id
stringlengths
13
16
published
stringlengths
23
23
url
stringlengths
12
500
tags
sequencelengths
1
6
domain
stringlengths
4
49
__index_level_0__
int64
0
135k
CVE-2019-8354
2019-02-15T23:29:00.277
https://usn.ubuntu.com/4079-2/
null
usn.ubuntu.com
2,132
CVE-2019-8355
2019-02-15T23:29:00.307
https://sourceforge.net/p/sox/bugs/320
[ "Third Party Advisory" ]
sourceforge.net
2,133
CVE-2019-8356
2019-02-15T23:29:00.370
https://sourceforge.net/p/sox/bugs/321
[ "Exploit", "Third Party Advisory" ]
sourceforge.net
2,134
CVE-2019-8357
2019-02-15T23:29:00.417
https://sourceforge.net/p/sox/bugs/318
[ "Third Party Advisory" ]
sourceforge.net
2,135
CVE-2019-8358
2019-02-16T18:29:00.217
https://www.hiawatha-webserver.org/changelog
[ "Product", "Vendor Advisory" ]
www.hiawatha-webserver.org
2,136
CVE-2019-8360
2019-02-16T22:29:00.240
https://packetstormsecurity.com/files/151706/Find-A-Place-CMS-Directory-1.5-SQL-Injection.html
[ "Exploit", "Third Party Advisory", "VDB Entry" ]
packetstormsecurity.com
2,137
CVE-2019-8361
2019-02-16T22:29:00.317
https://hackingvila.wordpress.com/2019/02/16/url-redirection-through-html-injection-in-responsive-video-news-script-php-script-mall/
[ "Exploit", "Third Party Advisory" ]
hackingvila.wordpress.com
2,138
CVE-2019-8361
2019-02-16T22:29:00.317
https://hackingvila.wordpress.com/2019/02/16/xss-vulnerability-in-responsive-video-news-script-php-script-mall/
[ "Exploit", "Third Party Advisory" ]
hackingvila.wordpress.com
2,138
CVE-2019-8362
2019-02-16T22:29:00.380
http://tusk1.cn/2019/02/16/dedecms%20v5.7%20sp2%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E/
[ "Exploit", "Third Party Advisory" ]
tusk1.cn
2,139
CVE-2019-8363
2019-02-16T22:29:00.427
https://github.com/Verytops/verydows/issues/12
[ "Exploit", "Third Party Advisory" ]
github.com
2,140
CVE-2019-8376
2019-02-17T02:29:00.223
http://www.securityfocus.com/bid/107085
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,141
CVE-2019-8376
2019-02-17T02:29:00.223
https://github.com/appneta/tcpreplay/issues/537
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
2,141
CVE-2019-8376
2019-02-17T02:29:00.223
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4V3SADKXUSHWTVAPU3WLXBDEQUHRA6ZO/
null
lists.fedoraproject.org
2,141
CVE-2019-8376
2019-02-17T02:29:00.223
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EB3ASS7URTIA3IFSBL2DIWJAFKTBJCAW/
null
lists.fedoraproject.org
2,141
CVE-2019-8376
2019-02-17T02:29:00.223
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MLPY6W7Z7G6PF2JN4LXXHCACYLD4RBG6/
null
lists.fedoraproject.org
2,141
CVE-2019-8376
2019-02-17T02:29:00.223
https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-get_layer4_v6-tcpreplay-4-3-1/
[ "Exploit", "Third Party Advisory" ]
research.loginsoft.com
2,141
CVE-2019-8377
2019-02-17T02:29:00.283
https://github.com/appneta/tcpreplay/issues/536
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
2,142
CVE-2019-8377
2019-02-17T02:29:00.283
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4YAT4AGTHQKB74ETOQPJMV67TSDIAPOC/
null
lists.fedoraproject.org
2,142
CVE-2019-8377
2019-02-17T02:29:00.283
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UOSEIQ3D2OONCJEVMGC2TYBC2QX4E5EJ/
null
lists.fedoraproject.org
2,142
CVE-2019-8377
2019-02-17T02:29:00.283
https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-get_ipv6_l4proto-tcpreplay-4-3-1/
[ "Exploit", "Third Party Advisory" ]
research.loginsoft.com
2,142
CVE-2019-8378
2019-02-17T02:29:00.363
https://github.com/axiomatic-systems/Bento4/issues/363
[ "Exploit", "Third Party Advisory" ]
github.com
2,143
CVE-2019-8378
2019-02-17T02:29:00.363
https://research.loginsoft.com/bugs/a-heap-buffer-overflow-vulnerability-in-the-function-ap4_bitstreamreadbytes-bento4-1-5-1-628/
[ "Exploit", "Third Party Advisory" ]
research.loginsoft.com
2,143
CVE-2019-8379
2019-02-17T02:29:00.410
https://access.redhat.com/errata/RHSA-2019:2332
[ "Third Party Advisory" ]
access.redhat.com
2,144
CVE-2019-8379
2019-02-17T02:29:00.410
https://lists.debian.org/debian-lts-announce/2021/12/msg00034.html
[ "Mailing List", "Third Party Advisory" ]
lists.debian.org
2,144
CVE-2019-8379
2019-02-17T02:29:00.410
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J23C6QSTJMQ467KAI6QG54AE4MZRLPQV/
null
lists.fedoraproject.org
2,144
CVE-2019-8379
2019-02-17T02:29:00.410
https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-the-function-be_uint32_read-advancecomp/
[ "Exploit", "Third Party Advisory" ]
research.loginsoft.com
2,144
CVE-2019-8379
2019-02-17T02:29:00.410
https://sourceforge.net/p/advancemame/bugs/271/
[ "Exploit", "Third Party Advisory" ]
sourceforge.net
2,144
CVE-2019-8380
2019-02-17T02:29:00.473
https://github.com/axiomatic-systems/Bento4/issues/366
[ "Exploit", "Third Party Advisory" ]
github.com
2,145
CVE-2019-8380
2019-02-17T02:29:00.473
https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-ap4_trackgetsampleindexfortimestampms-bento4-1-5-1-628/
[ "Exploit", "Third Party Advisory" ]
research.loginsoft.com
2,145
CVE-2019-8381
2019-02-17T02:29:00.537
https://github.com/appneta/tcpreplay/issues/538
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
2,146
CVE-2019-8381
2019-02-17T02:29:00.537
https://research.loginsoft.com/bugs/invalid-memory-access-vulnerability-in-function-do_checksum-tcpreplay-4-3-1/
[ "Exploit", "Third Party Advisory" ]
research.loginsoft.com
2,146
CVE-2019-8382
2019-02-17T02:29:00.597
https://github.com/axiomatic-systems/Bento4/issues/364
[ "Exploit", "Third Party Advisory" ]
github.com
2,147
CVE-2019-8382
2019-02-17T02:29:00.597
https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-ap4_listfind-bento4-1-5-1-628/
[ "Exploit", "Third Party Advisory" ]
research.loginsoft.com
2,147
CVE-2019-8383
2019-02-17T02:29:00.660
https://research.loginsoft.com/bugs/invalid-memory-access-in-adv_png_unfilter_8-advancecomp/
[ "Exploit", "Third Party Advisory" ]
research.loginsoft.com
2,148
CVE-2019-8383
2019-02-17T02:29:00.660
https://sourceforge.net/p/advancemame/bugs/272/
[ "Exploit", "Third Party Advisory" ]
sourceforge.net
2,148
CVE-2019-8389
2019-02-17T03:29:00.193
https://gist.github.com/shawarkhanethicalhacker/b98c5ac7491cf77732c793ecc468f465
[ "Exploit", "Third Party Advisory" ]
gist.github.com
2,149
CVE-2019-7399
2019-02-17T04:29:00.237
http://www.securityfocus.com/bid/107025
[ "VDB Entry", "Third Party Advisory" ]
www.securityfocus.com
2,150
CVE-2019-7399
2019-02-17T04:29:00.237
https://wwws.nightwatchcybersecurity.com/2019/02/07/content-injection-in-amazon-kindles-fireos-cve-2019-7399/
[ "Exploit", "Third Party Advisory" ]
wwws.nightwatchcybersecurity.com
2,150
CVE-2019-8392
2019-02-17T04:29:00.283
https://github.com/leonW7/D-Link/blob/master/Vul_6.md
[ "Exploit", "Third Party Advisory" ]
github.com
2,151
CVE-2019-8394
2019-02-17T04:29:00.330
http://www.securityfocus.com/bid/107129
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,152
CVE-2019-8394
2019-02-17T04:29:00.330
https://www.exploit-db.com/exploits/46413/
[ "Exploit", "VDB Entry", "Third Party Advisory" ]
www.exploit-db.com
2,152
CVE-2019-8394
2019-02-17T04:29:00.330
https://www.manageengine.com/products/service-desk/readme.html
[ "Release Notes", "Vendor Advisory" ]
www.manageengine.com
2,152
CVE-2019-8396
2019-02-17T06:29:00.237
https://github.com/magicSwordsMan/PAAFS/tree/master/vul4
[ "Exploit", "Third Party Advisory" ]
github.com
2,154
CVE-2019-8397
2019-02-17T06:29:00.550
https://github.com/magicSwordsMan/PAAFS/tree/master/vul5
[ "Exploit", "Third Party Advisory" ]
github.com
2,155
CVE-2019-8398
2019-02-17T06:29:00.613
https://github.com/magicSwordsMan/PAAFS/tree/master/vul6
[ "Exploit", "Third Party Advisory" ]
github.com
2,156
CVE-2019-8400
2019-02-17T06:29:00.643
https://drive.google.com/file/d/1-25expUYVfK6vsiCmEabUCuelOP7aUDj/view?usp=drivesdk
[ "Release Notes", "Third Party Advisory" ]
drive.google.com
2,157
CVE-2019-8400
2019-02-17T06:29:00.643
https://github.com/ory/hydra/blob/master/CHANGELOG.md#v100-rc3oryos9-2018-12-06
[ "Release Notes", "Third Party Advisory" ]
github.com
2,157
CVE-2019-8400
2019-02-17T06:29:00.643
https://github.com/ory/hydra/commit/9b5bbd48a72096930af08402c5e07fce7dd770f3
[ "Patch", "Third Party Advisory" ]
github.com
2,157
CVE-2019-8400
2019-02-17T06:29:00.643
https://hackerone.com/reports/456333
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
hackerone.com
2,157
CVE-2019-8400
2019-02-17T06:29:00.643
https://www.youtube.com/watch?v=RIyZLeKEC8E
[ "Exploit", "Third Party Advisory" ]
www.youtube.com
2,157
CVE-2019-8393
2019-02-17T15:29:00.197
https://github.com/FantasticLBP/Hotels_Server/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
2,158
CVE-2016-10742
2019-02-17T16:29:00.240
https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html
[ "Mailing List", "Third Party Advisory" ]
lists.debian.org
2,159
CVE-2016-10742
2019-02-17T16:29:00.240
https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html
null
lists.debian.org
2,159
CVE-2016-10742
2019-02-17T16:29:00.240
https://support.zabbix.com/browse/ZBX-10272
[ "Exploit", "Vendor Advisory" ]
support.zabbix.com
2,159
CVE-2016-10742
2019-02-17T16:29:00.240
https://support.zabbix.com/browse/ZBX-13133
[ "Vendor Advisory" ]
support.zabbix.com
2,159
CVE-2018-20782
2019-02-17T18:29:00.233
https://github.com/GloBee-Official/woocommerce-payment-api-plugin/issues/3
null
github.com
2,160
CVE-2018-20782
2019-02-17T18:29:00.233
https://github.com/GloBee-Official/woocommerce-payment-api-plugin/pull/2
[ "Patch", "Third Party Advisory" ]
github.com
2,160
CVE-2018-20782
2019-02-17T18:29:00.233
https://www.exploit-db.com/exploits/46414/
[ "Exploit", "Third Party Advisory", "VDB Entry" ]
www.exploit-db.com
2,160
CVE-2019-8407
2019-02-17T18:29:00.280
https://github.com/Neeke/HongCMS/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
2,161
CVE-2019-8408
2019-02-17T18:29:00.310
https://github.com/Self-Evident/OneFileCMS/issues/51
[ "Exploit", "Third Party Advisory" ]
github.com
2,162
CVE-2019-8411
2019-02-17T19:29:00.240
https://github.com/615/VulnPoC/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
2,163
CVE-2019-8412
2019-02-17T19:29:00.270
https://github.com/615/cms_vuln/blob/master/feifei.docx
[ "Exploit", "Third Party Advisory" ]
github.com
2,164
CVE-2019-8413
2019-02-17T19:29:00.317
https://github.com/datadancer/HIAFuzz/blob/master/MIX2_elliptic.md
[ "Exploit", "Third Party Advisory" ]
github.com
2,165
CVE-2019-7649
2019-02-17T21:29:00.227
https://github.com/arterli/CmsWing/issues/41
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
2,166
CVE-2019-8418
2019-02-17T21:29:00.277
https://github.com/seacms/seacms-v7.2/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
2,167
CVE-2019-8419
2019-02-17T22:29:00.270
https://github.com/tamlok/vnote/issues/564
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
2,168
CVE-2019-8421
2019-02-17T22:29:00.333
https://github.com/bagesoft/bagecms/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
2,169
CVE-2019-8422
2019-02-17T22:29:00.363
https://github.com/wowwooo/vnotes/blob/master/PbootCMS%20SQL%20Injection%20Description.md
[ "Exploit", "Third Party Advisory" ]
github.com
2,170
CVE-2019-8423
2019-02-18T00:29:00.243
https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#skinsclassicviewseventsphp-line-44-sql-injection
[ "Issue Tracking", "Exploit", "Third Party Advisory" ]
github.com
2,171
CVE-2019-8423
2019-02-18T00:29:00.243
https://www.seebug.org/vuldb/ssvid-97761
[ "Permissions Required", "Third Party Advisory" ]
www.seebug.org
2,171
CVE-2019-8424
2019-02-18T00:29:00.307
https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#ajaxstatusphp-line-276-orderby-sql-injection
[ "Issue Tracking", "Exploit", "Third Party Advisory" ]
github.com
2,172
CVE-2019-8424
2019-02-18T00:29:00.307
https://www.seebug.org/vuldb/ssvid-97763
[ "Permissions Required", "Third Party Advisory" ]
www.seebug.org
2,172
CVE-2019-8425
2019-02-18T00:29:00.367
https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#sql-query-error-reflected-xss
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
2,173
CVE-2019-8425
2019-02-18T00:29:00.367
https://www.seebug.org/vuldb/ssvid-97764
[ "Permissions Required", "Third Party Advisory" ]
www.seebug.org
2,173
CVE-2019-8426
2019-02-18T00:29:00.430
https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#skinsclassicviewscontrolcapphp-reflected-xss
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
2,174
CVE-2019-8426
2019-02-18T00:29:00.430
https://www.seebug.org/vuldb/ssvid-97766
[ "Permissions Required", "Third Party Advisory" ]
www.seebug.org
2,174
CVE-2019-8427
2019-02-18T00:29:00.493
https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#includesfunctionsphp-daemoncontrol-command-injection
[ "Issue Tracking", "Exploit", "Third Party Advisory" ]
github.com
2,175
CVE-2019-8428
2019-02-18T00:29:00.540
https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#skinsclassicviewscontrolphp-line-35-second-order-sqli
[ "Issue Tracking", "Exploit", "Third Party Advisory" ]
github.com
2,176
CVE-2019-8428
2019-02-18T00:29:00.540
https://www.seebug.org/vuldb/ssvid-97765
[ "Permissions Required", "Third Party Advisory" ]
www.seebug.org
2,176
CVE-2019-8429
2019-02-18T00:29:00.603
https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#ajaxstatusphp-line-393-sql-injection
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
2,177
CVE-2019-8429
2019-02-18T00:29:00.603
https://www.seebug.org/vuldb/ssvid-97762
[ "Permissions Required", "Third Party Advisory" ]
www.seebug.org
2,177
CVE-2019-8432
2019-02-18T00:29:00.650
https://github.com/fakerrr/CmsEasy_7.0/issues/1
[ "Exploit", "Mitigation", "Issue Tracking", "Third Party Advisory" ]
github.com
2,178
CVE-2019-8433
2019-02-18T00:29:00.697
https://github.com/jetiben/jtbc/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
2,179
CVE-2019-8434
2019-02-18T00:29:00.743
https://github.com/fakerrr/CmsEasy_7.0/issues/2
[ "Exploit", "Mitigation", "Issue Tracking", "Third Party Advisory" ]
github.com
2,180
CVE-2019-8435
2019-02-18T00:29:00.790
https://github.com/gaozhifeng/PHPMyWind/issues/3
[ "Exploit", "Mitigation", "Issue Tracking", "Third Party Advisory" ]
github.com
2,181
CVE-2019-8436
2019-02-18T00:29:00.837
https://github.com/peacexie/imcat/issues/1
[ "Mitigation", "Issue Tracking", "Exploit", "Third Party Advisory" ]
github.com
2,182
CVE-2019-8902
2019-02-18T14:29:00.237
https://github.com/idreamsoft/iCMS/issues/56
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
2,183
CVE-2019-6453
2019-02-18T15:29:00.247
https://github.com/proofofcalc/cve-2019-6453-poc
[ "Exploit", "Third Party Advisory" ]
github.com
2,184
CVE-2019-6453
2019-02-18T15:29:00.247
https://proofofcalc.com/advisories/20190218.txt
[ "Third Party Advisory" ]
proofofcalc.com
2,184
CVE-2019-6453
2019-02-18T15:29:00.247
https://proofofcalc.com/cve-2019-6453-mIRC/
[ "Exploit", "Third Party Advisory" ]
proofofcalc.com
2,184
CVE-2019-6453
2019-02-18T15:29:00.247
https://twitter.com/proofofcalc/status/1097518413143003136
[ "Exploit", "Third Party Advisory" ]
twitter.com
2,184
CVE-2019-6453
2019-02-18T15:29:00.247
https://www.exploit-db.com/exploits/46392/
[ "Exploit", "Third Party Advisory", "VDB Entry" ]
www.exploit-db.com
2,184
CVE-2019-6453
2019-02-18T15:29:00.247
https://www.mirc.com/news.html
[ "Product" ]
www.mirc.com
2,184
CVE-2019-8372
2019-02-18T15:29:00.387
http://www.jackson-t.ca/lg-driver-lpe.html
[ "Exploit", "Third Party Advisory" ]
www.jackson-t.ca
2,185
CVE-2019-8372
2019-02-18T15:29:00.387
https://lgsecurity.lge.com/security_updates.html
[ "Vendor Advisory" ]
lgsecurity.lge.com
2,185
CVE-2019-8372
2019-02-18T15:29:00.387
https://twitter.com/Jackson_T/status/1097353402034475009
[ "Third Party Advisory" ]
twitter.com
2,185
CVE-2019-8903
2019-02-18T16:29:00.870
https://blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903
null
blog.certimetergroup.com
2,186
CVE-2019-8903
2019-02-18T16:29:00.870
https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7
[ "Patch", "Third Party Advisory" ]
github.com
2,186
CVE-2019-8903
2019-02-18T16:29:00.870
https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b
[ "Patch", "Third Party Advisory" ]
github.com
2,186
CVE-2018-12159
2019-02-18T17:29:00.267
https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00169.html
[ "Patch", "Vendor Advisory" ]
www.intel.com
2,187