id
stringlengths 13
16
| published
stringlengths 23
23
| url
stringlengths 12
500
| tags
listlengths 1
6
⌀ | domain
stringlengths 4
49
| __index_level_0__
int64 0
135k
|
---|---|---|---|---|---|
CVE-2018-1000411
|
2019-01-09T23:29:02.450
|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1101
|
[
"Third Party Advisory"
] |
jenkins.io
| 368 |
CVE-2018-1000412
|
2019-01-09T23:29:02.480
|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1029
|
[
"Third Party Advisory"
] |
jenkins.io
| 369 |
CVE-2018-1000413
|
2019-01-09T23:29:02.513
|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1080
|
[
"Third Party Advisory"
] |
jenkins.io
| 370 |
CVE-2018-1000414
|
2019-01-09T23:29:02.543
|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-938
|
[
"Third Party Advisory"
] |
jenkins.io
| 371 |
CVE-2018-1000415
|
2019-01-09T23:29:02.577
|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-130
|
[
"Third Party Advisory"
] |
jenkins.io
| 372 |
CVE-2018-1000416
|
2019-01-09T23:29:02.607
|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1130
|
[
"Third Party Advisory"
] |
jenkins.io
| 373 |
CVE-2018-1000417
|
2019-01-09T23:29:02.637
|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1125
|
[
"Third Party Advisory"
] |
jenkins.io
| 374 |
CVE-2018-1000418
|
2019-01-09T23:29:02.670
|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-984%20%281%29
| null |
jenkins.io
| 375 |
CVE-2018-1000419
|
2019-01-09T23:29:02.730
|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-984%20%282%29
| null |
jenkins.io
| 376 |
CVE-2018-1000420
|
2019-01-09T23:29:02.763
|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1013%20%281%29
| null |
jenkins.io
| 377 |
CVE-2018-1000421
|
2019-01-09T23:29:02.810
|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1013%20%282%29
| null |
jenkins.io
| 378 |
CVE-2018-1000422
|
2019-01-09T23:29:02.840
|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1067
|
[
"Vendor Advisory"
] |
jenkins.io
| 379 |
CVE-2018-1000423
|
2019-01-09T23:29:02.887
|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1068
|
[
"Third Party Advisory"
] |
jenkins.io
| 380 |
CVE-2018-1000424
|
2019-01-09T23:29:02.920
|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-265
|
[
"Vendor Advisory"
] |
jenkins.io
| 381 |
CVE-2018-1000425
|
2019-01-09T23:29:02.967
|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1163
|
[
"Third Party Advisory"
] |
jenkins.io
| 382 |
CVE-2018-1000426
|
2019-01-09T23:29:02.997
|
https://jenkins.io/security/advisory/2018-09-25/#SECURITY-1122
|
[
"Vendor Advisory"
] |
jenkins.io
| 383 |
CVE-2018-16164
|
2019-01-09T23:29:03.027
|
https://jvn.jp/en/jp/JVN75738023/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 384 |
CVE-2018-16164
|
2019-01-09T23:29:03.027
|
https://plugins.trac.wordpress.org/changeset/1961423/
|
[
"Third Party Advisory"
] |
plugins.trac.wordpress.org
| 384 |
CVE-2018-16164
|
2019-01-09T23:29:03.027
|
https://wordpress.org/plugins/event-calendar-wd/#developers
|
[
"Release Notes"
] |
wordpress.org
| 384 |
CVE-2018-16164
|
2019-01-09T23:29:03.027
|
https://wpvulndb.com/vulnerabilities/9199
|
[
"Third Party Advisory"
] |
wpvulndb.com
| 384 |
CVE-2018-16165
|
2019-01-09T23:29:03.090
|
https://github.com/JPCERTCC/LogonTracer/releases/tag/v1.2.1
|
[
"Release Notes",
"Third Party Advisory"
] |
github.com
| 385 |
CVE-2018-16165
|
2019-01-09T23:29:03.090
|
https://jvn.jp/en/vu/JVNVU98026636/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 385 |
CVE-2018-16169
|
2019-01-09T23:29:03.293
|
https://jvn.jp/en/jp/JVN23161885/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 389 |
CVE-2018-16169
|
2019-01-09T23:29:03.293
|
https://kb.cybozu.support/article/34311/
|
[
"Vendor Advisory"
] |
kb.cybozu.support
| 389 |
CVE-2018-16170
|
2019-01-09T23:29:03.340
|
https://kb.cybozu.support/article/34301/
|
[
"Vendor Advisory"
] |
kb.cybozu.support
| 390 |
CVE-2018-16171
|
2019-01-09T23:29:03.387
|
https://kb.cybozu.support/article/35259/
|
[
"Vendor Advisory"
] |
kb.cybozu.support
| 391 |
CVE-2018-16172
|
2019-01-09T23:29:03.420
|
https://kb.cybozu.support/article/35260/
|
[
"Vendor Advisory"
] |
kb.cybozu.support
| 392 |
CVE-2018-16173
|
2019-01-09T23:29:03.467
|
https://jvn.jp/en/jp/JVN85760090/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 393 |
CVE-2018-16173
|
2019-01-09T23:29:03.467
|
https://wordpress.org/plugins/learnpress/
|
[
"Third Party Advisory"
] |
wordpress.org
| 393 |
CVE-2018-16176
|
2019-01-09T23:29:03.607
|
https://emdb.jaea.go.jp/emdb/en/mappingtool.html
|
[
"Vendor Advisory"
] |
emdb.jaea.go.jp
| 396 |
CVE-2018-16176
|
2019-01-09T23:29:03.607
|
https://jvn.jp/en/jp/JVN33677949/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 396 |
CVE-2018-16177
|
2019-01-09T23:29:03.653
|
https://f-security.jp/v6/support/information/100193.html
|
[
"Vendor Advisory"
] |
f-security.jp
| 397 |
CVE-2018-16177
|
2019-01-09T23:29:03.653
|
https://jvn.jp/en/jp/JVN15709478/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 397 |
CVE-2018-16178
|
2019-01-09T23:29:03.717
|
https://jvn.jp/en/jp/JVN25385698/index.html
|
[
"Patch",
"Third Party Advisory"
] |
jvn.jp
| 398 |
CVE-2018-16178
|
2019-01-09T23:29:03.717
|
https://kb.cybozu.support/article/35265
|
[
"Vendor Advisory"
] |
kb.cybozu.support
| 398 |
CVE-2018-16179
|
2019-01-09T23:29:03.763
|
https://jvn.jp/en/vu/JVNVU91640357/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 399 |
CVE-2018-16179
|
2019-01-09T23:29:03.763
|
https://play.google.com/store/apps/details?id=jp.co.mizuhobank.banking
|
[
"Product",
"Third Party Advisory"
] |
play.google.com
| 399 |
CVE-2018-16180
|
2019-01-09T23:29:03.827
|
https://download.daj.co.jp/user/ifilter/V9/
|
[
"Permissions Required",
"Vendor Advisory"
] |
download.daj.co.jp
| 400 |
CVE-2018-16180
|
2019-01-09T23:29:03.827
|
https://jvn.jp/en/jp/JVN32155106/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 400 |
CVE-2018-16182
|
2019-01-09T23:29:03.903
|
https://jvn.jp/en/jp/JVN78422300/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 402 |
CVE-2018-16182
|
2019-01-09T23:29:03.903
|
https://marketspeed.jp/ms1/download/
|
[
"Product",
"Vendor Advisory"
] |
marketspeed.jp
| 402 |
CVE-2018-16183
|
2019-01-09T23:29:03.967
|
https://jvn.jp/en/jp/JVN36895151/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 403 |
CVE-2018-16183
|
2019-01-09T23:29:03.967
|
https://pc-dl.panasonic.co.jp/dl/docs/077770
|
[
"Vendor Advisory"
] |
pc-dl.panasonic.co.jp
| 403 |
CVE-2018-16184
|
2019-01-09T23:29:04.043
|
https://jvn.jp/en/jp/JVN55263945/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 404 |
CVE-2018-16184
|
2019-01-09T23:29:04.043
|
https://www.ricoh.com/info/2018/1127_1.html
|
[
"Vendor Advisory"
] |
www.ricoh.com
| 404 |
CVE-2018-16191
|
2019-01-09T23:29:04.293
|
http://www.securityfocus.com/bid/106545
|
[
"Third Party Advisory",
"VDB Entry"
] |
www.securityfocus.com
| 409 |
CVE-2018-16191
|
2019-01-09T23:29:04.293
|
https://jvn.jp/en/jp/JVN25359688/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 409 |
CVE-2018-16191
|
2019-01-09T23:29:04.293
|
https://www.ec-cube.net/info/weakness/20181113/
|
[
"Vendor Advisory"
] |
www.ec-cube.net
| 409 |
CVE-2018-16192
|
2019-01-09T23:29:04.357
|
https://jpn.nec.com/security-info/secinfo/nv18-021.html
|
[
"Vendor Advisory"
] |
jpn.nec.com
| 410 |
CVE-2018-16192
|
2019-01-09T23:29:04.357
|
https://jvn.jp/en/jp/JVN87535892/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 410 |
CVE-2018-16196
|
2019-01-09T23:29:04.560
|
http://www.securityfocus.com/bid/106442
|
[
"VDB Entry",
"Third Party Advisory"
] |
www.securityfocus.com
| 414 |
CVE-2018-16196
|
2019-01-09T23:29:04.560
|
https://jvn.jp/vu/JVNVU93652047/index.html
|
[
"Third Party Advisory",
"VDB Entry"
] |
jvn.jp
| 414 |
CVE-2018-16196
|
2019-01-09T23:29:04.560
|
https://web-material3.yokogawa.com/YSAR-18-0008-E.pdf
|
[
"Vendor Advisory"
] |
web-material3.yokogawa.com
| 414 |
CVE-2018-16197
|
2019-01-09T23:29:04.623
|
http://www.tlt.co.jp/tlt/information/seihin/notice/defect/20181219/20181219.htm
|
[
"Vendor Advisory"
] |
www.tlt.co.jp
| 415 |
CVE-2018-16197
|
2019-01-09T23:29:04.623
|
https://jvn.jp/en/jp/JVN99810718/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 415 |
CVE-2018-16202
|
2019-01-09T23:29:04.933
|
http://jvn.jp/en/jp/JVN60497148/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 420 |
CVE-2018-16202
|
2019-01-09T23:29:04.933
|
https://github.com/ionic-team/cordova-plugin-ionic-webview
|
[
"Third Party Advisory"
] |
github.com
| 420 |
CVE-2018-16202
|
2019-01-09T23:29:04.933
|
https://jvn.jp/en/jp/JVN69812763/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 420 |
CVE-2018-16202
|
2019-01-09T23:29:04.933
|
https://www.npmjs.com/advisories/746
|
[
"Third Party Advisory"
] |
www.npmjs.com
| 420 |
CVE-2018-16203
|
2019-01-09T23:29:05.027
|
https://jvn.jp/en/jp/JVN13199224/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 421 |
CVE-2018-16203
|
2019-01-09T23:29:05.027
|
https://pgpool.net/mediawiki/index.php/Main_Page
|
[
"Vendor Advisory"
] |
pgpool.net
| 421 |
CVE-2018-16204
|
2019-01-09T23:29:05.090
|
https://jvn.jp/en/jp/JVN27052429/index.html
|
[
"Third Party Advisory"
] |
jvn.jp
| 422 |
CVE-2018-16204
|
2019-01-09T23:29:05.090
|
https://wordpress.org/plugins/google-sitemap-generator/#developers
|
[
"Product",
"Release Notes"
] |
wordpress.org
| 422 |
CVE-2018-20681
|
2019-01-09T23:29:05.230
|
https://github.com/mate-desktop/mate-screensaver/issues/152
|
[
"Exploit",
"Patch",
"Third Party Advisory"
] |
github.com
| 424 |
CVE-2018-20681
|
2019-01-09T23:29:05.230
|
https://github.com/mate-desktop/mate-screensaver/issues/155
|
[
"Exploit",
"Third Party Advisory"
] |
github.com
| 424 |
CVE-2018-20681
|
2019-01-09T23:29:05.230
|
https://github.com/mate-desktop/mate-screensaver/issues/170
|
[
"Third Party Advisory"
] |
github.com
| 424 |
CVE-2018-20681
|
2019-01-09T23:29:05.230
|
https://github.com/mate-desktop/mate-screensaver/pull/167
|
[
"Patch",
"Third Party Advisory"
] |
github.com
| 424 |
CVE-2018-20682
|
2019-01-09T23:29:05.340
|
https://www.netsparker.com/web-applications-advisories/ns-18-032-stored-cross-site-scripting-in-forkcms/
|
[
"Exploit",
"Third Party Advisory"
] |
www.netsparker.com
| 425 |
CVE-2019-3498
|
2019-01-09T23:29:05.387
|
http://www.securityfocus.com/bid/106453
|
[
"Third Party Advisory",
"VDB Entry"
] |
www.securityfocus.com
| 426 |
CVE-2019-3498
|
2019-01-09T23:29:05.387
|
https://docs.djangoproject.com/en/dev/releases/security/
|
[
"Patch",
"Vendor Advisory"
] |
docs.djangoproject.com
| 426 |
CVE-2019-3498
|
2019-01-09T23:29:05.387
|
https://groups.google.com/forum/#%21topic/django-announce/VYU7xQQTEPQ
| null |
groups.google.com
| 426 |
CVE-2019-3498
|
2019-01-09T23:29:05.387
|
https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html
|
[
"Mailing List",
"Third Party Advisory"
] |
lists.debian.org
| 426 |
CVE-2019-3498
|
2019-01-09T23:29:05.387
|
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/
| null |
lists.fedoraproject.org
| 426 |
CVE-2019-3498
|
2019-01-09T23:29:05.387
|
https://usn.ubuntu.com/3851-1/
|
[
"Third Party Advisory"
] |
usn.ubuntu.com
| 426 |
CVE-2019-3498
|
2019-01-09T23:29:05.387
|
https://www.debian.org/security/2019/dsa-4363
|
[
"Third Party Advisory"
] |
www.debian.org
| 426 |
CVE-2019-3498
|
2019-01-09T23:29:05.387
|
https://www.djangoproject.com/weblog/2019/jan/04/security-releases/
|
[
"Patch",
"Vendor Advisory"
] |
www.djangoproject.com
| 426 |
CVE-2019-5882
|
2019-01-09T23:29:05.450
|
https://github.com/irssi/irssi/pull/948
|
[
"Patch",
"Third Party Advisory"
] |
github.com
| 427 |
CVE-2019-5882
|
2019-01-09T23:29:05.450
|
https://irssi.org/NEWS/#v1-1-2
|
[
"Vendor Advisory"
] |
irssi.org
| 427 |
CVE-2019-5882
|
2019-01-09T23:29:05.450
|
https://irssi.org/security/irssi_sa_2019_01.txt
|
[
"Vendor Advisory"
] |
irssi.org
| 427 |
CVE-2019-5882
|
2019-01-09T23:29:05.450
|
https://usn.ubuntu.com/3862-1/
|
[
"Third Party Advisory"
] |
usn.ubuntu.com
| 427 |
CVE-2018-0181
|
2019-01-10T00:29:00.250
|
http://www.securityfocus.com/bid/106547
|
[
"Third Party Advisory",
"VDB Entry"
] |
www.securityfocus.com
| 428 |
CVE-2018-0181
|
2019-01-10T00:29:00.250
|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-cps-redis
|
[
"Vendor Advisory"
] |
tools.cisco.com
| 428 |
CVE-2018-0282
|
2019-01-10T00:29:00.297
|
http://www.securityfocus.com/bid/106510
|
[
"Third Party Advisory",
"VDB Entry"
] |
www.securityfocus.com
| 429 |
CVE-2018-0282
|
2019-01-10T00:29:00.297
|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-tcp
|
[
"Vendor Advisory"
] |
tools.cisco.com
| 429 |
CVE-2018-20683
|
2019-01-10T01:29:00.237
|
https://bugs.debian.org/918849
|
[
"Issue Tracking",
"Third Party Advisory"
] |
bugs.debian.org
| 430 |
CVE-2018-20683
|
2019-01-10T01:29:00.237
|
https://github.com/sitaramc/gitolite/blob/master/CHANGELOG
|
[
"Third Party Advisory"
] |
github.com
| 430 |
CVE-2018-20683
|
2019-01-10T01:29:00.237
|
https://github.com/sitaramc/gitolite/commit/5df2b817255ee919991da6c310239e08c8fcc1ae
|
[
"Patch",
"Third Party Advisory"
] |
github.com
| 430 |
CVE-2018-20683
|
2019-01-10T01:29:00.237
|
https://groups.google.com/forum/#%21topic/gitolite-announce/6xbjjmpLePQ
| null |
groups.google.com
| 430 |
CVE-2019-5884
|
2019-01-10T08:29:00.263
|
https://github.com/Studio-42/elFinder/commit/f133163f2d754584de65d718b2fde96191557316
|
[
"Patch",
"Third Party Advisory"
] |
github.com
| 431 |
CVE-2019-5884
|
2019-01-10T08:29:00.263
|
https://github.com/Studio-42/elFinder/releases/tag/2.1.45
|
[
"Release Notes",
"Third Party Advisory"
] |
github.com
| 431 |
CVE-2019-5886
|
2019-01-10T14:29:00.210
|
https://github.com/gongfuxiang/shopxo/issues/1
|
[
"Exploit",
"Third Party Advisory"
] |
github.com
| 432 |
CVE-2019-5887
|
2019-01-10T14:29:00.243
|
https://github.com/gongfuxiang/shopxo/issues/2
|
[
"Exploit",
"Third Party Advisory"
] |
github.com
| 433 |
CVE-2018-4032
|
2019-01-10T15:29:00.237
|
https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0705
|
[
"Third Party Advisory"
] |
www.talosintelligence.com
| 434 |
CVE-2018-4033
|
2019-01-10T15:29:00.317
|
https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0706
|
[
"Third Party Advisory"
] |
www.talosintelligence.com
| 435 |
CVE-2018-4034
|
2019-01-10T15:29:00.363
|
https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0707
|
[
"Third Party Advisory"
] |
www.talosintelligence.com
| 436 |
CVE-2018-4035
|
2019-01-10T15:29:00.393
|
https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0708
|
[
"Third Party Advisory"
] |
www.talosintelligence.com
| 437 |
CVE-2018-4036
|
2019-01-10T15:29:00.440
|
https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0709
|
[
"Third Party Advisory"
] |
www.talosintelligence.com
| 438 |
CVE-2018-4037
|
2019-01-10T15:29:00.487
|
https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0710
|
[
"Third Party Advisory"
] |
www.talosintelligence.com
| 439 |
CVE-2018-4041
|
2019-01-10T15:29:00.567
|
https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0715
|
[
"Third Party Advisory"
] |
www.talosintelligence.com
| 440 |
CVE-2018-4042
|
2019-01-10T15:29:00.597
|
https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0716
|
[
"Third Party Advisory"
] |
www.talosintelligence.com
| 441 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.