mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-06 10:41:46 +00:00
- Synchronized data.
This commit is contained in:
parent
0df989e2b5
commit
6a33aa4f3f
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070603 CERN İmage Map Dispatcher",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/470458/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/470458/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "964",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070603 CERN İmage Map Dispatcher",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/470458/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/470458/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MS00-028",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "GLSA-200301-07",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/305589/30/26390/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/305589/30/26390/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "1131",
|
||||
|
@ -75,7 +75,7 @@
|
||||
{
|
||||
"name" : "20070603 Dansie Cart Script Exploit Reported",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/470457/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/470457/100/0/threaded"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030313 R7-0012: Lotus Notes/Domino R6-beta PROTOS LDAP Denial of Service Regression",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/314909/30/25520/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/314909/30/25520/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "L-116",
|
||||
|
@ -60,12 +60,12 @@
|
||||
{
|
||||
"name" : "20070825 rPSA-2007-0172-1 tar",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/477731/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/477731/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070827 FLEA-2007-0049-1 tar",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/477865/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/477865/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "https://issues.rpath.com/browse/RPL-1631",
|
||||
|
@ -60,67 +60,67 @@
|
||||
{
|
||||
"name" : "20030125 Fw: MS SQL WORM IS DESTROYING INTERNET BLOCK PORT 1434!",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/308321/30/26180/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/308321/30/26180/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030125 MS SQL WORM IS DESTROYING INTERNET BLOCK PORT 1434!",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/308306/30/26180/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/308306/30/26180/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030125 RE: MS SQL WORM IS DESTROYING INTERNET BLOCK PORT 1434!",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/308393/30/26180/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/308393/30/26180/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030125 Re: MS SQL WORM IS DESTROYING INTERNET BLOCK PORT 1434!",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/308324/30/26180/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/308324/30/26180/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030125 SQL Sapphire Worm Analysis",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/308388/30/26180/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/308388/30/26180/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030125 Sapphire SQL Worm Analysis Complete",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/308418/30/26150/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/308418/30/26150/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030126 RE: MS SQL WORM IS DESTROYING INTERNET BLOCK PORT 1434!",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/308396/30/26150/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/308396/30/26150/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030126 Tool: Sapphire SQL Worm Scanner",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/308419/30/26150/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/308419/30/26150/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030128 RE: MS SQL WORM IS DESTROYING INTERNET BLOCK PORT 1434!",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/308760/30/26120/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/308760/30/26120/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030128 Re: MSDE contained in...",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/308806/30/26120/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/308806/30/26120/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030129 Re: MSDE contained in...",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/309096/30/26120/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/309096/30/26120/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030130 RE: MSDE contained in...",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/309324/30/26120/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/309324/30/26120/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030201 The Spread of the Sapphire/Slammer SQL Worm",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/309776/30/26090/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/309776/30/26090/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20020725 Microsoft SQL Server 2000 Unauthenticated System Compromise (#NISR25072002)",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20030317 McAfee ePolicy Orchestrator Format String Vulnerability (a031703-1)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/315230/30/25490/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/315230/30/25490/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "7111",
|
||||
|
@ -65,7 +65,7 @@
|
||||
{
|
||||
"name" : "CSSA-2003.003.0",
|
||||
"refsource" : "CALDERA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/307045/30/26300/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/307045/30/26300/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "CLA-2002:552",
|
||||
|
@ -65,22 +65,22 @@
|
||||
{
|
||||
"name" : "FLSA:157459-1",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/428028/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/428028/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "FLSA:157459-2",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/428058/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/428058/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "FLSA:157459-3",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/427980/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/427980/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "FLSA:157459-4",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/427981/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/427981/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2006:0101",
|
||||
|
@ -80,7 +80,7 @@
|
||||
{
|
||||
"name" : "20051220 Re: Unauthenticated EIGRP DoS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/419898/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/419898/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.cisco.com/warp/public/707/eigrp_issue.pdf",
|
||||
|
@ -90,12 +90,12 @@
|
||||
{
|
||||
"name" : "HPSBUX02117",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/434523/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/434523/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT2400",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/434523/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/434523/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "ADV-2006-1923",
|
||||
|
@ -65,12 +65,12 @@
|
||||
{
|
||||
"name" : "20030106 Etherleak: Ethernet frame padding information leakage (A010603-1)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/305335/30/26420/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/305335/30/26420/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030117 Re: More information regarding Etherleak",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/307564/30/26270/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/307564/30/26270/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030110 More information regarding Etherleak",
|
||||
|
@ -60,17 +60,17 @@
|
||||
{
|
||||
"name" : "20030331 GLSA: dietlibc (200303-29)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316931/30/25250/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316931/30/25250/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030331 GLSA: krb5 & mit-krb5 (200303-28)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316960/30/25250/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316960/30/25250/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030319 RE: EEYE: XDR Integer Overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/315638/30/25430/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/315638/30/25430/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030319 EEYE: XDR Integer Overflow",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030121 iDEFENSE Security Advisory 01.21.03: Buffer Overflows in Mandrake Linux printer-drivers Package",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/307608/30/26270/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/307608/30/26270/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.idefense.com/advisory/01.21.03.txt",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030121 iDEFENSE Security Advisory 01.21.03: Buffer Overflows in Mandrake Linux printer-drivers Package",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/307608/30/26270/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/307608/30/26270/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.idefense.com/advisory/01.21.03.txt",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030331 GLSA: krb5 & mit-krb5 (200303-28)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316960/30/25250/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316960/30/25250/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-005-buf.txt",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030331 GLSA: krb5 & mit-krb5 (200303-28)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316960/30/25250/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316960/30/25250/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-005-buf.txt",
|
||||
|
@ -60,17 +60,17 @@
|
||||
{
|
||||
"name" : "20030325 Fwd: APPLE-SA-2003-03-24 Samba, OpenSSL",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316165/30/25370/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316165/30/25370/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030401 Immunix Secured OS 7+ samba update",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/317145/30/25220/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/317145/30/25220/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2003-03-24",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316165/30/25370/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316165/30/25370/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-262",
|
||||
@ -85,7 +85,7 @@
|
||||
{
|
||||
"name" : "IMNX-2003-7+-003-01",
|
||||
"refsource" : "IMMUNIX",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/317145/30/25220/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/317145/30/25220/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2003:032",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20030325 Fwd: APPLE-SA-2003-03-24 Samba, OpenSSL",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316165/30/25370/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316165/30/25370/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "APPLE-SA-2003-03-24",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316165/30/25370/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316165/30/25370/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-262",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030331 NSFOCUS SA2003-02: Solaris lpq Stack Buffer Overflow Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316957/30/25250/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316957/30/25250/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030331 NSFOCUS SA2003-02: Solaris lpq Stack Buffer Overflow Vulnerability",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030331 NSFOCUS SA2003-03: Solaris dtsession Heap Buffer Overflow Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316948/30/25250/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316948/30/25250/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030331 NSFOCUS SA2003-03: Solaris dtsession Heap Buffer Overflow Vulnerability",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030327 Immunix Secured OS 7+ openssl update",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316577/30/25310/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316577/30/25310/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://eprint.iacr.org/2003/052/",
|
||||
@ -90,7 +90,7 @@
|
||||
{
|
||||
"name" : "IMNX-2003-7+-001-01",
|
||||
"refsource" : "IMMUNIX",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316577/30/25310/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316577/30/25310/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "OpenPKG-SA-2003.026",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20030331 GLSA: krb5 & mit-krb5 (200303-28)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316960/30/25250/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316960/30/25250/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-004-krb4.txt",
|
||||
|
@ -60,12 +60,12 @@
|
||||
{
|
||||
"name" : "20030330 GLSA: openafs (200303-26)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/317130/30/25250/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/317130/30/25250/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030331 GLSA: krb5 & mit-krb5 (200303-28)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316960/30/25250/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316960/30/25250/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://web.mit.edu/kerberos/www/advisories/MITKRB5-SA-2003-004-krb4.txt",
|
||||
|
@ -60,12 +60,12 @@
|
||||
{
|
||||
"name" : "20030325 Fwd: APPLE-SA-2003-03-24 Samba, OpenSSL",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316165/30/25370/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316165/30/25370/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030327 Immunix Secured OS 7+ openssl update",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316577/30/25310/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316577/30/25310/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030313 OpenSSL Private Key Disclosure",
|
||||
@ -90,7 +90,7 @@
|
||||
{
|
||||
"name" : "APPLE-SA-2003-03-24",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316165/30/25370/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316165/30/25370/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "CSSA-2003-014.0",
|
||||
@ -125,7 +125,7 @@
|
||||
{
|
||||
"name" : "IMNX-2003-7+-001-01",
|
||||
"refsource" : "IMMUNIX",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316577/30/25310/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316577/30/25310/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2003:035",
|
||||
|
@ -65,12 +65,12 @@
|
||||
{
|
||||
"name" : "20030331 GLSA: sendmail (200303-27)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316961/30/25250/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316961/30/25250/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030401 Immunix Secured OS 7+ openssl update",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/317135/30/25220/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030329 Sendmail: -1 gone wild",
|
||||
@ -90,7 +90,7 @@
|
||||
{
|
||||
"name" : "IMNX-2003-7+-002-01",
|
||||
"refsource" : "IMMUNIX",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/317135/30/25220/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "52620",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20030401 Fwd: QuickTime 6.1 for Windows is available",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/317141/30/25220/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/317141/30/25220/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030401 iDEFENSE Security Advisory 03.31.03: Buffer Overflow in Windows QuickTime Player",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/317148/30/25220/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/317148/30/25220/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030331 iDEFENSE Security Advisory 03.31.03: Buffer Overflow in Windows QuickTime Player",
|
||||
@ -80,7 +80,7 @@
|
||||
{
|
||||
"name" : "APPLE-SA-2003-03-31",
|
||||
"refsource" : "APPLE",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/317141/30/25220/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/317141/30/25220/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "VU#112553",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "HPSBTU02132",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/440454/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/440454/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061154",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/440454/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/440454/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2003:173",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "FLSA:184074",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/430302/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/430302/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2005:015",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20040101 Re: Gallery v1.3.3 Cross Site Scripting Vulnerabillity",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/348641/30/21790/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/348641/30/21790/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://gallery.menalto.com/modules.php?op=modload&name=News&file=article&sid=82&mode=thread&order=0&thold=0",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20040119 [ESA-20040119-002] 'tcpdump' multiple vulnerabilities.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/350238/30/21640/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/350238/30/21640/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[fedora-announce-list] 20040311 Re: [SECURITY] Fedora Core 1 Update: tcpdump-3.7.2-8.fc1.1",
|
||||
|
@ -65,7 +65,7 @@
|
||||
{
|
||||
"name" : "20040119 [ESA-20040119-002] 'tcpdump' multiple vulnerabilities.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/350238/30/21640/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/350238/30/21640/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[tcpdump-workers] 20031224 Seg fault of tcpdump (v 3.8.1 and below) with malformed l2tp packets",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20061112 Old SAP exploits",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/451378/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/451378/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030304 SAP R/3, account locking and RFC SDK",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20061008 Advanced Poll v2.02 :) <= Remote File Inclusion",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/448007/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/448007/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "Advanced Poll v2.02 :) <= Remote File Inclusion",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20060721 SolpotCrew Advisory #2 - Advanced Poll ver 2.02 (base_path) Remote File Inclusion",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/440780/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/440780/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.phpsecure.info/v2/tutos/frog/AdvancedPoll2.0.2.txt",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20030106 PDS: Integer overflow in FreeBSD kernel",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/305308/30/26420/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/305308/30/26420/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030106 PDS: Integer overflow in FreeBSD kernel",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20060521 Generic Browser Crash with Java 1.4.2_11, Java 1.5.0_06",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/434705/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/434705/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=4396719",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20060622 productcart soltan_defacer",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/438189/100/200/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/438189/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030705 [Vulnerability] : ProductCart database file can be downloaded remotely",
|
||||
|
@ -60,12 +60,12 @@
|
||||
{
|
||||
"name" : "20061019 PHP \"exec\", \"system\", \"popen\" problem",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/449234/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/449234/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061020 Re: PHP \"exec\", \"system\", \"popen\" (+small POC)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/449298/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/449298/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugs.php.net/38915",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20070927 Re: [waraxe-2007-SA#056] - Another Sql Injection in NukeSentinel 2.5.11",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/480866/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/480866/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "3185",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030224 GOnicus System Administrator php injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/313282/30/25760/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/313282/30/25760/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030223 GOnicus System Administrator php injection",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20030201 Re: silc question - insecure memory",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/309941/30/26090/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/309941/30/26090/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "6743",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20040119 Networker 6.0 - possible symlink attack",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/350237/30/21640/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/350237/30/21640/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "9446",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20030117 phpBB SQL Injection vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/307212/30/26300/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/307212/30/26300/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "6634",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030203 phpMyShop (php)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/309921/30/26090/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/309921/30/26090/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "6746",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030113 phpPass (PHP)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/307224/30/26300/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/307224/30/26300/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "6594",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030329 Justice Guestbook 1.3 vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316745/30/25280/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316745/30/25280/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "7233",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030329 Justice Guestbook 1.3 vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316745/30/25280/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316745/30/25280/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "7234",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030319 WF-Chat",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/315583/30/25430/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/315583/30/25430/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "7147",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030321 Guestbook tr3.a",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/315895/30/25400/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/315895/30/25400/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "7167",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030325 PHPNuke viewpage.php allows Remote File retrieving",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316179/30/25340/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316179/30/25340/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030325 Re: PHPNuke viewpage.php allows Remote File retrieving",
|
||||
@ -75,7 +75,7 @@
|
||||
{
|
||||
"name" : "20030325 Re: PHPNuke viewpage.php and another SQL injections",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316209/30/25340/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316209/30/25340/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030326 Re: PHPNuke viewpage.php allows Remote File retrieving",
|
||||
@ -85,7 +85,7 @@
|
||||
{
|
||||
"name" : "20030327 Re: PHPNuke viewpage.php allows Remote File retrieving",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316585/30/25310/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316585/30/25310/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "7191",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20030331 PHP-Nuke block-Forums.php subject vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316925/30/25250/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316925/30/25250/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030401 Re: PHP-Nuke block-Forums.php subject vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/317230/30/25220/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/317230/30/25220/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "7248",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030317 [SCSA-010] Path Disclosure & Cross Site Scripting Vulnerability in MyABraCaDaWeb",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/315317/30/25460/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/315317/30/25460/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "7126",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030317 [SCSA-010] Path Disclosure & Cross Site Scripting Vulnerability in MyABraCaDaWeb",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/315317/30/25460/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/315317/30/25460/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.security-corporation.com/download/patch/MyABraCaDaWebv1.0.2XSSpatch.zip",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20030304 uploader.php script",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/313819/30/25640/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/313819/30/25640/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20030304 uploader.php vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/313787/30/25670/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/313787/30/25670/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "uploader-uploads-file-upload(11467)",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030318 SIPS (PHP)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/315504/30/25460/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/315504/30/25460/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "7134",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030329 ScozBook BETA 1.1 vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316747/30/25280/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316747/30/25280/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "7235",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030329 ScozBook BETA 1.1 vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316747/30/25280/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316747/30/25280/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "7236",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030329 CGI-City's CCGuestBook Script Injection Vulns",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/316764/30/25250/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/316764/30/25250/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "7237",
|
||||
|
@ -60,12 +60,12 @@
|
||||
{
|
||||
"name" : "20030204 Re: GLSA: Mail-SpamAssasin",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/310212/30/26030/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/310212/30/26030/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200302-01",
|
||||
"refsource" : "GENTOO",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/309912/30/26090/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/309912/30/26090/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "6679",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20030117 GLSA: fnord",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/307400/30/26270/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/307400/30/26270/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.fefe.de/fnord/",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20040119 [ESA-20040119-002] 'tcpdump' multiple vulnerabilities.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/350238/30/21640/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/350238/30/21640/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[tcpdump-workers] multiple vulnerabilities in tcpdump 3.8.1",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20070827 PhpGedView login page multiple XSS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/477881/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/477881/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "11868",
|
||||
|
@ -80,12 +80,12 @@
|
||||
{
|
||||
"name" : "HPSBST02161",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/449179/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/449179/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061264",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/449179/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/449179/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MS05-019",
|
||||
|
@ -60,12 +60,12 @@
|
||||
{
|
||||
"name" : "20080228 Loginwindow.app and Mac OS X",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/488930/100/100/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/488930/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080229 Re: Loginwindow.app and Mac OS X",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/488948/100/100/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/488948/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://citp.princeton.edu/pub/coldboot.pdf",
|
||||
|
@ -100,12 +100,12 @@
|
||||
{
|
||||
"name" : "HPSBUX02119",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/434715/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/434715/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT4848",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/434715/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/434715/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2004:098",
|
||||
|
@ -100,12 +100,12 @@
|
||||
{
|
||||
"name" : "HPSBUX02119",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/434715/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/434715/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT4848",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/434715/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/434715/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2004:098",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "FLSA:152787",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/419762/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/419762/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2004:434",
|
||||
|
@ -70,7 +70,7 @@
|
||||
{
|
||||
"name" : "FLSA-2005:155510",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/419771/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/419771/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2004:095",
|
||||
|
@ -65,7 +65,7 @@
|
||||
{
|
||||
"name" : "20051204 have you ever been BluePIMped?",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/418633/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/418633/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.pentest.co.uk/documents/ptl-2004-03.html",
|
||||
|
@ -80,7 +80,7 @@
|
||||
{
|
||||
"name" : "FLSA-2005:155510",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/419771/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/419771/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2004:095",
|
||||
|
@ -75,7 +75,7 @@
|
||||
{
|
||||
"name" : "FLSA-2005:155510",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/419771/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/419771/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2004:095",
|
||||
|
@ -70,7 +70,7 @@
|
||||
{
|
||||
"name" : "FLSA-2005:155510",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/419771/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/419771/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2004:095",
|
||||
|
@ -80,22 +80,22 @@
|
||||
{
|
||||
"name" : "HPSBUX01164",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/418882/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/418882/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT4884",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/418882/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/418882/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBST02161",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/449179/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/449179/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT061264",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/449179/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/449179/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MS05-019",
|
||||
|
@ -70,12 +70,12 @@
|
||||
{
|
||||
"name" : "FLSA:157459-1",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/428028/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/428028/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "FLSA:157459-2",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/428058/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/428058/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "HPSBTU01210",
|
||||
@ -95,7 +95,7 @@
|
||||
{
|
||||
"name" : "HPSBUX01164",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/418882/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/418882/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2005:016",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "FLSA-2006:138098",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/426072/30/6740/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/426072/30/6740/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200412-08",
|
||||
|
@ -65,7 +65,7 @@
|
||||
{
|
||||
"name" : "FLSA-2006:138098",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/426072/30/6740/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/426072/30/6740/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2004:583",
|
||||
|
@ -60,62 +60,62 @@
|
||||
{
|
||||
"name" : "20080305 Firewire Attack on Windows Vista",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/489163/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/489163/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080305 RE: Firewire Attack on Windows Vista",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/489189/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/489189/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080305 Re: Firewire Attack on Windows Vista",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/489175/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/489175/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080309 Re: [Full-disclosure] Firewire Attack on Windows Vista",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/489322/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/489322/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080309 Re: Firewire Attack on Windows Vista",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/489335/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/489335/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080310 RE: [Full-disclosure] Firewire Attack on Windows Vista",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/489330/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/489330/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080310 Re: [Full-disclosure] Firewire Attack on Windows Vista",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/489342/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/489342/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080306 RE: Firewire Attack on Windows Vista",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/489257/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/489257/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080306 Re: Firewire Attack on Windows Vista",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/489212/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/489212/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080307 Re: Firewire Attack on Windows Vista",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/489269/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/489269/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080308 RE: [Full-disclosure] Firewire Attack on Windows Vista",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/489296/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/489296/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080308 Re: [Full-disclosure] Firewire Attack on Windows Vista",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/489295/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/489295/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://pacsec.jp/advisories.html",
|
||||
|
@ -85,7 +85,7 @@
|
||||
{
|
||||
"name" : "HPSBUX01164",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/418882/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/418882/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MS05-019",
|
||||
|
@ -65,7 +65,7 @@
|
||||
{
|
||||
"name" : "FLSA:152904",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/433927/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/433927/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200412-09",
|
||||
|
@ -65,17 +65,17 @@
|
||||
{
|
||||
"name" : "20051223 dtSearch DUNZIP32.dll Buffer Overflow Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/420274/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/420274/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060330 McAfee VirusScan DUNZIP32.dll Buffer Overflow Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/429361/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/429361/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060906 IBM Lotus Notes DUNZIP32.dll Buffer Overflow Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/445369/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/445369/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.networksecurity.fi/advisories/payroll.html",
|
||||
|
@ -60,12 +60,12 @@
|
||||
{
|
||||
"name" : "20060218 Re: Internet Explorer Phishing mouseover issue",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/425386/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/425386/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060223 Re: Internet Explorer Phishing mouseover issue",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/425883/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/425883/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "VU#702086",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20061025 IE7 status: 8 days after release, 3 unfixed issues",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/449917/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/449917/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://secunia.com/secunia_research/2004-13/advisory/",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20080313 Rapid7 Advisory R7-0032: Microsoft Internet Explorer FTP Command Injection Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/489500/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/489500/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.rapid7.com/advisories/R7-0032.jsp",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "FLSA:152870",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/419765/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/419765/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MDKSA-2004:140",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20060526 rPSA-2006-0083-1 enscript",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/435199/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/435199/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3549",
|
||||
@ -75,7 +75,7 @@
|
||||
{
|
||||
"name" : "FLSA:152892",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/419768/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/419768/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200502-03",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20060526 rPSA-2006-0083-1 enscript",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/435199/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/435199/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3549",
|
||||
@ -75,7 +75,7 @@
|
||||
{
|
||||
"name" : "FLSA:152892",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/419768/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/419768/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200502-03",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20060526 rPSA-2006-0083-1 enscript",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/435199/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/435199/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://support.apple.com/kb/HT3549",
|
||||
@ -75,7 +75,7 @@
|
||||
{
|
||||
"name" : "FLSA:152892",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/419768/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/419768/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "GLSA-200502-03",
|
||||
|
@ -60,12 +60,12 @@
|
||||
{
|
||||
"name" : "20070330 AIX 4.3 lsmcode local root command execution",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/464276/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/464276/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070402 Re: AIX 4.3 lsmcode local root command execution",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/464481/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/464481/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "701",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20061219 Oracle <= 9i / 10g (extproc) Local/Remote Command Execution Exploit",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/454861/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/454861/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.ngssoftware.com/advisories/oracle23122004B.txt",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20061021 Virtual Law Office (phpc_root_path) Remote File Include Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/449397/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/449397/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.gulftech.org/?node=research&article_id=00060-12292004",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20060602 Re: [SECURITY] [DSA 1085-1] New lynx-cur packages fix several vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/435689/30/4740/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/435689/30/4740/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20041018 Web browsers - a mini-farce",
|
||||
|
@ -60,22 +60,22 @@
|
||||
{
|
||||
"name" : "20061118 A-Cart 2.0 SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/452005/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/452005/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061114 A-Cart pro[ injection sql (post&get)]",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/451594/100/100/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/451594/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061118 A-Cart PRO SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/452006/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/452006/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061118 Re: A-Cart PRO SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/452023/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/452023/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.aria-security.com/forum/showthread.php?t=31",
|
||||
|
@ -60,12 +60,12 @@
|
||||
{
|
||||
"name" : "20060620 display.cgi",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/437813/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/437813/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20060621 Re: display.cgi",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/437978/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/437978/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "10040",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20080221 PHP-Nuke Module Downloads SQL Injection(sid)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/488452/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/488452/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.waraxe.us/index.php?modname=sa&id=27",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20060517 Re: Zen Cart login.php SQL Injection Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/434237/30/4950/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/434237/30/4950/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zen-cart.com/modules/ipb/index.php?showtopic=4835",
|
||||
|
@ -55,17 +55,17 @@
|
||||
{
|
||||
"name" : "20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/451404/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/451404/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/451417/100/200/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/451417/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/451426/100/200/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/451426/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[openssh-unix-dev] 20040127 OpenSSH - Connection problem when LoginGraceTime exceeds time",
|
||||
@ -110,7 +110,7 @@
|
||||
{
|
||||
"name" : "FLSA-2006:168935",
|
||||
"refsource" : "FEDORA",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/425397/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/425397/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "RHSA-2005:550",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20040128 Re: Oracle toplink mapping workbench password algorithm",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/352315/30/21430/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/352315/30/21430/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20040128 Re: Oracle toplink mapping workbench password algorithm",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20060424 Multiple vulnerabilities in IP3 Networks 'NetAccess' NA75 appliance",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/432007/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/432007/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "ip3-na75-password-field-sql-injection(26106)",
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user