- Synchronized data.

This commit is contained in:
CVE Team 2018-10-18 11:15:13 -04:00
parent 183098b798
commit 66ba7ab1f8
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
1489 changed files with 2220 additions and 2130 deletions

View File

@ -55,7 +55,7 @@
{
"name" : "20060212 XMB Forums Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425084/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425084/100/0/threaded"
},
{
"name" : "http://www.gulftech.org/?node=research&article_id=00100-02122006",

View File

@ -55,7 +55,7 @@
{
"name" : "20060212 XMB Forums Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425084/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425084/100/0/threaded"
},
{
"name" : "http://www.gulftech.org/?node=research&article_id=00100-02122006",

View File

@ -55,7 +55,7 @@
{
"name" : "20060227 [eVuln] PerlBlog Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426260/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426260/100/0/threaded"
},
{
"name" : "http://evuln.com/vulns/81/summary.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060227 [eVuln] PerlBlog Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426260/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426260/100/0/threaded"
},
{
"name" : "http://evuln.com/vulns/81/summary.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060227 [eVuln] PerlBlog Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426260/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426260/100/0/threaded"
},
{
"name" : "http://evuln.com/vulns/81/summary.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060216 Siteframe Beaumont 5.0.2 <== User Comment Cross-Site Scripting Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425180/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425180/100/0/threaded"
},
{
"name" : "16695",

View File

@ -55,7 +55,7 @@
{
"name" : "20060216 D-Link DWL-G700AP httpd DoS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425169/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425169/100/0/threaded"
},
{
"name" : "16690",

View File

@ -55,7 +55,7 @@
{
"name" : "20060216 PHPKIT >= 1.6.1r2 arbitrary local/remote inclusion (unproperly patched in previous versions)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425196/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425196/100/0/threaded"
},
{
"name" : "http://retrogod.altervista.org/phpkit_161r2_incl_xpl.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060216 PHPKIT >= 1.6.1r2 arbitrary local/remote inclusion (unproperly patched in previous versions)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425196/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425196/100/0/threaded"
},
{
"name" : "http://retrogod.altervista.org/phpkit_161r2_incl_xpl.html",

View File

@ -55,17 +55,17 @@
{
"name" : "20060605 [MajorSecurity #9]HostAdmin <= 3.1 - Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/435993/30/4650/threaded"
"url" : "http://www.securityfocus.com/archive/1/435993/30/4650/threaded"
},
{
"name" : "20081007 HostAdmin 3.* Remote File Include Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/497093/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/497093/100/0/threaded"
},
{
"name" : "20081007 Re: HostAdmin 3.* Remote File Include Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/497133/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/497133/100/0/threaded"
},
{
"name" : "20060215 HostAdmin - Remote Command Execution Vulnerability",

View File

@ -55,7 +55,7 @@
{
"name" : "20060226 [eVuln] Quirex Arbitrary File Disclosure Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426188/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426188/100/0/threaded"
},
{
"name" : "http://evuln.com/vulns/78/summary.html",

View File

@ -55,17 +55,17 @@
{
"name" : "20060216 Internet Explorer Phishing mouseover issue",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425298/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425298/100/0/threaded"
},
{
"name" : "20060218 Re: Internet Explorer Phishing mouseover issue",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425386/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425386/100/0/threaded"
},
{
"name" : "20060223 Re: Internet Explorer Phishing mouseover issue",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425883/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425883/100/0/threaded"
},
{
"name" : "23609",

View File

@ -55,7 +55,7 @@
{
"name" : "20060218 [waraxe-2006-SA#045] - Bypassing CAPTCHA in phpNuke 6.x-7.9",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425394/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425394/100/0/threaded"
},
{
"name" : "http://www.waraxe.us/advisory-45.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060218 ADOdb Library Cross Site Scripting",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425393/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425393/100/0/threaded"
},
{
"name" : "http://www.gulftech.org/?node=research&article_id=00101-02182006",

View File

@ -55,7 +55,7 @@
{
"name" : "20060220 Secunia Research: NJStar Word Processor Font Name Buffer Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425498/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425498/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-5/advisory/",

View File

@ -55,7 +55,7 @@
{
"name" : "20060223 Secunia Research: Visnetic AntiVirus Plug-in for MailServerPrivilege Escalation",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425890/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425890/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2005-65/advisory/",

View File

@ -55,7 +55,7 @@
{
"name" : "20060223 Secunia Research: WinACE ARJ Archive Handling Buffer Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425894/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425894/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2005-67/advisory/",

View File

@ -55,7 +55,7 @@
{
"name" : "20060301 Secunia Research: Lighttpd Script Source Disclosure Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426446/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426446/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-9/advisory/",

View File

@ -55,7 +55,7 @@
{
"name" : "20060301 Secunia Research: NetworkActiv Web Server Script Source DisclosureVulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426461/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426461/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-10/advisory",

View File

@ -55,7 +55,7 @@
{
"name" : "20060323 Secunia Research: Orion Application Server JSP Source DisclosureVulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/428601/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/428601/100/0/threaded"
},
{
"name" : "20060323 Secunia Research: Orion Application Server JSP Source Disclosure Vulnerability",

View File

@ -55,12 +55,12 @@
{
"name" : "20060717 Secunia Research: IceWarp Web Mail Two File InclusionVulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/440297/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
},
{
"name" : "20060717 Secunia Research: VisNetic Mail Server Two File InclusionVulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/440302/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-12/advisory/",

View File

@ -55,12 +55,12 @@
{
"name" : "20060717 Secunia Research: IceWarp Web Mail Two File InclusionVulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/440297/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/440297/100/0/threaded"
},
{
"name" : "20060717 Secunia Research: VisNetic Mail Server Two File InclusionVulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/440302/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/440302/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-12/advisory/",

View File

@ -55,7 +55,7 @@
{
"name" : "20060313 Secunia Research: Dwarf HTTP Server Source Disclosure andCross-Site Scripting",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/427478/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/427478/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-13/advisory",

View File

@ -55,7 +55,7 @@
{
"name" : "20060313 Secunia Research: Dwarf HTTP Server Source Disclosure andCross-Site Scripting",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/427478/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/427478/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-13/advisory",

View File

@ -55,7 +55,7 @@
{
"name" : "20060219 Geeklog Remote Code Execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425506/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425506/100/0/threaded"
},
{
"name" : "http://www.gulftech.org/?node=research&article_id=00102-02192006",

View File

@ -55,7 +55,7 @@
{
"name" : "20060219 Geeklog Remote Code Execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425506/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425506/100/0/threaded"
},
{
"name" : "http://www.gulftech.org/?node=research&article_id=00102-02192006",

View File

@ -55,7 +55,7 @@
{
"name" : "20060302 [eVuln] E-Blah Platinum 'Referer' XSS Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426582/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426582/100/0/threaded"
},
{
"name" : "http://evuln.com/vulns/83/summary.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060216 Stack overflow vulnerability in Internet Explorer exploitable trough VBScript and JScript scripting engines.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425283/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425283/100/0/threaded"
},
{
"name" : "20060218 Re: Stack overflow vulnerability in Internet Explorer exploitable trough VBScript and JScript scripting engines.",

View File

@ -55,7 +55,7 @@
{
"name" : "20060218 Tasarim Rehberi Index.PHP Remote Command Exucetion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425389/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425389/100/0/threaded"
}
]
}

View File

@ -55,7 +55,7 @@
{
"name" : "20060218 SLQ Injection vulnerability in WPCeasy",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425395/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425395/100/0/threaded"
},
{
"name" : "16721",

View File

@ -55,7 +55,7 @@
{
"name" : "20060216 Uniden UIP1868P (VoIP phone/gateway) default easy-to-guess password vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425362/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425362/100/0/threaded"
},
{
"name" : "uniden-uip1868p-default-account(24786)",

View File

@ -55,7 +55,7 @@
{
"name" : "20060221 Mozila Thunderbird 1.5 Address Book DoS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425602/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425602/100/0/threaded"
},
{
"name" : "20060217 Mozila Thunderbird 1.5 Address Book DoS",

View File

@ -55,7 +55,7 @@
{
"name" : "20060216 Password disclosure and remote access in Netcool/NeuSecure Security information management platform",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425304/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425304/100/0/threaded"
},
{
"name" : "20060216 Password disclosure and remote access in Netcool/NeuSecure Security information management platform",

View File

@ -55,7 +55,7 @@
{
"name" : "20060216 Password disclosure and remote access in Netcool/NeuSecure Security information management platform",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425304/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425304/100/0/threaded"
},
{
"name" : "20060216 Password disclosure and remote access in Netcool/NeuSecure Security information management platform",

View File

@ -55,7 +55,7 @@
{
"name" : "20060217 SNORT Incorrect fragmented packet reassembly",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425290/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425290/100/0/threaded"
},
{
"name" : "16705",

View File

@ -55,7 +55,7 @@
{
"name" : "20060215 [BuHa-Security] Multiple Vulnerabilities in Mantis 1.00rc4",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425046/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425046/100/0/threaded"
},
{
"name" : "http://morph3us.org/advisories/20060214-mantis-100rc4.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20060215 [BuHa-Security] Multiple Vulnerabilities in Mantis 1.00rc4",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425046/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425046/100/0/threaded"
},
{
"name" : "http://morph3us.org/advisories/20060214-mantis-100rc4.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20060220 [AJECT] TrueNorth IA eMailserver 5.3.4 buffer overflow vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425586/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425586/100/0/threaded"
},
{
"name" : "16744",

View File

@ -55,7 +55,7 @@
{
"name" : "20060223 zoo contains exploitable buffer overflows",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425887/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425887/100/0/threaded"
},
{
"name" : "http://www.guay-leroux.com/projects/zoo-advisory.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20060216 [eVuln] SmE GB Host Authentication Bypass Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425317/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425317/100/0/threaded"
},
{
"name" : "http://www.evuln.com/vulns/66/summary.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060218 e107 CMS 0.7.2 Chatbox plugin XSS vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425388/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425388/100/0/threaded"
},
{
"name" : "16719",

View File

@ -55,7 +55,7 @@
{
"name" : "20060219 [TZO-062006] Safe'nVulnerable",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425504/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425504/100/0/threaded"
},
{
"name" : "http://secdev.zoller.lu/research/safnsec.htm",

View File

@ -55,12 +55,12 @@
{
"name" : "20060220 Guestbox XSS/an admin bypass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425495/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425495/100/0/threaded"
},
{
"name" : "20060302 Re: Guestbox XSS/an admin bypass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426663/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426663/100/0/threaded"
},
{
"name" : "ADV-2006-0675",

View File

@ -55,12 +55,12 @@
{
"name" : "20060220 Guestbox XSS/an admin bypass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425495/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425495/100/0/threaded"
},
{
"name" : "20060302 Re: Guestbox XSS/an admin bypass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426663/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426663/100/0/threaded"
},
{
"name" : "16751",

View File

@ -55,12 +55,12 @@
{
"name" : "20060220 Guestbox XSS/an admin bypass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425495/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425495/100/0/threaded"
},
{
"name" : "20060302 Re: Guestbox XSS/an admin bypass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426663/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426663/100/0/threaded"
},
{
"name" : "ADV-2006-0675",

View File

@ -55,7 +55,7 @@
{
"name" : "20060222 IRM 017: Multiple Vulnerabilities in Infovista Portal SE",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425779/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425779/100/0/threaded"
},
{
"name" : "http://www.irmplc.com/advisory017.htm",

View File

@ -55,7 +55,7 @@
{
"name" : "20060222 IRM 017: Multiple Vulnerabilities in Infovista Portal SE",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425779/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425779/100/0/threaded"
},
{
"name" : "http://www.irmplc.com/advisory017.htm",

View File

@ -55,7 +55,7 @@
{
"name" : "20060222 [INetCop Security Advisory] Global Hauri Virobot cookie exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425788/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425788/100/0/threaded"
},
{
"name" : "http://x82.inetcop.org/h0me/adv1sor1es/INCSA.2006-0x82-028-VIROBOT.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20060219 PunBB 1.2.10 Multiple DoS Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425630/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425630/100/0/threaded"
},
{
"name" : "http://www.neosecurityteam.net/advisories/Advisory-15.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20060219 PunBB 1.2.10 Multiple DoS Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425630/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425630/100/0/threaded"
},
{
"name" : "http://www.neosecurityteam.net/advisories/Advisory-15.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20060222 South River WebDrive Buffer Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425785/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425785/100/0/threaded"
},
{
"name" : "webdrive-name-bo(24903)",

View File

@ -55,7 +55,7 @@
{
"name" : "20060222 Multiple Injection Vulnerabilities in PHP PEAR::Auth Module",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425796/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425796/100/0/threaded"
},
{
"name" : "http://pear.php.net/package/Auth/download/1.2.4",

View File

@ -55,7 +55,7 @@
{
"name" : "20060221 PEAR LiveUser File Access Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425711/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425711/100/0/threaded"
},
{
"name" : "http://www.gulftech.org/?node=research&article_id=00103-02212006",

View File

@ -55,22 +55,22 @@
{
"name" : "20060220 MiniNuke CMS System all versions (pages.asp) SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425599/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425599/100/0/threaded"
},
{
"name" : "20060321 Mini-Nuke<=1.8.2 SQL injection (6)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/428361/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/428361/100/0/threaded"
},
{
"name" : "20060420 Mini-NUKE v2.3<<--- SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/431602/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/431602/100/0/threaded"
},
{
"name" : "20060421 Re: Mini-NUKE v2.3<<--- SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/431714/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/431714/100/0/threaded"
},
{
"name" : "http://www.nukedx.com/?viewdoc=9",

View File

@ -55,7 +55,7 @@
{
"name" : "20060222 [KAPDA::#27] - Runcms 1.x Cross_Site_Scripting vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425775/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425775/100/0/threaded"
},
{
"name" : "http://kapda.ir/advisory-267.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060304 [eVuln] Easy Forum XSS Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426760/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426760/100/0/threaded"
},
{
"name" : "http://evuln.com/vulns/85/summary.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060222 [KAPDA::#29]Noah's classifieds multiple vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425783/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425783/100/0/threaded"
},
{
"name" : "http://www.kapda.ir/advisory-268.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060222 [KAPDA::#29]Noah's classifieds multiple vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425783/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425783/100/0/threaded"
},
{
"name" : "http://www.kapda.ir/advisory-268.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060222 [KAPDA::#29]Noah's classifieds multiple vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425783/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425783/100/0/threaded"
},
{
"name" : "http://www.kapda.ir/advisory-268.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060222 [KAPDA::#29]Noah's classifieds multiple vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425783/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425783/100/0/threaded"
},
{
"name" : "http://www.kapda.ir/advisory-268.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060222 [KAPDA::#29]Noah's classifieds multiple vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425783/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425783/100/0/threaded"
},
{
"name" : "http://www.kapda.ir/advisory-268.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060222 Mozilla Thunderbird : Remote Code Execution & Denial of Service",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425786/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425786/100/0/threaded"
},
{
"name" : "http://www.mozilla.org/security/announce/2006/mfsa2006-21.html",
@ -80,7 +80,7 @@
{
"name" : "FLSA:189137-1",
"refsource" : "FEDORA",
"url" : "http://www.securityfocus.com/archive/1/archive/1/436296/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/436296/100/0/threaded"
},
{
"name" : "GLSA-200604-18",
@ -95,22 +95,22 @@
{
"name" : "HPSBUX02122",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/archive/1/438730/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
},
{
"name" : "SSRT061158",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/archive/1/438730/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/438730/100/0/threaded"
},
{
"name" : "HPSBUX02156",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/archive/1/446657/100/200/threaded"
"url" : "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name" : "SSRT061236",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/archive/1/446657/100/200/threaded"
"url" : "http://www.securityfocus.com/archive/1/446657/100/200/threaded"
},
{
"name" : "MDKSA-2006:052",

View File

@ -55,7 +55,7 @@
{
"name" : "20060224 SpeedCommander 11.0 & ZipStar 5.1 & Squeez 5.1 Directory traversal",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425973/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425973/100/0/threaded"
},
{
"name" : "16807",

View File

@ -55,7 +55,7 @@
{
"name" : "20060306 [eVuln] Simple Machines Forum - SMF 'X-Forwarded-For' XSS Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426824/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426824/100/0/threaded"
},
{
"name" : "http://evuln.com/vulns/86/summary.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060223 Vulnerability in Crypt::CBC Perl module, versions <= 2.16",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425966/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425966/100/0/threaded"
},
{
"name" : "DSA-996",

View File

@ -55,7 +55,7 @@
{
"name" : "20060301 4images <=1.7.1 remote code execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426468/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426468/100/0/threaded"
},
{
"name" : "1533",

View File

@ -55,7 +55,7 @@
{
"name" : "20060226 2 SQL Injection in d3jeeb",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426197/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426197/100/0/threaded"
},
{
"name" : "16853",

View File

@ -55,7 +55,7 @@
{
"name" : "20060225 [waraxe-2006-SA#047] - Evading sql-injection filters in phpNuke 7.8",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426083/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426083/100/0/threaded"
},
{
"name" : "http://www.waraxe.us/advisory-47.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060225 [waraxe-2006-SA#047] - Evading sql-injection filters in phpNuke 7.8",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426083/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426083/100/0/threaded"
},
{
"name" : "http://www.waraxe.us/advisory-47.html",

View File

@ -55,12 +55,12 @@
{
"name" : "20060221 Invision Power Board 2.1.4 Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425713/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425713/100/0/threaded"
},
{
"name" : "20070419 IPB (Invision Power Board) Full Path Disclusure",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/466275/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/466275/100/0/threaded"
},
{
"name" : "http://neosecurityteam.net/advisories/Advisory-16.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20060221 Invision Power Board 2.1.4 Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425713/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425713/100/0/threaded"
},
{
"name" : "http://neosecurityteam.net/advisories/Advisory-16.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20060222 IpSwitch WhatsUp Professional 2006 DoS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425780/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425780/100/0/threaded"
},
{
"name" : "http://zur.homelinux.com/Advisories/ipswitch_dos.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20060221 [BUGZILLA] Security Advisory for Bugzilla 2.20, 2.21.1, and 2.18.4",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425584/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425584/100/0/threaded"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=312498",

View File

@ -55,7 +55,7 @@
{
"name" : "20060221 [BUGZILLA] Security Advisory for Bugzilla 2.20, 2.21.1, and 2.18.4",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425584/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425584/100/0/threaded"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=312498",

View File

@ -55,7 +55,7 @@
{
"name" : "20060221 [BUGZILLA] Security Advisory for Bugzilla 2.20, 2.21.1, and 2.18.4",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425584/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425584/100/0/threaded"
},
{
"name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=325079",

View File

@ -55,7 +55,7 @@
{
"name" : "20060221 grab cookie information with Melange Chat Server 1.10",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425589/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425589/100/0/threaded"
},
{
"name" : "http://www.oh2600.com/forum/viewtopic.php?t=43",

View File

@ -55,7 +55,7 @@
{
"name" : "20060223 NSA Group Security Advisory NSAG-&sup1;198-23.02.2006 Vulnerability The Bat v. 3.60.07",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425936/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425936/100/0/threaded"
},
{
"name" : "http://www.nsag.ru/vuln/953.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060223 HYSA-2006-003 Oi! Email Marketing 3.0 SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425924/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425924/100/0/threaded"
},
{
"name" : "http://www.h4cky0u.org/advisories/HYSA-2006-003-oi-email.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20060223 HYSA-2006-003 Oi! Email Marketing 3.0 SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425924/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425924/100/0/threaded"
},
{
"name" : "http://www.h4cky0u.org/advisories/HYSA-2006-003-oi-email.txt",

View File

@ -55,12 +55,12 @@
{
"name" : "20060223 NSA Group Security Advisory NSAG-&sup1;195-23.02.2006 Vulnerability FCKeditor 2.0 FC",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425937/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425937/100/0/threaded"
},
{
"name" : "20060519 Re: NSA Group Security Advisory NSAG-&sup1;195-23.02.2006 Vulnerability FCKeditor 2.0 FC",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/434559/30/4890/threaded"
"url" : "http://www.securityfocus.com/archive/1/434559/30/4890/threaded"
},
{
"name" : "http://www.nsag.ru/vuln/952.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060223 NSA Group Security Advisory NSAG-&sup1;197-23.02.2006 Vulnerability CubeCart 3.0.0 ? 3.0.6",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425931/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425931/100/0/threaded"
},
{
"name" : "http://www.cubecart.com/site/forums/index.php?showtopic=14817",

View File

@ -55,7 +55,7 @@
{
"name" : "20060224 Advisory: MyPHPNuke <= 1.8.8 multiple XSS vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425983/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425983/100/0/threaded"
},
{
"name" : "http://www.nukedx.com/?viewdoc=12",

View File

@ -55,7 +55,7 @@
{
"name" : "20060224 StuffIt and ZipMagic Family of products Directory traversal",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425972/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425972/100/0/threaded"
},
{
"name" : "http://www.hamid.ir/security/stuffit.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20060224 Advisory: Woltlab Burning Board 2.x (JGS-Gallery MOD <= 4.0)multiple XSS vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425981/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425981/100/0/threaded"
},
{
"name" : "20060224 Advisory: Woltlab Burning Board 2.x (JGS-Gallery MOD <= 4.0) multiple XSS vulnerabilities",

View File

@ -55,7 +55,7 @@
{
"name" : "20060224 NSA Group Security Advisory NSAG-&sup1;198-23.02.2006 Vulnerability ArGoSoft Mail Server Pro",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425968/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425968/100/0/threaded"
},
{
"name" : "http://www.nsag.ru/vuln/879.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060224 NSA Group Security Advisory NSAG-&sup1;200-24.02.2006 Vulnerability ArGoSoft Mail Server Pro IMAP",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425969/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425969/100/0/threaded"
},
{
"name" : "http://www.nsag.ru/vuln/878.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060224 Archive_Tar v 1.2(Tested) (Tar file management class) Directory traversal",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425967/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425967/100/0/threaded"
},
{
"name" : "http://www.hamid.ir/security/phptar.txt",

View File

@ -55,12 +55,12 @@
{
"name" : "20060224 Archive_Tar v 1.2(Tested) (Tar file management class) Directory traversal",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/425967/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/425967/100/0/threaded"
},
{
"name" : "20060225 Archive_Zip (Zip file management class) Directory traversal",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426153/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426153/100/0/threaded"
},
{
"name" : "http://www.hamid.ir/security/phpzip.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20060225 NSA Group Security Advisory NSAG-&sup1;202-25.02.2006 Vulnerability WEBSITE GENERATOR 3.3",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426077/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426077/100/0/threaded"
},
{
"name" : "http://nsag.ru/vuln/894.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060225 Advisory: eZ publish <= 3.7.3 (imagecatalogue module) XSSvulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426076/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426076/100/0/threaded"
},
{
"name" : "http://www.nukedx.com/?viewdoc=16",

View File

@ -55,7 +55,7 @@
{
"name" : "20060307 [eVuln] ShoutLIVE PHP Code Execution & Multiple XSS Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426985/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426985/100/0/threaded"
},
{
"name" : "http://evuln.com/vulns/87/summary.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060307 [eVuln] ShoutLIVE PHP Code Execution & Multiple XSS Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426985/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426985/100/0/threaded"
},
{
"name" : "http://evuln.com/vulns/87/summary.html",

View File

@ -55,12 +55,12 @@
{
"name" : "20060225 PwsPHP Injection SQL on Index.php",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426084/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426084/100/0/threaded"
},
{
"name" : "20060226 Re: PwsPHP Injection SQL on Index.php",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426183/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426183/100/0/threaded"
},
{
"name" : "http://www.pwsphp.com/index.php?mod=news&ac=commentaires&id=278",

View File

@ -55,7 +55,7 @@
{
"name" : "20060226 Archangel Weblog 0.90.02 Admin Authentication Bypass & Remote File Inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426184/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426184/100/0/threaded"
},
{
"name" : "3859",

View File

@ -55,7 +55,7 @@
{
"name" : "20060226 Archangel Weblog 0.90.02 Admin Authentication Bypass & Remote File Inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426184/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426184/100/0/threaded"
},
{
"name" : "16848",

View File

@ -55,7 +55,7 @@
{
"name" : "20060818 Secunia Research: AOL Insecure Default Directory Permissions",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/443622/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/443622/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-08",

View File

@ -55,7 +55,7 @@
{
"name" : "20060313 Secunia Research: unalz Filename Handling Directory TraversalVulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/427475/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/427475/100/0/threaded"
},
{
"name" : "20060313 Secunia Research: unalz Filename Handling",

View File

@ -55,7 +55,7 @@
{
"name" : "20060310 [eVuln] FreeForum PHP Code Execution & Multiple XSS Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/427321/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/427321/100/0/threaded"
},
{
"name" : "http://evuln.com/vulns/89/summary.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060310 [eVuln] FreeForum PHP Code Execution & Multiple XSS Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/427321/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/427321/100/0/threaded"
},
{
"name" : "http://evuln.com/vulns/89/summary.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20060228 MyBB 1.3 NewSQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426320/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426320/100/0/threaded"
},
{
"name" : "1539",
@ -65,7 +65,7 @@
{
"name" : "20060303 MyBB 1.04 Perl Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/426653/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/426653/100/0/threaded"
},
{
"name" : "16631",

Some files were not shown because too many files have changed in this diff Show More