Updates June 2019

Type

The data in this chart does not reflect real data. It is dummy data, distorted and not usable in any way. You need you unlock this view to get access to more details of real data.

UpdatedBaseTempVulnerabilityChangeExpRemCTICVE
06/30/20197.37.0Oracle Database sql injection(4): vulnerability_discoverydate, source_osvdb, source_osvdb_title, source_secunia_dateNot DefinedOfficial Fix0.04CVE-2005-0297
06/30/20197.37.0Oracle Database sql injection(4): vulnerability_discoverydate, source_osvdb, source_osvdb_title, source_secunia_dateNot DefinedOfficial Fix0.06CVE-2005-0297
06/30/20197.37.0Oracle Database memory corruption(2): vulnerability_discoverydate, source_secunia_dateNot DefinedOfficial Fix0.05CVE-2005-0297
06/30/20197.37.0Oracle Database sql injection(4): vulnerability_discoverydate, source_osvdb, source_osvdb_title, source_secunia_dateNot DefinedOfficial Fix0.05CVE-2005-0297
06/30/20196.36.0Kazaa sig2dat Protocol memory corruption(1): vulnerability_cweProof-of-ConceptOfficial Fix0.04
06/30/20197.67.6Sun MySQL mysqlaccess privileges management(2): vulnerability_discoverydate, source_secunia_dateNot DefinedOfficial Fix0.03CVE-2005-0004
06/30/20195.35.1RIM BlackBerry Enterprise Server Mobile Data Service WML denial of service(1): source_secunia_dateNot DefinedOfficial Fix0.04
06/30/20197.37.0Squid Proxy gopherToHTML memory corruption(7): vulnerability_discoverydate, advisory_confirm_url, countermeasure_date, source_cve_assigned, source_osvdb, source_osvdb_title, source_secunia_dateNot DefinedOfficial Fix0.00CVE-2005-0094
06/30/20196.25.9GNU Midnight Commander denial of service(3): vulnerability_discoverydate, countermeasure_date, source_secunia_dateNot DefinedOfficial Fix0.03CVE-2004-1174
06/30/20197.57.2Squid Proxy Web Cache Communication Protocol denial of service(2): vulnerability_discoverydate, source_secunia_dateNot DefinedOfficial Fix0.07CVE-2005-0094
06/30/20196.35.7Linux Kernel race condition(3): vulnerability_discoverydate, countermeasure_date, source_secunia_dateProof-of-ConceptOfficial Fix0.00CVE-2005-0001
06/30/20196.55.9OpenBSD TCP Retransmission denial of service(10): vulnerability_discoverydate, vulnerability_cvss2_nvd_av, vulnerability_cvss2_nvd_ac, vulnerability_cvss2_nvd_au, vulnerability_cvss2_nvd_ci, vulnerability_cvss2_nvd_ii, vulnerability_cvss2_nvd_ai, exploit_date, exploit_url, source_secunia_dateProof-of-ConceptOfficial Fix0.07CVE-2005-0740
06/30/20194.34.1Mozilla Firefox Modal Dialogbox authentication spoofing(1): countermeasure_dateProof-of-ConceptOfficial Fix0.00CVE-2005-0591
06/30/20196.55.9Apple AirPort Wireless Distribution System denial of service(2): vulnerability_discoverydate, source_secunia_dateProof-of-ConceptOfficial Fix0.05CVE-2005-0289
06/30/20197.36.6NullSoft WinAmp in_mp4.dll stack-based overflow(5): vulnerability_discoverydate, exploit_url, source_osvdb, source_osvdb_title, source_secunia_dateProof-of-ConceptOfficial Fix0.00CVE-2004-1150
06/30/20197.36.6NullSoft WinAmp in_cdda.dll stack-based overflow(3): vulnerability_discoverydate, exploit_url, source_secunia_dateProof-of-ConceptOfficial Fix0.03CVE-2004-1150
06/30/20197.36.6NullSoft WinAmp enc_mp4.dll stack-based overflow(4): vulnerability_discoverydate, exploit_url, source_osvdb, source_osvdb_titleProof-of-ConceptOfficial Fix0.00CVE-2004-1150
06/30/20197.37.0Netscape Directory Server LDAP memory corruption(6): vulnerability_discoverydate, source_secunia_date, source_openvas_id, source_openvas_filename, source_openvas_title, source_openvas_familyNot DefinedOfficial Fix0.04CVE-2004-1236
06/30/20197.36.6NullSoft WinAmp libmp4v2.dll stack-based overflow(7): vulnerability_discoverydate, advisory_confirm_url, exploit_url, source_cve_assigned, source_osvdb, source_osvdb_title, source_secunia_dateProof-of-ConceptOfficial Fix0.06CVE-2004-1150
06/30/20196.36.0Linux Kernel random.c poolsize_strategy memory corruption(2): countermeasure_date, source_secunia_dateNot DefinedOfficial Fix0.01CVE-2005-0180

4091 more entries are not shown

Do you want to use VulDB in your project?

Use the official API to access entries easily!