id
stringlengths 13
16
| published
stringlengths 23
23
| url
stringlengths 12
500
| tags
sequencelengths 1
6
⌀ | domain
stringlengths 4
49
| __index_level_0__
int64 0
135k
|
---|---|---|---|---|---|
CVE-2019-8354 | 2019-02-15T23:29:00.277 | https://usn.ubuntu.com/4079-2/ | null | usn.ubuntu.com | 2,132 |
CVE-2019-8355 | 2019-02-15T23:29:00.307 | https://sourceforge.net/p/sox/bugs/320 | [
"Third Party Advisory"
] | sourceforge.net | 2,133 |
CVE-2019-8356 | 2019-02-15T23:29:00.370 | https://sourceforge.net/p/sox/bugs/321 | [
"Exploit",
"Third Party Advisory"
] | sourceforge.net | 2,134 |
CVE-2019-8357 | 2019-02-15T23:29:00.417 | https://sourceforge.net/p/sox/bugs/318 | [
"Third Party Advisory"
] | sourceforge.net | 2,135 |
CVE-2019-8358 | 2019-02-16T18:29:00.217 | https://www.hiawatha-webserver.org/changelog | [
"Product",
"Vendor Advisory"
] | www.hiawatha-webserver.org | 2,136 |
CVE-2019-8360 | 2019-02-16T22:29:00.240 | https://packetstormsecurity.com/files/151706/Find-A-Place-CMS-Directory-1.5-SQL-Injection.html | [
"Exploit",
"Third Party Advisory",
"VDB Entry"
] | packetstormsecurity.com | 2,137 |
CVE-2019-8361 | 2019-02-16T22:29:00.317 | https://hackingvila.wordpress.com/2019/02/16/url-redirection-through-html-injection-in-responsive-video-news-script-php-script-mall/ | [
"Exploit",
"Third Party Advisory"
] | hackingvila.wordpress.com | 2,138 |
CVE-2019-8361 | 2019-02-16T22:29:00.317 | https://hackingvila.wordpress.com/2019/02/16/xss-vulnerability-in-responsive-video-news-script-php-script-mall/ | [
"Exploit",
"Third Party Advisory"
] | hackingvila.wordpress.com | 2,138 |
CVE-2019-8362 | 2019-02-16T22:29:00.380 | http://tusk1.cn/2019/02/16/dedecms%20v5.7%20sp2%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E/ | [
"Exploit",
"Third Party Advisory"
] | tusk1.cn | 2,139 |
CVE-2019-8363 | 2019-02-16T22:29:00.427 | https://github.com/Verytops/verydows/issues/12 | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,140 |
CVE-2019-8376 | 2019-02-17T02:29:00.223 | http://www.securityfocus.com/bid/107085 | [
"Third Party Advisory",
"VDB Entry"
] | www.securityfocus.com | 2,141 |
CVE-2019-8376 | 2019-02-17T02:29:00.223 | https://github.com/appneta/tcpreplay/issues/537 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | 2,141 |
CVE-2019-8376 | 2019-02-17T02:29:00.223 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4V3SADKXUSHWTVAPU3WLXBDEQUHRA6ZO/ | null | lists.fedoraproject.org | 2,141 |
CVE-2019-8376 | 2019-02-17T02:29:00.223 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EB3ASS7URTIA3IFSBL2DIWJAFKTBJCAW/ | null | lists.fedoraproject.org | 2,141 |
CVE-2019-8376 | 2019-02-17T02:29:00.223 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MLPY6W7Z7G6PF2JN4LXXHCACYLD4RBG6/ | null | lists.fedoraproject.org | 2,141 |
CVE-2019-8376 | 2019-02-17T02:29:00.223 | https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-get_layer4_v6-tcpreplay-4-3-1/ | [
"Exploit",
"Third Party Advisory"
] | research.loginsoft.com | 2,141 |
CVE-2019-8377 | 2019-02-17T02:29:00.283 | https://github.com/appneta/tcpreplay/issues/536 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | 2,142 |
CVE-2019-8377 | 2019-02-17T02:29:00.283 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4YAT4AGTHQKB74ETOQPJMV67TSDIAPOC/ | null | lists.fedoraproject.org | 2,142 |
CVE-2019-8377 | 2019-02-17T02:29:00.283 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UOSEIQ3D2OONCJEVMGC2TYBC2QX4E5EJ/ | null | lists.fedoraproject.org | 2,142 |
CVE-2019-8377 | 2019-02-17T02:29:00.283 | https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-get_ipv6_l4proto-tcpreplay-4-3-1/ | [
"Exploit",
"Third Party Advisory"
] | research.loginsoft.com | 2,142 |
CVE-2019-8378 | 2019-02-17T02:29:00.363 | https://github.com/axiomatic-systems/Bento4/issues/363 | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,143 |
CVE-2019-8378 | 2019-02-17T02:29:00.363 | https://research.loginsoft.com/bugs/a-heap-buffer-overflow-vulnerability-in-the-function-ap4_bitstreamreadbytes-bento4-1-5-1-628/ | [
"Exploit",
"Third Party Advisory"
] | research.loginsoft.com | 2,143 |
CVE-2019-8379 | 2019-02-17T02:29:00.410 | https://access.redhat.com/errata/RHSA-2019:2332 | [
"Third Party Advisory"
] | access.redhat.com | 2,144 |
CVE-2019-8379 | 2019-02-17T02:29:00.410 | https://lists.debian.org/debian-lts-announce/2021/12/msg00034.html | [
"Mailing List",
"Third Party Advisory"
] | lists.debian.org | 2,144 |
CVE-2019-8379 | 2019-02-17T02:29:00.410 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J23C6QSTJMQ467KAI6QG54AE4MZRLPQV/ | null | lists.fedoraproject.org | 2,144 |
CVE-2019-8379 | 2019-02-17T02:29:00.410 | https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-the-function-be_uint32_read-advancecomp/ | [
"Exploit",
"Third Party Advisory"
] | research.loginsoft.com | 2,144 |
CVE-2019-8379 | 2019-02-17T02:29:00.410 | https://sourceforge.net/p/advancemame/bugs/271/ | [
"Exploit",
"Third Party Advisory"
] | sourceforge.net | 2,144 |
CVE-2019-8380 | 2019-02-17T02:29:00.473 | https://github.com/axiomatic-systems/Bento4/issues/366 | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,145 |
CVE-2019-8380 | 2019-02-17T02:29:00.473 | https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-ap4_trackgetsampleindexfortimestampms-bento4-1-5-1-628/ | [
"Exploit",
"Third Party Advisory"
] | research.loginsoft.com | 2,145 |
CVE-2019-8381 | 2019-02-17T02:29:00.537 | https://github.com/appneta/tcpreplay/issues/538 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | 2,146 |
CVE-2019-8381 | 2019-02-17T02:29:00.537 | https://research.loginsoft.com/bugs/invalid-memory-access-vulnerability-in-function-do_checksum-tcpreplay-4-3-1/ | [
"Exploit",
"Third Party Advisory"
] | research.loginsoft.com | 2,146 |
CVE-2019-8382 | 2019-02-17T02:29:00.597 | https://github.com/axiomatic-systems/Bento4/issues/364 | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,147 |
CVE-2019-8382 | 2019-02-17T02:29:00.597 | https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-function-ap4_listfind-bento4-1-5-1-628/ | [
"Exploit",
"Third Party Advisory"
] | research.loginsoft.com | 2,147 |
CVE-2019-8383 | 2019-02-17T02:29:00.660 | https://research.loginsoft.com/bugs/invalid-memory-access-in-adv_png_unfilter_8-advancecomp/ | [
"Exploit",
"Third Party Advisory"
] | research.loginsoft.com | 2,148 |
CVE-2019-8383 | 2019-02-17T02:29:00.660 | https://sourceforge.net/p/advancemame/bugs/272/ | [
"Exploit",
"Third Party Advisory"
] | sourceforge.net | 2,148 |
CVE-2019-8389 | 2019-02-17T03:29:00.193 | https://gist.github.com/shawarkhanethicalhacker/b98c5ac7491cf77732c793ecc468f465 | [
"Exploit",
"Third Party Advisory"
] | gist.github.com | 2,149 |
CVE-2019-7399 | 2019-02-17T04:29:00.237 | http://www.securityfocus.com/bid/107025 | [
"VDB Entry",
"Third Party Advisory"
] | www.securityfocus.com | 2,150 |
CVE-2019-7399 | 2019-02-17T04:29:00.237 | https://wwws.nightwatchcybersecurity.com/2019/02/07/content-injection-in-amazon-kindles-fireos-cve-2019-7399/ | [
"Exploit",
"Third Party Advisory"
] | wwws.nightwatchcybersecurity.com | 2,150 |
CVE-2019-8392 | 2019-02-17T04:29:00.283 | https://github.com/leonW7/D-Link/blob/master/Vul_6.md | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,151 |
CVE-2019-8394 | 2019-02-17T04:29:00.330 | http://www.securityfocus.com/bid/107129 | [
"Third Party Advisory",
"VDB Entry"
] | www.securityfocus.com | 2,152 |
CVE-2019-8394 | 2019-02-17T04:29:00.330 | https://www.exploit-db.com/exploits/46413/ | [
"Exploit",
"VDB Entry",
"Third Party Advisory"
] | www.exploit-db.com | 2,152 |
CVE-2019-8394 | 2019-02-17T04:29:00.330 | https://www.manageengine.com/products/service-desk/readme.html | [
"Release Notes",
"Vendor Advisory"
] | www.manageengine.com | 2,152 |
CVE-2019-8396 | 2019-02-17T06:29:00.237 | https://github.com/magicSwordsMan/PAAFS/tree/master/vul4 | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,154 |
CVE-2019-8397 | 2019-02-17T06:29:00.550 | https://github.com/magicSwordsMan/PAAFS/tree/master/vul5 | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,155 |
CVE-2019-8398 | 2019-02-17T06:29:00.613 | https://github.com/magicSwordsMan/PAAFS/tree/master/vul6 | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,156 |
CVE-2019-8400 | 2019-02-17T06:29:00.643 | https://drive.google.com/file/d/1-25expUYVfK6vsiCmEabUCuelOP7aUDj/view?usp=drivesdk | [
"Release Notes",
"Third Party Advisory"
] | drive.google.com | 2,157 |
CVE-2019-8400 | 2019-02-17T06:29:00.643 | https://github.com/ory/hydra/blob/master/CHANGELOG.md#v100-rc3oryos9-2018-12-06 | [
"Release Notes",
"Third Party Advisory"
] | github.com | 2,157 |
CVE-2019-8400 | 2019-02-17T06:29:00.643 | https://github.com/ory/hydra/commit/9b5bbd48a72096930af08402c5e07fce7dd770f3 | [
"Patch",
"Third Party Advisory"
] | github.com | 2,157 |
CVE-2019-8400 | 2019-02-17T06:29:00.643 | https://hackerone.com/reports/456333 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | hackerone.com | 2,157 |
CVE-2019-8400 | 2019-02-17T06:29:00.643 | https://www.youtube.com/watch?v=RIyZLeKEC8E | [
"Exploit",
"Third Party Advisory"
] | www.youtube.com | 2,157 |
CVE-2019-8393 | 2019-02-17T15:29:00.197 | https://github.com/FantasticLBP/Hotels_Server/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,158 |
CVE-2016-10742 | 2019-02-17T16:29:00.240 | https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html | [
"Mailing List",
"Third Party Advisory"
] | lists.debian.org | 2,159 |
CVE-2016-10742 | 2019-02-17T16:29:00.240 | https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html | null | lists.debian.org | 2,159 |
CVE-2016-10742 | 2019-02-17T16:29:00.240 | https://support.zabbix.com/browse/ZBX-10272 | [
"Exploit",
"Vendor Advisory"
] | support.zabbix.com | 2,159 |
CVE-2016-10742 | 2019-02-17T16:29:00.240 | https://support.zabbix.com/browse/ZBX-13133 | [
"Vendor Advisory"
] | support.zabbix.com | 2,159 |
CVE-2018-20782 | 2019-02-17T18:29:00.233 | https://github.com/GloBee-Official/woocommerce-payment-api-plugin/issues/3 | null | github.com | 2,160 |
CVE-2018-20782 | 2019-02-17T18:29:00.233 | https://github.com/GloBee-Official/woocommerce-payment-api-plugin/pull/2 | [
"Patch",
"Third Party Advisory"
] | github.com | 2,160 |
CVE-2018-20782 | 2019-02-17T18:29:00.233 | https://www.exploit-db.com/exploits/46414/ | [
"Exploit",
"Third Party Advisory",
"VDB Entry"
] | www.exploit-db.com | 2,160 |
CVE-2019-8407 | 2019-02-17T18:29:00.280 | https://github.com/Neeke/HongCMS/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,161 |
CVE-2019-8408 | 2019-02-17T18:29:00.310 | https://github.com/Self-Evident/OneFileCMS/issues/51 | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,162 |
CVE-2019-8411 | 2019-02-17T19:29:00.240 | https://github.com/615/VulnPoC/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,163 |
CVE-2019-8412 | 2019-02-17T19:29:00.270 | https://github.com/615/cms_vuln/blob/master/feifei.docx | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,164 |
CVE-2019-8413 | 2019-02-17T19:29:00.317 | https://github.com/datadancer/HIAFuzz/blob/master/MIX2_elliptic.md | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,165 |
CVE-2019-7649 | 2019-02-17T21:29:00.227 | https://github.com/arterli/CmsWing/issues/41 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | 2,166 |
CVE-2019-8418 | 2019-02-17T21:29:00.277 | https://github.com/seacms/seacms-v7.2/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,167 |
CVE-2019-8419 | 2019-02-17T22:29:00.270 | https://github.com/tamlok/vnote/issues/564 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | 2,168 |
CVE-2019-8421 | 2019-02-17T22:29:00.333 | https://github.com/bagesoft/bagecms/issues/5 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | 2,169 |
CVE-2019-8422 | 2019-02-17T22:29:00.363 | https://github.com/wowwooo/vnotes/blob/master/PbootCMS%20SQL%20Injection%20Description.md | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,170 |
CVE-2019-8423 | 2019-02-18T00:29:00.243 | https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#skinsclassicviewseventsphp-line-44-sql-injection | [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
] | github.com | 2,171 |
CVE-2019-8423 | 2019-02-18T00:29:00.243 | https://www.seebug.org/vuldb/ssvid-97761 | [
"Permissions Required",
"Third Party Advisory"
] | www.seebug.org | 2,171 |
CVE-2019-8424 | 2019-02-18T00:29:00.307 | https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#ajaxstatusphp-line-276-orderby-sql-injection | [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
] | github.com | 2,172 |
CVE-2019-8424 | 2019-02-18T00:29:00.307 | https://www.seebug.org/vuldb/ssvid-97763 | [
"Permissions Required",
"Third Party Advisory"
] | www.seebug.org | 2,172 |
CVE-2019-8425 | 2019-02-18T00:29:00.367 | https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#sql-query-error-reflected-xss | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | 2,173 |
CVE-2019-8425 | 2019-02-18T00:29:00.367 | https://www.seebug.org/vuldb/ssvid-97764 | [
"Permissions Required",
"Third Party Advisory"
] | www.seebug.org | 2,173 |
CVE-2019-8426 | 2019-02-18T00:29:00.430 | https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#skinsclassicviewscontrolcapphp-reflected-xss | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | 2,174 |
CVE-2019-8426 | 2019-02-18T00:29:00.430 | https://www.seebug.org/vuldb/ssvid-97766 | [
"Permissions Required",
"Third Party Advisory"
] | www.seebug.org | 2,174 |
CVE-2019-8427 | 2019-02-18T00:29:00.493 | https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#includesfunctionsphp-daemoncontrol-command-injection | [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
] | github.com | 2,175 |
CVE-2019-8428 | 2019-02-18T00:29:00.540 | https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#skinsclassicviewscontrolphp-line-35-second-order-sqli | [
"Issue Tracking",
"Exploit",
"Third Party Advisory"
] | github.com | 2,176 |
CVE-2019-8428 | 2019-02-18T00:29:00.540 | https://www.seebug.org/vuldb/ssvid-97765 | [
"Permissions Required",
"Third Party Advisory"
] | www.seebug.org | 2,176 |
CVE-2019-8429 | 2019-02-18T00:29:00.603 | https://github.com/LoRexxar/CVE_Request/tree/master/zoneminder%20vul%20before%20v1.32.3#ajaxstatusphp-line-393-sql-injection | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | 2,177 |
CVE-2019-8429 | 2019-02-18T00:29:00.603 | https://www.seebug.org/vuldb/ssvid-97762 | [
"Permissions Required",
"Third Party Advisory"
] | www.seebug.org | 2,177 |
CVE-2019-8432 | 2019-02-18T00:29:00.650 | https://github.com/fakerrr/CmsEasy_7.0/issues/1 | [
"Exploit",
"Mitigation",
"Issue Tracking",
"Third Party Advisory"
] | github.com | 2,178 |
CVE-2019-8433 | 2019-02-18T00:29:00.697 | https://github.com/jetiben/jtbc/issues/6 | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,179 |
CVE-2019-8434 | 2019-02-18T00:29:00.743 | https://github.com/fakerrr/CmsEasy_7.0/issues/2 | [
"Exploit",
"Mitigation",
"Issue Tracking",
"Third Party Advisory"
] | github.com | 2,180 |
CVE-2019-8435 | 2019-02-18T00:29:00.790 | https://github.com/gaozhifeng/PHPMyWind/issues/3 | [
"Exploit",
"Mitigation",
"Issue Tracking",
"Third Party Advisory"
] | github.com | 2,181 |
CVE-2019-8436 | 2019-02-18T00:29:00.837 | https://github.com/peacexie/imcat/issues/1 | [
"Mitigation",
"Issue Tracking",
"Exploit",
"Third Party Advisory"
] | github.com | 2,182 |
CVE-2019-8902 | 2019-02-18T14:29:00.237 | https://github.com/idreamsoft/iCMS/issues/56 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | 2,183 |
CVE-2019-6453 | 2019-02-18T15:29:00.247 | https://github.com/proofofcalc/cve-2019-6453-poc | [
"Exploit",
"Third Party Advisory"
] | github.com | 2,184 |
CVE-2019-6453 | 2019-02-18T15:29:00.247 | https://proofofcalc.com/advisories/20190218.txt | [
"Third Party Advisory"
] | proofofcalc.com | 2,184 |
CVE-2019-6453 | 2019-02-18T15:29:00.247 | https://proofofcalc.com/cve-2019-6453-mIRC/ | [
"Exploit",
"Third Party Advisory"
] | proofofcalc.com | 2,184 |
CVE-2019-6453 | 2019-02-18T15:29:00.247 | https://twitter.com/proofofcalc/status/1097518413143003136 | [
"Exploit",
"Third Party Advisory"
] | twitter.com | 2,184 |
CVE-2019-6453 | 2019-02-18T15:29:00.247 | https://www.exploit-db.com/exploits/46392/ | [
"Exploit",
"Third Party Advisory",
"VDB Entry"
] | www.exploit-db.com | 2,184 |
CVE-2019-6453 | 2019-02-18T15:29:00.247 | https://www.mirc.com/news.html | [
"Product"
] | www.mirc.com | 2,184 |
CVE-2019-8372 | 2019-02-18T15:29:00.387 | http://www.jackson-t.ca/lg-driver-lpe.html | [
"Exploit",
"Third Party Advisory"
] | www.jackson-t.ca | 2,185 |
CVE-2019-8372 | 2019-02-18T15:29:00.387 | https://lgsecurity.lge.com/security_updates.html | [
"Vendor Advisory"
] | lgsecurity.lge.com | 2,185 |
CVE-2019-8372 | 2019-02-18T15:29:00.387 | https://twitter.com/Jackson_T/status/1097353402034475009 | [
"Third Party Advisory"
] | twitter.com | 2,185 |
CVE-2019-8903 | 2019-02-18T16:29:00.870 | https://blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903 | null | blog.certimetergroup.com | 2,186 |
CVE-2019-8903 | 2019-02-18T16:29:00.870 | https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7 | [
"Patch",
"Third Party Advisory"
] | github.com | 2,186 |
CVE-2019-8903 | 2019-02-18T16:29:00.870 | https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b | [
"Patch",
"Third Party Advisory"
] | github.com | 2,186 |
CVE-2018-12159 | 2019-02-18T17:29:00.267 | https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00169.html | [
"Patch",
"Vendor Advisory"
] | www.intel.com | 2,187 |