id
stringlengths
13
16
published
stringlengths
23
23
url
stringlengths
12
500
tags
sequencelengths
1
6
domain
stringlengths
4
49
__index_level_0__
int64
0
135k
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/r0153a08177fcfac7584c7b9ea3027f1e8f18f770126f905b9989190e%40%3Cissues.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/r08e7ddc354bdcbf95d88399f18b3d804865034f8bc706095e594b29f%40%3Cissues.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/r2349237482bcec43632d9d78d7d2804520d9a82f4d8b1fd96bb616b8%40%3Cissues.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/r47c7f67a3067ec09262eef0705abc42ea1b646699d9198bcaf8dad02%40%3Cissues.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/r5fbb63e405d2211c16524d33f52e3b122109d3bc88d5f74623fb212d%40%3Ccommits.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/r78645ca0eef44a276e144447fb2087db758b1fb8826d0330b3f0da1a%40%3Cissues.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/r79991aeb5d0c53c67e400e037c72758a06607752ca2f23b5302dd61f%40%3Cissues.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/r96d90e59bb12af5e5c631dcf7d7d80857a52bf3dc44d5b85553e7fc4%40%3Cissues.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/ra329bb85da9da93ac6f9b5fc0fc5446a3af0ee2a62c5de484da0af54%40%3Ccommits.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/ra62a3bf48ab4e0e9aaed970b03d79a73224d68a4275858c707542f6c%40%3Cissues.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/ra8c7573911082e9968f4835943045ad0952232bb6314becf23dc3de5%40%3Cissues.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/raae74a9290784e20e86fcd4e2525fa8700aeed6f65f3613b5b04bb11%40%3Ccommits.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/rb9fe3ae33246d7f11604a1c85c861cb013a1e32248a43a0c22457107%40%3Cissues.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/rcd26a5409af7356b5f69b2fafae3cf621bff8bf155f50e9ccf9ed5f6%40%3Cissues.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/rcd4945d66d8bb2fc92396af56a70ede4af983a2c98166f1281338346%40%3Cissues.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/ree71c6425d2cc0e36b77bda6902965a657c1e09c7229459811d66474%40%3Cissues.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/rf83697efcbcfe1131e31bbc7025cb3ee1db5d9185e9481093b2ef961%40%3Cissues.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://lists.apache.org/thread.html/rfea6eebfebb13bc015f258e7fa31d4e24a4202601be3b307da28d530%40%3Ccommits.servicemix.apache.org%3E
null
lists.apache.org
1,017
CVE-2019-3774
2019-01-18T22:29:01.050
https://pivotal.io/security/cve-2019-3774
[ "Mitigation", "Vendor Advisory" ]
pivotal.io
1,017
CVE-2018-18908
2019-01-20T20:29:00.460
https://blog.sean-wright.com/sky/
[ "Exploit", "Third Party Advisory" ]
blog.sean-wright.com
1,018
CVE-2019-6496
2019-01-20T20:29:00.917
http://www.securityfocus.com/bid/106865
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
1,019
CVE-2019-6496
2019-01-20T20:29:00.917
https://2018.zeronights.ru/wp-content/uploads/materials/19-Researching-Marvell-Avastar-Wi-Fi.pdf
[ "Exploit", "Third Party Advisory" ]
2018.zeronights.ru
1,019
CVE-2019-6496
2019-01-20T20:29:00.917
https://embedi.org/blog/remotely-compromise-devices-by-using-bugs-in-marvell-avastar-wi-fi-from-zero-knowledge-to-zero-click-rce/
[ "Third Party Advisory" ]
embedi.org
1,019
CVE-2019-6496
2019-01-20T20:29:00.917
https://www.kb.cert.org/vuls/id/730261/
[ "Third Party Advisory", "US Government Resource" ]
www.kb.cert.org
1,019
CVE-2019-6496
2019-01-20T20:29:00.917
https://www.scribd.com/document/398350818/WiFi-CVE-2019-6496-Marvell-s-Statement
[ "Third Party Advisory" ]
www.scribd.com
1,019
CVE-2019-6496
2019-01-20T20:29:00.917
https://www.synology.com/security/advisory/Synology_SA_19_07
[ "Third Party Advisory" ]
www.synology.com
1,019
CVE-2019-6496
2019-01-20T20:29:00.917
https://www.zdnet.com/article/wifi-firmware-bug-affects-laptops-smartphones-routers-gaming-devices/
[ "Exploit", "Press/Media Coverage", "Third Party Advisory" ]
www.zdnet.com
1,019
CVE-2019-6497
2019-01-20T20:29:01.180
https://github.com/FantasticLBP/Hotels_Server/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
1,020
CVE-2019-6498
2019-01-21T06:29:00.407
https://github.com/labapart/gattlib/issues/81
[ "Issue Tracking", "Exploit", "Third Party Advisory" ]
github.com
1,021
CVE-2019-6498
2019-01-21T06:29:00.407
https://github.com/labapart/gattlib/issues/82
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
1,021
CVE-2019-6498
2019-01-21T06:29:00.407
https://www.exploit-db.com/exploits/46215/
[ "Exploit", "Third Party Advisory", "VDB Entry" ]
www.exploit-db.com
1,021
CVE-2019-6499
2019-01-21T06:29:01.187
https://github.com/inf0seq/inf0seq.github.io/blob/master/_posts/2019-01-20-Teradata%20Viewpoint%20Hardcoded%20Password%20Vulnerability.md
[ "Third Party Advisory" ]
github.com
1,022
CVE-2019-6499
2019-01-21T06:29:01.187
https://inf0seq.github.io/cve/2019/01/20/Teradata-Viewpoint-Hardcoded-Password-Vulnerability.html
[ "Third Party Advisory" ]
inf0seq.github.io
1,022
CVE-2019-6500
2019-01-21T06:29:01.267
https://github.com/inf0seq/inf0seq.github.io/blob/master/_posts/2019-01-20-Directory-Traversal-in-Axway-File-Transfer-Direct.md
[ "Exploit", "Third Party Advisory" ]
github.com
1,023
CVE-2019-6500
2019-01-21T06:29:01.267
https://inf0seq.github.io/cve/2019/01/20/Directory-Traversal-in-Axway-File-Transfer-Direct.html
[ "Exploit", "Third Party Advisory" ]
inf0seq.github.io
1,023
CVE-2016-10739
2019-01-21T19:29:00.247
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html
[ "Mailing List", "Third Party Advisory" ]
lists.opensuse.org
1,024
CVE-2016-10739
2019-01-21T19:29:00.247
http://www.securityfocus.com/bid/106672
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
1,024
CVE-2016-10739
2019-01-21T19:29:00.247
https://access.redhat.com/errata/RHSA-2019:2118
null
access.redhat.com
1,024
CVE-2016-10739
2019-01-21T19:29:00.247
https://access.redhat.com/errata/RHSA-2019:3513
null
access.redhat.com
1,024
CVE-2016-10739
2019-01-21T19:29:00.247
https://bugzilla.redhat.com/show_bug.cgi?id=1347549
[ "Issue Tracking", "Third Party Advisory" ]
bugzilla.redhat.com
1,024
CVE-2016-10739
2019-01-21T19:29:00.247
https://sourceware.org/bugzilla/show_bug.cgi?id=20018
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
sourceware.org
1,024
CVE-2019-6502
2019-01-22T08:29:00.200
http://www.openwall.com/lists/oss-security/2019/12/29/1
null
www.openwall.com
1,025
CVE-2019-6502
2019-01-22T08:29:00.200
https://github.com/OpenSC/OpenSC/issues/1586
[ "Issue Tracking", "Exploit", "Third Party Advisory" ]
github.com
1,025
CVE-2019-6502
2019-01-22T08:29:00.200
https://lists.debian.org/debian-lts-announce/2023/06/msg00025.html
null
lists.debian.org
1,025
CVE-2018-13374
2019-01-22T14:29:00.220
https://fortiguard.com/advisory/FG-IR-18-157
[ "Vendor Advisory" ]
fortiguard.com
1,026
CVE-2019-1003000
2019-01-22T14:29:00.267
http://packetstormsecurity.com/files/152132/Jenkins-ACL-Bypass-Metaprogramming-Remote-Code-Execution.html
[ "Exploit", "Third Party Advisory", "VDB Entry" ]
packetstormsecurity.com
1,027
CVE-2019-1003000
2019-01-22T14:29:00.267
http://www.rapid7.com/db/modules/exploit/multi/http/jenkins_metaprogramming
[ "Third Party Advisory" ]
www.rapid7.com
1,027
CVE-2019-1003000
2019-01-22T14:29:00.267
https://access.redhat.com/errata/RHBA-2019:0326
[ "Third Party Advisory" ]
access.redhat.com
1,027
CVE-2019-1003000
2019-01-22T14:29:00.267
https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266
[ "Vendor Advisory" ]
jenkins.io
1,027
CVE-2019-1003000
2019-01-22T14:29:00.267
https://www.exploit-db.com/exploits/46453/
[ "Exploit", "Third Party Advisory", "VDB Entry" ]
www.exploit-db.com
1,027
CVE-2019-1003000
2019-01-22T14:29:00.267
https://www.exploit-db.com/exploits/46572/
[ "Exploit", "Third Party Advisory", "VDB Entry" ]
www.exploit-db.com
1,027
CVE-2019-1003003
2019-01-22T14:29:00.437
http://www.securityfocus.com/bid/106680
[ "Broken Link" ]
www.securityfocus.com
1,030
CVE-2019-1003003
2019-01-22T14:29:00.437
https://jenkins.io/security/advisory/2019-01-16/#SECURITY-868
[ "Vendor Advisory" ]
jenkins.io
1,030
CVE-2019-1003004
2019-01-22T14:29:00.487
https://jenkins.io/security/advisory/2019-01-16/#SECURITY-901
[ "Vendor Advisory" ]
jenkins.io
1,031
CVE-2019-6338
2019-01-22T14:29:00.517
http://www.securityfocus.com/bid/106706
[ "Third Party Advisory" ]
www.securityfocus.com
1,032
CVE-2019-6338
2019-01-22T14:29:00.517
https://lists.debian.org/debian-lts-announce/2019/02/msg00032.html
[ "Mailing List", "Third Party Advisory" ]
lists.debian.org
1,032
CVE-2019-6338
2019-01-22T14:29:00.517
https://www.debian.org/security/2019/dsa-4370
[ "Third Party Advisory" ]
www.debian.org
1,032
CVE-2019-6338
2019-01-22T14:29:00.517
https://www.drupal.org/sa-core-2019-001
[ "Patch", "Vendor Advisory" ]
www.drupal.org
1,032
CVE-2019-6503
2019-01-22T14:29:00.563
https://github.com/chatopera/cosin/issues/177
[ "Third Party Advisory", "Issue Tracking", "Exploit" ]
github.com
1,033
CVE-2017-6922
2019-01-22T15:29:00.223
http://www.securityfocus.com/bid/99219
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
1,034
CVE-2017-6922
2019-01-22T15:29:00.223
https://www.debian.org/security/2017/dsa-3897
[ "Third Party Advisory" ]
www.debian.org
1,034
CVE-2018-14666
2019-01-22T15:29:00.317
http://www.securityfocus.com/bid/106490
[ "Third Party Advisory" ]
www.securityfocus.com
1,036
CVE-2018-14666
2019-01-22T15:29:00.317
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14666
[ "Issue Tracking", "Vendor Advisory" ]
bugzilla.redhat.com
1,036
CVE-2018-19634
2019-01-22T15:29:00.363
http://www.securityfocus.com/bid/106689
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
1,037
CVE-2018-19634
2019-01-22T15:29:00.363
https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20190117-01-security-notice-for-ca-service-desk-manager.html
[ "Patch", "Vendor Advisory" ]
support.ca.com
1,037
CVE-2019-6339
2019-01-22T15:29:00.660
https://lists.debian.org/debian-lts-announce/2019/02/msg00004.html
[ "Third Party Advisory" ]
lists.debian.org
1,039
CVE-2019-6339
2019-01-22T15:29:00.660
https://www.drupal.org/sa-core-2019-002
[ "Patch", "Vendor Advisory" ]
www.drupal.org
1,039
CVE-2019-6507
2019-01-22T16:29:00.677
https://github.com/creditease-sec/insight/issues/42
[ "Exploit", "Third Party Advisory" ]
github.com
1,040
CVE-2018-6443
2019-01-22T17:29:00.300
http://packetstormsecurity.com/files/153035/Brocade-Network-Advisor-14.4.1-Unauthenticated-Remote-Code-Execution.html
null
packetstormsecurity.com
1,044
CVE-2018-6443
2019-01-22T17:29:00.300
https://security.netapp.com/advisory/ntap-20190411-0005/
[ "Third Party Advisory" ]
security.netapp.com
1,044
CVE-2018-6443
2019-01-22T17:29:00.300
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-743
[ "Third Party Advisory" ]
www.broadcom.com
1,044
CVE-2018-6444
2019-01-22T17:29:00.363
https://support.lenovo.com/us/en/product_security/LEN-25655
null
support.lenovo.com
1,045
CVE-2018-6444
2019-01-22T17:29:00.363
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-744
[ "Vendor Advisory" ]
www.broadcom.com
1,045
CVE-2018-6445
2019-01-22T17:29:00.410
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-745
[ "Vendor Advisory" ]
www.broadcom.com
1,046
CVE-2018-19011
2019-01-22T20:29:00.410
http://www.securityfocus.com/bid/106654
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
1,376
CVE-2018-19011
2019-01-22T20:29:00.410
https://ics-cert.us-cert.gov/advisories/ICSA-19-017-01
[ "Third Party Advisory", "US Government Resource" ]
ics-cert.us-cert.gov
1,376
CVE-2019-6260
2019-01-22T20:29:01.473
https://security.netapp.com/advisory/ntap-20190314-0001/
[ "Patch", "Third Party Advisory" ]
security.netapp.com
1,380
CVE-2019-6260
2019-01-22T20:29:01.473
https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-785
[ "Third Party Advisory" ]
www.broadcom.com
1,380
CVE-2019-6260
2019-01-22T20:29:01.473
https://www.flamingspork.com/blog/2019/01/23/cve-2019-6260:-gaining-control-of-bmc-from-the-host-processor/
[ "Third Party Advisory" ]
www.flamingspork.com
1,380
CVE-2019-6691
2019-01-23T09:29:00.190
https://github.com/Veeeooo/phpwind/blob/master/README.md
[ "Exploit", "Third Party Advisory" ]
github.com
1,381
CVE-2018-1751
2019-01-23T15:29:00.240
http://www.ibm.com/support/docview.wss?uid=ibm10791829
[ "Vendor Advisory" ]
www.ibm.com
1,382
CVE-2018-1751
2019-01-23T15:29:00.240
http://www.securityfocus.com/bid/106734
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
1,382
CVE-2018-1751
2019-01-23T15:29:00.240
https://exchange.xforce.ibmcloud.com/vulnerabilities/148512
[ "VDB Entry", "Vendor Advisory" ]
exchange.xforce.ibmcloud.com
1,382
CVE-2018-2026
2019-01-23T15:29:00.333
http://www.ibm.com/support/docview.wss?uid=ibm10795536
[ "Patch", "Vendor Advisory" ]
www.ibm.com
1,383
CVE-2018-2026
2019-01-23T15:29:00.333
http://www.ibm.com/support/docview.wss?uid=ibm10795544
[ "Patch", "Vendor Advisory" ]
www.ibm.com
1,383
CVE-2018-2026
2019-01-23T15:29:00.333
http://www.securityfocus.com/bid/106733
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
1,383
CVE-2018-2026
2019-01-23T15:29:00.333
https://exchange.xforce.ibmcloud.com/vulnerabilities/155552
[ "VDB Entry", "Vendor Advisory" ]
exchange.xforce.ibmcloud.com
1,383
CVE-2019-3584
2019-01-23T15:29:00.397
http://www.securityfocus.com/bid/106789
null
www.securityfocus.com
1,384
CVE-2019-3584
2019-01-23T15:29:00.397
https://kc.mcafee.com/corporate/index?page=content&id=SB10265
null
kc.mcafee.com
1,384
CVE-2019-3587
2019-01-23T15:29:00.457
http://service.mcafee.com/FAQDocument.aspx?&id=TS102887
null
service.mcafee.com
1,385
CVE-2017-15720
2019-01-23T17:29:00.257
https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57%40%3Cdev.airflow.apache.org%3E
null
lists.apache.org
1,386
CVE-2018-15614
2019-01-23T17:29:00.397
https://downloads.avaya.com/css/P8/documents/101054317
[ "Vendor Advisory" ]
downloads.avaya.com
1,389
CVE-2018-20245
2019-01-23T17:29:00.443
https://lists.apache.org/thread.html/b549c7573b342a6e457e5a3225c33054244343927bbfb2a4cdc4cf73%40%3Cdev.airflow.apache.org%3E
null
lists.apache.org
1,390
CVE-2019-6706
2019-01-23T19:29:00.447
http://lua-users.org/lists/lua-l/2019-01/msg00039.html
[ "Broken Link" ]
lua-users.org
1,391
CVE-2019-6706
2019-01-23T19:29:00.447
http://packetstormsecurity.com/files/151335/Lua-5.3.5-Use-After-Free.html
[ "Exploit", "Third Party Advisory", "VDB Entry" ]
packetstormsecurity.com
1,391
CVE-2019-6706
2019-01-23T19:29:00.447
https://access.redhat.com/security/cve/cve-2019-6706
[ "Third Party Advisory" ]
access.redhat.com
1,391
CVE-2019-6706
2019-01-23T19:29:00.447
https://github.com/Lua-Project/cve-analysis/blob/a43c9ccd00274b31fa2f24c6c8f20ce36655682d/CVE-2019-6706.pdf
[ "Exploit", "Third Party Advisory" ]
github.com
1,391
CVE-2019-6706
2019-01-23T19:29:00.447
https://github.com/lua/lua/commit/89aee84cbc9224f638f3b7951b306d2ee8ecb71e
[ "Patch", "Third Party Advisory" ]
github.com
1,391
CVE-2019-6706
2019-01-23T19:29:00.447
https://lists.debian.org/debian-lts-announce/2023/06/msg00031.html
null
lists.debian.org
1,391
CVE-2019-6707
2019-01-23T19:29:01.023
https://github.com/kk98kk0/exploit/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
1,392