| @@ -1,1000 +1,1000 @@ | | | @@ -1,1000 +1,1000 @@ |
1 | # $NetBSD: pkg-vulnerabilities,v 1.67 2023/11/16 18:10:44 nia Exp $ | | 1 | # $NetBSD: pkg-vulnerabilities,v 1.68 2023/11/17 08:05:29 nia Exp $ |
2 | # | | 2 | # |
3 | #FORMAT 1.0.0 | | 3 | #FORMAT 1.0.0 |
4 | # | | 4 | # |
5 | # Please read "Handling packages with security problems" in the pkgsrc | | 5 | # Please read "Handling packages with security problems" in the pkgsrc |
6 | # guide before editing this file. | | 6 | # guide before editing this file. |
7 | # | | 7 | # |
8 | # Note: NEVER remove entries from this file; this should document *all* | | 8 | # Note: NEVER remove entries from this file; this should document *all* |
9 | # known package vulnerabilities so it is entirely appropriate to have | | 9 | # known package vulnerabilities so it is entirely appropriate to have |
10 | # multiple entries in this file for a single package, and to contain | | 10 | # multiple entries in this file for a single package, and to contain |
11 | # entries for packages which have been removed from pkgsrc. | | 11 | # entries for packages which have been removed from pkgsrc. |
12 | # | | 12 | # |
13 | # New entries should be added at the end of this file. | | 13 | # New entries should be added at the end of this file. |
14 | # | | 14 | # |
15 | # Please ask pkgsrc-security to update the copy on ftp.NetBSD.org after | | 15 | # Please ask pkgsrc-security to update the copy on ftp.NetBSD.org after |
16 | # making changes to this file. | | 16 | # making changes to this file. |
17 | # | | 17 | # |
18 | # The command to run for this update is "./pkg-vuln-update.sh", but it needs | | 18 | # The command to run for this update is "./pkg-vuln-update.sh", but it needs |
19 | # access to the private GPG key for pkgsrc-security. | | 19 | # access to the private GPG key for pkgsrc-security. |
20 | # | | 20 | # |
21 | # If you have comments/additions/corrections, please contact | | 21 | # If you have comments/additions/corrections, please contact |
22 | # pkgsrc-security@NetBSD.org. | | 22 | # pkgsrc-security@NetBSD.org. |
23 | # | | 23 | # |
24 | # Note: If this file format changes, please do not forget to update | | 24 | # Note: If this file format changes, please do not forget to update |
25 | # pkgsrc/mk/scripts/genreadme.awk which also parses this file. | | 25 | # pkgsrc/mk/scripts/genreadme.awk which also parses this file. |
26 | # | | 26 | # |
27 | # package type of exploit URL | | 27 | # package type of exploit URL |
28 | cfengine<1.5.3nb3 remote-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-013.txt.asc | | 28 | cfengine<1.5.3nb3 remote-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-013.txt.asc |
29 | navigator<4.75 remote-user-access http://www.cert.org/advisories/CA-2000-15.html | | 29 | navigator<4.75 remote-user-access http://www.cert.org/advisories/CA-2000-15.html |
30 | navigator<4.74 remote-user-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-011.txt.asc | | 30 | navigator<4.74 remote-user-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-011.txt.asc |
31 | communicator<4.75 remote-user-access http://www.cert.org/advisories/CA-2000-15.html | | 31 | communicator<4.75 remote-user-access http://www.cert.org/advisories/CA-2000-15.html |
32 | communicator<4.74 remote-user-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-011.txt.asc | | 32 | communicator<4.74 remote-user-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-011.txt.asc |
33 | pine<4.30 remote-user-shell http://www.securityfocus.com/bid/1709 | | 33 | pine<4.30 remote-user-shell http://www.securityfocus.com/bid/1709 |
34 | pine<4.21nb1 denial-of-service http://www.securityfocus.com/advisories/2646 | | 34 | pine<4.21nb1 denial-of-service http://www.securityfocus.com/advisories/2646 |
35 | imap-uw<4.7c6 denial-of-service http://www.securityfocus.com/advisories/2646 | | 35 | imap-uw<4.7c6 denial-of-service http://www.securityfocus.com/advisories/2646 |
36 | screen<3.9.5nb1 local-root-shell http://www.securityfocus.com/advisories/2634 | | 36 | screen<3.9.5nb1 local-root-shell http://www.securityfocus.com/advisories/2634 |
37 | ntop<1.1 remote-root-shell http://www.securityfocus.com/advisories/2520 | | 37 | ntop<1.1 remote-root-shell http://www.securityfocus.com/advisories/2520 |
38 | wu-ftpd<2.6.1 remote-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-010.txt.asc | | 38 | wu-ftpd<2.6.1 remote-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-010.txt.asc |
39 | wu-ftpd<2.4.2b18.2 remote-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA1999-003.txt.asc | | 39 | wu-ftpd<2.4.2b18.2 remote-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA1999-003.txt.asc |
40 | xlockmore<4.17 local-root-file-view ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-003.txt.asc | | 40 | xlockmore<4.17 local-root-file-view ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-003.txt.asc |
41 | lsof<4.41 local-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA1999-005.txt.asc | | 41 | lsof<4.41 local-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA1999-005.txt.asc |
42 | wu-ftpd<2.6.0 remote-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA1999-003.txt.asc | | 42 | wu-ftpd<2.6.0 remote-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA1999-003.txt.asc |
43 | racoon<20001004a local-root-file-view http://mail-index.NetBSD.org/tech-net/2000/09/24/0000.html | | 43 | racoon<20001004a local-root-file-view http://mail-index.NetBSD.org/tech-net/2000/09/24/0000.html |
44 | global<3.56 remote-user-access http://www.NetBSD.org/cgi-bin/query-pr-single.pl?number=11165 | | 44 | global<3.56 remote-user-access http://www.NetBSD.org/cgi-bin/query-pr-single.pl?number=11165 |
45 | apache<1.3.14 remote-user-access http://httpd.apache.org/dist/httpd/CHANGES_1.3 | | 45 | apache<1.3.14 remote-user-access http://httpd.apache.org/dist/httpd/CHANGES_1.3 |
46 | apache6<1.3.14 remote-user-access http://httpd.apache.org/dist/httpd/CHANGES_1.3 | | 46 | apache6<1.3.14 remote-user-access http://httpd.apache.org/dist/httpd/CHANGES_1.3 |
47 | thttpd<2.20 remote-user-access http://www.dopesquad.net/security/advisories/20001002-thttpd-ssi.txt | | 47 | thttpd<2.20 remote-user-access http://www.dopesquad.net/security/advisories/20001002-thttpd-ssi.txt |
48 | bind<8.2.2.7 denial-of-service http://www.isc.org/products/BIND/bind-security.html | | 48 | bind<8.2.2.7 denial-of-service http://www.isc.org/products/BIND/bind-security.html |
49 | gnupg<1.0.4 weak-authentication http://www.gnupg.org/whatsnew.html#rn20001017 | | 49 | gnupg<1.0.4 weak-authentication http://www.gnupg.org/whatsnew.html#rn20001017 |
50 | pine<=4.21 remote-root-shell ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:59.pine.asc | | 50 | pine<=4.21 remote-root-shell ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:59.pine.asc |
51 | navigator<4.76 remote-root-shell ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A66.netscape.asc | | 51 | navigator<4.76 remote-root-shell ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A66.netscape.asc |
52 | navigator3<4.76 remote-root-shell ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A66.netscape.asc | | 52 | navigator3<4.76 remote-root-shell ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A66.netscape.asc |
53 | openssh<2.3.0 weak-authentication http://www.openbsd.org/errata27.html#sshforwarding | | 53 | openssh<2.3.0 weak-authentication http://www.openbsd.org/errata27.html#sshforwarding |
54 | ethereal<=0.8.13 remote-root-shell http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Ffromthread%3D1%26end%3D2000-11-25%26mid%3D145761%26start%3D2000-11-19%26list%3D1%26threads%3D0%26 | | 54 | ethereal<=0.8.13 remote-root-shell http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Ffromthread%3D1%26end%3D2000-11-25%26mid%3D145761%26start%3D2000-11-19%26list%3D1%26threads%3D0%26 |
55 | php<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 | | 55 | php<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 |
56 | php-gd<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 | | 56 | php-gd<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 |
57 | php-ldap<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 | | 57 | php-ldap<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 |
58 | php-mysql<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 | | 58 | php-mysql<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 |
59 | php-pgsql<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 | | 59 | php-pgsql<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 |
60 | php-snmp<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 | | 60 | php-snmp<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 |
61 | racoon<20001211a denial-of-service http://www.kame.net/ | | 61 | racoon<20001211a denial-of-service http://www.kame.net/ |
62 | LPRng<3.6.25 remote-root-shell http://www.cert.org/advisories/CA-2000-22.html | | 62 | LPRng<3.6.25 remote-root-shell http://www.cert.org/advisories/CA-2000-22.html |
63 | jakarta-tomcat<3.1.1 remote-server-admin http://jakarta.apache.org/site/news.html | | 63 | jakarta-tomcat<3.1.1 remote-server-admin http://jakarta.apache.org/site/news.html |
64 | jakarta-tomcat<3.2.3 cross-site-html http://www.securityfocus.com/bid/2982 | | 64 | jakarta-tomcat<3.2.3 cross-site-html http://www.securityfocus.com/bid/2982 |
65 | fsh<1.1 local-root-file-view http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1135 | | 65 | fsh<1.1 local-root-file-view http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1135 |
66 | bitchx<1.0.3.17nb1 remote-user-shell http://www.securityfocus.com/bid/2087 | | 66 | bitchx<1.0.3.17nb1 remote-user-shell http://www.securityfocus.com/bid/2087 |
67 | namazu<1.3.0.11 remote-file-creation http://www.namazu.org/security.html.en | | 67 | namazu<1.3.0.11 remote-file-creation http://www.namazu.org/security.html.en |
68 | zope<2.2.5 weak-authentication http://www.zope.org/Products/Zope/ | | 68 | zope<2.2.5 weak-authentication http://www.zope.org/Products/Zope/ |
69 | bind<8.2.3 remote-root-shell http://www.cert.org/advisories/CA-2001-02.html | | 69 | bind<8.2.3 remote-root-shell http://www.cert.org/advisories/CA-2001-02.html |
70 | suse{,32}_base<6.4nb2 local-root-shell http://www.suse.com/de/support/security/2001_001_glibc_txt.txt | | 70 | suse{,32}_base<6.4nb2 local-root-shell http://www.suse.com/de/support/security/2001_001_glibc_txt.txt |
71 | ja-micq<0.4.6.1 remote-user-shell http://www.freebsd.org/security/#adv | | 71 | ja-micq<0.4.6.1 remote-user-shell http://www.freebsd.org/security/#adv |
72 | micq<0.4.6.1 remote-user-shell http://www.freebsd.org/security/#adv | | 72 | micq<0.4.6.1 remote-user-shell http://www.freebsd.org/security/#adv |
73 | ssh<1.2.27nb1 remote-root-shell http://razor.bindview.com/publish/advisories/adv_ssh1crc.html | | 73 | ssh<1.2.27nb1 remote-root-shell http://razor.bindview.com/publish/advisories/adv_ssh1crc.html |
74 | ssh6<=1.2.31 remote-root-shell http://razor.bindview.com/publish/advisories/adv_ssh1crc.html | | 74 | ssh6<=1.2.31 remote-root-shell http://razor.bindview.com/publish/advisories/adv_ssh1crc.html |
75 | openssh<2.3.0 remote-root-shell http://razor.bindview.com/publish/advisories/adv_ssh1crc.html | | 75 | openssh<2.3.0 remote-root-shell http://razor.bindview.com/publish/advisories/adv_ssh1crc.html |
76 | camediaplay<20010211 local-user-shell ftp://ftp.itojun.org/pub/digi-cam/C-400/unix/README | | 76 | camediaplay<20010211 local-user-shell ftp://ftp.itojun.org/pub/digi-cam/C-400/unix/README |
77 | analog<4.16 remote-user-shell http://www.analog.cx/security2.html | | 77 | analog<4.16 remote-user-shell http://www.analog.cx/security2.html |
78 | gnupg<1.0.4nb3 weak-authentication http://www.gnupg.org/whatsnew.html#rn20001130 | | 78 | gnupg<1.0.4nb3 weak-authentication http://www.gnupg.org/whatsnew.html#rn20001130 |
79 | xemacs<21.1.14 remote-user-shell http://list-archive.xemacs.org/xemacs-announce/200102/msg00000.html | | 79 | xemacs<21.1.14 remote-user-shell http://list-archive.xemacs.org/xemacs-announce/200102/msg00000.html |
80 | sudo<1.6.3p6 local-root-shell http://www.openbsd.org/errata36.html#sudo | | 80 | sudo<1.6.3p6 local-root-shell http://www.openbsd.org/errata36.html#sudo |
81 | Mesa-glx<=20000813 local-root-shell http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-029.php3?dis=7.2 | | 81 | Mesa-glx<=20000813 local-root-shell http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-029.php3?dis=7.2 |
82 | apache<1.3.19 remote-user-access http://httpd.apache.org/dist/httpd/Announcement.html | | 82 | apache<1.3.19 remote-user-access http://httpd.apache.org/dist/httpd/Announcement.html |
83 | apache6<1.3.19 remote-user-access http://httpd.apache.org/dist/httpd/Announcement.html | | 83 | apache6<1.3.19 remote-user-access http://httpd.apache.org/dist/httpd/Announcement.html |
84 | exmh<2.3 local-symlink-race http://www.beedub.com/exmh/symlink.html | | 84 | exmh<2.3 local-symlink-race http://www.beedub.com/exmh/symlink.html |
85 | samba<2.0.8 local-symlink-race http://www.securityfocus.com/templates/archive.pike?list=1&mid=177370 | | 85 | samba<2.0.8 local-symlink-race http://www.securityfocus.com/templates/archive.pike?list=1&mid=177370 |
86 | hylafax<4.1b3 local-root-shell http://www.securityfocus.com/archive/1/176716 | | 86 | hylafax<4.1b3 local-root-shell http://www.securityfocus.com/archive/1/176716 |
87 | squirrelmail<1.0.5 remote-user-access http://www.geocrawler.com/lists/3/SourceForge/599/500/5567091/ | | 87 | squirrelmail<1.0.5 remote-user-access http://www.geocrawler.com/lists/3/SourceForge/599/500/5567091/ |
88 | kdelibs-2.1 local-root-shell http://dot.kde.org/988663144/ | | 88 | kdelibs-2.1 local-root-shell http://dot.kde.org/988663144/ |
89 | icecast<1.3.10 remote-user-access http://www.securityfocus.com/bid/2264 | | 89 | icecast<1.3.10 remote-user-access http://www.securityfocus.com/bid/2264 |
90 | joe<2.8nb1 local-file-write http://www.securityfocus.com/bid/1959 | | 90 | joe<2.8nb1 local-file-write http://www.securityfocus.com/bid/1959 |
91 | joe<2.8nb1 local-user-shell http://www.securityfocus.com/bid/2437 | | 91 | joe<2.8nb1 local-user-shell http://www.securityfocus.com/bid/2437 |
92 | openssh<2.9.2 remote-file-write http://www.openbsd.org/errata.html#sshcookie | | 92 | openssh<2.9.2 remote-file-write http://www.openbsd.org/errata.html#sshcookie |
93 | w3m<0.2.1.0.19nb1 remote-user-shell http://mi.med.tohoku.ac.jp/~satodai/w3m-dev-en/200106.month/537.html | | 93 | w3m<0.2.1.0.19nb1 remote-user-shell http://mi.med.tohoku.ac.jp/~satodai/w3m-dev-en/200106.month/537.html |
94 | samba<2.0.10 local-root-shell http://www.samba.org/samba/whatsnew/macroexploit.html | | 94 | samba<2.0.10 local-root-shell http://www.samba.org/samba/whatsnew/macroexploit.html |
95 | samba-2.2.0 local-root-shell http://www.samba.org/samba/whatsnew/macroexploit.html | | 95 | samba-2.2.0 local-root-shell http://www.samba.org/samba/whatsnew/macroexploit.html |
96 | samba-2.2.0nb1 local-root-shell http://www.samba.org/samba/whatsnew/macroexploit.html | | 96 | samba-2.2.0nb1 local-root-shell http://www.samba.org/samba/whatsnew/macroexploit.html |
97 | fetchmail<5.8.8 remote-user-access http://www.securityfocus.com/vdb/?id=2877 | | 97 | fetchmail<5.8.8 remote-user-access http://www.securityfocus.com/vdb/?id=2877 |
98 | openldap<1.2.12 denial-of-service http://www.cert.org/advisories/CA-2001-18.html | | 98 | openldap<1.2.12 denial-of-service http://www.cert.org/advisories/CA-2001-18.html |
99 | horde<1.2.6 remote-user-shell http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26mid%3D198495 | | 99 | horde<1.2.6 remote-user-shell http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26mid%3D198495 |
100 | imp<1.2.6 remote-user-shell http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26mid%3D198495 | | 100 | imp<1.2.6 remote-user-shell http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26mid%3D198495 |
101 | fetchmail<5.8.17 remote-user-shell http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26mid%3D203165 | | 101 | fetchmail<5.8.17 remote-user-shell http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26mid%3D203165 |
102 | windowmaker<0.65.1 remote-user-shell http://www.debian.org/security/2001/dsa-074 | | 102 | windowmaker<0.65.1 remote-user-shell http://www.debian.org/security/2001/dsa-074 |
103 | sendmail<8.11.6 local-root-shell ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES | | 103 | sendmail<8.11.6 local-root-shell ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES |
104 | gnut<0.4.27 remote-script-inject http://www.gnutelliums.com/linux_unix/gnut/ | | 104 | gnut<0.4.27 remote-script-inject http://www.gnutelliums.com/linux_unix/gnut/ |
105 | screen<3.9.10 local-root-shell http://lists.opensuse.org/opensuse-security-announce/2000-Sep/0005.html | | 105 | screen<3.9.10 local-root-shell http://lists.opensuse.org/opensuse-security-announce/2000-Sep/0005.html |
106 | openssh<2.9.9.2 remote-user-access http://www.securityfocus.com/cgi-bin/archive.pl?id=1&mid=216702&start=2001-09-23&end=2001-09-29 | | 106 | openssh<2.9.9.2 remote-user-access http://www.securityfocus.com/cgi-bin/archive.pl?id=1&mid=216702&start=2001-09-23&end=2001-09-29 |
107 | w3m<0.2.1.0.19nb2 weak-authentication http://mi.med.tohoku.ac.jp/~satodai/w3m-dev/200109.month/2226.html | | 107 | w3m<0.2.1.0.19nb2 weak-authentication http://mi.med.tohoku.ac.jp/~satodai/w3m-dev/200109.month/2226.html |
108 | procmail<3.20 local-root-shell http://www.somelist.com/mail.php/282/view/1200950 | | 108 | procmail<3.20 local-root-shell http://www.somelist.com/mail.php/282/view/1200950 |
109 | slrn<0.9.7.2nb1 remote-script-inject http://slrn.sourceforge.net/patches/index.html#subsect_decode | | 109 | slrn<0.9.7.2nb1 remote-script-inject http://slrn.sourceforge.net/patches/index.html#subsect_decode |
110 | nvi-m17n<1.79.19991117 local-user-shell http://www.securityfocus.com/archive/1/221880 | | 110 | nvi-m17n<1.79.19991117 local-user-shell http://www.securityfocus.com/archive/1/221880 |
111 | mgetty<1.1.22 denial-of-service ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A71.mgetty.asc | | 111 | mgetty<1.1.22 denial-of-service ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A71.mgetty.asc |
112 | kdeutils-2.2.1 local-root-shell http://lists.kde.org/?l=kde-announce&m=100535642201983&w=2 | | 112 | kdeutils-2.2.1 local-root-shell http://lists.kde.org/?l=kde-announce&m=100535642201983&w=2 |
113 | imp<2.2.7 remote-file-view http://www.securityfocus.com/archive/1/225686 | | 113 | imp<2.2.7 remote-file-view http://www.securityfocus.com/archive/1/225686 |
114 | libgtop<1.0.12nb1 remote-user-shell http://www.intexxia.com/ | | 114 | libgtop<1.0.12nb1 remote-user-shell http://www.intexxia.com/ |
115 | wu-ftpd<=2.6.1 remote-root-shell http://msgs.securepoint.com/cgi-bin/get/bugtraq0111/199.html | | 115 | wu-ftpd<=2.6.1 remote-root-shell http://msgs.securepoint.com/cgi-bin/get/bugtraq0111/199.html |
116 | radius-3.6B remote-user-shell http://xforce.iss.net/alerts/advise87.php | | 116 | radius-3.6B remote-user-shell http://xforce.iss.net/alerts/advise87.php |
117 | exim<3.34 remote-user-shell http://www.exim.org/pipermail/exim-announce/2001q4/000048.html | | 117 | exim<3.34 remote-user-shell http://www.exim.org/pipermail/exim-announce/2001q4/000048.html |
118 | stunnel<3.22 remote-user-shell http://www.stunnel.org/patches/desc/formatbug_ml.html | | 118 | stunnel<3.22 remote-user-shell http://www.stunnel.org/patches/desc/formatbug_ml.html |
119 | mutt<1.2.5.1 remote-user-shell http://www.mutt.org/announce/mutt-1.2.5.1-1.3.25.html | | 119 | mutt<1.2.5.1 remote-user-shell http://www.mutt.org/announce/mutt-1.2.5.1-1.3.25.html |
120 | mutt-1.3.1* remote-user-shell http://www.mutt.org/announce/mutt-1.2.5.1-1.3.25.html | | 120 | mutt-1.3.1* remote-user-shell http://www.mutt.org/announce/mutt-1.2.5.1-1.3.25.html |
121 | mutt-1.3.2[0-4]* remote-user-shell http://www.mutt.org/announce/mutt-1.2.5.1-1.3.25.html | | 121 | mutt-1.3.2[0-4]* remote-user-shell http://www.mutt.org/announce/mutt-1.2.5.1-1.3.25.html |
122 | cyrus-sasl<1.5.27 remote-code-execution http://www.securityfocus.com/bid/3498 | | 122 | cyrus-sasl<1.5.27 remote-code-execution http://www.securityfocus.com/bid/3498 |
123 | openldap<2.0.20 denial-of-service http://www.openldap.org/lists/openldap-announce/200201/msg00002.html | | 123 | openldap<2.0.20 denial-of-service http://www.openldap.org/lists/openldap-announce/200201/msg00002.html |
124 | xchat<1.8.7 remote-command-injection http://xchat.org/ | | 124 | xchat<1.8.7 remote-command-injection http://xchat.org/ |
125 | enscript<1.6.1nb1 local-file-write http://www.securityfocus.com/bid/3920 | | 125 | enscript<1.6.1nb1 local-file-write http://www.securityfocus.com/bid/3920 |
126 | rsync<2.5.2 remote-code-execution http://lists.samba.org/pipermail/rsync-announce/2002-January/000005.html | | 126 | rsync<2.5.2 remote-code-execution http://lists.samba.org/pipermail/rsync-announce/2002-January/000005.html |
127 | squirrelmail-1.2.[0-3] remote-code-execution http://www.securityfocus.com/bid/3952 | | 127 | squirrelmail-1.2.[0-3] remote-code-execution http://www.securityfocus.com/bid/3952 |
128 | gnuchess<5.03 remote-user-shell http://linux.oreillynet.com/pub/a/linux/2002/01/28/insecurities.html | | 128 | gnuchess<5.03 remote-user-shell http://linux.oreillynet.com/pub/a/linux/2002/01/28/insecurities.html |
129 | ucd-snmp<4.2.3 weak-authentication http://www.cert.org/advisories/CA-2002-03.html | | 129 | ucd-snmp<4.2.3 weak-authentication http://www.cert.org/advisories/CA-2002-03.html |
130 | ucd-snmp<4.2.3 denial-of-service http://www.cert.org/advisories/CA-2002-03.html | | 130 | ucd-snmp<4.2.3 denial-of-service http://www.cert.org/advisories/CA-2002-03.html |
131 | ucd-snmp<4.2.3nb1 remote-user-shell http://www.securityfocus.com/archive/1/248141 | | 131 | ucd-snmp<4.2.3nb1 remote-user-shell http://www.securityfocus.com/archive/1/248141 |
132 | squid<2.4.4 remote-user-shell http://www.squid-cache.org/Advisories/SQUID-2002_1.txt | | 132 | squid<2.4.4 remote-user-shell http://www.squid-cache.org/Advisories/SQUID-2002_1.txt |
133 | ap-php<3.0.18nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 133 | ap-php<3.0.18nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
134 | php<3.0.18nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 134 | php<3.0.18nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
135 | ap-php-4.0.1pl2 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 135 | ap-php-4.0.1pl2 remote-code-execution http://security.e-matters.de/advisories/012002.html |
136 | ap-php-4.0.3pl1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 136 | ap-php-4.0.3pl1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
137 | ap-php-4.0.3pl1nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 137 | ap-php-4.0.3pl1nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
138 | ap-php-4.0.4 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 138 | ap-php-4.0.4 remote-code-execution http://security.e-matters.de/advisories/012002.html |
139 | ap-php-4.0.4.1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 139 | ap-php-4.0.4.1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
140 | ap-php-4.0.4.1nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 140 | ap-php-4.0.4.1nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
141 | ap-php-4.0.5 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 141 | ap-php-4.0.5 remote-code-execution http://security.e-matters.de/advisories/012002.html |
142 | ap-php-4.0.6 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 142 | ap-php-4.0.6 remote-code-execution http://security.e-matters.de/advisories/012002.html |
143 | ap-php-4.1.0 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 143 | ap-php-4.1.0 remote-code-execution http://security.e-matters.de/advisories/012002.html |
144 | ap-php-4.1.1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 144 | ap-php-4.1.1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
145 | php-4.0.3pl1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 145 | php-4.0.3pl1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
146 | php-4.0.4 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 146 | php-4.0.4 remote-code-execution http://security.e-matters.de/advisories/012002.html |
147 | php-4.0.4.1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 147 | php-4.0.4.1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
148 | php-4.0.4.1nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 148 | php-4.0.4.1nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
149 | php-4.0.5 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 149 | php-4.0.5 remote-code-execution http://security.e-matters.de/advisories/012002.html |
150 | php-4.0.6 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 150 | php-4.0.6 remote-code-execution http://security.e-matters.de/advisories/012002.html |
151 | php-4.1.0 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 151 | php-4.1.0 remote-code-execution http://security.e-matters.de/advisories/012002.html |
152 | php-4.1.1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 152 | php-4.1.1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
153 | php-4.3.0 remote-code-execution http://www.php.net/release_4_3_1.php | | 153 | php-4.3.0 remote-code-execution http://www.php.net/release_4_3_1.php |
154 | radiusd-cistron<1.6.6 denial-of-service http://www.kb.cert.org/vuls/id/936683 | | 154 | radiusd-cistron<1.6.6 denial-of-service http://www.kb.cert.org/vuls/id/936683 |
155 | radiusd-cistron<1.6.6 remote-code-execution http://www.kb.cert.org/vuls/id/589523 | | 155 | radiusd-cistron<1.6.6 remote-code-execution http://www.kb.cert.org/vuls/id/589523 |
156 | openssh<3.0.2.1nb2 local-root-shell http://www.pine.nl/advisories/pine-cert-20020301.txt | | 156 | openssh<3.0.2.1nb2 local-root-shell http://www.pine.nl/advisories/pine-cert-20020301.txt |
157 | htdig<3.1.6 denial-of-service http://online.securityfocus.com/bid/3410 | | 157 | htdig<3.1.6 denial-of-service http://online.securityfocus.com/bid/3410 |
158 | htdig<3.1.6 local-user-file-view http://online.securityfocus.com/bid/3410 | | 158 | htdig<3.1.6 local-user-file-view http://online.securityfocus.com/bid/3410 |
159 | fileutils<4.1.7 local-file-removal http://mail.gnu.org/pipermail/bug-fileutils/2002-March/002433.html | | 159 | fileutils<4.1.7 local-file-removal http://mail.gnu.org/pipermail/bug-fileutils/2002-March/002433.html |
160 | zlib<1.1.4 denial-of-service http://www.zlib.org/advisory-2002-03-11.txt | | 160 | zlib<1.1.4 denial-of-service http://www.zlib.org/advisory-2002-03-11.txt |
161 | rsync<2.5.3 remote-user-file-view http://lists.samba.org/pipermail/rsync-announce/2002-March/000006.html | | 161 | rsync<2.5.3 remote-user-file-view http://lists.samba.org/pipermail/rsync-announce/2002-March/000006.html |
162 | suse{,32}_base<6.4nb5 denial-of-service http://www.zlib.org/advisory-2002-03-11.txt | | 162 | suse{,32}_base<6.4nb5 denial-of-service http://www.zlib.org/advisory-2002-03-11.txt |
163 | icecast<1.3.11 remote-root-shell http://www.debian.org/security/2001/dsa-089 | | 163 | icecast<1.3.11 remote-root-shell http://www.debian.org/security/2001/dsa-089 |
164 | sun-{jre,jdk}<1.3.1.0.2 remote-code-execution http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/218&type=0&nav=sec.sba | | 164 | sun-{jre,jdk}<1.3.1.0.2 remote-code-execution http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/218&type=0&nav=sec.sba |
165 | analog<5.22 remote-script-inject http://www.analog.cx/docs/whatsnew.html | | 165 | analog<5.22 remote-script-inject http://www.analog.cx/docs/whatsnew.html |
166 | jakarta-tomcat<3.2.3nb1 cross-site-scripting http://httpd.apache.org/info/css-security/ | | 166 | jakarta-tomcat<3.2.3nb1 cross-site-scripting http://httpd.apache.org/info/css-security/ |
167 | sudo<1.6.6 local-root-shell http://www.sudo.ws/sudo/alerts/prompt.html | | 167 | sudo<1.6.6 local-root-shell http://www.sudo.ws/sudo/alerts/prompt.html |
168 | squirrelmail<1.2.6 remote-code-execution http://cert.uni-stuttgart.de/archive/bugtraq/2002/03/msg00414.html | | 168 | squirrelmail<1.2.6 remote-code-execution http://cert.uni-stuttgart.de/archive/bugtraq/2002/03/msg00414.html |
169 | analog<5.23 denial-of-service http://www.analog.cx/security5.html | | 169 | analog<5.23 denial-of-service http://www.analog.cx/security5.html |
170 | icecast<1.3.12 denial-of-service http://online.securityfocus.com/bid/4415 | | 170 | icecast<1.3.12 denial-of-service http://online.securityfocus.com/bid/4415 |
171 | qpopper<4.0.4 denial-of-service http://online.securityfocus.com/bid/4295 | | 171 | qpopper<4.0.4 denial-of-service http://online.securityfocus.com/bid/4295 |
172 | qpopper<4.0.4nb1 local-root-shell http://online.securityfocus.com/bid/4614 | | 172 | qpopper<4.0.4nb1 local-root-shell http://online.securityfocus.com/bid/4614 |
173 | imap-uw<2001.1 local-root-shell http://online.securityfocus.com/bid/4713 | | 173 | imap-uw<2001.1 local-root-shell http://online.securityfocus.com/bid/4713 |
174 | fetchmail<5.9.10 remote-user-access http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0146 | | 174 | fetchmail<5.9.10 remote-user-access http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0146 |
175 | gaim<0.58 local-user-file-view http://online.securityfocus.com/archive/1/272180 | | 175 | gaim<0.58 local-user-file-view http://online.securityfocus.com/archive/1/272180 |
176 | mozilla<1.0rc3 remote-user-file-view http://groups.google.com/groups?as_umsgid=3CD095D4.9050003%40mozilla.org&hl=en | | 176 | mozilla<1.0rc3 remote-user-file-view http://groups.google.com/groups?as_umsgid=3CD095D4.9050003%40mozilla.org&hl=en |
177 | ethereal<0.9.4 remote-user-access http://www.ethereal.com/appnotes/enpa-sa-00004.html | | 177 | ethereal<0.9.4 remote-user-access http://www.ethereal.com/appnotes/enpa-sa-00004.html |
178 | bind-9.[01].* denial-of-service http://www.cert.org/advisories/CA-2002-15.html | | 178 | bind-9.[01].* denial-of-service http://www.cert.org/advisories/CA-2002-15.html |
179 | bind-9.2.0* denial-of-service http://www.cert.org/advisories/CA-2002-15.html | | 179 | bind-9.2.0* denial-of-service http://www.cert.org/advisories/CA-2002-15.html |
180 | bind-9.2.1rc* denial-of-service http://www.cert.org/advisories/CA-2002-15.html | | 180 | bind-9.2.1rc* denial-of-service http://www.cert.org/advisories/CA-2002-15.html |
181 | bind-8.3.0 denial-of-service http://www.isc.org/products/BIND/bind8.html | | 181 | bind-8.3.0 denial-of-service http://www.isc.org/products/BIND/bind8.html |
182 | xchat<1.8.9 remote-user-shell http://www.linuxsecurity.com/advisories/redhat_advisory-2107.html | | 182 | xchat<1.8.9 remote-user-shell http://www.linuxsecurity.com/advisories/redhat_advisory-2107.html |
183 | apache<1.3.26 remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt | | 183 | apache<1.3.26 remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt |
184 | apache6<1.3.26 remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt | | 184 | apache6<1.3.26 remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt |
185 | apache-2.0.1? remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt | | 185 | apache-2.0.1? remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt |
186 | apache-2.0.2? remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt | | 186 | apache-2.0.2? remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt |
187 | apache-2.0.3[0-8]* remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt | | 187 | apache-2.0.3[0-8]* remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt |
188 | irssi<0.8.5 denial-of-service http://online.securityfocus.com/archive/1 | | 188 | irssi<0.8.5 denial-of-service http://online.securityfocus.com/archive/1 |
189 | #ap-ssl<2.8.10 remote-root-shell http://www.apache-ssl.org/advisory-20020620.txt | | 189 | #ap-ssl<2.8.10 remote-root-shell http://www.apache-ssl.org/advisory-20020620.txt |
190 | ap-ssl<2.8.10 remote-root-shell http://www.modssl.org/news/changelog.html | | 190 | ap-ssl<2.8.10 remote-root-shell http://www.modssl.org/news/changelog.html |
191 | apache<1.3.26nb1 remote-root-shell http://www.apache-ssl.org/advisory-20020620.txt | | 191 | apache<1.3.26nb1 remote-root-shell http://www.apache-ssl.org/advisory-20020620.txt |
192 | apache6<1.3.26nb1 remote-root-shell http://www.apache-ssl.org/advisory-20020620.txt | | 192 | apache6<1.3.26nb1 remote-root-shell http://www.apache-ssl.org/advisory-20020620.txt |
193 | bind<4.9.7nb1 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 193 | bind<4.9.7nb1 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
194 | #compat12<=1.2.1 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 194 | #compat12<=1.2.1 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
195 | #compat13<=1.3.3nb1 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 195 | #compat13<=1.3.3nb1 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
196 | compat14<1.4.3.2 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 196 | compat14<1.4.3.2 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
197 | openssh<3.4 remote-root-shell https://nvd.nist.gov/vuln/detail/CVE-2002-0639 | | 197 | openssh<3.4 remote-root-shell https://nvd.nist.gov/vuln/detail/CVE-2002-0639 |
198 | #bind<=9.2.1 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 198 | #bind<=9.2.1 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
199 | bind<8.3.3 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 199 | bind<8.3.3 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
200 | socks5<1.0.2nb2 remote-root-shell http://online.securityfocus.com/archive/1/9842 | | 200 | socks5<1.0.2nb2 remote-root-shell http://online.securityfocus.com/archive/1/9842 |
201 | socks5-1.0.[3-9]* remote-root-shell http://online.securityfocus.com/archive/2/9842 | | 201 | socks5-1.0.[3-9]* remote-root-shell http://online.securityfocus.com/archive/2/9842 |
202 | socks5-1.0.1[0-1]* remote-root-shell http://online.securityfocus.com/archive/2/9842 | | 202 | socks5-1.0.1[0-1]* remote-root-shell http://online.securityfocus.com/archive/2/9842 |
203 | ipa<1.2.7 local-access http://www.NetBSD.org/cgi-bin/query-pr-single.pl?number=17434 | | 203 | ipa<1.2.7 local-access http://www.NetBSD.org/cgi-bin/query-pr-single.pl?number=17434 |
204 | ethereal<0.9.5 remote-root-shell http://www.ethereal.com/appnotes/enpa-sa-00005.html | | 204 | ethereal<0.9.5 remote-root-shell http://www.ethereal.com/appnotes/enpa-sa-00005.html |
205 | squid<2.4.7 remote-user-shell http://www.squid-cache.org/Advisories/SQUID-2002_3.txt | | 205 | squid<2.4.7 remote-user-shell http://www.squid-cache.org/Advisories/SQUID-2002_3.txt |
206 | nn<6.6.4 remote-user-shell http://online.securityfocus.com/bid/5160 | | 206 | nn<6.6.4 remote-user-shell http://online.securityfocus.com/bid/5160 |
207 | inn<2.3.0 remote-user-shell http://online.securityfocus.com/bid/2620 | | 207 | inn<2.3.0 remote-user-shell http://online.securityfocus.com/bid/2620 |
208 | cvsup-gui<=16.1.d remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 208 | cvsup-gui<=16.1.d remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
209 | cvsup<=16.1.d remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 209 | cvsup<=16.1.d remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
210 | xpilot<4.5.1 remote-user-shell http://online.securityfocus.com/bid/4534 | | 210 | xpilot<4.5.1 remote-user-shell http://online.securityfocus.com/bid/4534 |
211 | gnut<0.4.28 remote-user-shell http://online.securityfocus.com/bid/3267/ | | 211 | gnut<0.4.28 remote-user-shell http://online.securityfocus.com/bid/3267/ |
212 | wwwoffle<2.7c denial-of-service http://bespin.org/~qitest1/adv/wwwoffle-2.7b.asc | | 212 | wwwoffle<2.7c denial-of-service http://bespin.org/~qitest1/adv/wwwoffle-2.7b.asc |
213 | png<1.2.4 remote-user-shell ftp://swrinde.nde.swri.edu/pub/png-group/archives/png-list.200207 | | 213 | png<1.2.4 remote-user-shell ftp://swrinde.nde.swri.edu/pub/png-group/archives/png-list.200207 |
214 | php-4.2.[01] remote-user-shell http://security.e-matters.de/advisories/022002.html | | 214 | php-4.2.[01] remote-user-shell http://security.e-matters.de/advisories/022002.html |
215 | ap-php-4.2.[01] remote-user-shell http://security.e-matters.de/advisories/022002.html | | 215 | ap-php-4.2.[01] remote-user-shell http://security.e-matters.de/advisories/022002.html |
216 | srp_client<1.7.5 unknown http://www-cs-students.stanford.edu/~tjw/srp/download.html | | 216 | srp_client<1.7.5 unknown http://www-cs-students.stanford.edu/~tjw/srp/download.html |
217 | hylafax<4.1.3 remote-root-shell http://www.securityfocus.com/bid/3357 | | 217 | hylafax<4.1.3 remote-root-shell http://www.securityfocus.com/bid/3357 |
218 | openssl<0.9.6e remote-root-shell http://www.openssl.org/news/secadv_20020730.txt | | 218 | openssl<0.9.6e remote-root-shell http://www.openssl.org/news/secadv_20020730.txt |
219 | libmm<1.2.1 local-root-shell http://online.securityfocus.com/bid/5352 | | 219 | libmm<1.2.1 local-root-shell http://online.securityfocus.com/bid/5352 |
220 | openssl<0.9.6f denial-of-service http://www.openssl.org/news/secadv_20020730.txt | | 220 | openssl<0.9.6f denial-of-service http://www.openssl.org/news/secadv_20020730.txt |
221 | png<=1.0.12 remote-user-shell http://online.securityfocus.com/bid/5409 | | 221 | png<=1.0.12 remote-user-shell http://online.securityfocus.com/bid/5409 |
222 | kdelibs-2.1.* weak-ssl-authentication http://online.securityfocus.com/archive/1/286290/2002-08-08/2002-08-14/2 | | 222 | kdelibs-2.1.* weak-ssl-authentication http://online.securityfocus.com/archive/1/286290/2002-08-08/2002-08-14/2 |
223 | kdelibs-2.2.1* weak-ssl-authentication http://online.securityfocus.com/archive/1/286290/2002-08-08/2002-08-14/2 | | 223 | kdelibs-2.2.1* weak-ssl-authentication http://online.securityfocus.com/archive/1/286290/2002-08-08/2002-08-14/2 |
224 | kdelibs-2.2.2{,nb1} weak-ssl-authentication http://online.securityfocus.com/archive/1/286290/2002-08-08/2002-08-14/2 | | 224 | kdelibs-2.2.2{,nb1} weak-ssl-authentication http://online.securityfocus.com/archive/1/286290/2002-08-08/2002-08-14/2 |
225 | kdelibs-3.0.[12] weak-ssl-authentication http://online.securityfocus.com/archive/1/286290/2002-08-08/2002-08-14/2 | | 225 | kdelibs-3.0.[12] weak-ssl-authentication http://online.securityfocus.com/archive/1/286290/2002-08-08/2002-08-14/2 |
226 | arla<0.35.9 denial-of-service http://www.stacken.kth.se/lists/arla-drinkers/2002-08/msg00019.html | | 226 | arla<0.35.9 denial-of-service http://www.stacken.kth.se/lists/arla-drinkers/2002-08/msg00019.html |
227 | arla<0.35.9 remote-root-shell http://www.stacken.kth.se/lists/arla-drinkers/2002-08/msg00019.html | | 227 | arla<0.35.9 remote-root-shell http://www.stacken.kth.se/lists/arla-drinkers/2002-08/msg00019.html |
228 | ethereal<0.9.6 remote-root-shell http://www.ethereal.com/appnotes/enpa-sa-00006.html | | 228 | ethereal<0.9.6 remote-root-shell http://www.ethereal.com/appnotes/enpa-sa-00006.html |
229 | bind<4.9.10 remote-root-shell http://www.kb.cert.org/vuls/id/738331 | | 229 | bind<4.9.10 remote-root-shell http://www.kb.cert.org/vuls/id/738331 |
230 | compat14<1.4.3.2 remote-root-shell http://www.kb.cert.org/vuls/id/738331 | | 230 | compat14<1.4.3.2 remote-root-shell http://www.kb.cert.org/vuls/id/738331 |
231 | compat14-crypto<1.4.3.2 remote-root-shell http://www.kb.cert.org/vuls/id/738331 | | 231 | compat14-crypto<1.4.3.2 remote-root-shell http://www.kb.cert.org/vuls/id/738331 |
232 | netbsd32_compat14<1.4.3.2 remote-root-shell http://www.kb.cert.org/vuls/id/738331 | | 232 | netbsd32_compat14<1.4.3.2 remote-root-shell http://www.kb.cert.org/vuls/id/738331 |
233 | compat15<1.5.3.1 remote-root-shell http://www.kb.cert.org/vuls/id/738331 | | 233 | compat15<1.5.3.1 remote-root-shell http://www.kb.cert.org/vuls/id/738331 |
234 | netbsd32_compat15<1.5.3.1 remote-root-shell http://www.kb.cert.org/vuls/id/738331 | | 234 | netbsd32_compat15<1.5.3.1 remote-root-shell http://www.kb.cert.org/vuls/id/738331 |
235 | postgresql-server<7.2.2 remote-code-execution http://online.securityfocus.com/archive/1/288998 | | 235 | postgresql-server<7.2.2 remote-code-execution http://online.securityfocus.com/archive/1/288998 |
236 | gaim<0.59.1 remote-code-execution http://sourceforge.net/tracker/index.php?func=detail&aid=584252&group_id=235&atid=100235 | | 236 | gaim<0.59.1 remote-code-execution http://sourceforge.net/tracker/index.php?func=detail&aid=584252&group_id=235&atid=100235 |
237 | gaim-gnome<0.59.1 remote-code-execution http://sourceforge.net/tracker/index.php?func=detail&aid=584252&group_id=235&atid=100235 | | 237 | gaim-gnome<0.59.1 remote-code-execution http://sourceforge.net/tracker/index.php?func=detail&aid=584252&group_id=235&atid=100235 |
238 | mozilla<1.1 remote-file-read http://archives.neohapsis.com/archives/bugtraq/2002-07/0259.html | | 238 | mozilla<1.1 remote-file-read http://archives.neohapsis.com/archives/bugtraq/2002-07/0259.html |
239 | mozilla<1.1 remote-file-read http://www.geocities.co.jp/SiliconValley/1667/advisory03e.html | | 239 | mozilla<1.1 remote-file-read http://www.geocities.co.jp/SiliconValley/1667/advisory03e.html |
240 | freebsd_lib<=2.2.7 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 240 | freebsd_lib<=2.2.7 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
241 | opera<6.03 remote-user-shell http://www.opera.com/linux/changelog/log603.html | | 241 | opera<6.03 remote-user-shell http://www.opera.com/linux/changelog/log603.html |
242 | wmnet<1.06nb3 local-root-shell http://www.securiteam.com/unixfocus/5HP0F1P8AM.html | | 242 | wmnet<1.06nb3 local-root-shell http://www.securiteam.com/unixfocus/5HP0F1P8AM.html |
243 | apache-2.0.3[0-9]* denial-of-service http://www.apacheweek.com/issues/02-09-27#apache2042 | | 243 | apache-2.0.3[0-9]* denial-of-service http://www.apacheweek.com/issues/02-09-27#apache2042 |
244 | apache-2.0.4[0-1]* denial-of-service http://www.apacheweek.com/issues/02-09-27#apache2042 | | 244 | apache-2.0.4[0-1]* denial-of-service http://www.apacheweek.com/issues/02-09-27#apache2042 |
245 | fetchmail<6.1.0 remote-code-execution http://security.e-matters.de/advisories/032002.html | | 245 | fetchmail<6.1.0 remote-code-execution http://security.e-matters.de/advisories/032002.html |
246 | unzip<=5.42 local-file-write http://online.securityfocus.com/archive/1/196445 | | 246 | unzip<=5.42 local-file-write http://online.securityfocus.com/archive/1/196445 |
247 | apache-2.0.3[0-9]* remote-root-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 | | 247 | apache-2.0.3[0-9]* remote-root-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 |
248 | apache-2.0.4[0-2]* remote-file-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 | | 248 | apache-2.0.4[0-2]* remote-file-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 |
249 | net-snmp<5.0.5 denial-of-service http://sourceforge.net/forum/forum.php?forum_id=215540 | | 249 | net-snmp<5.0.5 denial-of-service http://sourceforge.net/forum/forum.php?forum_id=215540 |
250 | sendmail<8.12.6nb1 local-user-shell http://www.sendmail.org/smrsh.adv.txt | | 250 | sendmail<8.12.6nb1 local-user-shell http://www.sendmail.org/smrsh.adv.txt |
251 | apache<1.3.27 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843 | | 251 | apache<1.3.27 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843 |
252 | apache<1.3.27 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839 | | 252 | apache<1.3.27 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839 |
253 | apache<1.3.27 local-file-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 | | 253 | apache<1.3.27 local-file-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 |
254 | apache6<1.3.27 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843 | | 254 | apache6<1.3.27 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843 |
255 | apache6<1.3.27 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839 | | 255 | apache6<1.3.27 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839 |
256 | apache6<1.3.27 local-file-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 | | 256 | apache6<1.3.27 local-file-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 |
257 | gv<3.5.8nb2 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1569 | | 257 | gv<3.5.8nb2 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1569 |
258 | logsurfer<1.5.2 local-user-shell http://www.cert.dfn.de/eng/team/wl/logsurf/ | | 258 | logsurfer<1.5.2 local-user-shell http://www.cert.dfn.de/eng/team/wl/logsurf/ |
259 | suse{,32}_base<7.3nb1 remote-code-execution http://www.suse.com/de/security/2002_031_glibc.html | | 259 | suse{,32}_base<7.3nb1 remote-code-execution http://www.suse.com/de/security/2002_031_glibc.html |
260 | suse{,32}_devel<7.3nb1 remote-code-execution http://www.suse.com/de/security/2002_031_glibc.html | | 260 | suse{,32}_devel<7.3nb1 remote-code-execution http://www.suse.com/de/security/2002_031_glibc.html |
261 | kdegraphics<2.2.2nb2 remote-code-execution http://www.kde.org/info/security/advisory-20021008-1.txt | | 261 | kdegraphics<2.2.2nb2 remote-code-execution http://www.kde.org/info/security/advisory-20021008-1.txt |
262 | kdegraphics-3.0.[123]* remote-code-execution http://www.kde.org/info/security/advisory-20021008-1.txt | | 262 | kdegraphics-3.0.[123]* remote-code-execution http://www.kde.org/info/security/advisory-20021008-1.txt |
263 | kdenetwork-3.0.[123]* remote-file-read http://www.kde.org/info/security/advisory-20021008-2.txt | | 263 | kdenetwork-3.0.[123]* remote-file-read http://www.kde.org/info/security/advisory-20021008-2.txt |
264 | gtar-base<1.13.25 local-file-write http://online.securityfocus.com/archive/1/196445 | | 264 | gtar-base<1.13.25 local-file-write http://online.securityfocus.com/archive/1/196445 |
265 | kth-krb4<1.2.1 remote-code-execution http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2002-002-kadm4.txt | | 265 | kth-krb4<1.2.1 remote-code-execution http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2002-002-kadm4.txt |
266 | inn<2.3.3 local-user-shell http://online.securityfocus.com/bid/6049 | | 266 | inn<2.3.3 local-user-shell http://online.securityfocus.com/bid/6049 |
267 | inn<2.3.3 local-user-shell http://online.securityfocus.com/bid/4501 | | 267 | inn<2.3.3 local-user-shell http://online.securityfocus.com/bid/4501 |
268 | fetchmail<6.1.0 remote-user-shell http://online.securityfocus.com/bid/5825 | | 268 | fetchmail<6.1.0 remote-user-shell http://online.securityfocus.com/bid/5825 |
269 | fetchmail<6.1.0 denial-of-service http://online.securityfocus.com/bid/5826 | | 269 | fetchmail<6.1.0 denial-of-service http://online.securityfocus.com/bid/5826 |
270 | fetchmail<6.1.0 remote-user-shell http://online.securityfocus.com/bid/5827 | | 270 | fetchmail<6.1.0 remote-user-shell http://online.securityfocus.com/bid/5827 |
271 | squirrelmail<1.2.8 remote-script-inject http://online.securityfocus.com/bid/5763 | | 271 | squirrelmail<1.2.8 remote-script-inject http://online.securityfocus.com/bid/5763 |
272 | bind<4.9.10nb1 remote-root-shell http://www.isc.org/products/BIND/bind-security.html | | 272 | bind<4.9.10nb1 remote-root-shell http://www.isc.org/products/BIND/bind-security.html |
273 | bind<8.3.3nb1 remote-root-shell http://www.isc.org/products/BIND/bind-security.html | | 273 | bind<8.3.3nb1 remote-root-shell http://www.isc.org/products/BIND/bind-security.html |
274 | samba-2.2.[2-6]* remote-root-shell http://www.samba.org/samba/whatsnew/samba-2.2.7.html | | 274 | samba-2.2.[2-6]* remote-root-shell http://www.samba.org/samba/whatsnew/samba-2.2.7.html |
275 | windowmaker<0.80.2 remote-user-shell http://www.windowmaker.org/ | | 275 | windowmaker<0.80.2 remote-user-shell http://www.windowmaker.org/ |
276 | ssh<3.2.2 local-root-shell http://www.kb.cert.org/vuls/id/740619 | | 276 | ssh<3.2.2 local-root-shell http://www.kb.cert.org/vuls/id/740619 |
277 | w3m<0.3.2.1 remote-file-write http://mi.med.tohoku.ac.jp/%7Esatodai/w3m-dev/200211.month/3492.html | | 277 | w3m<0.3.2.1 remote-file-write http://mi.med.tohoku.ac.jp/%7Esatodai/w3m-dev/200211.month/3492.html |
278 | w3m-img<0.3.2.1 remote-file-write http://mi.med.tohoku.ac.jp/%7Esatodai/w3m-dev/200211.month/3492.html | | 278 | w3m-img<0.3.2.1 remote-file-write http://mi.med.tohoku.ac.jp/%7Esatodai/w3m-dev/200211.month/3492.html |
279 | Canna-server-bin<3.5.2nb3 remote-root-shell http://canna.sourceforge.jp/sec/Canna-2002-01.txt | | 279 | Canna-server-bin<3.5.2nb3 remote-root-shell http://canna.sourceforge.jp/sec/Canna-2002-01.txt |
280 | windowmaker<0.80.2 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1277 | | 280 | windowmaker<0.80.2 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1277 |
281 | kdelibs-2.1.* remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt | | 281 | kdelibs-2.1.* remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt |
282 | kdelibs-2.2.1* remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt | | 282 | kdelibs-2.2.1* remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt |
283 | kdelibs-2.2.2{,nb[123]} remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt | | 283 | kdelibs-2.2.2{,nb[123]} remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt |
284 | kdelibs-3.0.[123]* remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt | | 284 | kdelibs-3.0.[123]* remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt |
285 | kdelibs-3.0.4 remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt | | 285 | kdelibs-3.0.4 remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt |
286 | kdenetwork-2.[12]* remote-root-shell http://www.kde.org/info/security/advisory-20021111-2.txt | | 286 | kdenetwork-2.[12]* remote-root-shell http://www.kde.org/info/security/advisory-20021111-2.txt |
287 | kdenetwork-3.0.[123]* remote-root-shell http://www.kde.org/info/security/advisory-20021111-2.txt | | 287 | kdenetwork-3.0.[123]* remote-root-shell http://www.kde.org/info/security/advisory-20021111-2.txt |
288 | kdenetwork-3.0.4{,nb1} remote-root-shell http://www.kde.org/info/security/advisory-20021111-2.txt | | 288 | kdenetwork-3.0.4{,nb1} remote-root-shell http://www.kde.org/info/security/advisory-20021111-2.txt |
289 | cyrus-imapd<2.0.17 remote-code-execution http://www.securityfocus.com/bid/6298 | | 289 | cyrus-imapd<2.0.17 remote-code-execution http://www.securityfocus.com/bid/6298 |
290 | cyrus-imapd-2.1.9{,nb1} remote-code-execution http://www.securityfocus.com/bid/6298 | | 290 | cyrus-imapd-2.1.9{,nb1} remote-code-execution http://www.securityfocus.com/bid/6298 |
291 | imap-uw<2002.1rc1 remote-code-execution http://www.kb.cert.org/vuls/id/961489 | | 291 | imap-uw<2002.1rc1 remote-code-execution http://www.kb.cert.org/vuls/id/961489 |
292 | cyrus-sasl-2.1.9{,nb[12]} remote-code-execution http://online.securityfocus.com/archive/1/302603 | | 292 | cyrus-sasl-2.1.9{,nb[12]} remote-code-execution http://online.securityfocus.com/archive/1/302603 |
293 | fetchmail<6.2.0 remote-code-execution http://security.e-matters.de/advisories/052002.html | | 293 | fetchmail<6.2.0 remote-code-execution http://security.e-matters.de/advisories/052002.html |
294 | mysql-client<3.23.49nb2 remote-code-execution http://security.e-matters.de/advisories/042002.html | | 294 | mysql-client<3.23.49nb2 remote-code-execution http://security.e-matters.de/advisories/042002.html |
295 | mysql-server<3.23.49nb1 remote-code-execution http://security.e-matters.de/advisories/042002.html | | 295 | mysql-server<3.23.49nb1 remote-code-execution http://security.e-matters.de/advisories/042002.html |
296 | pine<4.50 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1320 | | 296 | pine<4.50 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1320 |
297 | w3m{,-img}<0.3.2.2 remote-file-read http://sourceforge.net/project/shownotes.php?group_id=39518&release_id=126233 | | 297 | w3m{,-img}<0.3.2.2 remote-file-read http://sourceforge.net/project/shownotes.php?group_id=39518&release_id=126233 |
298 | ethereal<0.9.8 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00007.html | | 298 | ethereal<0.9.8 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00007.html |
299 | wget<1.8.2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1344 | | 299 | wget<1.8.2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1344 |
300 | wget<1.8.2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1345 | | 300 | wget<1.8.2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1345 |
301 | ssh<=3.2.2 denial-of-service http://www.rapid7.com/advisories/R7-0009.txt | | 301 | ssh<=3.2.2 denial-of-service http://www.rapid7.com/advisories/R7-0009.txt |
302 | cups<1.1.18 remote-root-shell http://www.idefense.com/advisory/12.19.02.txt | | 302 | cups<1.1.18 remote-root-shell http://www.idefense.com/advisory/12.19.02.txt |
303 | png<1.2.5nb2 unknown ftp://swrinde.nde.swri.edu/pub/png-group/archives/png-implement.200212 | | 303 | png<1.2.5nb2 unknown ftp://swrinde.nde.swri.edu/pub/png-group/archives/png-implement.200212 |
304 | leafnode<1.9.30 denial-of-service http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0123.html | | 304 | leafnode<1.9.30 denial-of-service http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0123.html |
305 | cups<1.1.18 local-code-execution http://online.securityfocus.com/bid/6475 | | 305 | cups<1.1.18 local-code-execution http://online.securityfocus.com/bid/6475 |
306 | xpdf<=2.01 local-code-execution http://online.securityfocus.com/bid/6475 | | 306 | xpdf<=2.01 local-code-execution http://online.securityfocus.com/bid/6475 |
307 | mhonarc<2.5.14 cross-site-scripting http://www.mhonarc.org/archive/cgi-bin/mesg.cgi?a=mhonarc-users&i=200212220120.gBM1K8502180@mcguire.earlhood.com | | 307 | mhonarc<2.5.14 cross-site-scripting http://www.mhonarc.org/archive/cgi-bin/mesg.cgi?a=mhonarc-users&i=200212220120.gBM1K8502180@mcguire.earlhood.com |
308 | libmcrypt<2.5.5 remote-user-shell http://online.securityfocus.com/archive/1/305162/2003-01-01/2003-01-07/0 | | 308 | libmcrypt<2.5.5 remote-user-shell http://online.securityfocus.com/archive/1/305162/2003-01-01/2003-01-07/0 |
309 | kdebase<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 309 | kdebase<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
310 | kdegames<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 310 | kdegames<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
311 | kdegraphics<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 311 | kdegraphics<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
312 | kdelibs<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 312 | kdelibs<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
313 | kdemultimedia<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 313 | kdemultimedia<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
314 | kdenetwork<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 314 | kdenetwork<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
315 | kdepim<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 315 | kdepim<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
316 | kdesdk<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 316 | kdesdk<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
317 | kdeutils<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 317 | kdeutils<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
318 | cvs<1.11.4nb1 remote-file-write https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=51 | | 318 | cvs<1.11.4nb1 remote-file-write https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=51 |
319 | gabber<0.8.7nb4 privacy-leak http://online.securityfocus.com/archive/1/307430 | | 319 | gabber<0.8.7nb4 privacy-leak http://online.securityfocus.com/archive/1/307430 |
320 | spamassassin<2.43nb2 remote-code-execution http://cert.uni-stuttgart.de/archive/bugtraq/2003/01/msg00254.html | | 320 | spamassassin<2.43nb2 remote-code-execution http://cert.uni-stuttgart.de/archive/bugtraq/2003/01/msg00254.html |
321 | p5-Mail-SpamAssassin<2.43nb2 remote-code-execution http://cert.uni-stuttgart.de/archive/bugtraq/2003/01/msg00254.html | | 321 | p5-Mail-SpamAssassin<2.43nb2 remote-code-execution http://cert.uni-stuttgart.de/archive/bugtraq/2003/01/msg00254.html |
322 | squirrelmail<1.2.11 cross-site-scripting http://www.squirrelmail.org/ | | 322 | squirrelmail<1.2.11 cross-site-scripting http://www.squirrelmail.org/ |
323 | openssl<0.9.6gnb1 weak-encryption http://www.openssl.org/news/secadv_20030219.txt | | 323 | openssl<0.9.6gnb1 weak-encryption http://www.openssl.org/news/secadv_20030219.txt |
324 | php-4.1.[3-9]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 | | 324 | php-4.1.[3-9]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 |
325 | php-4.2.[0-2]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 | | 325 | php-4.2.[0-2]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 |
326 | php-4.2.3{,nb1} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 | | 326 | php-4.2.3{,nb1} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 |
327 | sendmail<8.11.6nb3 remote-code-execution http://www.cert.org/advisories/CA-2003-07.html | | 327 | sendmail<8.11.6nb3 remote-code-execution http://www.cert.org/advisories/CA-2003-07.html |
328 | sendmail-8.12.[0-7] remote-code-execution http://www.cert.org/advisories/CA-2003-07.html | | 328 | sendmail-8.12.[0-7] remote-code-execution http://www.cert.org/advisories/CA-2003-07.html |
329 | sendmail-8.12.[0-7]nb* remote-code-execution http://www.cert.org/advisories/CA-2003-07.html | | 329 | sendmail-8.12.[0-7]nb* remote-code-execution http://www.cert.org/advisories/CA-2003-07.html |
330 | snort<1.9.1 remote-code-execution http://www.kb.cert.org/vuls/id/916785 | | 330 | snort<1.9.1 remote-code-execution http://www.kb.cert.org/vuls/id/916785 |
331 | snort-pgsql<1.9.1 remote-code-execution http://www.kb.cert.org/vuls/id/916785 | | 331 | snort-pgsql<1.9.1 remote-code-execution http://www.kb.cert.org/vuls/id/916785 |
332 | snort-mysql<1.9.1 remote-code-execution http://www.kb.cert.org/vuls/id/916785 | | 332 | snort-mysql<1.9.1 remote-code-execution http://www.kb.cert.org/vuls/id/916785 |
333 | hypermail<2.1.7 remote-code-execution http://www.hypermail.org/mail-archive/2003/Feb/0025.html | | 333 | hypermail<2.1.7 remote-code-execution http://www.hypermail.org/mail-archive/2003/Feb/0025.html |
334 | zlib<1.1.4nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0107 | | 334 | zlib<1.1.4nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0107 |
335 | ethereal-0.8.[7-9] remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00008.html | | 335 | ethereal-0.8.[7-9] remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00008.html |
336 | ethereal-0.9.[0-9] remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00008.html | | 336 | ethereal-0.9.[0-9] remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00008.html |
337 | qpopper<4.0.5 remote-user-shell http://archives.neohapsis.com/archives/bugtraq/2003-03/0152.html | | 337 | qpopper<4.0.5 remote-user-shell http://archives.neohapsis.com/archives/bugtraq/2003-03/0152.html |
338 | ircII<20030313 remote-code-execution http://eterna.com.au/ircii/ | | 338 | ircII<20030313 remote-code-execution http://eterna.com.au/ircii/ |
339 | samba<2.2.8 remote-code-execution http://us1.samba.org/samba/whatsnew/samba-2.2.8.html | | 339 | samba<2.2.8 remote-code-execution http://us1.samba.org/samba/whatsnew/samba-2.2.8.html |
340 | openssl<0.9.6gnb2 remote-key-theft http://www.openssl.org/news/secadv_20030317.txt | | 340 | openssl<0.9.6gnb2 remote-key-theft http://www.openssl.org/news/secadv_20030317.txt |
341 | openssl<0.9.6gnb2 remote-use-of-secret http://www.openssl.org/news/secadv_20030319.txt | | 341 | openssl<0.9.6gnb2 remote-use-of-secret http://www.openssl.org/news/secadv_20030319.txt |
342 | mutt<1.4.1 remote-code-execution http://www.securityfocus.com/archive/1/315771/2003-03-19/2003-03-25/0 | | 342 | mutt<1.4.1 remote-code-execution http://www.securityfocus.com/archive/1/315771/2003-03-19/2003-03-25/0 |
343 | rxvt<2.7.10 remote-code-execution http://marc.theaimsgroup.com/?l=bugtraq&m=104612710031920&w=2 | | 343 | rxvt<2.7.10 remote-code-execution http://marc.theaimsgroup.com/?l=bugtraq&m=104612710031920&w=2 |
344 | eterm<0.9.2 remote-code-execution http://marc.theaimsgroup.com/?l=bugtraq&m=104612710031920&w=2 | | 344 | eterm<0.9.2 remote-code-execution http://marc.theaimsgroup.com/?l=bugtraq&m=104612710031920&w=2 |
345 | apcupsd<3.8.6 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1396 | | 345 | apcupsd<3.8.6 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1396 |
346 | apcupsd-3.10.[0-4] remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1396 | | 346 | apcupsd-3.10.[0-4] remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1396 |
347 | ap-php-4.1.[3-9]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 | | 347 | ap-php-4.1.[3-9]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 |
348 | ap-php-4.2.[0-2]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 | | 348 | ap-php-4.2.[0-2]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 |
349 | ap-php-4.2.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 | | 349 | ap-php-4.2.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 |
350 | ja-samba<2.2.7.1.1.1 remote-code-execution http://www.samba.gr.jp/news-release/2003/20030317-2.html | | 350 | ja-samba<2.2.7.1.1.1 remote-code-execution http://www.samba.gr.jp/news-release/2003/20030317-2.html |
351 | bitchx<1.0.3.19nb1 remote-code-execution http://www.securityfocus.com/archive/1/315057 | | 351 | bitchx<1.0.3.19nb1 remote-code-execution http://www.securityfocus.com/archive/1/315057 |
352 | apache-2.0.[0-3][0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0132 | | 352 | apache-2.0.[0-3][0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0132 |
353 | apache-2.0.4[0-4] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0132 | | 353 | apache-2.0.4[0-4] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0132 |
354 | apcupsd<3.8.6 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0099 | | 354 | apcupsd<3.8.6 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0099 |
355 | apcupsd-3.10.[0-4] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0099 | | 355 | apcupsd-3.10.[0-4] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0099 |
356 | setiathome<3.08 remote-code-execution http://spoor12.edup.tudelft.nl/SkyLined%20v4.2/?Advisories/Seti@home | | 356 | setiathome<3.08 remote-code-execution http://spoor12.edup.tudelft.nl/SkyLined%20v4.2/?Advisories/Seti@home |
357 | samba<=2.2.8 remote-root-access http://lists.samba.org/pipermail/samba-announce/2003-April/000065.html | | 357 | samba<=2.2.8 remote-root-access http://lists.samba.org/pipermail/samba-announce/2003-April/000065.html |
358 | mgetty+sendfax<1.1.29 file-permissions http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1392 | | 358 | mgetty+sendfax<1.1.29 file-permissions http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1392 |
359 | mgetty+sendfax<1.1.29 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1391 | | 359 | mgetty+sendfax<1.1.29 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1391 |
360 | ja-samba<2.2.7.2.1.0 remote-code-execution http://www.samba.gr.jp/news-release/2003/20030409-2.html | | 360 | ja-samba<2.2.7.2.1.0 remote-code-execution http://www.samba.gr.jp/news-release/2003/20030409-2.html |
361 | kde<3.1.1nb1 remote-code-execution http://www.kde.org/info/security/advisory-20030409-1.txt | | 361 | kde<3.1.1nb1 remote-code-execution http://www.kde.org/info/security/advisory-20030409-1.txt |
362 | kdelibs<3.1.1nb1 remote-code-execution http://www.kde.org/info/security/advisory-20030409-1.txt | | 362 | kdelibs<3.1.1nb1 remote-code-execution http://www.kde.org/info/security/advisory-20030409-1.txt |
363 | kdebase<3.1.1nb1 remote-code-execution http://www.kde.org/info/security/advisory-20030409-1.txt | | 363 | kdebase<3.1.1nb1 remote-code-execution http://www.kde.org/info/security/advisory-20030409-1.txt |
364 | kdegraphics<3.1.1nb2 remote-code-execution http://www.kde.org/info/security/advisory-20030409-1.txt | | 364 | kdegraphics<3.1.1nb2 remote-code-execution http://www.kde.org/info/security/advisory-20030409-1.txt |
365 | snort<2.0.0 remote-code-execution http://www.securityfocus.com/archive/1/318669 | | 365 | snort<2.0.0 remote-code-execution http://www.securityfocus.com/archive/1/318669 |
366 | snort-pgsql<2.0.0 remote-code-execution http://www.securityfocus.com/archive/1/318669 | | 366 | snort-pgsql<2.0.0 remote-code-execution http://www.securityfocus.com/archive/1/318669 |
367 | snort-mysql<2.0.0 remote-code-execution http://www.securityfocus.com/archive/1/318669 | | 367 | snort-mysql<2.0.0 remote-code-execution http://www.securityfocus.com/archive/1/318669 |
368 | poppassd<4.0.5nb1 local-root-shell http://www.securityfocus.com/archive/1/319811/2003-04-26/2003-05-02/0 | | 368 | poppassd<4.0.5nb1 local-root-shell http://www.securityfocus.com/archive/1/319811/2003-04-26/2003-05-02/0 |
369 | ethereal<0.9.12 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00009.html | | 369 | ethereal<0.9.12 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00009.html |
370 | gnupg<1.2.2 weak-authentication http://www.securityfocus.com/archive/1/320444 | | 370 | gnupg<1.2.2 weak-authentication http://www.securityfocus.com/archive/1/320444 |
371 | lv<4.49.5 local-code-execution http://bugs.debian.org/cgi-bin/bugreport.cgi?archive=no&bug=190941 | | 371 | lv<4.49.5 local-code-execution http://bugs.debian.org/cgi-bin/bugreport.cgi?archive=no&bug=190941 |
372 | bitchx<1.0.3.19nb2 denial-of-service http://www.securityfocus.com/archive/1/321093 | | 372 | bitchx<1.0.3.19nb2 denial-of-service http://www.securityfocus.com/archive/1/321093 |
373 | suse{,32}_libpng<7.3nb1 remote-user-shell http://www.suse.com/de/security/2003_004_libpng.html | | 373 | suse{,32}_libpng<7.3nb1 remote-user-shell http://www.suse.com/de/security/2003_004_libpng.html |
374 | apache-2.0.3[7-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0245 | | 374 | apache-2.0.3[7-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0245 |
375 | apache-2.0.4[0-5] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0245 | | 375 | apache-2.0.4[0-5] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0245 |
376 | suse{,32}_base<7.3nb4 remote-code-execution http://www.suse.com/de/security/2003_027_glibc.html | | 376 | suse{,32}_base<7.3nb4 remote-code-execution http://www.suse.com/de/security/2003_027_glibc.html |
377 | suse{,32}_devel<7.3nb2 remote-code-execution http://www.suse.com/de/security/2003_027_glibc.html | | 377 | suse{,32}_devel<7.3nb2 remote-code-execution http://www.suse.com/de/security/2003_027_glibc.html |
378 | cups<1.1.19 denial-of-service http://www.cups.org/str.php?L75 | | 378 | cups<1.1.19 denial-of-service http://www.cups.org/str.php?L75 |
379 | speakfreely<=7.5 remote-code-execution http://www.securityfocus.com/archive/1/324257/2003-06-06/2003-06-12/0 | | 379 | speakfreely<=7.5 remote-code-execution http://www.securityfocus.com/archive/1/324257/2003-06-06/2003-06-12/0 |
380 | ethereal<0.9.13 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00010.html | | 380 | ethereal<0.9.13 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00010.html |
381 | xpdf<2.02pl1 remote-code-execution http://lists.netsys.com/pipermail/full-disclosure/2003-June/010397.html | | 381 | xpdf<2.02pl1 remote-code-execution http://lists.netsys.com/pipermail/full-disclosure/2003-June/010397.html |
382 | acroread5<5.07 remote-code-execution http://lists.netsys.com/pipermail/full-disclosure/2003-June/010397.html | | 382 | acroread5<5.07 remote-code-execution http://lists.netsys.com/pipermail/full-disclosure/2003-June/010397.html |
383 | acroread5<5.08 remote-user-shell http://lists.netsys.com/pipermail/full-disclosure/2003-July/006342.html | | 383 | acroread5<5.08 remote-user-shell http://lists.netsys.com/pipermail/full-disclosure/2003-July/006342.html |
384 | ImageMagick<5.5.7.1 local-symlink-race http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0455 | | 384 | ImageMagick<5.5.7.1 local-symlink-race http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0455 |
385 | apache-2.0.3[7-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0253 | | 385 | apache-2.0.3[7-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0253 |
386 | apache-2.0.4[0-6] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0253 | | 386 | apache-2.0.4[0-6] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0253 |
387 | falcons-eye<1.9.3nb3 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0358 | | 387 | falcons-eye<1.9.3nb3 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0358 |
388 | xconq<7.4.1nb1 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0607 | | 388 | xconq<7.4.1nb1 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0607 |
389 | mhonarc<2.6.4 cross-site-scripting http://savannah.nongnu.org/bugs/?func=detailbug&bug_id=3128&group_id=1968 | | 389 | mhonarc<2.6.4 cross-site-scripting http://savannah.nongnu.org/bugs/?func=detailbug&bug_id=3128&group_id=1968 |
390 | wu-ftpd<2.6.2nb1 remote-root-shell http://isec.pl/vulnerabilities/isec-0011-wu-ftpd.txt | | 390 | wu-ftpd<2.6.2nb1 remote-root-shell http://isec.pl/vulnerabilities/isec-0011-wu-ftpd.txt |
391 | lftp<2.5.3 remote-user-shell http://freshmeat.net/releases/87364/ | | 391 | lftp<2.5.3 remote-user-shell http://freshmeat.net/releases/87364/ |
392 | postfix<1.1.13 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0468 | | 392 | postfix<1.1.13 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0468 |
393 | postfix<1.1.13 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0540 | | 393 | postfix<1.1.13 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0540 |
394 | xfstt<1.5 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0581 | | 394 | xfstt<1.5 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0581 |
395 | xfstt<1.5.1 privacy-leak http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0625 | | 395 | xfstt<1.5.1 privacy-leak http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0625 |
396 | stunnel<3.25 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1563 | | 396 | stunnel<3.25 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1563 |
397 | stunnel-4.0[0-3]* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1563 | | 397 | stunnel-4.0[0-3]* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1563 |
398 | ssh2<3.2.5 weak-authentication http://www.ssh.com/company/newsroom/article/454/ | | 398 | ssh2<3.2.5 weak-authentication http://www.ssh.com/company/newsroom/article/454/ |
399 | horde<2.2.4rc1 privacy-leak http://www.securityfocus.com/archive/1/333114/2003-08-13/2003-08-19/0 | | 399 | horde<2.2.4rc1 privacy-leak http://www.securityfocus.com/archive/1/333114/2003-08-13/2003-08-19/0 |
400 | imp<3.2.2rc1 privacy-leak http://www.securityfocus.com/archive/1/333114/2003-08-13/2003-08-19/0 | | 400 | imp<3.2.2rc1 privacy-leak http://www.securityfocus.com/archive/1/333114/2003-08-13/2003-08-19/0 |
401 | gopher<3.0.6 remote-root-shell http://www.securityfocus.com/archive/1/328843/2003-08-18/2003-08-24/2 | | 401 | gopher<3.0.6 remote-root-shell http://www.securityfocus.com/archive/1/328843/2003-08-18/2003-08-24/2 |
402 | unzip<5.50nb2 weak-path-validation http://www.securityfocus.com/archive/1/334070/2003-08-18/2003-08-24/2 | | 402 | unzip<5.50nb2 weak-path-validation http://www.securityfocus.com/archive/1/334070/2003-08-18/2003-08-24/2 |
403 | xmule-[0-9]* remote-user-shell http://lists.netsys.com/pipermail/full-disclosure/2003-August/008449.html | | 403 | xmule-[0-9]* remote-user-shell http://lists.netsys.com/pipermail/full-disclosure/2003-August/008449.html |
404 | sendmail-8.12.[0-8]nb* denial-of-service http://www.sendmail.org/dnsmap1.html | | 404 | sendmail-8.12.[0-8]nb* denial-of-service http://www.sendmail.org/dnsmap1.html |
405 | exim<3.36 remote-code-execution http://www.exim.org/pipermail/exim-announce/2003q3/000094.html | | 405 | exim<3.36 remote-code-execution http://www.exim.org/pipermail/exim-announce/2003q3/000094.html |
406 | exim>=4<4.22 remote-code-execution http://www.exim.org/pipermail/exim-announce/2003q3/000094.html | | 406 | exim>=4<4.22 remote-code-execution http://www.exim.org/pipermail/exim-announce/2003q3/000094.html |
407 | leafnode<1.9.42 denial-of-service http://www.securityfocus.com/archive/1/336186 | | 407 | leafnode<1.9.42 denial-of-service http://www.securityfocus.com/archive/1/336186 |
408 | p5-Apache-Gallery<0.7 local-user-shell http://www.securityfocus.com/archive/1/336583/2003-09-06/2003-09-12/0 | | 408 | p5-Apache-Gallery<0.7 local-user-shell http://www.securityfocus.com/archive/1/336583/2003-09-06/2003-09-12/0 |
409 | pine<4.58 remote-code-execution http://www.idefense.com/advisory/09.10.03.txt | | 409 | pine<4.58 remote-code-execution http://www.idefense.com/advisory/09.10.03.txt |
410 | net-snmp<5.0.9 privacy-leak http://sourceforge.net/forum/forum.php?forum_id=308015 | | 410 | net-snmp<5.0.9 privacy-leak http://sourceforge.net/forum/forum.php?forum_id=308015 |
411 | gtkhtml<1.1.10 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0541 | | 411 | gtkhtml<1.1.10 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0541 |
412 | sane-backends<1.0.11 weak-authentication http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0773 | | 412 | sane-backends<1.0.11 weak-authentication http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0773 |
413 | sane-backends<1.0.11 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0774 | | 413 | sane-backends<1.0.11 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0774 |
414 | sane-backends<1.0.11 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0775 | | 414 | sane-backends<1.0.11 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0775 |
415 | sane-backends<1.0.11 unknown http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0776 | | 415 | sane-backends<1.0.11 unknown http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0776 |
416 | sane-backends<1.0.11 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0777 | | 416 | sane-backends<1.0.11 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0777 |
417 | sane-backends<1.0.11 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0778 | | 417 | sane-backends<1.0.11 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0778 |
418 | apache<1.3.28 denial-of-service http://www.kb.cert.org/vuls/id/379828 | | 418 | apache<1.3.28 denial-of-service http://www.kb.cert.org/vuls/id/379828 |
419 | apache6<1.3.28 denial-of-service http://www.kb.cert.org/vuls/id/379828 | | 419 | apache6<1.3.28 denial-of-service http://www.kb.cert.org/vuls/id/379828 |
420 | mysql-server<3.23.49nb5 remote-code-execution http://lists.netsys.com/pipermail/full-disclosure/2003-September/009819.html | | 420 | mysql-server<3.23.49nb5 remote-code-execution http://lists.netsys.com/pipermail/full-disclosure/2003-September/009819.html |
421 | openssh<3.7.1 denial-of-service http://www.openssh.org/txt/buffer.adv | | 421 | openssh<3.7.1 denial-of-service http://www.openssh.org/txt/buffer.adv |
422 | openssh+gssapi<3.6.1.2.20030430nb2 denial-of-service http://www.openssh.org/txt/buffer.adv | | 422 | openssh+gssapi<3.6.1.2.20030430nb2 denial-of-service http://www.openssh.org/txt/buffer.adv |
423 | sendmail<8.12.10 unknown http://www.sendmail.org/8.12.10.html | | 423 | sendmail<8.12.10 unknown http://www.sendmail.org/8.12.10.html |
424 | thttpd<2.23.0.1nb1 remote-code-execution http://marc.theaimsgroup.com/?l=thttpd&m=106402145912879&w=2 | | 424 | thttpd<2.23.0.1nb1 remote-code-execution http://marc.theaimsgroup.com/?l=thttpd&m=106402145912879&w=2 |
425 | openssh<3.7.1.2 remote-code-execution http://www.openssh.com/txt/sshpam.adv | | 425 | openssh<3.7.1.2 remote-code-execution http://www.openssh.com/txt/sshpam.adv |
426 | proftpd<1.2.8nb2 remote-root-shell http://xforce.iss.net/xforce/alerts/id/154 | | 426 | proftpd<1.2.8nb2 remote-root-shell http://xforce.iss.net/xforce/alerts/id/154 |
427 | cfengine-2.0.[0-7]* remote-code-execution http://www.securityfocus.com/archive/1/339083/2003-09-22/2003-09-28/0 | | 427 | cfengine-2.0.[0-7]* remote-code-execution http://www.securityfocus.com/archive/1/339083/2003-09-22/2003-09-28/0 |
428 | mplayer<1.0rc1nb1 remote-code-execution http://www.mplayerhq.hu/homepage/news.html#vuln01 | | 428 | mplayer<1.0rc1nb1 remote-code-execution http://www.mplayerhq.hu/homepage/news.html#vuln01 |
429 | gmplayer<1.0rc1nb1 remote-code-execution http://www.mplayerhq.hu/homepage/news.html#vuln01 | | 429 | gmplayer<1.0rc1nb1 remote-code-execution http://www.mplayerhq.hu/homepage/news.html#vuln01 |
430 | marbles<1.0.2nb3 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0830 | | 430 | marbles<1.0.2nb3 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0830 |
431 | ncftp3<3.1.6 remote-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1345 | | 431 | ncftp3<3.1.6 remote-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1345 |
432 | openssl<0.9.6k remote-root-shell http://www.openssl.org/news/secadv_20030930.txt | | 432 | openssl<0.9.6k remote-root-shell http://www.openssl.org/news/secadv_20030930.txt |
433 | vmware3<3.2.1pl1 local-root-shell http://marc.theaimsgroup.com/?l=gentoo-announce&m=106181867621048&w=2 | | 433 | vmware3<3.2.1pl1 local-root-shell http://marc.theaimsgroup.com/?l=gentoo-announce&m=106181867621048&w=2 |
434 | fetchmail<6.2.4nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0790 | | 434 | fetchmail<6.2.4nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0790 |
435 | kdelibs<2.2.2 denial-of-service http://www.kde.org/info/security/ | | 435 | kdelibs<2.2.2 denial-of-service http://www.kde.org/info/security/ |
436 | kdebase<2.2.2 remote-code-execution http://www.kde.org/info/security/ | | 436 | kdebase<2.2.2 remote-code-execution http://www.kde.org/info/security/ |
437 | kdebase<2.2.2 denial-of-service http://www.kde.org/info/security/ | | 437 | kdebase<2.2.2 denial-of-service http://www.kde.org/info/security/ |
438 | kdebase<2.2.2 remote-code-execution http://www.kde.org/info/security/ | | 438 | kdebase<2.2.2 remote-code-execution http://www.kde.org/info/security/ |
439 | silc-client<0.9.13 denial-of-service http://silcnet.org/txt/security_20031016_1.txt | | 439 | silc-client<0.9.13 denial-of-service http://silcnet.org/txt/security_20031016_1.txt |
440 | silc-server<0.9.14 denial-of-service http://silcnet.org/txt/security_20031016_1.txt | | 440 | silc-server<0.9.14 denial-of-service http://silcnet.org/txt/security_20031016_1.txt |
441 | sylpheed-claws-0.9.4{,nb1} denial-of-service http://www.guninski.com/sylph.html | | 441 | sylpheed-claws-0.9.4{,nb1} denial-of-service http://www.guninski.com/sylph.html |
442 | vtun<2.6nb1 privacy-leak ftp://ftp.netbsd.org/pub/NetBSD/packages/distfiles/LOCAL_PORTS/vtun-26to30.patch | | 442 | vtun<2.6nb1 privacy-leak ftp://ftp.netbsd.org/pub/NetBSD/packages/distfiles/LOCAL_PORTS/vtun-26to30.patch |
443 | libnids<=1.17 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0850 | | 443 | libnids<=1.17 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0850 |
444 | apache<1.3.28nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542 | | 444 | apache<1.3.28nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542 |
445 | apache6<1.3.28nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542 | | 445 | apache6<1.3.28nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542 |
446 | apache-2.0.[0-3][0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0254 | | 446 | apache-2.0.[0-3][0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0254 |
447 | apache-2.0.4[0-7] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0254 | | 447 | apache-2.0.4[0-7] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0254 |
448 | sun-{jre,jdk}13<1.0.9 privilege-escalation http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57221&zone_32=category%3Asecurity | | 448 | sun-{jre,jdk}13<1.0.9 privilege-escalation http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57221&zone_32=category%3Asecurity |
449 | sun-{jre,jdk}14<2.0 privilege-escalation http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57221&zone_32=category%3Asecurity | | 449 | sun-{jre,jdk}14<2.0 privilege-escalation http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57221&zone_32=category%3Asecurity |
450 | thttpd<2.24 remote-code-execution http://www.texonet.com/advisories/TEXONET-20030908.txt | | 450 | thttpd<2.24 remote-code-execution http://www.texonet.com/advisories/TEXONET-20030908.txt |
451 | coreutils<5.0nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0853 | | 451 | coreutils<5.0nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0853 |
452 | coreutils<5.0nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0854 | | 452 | coreutils<5.0nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0854 |
453 | hylafax<4.1.8 remote-code-execution http://www.securiteam.com/unixfocus/6O00D0K8UI.html | | 453 | hylafax<4.1.8 remote-code-execution http://www.securiteam.com/unixfocus/6O00D0K8UI.html |
454 | quagga<0.96.3nb1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0795 | | 454 | quagga<0.96.3nb1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0795 |
455 | zebra<0.93bnb1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0795 | | 455 | zebra<0.93bnb1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0795 |
456 | pan<0.13.4 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0855 | | 456 | pan<0.13.4 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0855 |
457 | ethereal<0.9.15 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00011.html | | 457 | ethereal<0.9.15 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00011.html |
458 | mozilla{,-bin}<1.5 remote-code-execution http://www.mozilla.org/projects/security/known-vulnerabilities.html | | 458 | mozilla{,-bin}<1.5 remote-code-execution http://www.mozilla.org/projects/security/known-vulnerabilities.html |
459 | screen<4.0.1nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0972 | | 459 | screen<4.0.1nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0972 |
460 | gnupg<1.2.3nb2 weak-authentication http://lists.gnupg.org/pipermail/gnupg-announce/2003q4/000276.html | | 460 | gnupg<1.2.3nb2 weak-authentication http://lists.gnupg.org/pipermail/gnupg-announce/2003q4/000276.html |
461 | rsync<2.5.7 remote-user-shell http://www.mail-archive.com/rsync@lists.samba.org/msg08782.html | | 461 | rsync<2.5.7 remote-user-shell http://www.mail-archive.com/rsync@lists.samba.org/msg08782.html |
462 | audit-packages<1.26 no-exploit-but-less-integrity-so-please-upgrade http://mail-index.netbsd.org/tech-pkg/2003/11/30/0001.html | | 462 | audit-packages<1.26 no-exploit-but-less-integrity-so-please-upgrade http://mail-index.netbsd.org/tech-pkg/2003/11/30/0001.html |
463 | cvs<1.11.10 remote-file-write https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=84 | | 463 | cvs<1.11.10 remote-file-write https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=84 |
464 | lftp<2.6.10 remote-code-execution http://lists.netsys.com/pipermail/full-disclosure/2003-December/014824.html | | 464 | lftp<2.6.10 remote-code-execution http://lists.netsys.com/pipermail/full-disclosure/2003-December/014824.html |
465 | opera<7.23 remote-file-delete http://opera.rainyblue.org/modules/cjaycontent/index.php?id=1 | | 465 | opera<7.23 remote-file-delete http://opera.rainyblue.org/modules/cjaycontent/index.php?id=1 |
466 | mgetty+sendfax<=1.1.30 file-permissions http://mail-index.netbsd.org/tech-pkg/2003/11/18/0003.html | | 466 | mgetty+sendfax<=1.1.30 file-permissions http://mail-index.netbsd.org/tech-pkg/2003/11/18/0003.html |
467 | cvs<1.11.11 privilege-escalation https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=88 | | 467 | cvs<1.11.11 privilege-escalation https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=88 |
468 | ethereal<0.10.0 denial-of-service http://www.ethereal.com/appnotes/enpa-sa-00012.html | | 468 | ethereal<0.10.0 denial-of-service http://www.ethereal.com/appnotes/enpa-sa-00012.html |
469 | bind<8.4.3 cache-poisoning http://www.kb.cert.org/vuls/id/734644 | | 469 | bind<8.4.3 cache-poisoning http://www.kb.cert.org/vuls/id/734644 |
470 | mpg321<0.2.10nb3 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0969 | | 470 | mpg321<0.2.10nb3 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0969 |
471 | mailman<2.1.4 cross-site-scripting http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0965 | | 471 | mailman<2.1.4 cross-site-scripting http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0965 |
472 | racoon<20040116a remote-sa-delete http://www.securityfocus.com/archive/1/349756 | | 472 | racoon<20040116a remote-sa-delete http://www.securityfocus.com/archive/1/349756 |
473 | gaim<0.75nb1 remote-code-execution http://security.e-matters.de/advisories/012004.html | | 473 | gaim<0.75nb1 remote-code-execution http://security.e-matters.de/advisories/012004.html |
474 | freeradius<0.9.3 denial-of-service http://www.freeradius.org/security.html#0.9.2 | | 474 | freeradius<0.9.3 denial-of-service http://www.freeradius.org/security.html#0.9.2 |
475 | libtool-base<1.5.2nb3 local-symlink-race http://www.securityfocus.com/archive/1/352519 | | 475 | libtool-base<1.5.2nb3 local-symlink-race http://www.securityfocus.com/archive/1/352519 |
476 | jitterbug<1.6.2nb1 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0028 | | 476 | jitterbug<1.6.2nb1 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0028 |
477 | mpg123<0.59.18nb3 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0865 | | 477 | mpg123<0.59.18nb3 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0865 |
478 | mpg123-esound<0.59.18nb1 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0865 | | 478 | mpg123-esound<0.59.18nb1 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0865 |
479 | mpg123-nas<0.59.18nb3 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0865 | | 479 | mpg123-nas<0.59.18nb3 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0865 |
480 | clamav<0.66 denial-of-service http://www.securityfocus.com/archive/1/353186 | | 480 | clamav<0.66 denial-of-service http://www.securityfocus.com/archive/1/353186 |
481 | mutt<1.4.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0078 | | 481 | mutt<1.4.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0078 |
482 | metamail<2.7nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0104 | | 482 | metamail<2.7nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0104 |
483 | xboing<2.4nb2 privilege-escalation http://www.debian.org/security/2004/dsa-451 | | 483 | xboing<2.4nb2 privilege-escalation http://www.debian.org/security/2004/dsa-451 |
484 | libxml2<2.6.6 remote-user-shell http://lists.gnome.org/archives/xml/2004-February/msg00070.html | | 484 | libxml2<2.6.6 remote-user-shell http://lists.gnome.org/archives/xml/2004-February/msg00070.html |
485 | automake<1.8.3 privilege-escalation http://www.securityfocus.com/archive/1/356574/2004-03-05/2004-03-11/2 | | 485 | automake<1.8.3 privilege-escalation http://www.securityfocus.com/archive/1/356574/2004-03-05/2004-03-11/2 |
486 | apache-2.0.? denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113 | | 486 | apache-2.0.? denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113 |
487 | apache-2.0.[0-3][0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113 | | 487 | apache-2.0.[0-3][0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113 |
488 | apache-2.0.4[0-8] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113 | | 488 | apache-2.0.4[0-8] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113 |
489 | apache-2.0.? denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 | | 489 | apache-2.0.? denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 |
490 | apache-2.0.[0-3][0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 | | 490 | apache-2.0.[0-3][0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 |
491 | apache-2.0.4[0-8] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 | | 491 | apache-2.0.4[0-8] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 |
492 | apache-2.0.? remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 | | 492 | apache-2.0.? remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 |
493 | apache-2.0.[0-3][0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 | | 493 | apache-2.0.[0-3][0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 |
494 | apache-2.0.4[0-8] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 | | 494 | apache-2.0.4[0-8] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 |
495 | apache<1.3.29nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 | | 495 | apache<1.3.29nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 |
496 | apache6<1.3.29nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 | | 496 | apache6<1.3.29nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 |
497 | gdk-pixbuf<0.20 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0111 | | 497 | gdk-pixbuf<0.20 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0111 |
498 | openssl<0.9.6l denial-of-service http://www.openssl.org/news/secadv_20031104.txt | | 498 | openssl<0.9.6l denial-of-service http://www.openssl.org/news/secadv_20031104.txt |
499 | openssl<0.9.6m denial-of-service http://www.openssl.org/news/secadv_20040317.txt | | 499 | openssl<0.9.6m denial-of-service http://www.openssl.org/news/secadv_20040317.txt |
500 | isakmpd<=20030903nb1 denial-of-service http://www.rapid7.com/advisories/R7-0018.html | | 500 | isakmpd<=20030903nb1 denial-of-service http://www.rapid7.com/advisories/R7-0018.html |
501 | ghostscript-gnu<7.07 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0354 | | 501 | ghostscript-gnu<7.07 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0354 |
502 | ghostscript-gnu-nox11<7.07 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0354 | | 502 | ghostscript-gnu-nox11<7.07 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0354 |
503 | ghostscript-gnu-x11<7.07 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0354 | | 503 | ghostscript-gnu-x11<7.07 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0354 |
504 | python22<2.2.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0150 | | 504 | python22<2.2.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0150 |
505 | python22-pth<2.2.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0150 | | 505 | python22-pth<2.2.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0150 |
506 | squid<2.5.5 weak-acl-enforcement http://www.squid-cache.org/Advisories/SQUID-2004_1.txt | | 506 | squid<2.5.5 weak-acl-enforcement http://www.squid-cache.org/Advisories/SQUID-2004_1.txt |
507 | ethereal<0.10.3 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00013.html | | 507 | ethereal<0.10.3 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00013.html |
508 | mplayer<1.0rc3nb2 remote-code-execution http://www.securityfocus.com/archive/1/359025 | | 508 | mplayer<1.0rc3nb2 remote-code-execution http://www.securityfocus.com/archive/1/359025 |
509 | gmplayer<1.0rc3nb2 remote-code-execution http://www.securityfocus.com/archive/1/359025 | | 509 | gmplayer<1.0rc3nb2 remote-code-execution http://www.securityfocus.com/archive/1/359025 |
510 | mencoder<1.0rc3nb2 remote-code-execution http://www.securityfocus.com/archive/1/359025 | | 510 | mencoder<1.0rc3nb2 remote-code-execution http://www.securityfocus.com/archive/1/359025 |
511 | heimdal<0.6.1 remote-trust http://www.pdc.kth.se/heimdal/advisory/2004-04-01/ | | 511 | heimdal<0.6.1 remote-trust http://www.pdc.kth.se/heimdal/advisory/2004-04-01/ |
512 | uulib<0.5.20 archive-code-execution http://www.securityfocus.com/bid/9758 | | 512 | uulib<0.5.20 archive-code-execution http://www.securityfocus.com/bid/9758 |
513 | racoon<20040408a weak-authentication http://www.vuxml.org/freebsd/d8769838-8814-11d8-90d1-0020ed76ef5a.html | | 513 | racoon<20040408a weak-authentication http://www.vuxml.org/freebsd/d8769838-8814-11d8-90d1-0020ed76ef5a.html |
514 | xchat<1.8.11nb7 remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html | | 514 | xchat<1.8.11nb7 remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html |
515 | xchat-2.0.[0-7] remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html | | 515 | xchat-2.0.[0-7] remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html |
516 | xchat-2.0.[0-7]nb* remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html | | 516 | xchat-2.0.[0-7]nb* remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html |
517 | xchat-2.0.8 remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html | | 517 | xchat-2.0.8 remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html |
518 | xchat-2.0.8nb1 remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html | | 518 | xchat-2.0.8nb1 remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html |
519 | xchat-gnome<1.8.11nb7 remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html | | 519 | xchat-gnome<1.8.11nb7 remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html |
520 | cvs<1.11.15 remote-file-write https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=102 | | 520 | cvs<1.11.15 remote-file-write https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=102 |
521 | neon<0.24.5 unknown http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179 | | 521 | neon<0.24.5 unknown http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179 |
522 | tla<1.2.1rc1 remote-code-execution http://marc.theaimsgroup.com/?l=openpkg-announce&m=108213423102539&w=2 | | 522 | tla<1.2.1rc1 remote-code-execution http://marc.theaimsgroup.com/?l=openpkg-announce&m=108213423102539&w=2 |
523 | cadaver<0.22.1 remote-code-execution http://marc.theaimsgroup.com/?l=openpkg-announce&m=108213423102539&w=2 | | 523 | cadaver<0.22.1 remote-code-execution http://marc.theaimsgroup.com/?l=openpkg-announce&m=108213423102539&w=2 |
524 | lha<1.14i local-code-execution http://www2m.biglobe.ne.jp/~dolphin/lha/lha-unix.htm | | 524 | lha<1.14i local-code-execution http://www2m.biglobe.ne.jp/~dolphin/lha/lha-unix.htm |
525 | mplayer>=1.0rc0<1.0rc4 remote-code-execution http://www.mplayerhq.hu/homepage/design6/news.html | | 525 | mplayer>=1.0rc0<1.0rc4 remote-code-execution http://www.mplayerhq.hu/homepage/design6/news.html |
526 | xine-lib-1rc[0-2]* remote-file-write http://www.xinehq.de/index.php/security/XSA-2004-1 | | 526 | xine-lib-1rc[0-2]* remote-file-write http://www.xinehq.de/index.php/security/XSA-2004-1 |
527 | xine-lib-1rc3[ab]* remote-file-write http://www.xinehq.de/index.php/security/XSA-2004-1 | | 527 | xine-lib-1rc3[ab]* remote-file-write http://www.xinehq.de/index.php/security/XSA-2004-1 |
528 | rsync<2.6.1 remote-file-write http://rsync.samba.org/#security_apr04 | | 528 | rsync<2.6.1 remote-file-write http://rsync.samba.org/#security_apr04 |
529 | exim<3.36nb2 remote-code-execution http://www.guninski.com/exim1.html | | 529 | exim<3.36nb2 remote-code-execution http://www.guninski.com/exim1.html |
530 | exim>=4<4.30 remote-code-execution http://www.guninski.com/exim1.html | | 530 | exim>=4<4.30 remote-code-execution http://www.guninski.com/exim1.html |
531 | exim-exiscan-4.[0-2]* remote-code-execution http://www.guninski.com/exim1.html | | 531 | exim-exiscan-4.[0-2]* remote-code-execution http://www.guninski.com/exim1.html |
532 | pine<4.58nb4 local-symlink-race http://www.NetBSD.org/cgi-bin/query-pr-single.pl?number=22226 | | 532 | pine<4.58nb4 local-symlink-race http://www.NetBSD.org/cgi-bin/query-pr-single.pl?number=22226 |
533 | xine-lib-1rc[0-3]* remote-file-write http://www.xinehq.de/index.php/security/XSA-2004-3 | | 533 | xine-lib-1rc[0-3]* remote-file-write http://www.xinehq.de/index.php/security/XSA-2004-3 |
534 | global<4.6 remote-exec http://savannah.gnu.org/forum/forum.php?forum_id=2029 | | 534 | global<4.6 remote-exec http://savannah.gnu.org/forum/forum.php?forum_id=2029 |
535 | opera<7.50 remote-file-write http://www.idefense.com/application/poi/display?id=104&type=vulnerabilities&flashstatus=true | | 535 | opera<7.50 remote-file-write http://www.idefense.com/application/poi/display?id=104&type=vulnerabilities&flashstatus=true |
536 | lha<114.9nb2 remote-code-execution http://www.securityfocus.com/bid/10243 | | 536 | lha<114.9nb2 remote-code-execution http://www.securityfocus.com/bid/10243 |
537 | apache<1.3.31 weak-authentication http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987 | | 537 | apache<1.3.31 weak-authentication http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987 |
538 | apache<1.3.31 weak-acl-enforcement http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993 | | 538 | apache<1.3.31 weak-acl-enforcement http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993 |
539 | apache<1.3.31 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 | | 539 | apache<1.3.31 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 |
540 | apache6<1.3.31 weak-authentication http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987 | | 540 | apache6<1.3.31 weak-authentication http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987 |
541 | apache6<1.3.31 weak-acl-enforcement http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993 | | 541 | apache6<1.3.31 weak-acl-enforcement http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993 |
542 | apache6<1.3.31 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 | | 542 | apache6<1.3.31 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 |
543 | kdelibs<3.2.2nb2 remote-file-write http://www.kde.org/info/security/advisory-20040517-1.txt | | 543 | kdelibs<3.2.2nb2 remote-file-write http://www.kde.org/info/security/advisory-20040517-1.txt |
544 | subversion-base<1.0.3 denial-of-service http://subversion.tigris.org/servlets/ReadMsg?list=announce&msgNo=125 | | 544 | subversion-base<1.0.3 denial-of-service http://subversion.tigris.org/servlets/ReadMsg?list=announce&msgNo=125 |
545 | subversion-base<1.0.3 remote-code-execution http://subversion.tigris.org/servlets/ReadMsg?list=announce&msgNo=125 | | 545 | subversion-base<1.0.3 remote-code-execution http://subversion.tigris.org/servlets/ReadMsg?list=announce&msgNo=125 |
546 | ap{2,22}-subversion<1.0.3 denial-of-service http://subversion.tigris.org/servlets/ReadMsg?list=announce&msgNo=125 | | 546 | ap{2,22}-subversion<1.0.3 denial-of-service http://subversion.tigris.org/servlets/ReadMsg?list=announce&msgNo=125 |
547 | ap{2,22}-subversion<1.0.3 remote-code-execution http://subversion.tigris.org/servlets/ReadMsg?list=announce&msgNo=125 | | 547 | ap{2,22}-subversion<1.0.3 remote-code-execution http://subversion.tigris.org/servlets/ReadMsg?list=announce&msgNo=125 |
548 | neon<0.24.6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398 | | 548 | neon<0.24.6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398 |
549 | cvs-1.11.[0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0396 | | 549 | cvs-1.11.[0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0396 |
550 | cvs-1.11.1[0-5] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0396 | | 550 | cvs-1.11.1[0-5] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0396 |
551 | cadaver<0.22.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398 | | 551 | cadaver<0.22.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398 |
552 | ap-ssl<2.8.18 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0488 | | 552 | ap-ssl<2.8.18 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0488 |
553 | squirrelmail<1.4.3 cross-site-scripting http://www.securityfocus.com/bid/10246/ | | 553 | squirrelmail<1.4.3 cross-site-scripting http://www.securityfocus.com/bid/10246/ |
554 | ethereal<0.10.4 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00014.html | | 554 | ethereal<0.10.4 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00014.html |
555 | apache-2.0.49{,nb1} remote-code-execution http://www.securityfocus.com/bid/10355 | | 555 | apache-2.0.49{,nb1} remote-code-execution http://www.securityfocus.com/bid/10355 |
556 | roundup<0.7.3 remote-file-read http://cvs.sourceforge.net/viewcvs.py/*checkout*/roundup/roundup/CHANGES.txt?rev=1.533.2.21 | | 556 | roundup<0.7.3 remote-file-read http://cvs.sourceforge.net/viewcvs.py/*checkout*/roundup/roundup/CHANGES.txt?rev=1.533.2.21 |
557 | cvs-1.11.[0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416 | | 557 | cvs-1.11.[0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416 |
558 | cvs-1.11.[0-9]nb* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416 | | 558 | cvs-1.11.[0-9]nb* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416 |
559 | cvs-1.11.1[0-6]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416 | | 559 | cvs-1.11.1[0-6]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416 |
560 | subversion-base<1.0.5 denial-of-service http://www.contactor.se/~dast/svn/archive-2004-06/0331.shtml | | 560 | subversion-base<1.0.5 denial-of-service http://www.contactor.se/~dast/svn/archive-2004-06/0331.shtml |
561 | racoon<20040617a weak-authentication http://www.securitytracker.com/alerts/2004/Jun/1010495.html | | 561 | racoon<20040617a weak-authentication http://www.securitytracker.com/alerts/2004/Jun/1010495.html |
562 | mit-krb5<1.3.4 remote-code-execution http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-001-an_to_ln.txt | | 562 | mit-krb5<1.3.4 remote-code-execution http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-001-an_to_ln.txt |
563 | imp<3.2.4 cross-site-scripting http://securityfocus.com/bid/10501/info/ | | 563 | imp<3.2.4 cross-site-scripting http://securityfocus.com/bid/10501/info/ |
564 | gmplayer<1.0rc4nb2 remote-code-execution http://www.open-security.org/advisories/5 | | 564 | gmplayer<1.0rc4nb2 remote-code-execution http://www.open-security.org/advisories/5 |
565 | ethereal<0.10.5 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00015.html | | 565 | ethereal<0.10.5 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00015.html |
566 | courier-auth<0.45 remote-code-execution http://www.securityfocus.com/bid/9845 | | 566 | courier-auth<0.45 remote-code-execution http://www.securityfocus.com/bid/9845 |
567 | courier-imap<3.0.0 remote-code-execution http://www.securityfocus.com/bid/9845 | | 567 | courier-imap<3.0.0 remote-code-execution http://www.securityfocus.com/bid/9845 |
568 | sqwebmail<4.0.0 remote-code-execution http://www.securityfocus.com/bid/9845 | | 568 | sqwebmail<4.0.0 remote-code-execution http://www.securityfocus.com/bid/9845 |
569 | ap-ssl<2.8.19 remote-code-execution http://www.mail-archive.com/modssl-users@modssl.org/msg16853.html | | 569 | ap-ssl<2.8.19 remote-code-execution http://www.mail-archive.com/modssl-users@modssl.org/msg16853.html |
570 | ap{2,22}-subversion<1.0.6 weak-acl-enforcement http://www.contactor.se/~dast/svn/archive-2004-07/0814.shtml | | 570 | ap{2,22}-subversion<1.0.6 weak-acl-enforcement http://www.contactor.se/~dast/svn/archive-2004-07/0814.shtml |
571 | samba<2.2.10 remote-code-execution http://www.samba.org/samba/whatsnew/samba-2.2.10.html | | 571 | samba<2.2.10 remote-code-execution http://www.samba.org/samba/whatsnew/samba-2.2.10.html |
572 | samba-3.0.[0-4]{,a*,nb?} remote-code-execution http://www.samba.org/samba/whatsnew/samba-3.0.5.html | | 572 | samba-3.0.[0-4]{,a*,nb?} remote-code-execution http://www.samba.org/samba/whatsnew/samba-3.0.5.html |
573 | ja-samba<2.2.9.1.0nb1 remote-code-execution http://www.samba.org/samba/whatsnew/samba-2.2.10.html | | 573 | ja-samba<2.2.9.1.0nb1 remote-code-execution http://www.samba.org/samba/whatsnew/samba-2.2.10.html |
574 | acroread5<5.09 arbitrary-code-execution http://kb2.adobe.com/cps/322/322914.html | | 574 | acroread5<5.09 arbitrary-code-execution http://kb2.adobe.com/cps/322/322914.html |
575 | png<1.2.6rc1 remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt | | 575 | png<1.2.6rc1 remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt |
576 | suse{,32}_libpng-7.3{,nb1} remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt | | 576 | suse{,32}_libpng-7.3{,nb1} remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt |
577 | suse{,32}_libpng-9.1 remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt | | 577 | suse{,32}_libpng-9.1 remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt |
578 | suse{,32}_libpng<=6.4 remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt | | 578 | suse{,32}_libpng<=6.4 remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt |
579 | mozilla{,-gtk2}{,-bin}<1.7.2 ssl-certificate-spoofing http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 | | 579 | mozilla{,-gtk2}{,-bin}<1.7.2 ssl-certificate-spoofing http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 |
580 | mozilla{,-gtk2}{,-bin}<1.7.2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 | | 580 | mozilla{,-gtk2}{,-bin}<1.7.2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 |
581 | MozillaFirebird{,-gtk2}{,-bin}<0.9.3 ssl-certificate-spoofing http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 | | 581 | MozillaFirebird{,-gtk2}{,-bin}<0.9.3 ssl-certificate-spoofing http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 |
582 | firefox{,-gtk2}{,-bin}<0.9.3 ssl-certificate-spoofing http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 | | 582 | firefox{,-gtk2}{,-bin}<0.9.3 ssl-certificate-spoofing http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 |
583 | MozillaFirebird{,-gtk2}{,-bin}<0.9.3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 | | 583 | MozillaFirebird{,-gtk2}{,-bin}<0.9.3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 |
584 | firefox{,-gtk2}{,-bin}<0.9.3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 | | 584 | firefox{,-gtk2}{,-bin}<0.9.3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 |
585 | thunderbird{,-gtk2}{,-bin}<0.7.2 ssl-certificate-spoofing http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 | | 585 | thunderbird{,-gtk2}{,-bin}<0.7.2 ssl-certificate-spoofing http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 |
586 | thunderbird{,-gtk2}{,-bin}<0.7.2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 | | 586 | thunderbird{,-gtk2}{,-bin}<0.7.2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 |
587 | cfengine-2.0.* remote-code-execution http://www.securityfocus.org/advisories/7045 | | 587 | cfengine-2.0.* remote-code-execution http://www.securityfocus.org/advisories/7045 |
588 | cfengine-2.1.[0-7] remote-code-execution http://www.securityfocus.org/advisories/7045 | | 588 | cfengine-2.1.[0-7] remote-code-execution http://www.securityfocus.org/advisories/7045 |
589 | spamassassin<2.64 denial-of-service http://marc.theaimsgroup.com/?l=spamassassin-announce&m=109168121628767&w=2 | | 589 | spamassassin<2.64 denial-of-service http://marc.theaimsgroup.com/?l=spamassassin-announce&m=109168121628767&w=2 |
590 | kdelibs<3.2.3nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0689 | | 590 | kdelibs<3.2.3nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0689 |
591 | kdelibs<3.2.3nb2 local-account-compromise http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0690 | | 591 | kdelibs<3.2.3nb2 local-account-compromise http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0690 |
592 | kdelibs<3.2.3nb2 http-frame-spoof http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721 | | 592 | kdelibs<3.2.3nb2 http-frame-spoof http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721 |
593 | kdebase<3.2.3nb1 http-frame-spoof http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721 | | 593 | kdebase<3.2.3nb1 http-frame-spoof http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721 |
594 | opera<7.54 remote-file-read http://www.greymagic.com/security/advisories/gm008-op/ | | 594 | opera<7.54 remote-file-read http://www.greymagic.com/security/advisories/gm008-op/ |
595 | opera<7.54 www-address-spoof http://secunia.com/advisories/12162/ | | 595 | opera<7.54 www-address-spoof http://secunia.com/advisories/12162/ |
596 | rsync<2.6.2nb1 remote-file-access http://samba.org/rsync/#security_aug04 | | 596 | rsync<2.6.2nb1 remote-file-access http://samba.org/rsync/#security_aug04 |
597 | lukemftpd-[0-9]* remote-root-access ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-009.txt.asc | | 597 | lukemftpd-[0-9]* remote-root-access ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-009.txt.asc |
598 | tnftpd<20040810 remote-root-access ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-009.txt.asc | | 598 | tnftpd<20040810 remote-root-access ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-009.txt.asc |
599 | demime<1.1d denial-of-service http://scifi.squawk.com/demime.html | | 599 | demime<1.1d denial-of-service http://scifi.squawk.com/demime.html |
600 | kdelibs<3.2.3nb2 www-session-fixation http://www.kde.org/info/security/advisory-20040823-1.txt | | 600 | kdelibs<3.2.3nb2 www-session-fixation http://www.kde.org/info/security/advisory-20040823-1.txt |
601 | fidogate<4.4.9nb1 local-file-write http://sourceforge.net/tracker/index.php?func=detail&aid=1013726&group_id=10739&atid=310739 | | 601 | fidogate<4.4.9nb1 local-file-write http://sourceforge.net/tracker/index.php?func=detail&aid=1013726&group_id=10739&atid=310739 |
602 | qt3-libs<3.3.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0691 | | 602 | qt3-libs<3.3.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0691 |
603 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=0 | | 603 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=0 |
604 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=1 | | 604 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=1 |
605 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=2 | | 605 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=2 |
606 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=3 | | 606 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=3 |
607 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=4 | | 607 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=4 |
608 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=5 | | 608 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=5 |
609 | gaim<0.82 denial-of-service http://gaim.sourceforge.net/security/index.php?id=6 | | 609 | gaim<0.82 denial-of-service http://gaim.sourceforge.net/security/index.php?id=6 |
610 | zlib<1.2.1nb2 denial-of-service http://www.openpkg.org/security/OpenPKG-SA-2004.038-zlib.html | | 610 | zlib<1.2.1nb2 denial-of-service http://www.openpkg.org/security/OpenPKG-SA-2004.038-zlib.html |
611 | imlib2<1.1.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0802 | | 611 | imlib2<1.1.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0802 |
612 | mit-krb5<1.3.4nb2 remote-code-execution http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-002-dblfree.txt | | 612 | mit-krb5<1.3.4nb2 remote-code-execution http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-002-dblfree.txt |
613 | mit-krb5<1.3.4nb2 denial-of-service http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-003-asn1.txt | | 613 | mit-krb5<1.3.4nb2 denial-of-service http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-003-asn1.txt |
614 | mpg123<0.59.18nb4 remote-user-shell http://www.securityfocus.com/archive/1/374433 | | 614 | mpg123<0.59.18nb4 remote-user-shell http://www.securityfocus.com/archive/1/374433 |
615 | mpg123-esound<0.59.18nb2 remote-user-shell http://www.securityfocus.com/archive/1/374433 | | 615 | mpg123-esound<0.59.18nb2 remote-user-shell http://www.securityfocus.com/archive/1/374433 |
616 | mpg123-nas<0.59.18nb4 remote-user-shell http://www.securityfocus.com/archive/1/374433 | | 616 | mpg123-nas<0.59.18nb4 remote-user-shell http://www.securityfocus.com/archive/1/374433 |
617 | apache-2.0.[0-4]* denial-of-service http://issues.apache.org/bugzilla/show_bug.cgi?id=29964 | | 617 | apache-2.0.[0-4]* denial-of-service http://issues.apache.org/bugzilla/show_bug.cgi?id=29964 |
618 | apache-2.0.50 denial-of-service http://issues.apache.org/bugzilla/show_bug.cgi?id=29964 | | 618 | apache-2.0.50 denial-of-service http://issues.apache.org/bugzilla/show_bug.cgi?id=29964 |
619 | apache-2.0.[0-4]* denial-of-service http://issues.apache.org/bugzilla/show_bug.cgi?id=30134 | | 619 | apache-2.0.[0-4]* denial-of-service http://issues.apache.org/bugzilla/show_bug.cgi?id=30134 |
620 | apache-2.0.50 denial-of-service http://issues.apache.org/bugzilla/show_bug.cgi?id=30134 | | 620 | apache-2.0.50 denial-of-service http://issues.apache.org/bugzilla/show_bug.cgi?id=30134 |
621 | samba-3.0.[0-6]{,nb*} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0807 | | 621 | samba-3.0.[0-6]{,nb*} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0807 |
622 | samba-3.0.[0-6]{,nb*} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0808 | | 622 | samba-3.0.[0-6]{,nb*} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0808 |
623 | heimdal<0.6.3 remote-root-access http://www.pdc.kth.se/heimdal/advisory/2004-09-13/ | | 623 | heimdal<0.6.3 remote-root-access http://www.pdc.kth.se/heimdal/advisory/2004-09-13/ |
624 | MozillaFirebird{,-gtk2}{,-bin}<0.10 remote-code-execution http://secunia.com/advisories/12526/ | | 624 | MozillaFirebird{,-gtk2}{,-bin}<0.10 remote-code-execution http://secunia.com/advisories/12526/ |
625 | firefox<0.10 remote-code-execution http://secunia.com/advisories/12526/ | | 625 | firefox<0.10 remote-code-execution http://secunia.com/advisories/12526/ |
626 | firefox-bin<0.10 remote-code-execution http://secunia.com/advisories/12526/ | | 626 | firefox-bin<0.10 remote-code-execution http://secunia.com/advisories/12526/ |
627 | firefox-gtk2<0.10 remote-code-execution http://secunia.com/advisories/12526/ | | 627 | firefox-gtk2<0.10 remote-code-execution http://secunia.com/advisories/12526/ |
628 | firefox-gtk2-bin<0.10 remote-code-execution http://secunia.com/advisories/12526/ | | 628 | firefox-gtk2-bin<0.10 remote-code-execution http://secunia.com/advisories/12526/ |
629 | mozilla<1.7.3 remote-code-execution http://secunia.com/advisories/12526/ | | 629 | mozilla<1.7.3 remote-code-execution http://secunia.com/advisories/12526/ |
630 | mozilla-bin<1.7.3 remote-code-execution http://secunia.com/advisories/12526/ | | 630 | mozilla-bin<1.7.3 remote-code-execution http://secunia.com/advisories/12526/ |
631 | mozilla-gtk2<1.7.3 remote-code-execution http://secunia.com/advisories/12526/ | | 631 | mozilla-gtk2<1.7.3 remote-code-execution http://secunia.com/advisories/12526/ |
632 | thunderbird<0.8 remote-code-execution http://secunia.com/advisories/12526/ | | 632 | thunderbird<0.8 remote-code-execution http://secunia.com/advisories/12526/ |
633 | thunderbird-bin<0.8 remote-code-execution http://secunia.com/advisories/12526/ | | 633 | thunderbird-bin<0.8 remote-code-execution http://secunia.com/advisories/12526/ |
634 | thunderbird-gtk2<0.8 remote-code-execution http://secunia.com/advisories/12526/ | | 634 | thunderbird-gtk2<0.8 remote-code-execution http://secunia.com/advisories/12526/ |
635 | xpm<3.4knb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 | | 635 | xpm<3.4knb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 |
636 | xpm<3.4knb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 | | 636 | xpm<3.4knb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 |
637 | XFree86-libs<4.4.0nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 | | 637 | XFree86-libs<4.4.0nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 |
638 | XFree86-libs<4.4.0nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 | | 638 | XFree86-libs<4.4.0nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 |
639 | xorg-libs<6.7.0nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 | | 639 | xorg-libs<6.7.0nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 |
640 | xorg-libs<6.7.0nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 | | 640 | xorg-libs<6.7.0nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 |
641 | openmotif<2.1.30nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 | | 641 | openmotif<2.1.30nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 |
642 | openmotif<2.1.30nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 | | 642 | openmotif<2.1.30nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 |
643 | sudo-1.6.8 local-file-read http://www.sudo.ws/sudo/alerts/sudoedit.html | | 643 | sudo-1.6.8 local-file-read http://www.sudo.ws/sudo/alerts/sudoedit.html |
644 | apache-2.0.[0-4]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747 | | 644 | apache-2.0.[0-4]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747 |
645 | apache-2.0.50 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747 | | 645 | apache-2.0.50 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747 |
646 | apache-2.0.50nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747 | | 646 | apache-2.0.50nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747 |
647 | gdk-pixbuf<0.22 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753 | | 647 | gdk-pixbuf<0.22 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753 |
648 | gtk2+<2.4.10 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753 | | 648 | gtk2+<2.4.10 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753 |
649 | gdk-pixbuf<0.22 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782 | | 649 | gdk-pixbuf<0.22 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782 |
650 | gtk2+<2.4.10 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782 | | 650 | gtk2+<2.4.10 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782 |
651 | gdk-pixbuf<0.22 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783 | | 651 | gdk-pixbuf<0.22 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783 |
652 | gtk2+<2.4.10 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783 | | 652 | gtk2+<2.4.10 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783 |
653 | gdk-pixbuf<0.22 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788 | | 653 | gdk-pixbuf<0.22 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788 |
654 | gtk2+<2.4.10 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788 | | 654 | gtk2+<2.4.10 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788 |
655 | wv<=1.0.0nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0645 | | 655 | wv<=1.0.0nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0645 |
656 | apache-2.0.51 weak-acl-enforcement http://nagoya.apache.org/bugzilla/show_bug.cgi?id=31315 | | 656 | apache-2.0.51 weak-acl-enforcement http://nagoya.apache.org/bugzilla/show_bug.cgi?id=31315 |
657 | apache-1.3.2[5-9]* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 | | 657 | apache-1.3.2[5-9]* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 |
658 | apache-1.3.30* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 | | 658 | apache-1.3.30* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 |
659 | apache-1.3.31{,nb[1-4]} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 | | 659 | apache-1.3.31{,nb[1-4]} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 |
660 | apache<1.3.33 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0940 | | 660 | apache<1.3.33 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0940 |
661 | apache6-1.3.2[5-9]* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 | | 661 | apache6-1.3.2[5-9]* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 |
662 | apache6-1.3.30* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 | | 662 | apache6-1.3.30* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 |
663 | apache6-1.3.31{,nb[1-4]} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 | | 663 | apache6-1.3.31{,nb[1-4]} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 |
664 | apache6<1.3.33 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0940 | | 664 | apache6<1.3.33 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0940 |
665 | ImageMagick<6.0.6.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0827 | | 665 | ImageMagick<6.0.6.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0827 |
666 | ap{2,22}-subversion<1.0.8 metadata-leak http://subversion.tigris.org/security/CAN-2004-0749-advisory.txt | | 666 | ap{2,22}-subversion<1.0.8 metadata-leak http://subversion.tigris.org/security/CAN-2004-0749-advisory.txt |
667 | squid<2.5.6 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0832 | | 667 | squid<2.5.6 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0832 |
668 | MozillaFirebird{,-gtk2}{,-bin}<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html | | 668 | MozillaFirebird{,-gtk2}{,-bin}<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html |
669 | firefox<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html | | 669 | firefox<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html |
670 | firefox-bin<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html | | 670 | firefox-bin<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html |
671 | firefox-gtk2<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html | | 671 | firefox-gtk2<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html |
672 | firefox-gtk2-bin<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html | | 672 | firefox-gtk2-bin<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html |
673 | gzip-base<1.2.4b remote-code-execution http://www.securityfocus.com/bid/3712 | | 673 | gzip-base<1.2.4b remote-code-execution http://www.securityfocus.com/bid/3712 |
674 | squid<2.5.7 denial-of-service http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities | | 674 | squid<2.5.7 denial-of-service http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities |
675 | tiff<3.6.1nb4 remote-code-execution http://scary.beasts.org/security/CESA-2004-006.txt | | 675 | tiff<3.6.1nb4 remote-code-execution http://scary.beasts.org/security/CESA-2004-006.txt |
676 | tiff<3.6.1nb4 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804 | | 676 | tiff<3.6.1nb4 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804 |
677 | tiff<3.6.1nb4 denial-of-service http://securitytracker.com/id?1011674 | | 677 | tiff<3.6.1nb4 denial-of-service http://securitytracker.com/id?1011674 |
678 | ap-ssl<2.8.20 weak-acl-enforcement http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 | | 678 | ap-ssl<2.8.20 weak-acl-enforcement http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 |
679 | sox<12.17.6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0557 | | 679 | sox<12.17.6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0557 |
680 | ssmtp<2.61 remote-user-access http://lists.debian.org/debian-security-announce-2004/msg00084.html | | 680 | ssmtp<2.61 remote-user-access http://lists.debian.org/debian-security-announce-2004/msg00084.html |
681 | kdegraphics-3.2.* denial-of-service http://www.kde.org/info/security/advisory-20041021-1.txt | | 681 | kdegraphics-3.2.* denial-of-service http://www.kde.org/info/security/advisory-20041021-1.txt |
682 | kdegraphics-3.3.{0,0nb1,1} denial-of-service http://www.kde.org/info/security/advisory-20041021-1.txt | | 682 | kdegraphics-3.3.{0,0nb1,1} denial-of-service http://www.kde.org/info/security/advisory-20041021-1.txt |
683 | samba-2.2.[1-9] denial-of-service http://us1.samba.org/samba/history/samba-2.2.11.html | | 683 | samba-2.2.[1-9] denial-of-service http://us1.samba.org/samba/history/samba-2.2.11.html |
684 | samba-2.2.10 denial-of-service http://us1.samba.org/samba/history/samba-2.2.11.html | | 684 | samba-2.2.10 denial-of-service http://us1.samba.org/samba/history/samba-2.2.11.html |
685 | samba-2.2.[1-9] remote-file-access http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0815 | | 685 | samba-2.2.[1-9] remote-file-access http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0815 |
686 | samba-2.2.{10,11} remote-file-access http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0815 | | 686 | samba-2.2.{10,11} remote-file-access http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0815 |
687 | ja-samba<2.2.12.0.9.1 remote-file-access http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0815 | | 687 | ja-samba<2.2.12.0.9.1 remote-file-access http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0815 |
688 | postgresql-server-7.3.[1-7]{,nb*} local-symlink-race http://www.postgresql.org/about/news.234 | | 688 | postgresql-server-7.3.[1-7]{,nb*} local-symlink-race http://www.postgresql.org/about/news.234 |
689 | postgresql73-server-7.3.[1-7]{,nb*} local-symlink-race http://www.postgresql.org/about/news.234 | | 689 | postgresql73-server-7.3.[1-7]{,nb*} local-symlink-race http://www.postgresql.org/about/news.234 |
690 | postgresql74-server-7.4.[1-5]{,nb*} local-symlink-race http://www.postgresql.org/about/news.234 | | 690 | postgresql74-server-7.4.[1-5]{,nb*} local-symlink-race http://www.postgresql.org/about/news.234 |
691 | cabextract<1.1 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0916 | | 691 | cabextract<1.1 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0916 |
692 | mpg123<0.59.18nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0982 | | 692 | mpg123<0.59.18nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0982 |
693 | mpg123-esound<0.59.18nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0982 | | 693 | mpg123-esound<0.59.18nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0982 |
694 | mpg123-nas<0.59.18nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0982 | | 694 | mpg123-nas<0.59.18nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0982 |
695 | socat<1.4.0.3 privilege-escalation http://www.nosystem.com.ar/advisories/advisory-07.txt | | 695 | socat<1.4.0.3 privilege-escalation http://www.nosystem.com.ar/advisories/advisory-07.txt |
696 | ruby-base<1.6.8nb7 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0983 | | 696 | ruby-base<1.6.8nb7 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0983 |
697 | gnats<4 privilege-escalation http://www.securityfocus.com/archive/1/326337 | | 697 | gnats<4 privilege-escalation http://www.securityfocus.com/archive/1/326337 |
698 | mozilla<1.7.3nb2 local-file-write http://secunia.com/advisories/12956/ | | 698 | mozilla<1.7.3nb2 local-file-write http://secunia.com/advisories/12956/ |
699 | mozilla-bin<1.7.3nb1 local-file-write http://secunia.com/advisories/12956/ | | 699 | mozilla-bin<1.7.3nb1 local-file-write http://secunia.com/advisories/12956/ |
700 | mozilla-gtk2<1.7.3nb2 local-file-write http://secunia.com/advisories/12956/ | | 700 | mozilla-gtk2<1.7.3nb2 local-file-write http://secunia.com/advisories/12956/ |
701 | MozillaFirebird{,-gtk2}{,-bin}<1.0 local-file-write http://secunia.com/advisories/12956/ | | 701 | MozillaFirebird{,-gtk2}{,-bin}<1.0 local-file-write http://secunia.com/advisories/12956/ |
702 | firefox<1.0 local-file-write http://secunia.com/advisories/12956/ | | 702 | firefox<1.0 local-file-write http://secunia.com/advisories/12956/ |
703 | firefox-bin<1.0 local-file-write http://secunia.com/advisories/12956/ | | 703 | firefox-bin<1.0 local-file-write http://secunia.com/advisories/12956/ |
704 | firefox-gtk2<1.0 local-file-write http://secunia.com/advisories/12956/ | | 704 | firefox-gtk2<1.0 local-file-write http://secunia.com/advisories/12956/ |
705 | firefox-gtk2-bin<1.0 local-file-write http://secunia.com/advisories/12956/ | | 705 | firefox-gtk2-bin<1.0 local-file-write http://secunia.com/advisories/12956/ |
706 | thunderbird<0.8nb1 local-file-write http://secunia.com/advisories/12956/ | | 706 | thunderbird<0.8nb1 local-file-write http://secunia.com/advisories/12956/ |
707 | thunderbird-gtk2<0.8nb1 local-file-write http://secunia.com/advisories/12956/ | | 707 | thunderbird-gtk2<0.8nb1 local-file-write http://secunia.com/advisories/12956/ |
708 | thunderbird-bin<0.8nb1 local-file-write http://secunia.com/advisories/12956/ | | 708 | thunderbird-bin<0.8nb1 local-file-write http://secunia.com/advisories/12956/ |
709 | sudo<1.6.8pl3 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1051 | | 709 | sudo<1.6.8pl3 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1051 |
710 | gnats<4.0.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0623 | | 710 | gnats<4.0.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0623 |
711 | freeradius<1.0.1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0938 | | 711 | freeradius<1.0.1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0938 |
712 | freeradius<1.0.1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0960 | | 712 | freeradius<1.0.1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0960 |
713 | freeradius<1.0.1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0961 | | 713 | freeradius<1.0.1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0961 |
714 | samba<2.2.12nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930 | | 714 | samba<2.2.12nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930 |
715 | samba<2.2.12nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882 | | 715 | samba<2.2.12nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882 |
716 | samba<2.2.12nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154 | | 716 | samba<2.2.12nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154 |
717 | samba-3.0.[0-6]{,nb*} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930 | | 717 | samba-3.0.[0-6]{,nb*} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930 |
718 | samba-3.0.[0-7]{,nb*} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882 | | 718 | samba-3.0.[0-7]{,nb*} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882 |
719 | samba-3.0.[0-9]{,nb*} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154 | | 719 | samba-3.0.[0-9]{,nb*} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154 |
720 | ja-samba-[0-9]* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930 | | 720 | ja-samba-[0-9]* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930 |
721 | ja-samba<2.2.12.0.9.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882 | | 721 | ja-samba<2.2.12.0.9.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882 |
722 | ja-samba<2.2.12.0.9.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154 | | 722 | ja-samba<2.2.12.0.9.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154 |
723 | squirrelmail<1.4.3anb1 cross-site-scripting http://article.gmane.org/gmane.mail.squirrelmail.user/21169 | | 723 | squirrelmail<1.4.3anb1 cross-site-scripting http://article.gmane.org/gmane.mail.squirrelmail.user/21169 |
724 | ja-squirrelmail<1.4.3anb3 cross-site-scripting http://article.gmane.org/gmane.mail.squirrelmail.user/21169 | | 724 | ja-squirrelmail<1.4.3anb3 cross-site-scripting http://article.gmane.org/gmane.mail.squirrelmail.user/21169 |
725 | snownews<1.5 unsafe-umask http://kiza.kcore.de/software/snownews/changes#150 | | 725 | snownews<1.5 unsafe-umask http://kiza.kcore.de/software/snownews/changes#150 |
726 | liferea<0.6.2 unsafe-umask http://sourceforge.net/project/shownotes.php?release_id=282434 | | 726 | liferea<0.6.2 unsafe-umask http://sourceforge.net/project/shownotes.php?release_id=282434 |
727 | libxml2<2.6.14 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989 | | 727 | libxml2<2.6.14 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989 |
728 | libxml<1.8.17nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989 | | 728 | libxml<1.8.17nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989 |
729 | sun-{jre,jdk}14<2.6 remote-code-execution http://sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1 | | 729 | sun-{jre,jdk}14<2.6 remote-code-execution http://sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1 |
730 | sun-{jre,jdk}13<1.0.12nb1 remote-code-execution http://sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1 | | 730 | sun-{jre,jdk}13<1.0.12nb1 remote-code-execution http://sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1 |
731 | xpdf<3.00pl1 remote-code-execution http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml | | 731 | xpdf<3.00pl1 remote-code-execution http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml |
732 | php-curl<4.3.2 local-file-read http://www.securityfocus.com/bid/11557 | | 732 | php-curl<4.3.2 local-file-read http://www.securityfocus.com/bid/11557 |
733 | jabberd-2.0s[23]* remote-code-execution http://www.securityfocus.com/archive/1/382250 | | 733 | jabberd-2.0s[23]* remote-code-execution http://www.securityfocus.com/archive/1/382250 |
734 | jabberd-2.0s4 remote-code-execution http://www.securityfocus.com/archive/1/382250 | | 734 | jabberd-2.0s4 remote-code-execution http://www.securityfocus.com/archive/1/382250 |
735 | jabberd<1.4.2nb4 denial-of-service http://www.securityfocus.com/archive/1/375955 | | 735 | jabberd<1.4.2nb4 denial-of-service http://www.securityfocus.com/archive/1/375955 |
736 | imlib<1.9.15 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1025 | | 736 | imlib<1.9.15 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1025 |
737 | imlib<1.9.15nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1026 | | 737 | imlib<1.9.15nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1026 |
738 | kdelibs<3.3.2nb1 plain-text-password-exposure http://www.kde.org/info/security/advisory-20041209-1.txt | | 738 | kdelibs<3.3.2nb1 plain-text-password-exposure http://www.kde.org/info/security/advisory-20041209-1.txt |
739 | kdegraphics<3.3.2 denial-of-service http://www.kde.org/info/security/advisory-20041209-2.txt | | 739 | kdegraphics<3.3.2 denial-of-service http://www.kde.org/info/security/advisory-20041209-2.txt |
740 | kdelibs<3.3.2nb2 cross-site-scripting http://www.kde.org/info/security/advisory-20041213-1.txt | | 740 | kdelibs<3.3.2nb2 cross-site-scripting http://www.kde.org/info/security/advisory-20041213-1.txt |
741 | kdebase<3.3.2nb1 cross-site-scripting http://www.kde.org/info/security/advisory-20041213-1.txt | | 741 | kdebase<3.3.2nb1 cross-site-scripting http://www.kde.org/info/security/advisory-20041213-1.txt |
742 | phpmyadmin-2.6.0-pl2 remote-code-execution http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 | | 742 | phpmyadmin-2.6.0-pl2 remote-code-execution http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 |
743 | phpmyadmin-2.6.0pl2 remote-code-execution http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 | | 743 | phpmyadmin-2.6.0pl2 remote-code-execution http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 |
744 | phpmyadmin-2.[4-5]* remote-file-read http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 | | 744 | phpmyadmin-2.[4-5]* remote-file-read http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 |
745 | phpmyadmin-2.6.0 remote-file-read http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 | | 745 | phpmyadmin-2.6.0 remote-file-read http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 |
746 | phpmyadmin-2.6.0pl2 remote-file-read http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 | | 746 | phpmyadmin-2.6.0pl2 remote-file-read http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 |
747 | phpmyadmin-2.6.0-pl* remote-file-read http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 | | 747 | phpmyadmin-2.6.0-pl* remote-file-read http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 |
748 | namazu<2.0.14 cross-site-scripting http://www.namazu.org/security.html.en | | 748 | namazu<2.0.14 cross-site-scripting http://www.namazu.org/security.html.en |
749 | {ap-,}php<4.3.10 remote-code-execution http://www.hardened-php.net/advisories/012004.txt | | 749 | {ap-,}php<4.3.10 remote-code-execution http://www.hardened-php.net/advisories/012004.txt |
750 | {ap-,}php-5.0.2* remote-code-execution http://www.hardened-php.net/advisories/012004.txt | | 750 | {ap-,}php-5.0.2* remote-code-execution http://www.hardened-php.net/advisories/012004.txt |
751 | {ap-,}php<4.3.10 local-code-execution http://www.hardened-php.net/advisories/012004.txt | | 751 | {ap-,}php<4.3.10 local-code-execution http://www.hardened-php.net/advisories/012004.txt |
752 | {ap-,}php-5.0.2* local-code-execution http://www.hardened-php.net/advisories/012004.txt | | 752 | {ap-,}php-5.0.2* local-code-execution http://www.hardened-php.net/advisories/012004.txt |
753 | cyrus-imapd-2.2.[4-8]{,nb*} remote-code-execution http://security.e-matters.de/advisories/152004.txt | | 753 | cyrus-imapd-2.2.[4-8]{,nb*} remote-code-execution http://security.e-matters.de/advisories/152004.txt |
754 | cyrus-imapd-2.2.[0-5]{,nb*} remote-code-execution http://security.e-matters.de/advisories/152004.txt | | 754 | cyrus-imapd-2.2.[0-5]{,nb*} remote-code-execution http://security.e-matters.de/advisories/152004.txt |
755 | cyrus-imapd-2.2.[0-7]{,nb*} remote-code-execution http://security.e-matters.de/advisories/152004.txt | | 755 | cyrus-imapd-2.2.[0-7]{,nb*} remote-code-execution http://security.e-matters.de/advisories/152004.txt |
756 | cyrus-imapd-2.2.[7-8]{,nb*} remote-code-execution http://security.e-matters.de/advisories/152004.txt | | 756 | cyrus-imapd-2.2.[7-8]{,nb*} remote-code-execution http://security.e-matters.de/advisories/152004.txt |
757 | cyrus-imapd-2.2.[0-9]{,nb*} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0546 | | 757 | cyrus-imapd-2.2.[0-9]{,nb*} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0546 |
758 | cyrus-imapd-2.2.1[0-1]{,nb*} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0546 | | 758 | cyrus-imapd-2.2.1[0-1]{,nb*} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0546 |
759 | cyrus-imapd<2.1.18 remote-code-execution http://security.e-matters.de/advisories/152004.txt | | 759 | cyrus-imapd<2.1.18 remote-code-execution http://security.e-matters.de/advisories/152004.txt |
760 | cyrus-imapd<2.1.18 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0546 | | 760 | cyrus-imapd<2.1.18 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0546 |
761 | ethereal-0.9.* remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00016.html | | 761 | ethereal-0.9.* remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00016.html |
762 | ethereal-0.10.[0-7]{,nb*} remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00016.html | | 762 | ethereal-0.10.[0-7]{,nb*} remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00016.html |
763 | tcpdump<3.8.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0989 | | 763 | tcpdump<3.8.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0989 |
764 | tcpdump<3.8.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0057 | | 764 | tcpdump<3.8.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0057 |
765 | tcpdump<3.8.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0183 | | 765 | tcpdump<3.8.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0183 |
766 | tcpdump<3.8.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0184 | | 766 | tcpdump<3.8.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0184 |
767 | mc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0226 | | 767 | mc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0226 |
768 | gmc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0226 | | 768 | gmc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0226 |
769 | mc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0231 | | 769 | mc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0231 |
770 | gmc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0231 | | 770 | gmc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0231 |
771 | mc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0232 | | 771 | mc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0232 |
772 | gmc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0232 | | 772 | gmc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0232 |
773 | netpbm<9.26 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0924 | | 773 | netpbm<9.26 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0924 |
774 | pwlib<1.6.0 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0097 | | 774 | pwlib<1.6.0 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0097 |
775 | leafnode<1.9.48 denial-of-service http://leafnode.sourceforge.net/leafnode-SA-2004-01 | | 775 | leafnode<1.9.48 denial-of-service http://leafnode.sourceforge.net/leafnode-SA-2004-01 |
776 | lbreakout<2.4beta2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0158 | | 776 | lbreakout<2.4beta2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0158 |
777 | ap-python<2.7.9 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0973 | | 777 | ap-python<2.7.9 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0973 |
778 | logcheck<1.1.1 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0404 | | 778 | logcheck<1.1.1 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0404 |
779 | zope<2.5.2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0688 | | 779 | zope<2.5.2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0688 |
780 | flim<1.14.3 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0422 | | 780 | flim<1.14.3 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0422 |
781 | gnome-vfs<1.0.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0494 | | 781 | gnome-vfs<1.0.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0494 |
782 | cups<1.1.21 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0558 | | 782 | cups<1.1.21 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0558 |
783 | openoffice<1.1.3 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0752 | | 783 | openoffice<1.1.3 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0752 |
784 | openoffice-linux<1.1.3 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0752 | | 784 | openoffice-linux<1.1.3 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0752 |
785 | imlib<1.9.15 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0817 | | 785 | imlib<1.9.15 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0817 |
786 | apache-2.0.51* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0811 | | 786 | apache-2.0.51* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0811 |
787 | mysql-server<3.23.59 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 | | 787 | mysql-server<3.23.59 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 |
788 | mysql-server-4.0.[0-9] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 | | 788 | mysql-server-4.0.[0-9] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 |
789 | mysql-server-4.0.[0-9]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 | | 789 | mysql-server-4.0.[0-9]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 |
790 | mysql-server-4.0.1[0-8] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 | | 790 | mysql-server-4.0.1[0-8] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 |
791 | mysql-server-4.0.1[0-8]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 | | 791 | mysql-server-4.0.1[0-8]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 |
792 | mysql-server-4.1.[01] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 | | 792 | mysql-server-4.1.[01] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 |
793 | mysql-server-4.1.[01]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 | | 793 | mysql-server-4.1.[01]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 |
794 | mysql-server<3.23.49 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 | | 794 | mysql-server<3.23.49 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 |
795 | mysql-server-4.0.[0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 | | 795 | mysql-server-4.0.[0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 |
796 | mysql-server-4.0.[0-9]nb* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 | | 796 | mysql-server-4.0.[0-9]nb* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 |
797 | mysql-server-4.0.1[0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 | | 797 | mysql-server-4.0.1[0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 |
798 | mysql-server-4.0.1[0-9]nb* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 | | 798 | mysql-server-4.0.1[0-9]nb* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 |
799 | mysql-server-4.0.20 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 | | 799 | mysql-server-4.0.20 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 |
800 | mysql-server-4.0.20nb* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 | | 800 | mysql-server-4.0.20nb* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 |
801 | mysql-server<3.23.49 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 | | 801 | mysql-server<3.23.49 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 |
802 | mysql-server-4.0.[0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 | | 802 | mysql-server-4.0.[0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 |
803 | mysql-server-4.0.[0-9]nb* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 | | 803 | mysql-server-4.0.[0-9]nb* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 |
804 | mysql-server-4.0.1[0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 | | 804 | mysql-server-4.0.1[0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 |
805 | mysql-server-4.0.1[0-9]nb* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 | | 805 | mysql-server-4.0.1[0-9]nb* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 |
806 | mysql-server-4.0.20 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 | | 806 | mysql-server-4.0.20 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 |
807 | mysql-server-4.0.20nb* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 | | 807 | mysql-server-4.0.20nb* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 |
808 | cyrus-sasl<2.1.19 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0884 | | 808 | cyrus-sasl<2.1.19 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0884 |
809 | cups<1.1.21 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888 | | 809 | cups<1.1.21 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888 |
810 | cups<1.1.21 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0889 | | 810 | cups<1.1.21 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0889 |
811 | cups<1.1.21 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0923 | | 811 | cups<1.1.21 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0923 |
812 | apache-2.0.3[5-9] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 | | 812 | apache-2.0.3[5-9] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 |
813 | apache-2.0.3[5-9]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 | | 813 | apache-2.0.3[5-9]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 |
814 | apache-2.0.4[0-9] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 | | 814 | apache-2.0.4[0-9] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 |
815 | apache-2.0.4[0-9]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 | | 815 | apache-2.0.4[0-9]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 |
816 | apache-2.0.5[0-2] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 | | 816 | apache-2.0.5[0-2] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 |
817 | apache-2.0.5[0-2]nb[1-4] weak-cryptography http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 | | 817 | apache-2.0.5[0-2]nb[1-4] weak-cryptography http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 |
818 | openmotif<2.1.30nb3 denial-of-service http://www.ics.com/developers/index.php?cont=xpm_security_alert | | 818 | openmotif<2.1.30nb3 denial-of-service http://www.ics.com/developers/index.php?cont=xpm_security_alert |
819 | catdoc<0.91.5-2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0193 | | 819 | catdoc<0.91.5-2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0193 |
820 | gd<2.0.22 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0941 | | 820 | gd<2.0.22 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0941 |
821 | gd<2.0.28 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0990 | | 821 | gd<2.0.28 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0990 |
822 | ImageMagick<6.1.0 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0981 | | 822 | ImageMagick<6.1.0 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0981 |
823 | lesstif<0.93.96 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 | | 823 | lesstif<0.93.96 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 |
824 | lesstif<0.93.96 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 | | 824 | lesstif<0.93.96 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 |
825 | lesstif<0.94.0 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 | | 825 | lesstif<0.94.0 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 |
826 | xorg-libs<6.8.1nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 | | 826 | xorg-libs<6.8.1nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 |
827 | XFree86-libs<4.4.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 | | 827 | XFree86-libs<4.4.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 |
828 | xpm<3.4nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 | | 828 | xpm<3.4nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 |
829 | groff<1.19.1nb2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0969 | | 829 | groff<1.19.1nb2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0969 |
830 | zip<2.3nb3 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1010 | | 830 | zip<2.3nb3 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1010 |
831 | openssl<0.9.6mnb2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0975 | | 831 | openssl<0.9.6mnb2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0975 |
832 | mplayer<1.0rc5pl2 remote-code-execution http://www.idefense.com/application/poi/display?id=166&type=vulnerabilities | | 832 | mplayer<1.0rc5pl2 remote-code-execution http://www.idefense.com/application/poi/display?id=166&type=vulnerabilities |
833 | mplayer<1.0rc5pl2 remote-code-execution http://www.idefense.com/application/poi/display?id=167&type=vulnerabilities | | 833 | mplayer<1.0rc5pl2 remote-code-execution http://www.idefense.com/application/poi/display?id=167&type=vulnerabilities |
834 | mplayer<1.0rc5pl2 remote-code-execution http://www.idefense.com/application/poi/display?id=168&type=vulnerabilities | | 834 | mplayer<1.0rc5pl2 remote-code-execution http://www.idefense.com/application/poi/display?id=168&type=vulnerabilities |
835 | cscope<15.4nb4 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0996 | | 835 | cscope<15.4nb4 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0996 |
836 | acroread5<5.10 remote-code-execution http://www.adobe.com/support/techdocs/331153.html | | 836 | acroread5<5.10 remote-code-execution http://www.adobe.com/support/techdocs/331153.html |
837 | a2ps<4.13.0.2nb5 unsafe-shell-escape http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1170 | | 837 | a2ps<4.13.0.2nb5 unsafe-shell-escape http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1170 |
838 | a2ps<4.13.0.2nb7 local-symlink-race http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1377 | | 838 | a2ps<4.13.0.2nb7 local-symlink-race http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1377 |
839 | mc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-1023 | | 839 | mc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-1023 |
840 | tiff<3.6.1nb6 buffer-overrun http://www.idefense.com/application/poi/display?id=173&type=vulnerabilities | | 840 | tiff<3.6.1nb6 buffer-overrun http://www.idefense.com/application/poi/display?id=173&type=vulnerabilities |
841 | xpdf<3.00pl2 remote-code-execution http://www.idefense.com/application/poi/display?id=172&type=vulnerabilities | | 841 | xpdf<3.00pl2 remote-code-execution http://www.idefense.com/application/poi/display?id=172&type=vulnerabilities |
842 | xzgv<0.8.0.1 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0994 | | 842 | xzgv<0.8.0.1 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0994 |
843 | xine-lib-1rc[2-5]* remote-code-execution http://www.xinehq.de/index.php/security/XSA-2004-4 | | 843 | xine-lib-1rc[2-5]* remote-code-execution http://www.xinehq.de/index.php/security/XSA-2004-4 |
844 | xine-lib<1rc6 remote-code-execution http://www.xinehq.de/index.php/security/XSA-2004-5 | | 844 | xine-lib<1rc6 remote-code-execution http://www.xinehq.de/index.php/security/XSA-2004-5 |
845 | gpdf<2.8.1 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888 | | 845 | gpdf<2.8.1 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888 |
846 | koffice<1.3.5 integer-overflow http://kde.org/areas/koffice/releases/1.3.4-release.php | | 846 | koffice<1.3.5 integer-overflow http://kde.org/areas/koffice/releases/1.3.4-release.php |
847 | pdfTexinteTexbin<perhaps integer-overflow http://www.tug.org/applications/pdftex/NEWS | | 847 | pdfTexinteTexbin<perhaps integer-overflow http://www.tug.org/applications/pdftex/NEWS |
848 | opera<7.54pl1 remote-code-execution http://archives.neohapsis.com/archives/bugtraq/2004-11/0250.html | | 848 | opera<7.54pl1 remote-code-execution http://archives.neohapsis.com/archives/bugtraq/2004-11/0250.html |
849 | wget<1.9 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1487 | | 849 | wget<1.9 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1487 |
850 | p5-Tk<804.027nb2 remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt | | 850 | p5-Tk<804.027nb2 remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt |
851 | xine-lib<1rc6anb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1187 | | 851 | xine-lib<1rc6anb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1187 |
852 | xine-lib<1rc6anb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1188 | | 852 | xine-lib<1rc6anb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1188 |
853 | {ap-,}php<4.3.9 remote-memory-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0958 | | 853 | {ap-,}php<4.3.9 remote-memory-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0958 |
854 | {ap-,}php-5.0.[01]* remote-memory-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0958 | | 854 | {ap-,}php-5.0.[01]* remote-memory-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0958 |
855 | {ap-,}php<4.3.9 remote-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0959 | | 855 | {ap-,}php<4.3.9 remote-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0959 |
856 | {ap-,}php-5.0.[01]* remote-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0959 | | 856 | {ap-,}php-5.0.[01]* remote-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0959 |
857 | {ap-,}php<4.3.10 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1065 | | 857 | {ap-,}php<4.3.10 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1065 |
858 | {ap-,}php-5.0.[012]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1065 | | 858 | {ap-,}php-5.0.[012]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1065 |
859 | {ap-,}php<4.3.10 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1019 | | 859 | {ap-,}php<4.3.10 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1019 |
860 | {ap-,}php-5.0.[012]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1019 | | 860 | {ap-,}php-5.0.[012]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1019 |
861 | kdelibs<3.3.2 remote-code-execution http://www.kde.org/info/security/advisory-20041220-1.txt | | 861 | kdelibs<3.3.2 remote-code-execution http://www.kde.org/info/security/advisory-20041220-1.txt |
862 | kdegraphics<3.3.2nb1 remote-code-execution http://www.kde.org/info/security/advisory-20041223-1.txt | | 862 | kdegraphics<3.3.2nb1 remote-code-execution http://www.kde.org/info/security/advisory-20041223-1.txt |
863 | mit-krb5<1.3.6 remote-code-execution http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt | | 863 | mit-krb5<1.3.6 remote-code-execution http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt |
864 | snort-2.1.[3-9]* denial-of-service http://www.webservertalk.com/message416634.html | | 864 | snort-2.1.[3-9]* denial-of-service http://www.webservertalk.com/message416634.html |
865 | snort-mysql-2.1.[3-9]* denial-of-service http://www.webservertalk.com/message416634.html | | 865 | snort-mysql-2.1.[3-9]* denial-of-service http://www.webservertalk.com/message416634.html |
866 | snort-pgsql-2.1.[3-9]* denial-of-service http://www.webservertalk.com/message416634.html | | 866 | snort-pgsql-2.1.[3-9]* denial-of-service http://www.webservertalk.com/message416634.html |
867 | snort-2.2.0 denial-of-service http://www.webservertalk.com/message416634.html | | 867 | snort-2.2.0 denial-of-service http://www.webservertalk.com/message416634.html |
868 | snort-mysql-2.2.0 denial-of-service http://www.webservertalk.com/message416634.html | | 868 | snort-mysql-2.2.0 denial-of-service http://www.webservertalk.com/message416634.html |
869 | snort-pgsql-2.2.0 denial-of-service http://www.webservertalk.com/message416634.html | | 869 | snort-pgsql-2.2.0 denial-of-service http://www.webservertalk.com/message416634.html |
870 | tcpdump<0.21 privilege-escalation http://www.atstake.com/research/advisories/2003/a080703-2.txt | | 870 | tcpdump<0.21 privilege-escalation http://www.atstake.com/research/advisories/2003/a080703-2.txt |
871 | asp2php-[0-9]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1261 | | 871 | asp2php-[0-9]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1261 |
872 | chbg<=1.5 remote-code-execution http://tigger.uic.edu/~jlongs2/holes/chbg.txt | | 872 | chbg<=1.5 remote-code-execution http://tigger.uic.edu/~jlongs2/holes/chbg.txt |
873 | xlreader<0.9.0nb1 remote-code-execution http://tigger.uic.edu/~jlongs2/holes/xlreader.txt | | 873 | xlreader<0.9.0nb1 remote-code-execution http://tigger.uic.edu/~jlongs2/holes/xlreader.txt |
874 | cups<1.1.23rc1 denial-of-service http://www.cups.org/str.php?L1023 | | 874 | cups<1.1.23rc1 denial-of-service http://www.cups.org/str.php?L1023 |
875 | cups<1.1.23rc1 remote-code-execution http://www.cups.org/str.php?L1024 | | 875 | cups<1.1.23rc1 remote-code-execution http://www.cups.org/str.php?L1024 |
876 | mozilla<1.7.5 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt | | 876 | mozilla<1.7.5 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt |
877 | mozilla-bin<1.7.5 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt | | 877 | mozilla-bin<1.7.5 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt |
878 | mozilla-gtk2<1.7.5 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt | | 878 | mozilla-gtk2<1.7.5 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt |
879 | thunderbird<1.0 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt | | 879 | thunderbird<1.0 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt |
880 | thunderbird-bin<1.0 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt | | 880 | thunderbird-bin<1.0 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt |
881 | thunderbird-gtk2<1.0 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt | | 881 | thunderbird-gtk2<1.0 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt |
882 | cups<1.1.23 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125 | | 882 | cups<1.1.23 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125 |
883 | perl{,-thread}<5.6.2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0452 | | 883 | perl{,-thread}<5.6.2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0452 |
884 | perl{,-thread}-5.6.[0-9]* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448 | | 884 | perl{,-thread}-5.6.[0-9]* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448 |
885 | perl{,-thread}-5.8.[0-4]{,nb*}* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0452 | | 885 | perl{,-thread}-5.8.[0-4]{,nb*}* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0452 |
886 | perl{,-thread}-5.8.[0-4]{,nb*}* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448 | | 886 | perl{,-thread}-5.8.[0-4]{,nb*}* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448 |
887 | perl{,-thread}-5.8.5{,nb[123456]} local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0976 | | 887 | perl{,-thread}-5.8.5{,nb[123456]} local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0976 |
888 | perl{,-thread}-5.8.6 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0976 | | 888 | perl{,-thread}-5.8.6 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0976 |
889 | kdelibs<3.3.2nb6 remote-code-execution http://www.kde.org/info/security/advisory-20050101-1.txt | | 889 | kdelibs<3.3.2nb6 remote-code-execution http://www.kde.org/info/security/advisory-20050101-1.txt |
890 | xine-lib<1rc6anb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1300 | | 890 | xine-lib<1rc6anb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1300 |
891 | xine-lib-1rc8{,nb1} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1300 | | 891 | xine-lib-1rc8{,nb1} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1300 |
892 | nasm<0.98.39 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1287 | | 892 | nasm<0.98.39 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1287 |
893 | bugzilla<2.18rc3nb1 cross-site-scripting https://bugzilla.mozilla.org/show_bug.cgi?id=272620 | | 893 | bugzilla<2.18rc3nb1 cross-site-scripting https://bugzilla.mozilla.org/show_bug.cgi?id=272620 |
894 | exim<3.36nb7 remote-code-execution http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html | | 894 | exim<3.36nb7 remote-code-execution http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html |
895 | exim>=4<4.43nb2 remote-code-execution http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html | | 895 | exim>=4<4.43nb2 remote-code-execution http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html |
896 | exim-exiscan<4.43nb2 remote-code-execution http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html | | 896 | exim-exiscan<4.43nb2 remote-code-execution http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html |
897 | vim<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 | | 897 | vim<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 |
898 | vim-gtk<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 | | 898 | vim-gtk<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 |
899 | vim-gtk2<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 | | 899 | vim-gtk2<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 |
900 | vim-kde<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 | | 900 | vim-kde<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 |
901 | vim-motif<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 | | 901 | vim-motif<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 |
902 | vim-xaw<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 | | 902 | vim-xaw<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 |
903 | pcal<4.7nb1 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1289 | | 903 | pcal<4.7nb1 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1289 |
904 | tnftp<20050103 remote-code-execution http://tigger.uic.edu/~jlongs2/holes/tnftp.txt | | 904 | tnftp<20050103 remote-code-execution http://tigger.uic.edu/~jlongs2/holes/tnftp.txt |
905 | napshare<1.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1286 | | 905 | napshare<1.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1286 |
906 | yamt<0.5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1302 | | 906 | yamt<0.5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1302 |
907 | cups-1.1.2[12]* denial-of-service http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042 | | 907 | cups-1.1.2[12]* denial-of-service http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042 |
908 | dillo<0.8.3nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0012 | | 908 | dillo<0.8.3nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0012 |
909 | tiff<3.6.1nb6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1308 | | 909 | tiff<3.6.1nb6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1308 |
910 | mpg123<0.59.18nb7 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1284 | | 910 | mpg123<0.59.18nb7 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1284 |
911 | mpg123-esound<0.59.18nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1284 | | 911 | mpg123-esound<0.59.18nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1284 |
912 | mpg123-nas<0.59.18nb6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1284 | | 912 | mpg123-nas<0.59.18nb6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1284 |
913 | mpg123<0.59.18nb7 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0991 | | 913 | mpg123<0.59.18nb7 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0991 |
914 | mpg123-esound<0.59.18nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0991 | | 914 | mpg123-esound<0.59.18nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0991 |
915 | mpg123-nas<0.59.18nb6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0991 | | 915 | mpg123-nas<0.59.18nb6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0991 |
916 | hylafax<4.2.1 weak-acl-enforcement http://www.hylafax.org/4.2.1.html | | 916 | hylafax<4.2.1 weak-acl-enforcement http://www.hylafax.org/4.2.1.html |
917 | teTeX-bin<2.0.2nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125 | | 917 | teTeX-bin<2.0.2nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125 |
918 | teTeX-bin<2.0.2nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888 | | 918 | teTeX-bin<2.0.2nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888 |
919 | awstats<6.3 local-code-execution http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities | | 919 | awstats<6.3 local-code-execution http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities |
920 | ImageMagick<6.1.8.8 remote-code-execution http://www.idefense.com/application/poi/display?id=184&type=vulnerabilities | | 920 | ImageMagick<6.1.8.8 remote-code-execution http://www.idefense.com/application/poi/display?id=184&type=vulnerabilities |
921 | xpdf<3.00pl3 remote-code-execution http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities | | 921 | xpdf<3.00pl3 remote-code-execution http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities |
922 | cups<1.1.23nb1 remote-code-execution http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities | | 922 | cups<1.1.23nb1 remote-code-execution http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities |
923 | kdegraphics<3.3.2nb3 remote-code-execution http://www.kde.org/info/security/advisory-20050119-1.txt | | 923 | kdegraphics<3.3.2nb3 remote-code-execution http://www.kde.org/info/security/advisory-20050119-1.txt |
924 | mysql-client<3.23.58nb3 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 | | 924 | mysql-client<3.23.58nb3 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 |
925 | mysql-client-4.0.[0-9]{,nb*} local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 | | 925 | mysql-client-4.0.[0-9]{,nb*} local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 |
926 | mysql-client-4.0.1[0-9]* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 | | 926 | mysql-client-4.0.1[0-9]* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 |
927 | mysql-client-4.0.2[0-2]* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 | | 927 | mysql-client-4.0.2[0-2]* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 |
928 | mysql-client-4.0.23 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 | | 928 | mysql-client-4.0.23 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 |
929 | mysql-client-4.1.[0-8]{,nb*} local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 | | 929 | mysql-client-4.1.[0-8]{,nb*} local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 |
930 | mysql-client-4.1.9 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 | | 930 | mysql-client-4.1.9 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 |
931 | ethereal<0.10.9 denial-of-service http://ethereal.com/appnotes/enpa-sa-00017.html | | 931 | ethereal<0.10.9 denial-of-service http://ethereal.com/appnotes/enpa-sa-00017.html |
932 | ethereal<0.10.9 remote-code-execution http://ethereal.com/appnotes/enpa-sa-00017.html | | 932 | ethereal<0.10.9 remote-code-execution http://ethereal.com/appnotes/enpa-sa-00017.html |
933 | koffice<1.3.5nb4 remote-code-execution http://www.kde.org/info/security/advisory-20050120-1.txt | | 933 | koffice<1.3.5nb4 remote-code-execution http://www.kde.org/info/security/advisory-20050120-1.txt |
934 | squid<2.5.7nb5 buffer-overrun http://www.squid-cache.org/Advisories/SQUID-2005_1.txt | | 934 | squid<2.5.7nb5 buffer-overrun http://www.squid-cache.org/Advisories/SQUID-2005_1.txt |
935 | squid<2.5.7nb6 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0094 | | 935 | squid<2.5.7nb6 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0094 |
936 | squid<2.5.7nb7 denial-of-service http://www.squid-cache.org/Advisories/SQUID-2005_2.txt | | 936 | squid<2.5.7nb7 denial-of-service http://www.squid-cache.org/Advisories/SQUID-2005_2.txt |
937 | squid<2.5.7nb8 denial-of-service http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-response_splitting | | 937 | squid<2.5.7nb8 denial-of-service http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-response_splitting |
938 | unarj<2.65nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0947 | | 938 | unarj<2.65nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0947 |
939 | unarj<2.65nb1 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1027 | | 939 | unarj<2.65nb1 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1027 |
940 | suse{,32}_libtiff<9.1nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1308 | | 940 | suse{,32}_libtiff<9.1nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1308 |
941 | suse{,32}_x11<9.1nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 | | 941 | suse{,32}_x11<9.1nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 |
942 | suse{,32}_gtk2<9.1nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753 | | 942 | suse{,32}_gtk2<9.1nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753 |
943 | suse{,32}_gtk2<9.1nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782 | | 943 | suse{,32}_gtk2<9.1nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782 |
944 | suse{,32}_gtk2<9.1nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783 | | 944 | suse{,32}_gtk2<9.1nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783 |
945 | suse{,32}_gtk2<9.1nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788 | | 945 | suse{,32}_gtk2<9.1nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788 |
946 | webmin<1.160 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0559 | | 946 | webmin<1.160 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0559 |
947 | teTeX-bin<2.0.2nb5 remote-code-execution http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities | | 947 | teTeX-bin<2.0.2nb5 remote-code-execution http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities |
948 | sun-{jre,jdk}14<2.6 remote-code-execution http://sunsolve.sun.com/search/document.do?assetkey=1-26-57708-1 | | 948 | sun-{jre,jdk}14<2.6 remote-code-execution http://sunsolve.sun.com/search/document.do?assetkey=1-26-57708-1 |
949 | sun-{jre,jdk}13<1.0.13 remote-code-execution http://sunsolve.sun.com/search/document.do?assetkey=1-26-57708-1 | | 949 | sun-{jre,jdk}13<1.0.13 remote-code-execution http://sunsolve.sun.com/search/document.do?assetkey=1-26-57708-1 |
950 | evolution12<1.2.4nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0102 | | 950 | evolution12<1.2.4nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0102 |
951 | evolution14<1.4.6nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0102 | | 951 | evolution14<1.4.6nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0102 |
952 | evolution<2.0.3nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0102 | | 952 | evolution<2.0.3nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0102 |
953 | enscript<1.6.3nb1 remote-code-execution http://www.securityfocus.org/advisories/7879 | | 953 | enscript<1.6.3nb1 remote-code-execution http://www.securityfocus.org/advisories/7879 |
954 | bind-8.4.[4-5]{,nb*} denial-of-service http://www.kb.cert.org/vuls/id/327633 | | 954 | bind-8.4.[4-5]{,nb*} denial-of-service http://www.kb.cert.org/vuls/id/327633 |
955 | bind-9.3.0 denial-of-service http://www.kb.cert.org/vuls/id/938617 | | 955 | bind-9.3.0 denial-of-service http://www.kb.cert.org/vuls/id/938617 |
956 | squid<2.5.7nb9 cache-poisoning http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-response_splitting | | 956 | squid<2.5.7nb9 cache-poisoning http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-response_splitting |
957 | p5-DBI<1.46nb2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0077 | | 957 | p5-DBI<1.46nb2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0077 |
958 | f2c<20001205nb8 local-file-write http://www.debian.org/security/2005/dsa-661 | | 958 | f2c<20001205nb8 local-file-write http://www.debian.org/security/2005/dsa-661 |
959 | squid<2.5.7nb10 buffer-overrun http://www.squid-cache.org/Advisories/SQUID-2005_3.txt | | 959 | squid<2.5.7nb10 buffer-overrun http://www.squid-cache.org/Advisories/SQUID-2005_3.txt |
960 | zope25-Silva<0.9.2.8 privilege-escalation http://mail.zope.org/pipermail/zope-announce/2005-February/001653.html | | 960 | zope25-Silva<0.9.2.8 privilege-escalation http://mail.zope.org/pipermail/zope-announce/2005-February/001653.html |
961 | postgresql-server-7.3.[1-8]{,nb*} privilege-escalation http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php | | 961 | postgresql-server-7.3.[1-8]{,nb*} privilege-escalation http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php |
962 | postgresql73-server-7.3.[1-8]{,nb*} privilege-escalation http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php | | 962 | postgresql73-server-7.3.[1-8]{,nb*} privilege-escalation http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php |
963 | postgresql74-server-7.4.[1-6]{,nb*} privilege-escalation http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php | | 963 | postgresql74-server-7.4.[1-6]{,nb*} privilege-escalation http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php |
964 | postgresql80-server-8.0.0* privilege-escalation http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php | | 964 | postgresql80-server-8.0.0* privilege-escalation http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php |
965 | perl{,-thread}-5.8.{[0-4]{,nb*},5{,nb[1-7]},6{,nb[12]}} local-root-exploit http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0155 | | 965 | perl{,-thread}-5.8.{[0-4]{,nb*},5{,nb[1-7]},6{,nb[12]}} local-root-exploit http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0155 |
966 | perl{,-thread}-5.8.{[0-4]{,nb*},5{,nb[1-7]},6{,nb[12]}} buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0156 | | 966 | perl{,-thread}-5.8.{[0-4]{,nb*},5{,nb[1-7]},6{,nb[12]}} buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0156 |
967 | gpdf<2.8.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125 | | 967 | gpdf<2.8.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125 |
968 | gpdf<2.8.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064 | | 968 | gpdf<2.8.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064 |
969 | python22<2.2.3nb5 remote-code-execution http://www.python.org/security/PSF-2005-001/ | | 969 | python22<2.2.3nb5 remote-code-execution http://www.python.org/security/PSF-2005-001/ |
970 | python22-pth<2.2.3nb5 remote-code-execution http://www.python.org/security/PSF-2005-001/ | | 970 | python22-pth<2.2.3nb5 remote-code-execution http://www.python.org/security/PSF-2005-001/ |
971 | python23<2.3.4nb7 remote-code-execution http://www.python.org/security/PSF-2005-001/ | | 971 | python23<2.3.4nb7 remote-code-execution http://www.python.org/security/PSF-2005-001/ |
972 | python23-pth<2.3.4nb7 remote-code-execution http://www.python.org/security/PSF-2005-001/ | | 972 | python23-pth<2.3.4nb7 remote-code-execution http://www.python.org/security/PSF-2005-001/ |
973 | python23-nth<2.3.4nb2 remote-code-execution http://www.python.org/security/PSF-2005-001/ | | 973 | python23-nth<2.3.4nb2 remote-code-execution http://www.python.org/security/PSF-2005-001/ |
974 | python24<2.4nb4 remote-code-execution http://www.python.org/security/PSF-2005-001/ | | 974 | python24<2.4nb4 remote-code-execution http://www.python.org/security/PSF-2005-001/ |
975 | python24-pth<2.4nb4 remote-code-execution http://www.python.org/security/PSF-2005-001/ | | 975 | python24-pth<2.4nb4 remote-code-execution http://www.python.org/security/PSF-2005-001/ |
976 | py{15,20,21,22,23,24,25,26,27,31}-xmlrpc<=0.9.8 remote-code-execution http://www.python.org/security/PSF-2005-001/ | | 976 | py{15,20,21,22,23,24,25,26,27,31}-xmlrpc<=0.9.8 remote-code-execution http://www.python.org/security/PSF-2005-001/ |
977 | opera<7.54pl2 remote-code-execution http://secunia.com/advisories/13818/ | | 977 | opera<7.54pl2 remote-code-execution http://secunia.com/advisories/13818/ |
978 | opera<=7.54pl2 www-address-spoof http://secunia.com/advisories/14154/ | | 978 | opera<=7.54pl2 www-address-spoof http://secunia.com/advisories/14154/ |
979 | firefox{,-bin,-gtk2,-gtk2-bin}<=1.0 www-address-spoof http://secunia.com/advisories/14163/ | | 979 | firefox{,-bin,-gtk2,-gtk2-bin}<=1.0 www-address-spoof http://secunia.com/advisories/14163/ |
980 | mozilla{,-bin,-gtk2,-gtk2-bin}<=1.7.5 www-address-spoof http://secunia.com/advisories/14163/ | | 980 | mozilla{,-bin,-gtk2,-gtk2-bin}<=1.7.5 www-address-spoof http://secunia.com/advisories/14163/ |
981 | kdebase<=3.3.2nb1 www-address-spoof http://secunia.com/advisories/14162/ | | 981 | kdebase<=3.3.2nb1 www-address-spoof http://secunia.com/advisories/14162/ |
982 | apache-2.0.5[0-2]{,nb*} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0942 | | 982 | apache-2.0.5[0-2]{,nb*} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0942 |
983 | fprot-workstation-bin<4.5.3 local-code-execution http://www.f-secure.com/security/fsc-2005-1.shtml | | 983 | fprot-workstation-bin<4.5.3 local-code-execution http://www.f-secure.com/security/fsc-2005-1.shtml |
984 | mailman<2.1.4nb3 remote-file-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0202 | | 984 | mailman<2.1.4nb3 remote-file-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0202 |
985 | awstats<=6.3nb3 denial-of-service http://www.securityfocus.com/archive/1/390368 | | 985 | awstats<=6.3nb3 denial-of-service http://www.securityfocus.com/archive/1/390368 |
986 | awstats<=6.3nb3 remote-code-execution http://www.securityfocus.com/archive/1/390368 | | 986 | awstats<=6.3nb3 remote-code-execution http://www.securityfocus.com/archive/1/390368 |
987 | sympa<=4.1.2nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0073 | | 987 | sympa<=4.1.2nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0073 |
988 | bidwatcher<1.3.17 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0158 | | 988 | bidwatcher<1.3.17 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0158 |
989 | kdeedu<=3.3.2 privilege-escalation http://www.kde.org/info/security/advisory-20050215-1.txt | | 989 | kdeedu<=3.3.2 privilege-escalation http://www.kde.org/info/security/advisory-20050215-1.txt |
990 | emacs-21.[0-2]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 990 | emacs-21.[0-2]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
991 | emacs-21.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 991 | emacs-21.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
992 | emacs-21.3nb[0-6] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 992 | emacs-21.3nb[0-6] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
993 | emacs-nox11-21.[0-2]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 993 | emacs-nox11-21.[0-2]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
994 | emacs-nox11-21.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 994 | emacs-nox11-21.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
995 | emacs-nox11-21.3nb[0-1] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 995 | emacs-nox11-21.3nb[0-1] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
996 | emacs<20.7nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 996 | emacs<20.7nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
997 | xemacs<21.4.17 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 997 | xemacs<21.4.17 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
998 | xemacs-nox11<21.4.17 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 998 | xemacs-nox11<21.4.17 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
999 | xview-lib<3.2.1nb4 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0076 | | 999 | xview-lib<3.2.1nb4 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0076 |
1000 | clamav<0.82 denial-of-service http://www.securityfocus.com/bid/12408?ref=rss | | 1000 | clamav<0.82 denial-of-service http://www.securityfocus.com/bid/12408?ref=rss |
| @@ -22562,2000 +22562,2000 @@ py{27,36,37,38,39,310}-celery<5.2.2 comm | | | @@ -22562,2000 +22562,2000 @@ py{27,36,37,38,39,310}-celery<5.2.2 comm |
22562 | py{27,36,37,38,39,310}-nltk<3.6.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-43854 | | 22562 | py{27,36,37,38,39,310}-nltk<3.6.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-43854 |
22563 | py{27,36,37,38,39,310}-ujson-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-45958 | | 22563 | py{27,36,37,38,39,310}-ujson-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-45958 |
22564 | qt5-qtsvg-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-45930 | | 22564 | qt5-qtsvg-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-45930 |
22565 | qt6-qtsvg<6.2.2 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-45930 | | 22565 | qt6-qtsvg<6.2.2 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-45930 |
22566 | ruby26-base<2.6.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-41817 | | 22566 | ruby26-base<2.6.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-41817 |
22567 | ruby27-base<2.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-41817 | | 22567 | ruby27-base<2.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-41817 |
22568 | ruby30-base<3.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-41817 | | 22568 | ruby30-base<3.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-41817 |
22569 | ruby26-base<2.6.9 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2021-41819 | | 22569 | ruby26-base<2.6.9 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2021-41819 |
22570 | ruby27-base<2.7.5 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2021-41819 | | 22570 | ruby27-base<2.7.5 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2021-41819 |
22571 | ruby30-base<3.0.3 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2021-41819 | | 22571 | ruby30-base<3.0.3 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2021-41819 |
22572 | unicorn<2.0.0rc5 sandbox-escape https://nvd.nist.gov/vuln/detail/CVE-2021-44078 | | 22572 | unicorn<2.0.0rc5 sandbox-escape https://nvd.nist.gov/vuln/detail/CVE-2021-44078 |
22573 | vim<8.2.3884 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-4166 | | 22573 | vim<8.2.3884 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-4166 |
22574 | vim<8.2.3902 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-4173 | | 22574 | vim<8.2.3902 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-4173 |
22575 | vim<8.2.3923 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-4187 | | 22575 | vim<8.2.3923 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-4187 |
22576 | vim<8.2.3949 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-4192 | | 22576 | vim<8.2.3949 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-4192 |
22577 | vim<8.2.3950 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-4193 | | 22577 | vim<8.2.3950 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-4193 |
22578 | wireshark<3.6.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4181 | | 22578 | wireshark<3.6.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4181 |
22579 | wireshark<3.6.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4182 | | 22579 | wireshark<3.6.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4182 |
22580 | wireshark<3.6.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4183 | | 22580 | wireshark<3.6.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4183 |
22581 | wireshark<3.6.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4184 | | 22581 | wireshark<3.6.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4184 |
22582 | wireshark<3.6.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4185 | | 22582 | wireshark<3.6.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4185 |
22583 | wireshark<3.6.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4186 | | 22583 | wireshark<3.6.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4186 |
22584 | wireshark<3.6.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4190 | | 22584 | wireshark<3.6.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4190 |
22585 | hdf5-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45829 | | 22585 | hdf5-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45829 |
22586 | py{27,36,37,38,39,310}-nltk<3.6.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3842 | | 22586 | py{27,36,37,38,39,310}-nltk<3.6.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3842 |
22587 | tcpslice<1.5 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-41043 | | 22587 | tcpslice<1.5 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-41043 |
22588 | php{56,72,73,74,80}-roundcube<1.5.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-46144 | | 22588 | php{56,72,73,74,80}-roundcube<1.5.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-46144 |
22589 | expat<2.4.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-46143 | | 22589 | expat<2.4.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-46143 |
22590 | uriparser<0.9.6 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-46142 | | 22590 | uriparser<0.9.6 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-46142 |
22591 | uriparser<0.9.6 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-46141 | | 22591 | uriparser<0.9.6 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-46141 |
22592 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46038 | | 22592 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46038 |
22593 | hdf5-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-45832 | | 22593 | hdf5-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-45832 |
22594 | hdf5-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-45833 | | 22594 | hdf5-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-45833 |
22595 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-45831 | | 22595 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-45831 |
22596 | hdf5-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45830 | | 22596 | hdf5-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45830 |
22597 | lighttpd>=1.4.46<1.4.64 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-22707 | | 22597 | lighttpd>=1.4.46<1.4.64 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-22707 |
22598 | vim<8.2.4009 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0128 | | 22598 | vim<8.2.4009 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0128 |
22599 | ming-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-44591 | | 22599 | ming-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-44591 |
22600 | ming-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-44590 | | 22600 | ming-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-44590 |
22601 | wordpress<5.8.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-21664 | | 22601 | wordpress<5.8.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-21664 |
22602 | wordpress<5.8.3 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-21662 | | 22602 | wordpress<5.8.3 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-21662 |
22603 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-46044 | | 22603 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-46044 |
22604 | wordpress<5.8.3 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-21663 | | 22604 | wordpress<5.8.3 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-21663 |
22605 | wordpress<5.8.3 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-21661 | | 22605 | wordpress<5.8.3 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-21661 |
22606 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46043 | | 22606 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46043 |
22607 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46042 | | 22607 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46042 |
22608 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46041 | | 22608 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46041 |
22609 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46040 | | 22609 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46040 |
22610 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46039 | | 22610 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46039 |
22611 | kubectl<1.26.0 input-validation https://nvd.nist.gov/vuln/detail/CVE-2021-25743 | | 22611 | kubectl<1.26.0 input-validation https://nvd.nist.gov/vuln/detail/CVE-2021-25743 |
22612 | py{27,36,37,38,39,310}-django>=2.2<2.2.26 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-45452 | | 22612 | py{27,36,37,38,39,310}-django>=2.2<2.2.26 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-45452 |
22613 | py{27,36,37,38,39,310}-django>=3.2<3.2.11 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-45452 | | 22613 | py{27,36,37,38,39,310}-django>=3.2<3.2.11 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-45452 |
22614 | py{27,36,37,38,39,310}-django>=4<4.0.1 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-45452 | | 22614 | py{27,36,37,38,39,310}-django>=4<4.0.1 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-45452 |
22615 | py{27,36,37,38,39,310}-django>=2.2<2.2.26 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45115 | | 22615 | py{27,36,37,38,39,310}-django>=2.2<2.2.26 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45115 |
22616 | py{27,36,37,38,39,310}-django>=3.2<3.2.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45115 | | 22616 | py{27,36,37,38,39,310}-django>=3.2<3.2.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45115 |
22617 | py{27,36,37,38,39,310}-django>=4<2.0.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45115 | | 22617 | py{27,36,37,38,39,310}-django>=4<2.0.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45115 |
22618 | py{27,36,37,38,39,310}-django>=2.2<2.2.26 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-45116 | | 22618 | py{27,36,37,38,39,310}-django>=2.2<2.2.26 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-45116 |
22619 | py{27,36,37,38,39,310}-django>=3.2<3.2.11 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-45116 | | 22619 | py{27,36,37,38,39,310}-django>=3.2<3.2.11 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-45116 |
22620 | py{27,36,37,38,39,310}-django>=4<4.0.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-45116 | | 22620 | py{27,36,37,38,39,310}-django>=4<4.0.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-45116 |
22621 | tiff<4.3.0nb1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-22844 | | 22621 | tiff<4.3.0nb1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-22844 |
22622 | expat<2.4.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22827 | | 22622 | expat<2.4.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22827 |
22623 | expat<2.4.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22826 | | 22623 | expat<2.4.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22826 |
22624 | expat<2.4.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22825 | | 22624 | expat<2.4.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22825 |
22625 | expat<2.4.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22824 | | 22625 | expat<2.4.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22824 |
22626 | expat<2.4.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22823 | | 22626 | expat<2.4.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22823 |
22627 | expat<2.4.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22822 | | 22627 | expat<2.4.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22822 |
22628 | py{27,34,35,36,37,38,39,310}-Pillow<9.0.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22817 | | 22628 | py{27,34,35,36,37,38,39,310}-Pillow<9.0.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22817 |
22629 | py{27,34,35,36,37,38,39,310}-Pillow<9.0.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22816 | | 22629 | py{27,34,35,36,37,38,39,310}-Pillow<9.0.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22816 |
22630 | py{27,34,35,36,37,38,39,310}-Pillow<9.0.0 uninitialized-variables https://nvd.nist.gov/vuln/detail/CVE-2022-22815 | | 22630 | py{27,34,35,36,37,38,39,310}-Pillow<9.0.0 uninitialized-variables https://nvd.nist.gov/vuln/detail/CVE-2022-22815 |
22631 | vim<8.2.4049 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0158 | | 22631 | vim<8.2.4049 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0158 |
22632 | vim<8.2.4040 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-0156 | | 22632 | vim<8.2.4040 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-0156 |
22633 | mediawiki<1.36.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-46150 | | 22633 | mediawiki<1.36.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-46150 |
22634 | mediawiki<1.36.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46149 | | 22634 | mediawiki<1.36.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46149 |
22635 | mediawiki<1.36.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-46147 | | 22635 | mediawiki<1.36.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-46147 |
22636 | mediawiki<1.36.3 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-46148 | | 22636 | mediawiki<1.36.3 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-46148 |
22637 | mediawikit<1.36.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-46146 | | 22637 | mediawikit<1.36.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-46146 |
22638 | vim<8.2.3883 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-46059 | | 22638 | vim<8.2.3883 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-46059 |
22639 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46051 | | 22639 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46051 |
22640 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46049 | | 22640 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46049 |
22641 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-46047 | | 22641 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-46047 |
22642 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46045 | | 22642 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46045 |
22643 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46046 | | 22643 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46046 |
22644 | htmldoc<1.9.14 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-43579 | | 22644 | htmldoc<1.9.14 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-43579 |
22645 | ruby{25,26,27,30}-actionpack60<6.0.4.2 cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2021-44528 | | 22645 | ruby{25,26,27,30}-actionpack60<6.0.4.2 cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2021-44528 |
22646 | ruby{25,26,27,30}-actionpack61<6.1.4.2 cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2021-44528 | | 22646 | ruby{25,26,27,30}-actionpack61<6.1.4.2 cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2021-44528 |
22647 | phoronix-test-suite-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-0157 | | 22647 | phoronix-test-suite-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-0157 |
22648 | clamav<0.103.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-20698 | | 22648 | clamav<0.103.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-20698 |
22649 | fig2dev<3.2.8b double-free https://nvd.nist.gov/vuln/detail/CVE-2021-37529 | | 22649 | fig2dev<3.2.8b double-free https://nvd.nist.gov/vuln/detail/CVE-2021-37529 |
22650 | fig2dev<3.2.8b denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-37530 | | 22650 | fig2dev<3.2.8b denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-37530 |
22651 | gdk-pixbuf2<2.42.9 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-44648 | | 22651 | gdk-pixbuf2<2.42.9 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-44648 |
22652 | gpac<0.8.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-25427 | | 22652 | gpac<0.8.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-25427 |
22653 | gpac-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-36412 | | 22653 | gpac-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-36412 |
22654 | gpac-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-36414 | | 22654 | gpac-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-36414 |
22655 | gpac-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-36417 | | 22655 | gpac-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-36417 |
22656 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-40559 | | 22656 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-40559 |
22657 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40562 | | 22657 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40562 |
22658 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40563 | | 22658 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40563 |
22659 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40564 | | 22659 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40564 |
22660 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40565 | | 22660 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40565 |
22661 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40566 | | 22661 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40566 |
22662 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40567 | | 22662 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40567 |
22663 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40568 | | 22663 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40568 |
22664 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40569 | | 22664 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40569 |
22665 | gpac-[0-9]* double-free https://nvd.nist.gov/vuln/detail/CVE-2021-40570 | | 22665 | gpac-[0-9]* double-free https://nvd.nist.gov/vuln/detail/CVE-2021-40570 |
22666 | gpac-[0-9]* double-free https://nvd.nist.gov/vuln/detail/CVE-2021-40571 | | 22666 | gpac-[0-9]* double-free https://nvd.nist.gov/vuln/detail/CVE-2021-40571 |
22667 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40572 | | 22667 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40572 |
22668 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40573 | | 22668 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40573 |
22669 | gpac-[0-9]* double-free https://nvd.nist.gov/vuln/detail/CVE-2021-40574 | | 22669 | gpac-[0-9]* double-free https://nvd.nist.gov/vuln/detail/CVE-2021-40574 |
22670 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40575 | | 22670 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40575 |
22671 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40576 | | 22671 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40576 |
22672 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45760 | | 22672 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45760 |
22673 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45762 | | 22673 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45762 |
22674 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45763 | | 22674 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45763 |
22675 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45764 | | 22675 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45764 |
22676 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45767 | | 22676 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45767 |
22677 | guacamole-server<1.4.0 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2021-41767 | | 22677 | guacamole-server<1.4.0 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2021-41767 |
22678 | guacamole-server<1.4.0 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2021-43999 | | 22678 | guacamole-server<1.4.0 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2021-43999 |
22679 | jenkins<2.330 cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-20612 | | 22679 | jenkins<2.330 cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-20612 |
22680 | libde265<1.0.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-35452 | | 22680 | libde265<1.0.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-35452 |
22681 | libde265<1.0.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-36408 | | 22681 | libde265<1.0.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-36408 |
22682 | libde265<1.0.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-36409 | | 22682 | libde265<1.0.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-36409 |
22683 | libde265<1.0.9 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-36410 | | 22683 | libde265<1.0.9 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-36410 |
22684 | libde265<1.0.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-36411 | | 22684 | libde265<1.0.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-36411 |
22685 | lua54-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-44647 | | 22685 | lua54-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-44647 |
22686 | binaryen<105 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46048 | | 22686 | binaryen<105 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46048 |
22687 | binaryen-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-46050 | | 22687 | binaryen-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-46050 |
22688 | binaryen<105 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46052 | | 22688 | binaryen<105 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46052 |
22689 | binaryen-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46053 | | 22689 | binaryen-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46053 |
22690 | binaryen<105 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46054 | | 22690 | binaryen<105 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46054 |
22691 | binaryen<105 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46055 | | 22691 | binaryen<105 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46055 |
22692 | phoronix-test-suite-[0-9]* cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-0196 | | 22692 | phoronix-test-suite-[0-9]* cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-0196 |
22693 | phoronix-test-suite-[0-9]* cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-0197 | | 22693 | phoronix-test-suite-[0-9]* cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-0197 |
22694 | phoronix-test-suite-[0-9]* cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-0238 | | 22694 | phoronix-test-suite-[0-9]* cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-0238 |
22695 | radare2-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0173 | | 22695 | radare2-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0173 |
22696 | samba<4.13.16 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2021-43566 | | 22696 | samba<4.13.16 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2021-43566 |
22697 | spin-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-46168 | | 22697 | spin-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-46168 |
22698 | vim<8.2.4074 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0213 | | 22698 | vim<8.2.4074 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0213 |
22699 | wpa_supplicant<2.10 side-channel https://nvd.nist.gov/vuln/detail/CVE-2022-23303 | | 22699 | wpa_supplicant<2.10 side-channel https://nvd.nist.gov/vuln/detail/CVE-2022-23303 |
22700 | wpa_supplicant<2.10 side-channel https://nvd.nist.gov/vuln/detail/CVE-2022-23304 | | 22700 | wpa_supplicant<2.10 side-channel https://nvd.nist.gov/vuln/detail/CVE-2022-23304 |
22701 | zabbix<5.4.9 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-23131 | | 22701 | zabbix<5.4.9 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-23131 |
22702 | zabbix<5.4.9 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-23132 | | 22702 | zabbix<5.4.9 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-23132 |
22703 | zabbix<5.4.9 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-23133 | | 22703 | zabbix<5.4.9 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-23133 |
22704 | zabbix<5.4.9 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-23134 | | 22704 | zabbix<5.4.9 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-23134 |
22705 | webkit-gtk<2.34.4 multiple-vulnerabilities https://webkitgtk.org/security/WSA-2022-0001.html | | 22705 | webkit-gtk<2.34.4 multiple-vulnerabilities https://webkitgtk.org/security/WSA-2022-0001.html |
22706 | polkit<0.120nb2 local-privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2021-4034 | | 22706 | polkit<0.120nb2 local-privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2021-4034 |
22707 | mysql-cluster>=8.0<8.0.28 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2022.html#AppendixMSQL | | 22707 | mysql-cluster>=8.0<8.0.28 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2022.html#AppendixMSQL |
22708 | mysql-server>=5.7<5.7.37 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2022.html#AppendixMSQL | | 22708 | mysql-server>=5.7<5.7.37 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2022.html#AppendixMSQL |
22709 | mysql-server>=8.0<8.0.28 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2022.html#AppendixMSQL | | 22709 | mysql-server>=8.0<8.0.28 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2022.html#AppendixMSQL |
22710 | openjdk8<1.8.313 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixJAVA | | 22710 | openjdk8<1.8.313 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixJAVA |
22711 | openjdk11<1.11.0.14 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixJAVA | | 22711 | openjdk11<1.11.0.14 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixJAVA |
22712 | apache-tomcat<8.5.75 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-23181 | | 22712 | apache-tomcat<8.5.75 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-23181 |
22713 | apache-tomcat>=9<9.0.58 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-23181 | | 22713 | apache-tomcat>=9<9.0.58 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-23181 |
22714 | cacti-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-23225 | | 22714 | cacti-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-23225 |
22715 | cacti-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-26247 | | 22715 | cacti-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-26247 |
22716 | cacti-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-3816 | | 22716 | cacti-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-3816 |
22717 | duktape-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46322 | | 22717 | duktape-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46322 |
22718 | expat<2.4.4 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-23852 | | 22718 | expat<2.4.4 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-23852 |
22719 | expat<2.4.4 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-23990 | | 22719 | expat<2.4.4 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-23990 |
22720 | gcc-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46195 | | 22720 | gcc-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46195 |
22721 | go116<1.16.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-39293 | | 22721 | go116<1.16.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-39293 |
22722 | go117<1.17.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-39293 | | 22722 | go117<1.17.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-39293 |
22723 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46234 | | 22723 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46234 |
22724 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46236 | | 22724 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46236 |
22725 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46237 | | 22725 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46237 |
22726 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46238 | | 22726 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46238 |
22727 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46239 | | 22727 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46239 |
22728 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46240 | | 22728 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46240 |
22729 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46311 | | 22729 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46311 |
22730 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46313 | | 22730 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46313 |
22731 | grafana<8.3.4 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-21673 | | 22731 | grafana<8.3.4 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-21673 |
22732 | hdf5-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-46242 | | 22732 | hdf5-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-46242 |
22733 | hdf5-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46243 | | 22733 | hdf5-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46243 |
22734 | hdf5-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46244 | | 22734 | hdf5-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46244 |
22735 | ldns<1.8.0 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-19860 | | 22735 | ldns<1.8.0 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-19860 |
22736 | ldns<1.8.0 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-19861 | | 22736 | ldns<1.8.0 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-19861 |
22737 | librecad-[0-9]* remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-45341 | | 22737 | librecad-[0-9]* remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-45341 |
22738 | librecad-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-45342 | | 22738 | librecad-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-45342 |
22739 | librecad-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45343 | | 22739 | librecad-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45343 |
22740 | libsixel-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45340 | | 22740 | libsixel-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45340 |
22741 | libspf2<1.2.11 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-33912 | | 22741 | libspf2<1.2.11 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-33912 |
22742 | mariadb-server<10.6.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46657 | | 22742 | mariadb-server<10.6.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46657 |
22743 | mariadb-server<10.6.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46658 | | 22743 | mariadb-server<10.6.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46658 |
22744 | mariadb-server<10.7.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46659 | | 22744 | mariadb-server<10.7.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46659 |
22745 | moodle<3.11.5 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-0332 | | 22745 | moodle<3.11.5 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-0332 |
22746 | moodle<3.11.5 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-0333 | | 22746 | moodle<3.11.5 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-0333 |
22747 | moodle<3.11.5 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-0334 | | 22747 | moodle<3.11.5 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-0334 |
22748 | moodle<3.11.5 cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-0335 | | 22748 | moodle<3.11.5 cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-0335 |
22749 | py{36,37,38,39,310}-wagtail<2.15.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-21683 | | 22749 | py{36,37,38,39,310}-wagtail<2.15.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-21683 |
22750 | vim<8.2.4120 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0261 | | 22750 | vim<8.2.4120 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0261 |
22751 | wolfssl>=5<5.1.1 side-channel https://nvd.nist.gov/vuln/detail/CVE-2022-23408 | | 22751 | wolfssl>=5<5.1.1 side-channel https://nvd.nist.gov/vuln/detail/CVE-2022-23408 |
22752 | py{36,37,38,39,310}-loguru<0.6.0 remote-code-injection https://nvd.nist.gov/vuln/detail/CVE-2022-0329 | | 22752 | py{36,37,38,39,310}-loguru<0.6.0 remote-code-injection https://nvd.nist.gov/vuln/detail/CVE-2022-0329 |
22753 | vim<8.2.4151 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0318 | | 22753 | vim<8.2.4151 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0318 |
22754 | php{56,70,71,72,73,74,80}-phpmyadmin<4.9.8 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-23807 | | 22754 | php{56,70,71,72,73,74,80}-phpmyadmin<4.9.8 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-23807 |
22755 | xerces-j<2.12.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23437 | | 22755 | xerces-j<2.12.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23437 |
22756 | vim<8.2.4206 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2022-0351 | | 22756 | vim<8.2.4206 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2022-0351 |
22757 | vim<8.2.4217 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0368 | | 22757 | vim<8.2.4217 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0368 |
22758 | vim<8.2.4215 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0361 | | 22758 | vim<8.2.4215 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0361 |
22759 | vim<8.2.4214 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0359 | | 22759 | vim<8.2.4214 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0359 |
22760 | vim<8.2.4233 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0393 | | 22760 | vim<8.2.4233 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0393 |
22761 | vim<8.2.4218 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0392 | | 22761 | vim<8.2.4218 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0392 |
22762 | vim<8.2.4253 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-0413 | | 22762 | vim<8.2.4253 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-0413 |
22763 | vim<8.2.4247 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0408 | | 22763 | vim<8.2.4247 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0408 |
22764 | vim<8.2.4219 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0407 | | 22764 | vim<8.2.4219 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0407 |
22765 | vim<8.2.4245 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0417 | | 22765 | vim<8.2.4245 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0417 |
22766 | rust>=1<1.58.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-21658 | | 22766 | rust>=1<1.58.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-21658 |
22767 | p5-Image-ExifTool<12.38 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-23935 | | 22767 | p5-Image-ExifTool<12.38 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-23935 |
22768 | xenkernel411-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23035 | | 22768 | xenkernel411-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23035 |
22769 | xenkernel411-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23034 | | 22769 | xenkernel411-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23034 |
22770 | xenkernel411-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23033 | | 22770 | xenkernel411-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23033 |
22771 | xenkernel413-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23035 | | 22771 | xenkernel413-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23035 |
22772 | xenkernel413-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23034 | | 22772 | xenkernel413-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23034 |
22773 | xenkernel413-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23033 | | 22773 | xenkernel413-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23033 |
22774 | xenkernel415<4.15.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23035 | | 22774 | xenkernel415<4.15.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23035 |
22775 | xenkernel415<4.15.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23034 | | 22775 | xenkernel415<4.15.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23034 |
22776 | xenkernel415<4.15.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23033 | | 22776 | xenkernel415<4.15.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23033 |
22777 | varnish>=6.0<6.6.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-23959 | | 22777 | varnish>=6.0<6.6.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-23959 |
22778 | varnish>=7.0<7.0.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-23959 | | 22778 | varnish>=7.0<7.0.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-23959 |
22779 | qemu<6.2.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-4145 | | 22779 | qemu<6.2.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-4145 |
22780 | protobuf<3.15.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-22570 | | 22780 | protobuf<3.15.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-22570 |
22781 | tightvnc-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-23967 | | 22781 | tightvnc-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-23967 |
22782 | glpi<9.5.7 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-21720 | | 22782 | glpi<9.5.7 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-21720 |
22783 | glpi<9.5.7 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-21719 | | 22783 | glpi<9.5.7 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-21719 |
22784 | php{56,73,74,80}-piwigo<2.8.1 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2016-3735 | | 22784 | php{56,73,74,80}-piwigo<2.8.1 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2016-3735 |
22785 | xterm<370 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24130 | | 22785 | xterm<370 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24130 |
22786 | py{27,34,35,36,37,38,39,310}-treq<22.1.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-23607 | | 22786 | py{27,34,35,36,37,38,39,310}-treq<22.1.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-23607 |
22787 | h2o-[0-9]* arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-43848 | | 22787 | h2o-[0-9]* arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-43848 |
22788 | zabbix-[0-9]* remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-46088 | | 22788 | zabbix-[0-9]* remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-46088 |
22789 | minetest<5.4.0 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24301 | | 22789 | minetest<5.4.0 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24301 |
22790 | minetest<5.4.0 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24300 | | 22790 | minetest<5.4.0 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24300 |
22791 | jhead-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-26208 | | 22791 | jhead-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-26208 |
22792 | vim<8.2.4281 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-0443 | | 22792 | vim<8.2.4281 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-0443 |
22793 | py{27,36,37,38,39,310}-django>=2.2<2.2.27 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2022-23833 | | 22793 | py{27,36,37,38,39,310}-django>=2.2<2.2.27 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2022-23833 |
22794 | py{27,36,37,38,39,310}-django>=3.2<3.2.12 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2022-23833 | | 22794 | py{27,36,37,38,39,310}-django>=3.2<3.2.12 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2022-23833 |
22795 | py{27,36,37,38,39,310}-django>=4.0<4.0.2 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2022-23833 | | 22795 | py{27,36,37,38,39,310}-django>=4.0<4.0.2 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2022-23833 |
22796 | py{27,36,37,38,39,310}-django>=2.2<2.2.27 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-22818 | | 22796 | py{27,36,37,38,39,310}-django>=2.2<2.2.27 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-22818 |
22797 | py{27,36,37,38,39,310}-django>=3.2<3.2.12 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-22818 | | 22797 | py{27,36,37,38,39,310}-django>=3.2<3.2.12 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-22818 |
22798 | py{27,36,37,38,39,310}-django>=4.0<4.0.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-22818 | | 22798 | py{27,36,37,38,39,310}-django>=4.0<4.0.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-22818 |
22799 | py{27,36,37,38,39,310}-ipython>=6.0.0<7.16.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-21699 | | 22799 | py{27,36,37,38,39,310}-ipython>=6.0.0<7.16.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-21699 |
22800 | py{27,36,37,38,39,310}-ipython>=7.17.0<7.31.1 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-21699 | | 22800 | py{27,36,37,38,39,310}-ipython>=7.17.0<7.31.1 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-21699 |
22801 | py{27,36,37,38,39,310}-ipython>=8.0.0<8.0.1 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-21699 | | 22801 | py{27,36,37,38,39,310}-ipython>=8.0.0<8.0.1 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-21699 |
22802 | mariadb-server>=10.6<10.6.8 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-46669 | | 22802 | mariadb-server>=10.6<10.6.8 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-46669 |
22803 | mariadb-server>=10.5<10.5.16 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-46669 | | 22803 | mariadb-server>=10.5<10.5.16 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-46669 |
22804 | mariadb-server>=10.4<10.4.25 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-46669 | | 22804 | mariadb-server>=10.4<10.4.25 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-46669 |
22805 | mariadb-server>=10.6<10.6.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46668 | | 22805 | mariadb-server>=10.6<10.6.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46668 |
22806 | mariadb-server>=10.5<10.5.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46668 | | 22806 | mariadb-server>=10.5<10.5.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46668 |
22807 | mariadb-server>=10.4<10.4.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46668 | | 22807 | mariadb-server>=10.4<10.4.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46668 |
22808 | mariadb-server>=10.6<10.6.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46665 | | 22808 | mariadb-server>=10.6<10.6.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46665 |
22809 | mariadb-server>=10.5<10.5.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46665 | | 22809 | mariadb-server>=10.5<10.5.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46665 |
22810 | mariadb-server>=10.4<10.4.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46665 | | 22810 | mariadb-server>=10.4<10.4.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46665 |
22811 | mariadb-server>=10.6<10.6.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46664 | | 22811 | mariadb-server>=10.6<10.6.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46664 |
22812 | mariadb-server>=10.5<10.5.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46664 | | 22812 | mariadb-server>=10.5<10.5.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46664 |
22813 | mariadb-server>=10.4<10.4.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46664 | | 22813 | mariadb-server>=10.4<10.4.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46664 |
22814 | mariadb-server>=10.6<10.6.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46662 | | 22814 | mariadb-server>=10.6<10.6.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46662 |
22815 | mariadb-server>=10.5<10.5.13 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46662 | | 22815 | mariadb-server>=10.5<10.5.13 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46662 |
22816 | mariadb-server>=10.4<10.4.22 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46662 | | 22816 | mariadb-server>=10.4<10.4.22 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46662 |
22817 | mariadb-server>=10.6<10.6.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46663 | | 22817 | mariadb-server>=10.6<10.6.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46663 |
22818 | mariadb-server>=10.5<10.5.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46663 | | 22818 | mariadb-server>=10.5<10.5.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46663 |
22819 | mariadb-server>=10.4<10.4.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46663 | | 22819 | mariadb-server>=10.4<10.4.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46663 |
22820 | mariadb-server>=10.6<10.6.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46661 | | 22820 | mariadb-server>=10.6<10.6.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46661 |
22821 | mariadb-server>=10.5<10.5.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46661 | | 22821 | mariadb-server>=10.5<10.5.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46661 |
22822 | mariadb-server>=10.4<10.4.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46661 | | 22822 | mariadb-server>=10.4<10.4.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46661 |
22823 | openssl>=1.1.1<1.1.1m unknown-impact https://nvd.nist.gov/vuln/detail/CVE-2021-4160 | | 22823 | openssl>=1.1.1<1.1.1m unknown-impact https://nvd.nist.gov/vuln/detail/CVE-2021-4160 |
22824 | mariadb-server<10.4.22 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-46667 | | 22824 | mariadb-server<10.4.22 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-46667 |
22825 | mariadb-server>=10.5.0<10.5.13 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-46667 | | 22825 | mariadb-server>=10.5.0<10.5.13 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-46667 |
22826 | mariadb-server>=10.6.0<10.6.5 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-46667 | | 22826 | mariadb-server>=10.6.0<10.6.5 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-46667 |
22827 | mariadb-server<10.4.20 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46666 | | 22827 | mariadb-server<10.4.20 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46666 |
22828 | mariadb-server>=10.5.0<10.5.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46666 | | 22828 | mariadb-server>=10.5.0<10.5.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46666 |
22829 | mariadb-server>=10.6.0<10.6.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46666 | | 22829 | mariadb-server>=10.6.0<10.6.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46666 |
22830 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-24249 | | 22830 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-24249 |
22831 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-4043 | | 22831 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-4043 |
22832 | gerbv-[0-9]* information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-40403 | | 22832 | gerbv-[0-9]* information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-40403 |
22833 | gerbv-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-40401 | | 22833 | gerbv-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-40401 |
22834 | mongodb<4.2.18 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-32036 | | 22834 | mongodb<4.2.18 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-32036 |
22835 | apache-cassandra<3.0.26 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-44521 | | 22835 | apache-cassandra<3.0.26 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-44521 |
22836 | atheme<7.2.12 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24976 | | 22836 | atheme<7.2.12 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24976 |
22837 | drupal<9.0.6 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-13668 | | 22837 | drupal<9.0.6 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-13668 |
22838 | drupal<9.0.6 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2020-13669 | | 22838 | drupal<9.0.6 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2020-13669 |
22839 | drupal<9.0.6 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-13670 | | 22839 | drupal<9.0.6 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-13670 |
22840 | drupal<9.0.12 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2020-13672 | | 22840 | drupal<9.0.12 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2020-13672 |
22841 | drupal<9.2.6 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-13675 | | 22841 | drupal<9.2.6 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-13675 |
22842 | drupal<9.2.6 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-13677 | | 22842 | drupal<9.2.6 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-13677 |
22843 | gitea<1.7.0 server-side-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2021-45325 | | 22843 | gitea<1.7.0 server-side-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2021-45325 |
22844 | gitea<1.5.2 cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2021-45326 | | 22844 | gitea<1.5.2 cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2021-45326 |
22845 | gitea<1.11.2 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-45327 | | 22845 | gitea<1.11.2 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-45327 |
22846 | gitea<1.4.3 open-redirect https://nvd.nist.gov/vuln/detail/CVE-2021-45328 | | 22846 | gitea<1.4.3 open-redirect https://nvd.nist.gov/vuln/detail/CVE-2021-45328 |
22847 | gitea<1.5.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-45329 | | 22847 | gitea<1.5.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-45329 |
22848 | gitea<1.5.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-45330 | | 22848 | gitea<1.5.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-45330 |
22849 | gitea<1.5.0 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-45331 | | 22849 | gitea<1.5.0 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-45331 |
22850 | go116<1.16.14 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23772 | | 22850 | go116<1.16.14 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23772 |
22851 | go117<1.17.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23772 | | 22851 | go117<1.17.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23772 |
22852 | go116<1.16.14 improper-access-control https://nvd.nist.gov/vuln/detail/CVE-2022-23773 | | 22852 | go116<1.16.14 improper-access-control https://nvd.nist.gov/vuln/detail/CVE-2022-23773 |
22853 | go117<1.17.7 improper-access-control https://nvd.nist.gov/vuln/detail/CVE-2022-23773 | | 22853 | go117<1.17.7 improper-access-control https://nvd.nist.gov/vuln/detail/CVE-2022-23773 |
22854 | go116<1.16.14 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23806 | | 22854 | go116<1.16.14 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23806 |
22855 | go117<1.17.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23806 | | 22855 | go117<1.17.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23806 |
22856 | gradle<7.4 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-23630 | | 22856 | gradle<7.4 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-23630 |
22857 | grafana<8.3.5 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-21702 | | 22857 | grafana<8.3.5 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-21702 |
22858 | grafana<8.3.5 cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-21703 | | 22858 | grafana<8.3.5 cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-21703 |
22859 | grafana<8.3.5 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-21713 | | 22859 | grafana<8.3.5 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-21713 |
22860 | htmldoc<1.9.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0534 | | 22860 | htmldoc<1.9.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0534 |
22861 | jenkins<2.334 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0538 | | 22861 | jenkins<2.334 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0538 |
22862 | kate<21.12.2 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-23853 | | 22862 | kate<21.12.2 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-23853 |
22863 | # "can't be fixed" according to https://bugzilla.redhat.com/show_bug.cgi?id=2054686 | | 22863 | # "can't be fixed" according to https://bugzilla.redhat.com/show_bug.cgi?id=2054686 |
22864 | #git-base-[0-9]* information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-24975 | | 22864 | #git-base-[0-9]* information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-24975 |
22865 | php{56,73,74,80,81}-concrete5<9.0 cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2021-22954 | | 22865 | php{56,73,74,80,81}-concrete5<9.0 cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2021-22954 |
22866 | php{56,73,74,80,81}-piwigo-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-45357 | | 22866 | php{56,73,74,80,81}-piwigo-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-45357 |
22867 | py{27,36,37,38,39,310}-twisted<22.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-21712 | | 22867 | py{27,36,37,38,39,310}-twisted<22.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-21712 |
22868 | python36<3.6.14 http-header-injection https://nvd.nist.gov/vuln/detail/CVE-2022-0391 | | 22868 | python36<3.6.14 http-header-injection https://nvd.nist.gov/vuln/detail/CVE-2022-0391 |
22869 | python37<3.7.11 http-header-injection https://nvd.nist.gov/vuln/detail/CVE-2022-0391 | | 22869 | python37<3.7.11 http-header-injection https://nvd.nist.gov/vuln/detail/CVE-2022-0391 |
22870 | python38<3.8.11 http-header-injection https://nvd.nist.gov/vuln/detail/CVE-2022-0391 | | 22870 | python38<3.8.11 http-header-injection https://nvd.nist.gov/vuln/detail/CVE-2022-0391 |
22871 | python39<3.9.5 http-header-injection https://nvd.nist.gov/vuln/detail/CVE-2022-0391 | | 22871 | python39<3.9.5 http-header-injection https://nvd.nist.gov/vuln/detail/CVE-2022-0391 |
22872 | python310<3.10.0 http-header-injection https://nvd.nist.gov/vuln/detail/CVE-2022-0391 | | 22872 | python310<3.10.0 http-header-injection https://nvd.nist.gov/vuln/detail/CVE-2022-0391 |
22873 | radare2<5.6.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-0139 | | 22873 | radare2<5.6.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-0139 |
22874 | radare2<5.6.2 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0519 | | 22874 | radare2<5.6.2 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0519 |
22875 | radare2<5.6.2 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0521 | | 22875 | radare2<5.6.2 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0521 |
22876 | ruby{25,26,27,30,31}-actionpack60<6.0.4.6 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-23633 | | 22876 | ruby{25,26,27,30,31}-actionpack60<6.0.4.6 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-23633 |
22877 | ruby{25,26,27,30,31}-actionpack61<6.1.4.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-23633 | | 22877 | ruby{25,26,27,30,31}-actionpack61<6.1.4.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-23633 |
22878 | ruby{25,26,27,30,31}-actionpack70<7.0.2.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-23633 | | 22878 | ruby{25,26,27,30,31}-actionpack70<7.0.2.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-23633 |
22879 | ruby27-base<2.7.5 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-41816 | | 22879 | ruby27-base<2.7.5 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-41816 |
22880 | ruby30-base<3.0.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-41816 | | 22880 | ruby30-base<3.0.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-41816 |
22881 | ruby{25,26,27,30,31}-puma<5.2.6.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-23634 | | 22881 | ruby{25,26,27,30,31}-puma<5.2.6.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-23634 |
22882 | tcpreplay<4.3.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45386 | | 22882 | tcpreplay<4.3.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45386 |
22883 | tcpreplay<4.3.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45387 | | 22883 | tcpreplay<4.3.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-45387 |
22884 | tiff<4.3.0nb1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0561 | | 22884 | tiff<4.3.0nb1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0561 |
22885 | tiff<4.3.0nb1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0562 | | 22885 | tiff<4.3.0nb1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0562 |
22886 | unzip-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-0529 | | 22886 | unzip-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-0529 |
22887 | unzip-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0530 | | 22887 | unzip-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0530 |
22888 | vim<8.2.4327 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0554 | | 22888 | vim<8.2.4327 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0554 |
22889 | ImageMagick<7.0.10.31 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3596 | | 22889 | ImageMagick<7.0.10.31 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3596 |
22890 | ImageMagick<7.0.11.14 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3610 | | 22890 | ImageMagick<7.0.11.14 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3610 |
22891 | blender<2.83.19 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0544 | | 22891 | blender<2.83.19 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0544 |
22892 | blender>=2.93<2.93.8 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0544 | | 22892 | blender>=2.93<2.93.8 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0544 |
22893 | blender<2.83.19 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0545 | | 22893 | blender<2.83.19 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0545 |
22894 | blender>=2.93<2.93.8 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0545 | | 22894 | blender>=2.93<2.93.8 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0545 |
22895 | blender-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0546 | | 22895 | blender-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0546 |
22896 | consul<1.9.14 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24687 | | 22896 | consul<1.9.14 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24687 |
22897 | cyrus-sasl<2.1.28 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-24407 | | 22897 | cyrus-sasl<2.1.28 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-24407 |
22898 | drupal<9.2.16 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-25271 | | 22898 | drupal<9.2.16 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-25271 |
22899 | expat<2.4.5 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-25235 | | 22899 | expat<2.4.5 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-25235 |
22900 | expat<2.4.5 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-25236 | | 22900 | expat<2.4.5 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-25236 |
22901 | expat<2.4.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-25313 | | 22901 | expat<2.4.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-25313 |
22902 | expat<2.4.5 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-25314 | | 22902 | expat<2.4.5 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-25314 |
22903 | expat<2.4.5 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-25315 | | 22903 | expat<2.4.5 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-25315 |
22904 | ghostscript-agpl<9.55.0 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2021-3781 | | 22904 | ghostscript-agpl<9.55.0 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2021-3781 |
22905 | htmldoc<1.9.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-26252 | | 22905 | htmldoc<1.9.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-26252 |
22906 | isync<1.4.2 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-3578 | | 22906 | isync<1.4.2 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-3578 |
22907 | isync<1.4.4 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-3657 | | 22907 | isync<1.4.4 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-3657 |
22908 | kcron<21.12.3 insecure-temporary-files https://nvd.nist.gov/vuln/detail/CVE-2022-24986 | | 22908 | kcron<21.12.3 insecure-temporary-files https://nvd.nist.gov/vuln/detail/CVE-2022-24986 |
22909 | vim<8.2.4359 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0572 | | 22909 | vim<8.2.4359 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0572 |
22910 | phoronix-test-suite<10.8.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-0571 | | 22910 | phoronix-test-suite<10.8.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-0571 |
22911 | zsh<5.8.1 archive-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-45444 | | 22911 | zsh<5.8.1 archive-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-45444 |
22912 | wireshark<3.6.2 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2022-0586 | | 22912 | wireshark<3.6.2 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2022-0586 |
22913 | wireshark<3.6.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0583 | | 22913 | wireshark<3.6.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0583 |
22914 | wireshark<3.6.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0582 | | 22914 | wireshark<3.6.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0582 |
22915 | wireshark<3.6.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0581 | | 22915 | wireshark<3.6.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0581 |
22916 | radare2<5.6.2 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-0559 | | 22916 | radare2<5.6.2 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-0559 |
22917 | qt5>=5.9<5.15.9 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-25255 | | 22917 | qt5>=5.9<5.15.9 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-25255 |
22918 | pcf2bdf<1.07 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23319 | | 22918 | pcf2bdf<1.07 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23319 |
22919 | pcf2bdf<1.07 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-23318 | | 22919 | pcf2bdf<1.07 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-23318 |
22920 | vim<8.2.4397 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0629 | | 22920 | vim<8.2.4397 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0629 |
22921 | wireshark<3.6.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0585 | | 22921 | wireshark<3.6.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0585 |
22922 | swtpm-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-23645 | | 22922 | swtpm-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-23645 |
22923 | libsixel-[0-9]* double-free https://nvd.nist.gov/vuln/detail/CVE-2021-46700 | | 22923 | libsixel-[0-9]* double-free https://nvd.nist.gov/vuln/detail/CVE-2021-46700 |
22924 | vim<8.2.4418 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0685 | | 22924 | vim<8.2.4418 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0685 |
22925 | vim<8.2.4428 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-0696 | | 22925 | vim<8.2.4428 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-0696 |
22926 | radare2<5.6.4 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-0712 | | 22926 | radare2<5.6.4 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-0712 |
22927 | vim<8.2.4436 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0714 | | 22927 | vim<8.2.4436 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0714 |
22928 | radare2<5.6.4 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0713 | | 22928 | radare2<5.6.4 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0713 |
22929 | vim<8.2.4440 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0729 | | 22929 | vim<8.2.4440 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0729 |
22930 | radare2<5.6.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0476 | | 22930 | radare2<5.6.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0476 |
22931 | wolfssl<5.2.0 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2022-25640 | | 22931 | wolfssl<5.2.0 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2022-25640 |
22932 | wolfssl<5.2.0 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2022-25638 | | 22932 | wolfssl<5.2.0 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2022-25638 |
22933 | radare2<5.6.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0695 | | 22933 | radare2<5.6.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0695 |
22934 | radare2<5.6.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4021 | | 22934 | radare2<5.6.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4021 |
22935 | libxml2<2.9.13 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-23308 | | 22935 | libxml2<2.9.13 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-23308 |
22936 | lepton-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-26181 | | 22936 | lepton-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-26181 |
22937 | polkit<0.119 local-root-exploit https://nvd.nist.gov/vuln/detail/CVE-2021-3560 | | 22937 | polkit<0.119 local-root-exploit https://nvd.nist.gov/vuln/detail/CVE-2021-3560 |
22938 | qemu<6.2.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-3947 | | 22938 | qemu<6.2.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-3947 |
22939 | qemu<6.2.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3930 | | 22939 | qemu<6.2.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3930 |
22940 | polkit-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4115 | | 22940 | polkit-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4115 |
22941 | php{56,73,74,80,81}-piwigo-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-24620 | | 22941 | php{56,73,74,80,81}-piwigo-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-24620 |
22942 | qemu<6.1.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3608 | | 22942 | qemu<6.1.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3608 |
22943 | qemu<6.1.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3607 | | 22943 | qemu<6.1.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3607 |
22944 | qt5<5.15.9 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-25634 | | 22944 | qt5<5.15.9 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-25634 |
22945 | webmin<1.990 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-0829 | | 22945 | webmin<1.990 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-0829 |
22946 | webmin<1.990 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-0824 | | 22946 | webmin<1.990 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-0824 |
22947 | haproxy-[0-9]* http-response-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-0711 | | 22947 | haproxy-[0-9]* http-response-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-0711 |
22948 | htmldoc<1.9.12 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-23206 | | 22948 | htmldoc<1.9.12 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-23206 |
22949 | htmldoc<1.9.12 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-23191 | | 22949 | htmldoc<1.9.12 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-23191 |
22950 | htmldoc<1.9.12 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-23180 | | 22950 | htmldoc<1.9.12 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-23180 |
22951 | htmldoc<1.9.11 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-26948 | | 22951 | htmldoc<1.9.11 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-26948 |
22952 | htmldoc<1.9.12 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-26259 | | 22952 | htmldoc<1.9.12 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-26259 |
22953 | liquibase<4.8.0 xml-external-entity https://nvd.nist.gov/vuln/detail/CVE-2022-0839 | | 22953 | liquibase<4.8.0 xml-external-entity https://nvd.nist.gov/vuln/detail/CVE-2022-0839 |
22954 | radare2<5.6.6 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-0849 | | 22954 | radare2<5.6.6 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-0849 |
22955 | cmark-gfm<0.29.0.gfm.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24724 | | 22955 | cmark-gfm<0.29.0.gfm.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24724 |
22956 | cacti-[0-9]* authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-0730 | | 22956 | cacti-[0-9]* authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-0730 |
22957 | py{27,36,37,38,39,310}-twisted<22.2.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-21716 | | 22957 | py{27,36,37,38,39,310}-twisted<22.2.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-21716 |
22958 | qemu<7.2.0 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-3638 | | 22958 | qemu<7.2.0 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-3638 |
22959 | openjpeg-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-3575 | | 22959 | openjpeg-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-3575 |
22960 | openexr<2.5.4 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-20303 | | 22960 | openexr<2.5.4 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-20303 |
22961 | openexr<2.5.4 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-20300 | | 22961 | openexr<2.5.4 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-20300 |
22962 | openexr<2.5.4 floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2021-20302 | | 22962 | openexr<2.5.4 floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2021-20302 |
22963 | samba>=4.0<4.13.14 local-system-compromise https://nvd.nist.gov/vuln/detail/CVE-2020-25722 | | 22963 | samba>=4.0<4.13.14 local-system-compromise https://nvd.nist.gov/vuln/detail/CVE-2020-25722 |
22964 | samba>=4.14<4.14.10 local-system-compromise https://nvd.nist.gov/vuln/detail/CVE-2020-25722 | | 22964 | samba>=4.14<4.14.10 local-system-compromise https://nvd.nist.gov/vuln/detail/CVE-2020-25722 |
22965 | samba>=4.15<4.15.2 local-system-compromise https://nvd.nist.gov/vuln/detail/CVE-2020-25722 | | 22965 | samba>=4.15<4.15.2 local-system-compromise https://nvd.nist.gov/vuln/detail/CVE-2020-25722 |
22966 | samba>=4.0<4.13.14 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-25718 | | 22966 | samba>=4.0<4.13.14 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-25718 |
22967 | samba>=4.14<4.14.10 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-25718 | | 22967 | samba>=4.14<4.14.10 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-25718 |
22968 | samba>=4.15<4.15.2 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-25718 | | 22968 | samba>=4.15<4.15.2 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-25718 |
22969 | samba>=4.0<4.13.14 input-validation https://nvd.nist.gov/vuln/detail/CVE-2020-25717 | | 22969 | samba>=4.0<4.13.14 input-validation https://nvd.nist.gov/vuln/detail/CVE-2020-25717 |
22970 | samba>=4.14<4.14.10 input-validation https://nvd.nist.gov/vuln/detail/CVE-2020-25717 | | 22970 | samba>=4.14<4.14.10 input-validation https://nvd.nist.gov/vuln/detail/CVE-2020-25717 |
22971 | samba>=4.15<4.15.2 input-validation https://nvd.nist.gov/vuln/detail/CVE-2020-25717 | | 22971 | samba>=4.15<4.15.2 input-validation https://nvd.nist.gov/vuln/detail/CVE-2020-25717 |
22972 | samba>=4.0<4.13.14 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-25719 | | 22972 | samba>=4.0<4.13.14 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-25719 |
22973 | samba>=4.14<4.14.10 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-25719 | | 22973 | samba>=4.14<4.14.10 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-25719 |
22974 | samba>=4.15<4.15.2 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-25719 | | 22974 | samba>=4.15<4.15.2 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-25719 |
22975 | samba>=4.0<4.13.14 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2016-2124 | | 22975 | samba>=4.0<4.13.14 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2016-2124 |
22976 | samba>=4.14<4.14.10 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2016-2124 | | 22976 | samba>=4.14<4.14.10 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2016-2124 |
22977 | samba>=4.15<4.15.2 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2016-2124 | | 22977 | samba>=4.15<4.15.2 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2016-2124 |
22978 | samba<4.13.17 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-44142 | | 22978 | samba<4.13.17 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-44142 |
22979 | samba>=4.14<4.14.12 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-44142 | | 22979 | samba>=4.14<4.14.12 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-44142 |
22980 | samba>=4.15<4.15.5 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-44142 | | 22980 | samba>=4.15<4.15.5 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-44142 |
22981 | samba<4.15.5 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-44141 | | 22981 | samba<4.15.5 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-44141 |
22982 | samba>=4.0<4.13.14 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-3738 | | 22982 | samba>=4.0<4.13.14 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-3738 |
22983 | samba>=4.14<4.14.10 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-3738 | | 22983 | samba>=4.14<4.14.10 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-3738 |
22984 | samba>=4.15<4.15.2 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-3738 | | 22984 | samba>=4.15<4.15.2 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-3738 |
22985 | samba>=4.10<4.13.14 input-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23192 | | 22985 | samba>=4.10<4.13.14 input-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23192 |
22986 | samba>=4.14<4.14.10 input-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23192 | | 22986 | samba>=4.14<4.14.10 input-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23192 |
22987 | samba>=4.15<4.15.2 input-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23192 | | 22987 | samba>=4.15<4.15.2 input-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23192 |
22988 | go116<1.16.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24921 | | 22988 | go116<1.16.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24921 |
22989 | go117<1.17.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24921 | | 22989 | go117<1.17.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24921 |
22990 | mediawiki<1.23.16 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2017-0371 | | 22990 | mediawiki<1.23.16 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2017-0371 |
22991 | libreoffice>=7.2<7.2.5 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-25636 | | 22991 | libreoffice>=7.2<7.2.5 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-25636 |
22992 | py{36,37,38,39,310}-scrapy<2.6.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-0577 | | 22992 | py{36,37,38,39,310}-scrapy<2.6.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-0577 |
22993 | libtpms<0.9.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-3623 | | 22993 | libtpms<0.9.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-3623 |
22994 | ansible-base<2.9.26 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-3620 | | 22994 | ansible-base<2.9.26 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-3620 |
22995 | python36<3.6.14 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2021-3737 | | 22995 | python36<3.6.14 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2021-3737 |
22996 | python37<3.7.11 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2021-3737 | | 22996 | python37<3.7.11 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2021-3737 |
22997 | python38<3.8.11 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2021-3737 | | 22997 | python38<3.8.11 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2021-3737 |
22998 | python39<3.9.6 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2021-3737 | | 22998 | python39<3.9.6 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2021-3737 |
22999 | sqlite3>=3.35.1<3.38.0 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2021-45346 | | 22999 | sqlite3>=3.35.1<3.38.0 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2021-45346 |
23000 | mariadb-server<10.4.23 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24052 | | 23000 | mariadb-server<10.4.23 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24052 |
23001 | mariadb-server>=10.5<10.5.14 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24052 | | 23001 | mariadb-server>=10.5<10.5.14 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24052 |
23002 | mariadb-server>=10.6<10.6.6 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24052 | | 23002 | mariadb-server>=10.6<10.6.6 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24052 |
23003 | mariadb-server<10.4.23 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24051 | | 23003 | mariadb-server<10.4.23 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24051 |
23004 | mariadb-server>=10.5<10.5.14 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24051 | | 23004 | mariadb-server>=10.5<10.5.14 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24051 |
23005 | mariadb-server>=10.6<10.6.6 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24051 | | 23005 | mariadb-server>=10.6<10.6.6 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24051 |
23006 | mariadb-server<10.4.23 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24050 | | 23006 | mariadb-server<10.4.23 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24050 |
23007 | mariadb-server>=10.5<10.5.15 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24050 | | 23007 | mariadb-server>=10.5<10.5.15 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24050 |
23008 | mariadb-server>=10.6<10.6.6 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24050 | | 23008 | mariadb-server>=10.6<10.6.6 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24050 |
23009 | mariadb-server<10.4.23 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24048 | | 23009 | mariadb-server<10.4.23 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24048 |
23010 | mariadb-server>=10.5<10.5.15 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24048 | | 23010 | mariadb-server>=10.5<10.5.15 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24048 |
23011 | mariadb-server>=10.6<10.6.6 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24048 | | 23011 | mariadb-server>=10.6<10.6.6 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-24048 |
23012 | nodejs<12.22.9 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-44533 | | 23012 | nodejs<12.22.9 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-44533 |
23013 | nodejs>=14<14.18.3 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-44533 | | 23013 | nodejs>=14<14.18.3 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-44533 |
23014 | nodejs<12.22.9 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-44532 | | 23014 | nodejs<12.22.9 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-44532 |
23015 | nodejs>=14<14.18.3 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-44532 | | 23015 | nodejs>=14<14.18.3 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-44532 |
23016 | nodejs<12.22.9 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-44531 | | 23016 | nodejs<12.22.9 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-44531 |
23017 | nodejs>=14<14.18.3 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-44531 | | 23017 | nodejs>=14<14.18.3 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-44531 |
23018 | php>=7.4<7.4.28 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-21708 | | 23018 | php>=7.4<7.4.28 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-21708 |
23019 | php>=8.0<8.0.16 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-21708 | | 23019 | php>=8.0<8.0.16 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-21708 |
23020 | php>=8.1<8.1.3 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-21708 | | 23020 | php>=8.1<8.1.3 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-21708 |
23021 | postgresql11-server<11.13 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-3677 | | 23021 | postgresql11-server<11.13 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-3677 |
23022 | postgresql12-server<12.8 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-3677 | | 23022 | postgresql12-server<12.8 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-3677 |
23023 | postgresql13-server<13.4 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-3677 | | 23023 | postgresql13-server<13.4 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-3677 |
23024 | postgresql96-server<9.6.24 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23214 | | 23024 | postgresql96-server<9.6.24 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23214 |
23025 | postgresql10-server<10.19 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23214 | | 23025 | postgresql10-server<10.19 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23214 |
23026 | postgresql11-server<11.14 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23214 | | 23026 | postgresql11-server<11.14 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23214 |
23027 | postgresql12-server<12.9 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23214 | | 23027 | postgresql12-server<12.9 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23214 |
23028 | postgresql13-server<13.5 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23214 | | 23028 | postgresql13-server<13.5 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23214 |
23029 | postgresql14-server<14.1 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23214 | | 23029 | postgresql14-server<14.1 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2021-23214 |
23030 | nginx<1.20.2nb2 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-25139 | | 23030 | nginx<1.20.2nb2 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-25139 |
23031 | nginx>=1.21<1.21.6nb1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-25139 | | 23031 | nginx>=1.21<1.21.6nb1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-25139 |
23032 | njs<0.7.2 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-25139 | | 23032 | njs<0.7.2 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-25139 |
23033 | nginx<1.20.2nb2 type-confusion https://nvd.nist.gov/vuln/detail/CVE-2021-46463 | | 23033 | nginx<1.20.2nb2 type-confusion https://nvd.nist.gov/vuln/detail/CVE-2021-46463 |
23034 | nginx>=1.21<1.21.6nb1 type-confusion https://nvd.nist.gov/vuln/detail/CVE-2021-46463 | | 23034 | nginx>=1.21<1.21.6nb1 type-confusion https://nvd.nist.gov/vuln/detail/CVE-2021-46463 |
23035 | njs<0.7.2 type-confusion https://nvd.nist.gov/vuln/detail/CVE-2021-46463 | | 23035 | njs<0.7.2 type-confusion https://nvd.nist.gov/vuln/detail/CVE-2021-46463 |
23036 | nginx<1.20.2nb2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2021-46462 | | 23036 | nginx<1.20.2nb2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2021-46462 |
23037 | nginx>=1.21<1.21.6nb1 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2021-46462 | | 23037 | nginx>=1.21<1.21.6nb1 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2021-46462 |
23038 | njs<0.7.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2021-46462 | | 23038 | njs<0.7.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2021-46462 |
23039 | nginx<1.20.2nb2 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-46461 | | 23039 | nginx<1.20.2nb2 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-46461 |
23040 | nginx>=1.21<1.21.6nb1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-46461 | | 23040 | nginx>=1.21<1.21.6nb1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-46461 |
23041 | njs<0.7.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-46461 | | 23041 | njs<0.7.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-46461 |
23042 | mupdf<1.20.0nb2 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-45005 | | 23042 | mupdf<1.20.0nb2 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-45005 |
23043 | bareos<20.0.6 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24756 | | 23043 | bareos<20.0.6 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24756 |
23044 | bareos<20.0.6 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24755 | | 23044 | bareos<20.0.6 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24755 |
23045 | py{27,34,35,36,37,38,39,310}-httpie<3.1.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-0430 | | 23045 | py{27,34,35,36,37,38,39,310}-httpie<3.1.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-0430 |
23046 | openssl<1.1.1n denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0778 | | 23046 | openssl<1.1.1n denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0778 |
23047 | gitea<1.13.6 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2021-29134 | | 23047 | gitea<1.13.6 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2021-29134 |
23048 | vim<8.2.4563 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0943 | | 23048 | vim<8.2.4563 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0943 |
23049 | qemu<7.0.0 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-26354 | | 23049 | qemu<7.0.0 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-26354 |
23050 | qemu<7.0.0 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-26353 | | 23050 | qemu<7.0.0 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-26353 |
23051 | htmldoc<1.9.12 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-23158 | | 23051 | htmldoc<1.9.12 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-23158 |
23052 | openexr<3.0.1 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-20299 | | 23052 | openexr<3.0.1 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-20299 |
23053 | ansible-base<2.9.18 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-20180 | | 23053 | ansible-base<2.9.18 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-20180 |
23054 | qemu<6.0.0 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2021-20257 | | 23054 | qemu<6.0.0 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2021-20257 |
23055 | samba>=4.0<4.13.14 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-25721 | | 23055 | samba>=4.0<4.13.14 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-25721 |
23056 | samba>=4.14<4.14.10 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-25721 | | 23056 | samba>=4.14<4.14.10 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-25721 |
23057 | samba>=4.15<4.15.2 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-25721 | | 23057 | samba>=4.15<4.15.2 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-25721 |
23058 | minidlna<1.3.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-26505 | | 23058 | minidlna<1.3.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-26505 |
23059 | py{27,34,35,36,37,38,39,310}-httpie<3.1.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-24737 | | 23059 | py{27,34,35,36,37,38,39,310}-httpie<3.1.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-24737 |
23060 | php{56,71,72,73,74,80}-nextcloud>=20<20.0.14 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41239 | | 23060 | php{56,71,72,73,74,80}-nextcloud>=20<20.0.14 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41239 |
23061 | php{56,71,72,73,74,80}-nextcloud>=21<21.0.6 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41239 | | 23061 | php{56,71,72,73,74,80}-nextcloud>=21<21.0.6 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41239 |
23062 | php{56,71,72,73,74,80}-nextcloud>=22<22.2.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41239 | | 23062 | php{56,71,72,73,74,80}-nextcloud>=22<22.2.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41239 |
23063 | icingaweb2<2.9.6 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-24716 | | 23063 | icingaweb2<2.9.6 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-24716 |
23064 | icingaweb2<2.8.6 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-24714 | | 23064 | icingaweb2<2.8.6 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-24714 |
23065 | icingaweb2<2.8.6 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24715 | | 23065 | icingaweb2<2.8.6 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24715 |
23066 | zabbix-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-24919 | | 23066 | zabbix-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-24919 |
23067 | zabbix-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-24917 | | 23067 | zabbix-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-24917 |
23068 | zabbix-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-24918 | | 23068 | zabbix-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-24918 |
23069 | zabbix-[0-9]* security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24349 | | 23069 | zabbix-[0-9]* security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24349 |
23070 | gitea<1.16.4 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-0905 | | 23070 | gitea<1.16.4 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-0905 |
23071 | libcaca-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0856 | | 23071 | libcaca-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0856 |
23072 | php{56,70,71,72,73,74,80}-phpmyadmin<4.9.10 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-0813 | | 23072 | php{56,70,71,72,73,74,80}-phpmyadmin<4.9.10 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-0813 |
23073 | keepass-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-0725 | | 23073 | keepass-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-0725 |
23074 | ming-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-34342 | | 23074 | ming-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-34342 |
23075 | ming-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-34341 | | 23075 | ming-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-34341 |
23076 | ming-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-34340 | | 23076 | ming-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-34340 |
23077 | ming-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-34339 | | 23077 | ming-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-34339 |
23078 | ming-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-34338 | | 23078 | ming-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-34338 |
23079 | libpano13-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-33293 | | 23079 | libpano13-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-33293 |
23080 | libsixel-[0-9]* double-free https://nvd.nist.gov/vuln/detail/CVE-2020-36123 | | 23080 | libsixel-[0-9]* double-free https://nvd.nist.gov/vuln/detail/CVE-2020-36123 |
23081 | gpac-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-26967 | | 23081 | gpac-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-26967 |
23082 | gpac<2.0 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24578 | | 23082 | gpac<2.0 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24578 |
23083 | gpac<2.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-24577 | | 23083 | gpac<2.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-24577 |
23084 | gpac<2.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-24576 | | 23084 | gpac<2.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-24576 |
23085 | gpac<2.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24575 | | 23085 | gpac<2.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24575 |
23086 | gpac<2.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-24574 | | 23086 | gpac<2.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-24574 |
23087 | apache<2.4.53 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-23943 | | 23087 | apache<2.4.53 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-23943 |
23088 | apache<2.4.53 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-22720 | | 23088 | apache<2.4.53 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-22720 |
23089 | apache<2.4.53 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22721 | | 23089 | apache<2.4.53 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-22721 |
23090 | apache<2.4.53 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-22719 | | 23090 | apache<2.4.53 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-22719 |
23091 | mutt<2.2.3 buffer-overrun https://nvd.nist.gov/vuln/detail/CVE-2022-1328 | | 23091 | mutt<2.2.3 buffer-overrun https://nvd.nist.gov/vuln/detail/CVE-2022-1328 |
23092 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32162 | | 23092 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32162 |
23093 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32161 | | 23093 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32161 |
23094 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32160 | | 23094 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32160 |
23095 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32159 | | 23095 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32159 |
23096 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32158 | | 23096 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32158 |
23097 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32157 | | 23097 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32157 |
23098 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32156 | | 23098 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32156 |
23099 | vim<8.2.4647 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1160 | | 23099 | vim<8.2.4647 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1160 |
23100 | vim<8.2.4646 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-1154 | | 23100 | vim<8.2.4646 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-1154 |
23101 | tcpreplay-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27942 | | 23101 | tcpreplay-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27942 |
23102 | tcpreplay-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27941 | | 23102 | tcpreplay-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27941 |
23103 | tcpreplay-[0-9]* arbitrary-file-reading https://nvd.nist.gov/vuln/detail/CVE-2022-27939 | | 23103 | tcpreplay-[0-9]* arbitrary-file-reading https://nvd.nist.gov/vuln/detail/CVE-2022-27939 |
23104 | tcpreplay-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27940 | | 23104 | tcpreplay-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27940 |
23105 | tcpreplay<4.4.1 double-free https://nvd.nist.gov/vuln/detail/CVE-2022-27416 | | 23105 | tcpreplay<4.4.1 double-free https://nvd.nist.gov/vuln/detail/CVE-2022-27416 |
23106 | tcpreplay<4.4.1 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27418 | | 23106 | tcpreplay<4.4.1 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27418 |
23107 | salt<3004.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-22941 | | 23107 | salt<3004.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-22941 |
23108 | salt<3004.1 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-22936 | | 23108 | salt<3004.1 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-22936 |
23109 | salt<3004.1 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2022-22935 | | 23109 | salt<3004.1 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2022-22935 |
23110 | salt<3004.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-22934 | | 23110 | salt<3004.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-22934 |
23111 | moodle<3.10.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32478 | | 23111 | moodle<3.10.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32478 |
23112 | moodle<3.10.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-32476 | | 23112 | moodle<3.10.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-32476 |
23113 | moodle<3.10.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32475 | | 23113 | moodle<3.10.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-32475 |
23114 | moodle<3.10.4 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2021-32474 | | 23114 | moodle<3.10.4 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2021-32474 |
23115 | moodle<3.10.4 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-32473 | | 23115 | moodle<3.10.4 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-32473 |
23116 | moodle<3.10.4 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-32472 | | 23116 | moodle<3.10.4 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-32472 |
23117 | moodle<3.10.4 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2021-32477 | | 23117 | moodle<3.10.4 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2021-32477 |
23118 | radare2<5.6.6 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-1031 | | 23118 | radare2<5.6.6 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-1031 |
23119 | radare2<5.6.8 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1061 | | 23119 | radare2<5.6.8 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1061 |
23120 | radare2<5.6.6 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1052 | | 23120 | radare2<5.6.6 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1052 |
23121 | radare2<5.6.8 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1207 | | 23121 | radare2<5.6.8 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1207 |
23122 | radare2<5.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1244 | | 23122 | radare2<5.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1244 |
23123 | radare2<5.6.8 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1238 | | 23123 | radare2<5.6.8 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1238 |
23124 | radare2<5.8.6 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1240 | | 23124 | radare2<5.8.6 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1240 |
23125 | radare2<5.6.8 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1237 | | 23125 | radare2<5.6.8 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1237 |
23126 | radare2<5.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1284 | | 23126 | radare2<5.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1284 |
23127 | radare2<5.6.8 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-1283 | | 23127 | radare2<5.6.8 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-1283 |
23128 | radare2<5.6.8 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1296 | | 23128 | radare2<5.6.8 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1296 |
23129 | radare2<5.6.8 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1297 | | 23129 | radare2<5.6.8 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1297 |
23130 | libsixel-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27938 | | 23130 | libsixel-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27938 |
23131 | libsixel-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-27046 | | 23131 | libsixel-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-27046 |
23132 | libsixel-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27044 | | 23132 | libsixel-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27044 |
23133 | libsixel-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-41715 | | 23133 | libsixel-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-41715 |
23134 | libsixel-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40656 | | 23134 | libsixel-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40656 |
23135 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1035 | | 23135 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1035 |
23136 | gpac-[0-9]* infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2022-1222 | | 23136 | gpac-[0-9]* infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2022-1222 |
23137 | gpac-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27148 | | 23137 | gpac-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27148 |
23138 | gpac-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-27147 | | 23138 | gpac-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-27147 |
23139 | gpac-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27146 | | 23139 | gpac-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27146 |
23140 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27145 | | 23140 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27145 |
23141 | php{56,72,73,74,80}-orangehrm<4.10.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-27107 | | 23141 | php{56,72,73,74,80}-orangehrm<4.10.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-27107 |
23142 | php{56,72,73,74,80}-orangehrm<4.10.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-27108 | | 23142 | php{56,72,73,74,80}-orangehrm<4.10.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-27108 |
23143 | jhead<3.06.0.1 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-28278 | | 23143 | jhead<3.06.0.1 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-28278 |
23144 | jhead<3.06.0.1 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-28277 | | 23144 | jhead<3.06.0.1 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-28277 |
23145 | jhead<3.06.0.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-28276 | | 23145 | jhead<3.06.0.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-28276 |
23146 | jhead<3.06.0.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-28275 | | 23146 | jhead<3.06.0.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-28275 |
23147 | abcm2ps<8.14.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-32436 | | 23147 | abcm2ps<8.14.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-32436 |
23148 | abcm2ps<8.14.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-32435 | | 23148 | abcm2ps<8.14.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-32435 |
23149 | abcm2ps<8.14.12 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-32434 | | 23149 | abcm2ps<8.14.12 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-32434 |
23150 | mediawiki<1.37.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-28209 | | 23150 | mediawiki<1.37.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-28209 |
23151 | mediawiki<1.37.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-28202 | | 23151 | mediawiki<1.37.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-28202 |
23152 | tiff<4.4.0 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0891 | | 23152 | tiff<4.4.0 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0891 |
23153 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0865 | | 23153 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0865 |
23154 | tiff<4.4.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0924 | | 23154 | tiff<4.4.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-0924 |
23155 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0908 | | 23155 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0908 |
23156 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0909 | | 23156 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0909 |
23157 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0907 | | 23157 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0907 |
23158 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1056 | | 23158 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1056 |
23159 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1210 | | 23159 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1210 |
23160 | gerbv-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-40402 | | 23160 | gerbv-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-40402 |
23161 | gerbv-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-40400 | | 23161 | gerbv-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-40400 |
23162 | openexr<3.1.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3941 | | 23162 | openexr<3.1.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3941 |
23163 | openexr<3.1.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3933 | | 23163 | openexr<3.1.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3933 |
23164 | py{27,34,35,36,37,38,39,310}-tryton<6.2.6 authorization-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-26661 | | 23164 | py{27,34,35,36,37,38,39,310}-tryton<6.2.6 authorization-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-26661 |
23165 | wavpack-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-44269 | | 23165 | wavpack-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-44269 |
23166 | grub2-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-3981 | | 23166 | grub2-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-3981 |
23167 | horde<2.2.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-26874 | | 23167 | horde<2.2.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-26874 |
23168 | fish<3.4.0 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-20001 | | 23168 | fish<3.4.0 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-20001 |
23169 | lua54<5.4.4 sandbox-escape https://nvd.nist.gov/vuln/detail/CVE-2021-44964 | | 23169 | lua54<5.4.4 sandbox-escape https://nvd.nist.gov/vuln/detail/CVE-2021-44964 |
23170 | py{27,34,35,36,37,38,39,310}-paramiko<2.10.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-24302 | | 23170 | py{27,34,35,36,37,38,39,310}-paramiko<2.10.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-24302 |
23171 | openvpn<2.5.6 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-0547 | | 23171 | openvpn<2.5.6 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-0547 |
23172 | mitmproxy<8.0.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-24766 | | 23172 | mitmproxy<8.0.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-24766 |
23173 | bind>=9.16.11<9.16.27 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0396 | | 23173 | bind>=9.16.11<9.16.27 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0396 |
23174 | libsndfile<1.1.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-4156 | | 23174 | libsndfile<1.1.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-4156 |
23175 | qemu<6.2.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-3748 | | 23175 | qemu<6.2.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-3748 |
23176 | gitea<1.16.5 open-redirect https://nvd.nist.gov/vuln/detail/CVE-2022-1058 | | 23176 | gitea<1.16.5 open-redirect https://nvd.nist.gov/vuln/detail/CVE-2022-1058 |
23177 | mbedtls-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-43666 | | 23177 | mbedtls-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-43666 |
23178 | libvirt-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0897 | | 23178 | libvirt-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-0897 |
23179 | libvirt-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4147 | | 23179 | libvirt-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4147 |
23180 | qemu<2.17.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3582 | | 23180 | qemu<2.17.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3582 |
23181 | caribou<0.4.21 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3567 | | 23181 | caribou<0.4.21 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3567 |
23182 | zlib<1.2.12 input-validation https://nvd.nist.gov/vuln/detail/CVE-2018-25032 | | 23182 | zlib<1.2.12 input-validation https://nvd.nist.gov/vuln/detail/CVE-2018-25032 |
23183 | py{27,34,35,36,37,38,39,310}-Pillow<9.0.1 local-file-delete https://nvd.nist.gov/vuln/detail/CVE-2022-24303 | | 23183 | py{27,34,35,36,37,38,39,310}-Pillow<9.0.1 local-file-delete https://nvd.nist.gov/vuln/detail/CVE-2022-24303 |
23184 | lrzip<0.650 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-26291 | | 23184 | lrzip<0.650 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-26291 |
23185 | re2c<3.0 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2022-23901 | | 23185 | re2c<3.0 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2022-23901 |
23186 | openjpeg<2.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1122 | | 23186 | openjpeg<2.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1122 |
23187 | mediawiki<1.37.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-28205 | | 23187 | mediawiki<1.37.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-28205 |
23188 | mediawiki<1.37.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-28206 | | 23188 | mediawiki<1.37.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-28206 |
23189 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1172 | | 23189 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1172 |
23190 | ruby{25,26,27,30,31}-puma<5.6.4 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-24790 | | 23190 | ruby{25,26,27,30,31}-puma<5.6.4 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-24790 |
23191 | py{27,36,37,38,39,310}-notebook<6.4.9 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-24758 | | 23191 | py{27,36,37,38,39,310}-notebook<6.4.9 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-24758 |
23192 | SDL2<2.0.20 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-33657 | | 23192 | SDL2<2.0.20 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-33657 |
23193 | weechat<3.4 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2022-28352 | | 23193 | weechat<3.4 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2022-28352 |
23194 | py{27,36,37,38,39,310}-twisted<22.4.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-24801 | | 23194 | py{27,36,37,38,39,310}-twisted<22.4.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-24801 |
23195 | htmldoc<1.9.15 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24191 | | 23195 | htmldoc<1.9.15 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24191 |
23196 | py{27,36,37,38,39,310}-djangocms-text-ckeditor-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-24729 | | 23196 | py{27,36,37,38,39,310}-djangocms-text-ckeditor-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-24729 |
23197 | py{27,36,37,38,39,310}-djangocms-text-ckeditor-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-24728 | | 23197 | py{27,36,37,38,39,310}-djangocms-text-ckeditor-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-24728 |
23198 | mantis<2.25.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-26144 | | 23198 | mantis<2.25.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-26144 |
23199 | mantis<2.25.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-43257 | | 23199 | mantis<2.25.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-43257 |
23200 | libde265<1.0.10 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1253 | | 23200 | libde265<1.0.10 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1253 |
23201 | sox-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40426 | | 23201 | sox-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40426 |
23202 | njs<0.7.3 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27008 | | 23202 | njs<0.7.3 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27008 |
23203 | njs<0.7.3 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-27007 | | 23203 | njs<0.7.3 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-27007 |
23204 | mutt<2.2.3 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1328 | | 23204 | mutt<2.2.3 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1328 |
23205 | subversion-base<1.14.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-28544 | | 23205 | subversion-base<1.14.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-28544 |
23206 | ap24-subversion<1.14.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-28544 | | 23206 | ap24-subversion<1.14.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-28544 |
23207 | lua54-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-28805 | | 23207 | lua54-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-28805 |
23208 | e2fsprogs-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1304 | | 23208 | e2fsprogs-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1304 |
23209 | go116-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27191 | | 23209 | go116-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27191 |
23210 | go117<1.17.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27191 | | 23210 | go117<1.17.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27191 |
23211 | mariadb-server>=10.6<10.6.8 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27387 | | 23211 | mariadb-server>=10.6<10.6.8 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27387 |
23212 | mariadb-server>=10.5<10.5.16 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27387 | | 23212 | mariadb-server>=10.5<10.5.16 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27387 |
23213 | mariadb-server>=10.4<10.4.25 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27387 | | 23213 | mariadb-server>=10.4<10.4.25 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27387 |
23214 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27386 | | 23214 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27386 |
23215 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27386 | | 23215 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27386 |
23216 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27386 | | 23216 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27386 |
23217 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27382 | | 23217 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27382 |
23218 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27382 | | 23218 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27382 |
23219 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27382 | | 23219 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27382 |
23220 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27380 | | 23220 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27380 |
23221 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27380 | | 23221 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27380 |
23222 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27380 | | 23222 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27380 |
23223 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27384 | | 23223 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27384 |
23224 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27384 | | 23224 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27384 |
23225 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27384 | | 23225 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27384 |
23226 | mariadb-server>=10.6<10.6.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27385 | | 23226 | mariadb-server>=10.6<10.6.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27385 |
23227 | mariadb-server>=10.5<10.5.13 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27385 | | 23227 | mariadb-server>=10.5<10.5.13 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27385 |
23228 | mariadb-server>=10.4<10.4.22 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27385 | | 23228 | mariadb-server>=10.4<10.4.22 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27385 |
23229 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27383 | | 23229 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27383 |
23230 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27383 | | 23230 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27383 |
23231 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27383 | | 23231 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27383 |
23232 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27379 | | 23232 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27379 |
23233 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27379 | | 23233 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27379 |
23234 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27379 | | 23234 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27379 |
23235 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27378 | | 23235 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27378 |
23236 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27378 | | 23236 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27378 |
23237 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27378 | | 23237 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27378 |
23238 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27381 | | 23238 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27381 |
23239 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27381 | | 23239 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27381 |
23240 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27381 | | 23240 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27381 |
23241 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27376 | | 23241 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27376 |
23242 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27376 | | 23242 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27376 |
23243 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27376 | | 23243 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27376 |
23244 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27377 | | 23244 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27377 |
23245 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27377 | | 23245 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27377 |
23246 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27377 | | 23246 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27377 |
23247 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27458 | | 23247 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27458 |
23248 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27458 | | 23248 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27458 |
23249 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27458 | | 23249 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27458 |
23250 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27457 | | 23250 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27457 |
23251 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27457 | | 23251 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27457 |
23252 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27457 | | 23252 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27457 |
23253 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27456 | | 23253 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27456 |
23254 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27456 | | 23254 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27456 |
23255 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27456 | | 23255 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27456 |
23256 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27452 | | 23256 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27452 |
23257 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27452 | | 23257 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27452 |
23258 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27452 | | 23258 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27452 |
23259 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27455 | | 23259 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27455 |
23260 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27455 | | 23260 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27455 |
23261 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27455 | | 23261 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27455 |
23262 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27451 | | 23262 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27451 |
23263 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27451 | | 23263 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27451 |
23264 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27451 | | 23264 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27451 |
23265 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27448 | | 23265 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27448 |
23266 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27448 | | 23266 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27448 |
23267 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27448 | | 23267 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27448 |
23268 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27447 | | 23268 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27447 |
23269 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27447 | | 23269 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27447 |
23270 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27447 | | 23270 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27447 |
23271 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27446 | | 23271 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27446 |
23272 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27446 | | 23272 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27446 |
23273 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27446 | | 23273 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27446 |
23274 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27449 | | 23274 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27449 |
23275 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27449 | | 23275 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27449 |
23276 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27449 | | 23276 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27449 |
23277 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27445 | | 23277 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27445 |
23278 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27445 | | 23278 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27445 |
23279 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27445 | | 23279 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27445 |
23280 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27444 | | 23280 | mariadb-server>=10.6<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27444 |
23281 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27444 | | 23281 | mariadb-server>=10.5<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27444 |
23282 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27444 | | 23282 | mariadb-server>=10.4<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27444 |
23283 | subversion-base<1.14.2 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-24070 | | 23283 | subversion-base<1.14.2 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-24070 |
23284 | ap24-subversion<1.14.2 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-24070 | | 23284 | ap24-subversion<1.14.2 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-24070 |
23285 | mongodb<4.2.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-32040 | | 23285 | mongodb<4.2.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-32040 |
23286 | asterisk16<16.25.2 server-side-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-26499 | | 23286 | asterisk16<16.25.2 server-side-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-26499 |
23287 | asterisk18<18.11.2 server-side-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-26499 | | 23287 | asterisk18<18.11.2 server-side-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-26499 |
23288 | asterisk19<19.3.2 server-side-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-26499 | | 23288 | asterisk19<19.3.2 server-side-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-26499 |
23289 | asterisk16<16.25.2 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2022-26498 | | 23289 | asterisk16<16.25.2 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2022-26498 |
23290 | asterisk18<18.11.2 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2022-26498 | | 23290 | asterisk18<18.11.2 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2022-26498 |
23291 | asterisk19<19.3.2 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2022-26498 | | 23291 | asterisk19<19.3.2 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2022-26498 |
23292 | asterisk16<16.25.2 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-26651 | | 23292 | asterisk16<16.25.2 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-26651 |
23293 | asterisk18<18.11.2 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-26651 | | 23293 | asterisk18<18.11.2 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-26651 |
23294 | asterisk18<19.3.2 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-26651 | | 23294 | asterisk18<19.3.2 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-26651 |
23295 | php{56,71,72,73,74,80}-nextcloud<20.0.14 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41241 | | 23295 | php{56,71,72,73,74,80}-nextcloud<20.0.14 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41241 |
23296 | php{56,71,72,73,74,80}-nextcloud>=21<21.0.6 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41241 | | 23296 | php{56,71,72,73,74,80}-nextcloud>=21<21.0.6 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41241 |
23297 | php{56,71,72,73,74,80}-nextcloud>=22<22.2.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41241 | | 23297 | php{56,71,72,73,74,80}-nextcloud>=22<22.2.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41241 |
23298 | php{56,71,72,73,74,80}-nextcloud<21.0.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24741 | | 23298 | php{56,71,72,73,74,80}-nextcloud<21.0.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24741 |
23299 | php{56,71,72,73,74,80}-nextcloud>=22<22.2.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24741 | | 23299 | php{56,71,72,73,74,80}-nextcloud>=22<22.2.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24741 |
23300 | php{56,71,72,73,74,80}-nextcloud>=23<23.0.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24741 | | 23300 | php{56,71,72,73,74,80}-nextcloud>=23<23.0.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24741 |
23301 | php{56,71,72,73,74,80}-nextcloud<20.0.14 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41233 | | 23301 | php{56,71,72,73,74,80}-nextcloud<20.0.14 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41233 |
23302 | php{56,71,72,73,74,80}-nextcloud>=21<21.0.6 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41233 | | 23302 | php{56,71,72,73,74,80}-nextcloud>=21<21.0.6 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41233 |
23303 | php{56,71,72,73,74,80}-nextcloud>=22<22.2.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41233 | | 23303 | php{56,71,72,73,74,80}-nextcloud>=22<22.2.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-41233 |
23304 | ImageMagick<6.9.12.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4219 | | 23304 | ImageMagick<6.9.12.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4219 |
23305 | ImageMagick>=7.1<7.1.0.19 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4219 | | 23305 | ImageMagick>=7.1<7.1.0.19 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4219 |
23306 | php{56,72,73,74,80}-composer<2.2.12 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-24828 | | 23306 | php{56,72,73,74,80}-composer<2.2.12 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-24828 |
23307 | xenkernel411-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-26356 | | 23307 | xenkernel411-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-26356 |
23308 | xenkernel413-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-26356 | | 23308 | xenkernel413-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-26356 |
23309 | xenkernel415<4.15.3 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-26356 | | 23309 | xenkernel415<4.15.3 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-26356 |
23310 | njs<0.7.3 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-28049 | | 23310 | njs<0.7.3 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-28049 |
23311 | php{56,73,74,80,81}-piwigo-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-26267 | | 23311 | php{56,73,74,80,81}-piwigo-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-26267 |
23312 | php{56,73,74,80,81}-piwigo-[0-9]* sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-26266 | | 23312 | php{56,73,74,80,81}-piwigo-[0-9]* sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-26266 |
23313 | powerdns<4.4.3 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-27227 | | 23313 | powerdns<4.4.3 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-27227 |
23314 | powerdns-recursor<4.4.8 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-27227 | | 23314 | powerdns-recursor<4.4.8 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-27227 |
23315 | ruby{25,26,27,30,31}-nokogiri<1.13.4 xml-external-entity https://nvd.nist.gov/vuln/detail/CVE-2022-24836 | | 23315 | ruby{25,26,27,30,31}-nokogiri<1.13.4 xml-external-entity https://nvd.nist.gov/vuln/detail/CVE-2022-24836 |
23316 | # affects ghostpcl, not part of standard ghostscript, see e.g. https://ubuntu.com/security/CVE-2022-1350 | | 23316 | # affects ghostpcl, not part of standard ghostscript, see e.g. https://ubuntu.com/security/CVE-2022-1350 |
23317 | #ghostscript-agpl-[0-9]* memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-1350 | | 23317 | #ghostscript-agpl-[0-9]* memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-1350 |
23318 | neomutt<20220415 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1328 | | 23318 | neomutt<20220415 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1328 |
23319 | php{56,73,74,80,81}-memcached<2.1.0 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-26635 | | 23319 | php{56,73,74,80,81}-memcached<2.1.0 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-26635 |
23320 | grafana<8.4.6 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24812 | | 23320 | grafana<8.4.6 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24812 |
23321 | grafana<7.3.5 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-26148 | | 23321 | grafana<7.3.5 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-26148 |
23322 | libarchive<3.6.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-26280 | | 23322 | libarchive<3.6.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-26280 |
23323 | py{27,36,37,38,39,310}-django>=2.2<2.2.28 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-28347 | | 23323 | py{27,36,37,38,39,310}-django>=2.2<2.2.28 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-28347 |
23324 | py{27,36,37,38,39,310}-django>=3.2<3.2.13 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-28347 | | 23324 | py{27,36,37,38,39,310}-django>=3.2<3.2.13 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-28347 |
23325 | py{27,36,37,38,39,310}-django>=4.0<4.0.4 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-28347 | | 23325 | py{27,36,37,38,39,310}-django>=4.0<4.0.4 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-28347 |
23326 | py{27,36,37,38,39,310}-django>=2.2<2.2.28 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-28346 | | 23326 | py{27,36,37,38,39,310}-django>=2.2<2.2.28 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-28346 |
23327 | py{27,36,37,38,39,310}-django>=3.2<3.2.13 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-28346 | | 23327 | py{27,36,37,38,39,310}-django>=3.2<3.2.13 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-28346 |
23328 | py{27,36,37,38,39,310}-django>=4.0<4.0.4 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-28346 | | 23328 | py{27,36,37,38,39,310}-django>=4.0<4.0.4 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-28346 |
23329 | ruby{25,26,27,30,31}-yajl<1.4.2 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24795 | | 23329 | ruby{25,26,27,30,31}-yajl<1.4.2 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24795 |
23330 | bind>=9.11<9.11.37 dns-cache-poisoning https://nvd.nist.gov/vuln/detail/CVE-2021-25220 | | 23330 | bind>=9.11<9.11.37 dns-cache-poisoning https://nvd.nist.gov/vuln/detail/CVE-2021-25220 |
23331 | bind>=9.16<9.16.27 dns-cache-poisoning https://nvd.nist.gov/vuln/detail/CVE-2021-25220 | | 23331 | bind>=9.16<9.16.27 dns-cache-poisoning https://nvd.nist.gov/vuln/detail/CVE-2021-25220 |
23332 | python37<3.7.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3733 | | 23332 | python37<3.7.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3733 |
23333 | python39<3.8.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3733 | | 23333 | python39<3.8.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3733 |
23334 | python39<3.9.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3733 | | 23334 | python39<3.9.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3733 |
23335 | python37<3.7.16 shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2015-20107 | | 23335 | python37<3.7.16 shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2015-20107 |
23336 | python38<3.8.16 shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2015-20107 | | 23336 | python38<3.8.16 shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2015-20107 |
23337 | python39<3.9.16 shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2015-20107 | | 23337 | python39<3.9.16 shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2015-20107 |
23338 | python310<3.10.8 shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2015-20107 | | 23338 | python310<3.10.8 shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2015-20107 |
23339 | radare2<5.6.8 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-1382 | | 23339 | radare2<5.6.8 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-1382 |
23340 | radare2<5.6.8 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1383 | | 23340 | radare2<5.6.8 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1383 |
23341 | vim<8.2.4763 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1381 | | 23341 | vim<8.2.4763 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1381 |
23342 | bwm-ng<0.6.3 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-1341 | | 23342 | bwm-ng<0.6.3 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-1341 |
23343 | py{27,36,37,38,39,310}-PDF2<1.27.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24859 | | 23343 | py{27,36,37,38,39,310}-PDF2<1.27.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24859 |
23344 | opensc<0.22.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-42782 | | 23344 | opensc<0.22.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-42782 |
23345 | opensc<0.22.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-42781 | | 23345 | opensc<0.22.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-42781 |
23346 | opensc<0.22.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-42780 | | 23346 | opensc<0.22.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-42780 |
23347 | opensc<0.22.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-42779 | | 23347 | opensc<0.22.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-42779 |
23348 | opensc<0.22.0 double-free https://nvd.nist.gov/vuln/detail/CVE-2021-42778 | | 23348 | opensc<0.22.0 double-free https://nvd.nist.gov/vuln/detail/CVE-2021-42778 |
23349 | dcraw-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-3624 | | 23349 | dcraw-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-3624 |
23350 | freetype2<2.12.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27406 | | 23350 | freetype2<2.12.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27406 |
23351 | freetype2<2.12.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27405 | | 23351 | freetype2<2.12.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27405 |
23352 | freetype2<2.12.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27404 | | 23352 | freetype2<2.12.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27404 |
23353 | radare2-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1437 | | 23353 | radare2-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1437 |
23354 | radare2-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1444 | | 23354 | radare2-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1444 |
23355 | radare2-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1452 | | 23355 | radare2-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1452 |
23356 | radare2-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1451 | | 23356 | radare2-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1451 |
23357 | glpi<10.0.0 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24869 | | 23357 | glpi<10.0.0 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24869 |
23358 | glpi<10.0.0 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-24868 | | 23358 | glpi<10.0.0 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-24868 |
23359 | glpi<10.0.0 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-24867 | | 23359 | glpi<10.0.0 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-24867 |
23360 | zoneminder-[0-9]* remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-29806 | | 23360 | zoneminder-[0-9]* remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-29806 |
23361 | vim<8.2.4774 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1420 | | 23361 | vim<8.2.4774 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1420 |
23362 | pam-tacplus<1.4.1 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2016-20014 | | 23362 | pam-tacplus<1.4.1 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2016-20014 |
23363 | gpac-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-29537 | | 23363 | gpac-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-29537 |
23364 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1441 | | 23364 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1441 |
23365 | epiphany<41.4 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-29536 | | 23365 | epiphany<41.4 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-29536 |
23366 | xpdf-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27135 | | 23366 | xpdf-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27135 |
23367 | giflib<5.2.1nb5 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-28506 | | 23367 | giflib<5.2.1nb5 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-28506 |
23368 | mysql-cluster<5.7.37 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL | | 23368 | mysql-cluster<5.7.37 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL |
23369 | mysql-server<5.7.37 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL | | 23369 | mysql-server<5.7.37 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL |
23370 | mysql-cluster>=7.0<7.4.35 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL | | 23370 | mysql-cluster>=7.0<7.4.35 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL |
23371 | mysql-server>=7.0<7.4.35 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL | | 23371 | mysql-server>=7.0<7.4.35 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL |
23372 | mysql-cluster>=7.6<7.6.21 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL | | 23372 | mysql-cluster>=7.6<7.6.21 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL |
23373 | mysql-server>=7.6<7.6.21 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL | | 23373 | mysql-server>=7.6<7.6.21 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL |
23374 | mysql-cluster>=8.0<8.0.28 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL | | 23374 | mysql-cluster>=8.0<8.0.28 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL |
23375 | mysql-server>=8.0<8.0.28 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL | | 23375 | mysql-server>=8.0<8.0.28 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixMSQL |
23376 | openjdk8<1.8.322 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixJAVA | | 23376 | openjdk8<1.8.322 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixJAVA |
23377 | openjdk11<11.0.15 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixJAVA | | 23377 | openjdk11<11.0.15 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixJAVA |
23378 | freerdp2<2.7.0 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24883 | | 23378 | freerdp2<2.7.0 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24883 |
23379 | freerdp2<2.7.0 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24882 | | 23379 | freerdp2<2.7.0 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24882 |
23380 | couchdb<3.2.2 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24706 | | 23380 | couchdb<3.2.2 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24706 |
23381 | htmldoc-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-28085 | | 23381 | htmldoc-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-28085 |
23382 | consul<1.9.17 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-29153 | | 23382 | consul<1.9.17 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-29153 |
23383 | go117<1.17.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-28327 | | 23383 | go117<1.17.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-28327 |
23384 | go117<1.18.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-28327 | | 23384 | go117<1.18.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-28327 |
23385 | go118<1.18.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27536 | | 23385 | go118<1.18.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27536 |
23386 | go117<1.17.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24675 | | 23386 | go117<1.17.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24675 |
23387 | go118<1.18.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24675 | | 23387 | go118<1.18.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-24675 |
23388 | ncurses-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-29458 | | 23388 | ncurses-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-29458 |
23389 | ghostscript-gpl-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2019-25059 | | 23389 | ghostscript-gpl-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2019-25059 |
23390 | ghostscript-agpl<9.27 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2019-25059 | | 23390 | ghostscript-agpl<9.27 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2019-25059 |
23391 | redis<6.2.7 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-24736 | | 23391 | redis<6.2.7 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-24736 |
23392 | redis<6.2.7 code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-24735 | | 23392 | redis<6.2.7 code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-24735 |
23393 | php{56,71,72,73,74,80}-nextcloud>=22<22.2.4 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24889 | | 23393 | php{56,71,72,73,74,80}-nextcloud>=22<22.2.4 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24889 |
23394 | php{56,71,72,73,74,80}-nextcloud>=23<23.0.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24889 | | 23394 | php{56,71,72,73,74,80}-nextcloud>=23<23.0.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-24889 |
23395 | php{56,71,72,73,74,80}-nextcloud>=22<22.2.4 code-injection https://nvd.nist.gov/vuln/detail/CVE-2022-24888 | | 23395 | php{56,71,72,73,74,80}-nextcloud>=22<22.2.4 code-injection https://nvd.nist.gov/vuln/detail/CVE-2022-24888 |
23396 | php{56,71,72,73,74,80}-nextcloud>=23<23.0.1 code-injection https://nvd.nist.gov/vuln/detail/CVE-2022-24888 | | 23396 | php{56,71,72,73,74,80}-nextcloud>=23<23.0.1 code-injection https://nvd.nist.gov/vuln/detail/CVE-2022-24888 |
23397 | pycharm-bin<2022.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-29820 | | 23397 | pycharm-bin<2022.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-29820 |
23398 | intellij-ue-bin<2022.1 local-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-29819 | | 23398 | intellij-ue-bin<2022.1 local-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-29819 |
23399 | intellij-ue-bin<2022.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-29818 | | 23399 | intellij-ue-bin<2022.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-29818 |
23400 | intellij-ue-bin<2022.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-29817 | | 23400 | intellij-ue-bin<2022.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-29817 |
23401 | intellij-ue-bin<2022.1 code-injection https://nvd.nist.gov/vuln/detail/CVE-2022-29816 | | 23401 | intellij-ue-bin<2022.1 code-injection https://nvd.nist.gov/vuln/detail/CVE-2022-29816 |
23402 | intellij-ue-bin<2022.1 local-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-29815 | | 23402 | intellij-ue-bin<2022.1 local-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-29815 |
23403 | intellij-ue-bin<2022.1 local-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-29814 | | 23403 | intellij-ue-bin<2022.1 local-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-29814 |
23404 | intellij-ue-bin<2022.1 local-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-29813 | | 23404 | intellij-ue-bin<2022.1 local-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-29813 |
23405 | intellij-ue-bin<2022.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29812 | | 23405 | intellij-ue-bin<2022.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29812 |
23406 | py{27,36,37,38,39,310}-httpx-[0-9]* input-validation https://nvd.nist.gov/vuln/detail/CVE-2021-41945 | | 23406 | py{27,36,37,38,39,310}-httpx-[0-9]* input-validation https://nvd.nist.gov/vuln/detail/CVE-2021-41945 |
23407 | podman<3.4.7 code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-1227 | | 23407 | podman<3.4.7 code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-1227 |
23408 | ImageMagick>=7.1<7.1.0.28 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-1114 | | 23408 | ImageMagick>=7.1<7.1.0.28 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-1114 |
23409 | moodle-[0-9]* authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-0985 | | 23409 | moodle-[0-9]* authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-0985 |
23410 | moodle-[0-9]* authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-0984 | | 23410 | moodle-[0-9]* authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-0984 |
23411 | qemu<7.0.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-4207 | | 23411 | qemu<7.0.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-4207 |
23412 | qemu<7.0.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-4206 | | 23412 | qemu<7.0.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-4206 |
23413 | mediawiki<1.36.4 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-28323 | | 23413 | mediawiki<1.36.4 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-28323 |
23414 | prosody<0.11.12 denial-of-service https://prosody.im/security/advisory_20220113/ | | 23414 | prosody<0.11.12 denial-of-service https://prosody.im/security/advisory_20220113/ |
23415 | radare2-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-1649 | | 23415 | radare2-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-1649 |
23416 | vim<8.2.4925 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1629 | | 23416 | vim<8.2.4925 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1629 |
23417 | vim<8.2.4919 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1621 | | 23417 | vim<8.2.4919 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1621 |
23418 | libsixel-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29977 | | 23418 | libsixel-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29977 |
23419 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1623 | | 23419 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1623 |
23420 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1622 | | 23420 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1622 |
23421 | qemu<7.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3611 | | 23421 | qemu<7.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3611 |
23422 | mp3gain-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-34085 | | 23422 | mp3gain-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-34085 |
23423 | njs<0.7.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29369 | | 23423 | njs<0.7.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29369 |
23424 | vim<8.2.4938 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-1674 | | 23424 | vim<8.2.4938 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-1674 |
23425 | radare2-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1714 | | 23425 | radare2-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1714 |
23426 | webmin-[0-9]* remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-30708 | | 23426 | webmin-[0-9]* remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-30708 |
23427 | unrar<6.1.7 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2022-30333 | | 23427 | unrar<6.1.7 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2022-30333 |
23428 | janet<1.22.0 array-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-30763 | | 23428 | janet<1.22.0 array-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-30763 |
23429 | gitea<1.6.7 command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-30781 | | 23429 | gitea<1.6.7 command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-30781 |
23430 | xpdf-[0-9]* memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-30775 | | 23430 | xpdf-[0-9]* memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-30775 |
23431 | u-boot-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-30767 | | 23431 | u-boot-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-30767 |
23432 | apache-tomcat-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29885 | | 23432 | apache-tomcat-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29885 |
23433 | apache-tomcat>=9.0<9.0.21 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-25762 | | 23433 | apache-tomcat>=9.0<9.0.21 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-25762 |
23434 | apache-tomcat>=8.5<8.5.76 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-25762 | | 23434 | apache-tomcat>=8.5<8.5.76 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-25762 |
23435 | gitea<1.6.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27313 | | 23435 | gitea<1.6.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27313 |
23436 | gtk+-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 23436 | gtk+-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
23437 | gtk2+-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 23437 | gtk2+-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
23438 | qt4-libs-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 23438 | qt4-libs-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
23439 | ImageMagick6<6.9.12.44 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-28463 | | 23439 | ImageMagick6<6.9.12.44 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-28463 |
23440 | ImageMagick<7.1.0.29 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-28463 | | 23440 | ImageMagick<7.1.0.29 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-28463 |
23441 | ImageMagick6<6.9.12.43 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-32545 | | 23441 | ImageMagick6<6.9.12.43 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-32545 |
23442 | ImageMagick<7.1.0.28 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-32545 | | 23442 | ImageMagick<7.1.0.28 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-32545 |
23443 | ImageMagick6<6.9.12.44 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-32546 | | 23443 | ImageMagick6<6.9.12.44 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-32546 |
23444 | ImageMagick<7.1.0.29 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-32546 | | 23444 | ImageMagick<7.1.0.29 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-32546 |
23445 | ImageMagick<7.1.0.30 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-32547 | | 23445 | ImageMagick<7.1.0.30 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-32547 |
23446 | ImageMagick6<6.9.12.45 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-32547 | | 23446 | ImageMagick6<6.9.12.45 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-32547 |
23447 | SDL2_ttf<2.20.0 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27470 | | 23447 | SDL2_ttf<2.20.0 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-27470 |
23448 | admesh-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2018-25033 | | 23448 | admesh-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2018-25033 |
23449 | apache-maven<3.8.3 shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-29599 | | 23449 | apache-maven<3.8.3 shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-29599 |
23450 | apache-tomcat>=8.5<8.5.82 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-34305 | | 23450 | apache-tomcat>=8.5<8.5.82 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-34305 |
23451 | apache-tomcat>=9.0<9.0.65 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-34305 | | 23451 | apache-tomcat>=9.0<9.0.65 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-34305 |
23452 | apache<2.4.54 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-26377 | | 23452 | apache<2.4.54 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-26377 |
23453 | apache<2.4.54 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-28614 | | 23453 | apache<2.4.54 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-28614 |
23454 | apache<2.4.54 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-28615 | | 23454 | apache<2.4.54 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-28615 |
23455 | apache<2.4.54 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29404 | | 23455 | apache<2.4.54 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29404 |
23456 | apache<2.4.54 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30522 | | 23456 | apache<2.4.54 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30522 |
23457 | apache<2.4.54 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-30556 | | 23457 | apache<2.4.54 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-30556 |
23458 | apache<2.4.54 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-31813 | | 23458 | apache<2.4.54 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-31813 |
23459 | caddy<2.5.0 open-redirect https://nvd.nist.gov/vuln/detail/CVE-2022-29718 | | 23459 | caddy<2.5.0 open-redirect https://nvd.nist.gov/vuln/detail/CVE-2022-29718 |
23460 | clamav<0.103.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-20770 | | 23460 | clamav<0.103.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-20770 |
23461 | clamav<0.103.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-20771 | | 23461 | clamav<0.103.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-20771 |
23462 | clamav<0.103.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-20785 | | 23462 | clamav<0.103.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-20785 |
23463 | clamav<0.103.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-20796 | | 23463 | clamav<0.103.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-20796 |
23464 | curl<7.83.0 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-22576 | | 23464 | curl<7.83.0 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-22576 |
23465 | curl<7.83.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-27774 | | 23465 | curl<7.83.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-27774 |
23466 | curl<7.83.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-27775 | | 23466 | curl<7.83.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-27775 |
23467 | curl<7.83.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-27776 | | 23467 | curl<7.83.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-27776 |
23468 | curl<7.83.1 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2022-27778 | | 23468 | curl<7.83.1 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2022-27778 |
23469 | curl<7.83.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-27779 | | 23469 | curl<7.83.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-27779 |
23470 | curl<7.83.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-27780 | | 23470 | curl<7.83.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-27780 |
23471 | curl<7.83.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27781 | | 23471 | curl<7.83.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27781 |
23472 | curl<7.83.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-27782 | | 23472 | curl<7.83.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-27782 |
23473 | curl<7.83.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-30115 | | 23473 | curl<7.83.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-30115 |
23474 | dpkg<1.21.8 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2022-1664 | | 23474 | dpkg<1.21.8 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2022-1664 |
23475 | elasticsearch<7.17.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23712 | | 23475 | elasticsearch<7.17.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-23712 |
23476 | electrum<4.2.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31246 | | 23476 | electrum<4.2.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31246 |
23477 | ezxml-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-30045 | | 23477 | ezxml-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-30045 |
23478 | webkit-gtk<2.34.5 multiple-vulnerabilities https://webkitgtk.org/security/WSA-2022-0002.html | | 23478 | webkit-gtk<2.34.5 multiple-vulnerabilities https://webkitgtk.org/security/WSA-2022-0002.html |
23479 | webkit-gtk<2.34.6 multiple-vulnerabilities https://webkitgtk.org/security/WSA-2022-0003.html | | 23479 | webkit-gtk<2.34.6 multiple-vulnerabilities https://webkitgtk.org/security/WSA-2022-0003.html |
23480 | webkit-gtk<2.36.0 multiple-vulnerabilities https://webkitgtk.org/security/WSA-2022-0004.html | | 23480 | webkit-gtk<2.36.0 multiple-vulnerabilities https://webkitgtk.org/security/WSA-2022-0004.html |
23481 | webkit-gtk<2.36.3 multiple-vulnerabilities https://webkitgtk.org/security/WSA-2022-0005.html | | 23481 | webkit-gtk<2.36.3 multiple-vulnerabilities https://webkitgtk.org/security/WSA-2022-0005.html |
23482 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125002 | | 23482 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125002 |
23483 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125003 | | 23483 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125003 |
23484 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125004 | | 23484 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125004 |
23485 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125005 | | 23485 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125005 |
23486 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125006 | | 23486 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125006 |
23487 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125007 | | 23487 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125007 |
23488 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125008 | | 23488 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125008 |
23489 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125009 | | 23489 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125009 |
23490 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125010 | | 23490 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125010 |
23491 | ffmpeg2<2.2 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2014-125011 | | 23491 | ffmpeg2<2.2 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2014-125011 |
23492 | ffmpeg2<2.2 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2014-125012 | | 23492 | ffmpeg2<2.2 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2014-125012 |
23493 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125013 | | 23493 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125013 |
23494 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125014 | | 23494 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125014 |
23495 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125015 | | 23495 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125015 |
23496 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125016 | | 23496 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125016 |
23497 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125017 | | 23497 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125017 |
23498 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125018 | | 23498 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125018 |
23499 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125019 | | 23499 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125019 |
23500 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125020 | | 23500 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125020 |
23501 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125021 | | 23501 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125021 |
23502 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125022 | | 23502 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125022 |
23503 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125023 | | 23503 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125023 |
23504 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125024 | | 23504 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125024 |
23505 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125025 | | 23505 | ffmpeg2<2.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2014-125025 |
23506 | ffmpeg4<4.4.2 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1475 | | 23506 | ffmpeg4<4.4.2 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1475 |
23507 | ffmpeg5<5.0.1 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1475 | | 23507 | ffmpeg5<5.0.1 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1475 |
23508 | ghostscript-agpl<9.56.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2085 | | 23508 | ghostscript-agpl<9.56.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2085 |
23509 | giflib-util-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40633 | | 23509 | giflib-util-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40633 |
23510 | gimp<2.10.32 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30067 | | 23510 | gimp<2.10.32 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30067 |
23511 | gimp<2.10.32 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32990 | | 23511 | gimp<2.10.32 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32990 |
23512 | gitea<1.16.9 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-1928 | | 23512 | gitea<1.16.9 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-1928 |
23513 | gitea<1.17.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27313 | | 23513 | gitea<1.17.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27313 |
23514 | go117<1.17.10 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-29526 | | 23514 | go117<1.17.10 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-29526 |
23515 | go118<1.18.2 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-29526 | | 23515 | go118<1.18.2 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-29526 |
23516 | gpac<2.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40592 | | 23516 | gpac<2.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40592 |
23517 | gpac<2.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-41458 | | 23517 | gpac<2.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-41458 |
23518 | gpac-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-1795 | | 23518 | gpac-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-1795 |
23519 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29339 | | 23519 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29339 |
23520 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29340 | | 23520 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29340 |
23521 | gpac-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-30976 | | 23521 | gpac-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-30976 |
23522 | halibut<1.3 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-42612 | | 23522 | halibut<1.3 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-42612 |
23523 | halibut<1.3 double-free https://nvd.nist.gov/vuln/detail/CVE-2021-42613 | | 23523 | halibut<1.3 double-free https://nvd.nist.gov/vuln/detail/CVE-2021-42613 |
23524 | halibut<1.3 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-42614 | | 23524 | halibut<1.3 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-42614 |
23525 | harfbuzz<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33068 | | 23525 | harfbuzz<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33068 |
23526 | htmldoc<1.9.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27114 | | 23526 | htmldoc<1.9.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27114 |
23527 | inkscape<1.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-42700 | | 23527 | inkscape<1.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-42700 |
23528 | inkscape<1.0 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-42702 | | 23528 | inkscape<1.0 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-42702 |
23529 | inkscape<1.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-42704 | | 23529 | inkscape<1.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-42704 |
23530 | jenkins<2.346.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-34170 | | 23530 | jenkins<2.346.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-34170 |
23531 | jenkins<2.346.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-34171 | | 23531 | jenkins<2.346.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-34171 |
23532 | jenkins<2.346.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-34172 | | 23532 | jenkins<2.346.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-34172 |
23533 | jenkins<2.346.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-34173 | | 23533 | jenkins<2.346.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-34173 |
23534 | jenkins<2.346.1 username-enumeration https://nvd.nist.gov/vuln/detail/CVE-2022-34174 | | 23534 | jenkins<2.346.1 username-enumeration https://nvd.nist.gov/vuln/detail/CVE-2022-34174 |
23535 | jenkins<2.346.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-34175 | | 23535 | jenkins<2.346.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-34175 |
23536 | knot<5.5.1 dns-cache-poisoning https://nvd.nist.gov/vuln/detail/CVE-2022-32983 | | 23536 | knot<5.5.1 dns-cache-poisoning https://nvd.nist.gov/vuln/detail/CVE-2022-32983 |
23537 | libdwarf<0.4.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-32200 | | 23537 | libdwarf<0.4.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-32200 |
23538 | libdwarf<0.4.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34299 | | 23538 | libdwarf<0.4.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34299 |
23539 | libjpeg-turbo<2.1.0 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-46822 | | 23539 | libjpeg-turbo<2.1.0 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-46822 |
23540 | libntfs<2022.5.17 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-30783 | | 23540 | libntfs<2022.5.17 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-30783 |
23541 | libntfs<2022.5.17 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30784 | | 23541 | libntfs<2022.5.17 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30784 |
23542 | libntfs<2022.5.17 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2022-30785 | | 23542 | libntfs<2022.5.17 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2022-30785 |
23543 | libntfs<2022.5.17 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-30786 | | 23543 | libntfs<2022.5.17 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-30786 |
23544 | libntfs<2022.5.17 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2022-30787 | | 23544 | libntfs<2022.5.17 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2022-30787 |
23545 | libntfs<2022.5.17 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-30788 | | 23545 | libntfs<2022.5.17 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-30788 |
23546 | libntfs<2022.5.17 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-30789 | | 23546 | libntfs<2022.5.17 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-30789 |
23547 | libredwg-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-33034 | | 23547 | libredwg-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-33034 |
23548 | libxml2<2.9.14 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-29824 | | 23548 | libxml2<2.9.14 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-29824 |
23549 | lighttpd<1.4.59 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30780 | | 23549 | lighttpd<1.4.59 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30780 |
23550 | lrzip-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33067 | | 23550 | lrzip-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33067 |
23551 | mantis<2.25.5 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-33910 | | 23551 | mantis<2.25.5 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-33910 |
23552 | mariadb-server<10.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31621 | | 23552 | mariadb-server<10.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31621 |
23553 | mariadb-server<10.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31622 | | 23553 | mariadb-server<10.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31622 |
23554 | mariadb-server<10.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31623 | | 23554 | mariadb-server<10.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31623 |
23555 | mariadb-server<10.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31624 | | 23555 | mariadb-server<10.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31624 |
23556 | matio<1.5.22 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1515 | | 23556 | matio<1.5.22 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1515 |
23557 | moodle<4.0.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-30596 | | 23557 | moodle<4.0.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-30596 |
23558 | moodle<4.0.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-30597 | | 23558 | moodle<4.0.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-30597 |
23559 | moodle<4.0.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-30598 | | 23559 | moodle<4.0.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-30598 |
23560 | moodle<4.0.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-30600 | | 23560 | moodle<4.0.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-30600 |
23561 | mupdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30974 | | 23561 | mupdf<1.3.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30974 |
23562 | mupdf-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-30975 | | 23562 | mupdf<1.3.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-30975 |
23563 | njs<0.7.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29779 | | 23563 | njs<0.7.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29779 |
23564 | njs<0.7.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29780 | | 23564 | njs<0.7.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29780 |
23565 | njs<0.7.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30503 | | 23565 | njs<0.7.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30503 |
23566 | njs<0.7.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31306 | | 23566 | njs<0.7.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31306 |
23567 | njs<0.7.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31307 | | 23567 | njs<0.7.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31307 |
23568 | njs<0.7.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32414 | | 23568 | njs<0.7.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32414 |
23569 | nuitka<0.9 shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-2054 | | 23569 | nuitka<0.9 shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-2054 |
23570 | openldap<2.6.2 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-29155 | | 23570 | openldap<2.6.2 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-29155 |
23571 | openssl<1.1.1o shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-1292 | | 23571 | openssl<1.1.1o shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-1292 |
23572 | openssl>=3.0.0<3.0.3 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-1343 | | 23572 | openssl>=3.0.0<3.0.3 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-1343 |
23573 | openssl>=3.0.0<3.0.3 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2022-1434 | | 23573 | openssl>=3.0.0<3.0.3 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2022-1434 |
23574 | openssl>=3.0.0<3.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1473 | | 23574 | openssl>=3.0.0<3.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1473 |
23575 | openssl<1.1.1p shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-2068 | | 23575 | openssl<1.1.1p shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-2068 |
23576 | pcre2<10.40 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1586 | | 23576 | pcre2<10.40 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1586 |
23577 | pcre2<10.40 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1587 | | 23577 | pcre2<10.40 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1587 |
23578 | php{56,73,74,80,81}-concrete5<9.1.0 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-21829 | | 23578 | php{56,73,74,80,81}-concrete5<9.1.0 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-21829 |
23579 | php{56,73,74,80,81}-concrete5<9.1.0 arbitrary-file-deletion https://nvd.nist.gov/vuln/detail/CVE-2022-30117 | | 23579 | php{56,73,74,80,81}-concrete5<9.1.0 arbitrary-file-deletion https://nvd.nist.gov/vuln/detail/CVE-2022-30117 |
23580 | glpi<10.0.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-24876 | | 23580 | glpi<10.0.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-24876 |
23581 | glpi<10.0.1 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-29250 | | 23581 | glpi<10.0.1 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-29250 |
23582 | php74-mysql<7.4.30 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-31626 | | 23582 | php74-mysql<7.4.30 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-31626 |
23583 | php80-mysql<8.0.20 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-31626 | | 23583 | php80-mysql<8.0.20 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-31626 |
23584 | php81-mysql<8.1.7 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-31626 | | 23584 | php81-mysql<8.1.7 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-31626 |
23585 | php{56,74,80,81}-nextcloud<23.0.3 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-29163 | | 23585 | php{56,74,80,81}-nextcloud<23.0.3 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-29163 |
23586 | php{56,74,80,81}-nextcloud<23.0.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29243 | | 23586 | php{56,74,80,81}-nextcloud<23.0.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29243 |
23587 | php{56,74,80,81}-owncloud<10.10.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-31649 | | 23587 | php{56,74,80,81}-owncloud<10.10.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-31649 |
23588 | php74-pgsql<7.4.30 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-31625 | | 23588 | php74-pgsql<7.4.30 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-31625 |
23589 | php80-pgsql<8.0.20 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-31625 | | 23589 | php80-pgsql<8.0.20 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-31625 |
23590 | php81-pgsql<8.1.7 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-31625 | | 23590 | php81-pgsql<8.1.7 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-31625 |
23591 | php{56,74,80,81}-piwigo<2.10.0 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2020-19212 | | 23591 | php{56,74,80,81}-piwigo<2.10.0 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2020-19212 |
23592 | php{56,74,80,81}-piwigo<2.10.0 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2020-19213 | | 23592 | php{56,74,80,81}-piwigo<2.10.0 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2020-19213 |
23593 | php{56,74,80,81}-piwigo<2.10.0 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2020-19215 | | 23593 | php{56,74,80,81}-piwigo<2.10.0 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2020-19215 |
23594 | php{56,74,80,81}-piwigo<2.10.0 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2021-40317 | | 23594 | php{56,74,80,81}-piwigo<2.10.0 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2021-40317 |
23595 | php{56,74,80,81}-piwigo-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-40678 | | 23595 | php{56,74,80,81}-piwigo-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-40678 |
23596 | pidgin<2.14.9 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2022-26491 | | 23596 | pidgin<2.14.9 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2022-26491 |
23597 | poppler<22.04.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27337 | | 23597 | poppler<22.04.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27337 |
23598 | protobuf-c<=1.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33070 | | 23598 | protobuf-c<=1.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33070 |
23599 | py{27,36,37,38,39,310}-JWT<2.4.0 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-29217 | | 23599 | py{27,36,37,38,39,310}-JWT<2.4.0 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-29217 |
23600 | py{27,36,37,38,39,310}-Pillow<9.1.1 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-30595 | | 23600 | py{27,36,37,38,39,310}-Pillow<9.1.1 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-30595 |
23601 | py{27,36,37,38,39,310}-aiohttp-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33124 | | 23601 | py{27,36,37,38,39,310}-aiohttp-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33124 |
23602 | py{27,36,37,38,39,310}-bottle<0.12.20 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-31799 | | 23602 | py{27,36,37,38,39,310}-bottle<0.12.20 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-31799 |
23603 | py{27,36,37,38,39,310}-cookiecutter<2.1.1 shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-24065 | | 23603 | py{27,36,37,38,39,310}-cookiecutter<2.1.1 shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-24065 |
23604 | py{27,36,37,38,39,310}-flower-[0-9]* authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-30034 | | 23604 | py{27,36,37,38,39,310}-flower-[0-9]* authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-30034 |
23605 | py{27,36,37,38,39,310}-ldap3<3.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46823 | | 23605 | py{27,36,37,38,39,310}-ldap3<3.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46823 |
23606 | py{27,36,37,38,39,310}-notebook<6.4.12 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-29238 | | 23606 | py{27,36,37,38,39,310}-notebook<6.4.12 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-29238 |
23607 | py{27,36,37,38,39,310}-octoprint<1.8.0 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-1430 | | 23607 | py{27,36,37,38,39,310}-octoprint<1.8.0 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-1430 |
23608 | py{27,36,37,38,39,310}-octoprint<1.8.0 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-1432 | | 23608 | py{27,36,37,38,39,310}-octoprint<1.8.0 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-1432 |
23609 | py{27,36,37,38,39,310}-waitress>=2.1.0<2.1.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31015 | | 23609 | py{27,36,37,38,39,310}-waitress>=2.1.0<2.1.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31015 |
23610 | qemu<7.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3750 | | 23610 | qemu<7.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3750 |
23611 | radare2<5.5.4 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-44974 | | 23611 | radare2<5.5.4 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-44974 |
23612 | radare2<5.5.4 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-44975 | | 23612 | radare2<5.5.4 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-44975 |
23613 | radare2<5.7.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1809 | | 23613 | radare2<5.7.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1809 |
23614 | radare2<5.7.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1899 | | 23614 | radare2<5.7.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1899 |
23615 | redis<7.0.1 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-33105 | | 23615 | redis<7.0.1 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-33105 |
23616 | rsyslog<8.2204.1 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24903 | | 23616 | rsyslog<8.2204.1 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24903 |
23617 | ruby{26,27,30,31}-actionpack52-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-22577 | | 23617 | ruby{26,27,30,31}-actionpack52-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-22577 |
23618 | ruby{26,27,30,31}-actionpack60<6.0.4.8 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-22577 | | 23618 | ruby{26,27,30,31}-actionpack60<6.0.4.8 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-22577 |
23619 | ruby{26,27,30,31}-actionpack61<6.1.5.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-22577 | | 23619 | ruby{26,27,30,31}-actionpack61<6.1.5.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-22577 |
23620 | ruby{26,27,30,31}-activestorage52<5.2.6.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-21831 | | 23620 | ruby{26,27,30,31}-activestorage52<5.2.6.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-21831 |
23621 | ruby{26,27,30,31}-activestorage60<6.0.4.7 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-21831 | | 23621 | ruby{26,27,30,31}-activestorage60<6.0.4.7 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-21831 |
23622 | ruby{26,27,30,31}-activestorage61<6.1.4.7 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-21831 | | 23622 | ruby{26,27,30,31}-activestorage61<6.1.4.7 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-21831 |
23623 | ruby30-base<3.0.4 double-free https://nvd.nist.gov/vuln/detail/CVE-2022-28738 | | 23623 | ruby30-base<3.0.4 double-free https://nvd.nist.gov/vuln/detail/CVE-2022-28738 |
23624 | ruby31-base<3.0.4 double-free https://nvd.nist.gov/vuln/detail/CVE-2022-28738 | | 23624 | ruby31-base<3.0.4 double-free https://nvd.nist.gov/vuln/detail/CVE-2022-28738 |
23625 | ruby26-base<2.6.10 out-of-bounds-read https:/nvd.nist.gov/vuln/detail/CVE-2022-28739 | | 23625 | ruby26-base<2.6.10 out-of-bounds-read https:/nvd.nist.gov/vuln/detail/CVE-2022-28739 |
23626 | ruby27-base<2.7.6 out-of-bounds-read https:/nvd.nist.gov/vuln/detail/CVE-2022-28739 | | 23626 | ruby27-base<2.7.6 out-of-bounds-read https:/nvd.nist.gov/vuln/detail/CVE-2022-28739 |
23627 | ruby30-base<3.0.4 out-of-bounds-read https:/nvd.nist.gov/vuln/detail/CVE-2022-28739 | | 23627 | ruby30-base<3.0.4 out-of-bounds-read https:/nvd.nist.gov/vuln/detail/CVE-2022-28739 |
23628 | ruby31-base<3.1.2 out-of-bounds-read https:/nvd.nist.gov/vuln/detail/CVE-2022-28739 | | 23628 | ruby31-base<3.1.2 out-of-bounds-read https:/nvd.nist.gov/vuln/detail/CVE-2022-28739 |
23629 | ruby{26,27,30,31}-jmespath<1.6.1 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-32511 | | 23629 | ruby{26,27,30,31}-jmespath<1.6.1 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-32511 |
23630 | ruby{26,27,30,31}-mechanize<2.8.5 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-31033 | | 23630 | ruby{26,27,30,31}-mechanize<2.8.5 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-31033 |
23631 | ruby{26,27,30,31}-nokogiri<1.13.6 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2022-29181 | | 23631 | ruby{26,27,30,31}-nokogiri<1.13.6 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2022-29181 |
23632 | ruby{26,27,30,31}-octokit>=4.23.0<4.25.0 insecure-file-permissions https://nvd.nist.gov/vuln/detail/CVE-2022-31072 | | 23632 | ruby{26,27,30,31}-octokit>=4.23.0<4.25.0 insecure-file-permissions https://nvd.nist.gov/vuln/detail/CVE-2022-31072 |
23633 | ruby{26,27,30,31}-rails<1.4.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-32209 | | 23633 | ruby{26,27,30,31}-rails<1.4.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-32209 |
23634 | ruby{26,27,30,31}-sinatra<2.2.0 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-29970 | | 23634 | ruby{26,27,30,31}-sinatra<2.2.0 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-29970 |
23635 | salt<3004.2 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-22967 | | 23635 | salt<3004.2 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-22967 |
23636 | slurm-wlm<20.11.9.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-29500 | | 23636 | slurm-wlm<20.11.9.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-29500 |
23637 | slurm-wlm<20.11.9.1 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-29501 | | 23637 | slurm-wlm<20.11.9.1 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-29501 |
23638 | slurm-wlm>=21<21.08.8.1 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-29502 | | 23638 | slurm-wlm>=21<21.08.8.1 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-29502 |
23639 | sofia-sip<1.13.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31001 | | 23639 | sofia-sip<1.13.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31001 |
23640 | sofia-sip<1.13.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31002 | | 23640 | sofia-sip<1.13.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31002 |
23641 | sofia-sip<1.13.8 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-31003 | | 23641 | sofia-sip<1.13.8 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-31003 |
23642 | sox-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-3643 | | 23642 | sox-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-3643 |
23643 | sox-[0-9]* floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2022-31650 | | 23643 | sox-[0-9]* floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2022-31650 |
23644 | sox-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31651 | | 23644 | sox-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31651 |
23645 | tcpreplay-[0-9]* format-string https://nvd.nist.gov/vuln/detail/CVE-2022-28487 | | 23645 | tcpreplay-[0-9]* format-string https://nvd.nist.gov/vuln/detail/CVE-2022-28487 |
23646 | totd<1.5.3 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-34295 | | 23646 | totd<1.5.3 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-34295 |
23647 | php{56,73,74,80,81}-typo3<7.6.57 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-31046 | | 23647 | php{56,73,74,80,81}-typo3<7.6.57 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-31046 |
23648 | php{56,73,74,80,81}-typo3<7.6.57 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-31047 | | 23648 | php{56,73,74,80,81}-typo3<7.6.57 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-31047 |
23649 | php{56,73,74,80,81}-typo3<8.7.47 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-31048 | | 23649 | php{56,73,74,80,81}-typo3<8.7.47 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-31048 |
23650 | php{56,73,74,80,81}-typo3<9.5.34 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-31049 | | 23650 | php{56,73,74,80,81}-typo3<9.5.34 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-31049 |
23651 | php{56,73,74,80,81}-typo3<9.5.34 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-31050 | | 23651 | php{56,73,74,80,81}-typo3<9.5.34 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-31050 |
23652 | u-boot<2022.07 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-30552 | | 23652 | u-boot<2022.07 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-30552 |
23653 | u-boot<2022.07 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-30790 | | 23653 | u-boot<2022.07 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-30790 |
23654 | unicorn-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-29692 | | 23654 | unicorn-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-29692 |
23655 | unicorn<2.0.0 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-29693 | | 23655 | unicorn<2.0.0 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-29693 |
23656 | unicorn<2.0.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-29694 | | 23656 | unicorn<2.0.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-29694 |
23657 | unicorn<2.0.0 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-29695 | | 23657 | unicorn<2.0.0 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-29695 |
23658 | vault>=1.10.0<1.10.3 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-30689 | | 23658 | vault>=1.10.0<1.10.3 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-30689 |
23659 | vim<8.2.4895 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-1616 | | 23659 | vim<8.2.4895 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-1616 |
23660 | vim<8.2.4899 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1619 | | 23660 | vim<8.2.4899 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1619 |
23661 | vim<8.2.4901 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-1620 | | 23661 | vim<8.2.4901 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-1620 |
23662 | vim<8.2.4956 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1720 | | 23662 | vim<8.2.4956 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1720 |
23663 | vim<8.2.4968 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1733 | | 23663 | vim<8.2.4968 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1733 |
23664 | vim<8.2.4969 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1735 | | 23664 | vim<8.2.4969 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1735 |
23665 | vim<8.2.4974 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1769 | | 23665 | vim<8.2.4974 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1769 |
23666 | vim<8.2.4975 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1771 | | 23666 | vim<8.2.4975 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1771 |
23667 | vim<8.2.4977 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-1785 | | 23667 | vim<8.2.4977 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-1785 |
23668 | vim<8.2.4979 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-1796 | | 23668 | vim<8.2.4979 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-1796 |
23669 | vim<8.2.5013 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1851 | | 23669 | vim<8.2.5013 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1851 |
23670 | vim<8.2.5016 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1886 | | 23670 | vim<8.2.5016 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1886 |
23671 | vim<8.2.5023 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-1897 | | 23671 | vim<8.2.5023 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-1897 |
23672 | vim<8.2.5024 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-1898 | | 23672 | vim<8.2.5024 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-1898 |
23673 | vim<8.2.5037 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1927 | | 23673 | vim<8.2.5037 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-1927 |
23674 | vim<8.2.5043 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1942 | | 23674 | vim<8.2.5043 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1942 |
23675 | vim<8.2.5050 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-1968 | | 23675 | vim<8.2.5050 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-1968 |
23676 | vim<8.2.5063 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-2000 | | 23676 | vim<8.2.5063 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-2000 |
23677 | vim<8.2.5072 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2042 | | 23677 | vim<8.2.5072 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2042 |
23678 | vim<8.2.5120 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2124 | | 23678 | vim<8.2.5120 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2124 |
23679 | vim<8.2.5122 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2125 | | 23679 | vim<8.2.5122 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2125 |
23680 | vim<8.2.5123 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2126 | | 23680 | vim<8.2.5123 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2126 |
23681 | vim<8.2.5126 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-2129 | | 23681 | vim<8.2.5126 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-2129 |
23682 | vim<8.2.5148 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2175 | | 23682 | vim<8.2.5148 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2175 |
23683 | vim<8.2.5150 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2182 | | 23683 | vim<8.2.5150 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2182 |
23684 | vim<8.2.5151 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2183 | | 23684 | vim<8.2.5151 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2183 |
23685 | xenkernel413<4.13.4nb1 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-26362 | | 23685 | xenkernel413<4.13.4nb1 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-26362 |
23686 | xenkernel415<4.15.2nb2 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-26362 | | 23686 | xenkernel415<4.15.2nb2 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-26362 |
23687 | xenkernel413<4.13.4nb1 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-26363 | | 23687 | xenkernel413<4.13.4nb1 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-26363 |
23688 | xenkernel415<4.15.2nb2 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-26363 | | 23688 | xenkernel415<4.15.2nb2 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-26363 |
23689 | xenkernel413<4.13.4nb1 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-26364 | | 23689 | xenkernel413<4.13.4nb1 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-26364 |
23690 | xenkernel415<4.15.2nb2 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-26364 | | 23690 | xenkernel415<4.15.2nb2 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-26364 |
23691 | xfce4-exo<4.16.4 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-32278 | | 23691 | xfce4-exo<4.16.4 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-32278 |
23692 | xpdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30524 | | 23692 | xpdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30524 |
23693 | nodejs>=14<14.19.0 weak-encryption https://nvd.nist.gov/vuln/detail/CVE-2022-2097 | | 23693 | nodejs>=14<14.19.0 weak-encryption https://nvd.nist.gov/vuln/detail/CVE-2022-2097 |
23694 | nodejs>=14<14.20.1 dns-rebinding https://nvd.nist.gov/vuln/detail/CVE-2022-32212 | | 23694 | nodejs>=14<14.20.1 dns-rebinding https://nvd.nist.gov/vuln/detail/CVE-2022-32212 |
23695 | nodejs>=14<14.20.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32213 | | 23695 | nodejs>=14<14.20.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32213 |
23696 | nodejs>=14<14.19.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32214 | | 23696 | nodejs>=14<14.19.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32214 |
23697 | nodejs>=14<14.19.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32215 | | 23697 | nodejs>=14<14.19.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32215 |
23698 | nodejs>=14<14.19.0 dll-hijacking https://nvd.nist.gov/vuln/detail/CVE-2022-32223 | | 23698 | nodejs>=14<14.19.0 dll-hijacking https://nvd.nist.gov/vuln/detail/CVE-2022-32223 |
23699 | nodejs>=16<16.16.0 weak-encryption https://nvd.nist.gov/vuln/detail/CVE-2022-2097 | | 23699 | nodejs>=16<16.16.0 weak-encryption https://nvd.nist.gov/vuln/detail/CVE-2022-2097 |
23700 | nodejs>=16<16.16.0 dns-rebinding https://nvd.nist.gov/vuln/detail/CVE-2022-32212 | | 23700 | nodejs>=16<16.16.0 dns-rebinding https://nvd.nist.gov/vuln/detail/CVE-2022-32212 |
23701 | nodejs>=16<16.16.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32213 | | 23701 | nodejs>=16<16.16.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32213 |
23702 | nodejs>=16<16.16.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32214 | | 23702 | nodejs>=16<16.16.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32214 |
23703 | nodejs>=16<16.16.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32215 | | 23703 | nodejs>=16<16.16.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32215 |
23704 | nodejs>=16<16.16.0 dll-hijacking https://nvd.nist.gov/vuln/detail/CVE-2022-32223 | | 23704 | nodejs>=16<16.16.0 dll-hijacking https://nvd.nist.gov/vuln/detail/CVE-2022-32223 |
23705 | nodejs>=18<18.5.0 weak-encryption https://nvd.nist.gov/vuln/detail/CVE-2022-2097 | | 23705 | nodejs>=18<18.5.0 weak-encryption https://nvd.nist.gov/vuln/detail/CVE-2022-2097 |
23706 | nodejs>=18<18.9.1 dns-rebinding https://nvd.nist.gov/vuln/detail/CVE-2022-32212 | | 23706 | nodejs>=18<18.9.1 dns-rebinding https://nvd.nist.gov/vuln/detail/CVE-2022-32212 |
23707 | nodejs>=18<18.9.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32213 | | 23707 | nodejs>=18<18.9.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32213 |
23708 | nodejs>=18<18.5.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32214 | | 23708 | nodejs>=18<18.5.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32214 |
23709 | nodejs>=18<18.9.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32215 | | 23709 | nodejs>=18<18.9.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32215 |
23710 | nodejs>=18<18.9.1 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-32222 | | 23710 | nodejs>=18<18.9.1 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-32222 |
23711 | vim<8.2.5160 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2206 | | 23711 | vim<8.2.5160 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2206 |
23712 | vim<8.2.5164 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-2210 | | 23712 | vim<8.2.5164 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-2210 |
23713 | vim<8.2.5163 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2208 | | 23713 | vim<8.2.5163 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2208 |
23714 | vim<8.2.5162 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2207 | | 23714 | vim<8.2.5162 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2207 |
23715 | vim<8.2.5169 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2231 | | 23715 | vim<8.2.5169 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2231 |
23716 | vim<9.0.0009 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2257 | | 23716 | vim<9.0.0009 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2257 |
23717 | vim<9.0.0011 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2264 | | 23717 | vim<9.0.0011 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2264 |
23718 | vim<9.0.0020 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2286 | | 23718 | vim<9.0.0020 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2286 |
23719 | vim<9.0.0018 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2285 | | 23719 | vim<9.0.0018 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2285 |
23720 | vim<9.0.0017 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2284 | | 23720 | vim<9.0.0017 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2284 |
23721 | vim<9.0.0021 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2287 | | 23721 | vim<9.0.0021 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2287 |
23722 | vim<9.0.0025 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-2288 | | 23722 | vim<9.0.0025 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-2288 |
23723 | vim<9.0.0026 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2289 | | 23723 | vim<9.0.0026 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2289 |
23724 | vim<9.0.0035 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2304 | | 23724 | vim<9.0.0035 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2304 |
23725 | vim<9.0.0046 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2344 | | 23725 | vim<9.0.0046 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2344 |
23726 | vim<9.0.0045 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2343 | | 23726 | vim<9.0.0045 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2343 |
23727 | vim<9.0.0047 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2345 | | 23727 | vim<9.0.0047 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2345 |
23728 | libredwg-[0-9]* double-free https://nvd.nist.gov/vuln/detail/CVE-2022-33033 | | 23728 | libredwg-[0-9]* double-free https://nvd.nist.gov/vuln/detail/CVE-2022-33033 |
23729 | libredwg-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-33027 | | 23729 | libredwg-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-33027 |
23730 | libredwg-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-33026 | | 23730 | libredwg-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-33026 |
23731 | libredwg-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-33032 | | 23731 | libredwg-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-33032 |
23732 | libredwg-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-33028 | | 23732 | libredwg-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-33028 |
23733 | libredwg-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33024 | | 23733 | libredwg-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33024 |
23734 | libredwg-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-33025 | | 23734 | libredwg-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-33025 |
23735 | gpac<2.0.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40942 | | 23735 | gpac<2.0.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40942 |
23736 | gpac<2.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40607 | | 23736 | gpac<2.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40607 |
23737 | gpac<2.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40944 | | 23737 | gpac<2.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40944 |
23738 | gpac<2.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40608 | | 23738 | gpac<2.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40608 |
23739 | gpac<2.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40609 | | 23739 | gpac<2.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40609 |
23740 | gpac<2.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40606 | | 23740 | gpac<2.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-40606 |
23741 | curl<7.84.0 insecure-temp-file https://nvd.nist.gov/vuln/detail/CVE-2022-32207 | | 23741 | curl<7.84.0 insecure-temp-file https://nvd.nist.gov/vuln/detail/CVE-2022-32207 |
23742 | curl<7.84.0 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2022-32208 | | 23742 | curl<7.84.0 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2022-32208 |
23743 | curl<7.84.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32206 | | 23743 | curl<7.84.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32206 |
23744 | curl<7.84.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32205 | | 23744 | curl<7.84.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32205 |
23745 | glpi<10.0.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-31061 | | 23745 | glpi<10.0.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-31061 |
23746 | glpi<10.0.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-31068 | | 23746 | glpi<10.0.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-31068 |
23747 | glpi<10.0.2 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-31056 | | 23747 | glpi<10.0.2 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-31056 |
23748 | mediawiki<1.39.0 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-34750 | | 23748 | mediawiki<1.39.0 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-34750 |
23749 | mediawiki<1.38.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-34912 | | 23749 | mediawiki<1.38.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-34912 |
23750 | mediawiki<1.38.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-34911 | | 23750 | mediawiki<1.38.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-34911 |
23751 | salt<3004.2. authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-2282 | | 23751 | salt<3004.2. authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-2282 |
23752 | jetty<9.4.47 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2048 | | 23752 | jetty<9.4.47 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2048 |
23753 | jetty<9.4.47 improper-session-handling https://nvd.nist.gov/vuln/detail/CVE-2022-2047 | | 23753 | jetty<9.4.47 improper-session-handling https://nvd.nist.gov/vuln/detail/CVE-2022-2047 |
23754 | webmin<1.997 escape-sequence-injection https://nvd.nist.gov/vuln/detail/CVE-2022-36446 | | 23754 | webmin<1.997 escape-sequence-injection https://nvd.nist.gov/vuln/detail/CVE-2022-36446 |
23755 | webmin<1.995 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-36880 | | 23755 | webmin<1.995 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-36880 |
23756 | vim<9.0.0060 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2522 | | 23756 | vim<9.0.0060 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2522 |
23757 | vim<9.0.0100 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-2598 | | 23757 | vim<9.0.0100 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-2598 |
23758 | vim<9.0.0104 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2581 | | 23758 | vim<9.0.0104 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2581 |
23759 | vim<9.0.0102 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2580 | | 23759 | vim<9.0.0102 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2580 |
23760 | vim<9.0.0101 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2571 | | 23760 | vim<9.0.0101 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2571 |
23761 | unbound<1.16.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30699 | | 23761 | unbound<1.16.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30699 |
23762 | unbound<1.16.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30698 | | 23762 | unbound<1.16.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30698 |
23763 | lrzip-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2021-33451 | | 23763 | lrzip-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2021-33451 |
23764 | lrzip-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-33453 | | 23764 | lrzip-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-33453 |
23765 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-33468 | | 23765 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-33468 |
23766 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33465 | | 23766 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33465 |
23767 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33466 | | 23767 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33466 |
23768 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33459 | | 23768 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33459 |
23769 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33456 | | 23769 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33456 |
23770 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-33467 | | 23770 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-33467 |
23771 | yasm-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-33464 | | 23771 | yasm-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-33464 |
23772 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-33462 | | 23772 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-33462 |
23773 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33463 | | 23773 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33463 |
23774 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-33461 | | 23774 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-33461 |
23775 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33460 | | 23775 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33460 |
23776 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33458 | | 23776 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33458 |
23777 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33457 | | 23777 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33457 |
23778 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33454 | | 23778 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33454 |
23779 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33455 | | 23779 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-33455 |
23780 | u-boot<2022.07 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-34835 | | 23780 | u-boot<2022.07 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-34835 |
23781 | u-boot<2022.07 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-33103 | | 23781 | u-boot<2022.07 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-33103 |
23782 | u-boot<2022.07 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33967 | | 23782 | u-boot<2022.07 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33967 |
23783 | xpdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33108 | | 23783 | xpdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33108 |
23784 | radare2-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-34520 | | 23784 | radare2-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-34520 |
23785 | radare2-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34502 | | 23785 | radare2-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34502 |
23786 | gpac-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2454 | | 23786 | gpac-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2454 |
23787 | gpac-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2453 | | 23787 | gpac-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2453 |
23788 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2549 | | 23788 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2549 |
23789 | njs<0.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34032 | | 23789 | njs<0.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34032 |
23790 | njs<0.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34031 | | 23790 | njs<0.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34031 |
23791 | njs<0.7.5 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-34029 | | 23791 | njs<0.7.5 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-34029 |
23792 | njs<0.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34030 | | 23792 | njs<0.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34030 |
23793 | njs<0.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34028 | | 23793 | njs<0.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34028 |
23794 | njs<0.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34027 | | 23794 | njs<0.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34027 |
23795 | nasm-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2021-33450 | | 23795 | nasm-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2021-33450 |
23796 | nasm-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2021-33452 | | 23796 | nasm-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2021-33452 |
23797 | gstreamer1<1.20.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2122 | | 23797 | gstreamer1<1.20.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2122 |
23798 | gstreamer1<1.20.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1924 | | 23798 | gstreamer1<1.20.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1924 |
23799 | gstreamer1<1.20.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1923 | | 23799 | gstreamer1<1.20.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1923 |
23800 | gstreamer1<1.20.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1921 | | 23800 | gstreamer1<1.20.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1921 |
23801 | gstreamer1<1.20.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1922 | | 23801 | gstreamer1<1.20.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1922 |
23802 | gstreamer1<1.20.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-1920 | | 23802 | gstreamer1<1.20.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-1920 |
23803 | gstreamer1<1.20.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1925 | | 23803 | gstreamer1<1.20.3 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1925 |
23804 | opa<0.42.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33082 | | 23804 | opa<0.42.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33082 |
23805 | dovecot<2.3.20 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-30550 | | 23805 | dovecot<2.3.20 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-30550 |
23806 | caddy<2.5.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34037 | | 23806 | caddy<2.5.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34037 |
23807 | autotrace-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-32323 | | 23807 | autotrace-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-32323 |
23808 | picoc-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-34556 | | 23808 | picoc-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-34556 |
23809 | qpdf<10.3.2 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-34503 | | 23809 | qpdf<10.3.2 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-34503 |
23810 | libxml2<2.9.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2016-3709 | | 23810 | libxml2<2.9.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2016-3709 |
23811 | py{27,36,37,38,39,310}-lxml<4.9.1 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2309 | | 23811 | py{27,36,37,38,39,310}-lxml<4.9.1 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2309 |
23812 | libxml2<2.10.2 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2309 | | 23812 | libxml2<2.10.2 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2309 |
23813 | htmldoc<1.9.12 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-34035 | | 23813 | htmldoc<1.9.12 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-34035 |
23814 | htmldoc<1.9.16 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-34033 | | 23814 | htmldoc<1.9.16 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-34033 |
23815 | p5-HTTP-Daemon<6.15 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-31081 | | 23815 | p5-HTTP-Daemon<6.15 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-31081 |
23816 | mplayer-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32317 | | 23816 | mplayer-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32317 |
23817 | grub2<2.12 buffer-underflow https://nvd.nist.gov/vuln/detail/CVE-2021-3697 | | 23817 | grub2<2.12 buffer-underflow https://nvd.nist.gov/vuln/detail/CVE-2021-3697 |
23818 | grub2<2.12 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-3696 | | 23818 | grub2<2.12 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-3696 |
23819 | grub2<2.12 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-3695 | | 23819 | grub2<2.12 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2021-3695 |
23820 | vault<1.11.1 improper-access-control https://nvd.nist.gov/vuln/detail/CVE-2022-36129 | | 23820 | vault<1.11.1 improper-access-control https://nvd.nist.gov/vuln/detail/CVE-2022-36129 |
23821 | wavpack-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2476 | | 23821 | wavpack-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2476 |
23822 | tor>=0.4.7<0.4.7.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33903 | | 23822 | tor>=0.4.7<0.4.7.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33903 |
23823 | moodle<4.0.2 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-35650 | | 23823 | moodle<4.0.2 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-35650 |
23824 | moodle<4.0.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-35653 | | 23824 | moodle<4.0.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-35653 |
23825 | moodle<4.0.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-35652 | | 23825 | moodle<4.0.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-35652 |
23826 | moodle<4.0.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-35651 | | 23826 | moodle<4.0.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-35651 |
23827 | moodle<4.0.2 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-35649 | | 23827 | moodle<4.0.2 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-35649 |
23828 | mbedtls<2.28.2 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-35409 | | 23828 | mbedtls<2.28.2 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-35409 |
23829 | gdk-pixbuf2<2.42.8 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-46829 | | 23829 | gdk-pixbuf2<2.42.8 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-46829 |
23830 | gradle<7.5.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-31156 | | 23830 | gradle<7.5.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-31156 |
23831 | py{27,36,37,38,39,310}-ujson<5.4.0 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-31116 | | 23831 | py{27,36,37,38,39,310}-ujson<5.4.0 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-31116 |
23832 | py{27,36,37,38,39,310}-ujson<5.4.0 double-free https://nvd.nist.gov/vuln/detail/CVE-2022-31117 | | 23832 | py{27,36,37,38,39,310}-ujson<5.4.0 double-free https://nvd.nist.gov/vuln/detail/CVE-2022-31117 |
23833 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2056 | | 23833 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2056 |
23834 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2058 | | 23834 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2058 |
23835 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2057 | | 23835 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2057 |
23836 | tiff<4.1.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34266 | | 23836 | tiff<4.1.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34266 |
23837 | mysql-server>=8.0<8.0.30 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL | | 23837 | mysql-server>=8.0<8.0.30 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL |
23838 | mysql-server>=7.6<7.6.23 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL | | 23838 | mysql-server>=7.6<7.6.23 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL |
23839 | mysql-server>=7.0<7.4.37 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL | | 23839 | mysql-server>=7.0<7.4.37 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL |
23840 | mysql-server<5.7.39 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL | | 23840 | mysql-server<5.7.39 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL |
23841 | mysql-cluster>=8.0<8.0.30 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL | | 23841 | mysql-cluster>=8.0<8.0.30 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL |
23842 | mysql-cluster>=7.6<7.6.23 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL | | 23842 | mysql-cluster>=7.6<7.6.23 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL |
23843 | mysql-cluster>=7.0<7.4.37 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL | | 23843 | mysql-cluster>=7.0<7.4.37 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL |
23844 | matrix-synapse<1.61.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31052 | | 23844 | matrix-synapse<1.61.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31052 |
23845 | ruby{26,27,30,31}-mysql<2.10.0 local-file-read https://nvd.nist.gov/vuln/detail/CVE-2021-3779 | | 23845 | ruby{26,27,30,31}-mysql<2.10.0 local-file-read https://nvd.nist.gov/vuln/detail/CVE-2021-3779 |
23846 | php{56,73,74,80,81}-piwigo-[0-9]* remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-40553 | | 23846 | php{56,73,74,80,81}-piwigo-[0-9]* remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-40553 |
23847 | jpegoptim-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-32325 | | 23847 | jpegoptim-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-32325 |
23848 | libreoffice<7.3.2 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2022-26305 | | 23848 | libreoffice<7.3.2 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2022-26305 |
23849 | libreoffice<7.3.3 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-26307 | | 23849 | libreoffice<7.3.3 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-26307 |
23850 | libreoffice<7.3.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-26306 | | 23850 | libreoffice<7.3.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-26306 |
23851 | qemu<7.1.0 uninitialized-buffer https://nvd.nist.gov/vuln/detail/CVE-2022-35414 | | 23851 | qemu<7.1.0 uninitialized-buffer https://nvd.nist.gov/vuln/detail/CVE-2022-35414 |
23852 | grafana>=9.0.0<9.0.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-31097 | | 23852 | grafana>=9.0.0<9.0.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-31097 |
23853 | grafana<8.5.9 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-31097 | | 23853 | grafana<8.5.9 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-31097 |
23854 | grafana>=9.0.0<9.0.3 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-31107 | | 23854 | grafana>=9.0.0<9.0.3 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-31107 |
23855 | grafana<8.5.9 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-31107 | | 23855 | grafana<8.5.9 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-31107 |
23856 | gnutls<3.7.7 double-free https://nvd.nist.gov/vuln/detail/CVE-2022-2509 | | 23856 | gnutls<3.7.7 double-free https://nvd.nist.gov/vuln/detail/CVE-2022-2509 |
23857 | gsasl<2.0.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2469 | | 23857 | gsasl<2.0.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2469 |
23858 | py{27,36,37,38,39,310}-django>=3.2<3.2.14 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-34265 | | 23858 | py{27,36,37,38,39,310}-django>=3.2<3.2.14 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-34265 |
23859 | py{27,36,37,38,39,310}-django>=4.0<4.0.6 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-34265 | | 23859 | py{27,36,37,38,39,310}-django>=4.0<4.0.6 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-34265 |
23860 | php{56,74,80,81}-nextcloud<23.0.5 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-31014 | | 23860 | php{56,74,80,81}-nextcloud<23.0.5 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-31014 |
23861 | rt4-[0-9]* open-redirect https://nvd.nist.gov/vuln/detail/CVE-2022-25803 | | 23861 | rt4-[0-9]* open-redirect https://nvd.nist.gov/vuln/detail/CVE-2022-25803 |
23862 | rt4<4.4.6 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-25802 | | 23862 | rt4<4.4.6 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-25802 |
23863 | php{56,73,74,80,81}-piwigo-[0-9]* sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-32297 | | 23863 | php{56,73,74,80,81}-piwigo-[0-9]* sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-32297 |
23864 | ruby{26,27,30,31}-tzinfo<1.2.10 path-traversal https://nvd.nist.gov/vuln/detail/CVE-2022-31163 | | 23864 | ruby{26,27,30,31}-tzinfo<1.2.10 path-traversal https://nvd.nist.gov/vuln/detail/CVE-2022-31163 |
23865 | py{27,36,37,38,39,310}-mistune<2.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34749 | | 23865 | py{27,36,37,38,39,310}-mistune<2.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34749 |
23866 | php>=8.1<8.1.8 heap-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-31627 | | 23866 | php>=8.1<8.1.8 heap-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-31627 |
23867 | SDL-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-34568 | | 23867 | SDL-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-34568 |
23868 | packagekit-[0-9]* information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-0987 | | 23868 | packagekit-[0-9]* information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-0987 |
23869 | squid4-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46784 | | 23869 | squid4-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46784 |
23870 | py{27,36,37,38,39,310}-sanic<22.6.1 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2022-35920 | | 23870 | py{27,36,37,38,39,310}-sanic<22.6.1 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2022-35920 |
23871 | lua54-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-33099 | | 23871 | lua54-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-33099 |
23872 | mariadb-server<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32089 | | 23872 | mariadb-server<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32089 |
23873 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32089 | | 23873 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32089 |
23874 | mariadb-server<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32087 | | 23874 | mariadb-server<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32087 |
23875 | mariadb-server>=10.5.0<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32087 | | 23875 | mariadb-server>=10.5.0<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32087 |
23876 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32087 | | 23876 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32087 |
23877 | mariadb-server<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32085 | | 23877 | mariadb-server<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32085 |
23878 | mariadb-server>=10.5.0<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32085 | | 23878 | mariadb-server>=10.5.0<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32085 |
23879 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32085 | | 23879 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32085 |
23880 | mariadb-server<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32082 | | 23880 | mariadb-server<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32082 |
23881 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32082 | | 23881 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32082 |
23882 | mariadb-server<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32086 | | 23882 | mariadb-server<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32086 |
23883 | mariadb-server>=10.5.0<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32086 | | 23883 | mariadb-server>=10.5.0<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32086 |
23884 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32086 | | 23884 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32086 |
23885 | mariadb-server<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32084 | | 23885 | mariadb-server<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32084 |
23886 | mariadb-server>=10.5.0<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32084 | | 23886 | mariadb-server>=10.5.0<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32084 |
23887 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32084 | | 23887 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32084 |
23888 | mariadb-server<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32083 | | 23888 | mariadb-server<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32083 |
23889 | mariadb-server>=10.5.0<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32083 | | 23889 | mariadb-server>=10.5.0<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32083 |
23890 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32083 | | 23890 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32083 |
23891 | mariadb-server<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32088 | | 23891 | mariadb-server<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32088 |
23892 | mariadb-server>=10.5.0<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32088 | | 23892 | mariadb-server>=10.5.0<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32088 |
23893 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32088 | | 23893 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32088 |
23894 | mariadb-server<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32081 | | 23894 | mariadb-server<10.4.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32081 |
23895 | mariadb-server>=10.5.0<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32081 | | 23895 | mariadb-server>=10.5.0<10.5.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32081 |
23896 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32081 | | 23896 | mariadb-server>=10.6.0<10.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32081 |
23897 | gnupg2<2.2.36 signature-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-34903 | | 23897 | gnupg2<2.2.36 signature-forgery https://nvd.nist.gov/vuln/detail/CVE-2022-34903 |
23898 | openssl<1.1.1q weak-encryption https://nvd.nist.gov/vuln/detail/CVE-2022-2097 | | 23898 | openssl<1.1.1q weak-encryption https://nvd.nist.gov/vuln/detail/CVE-2022-2097 |
23899 | rsync<3.2.5 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2022-29154 | | 23899 | rsync<3.2.5 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2022-29154 |
23900 | frr-[0-9]* remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-37035 | | 23900 | frr-[0-9]* remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-37035 |
23901 | milkytracker-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-34927 | | 23901 | milkytracker-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-34927 |
23902 | sqlite3<3.39.2 array-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-35737 | | 23902 | sqlite3<3.39.2 array-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-35737 |
23903 | moodle<3.8.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-1754 | | 23903 | moodle<3.8.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-1754 |
23904 | py{27,36,37,38,39,310}-django>=3.2<3.2.15 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-36359 | | 23904 | py{27,36,37,38,39,310}-django>=3.2<3.2.15 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-36359 |
23905 | py{27,36,37,38,39,310}-django>=4.0<4.0.7 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-36359 | | 23905 | py{27,36,37,38,39,310}-django>=4.0<4.0.7 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-36359 |
23906 | py{27,36,37,38,39,310}-djangocms-text-ckeditor-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-31175 | | 23906 | py{27,36,37,38,39,310}-djangocms-text-ckeditor-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-31175 |
23907 | php{56,74,80,81}-nextcloud<22.2.7 excessive-logging https://nvd.nist.gov/vuln/detail/CVE-2022-31120 | | 23907 | php{56,74,80,81}-nextcloud<22.2.7 excessive-logging https://nvd.nist.gov/vuln/detail/CVE-2022-31120 |
23908 | php{56,74,80,81}-nextcloud>=23.0<23.0.4 excessive-logging https://nvd.nist.gov/vuln/detail/CVE-2022-31120 | | 23908 | php{56,74,80,81}-nextcloud>=23.0<23.0.4 excessive-logging https://nvd.nist.gov/vuln/detail/CVE-2022-31120 |
23909 | php{56,74,80,81}-nextcloud<22.2.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31118 | | 23909 | php{56,74,80,81}-nextcloud<22.2.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31118 |
23910 | php{56,74,80,81}-nextcloud>=23.0<23.0.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31118 | | 23910 | php{56,74,80,81}-nextcloud>=23.0<23.0.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31118 |
23911 | php{56,74,80,81}-nextcloud>=24.0<24.0.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31118 | | 23911 | php{56,74,80,81}-nextcloud>=24.0<24.0.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-31118 |
23912 | zlib-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-37434 | | 23912 | zlib-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-37434 |
23913 | libmpeg2-[0-9]* arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2022-37416 | | 23913 | libmpeg2-[0-9]* arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2022-37416 |
23914 | exim4<4.96 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-37451 | | 23914 | exim4<4.96 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-37451 |
23915 | exim4<4.95 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-37452 | | 23915 | exim4<4.95 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-37452 |
23916 | openjdk7<1.7.344 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixJAVA | | 23916 | openjdk7<1.7.344 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixJAVA |
23917 | openjdk8<1.8.334 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixJAVA | | 23917 | openjdk8<1.8.334 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixJAVA |
23918 | openjdk11<1.11.0.15.2 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixJAVA | | 23918 | openjdk11<1.11.0.15.2 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixJAVA |
23919 | libxslt<1.1.34nb10 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-30560 | | 23919 | libxslt<1.1.34nb10 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-30560 |
23920 | expat<2.4.9 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-40674 | | 23920 | expat<2.4.9 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-40674 |
23921 | routinator<0.11.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3029 | | 23921 | routinator<0.11.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3029 |
23922 | bind916<9.16.33 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38178 | | 23922 | bind916<9.16.33 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38178 |
23923 | bind916<9.16.33 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38177 | | 23923 | bind916<9.16.33 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38177 |
23924 | bind916<9.16.33 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3080 | | 23924 | bind916<9.16.33 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3080 |
23925 | bind916<9.16.33 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2795 | | 23925 | bind916<9.16.33 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2795 |
23926 | unbound<1.16.3 denial-of-service https://nlnetlabs.nl/downloads/unbound/CVE-2022-3204.txt | | 23926 | unbound<1.16.3 denial-of-service https://nlnetlabs.nl/downloads/unbound/CVE-2022-3204.txt |
23927 | redis>7<7.0.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-35951 | | 23927 | redis>7<7.0.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-35951 |
23928 | ruby25-* eol https://www.ruby-lang.org/en/downloads/branches/ | | 23928 | ruby25-* eol https://www.ruby-lang.org/en/downloads/branches/ |
23929 | ruby26-* eol https://www.ruby-lang.org/en/downloads/branches/ | | 23929 | ruby26-* eol https://www.ruby-lang.org/en/downloads/branches/ |
23930 | nodejs>=14<14.20.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32256 | | 23930 | nodejs>=14<14.20.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32256 |
23931 | nodejs>=18<18.9.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32255 | | 23931 | nodejs>=18<18.9.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32255 |
23932 | nodejs>=18<18.9.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32256 | | 23932 | nodejs>=18<18.9.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-32256 |
23933 | php>=7.4<7.4.32 heap-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-31628 | | 23933 | php>=7.4<7.4.32 heap-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-31628 |
23934 | php>=8.0<8.0.24 heap-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-31628 | | 23934 | php>=8.0<8.0.24 heap-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-31628 |
23935 | php>=8.0<8.0.24 heap-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-31629 | | 23935 | php>=8.0<8.0.24 heap-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-31629 |
23936 | php>=8.1<8.1.11 heap-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-31628 | | 23936 | php>=8.1<8.1.11 heap-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-31628 |
23937 | php>=8.1<8.1.11 heap-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-31629 | | 23937 | php>=8.1<8.1.11 heap-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-31629 |
23938 | drupal<9.3.22 multiple-vulnerabilities https://www.drupal.org/sa-core-2022-016 | | 23938 | drupal<9.3.22 multiple-vulnerabilities https://www.drupal.org/sa-core-2022-016 |
23939 | sqlite3<3.39.4 integer-overflow https://sqlite.org/news.html#2022_09_29 | | 23939 | sqlite3<3.39.4 integer-overflow https://sqlite.org/news.html#2022_09_29 |
23940 | go118<1.18.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2879 | | 23940 | go118<1.18.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2879 |
23941 | go119<1.19.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2879 | | 23941 | go119<1.19.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2879 |
23942 | isc-dhcpd<4.4.3p1 integer-overflow https://kb.isc.org/docs/cve-2022-2928 | | 23942 | isc-dhcpd<4.4.3p1 integer-overflow https://kb.isc.org/docs/cve-2022-2928 |
23943 | isc-dhcpd<4.4.3p1 memory-leak https://kb.isc.org/docs/cve-2022-2929 | | 23943 | isc-dhcpd<4.4.3p1 memory-leak https://kb.isc.org/docs/cve-2022-2929 |
23944 | isc-dhcp4-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 23944 | isc-dhcp4-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
23945 | isc-dhcpd4-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 23945 | isc-dhcpd4-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
23946 | isc-dhclient4-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 23946 | isc-dhclient4-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
23947 | isc-dhcrelay4-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 23947 | isc-dhcrelay4-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
23948 | xterm<375 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45063 | | 23948 | xterm<375 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45063 |
23949 | postgresql10-* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 23949 | postgresql10-* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
23950 | py{27,36,37,38,39,310}-sip<5 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 23950 | py{27,36,37,38,39,310}-sip<5 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
23951 | emacs20-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 | | 23951 | emacs20-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 |
23952 | emacs21-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 | | 23952 | emacs21-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 |
23953 | emacs21-nox11-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 | | 23953 | emacs21-nox11-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 |
23954 | emacs25-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 | | 23954 | emacs25-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 |
23955 | emacs25-nox11-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 | | 23955 | emacs25-nox11-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 |
23956 | emacs26-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 | | 23956 | emacs26-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 |
23957 | emacs26-nox11-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 | | 23957 | emacs26-nox11-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 |
23958 | emacs27-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 | | 23958 | emacs27-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 |
23959 | emacs27-nox11-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 | | 23959 | emacs27-nox11-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 |
23960 | emacs28<28.2 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 | | 23960 | emacs28<28.2 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 |
23961 | emacs28-nox11<28.2 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 | | 23961 | emacs28-nox11<28.2 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45939 |
23962 | rust<1.66.1 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2022-46176 | | 23962 | rust<1.66.1 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2022-46176 |
23963 | libXpm<3.5.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-46285 | | 23963 | libXpm<3.5.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-46285 |
23964 | libXpm<3.5.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-44617 | | 23964 | libXpm<3.5.15 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-44617 |
23965 | libXpm<3.5.15 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-4883 | | 23965 | libXpm<3.5.15 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-4883 |
23966 | motif-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-46285 | | 23966 | motif-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-46285 |
23967 | motif-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-44617 | | 23967 | motif-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-44617 |
23968 | motif-[0-9]* privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-4883 | | 23968 | motif-[0-9]* privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-4883 |
23969 | heimdal<7.8.0nb2 unknown-impact https://nvd.nist.gov/vuln/detail/CVE-2022-45142 | | 23969 | heimdal<7.8.0nb2 unknown-impact https://nvd.nist.gov/vuln/detail/CVE-2022-45142 |
23970 | py{36,37,38,39,310,311}-django>=3.2<3.2.17 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-23969 | | 23970 | py{36,37,38,39,310,311}-django>=3.2<3.2.17 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-23969 |
23971 | py{36,37,38,39,310,311}-django>=3.2<3.2.18 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-24580 | | 23971 | py{36,37,38,39,310,311}-django>=3.2<3.2.18 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-24580 |
23972 | gnutls<3.7.9 side-channel https://nvd.nist.gov/vuln/detail/CVE-2023-0361 | | 23972 | gnutls<3.7.9 side-channel https://nvd.nist.gov/vuln/detail/CVE-2023-0361 |
23973 | git-base<2.39.1 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-41903 | | 23973 | git-base<2.39.1 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-41903 |
23974 | git-base<2.39.1 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-23521 | | 23974 | git-base<2.39.1 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-23521 |
23975 | git-base<2.39.2 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2023-22490 | | 23975 | git-base<2.39.2 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2023-22490 |
23976 | git-base<2.39.2 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2023-23946 | | 23976 | git-base<2.39.2 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2023-23946 |
23977 | curl>=7.57.0<7.88.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-23916 | | 23977 | curl>=7.57.0<7.88.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-23916 |
23978 | haproxy<2.7.3 http-response-smuggling https://nvd.nist.gov/vuln/detail/CVE-2023-25725 | | 23978 | haproxy<2.7.3 http-response-smuggling https://nvd.nist.gov/vuln/detail/CVE-2023-25725 |
23979 | webkit-gtk<2.38.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-23529 | | 23979 | webkit-gtk<2.38.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-23529 |
23980 | vim<9.0.0224 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2874 | | 23980 | vim<9.0.0224 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2874 |
23981 | vim<9.0.0211 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2819 | | 23981 | vim<9.0.0211 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2819 |
23982 | vim<9.0.0213 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2817 | | 23982 | vim<9.0.0213 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2817 |
23983 | vim<9.0.0212 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2816 | | 23983 | vim<9.0.0212 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2816 |
23984 | vim<9.0.0218 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2845 | | 23984 | vim<9.0.0218 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2845 |
23985 | vim<9.0.0220 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2849 | | 23985 | vim<9.0.0220 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-2849 |
23986 | vim<9.0.0221 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2862 | | 23986 | vim<9.0.0221 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2862 |
23987 | vim<9.0.0225 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2889 | | 23987 | vim<9.0.0225 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2889 |
23988 | vim<9.0.0240 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2923 | | 23988 | vim<9.0.0240 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2923 |
23989 | vim<9.0.0246 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2946 | | 23989 | vim<9.0.0246 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2946 |
23990 | vim<9.0.0260 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2982 | | 23990 | vim<9.0.0260 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-2982 |
23991 | vim<9.0.0259 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2980 | | 23991 | vim<9.0.0259 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-2980 |
23992 | vim<9.0.0286 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3016 | | 23992 | vim<9.0.0286 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3016 |
23993 | vim<9.0.0322 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3037 | | 23993 | vim<9.0.0322 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3037 |
23994 | vim<9.0.0360 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3099 | | 23994 | vim<9.0.0360 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3099 |
23995 | vim<9.0.0389 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3134 | | 23995 | vim<9.0.0389 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3134 |
23996 | vim<9.0.0404 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-3153 | | 23996 | vim<9.0.0404 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-3153 |
23997 | vim<9.0.0483 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3234 | | 23997 | vim<9.0.0483 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3234 |
23998 | vim<9.0.0490 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3235 | | 23998 | vim<9.0.0490 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3235 |
23999 | vim<9.0.0530 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3256 | | 23999 | vim<9.0.0530 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3256 |
24000 | vim<9.0.0552 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-3278 | | 24000 | vim<9.0.0552 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-3278 |
24001 | vim<9.0.0577 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3296 | | 24001 | vim<9.0.0577 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3296 |
24002 | vim<9.0.0598 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3324 | | 24002 | vim<9.0.0598 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3324 |
24003 | vim<9.0.0579 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3297 | | 24003 | vim<9.0.0579 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3297 |
24004 | vim<8.2.4959 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-1725 | | 24004 | vim<8.2.4959 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-1725 |
24005 | vim<9.0.0614 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3352 | | 24005 | vim<9.0.0614 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3352 |
24006 | vim<9.0.0805 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3705 | | 24006 | vim<9.0.0805 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3705 |
24007 | vim<9.0.0946 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-4141 | | 24007 | vim<9.0.0946 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-4141 |
24008 | vim<9.0.0789 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3591 | | 24008 | vim<9.0.0789 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3591 |
24009 | vim<9.0.0765 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3520 | | 24009 | vim<9.0.0765 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3520 |
24010 | vim<9.0.0742 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3491 | | 24010 | vim<9.0.0742 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3491 |
24011 | vim<9.0.0882 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-4292 | | 24011 | vim<9.0.0882 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-4292 |
24012 | vim<9.0.0804 floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2022-4293 | | 24012 | vim<9.0.0804 floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2022-4293 |
24013 | vim<9.0.1144 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0051 | | 24013 | vim<9.0.1144 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0051 |
24014 | vim<9.0.1143 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-0049 | | 24014 | vim<9.0.1143 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-0049 |
24015 | vim<9.0.1145 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-0054 | | 24015 | vim<9.0.1145 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-0054 |
24016 | vim<9.0.1189 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0288 | | 24016 | vim<9.0.1189 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0288 |
24017 | vim>=8.1.2269<9.0.0339 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-47024 | | 24017 | vim>=8.1.2269<9.0.0339 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-47024 |
24018 | vim<9.0.1225 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0433 | | 24018 | vim<9.0.1225 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0433 |
24019 | vim<9.0.1247 divide-by-zero https://nvd.nist.gov/vuln/detail/CVE-2023-0512 | | 24019 | vim<9.0.1247 divide-by-zero https://nvd.nist.gov/vuln/detail/CVE-2023-0512 |
24020 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44321 | | 24020 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44321 |
24021 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44320 | | 24021 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44320 |
24022 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44319 | | 24022 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44319 |
24023 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44318 | | 24023 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44318 |
24024 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44317 | | 24024 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44317 |
24025 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44315 | | 24025 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44315 |
24026 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44316 | | 24026 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44316 |
24027 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44314 | | 24027 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44314 |
24028 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44313 | | 24028 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44313 |
24029 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44312 | | 24029 | picoc-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44312 |
24030 | zoneminder<1.37.24 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39290 | | 24030 | zoneminder<1.37.24 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39290 |
24031 | zoneminder<1.37.24 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39291 | | 24031 | zoneminder<1.37.24 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39291 |
24032 | zoneminder<1.37.24 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39289 | | 24032 | zoneminder<1.37.24 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39289 |
24033 | zoneminder<1.37.24 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39285 | | 24033 | zoneminder<1.37.24 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39285 |
24034 | zoneminder<1.37.24 session-hijack https://nvd.nist.gov/vuln/detail/CVE-2022-30769 | | 24034 | zoneminder<1.37.24 session-hijack https://nvd.nist.gov/vuln/detail/CVE-2022-30769 |
24035 | zoneminder<1.37.24 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-30768 | | 24035 | zoneminder<1.37.24 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-30768 |
24036 | openimageio-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43603 | | 24036 | openimageio-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43603 |
24037 | openimageio-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43602 | | 24037 | openimageio-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43602 |
24038 | openimageio-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43601 | | 24038 | openimageio-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43601 |
24039 | openimageio-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43600 | | 24039 | openimageio-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43600 |
24040 | openimageio-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43599 | | 24040 | openimageio-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43599 |
24041 | openimageio-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-43598 | | 24041 | openimageio-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-43598 |
24042 | openimageio-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-43597 | | 24042 | openimageio-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-43597 |
24043 | openimageio-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43596 | | 24043 | openimageio-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43596 |
24044 | openimageio-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-43594 | | 24044 | openimageio-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-43594 |
24045 | openimageio-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-43595 | | 24045 | openimageio-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-43595 |
24046 | openimageio-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-43593 | | 24046 | openimageio-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-43593 |
24047 | openimageio-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43592 | | 24047 | openimageio-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43592 |
24048 | openimageio-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41999 | | 24048 | openimageio-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41999 |
24049 | openimageio-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41988 | | 24049 | openimageio-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41988 |
24050 | openimageio-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-41981 | | 24050 | openimageio-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-41981 |
24051 | openimageio-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41977 | | 24051 | openimageio-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41977 |
24052 | openimageio-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-41838 | | 24052 | openimageio-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-41838 |
24053 | openimageio-[0-9]* memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-41837 | | 24053 | openimageio-[0-9]* memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-41837 |
24054 | openimageio-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-41794 | | 24054 | openimageio-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-41794 |
24055 | openimageio-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41649 | | 24055 | openimageio-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41649 |
24056 | openimageio-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41684 | | 24056 | openimageio-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41684 |
24057 | openimageio-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41639 | | 24057 | openimageio-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41639 |
24058 | openimageio-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-38143 | | 24058 | openimageio-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-38143 |
24059 | openimageio-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-36354 | | 24059 | openimageio-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-36354 |
24060 | openimageio-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43603 | | 24060 | openimageio-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43603 |
24061 | openimageio-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43602 | | 24061 | openimageio-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43602 |
24062 | openimageio-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43601 | | 24062 | openimageio-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43601 |
24063 | openimageio-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43600 | | 24063 | openimageio-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43600 |
24064 | openimageio-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43599 | | 24064 | openimageio-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43599 |
24065 | openimageio-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-43598 | | 24065 | openimageio-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-43598 |
24066 | openimageio-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-43597 | | 24066 | openimageio-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-43597 |
24067 | openimageio-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43596 | | 24067 | openimageio-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43596 |
24068 | openimageio-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-43594 | | 24068 | openimageio-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-43594 |
24069 | openimageio-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-43595 | | 24069 | openimageio-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-43595 |
24070 | openimageio-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-43593 | | 24070 | openimageio-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-43593 |
24071 | openimageio-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43592 | | 24071 | openimageio-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43592 |
24072 | openimageio-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41999 | | 24072 | openimageio-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41999 |
24073 | openimageio-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41988 | | 24073 | openimageio-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41988 |
24074 | openimageio-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-41981 | | 24074 | openimageio-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-41981 |
24075 | openimageio-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41977 | | 24075 | openimageio-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41977 |
24076 | openimageio-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-41838 | | 24076 | openimageio-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-41838 |
24077 | openimageio-[0-9]* memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-41837 | | 24077 | openimageio-[0-9]* memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-41837 |
24078 | openimageio-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-41794 | | 24078 | openimageio-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-41794 |
24079 | openimageio-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41649 | | 24079 | openimageio-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41649 |
24080 | openimageio-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41684 | | 24080 | openimageio-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41684 |
24081 | openimageio-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41639 | | 24081 | openimageio-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41639 |
24082 | openimageio-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-38143 | | 24082 | openimageio-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-38143 |
24083 | openimageio-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-36354 | | 24083 | openimageio-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-36354 |
24084 | redis>=7<7.0.5 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-35951 | | 24084 | redis>=7<7.0.5 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-35951 |
24085 | redis>=7<7.0.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-22458 | | 24085 | redis>=7<7.0.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-22458 |
24086 | redis>=6.0<6.0.17 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-35977 | | 24086 | redis>=6.0<6.0.17 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-35977 |
24087 | redis>=6.2<6.2.9 denial-of-service https://nvd.nist.gov/vuln/detail/cve-2022-35977 | | 24087 | redis>=6.2<6.2.9 denial-of-service https://nvd.nist.gov/vuln/detail/cve-2022-35977 |
24088 | redis>=7<7.0.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-35977 | | 24088 | redis>=7<7.0.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-35977 |
24089 | advancecomp-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-35020 | | 24089 | advancecomp-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-35020 |
24090 | advancecomp-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-35019 | | 24090 | advancecomp-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-35019 |
24091 | advancecomp-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-35018 | | 24091 | advancecomp-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-35018 |
24092 | advancecomp-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-35017 | | 24092 | advancecomp-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-35017 |
24093 | advancecomp-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-35016 | | 24093 | advancecomp-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-35016 |
24094 | advancecomp-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-35015 | | 24094 | advancecomp-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-35015 |
24095 | advancecomp-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-35014 | | 24095 | advancecomp-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-35014 |
24096 | nasm-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-41420 | | 24096 | nasm-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-41420 |
24097 | nasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-46457 | | 24097 | nasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-46457 |
24098 | nasm-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-46456 | | 24098 | nasm-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-46456 |
24099 | tcpreplay-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-37049 | | 24099 | tcpreplay-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-37049 |
24100 | tcpreplay-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-37048 | | 24100 | tcpreplay-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-37048 |
24101 | tcpreplay-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-37047 | | 24101 | tcpreplay-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-37047 |
24102 | binwalk<2.3.3 symlink-attack https://nvd.nist.gov/vuln/detail/CVE-2021-4287 | | 24102 | binwalk<2.3.3 symlink-attack https://nvd.nist.gov/vuln/detail/CVE-2021-4287 |
24103 | binwalk>=2.2<2.3.3 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-4510 | | 24103 | binwalk>=2.2<2.3.3 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-4510 |
24104 | upx<3.96 floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2020-27790 | | 24104 | upx<3.96 floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2020-27790 |
24105 | upx<3.96 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-27787 | | 24105 | upx<3.96 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-27787 |
24106 | upx<3.96 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-27788 | | 24106 | upx<3.96 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-27788 |
24107 | upx-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-23457 | | 24107 | upx-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-23457 |
24108 | upx-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-23456 | | 24108 | upx-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-23456 |
24109 | ampache<5.5.7 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-0606 | | 24109 | ampache<5.5.7 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-0606 |
24110 | ampache<5.5.7 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2023-0771 | | 24110 | ampache<5.5.7 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2023-0771 |
24111 | bind>=9.18.0<9.18.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2906 | | 24111 | bind>=9.18.0<9.18.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2906 |
24112 | bind>=9.19.0<9.19.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2906 | | 24112 | bind>=9.19.0<9.19.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2906 |
24113 | bind>=9.18.0<9.18.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2881 | | 24113 | bind>=9.18.0<9.18.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2881 |
24114 | bind>=9.19.0<9.19.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2881 | | 24114 | bind>=9.19.0<9.19.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2881 |
24115 | bind>=9.16.12<9.16.37 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3924 | | 24115 | bind>=9.16.12<9.16.37 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3924 |
24116 | bind>=9.18.0<9.18.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3924 | | 24116 | bind>=9.18.0<9.18.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3924 |
24117 | bind>=9.19.0<9.19.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3924 | | 24117 | bind>=9.19.0<9.19.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3924 |
24118 | bind>=9.16.12<9.16.37 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3736 | | 24118 | bind>=9.16.12<9.16.37 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3736 |
24119 | bind>=9.18.0<9.18.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3736 | | 24119 | bind>=9.18.0<9.18.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3736 |
24120 | bind>=9.19.0<9.19.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3736 | | 24120 | bind>=9.19.0<9.19.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3736 |
24121 | xpdf-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38238 | | 24121 | xpdf-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38238 |
24122 | xpdf-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38237 | | 24122 | xpdf-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38237 |
24123 | xpdf-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38236 | | 24123 | xpdf-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38236 |
24124 | xpdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38235 | | 24124 | xpdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38235 |
24125 | xpdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38233 | | 24125 | xpdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38233 |
24126 | xpdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38234 | | 24126 | xpdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38234 |
24127 | xpdf-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38231 | | 24127 | xpdf-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38231 |
24128 | xpdf-[0-9]* floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2022-38230 | | 24128 | xpdf-[0-9]* floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2022-38230 |
24129 | xpdf-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38229 | | 24129 | xpdf-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38229 |
24130 | xpdf-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38228 | | 24130 | xpdf-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38228 |
24131 | xpdf-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38227 | | 24131 | xpdf-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38227 |
24132 | xpdf<4.04 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38171 | | 24132 | xpdf<4.04 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38171 |
24133 | xpdf<4.04 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24107 | | 24133 | xpdf<4.04 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24107 |
24134 | xpdf<4.04 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24106 | | 24134 | xpdf<4.04 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-24106 |
24135 | xpdf<4.04 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-36561 | | 24135 | xpdf<4.04 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-36561 |
24136 | xpdf<4.04 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38334 | | 24136 | xpdf<4.04 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38334 |
24137 | xpdf<4.05 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38928 | | 24137 | xpdf<4.05 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38928 |
24138 | xpdf<4.05 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38222 | | 24138 | xpdf<4.05 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38222 |
24139 | xpdf<4.05 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41842 | | 24139 | xpdf<4.05 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41842 |
24140 | xpdf<4.05 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41844 | | 24140 | xpdf<4.05 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41844 |
24141 | xpdf<4.05 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41843 | | 24141 | xpdf<4.05 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41843 |
24142 | xpdf<4.04 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40226 | | 24142 | xpdf<4.04 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40226 |
24143 | xpdf<4.05 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43295 | | 24143 | xpdf<4.05 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43295 |
24144 | xpdf<4.05 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43071 | | 24144 | xpdf<4.05 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43071 |
24145 | xpdf<4.04 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-36493 | | 24145 | xpdf<4.04 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-36493 |
24146 | grafana<9.1.6 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-35957 | | 24146 | grafana<9.1.6 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-35957 |
24147 | grafana<9.1.6 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-36062 | | 24147 | grafana<9.1.6 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-36062 |
24148 | grafana<9.1.8 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-39201 | | 24148 | grafana<9.1.8 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-39201 |
24149 | grafana<9.1.8 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-39229 | | 24149 | grafana<9.1.8 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-39229 |
24150 | grafana<9.1.8 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-31130 | | 24150 | grafana<9.1.8 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-31130 |
24151 | grafana<9.1.8 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-31123 | | 24151 | grafana<9.1.8 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-31123 |
24152 | grafana>=9.2.0<9.2.4 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-39328 | | 24152 | grafana>=9.2.0<9.2.4 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-39328 |
24153 | grafana<9.2.4 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39307 | | 24153 | grafana<9.2.4 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39307 |
24154 | grafana<9.2.4 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39306 | | 24154 | grafana<9.2.4 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39306 |
24155 | grafana<9.2.8 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-39324 | | 24155 | grafana<9.2.8 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-39324 |
24156 | grafana<9.3.4 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-23552 | | 24156 | grafana<9.3.4 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-23552 |
24157 | grafana<9.3.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-23498 | | 24157 | grafana<9.3.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-23498 |
24158 | libde265<1.0.10 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43253 | | 24158 | libde265<1.0.10 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43253 |
24159 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43252 | | 24159 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43252 |
24160 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43250 | | 24160 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43250 |
24161 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43249 | | 24161 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43249 |
24162 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43248 | | 24162 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43248 |
24163 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43245 | | 24163 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43245 |
24164 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43244 | | 24164 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43244 |
24165 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43243 | | 24165 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43243 |
24166 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43242 | | 24166 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43242 |
24167 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43241 | | 24167 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43241 |
24168 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43240 | | 24168 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43240 |
24169 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43238 | | 24169 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43238 |
24170 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43237 | | 24170 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43237 |
24171 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43239 | | 24171 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43239 |
24172 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43236 | | 24172 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43236 |
24173 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43235 | | 24173 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43235 |
24174 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-47655 | | 24174 | libde265<1.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-47655 |
24175 | heimdal<7.7.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41916 | | 24175 | heimdal<7.7.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41916 |
24176 | heimdal<7.7.1 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-44640 | | 24176 | heimdal<7.7.1 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-44640 |
24177 | heimdal<7.7.1 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-44758 | | 24177 | heimdal<7.7.1 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-44758 |
24178 | curl<7.85.0 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-35252 | | 24178 | curl<7.85.0 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-35252 |
24179 | curl>=7.77.0<7.86.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-42916 | | 24179 | curl>=7.77.0<7.86.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-42916 |
24180 | curl>=7.77.0<7.86.0 double-free https://nvd.nist.gov/vuln/detail/CVE-2022-42915 | | 24180 | curl>=7.77.0<7.86.0 double-free https://nvd.nist.gov/vuln/detail/CVE-2022-42915 |
24181 | curl>=7.84.0<7.86.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-35260 | | 24181 | curl>=7.84.0<7.86.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-35260 |
24182 | curl<7.86.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-32221 | | 24182 | curl<7.86.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-32221 |
24183 | curl>=7.77.0<7.87.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-43551 | | 24183 | curl>=7.77.0<7.87.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-43551 |
24184 | curl<7.87.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-43552 | | 24184 | curl<7.87.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-43552 |
24185 | freeradius-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-41860 | | 24185 | freeradius-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-41860 |
24186 | freeradius-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41861 | | 24186 | freeradius-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41861 |
24187 | freeradius-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41859 | | 24187 | freeradius-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41859 |
24188 | freerdp2<2.8.1 uninitialized-memory-read https://nvd.nist.gov/vuln/detail/CVE-2022-39283 | | 24188 | freerdp2<2.8.1 uninitialized-memory-read https://nvd.nist.gov/vuln/detail/CVE-2022-39283 |
24189 | freerdp2<2.8.1 uninitialized-memory-read https://nvd.nist.gov/vuln/detail/CVE-2022-39282 | | 24189 | freerdp2<2.8.1 uninitialized-memory-read https://nvd.nist.gov/vuln/detail/CVE-2022-39282 |
24190 | freerdp2<2.9.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-41877 | | 24190 | freerdp2<2.9.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-41877 |
24191 | freerdp2<2.9.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-39347 | | 24191 | freerdp2<2.9.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-39347 |
24192 | freerdp2<2.9.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-39320 | | 24192 | freerdp2<2.9.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-39320 |
24193 | freerdp2<2.9.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-39319 | | 24193 | freerdp2<2.9.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-39319 |
24194 | freerdp2<2.9.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-39318 | | 24194 | freerdp2<2.9.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-39318 |
24195 | freerdp2<2.9.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-39316 | | 24195 | freerdp2<2.9.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-39316 |
24196 | freerdp2<2.9.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-39317 | | 24196 | freerdp2<2.9.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-39317 |
24197 | fribidi<1.0.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-25310 | | 24197 | fribidi<1.0.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-25310 |
24198 | fribidi<1.0.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-25309 | | 24198 | fribidi<1.0.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-25309 |
24199 | fribidi<1.0.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-25308 | | 24199 | fribidi<1.0.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-25308 |
24200 | glpi>=0.65<10.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39376 | | 24200 | glpi>=0.65<10.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39376 |
24201 | glpi<10.0.4 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39375 | | 24201 | glpi<10.0.4 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39375 |
24202 | glpi>=10.0.0<10.0.4 code-injection https://nvd.nist.gov/vuln/detail/CVE-2022-39373 | | 24202 | glpi>=10.0.0<10.0.4 code-injection https://nvd.nist.gov/vuln/detail/CVE-2022-39373 |
24203 | glpi>=0.70<10.0.4 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39372 | | 24203 | glpi>=0.70<10.0.4 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39372 |
24204 | glpi>=10.0.0<10.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39371 | | 24204 | glpi>=10.0.0<10.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39371 |
24205 | glpi<10.0.4 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-39370 | | 24205 | glpi<10.0.4 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-39370 |
24206 | glpi<10.0.4 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-39323 | | 24206 | glpi<10.0.4 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-39323 |
24207 | glpi>=0.60<10.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39277 | | 24207 | glpi>=0.60<10.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39277 |
24208 | glpi<10.0.4 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39262 | | 24208 | glpi<10.0.4 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39262 |
24209 | glpi<10.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39276 | | 24209 | glpi<10.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39276 |
24210 | glpi<10.0.4 access-validation-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-39234 | | 24210 | glpi<10.0.4 access-validation-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-39234 |
24211 | glpi<10.0.3 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-35947 | | 24211 | glpi<10.0.3 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-35947 |
24212 | glpi<10.0.3 html-attribute-injection https://nvd.nist.gov/vuln/detail/CVE-2022-31187 | | 24212 | glpi<10.0.3 html-attribute-injection https://nvd.nist.gov/vuln/detail/CVE-2022-31187 |
24213 | glpi<10.0.3 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-36112 | | 24213 | glpi<10.0.3 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-36112 |
24214 | glpi<10.0.3 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-35946 | | 24214 | glpi<10.0.3 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-35946 |
24215 | glpi<10.0.3 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-31143 | | 24215 | glpi<10.0.3 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-31143 |
24216 | glpi<10.0.3 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-35945 | | 24216 | glpi<10.0.3 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-35945 |
24217 | glpi-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39181 | | 24217 | glpi-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-39181 |
24218 | glpi<10.0.6 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-23610 | | 24218 | glpi<10.0.6 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-23610 |
24219 | glpi<10.0.6 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-22725 | | 24219 | glpi<10.0.6 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-22725 |
24220 | glpi<10.0.6 access-validation-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-22500 | | 24220 | glpi<10.0.6 access-validation-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-22500 |
24221 | glpi<10.0.6 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-22724 | | 24221 | glpi<10.0.6 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-22724 |
24222 | glpi<10.0.6 url-injection https://nvd.nist.gov/vuln/detail/CVE-2023-22722 | | 24222 | glpi<10.0.6 url-injection https://nvd.nist.gov/vuln/detail/CVE-2023-22722 |
24223 | glpi<10.0.6 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-41941 | | 24223 | glpi<10.0.6 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-41941 |
24224 | wordpress<6.0.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-43500 | | 24224 | wordpress<6.0.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-43500 |
24225 | wordpress<6.0.3 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-43504 | | 24225 | wordpress<6.0.3 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-43504 |
24226 | wordpress<6.0.3 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-43497 | | 24226 | wordpress<6.0.3 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-43497 |
24227 | wordpress-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-3590 | | 24227 | wordpress-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-3590 |
24228 | wordpress-[0-9]* unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-22622 | | 24228 | wordpress-[0-9]* unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-22622 |
24229 | radare2<4.4.0 double-free https://nvd.nist.gov/vuln/detail/CVE-2020-27794 | | 24229 | radare2<4.4.0 double-free https://nvd.nist.gov/vuln/detail/CVE-2020-27794 |
24230 | radare2<4.4.0 off-by-one https://nvd.nist.gov/vuln/detail/CVE-2020-27793 | | 24230 | radare2<4.4.0 off-by-one https://nvd.nist.gov/vuln/detail/CVE-2020-27793 |
24231 | radare2<4.4.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2020-27795 | | 24231 | radare2<4.4.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2020-27795 |
24232 | radare2-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-4398 | | 24232 | radare2-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-4398 |
24233 | radare2<5.8.2 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-4843 | | 24233 | radare2<5.8.2 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-4843 |
24234 | radare2<5.8.2 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-0302 | | 24234 | radare2<5.8.2 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-0302 |
24235 | exim-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3559 | | 24235 | exim-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3559 |
24236 | exim-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3620 | | 24236 | exim-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3620 |
24237 | sox-[0-9]* division-by-zero https://nvd.nist.gov/vuln/detail/CVE-2021-33844 | | 24237 | sox-[0-9]* division-by-zero https://nvd.nist.gov/vuln/detail/CVE-2021-33844 |
24238 | sox-[0-9]* division-by-zero https://nvd.nist.gov/vuln/detail/CVE-2021-23210 | | 24238 | sox-[0-9]* division-by-zero https://nvd.nist.gov/vuln/detail/CVE-2021-23210 |
24239 | sox-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-23172 | | 24239 | sox-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-23172 |
24240 | sox-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-23159 | | 24240 | sox-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-23159 |
24241 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2869 | | 24241 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2869 |
24242 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2868 | | 24242 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2868 |
24243 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2867 | | 24243 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2867 |
24244 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2953 | | 24244 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2953 |
24245 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2521 | | 24245 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2521 |
24246 | tiff<4.5.0 double-free https://nvd.nist.gov/vuln/detail/CVE-2022-2519 | | 24246 | tiff<4.5.0 double-free https://nvd.nist.gov/vuln/detail/CVE-2022-2519 |
24247 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2520 | | 24247 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2520 |
24248 | tiff<4.4.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1355 | | 24248 | tiff<4.4.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1355 |
24249 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1354 | | 24249 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1354 |
24250 | tiff<4.5.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-3599 | | 24250 | tiff<4.5.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-3599 |
24251 | tiff<4.5.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-3598 | | 24251 | tiff<4.5.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-3598 |
24252 | tiff<4.5.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-3627 | | 24252 | tiff<4.5.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-3627 |
24253 | tiff<4.5.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-3626 | | 24253 | tiff<4.5.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-3626 |
24254 | tiff<4.5.0 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3570 | | 24254 | tiff<4.5.0 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3570 |
24255 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3970 | | 24255 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3970 |
24256 | tiff<4.5.1 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-48281 | | 24256 | tiff<4.5.1 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-48281 |
24257 | libraw<0.21.1 ut-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2020-35535 | | 24257 | libraw<0.21.1 ut-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2020-35535 |
24258 | libraw<0.21.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2020-35533 | | 24258 | libraw<0.21.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2020-35533 |
24259 | libraw<0.21.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2020-35531 | | 24259 | libraw<0.21.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2020-35531 |
24260 | libraw<0.21.1 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2020-35534 | | 24260 | libraw<0.21.1 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2020-35534 |
24261 | libraw<0.21.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2020-35530 | | 24261 | libraw<0.21.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2020-35530 |
24262 | libraw<0.21.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2020-35532 | | 24262 | libraw<0.21.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2020-35532 |
24263 | libredwg<0.12.4.4608 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-35164 | | 24263 | libredwg<0.12.4.4608 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-35164 |
24264 | libredwg-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-45332 | | 24264 | libredwg-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-45332 |
24265 | blender-[0-9]* infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2022-2833 | | 24265 | blender-[0-9]* infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2022-2833 |
24266 | blender-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2832 | | 24266 | blender-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2832 |
24267 | blender-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2831 | | 24267 | blender-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2831 |
24268 | consul<1.11.9 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-41803 | | 24268 | consul<1.11.9 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-41803 |
24269 | consul<1.12.5 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-40716 | | 24269 | consul<1.12.5 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2022-40716 |
24270 | consul<1.24.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-3920 | | 24270 | consul<1.24.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-3920 |
24271 | rpm<4.17.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-3521 | | 24271 | rpm<4.17.1 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-3521 |
24272 | rpm<4.18.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-35938 | | 24272 | rpm<4.18.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-35938 |
24273 | rpm<4.18.0 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2021-35937 | | 24273 | rpm<4.18.0 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2021-35937 |
24274 | rpm<4.18.0 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2021-35939 | | 24274 | rpm<4.18.0 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2021-35939 |
24275 | typo3<8 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 24275 | typo3<8 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
24276 | wireshark<3.6.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3725 | | 24276 | wireshark<3.6.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3725 |
24277 | wireshark<4.0.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-4345 | | 24277 | wireshark<4.0.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-4345 |
24278 | wireshark<4.0.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-4344 | | 24278 | wireshark<4.0.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-4344 |
24279 | wireshark<4.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0417 | | 24279 | wireshark<4.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0417 |
24280 | wireshark<4.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0416 | | 24280 | wireshark<4.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0416 |
24281 | wireshark<4.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0415 | | 24281 | wireshark<4.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0415 |
24282 | wireshark<4.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0414 | | 24282 | wireshark<4.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0414 |
24283 | wireshark<4.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0413 | | 24283 | wireshark<4.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0413 |
24284 | wireshark<4.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0412 | | 24284 | wireshark<4.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0412 |
24285 | wireshark<4.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0411 | | 24285 | wireshark<4.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0411 |
24286 | wolfssl<5.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34293 | | 24286 | wolfssl<5.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-34293 |
24287 | wolfssl>=5.3.0<5.5.0 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2022-38153 | | 24287 | wolfssl>=5.3.0<5.5.0 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2022-38153 |
24288 | wolfssl<5.5.0 unknown-impact https://nvd.nist.gov/vuln/detail/CVE-2022-38152 | | 24288 | wolfssl<5.5.0 unknown-impact https://nvd.nist.gov/vuln/detail/CVE-2022-38152 |
24289 | wolfssl<5.1.0 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2021-44718 | | 24289 | wolfssl<5.1.0 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2021-44718 |
24290 | wolfssl<5.5.1 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-39173 | | 24290 | wolfssl<5.5.1 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-39173 |
24291 | wolfssl<5.5.0 privacy-leak https://nvd.nist.gov/vuln/detail/CVE-2022-42961 | | 24291 | wolfssl<5.5.0 privacy-leak https://nvd.nist.gov/vuln/detail/CVE-2022-42961 |
24292 | wolfssl<5.5.2 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-42905 | | 24292 | wolfssl<5.5.2 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-42905 |
24293 | wkhtmltopdf<0.12.6 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-21365 | | 24293 | wkhtmltopdf<0.12.6 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-21365 |
24294 | wkhtmltopdf-[0-9]* command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-35583 | | 24294 | wkhtmltopdf-[0-9]* command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-35583 |
24295 | moodle<3.8.2 input-validation https://nvd.nist.gov/vuln/detail/CVE-2020-1756 | | 24295 | moodle<3.8.2 input-validation https://nvd.nist.gov/vuln/detail/CVE-2020-1756 |
24296 | moodle<3.8.2 url-spoofing https://nvd.nist.gov/vuln/detail/CVE-2020-1755 | | 24296 | moodle<3.8.2 url-spoofing https://nvd.nist.gov/vuln/detail/CVE-2020-1755 |
24297 | moodle<3.9.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-14322 | | 24297 | moodle<3.9.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-14322 |
24298 | moodle<3.8.4 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-14321 | | 24298 | moodle<3.8.4 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-14321 |
24299 | moodle<3.9.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2020-14320 | | 24299 | moodle<3.9.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2020-14320 |
24300 | moodle<4.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-36568 | | 24300 | moodle<4.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-36568 |
24301 | moodle<3.11.3 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-40695 | | 24301 | moodle<3.11.3 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-40695 |
24302 | moodle<3.11.3 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2021-40694 | | 24302 | moodle<3.11.3 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2021-40694 |
24303 | moodle<3.11.3 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-40693 | | 24303 | moodle<3.11.3 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-40693 |
24304 | moodle<3.11.3 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-40692 | | 24304 | moodle<3.11.3 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-40692 |
24305 | moodle<3.11.3 session-hijack https://nvd.nist.gov/vuln/detail/CVE-2021-40691 | | 24305 | moodle<3.11.3 session-hijack https://nvd.nist.gov/vuln/detail/CVE-2021-40691 |
24306 | moodle<4.0.4 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-40315 | | 24306 | moodle<4.0.4 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2022-40315 |
24307 | moodle<4.0.4 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-40316 | | 24307 | moodle<4.0.4 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-40316 |
24308 | moodle<4.0.4 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-40314 | | 24308 | moodle<4.0.4 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-40314 |
24309 | moodle<4.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-40313 | | 24309 | moodle<4.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-40313 |
24310 | moodle<4.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-45151 | | 24310 | moodle<4.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-45151 |
24311 | moodle<4.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-45150 | | 24311 | moodle<4.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-45150 |
24312 | moodle<4.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-45149 | | 24312 | moodle<4.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-45149 |
24313 | moodle<4.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-45152 | | 24313 | moodle<4.0.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-45152 |
24314 | py{36,37,38,39,310,311}-octoprint<1.8.3 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-2930 | | 24314 | py{36,37,38,39,310,311}-octoprint<1.8.3 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-2930 |
24315 | py{36,37,38,39,310,311}-octoprint<1.8.3 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-3068 | | 24315 | py{36,37,38,39,310,311}-octoprint<1.8.3 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-3068 |
24316 | py{36,37,38,39,310,311}-octoprint<1.8.3 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-2888 | | 24316 | py{36,37,38,39,310,311}-octoprint<1.8.3 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-2888 |
24317 | py{36,37,38,39,310,311}-octoprint<1.8.3 remote-file-write https://nvd.nist.gov/vuln/detail/CVE-2022-2872 | | 24317 | py{36,37,38,39,310,311}-octoprint<1.8.3 remote-file-write https://nvd.nist.gov/vuln/detail/CVE-2022-2872 |
24318 | py{36,37,38,39,310,311}-octoprint<1.8.3 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-3607 | | 24318 | py{36,37,38,39,310,311}-octoprint<1.8.3 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-3607 |
24319 | php{56,73,74,80,81}-concrete5<8.5.10 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-43967 | | 24319 | php{56,73,74,80,81}-concrete5<8.5.10 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-43967 |
24320 | php{56,73,74,80,81}-concrete5<8.5.10 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-43692 | | 24320 | php{56,73,74,80,81}-concrete5<8.5.10 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-43692 |
24321 | php{56,73,74,80,81}-concrete5<8.5.10 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-43691 | | 24321 | php{56,73,74,80,81}-concrete5<8.5.10 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-43691 |
24322 | php{56,73,74,80,81}-concrete5<8.5.10 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-43968 | | 24322 | php{56,73,74,80,81}-concrete5<8.5.10 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-43968 |
24323 | php{56,73,74,80,81}-concrete5<8.5.10 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-43695 | | 24323 | php{56,73,74,80,81}-concrete5<8.5.10 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-43695 |
24324 | php{56,73,74,80,81}-concrete5<8.5.10 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-43694 | | 24324 | php{56,73,74,80,81}-concrete5<8.5.10 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-43694 |
24325 | php{56,73,74,80,81}-concrete5<8.5.10 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-43690 | | 24325 | php{56,73,74,80,81}-concrete5<8.5.10 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-43690 |
24326 | php{56,73,74,80,81}-concrete5<8.5.10 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-43689 | | 24326 | php{56,73,74,80,81}-concrete5<8.5.10 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-43689 |
24327 | php{56,73,74,80,81}-concrete5<8.5.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43686 | | 24327 | php{56,73,74,80,81}-concrete5<8.5.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43686 |
24328 | php{56,73,74,80,81}-concrete5<8.5.10 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-43687 | | 24328 | php{56,73,74,80,81}-concrete5<8.5.10 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-43687 |
24329 | php{56,73,74,80,81}-concrete5<8.5.10 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-43556 | | 24329 | php{56,73,74,80,81}-concrete5<8.5.10 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-43556 |
24330 | lighttpd<1.4.67 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-37797 | | 24330 | lighttpd<1.4.67 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-37797 |
24331 | lighttpd>=1.4.56<1.4.67 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-41556 | | 24331 | lighttpd>=1.4.56<1.4.67 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-41556 |
24332 | varnish<7.1.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-38150 | | 24332 | varnish<7.1.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-38150 |
24333 | varnish<7.2.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-45059 | | 24333 | varnish<7.2.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-45059 |
24334 | mediawiki<1.38.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-39194 | | 24334 | mediawiki<1.38.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-39194 |
24335 | mediawiki<1.37.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-28203 | | 24335 | mediawiki<1.37.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-28203 |
24336 | mediawiki<1.37.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-28204 | | 24336 | mediawiki<1.37.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-28204 |
24337 | mediawiki<1.37.2 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-28201 | | 24337 | mediawiki<1.37.2 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-28201 |
24338 | mediawiki<1.38.5 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-42049 | | 24338 | mediawiki<1.38.5 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-42049 |
24339 | mediawiki<1.37.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-44855 | | 24339 | mediawiki<1.37.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-44855 |
24340 | mediawiki<1.37.1 cache-poisoning https://nvd.nist.gov/vuln/detail/CVE-2021-44854 | | 24340 | mediawiki<1.37.1 cache-poisoning https://nvd.nist.gov/vuln/detail/CVE-2021-44854 |
24341 | mediawiki<1.38.3 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41767 | | 24341 | mediawiki<1.38.3 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41767 |
24342 | mediawiki<1.38.3 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41765 | | 24342 | mediawiki<1.38.3 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41765 |
24343 | mediawiki<1.37.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-44856 | | 24343 | mediawiki<1.37.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-44856 |
24344 | mediawiki<1.38.5 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-22911 | | 24344 | mediawiki<1.38.5 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-22911 |
24345 | mediawiki<1.39.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-22909 | | 24345 | mediawiki<1.39.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-22909 |
24346 | mediawiki<1.39.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-22945 | | 24346 | mediawiki<1.39.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-22945 |
24347 | mediawiki<1.39.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-47927 | | 24347 | mediawiki<1.39.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-47927 |
24348 | mediawiki<1.39.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-22912 | | 24348 | mediawiki<1.39.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-22912 |
24349 | mediawiki<1.39.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-22910 | | 24349 | mediawiki<1.39.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-22910 |
24350 | mediawiki-[0-9]* information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39193 | | 24350 | mediawiki-[0-9]* information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39193 |
24351 | mbedtls<2.28.2 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-46393 | | 24351 | mbedtls<2.28.2 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-46393 |
24352 | mbedtls>=3<3.3.0 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-46393 | | 24352 | mbedtls>=3<3.3.0 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-46393 |
24353 | mbedtls<2.28.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-46392 | | 24353 | mbedtls<2.28.2 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-46392 |
24354 | mbedtls>=3<3.3.0 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-46392 | | 24354 | mbedtls>=3<3.3.0 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-46392 |
24355 | mbedtls<2.16.11 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-36647 | | 24355 | mbedtls<2.16.11 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-36647 |
24356 | mbedtls>=2.17<2.27 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-36647 | | 24356 | mbedtls>=2.17<2.27 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-36647 |
24357 | mbedtls>=2.28.0<3.0.0 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-36647 | | 24357 | mbedtls>=2.28.0<3.0.0 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-36647 |
24358 | gitea<1.16.9 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-38183 | | 24358 | gitea<1.16.9 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-38183 |
24359 | gitea<1.17.3 command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-42968 | | 24359 | gitea<1.17.3 command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-42968 |
24360 | squid<5.7 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2022-41318 | | 24360 | squid<5.7 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2022-41318 |
24361 | squid>=4.9<4.17 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41317 | | 24361 | squid>=4.9<4.17 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41317 |
24362 | squid>=5.0.6<5.7 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41317 | | 24362 | squid>=5.0.6<5.7 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-41317 |
24363 | tiff<4.5.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-0804 | | 24363 | tiff<4.5.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-0804 |
24364 | tiff<4.5.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-0803 | | 24364 | tiff<4.5.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-0803 |
24365 | tiff<4.5.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-0802 | | 24365 | tiff<4.5.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-0802 |
24366 | tiff<4.5.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-0801 | | 24366 | tiff<4.5.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-0801 |
24367 | tiff<4.5.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-0800 | | 24367 | tiff<4.5.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-0800 |
24368 | tiff<4.5.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-0799 | | 24368 | tiff<4.5.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-0799 |
24369 | tiff<4.5.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-0798 | | 24369 | tiff<4.5.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-0798 |
24370 | tiff<4.5.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-0797 | | 24370 | tiff<4.5.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-0797 |
24371 | tiff<4.5.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-0796 | | 24371 | tiff<4.5.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-0796 |
24372 | tiff<4.5.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-0795 | | 24372 | tiff<4.5.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-0795 |
24373 | xpdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-45587 | | 24373 | xpdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-45587 |
24374 | xpdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-45586 | | 24374 | xpdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-45586 |
24375 | py{36,37,38,39,310,311}-werkzeug<2.2.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-25577 | | 24375 | py{36,37,38,39,310,311}-werkzeug<2.2.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-25577 |
24376 | py{36,37,38,39,310,311}-werkzeug<2.2.3 input-validation https://nvd.nist.gov/vuln/detail/CVE-2023-23934 | | 24376 | py{36,37,38,39,310,311}-werkzeug<2.2.3 input-validation https://nvd.nist.gov/vuln/detail/CVE-2023-23934 |
24377 | php{56,73,74,80,81}-nextcloud<24.0.8 server-side-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2023-25162 | | 24377 | php{56,73,74,80,81}-nextcloud<24.0.8 server-side-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2023-25162 |
24378 | php{56,73,74,80,81}-nextcloud<25.0.1 improper-access-control https://nvd.nist.gov/vuln/detail/CVE-2023-25161 | | 24378 | php{56,73,74,80,81}-nextcloud<25.0.1 improper-access-control https://nvd.nist.gov/vuln/detail/CVE-2023-25161 |
24379 | py{27,36,37,38,39,310,311}-djangocms-text-ckeditor-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-48110 | | 24379 | py{27,36,37,38,39,310,311}-djangocms-text-ckeditor-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-48110 |
24380 | postgresql-timescaledb<2.9.3 improper-access-control https://nvd.nist.gov/vuln/detail/CVE-2023-25149 | | 24380 | postgresql-timescaledb<2.9.3 improper-access-control https://nvd.nist.gov/vuln/detail/CVE-2023-25149 |
24381 | cmark-gfm<0.29.0.gfm.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-39209 | | 24381 | cmark-gfm<0.29.0.gfm.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-39209 |
24382 | cmark-gfm<0.29.0.gfm.7 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-22485 | | 24382 | cmark-gfm<0.29.0.gfm.7 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-22485 |
24383 | cmark-gfm<0.29.0.gfm.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-22484 | | 24383 | cmark-gfm<0.29.0.gfm.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-22484 |
24384 | cmark-gfm<0.29.0.gfm.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-22483 | | 24384 | cmark-gfm<0.29.0.gfm.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-22483 |
24385 | cmark-gfm<0.29.0.gfm.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-22486 | | 24385 | cmark-gfm<0.29.0.gfm.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-22486 |
24386 | ap-modsecurity2<2.9.7 filtering-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-24021 | | 24386 | ap-modsecurity2<2.9.7 filtering-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-24021 |
24387 | ap-modsecurity2<2.9.6 filtering-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-48279 | | 24387 | ap-modsecurity2<2.9.6 filtering-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-48279 |
24388 | apache>=2.4.0<2.4.55 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-36760 | | 24388 | apache>=2.4.0<2.4.55 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-36760 |
24389 | apache<2.4.55 remote-memory-read https://nvd.nist.gov/vuln/detail/CVE-2006-20001 | | 24389 | apache<2.4.55 remote-memory-read https://nvd.nist.gov/vuln/detail/CVE-2006-20001 |
24390 | apache<2.4.55 http-header-injection https://nvd.nist.gov/vuln/detail/CVE-2022-37436 | | 24390 | apache<2.4.55 http-header-injection https://nvd.nist.gov/vuln/detail/CVE-2022-37436 |
24391 | nginx<1.22.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41742 | | 24391 | nginx<1.22.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41742 |
24392 | nginx<1.22.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41741 | | 24392 | nginx<1.22.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41741 |
24393 | zabbix-[0-9]* security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-40626 | | 24393 | zabbix-[0-9]* security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-40626 |
24394 | zabbix-[0-9]* security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-43515 | | 24394 | zabbix-[0-9]* security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-43515 |
24395 | xfig<3.2.8 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40241 | | 24395 | xfig<3.2.8 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40241 |
24396 | webmin<2.003 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-3844 | | 24396 | webmin<2.003 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-3844 |
24397 | wayland<1.20.91 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-3782 | | 24397 | wayland<1.20.91 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-3782 |
24398 | w3m<0.5.3.0.20230121 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-38223 | | 24398 | w3m<0.5.3.0.20230121 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-38223 |
24399 | viewvc<1.1.29 arbitrary-file-creation https://nvd.nist.gov/vuln/detail/CVE-2023-22456 | | 24399 | viewvc<1.1.29 arbitrary-file-creation https://nvd.nist.gov/vuln/detail/CVE-2023-22456 |
24400 | viewvc>=1.2.0<1.2.2 arbitrary-file-creation https://nvd.nist.gov/vuln/detail/CVE-2023-22456 | | 24400 | viewvc>=1.2.0<1.2.2 arbitrary-file-creation https://nvd.nist.gov/vuln/detail/CVE-2023-22456 |
24401 | viewvc<1.1.30 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-22464 | | 24401 | viewvc<1.1.30 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-22464 |
24402 | viewvc>=1.2.0<1.2.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-22464 | | 24402 | viewvc>=1.2.0<1.2.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-22464 |
24403 | jasper<4.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-40755 | | 24403 | jasper<4.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-40755 |
24404 | net-snmp-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-44793 | | 24404 | net-snmp-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-44793 |
24405 | net-snmp-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-44792 | | 24405 | net-snmp-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-44792 |
24406 | pspp-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-39831 | | 24406 | pspp-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-39831 |
24407 | pspp-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-39832 | | 24407 | pspp-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-39832 |
24408 | samba<4.14.13 unspecified https://nvd.nist.gov/vuln/detail/CVE-2021-3670 | | 24408 | samba<4.14.13 unspecified https://nvd.nist.gov/vuln/detail/CVE-2021-3670 |
24409 | samba>=4.15<4.15.6 unspecified https://nvd.nist.gov/vuln/detail/CVE-2021-3670 | | 24409 | samba>=4.15<4.15.6 unspecified https://nvd.nist.gov/vuln/detail/CVE-2021-3670 |
24410 | samba<4.15.0 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-20316 | | 24410 | samba<4.15.0 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-20316 |
24411 | samba>=4.13.14<4.14.14 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32745 | | 24411 | samba>=4.13.14<4.14.14 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32745 |
24412 | samba>=4.15.2<4.15.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32745 | | 24412 | samba>=4.15.2<4.15.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32745 |
24413 | samba>=4.16.0<4.16.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32745 | | 24413 | samba>=4.16.0<4.16.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32745 |
24414 | samba>=4.3.0<4.14.14 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-32744 | | 24414 | samba>=4.3.0<4.14.14 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-32744 |
24415 | samba>=4.15.0<4.15.9 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-32744 | | 24415 | samba>=4.15.0<4.15.9 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-32744 |
24416 | samba>=4.16.0<4.16.4 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-32744 | | 24416 | samba>=4.16.0<4.16.4 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-32744 |
24417 | samba<4.14.14 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-32742 | | 24417 | samba<4.14.14 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-32742 |
24418 | samba>=4.15.0<4.15.9 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-32742 | | 24418 | samba>=4.15.0<4.15.9 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-32742 |
24419 | samba>=4.16.0<4.16.4 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-32742 | | 24419 | samba>=4.16.0<4.16.4 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2022-32742 |
24420 | samba<4.14.14 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-2031 | | 24420 | samba<4.14.14 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-2031 |
24421 | samba>=4.15.0<4.15.9 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-2031 | | 24421 | samba>=4.15.0<4.15.9 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-2031 |
24422 | samba>=4.16.0<4.16.4 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-2031 | | 24422 | samba>=4.16.0<4.16.4 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-2031 |
24423 | samba>=4.0.0<4.13.17 insecure-defaults https://nvd.nist.gov/vuln/detail/CVE-2022-0336 | | 24423 | samba>=4.0.0<4.13.17 insecure-defaults https://nvd.nist.gov/vuln/detail/CVE-2022-0336 |
24424 | samba>=4.14.0<4.14.12 insecure-defaults https://nvd.nist.gov/vuln/detail/CVE-2022-0336 | | 24424 | samba>=4.14.0<4.14.12 insecure-defaults https://nvd.nist.gov/vuln/detail/CVE-2022-0336 |
24425 | samba>=4.15.0<4.15.4 insecure-defaults https://nvd.nist.gov/vuln/detail/CVE-2022-0336 | | 24425 | samba>=4.15.0<4.15.4 insecure-defaults https://nvd.nist.gov/vuln/detail/CVE-2022-0336 |
24426 | samba<4.17.1 insecure-defaults https://nvd.nist.gov/vuln/detail/CVE-2022-32743 | | 24426 | samba<4.17.1 insecure-defaults https://nvd.nist.gov/vuln/detail/CVE-2022-32743 |
24427 | samba<4.17.1 insufficiently-random-numbers https://nvd.nist.gov/vuln/detail/CVE-2022-1615 | | 24427 | samba<4.17.1 insufficiently-random-numbers https://nvd.nist.gov/vuln/detail/CVE-2022-1615 |
24428 | samba>=4.0.0<4.15.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3437 | | 24428 | samba>=4.0.0<4.15.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3437 |
24429 | samba>=4.16.0<4.16.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3437 | | 24429 | samba>=4.16.0<4.16.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3437 |
24430 | samba>=4.17.0<4.17.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3437 | | 24430 | samba>=4.17.0<4.17.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3437 |
24431 | samba>=4.17.0<4.17.2 symlink-attack https://nvd.nist.gov/vuln/detail/CVE-2022-3592 | | 24431 | samba>=4.17.0<4.17.2 symlink-attack https://nvd.nist.gov/vuln/detail/CVE-2022-3592 |
24432 | samba-[0-9]* sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2018-14628 | | 24432 | samba-[0-9]* sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2018-14628 |
24433 | ffmpeg5-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-3965 | | 24433 | ffmpeg5-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-3965 |
24434 | ffmpeg4-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-3964 | | 24434 | ffmpeg4-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-3964 |
24435 | ffmpeg3-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-3109 | | 24435 | ffmpeg3-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-3109 |
24436 | ffmpeg5<5.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3341 | | 24436 | ffmpeg5<5.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3341 |
24437 | ffmpeg5-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-2566 | | 24437 | ffmpeg5-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-2566 |
24438 | sqlite3<3.40.1 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-46908 | | 24438 | sqlite3<3.40.1 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-46908 |
24439 | sqlite3<3.32.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2020-35527 | | 24439 | sqlite3<3.32.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2020-35527 |
24440 | sqlite3<3.32.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2020-35525 | | 24440 | sqlite3<3.32.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2020-35525 |
24441 | powerdns-recursor>=4.5.0<4.5.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-37428 | | 24441 | powerdns-recursor>=4.5.0<4.5.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-37428 |
24442 | powerdns-recursor>=4.6.0<4.6.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-37428 | | 24442 | powerdns-recursor>=4.6.0<4.6.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-37428 |
24443 | powerdns-recursor>=4.7.0<4.7.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-37428 | | 24443 | powerdns-recursor>=4.7.0<4.7.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-37428 |
24444 | powerdns-recursor>=4.8.0<4.8.1 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2023-22617 | | 24444 | powerdns-recursor>=4.8.0<4.8.1 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2023-22617 |
24445 | open-vm-tools-[0-9]* symlink-attack https://nvd.nist.gov/vuln/detail/CVE-2009-1143 | | 24445 | open-vm-tools-[0-9]* symlink-attack https://nvd.nist.gov/vuln/detail/CVE-2009-1143 |
24446 | open-vm-tools-[0-9]* symlink-attack https://nvd.nist.gov/vuln/detail/CVE-2009-1142 | | 24446 | open-vm-tools-[0-9]* symlink-attack https://nvd.nist.gov/vuln/detail/CVE-2009-1142 |
24447 | dbus<1.12.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42012 | | 24447 | dbus<1.12.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42012 |
24448 | dbus>=1.13.0<1.14.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42012 | | 24448 | dbus>=1.13.0<1.14.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42012 |
24449 | dbus>=1.15.0<1.15.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42012 | | 24449 | dbus>=1.15.0<1.15.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42012 |
24450 | dbus<1.12.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42011 | | 24450 | dbus<1.12.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42011 |
24451 | dbus>=1.13.0<1.14.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42011 | | 24451 | dbus>=1.13.0<1.14.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42011 |
24452 | dbus>=1.15.0<1.15.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42011 | | 24452 | dbus>=1.15.0<1.15.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42011 |
24453 | dbus<1.12.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42010 | | 24453 | dbus<1.12.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42010 |
24454 | dbus>=1.13.0<1.14.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42010 | | 24454 | dbus>=1.13.0<1.14.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42010 |
24455 | dbus>=1.15.0<1.15.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42010 | | 24455 | dbus>=1.15.0<1.15.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-42010 |
24456 | apr<1.7.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-24963 | | 24456 | apr<1.7.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-24963 |
24457 | apr-util<1.6.3 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-25147 | | 24457 | apr-util<1.6.3 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-25147 |
24458 | p5-libapreq2<2.18 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-22728 | | 24458 | p5-libapreq2<2.18 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-22728 |
24459 | gpac-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0819 | | 24459 | gpac-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0819 |
24460 | gpac-[0-9]* off-by-one https://nvd.nist.gov/vuln/detail/CVE-2023-0818 | | 24460 | gpac-[0-9]* off-by-one https://nvd.nist.gov/vuln/detail/CVE-2023-0818 |
24461 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0817 | | 24461 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0817 |
24462 | gpac-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0841 | | 24462 | gpac-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0841 |
24463 | php>=8.0<8.0.28 unauthorized-access https://nvd.nist.gov/vuln/detail/CVE-2023-0568 | | 24463 | php>=8.0<8.0.28 unauthorized-access https://nvd.nist.gov/vuln/detail/CVE-2023-0568 |
24464 | php>=8.1<8.1.16 unauthorized-access https://nvd.nist.gov/vuln/detail/CVE-2023-0568 | | 24464 | php>=8.1<8.1.16 unauthorized-access https://nvd.nist.gov/vuln/detail/CVE-2023-0568 |
24465 | php>=8.2<8.2.3 unauthorized-access https://nvd.nist.gov/vuln/detail/CVE-2023-0568 | | 24465 | php>=8.2<8.2.3 unauthorized-access https://nvd.nist.gov/vuln/detail/CVE-2023-0568 |
24466 | php>=8.0<8.0.28 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0662 | | 24466 | php>=8.0<8.0.28 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0662 |
24467 | php>=8.1<8.1.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0662 | | 24467 | php>=8.1<8.1.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0662 |
24468 | php>=8.2<8.2.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0662 | | 24468 | php>=8.2<8.2.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0662 |
24469 | apache-tomcat>=8.5.0<8.5.78 unspecified https://nvd.nist.gov/vuln/detail/CVE-2021-43980 | | 24469 | apache-tomcat>=8.5.0<8.5.78 unspecified https://nvd.nist.gov/vuln/detail/CVE-2021-43980 |
24470 | apache-tomcat>=9<9.0.61 unspecified https://nvd.nist.gov/vuln/detail/CVE-2021-43980 | | 24470 | apache-tomcat>=9<9.0.61 unspecified https://nvd.nist.gov/vuln/detail/CVE-2021-43980 |
24471 | apache-tomcat>=8.5.0<8.5.83 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-42252 | | 24471 | apache-tomcat>=8.5.0<8.5.83 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-42252 |
24472 | apache-tomcat>=9.0.0<9.0.68 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-42252 | | 24472 | apache-tomcat>=9.0.0<9.0.68 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-42252 |
24473 | apache-tomcat>=9.0.40<9.0.69 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-45143 | | 24473 | apache-tomcat>=9.0.40<9.0.69 invalid-validation https://nvd.nist.gov/vuln/detail/CVE-2022-45143 |
24474 | hdf5-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-26061 | | 24474 | hdf5-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-26061 |
24475 | hdf5-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-25972 | | 24475 | hdf5-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-25972 |
24476 | hdf5-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-25942 | | 24476 | hdf5-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-25942 |
24477 | hdf5-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-37501 | | 24477 | hdf5-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-37501 |
24478 | gpac-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-36190 | | 24478 | gpac-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-36190 |
24479 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-36186 | | 24479 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-36186 |
24480 | gpac-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38530 | | 24480 | gpac-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-38530 |
24481 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3178 | | 24481 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3178 |
24482 | gpac<2.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3222 | | 24482 | gpac<2.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3222 |
24483 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43045 | | 24483 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43045 |
24484 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43044 | | 24484 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43044 |
24485 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43043 | | 24485 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43043 |
24486 | gpac-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43042 | | 24486 | gpac-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43042 |
24487 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43039 | | 24487 | gpac-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43039 |
24488 | gpac-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43040 | | 24488 | gpac-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-43040 |
24489 | gpac-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-43255 | | 24489 | gpac-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-43255 |
24490 | gpac-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-43254 | | 24490 | gpac-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-43254 |
24491 | gpac-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-3957 | | 24491 | gpac-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-3957 |
24492 | gpac-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-45204 | | 24492 | gpac-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-45204 |
24493 | gpac-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-45202 | | 24493 | gpac-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-45202 |
24494 | gpac-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-45343 | | 24494 | gpac-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-45343 |
24495 | gpac-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-4202 | | 24495 | gpac-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-4202 |
24496 | gpac-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-45283 | | 24496 | gpac-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-45283 |
24497 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47663 | | 24497 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47663 |
24498 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47662 | | 24498 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47662 |
24499 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47661 | | 24499 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47661 |
24500 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47659 | | 24500 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47659 |
24501 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47658 | | 24501 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47658 |
24502 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47657 | | 24502 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47657 |
24503 | gpac-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47660 | | 24503 | gpac-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47660 |
24504 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47656 | | 24504 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47656 |
24505 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47654 | | 24505 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47654 |
24506 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47653 | | 24506 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47653 |
24507 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47095 | | 24507 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47095 |
24508 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-47094 | | 24508 | gpac-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-47094 |
24509 | gpac-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-47093 | | 24509 | gpac-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-47093 |
24510 | gpac-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47092 | | 24510 | gpac-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47092 |
24511 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47091 | | 24511 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47091 |
24512 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47089 | | 24512 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47089 |
24513 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47088 | | 24513 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47088 |
24514 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47087 | | 24514 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47087 |
24515 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47086 | | 24515 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47086 |
24516 | gpac-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-46490 | | 24516 | gpac-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-46490 |
24517 | gpac-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-46489 | | 24517 | gpac-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-46489 |
24518 | gpac-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-0358 | | 24518 | gpac-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-0358 |
24519 | gpac-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-23145 | | 24519 | gpac-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-23145 |
24520 | gpac-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-23144 | | 24520 | gpac-[0-9]* integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-23144 |
24521 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-23143 | | 24521 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-23143 |
24522 | gpac-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0760 | | 24522 | gpac-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0760 |
24523 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0770 | | 24523 | gpac-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0770 |
24524 | htmldoc<1.9.12 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-33235 | | 24524 | htmldoc<1.9.12 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-33235 |
24525 | htmldoc<1.9.12 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-33236 | | 24525 | htmldoc<1.9.12 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-33236 |
24526 | htmldoc<1.9.15 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0137 | | 24526 | htmldoc<1.9.15 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0137 |
24527 | go117<1.17.13 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32189 | | 24527 | go117<1.17.13 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32189 |
24528 | go118<1.18.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32189 | | 24528 | go118<1.18.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-32189 |
24529 | go117<1.17.12 http-header-injection https://nvd.nist.gov/vuln/detail/CVE-2022-32148 | | 24529 | go117<1.17.12 http-header-injection https://nvd.nist.gov/vuln/detail/CVE-2022-32148 |
24530 | go118<1.18.4 http-header-injection https://nvd.nist.gov/vuln/detail/CVE-2022-32148 | | 24530 | go118<1.18.4 http-header-injection https://nvd.nist.gov/vuln/detail/CVE-2022-32148 |
24531 | go117<1.17.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30635 | | 24531 | go117<1.17.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30635 |
24532 | go118<1.18.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30635 | | 24532 | go118<1.18.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30635 |
24533 | go117<1.17.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30633 | | 24533 | go117<1.17.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30633 |
24534 | go118<1.18.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30633 | | 24534 | go118<1.18.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30633 |
24535 | go117<1.17.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30632 | | 24535 | go117<1.17.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30632 |
24536 | go118<1.18.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30632 | | 24536 | go118<1.18.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30632 |
24537 | go117<1.17.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30631 | | 24537 | go117<1.17.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30631 |
24538 | go118<1.18.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30631 | | 24538 | go118<1.18.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30631 |
24539 | go117<1.17.11 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2022-30629 | | 24539 | go117<1.17.11 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2022-30629 |
24540 | go118<1.18.3 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2022-30629 | | 24540 | go118<1.18.3 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2022-30629 |
24541 | go117<1.17.11 code-injection https://nvd.nist.gov/vuln/detail/CVE-2022-30580 | | 24541 | go117<1.17.11 code-injection https://nvd.nist.gov/vuln/detail/CVE-2022-30580 |
24542 | go118<1.18.3 code-injection https://nvd.nist.gov/vuln/detail/CVE-2022-30580 | | 24542 | go118<1.18.3 code-injection https://nvd.nist.gov/vuln/detail/CVE-2022-30580 |
24543 | go117<1.17.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30630 | | 24543 | go117<1.17.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30630 |
24544 | go118<1.18.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30630 | | 24544 | go118<1.18.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-30630 |
24545 | go117<1.17.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-28131 | | 24545 | go117<1.17.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-28131 |
24546 | go118<1.18.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-28131 | | 24546 | go118<1.18.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-28131 |
24547 | go117<1.17.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1962 | | 24547 | go117<1.17.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1962 |
24548 | go118<1.18.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1962 | | 24548 | go118<1.18.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1962 |
24549 | go117<1.17.12 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-1705 | | 24549 | go117<1.17.12 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-1705 |
24550 | go118<1.18.4 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-1705 | | 24550 | go118<1.18.4 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-1705 |
24551 | go118<1.18.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27664 | | 24551 | go118<1.18.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27664 |
24552 | go119<1.19.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27664 | | 24552 | go119<1.19.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-27664 |
24553 | go118<1.18.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41715 | | 24553 | go118<1.18.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41715 |
24554 | go119<1.19.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41715 | | 24554 | go119<1.19.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41715 |
24555 | go118<1.18.7 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-2880 | | 24555 | go118<1.18.7 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-2880 |
24556 | go119<1.19.2 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-2880 | | 24556 | go119<1.19.2 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-2880 |
24557 | go118<1.18.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41717 | | 24557 | go118<1.18.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41717 |
24558 | go119<1.19.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41717 | | 24558 | go119<1.19.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41717 |
24559 | go119<1.19.1 path-traversal https://nvd.nist.gov/vuln/detail/CVE-2022-32190 | | 24559 | go119<1.19.1 path-traversal https://nvd.nist.gov/vuln/detail/CVE-2022-32190 |
24560 | php{56,73,74,80,81}-piwigo-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-37183 | | 24560 | php{56,73,74,80,81}-piwigo-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-37183 |
24561 | py{27,36,37,38,39,310,311}-django>=3.2<3.2.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41323 | | 24561 | py{27,36,37,38,39,310,311}-django>=3.2<3.2.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-41323 |