id
stringlengths
13
16
published
stringlengths
23
23
url
stringlengths
12
500
tags
sequencelengths
1
6
domain
stringlengths
4
49
__index_level_0__
int64
0
135k
CVE-2018-12405
2019-02-28T18:29:01.257
https://www.debian.org/security/2018/dsa-4354
[ "Third Party Advisory" ]
www.debian.org
2,510
CVE-2018-12405
2019-02-28T18:29:01.257
https://www.debian.org/security/2019/dsa-4362
[ "Third Party Advisory" ]
www.debian.org
2,510
CVE-2018-12405
2019-02-28T18:29:01.257
https://www.mozilla.org/security/advisories/mfsa2018-29/
[ "Vendor Advisory" ]
www.mozilla.org
2,510
CVE-2018-12405
2019-02-28T18:29:01.257
https://www.mozilla.org/security/advisories/mfsa2018-30/
[ "Vendor Advisory" ]
www.mozilla.org
2,510
CVE-2018-12405
2019-02-28T18:29:01.257
https://www.mozilla.org/security/advisories/mfsa2018-31/
[ "Vendor Advisory" ]
www.mozilla.org
2,510
CVE-2018-12406
2019-02-28T18:29:01.337
http://www.securityfocus.com/bid/106167
[ "Third Party Advisory" ]
www.securityfocus.com
2,511
CVE-2018-12406
2019-02-28T18:29:01.337
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1456947%2C1475669%2C1504816%2C1502886%2C1500064%2C1500310%2C1500696%2C1499198%2C1434490%2C1481745%2C1458129
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
bugzilla.mozilla.org
2,511
CVE-2018-12407
2019-02-28T18:29:01.383
https://bugzilla.mozilla.org/show_bug.cgi?id=1505973
[ "Issue Tracking", "Permissions Required", "Vendor Advisory" ]
bugzilla.mozilla.org
2,512
CVE-2018-18492
2019-02-28T18:29:01.430
https://bugzilla.mozilla.org/show_bug.cgi?id=1499861
[ "Issue Tracking", "Permissions Required", "Vendor Advisory" ]
bugzilla.mozilla.org
2,513
CVE-2018-18493
2019-02-28T18:29:01.507
https://bugzilla.mozilla.org/show_bug.cgi?id=1504452
[ "Issue Tracking", "Permissions Required", "Vendor Advisory" ]
bugzilla.mozilla.org
2,514
CVE-2018-18494
2019-02-28T18:29:01.587
https://bugzilla.mozilla.org/show_bug.cgi?id=1487964
[ "Issue Tracking", "Permissions Required", "Vendor Advisory" ]
bugzilla.mozilla.org
2,515
CVE-2018-18495
2019-02-28T18:29:01.680
https://bugzilla.mozilla.org/show_bug.cgi?id=1427585
[ "Issue Tracking", "Permissions Required", "Vendor Advisory" ]
bugzilla.mozilla.org
2,516
CVE-2018-18496
2019-02-28T18:29:01.743
https://bugzilla.mozilla.org/show_bug.cgi?id=1422231
[ "Issue Tracking", "Permissions Required", "Vendor Advisory" ]
bugzilla.mozilla.org
2,517
CVE-2018-18497
2019-02-28T18:29:01.790
https://bugzilla.mozilla.org/show_bug.cgi?id=1488180
[ "Issue Tracking", "Permissions Required", "Vendor Advisory" ]
bugzilla.mozilla.org
2,518
CVE-2018-18498
2019-02-28T18:29:01.853
https://bugzilla.mozilla.org/show_bug.cgi?id=1500011
[ "Issue Tracking", "Permissions Required", "Vendor Advisory" ]
bugzilla.mozilla.org
2,519
CVE-2018-18499
2019-02-28T18:29:01.947
https://bugzilla.mozilla.org/show_bug.cgi?id=1468523
[ "Issue Tracking", "Permissions Required", "Vendor Advisory" ]
bugzilla.mozilla.org
2,520
CVE-2018-18499
2019-02-28T18:29:01.947
https://www.mozilla.org/security/advisories/mfsa2018-20/
[ "Vendor Advisory" ]
www.mozilla.org
2,520
CVE-2018-18499
2019-02-28T18:29:01.947
https://www.mozilla.org/security/advisories/mfsa2018-21/
[ "Vendor Advisory" ]
www.mozilla.org
2,520
CVE-2018-18499
2019-02-28T18:29:01.947
https://www.mozilla.org/security/advisories/mfsa2018-25/
[ "Vendor Advisory" ]
www.mozilla.org
2,520
CVE-2019-1663
2019-02-28T18:29:02.040
http://packetstormsecurity.com/files/152507/Cisco-RV130W-Routers-Management-Interface-Remote-Command-Execution.html
[ "Third Party Advisory", "VDB Entry" ]
packetstormsecurity.com
2,521
CVE-2019-1663
2019-02-28T18:29:02.040
http://packetstormsecurity.com/files/153163/Cisco-RV130W-1.0.3.44-Remote-Stack-Overflow.html
[ "Third Party Advisory", "VDB Entry" ]
packetstormsecurity.com
2,521
CVE-2019-1663
2019-02-28T18:29:02.040
http://packetstormsecurity.com/files/154310/Cisco-RV110W-RV130-W-RV215W-Remote-Command-Execution.html
[ "Third Party Advisory", "VDB Entry" ]
packetstormsecurity.com
2,521
CVE-2019-1663
2019-02-28T18:29:02.040
http://www.rapid7.com/db/modules/exploit/linux/http/cisco_rv130_rmi_rce
[ "Exploit", "Third Party Advisory" ]
www.rapid7.com
2,521
CVE-2019-1663
2019-02-28T18:29:02.040
http://www.securityfocus.com/bid/107185
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,521
CVE-2019-1663
2019-02-28T18:29:02.040
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-rmi-cmd-ex
[ "Vendor Advisory" ]
tools.cisco.com
2,521
CVE-2019-1663
2019-02-28T18:29:02.040
https://www.exploit-db.com/exploits/46705/
[ "Exploit", "Third Party Advisory", "VDB Entry" ]
www.exploit-db.com
2,521
CVE-2019-1674
2019-02-28T18:29:02.087
http://www.securityfocus.com/bid/107184
[ "Third Party Advisory" ]
www.securityfocus.com
2,522
CVE-2019-1674
2019-02-28T18:29:02.087
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190227-wmda-cmdinj
[ "Vendor Advisory" ]
tools.cisco.com
2,522
CVE-2019-1674
2019-02-28T18:29:02.087
https://www.exploit-db.com/exploits/46479/
[ "Exploit", "Third Party Advisory" ]
www.exploit-db.com
2,522
CVE-2019-6555
2019-02-28T20:29:00.323
http://www.securityfocus.com/bid/107087
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,523
CVE-2019-6555
2019-02-28T20:29:00.323
https://ics-cert.us-cert.gov/advisories/ICSA-19-050-03
[ "US Government Resource", "Third Party Advisory" ]
ics-cert.us-cert.gov
2,523
CVE-2019-6547
2019-02-28T21:29:00.250
http://www.securityfocus.com/bid/107086
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,524
CVE-2019-6547
2019-02-28T21:29:00.250
https://ics-cert.us-cert.gov/advisories/ICSA-19-050-02
[ "Patch", "US Government Resource", "Third Party Advisory" ]
ics-cert.us-cert.gov
2,524
CVE-2019-6551
2019-02-28T21:29:00.297
http://www.securityfocus.com/bid/107031
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,525
CVE-2019-6551
2019-02-28T21:29:00.297
https://ics-cert.us-cert.gov/advisories/ICSA-19-045-01
[ "Third Party Advisory", "US Government Resource" ]
ics-cert.us-cert.gov
2,525
CVE-2019-9482
2019-03-01T05:29:00.790
https://github.com/MISP/MISP/commit/c69969329d197bcdd04832b03310fa73f4eb7155
[ "Patch", "Third Party Advisory" ]
github.com
2,526
CVE-2019-9483
2019-03-01T05:29:01.133
https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/
[ "Third Party Advisory" ]
dojo.bullguard.com
2,527
CVE-2019-9483
2019-03-01T05:29:01.133
https://www.theverge.com/2019/2/27/18243296/ring-doorbell-hacked-fake-images-security-experts
[ "Third Party Advisory" ]
www.theverge.com
2,527
CVE-2019-9484
2019-03-01T07:29:00.217
https://medium.com/%40SergiuSechel/insecure-permissions-in-glen-dimplex-deutschland-gmbh-implementation-of-carel-pcoweb-configuration-ca3896f24835
null
medium.com
2,528
CVE-2018-20798
2019-03-01T15:29:00.280
https://redmine.pfsense.org/issues/9223
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
redmine.pfsense.org
2,529
CVE-2018-8790
2019-03-01T16:29:00.247
http://www.securityfocus.com/bid/107254
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,531
CVE-2018-8790
2019-03-01T16:29:00.247
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk142952
[ "Vendor Advisory" ]
supportcenter.checkpoint.com
2,531
CVE-2018-8790
2019-03-01T16:29:00.247
https://www.zonealarm.com/software/release-history/zafavfw.html#15.4.062.17802
[ "Release Notes", "Vendor Advisory" ]
www.zonealarm.com
2,531
CVE-2018-8790
2019-03-01T16:29:00.247
https://www.zonealarm.com/software/release-history/zafree.html#15.4.062.17802
[ "Release Notes", "Vendor Advisory" ]
www.zonealarm.com
2,531
CVE-2019-9543
2019-03-01T19:29:02.743
http://www.securityfocus.com/bid/107238
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,532
CVE-2019-9543
2019-03-01T19:29:02.743
https://gitlab.freedesktop.org/poppler/poppler/issues/730
[ "Exploit", "Third Party Advisory" ]
gitlab.freedesktop.org
2,532
CVE-2019-9543
2019-03-01T19:29:02.743
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadgenericbitmap-poppler-0-74-0/
[ "Third Party Advisory" ]
research.loginsoft.com
2,532
CVE-2019-9544
2019-03-01T19:29:02.850
https://github.com/axiomatic-systems/Bento4/issues/374
[ "Exploit", "Third Party Advisory" ]
github.com
2,533
CVE-2019-9544
2019-03-01T19:29:02.850
https://research.loginsoft.com/bugs/out-of-bounds-write-in-function-ap4_cttstableentryap4_cttstableentry-bento4-1-5-1-0/
[ "Exploit", "Third Party Advisory" ]
research.loginsoft.com
2,533
CVE-2019-9545
2019-03-01T19:29:02.930
https://gitlab.freedesktop.org/poppler/poppler/issues/731
[ "Exploit", "Third Party Advisory" ]
gitlab.freedesktop.org
2,534
CVE-2019-9545
2019-03-01T19:29:02.930
https://research.loginsoft.com/bugs/recursive-function-call-in-function-jbig2streamreadtextregion-poppler-0-74-0/
[ "Exploit", "Third Party Advisory" ]
research.loginsoft.com
2,534
CVE-2019-9546
2019-03-01T22:29:00.230
https://github.com/active-labs/Advisories/blob/master/2019/ACTIVE-2019-005.md
null
github.com
2,535
CVE-2019-9546
2019-03-01T22:29:00.230
https://support.solarwinds.com/SuccessCenter/s/article/CVE-2019-9546-Orion-Platform-Vulnerability
[ "Vendor Advisory" ]
support.solarwinds.com
2,535
CVE-2019-9546
2019-03-01T22:29:00.230
https://support.solarwinds.com/Success_Center/Orion_Platform/Orion_Documentation/Additional_Resources/Orion_Platform_2018-4_Hotfix_2
[ "Release Notes", "Vendor Advisory" ]
support.solarwinds.com
2,535
CVE-2019-9547
2019-03-01T22:29:00.277
https://github.com/spdk/spdk/commit/eca42c66092b9031711afe215fbc1891ee55f143
[ "Third Party Advisory" ]
github.com
2,536
CVE-2019-9547
2019-03-01T22:29:00.277
https://github.com/spdk/spdk/releases/tag/v19.01
[ "Third Party Advisory" ]
github.com
2,536
CVE-2019-8278
2019-03-02T01:29:00.307
http://www.securityfocus.com/bid/107258
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,537
CVE-2019-8278
2019-03-02T01:29:00.307
https://scriptinjection.blogspot.com/2019/02/invision-power-board-331-348-stored-xss.html
[ "Exploit", "Third Party Advisory" ]
scriptinjection.blogspot.com
2,537
CVE-2019-8279
2019-03-02T01:29:00.357
https://scriptinjection.blogspot.com/2019/02/vanilla-forums-25-stored-xss-in-any.html
[ "Exploit", "Third Party Advisory" ]
scriptinjection.blogspot.com
2,538
CVE-2019-9549
2019-03-03T19:29:00.260
https://github.com/PopojiCMS/PopojiCMS/issues/17
[ "Exploit", "Third Party Advisory" ]
github.com
2,539
CVE-2019-9550
2019-03-03T19:29:00.557
https://github.com/ShaoGongBra/dhcms/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
2,540
CVE-2019-9551
2019-03-04T04:29:00.240
https://github.com/millken/doyocms/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
2,541
CVE-2019-9552
2019-03-04T04:29:00.287
https://github.com/lmy1342554547/p2pProject/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
2,542
CVE-2019-9563
2019-03-04T08:29:00.280
http://git.bluemind.net/bluemind/commit/b11aa12d3c2f4c5dac4f9059f8b6bac1bf873244
[ "Patch", "Vendor Advisory" ]
git.bluemind.net
2,543
CVE-2019-9563
2019-03-04T08:29:00.280
https://forum.bluemind.net/viewtopic.php?pid=8049#p8049
[ "Issue Tracking", "Vendor Advisory" ]
forum.bluemind.net
2,543
CVE-2019-9563
2019-03-04T08:29:00.280
https://forum.bluemind.net/viewtopic.php?pid=8054#p8054
[ "Issue Tracking", "Vendor Advisory" ]
forum.bluemind.net
2,543
CVE-2019-9565
2019-03-04T08:29:00.497
https://gosecure.net/2019/02/20/abusing-unsafe-defaults-in-active-directory/
[ "Exploit", "Third Party Advisory" ]
gosecure.net
2,544
CVE-2019-9565
2019-03-04T08:29:00.497
https://www.druide.com/en/news/security-improvement-antidote-windows
[ "Vendor Advisory" ]
www.druide.com
2,544
CVE-2019-9566
2019-03-04T18:29:00.257
http://www.iwantacve.cn/index.php/archives/127/
[ "Exploit", "Third Party Advisory" ]
www.iwantacve.cn
2,545
CVE-2019-9567
2019-03-04T18:29:00.350
https://lists.openwall.net/full-disclosure/2019/02/05/4
[ "Exploit", "Third Party Advisory" ]
lists.openwall.net
2,546
CVE-2019-9567
2019-03-04T18:29:00.350
https://security-consulting.icu/blog/2019/02/wordpress-forminator-persistent-xss-blind-sql-injection/
[ "Exploit", "Third Party Advisory" ]
security-consulting.icu
2,546
CVE-2019-9567
2019-03-04T18:29:00.350
https://wordpress.org/plugins/forminator/#developers
[ "Vendor Advisory" ]
wordpress.org
2,546
CVE-2019-9567
2019-03-04T18:29:00.350
https://wpvulndb.com/vulnerabilities/9215
[ "Third Party Advisory" ]
wpvulndb.com
2,546
CVE-2019-6206
2019-03-04T20:29:00.267
http://www.securityfocus.com/bid/106687
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,548
CVE-2019-6206
2019-03-04T20:29:00.267
https://support.apple.com/HT209443
[ "Vendor Advisory" ]
support.apple.com
2,548
CVE-2019-6235
2019-03-04T20:29:00.313
http://www.securityfocus.com/bid/106724
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,549
CVE-2019-6235
2019-03-04T20:29:00.313
https://support.apple.com/HT209446
[ "Vendor Advisory" ]
support.apple.com
2,549
CVE-2019-6235
2019-03-04T20:29:00.313
https://support.apple.com/HT209447
[ "Vendor Advisory" ]
support.apple.com
2,549
CVE-2019-6235
2019-03-04T20:29:00.313
https://support.apple.com/HT209448
[ "Vendor Advisory" ]
support.apple.com
2,549
CVE-2019-6235
2019-03-04T20:29:00.313
https://support.apple.com/HT209450
[ "Vendor Advisory" ]
support.apple.com
2,549
CVE-2017-15515
2019-03-04T22:29:00.267
http://www.securityfocus.com/bid/107272
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,550
CVE-2017-15515
2019-03-04T22:29:00.267
https://security.netapp.com/advisory/ntap-20190304-0002/
[ "Patch", "Vendor Advisory" ]
security.netapp.com
2,550
CVE-2018-5482
2019-03-04T23:29:00.213
http://www.securityfocus.com/bid/107274
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,551
CVE-2018-5482
2019-03-04T23:29:00.213
https://security.netapp.com/advisory/ntap-20190304-0001/
[ "Patch", "Vendor Advisory" ]
security.netapp.com
2,551
CVE-2019-9570
2019-03-05T14:29:00.247
https://github.com/yzmcms/yzmcms/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
2,552
CVE-2019-9572
2019-03-05T14:29:00.310
https://github.com/PearlyNautilus/Security-Code-Review/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
2,553
CVE-2018-15361
2019-03-05T15:29:00.273
https://cert-portal.siemens.com/productcert/pdf/ssa-927095.pdf
null
cert-portal.siemens.com
2,554
CVE-2018-15361
2019-03-05T15:29:00.273
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-003-ultravnc-buffer-underwrite/
[ "Third Party Advisory" ]
ics-cert.kaspersky.com
2,554
CVE-2018-15361
2019-03-05T15:29:00.273
https://www.us-cert.gov/ics/advisories/icsa-20-161-06
null
www.us-cert.gov
2,554
CVE-2019-8258
2019-03-05T15:29:00.320
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-004-ultravnc-heap-based-buffer-overflow/
[ "Third Party Advisory" ]
ics-cert.kaspersky.com
2,555
CVE-2019-8259
2019-03-05T15:29:00.367
https://cert-portal.siemens.com/productcert/pdf/ssa-286838.pdf
null
cert-portal.siemens.com
2,556
CVE-2019-8259
2019-03-05T15:29:00.367
https://cert-portal.siemens.com/productcert/pdf/ssa-940818.pdf
null
cert-portal.siemens.com
2,556
CVE-2019-8259
2019-03-05T15:29:00.367
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-005-ultravnc-memory-leak/
[ "Third Party Advisory" ]
ics-cert.kaspersky.com
2,556
CVE-2019-8259
2019-03-05T15:29:00.367
https://us-cert.cisa.gov/ics/advisories/icsa-21-131-11
null
us-cert.cisa.gov
2,556
CVE-2019-8260
2019-03-05T15:29:00.397
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-006-ultravnc-out-of-bound-read/
[ "Third Party Advisory" ]
ics-cert.kaspersky.com
2,557
CVE-2019-8261
2019-03-05T15:29:00.443
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-007-ultravnc-out-of-bound-read/
[ "Third Party Advisory" ]
ics-cert.kaspersky.com
2,558
CVE-2019-8262
2019-03-05T15:29:00.477
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-008-ultravnc-heap-based-buffer-overflow/
[ "Third Party Advisory" ]
ics-cert.kaspersky.com
2,559
CVE-2019-8263
2019-03-05T15:29:00.507
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/
[ "Not Applicable", "Third Party Advisory" ]
ics-cert.kaspersky.com
2,560
CVE-2019-8263
2019-03-05T15:29:00.507
https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-010-ultravnc-stack-based-buffer-overflow/
[ "Third Party Advisory" ]
ics-cert.kaspersky.com
2,560
CVE-2018-19636
2019-03-05T16:29:00.293
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00018.html
null
lists.opensuse.org
2,561