a4c-89b7-297c3459a1c3 |
bogofilter -- RFC 2047 decoder denial-of-service vulnerability |
f4464e49-7e04-11ee-8e38-002590c1f29c |
FreeBSD -- Incorrect libcap_net limitation list manipulation |
f450587b-d7bd-11e4-b5a4-14dae9d5a9d2 |
osc -- shell command injection via crafted _service files |
f45c0049-be72-11e1-a284-0023ae8e59f0 |
pycrypto -- vulnerable ElGamal key generation |
f46c4c6a-ba25-11e1-806a-001143cd36d8 |
joomla -- Privilege Escalation |
f471032a-8700-11e6-8d93-00248c0c745d |
PHP -- multiple vulnerabilities |
f4722927-1375-11eb-8711-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
f47f2746-12c5-11dd-bab7-0016179b2dd5 |
mailman -- script insertion vulnerability |
f4876dd4-9ca8-11e8-aa17-0011d823eebd |
mbed TLS -- plaintext recovery vulnerabilities |
f49ba347-2190-11dd-907c-001c2514716c |
django -- XSS vulnerability |
f4a0212f-f797-11e2-9bb9-6805ca0b3d42 |
phpMyAdmin -- multiple vulnerabilities |
f4a94232-7864-4afb-bbf9-ff2dc8e288d1 |
py-cinder -- data leak |
f4af098d-d921-11da-ad4a-00123ffe8333 |
jabberd -- SASL Negotiation Denial of Service Vulnerability |
f4b15f7d-d33a-4cd0-a97b-709d6af0e43e |
minio -- policy restriction issue |
f4b95430-51d8-11da-8e93-0010dc4afb40 |
flyspray -- cross-site scripting vulnerabilities |
f4bf713f-6ac7-4b76-8980-47bf90c5419f |
memcached -- multiple vulnerabilities |
f4c54b81-bcc8-11eb-a7a6-080027f515ea |
binutils -- excessive debug section size can cause excessive memory consumption in bfd's dwarf2.c read_section() |
f4ce64c2-5bd4-11e5-9040-3c970e169bc2 |
wordpress -- multiple vulnerabilities |
f4d638b9-e6e5-4dbe-8c70-571dbc116174 |
curl -- password overflow vulnerability |
f4eb9a25-fde0-11e6-9ad0-b8aeed92ecc4 |
potrace -- multiple memory failure |
f4f15051-4574-11ed-81a1-080027881239 |
Django -- multiple vulnerabilities |
f4ff7434-9505-11db-9ddc-0011098b2f36 |
plone -- user can masquerade as a group |
f5035ead-688b-11e6-8b1d-c86000169601 |
eog -- out-of-bounds write |
f504a8d2-e105-11ed-85f6-84a93843eb75 |
MySQL -- Multiple vulnerabilities |
f5225b23-192d-11e5-a1cf-002590263bf5 |
rubygem-bson -- DoS and possible injection |
f524d8e0-3d83-11e2-807a-080027ef73ec |
bogofilter -- heap corruption by invalid base64 input |
f52e3a8d-3f7e-11e7-97a9-a0d3c19bfa21 |
NVIDIA UNIX driver -- multiple vulnerabilities in the kernel mode layer handler |
f53dab71-1b15-11ec-9d9d-0022489ad614 |
Node.js -- July 2021 Security Releases (2) |
f53dd5cc-527f-11e7-a772-e8e0b747a45a |
chromium -- multiple vulnerabilities |
f54584bc-7d2b-11e2-9bd1-206a8a720317 |
krb5 -- null pointer dereference in the KDC PKINIT code [CVE-2013-1415] |
f5524753-67b1-4c88-8114-29c2d258b383 |
mini_httpd,thttpd -- Buffer overflow in htpasswd |
f5561ade-846c-11e4-b7a7-20cf30e32f6d |
subversion -- DoS vulnerabilities |
f55921aa-10c9-11ec-8647-00e0670f2660 |
MPD5 PPPoE Server remotely exploitable crash |
f56390a4-4638-11e1-9f47-00e0815b8da8 |
FreeBSD -- Buffer overflow in handling of UNIX socket addresses |
f56669f5-d799-4ff5-9174-64a6d571c451 |
bro -- Null pointer dereference and Signed integer overflow |
f599dfc4-3ec2-11e2-8ae1-001a8056d0b5 |
tomcat -- bypass of security constraints |
f59af308-07f3-11ea-8c56-f8b156b6dcc8 |
GNU cpio -- multiple vulnerabilities |
f59c4c53-c55f-43fe-9920-82b9d1ea9c3d |
zeek -- Remote crash vulnerability |
f59dda75-5ff4-11de-a13e-00e0815b8da8 |
tor-devel -- DNS resolution vulnerability |
f5a48a7a-61d3-11ed-9094-589cfc0f81b0 |
phpmyfaq -- multiple vulnerabilities |
f5a76faf-244c-11dd-b143-0211d880e350 |
libvorbis -- various security issues |
f5abafc0-fcf6-11ea-8758-e0d55e2a8bf9 |
libxml -- multiple vulnerabilities |
f5b29ec0-71f9-11dc-8c6a-00304881ac9a |
ImageMagick -- multiple vulnerabilities |
f5b8b670-465c-11e5-a49d-bcaec565249c |
gdk-pixbuf2 -- heap overflow and DoS |
f5c4d7f7-9f4b-11dd-bab1-001999392805 |
opera -- multiple vulnerabilities |
f5c58fc1-49c0-11dd-b0ba-00163e000016 |
py-pylons -- Path traversal bug |
f5d0cfe7-6ba6-11ef-858b-23eeba13701a |
gitea -- multiple issues |
f5e52bf5-fc77-11db-8163-000e0c2e438a |
php -- multiple vulnerabilities |
f5f00804-a03b-11e1-a284-0023ae8e59f0 |
inspircd -- buffer overflow |
f5f0a640-bae8-11e9-bb3a-001e2a3f778d |
KDE Frameworks -- malicious .desktop files execute code |
f5fa174d-19de-11ef-83d8-4ccc6adda413 |
QtNetworkAuth -- predictable seeding of PRNG in QAbstractOAuth |
f60561e7-e23e-11ea-be64-507b9d01076a |
Icinga Web 2 -- directory traversal vulnerability |
f622608c-c53c-11e7-a633-009c02a2ab30 |
roundcube -- file disclosure vulnerability |
f62bba56-b309-11e9-a87f-a4badb2f4699 |
FreeBSD -- iconv buffer overflow |
f6377f08-12a7-11dd-bab7-0016179b2dd5 |
php -- integer overflow vulnerability |
f63bf080-619d-11e1-91af-003067b2972c |
linux-flashplugin -- multiple vulnerabilities |
f6429c24-4fc9-11df-83fb-0015587e2cc1 |
moodle -- multiple vulnerabilities |
f6447303-9ec9-11da-b410-000e0c2e438a |
heartbeat -- insecure temporary file creation vulnerability |
f645aa90-a3e8-11e3-a422-3c970e169bc2 |
gnutls -- multiple certificate verification issues |
f650d5b8-ae62-11d9-a788-0001020eed82 |
mozilla -- privilege escalation via DOM property overrides |
f6565fbf-ab9e-11e6-ae1b-002590263bf5 |
moodle -- multiple vulnerabilities |
f661184a-eb90-11ee-92fc-1c697a616631 |
emacs -- multiple vulnerabilities |
f6680c03-0bd8-11d9-8a8a-000c41e2cdad |
tiff -- RLE decoder heap overflows |
f66e011d-13ff-11da-af41-0004614cc33d |
elm -- remote buffer overflow in Expires header |
f671c282-95ef-11eb-9c34-080027f515ea |
python -- Information disclosure via pydoc -p: /getfile?key=path allows to read arbitrary file on the filesystem |
f682a506-df7c-11e5-81e4-6805ca0b3d42 |
phpmyadmin -- multiple XSS and a man-in-the-middle vulnerability |
f68bb358-be8e-11ed-9215-00e081b7aa2d |
jenkins -- multiple vulnerabilities |
f69415aa-086e-11ef-9f97-a8a1599412c6 |
chromium -- multiple security fixes |
f69e1f09-e39b-11e5-9f77-5453ed2e2b49 |
websvn -- information disclosure |
f6a014cd-d268-11e4-8339-001e679db764 |
GNU binutils -- multiple vulnerabilities |
f6bff909-4a26-11db-a4cc-000a48049292 |
libmms -- stack-based buffer overflow |
f6d6308a-f2ec-11e8-b005-6805ca2fa271 |
powerdns-recursor -- Crafted query can cause a denial of service |
f6ea18bb-65b9-11e9-8b31-002590045d9c |
py-yaml -- arbitrary code execution |
f6eb2279-ca3f-11df-aade-0050568f000c |
FreeBSD -- Insufficient environment sanitization in jail(8) |
f6f19735-9245-4918-8a60-87948ebb4907 |
wireshark -- multiple vulnerabilities |
f70ab05e-be06-11eb-b983-000c294bb613 |
drupal7 -- fix possible CSS |
f70d09cb-0c46-11db-aac7-000c6ec775d9 |
mambo -- SQL injection vulnerabilities |
f70f8860-e8ee-11d9-b875-0001020eed82 |
kernel -- ipfw packet matching errors with address tables |
f714b4c9-a6c1-11e5-88d7-047d7b492d07 |
libvirt -- ACL bypass using ../ to access beyond storage pool |
f714d8ab-028e-11e7-8042-50e549ebab6c |
kio: Information Leak when accessing https when using a malicious PAC file |
f72d98d1-0b7e-11e7-970f-002590263bf5 |
moodle -- multiple vulnerabilities |
f74dc01b-0e83-11da-bc08-0001020eed82 |
acroread -- plug-in buffer overflow vulnerability |
f755545e-6fcd-11d9-abec-00061bd2d56f |
xpdf -- makeFileKey2() buffer overflow vulnerability |
f75722ce-31b0-11ed-8b56-0800277bb8a8 |
gitea -- multiple issues |
f762ccbb-baed-11dc-a302-000102cc8983 |
linux-realplayer -- multiple vulnerabilities |
f767d615-01db-47e9-b4ab-07bb8d3409fd |
py39-cinder -- insecure-credentials flaw |
f771880c-31cf-11e6-8e82-002590263bf5 |
botan -- cryptographic vulnerability |
f7809d9e-6af0-11e2-8e32-080027d768d3 |
poweradmin -- multiple XSS vulnerabilities |
f78eac48-c3d1-4666-8de5-63ceea25a578 |
mozilla -- multiple vulnerabilities |
f7a00ad7-ae75-11eb-8113-08002728f74c |
Rails -- multiple vulnerabilities |
f7a02651-c798-11ea-81d6-6805cabe6ebb |
clamav -- multiple vulnerabilities |
f7a3b18c-624c-4703-9756-b6b27429e5b0 |
leafnode denial-of-service triggered by article request |
f7a97d43-c039-11ea-a051-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
f7a9e415-bdca-11e4-970c-000c292ee6b8 |
php5 -- multiple vulnerabilities |
f7b3d1eb-f738-11e5-a710-0011d823eebd |
flash -- multiple vulnerabilities |
f7ba20aa-6b5a-11dd-9d79-001fc61c2a55 |
ruby -- DoS vulnerability in WEBrick |
f7c5b3a9-b9fb-11ed-99c6-001b217b3468 |
Gitlab -- Multiple Vulnerabilities |
f7c87a8a-55d5-11e2-a255-c8600054b392 |
asterisk -- multiple vulnerabilities |
f7d79fac-cd49-11e4-898f-bcaec565249c |
libXfont -- BDF parsing issues |
f7d838f2-9039-11e0-a051-080027ef73ec |
fetchmail -- STARTTLS denial of service |
f7dd2d09-625e-11e6-828b-fcaa14edc6a6 |
TeamSpeak Server 3 -- Multiple vulnerabilities including Remote Code Execution |
f7e8d2ca-410e-40b2-8748-3abd021e44a9 |
xtrlock -- X display locking bypass |
f7e9a1cc-0931-11ee-94b4-6cc21735f730 |
xmltooling -- remote resource access |
f7eb0b23-7099-11da-a15c-0060084a00e5 |
fetchmail -- null pointer dereference in multidrop mode with headerless email |
f7fcb75c-e537-11e9-863e-b9b7af01ba9e |
ruby -- multiple vulnerabilities |
f82c85d8-1c6e-11df-abb2-000f20797ede |
mozilla -- multiple vulnerabilities |
f838dcb4-656f-11e5-9909-002590263bf5 |
codeigniter -- multiple vulnerabilities |
f848ef90-1848-11ef-9850-001b217b3468 |
Gitlab -- Vulnerabilities |
f84ab297-2285-11ec-9e79-08002789875b |
mediawiki -- multiple vulnerabilities |
f8536143-9bc4-11d9-b8b3-000a95bc6fae |
sylpheed -- buffer overflow in header processing |
f8551668-de09-4d7b-9720-f1360929df07 |
tcpdump ISAKMP payload handling remote denial-of-service |
f85fa236-e2a6-412e-b5c7-c42120892de5 |
chromium -- multiple vulnerabilities |
f866d2af-bbba-11df-8a8d-0008743bf21a |
vim6 -- heap-based overflow while parsing shell metacharacters |
f86d0e5d-7467-11e7-93af-005056925db4 |
Cacti -- Cross-site scripting (XSS) vulnerability in auth_profile.php |
f87a9376-0943-11e6-8fc4-00a0986f28c4 |
phpmyfaq -- cross-site request forgery vulnerability |
f8a913cc-1322-11e3-8ffa-20cf30e32f6d |
svnserve is vulnerable to a local privilege escalation vulnerability via symlink attack. |
f8b0f83c-8bb3-11dc-bffa-0016179b2dd5 |
gftp -- multiple vulnerabilities |
f8b46415-c264-11ea-8659-901b0ef719ab |
FreeBSD -- posix_spawnp(3) buffer overflow |
f8c2f741-6be1-11ee-b33a-a04a5edf46d9 |
moonlight-embedded -- multiple vulnerabilities |
f8c37915-7ac5-11e5-b35a-002590263bf5 |
Joomla! -- Core - XSS Vulnerability |
f8c88d50-5fb3-11e4-81bd-5453ed2e2b49 |
libssh -- PRNG state reuse on forking servers |
f8d3689e-6770-11dc-8be8-02e0185f8d72 |
bugzilla -- "createmailregexp" security bypass vulnerability |
f8e1e2a6-9791-11eb-b87a-901b0ef719ab |
FreeBSD -- double free in accept_filter(9) socket configuration interface |
f8e72cd4-c66a-11e7-bb17-e8e0b747a45a |
chromium -- multiple vulnerabilities |
f8fe2905-0918-11e9-a550-00262d164c21 |
rpm4 -- regression in -setperms, -setugids and -restore |
f900bda8-0472-11db-bbf7-000c6ec775d9 |
gnupg -- user id integer overflow vulnerability |
f90bf863-e43c-4db3-b5a8-d9603684657a |
electron{27,28,29} -- multiple vulnerabilities |
f90fce70-ecfa-4f4d-9ee8-c476dbf4bf0e |
mozilla -- data: URL can inherit wrong origin after an HTTP redirect |
f9140ad4-4920-11ed-a07e-080027f5fec9 |
samba -- Multiple vulnerabilities |
f923205f-6e66-11ee-85eb-84a93843eb75 |
Apache httpd -- Multiple vulnerabilities |
f9258873-2ee2-11e0-afcd-0015f2db7bde |
vlc -- Insufficient input validation in MKV demuxer |
f927e06c-1109-11e4-b090-20cf30e32f6d |
apache22 -- several vulnerabilities |
f929b172-369e-11ea-9cdb-001b217b3468 |
Gitlab -- Private objects exposed through project import |
f92e1bbc-5e18-11d9-839a-0050da134090 |
tnftp -- mget does not check for directory escapes |
f93be979-a992-11d8-aecc-000d610a3b12 |
cvs pserver remote heap buffer overflow |
f947aa26-b2f9-11eb-a5f7-a0f3c100ae18 |
Pillow -- multiple vulnerabilities |
f94befcd-1289-11e2-a25e-525400272390 |
gitolite -- path traversal vulnerability |
f95a9005-88ae-11d8-90d1-0020ed76ef5a |
shmat reference counting bug |
f96044a2-7df9-414b-9f6b-6e5b85d06c86 |
Rails -- Active Job vulnerability |
f969bad7-46fc-11e3-b6ee-00269ee29e57 |
Quassel IRC -- SQL injection vulnerability |
f98dea27-d687-11dd-abd1-0050568452ac |
twiki -- multiple vulnerabilities |
f9ada0b5-3d80-11ed-9330-080027f5fec9 |
squid -- Exposure of sensitive information in cache manager |
f9c388c5-a256-11e4-992a-7b2a515a1247 |
LibreSSL -- DTLS vulnerability |
f9c5a410-9b4e-11ea-ac3f-6805ca2fa271 |
powerdns-recursor -- multiple vulnerabilities |
f9cfdb00-7f43-11ef-9b27-592d55dd336d |
Slixmpp -- Lack of SSL Certificate hostname validation in XMLStream |
f9d73a20-b5f0-11e8-b1da-6451062f0f7a |
Flash Player -- information disclosure |
f9e3e60b-e650-11d8-9b0a-000347a4fa7d |
libpng stack-based buffer overflow and other code concerns |
f9e6c0d1-e4cc-11e5-b2bd-002590263bf5 |
django -- multiple vulnerabilities |
f9e96930-e6df-11dc-8c6a-00304881ac9a |
pcre -- buffer overflow vulnerability |
f9f5c5a2-17b5-11e8-90b8-001999f8d30b |
asterisk and pjsip -- multiple vulnerabilities |
f9f76a50-9642-11e7-ab09-080027b00c2e |
cyrus-imapd -- broken "other users" behaviour |
f9fa7adc-ee51-11ea-a240-002590acae31 |
gnupg -- AEAD key import overflow |
fa175f30-8c75-11e6-924a-60a44ce6887b |
redis -- sensitive information leak through command history file |
fa194483-dabd-11e8-bf39-5404a68ad561 |
liveMedia -- potential remote code execution |
fa239535-30f6-11ee-aef9-001b217b3468 |
Gitlab -- Vulnerabilities |
fa2f386f-4814-11e1-89b4-001ec9578670 |
acroread9 -- Multiple Vulnerabilities |
fa6a4a69-03d1-11e9-be12-a4badb2f4699 |
FreeBSD -- bootpd buffer overflow |
fa708908-a8c7-11dc-b41d-000fb5066b20 |
drupal -- SQL injection vulnerability |
fab87bff-3ce5-11e7-bf9d-001999f8d30b |
asterisk -- Memory exhaustion on short SCCP packets |
faca0843-6281-11da-8630-00123ffe8333 |
drupal -- multiple vulnerabilities |
faccf131-00d9-11ef-92b7-589cfc023192 |
GLPI -- multiple vulnerabilities |
faf7c1d0-f5bb-47b4-a6a8-ef57317b9766 |
ffmpeg -- multiple vulnerabilities |
fafaef4d-f364-4a07-bbdd-bf53448c593c |
chromium -- multiple security fixes |
fb03b1c6-8a8a-11d9-81f7-02023f003c9f |
uim -- privilege escalation vulnerability |
fb0b5574-4e64-11ef-8a0f-a8a1599412c6 |
chromium -- multiple security fixes |
fb2475c2-9125-11e5-bd18-002590263bf5 |
kibana4 -- CSRF vulnerability |
fb25333d-442f-11e4-98f3-5453ed2e2b49 |
krfb -- Multiple security issues in bundled libvncserver |
fb26f78a-26a9-11e8-a1c2-00505689d4ae |
samba -- multiple vulnerabilities |
fb30db8f-62af-11e9-b0de-001cc0382b2f |
GnuTLS -- double free, invalid pointer access |
fb3455be-ebf6-11eb-aef1-0897988a1c07 |
asterisk -- Remote crash when using IAX2 channel driver |
fb3668df-32d7-11e5-a4a5-002590263bf5 |
elasticsearch -- remote code execution via transport protocol |
fb521119-9bc4-11d8-9366-0020ed76ef5a |
pound remotely exploitable vulnerability |
fb5e227e-b8c6-11d8-b88c-000d610a3b12 |
jailed processes can manipulate host routing tables |
fb672330-02db-11dd-bd06-0017319806e7 |
suphp -- multiple local privilege escalation vulnerabilities |
fb67567a-5d95-11eb-a955-08002728f74c |
pysaml2 -- multiple vulnerabilities |
fb6e53ae-9df6-11eb-ba8c-001b217b3468 |
Gitlab -- Vulnerabilities |
fb74eacc-ec8a-11e6-bc8a-0011d823eebd |
tiff -- multiple vulnerabilities |
fb754341-c3e2-11e5-b5fe-002590263bf5 |
wordpress -- XSS vulnerability |
fb84d5dd-9528-11dd-9a00-001999392805 |
opera -- multiple vulnerabilities |
fb911e31-8ceb-11dd-bb29-000c6e274733 |
lighttpd -- multiple vulnerabilities |
fb9ba490-5cc4-11ec-aac7-3065ec8fd3ec |
chromium -- multiple vulnerabilities |
fba75b43-c588-11da-9110-00123ffe8333 |
phpmyadmin -- XSS vulnerabilities |
fbb01289-2645-11e4-bc44-6805ca0b3d42 |
phpMyAdmin -- XSS vulnerabilities |
fbb5a260-f00f-11ed-bbae-6cc21735f730 |
postgresql-server -- CREATE SCHEMA ... schema elements defeats protective search_path changes |
fbc2c629-0dc5-11ef-9850-001b217b3468 |
Gitlab -- vulnerabilities |
fbc8413f-2f7a-11de-9a3f-001b77d09812 |
FreeBSD -- remotely exploitable crash in OpenSSL |
fbca6863-e2ad-11ea-9d39-00a09858faf5 |
textproc/elasticsearch6 -- field disclosure flaw |
fbcba194-ac7d-11ea-8b5e-b42e99a1b9c3 |
Intel CPU issues |
fbd7aa81-2cc1-11dd-8cfb-00e0815b8da8 |
Nagios -- Cross Site Scripting Vulnerability |
fbe10a8a-05a1-11ea-9dfa-f8b156ac3ff9 |
FreeBSD -- Intel CPU Microcode Update |
fc07c9ca-22ce-11d9-814e-0001020eed82 |
phpmyadmin -- remote command execution vulnerability |
fc1bcbca-c88b-11eb-9120-f02f74d0e4bd |
dino -- Path traversal in Dino file transfers |
fc1f6658-4f53-11e5-934b-002590263bf5 |
ghostscript -- denial of service (crash) via crafted Postscript files |
fc1f8795-881d-11e5-ab94-002590263bf5 |
xen-kernel -- leak of main per-domain vcpu pointer array |
fc28df92-b233-11e3-99ca-f0def16c5c1b |
nginx -- SPDY heap buffer overflow |
fc2a9541-8893-11ec-9d01-80ee73419af3 |
xrdp -- privilege escalation |
fc38cd83-00b3-11e5-8ebd-0026551a22dc |
PostgreSQL -- minor security problems. |
fc4d0ae8-3fa3-11de-a3fd-0030843d3802 |
moinmoin -- multiple cross site scripting vulnerabilities |
fc5231b6-c066-11e1-b5e0-000c299b62e1 |
FreeBSD -- Incorrect handling of zero-length RDATA fields in named(8) |
fc55e396-6deb-11df-8b8e-000c29ba66d2 |
mediawiki -- two security vulnerabilities |
fc75570a-b417-11eb-a23d-c7ab331fd711 |
Prosody -- multiple vulnerabilities |
fc7e6a42-6012-11d9-a9e7-0001020eed82 |
tiff -- directory entry count integer overflow vulnerability |
fc91f2ef-fd7b-11e9-a1c7-b499baebfeaf |
MySQL -- Multiple vulerabilities |
fc99c736-3499-11d9-98a7-0090962cff2a |
gnats -- format string vulnerability |
fc9c217e-3791-11dc-bb1a-000fea449b8a |
lighttpd -- multiple vulnerabilities |
fc9e73b2-8685-11dd-bb64-0030843d3802 |
gallery -- multiple vulnerabilities |
fcb0e00f-d7d3-49b6-a4a1-852528230912 |
electron31 -- multiple vulnerabilities |
fcb90eb0-2ace-11db-a6e2-000e0c2e438a |
mysql -- format string vulnerability |
fcba5764-506a-11db-a5ae-00508d6a62df |
dokuwiki -- multiple vulnerabilities |
fcbf56dd-e667-11de-920a-00248c9b4be7 |
piwik -- php code execution |
fcc39d22-5777-11df-bf33-001a92771ec2 |
redmine -- multiple vulnerabilities |
fce67546-d2e7-11e2-a9bf-98fc11cdc4f5 |
linux-flashplugin -- multiple vulnerabilities |
fce7a6e7-bc5d-11ea-b38d-f0def1d0c3ea |
coturn -- information leakage |
fceb2b08-cb76-11ec-a06f-d4c9ef517024 |
OpenSSL -- Multiple vulnerabilities |
fcedcdbb-c86e-11e6-b1cf-14dae9d210b8 |
FreeBSD -- Multiple vulnerabilities of ntp |
fcfdabb7-f14d-4e61-a7d5-cfefb4b99b15 |
Ruby Rack Gem -- Multiple Issues |
fd10aa77-fb5e-11e9-af7b-0800274e5f20 |
gitea -- information disclosure |
fd24a530-c202-11eb-b217-b42e99639323 |
wayland -- integer overflow |
fd2bf3b5-1001-11e3-ba94-0025905a4771 |
asterisk -- multiple vulnerabilities |
fd2e0ca8-e3ae-11e9-8af7-08002720423d |
mongodb -- Bump Windows package dependencies |
fd3401a1-b6df-4577-917a-2c22fee99d34 |
chromium -- multiple security fixes |
fd376b8b-41e1-11d8-b096-0020ed76ef5a |
Buffer overflow in INN control message handling |
fd47fcfe-ec69-4000-b9ce-e5e62102c1c7 |
couchdb -- information sharing via couchjs processes |
fd538d14-5778-4764-b321-2ddd61a8a58f |
keycloak -- Missing server identity checks when sending mails via SMTPS |
fd64188d-a71d-11e0-89b4-001ec9578670 |
BIND -- Remote DoS against authoritative and recursive servers |
fd792048-ad91-11ed-a879-080027f5fec9 |
clamav -- Multiple vulnerabilities |
fd87a250-ff78-11ed-8290-a8a1599412c6 |
chromium -- multiple vulnerabilities |
fd8bac56-c444-11e1-864b-001cc0877741 |
phpList -- SQL injection and XSS vulnerability |
fdad8a87-7f94-11d9-a9e7-0001020eed82 |
awstats -- arbitrary command execution |
fdbe9aec-118b-11ee-908a-6c3be5272acd |
Grafana -- Account takeover / authentication bypass |
fdc49972-3ca7-11eb-929d-d4c9ef517024 |
p11-kit -- Multiple vulnerabilities |
fdca9418-06f0-11ee-abe2-ecf4bbefc954 |
acme.sh -- closes potential remote vuln |
fdd1c316-5a3d-11e1-8d3e-e0cb4e266481 |
phpMyAdmin -- XSS in replication setup |
fde53204-7ea6-11d8-9645-0020ed76ef5a |
insecure temporary file creation in xine-check, xine-bugreport |
fdf72a0e-8371-11e4-bc20-001636d274f3 |
NVIDIA UNIX driver -- remote denial of service or arbitrary code execution |
fe12ef83-8b47-11e8-96cc-001a4a7ec6be |
mutt/neomutt -- multiple vulnerabilities |
fe15f30a-b4c9-11ec-94a3-3065ec8fd3ec |
chromium -- Type confusion in V8 |
fe2b6597-c9a4-11dc-8da8-0008a18a9961 |
xorg -- multiple vulnerabilities |
fe4c84fc-bdb5-11da-b7d4-00123ffe8333 |
linux-realplayer -- heap overflow |
fe5c1e7a-7eed-11ef-9533-f875a43e1796 |
php -- Multiple vulnerabilities |
fe7031d3-3000-4b43-9fa6-52c2b624b8f9 |
zeek -- potential DoS vulnerability |
fe7ac70a-792b-11ee-bf9a-a04a5edf46d9 |
PptiPNG -- Global-buffer-overflow |
fe7e322f-522d-11e9-98b5-216e512dad89 |
Jupyter notebook -- open redirect vulnerability |
fe818607-b5ff-11e8-856b-485b3931c969 |
Containous Traefik -- exposes the configuration and secret |
fe83eb5b-55e1-11db-a5ae-00508d6a62df |
python -- buffer overrun in repr() for unicode strings |
fe853666-56ce-11e0-9668-001fd0d616cf |
php -- ZipArchive segfault with FL_UNCHANGED on empty archive |
fe903533-ff96-4c7a-bd3e-4d40efa71897 |
gforge -- directory traversal vulnerability |
fe910ed6-f88d-11e4-9ae3-0050562a4d7b |
suricata -- TLS/DER Parser Bug (DoS) |
fe93803c-883f-11e8-9f0c-001b216d295b |
Several Security Defects in the Bouncy Castle Crypto APIs |
fe971a0f-1246-11dd-bab7-0016179b2dd5 |
phpmyadmin -- Shared Host Information Disclosure |
fe99d3ca-a63a-11e8-a7c6-54e1ad3d6335 |
libX11 -- Multiple vulnerabilities |
feb8afdc-b3e5-11ea-9df5-08002728f74c |
Rails -- permission vulnerability |
fedf7e71-61bd-49ec-aaf0-6da14bdbb319 |
zeek -- potential DoS vulnerability |
fee7e059-acec-11dc-807f-001b246e4fdf |
ganglia-webfrontend -- XSS vulnerabilities |
fee94342-4638-11e1-9f47-00e0815b8da8 |
FreeBSD -- errors handling corrupt compress file in compress(1) and gzip(1) |
fef03980-e4c6-11e5-b2bd-002590263bf5 |
wordpress -- multiple vulnerabilities |
fefcd340-624f-11ee-8e38-002590c1f29c |
FreeBSD -- msdosfs data disclosure |
fefd93d8-8af5-11db-9d01-0016179b2dd5 |
tdiary -- injection vulnerability |
ff00f2ce-c54c-11d8-b708-00061bc2ad93 |
XFree86 opens a chooserFd TCP socket even when DisplayManager.requestPort is 0 |
ff0acfb4-3efa-11e5-93ad-002590263bf5 |
pcre -- heap overflow vulnerability in '(?|' situations |
ff304c35-fb5b-11dc-91c1-00e0815b8da8 |
silc -- pkcs_decode buffer overflow |
ff50192c-19eb-11e9-8573-001b217b3468 |
Gitlab -- Arbitrary repo read in Gitlab project import |
ff5606f7-8a45-11ec-8be6-d4c9ef517024 |
MariaDB -- Multiple vulnerabilities |
ff6519ad-18e5-11df-9bdd-001b2134ef46 |
linux-flashplugin -- multiple vulnerabilities |
ff65eecb-91e4-11dc-bd6c-0016179b2dd5 |
flac -- media file processing integer overflow vulnerabilities |
ff76f0e0-3f11-11e6-b3c8-14dae9d210b8 |
expat2 -- denial of service |
ff824eea-c69c-11e5-96d6-14dae9d210b8 |
radicale -- multiple vulnerabilities |
ff82610f-b309-11e9-a87f-a4badb2f4699 |
FreeBSD -- Kernel stack disclosure in UFS/FFS |
ff8b419a-0ffa-11e0-becc-0022156e8794 |
Drupal Views plugin -- cross-site scripting |
ff98087f-0a8f-11e4-b00b-5453ed2e2b49 |
postfixadmin -- SQL injection vulnerability |
ffa15b3b-e6f6-11ea-8cbf-54e1ad3d6335 |
xorg-server -- Multiple input validation failures in X server extensions |
ffa364e1-ebf5-11eb-aef1-0897988a1c07 |
asterisk -- Remote Crash Vulnerability in PJSIP channel driver |
ffa7c6e4-bb29-11e3-8136-60a44c524f57 |
otrs -- Clickjacking issue |
ffa8ca79-4afb-11e6-97ea-002590263bf5 |
atutor -- multiple vulnerabilities |
ffb82d3a-610f-11da-8823-00123ffe8333 |
mambo -- "register_globals" emulation layer overwrite vulnerability |
ffba6ab0-90b5-11dc-9835-003048705d5a |
plone -- unsafe data interpreted as pickles |
ffc73e87-87f0-11e9-ad56-fcaa147e860e |
Django -- AdminURLFieldWidget XSS |
ffc80e58-0dcb-11ea-9673-4c72b94353b5 |
unbound -- parsing vulnerability |
ffcbd42d-a8c5-11dc-bec2-02e0185f8d72 |
samba -- buffer overflow vulnerability |
ffe2d86c-07d9-11e5-9a28-001e67150279 |
rest-client -- plaintext password disclosure |
ffeb25d0-ac94-11e8-ab15-d8cb8abf62dd |
Gitlab -- multiple vulnerabilities |
fffa9257-3c17-11db-86ab-00123ffe8333 |
mailman -- Multiple Vulnerabilities |
fffacc93-16cb-11d9-bc4a-000c41e2cdad |
xv -- exploitable buffer overflows |