id
stringlengths
13
16
published
stringlengths
23
23
url
stringlengths
12
500
tags
sequencelengths
1
6
domain
stringlengths
4
49
__index_level_0__
int64
0
135k
CVE-2019-7587
2019-02-07T19:29:00.333
https://c3tsec.wordpress.com/2019/01/12/sql-injection-in-bo-blog-wind-cms/
[ "Exploit", "Third Party Advisory" ]
c3tsec.wordpress.com
1,890
CVE-2019-1675
2019-02-07T20:29:00.277
http://www.securityfocus.com/bid/106944
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
1,891
CVE-2019-1675
2019-02-07T20:29:00.277
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-aas-creds
[ "Vendor Advisory" ]
tools.cisco.com
1,891
CVE-2019-1678
2019-02-07T20:29:00.323
http://www.securityfocus.com/bid/106943
[ "Broken Link", "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
1,892
CVE-2019-1678
2019-02-07T20:29:00.323
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-cms-dos
[ "Vendor Advisory" ]
tools.cisco.com
1,892
CVE-2019-1660
2019-02-07T21:29:00.187
http://www.securityfocus.com/bid/106918
[ "VDB Entry", "Third Party Advisory" ]
www.securityfocus.com
1,893
CVE-2019-1660
2019-02-07T21:29:00.187
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-tms-soap
[ "Vendor Advisory" ]
tools.cisco.com
1,893
CVE-2019-1679
2019-02-07T21:29:00.217
http://www.securityfocus.com/bid/106940
[ "Broken Link", "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
1,894
CVE-2019-1679
2019-02-07T21:29:00.217
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-rest-api-ssrf
[ "Vendor Advisory" ]
tools.cisco.com
1,894
CVE-2019-1680
2019-02-07T21:29:00.250
http://www.securityfocus.com/bid/106939
[ "Broken Link", "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
1,895
CVE-2019-1680
2019-02-07T21:29:00.250
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-webex-injection
[ "Vendor Advisory" ]
tools.cisco.com
1,895
CVE-2018-1296
2019-02-07T22:29:00.240
http://www.securityfocus.com/bid/106764
[ "Third Party Advisory" ]
www.securityfocus.com
1,896
CVE-2018-1296
2019-02-07T22:29:00.240
https://lists.apache.org/thread.html/a5b15bc76fbdad2ee40761aacf954a13aeef67e305f86d483f267e8e%40%3Cuser.hadoop.apache.org%3E
null
lists.apache.org
1,896
CVE-2018-1340
2019-02-07T22:29:00.287
http://www.securityfocus.com/bid/106768
[ "Third Party Advisory" ]
www.securityfocus.com
1,897
CVE-2018-1340
2019-02-07T22:29:00.287
https://lists.apache.org/thread.html/af1632e13dd9acf7537546660cae9143cbb10fdd2f9bb0832a690979%40%3Cannounce.guacamole.apache.org%3E
null
lists.apache.org
1,897
CVE-2019-1661
2019-02-07T22:29:00.337
http://www.securityfocus.com/bid/106920
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
1,898
CVE-2019-1661
2019-02-07T22:29:00.337
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-tms-xss
[ "Vendor Advisory" ]
tools.cisco.com
1,898
CVE-2019-1670
2019-02-07T22:29:00.383
http://www.securityfocus.com/bid/106919
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
1,899
CVE-2019-1670
2019-02-07T22:29:00.383
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-cuic-xss
[ "Vendor Advisory" ]
tools.cisco.com
1,899
CVE-2019-1671
2019-02-07T22:29:00.413
http://www.securityfocus.com/bid/106927
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
1,900
CVE-2019-1671
2019-02-07T22:29:00.413
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-fmc-xss
[ "Vendor Advisory" ]
tools.cisco.com
1,900
CVE-2019-6139
2019-02-07T23:29:00.197
https://help.forcepoint.com/security/CVE/CVE-2019-6139.html
[ "Vendor Advisory" ]
help.forcepoint.com
1,902
CVE-2019-7401
2019-02-08T03:29:00.247
http://hg.nginx.org/unit/file/tip/CHANGES
[ "Release Notes", "Vendor Advisory" ]
hg.nginx.org
1,903
CVE-2019-7401
2019-02-08T03:29:00.247
http://mailman.nginx.org/pipermail/unit/2019-February/000113.html
[ "Mailing List", "Vendor Advisory" ]
mailman.nginx.org
1,903
CVE-2019-7401
2019-02-08T03:29:00.247
http://unit.nginx.org/CHANGES.txt
[ "Release Notes", "Vendor Advisory" ]
unit.nginx.org
1,903
CVE-2019-7401
2019-02-08T03:29:00.247
http://www.securityfocus.com/bid/106956
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
1,903
CVE-2019-7628
2019-02-08T03:29:00.327
https://pagure.io/pagure/c/9905fb1e64341822366b6ab1d414d2baa230af0a
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
pagure.io
1,904
CVE-2019-7628
2019-02-08T03:29:00.327
https://pagure.io/pagure/issue/4230
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
pagure.io
1,904
CVE-2019-7628
2019-02-08T03:29:00.327
https://pagure.io/pagure/issue/4252
[ "Broken Link" ]
pagure.io
1,904
CVE-2019-7628
2019-02-08T03:29:00.327
https://pagure.io/pagure/issue/4253
[ "Broken Link" ]
pagure.io
1,904
CVE-2019-7628
2019-02-08T03:29:00.327
https://pagure.io/pagure/pull-request/4254
[ "Issue Tracking", "Patch", "Vendor Advisory" ]
pagure.io
1,904
CVE-2019-6242
2019-02-08T05:29:00.790
https://gist.github.com/boatpavaris/cff51e52a96fdde8215f71a3315703c2
[ "Exploit", "Third Party Advisory" ]
gist.github.com
1,905
CVE-2019-7632
2019-02-08T05:29:01.197
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=22113
[ "Exploit", "Third Party Advisory" ]
www.trustwave.com
1,906
CVE-2019-7635
2019-02-08T11:29:00.233
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html
[ "Mailing List", "Third Party Advisory" ]
lists.opensuse.org
1,907
CVE-2019-7635
2019-02-08T11:29:00.233
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html
[ "Mailing List", "Third Party Advisory" ]
lists.opensuse.org
1,907
CVE-2019-7635
2019-02-08T11:29:00.233
https://bugzilla.libsdl.org/show_bug.cgi?id=4498
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
bugzilla.libsdl.org
1,907
CVE-2019-7635
2019-02-08T11:29:00.233
https://lists.debian.org/debian-lts-announce/2019/07/msg00021.html
[ "Mailing List", "Third Party Advisory" ]
lists.debian.org
1,907
CVE-2019-7635
2019-02-08T11:29:00.233
https://lists.debian.org/debian-lts-announce/2019/07/msg00026.html
[ "Mailing List", "Third Party Advisory" ]
lists.debian.org
1,907
CVE-2019-7635
2019-02-08T11:29:00.233
https://usn.ubuntu.com/4143-1/
[ "Third Party Advisory" ]
usn.ubuntu.com
1,907
CVE-2019-7635
2019-02-08T11:29:00.233
https://usn.ubuntu.com/4238-1/
[ "Third Party Advisory" ]
usn.ubuntu.com
1,907
CVE-2019-7636
2019-02-08T11:29:00.313
https://bugzilla.libsdl.org/show_bug.cgi?id=4499
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
bugzilla.libsdl.org
1,908
CVE-2019-7637
2019-02-08T11:29:00.390
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00071.html
[ "Mailing List", "Third Party Advisory" ]
lists.opensuse.org
1,909
CVE-2019-7637
2019-02-08T11:29:00.390
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00081.html
[ "Mailing List", "Third Party Advisory" ]
lists.opensuse.org
1,909
CVE-2019-7637
2019-02-08T11:29:00.390
https://bugzilla.libsdl.org/show_bug.cgi?id=4497
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
bugzilla.libsdl.org
1,909
CVE-2019-7637
2019-02-08T11:29:00.390
https://lists.debian.org/debian-lts-announce/2021/10/msg00031.html
[ "Mailing List", "Third Party Advisory" ]
lists.debian.org
1,909
CVE-2019-7638
2019-02-08T11:29:00.453
https://bugzilla.libsdl.org/show_bug.cgi?id=4500
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
bugzilla.libsdl.org
1,910
CVE-2019-7639
2019-02-08T11:29:00.517
https://bugzilla.redhat.com/show_bug.cgi?id=1673802
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
bugzilla.redhat.com
1,911
CVE-2018-18364
2019-02-08T17:29:00.257
http://www.securityfocus.com/bid/106684
[ "Third Party Advisory" ]
www.securityfocus.com
1,912
CVE-2018-18364
2019-02-08T17:29:00.257
https://support.symantec.com/en_US/article.SYMSA1474.html
[ "Mitigation", "Vendor Advisory" ]
support.symantec.com
1,912
CVE-2018-20764
2019-02-08T17:29:00.303
https://community.helpsystems.com/knowledge-base/fox-technologies/hotfix/515/
[ "Vendor Advisory" ]
community.helpsystems.com
1,913
CVE-2019-1673
2019-02-08T17:29:00.380
http://www.securityfocus.com/bid/106915
[ "Third Party Advisory" ]
www.securityfocus.com
1,914
CVE-2019-1673
2019-02-08T17:29:00.380
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-ise-xss
[ "Vendor Advisory" ]
tools.cisco.com
1,914
CVE-2019-7648
2019-02-08T17:29:00.427
https://github.com/FantasticLBP/Hotels_Server/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
1,915
CVE-2018-1352
2019-02-08T18:29:00.237
https://fortiguard.com/advisory/FG-IR-18-018
[ "Vendor Advisory" ]
fortiguard.com
1,916
CVE-2019-1672
2019-02-08T18:29:00.283
http://www.securityfocus.com/bid/106904
[ "Third Party Advisory" ]
www.securityfocus.com
1,917
CVE-2019-1672
2019-02-08T18:29:00.283
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-wsa-bypass
[ "Third Party Advisory" ]
tools.cisco.com
1,917
CVE-2019-1676
2019-02-08T18:29:00.347
http://www.securityfocus.com/bid/106909
[ "Third Party Advisory" ]
www.securityfocus.com
1,918
CVE-2019-1676
2019-02-08T18:29:00.347
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190206-meeting-sipdos
[ "Vendor Advisory" ]
tools.cisco.com
1,918
CVE-2018-9190
2019-02-08T19:29:00.250
https://fortiguard.com/advisory/FG-IR-18-092
[ "Third Party Advisory" ]
fortiguard.com
1,919
CVE-2019-7651
2019-02-08T22:29:00.257
https://blog.emsisoft.com/en/32517/new-in-2018-12-safe-web-browsing-with-emsisoft-browser-security/
[ "Release Notes", "Vendor Advisory" ]
blog.emsisoft.com
1,920
CVE-2019-7651
2019-02-08T22:29:00.257
https://github.com/nafiez/nafiez.github.io/blob/master/_posts/2019-01-09-emsisoft-Anti-Malware-bypass.md
[ "Exploit", "Third Party Advisory" ]
github.com
1,920
CVE-2019-7651
2019-02-08T22:29:00.257
https://help.emsisoft.com/en/1760/vulnerability-report-en/
[ "Vendor Advisory" ]
help.emsisoft.com
1,920
CVE-2019-7651
2019-02-08T22:29:00.257
https://nafiez.github.io/security/bypass/2019/01/08/emsisoft-Anti-Malware-bypass.html
[ "Exploit", "Third Party Advisory" ]
nafiez.github.io
1,920
CVE-2019-7653
2019-02-09T03:29:00.237
https://bugs.debian.org/921751
[ "Exploit", "Mailing List", "Third Party Advisory" ]
bugs.debian.org
1,921
CVE-2019-7653
2019-02-09T03:29:00.237
https://lists.debian.org/debian-lts-announce/2019/03/msg00019.html
[ "Mailing List", "Third Party Advisory" ]
lists.debian.org
1,921
CVE-2019-7653
2019-02-09T03:29:00.237
https://lists.debian.org/debian-lts-announce/2021/12/msg00026.html
[ "Mailing List", "Third Party Advisory" ]
lists.debian.org
1,921
CVE-2019-7653
2019-02-09T03:29:00.237
https://usn.ubuntu.com/4535-1/
[ "Third Party Advisory" ]
usn.ubuntu.com
1,921
CVE-2019-7659
2019-02-09T14:29:00.193
https://lists.debian.org/debian-lts-announce/2019/02/msg00027.html
[ "Mailing List", "Third Party Advisory" ]
lists.debian.org
1,922
CVE-2019-7659
2019-02-09T14:29:00.193
https://outpost24.com/blog/gsoap-vulnerability-identified
null
outpost24.com
1,922
CVE-2019-7659
2019-02-09T14:29:00.193
https://www.genivia.com/advisory.html#Bug_in_gSOAP_versions_2.7.0_to_2.8.74_for_applications_built_with_the_WITH_COOKIES_flag_enabled_%28Jan_14%2C_2019%29
null
www.genivia.com
1,922
CVE-2019-7662
2019-02-09T16:29:00.250
https://github.com/WebAssembly/binaryen/issues/1872
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
1,923
CVE-2019-7663
2019-02-09T16:29:00.313
http://bugzilla.maptools.org/show_bug.cgi?id=2833
[ "Exploit", "Issue Tracking", "Third Party Advisory", "Patch" ]
bugzilla.maptools.org
1,924
CVE-2019-7663
2019-02-09T16:29:00.313
https://gitlab.com/libtiff/libtiff/commit/802d3cbf3043be5dce5317e140ccb1c17a6a2d39
[ "Patch", "Third Party Advisory" ]
gitlab.com
1,924
CVE-2019-7663
2019-02-09T16:29:00.313
https://lists.debian.org/debian-lts-announce/2019/02/msg00026.html
[ "Mailing List", "Third Party Advisory" ]
lists.debian.org
1,924
CVE-2019-7663
2019-02-09T16:29:00.313
https://www.debian.org/security/2020/dsa-4670
null
www.debian.org
1,924
CVE-2019-7664
2019-02-09T16:29:00.360
https://sourceware.org/bugzilla/show_bug.cgi?id=24084
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
sourceware.org
1,925
CVE-2019-7665
2019-02-09T16:29:00.420
https://sourceware.org/bugzilla/show_bug.cgi?id=24089
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
sourceware.org
1,926
CVE-2019-7665
2019-02-09T16:29:00.420
https://sourceware.org/ml/elfutils-devel/2019-q1/msg00049.html
[ "Exploit", "Mailing List", "Third Party Advisory" ]
sourceware.org
1,926
CVE-2009-5154
2019-02-09T22:29:00.247
https://gist.github.com/llandeilocymro/7dbe3daaab6d058d609fd9a0b24301cb
[ "Exploit", "Third Party Advisory" ]
gist.github.com
1,927
CVE-2009-5154
2019-02-09T22:29:00.247
https://www.use-ip.co.uk/forum/threads/mobotix-default-password.76/
[ "Exploit", "Third Party Advisory" ]
www.use-ip.co.uk
1,927
CVE-2019-7676
2019-02-09T22:29:00.510
https://github.com/pudding2/enphase-energy/blob/master/weak_password.txt
[ "Third Party Advisory" ]
github.com
1,931
CVE-2019-7676
2019-02-09T22:29:00.510
https://github.com/puddi…k_password_1.png
[ "Third Party Advisory" ]
github.com
1,931
CVE-2019-7676
2019-02-09T22:29:00.510
https://github.com/puddi…k_password_2.png
[ "Third Party Advisory" ]
github.com
1,931
CVE-2019-7677
2019-02-09T22:29:00.573
https://github.com/pudding2/enphase-energy/blob/master/XSS-exp.txt
[ "Exploit", "Third Party Advisory" ]
github.com
1,932
CVE-2019-7677
2019-02-09T22:29:00.573
https://github.com/puddi…b/master/XSS.png
[ "Exploit", "Third Party Advisory" ]
github.com
1,932
CVE-2019-7678
2019-02-09T22:29:00.637
https://github.com/puddi…_traversal_1.png
[ "Third Party Advisory" ]
github.com
1,933
CVE-2019-7678
2019-02-09T22:29:00.637
https://github.com/pudding2/enphase-energy/blob/master/directory_traversal_exp.txt
[ "Third Party Advisory" ]
github.com
1,933
CVE-2019-7684
2019-02-09T22:29:00.713
https://gitee.com/inxeduopen/inxedu/issues/IQJUH
[ "Exploit", "Third Party Advisory" ]
gitee.com
1,934
CVE-2018-13792
2019-02-10T02:29:00.207
http://www.abbyydownloads.com/fc12/ReleaseNotes_FC12_R2_U6_1299.29_build_12.0.2.1420.pdf
[ "Release Notes", "Vendor Advisory" ]
www.abbyydownloads.com
1,935
CVE-2019-7692
2019-02-10T16:29:00.200
https://github.com/AvaterXXX/CVEs/blob/master/cim.md#getshell
[ "Exploit", "Third Party Advisory" ]
github.com
1,936
CVE-2018-20767
2019-02-10T17:29:00.247
https://securitydocs.business.xerox.com/wp-content/uploads/2018/07/cert_Security_Mini_Bulletin_XRX18Y_for_ConnectKey_EC78xx_v1.0.pdf
[ "Vendor Advisory" ]
securitydocs.business.xerox.com
1,937
CVE-2019-7693
2019-02-10T22:29:00.247
http://storage.axiositalia.com/Quick_Guide/Manuale_Avviamento.pdf
[ "Product", "Vendor Advisory" ]
storage.axiositalia.com
1,942
CVE-2019-7693
2019-02-10T22:29:00.247
https://pastebin.com/raw/nQ648Dif
[ "Exploit", "Third Party Advisory" ]
pastebin.com
1,942
CVE-2019-7697
2019-02-10T22:29:00.327
https://github.com/axiomatic-systems/Bento4/issues/351
[ "Exploit", "Third Party Advisory" ]
github.com
1,943
CVE-2019-7698
2019-02-10T22:29:00.373
https://github.com/axiomatic-systems/Bento4/issues/354
[ "Exploit", "Third Party Advisory" ]
github.com
1,944
CVE-2019-7699
2019-02-10T22:29:00.403
https://github.com/axiomatic-systems/Bento4/issues/355
[ "Exploit", "Third Party Advisory" ]
github.com
1,945
CVE-2019-7700
2019-02-10T22:29:00.450
https://github.com/WebAssembly/binaryen/issues/1864
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
1,946
CVE-2019-7701
2019-02-10T22:29:00.497
https://github.com/WebAssembly/binaryen/issues/1863
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
1,947
CVE-2019-7702
2019-02-10T22:29:00.560
https://github.com/WebAssembly/binaryen/issues/1867
[ "Exploit", "Third Party Advisory" ]
github.com
1,948
CVE-2019-7703
2019-02-10T22:29:00.590
https://github.com/WebAssembly/binaryen/issues/1865
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
1,949