| @@ -1,1000 +1,1000 @@ | | | @@ -1,1000 +1,1000 @@ |
1 | # $NetBSD: pkg-vulnerabilities,v 1.124 2024/02/12 08:54:31 wiz Exp $ | | 1 | # $NetBSD: pkg-vulnerabilities,v 1.125 2024/02/13 13:59:36 he Exp $ |
2 | # | | 2 | # |
3 | #FORMAT 1.0.0 | | 3 | #FORMAT 1.0.0 |
4 | # | | 4 | # |
5 | # Please read "Handling packages with security problems" in the pkgsrc | | 5 | # Please read "Handling packages with security problems" in the pkgsrc |
6 | # guide before editing this file. | | 6 | # guide before editing this file. |
7 | # | | 7 | # |
8 | # Note: NEVER remove entries from this file; this should document *all* | | 8 | # Note: NEVER remove entries from this file; this should document *all* |
9 | # known package vulnerabilities so it is entirely appropriate to have | | 9 | # known package vulnerabilities so it is entirely appropriate to have |
10 | # multiple entries in this file for a single package, and to contain | | 10 | # multiple entries in this file for a single package, and to contain |
11 | # entries for packages which have been removed from pkgsrc. | | 11 | # entries for packages which have been removed from pkgsrc. |
12 | # | | 12 | # |
13 | # New entries should be added at the end of this file. | | 13 | # New entries should be added at the end of this file. |
14 | # | | 14 | # |
15 | # Please ask pkgsrc-security to update the copy on ftp.NetBSD.org after | | 15 | # Please ask pkgsrc-security to update the copy on ftp.NetBSD.org after |
16 | # making changes to this file. | | 16 | # making changes to this file. |
17 | # | | 17 | # |
18 | # The command to run for this update is "./pkg-vuln-update.sh", but it needs | | 18 | # The command to run for this update is "./pkg-vuln-update.sh", but it needs |
19 | # access to the private GPG key for pkgsrc-security. | | 19 | # access to the private GPG key for pkgsrc-security. |
20 | # | | 20 | # |
21 | # If you have comments/additions/corrections, please contact | | 21 | # If you have comments/additions/corrections, please contact |
22 | # pkgsrc-security@NetBSD.org. | | 22 | # pkgsrc-security@NetBSD.org. |
23 | # | | 23 | # |
24 | # Note: If this file format changes, please do not forget to update | | 24 | # Note: If this file format changes, please do not forget to update |
25 | # pkgsrc/mk/scripts/genreadme.awk which also parses this file. | | 25 | # pkgsrc/mk/scripts/genreadme.awk which also parses this file. |
26 | # | | 26 | # |
27 | # package type of exploit URL | | 27 | # package type of exploit URL |
28 | cfengine<1.5.3nb3 remote-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-013.txt.asc | | 28 | cfengine<1.5.3nb3 remote-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-013.txt.asc |
29 | navigator<4.75 remote-user-access http://www.cert.org/advisories/CA-2000-15.html | | 29 | navigator<4.75 remote-user-access http://www.cert.org/advisories/CA-2000-15.html |
30 | navigator<4.74 remote-user-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-011.txt.asc | | 30 | navigator<4.74 remote-user-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-011.txt.asc |
31 | communicator<4.75 remote-user-access http://www.cert.org/advisories/CA-2000-15.html | | 31 | communicator<4.75 remote-user-access http://www.cert.org/advisories/CA-2000-15.html |
32 | communicator<4.74 remote-user-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-011.txt.asc | | 32 | communicator<4.74 remote-user-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-011.txt.asc |
33 | pine<4.30 remote-user-shell http://www.securityfocus.com/bid/1709 | | 33 | pine<4.30 remote-user-shell http://www.securityfocus.com/bid/1709 |
34 | pine<4.21nb1 denial-of-service http://www.securityfocus.com/advisories/2646 | | 34 | pine<4.21nb1 denial-of-service http://www.securityfocus.com/advisories/2646 |
35 | imap-uw<4.7c6 denial-of-service http://www.securityfocus.com/advisories/2646 | | 35 | imap-uw<4.7c6 denial-of-service http://www.securityfocus.com/advisories/2646 |
36 | screen<3.9.5nb1 local-root-shell http://www.securityfocus.com/advisories/2634 | | 36 | screen<3.9.5nb1 local-root-shell http://www.securityfocus.com/advisories/2634 |
37 | ntop<1.1 remote-root-shell http://www.securityfocus.com/advisories/2520 | | 37 | ntop<1.1 remote-root-shell http://www.securityfocus.com/advisories/2520 |
38 | wu-ftpd<2.6.1 remote-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-010.txt.asc | | 38 | wu-ftpd<2.6.1 remote-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-010.txt.asc |
39 | wu-ftpd<2.4.2b18.2 remote-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA1999-003.txt.asc | | 39 | wu-ftpd<2.4.2b18.2 remote-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA1999-003.txt.asc |
40 | xlockmore<4.17 local-root-file-view ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-003.txt.asc | | 40 | xlockmore<4.17 local-root-file-view ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2000-003.txt.asc |
41 | lsof<4.41 local-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA1999-005.txt.asc | | 41 | lsof<4.41 local-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA1999-005.txt.asc |
42 | wu-ftpd<2.6.0 remote-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA1999-003.txt.asc | | 42 | wu-ftpd<2.6.0 remote-root-shell ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA1999-003.txt.asc |
43 | racoon<20001004a local-root-file-view http://mail-index.NetBSD.org/tech-net/2000/09/24/0000.html | | 43 | racoon<20001004a local-root-file-view http://mail-index.NetBSD.org/tech-net/2000/09/24/0000.html |
44 | global<3.56 remote-user-access http://www.NetBSD.org/cgi-bin/query-pr-single.pl?number=11165 | | 44 | global<3.56 remote-user-access http://www.NetBSD.org/cgi-bin/query-pr-single.pl?number=11165 |
45 | apache<1.3.14 remote-user-access http://httpd.apache.org/dist/httpd/CHANGES_1.3 | | 45 | apache<1.3.14 remote-user-access http://httpd.apache.org/dist/httpd/CHANGES_1.3 |
46 | apache6<1.3.14 remote-user-access http://httpd.apache.org/dist/httpd/CHANGES_1.3 | | 46 | apache6<1.3.14 remote-user-access http://httpd.apache.org/dist/httpd/CHANGES_1.3 |
47 | thttpd<2.20 remote-user-access http://www.dopesquad.net/security/advisories/20001002-thttpd-ssi.txt | | 47 | thttpd<2.20 remote-user-access http://www.dopesquad.net/security/advisories/20001002-thttpd-ssi.txt |
48 | bind<8.2.2.7 denial-of-service http://www.isc.org/products/BIND/bind-security.html | | 48 | bind<8.2.2.7 denial-of-service http://www.isc.org/products/BIND/bind-security.html |
49 | gnupg<1.0.4 weak-authentication http://www.gnupg.org/whatsnew.html#rn20001017 | | 49 | gnupg<1.0.4 weak-authentication http://www.gnupg.org/whatsnew.html#rn20001017 |
50 | pine<=4.21 remote-root-shell ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:59.pine.asc | | 50 | pine<=4.21 remote-root-shell ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:59.pine.asc |
51 | navigator<4.76 remote-root-shell ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A66.netscape.asc | | 51 | navigator<4.76 remote-root-shell ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A66.netscape.asc |
52 | navigator3<4.76 remote-root-shell ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A66.netscape.asc | | 52 | navigator3<4.76 remote-root-shell ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A66.netscape.asc |
53 | openssh<2.3.0 weak-authentication http://www.openbsd.org/errata27.html#sshforwarding | | 53 | openssh<2.3.0 weak-authentication http://www.openbsd.org/errata27.html#sshforwarding |
54 | ethereal<=0.8.13 remote-root-shell http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Ffromthread%3D1%26end%3D2000-11-25%26mid%3D145761%26start%3D2000-11-19%26list%3D1%26threads%3D0%26 | | 54 | ethereal<=0.8.13 remote-root-shell http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Ffromthread%3D1%26end%3D2000-11-25%26mid%3D145761%26start%3D2000-11-19%26list%3D1%26threads%3D0%26 |
55 | php<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 | | 55 | php<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 |
56 | php-gd<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 | | 56 | php-gd<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 |
57 | php-ldap<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 | | 57 | php-ldap<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 |
58 | php-mysql<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 | | 58 | php-mysql<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 |
59 | php-pgsql<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 | | 59 | php-pgsql<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 |
60 | php-snmp<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 | | 60 | php-snmp<3.0.17 remote-user-shell http://www.php.net/ChangeLog.php3 |
61 | racoon<20001211a denial-of-service http://www.kame.net/ | | 61 | racoon<20001211a denial-of-service http://www.kame.net/ |
62 | LPRng<3.6.25 remote-root-shell http://www.cert.org/advisories/CA-2000-22.html | | 62 | LPRng<3.6.25 remote-root-shell http://www.cert.org/advisories/CA-2000-22.html |
63 | jakarta-tomcat<3.1.1 remote-server-admin http://jakarta.apache.org/site/news.html | | 63 | jakarta-tomcat<3.1.1 remote-server-admin http://jakarta.apache.org/site/news.html |
64 | jakarta-tomcat<3.2.3 cross-site-html http://www.securityfocus.com/bid/2982 | | 64 | jakarta-tomcat<3.2.3 cross-site-html http://www.securityfocus.com/bid/2982 |
65 | fsh<1.1 local-root-file-view http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1135 | | 65 | fsh<1.1 local-root-file-view http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1135 |
66 | bitchx<1.0.3.17nb1 remote-user-shell http://www.securityfocus.com/bid/2087 | | 66 | bitchx<1.0.3.17nb1 remote-user-shell http://www.securityfocus.com/bid/2087 |
67 | namazu<1.3.0.11 remote-file-creation http://www.namazu.org/security.html.en | | 67 | namazu<1.3.0.11 remote-file-creation http://www.namazu.org/security.html.en |
68 | zope<2.2.5 weak-authentication http://www.zope.org/Products/Zope/ | | 68 | zope<2.2.5 weak-authentication http://www.zope.org/Products/Zope/ |
69 | bind<8.2.3 remote-root-shell http://www.cert.org/advisories/CA-2001-02.html | | 69 | bind<8.2.3 remote-root-shell http://www.cert.org/advisories/CA-2001-02.html |
70 | suse{,32}_base<6.4nb2 local-root-shell http://www.suse.com/de/support/security/2001_001_glibc_txt.txt | | 70 | suse{,32}_base<6.4nb2 local-root-shell http://www.suse.com/de/support/security/2001_001_glibc_txt.txt |
71 | ja-micq<0.4.6.1 remote-user-shell http://www.freebsd.org/security/#adv | | 71 | ja-micq<0.4.6.1 remote-user-shell http://www.freebsd.org/security/#adv |
72 | micq<0.4.6.1 remote-user-shell http://www.freebsd.org/security/#adv | | 72 | micq<0.4.6.1 remote-user-shell http://www.freebsd.org/security/#adv |
73 | ssh<1.2.27nb1 remote-root-shell http://razor.bindview.com/publish/advisories/adv_ssh1crc.html | | 73 | ssh<1.2.27nb1 remote-root-shell http://razor.bindview.com/publish/advisories/adv_ssh1crc.html |
74 | ssh6<=1.2.31 remote-root-shell http://razor.bindview.com/publish/advisories/adv_ssh1crc.html | | 74 | ssh6<=1.2.31 remote-root-shell http://razor.bindview.com/publish/advisories/adv_ssh1crc.html |
75 | openssh<2.3.0 remote-root-shell http://razor.bindview.com/publish/advisories/adv_ssh1crc.html | | 75 | openssh<2.3.0 remote-root-shell http://razor.bindview.com/publish/advisories/adv_ssh1crc.html |
76 | camediaplay<20010211 local-user-shell ftp://ftp.itojun.org/pub/digi-cam/C-400/unix/README | | 76 | camediaplay<20010211 local-user-shell ftp://ftp.itojun.org/pub/digi-cam/C-400/unix/README |
77 | analog<4.16 remote-user-shell http://www.analog.cx/security2.html | | 77 | analog<4.16 remote-user-shell http://www.analog.cx/security2.html |
78 | gnupg<1.0.4nb3 weak-authentication http://www.gnupg.org/whatsnew.html#rn20001130 | | 78 | gnupg<1.0.4nb3 weak-authentication http://www.gnupg.org/whatsnew.html#rn20001130 |
79 | xemacs<21.1.14 remote-user-shell http://list-archive.xemacs.org/xemacs-announce/200102/msg00000.html | | 79 | xemacs<21.1.14 remote-user-shell http://list-archive.xemacs.org/xemacs-announce/200102/msg00000.html |
80 | sudo<1.6.3p6 local-root-shell http://www.openbsd.org/errata36.html#sudo | | 80 | sudo<1.6.3p6 local-root-shell http://www.openbsd.org/errata36.html#sudo |
81 | Mesa-glx<=20000813 local-root-shell http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-029.php3?dis=7.2 | | 81 | Mesa-glx<=20000813 local-root-shell http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-029.php3?dis=7.2 |
82 | apache<1.3.19 remote-user-access http://httpd.apache.org/dist/httpd/Announcement.html | | 82 | apache<1.3.19 remote-user-access http://httpd.apache.org/dist/httpd/Announcement.html |
83 | apache6<1.3.19 remote-user-access http://httpd.apache.org/dist/httpd/Announcement.html | | 83 | apache6<1.3.19 remote-user-access http://httpd.apache.org/dist/httpd/Announcement.html |
84 | exmh<2.3 local-symlink-race http://www.beedub.com/exmh/symlink.html | | 84 | exmh<2.3 local-symlink-race http://www.beedub.com/exmh/symlink.html |
85 | samba<2.0.8 local-symlink-race http://www.securityfocus.com/templates/archive.pike?list=1&mid=177370 | | 85 | samba<2.0.8 local-symlink-race http://www.securityfocus.com/templates/archive.pike?list=1&mid=177370 |
86 | hylafax<4.1b3 local-root-shell http://www.securityfocus.com/archive/1/176716 | | 86 | hylafax<4.1b3 local-root-shell http://www.securityfocus.com/archive/1/176716 |
87 | squirrelmail<1.0.5 remote-user-access http://www.geocrawler.com/lists/3/SourceForge/599/500/5567091/ | | 87 | squirrelmail<1.0.5 remote-user-access http://www.geocrawler.com/lists/3/SourceForge/599/500/5567091/ |
88 | kdelibs-2.1 local-root-shell http://dot.kde.org/988663144/ | | 88 | kdelibs-2.1 local-root-shell http://dot.kde.org/988663144/ |
89 | icecast<1.3.10 remote-user-access http://www.securityfocus.com/bid/2264 | | 89 | icecast<1.3.10 remote-user-access http://www.securityfocus.com/bid/2264 |
90 | joe<2.8nb1 local-file-write http://www.securityfocus.com/bid/1959 | | 90 | joe<2.8nb1 local-file-write http://www.securityfocus.com/bid/1959 |
91 | joe<2.8nb1 local-user-shell http://www.securityfocus.com/bid/2437 | | 91 | joe<2.8nb1 local-user-shell http://www.securityfocus.com/bid/2437 |
92 | openssh<2.9.2 remote-file-write http://www.openbsd.org/errata.html#sshcookie | | 92 | openssh<2.9.2 remote-file-write http://www.openbsd.org/errata.html#sshcookie |
93 | w3m<0.2.1.0.19nb1 remote-user-shell http://mi.med.tohoku.ac.jp/~satodai/w3m-dev-en/200106.month/537.html | | 93 | w3m<0.2.1.0.19nb1 remote-user-shell http://mi.med.tohoku.ac.jp/~satodai/w3m-dev-en/200106.month/537.html |
94 | samba<2.0.10 local-root-shell http://www.samba.org/samba/whatsnew/macroexploit.html | | 94 | samba<2.0.10 local-root-shell http://www.samba.org/samba/whatsnew/macroexploit.html |
95 | samba-2.2.0 local-root-shell http://www.samba.org/samba/whatsnew/macroexploit.html | | 95 | samba-2.2.0 local-root-shell http://www.samba.org/samba/whatsnew/macroexploit.html |
96 | samba-2.2.0nb1 local-root-shell http://www.samba.org/samba/whatsnew/macroexploit.html | | 96 | samba-2.2.0nb1 local-root-shell http://www.samba.org/samba/whatsnew/macroexploit.html |
97 | fetchmail<5.8.8 remote-user-access http://www.securityfocus.com/vdb/?id=2877 | | 97 | fetchmail<5.8.8 remote-user-access http://www.securityfocus.com/vdb/?id=2877 |
98 | openldap<1.2.12 denial-of-service http://www.cert.org/advisories/CA-2001-18.html | | 98 | openldap<1.2.12 denial-of-service http://www.cert.org/advisories/CA-2001-18.html |
99 | horde<1.2.6 remote-user-shell http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26mid%3D198495 | | 99 | horde<1.2.6 remote-user-shell http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26mid%3D198495 |
100 | imp<1.2.6 remote-user-shell http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26mid%3D198495 | | 100 | imp<1.2.6 remote-user-shell http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26mid%3D198495 |
101 | fetchmail<5.8.17 remote-user-shell http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26mid%3D203165 | | 101 | fetchmail<5.8.17 remote-user-shell http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26mid%3D203165 |
102 | windowmaker<0.65.1 remote-user-shell http://www.debian.org/security/2001/dsa-074 | | 102 | windowmaker<0.65.1 remote-user-shell http://www.debian.org/security/2001/dsa-074 |
103 | sendmail<8.11.6 local-root-shell ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES | | 103 | sendmail<8.11.6 local-root-shell ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES |
104 | gnut<0.4.27 remote-script-inject http://www.gnutelliums.com/linux_unix/gnut/ | | 104 | gnut<0.4.27 remote-script-inject http://www.gnutelliums.com/linux_unix/gnut/ |
105 | screen<3.9.10 local-root-shell http://lists.opensuse.org/opensuse-security-announce/2000-Sep/0005.html | | 105 | screen<3.9.10 local-root-shell http://lists.opensuse.org/opensuse-security-announce/2000-Sep/0005.html |
106 | openssh<2.9.9.2 remote-user-access http://www.securityfocus.com/cgi-bin/archive.pl?id=1&mid=216702&start=2001-09-23&end=2001-09-29 | | 106 | openssh<2.9.9.2 remote-user-access http://www.securityfocus.com/cgi-bin/archive.pl?id=1&mid=216702&start=2001-09-23&end=2001-09-29 |
107 | w3m<0.2.1.0.19nb2 weak-authentication http://mi.med.tohoku.ac.jp/~satodai/w3m-dev/200109.month/2226.html | | 107 | w3m<0.2.1.0.19nb2 weak-authentication http://mi.med.tohoku.ac.jp/~satodai/w3m-dev/200109.month/2226.html |
108 | procmail<3.20 local-root-shell http://www.somelist.com/mail.php/282/view/1200950 | | 108 | procmail<3.20 local-root-shell http://www.somelist.com/mail.php/282/view/1200950 |
109 | slrn<0.9.7.2nb1 remote-script-inject http://slrn.sourceforge.net/patches/index.html#subsect_decode | | 109 | slrn<0.9.7.2nb1 remote-script-inject http://slrn.sourceforge.net/patches/index.html#subsect_decode |
110 | nvi-m17n<1.79.19991117 local-user-shell http://www.securityfocus.com/archive/1/221880 | | 110 | nvi-m17n<1.79.19991117 local-user-shell http://www.securityfocus.com/archive/1/221880 |
111 | mgetty<1.1.22 denial-of-service ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A71.mgetty.asc | | 111 | mgetty<1.1.22 denial-of-service ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A71.mgetty.asc |
112 | kdeutils-2.2.1 local-root-shell http://lists.kde.org/?l=kde-announce&m=100535642201983&w=2 | | 112 | kdeutils-2.2.1 local-root-shell http://lists.kde.org/?l=kde-announce&m=100535642201983&w=2 |
113 | imp<2.2.7 remote-file-view http://www.securityfocus.com/archive/1/225686 | | 113 | imp<2.2.7 remote-file-view http://www.securityfocus.com/archive/1/225686 |
114 | libgtop<1.0.12nb1 remote-user-shell http://www.intexxia.com/ | | 114 | libgtop<1.0.12nb1 remote-user-shell http://www.intexxia.com/ |
115 | wu-ftpd<=2.6.1 remote-root-shell http://msgs.securepoint.com/cgi-bin/get/bugtraq0111/199.html | | 115 | wu-ftpd<=2.6.1 remote-root-shell http://msgs.securepoint.com/cgi-bin/get/bugtraq0111/199.html |
116 | radius-3.6B remote-user-shell http://xforce.iss.net/alerts/advise87.php | | 116 | radius-3.6B remote-user-shell http://xforce.iss.net/alerts/advise87.php |
117 | exim<3.34 remote-user-shell http://www.exim.org/pipermail/exim-announce/2001q4/000048.html | | 117 | exim<3.34 remote-user-shell http://www.exim.org/pipermail/exim-announce/2001q4/000048.html |
118 | stunnel<3.22 remote-user-shell http://www.stunnel.org/patches/desc/formatbug_ml.html | | 118 | stunnel<3.22 remote-user-shell http://www.stunnel.org/patches/desc/formatbug_ml.html |
119 | mutt<1.2.5.1 remote-user-shell http://www.mutt.org/announce/mutt-1.2.5.1-1.3.25.html | | 119 | mutt<1.2.5.1 remote-user-shell http://www.mutt.org/announce/mutt-1.2.5.1-1.3.25.html |
120 | mutt-1.3.1* remote-user-shell http://www.mutt.org/announce/mutt-1.2.5.1-1.3.25.html | | 120 | mutt-1.3.1* remote-user-shell http://www.mutt.org/announce/mutt-1.2.5.1-1.3.25.html |
121 | mutt-1.3.2[0-4]* remote-user-shell http://www.mutt.org/announce/mutt-1.2.5.1-1.3.25.html | | 121 | mutt-1.3.2[0-4]* remote-user-shell http://www.mutt.org/announce/mutt-1.2.5.1-1.3.25.html |
122 | cyrus-sasl<1.5.27 remote-code-execution http://www.securityfocus.com/bid/3498 | | 122 | cyrus-sasl<1.5.27 remote-code-execution http://www.securityfocus.com/bid/3498 |
123 | openldap<2.0.20 denial-of-service http://www.openldap.org/lists/openldap-announce/200201/msg00002.html | | 123 | openldap<2.0.20 denial-of-service http://www.openldap.org/lists/openldap-announce/200201/msg00002.html |
124 | xchat<1.8.7 remote-command-injection http://xchat.org/ | | 124 | xchat<1.8.7 remote-command-injection http://xchat.org/ |
125 | enscript<1.6.1nb1 local-file-write http://www.securityfocus.com/bid/3920 | | 125 | enscript<1.6.1nb1 local-file-write http://www.securityfocus.com/bid/3920 |
126 | rsync<2.5.2 remote-code-execution http://lists.samba.org/pipermail/rsync-announce/2002-January/000005.html | | 126 | rsync<2.5.2 remote-code-execution http://lists.samba.org/pipermail/rsync-announce/2002-January/000005.html |
127 | squirrelmail-1.2.[0-3] remote-code-execution http://www.securityfocus.com/bid/3952 | | 127 | squirrelmail-1.2.[0-3] remote-code-execution http://www.securityfocus.com/bid/3952 |
128 | gnuchess<5.03 remote-user-shell http://linux.oreillynet.com/pub/a/linux/2002/01/28/insecurities.html | | 128 | gnuchess<5.03 remote-user-shell http://linux.oreillynet.com/pub/a/linux/2002/01/28/insecurities.html |
129 | ucd-snmp<4.2.3 weak-authentication http://www.cert.org/advisories/CA-2002-03.html | | 129 | ucd-snmp<4.2.3 weak-authentication http://www.cert.org/advisories/CA-2002-03.html |
130 | ucd-snmp<4.2.3 denial-of-service http://www.cert.org/advisories/CA-2002-03.html | | 130 | ucd-snmp<4.2.3 denial-of-service http://www.cert.org/advisories/CA-2002-03.html |
131 | ucd-snmp<4.2.3nb1 remote-user-shell http://www.securityfocus.com/archive/1/248141 | | 131 | ucd-snmp<4.2.3nb1 remote-user-shell http://www.securityfocus.com/archive/1/248141 |
132 | squid<2.4.4 remote-user-shell http://www.squid-cache.org/Advisories/SQUID-2002_1.txt | | 132 | squid<2.4.4 remote-user-shell http://www.squid-cache.org/Advisories/SQUID-2002_1.txt |
133 | ap-php<3.0.18nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 133 | ap-php<3.0.18nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
134 | php<3.0.18nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 134 | php<3.0.18nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
135 | ap-php-4.0.1pl2 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 135 | ap-php-4.0.1pl2 remote-code-execution http://security.e-matters.de/advisories/012002.html |
136 | ap-php-4.0.3pl1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 136 | ap-php-4.0.3pl1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
137 | ap-php-4.0.3pl1nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 137 | ap-php-4.0.3pl1nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
138 | ap-php-4.0.4 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 138 | ap-php-4.0.4 remote-code-execution http://security.e-matters.de/advisories/012002.html |
139 | ap-php-4.0.4.1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 139 | ap-php-4.0.4.1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
140 | ap-php-4.0.4.1nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 140 | ap-php-4.0.4.1nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
141 | ap-php-4.0.5 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 141 | ap-php-4.0.5 remote-code-execution http://security.e-matters.de/advisories/012002.html |
142 | ap-php-4.0.6 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 142 | ap-php-4.0.6 remote-code-execution http://security.e-matters.de/advisories/012002.html |
143 | ap-php-4.1.0 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 143 | ap-php-4.1.0 remote-code-execution http://security.e-matters.de/advisories/012002.html |
144 | ap-php-4.1.1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 144 | ap-php-4.1.1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
145 | php-4.0.3pl1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 145 | php-4.0.3pl1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
146 | php-4.0.4 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 146 | php-4.0.4 remote-code-execution http://security.e-matters.de/advisories/012002.html |
147 | php-4.0.4.1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 147 | php-4.0.4.1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
148 | php-4.0.4.1nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 148 | php-4.0.4.1nb1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
149 | php-4.0.5 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 149 | php-4.0.5 remote-code-execution http://security.e-matters.de/advisories/012002.html |
150 | php-4.0.6 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 150 | php-4.0.6 remote-code-execution http://security.e-matters.de/advisories/012002.html |
151 | php-4.1.0 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 151 | php-4.1.0 remote-code-execution http://security.e-matters.de/advisories/012002.html |
152 | php-4.1.1 remote-code-execution http://security.e-matters.de/advisories/012002.html | | 152 | php-4.1.1 remote-code-execution http://security.e-matters.de/advisories/012002.html |
153 | php-4.3.0 remote-code-execution http://www.php.net/release_4_3_1.php | | 153 | php-4.3.0 remote-code-execution http://www.php.net/release_4_3_1.php |
154 | radiusd-cistron<1.6.6 denial-of-service http://www.kb.cert.org/vuls/id/936683 | | 154 | radiusd-cistron<1.6.6 denial-of-service http://www.kb.cert.org/vuls/id/936683 |
155 | radiusd-cistron<1.6.6 remote-code-execution http://www.kb.cert.org/vuls/id/589523 | | 155 | radiusd-cistron<1.6.6 remote-code-execution http://www.kb.cert.org/vuls/id/589523 |
156 | openssh<3.0.2.1nb2 local-root-shell http://www.pine.nl/advisories/pine-cert-20020301.txt | | 156 | openssh<3.0.2.1nb2 local-root-shell http://www.pine.nl/advisories/pine-cert-20020301.txt |
157 | htdig<3.1.6 denial-of-service http://online.securityfocus.com/bid/3410 | | 157 | htdig<3.1.6 denial-of-service http://online.securityfocus.com/bid/3410 |
158 | htdig<3.1.6 local-user-file-view http://online.securityfocus.com/bid/3410 | | 158 | htdig<3.1.6 local-user-file-view http://online.securityfocus.com/bid/3410 |
159 | fileutils<4.1.7 local-file-removal http://mail.gnu.org/pipermail/bug-fileutils/2002-March/002433.html | | 159 | fileutils<4.1.7 local-file-removal http://mail.gnu.org/pipermail/bug-fileutils/2002-March/002433.html |
160 | zlib<1.1.4 denial-of-service http://www.zlib.org/advisory-2002-03-11.txt | | 160 | zlib<1.1.4 denial-of-service http://www.zlib.org/advisory-2002-03-11.txt |
161 | rsync<2.5.3 remote-user-file-view http://lists.samba.org/pipermail/rsync-announce/2002-March/000006.html | | 161 | rsync<2.5.3 remote-user-file-view http://lists.samba.org/pipermail/rsync-announce/2002-March/000006.html |
162 | suse{,32}_base<6.4nb5 denial-of-service http://www.zlib.org/advisory-2002-03-11.txt | | 162 | suse{,32}_base<6.4nb5 denial-of-service http://www.zlib.org/advisory-2002-03-11.txt |
163 | icecast<1.3.11 remote-root-shell http://www.debian.org/security/2001/dsa-089 | | 163 | icecast<1.3.11 remote-root-shell http://www.debian.org/security/2001/dsa-089 |
164 | sun-{jre,jdk}<1.3.1.0.2 remote-code-execution http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/218&type=0&nav=sec.sba | | 164 | sun-{jre,jdk}<1.3.1.0.2 remote-code-execution http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/218&type=0&nav=sec.sba |
165 | analog<5.22 remote-script-inject http://www.analog.cx/docs/whatsnew.html | | 165 | analog<5.22 remote-script-inject http://www.analog.cx/docs/whatsnew.html |
166 | jakarta-tomcat<3.2.3nb1 cross-site-scripting http://httpd.apache.org/info/css-security/ | | 166 | jakarta-tomcat<3.2.3nb1 cross-site-scripting http://httpd.apache.org/info/css-security/ |
167 | sudo<1.6.6 local-root-shell http://www.sudo.ws/sudo/alerts/prompt.html | | 167 | sudo<1.6.6 local-root-shell http://www.sudo.ws/sudo/alerts/prompt.html |
168 | squirrelmail<1.2.6 remote-code-execution http://cert.uni-stuttgart.de/archive/bugtraq/2002/03/msg00414.html | | 168 | squirrelmail<1.2.6 remote-code-execution http://cert.uni-stuttgart.de/archive/bugtraq/2002/03/msg00414.html |
169 | analog<5.23 denial-of-service http://www.analog.cx/security5.html | | 169 | analog<5.23 denial-of-service http://www.analog.cx/security5.html |
170 | icecast<1.3.12 denial-of-service http://online.securityfocus.com/bid/4415 | | 170 | icecast<1.3.12 denial-of-service http://online.securityfocus.com/bid/4415 |
171 | qpopper<4.0.4 denial-of-service http://online.securityfocus.com/bid/4295 | | 171 | qpopper<4.0.4 denial-of-service http://online.securityfocus.com/bid/4295 |
172 | qpopper<4.0.4nb1 local-root-shell http://online.securityfocus.com/bid/4614 | | 172 | qpopper<4.0.4nb1 local-root-shell http://online.securityfocus.com/bid/4614 |
173 | imap-uw<2001.1 local-root-shell http://online.securityfocus.com/bid/4713 | | 173 | imap-uw<2001.1 local-root-shell http://online.securityfocus.com/bid/4713 |
174 | fetchmail<5.9.10 remote-user-access http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0146 | | 174 | fetchmail<5.9.10 remote-user-access http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0146 |
175 | gaim<0.58 local-user-file-view http://online.securityfocus.com/archive/1/272180 | | 175 | gaim<0.58 local-user-file-view http://online.securityfocus.com/archive/1/272180 |
176 | mozilla<1.0rc3 remote-user-file-view http://groups.google.com/groups?as_umsgid=3CD095D4.9050003%40mozilla.org&hl=en | | 176 | mozilla<1.0rc3 remote-user-file-view http://groups.google.com/groups?as_umsgid=3CD095D4.9050003%40mozilla.org&hl=en |
177 | ethereal<0.9.4 remote-user-access http://www.ethereal.com/appnotes/enpa-sa-00004.html | | 177 | ethereal<0.9.4 remote-user-access http://www.ethereal.com/appnotes/enpa-sa-00004.html |
178 | bind-9.[01].* denial-of-service http://www.cert.org/advisories/CA-2002-15.html | | 178 | bind-9.[01].* denial-of-service http://www.cert.org/advisories/CA-2002-15.html |
179 | bind-9.2.0* denial-of-service http://www.cert.org/advisories/CA-2002-15.html | | 179 | bind-9.2.0* denial-of-service http://www.cert.org/advisories/CA-2002-15.html |
180 | bind-9.2.1rc* denial-of-service http://www.cert.org/advisories/CA-2002-15.html | | 180 | bind-9.2.1rc* denial-of-service http://www.cert.org/advisories/CA-2002-15.html |
181 | bind-8.3.0 denial-of-service http://www.isc.org/products/BIND/bind8.html | | 181 | bind-8.3.0 denial-of-service http://www.isc.org/products/BIND/bind8.html |
182 | xchat<1.8.9 remote-user-shell http://www.linuxsecurity.com/advisories/redhat_advisory-2107.html | | 182 | xchat<1.8.9 remote-user-shell http://www.linuxsecurity.com/advisories/redhat_advisory-2107.html |
183 | apache<1.3.26 remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt | | 183 | apache<1.3.26 remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt |
184 | apache6<1.3.26 remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt | | 184 | apache6<1.3.26 remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt |
185 | apache-2.0.1? remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt | | 185 | apache-2.0.1? remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt |
186 | apache-2.0.2? remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt | | 186 | apache-2.0.2? remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt |
187 | apache-2.0.3[0-8]* remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt | | 187 | apache-2.0.3[0-8]* remote-root-shell http://httpd.apache.org/info/security_bulletin_20020617.txt |
188 | irssi<0.8.5 denial-of-service http://online.securityfocus.com/archive/1 | | 188 | irssi<0.8.5 denial-of-service http://online.securityfocus.com/archive/1 |
189 | #ap-ssl<2.8.10 remote-root-shell http://www.apache-ssl.org/advisory-20020620.txt | | 189 | #ap-ssl<2.8.10 remote-root-shell http://www.apache-ssl.org/advisory-20020620.txt |
190 | ap-ssl<2.8.10 remote-root-shell http://www.modssl.org/news/changelog.html | | 190 | ap-ssl<2.8.10 remote-root-shell http://www.modssl.org/news/changelog.html |
191 | apache<1.3.26nb1 remote-root-shell http://www.apache-ssl.org/advisory-20020620.txt | | 191 | apache<1.3.26nb1 remote-root-shell http://www.apache-ssl.org/advisory-20020620.txt |
192 | apache6<1.3.26nb1 remote-root-shell http://www.apache-ssl.org/advisory-20020620.txt | | 192 | apache6<1.3.26nb1 remote-root-shell http://www.apache-ssl.org/advisory-20020620.txt |
193 | bind<4.9.7nb1 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 193 | bind<4.9.7nb1 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
194 | #compat12<=1.2.1 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 194 | #compat12<=1.2.1 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
195 | #compat13<=1.3.3nb1 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 195 | #compat13<=1.3.3nb1 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
196 | compat14<1.4.3.2 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 196 | compat14<1.4.3.2 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
197 | openssh<3.4 remote-root-shell https://nvd.nist.gov/vuln/detail/CVE-2002-0639 | | 197 | openssh<3.4 remote-root-shell https://nvd.nist.gov/vuln/detail/CVE-2002-0639 |
198 | #bind<=9.2.1 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 198 | #bind<=9.2.1 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
199 | bind<8.3.3 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 199 | bind<8.3.3 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
200 | socks5<1.0.2nb2 remote-root-shell http://online.securityfocus.com/archive/1/9842 | | 200 | socks5<1.0.2nb2 remote-root-shell http://online.securityfocus.com/archive/1/9842 |
201 | socks5-1.0.[3-9]* remote-root-shell http://online.securityfocus.com/archive/2/9842 | | 201 | socks5-1.0.[3-9]* remote-root-shell http://online.securityfocus.com/archive/2/9842 |
202 | socks5-1.0.1[0-1]* remote-root-shell http://online.securityfocus.com/archive/2/9842 | | 202 | socks5-1.0.1[0-1]* remote-root-shell http://online.securityfocus.com/archive/2/9842 |
203 | ipa<1.2.7 local-access http://www.NetBSD.org/cgi-bin/query-pr-single.pl?number=17434 | | 203 | ipa<1.2.7 local-access http://www.NetBSD.org/cgi-bin/query-pr-single.pl?number=17434 |
204 | ethereal<0.9.5 remote-root-shell http://www.ethereal.com/appnotes/enpa-sa-00005.html | | 204 | ethereal<0.9.5 remote-root-shell http://www.ethereal.com/appnotes/enpa-sa-00005.html |
205 | squid<2.4.7 remote-user-shell http://www.squid-cache.org/Advisories/SQUID-2002_3.txt | | 205 | squid<2.4.7 remote-user-shell http://www.squid-cache.org/Advisories/SQUID-2002_3.txt |
206 | nn<6.6.4 remote-user-shell http://online.securityfocus.com/bid/5160 | | 206 | nn<6.6.4 remote-user-shell http://online.securityfocus.com/bid/5160 |
207 | inn<2.3.0 remote-user-shell http://online.securityfocus.com/bid/2620 | | 207 | inn<2.3.0 remote-user-shell http://online.securityfocus.com/bid/2620 |
208 | cvsup-gui<=16.1.d remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 208 | cvsup-gui<=16.1.d remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
209 | cvsup<=16.1.d remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 209 | cvsup<=16.1.d remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
210 | xpilot<4.5.1 remote-user-shell http://online.securityfocus.com/bid/4534 | | 210 | xpilot<4.5.1 remote-user-shell http://online.securityfocus.com/bid/4534 |
211 | gnut<0.4.28 remote-user-shell http://online.securityfocus.com/bid/3267/ | | 211 | gnut<0.4.28 remote-user-shell http://online.securityfocus.com/bid/3267/ |
212 | wwwoffle<2.7c denial-of-service http://bespin.org/~qitest1/adv/wwwoffle-2.7b.asc | | 212 | wwwoffle<2.7c denial-of-service http://bespin.org/~qitest1/adv/wwwoffle-2.7b.asc |
213 | png<1.2.4 remote-user-shell ftp://swrinde.nde.swri.edu/pub/png-group/archives/png-list.200207 | | 213 | png<1.2.4 remote-user-shell ftp://swrinde.nde.swri.edu/pub/png-group/archives/png-list.200207 |
214 | php-4.2.[01] remote-user-shell http://security.e-matters.de/advisories/022002.html | | 214 | php-4.2.[01] remote-user-shell http://security.e-matters.de/advisories/022002.html |
215 | ap-php-4.2.[01] remote-user-shell http://security.e-matters.de/advisories/022002.html | | 215 | ap-php-4.2.[01] remote-user-shell http://security.e-matters.de/advisories/022002.html |
216 | srp_client<1.7.5 unknown http://www-cs-students.stanford.edu/~tjw/srp/download.html | | 216 | srp_client<1.7.5 unknown http://www-cs-students.stanford.edu/~tjw/srp/download.html |
217 | hylafax<4.1.3 remote-root-shell http://www.securityfocus.com/bid/3357 | | 217 | hylafax<4.1.3 remote-root-shell http://www.securityfocus.com/bid/3357 |
218 | openssl<0.9.6e remote-root-shell http://www.openssl.org/news/secadv_20020730.txt | | 218 | openssl<0.9.6e remote-root-shell http://www.openssl.org/news/secadv_20020730.txt |
219 | libmm<1.2.1 local-root-shell http://online.securityfocus.com/bid/5352 | | 219 | libmm<1.2.1 local-root-shell http://online.securityfocus.com/bid/5352 |
220 | openssl<0.9.6f denial-of-service http://www.openssl.org/news/secadv_20020730.txt | | 220 | openssl<0.9.6f denial-of-service http://www.openssl.org/news/secadv_20020730.txt |
221 | png<=1.0.12 remote-user-shell http://online.securityfocus.com/bid/5409 | | 221 | png<=1.0.12 remote-user-shell http://online.securityfocus.com/bid/5409 |
222 | kdelibs-2.1.* weak-ssl-authentication http://online.securityfocus.com/archive/1/286290/2002-08-08/2002-08-14/2 | | 222 | kdelibs-2.1.* weak-ssl-authentication http://online.securityfocus.com/archive/1/286290/2002-08-08/2002-08-14/2 |
223 | kdelibs-2.2.1* weak-ssl-authentication http://online.securityfocus.com/archive/1/286290/2002-08-08/2002-08-14/2 | | 223 | kdelibs-2.2.1* weak-ssl-authentication http://online.securityfocus.com/archive/1/286290/2002-08-08/2002-08-14/2 |
224 | kdelibs-2.2.2{,nb1} weak-ssl-authentication http://online.securityfocus.com/archive/1/286290/2002-08-08/2002-08-14/2 | | 224 | kdelibs-2.2.2{,nb1} weak-ssl-authentication http://online.securityfocus.com/archive/1/286290/2002-08-08/2002-08-14/2 |
225 | kdelibs-3.0.[12] weak-ssl-authentication http://online.securityfocus.com/archive/1/286290/2002-08-08/2002-08-14/2 | | 225 | kdelibs-3.0.[12] weak-ssl-authentication http://online.securityfocus.com/archive/1/286290/2002-08-08/2002-08-14/2 |
226 | arla<0.35.9 denial-of-service http://www.stacken.kth.se/lists/arla-drinkers/2002-08/msg00019.html | | 226 | arla<0.35.9 denial-of-service http://www.stacken.kth.se/lists/arla-drinkers/2002-08/msg00019.html |
227 | arla<0.35.9 remote-root-shell http://www.stacken.kth.se/lists/arla-drinkers/2002-08/msg00019.html | | 227 | arla<0.35.9 remote-root-shell http://www.stacken.kth.se/lists/arla-drinkers/2002-08/msg00019.html |
228 | ethereal<0.9.6 remote-root-shell http://www.ethereal.com/appnotes/enpa-sa-00006.html | | 228 | ethereal<0.9.6 remote-root-shell http://www.ethereal.com/appnotes/enpa-sa-00006.html |
229 | bind<4.9.10 remote-root-shell http://www.kb.cert.org/vuls/id/738331 | | 229 | bind<4.9.10 remote-root-shell http://www.kb.cert.org/vuls/id/738331 |
230 | compat14<1.4.3.2 remote-root-shell http://www.kb.cert.org/vuls/id/738331 | | 230 | compat14<1.4.3.2 remote-root-shell http://www.kb.cert.org/vuls/id/738331 |
231 | compat14-crypto<1.4.3.2 remote-root-shell http://www.kb.cert.org/vuls/id/738331 | | 231 | compat14-crypto<1.4.3.2 remote-root-shell http://www.kb.cert.org/vuls/id/738331 |
232 | netbsd32_compat14<1.4.3.2 remote-root-shell http://www.kb.cert.org/vuls/id/738331 | | 232 | netbsd32_compat14<1.4.3.2 remote-root-shell http://www.kb.cert.org/vuls/id/738331 |
233 | compat15<1.5.3.1 remote-root-shell http://www.kb.cert.org/vuls/id/738331 | | 233 | compat15<1.5.3.1 remote-root-shell http://www.kb.cert.org/vuls/id/738331 |
234 | netbsd32_compat15<1.5.3.1 remote-root-shell http://www.kb.cert.org/vuls/id/738331 | | 234 | netbsd32_compat15<1.5.3.1 remote-root-shell http://www.kb.cert.org/vuls/id/738331 |
235 | postgresql-server<7.2.2 remote-code-execution http://online.securityfocus.com/archive/1/288998 | | 235 | postgresql-server<7.2.2 remote-code-execution http://online.securityfocus.com/archive/1/288998 |
236 | gaim<0.59.1 remote-code-execution http://sourceforge.net/tracker/index.php?func=detail&aid=584252&group_id=235&atid=100235 | | 236 | gaim<0.59.1 remote-code-execution http://sourceforge.net/tracker/index.php?func=detail&aid=584252&group_id=235&atid=100235 |
237 | gaim-gnome<0.59.1 remote-code-execution http://sourceforge.net/tracker/index.php?func=detail&aid=584252&group_id=235&atid=100235 | | 237 | gaim-gnome<0.59.1 remote-code-execution http://sourceforge.net/tracker/index.php?func=detail&aid=584252&group_id=235&atid=100235 |
238 | mozilla<1.1 remote-file-read http://archives.neohapsis.com/archives/bugtraq/2002-07/0259.html | | 238 | mozilla<1.1 remote-file-read http://archives.neohapsis.com/archives/bugtraq/2002-07/0259.html |
239 | mozilla<1.1 remote-file-read http://www.geocities.co.jp/SiliconValley/1667/advisory03e.html | | 239 | mozilla<1.1 remote-file-read http://www.geocities.co.jp/SiliconValley/1667/advisory03e.html |
240 | freebsd_lib<=2.2.7 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html | | 240 | freebsd_lib<=2.2.7 remote-root-shell http://www.pine.nl/advisories/pine-cert-20020601.html |
241 | opera<6.03 remote-user-shell http://www.opera.com/linux/changelog/log603.html | | 241 | opera<6.03 remote-user-shell http://www.opera.com/linux/changelog/log603.html |
242 | wmnet<1.06nb3 local-root-shell http://www.securiteam.com/unixfocus/5HP0F1P8AM.html | | 242 | wmnet<1.06nb3 local-root-shell http://www.securiteam.com/unixfocus/5HP0F1P8AM.html |
243 | apache-2.0.3[0-9]* denial-of-service http://www.apacheweek.com/issues/02-09-27#apache2042 | | 243 | apache-2.0.3[0-9]* denial-of-service http://www.apacheweek.com/issues/02-09-27#apache2042 |
244 | apache-2.0.4[0-1]* denial-of-service http://www.apacheweek.com/issues/02-09-27#apache2042 | | 244 | apache-2.0.4[0-1]* denial-of-service http://www.apacheweek.com/issues/02-09-27#apache2042 |
245 | fetchmail<6.1.0 remote-code-execution http://security.e-matters.de/advisories/032002.html | | 245 | fetchmail<6.1.0 remote-code-execution http://security.e-matters.de/advisories/032002.html |
246 | unzip<=5.42 local-file-write http://online.securityfocus.com/archive/1/196445 | | 246 | unzip<=5.42 local-file-write http://online.securityfocus.com/archive/1/196445 |
247 | apache-2.0.3[0-9]* remote-root-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 | | 247 | apache-2.0.3[0-9]* remote-root-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 |
248 | apache-2.0.4[0-2]* remote-file-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 | | 248 | apache-2.0.4[0-2]* remote-file-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 |
249 | net-snmp<5.0.5 denial-of-service http://sourceforge.net/forum/forum.php?forum_id=215540 | | 249 | net-snmp<5.0.5 denial-of-service http://sourceforge.net/forum/forum.php?forum_id=215540 |
250 | sendmail<8.12.6nb1 local-user-shell http://www.sendmail.org/smrsh.adv.txt | | 250 | sendmail<8.12.6nb1 local-user-shell http://www.sendmail.org/smrsh.adv.txt |
251 | apache<1.3.27 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843 | | 251 | apache<1.3.27 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843 |
252 | apache<1.3.27 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839 | | 252 | apache<1.3.27 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839 |
253 | apache<1.3.27 local-file-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 | | 253 | apache<1.3.27 local-file-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 |
254 | apache6<1.3.27 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843 | | 254 | apache6<1.3.27 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843 |
255 | apache6<1.3.27 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839 | | 255 | apache6<1.3.27 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839 |
256 | apache6<1.3.27 local-file-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 | | 256 | apache6<1.3.27 local-file-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 |
257 | gv<3.5.8nb2 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1569 | | 257 | gv<3.5.8nb2 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1569 |
258 | logsurfer<1.5.2 local-user-shell http://www.cert.dfn.de/eng/team/wl/logsurf/ | | 258 | logsurfer<1.5.2 local-user-shell http://www.cert.dfn.de/eng/team/wl/logsurf/ |
259 | suse{,32}_base<7.3nb1 remote-code-execution http://www.suse.com/de/security/2002_031_glibc.html | | 259 | suse{,32}_base<7.3nb1 remote-code-execution http://www.suse.com/de/security/2002_031_glibc.html |
260 | suse{,32}_devel<7.3nb1 remote-code-execution http://www.suse.com/de/security/2002_031_glibc.html | | 260 | suse{,32}_devel<7.3nb1 remote-code-execution http://www.suse.com/de/security/2002_031_glibc.html |
261 | kdegraphics<2.2.2nb2 remote-code-execution http://www.kde.org/info/security/advisory-20021008-1.txt | | 261 | kdegraphics<2.2.2nb2 remote-code-execution http://www.kde.org/info/security/advisory-20021008-1.txt |
262 | kdegraphics-3.0.[123]* remote-code-execution http://www.kde.org/info/security/advisory-20021008-1.txt | | 262 | kdegraphics-3.0.[123]* remote-code-execution http://www.kde.org/info/security/advisory-20021008-1.txt |
263 | kdenetwork-3.0.[123]* remote-file-read http://www.kde.org/info/security/advisory-20021008-2.txt | | 263 | kdenetwork-3.0.[123]* remote-file-read http://www.kde.org/info/security/advisory-20021008-2.txt |
264 | gtar-base<1.13.25 local-file-write http://online.securityfocus.com/archive/1/196445 | | 264 | gtar-base<1.13.25 local-file-write http://online.securityfocus.com/archive/1/196445 |
265 | kth-krb4<1.2.1 remote-code-execution http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2002-002-kadm4.txt | | 265 | kth-krb4<1.2.1 remote-code-execution http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2002-002-kadm4.txt |
266 | inn<2.3.3 local-user-shell http://online.securityfocus.com/bid/6049 | | 266 | inn<2.3.3 local-user-shell http://online.securityfocus.com/bid/6049 |
267 | inn<2.3.3 local-user-shell http://online.securityfocus.com/bid/4501 | | 267 | inn<2.3.3 local-user-shell http://online.securityfocus.com/bid/4501 |
268 | fetchmail<6.1.0 remote-user-shell http://online.securityfocus.com/bid/5825 | | 268 | fetchmail<6.1.0 remote-user-shell http://online.securityfocus.com/bid/5825 |
269 | fetchmail<6.1.0 denial-of-service http://online.securityfocus.com/bid/5826 | | 269 | fetchmail<6.1.0 denial-of-service http://online.securityfocus.com/bid/5826 |
270 | fetchmail<6.1.0 remote-user-shell http://online.securityfocus.com/bid/5827 | | 270 | fetchmail<6.1.0 remote-user-shell http://online.securityfocus.com/bid/5827 |
271 | squirrelmail<1.2.8 remote-script-inject http://online.securityfocus.com/bid/5763 | | 271 | squirrelmail<1.2.8 remote-script-inject http://online.securityfocus.com/bid/5763 |
272 | bind<4.9.10nb1 remote-root-shell http://www.isc.org/products/BIND/bind-security.html | | 272 | bind<4.9.10nb1 remote-root-shell http://www.isc.org/products/BIND/bind-security.html |
273 | bind<8.3.3nb1 remote-root-shell http://www.isc.org/products/BIND/bind-security.html | | 273 | bind<8.3.3nb1 remote-root-shell http://www.isc.org/products/BIND/bind-security.html |
274 | samba-2.2.[2-6]* remote-root-shell http://www.samba.org/samba/whatsnew/samba-2.2.7.html | | 274 | samba-2.2.[2-6]* remote-root-shell http://www.samba.org/samba/whatsnew/samba-2.2.7.html |
275 | windowmaker<0.80.2 remote-user-shell http://www.windowmaker.org/ | | 275 | windowmaker<0.80.2 remote-user-shell http://www.windowmaker.org/ |
276 | ssh<3.2.2 local-root-shell http://www.kb.cert.org/vuls/id/740619 | | 276 | ssh<3.2.2 local-root-shell http://www.kb.cert.org/vuls/id/740619 |
277 | w3m<0.3.2.1 remote-file-write http://mi.med.tohoku.ac.jp/%7Esatodai/w3m-dev/200211.month/3492.html | | 277 | w3m<0.3.2.1 remote-file-write http://mi.med.tohoku.ac.jp/%7Esatodai/w3m-dev/200211.month/3492.html |
278 | w3m-img<0.3.2.1 remote-file-write http://mi.med.tohoku.ac.jp/%7Esatodai/w3m-dev/200211.month/3492.html | | 278 | w3m-img<0.3.2.1 remote-file-write http://mi.med.tohoku.ac.jp/%7Esatodai/w3m-dev/200211.month/3492.html |
279 | Canna-server-bin<3.5.2nb3 remote-root-shell http://canna.sourceforge.jp/sec/Canna-2002-01.txt | | 279 | Canna-server-bin<3.5.2nb3 remote-root-shell http://canna.sourceforge.jp/sec/Canna-2002-01.txt |
280 | windowmaker<0.80.2 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1277 | | 280 | windowmaker<0.80.2 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1277 |
281 | kdelibs-2.1.* remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt | | 281 | kdelibs-2.1.* remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt |
282 | kdelibs-2.2.1* remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt | | 282 | kdelibs-2.2.1* remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt |
283 | kdelibs-2.2.2{,nb[123]} remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt | | 283 | kdelibs-2.2.2{,nb[123]} remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt |
284 | kdelibs-3.0.[123]* remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt | | 284 | kdelibs-3.0.[123]* remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt |
285 | kdelibs-3.0.4 remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt | | 285 | kdelibs-3.0.4 remote-user-shell http://www.kde.org/info/security/advisory-20021111-1.txt |
286 | kdenetwork-2.[12]* remote-root-shell http://www.kde.org/info/security/advisory-20021111-2.txt | | 286 | kdenetwork-2.[12]* remote-root-shell http://www.kde.org/info/security/advisory-20021111-2.txt |
287 | kdenetwork-3.0.[123]* remote-root-shell http://www.kde.org/info/security/advisory-20021111-2.txt | | 287 | kdenetwork-3.0.[123]* remote-root-shell http://www.kde.org/info/security/advisory-20021111-2.txt |
288 | kdenetwork-3.0.4{,nb1} remote-root-shell http://www.kde.org/info/security/advisory-20021111-2.txt | | 288 | kdenetwork-3.0.4{,nb1} remote-root-shell http://www.kde.org/info/security/advisory-20021111-2.txt |
289 | cyrus-imapd<2.0.17 remote-code-execution http://www.securityfocus.com/bid/6298 | | 289 | cyrus-imapd<2.0.17 remote-code-execution http://www.securityfocus.com/bid/6298 |
290 | cyrus-imapd-2.1.9{,nb1} remote-code-execution http://www.securityfocus.com/bid/6298 | | 290 | cyrus-imapd-2.1.9{,nb1} remote-code-execution http://www.securityfocus.com/bid/6298 |
291 | imap-uw<2002.1rc1 remote-code-execution http://www.kb.cert.org/vuls/id/961489 | | 291 | imap-uw<2002.1rc1 remote-code-execution http://www.kb.cert.org/vuls/id/961489 |
292 | cyrus-sasl-2.1.9{,nb[12]} remote-code-execution http://online.securityfocus.com/archive/1/302603 | | 292 | cyrus-sasl-2.1.9{,nb[12]} remote-code-execution http://online.securityfocus.com/archive/1/302603 |
293 | fetchmail<6.2.0 remote-code-execution http://security.e-matters.de/advisories/052002.html | | 293 | fetchmail<6.2.0 remote-code-execution http://security.e-matters.de/advisories/052002.html |
294 | mysql-client<3.23.49nb2 remote-code-execution http://security.e-matters.de/advisories/042002.html | | 294 | mysql-client<3.23.49nb2 remote-code-execution http://security.e-matters.de/advisories/042002.html |
295 | mysql-server<3.23.49nb1 remote-code-execution http://security.e-matters.de/advisories/042002.html | | 295 | mysql-server<3.23.49nb1 remote-code-execution http://security.e-matters.de/advisories/042002.html |
296 | pine<4.50 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1320 | | 296 | pine<4.50 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1320 |
297 | w3m{,-img}<0.3.2.2 remote-file-read http://sourceforge.net/project/shownotes.php?group_id=39518&release_id=126233 | | 297 | w3m{,-img}<0.3.2.2 remote-file-read http://sourceforge.net/project/shownotes.php?group_id=39518&release_id=126233 |
298 | ethereal<0.9.8 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00007.html | | 298 | ethereal<0.9.8 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00007.html |
299 | wget<1.8.2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1344 | | 299 | wget<1.8.2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1344 |
300 | wget<1.8.2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1345 | | 300 | wget<1.8.2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1345 |
301 | ssh<=3.2.2 denial-of-service http://www.rapid7.com/advisories/R7-0009.txt | | 301 | ssh<=3.2.2 denial-of-service http://www.rapid7.com/advisories/R7-0009.txt |
302 | cups<1.1.18 remote-root-shell http://www.idefense.com/advisory/12.19.02.txt | | 302 | cups<1.1.18 remote-root-shell http://www.idefense.com/advisory/12.19.02.txt |
303 | png<1.2.5nb2 unknown ftp://swrinde.nde.swri.edu/pub/png-group/archives/png-implement.200212 | | 303 | png<1.2.5nb2 unknown ftp://swrinde.nde.swri.edu/pub/png-group/archives/png-implement.200212 |
304 | leafnode<1.9.30 denial-of-service http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0123.html | | 304 | leafnode<1.9.30 denial-of-service http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0123.html |
305 | cups<1.1.18 local-code-execution http://online.securityfocus.com/bid/6475 | | 305 | cups<1.1.18 local-code-execution http://online.securityfocus.com/bid/6475 |
306 | xpdf<=2.01 local-code-execution http://online.securityfocus.com/bid/6475 | | 306 | xpdf<=2.01 local-code-execution http://online.securityfocus.com/bid/6475 |
307 | mhonarc<2.5.14 cross-site-scripting http://www.mhonarc.org/archive/cgi-bin/mesg.cgi?a=mhonarc-users&i=200212220120.gBM1K8502180@mcguire.earlhood.com | | 307 | mhonarc<2.5.14 cross-site-scripting http://www.mhonarc.org/archive/cgi-bin/mesg.cgi?a=mhonarc-users&i=200212220120.gBM1K8502180@mcguire.earlhood.com |
308 | libmcrypt<2.5.5 remote-user-shell http://online.securityfocus.com/archive/1/305162/2003-01-01/2003-01-07/0 | | 308 | libmcrypt<2.5.5 remote-user-shell http://online.securityfocus.com/archive/1/305162/2003-01-01/2003-01-07/0 |
309 | kdebase<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 309 | kdebase<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
310 | kdegames<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 310 | kdegames<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
311 | kdegraphics<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 311 | kdegraphics<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
312 | kdelibs<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 312 | kdelibs<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
313 | kdemultimedia<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 313 | kdemultimedia<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
314 | kdenetwork<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 314 | kdenetwork<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
315 | kdepim<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 315 | kdepim<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
316 | kdesdk<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 316 | kdesdk<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
317 | kdeutils<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt | | 317 | kdeutils<3.0.5.1 remote-code-execution http://www.kde.org/info/security/advisory-20021220-1.txt |
318 | cvs<1.11.4nb1 remote-file-write https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=51 | | 318 | cvs<1.11.4nb1 remote-file-write https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=51 |
319 | gabber<0.8.7nb4 privacy-leak http://online.securityfocus.com/archive/1/307430 | | 319 | gabber<0.8.7nb4 privacy-leak http://online.securityfocus.com/archive/1/307430 |
320 | spamassassin<2.43nb2 remote-code-execution http://cert.uni-stuttgart.de/archive/bugtraq/2003/01/msg00254.html | | 320 | spamassassin<2.43nb2 remote-code-execution http://cert.uni-stuttgart.de/archive/bugtraq/2003/01/msg00254.html |
321 | p5-Mail-SpamAssassin<2.43nb2 remote-code-execution http://cert.uni-stuttgart.de/archive/bugtraq/2003/01/msg00254.html | | 321 | p5-Mail-SpamAssassin<2.43nb2 remote-code-execution http://cert.uni-stuttgart.de/archive/bugtraq/2003/01/msg00254.html |
322 | squirrelmail<1.2.11 cross-site-scripting http://www.squirrelmail.org/ | | 322 | squirrelmail<1.2.11 cross-site-scripting http://www.squirrelmail.org/ |
323 | openssl<0.9.6gnb1 weak-encryption http://www.openssl.org/news/secadv_20030219.txt | | 323 | openssl<0.9.6gnb1 weak-encryption http://www.openssl.org/news/secadv_20030219.txt |
324 | php-4.1.[3-9]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 | | 324 | php-4.1.[3-9]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 |
325 | php-4.2.[0-2]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 | | 325 | php-4.2.[0-2]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 |
326 | php-4.2.3{,nb1} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 | | 326 | php-4.2.3{,nb1} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 |
327 | sendmail<8.11.6nb3 remote-code-execution http://www.cert.org/advisories/CA-2003-07.html | | 327 | sendmail<8.11.6nb3 remote-code-execution http://www.cert.org/advisories/CA-2003-07.html |
328 | sendmail-8.12.[0-7] remote-code-execution http://www.cert.org/advisories/CA-2003-07.html | | 328 | sendmail-8.12.[0-7] remote-code-execution http://www.cert.org/advisories/CA-2003-07.html |
329 | sendmail-8.12.[0-7]nb* remote-code-execution http://www.cert.org/advisories/CA-2003-07.html | | 329 | sendmail-8.12.[0-7]nb* remote-code-execution http://www.cert.org/advisories/CA-2003-07.html |
330 | snort<1.9.1 remote-code-execution http://www.kb.cert.org/vuls/id/916785 | | 330 | snort<1.9.1 remote-code-execution http://www.kb.cert.org/vuls/id/916785 |
331 | snort-pgsql<1.9.1 remote-code-execution http://www.kb.cert.org/vuls/id/916785 | | 331 | snort-pgsql<1.9.1 remote-code-execution http://www.kb.cert.org/vuls/id/916785 |
332 | snort-mysql<1.9.1 remote-code-execution http://www.kb.cert.org/vuls/id/916785 | | 332 | snort-mysql<1.9.1 remote-code-execution http://www.kb.cert.org/vuls/id/916785 |
333 | hypermail<2.1.7 remote-code-execution http://www.hypermail.org/mail-archive/2003/Feb/0025.html | | 333 | hypermail<2.1.7 remote-code-execution http://www.hypermail.org/mail-archive/2003/Feb/0025.html |
334 | zlib<1.1.4nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0107 | | 334 | zlib<1.1.4nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0107 |
335 | ethereal-0.8.[7-9] remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00008.html | | 335 | ethereal-0.8.[7-9] remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00008.html |
336 | ethereal-0.9.[0-9] remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00008.html | | 336 | ethereal-0.9.[0-9] remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00008.html |
337 | qpopper<4.0.5 remote-user-shell http://archives.neohapsis.com/archives/bugtraq/2003-03/0152.html | | 337 | qpopper<4.0.5 remote-user-shell http://archives.neohapsis.com/archives/bugtraq/2003-03/0152.html |
338 | ircII<20030313 remote-code-execution http://eterna.com.au/ircii/ | | 338 | ircII<20030313 remote-code-execution http://eterna.com.au/ircii/ |
339 | samba<2.2.8 remote-code-execution http://us1.samba.org/samba/whatsnew/samba-2.2.8.html | | 339 | samba<2.2.8 remote-code-execution http://us1.samba.org/samba/whatsnew/samba-2.2.8.html |
340 | openssl<0.9.6gnb2 remote-key-theft http://www.openssl.org/news/secadv_20030317.txt | | 340 | openssl<0.9.6gnb2 remote-key-theft http://www.openssl.org/news/secadv_20030317.txt |
341 | openssl<0.9.6gnb2 remote-use-of-secret http://www.openssl.org/news/secadv_20030319.txt | | 341 | openssl<0.9.6gnb2 remote-use-of-secret http://www.openssl.org/news/secadv_20030319.txt |
342 | mutt<1.4.1 remote-code-execution http://www.securityfocus.com/archive/1/315771/2003-03-19/2003-03-25/0 | | 342 | mutt<1.4.1 remote-code-execution http://www.securityfocus.com/archive/1/315771/2003-03-19/2003-03-25/0 |
343 | rxvt<2.7.10 remote-code-execution http://marc.theaimsgroup.com/?l=bugtraq&m=104612710031920&w=2 | | 343 | rxvt<2.7.10 remote-code-execution http://marc.theaimsgroup.com/?l=bugtraq&m=104612710031920&w=2 |
344 | eterm<0.9.2 remote-code-execution http://marc.theaimsgroup.com/?l=bugtraq&m=104612710031920&w=2 | | 344 | eterm<0.9.2 remote-code-execution http://marc.theaimsgroup.com/?l=bugtraq&m=104612710031920&w=2 |
345 | apcupsd<3.8.6 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1396 | | 345 | apcupsd<3.8.6 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1396 |
346 | apcupsd-3.10.[0-4] remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1396 | | 346 | apcupsd-3.10.[0-4] remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1396 |
347 | ap-php-4.1.[3-9]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 | | 347 | ap-php-4.1.[3-9]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 |
348 | ap-php-4.2.[0-2]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 | | 348 | ap-php-4.2.[0-2]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 |
349 | ap-php-4.2.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 | | 349 | ap-php-4.2.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1396 |
350 | ja-samba<2.2.7.1.1.1 remote-code-execution http://www.samba.gr.jp/news-release/2003/20030317-2.html | | 350 | ja-samba<2.2.7.1.1.1 remote-code-execution http://www.samba.gr.jp/news-release/2003/20030317-2.html |
351 | bitchx<1.0.3.19nb1 remote-code-execution http://www.securityfocus.com/archive/1/315057 | | 351 | bitchx<1.0.3.19nb1 remote-code-execution http://www.securityfocus.com/archive/1/315057 |
352 | apache-2.0.[0-3][0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0132 | | 352 | apache-2.0.[0-3][0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0132 |
353 | apache-2.0.4[0-4] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0132 | | 353 | apache-2.0.4[0-4] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0132 |
354 | apcupsd<3.8.6 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0099 | | 354 | apcupsd<3.8.6 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0099 |
355 | apcupsd-3.10.[0-4] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0099 | | 355 | apcupsd-3.10.[0-4] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0099 |
356 | setiathome<3.08 remote-code-execution http://spoor12.edup.tudelft.nl/SkyLined%20v4.2/?Advisories/Seti@home | | 356 | setiathome<3.08 remote-code-execution http://spoor12.edup.tudelft.nl/SkyLined%20v4.2/?Advisories/Seti@home |
357 | samba<=2.2.8 remote-root-access http://lists.samba.org/pipermail/samba-announce/2003-April/000065.html | | 357 | samba<=2.2.8 remote-root-access http://lists.samba.org/pipermail/samba-announce/2003-April/000065.html |
358 | mgetty+sendfax<1.1.29 file-permissions http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1392 | | 358 | mgetty+sendfax<1.1.29 file-permissions http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1392 |
359 | mgetty+sendfax<1.1.29 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1391 | | 359 | mgetty+sendfax<1.1.29 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1391 |
360 | ja-samba<2.2.7.2.1.0 remote-code-execution http://www.samba.gr.jp/news-release/2003/20030409-2.html | | 360 | ja-samba<2.2.7.2.1.0 remote-code-execution http://www.samba.gr.jp/news-release/2003/20030409-2.html |
361 | kde<3.1.1nb1 remote-code-execution http://www.kde.org/info/security/advisory-20030409-1.txt | | 361 | kde<3.1.1nb1 remote-code-execution http://www.kde.org/info/security/advisory-20030409-1.txt |
362 | kdelibs<3.1.1nb1 remote-code-execution http://www.kde.org/info/security/advisory-20030409-1.txt | | 362 | kdelibs<3.1.1nb1 remote-code-execution http://www.kde.org/info/security/advisory-20030409-1.txt |
363 | kdebase<3.1.1nb1 remote-code-execution http://www.kde.org/info/security/advisory-20030409-1.txt | | 363 | kdebase<3.1.1nb1 remote-code-execution http://www.kde.org/info/security/advisory-20030409-1.txt |
364 | kdegraphics<3.1.1nb2 remote-code-execution http://www.kde.org/info/security/advisory-20030409-1.txt | | 364 | kdegraphics<3.1.1nb2 remote-code-execution http://www.kde.org/info/security/advisory-20030409-1.txt |
365 | snort<2.0.0 remote-code-execution http://www.securityfocus.com/archive/1/318669 | | 365 | snort<2.0.0 remote-code-execution http://www.securityfocus.com/archive/1/318669 |
366 | snort-pgsql<2.0.0 remote-code-execution http://www.securityfocus.com/archive/1/318669 | | 366 | snort-pgsql<2.0.0 remote-code-execution http://www.securityfocus.com/archive/1/318669 |
367 | snort-mysql<2.0.0 remote-code-execution http://www.securityfocus.com/archive/1/318669 | | 367 | snort-mysql<2.0.0 remote-code-execution http://www.securityfocus.com/archive/1/318669 |
368 | poppassd<4.0.5nb1 local-root-shell http://www.securityfocus.com/archive/1/319811/2003-04-26/2003-05-02/0 | | 368 | poppassd<4.0.5nb1 local-root-shell http://www.securityfocus.com/archive/1/319811/2003-04-26/2003-05-02/0 |
369 | ethereal<0.9.12 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00009.html | | 369 | ethereal<0.9.12 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00009.html |
370 | gnupg<1.2.2 weak-authentication http://www.securityfocus.com/archive/1/320444 | | 370 | gnupg<1.2.2 weak-authentication http://www.securityfocus.com/archive/1/320444 |
371 | lv<4.49.5 local-code-execution http://bugs.debian.org/cgi-bin/bugreport.cgi?archive=no&bug=190941 | | 371 | lv<4.49.5 local-code-execution http://bugs.debian.org/cgi-bin/bugreport.cgi?archive=no&bug=190941 |
372 | bitchx<1.0.3.19nb2 denial-of-service http://www.securityfocus.com/archive/1/321093 | | 372 | bitchx<1.0.3.19nb2 denial-of-service http://www.securityfocus.com/archive/1/321093 |
373 | suse{,32}_libpng<7.3nb1 remote-user-shell http://www.suse.com/de/security/2003_004_libpng.html | | 373 | suse{,32}_libpng<7.3nb1 remote-user-shell http://www.suse.com/de/security/2003_004_libpng.html |
374 | apache-2.0.3[7-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0245 | | 374 | apache-2.0.3[7-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0245 |
375 | apache-2.0.4[0-5] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0245 | | 375 | apache-2.0.4[0-5] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0245 |
376 | suse{,32}_base<7.3nb4 remote-code-execution http://www.suse.com/de/security/2003_027_glibc.html | | 376 | suse{,32}_base<7.3nb4 remote-code-execution http://www.suse.com/de/security/2003_027_glibc.html |
377 | suse{,32}_devel<7.3nb2 remote-code-execution http://www.suse.com/de/security/2003_027_glibc.html | | 377 | suse{,32}_devel<7.3nb2 remote-code-execution http://www.suse.com/de/security/2003_027_glibc.html |
378 | cups<1.1.19 denial-of-service http://www.cups.org/str.php?L75 | | 378 | cups<1.1.19 denial-of-service http://www.cups.org/str.php?L75 |
379 | speakfreely<=7.5 remote-code-execution http://www.securityfocus.com/archive/1/324257/2003-06-06/2003-06-12/0 | | 379 | speakfreely<=7.5 remote-code-execution http://www.securityfocus.com/archive/1/324257/2003-06-06/2003-06-12/0 |
380 | ethereal<0.9.13 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00010.html | | 380 | ethereal<0.9.13 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00010.html |
381 | xpdf<2.02pl1 remote-code-execution http://lists.netsys.com/pipermail/full-disclosure/2003-June/010397.html | | 381 | xpdf<2.02pl1 remote-code-execution http://lists.netsys.com/pipermail/full-disclosure/2003-June/010397.html |
382 | acroread5<5.07 remote-code-execution http://lists.netsys.com/pipermail/full-disclosure/2003-June/010397.html | | 382 | acroread5<5.07 remote-code-execution http://lists.netsys.com/pipermail/full-disclosure/2003-June/010397.html |
383 | acroread5<5.08 remote-user-shell http://lists.netsys.com/pipermail/full-disclosure/2003-July/006342.html | | 383 | acroread5<5.08 remote-user-shell http://lists.netsys.com/pipermail/full-disclosure/2003-July/006342.html |
384 | ImageMagick<5.5.7.1 local-symlink-race http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0455 | | 384 | ImageMagick<5.5.7.1 local-symlink-race http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0455 |
385 | apache-2.0.3[7-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0253 | | 385 | apache-2.0.3[7-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0253 |
386 | apache-2.0.4[0-6] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0253 | | 386 | apache-2.0.4[0-6] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0253 |
387 | falcons-eye<1.9.3nb3 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0358 | | 387 | falcons-eye<1.9.3nb3 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0358 |
388 | xconq<7.4.1nb1 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0607 | | 388 | xconq<7.4.1nb1 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0607 |
389 | mhonarc<2.6.4 cross-site-scripting http://savannah.nongnu.org/bugs/?func=detailbug&bug_id=3128&group_id=1968 | | 389 | mhonarc<2.6.4 cross-site-scripting http://savannah.nongnu.org/bugs/?func=detailbug&bug_id=3128&group_id=1968 |
390 | wu-ftpd<2.6.2nb1 remote-root-shell http://isec.pl/vulnerabilities/isec-0011-wu-ftpd.txt | | 390 | wu-ftpd<2.6.2nb1 remote-root-shell http://isec.pl/vulnerabilities/isec-0011-wu-ftpd.txt |
391 | lftp<2.5.3 remote-user-shell http://freshmeat.net/releases/87364/ | | 391 | lftp<2.5.3 remote-user-shell http://freshmeat.net/releases/87364/ |
392 | postfix<1.1.13 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0468 | | 392 | postfix<1.1.13 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0468 |
393 | postfix<1.1.13 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0540 | | 393 | postfix<1.1.13 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0540 |
394 | xfstt<1.5 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0581 | | 394 | xfstt<1.5 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0581 |
395 | xfstt<1.5.1 privacy-leak http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0625 | | 395 | xfstt<1.5.1 privacy-leak http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0625 |
396 | stunnel<3.25 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1563 | | 396 | stunnel<3.25 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1563 |
397 | stunnel-4.0[0-3]* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1563 | | 397 | stunnel-4.0[0-3]* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1563 |
398 | ssh2<3.2.5 weak-authentication http://www.ssh.com/company/newsroom/article/454/ | | 398 | ssh2<3.2.5 weak-authentication http://www.ssh.com/company/newsroom/article/454/ |
399 | horde<2.2.4rc1 privacy-leak http://www.securityfocus.com/archive/1/333114/2003-08-13/2003-08-19/0 | | 399 | horde<2.2.4rc1 privacy-leak http://www.securityfocus.com/archive/1/333114/2003-08-13/2003-08-19/0 |
400 | imp<3.2.2rc1 privacy-leak http://www.securityfocus.com/archive/1/333114/2003-08-13/2003-08-19/0 | | 400 | imp<3.2.2rc1 privacy-leak http://www.securityfocus.com/archive/1/333114/2003-08-13/2003-08-19/0 |
401 | gopher<3.0.6 remote-root-shell http://www.securityfocus.com/archive/1/328843/2003-08-18/2003-08-24/2 | | 401 | gopher<3.0.6 remote-root-shell http://www.securityfocus.com/archive/1/328843/2003-08-18/2003-08-24/2 |
402 | unzip<5.50nb2 weak-path-validation http://www.securityfocus.com/archive/1/334070/2003-08-18/2003-08-24/2 | | 402 | unzip<5.50nb2 weak-path-validation http://www.securityfocus.com/archive/1/334070/2003-08-18/2003-08-24/2 |
403 | xmule-[0-9]* remote-user-shell http://lists.netsys.com/pipermail/full-disclosure/2003-August/008449.html | | 403 | xmule-[0-9]* remote-user-shell http://lists.netsys.com/pipermail/full-disclosure/2003-August/008449.html |
404 | sendmail-8.12.[0-8]nb* denial-of-service http://www.sendmail.org/dnsmap1.html | | 404 | sendmail-8.12.[0-8]nb* denial-of-service http://www.sendmail.org/dnsmap1.html |
405 | exim<3.36 remote-code-execution http://www.exim.org/pipermail/exim-announce/2003q3/000094.html | | 405 | exim<3.36 remote-code-execution http://www.exim.org/pipermail/exim-announce/2003q3/000094.html |
406 | exim>=4<4.22 remote-code-execution http://www.exim.org/pipermail/exim-announce/2003q3/000094.html | | 406 | exim>=4<4.22 remote-code-execution http://www.exim.org/pipermail/exim-announce/2003q3/000094.html |
407 | leafnode<1.9.42 denial-of-service http://www.securityfocus.com/archive/1/336186 | | 407 | leafnode<1.9.42 denial-of-service http://www.securityfocus.com/archive/1/336186 |
408 | p5-Apache-Gallery<0.7 local-user-shell http://www.securityfocus.com/archive/1/336583/2003-09-06/2003-09-12/0 | | 408 | p5-Apache-Gallery<0.7 local-user-shell http://www.securityfocus.com/archive/1/336583/2003-09-06/2003-09-12/0 |
409 | pine<4.58 remote-code-execution http://www.idefense.com/advisory/09.10.03.txt | | 409 | pine<4.58 remote-code-execution http://www.idefense.com/advisory/09.10.03.txt |
410 | net-snmp<5.0.9 privacy-leak http://sourceforge.net/forum/forum.php?forum_id=308015 | | 410 | net-snmp<5.0.9 privacy-leak http://sourceforge.net/forum/forum.php?forum_id=308015 |
411 | gtkhtml<1.1.10 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0541 | | 411 | gtkhtml<1.1.10 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0541 |
412 | sane-backends<1.0.11 weak-authentication http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0773 | | 412 | sane-backends<1.0.11 weak-authentication http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0773 |
413 | sane-backends<1.0.11 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0774 | | 413 | sane-backends<1.0.11 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0774 |
414 | sane-backends<1.0.11 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0775 | | 414 | sane-backends<1.0.11 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0775 |
415 | sane-backends<1.0.11 unknown http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0776 | | 415 | sane-backends<1.0.11 unknown http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0776 |
416 | sane-backends<1.0.11 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0777 | | 416 | sane-backends<1.0.11 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0777 |
417 | sane-backends<1.0.11 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0778 | | 417 | sane-backends<1.0.11 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0778 |
418 | apache<1.3.28 denial-of-service http://www.kb.cert.org/vuls/id/379828 | | 418 | apache<1.3.28 denial-of-service http://www.kb.cert.org/vuls/id/379828 |
419 | apache6<1.3.28 denial-of-service http://www.kb.cert.org/vuls/id/379828 | | 419 | apache6<1.3.28 denial-of-service http://www.kb.cert.org/vuls/id/379828 |
420 | mysql-server<3.23.49nb5 remote-code-execution http://lists.netsys.com/pipermail/full-disclosure/2003-September/009819.html | | 420 | mysql-server<3.23.49nb5 remote-code-execution http://lists.netsys.com/pipermail/full-disclosure/2003-September/009819.html |
421 | openssh<3.7.1 denial-of-service http://www.openssh.org/txt/buffer.adv | | 421 | openssh<3.7.1 denial-of-service http://www.openssh.org/txt/buffer.adv |
422 | openssh+gssapi<3.6.1.2.20030430nb2 denial-of-service http://www.openssh.org/txt/buffer.adv | | 422 | openssh+gssapi<3.6.1.2.20030430nb2 denial-of-service http://www.openssh.org/txt/buffer.adv |
423 | sendmail<8.12.10 unknown http://www.sendmail.org/8.12.10.html | | 423 | sendmail<8.12.10 unknown http://www.sendmail.org/8.12.10.html |
424 | thttpd<2.23.0.1nb1 remote-code-execution http://marc.theaimsgroup.com/?l=thttpd&m=106402145912879&w=2 | | 424 | thttpd<2.23.0.1nb1 remote-code-execution http://marc.theaimsgroup.com/?l=thttpd&m=106402145912879&w=2 |
425 | openssh<3.7.1.2 remote-code-execution http://www.openssh.com/txt/sshpam.adv | | 425 | openssh<3.7.1.2 remote-code-execution http://www.openssh.com/txt/sshpam.adv |
426 | proftpd<1.2.8nb2 remote-root-shell http://xforce.iss.net/xforce/alerts/id/154 | | 426 | proftpd<1.2.8nb2 remote-root-shell http://xforce.iss.net/xforce/alerts/id/154 |
427 | cfengine-2.0.[0-7]* remote-code-execution http://www.securityfocus.com/archive/1/339083/2003-09-22/2003-09-28/0 | | 427 | cfengine-2.0.[0-7]* remote-code-execution http://www.securityfocus.com/archive/1/339083/2003-09-22/2003-09-28/0 |
428 | mplayer<1.0rc1nb1 remote-code-execution http://www.mplayerhq.hu/homepage/news.html#vuln01 | | 428 | mplayer<1.0rc1nb1 remote-code-execution http://www.mplayerhq.hu/homepage/news.html#vuln01 |
429 | gmplayer<1.0rc1nb1 remote-code-execution http://www.mplayerhq.hu/homepage/news.html#vuln01 | | 429 | gmplayer<1.0rc1nb1 remote-code-execution http://www.mplayerhq.hu/homepage/news.html#vuln01 |
430 | marbles<1.0.2nb3 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0830 | | 430 | marbles<1.0.2nb3 local-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0830 |
431 | ncftp3<3.1.6 remote-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1345 | | 431 | ncftp3<3.1.6 remote-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-1345 |
432 | openssl<0.9.6k remote-root-shell http://www.openssl.org/news/secadv_20030930.txt | | 432 | openssl<0.9.6k remote-root-shell http://www.openssl.org/news/secadv_20030930.txt |
433 | vmware3<3.2.1pl1 local-root-shell http://marc.theaimsgroup.com/?l=gentoo-announce&m=106181867621048&w=2 | | 433 | vmware3<3.2.1pl1 local-root-shell http://marc.theaimsgroup.com/?l=gentoo-announce&m=106181867621048&w=2 |
434 | fetchmail<6.2.4nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0790 | | 434 | fetchmail<6.2.4nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0790 |
435 | kdelibs<2.2.2 denial-of-service http://www.kde.org/info/security/ | | 435 | kdelibs<2.2.2 denial-of-service http://www.kde.org/info/security/ |
436 | kdebase<2.2.2 remote-code-execution http://www.kde.org/info/security/ | | 436 | kdebase<2.2.2 remote-code-execution http://www.kde.org/info/security/ |
437 | kdebase<2.2.2 denial-of-service http://www.kde.org/info/security/ | | 437 | kdebase<2.2.2 denial-of-service http://www.kde.org/info/security/ |
438 | kdebase<2.2.2 remote-code-execution http://www.kde.org/info/security/ | | 438 | kdebase<2.2.2 remote-code-execution http://www.kde.org/info/security/ |
439 | silc-client<0.9.13 denial-of-service http://silcnet.org/txt/security_20031016_1.txt | | 439 | silc-client<0.9.13 denial-of-service http://silcnet.org/txt/security_20031016_1.txt |
440 | silc-server<0.9.14 denial-of-service http://silcnet.org/txt/security_20031016_1.txt | | 440 | silc-server<0.9.14 denial-of-service http://silcnet.org/txt/security_20031016_1.txt |
441 | sylpheed-claws-0.9.4{,nb1} denial-of-service http://www.guninski.com/sylph.html | | 441 | sylpheed-claws-0.9.4{,nb1} denial-of-service http://www.guninski.com/sylph.html |
442 | vtun<2.6nb1 privacy-leak ftp://ftp.netbsd.org/pub/NetBSD/packages/distfiles/LOCAL_PORTS/vtun-26to30.patch | | 442 | vtun<2.6nb1 privacy-leak ftp://ftp.netbsd.org/pub/NetBSD/packages/distfiles/LOCAL_PORTS/vtun-26to30.patch |
443 | libnids<=1.17 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0850 | | 443 | libnids<=1.17 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0850 |
444 | apache<1.3.28nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542 | | 444 | apache<1.3.28nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542 |
445 | apache6<1.3.28nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542 | | 445 | apache6<1.3.28nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542 |
446 | apache-2.0.[0-3][0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0254 | | 446 | apache-2.0.[0-3][0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0254 |
447 | apache-2.0.4[0-7] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0254 | | 447 | apache-2.0.4[0-7] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0254 |
448 | sun-{jre,jdk}13<1.0.9 privilege-escalation http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57221&zone_32=category%3Asecurity | | 448 | sun-{jre,jdk}13<1.0.9 privilege-escalation http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57221&zone_32=category%3Asecurity |
449 | sun-{jre,jdk}14<2.0 privilege-escalation http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57221&zone_32=category%3Asecurity | | 449 | sun-{jre,jdk}14<2.0 privilege-escalation http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2F57221&zone_32=category%3Asecurity |
450 | thttpd<2.24 remote-code-execution http://www.texonet.com/advisories/TEXONET-20030908.txt | | 450 | thttpd<2.24 remote-code-execution http://www.texonet.com/advisories/TEXONET-20030908.txt |
451 | coreutils<5.0nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0853 | | 451 | coreutils<5.0nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0853 |
452 | coreutils<5.0nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0854 | | 452 | coreutils<5.0nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0854 |
453 | hylafax<4.1.8 remote-code-execution http://www.securiteam.com/unixfocus/6O00D0K8UI.html | | 453 | hylafax<4.1.8 remote-code-execution http://www.securiteam.com/unixfocus/6O00D0K8UI.html |
454 | quagga<0.96.3nb1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0795 | | 454 | quagga<0.96.3nb1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0795 |
455 | zebra<0.93bnb1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0795 | | 455 | zebra<0.93bnb1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0795 |
456 | pan<0.13.4 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0855 | | 456 | pan<0.13.4 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0855 |
457 | ethereal<0.9.15 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00011.html | | 457 | ethereal<0.9.15 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00011.html |
458 | mozilla{,-bin}<1.5 remote-code-execution http://www.mozilla.org/projects/security/known-vulnerabilities.html | | 458 | mozilla{,-bin}<1.5 remote-code-execution http://www.mozilla.org/projects/security/known-vulnerabilities.html |
459 | screen<4.0.1nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0972 | | 459 | screen<4.0.1nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0972 |
460 | gnupg<1.2.3nb2 weak-authentication http://lists.gnupg.org/pipermail/gnupg-announce/2003q4/000276.html | | 460 | gnupg<1.2.3nb2 weak-authentication http://lists.gnupg.org/pipermail/gnupg-announce/2003q4/000276.html |
461 | rsync<2.5.7 remote-user-shell http://www.mail-archive.com/rsync@lists.samba.org/msg08782.html | | 461 | rsync<2.5.7 remote-user-shell http://www.mail-archive.com/rsync@lists.samba.org/msg08782.html |
462 | audit-packages<1.26 no-exploit-but-less-integrity-so-please-upgrade http://mail-index.netbsd.org/tech-pkg/2003/11/30/0001.html | | 462 | audit-packages<1.26 no-exploit-but-less-integrity-so-please-upgrade http://mail-index.netbsd.org/tech-pkg/2003/11/30/0001.html |
463 | cvs<1.11.10 remote-file-write https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=84 | | 463 | cvs<1.11.10 remote-file-write https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=84 |
464 | lftp<2.6.10 remote-code-execution http://lists.netsys.com/pipermail/full-disclosure/2003-December/014824.html | | 464 | lftp<2.6.10 remote-code-execution http://lists.netsys.com/pipermail/full-disclosure/2003-December/014824.html |
465 | opera<7.23 remote-file-delete http://opera.rainyblue.org/modules/cjaycontent/index.php?id=1 | | 465 | opera<7.23 remote-file-delete http://opera.rainyblue.org/modules/cjaycontent/index.php?id=1 |
466 | mgetty+sendfax<=1.1.30 file-permissions http://mail-index.netbsd.org/tech-pkg/2003/11/18/0003.html | | 466 | mgetty+sendfax<=1.1.30 file-permissions http://mail-index.netbsd.org/tech-pkg/2003/11/18/0003.html |
467 | cvs<1.11.11 privilege-escalation https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=88 | | 467 | cvs<1.11.11 privilege-escalation https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=88 |
468 | ethereal<0.10.0 denial-of-service http://www.ethereal.com/appnotes/enpa-sa-00012.html | | 468 | ethereal<0.10.0 denial-of-service http://www.ethereal.com/appnotes/enpa-sa-00012.html |
469 | bind<8.4.3 cache-poisoning http://www.kb.cert.org/vuls/id/734644 | | 469 | bind<8.4.3 cache-poisoning http://www.kb.cert.org/vuls/id/734644 |
470 | mpg321<0.2.10nb3 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0969 | | 470 | mpg321<0.2.10nb3 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0969 |
471 | mailman<2.1.4 cross-site-scripting http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0965 | | 471 | mailman<2.1.4 cross-site-scripting http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0965 |
472 | racoon<20040116a remote-sa-delete http://www.securityfocus.com/archive/1/349756 | | 472 | racoon<20040116a remote-sa-delete http://www.securityfocus.com/archive/1/349756 |
473 | gaim<0.75nb1 remote-code-execution http://security.e-matters.de/advisories/012004.html | | 473 | gaim<0.75nb1 remote-code-execution http://security.e-matters.de/advisories/012004.html |
474 | freeradius<0.9.3 denial-of-service http://www.freeradius.org/security.html#0.9.2 | | 474 | freeradius<0.9.3 denial-of-service http://www.freeradius.org/security.html#0.9.2 |
475 | libtool-base<1.5.2nb3 local-symlink-race http://www.securityfocus.com/archive/1/352519 | | 475 | libtool-base<1.5.2nb3 local-symlink-race http://www.securityfocus.com/archive/1/352519 |
476 | jitterbug<1.6.2nb1 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0028 | | 476 | jitterbug<1.6.2nb1 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0028 |
477 | mpg123<0.59.18nb3 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0865 | | 477 | mpg123<0.59.18nb3 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0865 |
478 | mpg123-esound<0.59.18nb1 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0865 | | 478 | mpg123-esound<0.59.18nb1 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0865 |
479 | mpg123-nas<0.59.18nb3 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0865 | | 479 | mpg123-nas<0.59.18nb3 remote-user-shell http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0865 |
480 | clamav<0.66 denial-of-service http://www.securityfocus.com/archive/1/353186 | | 480 | clamav<0.66 denial-of-service http://www.securityfocus.com/archive/1/353186 |
481 | mutt<1.4.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0078 | | 481 | mutt<1.4.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0078 |
482 | metamail<2.7nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0104 | | 482 | metamail<2.7nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0104 |
483 | xboing<2.4nb2 privilege-escalation http://www.debian.org/security/2004/dsa-451 | | 483 | xboing<2.4nb2 privilege-escalation http://www.debian.org/security/2004/dsa-451 |
484 | libxml2<2.6.6 remote-user-shell http://lists.gnome.org/archives/xml/2004-February/msg00070.html | | 484 | libxml2<2.6.6 remote-user-shell http://lists.gnome.org/archives/xml/2004-February/msg00070.html |
485 | automake<1.8.3 privilege-escalation http://www.securityfocus.com/archive/1/356574/2004-03-05/2004-03-11/2 | | 485 | automake<1.8.3 privilege-escalation http://www.securityfocus.com/archive/1/356574/2004-03-05/2004-03-11/2 |
486 | apache-2.0.? denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113 | | 486 | apache-2.0.? denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113 |
487 | apache-2.0.[0-3][0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113 | | 487 | apache-2.0.[0-3][0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113 |
488 | apache-2.0.4[0-8] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113 | | 488 | apache-2.0.4[0-8] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113 |
489 | apache-2.0.? denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 | | 489 | apache-2.0.? denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 |
490 | apache-2.0.[0-3][0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 | | 490 | apache-2.0.[0-3][0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 |
491 | apache-2.0.4[0-8] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 | | 491 | apache-2.0.4[0-8] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 |
492 | apache-2.0.? remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 | | 492 | apache-2.0.? remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 |
493 | apache-2.0.[0-3][0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 | | 493 | apache-2.0.[0-3][0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 |
494 | apache-2.0.4[0-8] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 | | 494 | apache-2.0.4[0-8] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 |
495 | apache<1.3.29nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 | | 495 | apache<1.3.29nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 |
496 | apache6<1.3.29nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 | | 496 | apache6<1.3.29nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 |
497 | gdk-pixbuf<0.20 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0111 | | 497 | gdk-pixbuf<0.20 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0111 |
498 | openssl<0.9.6l denial-of-service http://www.openssl.org/news/secadv_20031104.txt | | 498 | openssl<0.9.6l denial-of-service http://www.openssl.org/news/secadv_20031104.txt |
499 | openssl<0.9.6m denial-of-service http://www.openssl.org/news/secadv_20040317.txt | | 499 | openssl<0.9.6m denial-of-service http://www.openssl.org/news/secadv_20040317.txt |
500 | isakmpd<=20030903nb1 denial-of-service http://www.rapid7.com/advisories/R7-0018.html | | 500 | isakmpd<=20030903nb1 denial-of-service http://www.rapid7.com/advisories/R7-0018.html |
501 | ghostscript-gnu<7.07 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0354 | | 501 | ghostscript-gnu<7.07 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0354 |
502 | ghostscript-gnu-nox11<7.07 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0354 | | 502 | ghostscript-gnu-nox11<7.07 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0354 |
503 | ghostscript-gnu-x11<7.07 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0354 | | 503 | ghostscript-gnu-x11<7.07 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0354 |
504 | python22<2.2.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0150 | | 504 | python22<2.2.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0150 |
505 | python22-pth<2.2.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0150 | | 505 | python22-pth<2.2.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0150 |
506 | squid<2.5.5 weak-acl-enforcement http://www.squid-cache.org/Advisories/SQUID-2004_1.txt | | 506 | squid<2.5.5 weak-acl-enforcement http://www.squid-cache.org/Advisories/SQUID-2004_1.txt |
507 | ethereal<0.10.3 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00013.html | | 507 | ethereal<0.10.3 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00013.html |
508 | mplayer<1.0rc3nb2 remote-code-execution http://www.securityfocus.com/archive/1/359025 | | 508 | mplayer<1.0rc3nb2 remote-code-execution http://www.securityfocus.com/archive/1/359025 |
509 | gmplayer<1.0rc3nb2 remote-code-execution http://www.securityfocus.com/archive/1/359025 | | 509 | gmplayer<1.0rc3nb2 remote-code-execution http://www.securityfocus.com/archive/1/359025 |
510 | mencoder<1.0rc3nb2 remote-code-execution http://www.securityfocus.com/archive/1/359025 | | 510 | mencoder<1.0rc3nb2 remote-code-execution http://www.securityfocus.com/archive/1/359025 |
511 | heimdal<0.6.1 remote-trust http://www.pdc.kth.se/heimdal/advisory/2004-04-01/ | | 511 | heimdal<0.6.1 remote-trust http://www.pdc.kth.se/heimdal/advisory/2004-04-01/ |
512 | uulib<0.5.20 archive-code-execution http://www.securityfocus.com/bid/9758 | | 512 | uulib<0.5.20 archive-code-execution http://www.securityfocus.com/bid/9758 |
513 | racoon<20040408a weak-authentication http://www.vuxml.org/freebsd/d8769838-8814-11d8-90d1-0020ed76ef5a.html | | 513 | racoon<20040408a weak-authentication http://www.vuxml.org/freebsd/d8769838-8814-11d8-90d1-0020ed76ef5a.html |
514 | xchat<1.8.11nb7 remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html | | 514 | xchat<1.8.11nb7 remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html |
515 | xchat-2.0.[0-7] remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html | | 515 | xchat-2.0.[0-7] remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html |
516 | xchat-2.0.[0-7]nb* remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html | | 516 | xchat-2.0.[0-7]nb* remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html |
517 | xchat-2.0.8 remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html | | 517 | xchat-2.0.8 remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html |
518 | xchat-2.0.8nb1 remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html | | 518 | xchat-2.0.8nb1 remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html |
519 | xchat-gnome<1.8.11nb7 remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html | | 519 | xchat-gnome<1.8.11nb7 remote-code-execution http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html |
520 | cvs<1.11.15 remote-file-write https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=102 | | 520 | cvs<1.11.15 remote-file-write https://ccvs.cvshome.org/servlets/NewsItemView?newsItemID=102 |
521 | neon<0.24.5 unknown http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179 | | 521 | neon<0.24.5 unknown http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0179 |
522 | tla<1.2.1rc1 remote-code-execution http://marc.theaimsgroup.com/?l=openpkg-announce&m=108213423102539&w=2 | | 522 | tla<1.2.1rc1 remote-code-execution http://marc.theaimsgroup.com/?l=openpkg-announce&m=108213423102539&w=2 |
523 | cadaver<0.22.1 remote-code-execution http://marc.theaimsgroup.com/?l=openpkg-announce&m=108213423102539&w=2 | | 523 | cadaver<0.22.1 remote-code-execution http://marc.theaimsgroup.com/?l=openpkg-announce&m=108213423102539&w=2 |
524 | lha<1.14i local-code-execution http://www2m.biglobe.ne.jp/~dolphin/lha/lha-unix.htm | | 524 | lha<1.14i local-code-execution http://www2m.biglobe.ne.jp/~dolphin/lha/lha-unix.htm |
525 | mplayer>=1.0rc0<1.0rc4 remote-code-execution http://www.mplayerhq.hu/homepage/design6/news.html | | 525 | mplayer>=1.0rc0<1.0rc4 remote-code-execution http://www.mplayerhq.hu/homepage/design6/news.html |
526 | xine-lib-1rc[0-2]* remote-file-write http://www.xinehq.de/index.php/security/XSA-2004-1 | | 526 | xine-lib-1rc[0-2]* remote-file-write http://www.xinehq.de/index.php/security/XSA-2004-1 |
527 | xine-lib-1rc3[ab]* remote-file-write http://www.xinehq.de/index.php/security/XSA-2004-1 | | 527 | xine-lib-1rc3[ab]* remote-file-write http://www.xinehq.de/index.php/security/XSA-2004-1 |
528 | rsync<2.6.1 remote-file-write http://rsync.samba.org/#security_apr04 | | 528 | rsync<2.6.1 remote-file-write http://rsync.samba.org/#security_apr04 |
529 | exim<3.36nb2 remote-code-execution http://www.guninski.com/exim1.html | | 529 | exim<3.36nb2 remote-code-execution http://www.guninski.com/exim1.html |
530 | exim>=4<4.30 remote-code-execution http://www.guninski.com/exim1.html | | 530 | exim>=4<4.30 remote-code-execution http://www.guninski.com/exim1.html |
531 | exim-exiscan-4.[0-2]* remote-code-execution http://www.guninski.com/exim1.html | | 531 | exim-exiscan-4.[0-2]* remote-code-execution http://www.guninski.com/exim1.html |
532 | pine<4.58nb4 local-symlink-race http://www.NetBSD.org/cgi-bin/query-pr-single.pl?number=22226 | | 532 | pine<4.58nb4 local-symlink-race http://www.NetBSD.org/cgi-bin/query-pr-single.pl?number=22226 |
533 | xine-lib-1rc[0-3]* remote-file-write http://www.xinehq.de/index.php/security/XSA-2004-3 | | 533 | xine-lib-1rc[0-3]* remote-file-write http://www.xinehq.de/index.php/security/XSA-2004-3 |
534 | global<4.6 remote-exec http://savannah.gnu.org/forum/forum.php?forum_id=2029 | | 534 | global<4.6 remote-exec http://savannah.gnu.org/forum/forum.php?forum_id=2029 |
535 | opera<7.50 remote-file-write http://www.idefense.com/application/poi/display?id=104&type=vulnerabilities&flashstatus=true | | 535 | opera<7.50 remote-file-write http://www.idefense.com/application/poi/display?id=104&type=vulnerabilities&flashstatus=true |
536 | lha<114.9nb2 remote-code-execution http://www.securityfocus.com/bid/10243 | | 536 | lha<114.9nb2 remote-code-execution http://www.securityfocus.com/bid/10243 |
537 | apache<1.3.31 weak-authentication http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987 | | 537 | apache<1.3.31 weak-authentication http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987 |
538 | apache<1.3.31 weak-acl-enforcement http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993 | | 538 | apache<1.3.31 weak-acl-enforcement http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993 |
539 | apache<1.3.31 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 | | 539 | apache<1.3.31 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 |
540 | apache6<1.3.31 weak-authentication http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987 | | 540 | apache6<1.3.31 weak-authentication http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987 |
541 | apache6<1.3.31 weak-acl-enforcement http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993 | | 541 | apache6<1.3.31 weak-acl-enforcement http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993 |
542 | apache6<1.3.31 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 | | 542 | apache6<1.3.31 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174 |
543 | kdelibs<3.2.2nb2 remote-file-write http://www.kde.org/info/security/advisory-20040517-1.txt | | 543 | kdelibs<3.2.2nb2 remote-file-write http://www.kde.org/info/security/advisory-20040517-1.txt |
544 | subversion-base<1.0.3 denial-of-service http://subversion.tigris.org/servlets/ReadMsg?list=announce&msgNo=125 | | 544 | subversion-base<1.0.3 denial-of-service http://subversion.tigris.org/servlets/ReadMsg?list=announce&msgNo=125 |
545 | subversion-base<1.0.3 remote-code-execution http://subversion.tigris.org/servlets/ReadMsg?list=announce&msgNo=125 | | 545 | subversion-base<1.0.3 remote-code-execution http://subversion.tigris.org/servlets/ReadMsg?list=announce&msgNo=125 |
546 | ap{2,22}-subversion<1.0.3 denial-of-service http://subversion.tigris.org/servlets/ReadMsg?list=announce&msgNo=125 | | 546 | ap{2,22}-subversion<1.0.3 denial-of-service http://subversion.tigris.org/servlets/ReadMsg?list=announce&msgNo=125 |
547 | ap{2,22}-subversion<1.0.3 remote-code-execution http://subversion.tigris.org/servlets/ReadMsg?list=announce&msgNo=125 | | 547 | ap{2,22}-subversion<1.0.3 remote-code-execution http://subversion.tigris.org/servlets/ReadMsg?list=announce&msgNo=125 |
548 | neon<0.24.6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398 | | 548 | neon<0.24.6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398 |
549 | cvs-1.11.[0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0396 | | 549 | cvs-1.11.[0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0396 |
550 | cvs-1.11.1[0-5] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0396 | | 550 | cvs-1.11.1[0-5] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0396 |
551 | cadaver<0.22.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398 | | 551 | cadaver<0.22.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0398 |
552 | ap-ssl<2.8.18 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0488 | | 552 | ap-ssl<2.8.18 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0488 |
553 | squirrelmail<1.4.3 cross-site-scripting http://www.securityfocus.com/bid/10246/ | | 553 | squirrelmail<1.4.3 cross-site-scripting http://www.securityfocus.com/bid/10246/ |
554 | ethereal<0.10.4 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00014.html | | 554 | ethereal<0.10.4 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00014.html |
555 | apache-2.0.49{,nb1} remote-code-execution http://www.securityfocus.com/bid/10355 | | 555 | apache-2.0.49{,nb1} remote-code-execution http://www.securityfocus.com/bid/10355 |
556 | roundup<0.7.3 remote-file-read http://cvs.sourceforge.net/viewcvs.py/*checkout*/roundup/roundup/CHANGES.txt?rev=1.533.2.21 | | 556 | roundup<0.7.3 remote-file-read http://cvs.sourceforge.net/viewcvs.py/*checkout*/roundup/roundup/CHANGES.txt?rev=1.533.2.21 |
557 | cvs-1.11.[0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416 | | 557 | cvs-1.11.[0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416 |
558 | cvs-1.11.[0-9]nb* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416 | | 558 | cvs-1.11.[0-9]nb* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416 |
559 | cvs-1.11.1[0-6]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416 | | 559 | cvs-1.11.1[0-6]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0416 |
560 | subversion-base<1.0.5 denial-of-service http://www.contactor.se/~dast/svn/archive-2004-06/0331.shtml | | 560 | subversion-base<1.0.5 denial-of-service http://www.contactor.se/~dast/svn/archive-2004-06/0331.shtml |
561 | racoon<20040617a weak-authentication http://www.securitytracker.com/alerts/2004/Jun/1010495.html | | 561 | racoon<20040617a weak-authentication http://www.securitytracker.com/alerts/2004/Jun/1010495.html |
562 | mit-krb5<1.3.4 remote-code-execution http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-001-an_to_ln.txt | | 562 | mit-krb5<1.3.4 remote-code-execution http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2004-001-an_to_ln.txt |
563 | imp<3.2.4 cross-site-scripting http://securityfocus.com/bid/10501/info/ | | 563 | imp<3.2.4 cross-site-scripting http://securityfocus.com/bid/10501/info/ |
564 | gmplayer<1.0rc4nb2 remote-code-execution http://www.open-security.org/advisories/5 | | 564 | gmplayer<1.0rc4nb2 remote-code-execution http://www.open-security.org/advisories/5 |
565 | ethereal<0.10.5 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00015.html | | 565 | ethereal<0.10.5 remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00015.html |
566 | courier-auth<0.45 remote-code-execution http://www.securityfocus.com/bid/9845 | | 566 | courier-auth<0.45 remote-code-execution http://www.securityfocus.com/bid/9845 |
567 | courier-imap<3.0.0 remote-code-execution http://www.securityfocus.com/bid/9845 | | 567 | courier-imap<3.0.0 remote-code-execution http://www.securityfocus.com/bid/9845 |
568 | sqwebmail<4.0.0 remote-code-execution http://www.securityfocus.com/bid/9845 | | 568 | sqwebmail<4.0.0 remote-code-execution http://www.securityfocus.com/bid/9845 |
569 | ap-ssl<2.8.19 remote-code-execution http://www.mail-archive.com/modssl-users@modssl.org/msg16853.html | | 569 | ap-ssl<2.8.19 remote-code-execution http://www.mail-archive.com/modssl-users@modssl.org/msg16853.html |
570 | ap{2,22}-subversion<1.0.6 weak-acl-enforcement http://www.contactor.se/~dast/svn/archive-2004-07/0814.shtml | | 570 | ap{2,22}-subversion<1.0.6 weak-acl-enforcement http://www.contactor.se/~dast/svn/archive-2004-07/0814.shtml |
571 | samba<2.2.10 remote-code-execution http://www.samba.org/samba/whatsnew/samba-2.2.10.html | | 571 | samba<2.2.10 remote-code-execution http://www.samba.org/samba/whatsnew/samba-2.2.10.html |
572 | samba-3.0.[0-4]{,a*,nb?} remote-code-execution http://www.samba.org/samba/whatsnew/samba-3.0.5.html | | 572 | samba-3.0.[0-4]{,a*,nb?} remote-code-execution http://www.samba.org/samba/whatsnew/samba-3.0.5.html |
573 | ja-samba<2.2.9.1.0nb1 remote-code-execution http://www.samba.org/samba/whatsnew/samba-2.2.10.html | | 573 | ja-samba<2.2.9.1.0nb1 remote-code-execution http://www.samba.org/samba/whatsnew/samba-2.2.10.html |
574 | acroread5<5.09 arbitrary-code-execution http://kb2.adobe.com/cps/322/322914.html | | 574 | acroread5<5.09 arbitrary-code-execution http://kb2.adobe.com/cps/322/322914.html |
575 | png<1.2.6rc1 remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt | | 575 | png<1.2.6rc1 remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt |
576 | suse{,32}_libpng-7.3{,nb1} remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt | | 576 | suse{,32}_libpng-7.3{,nb1} remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt |
577 | suse{,32}_libpng-9.1 remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt | | 577 | suse{,32}_libpng-9.1 remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt |
578 | suse{,32}_libpng<=6.4 remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt | | 578 | suse{,32}_libpng<=6.4 remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt |
579 | mozilla{,-gtk2}{,-bin}<1.7.2 ssl-certificate-spoofing http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 | | 579 | mozilla{,-gtk2}{,-bin}<1.7.2 ssl-certificate-spoofing http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 |
580 | mozilla{,-gtk2}{,-bin}<1.7.2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 | | 580 | mozilla{,-gtk2}{,-bin}<1.7.2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 |
581 | MozillaFirebird{,-gtk2}{,-bin}<0.9.3 ssl-certificate-spoofing http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 | | 581 | MozillaFirebird{,-gtk2}{,-bin}<0.9.3 ssl-certificate-spoofing http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 |
582 | firefox{,-gtk2}{,-bin}<0.9.3 ssl-certificate-spoofing http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 | | 582 | firefox{,-gtk2}{,-bin}<0.9.3 ssl-certificate-spoofing http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 |
583 | MozillaFirebird{,-gtk2}{,-bin}<0.9.3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 | | 583 | MozillaFirebird{,-gtk2}{,-bin}<0.9.3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 |
584 | firefox{,-gtk2}{,-bin}<0.9.3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 | | 584 | firefox{,-gtk2}{,-bin}<0.9.3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 |
585 | thunderbird{,-gtk2}{,-bin}<0.7.2 ssl-certificate-spoofing http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 | | 585 | thunderbird{,-gtk2}{,-bin}<0.7.2 ssl-certificate-spoofing http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0763 |
586 | thunderbird{,-gtk2}{,-bin}<0.7.2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 | | 586 | thunderbird{,-gtk2}{,-bin}<0.7.2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0758 |
587 | cfengine-2.0.* remote-code-execution http://www.securityfocus.org/advisories/7045 | | 587 | cfengine-2.0.* remote-code-execution http://www.securityfocus.org/advisories/7045 |
588 | cfengine-2.1.[0-7] remote-code-execution http://www.securityfocus.org/advisories/7045 | | 588 | cfengine-2.1.[0-7] remote-code-execution http://www.securityfocus.org/advisories/7045 |
589 | spamassassin<2.64 denial-of-service http://marc.theaimsgroup.com/?l=spamassassin-announce&m=109168121628767&w=2 | | 589 | spamassassin<2.64 denial-of-service http://marc.theaimsgroup.com/?l=spamassassin-announce&m=109168121628767&w=2 |
590 | kdelibs<3.2.3nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0689 | | 590 | kdelibs<3.2.3nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0689 |
591 | kdelibs<3.2.3nb2 local-account-compromise http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0690 | | 591 | kdelibs<3.2.3nb2 local-account-compromise http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0690 |
592 | kdelibs<3.2.3nb2 http-frame-spoof http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721 | | 592 | kdelibs<3.2.3nb2 http-frame-spoof http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721 |
593 | kdebase<3.2.3nb1 http-frame-spoof http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721 | | 593 | kdebase<3.2.3nb1 http-frame-spoof http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0721 |
594 | opera<7.54 remote-file-read http://www.greymagic.com/security/advisories/gm008-op/ | | 594 | opera<7.54 remote-file-read http://www.greymagic.com/security/advisories/gm008-op/ |
595 | opera<7.54 www-address-spoof http://secunia.com/advisories/12162/ | | 595 | opera<7.54 www-address-spoof http://secunia.com/advisories/12162/ |
596 | rsync<2.6.2nb1 remote-file-access http://samba.org/rsync/#security_aug04 | | 596 | rsync<2.6.2nb1 remote-file-access http://samba.org/rsync/#security_aug04 |
597 | lukemftpd-[0-9]* remote-root-access ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-009.txt.asc | | 597 | lukemftpd-[0-9]* remote-root-access ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-009.txt.asc |
598 | tnftpd<20040810 remote-root-access ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-009.txt.asc | | 598 | tnftpd<20040810 remote-root-access ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-009.txt.asc |
599 | demime<1.1d denial-of-service http://scifi.squawk.com/demime.html | | 599 | demime<1.1d denial-of-service http://scifi.squawk.com/demime.html |
600 | kdelibs<3.2.3nb2 www-session-fixation http://www.kde.org/info/security/advisory-20040823-1.txt | | 600 | kdelibs<3.2.3nb2 www-session-fixation http://www.kde.org/info/security/advisory-20040823-1.txt |
601 | fidogate<4.4.9nb1 local-file-write http://sourceforge.net/tracker/index.php?func=detail&aid=1013726&group_id=10739&atid=310739 | | 601 | fidogate<4.4.9nb1 local-file-write http://sourceforge.net/tracker/index.php?func=detail&aid=1013726&group_id=10739&atid=310739 |
602 | qt3-libs<3.3.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0691 | | 602 | qt3-libs<3.3.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0691 |
603 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=0 | | 603 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=0 |
604 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=1 | | 604 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=1 |
605 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=2 | | 605 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=2 |
606 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=3 | | 606 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=3 |
607 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=4 | | 607 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=4 |
608 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=5 | | 608 | gaim<0.82 remote-code-execution http://gaim.sourceforge.net/security/index.php?id=5 |
609 | gaim<0.82 denial-of-service http://gaim.sourceforge.net/security/index.php?id=6 | | 609 | gaim<0.82 denial-of-service http://gaim.sourceforge.net/security/index.php?id=6 |
610 | zlib<1.2.1nb2 denial-of-service http://www.openpkg.org/security/OpenPKG-SA-2004.038-zlib.html | | 610 | zlib<1.2.1nb2 denial-of-service http://www.openpkg.org/security/OpenPKG-SA-2004.038-zlib.html |
611 | imlib2<1.1.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0802 | | 611 | imlib2<1.1.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0802 |
612 | mit-krb5<1.3.4nb2 remote-code-execution http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-002-dblfree.txt | | 612 | mit-krb5<1.3.4nb2 remote-code-execution http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-002-dblfree.txt |
613 | mit-krb5<1.3.4nb2 denial-of-service http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-003-asn1.txt | | 613 | mit-krb5<1.3.4nb2 denial-of-service http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-003-asn1.txt |
614 | mpg123<0.59.18nb4 remote-user-shell http://www.securityfocus.com/archive/1/374433 | | 614 | mpg123<0.59.18nb4 remote-user-shell http://www.securityfocus.com/archive/1/374433 |
615 | mpg123-esound<0.59.18nb2 remote-user-shell http://www.securityfocus.com/archive/1/374433 | | 615 | mpg123-esound<0.59.18nb2 remote-user-shell http://www.securityfocus.com/archive/1/374433 |
616 | mpg123-nas<0.59.18nb4 remote-user-shell http://www.securityfocus.com/archive/1/374433 | | 616 | mpg123-nas<0.59.18nb4 remote-user-shell http://www.securityfocus.com/archive/1/374433 |
617 | apache-2.0.[0-4]* denial-of-service http://issues.apache.org/bugzilla/show_bug.cgi?id=29964 | | 617 | apache-2.0.[0-4]* denial-of-service http://issues.apache.org/bugzilla/show_bug.cgi?id=29964 |
618 | apache-2.0.50 denial-of-service http://issues.apache.org/bugzilla/show_bug.cgi?id=29964 | | 618 | apache-2.0.50 denial-of-service http://issues.apache.org/bugzilla/show_bug.cgi?id=29964 |
619 | apache-2.0.[0-4]* denial-of-service http://issues.apache.org/bugzilla/show_bug.cgi?id=30134 | | 619 | apache-2.0.[0-4]* denial-of-service http://issues.apache.org/bugzilla/show_bug.cgi?id=30134 |
620 | apache-2.0.50 denial-of-service http://issues.apache.org/bugzilla/show_bug.cgi?id=30134 | | 620 | apache-2.0.50 denial-of-service http://issues.apache.org/bugzilla/show_bug.cgi?id=30134 |
621 | samba-3.0.[0-6]{,nb*} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0807 | | 621 | samba-3.0.[0-6]{,nb*} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0807 |
622 | samba-3.0.[0-6]{,nb*} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0808 | | 622 | samba-3.0.[0-6]{,nb*} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0808 |
623 | heimdal<0.6.3 remote-root-access http://www.pdc.kth.se/heimdal/advisory/2004-09-13/ | | 623 | heimdal<0.6.3 remote-root-access http://www.pdc.kth.se/heimdal/advisory/2004-09-13/ |
624 | MozillaFirebird{,-gtk2}{,-bin}<0.10 remote-code-execution http://secunia.com/advisories/12526/ | | 624 | MozillaFirebird{,-gtk2}{,-bin}<0.10 remote-code-execution http://secunia.com/advisories/12526/ |
625 | firefox<0.10 remote-code-execution http://secunia.com/advisories/12526/ | | 625 | firefox<0.10 remote-code-execution http://secunia.com/advisories/12526/ |
626 | firefox-bin<0.10 remote-code-execution http://secunia.com/advisories/12526/ | | 626 | firefox-bin<0.10 remote-code-execution http://secunia.com/advisories/12526/ |
627 | firefox-gtk2<0.10 remote-code-execution http://secunia.com/advisories/12526/ | | 627 | firefox-gtk2<0.10 remote-code-execution http://secunia.com/advisories/12526/ |
628 | firefox-gtk2-bin<0.10 remote-code-execution http://secunia.com/advisories/12526/ | | 628 | firefox-gtk2-bin<0.10 remote-code-execution http://secunia.com/advisories/12526/ |
629 | mozilla<1.7.3 remote-code-execution http://secunia.com/advisories/12526/ | | 629 | mozilla<1.7.3 remote-code-execution http://secunia.com/advisories/12526/ |
630 | mozilla-bin<1.7.3 remote-code-execution http://secunia.com/advisories/12526/ | | 630 | mozilla-bin<1.7.3 remote-code-execution http://secunia.com/advisories/12526/ |
631 | mozilla-gtk2<1.7.3 remote-code-execution http://secunia.com/advisories/12526/ | | 631 | mozilla-gtk2<1.7.3 remote-code-execution http://secunia.com/advisories/12526/ |
632 | thunderbird<0.8 remote-code-execution http://secunia.com/advisories/12526/ | | 632 | thunderbird<0.8 remote-code-execution http://secunia.com/advisories/12526/ |
633 | thunderbird-bin<0.8 remote-code-execution http://secunia.com/advisories/12526/ | | 633 | thunderbird-bin<0.8 remote-code-execution http://secunia.com/advisories/12526/ |
634 | thunderbird-gtk2<0.8 remote-code-execution http://secunia.com/advisories/12526/ | | 634 | thunderbird-gtk2<0.8 remote-code-execution http://secunia.com/advisories/12526/ |
635 | xpm<3.4knb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 | | 635 | xpm<3.4knb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 |
636 | xpm<3.4knb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 | | 636 | xpm<3.4knb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 |
637 | XFree86-libs<4.4.0nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 | | 637 | XFree86-libs<4.4.0nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 |
638 | XFree86-libs<4.4.0nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 | | 638 | XFree86-libs<4.4.0nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 |
639 | xorg-libs<6.7.0nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 | | 639 | xorg-libs<6.7.0nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 |
640 | xorg-libs<6.7.0nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 | | 640 | xorg-libs<6.7.0nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 |
641 | openmotif<2.1.30nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 | | 641 | openmotif<2.1.30nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 |
642 | openmotif<2.1.30nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 | | 642 | openmotif<2.1.30nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 |
643 | sudo-1.6.8 local-file-read http://www.sudo.ws/sudo/alerts/sudoedit.html | | 643 | sudo-1.6.8 local-file-read http://www.sudo.ws/sudo/alerts/sudoedit.html |
644 | apache-2.0.[0-4]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747 | | 644 | apache-2.0.[0-4]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747 |
645 | apache-2.0.50 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747 | | 645 | apache-2.0.50 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747 |
646 | apache-2.0.50nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747 | | 646 | apache-2.0.50nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747 |
647 | gdk-pixbuf<0.22 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753 | | 647 | gdk-pixbuf<0.22 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753 |
648 | gtk2+<2.4.10 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753 | | 648 | gtk2+<2.4.10 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753 |
649 | gdk-pixbuf<0.22 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782 | | 649 | gdk-pixbuf<0.22 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782 |
650 | gtk2+<2.4.10 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782 | | 650 | gtk2+<2.4.10 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782 |
651 | gdk-pixbuf<0.22 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783 | | 651 | gdk-pixbuf<0.22 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783 |
652 | gtk2+<2.4.10 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783 | | 652 | gtk2+<2.4.10 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783 |
653 | gdk-pixbuf<0.22 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788 | | 653 | gdk-pixbuf<0.22 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788 |
654 | gtk2+<2.4.10 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788 | | 654 | gtk2+<2.4.10 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788 |
655 | wv<=1.0.0nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0645 | | 655 | wv<=1.0.0nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0645 |
656 | apache-2.0.51 weak-acl-enforcement http://nagoya.apache.org/bugzilla/show_bug.cgi?id=31315 | | 656 | apache-2.0.51 weak-acl-enforcement http://nagoya.apache.org/bugzilla/show_bug.cgi?id=31315 |
657 | apache-1.3.2[5-9]* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 | | 657 | apache-1.3.2[5-9]* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 |
658 | apache-1.3.30* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 | | 658 | apache-1.3.30* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 |
659 | apache-1.3.31{,nb[1-4]} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 | | 659 | apache-1.3.31{,nb[1-4]} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 |
660 | apache<1.3.33 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0940 | | 660 | apache<1.3.33 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0940 |
661 | apache6-1.3.2[5-9]* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 | | 661 | apache6-1.3.2[5-9]* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 |
662 | apache6-1.3.30* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 | | 662 | apache6-1.3.30* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 |
663 | apache6-1.3.31{,nb[1-4]} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 | | 663 | apache6-1.3.31{,nb[1-4]} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0492 |
664 | apache6<1.3.33 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0940 | | 664 | apache6<1.3.33 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0940 |
665 | ImageMagick<6.0.6.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0827 | | 665 | ImageMagick<6.0.6.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0827 |
666 | ap{2,22}-subversion<1.0.8 metadata-leak http://subversion.tigris.org/security/CAN-2004-0749-advisory.txt | | 666 | ap{2,22}-subversion<1.0.8 metadata-leak http://subversion.tigris.org/security/CAN-2004-0749-advisory.txt |
667 | squid<2.5.6 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0832 | | 667 | squid<2.5.6 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0832 |
668 | MozillaFirebird{,-gtk2}{,-bin}<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html | | 668 | MozillaFirebird{,-gtk2}{,-bin}<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html |
669 | firefox<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html | | 669 | firefox<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html |
670 | firefox-bin<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html | | 670 | firefox-bin<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html |
671 | firefox-gtk2<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html | | 671 | firefox-gtk2<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html |
672 | firefox-gtk2-bin<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html | | 672 | firefox-gtk2-bin<0.10.1 local-file-write http://www.mozilla.org/press/mozilla-2004-10-01-02.html |
673 | gzip-base<1.2.4b remote-code-execution http://www.securityfocus.com/bid/3712 | | 673 | gzip-base<1.2.4b remote-code-execution http://www.securityfocus.com/bid/3712 |
674 | squid<2.5.7 denial-of-service http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities | | 674 | squid<2.5.7 denial-of-service http://www.idefense.com/application/poi/display?id=152&type=vulnerabilities |
675 | tiff<3.6.1nb4 remote-code-execution http://scary.beasts.org/security/CESA-2004-006.txt | | 675 | tiff<3.6.1nb4 remote-code-execution http://scary.beasts.org/security/CESA-2004-006.txt |
676 | tiff<3.6.1nb4 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804 | | 676 | tiff<3.6.1nb4 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0804 |
677 | tiff<3.6.1nb4 denial-of-service http://securitytracker.com/id?1011674 | | 677 | tiff<3.6.1nb4 denial-of-service http://securitytracker.com/id?1011674 |
678 | ap-ssl<2.8.20 weak-acl-enforcement http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 | | 678 | ap-ssl<2.8.20 weak-acl-enforcement http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 |
679 | sox<12.17.6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0557 | | 679 | sox<12.17.6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0557 |
680 | ssmtp<2.61 remote-user-access http://lists.debian.org/debian-security-announce-2004/msg00084.html | | 680 | ssmtp<2.61 remote-user-access http://lists.debian.org/debian-security-announce-2004/msg00084.html |
681 | kdegraphics-3.2.* denial-of-service http://www.kde.org/info/security/advisory-20041021-1.txt | | 681 | kdegraphics-3.2.* denial-of-service http://www.kde.org/info/security/advisory-20041021-1.txt |
682 | kdegraphics-3.3.{0,0nb1,1} denial-of-service http://www.kde.org/info/security/advisory-20041021-1.txt | | 682 | kdegraphics-3.3.{0,0nb1,1} denial-of-service http://www.kde.org/info/security/advisory-20041021-1.txt |
683 | samba-2.2.[1-9] denial-of-service http://us1.samba.org/samba/history/samba-2.2.11.html | | 683 | samba-2.2.[1-9] denial-of-service http://us1.samba.org/samba/history/samba-2.2.11.html |
684 | samba-2.2.10 denial-of-service http://us1.samba.org/samba/history/samba-2.2.11.html | | 684 | samba-2.2.10 denial-of-service http://us1.samba.org/samba/history/samba-2.2.11.html |
685 | samba-2.2.[1-9] remote-file-access http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0815 | | 685 | samba-2.2.[1-9] remote-file-access http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0815 |
686 | samba-2.2.{10,11} remote-file-access http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0815 | | 686 | samba-2.2.{10,11} remote-file-access http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0815 |
687 | ja-samba<2.2.12.0.9.1 remote-file-access http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0815 | | 687 | ja-samba<2.2.12.0.9.1 remote-file-access http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0815 |
688 | postgresql-server-7.3.[1-7]{,nb*} local-symlink-race http://www.postgresql.org/about/news.234 | | 688 | postgresql-server-7.3.[1-7]{,nb*} local-symlink-race http://www.postgresql.org/about/news.234 |
689 | postgresql73-server-7.3.[1-7]{,nb*} local-symlink-race http://www.postgresql.org/about/news.234 | | 689 | postgresql73-server-7.3.[1-7]{,nb*} local-symlink-race http://www.postgresql.org/about/news.234 |
690 | postgresql74-server-7.4.[1-5]{,nb*} local-symlink-race http://www.postgresql.org/about/news.234 | | 690 | postgresql74-server-7.4.[1-5]{,nb*} local-symlink-race http://www.postgresql.org/about/news.234 |
691 | cabextract<1.1 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0916 | | 691 | cabextract<1.1 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0916 |
692 | mpg123<0.59.18nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0982 | | 692 | mpg123<0.59.18nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0982 |
693 | mpg123-esound<0.59.18nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0982 | | 693 | mpg123-esound<0.59.18nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0982 |
694 | mpg123-nas<0.59.18nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0982 | | 694 | mpg123-nas<0.59.18nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0982 |
695 | socat<1.4.0.3 privilege-escalation http://www.nosystem.com.ar/advisories/advisory-07.txt | | 695 | socat<1.4.0.3 privilege-escalation http://www.nosystem.com.ar/advisories/advisory-07.txt |
696 | ruby-base<1.6.8nb7 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0983 | | 696 | ruby-base<1.6.8nb7 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0983 |
697 | gnats<4 privilege-escalation http://www.securityfocus.com/archive/1/326337 | | 697 | gnats<4 privilege-escalation http://www.securityfocus.com/archive/1/326337 |
698 | mozilla<1.7.3nb2 local-file-write http://secunia.com/advisories/12956/ | | 698 | mozilla<1.7.3nb2 local-file-write http://secunia.com/advisories/12956/ |
699 | mozilla-bin<1.7.3nb1 local-file-write http://secunia.com/advisories/12956/ | | 699 | mozilla-bin<1.7.3nb1 local-file-write http://secunia.com/advisories/12956/ |
700 | mozilla-gtk2<1.7.3nb2 local-file-write http://secunia.com/advisories/12956/ | | 700 | mozilla-gtk2<1.7.3nb2 local-file-write http://secunia.com/advisories/12956/ |
701 | MozillaFirebird{,-gtk2}{,-bin}<1.0 local-file-write http://secunia.com/advisories/12956/ | | 701 | MozillaFirebird{,-gtk2}{,-bin}<1.0 local-file-write http://secunia.com/advisories/12956/ |
702 | firefox<1.0 local-file-write http://secunia.com/advisories/12956/ | | 702 | firefox<1.0 local-file-write http://secunia.com/advisories/12956/ |
703 | firefox-bin<1.0 local-file-write http://secunia.com/advisories/12956/ | | 703 | firefox-bin<1.0 local-file-write http://secunia.com/advisories/12956/ |
704 | firefox-gtk2<1.0 local-file-write http://secunia.com/advisories/12956/ | | 704 | firefox-gtk2<1.0 local-file-write http://secunia.com/advisories/12956/ |
705 | firefox-gtk2-bin<1.0 local-file-write http://secunia.com/advisories/12956/ | | 705 | firefox-gtk2-bin<1.0 local-file-write http://secunia.com/advisories/12956/ |
706 | thunderbird<0.8nb1 local-file-write http://secunia.com/advisories/12956/ | | 706 | thunderbird<0.8nb1 local-file-write http://secunia.com/advisories/12956/ |
707 | thunderbird-gtk2<0.8nb1 local-file-write http://secunia.com/advisories/12956/ | | 707 | thunderbird-gtk2<0.8nb1 local-file-write http://secunia.com/advisories/12956/ |
708 | thunderbird-bin<0.8nb1 local-file-write http://secunia.com/advisories/12956/ | | 708 | thunderbird-bin<0.8nb1 local-file-write http://secunia.com/advisories/12956/ |
709 | sudo<1.6.8pl3 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1051 | | 709 | sudo<1.6.8pl3 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1051 |
710 | gnats<4.0.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0623 | | 710 | gnats<4.0.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0623 |
711 | freeradius<1.0.1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0938 | | 711 | freeradius<1.0.1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0938 |
712 | freeradius<1.0.1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0960 | | 712 | freeradius<1.0.1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0960 |
713 | freeradius<1.0.1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0961 | | 713 | freeradius<1.0.1 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0961 |
714 | samba<2.2.12nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930 | | 714 | samba<2.2.12nb2 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930 |
715 | samba<2.2.12nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882 | | 715 | samba<2.2.12nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882 |
716 | samba<2.2.12nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154 | | 716 | samba<2.2.12nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154 |
717 | samba-3.0.[0-6]{,nb*} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930 | | 717 | samba-3.0.[0-6]{,nb*} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930 |
718 | samba-3.0.[0-7]{,nb*} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882 | | 718 | samba-3.0.[0-7]{,nb*} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882 |
719 | samba-3.0.[0-9]{,nb*} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154 | | 719 | samba-3.0.[0-9]{,nb*} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154 |
720 | ja-samba-[0-9]* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930 | | 720 | ja-samba-[0-9]* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0930 |
721 | ja-samba<2.2.12.0.9.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882 | | 721 | ja-samba<2.2.12.0.9.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0882 |
722 | ja-samba<2.2.12.0.9.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154 | | 722 | ja-samba<2.2.12.0.9.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154 |
723 | squirrelmail<1.4.3anb1 cross-site-scripting http://article.gmane.org/gmane.mail.squirrelmail.user/21169 | | 723 | squirrelmail<1.4.3anb1 cross-site-scripting http://article.gmane.org/gmane.mail.squirrelmail.user/21169 |
724 | ja-squirrelmail<1.4.3anb3 cross-site-scripting http://article.gmane.org/gmane.mail.squirrelmail.user/21169 | | 724 | ja-squirrelmail<1.4.3anb3 cross-site-scripting http://article.gmane.org/gmane.mail.squirrelmail.user/21169 |
725 | snownews<1.5 unsafe-umask http://kiza.kcore.de/software/snownews/changes#150 | | 725 | snownews<1.5 unsafe-umask http://kiza.kcore.de/software/snownews/changes#150 |
726 | liferea<0.6.2 unsafe-umask http://sourceforge.net/project/shownotes.php?release_id=282434 | | 726 | liferea<0.6.2 unsafe-umask http://sourceforge.net/project/shownotes.php?release_id=282434 |
727 | libxml2<2.6.14 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989 | | 727 | libxml2<2.6.14 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989 |
728 | libxml<1.8.17nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989 | | 728 | libxml<1.8.17nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0989 |
729 | sun-{jre,jdk}14<2.6 remote-code-execution http://sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1 | | 729 | sun-{jre,jdk}14<2.6 remote-code-execution http://sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1 |
730 | sun-{jre,jdk}13<1.0.12nb1 remote-code-execution http://sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1 | | 730 | sun-{jre,jdk}13<1.0.12nb1 remote-code-execution http://sunsolve.sun.com/search/document.do?assetkey=1-26-57591-1 |
731 | xpdf<3.00pl1 remote-code-execution http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml | | 731 | xpdf<3.00pl1 remote-code-execution http://www.gentoo.org/security/en/glsa/glsa-200410-20.xml |
732 | php-curl<4.3.2 local-file-read http://www.securityfocus.com/bid/11557 | | 732 | php-curl<4.3.2 local-file-read http://www.securityfocus.com/bid/11557 |
733 | jabberd-2.0s[23]* remote-code-execution http://www.securityfocus.com/archive/1/382250 | | 733 | jabberd-2.0s[23]* remote-code-execution http://www.securityfocus.com/archive/1/382250 |
734 | jabberd-2.0s4 remote-code-execution http://www.securityfocus.com/archive/1/382250 | | 734 | jabberd-2.0s4 remote-code-execution http://www.securityfocus.com/archive/1/382250 |
735 | jabberd<1.4.2nb4 denial-of-service http://www.securityfocus.com/archive/1/375955 | | 735 | jabberd<1.4.2nb4 denial-of-service http://www.securityfocus.com/archive/1/375955 |
736 | imlib<1.9.15 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1025 | | 736 | imlib<1.9.15 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1025 |
737 | imlib<1.9.15nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1026 | | 737 | imlib<1.9.15nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1026 |
738 | kdelibs<3.3.2nb1 plain-text-password-exposure http://www.kde.org/info/security/advisory-20041209-1.txt | | 738 | kdelibs<3.3.2nb1 plain-text-password-exposure http://www.kde.org/info/security/advisory-20041209-1.txt |
739 | kdegraphics<3.3.2 denial-of-service http://www.kde.org/info/security/advisory-20041209-2.txt | | 739 | kdegraphics<3.3.2 denial-of-service http://www.kde.org/info/security/advisory-20041209-2.txt |
740 | kdelibs<3.3.2nb2 cross-site-scripting http://www.kde.org/info/security/advisory-20041213-1.txt | | 740 | kdelibs<3.3.2nb2 cross-site-scripting http://www.kde.org/info/security/advisory-20041213-1.txt |
741 | kdebase<3.3.2nb1 cross-site-scripting http://www.kde.org/info/security/advisory-20041213-1.txt | | 741 | kdebase<3.3.2nb1 cross-site-scripting http://www.kde.org/info/security/advisory-20041213-1.txt |
742 | phpmyadmin-2.6.0-pl2 remote-code-execution http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 | | 742 | phpmyadmin-2.6.0-pl2 remote-code-execution http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 |
743 | phpmyadmin-2.6.0pl2 remote-code-execution http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 | | 743 | phpmyadmin-2.6.0pl2 remote-code-execution http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 |
744 | phpmyadmin-2.[4-5]* remote-file-read http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 | | 744 | phpmyadmin-2.[4-5]* remote-file-read http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 |
745 | phpmyadmin-2.6.0 remote-file-read http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 | | 745 | phpmyadmin-2.6.0 remote-file-read http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 |
746 | phpmyadmin-2.6.0pl2 remote-file-read http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 | | 746 | phpmyadmin-2.6.0pl2 remote-file-read http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 |
747 | phpmyadmin-2.6.0-pl* remote-file-read http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 | | 747 | phpmyadmin-2.6.0-pl* remote-file-read http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-4 |
748 | namazu<2.0.14 cross-site-scripting http://www.namazu.org/security.html.en | | 748 | namazu<2.0.14 cross-site-scripting http://www.namazu.org/security.html.en |
749 | {ap-,}php<4.3.10 remote-code-execution http://www.hardened-php.net/advisories/012004.txt | | 749 | {ap-,}php<4.3.10 remote-code-execution http://www.hardened-php.net/advisories/012004.txt |
750 | {ap-,}php-5.0.2* remote-code-execution http://www.hardened-php.net/advisories/012004.txt | | 750 | {ap-,}php-5.0.2* remote-code-execution http://www.hardened-php.net/advisories/012004.txt |
751 | {ap-,}php<4.3.10 local-code-execution http://www.hardened-php.net/advisories/012004.txt | | 751 | {ap-,}php<4.3.10 local-code-execution http://www.hardened-php.net/advisories/012004.txt |
752 | {ap-,}php-5.0.2* local-code-execution http://www.hardened-php.net/advisories/012004.txt | | 752 | {ap-,}php-5.0.2* local-code-execution http://www.hardened-php.net/advisories/012004.txt |
753 | cyrus-imapd-2.2.[4-8]{,nb*} remote-code-execution http://security.e-matters.de/advisories/152004.txt | | 753 | cyrus-imapd-2.2.[4-8]{,nb*} remote-code-execution http://security.e-matters.de/advisories/152004.txt |
754 | cyrus-imapd-2.2.[0-5]{,nb*} remote-code-execution http://security.e-matters.de/advisories/152004.txt | | 754 | cyrus-imapd-2.2.[0-5]{,nb*} remote-code-execution http://security.e-matters.de/advisories/152004.txt |
755 | cyrus-imapd-2.2.[0-7]{,nb*} remote-code-execution http://security.e-matters.de/advisories/152004.txt | | 755 | cyrus-imapd-2.2.[0-7]{,nb*} remote-code-execution http://security.e-matters.de/advisories/152004.txt |
756 | cyrus-imapd-2.2.[7-8]{,nb*} remote-code-execution http://security.e-matters.de/advisories/152004.txt | | 756 | cyrus-imapd-2.2.[7-8]{,nb*} remote-code-execution http://security.e-matters.de/advisories/152004.txt |
757 | cyrus-imapd-2.2.[0-9]{,nb*} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0546 | | 757 | cyrus-imapd-2.2.[0-9]{,nb*} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0546 |
758 | cyrus-imapd-2.2.1[0-1]{,nb*} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0546 | | 758 | cyrus-imapd-2.2.1[0-1]{,nb*} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0546 |
759 | cyrus-imapd<2.1.18 remote-code-execution http://security.e-matters.de/advisories/152004.txt | | 759 | cyrus-imapd<2.1.18 remote-code-execution http://security.e-matters.de/advisories/152004.txt |
760 | cyrus-imapd<2.1.18 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0546 | | 760 | cyrus-imapd<2.1.18 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0546 |
761 | ethereal-0.9.* remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00016.html | | 761 | ethereal-0.9.* remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00016.html |
762 | ethereal-0.10.[0-7]{,nb*} remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00016.html | | 762 | ethereal-0.10.[0-7]{,nb*} remote-code-execution http://www.ethereal.com/appnotes/enpa-sa-00016.html |
763 | tcpdump<3.8.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0989 | | 763 | tcpdump<3.8.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0989 |
764 | tcpdump<3.8.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0057 | | 764 | tcpdump<3.8.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0057 |
765 | tcpdump<3.8.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0183 | | 765 | tcpdump<3.8.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0183 |
766 | tcpdump<3.8.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0184 | | 766 | tcpdump<3.8.2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0184 |
767 | mc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0226 | | 767 | mc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0226 |
768 | gmc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0226 | | 768 | gmc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0226 |
769 | mc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0231 | | 769 | mc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0231 |
770 | gmc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0231 | | 770 | gmc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0231 |
771 | mc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0232 | | 771 | mc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0232 |
772 | gmc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0232 | | 772 | gmc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0232 |
773 | netpbm<9.26 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0924 | | 773 | netpbm<9.26 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0924 |
774 | pwlib<1.6.0 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0097 | | 774 | pwlib<1.6.0 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0097 |
775 | leafnode<1.9.48 denial-of-service http://leafnode.sourceforge.net/leafnode-SA-2004-01 | | 775 | leafnode<1.9.48 denial-of-service http://leafnode.sourceforge.net/leafnode-SA-2004-01 |
776 | lbreakout<2.4beta2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0158 | | 776 | lbreakout<2.4beta2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0158 |
777 | ap-python<2.7.9 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0973 | | 777 | ap-python<2.7.9 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0973 |
778 | logcheck<1.1.1 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0404 | | 778 | logcheck<1.1.1 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0404 |
779 | zope<2.5.2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0688 | | 779 | zope<2.5.2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0688 |
780 | flim<1.14.3 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0422 | | 780 | flim<1.14.3 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0422 |
781 | gnome-vfs<1.0.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0494 | | 781 | gnome-vfs<1.0.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0494 |
782 | cups<1.1.21 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0558 | | 782 | cups<1.1.21 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0558 |
783 | openoffice<1.1.3 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0752 | | 783 | openoffice<1.1.3 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0752 |
784 | openoffice-linux<1.1.3 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0752 | | 784 | openoffice-linux<1.1.3 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0752 |
785 | imlib<1.9.15 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0817 | | 785 | imlib<1.9.15 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0817 |
786 | apache-2.0.51* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0811 | | 786 | apache-2.0.51* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0811 |
787 | mysql-server<3.23.59 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 | | 787 | mysql-server<3.23.59 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 |
788 | mysql-server-4.0.[0-9] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 | | 788 | mysql-server-4.0.[0-9] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 |
789 | mysql-server-4.0.[0-9]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 | | 789 | mysql-server-4.0.[0-9]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 |
790 | mysql-server-4.0.1[0-8] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 | | 790 | mysql-server-4.0.1[0-8] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 |
791 | mysql-server-4.0.1[0-8]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 | | 791 | mysql-server-4.0.1[0-8]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 |
792 | mysql-server-4.1.[01] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 | | 792 | mysql-server-4.1.[01] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 |
793 | mysql-server-4.1.[01]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 | | 793 | mysql-server-4.1.[01]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0835 |
794 | mysql-server<3.23.49 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 | | 794 | mysql-server<3.23.49 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 |
795 | mysql-server-4.0.[0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 | | 795 | mysql-server-4.0.[0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 |
796 | mysql-server-4.0.[0-9]nb* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 | | 796 | mysql-server-4.0.[0-9]nb* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 |
797 | mysql-server-4.0.1[0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 | | 797 | mysql-server-4.0.1[0-9] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 |
798 | mysql-server-4.0.1[0-9]nb* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 | | 798 | mysql-server-4.0.1[0-9]nb* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 |
799 | mysql-server-4.0.20 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 | | 799 | mysql-server-4.0.20 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 |
800 | mysql-server-4.0.20nb* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 | | 800 | mysql-server-4.0.20nb* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0836 |
801 | mysql-server<3.23.49 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 | | 801 | mysql-server<3.23.49 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 |
802 | mysql-server-4.0.[0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 | | 802 | mysql-server-4.0.[0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 |
803 | mysql-server-4.0.[0-9]nb* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 | | 803 | mysql-server-4.0.[0-9]nb* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 |
804 | mysql-server-4.0.1[0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 | | 804 | mysql-server-4.0.1[0-9] denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 |
805 | mysql-server-4.0.1[0-9]nb* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 | | 805 | mysql-server-4.0.1[0-9]nb* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 |
806 | mysql-server-4.0.20 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 | | 806 | mysql-server-4.0.20 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 |
807 | mysql-server-4.0.20nb* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 | | 807 | mysql-server-4.0.20nb* denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0837 |
808 | cyrus-sasl<2.1.19 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0884 | | 808 | cyrus-sasl<2.1.19 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0884 |
809 | cups<1.1.21 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888 | | 809 | cups<1.1.21 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888 |
810 | cups<1.1.21 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0889 | | 810 | cups<1.1.21 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0889 |
811 | cups<1.1.21 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0923 | | 811 | cups<1.1.21 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0923 |
812 | apache-2.0.3[5-9] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 | | 812 | apache-2.0.3[5-9] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 |
813 | apache-2.0.3[5-9]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 | | 813 | apache-2.0.3[5-9]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 |
814 | apache-2.0.4[0-9] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 | | 814 | apache-2.0.4[0-9] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 |
815 | apache-2.0.4[0-9]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 | | 815 | apache-2.0.4[0-9]nb* privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 |
816 | apache-2.0.5[0-2] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 | | 816 | apache-2.0.5[0-2] privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 |
817 | apache-2.0.5[0-2]nb[1-4] weak-cryptography http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 | | 817 | apache-2.0.5[0-2]nb[1-4] weak-cryptography http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0885 |
818 | openmotif<2.1.30nb3 denial-of-service http://www.ics.com/developers/index.php?cont=xpm_security_alert | | 818 | openmotif<2.1.30nb3 denial-of-service http://www.ics.com/developers/index.php?cont=xpm_security_alert |
819 | catdoc<0.91.5-2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0193 | | 819 | catdoc<0.91.5-2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0193 |
820 | gd<2.0.22 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0941 | | 820 | gd<2.0.22 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0941 |
821 | gd<2.0.28 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0990 | | 821 | gd<2.0.28 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0990 |
822 | ImageMagick<6.1.0 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0981 | | 822 | ImageMagick<6.1.0 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0981 |
823 | lesstif<0.93.96 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 | | 823 | lesstif<0.93.96 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0687 |
824 | lesstif<0.93.96 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 | | 824 | lesstif<0.93.96 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0688 |
825 | lesstif<0.94.0 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 | | 825 | lesstif<0.94.0 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 |
826 | xorg-libs<6.8.1nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 | | 826 | xorg-libs<6.8.1nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 |
827 | XFree86-libs<4.4.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 | | 827 | XFree86-libs<4.4.1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 |
828 | xpm<3.4nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 | | 828 | xpm<3.4nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 |
829 | groff<1.19.1nb2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0969 | | 829 | groff<1.19.1nb2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0969 |
830 | zip<2.3nb3 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1010 | | 830 | zip<2.3nb3 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1010 |
831 | openssl<0.9.6mnb2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0975 | | 831 | openssl<0.9.6mnb2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0975 |
832 | mplayer<1.0rc5pl2 remote-code-execution http://www.idefense.com/application/poi/display?id=166&type=vulnerabilities | | 832 | mplayer<1.0rc5pl2 remote-code-execution http://www.idefense.com/application/poi/display?id=166&type=vulnerabilities |
833 | mplayer<1.0rc5pl2 remote-code-execution http://www.idefense.com/application/poi/display?id=167&type=vulnerabilities | | 833 | mplayer<1.0rc5pl2 remote-code-execution http://www.idefense.com/application/poi/display?id=167&type=vulnerabilities |
834 | mplayer<1.0rc5pl2 remote-code-execution http://www.idefense.com/application/poi/display?id=168&type=vulnerabilities | | 834 | mplayer<1.0rc5pl2 remote-code-execution http://www.idefense.com/application/poi/display?id=168&type=vulnerabilities |
835 | cscope<15.4nb4 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0996 | | 835 | cscope<15.4nb4 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0996 |
836 | acroread5<5.10 remote-code-execution http://www.adobe.com/support/techdocs/331153.html | | 836 | acroread5<5.10 remote-code-execution http://www.adobe.com/support/techdocs/331153.html |
837 | a2ps<4.13.0.2nb5 unsafe-shell-escape http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1170 | | 837 | a2ps<4.13.0.2nb5 unsafe-shell-escape http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1170 |
838 | a2ps<4.13.0.2nb7 local-symlink-race http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1377 | | 838 | a2ps<4.13.0.2nb7 local-symlink-race http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1377 |
839 | mc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-1023 | | 839 | mc<4.6.1rc2 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-1023 |
840 | tiff<3.6.1nb6 buffer-overrun http://www.idefense.com/application/poi/display?id=173&type=vulnerabilities | | 840 | tiff<3.6.1nb6 buffer-overrun http://www.idefense.com/application/poi/display?id=173&type=vulnerabilities |
841 | xpdf<3.00pl2 remote-code-execution http://www.idefense.com/application/poi/display?id=172&type=vulnerabilities | | 841 | xpdf<3.00pl2 remote-code-execution http://www.idefense.com/application/poi/display?id=172&type=vulnerabilities |
842 | xzgv<0.8.0.1 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0994 | | 842 | xzgv<0.8.0.1 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0994 |
843 | xine-lib-1rc[2-5]* remote-code-execution http://www.xinehq.de/index.php/security/XSA-2004-4 | | 843 | xine-lib-1rc[2-5]* remote-code-execution http://www.xinehq.de/index.php/security/XSA-2004-4 |
844 | xine-lib<1rc6 remote-code-execution http://www.xinehq.de/index.php/security/XSA-2004-5 | | 844 | xine-lib<1rc6 remote-code-execution http://www.xinehq.de/index.php/security/XSA-2004-5 |
845 | gpdf<2.8.1 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888 | | 845 | gpdf<2.8.1 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888 |
846 | koffice<1.3.5 integer-overflow http://kde.org/areas/koffice/releases/1.3.4-release.php | | 846 | koffice<1.3.5 integer-overflow http://kde.org/areas/koffice/releases/1.3.4-release.php |
847 | pdfTexinteTexbin<perhaps integer-overflow http://www.tug.org/applications/pdftex/NEWS | | 847 | pdfTexinteTexbin<perhaps integer-overflow http://www.tug.org/applications/pdftex/NEWS |
848 | opera<7.54pl1 remote-code-execution http://archives.neohapsis.com/archives/bugtraq/2004-11/0250.html | | 848 | opera<7.54pl1 remote-code-execution http://archives.neohapsis.com/archives/bugtraq/2004-11/0250.html |
849 | wget<1.9 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1487 | | 849 | wget<1.9 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1487 |
850 | p5-Tk<804.027nb2 remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt | | 850 | p5-Tk<804.027nb2 remote-code-execution http://scary.beasts.org/security/CESA-2004-001.txt |
851 | xine-lib<1rc6anb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1187 | | 851 | xine-lib<1rc6anb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1187 |
852 | xine-lib<1rc6anb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1188 | | 852 | xine-lib<1rc6anb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1188 |
853 | {ap-,}php<4.3.9 remote-memory-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0958 | | 853 | {ap-,}php<4.3.9 remote-memory-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0958 |
854 | {ap-,}php-5.0.[01]* remote-memory-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0958 | | 854 | {ap-,}php-5.0.[01]* remote-memory-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0958 |
855 | {ap-,}php<4.3.9 remote-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0959 | | 855 | {ap-,}php<4.3.9 remote-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0959 |
856 | {ap-,}php-5.0.[01]* remote-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0959 | | 856 | {ap-,}php-5.0.[01]* remote-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0959 |
857 | {ap-,}php<4.3.10 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1065 | | 857 | {ap-,}php<4.3.10 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1065 |
858 | {ap-,}php-5.0.[012]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1065 | | 858 | {ap-,}php-5.0.[012]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1065 |
859 | {ap-,}php<4.3.10 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1019 | | 859 | {ap-,}php<4.3.10 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1019 |
860 | {ap-,}php-5.0.[012]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1019 | | 860 | {ap-,}php-5.0.[012]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1019 |
861 | kdelibs<3.3.2 remote-code-execution http://www.kde.org/info/security/advisory-20041220-1.txt | | 861 | kdelibs<3.3.2 remote-code-execution http://www.kde.org/info/security/advisory-20041220-1.txt |
862 | kdegraphics<3.3.2nb1 remote-code-execution http://www.kde.org/info/security/advisory-20041223-1.txt | | 862 | kdegraphics<3.3.2nb1 remote-code-execution http://www.kde.org/info/security/advisory-20041223-1.txt |
863 | mit-krb5<1.3.6 remote-code-execution http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt | | 863 | mit-krb5<1.3.6 remote-code-execution http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2004-004-pwhist.txt |
864 | snort-2.1.[3-9]* denial-of-service http://www.webservertalk.com/message416634.html | | 864 | snort-2.1.[3-9]* denial-of-service http://www.webservertalk.com/message416634.html |
865 | snort-mysql-2.1.[3-9]* denial-of-service http://www.webservertalk.com/message416634.html | | 865 | snort-mysql-2.1.[3-9]* denial-of-service http://www.webservertalk.com/message416634.html |
866 | snort-pgsql-2.1.[3-9]* denial-of-service http://www.webservertalk.com/message416634.html | | 866 | snort-pgsql-2.1.[3-9]* denial-of-service http://www.webservertalk.com/message416634.html |
867 | snort-2.2.0 denial-of-service http://www.webservertalk.com/message416634.html | | 867 | snort-2.2.0 denial-of-service http://www.webservertalk.com/message416634.html |
868 | snort-mysql-2.2.0 denial-of-service http://www.webservertalk.com/message416634.html | | 868 | snort-mysql-2.2.0 denial-of-service http://www.webservertalk.com/message416634.html |
869 | snort-pgsql-2.2.0 denial-of-service http://www.webservertalk.com/message416634.html | | 869 | snort-pgsql-2.2.0 denial-of-service http://www.webservertalk.com/message416634.html |
870 | tcpdump<0.21 privilege-escalation http://www.atstake.com/research/advisories/2003/a080703-2.txt | | 870 | tcpdump<0.21 privilege-escalation http://www.atstake.com/research/advisories/2003/a080703-2.txt |
871 | asp2php-[0-9]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1261 | | 871 | asp2php-[0-9]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1261 |
872 | chbg<=1.5 remote-code-execution http://tigger.uic.edu/~jlongs2/holes/chbg.txt | | 872 | chbg<=1.5 remote-code-execution http://tigger.uic.edu/~jlongs2/holes/chbg.txt |
873 | xlreader<0.9.0nb1 remote-code-execution http://tigger.uic.edu/~jlongs2/holes/xlreader.txt | | 873 | xlreader<0.9.0nb1 remote-code-execution http://tigger.uic.edu/~jlongs2/holes/xlreader.txt |
874 | cups<1.1.23rc1 denial-of-service http://www.cups.org/str.php?L1023 | | 874 | cups<1.1.23rc1 denial-of-service http://www.cups.org/str.php?L1023 |
875 | cups<1.1.23rc1 remote-code-execution http://www.cups.org/str.php?L1024 | | 875 | cups<1.1.23rc1 remote-code-execution http://www.cups.org/str.php?L1024 |
876 | mozilla<1.7.5 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt | | 876 | mozilla<1.7.5 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt |
877 | mozilla-bin<1.7.5 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt | | 877 | mozilla-bin<1.7.5 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt |
878 | mozilla-gtk2<1.7.5 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt | | 878 | mozilla-gtk2<1.7.5 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt |
879 | thunderbird<1.0 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt | | 879 | thunderbird<1.0 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt |
880 | thunderbird-bin<1.0 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt | | 880 | thunderbird-bin<1.0 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt |
881 | thunderbird-gtk2<1.0 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt | | 881 | thunderbird-gtk2<1.0 remote-code-execution http://isec.pl/vulnerabilities/isec-0020-mozilla.txt |
882 | cups<1.1.23 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125 | | 882 | cups<1.1.23 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125 |
883 | perl{,-thread}<5.6.2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0452 | | 883 | perl{,-thread}<5.6.2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0452 |
884 | perl{,-thread}-5.6.[0-9]* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448 | | 884 | perl{,-thread}-5.6.[0-9]* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448 |
885 | perl{,-thread}-5.8.[0-4]{,nb*}* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0452 | | 885 | perl{,-thread}-5.8.[0-4]{,nb*}* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0452 |
886 | perl{,-thread}-5.8.[0-4]{,nb*}* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448 | | 886 | perl{,-thread}-5.8.[0-4]{,nb*}* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0448 |
887 | perl{,-thread}-5.8.5{,nb[123456]} local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0976 | | 887 | perl{,-thread}-5.8.5{,nb[123456]} local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0976 |
888 | perl{,-thread}-5.8.6 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0976 | | 888 | perl{,-thread}-5.8.6 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0976 |
889 | kdelibs<3.3.2nb6 remote-code-execution http://www.kde.org/info/security/advisory-20050101-1.txt | | 889 | kdelibs<3.3.2nb6 remote-code-execution http://www.kde.org/info/security/advisory-20050101-1.txt |
890 | xine-lib<1rc6anb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1300 | | 890 | xine-lib<1rc6anb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1300 |
891 | xine-lib-1rc8{,nb1} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1300 | | 891 | xine-lib-1rc8{,nb1} remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1300 |
892 | nasm<0.98.39 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1287 | | 892 | nasm<0.98.39 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1287 |
893 | bugzilla<2.18rc3nb1 cross-site-scripting https://bugzilla.mozilla.org/show_bug.cgi?id=272620 | | 893 | bugzilla<2.18rc3nb1 cross-site-scripting https://bugzilla.mozilla.org/show_bug.cgi?id=272620 |
894 | exim<3.36nb7 remote-code-execution http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html | | 894 | exim<3.36nb7 remote-code-execution http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html |
895 | exim>=4<4.43nb2 remote-code-execution http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html | | 895 | exim>=4<4.43nb2 remote-code-execution http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html |
896 | exim-exiscan<4.43nb2 remote-code-execution http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html | | 896 | exim-exiscan<4.43nb2 remote-code-execution http://www.exim.org/mail-archives/exim-announce/2005/msg00000.html |
897 | vim<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 | | 897 | vim<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 |
898 | vim-gtk<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 | | 898 | vim-gtk<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 |
899 | vim-gtk2<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 | | 899 | vim-gtk2<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 |
900 | vim-kde<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 | | 900 | vim-kde<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 |
901 | vim-motif<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 | | 901 | vim-motif<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 |
902 | vim-xaw<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 | | 902 | vim-xaw<6.3.045 local-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1138 |
903 | pcal<4.7nb1 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1289 | | 903 | pcal<4.7nb1 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1289 |
904 | tnftp<20050103 remote-code-execution http://tigger.uic.edu/~jlongs2/holes/tnftp.txt | | 904 | tnftp<20050103 remote-code-execution http://tigger.uic.edu/~jlongs2/holes/tnftp.txt |
905 | napshare<1.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1286 | | 905 | napshare<1.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1286 |
906 | yamt<0.5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1302 | | 906 | yamt<0.5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1302 |
907 | cups-1.1.2[12]* denial-of-service http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042 | | 907 | cups-1.1.2[12]* denial-of-service http://www.cups.org/str.php?L1042+P0+S-1+C0+I0+E0+Q1042 |
908 | dillo<0.8.3nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0012 | | 908 | dillo<0.8.3nb2 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0012 |
909 | tiff<3.6.1nb6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1308 | | 909 | tiff<3.6.1nb6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1308 |
910 | mpg123<0.59.18nb7 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1284 | | 910 | mpg123<0.59.18nb7 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1284 |
911 | mpg123-esound<0.59.18nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1284 | | 911 | mpg123-esound<0.59.18nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1284 |
912 | mpg123-nas<0.59.18nb6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1284 | | 912 | mpg123-nas<0.59.18nb6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1284 |
913 | mpg123<0.59.18nb7 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0991 | | 913 | mpg123<0.59.18nb7 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0991 |
914 | mpg123-esound<0.59.18nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0991 | | 914 | mpg123-esound<0.59.18nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0991 |
915 | mpg123-nas<0.59.18nb6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0991 | | 915 | mpg123-nas<0.59.18nb6 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0991 |
916 | hylafax<4.2.1 weak-acl-enforcement http://www.hylafax.org/4.2.1.html | | 916 | hylafax<4.2.1 weak-acl-enforcement http://www.hylafax.org/4.2.1.html |
917 | teTeX-bin<2.0.2nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125 | | 917 | teTeX-bin<2.0.2nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125 |
918 | teTeX-bin<2.0.2nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888 | | 918 | teTeX-bin<2.0.2nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0888 |
919 | awstats<6.3 local-code-execution http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities | | 919 | awstats<6.3 local-code-execution http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities |
920 | ImageMagick<6.1.8.8 remote-code-execution http://www.idefense.com/application/poi/display?id=184&type=vulnerabilities | | 920 | ImageMagick<6.1.8.8 remote-code-execution http://www.idefense.com/application/poi/display?id=184&type=vulnerabilities |
921 | xpdf<3.00pl3 remote-code-execution http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities | | 921 | xpdf<3.00pl3 remote-code-execution http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities |
922 | cups<1.1.23nb1 remote-code-execution http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities | | 922 | cups<1.1.23nb1 remote-code-execution http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities |
923 | kdegraphics<3.3.2nb3 remote-code-execution http://www.kde.org/info/security/advisory-20050119-1.txt | | 923 | kdegraphics<3.3.2nb3 remote-code-execution http://www.kde.org/info/security/advisory-20050119-1.txt |
924 | mysql-client<3.23.58nb3 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 | | 924 | mysql-client<3.23.58nb3 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 |
925 | mysql-client-4.0.[0-9]{,nb*} local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 | | 925 | mysql-client-4.0.[0-9]{,nb*} local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 |
926 | mysql-client-4.0.1[0-9]* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 | | 926 | mysql-client-4.0.1[0-9]* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 |
927 | mysql-client-4.0.2[0-2]* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 | | 927 | mysql-client-4.0.2[0-2]* local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 |
928 | mysql-client-4.0.23 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 | | 928 | mysql-client-4.0.23 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 |
929 | mysql-client-4.1.[0-8]{,nb*} local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 | | 929 | mysql-client-4.1.[0-8]{,nb*} local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 |
930 | mysql-client-4.1.9 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 | | 930 | mysql-client-4.1.9 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0004 |
931 | ethereal<0.10.9 denial-of-service http://ethereal.com/appnotes/enpa-sa-00017.html | | 931 | ethereal<0.10.9 denial-of-service http://ethereal.com/appnotes/enpa-sa-00017.html |
932 | ethereal<0.10.9 remote-code-execution http://ethereal.com/appnotes/enpa-sa-00017.html | | 932 | ethereal<0.10.9 remote-code-execution http://ethereal.com/appnotes/enpa-sa-00017.html |
933 | koffice<1.3.5nb4 remote-code-execution http://www.kde.org/info/security/advisory-20050120-1.txt | | 933 | koffice<1.3.5nb4 remote-code-execution http://www.kde.org/info/security/advisory-20050120-1.txt |
934 | squid<2.5.7nb5 buffer-overrun http://www.squid-cache.org/Advisories/SQUID-2005_1.txt | | 934 | squid<2.5.7nb5 buffer-overrun http://www.squid-cache.org/Advisories/SQUID-2005_1.txt |
935 | squid<2.5.7nb6 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0094 | | 935 | squid<2.5.7nb6 buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0094 |
936 | squid<2.5.7nb7 denial-of-service http://www.squid-cache.org/Advisories/SQUID-2005_2.txt | | 936 | squid<2.5.7nb7 denial-of-service http://www.squid-cache.org/Advisories/SQUID-2005_2.txt |
937 | squid<2.5.7nb8 denial-of-service http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-response_splitting | | 937 | squid<2.5.7nb8 denial-of-service http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-response_splitting |
938 | unarj<2.65nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0947 | | 938 | unarj<2.65nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0947 |
939 | unarj<2.65nb1 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1027 | | 939 | unarj<2.65nb1 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1027 |
940 | suse{,32}_libtiff<9.1nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1308 | | 940 | suse{,32}_libtiff<9.1nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1308 |
941 | suse{,32}_x11<9.1nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 | | 941 | suse{,32}_x11<9.1nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0914 |
942 | suse{,32}_gtk2<9.1nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753 | | 942 | suse{,32}_gtk2<9.1nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753 |
943 | suse{,32}_gtk2<9.1nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782 | | 943 | suse{,32}_gtk2<9.1nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782 |
944 | suse{,32}_gtk2<9.1nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783 | | 944 | suse{,32}_gtk2<9.1nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783 |
945 | suse{,32}_gtk2<9.1nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788 | | 945 | suse{,32}_gtk2<9.1nb3 denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788 |
946 | webmin<1.160 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0559 | | 946 | webmin<1.160 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0559 |
947 | teTeX-bin<2.0.2nb5 remote-code-execution http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities | | 947 | teTeX-bin<2.0.2nb5 remote-code-execution http://www.idefense.com/application/poi/display?id=186&type=vulnerabilities |
948 | sun-{jre,jdk}14<2.6 remote-code-execution http://sunsolve.sun.com/search/document.do?assetkey=1-26-57708-1 | | 948 | sun-{jre,jdk}14<2.6 remote-code-execution http://sunsolve.sun.com/search/document.do?assetkey=1-26-57708-1 |
949 | sun-{jre,jdk}13<1.0.13 remote-code-execution http://sunsolve.sun.com/search/document.do?assetkey=1-26-57708-1 | | 949 | sun-{jre,jdk}13<1.0.13 remote-code-execution http://sunsolve.sun.com/search/document.do?assetkey=1-26-57708-1 |
950 | evolution12<1.2.4nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0102 | | 950 | evolution12<1.2.4nb4 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0102 |
951 | evolution14<1.4.6nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0102 | | 951 | evolution14<1.4.6nb3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0102 |
952 | evolution<2.0.3nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0102 | | 952 | evolution<2.0.3nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0102 |
953 | enscript<1.6.3nb1 remote-code-execution http://www.securityfocus.org/advisories/7879 | | 953 | enscript<1.6.3nb1 remote-code-execution http://www.securityfocus.org/advisories/7879 |
954 | bind-8.4.[4-5]{,nb*} denial-of-service http://www.kb.cert.org/vuls/id/327633 | | 954 | bind-8.4.[4-5]{,nb*} denial-of-service http://www.kb.cert.org/vuls/id/327633 |
955 | bind-9.3.0 denial-of-service http://www.kb.cert.org/vuls/id/938617 | | 955 | bind-9.3.0 denial-of-service http://www.kb.cert.org/vuls/id/938617 |
956 | squid<2.5.7nb9 cache-poisoning http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-response_splitting | | 956 | squid<2.5.7nb9 cache-poisoning http://www.squid-cache.org/Versions/v2/2.5/bugs/#squid-2.5.STABLE7-response_splitting |
957 | p5-DBI<1.46nb2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0077 | | 957 | p5-DBI<1.46nb2 local-file-write http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0077 |
958 | f2c<20001205nb8 local-file-write http://www.debian.org/security/2005/dsa-661 | | 958 | f2c<20001205nb8 local-file-write http://www.debian.org/security/2005/dsa-661 |
959 | squid<2.5.7nb10 buffer-overrun http://www.squid-cache.org/Advisories/SQUID-2005_3.txt | | 959 | squid<2.5.7nb10 buffer-overrun http://www.squid-cache.org/Advisories/SQUID-2005_3.txt |
960 | zope25-Silva<0.9.2.8 privilege-escalation http://mail.zope.org/pipermail/zope-announce/2005-February/001653.html | | 960 | zope25-Silva<0.9.2.8 privilege-escalation http://mail.zope.org/pipermail/zope-announce/2005-February/001653.html |
961 | postgresql-server-7.3.[1-8]{,nb*} privilege-escalation http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php | | 961 | postgresql-server-7.3.[1-8]{,nb*} privilege-escalation http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php |
962 | postgresql73-server-7.3.[1-8]{,nb*} privilege-escalation http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php | | 962 | postgresql73-server-7.3.[1-8]{,nb*} privilege-escalation http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php |
963 | postgresql74-server-7.4.[1-6]{,nb*} privilege-escalation http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php | | 963 | postgresql74-server-7.4.[1-6]{,nb*} privilege-escalation http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php |
964 | postgresql80-server-8.0.0* privilege-escalation http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php | | 964 | postgresql80-server-8.0.0* privilege-escalation http://archives.postgresql.org/pgsql-bugs/2005-01/msg00269.php |
965 | perl{,-thread}-5.8.{[0-4]{,nb*},5{,nb[1-7]},6{,nb[12]}} local-root-exploit http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0155 | | 965 | perl{,-thread}-5.8.{[0-4]{,nb*},5{,nb[1-7]},6{,nb[12]}} local-root-exploit http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0155 |
966 | perl{,-thread}-5.8.{[0-4]{,nb*},5{,nb[1-7]},6{,nb[12]}} buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0156 | | 966 | perl{,-thread}-5.8.{[0-4]{,nb*},5{,nb[1-7]},6{,nb[12]}} buffer-overrun http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0156 |
967 | gpdf<2.8.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125 | | 967 | gpdf<2.8.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1125 |
968 | gpdf<2.8.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064 | | 968 | gpdf<2.8.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0064 |
969 | python22<2.2.3nb5 remote-code-execution http://www.python.org/security/PSF-2005-001/ | | 969 | python22<2.2.3nb5 remote-code-execution http://www.python.org/security/PSF-2005-001/ |
970 | python22-pth<2.2.3nb5 remote-code-execution http://www.python.org/security/PSF-2005-001/ | | 970 | python22-pth<2.2.3nb5 remote-code-execution http://www.python.org/security/PSF-2005-001/ |
971 | python23<2.3.4nb7 remote-code-execution http://www.python.org/security/PSF-2005-001/ | | 971 | python23<2.3.4nb7 remote-code-execution http://www.python.org/security/PSF-2005-001/ |
972 | python23-pth<2.3.4nb7 remote-code-execution http://www.python.org/security/PSF-2005-001/ | | 972 | python23-pth<2.3.4nb7 remote-code-execution http://www.python.org/security/PSF-2005-001/ |
973 | python23-nth<2.3.4nb2 remote-code-execution http://www.python.org/security/PSF-2005-001/ | | 973 | python23-nth<2.3.4nb2 remote-code-execution http://www.python.org/security/PSF-2005-001/ |
974 | python24<2.4nb4 remote-code-execution http://www.python.org/security/PSF-2005-001/ | | 974 | python24<2.4nb4 remote-code-execution http://www.python.org/security/PSF-2005-001/ |
975 | python24-pth<2.4nb4 remote-code-execution http://www.python.org/security/PSF-2005-001/ | | 975 | python24-pth<2.4nb4 remote-code-execution http://www.python.org/security/PSF-2005-001/ |
976 | py{15,20,21,22,23,24,25,26,27,31}-xmlrpc<=0.9.8 remote-code-execution http://www.python.org/security/PSF-2005-001/ | | 976 | py{15,20,21,22,23,24,25,26,27,31}-xmlrpc<=0.9.8 remote-code-execution http://www.python.org/security/PSF-2005-001/ |
977 | opera<7.54pl2 remote-code-execution http://secunia.com/advisories/13818/ | | 977 | opera<7.54pl2 remote-code-execution http://secunia.com/advisories/13818/ |
978 | opera<=7.54pl2 www-address-spoof http://secunia.com/advisories/14154/ | | 978 | opera<=7.54pl2 www-address-spoof http://secunia.com/advisories/14154/ |
979 | firefox{,-bin,-gtk2,-gtk2-bin}<=1.0 www-address-spoof http://secunia.com/advisories/14163/ | | 979 | firefox{,-bin,-gtk2,-gtk2-bin}<=1.0 www-address-spoof http://secunia.com/advisories/14163/ |
980 | mozilla{,-bin,-gtk2,-gtk2-bin}<=1.7.5 www-address-spoof http://secunia.com/advisories/14163/ | | 980 | mozilla{,-bin,-gtk2,-gtk2-bin}<=1.7.5 www-address-spoof http://secunia.com/advisories/14163/ |
981 | kdebase<=3.3.2nb1 www-address-spoof http://secunia.com/advisories/14162/ | | 981 | kdebase<=3.3.2nb1 www-address-spoof http://secunia.com/advisories/14162/ |
982 | apache-2.0.5[0-2]{,nb*} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0942 | | 982 | apache-2.0.5[0-2]{,nb*} denial-of-service http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0942 |
983 | fprot-workstation-bin<4.5.3 local-code-execution http://www.f-secure.com/security/fsc-2005-1.shtml | | 983 | fprot-workstation-bin<4.5.3 local-code-execution http://www.f-secure.com/security/fsc-2005-1.shtml |
984 | mailman<2.1.4nb3 remote-file-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0202 | | 984 | mailman<2.1.4nb3 remote-file-read http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0202 |
985 | awstats<=6.3nb3 denial-of-service http://www.securityfocus.com/archive/1/390368 | | 985 | awstats<=6.3nb3 denial-of-service http://www.securityfocus.com/archive/1/390368 |
986 | awstats<=6.3nb3 remote-code-execution http://www.securityfocus.com/archive/1/390368 | | 986 | awstats<=6.3nb3 remote-code-execution http://www.securityfocus.com/archive/1/390368 |
987 | sympa<=4.1.2nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0073 | | 987 | sympa<=4.1.2nb1 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0073 |
988 | bidwatcher<1.3.17 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0158 | | 988 | bidwatcher<1.3.17 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0158 |
989 | kdeedu<=3.3.2 privilege-escalation http://www.kde.org/info/security/advisory-20050215-1.txt | | 989 | kdeedu<=3.3.2 privilege-escalation http://www.kde.org/info/security/advisory-20050215-1.txt |
990 | emacs-21.[0-2]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 990 | emacs-21.[0-2]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
991 | emacs-21.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 991 | emacs-21.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
992 | emacs-21.3nb[0-6] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 992 | emacs-21.3nb[0-6] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
993 | emacs-nox11-21.[0-2]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 993 | emacs-nox11-21.[0-2]* remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
994 | emacs-nox11-21.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 994 | emacs-nox11-21.3 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
995 | emacs-nox11-21.3nb[0-1] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 995 | emacs-nox11-21.3nb[0-1] remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
996 | emacs<20.7nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 996 | emacs<20.7nb5 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
997 | xemacs<21.4.17 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 997 | xemacs<21.4.17 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
998 | xemacs-nox11<21.4.17 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 | | 998 | xemacs-nox11<21.4.17 remote-code-execution http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0100 |
999 | xview-lib<3.2.1nb4 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0076 | | 999 | xview-lib<3.2.1nb4 privilege-escalation http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0076 |
1000 | clamav<0.82 denial-of-service http://www.securityfocus.com/bid/12408?ref=rss | | 1000 | clamav<0.82 denial-of-service http://www.securityfocus.com/bid/12408?ref=rss |
| @@ -24884,999 +24884,1001 @@ njs<0.7.6 unspecified https://nvd.nist.g | | | @@ -24884,999 +24884,1001 @@ njs<0.7.6 unspecified https://nvd.nist.g |
24884 | njs<0.7.8 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-38890 | | 24884 | njs<0.7.8 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-38890 |
24885 | njs<0.7.4 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-43286 | | 24885 | njs<0.7.4 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-43286 |
24886 | njs<0.7.8 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-43285 | | 24886 | njs<0.7.8 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-43285 |
24887 | njs<0.7.6 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-43284 | | 24887 | njs<0.7.6 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-43284 |
24888 | nim<1.6.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-46872 | | 24888 | nim<1.6.2 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-46872 |
24889 | nss<3.79.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3479 | | 24889 | nss<3.79.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3479 |
24890 | mujs>=1.0.0<1.3.2 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-44789 | | 24890 | mujs>=1.0.0<1.3.2 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-44789 |
24891 | mupdf<1.21 floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2021-4216 | | 24891 | mupdf<1.21 floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2021-4216 |
24892 | openssl<1.1.1t denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0286 | | 24892 | openssl<1.1.1t denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0286 |
24893 | openssl<1.1.1t use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-0215 | | 24893 | openssl<1.1.1t use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-0215 |
24894 | openssl<1.1.1t timing-attack https://nvd.nist.gov/vuln/detail/CVE-2022-4304 | | 24894 | openssl<1.1.1t timing-attack https://nvd.nist.gov/vuln/detail/CVE-2022-4304 |
24895 | openssl<1.1.1t denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-4450 | | 24895 | openssl<1.1.1t denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-4450 |
24896 | man2html-[0-9]* memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2021-40648 | | 24896 | man2html-[0-9]* memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2021-40648 |
24897 | man2html-[0-9]* arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-40647 | | 24897 | man2html-[0-9]* arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2021-40647 |
24898 | bash<5.1.8 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3715 | | 24898 | bash<5.1.8 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3715 |
24899 | minetest-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-35978 | | 24899 | minetest-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-35978 |
24900 | less>=566<609 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-46663 | | 24900 | less>=566<609 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-46663 |
24901 | grub2-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-2601 | | 24901 | grub2-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-2601 |
24902 | grub2-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-3775 | | 24902 | grub2-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-3775 |
24903 | memcached<1.6.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-37519 | | 24903 | memcached<1.6.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-37519 |
24904 | leptonica<1.80.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38266 | | 24904 | leptonica<1.80.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38266 |
24905 | lepton-[0-9]* unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-4104 | | 24905 | lepton-[0-9]* unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-4104 |
24906 | binutils<2.40 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-38533 | | 24906 | binutils<2.40 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-38533 |
24907 | binutils<2.40 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-4285 | | 24907 | binutils<2.40 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-4285 |
24908 | awstats>=7<7.9 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-46391 | | 24908 | awstats>=7<7.9 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-46391 |
24909 | assimp-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-45748 | | 24909 | assimp-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-45748 |
24910 | knot<5.5.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-40188 | | 24910 | knot<5.5.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-40188 |
24911 | freeciv>=2.6.7<3.0.3 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-39047 | | 24911 | freeciv>=2.6.7<3.0.3 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-39047 |
24912 | modular-xorg-server<21.1.4 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2319 | | 24912 | modular-xorg-server<21.1.4 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-2319 |
24913 | modular-xorg-server<21.1.4 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2022-2320 | | 24913 | modular-xorg-server<21.1.4 arbitrary-memory-access https://nvd.nist.gov/vuln/detail/CVE-2022-2320 |
24914 | modular-xorg-server<21.1.6 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-3551 | | 24914 | modular-xorg-server<21.1.6 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-3551 |
24915 | modular-xorg-server<21.1.6 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3550 | | 24915 | modular-xorg-server<21.1.6 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-3550 |
24916 | modular-xorg-server<1.20.11 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-46342 | | 24916 | modular-xorg-server<1.20.11 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-46342 |
24917 | modular-xorg-server<1.20.11 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-46344 | | 24917 | modular-xorg-server<1.20.11 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-46344 |
24918 | modular-xorg-server<1.20.11 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-46343 | | 24918 | modular-xorg-server<1.20.11 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-46343 |
24919 | modular-xorg-server<1.20.11 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-46341 | | 24919 | modular-xorg-server<1.20.11 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-46341 |
24920 | modular-xorg-server<1.20.11 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-46340 | | 24920 | modular-xorg-server<1.20.11 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-46340 |
24921 | modular-xorg-server<1.20.11 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-4283 | | 24921 | modular-xorg-server<1.20.11 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-4283 |
24922 | git-base<2.38.1 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-39260 | | 24922 | git-base<2.38.1 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-39260 |
24923 | git-base<2.38.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39253 | | 24923 | git-base<2.38.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39253 |
24924 | mysql-server<5.7.40 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixMSQL | | 24924 | mysql-server<5.7.40 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixMSQL |
24925 | mysql-server>=8.0<8.0.32 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixMSQL | | 24925 | mysql-server>=8.0<8.0.32 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixMSQL |
24926 | mysql-cluster<5.7.40 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixMSQL | | 24926 | mysql-cluster<5.7.40 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixMSQL |
24927 | mysql-cluster>=8.0<8.0.32 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixMSQL | | 24927 | mysql-cluster>=8.0<8.0.32 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixMSQL |
24928 | mysql-server<5.7.41 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL | | 24928 | mysql-server<5.7.41 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL |
24929 | mysql-server>=7.6<7.6.25 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL | | 24929 | mysql-server>=7.6<7.6.25 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL |
24930 | mysql-server>=8.0<8.0.32 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL | | 24930 | mysql-server>=8.0<8.0.32 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL |
24931 | mysql-cluster<5.7.41 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL | | 24931 | mysql-cluster<5.7.41 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL |
24932 | mysql-cluster>=7.6<7.6.25 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL | | 24932 | mysql-cluster>=7.6<7.6.25 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL |
24933 | mysql-cluster>=8.0<8.0.32 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL | | 24933 | mysql-cluster>=8.0<8.0.32 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixMSQL |
24934 | thunderbird<102.8.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0616 | | 24934 | thunderbird<102.8.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0616 |
24935 | thunderbird<102.8.0 information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-25728 | | 24935 | thunderbird<102.8.0 information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-25728 |
24936 | thunderbird<102.8.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-25730 | | 24936 | thunderbird<102.8.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-25730 |
24937 | thunderbird<102.8.0 arbitrary-memory-write https://nvd.nist.gov/vuln/detail/CVE-2023-0767 | | 24937 | thunderbird<102.8.0 arbitrary-memory-write https://nvd.nist.gov/vuln/detail/CVE-2023-0767 |
24938 | thunderbird<102.8.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-25735 | | 24938 | thunderbird<102.8.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-25735 |
24939 | thunderbird<102.8.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-25737 | | 24939 | thunderbird<102.8.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-25737 |
24940 | thunderbird<102.8.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-25738 | | 24940 | thunderbird<102.8.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-25738 |
24941 | thunderbird<102.8.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-25739 | | 24941 | thunderbird<102.8.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-25739 |
24942 | thunderbird<102.8.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-25729 | | 24942 | thunderbird<102.8.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-25729 |
24943 | thunderbird<102.8.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-25732 | | 24943 | thunderbird<102.8.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-25732 |
24944 | thunderbird<102.8.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-25734 | | 24944 | thunderbird<102.8.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-25734 |
24945 | thunderbird<102.8.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-25742 | | 24945 | thunderbird<102.8.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-25742 |
24946 | thunderbird<102.8.0 memory-safety https://nvd.nist.gov/vuln/detail/CVE-2023-25746 | | 24946 | thunderbird<102.8.0 memory-safety https://nvd.nist.gov/vuln/detail/CVE-2023-25746 |
24947 | thunderbird<102.7.1 unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-0430 | | 24947 | thunderbird<102.7.1 unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-0430 |
24948 | thunderbird<102.7.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-46871 | | 24948 | thunderbird<102.7.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-46871 |
24949 | thunderbird<102.7.0 arbitrary-file-reading https://nvd.nist.gov/vuln/detail/CVE-2023-23598 | | 24949 | thunderbird<102.7.0 arbitrary-file-reading https://nvd.nist.gov/vuln/detail/CVE-2023-23598 |
24950 | thunderbird<102.7.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-23599 | | 24950 | thunderbird<102.7.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-23599 |
24951 | thunderbird<102.7.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-23601 | | 24951 | thunderbird<102.7.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-23601 |
24952 | thunderbird<102.7.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-23602 | | 24952 | thunderbird<102.7.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-23602 |
24953 | thunderbird<102.7.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-46877 | | 24953 | thunderbird<102.7.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-46877 |
24954 | thunderbird<102.7.0 security-restrictions-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-23603 | | 24954 | thunderbird<102.7.0 security-restrictions-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-23603 |
24955 | thunderbird<102.7.0 memory-safety https://nvd.nist.gov/vuln/detail/CVE-2023-23605 | | 24955 | thunderbird<102.7.0 memory-safety https://nvd.nist.gov/vuln/detail/CVE-2023-23605 |
24956 | clamav<0.103.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-20792 | | 24956 | clamav<0.103.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-20792 |
24957 | ImageMagick<7.1.0.30 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2719 | | 24957 | ImageMagick<7.1.0.30 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-2719 |
24958 | ghostscript-agpl<9.51 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-27792 | | 24958 | ghostscript-agpl<9.51 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-27792 |
24959 | ap{22,24}-auth-mellon<0.18.0 open-redirect https://nvd.nist.gov/vuln/detail/CVE-2021-3639 | | 24959 | ap{22,24}-auth-mellon<0.18.0 open-redirect https://nvd.nist.gov/vuln/detail/CVE-2021-3639 |
24960 | gnutls<3.7.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4209 | | 24960 | gnutls<3.7.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-4209 |
24961 | colord<1.4.6 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-42523 | | 24961 | colord<1.4.6 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-42523 |
24962 | anjuta-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-42522 | | 24962 | anjuta-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2021-42522 |
24963 | ImageMagick6<6.9.12.44 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1115 | | 24963 | ImageMagick6<6.9.12.44 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1115 |
24964 | ImageMagick<7.1.0-29 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1115 | | 24964 | ImageMagick<7.1.0-29 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-1115 |
24965 | dnsmasq-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-0934 | | 24965 | dnsmasq-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-0934 |
24966 | ImageMagick<7.1.0.20 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0284 | | 24966 | ImageMagick<7.1.0.20 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-0284 |
24967 | inetutils<2.4 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-39028 | | 24967 | inetutils<2.4 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-39028 |
24968 | gzip<1.12 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2022-1271 | | 24968 | gzip<1.12 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2022-1271 |
24969 | influxdb<1.8.10 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-36640 | | 24969 | influxdb<1.8.10 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-36640 |
24970 | confuse-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-40320 | | 24970 | confuse-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-40320 |
24971 | frr<8.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-37032 | | 24971 | frr<8.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-37032 |
24972 | nodejs>=14<14.21.1 arbitrary-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-43548 | | 24972 | nodejs>=14<14.21.1 arbitrary-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-43548 |
24973 | nodejs>=16<16.18.1 arbitrary-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-43548 | | 24973 | nodejs>=16<16.18.1 arbitrary-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-43548 |
24974 | nodejs>=18.18.12.1 arbitrary-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-43548 | | 24974 | nodejs>=18.18.12.1 arbitrary-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-43548 |
24975 | nodejs<16.17.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-35256 | | 24975 | nodejs<16.17.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-35256 |
24976 | nodejs>=18<18.9.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-35256 | | 24976 | nodejs>=18<18.9.1 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2022-35256 |
24977 | nodejs<16.17.1 insufficiently-random-numbers https://nvd.nist.gov/vuln/detail/CVE-2022-35255 | | 24977 | nodejs<16.17.1 insufficiently-random-numbers https://nvd.nist.gov/vuln/detail/CVE-2022-35255 |
24978 | nodejs>=18<18.9.1 insufficiently-random-numbers https://nvd.nist.gov/vuln/detail/CVE-2022-35255 | | 24978 | nodejs>=18<18.9.1 insufficiently-random-numbers https://nvd.nist.gov/vuln/detail/CVE-2022-35255 |
24979 | SOGo<5.8.0 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-4558 | | 24979 | SOGo<5.8.0 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-4558 |
24980 | SOGo<5.8.0 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-4556 | | 24980 | SOGo<5.8.0 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-4556 |
24981 | dropbear<2022.82 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-36369 | | 24981 | dropbear<2022.82 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2021-36369 |
24982 | dynamips-[0-9]* uninitialized-variables https://nvd.nist.gov/vuln/detail/CVE-2022-47012 | | 24982 | dynamips-[0-9]* uninitialized-variables https://nvd.nist.gov/vuln/detail/CVE-2022-47012 |
24983 | gajim<1.5.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-39835 | | 24983 | gajim<1.5.0 unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-39835 |
24984 | harfbuzz<7.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-25193 | | 24984 | harfbuzz<7.0.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-25193 |
24985 | hs-aeson<2.0.1.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3433 | | 24985 | hs-aeson<2.0.1.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3433 |
24986 | hyperscan<5.4.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-29486 | | 24986 | hyperscan<5.4.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-29486 |
24987 | jasper<4.0.0 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-2963 | | 24987 | jasper<4.0.0 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-2963 |
24988 | jenkins<2.370 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-41224 | | 24988 | jenkins<2.370 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-41224 |
24989 | kitty<0.26.2 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-41322 | | 24989 | kitty<0.26.2 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-41322 |
24990 | cacti<1.2.23 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-46169 | | 24990 | cacti<1.2.23 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-46169 |
24991 | caddy<2.5.0 open-redirect https://nvd.nist.gov/vuln/detail/CVE-2022-28923 | | 24991 | caddy<2.5.0 open-redirect https://nvd.nist.gov/vuln/detail/CVE-2022-28923 |
24992 | chicken>=5.0.0<5.3.1 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45145 | | 24992 | chicken>=5.0.0<5.3.1 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-45145 |
24993 | erlang<23.3.4.15 security-restrictions-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-37026 | | 24993 | erlang<23.3.4.15 security-restrictions-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-37026 |
24994 | erlang>=24<24.3.4.2 security-restrictions-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-37026 | | 24994 | erlang>=24<24.3.4.2 security-restrictions-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-37026 |
24995 | erlang>=25<25.0.2 security-restrictions-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-37026 | | 24995 | erlang>=25<25.0.2 security-restrictions-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-37026 |
24996 | fcitx5-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-37311 | | 24996 | fcitx5-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-37311 |
24997 | botan2<2.19.3 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2022-43705 | | 24997 | botan2<2.19.3 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2022-43705 |
24998 | fuse-ntfs-3g<2022.10.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-40284 | | 24998 | fuse-ntfs-3g<2022.10.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-40284 |
24999 | gtar-base<1.34nb1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-48303 | | 24999 | gtar-base<1.34nb1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-48303 |
25000 | bind>=9.11<9.11.37 dns-cache-poisoning https://nvd.nist.gov/vuln/detail/CVE-2022-3488 | | 25000 | bind>=9.11<9.11.37 dns-cache-poisoning https://nvd.nist.gov/vuln/detail/CVE-2022-3488 |
25001 | bind>=9.16<9.16.36 dns-cache-poisoning https://nvd.nist.gov/vuln/detail/CVE-2022-3488 | | 25001 | bind>=9.16<9.16.36 dns-cache-poisoning https://nvd.nist.gov/vuln/detail/CVE-2022-3488 |
25002 | bind>=9.16<9.16.37 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3094 | | 25002 | bind>=9.16<9.16.37 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3094 |
25003 | bind>=9.18<9.18.11 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3094 | | 25003 | bind>=9.18<9.18.11 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3094 |
25004 | bind>=9.19<9.19.9 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3094 | | 25004 | bind>=9.19<9.19.9 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-3094 |
25005 | libreoffice>=7.3<7.3.6 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-3140 | | 25005 | libreoffice>=7.3<7.3.6 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-3140 |
25006 | libreoffice>=7.4<7.4.1 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-3140 | | 25006 | libreoffice>=7.4<7.4.1 input-validation https://nvd.nist.gov/vuln/detail/CVE-2022-3140 |
25007 | mariadb-server>=10.3<10.3.36 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38791 | | 25007 | mariadb-server>=10.3<10.3.36 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38791 |
25008 | mariadb-server>=10.4<10.4.26 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38791 | | 25008 | mariadb-server>=10.4<10.4.26 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38791 |
25009 | mariadb-server>=10.5<10.5.17 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38791 | | 25009 | mariadb-server>=10.5<10.5.17 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38791 |
25010 | mariadb-server>=10.6<10.6.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38791 | | 25010 | mariadb-server>=10.6<10.6.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38791 |
25011 | mariadb-server>=10.7<10.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38791 | | 25011 | mariadb-server>=10.7<10.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38791 |
25012 | mariadb-server>=10.8<10.8.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38791 | | 25012 | mariadb-server>=10.8<10.8.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38791 |
25013 | mariadb-server>=10.11<10.11.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-47015 | | 25013 | mariadb-server>=10.11<10.11.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-47015 |
25014 | mariadb-server>=10.6<10.6.13 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-47015 | | 25014 | mariadb-server>=10.6<10.6.13 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-47015 |
25015 | mariadb-server>=10.5<10.5.20 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-47015 | | 25015 | mariadb-server>=10.5<10.5.20 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-47015 |
25016 | mariadb-server>=10.4<10.4.29 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-47015 | | 25016 | mariadb-server>=10.4<10.4.29 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-47015 |
25017 | mit-krb5>=1.8<1.19.4 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-42898 | | 25017 | mit-krb5>=1.8<1.19.4 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-42898 |
25018 | modular-xorg-xquartz-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3553 | | 25018 | modular-xorg-xquartz-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-3553 |
25019 | ImageMagick<7.0.10.57 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-20224 | | 25019 | ImageMagick<7.0.10.57 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-20224 |
25020 | ImageMagick6<6.9.11.57 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-20224 | | 25020 | ImageMagick6<6.9.11.57 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-20224 |
25021 | ImageMagick<7.0.11.8 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2021-3574 | | 25021 | ImageMagick<7.0.11.8 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2021-3574 |
25022 | ImageMagick6<6.9.12.8 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2021-3574 | | 25022 | ImageMagick6<6.9.12.8 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2021-3574 |
25023 | ImageMagick<7.1.0.47 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-3213 | | 25023 | ImageMagick<7.1.0.47 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-3213 |
25024 | ImageMagick6<6.9.12.62 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-3213 | | 25024 | ImageMagick6<6.9.12.62 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-3213 |
25025 | ImageMagick<7.1.0.62 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-44267 | | 25025 | ImageMagick<7.1.0.62 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-44267 |
25026 | ImageMagick6<6.9.12.76 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-44267 | | 25026 | ImageMagick6<6.9.12.76 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-44267 |
25027 | ImageMagick<7.1.0.52 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-44268 | | 25027 | ImageMagick<7.1.0.52 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-44268 |
25028 | ImageMagick6<6.9.12.67 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-44268 | | 25028 | ImageMagick6<6.9.12.67 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-44268 |
25029 | SDL2>=2.0.4<2.26.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-4743 | | 25029 | SDL2>=2.0.4<2.26.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-4743 |
25030 | alpine<2.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46853 | | 25030 | alpine<2.25 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46853 |
25031 | amanda-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-37703 | | 25031 | amanda-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-37703 |
25032 | GraphicsMagick<1.3.38 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1270 | | 25032 | GraphicsMagick<1.3.38 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-1270 |
25033 | ap{22,24}-auth-openidc<2.4.12.2 open-redirect https://nvd.nist.gov/vuln/detail/CVE-2022-23527 | | 25033 | ap{22,24}-auth-openidc<2.4.12.2 open-redirect https://nvd.nist.gov/vuln/detail/CVE-2022-23527 |
25034 | postgresql-server>=10<10.22 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-2625 | | 25034 | postgresql-server>=10<10.22 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-2625 |
25035 | postgresql-server>=11<11.17 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-2625 | | 25035 | postgresql-server>=11<11.17 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-2625 |
25036 | postgresql-server>=12<12.12 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-2625 | | 25036 | postgresql-server>=12<12.12 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-2625 |
25037 | postgresql-server>=13<13.8 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-2625 | | 25037 | postgresql-server>=13<13.8 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-2625 |
25038 | postgresql-server>=14<14.5 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-2625 | | 25038 | postgresql-server>=14<14.5 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-2625 |
25039 | postgresql-server>=10<10.21 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-1552 | | 25039 | postgresql-server>=10<10.21 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-1552 |
25040 | postgresql-server>=11<11.16 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-1552 | | 25040 | postgresql-server>=11<11.16 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-1552 |
25041 | postgresql-server>=12<12.11 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-1552 | | 25041 | postgresql-server>=12<12.11 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-1552 |
25042 | postgresql-server>=13<13.7 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-1552 | | 25042 | postgresql-server>=13<13.7 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-1552 |
25043 | postgresql-server>=14<14.3 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-1552 | | 25043 | postgresql-server>=14<14.3 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-1552 |
25044 | asterisk>=16<16.16.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46837 | | 25044 | asterisk>=16<16.16.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46837 |
25045 | asterisk>=17<17.9.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46837 | | 25045 | asterisk>=17<17.9.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46837 |
25046 | asterisk>=18<18.2.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46837 | | 25046 | asterisk>=18<18.2.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46837 |
25047 | asterisk>=16<16.16.1 local-file-read https://nvd.nist.gov/vuln/detail/CVE-2022-42706 | | 25047 | asterisk>=16<16.16.1 local-file-read https://nvd.nist.gov/vuln/detail/CVE-2022-42706 |
25048 | asterisk>=17<18.15.1 local-file-read https://nvd.nist.gov/vuln/detail/CVE-2022-42706 | | 25048 | asterisk>=17<18.15.1 local-file-read https://nvd.nist.gov/vuln/detail/CVE-2022-42706 |
25049 | asterisk>=19<19.7.1 local-file-read https://nvd.nist.gov/vuln/detail/CVE-2022-42706 | | 25049 | asterisk>=19<19.7.1 local-file-read https://nvd.nist.gov/vuln/detail/CVE-2022-42706 |
25050 | asterisk>=16<16.29.1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-42705 | | 25050 | asterisk>=16<16.29.1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-42705 |
25051 | asterisk>=18.14<18.15.1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-42705 | | 25051 | asterisk>=18.14<18.15.1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-42705 |
25052 | asterisk>=19.6<19.7.1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-42705 | | 25052 | asterisk>=19.6<19.7.1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-42705 |
25053 | asterisk-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-37325 | | 25053 | asterisk-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-37325 |
25054 | salt-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-33226 | | 25054 | salt-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-33226 |
25055 | xdg-utils-[0-9]* command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-4055 | | 25055 | xdg-utils-[0-9]* command-execution https://nvd.nist.gov/vuln/detail/CVE-2022-4055 |
25056 | mysql-client>=8<8.0.29 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL | | 25056 | mysql-client>=8<8.0.29 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujul2022.html#AppendixMSQL |
25057 | openjdk8<1.8.346 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixJAVA | | 25057 | openjdk8<1.8.346 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixJAVA |
25058 | openjdk11<1.11.0.16.2 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixJAVA | | 25058 | openjdk11<1.11.0.16.2 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixJAVA |
25059 | openjdk17<1.17.0.4.2 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixJAVA | | 25059 | openjdk17<1.17.0.4.2 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixJAVA |
25060 | openjdk8<1.8.352 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixJAVA | | 25060 | openjdk8<1.8.352 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixJAVA |
25061 | openjdk11<1.11.0.18 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixJAVA | | 25061 | openjdk11<1.11.0.18 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixJAVA |
25062 | openjdk11<1.17.0.6 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixJAVA | | 25062 | openjdk11<1.17.0.6 multiple-vulnerabilities https://www.oracle.com/security-alerts/cpujan2023.html#AppendixJAVA |
25063 | nethack>=3.6.2<3.6.7 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-24809 | | 25063 | nethack>=3.6.2<3.6.7 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-24809 |
25064 | moodle<4.1.1 unauthorized-access https://nvd.nist.gov/vuln/detail/CVE-2023-23923 | | 25064 | moodle<4.1.1 unauthorized-access https://nvd.nist.gov/vuln/detail/CVE-2023-23923 |
25065 | moodle<4.1.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-23922 | | 25065 | moodle<4.1.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-23922 |
25066 | moodle<4.1.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-23921 | | 25066 | moodle<4.1.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-23921 |
25067 | samba>=4.3<4.14.14 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-32746 | | 25067 | samba>=4.3<4.14.14 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-32746 |
25068 | samba>=4.15<4.15.9 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-32746 | | 25068 | samba>=4.15<4.15.9 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-32746 |
25069 | samba>=4.16<4.16.4 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-32746 | | 25069 | samba>=4.16<4.16.4 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-32746 |
25070 | xenkernel413-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-33745 | | 25070 | xenkernel413-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-33745 |
25071 | xenkernel413-[0-9]* unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-33748 | | 25071 | xenkernel413-[0-9]* unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-33748 |
25072 | xenkernel415-[0-9]* unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-33748 | | 25072 | xenkernel415-[0-9]* unspecified https://nvd.nist.gov/vuln/detail/CVE-2022-33748 |
25073 | xenkernel413-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33747 | | 25073 | xenkernel413-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33747 |
25074 | xenkernel415-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33747 | | 25074 | xenkernel415-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33747 |
25075 | xenkernel413-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33746 | | 25075 | xenkernel413-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33746 |
25076 | xenkernel415-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33746 | | 25076 | xenkernel415-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-33746 |
25077 | epiphany-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-26081 | | 25077 | epiphany-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-26081 |
25078 | afl++-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-26266 | | 25078 | afl++-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-26266 |
25079 | glusterfs-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-26253 | | 25079 | glusterfs-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-26253 |
25080 | knot<5.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-26249 | | 25080 | knot<5.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-26249 |
25081 | jd-gui-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-26235 | | 25081 | jd-gui-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-26235 |
25082 | jd-gui-[0-9]* unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-26234 | | 25082 | jd-gui-[0-9]* unspecified https://nvd.nist.gov/vuln/detail/CVE-2023-26234 |
25083 | glusterfs-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-48340 | | 25083 | glusterfs-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-48340 |
25084 | emacs-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-48339 | | 25084 | emacs-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-48339 |
25085 | emacs-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-48338 | | 25085 | emacs-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-48338 |
25086 | emacs-[0-9]* shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-48337 | | 25086 | emacs-[0-9]* shell-command-injection https://nvd.nist.gov/vuln/detail/CVE-2022-48337 |
25087 | zoneminder<1.36.33 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2023-26039 | | 25087 | zoneminder<1.36.33 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2023-26039 |
25088 | zoneminder<1.36.33 local-file-inclusion https://nvd.nist.gov/vuln/detail/CVE-2023-26038 | | 25088 | zoneminder<1.36.33 local-file-inclusion https://nvd.nist.gov/vuln/detail/CVE-2023-26038 |
25089 | zoneminder<1.36.33 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2023-26037 | | 25089 | zoneminder<1.36.33 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2023-26037 |
25090 | zoneminder<1.36.33 local-file-inclusion https://nvd.nist.gov/vuln/detail/CVE-2023-26036 | | 25090 | zoneminder<1.36.33 local-file-inclusion https://nvd.nist.gov/vuln/detail/CVE-2023-26036 |
25091 | zoneminder<1.36.33 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-26035 | | 25091 | zoneminder<1.36.33 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-26035 |
25092 | zoneminder<1.36.33 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2023-26034 | | 25092 | zoneminder<1.36.33 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2023-26034 |
25093 | zoneminder<1.36.33 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-25825 | | 25093 | zoneminder<1.36.33 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-25825 |
25094 | zoneminder<1.36.33 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2023-26032 | | 25094 | zoneminder<1.36.33 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2023-26032 |
25095 | curl>=7.57<7.88 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-23915 | | 25095 | curl>=7.57<7.88 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-23915 |
25096 | curl>=7.57<7.88 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-23914 | | 25096 | curl>=7.57<7.88 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-23914 |
25097 | freeimage-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-33367 | | 25097 | freeimage-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-33367 |
25098 | mantis<2.25.6 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-22476 | | 25098 | mantis<2.25.6 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-22476 |
25099 | libheif<1.15 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0996 | | 25099 | libheif<1.15 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-0996 |
25100 | php{56,73,74,80,81}-nextcloud>=23<23.0.12 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2023-25579 | | 25100 | php{56,73,74,80,81}-nextcloud>=23<23.0.12 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2023-25579 |
25101 | php{56,73,74,80,81}-nextcloud>=24<24.0.8 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2023-25579 | | 25101 | php{56,73,74,80,81}-nextcloud>=24<24.0.8 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2023-25579 |
25102 | php{56,73,74,80,81}-nextcloud>=25<25.0.2 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2023-25579 | | 25102 | php{56,73,74,80,81}-nextcloud>=25<25.0.2 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2023-25579 |
25103 | php{56,73,74,80,81}-nextcloud>=24<24.0.7 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-25821 | | 25103 | php{56,73,74,80,81}-nextcloud>=24<24.0.7 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-25821 |
25104 | php{56,73,74,80,81}-nextcloud>=25<25.0.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-25821 | | 25104 | php{56,73,74,80,81}-nextcloud>=25<25.0.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-25821 |
25105 | php{56,73,74,80,81}-nextcloud>=25<25.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-25816 | | 25105 | php{56,73,74,80,81}-nextcloud>=25<25.0.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-25816 |
25106 | nodejs<14.21.3 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-23920 | | 25106 | nodejs<14.21.3 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-23920 |
25107 | nodejs>=16<16.19.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-23920 | | 25107 | nodejs>=16<16.19.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-23920 |
25108 | nodejs>=18<18.14.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-23920 | | 25108 | nodejs>=18<18.14.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-23920 |
25109 | nodejs>=19<19.6.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-23920 | | 25109 | nodejs>=19<19.6.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-23920 |
25110 | nodejs<14.21.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-23919 | | 25110 | nodejs<14.21.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-23919 |
25111 | nodejs>=16<16.19.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-23919 | | 25111 | nodejs>=16<16.19.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-23919 |
25112 | nodejs>=18<18.14.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-23919 | | 25112 | nodejs>=18<18.14.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-23919 |
25113 | nodejs>=19<19.2.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-23919 | | 25113 | nodejs>=19<19.2.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-23919 |
25114 | nodejs<14.21.3 security-restrictions-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-23918 | | 25114 | nodejs<14.21.3 security-restrictions-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-23918 |
25115 | nodejs>=16<16.19.1 security-restrictions-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-23918 | | 25115 | nodejs>=16<16.19.1 security-restrictions-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-23918 |
25116 | nodejs>=18<18.14.1 security-restrictions-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-23918 | | 25116 | nodejs>=18<18.14.1 security-restrictions-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-23918 |
25117 | nodejs>=19<19.6.1 security-restrictions-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-23918 | | 25117 | nodejs>=19<19.6.1 security-restrictions-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-23918 |
25118 | apache<2.4.56 http-response-splitting https://nvd.nist.gov/vuln/detail/CVE-2023-27522 | | 25118 | apache<2.4.56 http-response-splitting https://nvd.nist.gov/vuln/detail/CVE-2023-27522 |
25119 | apache<2.4.56 http-response-splitting https://nvd.nist.gov/vuln/detail/CVE-2023-25690 | | 25119 | apache<2.4.56 http-response-splitting https://nvd.nist.gov/vuln/detail/CVE-2023-25690 |
25120 | yubico-c-client-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 25120 | yubico-c-client-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
25121 | curl>=7.7<8.00 command-injection https://nvd.nist.gov/vuln/detail/CVE-2023-27533 | | 25121 | curl>=7.7<8.00 command-injection https://nvd.nist.gov/vuln/detail/CVE-2023-27533 |
25122 | curl>=7.18<8.00 improper-path-limitation https://nvd.nist.gov/vuln/detail/CVE-2023-27534 | | 25122 | curl>=7.18<8.00 improper-path-limitation https://nvd.nist.gov/vuln/detail/CVE-2023-27534 |
25123 | curl>=7.13<8.00 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-27535 | | 25123 | curl>=7.13<8.00 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-27535 |
25124 | curl>=7.22<8.00 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-27536 | | 25124 | curl>=7.22<8.00 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-27536 |
25125 | curl>=7.88<8.00 double-free https://nvd.nist.gov/vuln/detail/CVE-2023-27537 | | 25125 | curl>=7.88<8.00 double-free https://nvd.nist.gov/vuln/detail/CVE-2023-27537 |
25126 | curl>=7.16.1<8.00 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-27538 | | 25126 | curl>=7.16.1<8.00 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-27538 |
25127 | redis>=7.0.8<7.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-28425 | | 25127 | redis>=7.0.8<7.0.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-28425 |
25128 | openssl<1.1.1tnb1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0464 | | 25128 | openssl<1.1.1tnb1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0464 |
25129 | modular-xorg-server<21.1.7nb1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-1393 | | 25129 | modular-xorg-server<21.1.7nb1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-1393 |
25130 | irssi<1.4.4 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-29132 | | 25130 | irssi<1.4.4 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-29132 |
25131 | pcre-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 25131 | pcre-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
25132 | ghostscript-gpl<10.01.1 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-28879 | | 25132 | ghostscript-gpl<10.01.1 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-28879 |
25133 | ghostscript-agpl<10.01.1 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-28879 | | 25133 | ghostscript-agpl<10.01.1 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-28879 |
25134 | git-base<2.40.1 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2023-25652 | | 25134 | git-base<2.40.1 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2023-25652 |
25135 | git-base<2.40.1 arbitrary-messages https://nvd.nist.gov/vuln/detail/CVE-2023-25815 | | 25135 | git-base<2.40.1 arbitrary-messages https://nvd.nist.gov/vuln/detail/CVE-2023-25815 |
25136 | git-base<2.40.1 configuration-misinterpretation https://nvd.nist.gov/vuln/detail/CVE-2023-29007 | | 25136 | git-base<2.40.1 configuration-misinterpretation https://nvd.nist.gov/vuln/detail/CVE-2023-29007 |
25137 | # CPAN up to and including 2.34 | | 25137 | # CPAN up to and including 2.34 |
25138 | perl-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-31484 | | 25138 | perl-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-31484 |
25139 | p5-GitLab-API-v4-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-31485 | | 25139 | p5-GitLab-API-v4-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-31485 |
25140 | # HTTP::Tiny up to and including 0.082, part of perl | | 25140 | # HTTP::Tiny up to and including 0.082, part of perl |
25141 | perl-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-31486 | | 25141 | perl-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-31486 |
25142 | py{27,36,37,38,39,310,311}-django>=3.2<3.2.19 input-validation https://nvd.nist.gov/vuln/detail/CVE-2023-31047 | | 25142 | py{27,36,37,38,39,310,311}-django>=3.2<3.2.19 input-validation https://nvd.nist.gov/vuln/detail/CVE-2023-31047 |
25143 | py{27,36,37,38,39,310,311}-django>=4.1<4.1.9 input-validation https://nvd.nist.gov/vuln/detail/CVE-2023-31047 | | 25143 | py{27,36,37,38,39,310,311}-django>=4.1<4.1.9 input-validation https://nvd.nist.gov/vuln/detail/CVE-2023-31047 |
25144 | py{27,36,37,38,39,310,311}-django>=4.2<4.2.1 input-validation https://nvd.nist.gov/vuln/detail/CVE-2023-31047 | | 25144 | py{27,36,37,38,39,310,311}-django>=4.2<4.2.1 input-validation https://nvd.nist.gov/vuln/detail/CVE-2023-31047 |
25145 | libssh<0.105 debial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-1667 | | 25145 | libssh<0.105 debial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-1667 |
25146 | libssh<0.105 unauthorized-access https://nvd.nist.gov/vuln/detail/CVE-2023-2283 | | 25146 | libssh<0.105 unauthorized-access https://nvd.nist.gov/vuln/detail/CVE-2023-2283 |
25147 | curl>=7.81.0<8.1.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-28319 | | 25147 | curl>=7.81.0<8.1.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-28319 |
25148 | curl>=7.9.8<8.1.0 improper-synchronization https://nvd.nist.gov/vuln/detail/CVE-2023-28320 | | 25148 | curl>=7.9.8<8.1.0 improper-synchronization https://nvd.nist.gov/vuln/detail/CVE-2023-28320 |
25149 | curl>=7.12.0<8.1.0 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2023-28321 | | 25149 | curl>=7.12.0<8.1.0 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2023-28321 |
25150 | curl>=7.7<8.1.0 expected-behavior-violation https://nvd.nist.gov/vuln/detail/CVE-2023-28322 | | 25150 | curl>=7.7<8.1.0 expected-behavior-violation https://nvd.nist.gov/vuln/detail/CVE-2023-28322 |
25151 | cups-filters<1.28.18 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-24805 | | 25151 | cups-filters<1.28.18 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-24805 |
25152 | libcares<1.19.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-32067 | | 25152 | libcares<1.19.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-32067 |
25153 | libcares<1.19.1 lack-of-entropy https://nvd.nist.gov/vuln/detail/CVE-2023-31124 | | 25153 | libcares<1.19.1 lack-of-entropy https://nvd.nist.gov/vuln/detail/CVE-2023-31124 |
25154 | libcares<1.19.1 buffer-underflow https://nvd.nist.gov/vuln/detail/CVE-2023-31130 | | 25154 | libcares<1.19.1 buffer-underflow https://nvd.nist.gov/vuln/detail/CVE-2023-31130 |
25155 | libcares<1.19.1 lack-of-entropy https://nvd.nist.gov/vuln/detail/CVE-2023-31147 | | 25155 | libcares<1.19.1 lack-of-entropy https://nvd.nist.gov/vuln/detail/CVE-2023-31147 |
25156 | luatex<1.17 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-32700 | | 25156 | luatex<1.17 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-32700 |
25157 | openssl<1.1.1u denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2650 | | 25157 | openssl<1.1.1u denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2650 |
25158 | webkit-gtk<2.40.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-28204 | | 25158 | webkit-gtk<2.40.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-28204 |
25159 | webkit-gtk<2.40.2 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-32373 | | 25159 | webkit-gtk<2.40.2 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-32373 |
25160 | cups-base<2.4.2nb9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-32324 | | 25160 | cups-base<2.4.2nb9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-32324 |
25161 | libde265<1.0.12 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-27102 | | 25161 | libde265<1.0.12 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-27102 |
25162 | libde265<1.0.12 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-27103 | | 25162 | libde265<1.0.12 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-27103 |
25163 | libX11<1.8.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-3138 | | 25163 | libX11<1.8.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-3138 |
25164 | libtpms<0.9.6 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-1017 | | 25164 | libtpms<0.9.6 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-1017 |
25165 | libtpms<0.9.6 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-1018 | | 25165 | libtpms<0.9.6 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-1018 |
25166 | cups-base<2.4.6 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-34241 | | 25166 | cups-base<2.4.6 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-34241 |
25167 | webkit-gtk<2.38.0 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-48503 | | 25167 | webkit-gtk<2.38.0 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-48503 |
25168 | webkit-gtk<2.40.0 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-32435 | | 25168 | webkit-gtk<2.40.0 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-32435 |
25169 | webkit-gtk<2.40.3 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-32439 | | 25169 | webkit-gtk<2.40.3 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-32439 |
25170 | ruby27-* eol https://www.ruby-lang.org/en/downloads/branches/ | | 25170 | ruby27-* eol https://www.ruby-lang.org/en/downloads/branches/ |
25171 | ruby{26,27,30,31}-actionpack52<5.2.8.1nb1 cross-site-scripting https://cve.report/CVE-2023-28362 | | 25171 | ruby{26,27,30,31}-actionpack52<5.2.8.1nb1 cross-site-scripting https://cve.report/CVE-2023-28362 |
25172 | ruby{26,27,30,31}-actionpack60<6.0.6.1nb1 cross-site-scripting https://cve.report/CVE-2023-28362 | | 25172 | ruby{26,27,30,31}-actionpack60<6.0.6.1nb1 cross-site-scripting https://cve.report/CVE-2023-28362 |
25173 | ruby{26,27,30,31}-actionpack61<6.1.7.4 cross-site-scripting https://cve.report/CVE-2023-28362 | | 25173 | ruby{26,27,30,31}-actionpack61<6.1.7.4 cross-site-scripting https://cve.report/CVE-2023-28362 |
25174 | ruby{26,27,30,31}-actionpack70<6.1.7.4 cross-site-scripting https://cve.report/CVE-2023-28362 | | 25174 | ruby{26,27,30,31}-actionpack70<6.1.7.4 cross-site-scripting https://cve.report/CVE-2023-28362 |
25175 | ruby30-base<3.0.6nb1 denial-of-service https://cve.report/CVE-2023-36617 | | 25175 | ruby30-base<3.0.6nb1 denial-of-service https://cve.report/CVE-2023-36617 |
25176 | ruby31-base<3.1.4nb1 denial-of-service https://cve.report/CVE-2023-36617 | | 25176 | ruby31-base<3.1.4nb1 denial-of-service https://cve.report/CVE-2023-36617 |
25177 | ruby32-base<3.2.2nb2 denial-of-service https://cve.report/CVE-2023-36617 | | 25177 | ruby32-base<3.2.2nb2 denial-of-service https://cve.report/CVE-2023-36617 |
25178 | python36-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 25178 | python36-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
25179 | python37-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 25179 | python37-[0-9]* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
25180 | py{27,37,38,39,310,311}-django>=3.2<3.2.20 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-36053 | | 25180 | py{27,37,38,39,310,311}-django>=3.2<3.2.20 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-36053 |
25181 | py{27,37,38,39,310,311}-django>=4.1<4.1.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-36053 | | 25181 | py{27,37,38,39,310,311}-django>=4.1<4.1.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-36053 |
25182 | py{27,37,38,39,310,311}-django>=4.2<4.2.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-36053 | | 25182 | py{27,37,38,39,310,311}-django>=4.2<4.2.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-36053 |
25183 | py{27,34,35,36,37,38,39,310,311}-django<3.2 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 25183 | py{27,34,35,36,37,38,39,310,311}-django<3.2 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
25184 | ruby{26,27,30,31}-sanitize<6.0.2 cross-site-scripting https://cve.report/CVE-2023-36823 | | 25184 | ruby{26,27,30,31}-sanitize<6.0.2 cross-site-scripting https://cve.report/CVE-2023-36823 |
25185 | acmesh<3.0.6 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38198 | | 25185 | acmesh<3.0.6 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38198 |
25186 | openssh<9.3p2 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38408 | | 25186 | openssh<9.3p2 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38408 |
25187 | samba<4.18.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-2127 | | 25187 | samba<4.18.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-2127 |
25188 | samba<4.18.5 man-in-the-middle https://nvd.nist.gov/vuln/detail/CVE-2023-3347 | | 25188 | samba<4.18.5 man-in-the-middle https://nvd.nist.gov/vuln/detail/CVE-2023-3347 |
25189 | samba<4.18.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-34966 | | 25189 | samba<4.18.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-34966 |
25190 | samba<4.18.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-34967 | | 25190 | samba<4.18.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-34967 |
25191 | samba<4.18.5 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-34968 | | 25191 | samba<4.18.5 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-34968 |
25192 | samba<4 eol https://wiki.samba.org/index.php/Samba_Release_Planning | | 25192 | samba<4 eol https://wiki.samba.org/index.php/Samba_Release_Planning |
25193 | webkit-gtk<2.40.4 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-37450 | | 25193 | webkit-gtk<2.40.4 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-37450 |
25194 | webkit-gtk<2.40.4 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-32393 | | 25194 | webkit-gtk<2.40.4 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-32393 |
25195 | librsvg<2.46.6 arbitrary-file-read https://nvd.nist.gov/vuln/detail/CVE-2023-38633 | | 25195 | librsvg<2.46.6 arbitrary-file-read https://nvd.nist.gov/vuln/detail/CVE-2023-38633 |
25196 | librsvg<2.56.3 arbitrary-file-read https://nvd.nist.gov/vuln/detail/CVE-2023-38633 | | 25196 | librsvg<2.56.3 arbitrary-file-read https://nvd.nist.gov/vuln/detail/CVE-2023-38633 |
25197 | webkit-gtk<2.40.5 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-38133 | | 25197 | webkit-gtk<2.40.5 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-38133 |
25198 | webkit-gtk<2.40.5 same-origin-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-38572 | | 25198 | webkit-gtk<2.40.5 same-origin-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-38572 |
25199 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38592 | | 25199 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38592 |
25200 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38594 | | 25200 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38594 |
25201 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38595 | | 25201 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38595 |
25202 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38597 | | 25202 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38597 |
25203 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38599 | | 25203 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38599 |
25204 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38600 | | 25204 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38600 |
25205 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38611 | | 25205 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-38611 |
25206 | rust<1.71.1 permission-problem https://nvd.nist.gov/vuln/detail/CVE-2023-38497 | | 25206 | rust<1.71.1 permission-problem https://nvd.nist.gov/vuln/detail/CVE-2023-38497 |
25207 | py{27,37,38,39,310,311}-borgbackup<1.2.5 archive-spoofing https://nvd.nist.gov/vuln/detail/CVE-2023-36811 | | 25207 | py{27,37,38,39,310,311}-borgbackup<1.2.5 archive-spoofing https://nvd.nist.gov/vuln/detail/CVE-2023-36811 |
25208 | ruby{30,31,32}-rails<6.1 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 25208 | ruby{30,31,32}-rails<6.1 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
25209 | py{27,37,38,39,310,311}-django>=3.2<3.2.21 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-41164 | | 25209 | py{27,37,38,39,310,311}-django>=3.2<3.2.21 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-41164 |
25210 | py{27,37,38,39,310,311}-django>=4.1<4.1.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-41164 | | 25210 | py{27,37,38,39,310,311}-django>=4.1<4.1.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-41164 |
25211 | py{27,37,38,39,310,311}-django>=4.2<4.2.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-41164 | | 25211 | py{27,37,38,39,310,311}-django>=4.2<4.2.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-41164 |
25212 | curl>=7.84.0<8.3.0 allocation-of-resources-without-limits-or-throttling https://nvd.nist.gov/vuln/detail/CVE-2023-38039 | | 25212 | curl>=7.84.0<8.3.0 allocation-of-resources-without-limits-or-throttling https://nvd.nist.gov/vuln/detail/CVE-2023-38039 |
25213 | webkit-gtk<2.40.1 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-28198 | | 25213 | webkit-gtk<2.40.1 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-28198 |
25214 | webkit-gtk<2.40.1 content-security-policiy-escape https://nvd.nist.gov/vuln/detail/CVE-2023-32370 | | 25214 | webkit-gtk<2.40.1 content-security-policiy-escape https://nvd.nist.gov/vuln/detail/CVE-2023-32370 |
25215 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-40397 | | 25215 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-40397 |
25216 | libwebp<1.3.2 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-4863 | | 25216 | libwebp<1.3.2 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-4863 |
25217 | bind>=9.2<9.16.43 denial-of-service https://kb.isc.org/docs/cve-2023-3341 | | 25217 | bind>=9.2<9.16.43 denial-of-service https://kb.isc.org/docs/cve-2023-3341 |
25218 | bind>=9.18<9.18.18 denial-of-service https://kb.isc.org/docs/cve-2023-3341 | | 25218 | bind>=9.18<9.18.18 denial-of-service https://kb.isc.org/docs/cve-2023-3341 |
25219 | bind>=9.19<9.19.16 denial-of-service https://kb.isc.org/docs/cve-2023-3341 | | 25219 | bind>=9.19<9.19.16 denial-of-service https://kb.isc.org/docs/cve-2023-3341 |
25220 | bind>=9.18<9.18.18 denial-of-service https://kb.isc.org/docs/cve-2023-4236 | | 25220 | bind>=9.18<9.18.18 denial-of-service https://kb.isc.org/docs/cve-2023-4236 |
25221 | cups-base<2.4.7 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-4504 | | 25221 | cups-base<2.4.7 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-4504 |
25222 | zbar-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-40890 | | 25222 | zbar-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-40890 |
25223 | zbar-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-40889 | | 25223 | zbar-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-40889 |
25224 | zola-[0-9]* directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2023-40274 | | 25224 | zola-[0-9]* directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2023-40274 |
25225 | zstd<1.5.4 buffer-overrun https://nvd.nist.gov/vuln/detail/CVE-2022-4899 | | 25225 | zstd<1.5.4 buffer-overrun https://nvd.nist.gov/vuln/detail/CVE-2022-4899 |
25226 | z3<4.8.8 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2020-19725 | | 25226 | z3<4.8.8 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2020-19725 |
25227 | yasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-29581 | | 25227 | yasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-29581 |
25228 | yasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-29580 | | 25228 | yasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-29580 |
25229 | yasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-29582 | | 25229 | yasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-29582 |
25230 | yasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-29583 | | 25230 | yasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-29583 |
25231 | yasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-29579 | | 25231 | yasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-29579 |
25232 | yasm-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-30402 | | 25232 | yasm-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-30402 |
25233 | yasm-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-31975 | | 25233 | yasm-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-31975 |
25234 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-31974 | | 25234 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-31974 |
25235 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-31973 | | 25235 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-31973 |
25236 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-31972 | | 25236 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-31972 |
25237 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-31724 | | 25237 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-31724 |
25238 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-31725 | | 25238 | yasm-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-31725 |
25239 | yasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-31723 | | 25239 | yasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-31723 |
25240 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-37732 | | 25240 | yasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-37732 |
25241 | yt-dlp>=2015.01.25<2023.07.06 open-redirect https://nvd.nist.gov/vuln/detail/CVE-2023-35934 | | 25241 | yt-dlp>=2015.01.25<2023.07.06 open-redirect https://nvd.nist.gov/vuln/detail/CVE-2023-35934 |
25242 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38310 | | 25242 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38310 |
25243 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38308 | | 25243 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38308 |
25244 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38306 | | 25244 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38306 |
25245 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38305 | | 25245 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38305 |
25246 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38311 | | 25246 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38311 |
25247 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38309 | | 25247 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38309 |
25248 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38307 | | 25248 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38307 |
25249 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38304 | | 25249 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38304 |
25250 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38303 | | 25250 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-38303 |
25251 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-41155 | | 25251 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-41155 |
25252 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-40986 | | 25252 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-40986 |
25253 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-40985 | | 25253 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-40985 |
25254 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-40984 | | 25254 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-40984 |
25255 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-40983 | | 25255 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-40983 |
25256 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-40982 | | 25256 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-40982 |
25257 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-43309 | | 25257 | webmin-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-43309 |
25258 | upx<4 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-43316 | | 25258 | upx<4 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-43316 |
25259 | upx<4 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-43317 | | 25259 | upx<4 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-43317 |
25260 | upx<4 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-43314 | | 25260 | upx<4 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-43314 |
25261 | upx<4 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-43315 | | 25261 | upx<4 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-43315 |
25262 | upx<4 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-43311 | | 25262 | upx<4 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-43311 |
25263 | upx<4 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-43313 | | 25263 | upx<4 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-43313 |
25264 | upx<4 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-43312 | | 25264 | upx<4 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-43312 |
25265 | upx<4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46179 | | 25265 | upx<4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46179 |
25266 | netatalk3<3.1.13 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-23125 | | 25266 | netatalk3<3.1.13 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-23125 |
25267 | netatalk3<3.1.13 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-23124 | | 25267 | netatalk3<3.1.13 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-23124 |
25268 | netatalk3<3.1.13 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-23123 | | 25268 | netatalk3<3.1.13 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-23123 |
25269 | netatalk3<3.1.13 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-23122 | | 25269 | netatalk3<3.1.13 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-23122 |
25270 | netatalk3<3.1.13 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-23121 | | 25270 | netatalk3<3.1.13 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-23121 |
25271 | netatalk3<3.1.13 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-0194 | | 25271 | netatalk3<3.1.13 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-0194 |
25272 | netatalk3-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-43634 | | 25272 | netatalk3-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-43634 |
25273 | cacti<1.2.6 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-37543 | | 25273 | cacti<1.2.6 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-37543 |
25274 | cacti<1.2.19 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-48547 | | 25274 | cacti<1.2.19 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-48547 |
25275 | cacti<1.2.23 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-48538 | | 25275 | cacti<1.2.23 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-48538 |
25276 | cacti-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-41444 | | 25276 | cacti-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-41444 |
25277 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39515 | | 25277 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39515 |
25278 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39514 | | 25278 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39514 |
25279 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39513 | | 25279 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39513 |
25280 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39516 | | 25280 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39516 |
25281 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39512 | | 25281 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39512 |
25282 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39510 | | 25282 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39510 |
25283 | cacti>=1.2.0<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39366 | | 25283 | cacti>=1.2.0<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39366 |
25284 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39365 | | 25284 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39365 |
25285 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39364 | | 25285 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39364 |
25286 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39362 | | 25286 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39362 |
25287 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39361 | | 25287 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39361 |
25288 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39360 | | 25288 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39360 |
25289 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39359 | | 25289 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39359 |
25290 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39358 | | 25290 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39358 |
25291 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39357 | | 25291 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39357 |
25292 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-31132 | | 25292 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-31132 |
25293 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-30534 | | 25293 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-30534 |
25294 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39511 | | 25294 | cacti<1.2.25 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-39511 |
25295 | radare2<5.8.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27114 | | 25295 | radare2<5.8.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27114 |
25296 | radare2<5.8.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-1605 | | 25296 | radare2<5.8.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-1605 |
25297 | radare2<5.3.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-32495 | | 25297 | radare2<5.3.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-32495 |
25298 | radare2<5.3.0 division-by-zero https://nvd.nist.gov/vuln/detail/CVE-2021-32494 | | 25298 | radare2<5.3.0 division-by-zero https://nvd.nist.gov/vuln/detail/CVE-2021-32494 |
25299 | radare2<5.9.0 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-4322 | | 25299 | radare2<5.9.0 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-4322 |
25300 | radare2<5.5.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-28073 | | 25300 | radare2<5.5.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-28073 |
25301 | radare2<5.5.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-28072 | | 25301 | radare2<5.5.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-28072 |
25302 | radare2<5.5.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-28071 | | 25302 | radare2<5.5.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-28071 |
25303 | radare2<5.5.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-28070 | | 25303 | radare2<5.5.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2022-28070 |
25304 | radare2<5.5.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-28069 | | 25304 | radare2<5.5.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-28069 |
25305 | radare2<5.5.0 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-28068 | | 25305 | radare2<5.5.0 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-28068 |
25306 | vault<1.10.11 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-24999 | | 25306 | vault<1.10.11 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-24999 |
25307 | vault<1.11.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-25000 | | 25307 | vault<1.11.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-25000 |
25308 | vault<1.11.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0665 | | 25308 | vault<1.11.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0665 |
25309 | vault<1.11.9 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2023-0620 | | 25309 | vault<1.11.9 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2023-0620 |
25310 | vault<1.11.11 html-attribute-injection https://nvd.nist.gov/vuln/detail/CVE-2023-2121 | | 25310 | vault<1.11.11 html-attribute-injection https://nvd.nist.gov/vuln/detail/CVE-2023-2121 |
25311 | vault<1.13.5 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-3462 | | 25311 | vault<1.13.5 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-3462 |
25312 | vault<1.12.11 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-4680 | | 25312 | vault<1.12.11 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-4680 |
25313 | libxls-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38854 | | 25313 | libxls-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38854 |
25314 | libxls-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38856 | | 25314 | libxls-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38856 |
25315 | libxls-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38853 | | 25315 | libxls-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38853 |
25316 | libxls-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38852 | | 25316 | libxls-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38852 |
25317 | libxls-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38851 | | 25317 | libxls-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38851 |
25318 | libxls-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38855 | | 25318 | libxls-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38855 |
25319 | tcpreplay<4.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27789 | | 25319 | tcpreplay<4.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27789 |
25320 | tcpreplay<4.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27788 | | 25320 | tcpreplay<4.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27788 |
25321 | tcpreplay<4.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27787 | | 25321 | tcpreplay<4.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27787 |
25322 | tcpreplay<4.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27786 | | 25322 | tcpreplay<4.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27786 |
25323 | tcpreplay<4.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27785 | | 25323 | tcpreplay<4.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27785 |
25324 | tcpreplay<4.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27784 | | 25324 | tcpreplay<4.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27784 |
25325 | tcpreplay<4.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27783 | | 25325 | tcpreplay<4.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27783 |
25326 | salt<3005.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-20898 | | 25326 | salt<3005.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-20898 |
25327 | salt<3005.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-20897 | | 25327 | salt<3005.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-20897 |
25328 | salt>=3006.0<3006.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-20898 | | 25328 | salt>=3006.0<3006.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-20898 |
25329 | salt>=3006.0<3006.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-20897 | | 25329 | salt>=3006.0<3006.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-20897 |
25330 | sudo>=1.9.8<1.9.13 double-free https://nvd.nist.gov/vuln/detail/CVE-2023-27320 | | 25330 | sudo>=1.9.8<1.9.13 double-free https://nvd.nist.gov/vuln/detail/CVE-2023-27320 |
25331 | sudo<1.9.13 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-28487 | | 25331 | sudo<1.9.13 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-28487 |
25332 | sudo<1.9.13 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-28486 | | 25332 | sudo<1.9.13 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-28486 |
25333 | jetty<9.4.51 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-26049 | | 25333 | jetty<9.4.51 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-26049 |
25334 | jetty<9.4.51 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-26048 | | 25334 | jetty<9.4.51 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-26048 |
25335 | jetty>=9.0.0<9.4.52 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-40167 | | 25335 | jetty>=9.0.0<9.4.52 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-40167 |
25336 | jetty>=9.4.21<9.4.52 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-41900 | | 25336 | jetty>=9.4.21<9.4.52 authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-41900 |
25337 | sox-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-34318 | | 25337 | sox-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-34318 |
25338 | sox-[0-9]* floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2023-32627 | | 25338 | sox-[0-9]* floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2023-32627 |
25339 | sox-[0-9]* floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2023-26590 | | 25339 | sox-[0-9]* floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2023-26590 |
25340 | sox-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-34432 | | 25340 | sox-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-34432 |
25341 | libredwg<0.12.5.5016 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-25222 | | 25341 | libredwg<0.12.5.5016 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-25222 |
25342 | libredwg<0.12.5.5256 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-36274 | | 25342 | libredwg<0.12.5.5256 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-36274 |
25343 | libredwg<0.12.5.5256 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-36273 | | 25343 | libredwg<0.12.5.5256 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-36273 |
25344 | libredwg<0.12.5.5256 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-36272 | | 25344 | libredwg<0.12.5.5256 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-36272 |
25345 | libredwg<0.12.5.5256 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-36271 | | 25345 | libredwg<0.12.5.5256 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-36271 |
25346 | podofo<0.10.1 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-2241 | | 25346 | podofo<0.10.1 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-2241 |
25347 | podofo<0.10.1 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-31568 | | 25347 | podofo<0.10.1 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-31568 |
25348 | podofo<0.10.1 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-31567 | | 25348 | podofo<0.10.1 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-31567 |
25349 | podofo<0.10.1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-31566 | | 25349 | podofo<0.10.1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-31566 |
25350 | podofo<0.10.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-31555 | | 25350 | podofo<0.10.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-31555 |
25351 | podofo<0.10.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-31556 | | 25351 | podofo<0.10.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-31556 |
25352 | openimageio<2.4.8.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-24472 | | 25352 | openimageio<2.4.8.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-24472 |
25353 | openimageio<2.4.8.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-24473 | | 25353 | openimageio<2.4.8.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-24473 |
25354 | openimageio<2.4.8.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-22845 | | 25354 | openimageio<2.4.8.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-22845 |
25355 | openimageio<2.4.13.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-36183 | | 25355 | openimageio<2.4.13.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-36183 |
25356 | ntp<4.2.8p17 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-26554 | | 25356 | ntp<4.2.8p17 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-26554 |
25357 | ntp<4.2.8p16 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-26555 | | 25357 | ntp<4.2.8p16 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-26555 |
25358 | ntp<4.2.8p16 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-26553 | | 25358 | ntp<4.2.8p16 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-26553 |
25359 | ntp<4.2.8p16 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-26552 | | 25359 | ntp<4.2.8p16 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-26552 |
25360 | ntp<4.2.8p16 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-26551 | | 25360 | ntp<4.2.8p16 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-26551 |
25361 | ntpsec<1.2.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-4012 | | 25361 | ntpsec<1.2.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-4012 |
25362 | webkit-gtk<2.42.0 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-39928 | | 25362 | webkit-gtk<2.42.0 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-39928 |
25363 | webkit-gtk<2.40.0 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-35074 | | 25363 | webkit-gtk<2.40.0 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-35074 |
25364 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-39434 | | 25364 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-39434 |
25365 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-40451 | | 25365 | webkit-gtk<2.40.5 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-40451 |
25366 | webkit-gtk<2.42.0 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-41074 | | 25366 | webkit-gtk<2.42.0 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-41074 |
25367 | webkit-gtk<2.42.1 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-41993 | | 25367 | webkit-gtk<2.42.1 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-41993 |
25368 | libvpx<1.13.0nb1 heap-corruption https://nvd.nist.gov/vuln/detail/CVE-2023-5217 | | 25368 | libvpx<1.13.0nb1 heap-corruption https://nvd.nist.gov/vuln/detail/CVE-2023-5217 |
25369 | exim<4.96.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-42114 | | 25369 | exim<4.96.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-42114 |
25370 | exim<4.96.1 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-42115 | | 25370 | exim<4.96.1 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-42115 |
25371 | exim<4.96.1 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-42116 | | 25371 | exim<4.96.1 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-42116 |
25372 | exim<4.96.2 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-42117 | | 25372 | exim<4.96.2 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-42117 |
25373 | libspf2<1.2.11nb2 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-42118 | | 25373 | libspf2<1.2.11nb2 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-42118 |
25374 | exim<4.96.2 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-42119 | | 25374 | exim<4.96.2 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-42119 |
25375 | gst-plugins1-bad<1.22.6 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40474 | | 25375 | gst-plugins1-bad<1.22.6 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40474 |
25376 | gst-plugins1-bad<1.22.6 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40475 | | 25376 | gst-plugins1-bad<1.22.6 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40475 |
25377 | gst-plugins1-bad<1.22.6 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40476 | | 25377 | gst-plugins1-bad<1.22.6 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40476 |
25378 | libX11<1.8.7 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-43785 | | 25378 | libX11<1.8.7 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-43785 |
25379 | libX11<1.8.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-43786 | | 25379 | libX11<1.8.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-43786 |
25380 | libX11<1.8.7 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-43787 | | 25380 | libX11<1.8.7 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-43787 |
25381 | libXpm<3.5.17 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-43788 | | 25381 | libXpm<3.5.17 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-43788 |
25382 | libXpm<3.5.17 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-43789 | | 25382 | libXpm<3.5.17 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-43789 |
25383 | py{27,37,38,39,310,311}-django>=3.2<3.2.22 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-43665 | | 25383 | py{27,37,38,39,310,311}-django>=3.2<3.2.22 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-43665 |
25384 | py{27,37,38,39,310,311}-django>=4.1<4.1.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-43665 | | 25384 | py{27,37,38,39,310,311}-django>=4.1<4.1.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-43665 |
25385 | py{27,37,38,39,310,311}-django>=4.2<4.2.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-43665 | | 25385 | py{27,37,38,39,310,311}-django>=4.2<4.2.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-43665 |
25386 | grub2-[0-9]* out-of-bounds https://nvd.nist.gov/vuln/detail/CVE-2023-4692 | | 25386 | grub2-[0-9]* out-of-bounds https://nvd.nist.gov/vuln/detail/CVE-2023-4692 |
25387 | grub2-[0-9]* out-of-bounds https://nvd.nist.gov/vuln/detail/CVE-2023-4693 | | 25387 | grub2-[0-9]* out-of-bounds https://nvd.nist.gov/vuln/detail/CVE-2023-4693 |
25388 | croc-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-43621 | | 25388 | croc-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-43621 |
25389 | croc-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-43620 | | 25389 | croc-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-43620 |
25390 | croc-[0-9]* remote-command-execution https://nvd.nist.gov/vuln/detail/CVE-2023-43619 | | 25390 | croc-[0-9]* remote-command-execution https://nvd.nist.gov/vuln/detail/CVE-2023-43619 |
25391 | croc-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-43618 | | 25391 | croc-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-43618 |
25392 | croc-[0-9]* arbitrary-file-overwrite https://nvd.nist.gov/vuln/detail/CVE-2023-43616 | | 25392 | croc-[0-9]* arbitrary-file-overwrite https://nvd.nist.gov/vuln/detail/CVE-2023-43616 |
25393 | croc-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-43617 | | 25393 | croc-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-43617 |
25394 | ming-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44232 | | 25394 | ming-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44232 |
25395 | ming-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-31976 | | 25395 | ming-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-31976 |
25396 | ming-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-30085 | | 25396 | ming-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-30085 |
25397 | ming-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-30084 | | 25397 | ming-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-30084 |
25398 | ming-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-30083 | | 25398 | ming-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-30083 |
25399 | ming-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-31240 | | 25399 | ming-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-31240 |
25400 | ming-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-36239 | | 25400 | ming-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-36239 |
25401 | ming-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40781 | | 25401 | ming-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40781 |
25402 | amanda-server<3.5.4 local-root-shell https://nvd.nist.gov/vuln/detail/CVE-2022-37705 | | 25402 | amanda-server<3.5.4 local-root-shell https://nvd.nist.gov/vuln/detail/CVE-2022-37705 |
25403 | amanda-server<3.5.4 local-root-shell https://nvd.nist.gov/vuln/detail/CVE-2022-37704 | | 25403 | amanda-server<3.5.4 local-root-shell https://nvd.nist.gov/vuln/detail/CVE-2022-37704 |
25404 | lldpd<1.0.13 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-43612 | | 25404 | lldpd<1.0.13 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2021-43612 |
25405 | lldpd<1.0.17 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-41910 | | 25405 | lldpd<1.0.17 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-41910 |
25406 | zabbix<4.0.47 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-29456 | | 25406 | zabbix<4.0.47 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-29456 |
25407 | zabbix<4.0.46 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-29457 | | 25407 | zabbix<4.0.46 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-29457 |
25408 | zabbix<4.0.46 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-29455 | | 25408 | zabbix<4.0.46 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-29455 |
25409 | zabbix<4.0.46 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-29454 | | 25409 | zabbix<4.0.46 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-29454 |
25410 | freeimage<1.18.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-40266 | | 25410 | freeimage<1.18.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-40266 |
25411 | freeimage<1.18.0 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40265 | | 25411 | freeimage<1.18.0 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40265 |
25412 | freeimage<1.18.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-40264 | | 25412 | freeimage<1.18.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2021-40264 |
25413 | freeimage<1.18.0 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40262 | | 25413 | freeimage<1.18.0 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40262 |
25414 | freeimage-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40263 | | 25414 | freeimage-[0-9]* heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-40263 |
25415 | freeimage-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-24295 | | 25415 | freeimage-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-24295 |
25416 | freeimage-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-24293 | | 25416 | freeimage-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-24293 |
25417 | freeimage-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-24294 | | 25417 | freeimage-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-24294 |
25418 | freeimage-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-24292 | | 25418 | freeimage-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-24292 |
25419 | freeimage-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-22524 | | 25419 | freeimage-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-22524 |
25420 | freeimage-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-21428 | | 25420 | freeimage-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-21428 |
25421 | freeimage-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-21426 | | 25421 | freeimage-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-21426 |
25422 | freeimage-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-21427 | | 25422 | freeimage-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-21427 |
25423 | wireshark<4.0.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-1161 | | 25423 | wireshark<4.0.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-1161 |
25424 | wireshark<4.0.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-1992 | | 25424 | wireshark<4.0.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-1992 |
25425 | wireshark<4.0.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-1994 | | 25425 | wireshark<4.0.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-1994 |
25426 | wireshark<4.0.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2879 | | 25426 | wireshark<4.0.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2879 |
25427 | wireshark<4.0.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2858 | | 25427 | wireshark<4.0.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2858 |
25428 | wireshark<4.0.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2857 | | 25428 | wireshark<4.0.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2857 |
25429 | wireshark<4.0.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2856 | | 25429 | wireshark<4.0.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2856 |
25430 | wireshark<4.0.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2855 | | 25430 | wireshark<4.0.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2855 |
25431 | wireshark<4.0.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2854 | | 25431 | wireshark<4.0.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2854 |
25432 | wireshark<4.0.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2952 | | 25432 | wireshark<4.0.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2952 |
25433 | wireshark<4.0.6 code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-0667 | | 25433 | wireshark<4.0.6 code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-0667 |
25434 | wireshark>=4<4.0.6 code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-0666 | | 25434 | wireshark>=4<4.0.6 code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-0666 |
25435 | wireshark<4.0.6 code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-0668 | | 25435 | wireshark<4.0.6 code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-0668 |
25436 | wireshark-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-3649 | | 25436 | wireshark-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-3649 |
25437 | wireshark-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-3648 | | 25437 | wireshark-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-3648 |
25438 | wireshark<4.0.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-4513 | | 25438 | wireshark<4.0.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-4513 |
25439 | wireshark-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-4512 | | 25439 | wireshark-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-4512 |
25440 | wireshark<4.0.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-4511 | | 25440 | wireshark<4.0.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-4511 |
25441 | wireshark-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-5371 | | 25441 | wireshark-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-5371 |
25442 | w3m-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-38252 | | 25442 | w3m-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-38252 |
25443 | w3m-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-38253 | | 25443 | w3m-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-38253 |
25444 | vsftpd-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-30047 | | 25444 | vsftpd-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-30047 |
25445 | vorbis-tools-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-43361 | | 25445 | vorbis-tools-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-43361 |
25446 | matrix-synapse<1.74.0 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-32323 | | 25446 | matrix-synapse<1.74.0 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-32323 |
25447 | matrix-synapse>=1.62.0<1.68.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39374 | | 25447 | matrix-synapse>=1.62.0<1.68.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39374 |
25448 | matrix-synapse<1.69.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39335 | | 25448 | matrix-synapse<1.69.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-39335 |
25449 | matrix-synapse<1.85.0 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-32682 | | 25449 | matrix-synapse<1.85.0 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-32682 |
25450 | matrix-synapse<1.85.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-32683 | | 25450 | matrix-synapse<1.85.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-32683 |
25451 | matrix-synapse>=1.66.0<1.93.0 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-41335 | | 25451 | matrix-synapse>=1.66.0<1.93.0 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-41335 |
25452 | matrix-synapse>=1.34.0<1.93.0 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-42453 | | 25452 | matrix-synapse>=1.34.0<1.93.0 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-42453 |
25453 | freerdp2<2.11.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40589 | | 25453 | freerdp2<2.11.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40589 |
25454 | freerdp2<2.11.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-40569 | | 25454 | freerdp2<2.11.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-40569 |
25455 | freerdp2<2.11.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-40188 | | 25455 | freerdp2<2.11.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-40188 |
25456 | freerdp2<2.11.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-40567 | | 25456 | freerdp2<2.11.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-40567 |
25457 | freerdp2<2.11.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-40186 | | 25457 | freerdp2<2.11.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-40186 |
25458 | freerdp2<2.11.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-40181 | | 25458 | freerdp2<2.11.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-40181 |
25459 | freerdp2<2.11.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-39356 | | 25459 | freerdp2<2.11.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-39356 |
25460 | freerdp2<2.11.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-39354 | | 25460 | freerdp2<2.11.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-39354 |
25461 | freerdp2<2.11.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-39353 | | 25461 | freerdp2<2.11.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-39353 |
25462 | freerdp2<2.11.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-39352 | | 25462 | freerdp2<2.11.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-39352 |
25463 | freerdp2<2.11.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-39350 | | 25463 | freerdp2<2.11.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-39350 |
25464 | freerdp2<2.11.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-39351 | | 25464 | freerdp2<2.11.0 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-39351 |
25465 | gnupg2-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-3219 | | 25465 | gnupg2-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-3219 |
25466 | libmicrohttpd<0.9.76 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-27371 | | 25466 | libmicrohttpd<0.9.76 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-27371 |
25467 | libde265<1.0.11 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-25221 | | 25467 | libde265<1.0.11 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-25221 |
25468 | libde265<1.0.11 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-24758 | | 25468 | libde265<1.0.11 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-24758 |
25469 | libde265<1.0.11 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-24757 | | 25469 | libde265<1.0.11 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-24757 |
25470 | libde265<1.0.11 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-24756 | | 25470 | libde265<1.0.11 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-24756 |
25471 | libde265<1.0.11 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-24754 | | 25471 | libde265<1.0.11 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-24754 |
25472 | libde265<1.0.11 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-24755 | | 25472 | libde265<1.0.11 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-24755 |
25473 | libde265<1.0.11 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-24752 | | 25473 | libde265<1.0.11 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-24752 |
25474 | libde265<1.0.11 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-24751 | | 25474 | libde265<1.0.11 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-24751 |
25475 | nasm<2.16 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44370 | | 25475 | nasm<2.16 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44370 |
25476 | nasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-44369 | | 25476 | nasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-44369 |
25477 | nasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-44368 | | 25477 | nasm-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-44368 |
25478 | nasm-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-31722 | | 25478 | nasm-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-31722 |
25479 | nasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38668 | | 25479 | nasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38668 |
25480 | nasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38667 | | 25480 | nasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38667 |
25481 | nasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38665 | | 25481 | nasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38665 |
25482 | nasm<2.15.05 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29654 | | 25482 | nasm<2.15.05 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-29654 |
25483 | nasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-21687 | | 25483 | nasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-21687 |
25484 | nasm<2.15.04 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-21686 | | 25484 | nasm<2.15.04 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-21686 |
25485 | nasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-21685 | | 25485 | nasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-21685 |
25486 | nasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-21528 | | 25486 | nasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-21528 |
25487 | nasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-18780 | | 25487 | nasm-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-18780 |
25488 | puppet<7.11.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-1894 | | 25488 | puppet<7.11.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-1894 |
25489 | openssh>=8.9<9.3 configuration-misinterpretation https://nvd.nist.gov/vuln/detail/CVE-2023-28531 | | 25489 | openssh>=8.9<9.3 configuration-misinterpretation https://nvd.nist.gov/vuln/detail/CVE-2023-28531 |
25490 | wolfssl<5.6.2 privacy-leak https://nvd.nist.gov/vuln/detail/CVE-2023-3724 | | 25490 | wolfssl<5.6.2 privacy-leak https://nvd.nist.gov/vuln/detail/CVE-2023-3724 |
25491 | catdoc-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-31979 | | 25491 | catdoc-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-31979 |
25492 | catdoc-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-41633 | | 25492 | catdoc-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-41633 |
25493 | geeklog-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-37787 | | 25493 | geeklog-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-37787 |
25494 | geeklog-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-37786 | | 25494 | geeklog-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-37786 |
25495 | avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38469 | | 25495 | avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38469 |
25496 | avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38470 | | 25496 | avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38470 |
25497 | avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38471 | | 25497 | avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38471 |
25498 | avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38472 | | 25498 | avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38472 |
25499 | avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38473 | | 25499 | avahi-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38473 |
25500 | libxml2<2.12.2 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-45322 | | 25500 | libxml2<2.12.2 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-45322 |
25501 | libcue<2.2.1nb1 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2023-43641 | | 25501 | libcue<2.2.1nb1 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2023-43641 |
25502 | mutt<2.2.12 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-4874 | | 25502 | mutt<2.2.12 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-4874 |
25503 | mutt<2.2.12 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-4875 | | 25503 | mutt<2.2.12 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-4875 |
25504 | djvulibre-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46312 | | 25504 | djvulibre-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46312 |
25505 | djvulibre-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46310 | | 25505 | djvulibre-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-46310 |
25506 | grpc<1.53.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-32732 | | 25506 | grpc<1.53.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-32732 |
25507 | grpc>=1.53.0<1.55.0 expected-behavior-violation https://nvd.nist.gov/vuln/detail/CVE-2023-32731 | | 25507 | grpc>=1.53.0<1.55.0 expected-behavior-violation https://nvd.nist.gov/vuln/detail/CVE-2023-32731 |
25508 | grpc>=1.51.0<1.53.0 expected-behavior-violation https://nvd.nist.gov/vuln/detail/CVE-2023-1428 | | 25508 | grpc>=1.51.0<1.53.0 expected-behavior-violation https://nvd.nist.gov/vuln/detail/CVE-2023-1428 |
25509 | grpc<1.55.3 expected-behavior-violation https://nvd.nist.gov/vuln/detail/CVE-2023-4785 | | 25509 | grpc<1.55.3 expected-behavior-violation https://nvd.nist.gov/vuln/detail/CVE-2023-4785 |
25510 | podman-[0-9]* unknown-impact https://nvd.nist.gov/vuln/detail/CVE-2023-0778 | | 25510 | podman-[0-9]* unknown-impact https://nvd.nist.gov/vuln/detail/CVE-2023-0778 |
25511 | opensc-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2977 | | 25511 | opensc-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2977 |
25512 | opensc<0.23.0 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-34193 | | 25512 | opensc<0.23.0 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-34193 |
25513 | jhead<3.08 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-28550 | | 25513 | jhead<3.08 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-28550 |
25514 | jhead<3.04 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2020-28840 | | 25514 | jhead<3.04 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2020-28840 |
25515 | monit<5.31.0 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-26563 | | 25515 | monit<5.31.0 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-26563 |
25516 | tiff<4.5.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-4645 | | 25516 | tiff<4.5.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2022-4645 |
25517 | tiff<4.5.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-1916 | | 25517 | tiff<4.5.1 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-1916 |
25518 | vim<9.0.1367 divide-by-zero https://nvd.nist.gov/vuln/detail/CVE-2023-1127 | | 25518 | vim<9.0.1367 divide-by-zero https://nvd.nist.gov/vuln/detail/CVE-2023-1127 |
25519 | vim<9.0.1376 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-1170 | | 25519 | vim<9.0.1376 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-1170 |
25520 | vim<9.0.1378 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-1175 | | 25520 | vim<9.0.1378 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-1175 |
25521 | vim<9.0.1392 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-1264 | | 25521 | vim<9.0.1392 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-1264 |
25522 | vim<9.0.1402 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-1355 | | 25522 | vim<9.0.1402 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-1355 |
25523 | vim<9.0.1499 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-2426 | | 25523 | vim<9.0.1499 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-2426 |
25524 | vim<9.0.1531 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-2609 | | 25524 | vim<9.0.1531 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-2609 |
25525 | vim<9.0.1532 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-2610 | | 25525 | vim<9.0.1532 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-2610 |
25526 | optipng-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-43907 | | 25526 | optipng-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-43907 |
25527 | #png-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-3857 # false positive | | 25527 | #png-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2022-3857 # false positive |
25528 | jpegoptim<1.5.3 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-27781 | | 25528 | jpegoptim<1.5.3 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-27781 |
25529 | phppgadmin<7.14.5 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-40619 | | 25529 | phppgadmin<7.14.5 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-40619 |
25530 | phppgadmin<7.7 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2023-5002 | | 25530 | phppgadmin<7.7 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2023-5002 |
25531 | phppgadmin<6.19 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2023-0241 | | 25531 | phppgadmin<6.19 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2023-0241 |
25532 | webkit-gtk<2.36.8 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-25363 | | 25532 | webkit-gtk<2.36.8 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-25363 |
25533 | webkit-gtk<2.36.8 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-25362 | | 25533 | webkit-gtk<2.36.8 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-25362 |
25534 | webkit-gtk<2.36.8 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-25361 | | 25534 | webkit-gtk<2.36.8 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-25361 |
25535 | webkit-gtk<2.36.8 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-25360 | | 25535 | webkit-gtk<2.36.8 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-25360 |
25536 | webkit-gtk<2.36.8 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-25358 | | 25536 | webkit-gtk<2.36.8 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-25358 |
25537 | libde265-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47664 | | 25537 | libde265-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-47664 |
25538 | libcares<1.19.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-4904 | | 25538 | libcares<1.19.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-4904 |
25539 | webkit-gtk<2.26.0 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2019-8720 | | 25539 | webkit-gtk<2.26.0 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2019-8720 |
25540 | qemu>=7.2.0<7.2.3 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-0330 | | 25540 | qemu>=7.2.0<7.2.3 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-0330 |
25541 | emacs>=28.1<28.3 code-injection https://nvd.nist.gov/vuln/detail/CVE-2023-27986 | | 25541 | emacs>=28.1<28.3 code-injection https://nvd.nist.gov/vuln/detail/CVE-2023-27986 |
25542 | emacs>=28.1<28.3 command-injection https://nvd.nist.gov/vuln/detail/CVE-2023-27985 | | 25542 | emacs>=28.1<28.3 command-injection https://nvd.nist.gov/vuln/detail/CVE-2023-27985 |
25543 | consul<1.14.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0845 | | 25543 | consul<1.14.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-0845 |
25544 | liferea<1.14.1 command-injection https://nvd.nist.gov/vuln/detail/CVE-2023-1350 | | 25544 | liferea<1.14.1 command-injection https://nvd.nist.gov/vuln/detail/CVE-2023-1350 |
25545 | opendoas-[0-9]* privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2023-28339 | | 25545 | opendoas-[0-9]* privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2023-28339 |
25546 | stellarium<23.1 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2023-28371 | | 25546 | stellarium<23.1 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2023-28371 |
25547 | dnsmasq<2.90 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-28450 | | 25547 | dnsmasq<2.90 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-28450 |
25548 | pandoc>=1.13<3.1.4 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2023-35936 | | 25548 | pandoc>=1.13<3.1.4 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2023-35936 |
25549 | pandoc<3.1.6 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2023-38745 | | 25549 | pandoc<3.1.6 arbitrary-file-write https://nvd.nist.gov/vuln/detail/CVE-2023-38745 |
25550 | exempi<2.5.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-18652 | | 25550 | exempi<2.5.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-18652 |
25551 | exempi<2.5.1 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-18651 | | 25551 | exempi<2.5.1 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-18651 |
25552 | cmark-gfm<0.29.0.gfm.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-24824 | | 25552 | cmark-gfm<0.29.0.gfm.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-24824 |
25553 | cmark-gfm<0.29.0.gfm.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-26485 | | 25553 | cmark-gfm<0.29.0.gfm.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-26485 |
25554 | cmark-gfm<0.29.0.gfm.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-37463 | | 25554 | cmark-gfm<0.29.0.gfm.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-37463 |
25555 | syncthing<1.23.5 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-46165 | | 25555 | syncthing<1.23.5 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2022-46165 |
25556 | memcached<1.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-48571 | | 25556 | memcached<1.6.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-48571 |
25557 | memcached>=1.6.0<1.6.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-22570 | | 25557 | memcached>=1.6.0<1.6.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-22570 |
25558 | mbedtls<2.28.5 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-43615 | | 25558 | mbedtls<2.28.5 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-43615 |
25559 | libheif<1.15.2 floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2023-29659 | | 25559 | libheif<1.15.2 floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2023-29659 |
25560 | grafana<9.3.8 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-0594 | | 25560 | grafana<9.3.8 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-0594 |
25561 | grafana<9.3.8 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-0507 | | 25561 | grafana<9.3.8 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-0507 |
25562 | redis<7.0.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-36021 | | 25562 | redis<7.0.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-36021 |
25563 | gradle>=6.2<6.9.4 verification-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-26053 | | 25563 | gradle>=6.2<6.9.4 verification-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-26053 |
25564 | redis<7.0.9 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-25155 | | 25564 | redis<7.0.9 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-25155 |
25565 | grafana<9.3.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-22462 | | 25565 | grafana<9.3.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-22462 |
25566 | libde265<1.0.10 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-47665 | | 25566 | libde265<1.0.10 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-47665 |
25567 | moodle<3.11.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-36398 | | 25567 | moodle<3.11.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-36398 |
25568 | moodle<3.11.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-36397 | | 25568 | moodle<3.11.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-36397 |
25569 | moodle<3.11.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-36396 | | 25569 | moodle<3.11.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-36396 |
25570 | moodle<3.11.1 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2021-36393 | | 25570 | moodle<3.11.1 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2021-36393 |
25571 | moodle<3.11.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-36395 | | 25571 | moodle<3.11.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-36395 |
25572 | moodle<3.11.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-36403 | | 25572 | moodle<3.11.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2021-36403 |
25573 | samba4<4.17.4 brute-force-attack https://nvd.nist.gov/vuln/detail/CVE-2021-20251 | | 25573 | samba4<4.17.4 brute-force-attack https://nvd.nist.gov/vuln/detail/CVE-2021-20251 |
25574 | pev-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-45423 | | 25574 | pev-[0-9]* arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-45423 |
25575 | vim<9.0.1969 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-5344 | | 25575 | vim<9.0.1969 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-5344 |
25576 | mosquitto<2.0.16 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-3592 | | 25576 | mosquitto<2.0.16 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-3592 |
25577 | gpac-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-5377 | | 25577 | gpac-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-5377 |
25578 | tiff<4.5.1 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-3576 | | 25578 | tiff<4.5.1 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-3576 |
25579 | ImageMagick<7.1.1.19 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-3428 | | 25579 | ImageMagick<7.1.1.19 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-3428 |
25580 | gradle<7.6.3 insecure-file-permissions https://nvd.nist.gov/vuln/detail/CVE-2023-44387 | | 25580 | gradle<7.6.3 insecure-file-permissions https://nvd.nist.gov/vuln/detail/CVE-2023-44387 |
25581 | webkit-gtk<2.42 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-39928 | | 25581 | webkit-gtk<2.42 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-39928 |
25582 | gifsicle-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44821 | | 25582 | gifsicle-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44821 |
25583 | libcue<2.2.1nb1 code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-43641 | | 25583 | libcue<2.2.1nb1 code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-43641 |
25584 | py{27,37,38,39,310,311,312}-urllib3<2.0.6 cookie-injection https://nvd.nist.gov/vuln/detail/CVE-2023-43804 | | 25584 | py{27,37,38,39,310,311,312}-urllib3<2.0.6 cookie-injection https://nvd.nist.gov/vuln/detail/CVE-2023-43804 |
25585 | tnftpd<20231001 information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-45198 | | 25585 | tnftpd<20231001 information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-45198 |
25586 | tiff<4.6.0 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-41175 | | 25586 | tiff<4.6.0 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-41175 |
25587 | tiff<4.6.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-40745 | | 25587 | tiff<4.6.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-40745 |
25588 | vim<9.0.1992 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-5441 | | 25588 | vim<9.0.1992 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-5441 |
25589 | go120<1.20.9 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-39323 | | 25589 | go120<1.20.9 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-39323 |
25590 | php{56,73,74,80,81,82}-concrete5-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-44766 | | 25590 | php{56,73,74,80,81,82}-concrete5-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-44766 |
25591 | php{56,73,74,80,81,82}-concrete5-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-44765 | | 25591 | php{56,73,74,80,81,82}-concrete5-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-44765 |
25592 | php{56,73,74,80,81,82}-concrete5-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-44762 | | 25592 | php{56,73,74,80,81,82}-concrete5-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-44762 |
25593 | php{56,73,74,80,81,82}-concrete5-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-44761 | | 25593 | php{56,73,74,80,81,82}-concrete5-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-44761 |
25594 | php{56,73,74,80,81,82}-concrete5-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-44764 | | 25594 | php{56,73,74,80,81,82}-concrete5-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-44764 |
25595 | gradle<7.6.3 xml-external-entity https://nvd.nist.gov/vuln/detail/CVE-2023-42445 | | 25595 | gradle<7.6.3 xml-external-entity https://nvd.nist.gov/vuln/detail/CVE-2023-42445 |
25596 | py{27,37,38,39,310,311,312}-octoprint<1.9.3 code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-41047 | | 25596 | py{27,37,38,39,310,311,312}-octoprint<1.9.3 code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-41047 |
25597 | php{56,73,74,80,81,82}-piwigo-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-44393 | | 25597 | php{56,73,74,80,81,82}-piwigo-[0-9]* cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-44393 |
25598 | asn1c-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-23910 | | 25598 | asn1c-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-23910 |
25599 | asn1c-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2020-23911 | | 25599 | asn1c-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2020-23911 |
25600 | yajl-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-33460 | | 25600 | yajl-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-33460 |
25601 | zziplib-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-18770 | | 25601 | zziplib-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-18770 |
25602 | xterm<380 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40359 | | 25602 | xterm<380 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40359 |
25603 | vim<9.0.1847 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-4735 | | 25603 | vim<9.0.1847 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-4735 |
25604 | vim<9.0.1846 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-4734 | | 25604 | vim<9.0.1846 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-4734 |
25605 | vim<9.0.1833 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-4736 | | 25605 | vim<9.0.1833 access-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-4736 |
25606 | vim<9.0.1848 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-4738 | | 25606 | vim<9.0.1848 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-4738 |
25607 | vim<9.0.1331 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-4751 | | 25607 | vim<9.0.1331 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-4751 |
25608 | vim<9.0.1858 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-4752 | | 25608 | vim<9.0.1858 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-4752 |
25609 | vim<9.0.1840 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-4733 | | 25609 | vim<9.0.1840 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-4733 |
25610 | vim<9.0.1857 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-4750 | | 25610 | vim<9.0.1857 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-4750 |
25611 | vim<9.0.1873 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-4781 | | 25611 | vim<9.0.1873 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-4781 |
25612 | tightvnc<2.8.75 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2023-27830 | | 25612 | tightvnc<2.8.75 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2023-27830 |
25613 | unrar<6.2.3 verification-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-48579 | | 25613 | unrar<6.2.3 verification-bypass https://nvd.nist.gov/vuln/detail/CVE-2022-48579 |
25614 | haproxy<2.7.1 information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-0836 | | 25614 | haproxy<2.7.1 information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-0836 |
25615 | haproxy<2.7.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-25950 | | 25615 | haproxy<2.7.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-25950 |
25616 | haproxy<2.8.2 request-forgery https://nvd.nist.gov/vuln/detail/CVE-2023-40225 | | 25616 | haproxy<2.8.2 request-forgery https://nvd.nist.gov/vuln/detail/CVE-2023-40225 |
25617 | py{27,37,38,39,310,311,312}-MechanicalSoup<1.3.0 arbitrary-file-read https://nvd.nist.gov/vuln/detail/CVE-2023-34457 | | 25617 | py{27,37,38,39,310,311,312}-MechanicalSoup<1.3.0 arbitrary-file-read https://nvd.nist.gov/vuln/detail/CVE-2023-34457 |
25618 | p7zip-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-47069 | | 25618 | p7zip-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2022-47069 |
25619 | p7zip-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-1576 | | 25619 | p7zip-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-1576 |
25620 | wordpress<6.1.2 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2023-2745 | | 25620 | wordpress<6.1.2 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2023-2745 |
25621 | webkit-gtk-[0-9]* input-validation https://nvd.nist.gov/vuln/detail/CVE-2023-2203 | | 25621 | webkit-gtk-[0-9]* input-validation https://nvd.nist.gov/vuln/detail/CVE-2023-2203 |
25622 | vault>=0.10.0<1.13.0 permission-problem https://nvd.nist.gov/vuln/detail/CVE-2023-5077 | | 25622 | vault>=0.10.0<1.13.0 permission-problem https://nvd.nist.gov/vuln/detail/CVE-2023-5077 |
25623 | vim<8.1.2136 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-20703 | | 25623 | vim<8.1.2136 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-20703 |
25624 | vim<9.0.1664 divide-by-zero https://nvd.nist.gov/vuln/detail/CVE-2023-3896 | | 25624 | vim<9.0.1664 divide-by-zero https://nvd.nist.gov/vuln/detail/CVE-2023-3896 |
25625 | vim<8.2.2354 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3236 | | 25625 | vim<8.2.2354 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2021-3236 |
25626 | poppler<23.06.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-34872 | | 25626 | poppler<23.06.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-34872 |
25627 | poppler<21.01.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-36024 | | 25627 | poppler<21.01.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-36024 |
25628 | poppler<21.01.0 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2020-36023 | | 25628 | poppler<21.01.0 infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2020-36023 |
25629 | poppler<21.01.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38349 | | 25629 | poppler<21.01.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-38349 |
25630 | poppler<22.08.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-37052 | | 25630 | poppler<22.08.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-37052 |
25631 | poppler<22.08.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-37050 | | 25631 | poppler<22.08.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-37050 |
25632 | poppler<0.76.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2020-18839 | | 25632 | poppler<0.76.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2020-18839 |
25633 | poppler<20.08.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-23804 | | 25633 | poppler<20.08.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-23804 |
25634 | protobuf-c<1.4.1 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-48468 | | 25634 | protobuf-c<1.4.1 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-48468 |
25635 | advancecomp<2.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2961 | | 25635 | advancecomp<2.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2961 |
25636 | opendkim-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-48521 | | 25636 | opendkim-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2022-48521 |
25637 | grub2>=2.00<2.06.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-28736 | | 25637 | grub2>=2.00<2.06.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-28736 |
25638 | grub2>=2.00<2.06.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-28735 | | 25638 | grub2>=2.00<2.06.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2022-28735 |
25639 | grub2>=2.00<2.06.3 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-28733 | | 25639 | grub2>=2.00<2.06.3 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-28733 |
25640 | grub2>=2.00<2.06.3 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-28734 | | 25640 | grub2>=2.00<2.06.3 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-28734 |
25641 | mp4v2-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-1451 | | 25641 | mp4v2-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-1451 |
25642 | mp4v2-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-1450 | | 25642 | mp4v2-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-1450 |
25643 | mp4v2-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-29584 | | 25643 | mp4v2-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-29584 |
25644 | mp4v2-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-29578 | | 25644 | mp4v2-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-29578 |
25645 | mp4v2-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-33720 | | 25645 | mp4v2-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-33720 |
25646 | mp4v2-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-33718 | | 25646 | mp4v2-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-33718 |
25647 | mp4v2-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-33716 | | 25647 | mp4v2-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-33716 |
25648 | mp4v2-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-33719 | | 25648 | mp4v2-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-33719 |
25649 | mp4v2-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-33717 | | 25649 | mp4v2-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-33717 |
25650 | njs<0.3.4 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2020-19695 | | 25650 | njs<0.3.4 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2020-19695 |
25651 | njs<0.3.4 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2020-19692 | | 25651 | njs<0.3.4 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2020-19692 |
25652 | njs<0.7.11 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-27730 | | 25652 | njs<0.7.11 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-27730 |
25653 | njs<0.7.11 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2023-27729 | | 25653 | njs<0.7.11 memory-corruption https://nvd.nist.gov/vuln/detail/CVE-2023-27729 |
25654 | njs<0.7.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27728 | | 25654 | njs<0.7.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27728 |
25655 | njs<0.7.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27727 | | 25655 | njs<0.7.11 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-27727 |
25656 | nats-server>=2.2.0<2.8.0 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2022-28357 | | 25656 | nats-server>=2.2.0<2.8.0 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2022-28357 |
25657 | qpdf<10.1.0 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-25786 | | 25657 | qpdf<10.1.0 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2021-25786 |
25658 | gawk<5.1.1 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-4156 | | 25658 | gawk<5.1.1 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-4156 |
25659 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2731 | | 25659 | tiff<4.5.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-2731 |
25660 | tiff<4.5.1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-26965 | | 25660 | tiff<4.5.1 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-26965 |
25661 | tiff>=3.9.0<4.5.1 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-3316 | | 25661 | tiff>=3.9.0<4.5.1 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-3316 |
25662 | tiff<4.5.1 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-3618 | | 25662 | tiff<4.5.1 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-3618 |
25663 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-40090 | | 25663 | tiff<4.4.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-40090 |
25664 | consul>=1.15.0<1.15.3 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-2816 | | 25664 | consul>=1.15.0<1.15.3 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-2816 |
25665 | consul>=1.13.0<1.15.3 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-1297 | | 25665 | consul>=1.13.0<1.15.3 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-1297 |
25666 | consul<1.16.1 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-3518 | | 25666 | consul<1.16.1 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2023-3518 |
25667 | faad2<2.11.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38858 | | 25667 | faad2<2.11.0 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38858 |
25668 | faad2<2.11.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38857 | | 25668 | faad2<2.11.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38857 |
25669 | bitcoin<24.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-33297 | | 25669 | bitcoin<24.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-33297 |
25670 | bitcoin-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-37192 | | 25670 | bitcoin-[0-9]* memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-37192 |
25671 | gnuplot-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-25969 | | 25671 | gnuplot-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2020-25969 |
25672 | screen<4.9.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-24626 | | 25672 | screen<4.9.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-24626 |
25673 | terraform>=1.0.8<1.5.7 overwrite-arbitrary-files https://nvd.nist.gov/vuln/detail/CVE-2023-4782 | | 25673 | terraform>=1.0.8<1.5.7 overwrite-arbitrary-files https://nvd.nist.gov/vuln/detail/CVE-2023-4782 |
25674 | sniproxy<0.6.1 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-25076 | | 25674 | sniproxy<0.6.1 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-25076 |
25675 | spice-server-[0-9]* authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-23793 | | 25675 | spice-server-[0-9]* authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2020-23793 |
25676 | routinator<0.12.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-39915 | | 25676 | routinator<0.12.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-39915 |
25677 | routinator>=0.9.0<0.12.2 path-traversal https://nvd.nist.gov/vuln/detail/CVE-2023-39916 | | 25677 | routinator>=0.9.0<0.12.2 path-traversal https://nvd.nist.gov/vuln/detail/CVE-2023-39916 |
25678 | sofia-sip<1.13.15 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-32307 | | 25678 | sofia-sip<1.13.15 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-32307 |
25679 | xpdf-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-26930 | | 25679 | xpdf-[0-9]* buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-26930 |
25680 | xpdf-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-2664 | | 25680 | xpdf-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-2664 |
25681 | xpdf-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-2663 | | 25681 | xpdf-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-2663 |
25682 | xpdf-[0-9]* divide-by-zero https://nvd.nist.gov/vuln/detail/CVE-2023-2662 | | 25682 | xpdf-[0-9]* divide-by-zero https://nvd.nist.gov/vuln/detail/CVE-2023-2662 |
25683 | xpdf<4.05 divide-by-zero https://nvd.nist.gov/vuln/detail/CVE-2023-3044 | | 25683 | xpdf<4.05 divide-by-zero https://nvd.nist.gov/vuln/detail/CVE-2023-3044 |
25684 | xpdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-3436 | | 25684 | xpdf-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-3436 |
25685 | xpdf-[0-9]* infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2022-48545 | | 25685 | xpdf-[0-9]* infinite-loop https://nvd.nist.gov/vuln/detail/CVE-2022-48545 |
25686 | tcpdump-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-1801 | | 25686 | tcpdump-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-1801 |
25687 | quickjs-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-31922 | | 25687 | quickjs-[0-9]* stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-31922 |
25688 | libsass-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43358 | | 25688 | libsass-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43358 |
25689 | libsass-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43357 | | 25689 | libsass-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43357 |
25690 | libsass-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-26592 | | 25690 | libsass-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-26592 |
25691 | nuclei<2.9.9 sandbox-escape https://nvd.nist.gov/vuln/detail/CVE-2023-37896 | | 25691 | nuclei<2.9.9 sandbox-escape https://nvd.nist.gov/vuln/detail/CVE-2023-37896 |
25692 | powerdns-recursor<4.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-26437 | | 25692 | powerdns-recursor<4.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-26437 |
25693 | go117-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 | | 25693 | go117-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 |
25694 | go118-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 | | 25694 | go118-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 |
25695 | go119-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 | | 25695 | go119-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 |
25696 | go120-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 | | 25696 | go120-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 |
25697 | go121<1.21.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 | | 25697 | go121<1.21.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 |
25698 | h2o-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 | | 25698 | h2o-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 |
25699 | nghttp2<1.57.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 | | 25699 | nghttp2<1.57.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 |
25700 | apache-tomcat>=9<9.0.81 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 | | 25700 | apache-tomcat>=9<9.0.81 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 |
25701 | apache-tomcat>=8<8.5.94 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 | | 25701 | apache-tomcat>=8<8.5.94 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 |
25702 | apache-tomcat<8.5 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 25702 | apache-tomcat<8.5 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
25703 | frr<8.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-36440 | | 25703 | frr<8.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-36440 |
25704 | frr<8.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-40302 | | 25704 | frr<8.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-40302 |
25705 | frr<8.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43681 | | 25705 | frr<8.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-43681 |
25706 | frr<8.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-40318 | | 25706 | frr<8.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-40318 |
25707 | frr<8.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-31490 | | 25707 | frr<8.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-31490 |
25708 | frr<8.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-31489 | | 25708 | frr<8.4.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-31489 |
25709 | frr<8.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-3748 | | 25709 | frr<8.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-3748 |
25710 | frr-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-41361 | | 25710 | frr-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-41361 |
25711 | frr-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-41360 | | 25711 | frr-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-41360 |
25712 | frr-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-41358 | | 25712 | frr-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-41358 |
25713 | frr-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-41359 | | 25713 | frr-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-41359 |
25714 | frr-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38802 | | 25714 | frr-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-38802 |
25715 | frr-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-41909 | | 25715 | frr-[0-9]* null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-41909 |
25716 | mupdf<1.18.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-26683 | | 25716 | mupdf<1.18.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2020-26683 |
25717 | mupdf<1.18.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-21896 | | 25717 | mupdf<1.18.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-21896 |
25718 | binutils<2.40 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-48065 | | 25718 | binutils<2.40 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2022-48065 |
25719 | binutils<2.40 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-48064 | | 25719 | binutils<2.40 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-48064 |
25720 | binutils<2.39.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-47696 | | 25720 | binutils<2.39.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-47696 |
25721 | binutils<2.39.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-47695 | | 25721 | binutils<2.39.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-47695 |
25722 | binutils<2.39.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-47673 | | 25722 | binutils<2.39.3 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-47673 |
25723 | binutils<2.40 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-48063 | | 25723 | binutils<2.40 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2022-48063 |
25724 | binutils<2.40 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44840 | | 25724 | binutils<2.40 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2022-44840 |
25725 | binutils<2.38 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-46174 | | 25725 | binutils<2.38 heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-46174 |
25726 | binutils<2.34 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2020-35342 | | 25726 | binutils<2.34 sensitive-information-leak https://nvd.nist.gov/vuln/detail/CVE-2020-35342 |
25727 | binutils<2.34 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2020-21490 | | 25727 | binutils<2.34 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2020-21490 |
25728 | binutils<2.34 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-19724 | | 25728 | binutils<2.34 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-19724 |
25729 | libdwarf<0.3.4 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2020-27545 | | 25729 | libdwarf<0.3.4 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2020-27545 |
25730 | libdwarf<0.3.4 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2020-28163 | | 25730 | libdwarf<0.3.4 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2020-28163 |
25731 | kilo-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-20335 | | 25731 | kilo-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2020-20335 |
25732 | h2o-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-30847 | | 25732 | h2o-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-30847 |
25733 | atasm-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-34123 | | 25733 | atasm-[0-9]* heap-based-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-34123 |
25734 | KeePass>=2.00<2.54 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-32784 | | 25734 | KeePass>=2.00<2.54 memory-leak https://nvd.nist.gov/vuln/detail/CVE-2023-32784 |
25735 | curl>=7.69.0<8.4.0 heap-based-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38545 | | 25735 | curl>=7.69.0<8.4.0 heap-based-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-38545 |
25736 | curl>=7.9.1<8.4.0 external-control-of-file-name-or-path https://nvd.nist.gov/vuln/detail/CVE-2023-38546 | | 25736 | curl>=7.9.1<8.4.0 external-control-of-file-name-or-path https://nvd.nist.gov/vuln/detail/CVE-2023-38546 |
25737 | samba4>=4.17<4.17.12 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2023-3961 | | 25737 | samba4>=4.17<4.17.12 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2023-3961 |
25738 | samba4>=4.18<4.18.8 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2023-3961 | | 25738 | samba4>=4.18<4.18.8 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2023-3961 |
25739 | samba4>=4.17<4.17.12 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2023-42669 | | 25739 | samba4>=4.17<4.17.12 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2023-42669 |
25740 | samba4>=4.18<4.18.8 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2023-42669 | | 25740 | samba4>=4.18<4.18.8 privilege-escalation https://nvd.nist.gov/vuln/detail/CVE-2023-42669 |
25741 | samba4>=4.17<4.17.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-42670 | | 25741 | samba4>=4.17<4.17.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-42670 |
25742 | samba4>=4.18<4.18.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-42670 | | 25742 | samba4>=4.18<4.18.8 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-42670 |
25743 | hs-http2<4.2.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 | | 25743 | hs-http2<4.2.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 |
25744 | varnish-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 | | 25744 | varnish-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-44487 |
25745 | apache<2.4.58 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-31122 | | 25745 | apache<2.4.58 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-31122 |
25746 | apache<2.4.58 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-43622 | | 25746 | apache<2.4.58 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-43622 |
25747 | apache<2.4.58 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-45802 | | 25747 | apache<2.4.58 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-45802 |
25748 | minizip<1.3.1 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-45853 | | 25748 | minizip<1.3.1 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-45853 |
25749 | py{27,37,38,39,310,311,312}-configobj<5.0.8nb1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-26112 | | 25749 | py{27,37,38,39,310,311,312}-configobj<5.0.8nb1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-26112 |
25750 | modular-xorg-server<21.1.9 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-5367 | | 25750 | modular-xorg-server<21.1.9 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-5367 |
25751 | modular-xorg-server<21.1.9 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-5380 | | 25751 | modular-xorg-server<21.1.9 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-5380 |
25752 | modular-xorg-server-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-5574 | | 25752 | modular-xorg-server-[0-9]* use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-5574 |
25753 | py{27,38,39,310,311,312}-pip<23.3 command-injection https://nvd.nist.gov/vuln/detail/CVE-2023-5752 | | 25753 | py{27,38,39,310,311,312}-pip<23.3 command-injection https://nvd.nist.gov/vuln/detail/CVE-2023-5752 |
25754 | php{56,73,74,80,81,82}-roundcube<1.6.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-5631 | | 25754 | php{56,73,74,80,81,82}-roundcube<1.6.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2023-5631 |
25755 | exiv2>=0.28<0.28.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-44398 | | 25755 | exiv2>=0.28<0.28.1 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2023-44398 |
25756 | ltm<1.2.1 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-36328 | | 25756 | ltm<1.2.1 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-36328 |
25757 | gimp<2.10.36 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-44441 | | 25757 | gimp<2.10.36 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-44441 |
25758 | qimp<2.10.36 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-44442 | | 25758 | qimp<2.10.36 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-44442 |
25759 | gimp<2.10.36 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-44443 | | 25759 | gimp<2.10.36 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-44443 |
25760 | gimp<2.10.36 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-44444 | | 25760 | gimp<2.10.36 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-44444 |
25761 | tor<0.4.8.8 unknown-impact https://gitlab.torproject.org/tpo/core/team/-/wikis/NetworkTeam/TROVE | | 25761 | tor<0.4.8.8 unknown-impact https://gitlab.torproject.org/tpo/core/team/-/wikis/NetworkTeam/TROVE |
25762 | tor<0.4.8.9 unknown-impact https://gitlab.torproject.org/tpo/core/team/-/wikis/NetworkTeam/TROVE | | 25762 | tor<0.4.8.9 unknown-impact https://gitlab.torproject.org/tpo/core/team/-/wikis/NetworkTeam/TROVE |
25763 | yt-dlp<2023.11.14 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2023-46121 | | 25763 | yt-dlp<2023.11.14 man-in-the-middle-attack https://nvd.nist.gov/vuln/detail/CVE-2023-46121 |
25764 | webkit-gtk<2.38.4 ui-spoofing https://nvd.nist.gov/vuln/detail/CVE-2023-32919 | | 25764 | webkit-gtk<2.38.4 ui-spoofing https://nvd.nist.gov/vuln/detail/CVE-2023-32919 |
25765 | webkit-gtk<2.38.0 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-32933 | | 25765 | webkit-gtk<2.38.0 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-32933 |
25766 | webkit-gtk<2.38.4 ui-spoofing https://nvd.nist.gov/vuln/detail/CVE-2022-46705 | | 25766 | webkit-gtk<2.38.4 ui-spoofing https://nvd.nist.gov/vuln/detail/CVE-2022-46705 |
25767 | webkit-gtk<2.38.4 ui-spoofing https://nvd.nist.gov/vuln/detail/CVE-2022-46725 | | 25767 | webkit-gtk<2.38.4 ui-spoofing https://nvd.nist.gov/vuln/detail/CVE-2022-46725 |
25768 | webkit-gtk<2.42 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-32359 | | 25768 | webkit-gtk<2.42 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-32359 |
25769 | webkit-gtk<2.42.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-41983 | | 25769 | webkit-gtk<2.42.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-41983 |
25770 | webkit-gtk<2.42.2 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-42852 | | 25770 | webkit-gtk<2.42.2 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-42852 |
25771 | gst-plugins1-base<1.22.4 heap-overwrite https://nvd.nist.gov/vuln/detail/CVE-2023-37328 | | 25771 | gst-plugins1-base<1.22.4 heap-overwrite https://nvd.nist.gov/vuln/detail/CVE-2023-37328 |
25772 | gst-plugins1-base<1.22.4 heap-overwrite https://nvd.nist.gov/vuln/detail/CVE-2023-37329 | | 25772 | gst-plugins1-base<1.22.4 heap-overwrite https://nvd.nist.gov/vuln/detail/CVE-2023-37329 |
25773 | gst-plugins1-ugly<1.22.5 integer-overflow https://gstreamer.freedesktop.org/security/sa-2023-0004.html | | 25773 | gst-plugins1-ugly<1.22.5 integer-overflow https://gstreamer.freedesktop.org/security/sa-2023-0004.html |
25774 | gst-plugins1-ugly<1.22.5 integer-overflow https://gstreamer.freedesktop.org/security/sa-2023-0005.html | | 25774 | gst-plugins1-ugly<1.22.5 integer-overflow https://gstreamer.freedesktop.org/security/sa-2023-0005.html |
25775 | gst-plugins1-bad<1.22.6 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40474 | | 25775 | gst-plugins1-bad<1.22.6 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40474 |
25776 | gst-plugins1-bad<1.22.6 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40475 | | 25776 | gst-plugins1-bad<1.22.6 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40475 |
25777 | gst-plugins1-bad<1.22.6 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40476 | | 25777 | gst-plugins1-bad<1.22.6 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-40476 |
25778 | gst-plugins1-bad<1.22.6 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-44429 | | 25778 | gst-plugins1-bad<1.22.6 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-44429 |
25779 | gst-plugins1-bad<1.22.6 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-44446 | | 25779 | gst-plugins1-bad<1.22.6 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-44446 |
25780 | vim<9.0.2106 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-48231 | | 25780 | vim<9.0.2106 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2021-48231 |
25781 | vim<9.0.2112 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-48237 | | 25781 | vim<9.0.2112 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2021-48237 |
25782 | gnutls<3.8.2 timing-side-channel https://nvd.nist.gov/vuln/detail/CVE-2023-5981 | | 25782 | gnutls<3.8.2 timing-side-channel https://nvd.nist.gov/vuln/detail/CVE-2023-5981 |
25783 | vim<9.0.2121 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-48706 | | 25783 | vim<9.0.2121 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2023-48706 |
25784 | samba4>=4.0<4.18.9 information-leak https://nvd.nist.gov/vuln/detail/CVE-2018-14628 | | 25784 | samba4>=4.0<4.18.9 information-leak https://nvd.nist.gov/vuln/detail/CVE-2018-14628 |
25785 | samba4>=4.19<4.19.3 information-leak https://nvd.nist.gov/vuln/detail/CVE-2018-14628 | | 25785 | samba4>=4.19<4.19.3 information-leak https://nvd.nist.gov/vuln/detail/CVE-2018-14628 |
25786 | py{27,38,39,310,311,312}-cryptography>=3.1<41.0.6 NULL-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-49083 | | 25786 | py{27,38,39,310,311,312}-cryptography>=3.1<41.0.6 NULL-dereference https://nvd.nist.gov/vuln/detail/CVE-2023-49083 |
25787 | perl>=5.30.0<5.38.1 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-47038 | | 25787 | perl>=5.30.0<5.38.1 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-47038 |
25788 | webkit-gtk<2.42.3 disclose-sensitive-information https://nvd.nist.gov/vuln/detail/CVE-2023-42916 | | 25788 | webkit-gtk<2.42.3 disclose-sensitive-information https://nvd.nist.gov/vuln/detail/CVE-2023-42916 |
25789 | webkit-gtk<2.42.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-42917 | | 25789 | webkit-gtk<2.42.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-42917 |
25790 | go120<1.20.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-39326 | | 25790 | go120<1.20.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-39326 |
25791 | go121<1.21.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-39326 | | 25791 | go121<1.21.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-39326 |
25792 | go120<1.20.12 insecure-fallback https://nvd.nist.gov/vuln/detail/CVE-2023-45285 | | 25792 | go120<1.20.12 insecure-fallback https://nvd.nist.gov/vuln/detail/CVE-2023-45285 |
25793 | go121<1.21.5 insecure-fallback https://nvd.nist.gov/vuln/detail/CVE-2023-45285 | | 25793 | go121<1.21.5 insecure-fallback https://nvd.nist.gov/vuln/detail/CVE-2023-45285 |
25794 | curl>=7.46.0<8.5.0 information-exposure-through-sent-data https://nvd.nist.gov/vuln/detail/CVE-2023-46218 | | 25794 | curl>=7.46.0<8.5.0 information-exposure-through-sent-data https://nvd.nist.gov/vuln/detail/CVE-2023-46218 |
25795 | curl>=7.84.0<8.5.0 missing-encryption-of-sensitive-data https://nvd.nist.gov/vuln/detail/CVE-2023-46219 | | 25795 | curl>=7.84.0<8.5.0 missing-encryption-of-sensitive-data https://nvd.nist.gov/vuln/detail/CVE-2023-46219 |
25796 | fish<3.6.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-49284 | | 25796 | fish<3.6.2 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-49284 |
25797 | modular-xorg-server<21.1.10 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-CVE-2023-6377 | | 25797 | modular-xorg-server<21.1.10 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-CVE-2023-6377 |
25798 | modular-xorg-server<21.1.10 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-CVE-2023-6478 | | 25798 | modular-xorg-server<21.1.10 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-CVE-2023-6478 |
25799 | opensc>=0.17.0<0.24.0 potential-pin-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-40660 | | 25799 | opensc>=0.17.0<0.24.0 potential-pin-bypass https://nvd.nist.gov/vuln/detail/CVE-2023-40660 |
25800 | asterisk<18.20.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-49786 | | 25800 | asterisk<18.20.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-49786 |
25801 | asterisk>=20<20.5.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-49786 | | 25801 | asterisk>=20<20.5.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-49786 |
25802 | asterisk>=21<21.0.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-49786 | | 25802 | asterisk>=21<21.0.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-49786 |
25803 | asterisk<18 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 25803 | asterisk<18 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
25804 | asterisk>=19<20 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 25804 | asterisk>=19<20 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
25805 | jq<1.7.1 buffer-overflow http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-50246 | | 25805 | jq<1.7.1 buffer-overflow http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-50246 |
25806 | jq<1.7.1 buffer-overflow http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-50268 | | 25806 | jq<1.7.1 buffer-overflow http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-50268 |
25807 | webkit-gtk<2.42.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-42883 | | 25807 | webkit-gtk<2.42.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-42883 |
25808 | webkit-gtk<2.42.0 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-42890 | | 25808 | webkit-gtk<2.42.0 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-42890 |
25809 | openssh<9.6 extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 | | 25809 | openssh<9.6 extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 |
25810 | putty<0.80 extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 | | 25810 | putty<0.80 extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 |
25811 | py{38,39,310,311,321}-asyncssh<2.14.2 extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 | | 25811 | py{38,39,310,311,321}-asyncssh<2.14.2 extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 |
25812 | py{38,39,310,311,321}-asyncssh<2.14.2 extension-negotiation-attack https://nvd.nist.gov/vuln/detail/CVE-2023-46445 | | 25812 | py{38,39,310,311,321}-asyncssh<2.14.2 extension-negotiation-attack https://nvd.nist.gov/vuln/detail/CVE-2023-46445 |
25813 | py{38,39,310,311,321}-asyncssh<2.14.2 session-attack https://nvd.nist.gov/vuln/detail/CVE-2023-46446 | | 25813 | py{38,39,310,311,321}-asyncssh<2.14.2 session-attack https://nvd.nist.gov/vuln/detail/CVE-2023-46446 |
25814 | libssh<0.106 extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 | | 25814 | libssh<0.106 extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 |
25815 | py{38,39,310,311,321}-paramiko<3.4.0 session-attack https://nvd.nist.gov/vuln/detail/CVE-2023-46446 | | 25815 | py{38,39,310,311,321}-paramiko<3.4.0 session-attack https://nvd.nist.gov/vuln/detail/CVE-2023-46446 |
25816 | proftpd<1.3.8b extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 | | 25816 | proftpd<1.3.8b extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 |
25817 | dropbear<2022.83nb1 extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 | | 25817 | dropbear<2022.83nb1 extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 |
25818 | erlang<26.2.1 extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 | | 25818 | erlang<26.2.1 extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 |
25819 | libssh2<1.11.0nb2 extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 | | 25819 | libssh2<1.11.0nb2 extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 |
25820 | postfix<3.8.4 email-spoofing https://nvd.nist.gov/vuln/detail/CVE-2023-51764 | | 25820 | postfix<3.8.4 email-spoofing https://nvd.nist.gov/vuln/detail/CVE-2023-51764 |
25821 | mysqld_exporter<0.15.1 auth-bypass https://pkg.go.dev/vuln/GO-2022-1130 | | 25821 | mysqld_exporter<0.15.1 auth-bypass https://pkg.go.dev/vuln/GO-2022-1130 |
25822 | mysqld_exporter<0.15.1 denial-of-service https://pkg.go.dev/vuln/GO-2023-1571 | | 25822 | mysqld_exporter<0.15.1 denial-of-service https://pkg.go.dev/vuln/GO-2023-1571 |
25823 | postgres_exporter<0.15.0 auth-bypass https://pkg.go.dev/vuln/GO-2022-1130 | | 25823 | postgres_exporter<0.15.0 auth-bypass https://pkg.go.dev/vuln/GO-2022-1130 |
25824 | postgres_exporter<0.15.0 denial-of-service https://pkg.go.dev/vuln/GO-2023-1571 | | 25824 | postgres_exporter<0.15.0 denial-of-service https://pkg.go.dev/vuln/GO-2023-1571 |
25825 | git-lfs<3.4.1 denial-of-service https://pkg.go.dev/vuln/GO-2023-1571 | | 25825 | git-lfs<3.4.1 denial-of-service https://pkg.go.dev/vuln/GO-2023-1571 |
25826 | exim<4.97.1 email-spoofing https://nvd.nist.gov/vuln/detail/CVE-2023-51766 | | 25826 | exim<4.97.1 email-spoofing https://nvd.nist.gov/vuln/detail/CVE-2023-51766 |
25827 | nuclei<3.1.3 man-in-the-middle https://pkg.go.dev/vuln/GO-2023-2402 | | 25827 | nuclei<3.1.3 man-in-the-middle https://pkg.go.dev/vuln/GO-2023-2402 |
25828 | glow<1.5.1 man-in-the-middle https://pkg.go.dev/vuln/GO-2023-2402 | | 25828 | glow<1.5.1 man-in-the-middle https://pkg.go.dev/vuln/GO-2023-2402 |
25829 | sendmail<8.18.0.2 email-spoofing https://nvd.nist.gov/vuln/detail/CVE-CVE-2023-51765 | | 25829 | sendmail<8.18.0.2 email-spoofing https://nvd.nist.gov/vuln/detail/CVE-CVE-2023-51765 |
25830 | packer<1.9.5 man-in-the-middle https://pkg.go.dev/vuln/GO-2023-2402 | | 25830 | packer<1.9.5 man-in-the-middle https://pkg.go.dev/vuln/GO-2023-2402 |
25831 | ssh-chat-[0-9]* man-in-the-middle https://pkg.go.dev/vuln/GO-2023-2402 | | 25831 | ssh-chat-[0-9]* man-in-the-middle https://pkg.go.dev/vuln/GO-2023-2402 |
25832 | influxdb-[0-9]* denial-of-service https://pkg.go.dev/vuln/GO-2023-1571 | | 25832 | influxdb-[0-9]* denial-of-service https://pkg.go.dev/vuln/GO-2023-1571 |
25833 | lazygit-[0-9]* man-in-the-middle https://pkg.go.dev/vuln/GO-2023-2402 | | 25833 | lazygit-[0-9]* man-in-the-middle https://pkg.go.dev/vuln/GO-2023-2402 |
25834 | amfora-[0-9]* infinite-loop https://pkg.go.dev/vuln/GO-2021-0238 | | 25834 | amfora-[0-9]* infinite-loop https://pkg.go.dev/vuln/GO-2021-0238 |
25835 | hub-[0-9]* denial-of-service https://pkg.go.dev/vuln/GO-2021-0061 | | 25835 | hub-[0-9]* denial-of-service https://pkg.go.dev/vuln/GO-2021-0061 |
25836 | nats-server-[0-9]* permissions-checking https://pkg.go.dev/vuln/GO-2022-0386 | | 25836 | nats-server-[0-9]* permissions-checking https://pkg.go.dev/vuln/GO-2022-0386 |
25837 | obfs4proxy-[0-9]* denial-of-service https://pkg.go.dev/vuln/GO-2023-1571 | | 25837 | obfs4proxy-[0-9]* denial-of-service https://pkg.go.dev/vuln/GO-2023-1571 |
25838 | terraform-provider-aws-[0-9]* denial-of-service https://pkg.go.dev/vuln/GO-2023-2153 | | 25838 | terraform-provider-aws-[0-9]* denial-of-service https://pkg.go.dev/vuln/GO-2023-2153 |
25839 | terraform-provider-aws-[0-9]* denial-of-service https://pkg.go.dev/vuln/GO-2023-1571 | | 25839 | terraform-provider-aws-[0-9]* denial-of-service https://pkg.go.dev/vuln/GO-2023-1571 |
25840 | authelia-[0-9]* path-traversal https://pkg.go.dev/vuln/GO-2022-0355 | | 25840 | authelia-[0-9]* path-traversal https://pkg.go.dev/vuln/GO-2022-0355 |
25841 | authelia-[0-9]* out-of-bounds-read https://pkg.go.dev/vuln/GO-2021-0113 | | 25841 | authelia-[0-9]* out-of-bounds-read https://pkg.go.dev/vuln/GO-2021-0113 |
25842 | apisprout-[0-9]* denial-of-service https://pkg.go.dev/vuln/GO-2021-0061 | | 25842 | apisprout-[0-9]* denial-of-service https://pkg.go.dev/vuln/GO-2021-0061 |
25843 | gitea-[0-9]* man-in-the-middle https://pkg.go.dev/vuln/GO-2023-2402 | | 25843 | gitea-[0-9]* man-in-the-middle https://pkg.go.dev/vuln/GO-2023-2402 |
25844 | gitea-[0-9]* improper-rendering https://pkg.go.dev/vuln/GO-2023-1988 | | 25844 | gitea-[0-9]* improper-rendering https://pkg.go.dev/vuln/GO-2023-1988 |
25845 | openssh<9.6 command-injection https://nvd.nist.gov/vuln/detail/CVE-2023-51385 | | 25845 | openssh<9.6 command-injection https://nvd.nist.gov/vuln/detail/CVE-2023-51385 |
25846 | libssh<0.10.6 command-injection https://nvd.nist.gov/vuln/detail/CVE-2023-6004 | | 25846 | libssh<0.10.6 command-injection https://nvd.nist.gov/vuln/detail/CVE-2023-6004 |
25847 | p5-Spreadsheet-ParseExcel<0.6600 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-7101 | | 25847 | p5-Spreadsheet-ParseExcel<0.6600 remote-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-7101 |
25848 | filezilla<3.66.4 extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 | | 25848 | filezilla<3.66.4 extension-negotiation-downgrade https://nvd.nist.gov/vuln/detail/CVE-2023-48795 |
25849 | libheif<1.17.6 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-49462 | | 25849 | libheif<1.17.6 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-49462 |
25850 | libde265<1.0.15 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-49468 | | 25850 | libde265<1.0.15 buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-2023-49468 |
25851 | gst-plugins1-bad<1.22.8 buffer-overflow https://gstreamer.freedesktop.org/security/sa-2023-0011.html | | 25851 | gst-plugins1-bad<1.22.8 buffer-overflow https://gstreamer.freedesktop.org/security/sa-2023-0011.html |
25852 | modular-xorg-server<21.1.11 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-CVE-2023-6816 | | 25852 | modular-xorg-server<21.1.11 heap-buffer-overflow https://nvd.nist.gov/vuln/detail/CVE-CVE-2023-6816 |
25853 | coreutils<9.4 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2024-0684 | | 25853 | coreutils<9.4 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2024-0684 |
25854 | gnutls<3.8.3 timing-side-channel https://nvd.nist.gov/vuln/detail/CVE-2023-0553 | | 25854 | gnutls<3.8.3 timing-side-channel https://nvd.nist.gov/vuln/detail/CVE-2023-0553 |
25855 | py{27,38,39,310,311,312}-Pillow<10.2.0 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-50447 | | 25855 | py{27,38,39,310,311,312}-Pillow<10.2.0 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2023-50447 |
25856 | postgresql-server>=11<12 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 25856 | postgresql-server>=11<12 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
25857 | nodejs>=16<18 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 25857 | nodejs>=16<18 eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
25858 | py{27,37,38,39,310,311,312}-aiohttp<3.9.2 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2024-23334 | | 25858 | py{27,37,38,39,310,311,312}-aiohttp<3.9.2 directory-traversal https://nvd.nist.gov/vuln/detail/CVE-2024-23334 |
25859 | py{27,37,38,39,310,311,312}-aiohttp<3.9.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-23829 | | 25859 | py{27,37,38,39,310,311,312}-aiohttp<3.9.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-23829 |
25860 | curl<8.6.0 out-of-bounds https://nvd.nist.gov/vuln/detail/CVE-2023-52071 | | 25860 | curl<8.6.0 out-of-bounds https://nvd.nist.gov/vuln/detail/CVE-2023-52071 |
25861 | mbedtls<2.28.7 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2024-23170 | | 25861 | mbedtls<2.28.7 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2024-23170 |
25862 | mbedtls>=3<3.5.2 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2024-23170 | | 25862 | mbedtls>=3<3.5.2 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2024-23170 |
25863 | mbedtls<2.28.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-23775 | | 25863 | mbedtls<2.28.7 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-23775 |
25864 | mbedtls>=3<3.5.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-23775 | | 25864 | mbedtls>=3<3.5.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-23775 |
25865 | opensc-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-5992 | | 25865 | opensc-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2023-5992 |
25866 | py{27,37,38,39,310,311,312}-octoprint-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2024-23637 | | 25866 | py{27,37,38,39,310,311,312}-octoprint-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2024-23637 |
25867 | glpi<10.0.12 code-injection https://nvd.nist.gov/vuln/detail/CVE-2023-51446 | | 25867 | glpi<10.0.12 code-injection https://nvd.nist.gov/vuln/detail/CVE-2023-51446 |
25868 | glpi<10.0.12 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2024-23645 | | 25868 | glpi<10.0.12 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2024-23645 |
25869 | graphviz<10 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-46045 | | 25869 | graphviz<10 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2023-46045 |
25870 | expat<2.6.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-52425 | | 25870 | expat<2.6.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-52425 |
25871 | expat<2.6.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-52426 | | 25871 | expat<2.6.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2023-52426 |
25872 | webkit-gtk<2.42.5 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2024-23222 | | 25872 | webkit-gtk<2.42.5 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2024-23222 |
25873 | py{27,37,38,39,310,311,312}-django>=3.2<3.2.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-24680 | | 25873 | py{27,37,38,39,310,311,312}-django>=3.2<3.2.24 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-24680 |
25874 | py{27,37,38,39,310,311,312}-django>=4.1<4.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-24680 | | 25874 | py{27,37,38,39,310,311,312}-django>=4.1<4.2 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-24680 |
25875 | py{27,37,38,39,310,311,312}-django>=4.2<4.2.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-24680 | | 25875 | py{27,37,38,39,310,311,312}-django>=4.2<4.2.10 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2024-24680 |
25876 | libuv>=1.24.0<1.48 address-check-bypass https://nvd.nist.gov/vuln/detail/CVE-2024-24806 | | 25876 | libuv>=1.24.0<1.48 address-check-bypass https://nvd.nist.gov/vuln/detail/CVE-2024-24806 |
25877 | postgresql-server>=12<12.18 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2024-0985 | | 25877 | postgresql-server>=12<12.18 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2024-0985 |
25878 | postgresql-server>=13<13.14 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2024-0985 | | 25878 | postgresql-server>=13<13.14 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2024-0985 |
25879 | postgresql-server>=14<14.11 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2024-0985 | | 25879 | postgresql-server>=14<14.11 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2024-0985 |
25880 | postgresql-server>=15<15.6 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2024-0985 | | 25880 | postgresql-server>=15<15.6 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2024-0985 |
25881 | postgresql-server>=16<16.2 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2024-0985 | | 25881 | postgresql-server>=16<16.2 arbitrary-command-execution https://nvd.nist.gov/vuln/detail/CVE-2024-0985 |
25882 | asterisk-13.* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages | | 25882 | asterisk-13.* eol http://ftp.NetBSD.org/pub/NetBSD/packages/vulns/eol-packages |
| | | 25883 | unbound<1.19.1 denial-of-service https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50387 |
| | | 25884 | unbound<1.19.1 denial-of-service https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50868 |