Browse and filter security vulnerabilities across ecosystems
Browse and filter security vulnerabilities across ecosystems
(Unspecified vulnerability in the Oracle VM VirtualBox component in Ora ...)
(The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other prod ...)
(Jetty 8.1.0.RC2 and earlier computes hash values for form parameters w ...)
(The JPEG decoder in ImageMagick before 6.8.9-9 allows local users to c ...)
(Integer overflow in the strxfrm function in the GNU C Library (aka gli ...)
(pt_chown in the glibc package before 2.19-18+deb8u4 on Debian jessie; ...)
(The strchr function in procmime.c in Claws Mail (aka claws-mail) 3.8.1 ...)
(The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, al ...)
(The xen_iret function in arch/x86/xen/xen-asm_32.S in the Linux kernel ...)
(The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ...)
(obby (aka libobby) does not verify SSL server certificates, which allo ...)
(phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir ...)
(OpenFabrics ibutils 1.5.7 allows local users to overwrite arbitrary fi ...)
(course/loginas.php in Moodle through 2.2.11, 2.3.x before 2.3.11, 2.4. ...)
(In NetworkManager 0.9.2.0, when a new wireless network was created wit ...)
(rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier ...)
(Bugzilla 2.23.3 through 2.22.7, 3.0.x through 3.3.x, 3.4.x before 3.4. ...)
(The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 ...)
(The FS_CheckFilenameIsNotExecutable function in qcommon/files.c in the ...)
(The GLX extension in X.Org xserver 1.7.7 allows remote authenticated u ...)
Showing 1 - 20 of 1,000+ results