id
stringlengths
13
16
published
stringlengths
23
23
url
stringlengths
12
500
tags
sequencelengths
1
6
domain
stringlengths
4
49
__index_level_0__
int64
0
135k
CVE-2018-1950
2019-02-21T17:29:00.647
https://exchange.xforce.ibmcloud.com/vulnerabilities/153430
[ "VDB Entry", "Vendor Advisory" ]
exchange.xforce.ibmcloud.com
2,301
CVE-2018-2006
2019-02-21T17:29:00.710
http://www.securityfocus.com/bid/107122
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,302
CVE-2018-2006
2019-02-21T17:29:00.710
https://exchange.xforce.ibmcloud.com/vulnerabilities/155008
[ "VDB Entry", "Vendor Advisory" ]
exchange.xforce.ibmcloud.com
2,302
CVE-2018-2006
2019-02-21T17:29:00.710
https://www.ibm.com/support/docview.wss?uid=ibm10794133
[ "Vendor Advisory" ]
www.ibm.com
2,302
CVE-2019-1662
2019-02-21T17:29:00.773
http://www.securityfocus.com/bid/107096
[ "Third Party Advisory" ]
www.securityfocus.com
2,303
CVE-2019-1662
2019-02-21T17:29:00.773
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-pca-access
[ "Vendor Advisory" ]
tools.cisco.com
2,303
CVE-2018-20783
2019-02-21T19:29:00.287
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00083.html
[ "Mailing List", "Third Party Advisory" ]
lists.opensuse.org
2,304
CVE-2018-20783
2019-02-21T19:29:00.287
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00104.html
[ "Mailing List", "Third Party Advisory" ]
lists.opensuse.org
2,304
CVE-2018-20783
2019-02-21T19:29:00.287
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00041.html
null
lists.opensuse.org
2,304
CVE-2018-20783
2019-02-21T19:29:00.287
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00044.html
null
lists.opensuse.org
2,304
CVE-2018-20783
2019-02-21T19:29:00.287
https://bugs.php.net/bug.php?id=77143
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
bugs.php.net
2,304
CVE-2018-20783
2019-02-21T19:29:00.287
https://usn.ubuntu.com/3566-2/
null
usn.ubuntu.com
2,304
CVE-2019-1664
2019-02-21T19:29:00.367
http://www.securityfocus.com/bid/107103
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,305
CVE-2019-1664
2019-02-21T19:29:00.367
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-chn-root-access
[ "Vendor Advisory" ]
tools.cisco.com
2,305
CVE-2019-1665
2019-02-21T19:29:00.413
http://www.securityfocus.com/bid/107097
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,306
CVE-2019-1665
2019-02-21T19:29:00.413
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-hyper-xss
[ "Vendor Advisory" ]
tools.cisco.com
2,306
CVE-2019-1666
2019-02-21T19:29:00.460
http://www.securityfocus.com/bid/107108
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,307
CVE-2019-1666
2019-02-21T19:29:00.460
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-hyper-retrieve
[ "Vendor Advisory" ]
tools.cisco.com
2,307
CVE-2019-1667
2019-02-21T19:29:00.507
http://www.securityfocus.com/bid/107100
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,308
CVE-2019-1667
2019-02-21T19:29:00.507
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-hyper-write
[ "Vendor Advisory" ]
tools.cisco.com
2,308
CVE-2019-8985
2019-02-21T19:29:00.570
https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/netis/buffer%20overflow.md
[ "Exploit", "Vendor Advisory" ]
github.com
2,309
CVE-2019-1681
2019-02-21T20:29:00.290
http://www.securityfocus.com/bid/107107
[ "Broken Link", "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,310
CVE-2019-1681
2019-02-21T20:29:00.290
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-ncs
[ "Vendor Advisory" ]
tools.cisco.com
2,310
CVE-2019-1684
2019-02-21T20:29:00.337
http://www.securityfocus.com/bid/107104
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,311
CVE-2019-1684
2019-02-21T20:29:00.337
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-cdp-lldp-dos
[ "Vendor Advisory" ]
tools.cisco.com
2,311
CVE-2019-1685
2019-02-21T20:29:00.367
http://www.securityfocus.com/bid/107102
[ "Broken Link", "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,312
CVE-2019-1685
2019-02-21T20:29:00.367
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-cuc-rxss
[ "Vendor Advisory" ]
tools.cisco.com
2,312
CVE-2019-1691
2019-02-21T20:29:00.417
http://www.securityfocus.com/bid/107099
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,313
CVE-2019-1691
2019-02-21T20:29:00.417
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-fpwr-ssltls-dos
[ "Vendor Advisory" ]
tools.cisco.com
2,313
CVE-2019-1698
2019-02-21T21:29:00.267
http://www.securityfocus.com/bid/107093
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,314
CVE-2019-1698
2019-02-21T21:29:00.267
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-iot-fnd-xml
[ "Vendor Advisory" ]
tools.cisco.com
2,314
CVE-2019-1700
2019-02-21T21:29:00.313
http://www.securityfocus.com/bid/107105
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,315
CVE-2019-1700
2019-02-21T21:29:00.313
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190220-firpwr-dos
[ "Vendor Advisory" ]
tools.cisco.com
2,315
CVE-2019-6340
2019-02-21T21:29:00.343
http://www.securityfocus.com/bid/107106
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,316
CVE-2019-6340
2019-02-21T21:29:00.343
https://www.drupal.org/sa-core-2019-003
[ "Mitigation", "Vendor Advisory" ]
www.drupal.org
2,316
CVE-2019-6340
2019-02-21T21:29:00.343
https://www.exploit-db.com/exploits/46452/
[ "Patch", "Third Party Advisory", "VDB Entry" ]
www.exploit-db.com
2,316
CVE-2019-6340
2019-02-21T21:29:00.343
https://www.exploit-db.com/exploits/46459/
[ "Exploit", "Third Party Advisory", "VDB Entry" ]
www.exploit-db.com
2,316
CVE-2019-6340
2019-02-21T21:29:00.343
https://www.exploit-db.com/exploits/46510/
[ "Exploit", "Third Party Advisory" ]
www.exploit-db.com
2,316
CVE-2019-6340
2019-02-21T21:29:00.343
https://www.synology.com/security/advisory/Synology_SA_19_09
[ "Third Party Advisory" ]
www.synology.com
2,316
CVE-2019-8996
2019-02-21T21:29:00.377
https://help.signiant.com/flight-deck/general/release-notes-13-5
[ "Release Notes", "Vendor Advisory" ]
help.signiant.com
2,317
CVE-2019-8996
2019-02-21T21:29:00.377
https://help.signiant.com/manager-agents/installation/release-notes/
[ "Release Notes", "Vendor Advisory" ]
help.signiant.com
2,317
CVE-2019-8955
2019-02-21T23:29:00.267
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00013.html
null
lists.opensuse.org
2,318
CVE-2019-8955
2019-02-21T23:29:00.267
http://www.securityfocus.com/bid/107136
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,318
CVE-2019-8955
2019-02-21T23:29:00.267
https://blog.torproject.org/new-releases-tor-0402-alpha-0358-03411-and-03312
[ "Vendor Advisory" ]
blog.torproject.org
2,318
CVE-2019-8955
2019-02-21T23:29:00.267
https://trac.torproject.org/projects/tor/ticket/29168
[ "Vendor Advisory" ]
trac.torproject.org
2,318
CVE-2019-9002
2019-02-22T07:29:00.240
https://github.com/mikelbring/tinyissue/issues/237
[ "Exploit", "Third Party Advisory" ]
github.com
2,319
CVE-2019-9002
2019-02-22T07:29:00.240
https://github.com/pixeline/bugs/commit/9d2d3fcdea22e94f7b497f6ed83791ab3a31ee41
[ "Patch", "Third Party Advisory" ]
github.com
2,319
CVE-2019-7728
2019-02-22T13:29:00.277
https://psirt.bosch.com/Advisory/BOSCH-2019-0202.html
[ "Vendor Advisory" ]
psirt.bosch.com
2,320
CVE-2019-7729
2019-02-22T13:29:00.387
https://psirt.bosch.com/Advisory/BOSCH-2019-0204.html
[ "Vendor Advisory" ]
psirt.bosch.com
2,321
CVE-2018-20784
2019-02-22T15:29:00.237
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0
[ "Patch", "Vendor Advisory" ]
git.kernel.org
2,322
CVE-2018-20784
2019-02-22T15:29:00.237
https://access.redhat.com/errata/RHSA-2019:1959
[ "Third Party Advisory" ]
access.redhat.com
2,322
CVE-2018-20784
2019-02-22T15:29:00.237
https://access.redhat.com/errata/RHSA-2019:1971
[ "Third Party Advisory" ]
access.redhat.com
2,322
CVE-2018-20784
2019-02-22T15:29:00.237
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2
[ "Release Notes", "Vendor Advisory" ]
cdn.kernel.org
2,322
CVE-2018-20784
2019-02-22T15:29:00.237
https://github.com/torvalds/linux/commit/c40f7d74c741a907cfaeb73a7697081881c497d0
[ "Patch", "Third Party Advisory" ]
github.com
2,322
CVE-2018-20784
2019-02-22T15:29:00.237
https://usn.ubuntu.com/4211-1/
[ "Third Party Advisory" ]
usn.ubuntu.com
2,322
CVE-2018-20784
2019-02-22T15:29:00.237
https://usn.ubuntu.com/4211-2/
[ "Third Party Advisory" ]
usn.ubuntu.com
2,322
CVE-2019-9003
2019-02-22T15:29:00.550
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=77f8269606bf95fcb232ee86f6da80886f1dfae8
[ "Patch", "Vendor Advisory" ]
git.kernel.org
2,323
CVE-2019-9003
2019-02-22T15:29:00.550
http://www.securityfocus.com/bid/107145
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,323
CVE-2019-9003
2019-02-22T15:29:00.550
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.5
[ "Release Notes", "Vendor Advisory" ]
cdn.kernel.org
2,323
CVE-2019-9003
2019-02-22T15:29:00.550
https://github.com/torvalds/linux/commit/77f8269606bf95fcb232ee86f6da80886f1dfae8
[ "Patch", "Third Party Advisory" ]
github.com
2,323
CVE-2019-9003
2019-02-22T15:29:00.550
https://security.netapp.com/advisory/ntap-20190327-0002/
[ "Third Party Advisory" ]
security.netapp.com
2,323
CVE-2019-9004
2019-02-22T15:29:00.737
https://github.com/eclipse/wakaama/issues/425
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
2,324
CVE-2019-9015
2019-02-22T16:29:00.263
https://github.com/yangsuda/mopcms/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
2,325
CVE-2019-9016
2019-02-22T16:29:00.327
https://github.com/yangsuda/mopcms/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
2,326
CVE-2019-9019
2019-02-22T20:29:00.263
https://www.linkedin.com/pulse/buffer-overflow-exploitation-british-airways-system-marco-gisbert/
[ "Exploit", "Third Party Advisory" ]
www.linkedin.com
2,327
CVE-2019-6485
2019-02-22T23:29:00.283
http://www.securityfocus.com/bid/106783
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,328
CVE-2019-6485
2019-02-22T23:29:00.283
https://github.com/RUB-NDS/TLS-Padding-Oracles
[ "Product", "Third Party Advisory" ]
github.com
2,328
CVE-2019-6485
2019-02-22T23:29:00.283
https://support.citrix.com/article/CTX240139
[ "Mitigation", "Patch", "Vendor Advisory" ]
support.citrix.com
2,328
CVE-2019-9020
2019-02-22T23:29:00.330
http://www.securityfocus.com/bid/107156
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,329
CVE-2019-9020
2019-02-22T23:29:00.330
https://bugs.php.net/bug.php?id=77242
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
bugs.php.net
2,329
CVE-2019-9020
2019-02-22T23:29:00.330
https://bugs.php.net/bug.php?id=77249
[ "Issue Tracking", "Exploit", "Vendor Advisory" ]
bugs.php.net
2,329
CVE-2019-9020
2019-02-22T23:29:00.330
https://security.netapp.com/advisory/ntap-20190321-0001/
[ "Third Party Advisory" ]
security.netapp.com
2,329
CVE-2019-9020
2019-02-22T23:29:00.330
https://usn.ubuntu.com/3902-1/
[ "Third Party Advisory" ]
usn.ubuntu.com
2,329
CVE-2019-9020
2019-02-22T23:29:00.330
https://usn.ubuntu.com/3902-2/
[ "Third Party Advisory" ]
usn.ubuntu.com
2,329
CVE-2019-9020
2019-02-22T23:29:00.330
https://www.debian.org/security/2019/dsa-4398
[ "Third Party Advisory" ]
www.debian.org
2,329
CVE-2019-9021
2019-02-22T23:29:00.410
http://www.securityfocus.com/bid/106747
[ "Third Party Advisory", "VDB Entry" ]
www.securityfocus.com
2,330
CVE-2019-9021
2019-02-22T23:29:00.410
https://bugs.php.net/bug.php?id=77247
[ "Issue Tracking", "Exploit", "Patch", "Vendor Advisory" ]
bugs.php.net
2,330
CVE-2019-9022
2019-02-22T23:29:00.440
https://bugs.php.net/bug.php?id=77369
[ "Exploit", "Issue Tracking", "Vendor Advisory" ]
bugs.php.net
2,331
CVE-2019-9022
2019-02-22T23:29:00.440
https://lists.debian.org/debian-lts-announce/2019/03/msg00043.html
[ "Mailing List", "Third Party Advisory" ]
lists.debian.org
2,331
CVE-2019-9022
2019-02-22T23:29:00.440
https://usn.ubuntu.com/3922-2/
[ "Third Party Advisory" ]
usn.ubuntu.com
2,331
CVE-2019-9022
2019-02-22T23:29:00.440
https://usn.ubuntu.com/3922-3/
[ "Third Party Advisory" ]
usn.ubuntu.com
2,331
CVE-2019-9022
2019-02-22T23:29:00.440
https://www.tenable.com/security/tns-2019-07
null
www.tenable.com
2,331
CVE-2019-9023
2019-02-22T23:29:00.487
https://bugs.php.net/bug.php?id=77370
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
bugs.php.net
2,332
CVE-2019-9023
2019-02-22T23:29:00.487
https://bugs.php.net/bug.php?id=77371
[ "Issue Tracking", "Exploit", "Vendor Advisory", "Patch" ]
bugs.php.net
2,332
CVE-2019-9023
2019-02-22T23:29:00.487
https://bugs.php.net/bug.php?id=77381
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
bugs.php.net
2,332
CVE-2019-9023
2019-02-22T23:29:00.487
https://bugs.php.net/bug.php?id=77382
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
bugs.php.net
2,332
CVE-2019-9023
2019-02-22T23:29:00.487
https://bugs.php.net/bug.php?id=77385
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
bugs.php.net
2,332
CVE-2019-9023
2019-02-22T23:29:00.487
https://bugs.php.net/bug.php?id=77394
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
bugs.php.net
2,332
CVE-2019-9023
2019-02-22T23:29:00.487
https://bugs.php.net/bug.php?id=77418
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
bugs.php.net
2,332
CVE-2019-9023
2019-02-22T23:29:00.487
https://support.f5.com/csp/article/K06372014
[ "Third Party Advisory" ]
support.f5.com
2,332
CVE-2019-9024
2019-02-22T23:29:00.627
https://bugs.php.net/bug.php?id=77380
[ "Issue Tracking", "Exploit", "Patch", "Vendor Advisory" ]
bugs.php.net
2,333
CVE-2019-9025
2019-02-22T23:29:00.660
https://bugs.php.net/bug.php?id=77367
[ "Exploit", "Issue Tracking", "Patch", "Vendor Advisory" ]
bugs.php.net
2,334
CVE-2018-18692
2019-02-23T11:29:00.240
https://atomic111.github.io/article/semcosoft-cross-site-scripting
[ "Exploit", "Third Party Advisory" ]
atomic111.github.io
2,335
CVE-2019-9026
2019-02-23T12:29:00.257
https://github.com/TeamSeri0us/pocs/tree/master/matio
[ "Exploit", "Third Party Advisory" ]
github.com
2,336
CVE-2019-9026
2019-02-23T12:29:00.257
https://github.com/tbeu/matio/issues/103
[ "Third Party Advisory" ]
github.com
2,336
CVE-2014-10078
2019-02-23T14:29:00.253
https://cxsecurity.com/issue/WLB-2018120091
[ "Exploit", "Third Party Advisory" ]
cxsecurity.com
2,349
CVE-2014-10078
2019-02-23T14:29:00.253
https://seclists.org/fulldisclosure/2014/Aug/8
[ "Mailing List", "Third Party Advisory" ]
seclists.org
2,349
CVE-2014-10078
2019-02-23T14:29:00.253
https://www.exploit-db.com/exploits/46549/
[ "Exploit", "Third Party Advisory", "VDB Entry" ]
www.exploit-db.com
2,349
CVE-2014-10079
2019-02-23T14:29:00.330
https://packetstormsecurity.com/files/127786/Vembu-Backup-Disaster-Recovery-6.1-Follow-Up.html
[ "Third Party Advisory", "VDB Entry" ]
packetstormsecurity.com
2,350
CVE-2018-20785
2019-02-23T14:29:00.427
https://media.ccc.de/v/2018-124-pinky-brain-are-taking-over-the-world-with-vacuum-cleaners#t=745
[ "Exploit", "Third Party Advisory" ]
media.ccc.de
2,351