- Synchronized data.

This commit is contained in:
CVE Team 2018-10-16 11:17:01 -04:00
parent 064b7217f2
commit 919e35d2f6
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
1486 changed files with 2159 additions and 2040 deletions

View File

@ -55,7 +55,7 @@
{
"name" : "20070104 23C3 - Bluetooth hacking revisted [Summary and Code]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/455889/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/455889/100/0/threaded"
},
{
"name" : "http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf",

View File

@ -55,7 +55,7 @@
{
"name" : "20070104 23C3 - Bluetooth hacking revisted [Summary and Code]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/455889/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/455889/100/0/threaded"
},
{
"name" : "http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf",

View File

@ -55,7 +55,7 @@
{
"name" : "20070104 23C3 - Bluetooth hacking revisted [Summary and Code]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/455889/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/455889/100/0/threaded"
},
{
"name" : "http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf",

View File

@ -55,7 +55,7 @@
{
"name" : "20070104 23C3 - Bluetooth hacking revisted [Summary and Code]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/455889/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/455889/100/0/threaded"
},
{
"name" : "http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf",

View File

@ -55,7 +55,7 @@
{
"name" : "20070104 23C3 - Bluetooth hacking revisted [Summary and Code]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/455889/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/455889/100/0/threaded"
},
{
"name" : "http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf",

View File

@ -55,7 +55,7 @@
{
"name" : "20070104 23C3 - Bluetooth hacking revisted [Summary and Code]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/455889/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/455889/100/0/threaded"
},
{
"name" : "http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf",

View File

@ -55,7 +55,7 @@
{
"name" : "20070104 23C3 - Bluetooth hacking revisted [Summary and Code]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/455889/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/455889/100/0/threaded"
},
{
"name" : "http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf",

View File

@ -55,7 +55,7 @@
{
"name" : "20070104 23C3 - Bluetooth hacking revisted [Summary and Code]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/455889/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/455889/100/0/threaded"
},
{
"name" : "http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf",

View File

@ -55,7 +55,7 @@
{
"name" : "20070104 23C3 - Bluetooth hacking revisted [Summary and Code]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/455889/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/455889/100/0/threaded"
},
{
"name" : "http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf",

View File

@ -55,7 +55,7 @@
{
"name" : "20070104 23C3 - Bluetooth hacking revisted [Summary and Code]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/455889/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/455889/100/0/threaded"
},
{
"name" : "http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf",

View File

@ -55,7 +55,7 @@
{
"name" : "20070104 23C3 - Bluetooth hacking revisted [Summary and Code]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/455889/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/455889/100/0/threaded"
},
{
"name" : "http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf",

View File

@ -75,7 +75,7 @@
{
"name" : "20070109 CA BrightStor ARCserve Backup Tape Engine Exploit Security Notice",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/456428/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/456428/100/0/threaded"
},
{
"name" : "20070111 [CAID 34955, 34956, 34957, 34958, 34959, 34817]: CA BrightStor ARCserve Backup Multiple Overflow Vulnerabilities",

View File

@ -55,7 +55,7 @@
{
"name" : "20061118 Sage cross-context scripting -> LOCAL-CONTEXT SCRIPTING",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/452010/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/452010/100/0/threaded"
},
{
"name" : "http://michaeldaw.org/md-hacks/rss-injection-in-sage-part-2/",

View File

@ -55,7 +55,7 @@
{
"name" : "20061120 Rialto 1.6[admin login bypass & multiples injections sql]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/452112/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/452112/100/0/threaded"
},
{
"name" : "21191",

View File

@ -55,7 +55,7 @@
{
"name" : "20061120 Rialto 1.6[admin login bypass & multiples injections sql]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/452112/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/452112/100/0/threaded"
},
{
"name" : "21191",

View File

@ -55,7 +55,7 @@
{
"name" : "20061119 Rapid Classified v3.1 [multiple xss (get) & injection sql]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/452088/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/452088/100/0/threaded"
},
{
"name" : "http://s-a-p.ca/index.php?page=OurAdvisories&id=44",

View File

@ -55,7 +55,7 @@
{
"name" : "20061119 Rapid Classified v3.1 [multiple xss (get) & injection sql]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/452088/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/452088/100/0/threaded"
},
{
"name" : "http://s-a-p.ca/index.php?page=OurAdvisories&id=44",

View File

@ -55,7 +55,7 @@
{
"name" : "20061116 Image gallery with Access Database SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/451875/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/451875/100/0/threaded"
},
{
"name" : "21131",

View File

@ -55,7 +55,7 @@
{
"name" : "20061108 Portix-PHP [login bypass & xss (post)]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/450935/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/450935/100/0/threaded"
},
{
"name" : "http://s-a-p.ca/index.php?page=OurAdvisories&id=8",

View File

@ -55,7 +55,7 @@
{
"name" : "20061108 Portix-PHP [login bypass & xss (post)]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/450935/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/450935/100/0/threaded"
},
{
"name" : "http://s-a-p.ca/index.php?page=OurAdvisories&id=8",

View File

@ -55,7 +55,7 @@
{
"name" : "20061116 Xtreme ASP Photo Gallery Cross Site Scripting And SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/451786/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/451786/100/0/threaded"
},
{
"name" : "21138",

View File

@ -55,7 +55,7 @@
{
"name" : "20061116 Xtreme ASP Photo Gallery Cross Site Scripting And SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/451786/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/451786/100/0/threaded"
},
{
"name" : "http://aria-security.net/advisory/xtremeg.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20070204 Sql injection bugs in Virtuemart and Letterman",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/459195/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/459195/100/0/threaded"
},
{
"name" : "20070118 The vulnerabilities festival !",

View File

@ -55,7 +55,7 @@
{
"name" : "20061116 [Reversemode advisory] Computer Associates HIPS Drivers - multiple local privilege escalation vulnerabilities.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/451952/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/451952/100/0/threaded"
},
{
"name" : "20061121 RE: [Reversemode advisory] Computer Associates HIPS Drivers - multiple local privilege escalation vulnerabilities.",
@ -65,7 +65,7 @@
{
"name" : "20070124 [CAID 34818]: CA Personal Firewall Multiple Privilege Escalation Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/458040/100/200/threaded"
"url" : "http://www.securityfocus.com/archive/1/458040/100/200/threaded"
},
{
"name" : "http://www.reversemode.com/index.php?option=com_remository&Itemid=2&func=fileinfo&id=38",

View File

@ -55,7 +55,7 @@
{
"name" : "20060623 GlobeTrotter Mobility Manager - security issue",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/438376/100/100/threaded"
"url" : "http://www.securityfocus.com/archive/1/438376/100/100/threaded"
},
{
"name" : "http://img45.imageshack.us/my.php?image=poc7ik.jpg",

View File

@ -55,12 +55,12 @@
{
"name" : "20060623 Re: flock d0s exploit remote. beta 1 (v0.7)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/438365/100/100/threaded"
"url" : "http://www.securityfocus.com/archive/1/438365/100/100/threaded"
},
{
"name" : "20060623 flock d0s exploit remote. beta 1 (v0.7)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/438144/100/100/threaded"
"url" : "http://www.securityfocus.com/archive/1/438144/100/100/threaded"
},
{
"name" : "20060704 [Bugtraq] Re: flock d0s exploit remote. beta 1 (v0.7)",

View File

@ -55,7 +55,7 @@
{
"name" : "20060622 phpBlueDragon CMS 2.9.1 multiple remote file inclusion vuln",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/438238/100/100/threaded"
"url" : "http://www.securityfocus.com/archive/1/438238/100/100/threaded"
},
{
"name" : "http://packetstormsecurity.org/0606-exploits/phpbluedragon-2.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20060620 Multiple Bypass and Integrity Lost Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/437814/100/200/threaded"
"url" : "http://www.securityfocus.com/archive/1/437814/100/200/threaded"
},
{
"name" : "http://www.sentinel.gr/advisories/SGA-0001.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20060620 Multiple Bypass and Integrity Lost Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/437814/100/200/threaded"
"url" : "http://www.securityfocus.com/archive/1/437814/100/200/threaded"
},
{
"name" : "http://www.sentinel.gr/advisories/SGA-0001.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20060620 Multiple Bypass and Integrity Lost Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/437814/100/200/threaded"
"url" : "http://www.securityfocus.com/archive/1/437814/100/200/threaded"
},
{
"name" : "http://www.sentinel.gr/advisories/SGA-0001.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20070205 Jetty Session ID Prediction",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/459164/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/459164/100/0/threaded"
},
{
"name" : "20070206 Re: Jetty Session ID Prediction",

View File

@ -55,7 +55,7 @@
{
"name" : "20070206 Firefox 2.0.0.1 and Opera 9.10 Anty Fraud/Phishing Protection bypass.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/459265/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/459265/100/0/threaded"
},
{
"name" : "http://kaneda.bohater.net/security/20061220-opera_9.10_final_bypass_fraud_protection.php",

View File

@ -55,7 +55,7 @@
{
"name" : "20060514 XSS in FreeTextBox and FCKEditor Basic Toolbar Selection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/434006/30/4980/threaded"
"url" : "http://www.securityfocus.com/archive/1/434006/30/4980/threaded"
},
{
"name" : "http://www.newffr.com/viewtopic.php?forum=26&topic=11683",

View File

@ -55,7 +55,7 @@
{
"name" : "20060514 XSS in FreeTextBox and FCKEditor Basic Toolbar Selection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/434006/30/4980/threaded"
"url" : "http://www.securityfocus.com/archive/1/434006/30/4980/threaded"
},
{
"name" : "http://www.newffr.com/viewtopic.php?forum=26&topic=11683",

View File

@ -55,7 +55,7 @@
{
"name" : "20060617 V3Chat Instant Messenger - XSS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/437755/100/200/threaded"
"url" : "http://www.securityfocus.com/archive/1/437755/100/200/threaded"
},
{
"name" : "18543",

View File

@ -55,7 +55,7 @@
{
"name" : "20060616 Develooping Flash Chat (banned_file) Remote File Inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/437411/30/4320/threaded"
"url" : "http://www.securityfocus.com/archive/1/437411/30/4320/threaded"
},
{
"name" : "20070214 false: old Develooping Flash Chat RFI",

View File

@ -55,7 +55,7 @@
{
"name" : "20060603 [ECHO_ADV_32$2006] SCart 2.0 Remote Code Execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/435861/30/4710/threaded"
"url" : "http://www.securityfocus.com/archive/1/435861/30/4710/threaded"
},
{
"name" : "1876",

View File

@ -55,7 +55,7 @@
{
"name" : "20060601 SMF 1.0.7 and lower plus 1.1rc2 and lower - IP spoofing vulnerability/IP ban evasion vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/435686/30/4740/threaded"
"url" : "http://www.securityfocus.com/archive/1/435686/30/4740/threaded"
},
{
"name" : "2256",

View File

@ -55,7 +55,7 @@
{
"name" : "20060606 BloggIT <= 1.01 (admin.php) Arbitrary code execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/436259/30/4620/threaded"
"url" : "http://www.securityfocus.com/archive/1/436259/30/4620/threaded"
},
{
"name" : "ADV-2006-2210",

View File

@ -55,7 +55,7 @@
{
"name" : "20060613 Jobline 1 1 1 Version - Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/436990/30/4440/threaded"
"url" : "http://www.securityfocus.com/archive/1/436990/30/4440/threaded"
},
{
"name" : "20070214 false: old Jobline RFI",

View File

@ -55,7 +55,7 @@
{
"name" : "20060525 phpjobboard Authecnical admin byPass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/435119/30/4710/threaded"
"url" : "http://www.securityfocus.com/archive/1/435119/30/4710/threaded"
},
{
"name" : "20060617 phpjobboard Authecnical admin byPass (fwd)",

View File

@ -55,7 +55,7 @@
{
"name" : "20060610 fx-APP Version 0.0.8.1",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/436691/30/4500/threaded"
"url" : "http://www.securityfocus.com/archive/1/436691/30/4500/threaded"
},
{
"name" : "18361",

View File

@ -55,12 +55,12 @@
{
"name" : "20060610 fx-APP Version 0.0.8.1",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/436691/30/4500/threaded"
"url" : "http://www.securityfocus.com/archive/1/436691/30/4500/threaded"
},
{
"name" : "20070528 Re: fx-APP Version 0.0.8.1",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/469825/100/100/threaded"
"url" : "http://www.securityfocus.com/archive/1/469825/100/100/threaded"
},
{
"name" : "18361",

View File

@ -55,22 +55,22 @@
{
"name" : "20060504 ISA Server 2004 Log Manipulation",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/432947/30/5190/threaded"
"url" : "http://www.securityfocus.com/archive/1/432947/30/5190/threaded"
},
{
"name" : "20060505 Re: ISA Server 2004 Log Manipulation",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/433074/30/5190/threaded"
"url" : "http://www.securityfocus.com/archive/1/433074/30/5190/threaded"
},
{
"name" : "20060506 Re: ISA Server 2004 Log Manipulation",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/433141/30/5160/threaded"
"url" : "http://www.securityfocus.com/archive/1/433141/30/5160/threaded"
},
{
"name" : "20060509 Re: ISA Server 2004 Log Manipulation",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/433350/30/5100/threaded"
"url" : "http://www.securityfocus.com/archive/1/433350/30/5100/threaded"
},
{
"name" : "isa-log-manipulation(26233)",

View File

@ -55,7 +55,7 @@
{
"name" : "20060517 Sun single-CPU DOS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/434449/30/4890/threaded"
"url" : "http://www.securityfocus.com/archive/1/434449/30/4890/threaded"
},
{
"name" : "20060523 Re: Sun single-CPU DOS",
@ -65,7 +65,7 @@
{
"name" : "20060524 Re: Sun single-CPU DOS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/435107/30/4710/threaded"
"url" : "http://www.securityfocus.com/archive/1/435107/30/4710/threaded"
},
{
"name" : "20060524 Re: Sun single-CPU DOS",

View File

@ -55,27 +55,27 @@
{
"name" : "20060520 Microsoft Internet Explorer - Crash on mouse button click",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/434742/30/4830/threaded"
"url" : "http://www.securityfocus.com/archive/1/434742/30/4830/threaded"
},
{
"name" : "20060523 RE: Microsoft Internet Explorer - Crash on mouse button click",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/435004/30/4740/threaded"
"url" : "http://www.securityfocus.com/archive/1/435004/30/4740/threaded"
},
{
"name" : "20060523 Re: Microsoft Internet Explorer - Crash on mouse button click",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/434903/30/4800/threaded"
"url" : "http://www.securityfocus.com/archive/1/434903/30/4800/threaded"
},
{
"name" : "20060524 Re: Microsoft Internet Explorer - Crash on mouse button click",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/435147/30/4680/threaded"
"url" : "http://www.securityfocus.com/archive/1/435147/30/4680/threaded"
},
{
"name" : "20060525 Re: Microsoft Internet Explorer - Crash on mouse button click",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/435168/30/4680/threaded"
"url" : "http://www.securityfocus.com/archive/1/435168/30/4680/threaded"
},
{
"name" : "20060605 Re: [Full Disclosure] [Kil13r-SA-20060520] Microsoft Internet Explorer Crash Vulnerability",

View File

@ -55,12 +55,12 @@
{
"name" : "20060525 [BuHa-Security] DoS Vulnerability in MS IE 6 SP2",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/435095/30/4710/threaded"
"url" : "http://www.securityfocus.com/archive/1/435095/30/4710/threaded"
},
{
"name" : "20060526 Re: [BuHa-Security] DoS Vulnerability in MS IE 6 SP2",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/435129/30/4710/threaded"
"url" : "http://www.securityfocus.com/archive/1/435129/30/4710/threaded"
},
{
"name" : "18112",

View File

@ -55,7 +55,7 @@
{
"name" : "20060525 Super Link Exchange Script v1.0",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/435166/30/4680/threaded"
"url" : "http://www.securityfocus.com/archive/1/435166/30/4680/threaded"
},
{
"name" : "2285",

View File

@ -55,7 +55,7 @@
{
"name" : "20060525 Super Link Exchange Script v1.0",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/435166/30/4680/threaded"
"url" : "http://www.securityfocus.com/archive/1/435166/30/4680/threaded"
},
{
"name" : "2285",

View File

@ -55,7 +55,7 @@
{
"name" : "20060525 Super Link Exchange Script v1.0",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/435166/30/4680/threaded"
"url" : "http://www.securityfocus.com/archive/1/435166/30/4680/threaded"
},
{
"name" : "2285",

View File

@ -55,7 +55,7 @@
{
"name" : "20060615 Andys Chat 4.5 (action) Remote File Inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/437300/30/4350/threaded"
"url" : "http://www.securityfocus.com/archive/1/437300/30/4350/threaded"
},
{
"name" : "2284",

View File

@ -55,7 +55,7 @@
{
"name" : "20060608 Mathcad Area Lock Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/436441/30/4560/threaded"
"url" : "http://www.securityfocus.com/archive/1/436441/30/4560/threaded"
},
{
"name" : "2305",

View File

@ -55,7 +55,7 @@
{
"name" : "20060528 Xss exploit in Chipmunk directory",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/435381/30/4770/threaded"
"url" : "http://www.securityfocus.com/archive/1/435381/30/4770/threaded"
},
{
"name" : "18119",

View File

@ -55,12 +55,12 @@
{
"name" : "20060613 Re: Shoutpro 1.0 Version - Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/436997/30/4410/threaded"
"url" : "http://www.securityfocus.com/archive/1/436997/30/4410/threaded"
},
{
"name" : "20060613 Shoutpro 1.0 Version - Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/436975/30/4440/threaded"
"url" : "http://www.securityfocus.com/archive/1/436975/30/4440/threaded"
},
{
"name" : "2303",

View File

@ -55,7 +55,7 @@
{
"name" : "20060404 Linux Kernel Local DoS vulnerability.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/430278/30/5790/threaded"
"url" : "http://www.securityfocus.com/archive/1/430278/30/5790/threaded"
},
{
"name" : "1657",

View File

@ -55,7 +55,7 @@
{
"name" : "20060423 [MajorSecurity] TotalCalendar 2.30 - Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/431866/30/5370/threaded"
"url" : "http://www.securityfocus.com/archive/1/431866/30/5370/threaded"
},
{
"name" : "1753",

View File

@ -55,7 +55,7 @@
{
"name" : "20060605 [MajorSecurity #9]HostAdmin <= 3.1 - Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/435993/30/4650/threaded"
"url" : "http://www.securityfocus.com/archive/1/435993/30/4650/threaded"
},
{
"name" : "http://www.majorsecurity.de/advisory/major_rls9.txt",

View File

@ -55,12 +55,12 @@
{
"name" : "20060727 Oracle 10g R2 and, probably, all previous versions",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/441345/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/441345/100/0/threaded"
},
{
"name" : "20060728 Oracle 10g R2 and, probably, all previous versions",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/441477/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/441477/100/0/threaded"
},
{
"name" : "20060727 Oracle 10g R2 and, probably, all previous versions",

View File

@ -55,7 +55,7 @@
{
"name" : "20060725 Etomite CMS <= 0.6.1 'rfiles.php' remote command execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/441202/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/441202/100/0/threaded"
},
{
"name" : "2072",

View File

@ -55,7 +55,7 @@
{
"name" : "20060727 GeoClassifieds Enterprise <= 2.0.5.2 Cross Site Scripting",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/441294/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/441294/100/0/threaded"
},
{
"name" : "19196",

View File

@ -55,7 +55,7 @@
{
"name" : "20060725 Professional Home Page Tools Login Script Cross Site Scripting Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/441194/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/441194/100/0/threaded"
},
{
"name" : "20060725 Professional Home Page Tools Login Script Cross Site Scripting Vulnerabilities",

View File

@ -55,12 +55,12 @@
{
"name" : "20061114 Advisory 14/2006: Dotdeb PHP Email Header Injection Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/451528/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/451528/100/0/threaded"
},
{
"name" : "20061114 Re: Advisory 14/2006: Dotdeb PHP Email Header Injection Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/451839/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/451839/100/0/threaded"
},
{
"name" : "20061114 Advisory 14/2006: Dotdeb PHP Email Header Injection Vulnerability",

View File

@ -55,7 +55,7 @@
{
"name" : "20070220 /bin/ls with gid=0 in Debian linux-ftpd",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/460742/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/460742/100/0/threaded"
},
{
"name" : "http://bugs.debian.org/384454",

View File

@ -55,7 +55,7 @@
{
"name" : "20061012 Phpbb insert mod Remote file include",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448542/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448542/100/0/threaded"
},
{
"name" : "2525",

View File

@ -55,7 +55,7 @@
{
"name" : "20061027 MHL-2006-003 Public Advisory: \"ezOnlineGallery\" Multiple Security Issues",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/449889/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/449889/100/0/threaded"
},
{
"name" : "20061027 MHL-2006-003 Public Advisory: \"ezOnlineGallery\" Multiple Security Issues",

View File

@ -55,7 +55,7 @@
{
"name" : "20061110 PHPKit 1.6.1 RC2 (faq/faq.php) Remote SQL Injection Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/451304/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/451304/100/0/threaded"
},
{
"name" : "http://www.bb-pcsecurity.de/websecurity/532/org/PHPKit_1.6.1_RC2_(faq-faq.php)_Remote_SQL_Injection_Exploit.htm",

View File

@ -55,7 +55,7 @@
{
"name" : "20061114 Engine Manager SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/451535/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/451535/100/0/threaded"
},
{
"name" : "21064",

View File

@ -55,7 +55,7 @@
{
"name" : "20061015 maintain-3.0.0-RC2 - Remote File Include Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448780/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448780/100/0/threaded"
},
{
"name" : "20560",

View File

@ -55,7 +55,7 @@
{
"name" : "20060929 Secunia Research: Joomla BSQ Sitestats Component MultipleVulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/447356/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/447356/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-63/advisory/",

View File

@ -55,7 +55,7 @@
{
"name" : "20060929 Secunia Research: Joomla BSQ Sitestats Component MultipleVulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/447356/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/447356/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-63/advisory/",

View File

@ -55,7 +55,7 @@
{
"name" : "20060929 Secunia Research: Joomla BSQ Sitestats Component MultipleVulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/447356/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/447356/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-63/advisory/",

View File

@ -55,7 +55,7 @@
{
"name" : "20061018 Secunia Research: Joomla BSQ Sitestats Script Insertion and SQLInjection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/449125/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/449125/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-65/advisory/",

View File

@ -55,7 +55,7 @@
{
"name" : "20061018 Secunia Research: Joomla BSQ Sitestats Script Insertion and SQLInjection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/449125/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/449125/100/0/threaded"
},
{
"name" : "http://secunia.com/secunia_research/2006-65/advisory/",

View File

@ -55,7 +55,7 @@
{
"name" : "20061015 ISS BlackICE PC Protection Filelock protection bypass Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448763/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448763/100/0/threaded"
},
{
"name" : "20061015 ISS BlackICE PC Protection Filelock protection bypass Vulnerability",

View File

@ -55,7 +55,7 @@
{
"name" : "20061010 Jinzora <= 2.1 Remote File Inclusion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448290/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448290/100/0/threaded"
},
{
"name" : "2512",

View File

@ -55,7 +55,7 @@
{
"name" : "20061014 Jinzora 2.6 - Remote File Include Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448703/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448703/100/0/threaded"
},
{
"name" : "2558",

View File

@ -55,12 +55,12 @@
{
"name" : "20060805 Tinyportal Shoutbox",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/442308/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/442308/100/0/threaded"
},
{
"name" : "20070306 Re: Tinyportal Shoutbox",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/462018/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/462018/100/0/threaded"
},
{
"name" : "19357",

View File

@ -55,7 +55,7 @@
{
"name" : "20061023 SQL Injection Vulnerability in Oracle WWV_FLOW_UTILITIES",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/449498/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/449498/100/0/threaded"
},
{
"name" : "20061023 SQL Injection Vulnerability in Oracle WWV_FLOW_UTILITIES",

View File

@ -55,12 +55,12 @@
{
"name" : "20061014 Kmail <= 1.9.1 (table/frameset) DOS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448768/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448768/100/0/threaded"
},
{
"name" : "20061015 Re: [Full-disclosure] Kmail <= 1.9.1 (table/frameset) DOS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448766/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448766/100/0/threaded"
},
{
"name" : "20061014 Kmail <= 1.9.1 (table/frameset) DOS",

View File

@ -55,17 +55,17 @@
{
"name" : "20061219 Oracle <= 9i / 10g File System Access via utl_file Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/454862/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/454862/100/0/threaded"
},
{
"name" : "20061220 Re: Oracle <= 9i / 10g File System Access via utl_file Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/454964/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/454964/100/0/threaded"
},
{
"name" : "20061221 Re: Oracle <= 9i / 10g File System Access via utl_file Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/455047/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/455047/100/0/threaded"
},
{
"name" : "http://www.0xdeadbeef.info/exploits/raptor_orafile.sql",

View File

@ -55,12 +55,12 @@
{
"name" : "20061013 Utimaco Safeguard Easy vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448598/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448598/100/0/threaded"
},
{
"name" : "20061018 Re: Utimaco Safeguard Easy vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/449120/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/449120/100/0/threaded"
},
{
"name" : "http://www.utimaco.fi/servlets/ActionDispatcher?action:ws3_content_get_binary=true&scope=domain&domain_id=www.utimaco.fi&page_id=/templates/ajankohtaisteksti.jsp?ws3_page_id=tiedoteartikkeli_103&form_id=&component_id=linkin_dokumentti_104",

View File

@ -55,7 +55,7 @@
{
"name" : "20061012 MHL-2006-002 Public Advisory: \"Call-Center-Software\" Multiple Security Issues",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448423/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448423/100/0/threaded"
},
{
"name" : "20061011 MHL-2006-002 Public Advisory: \"Call-Center-Software\" Multiple Security Issues",

View File

@ -55,7 +55,7 @@
{
"name" : "20061012 MHL-2006-002 Public Advisory: \"Call-Center-Software\" Multiple Security Issues",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448423/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448423/100/0/threaded"
},
{
"name" : "20061011 MHL-2006-002 Public Advisory: \"Call-Center-Software\" Multiple Security Issues",

View File

@ -55,7 +55,7 @@
{
"name" : "20061012 MHL-2006-002 Public Advisory: \"Call-Center-Software\" Multiple Security Issues",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448423/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448423/100/0/threaded"
},
{
"name" : "20061011 MHL-2006-002 Public Advisory: \"Call-Center-Software\" Multiple Security Issues",

View File

@ -55,7 +55,7 @@
{
"name" : "20061011 CommunityPortals <= 1.0 Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448311/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448311/100/0/threaded"
},
{
"name" : "20467",

View File

@ -55,7 +55,7 @@
{
"name" : "20061012 maluinfo version 206.2.38l Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448639/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448639/100/0/threaded"
},
{
"name" : "20507",

View File

@ -55,7 +55,7 @@
{
"name" : "20061020 [KAPDA::#60] Mambo V4.6.x vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/449305/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/449305/100/0/threaded"
},
{
"name" : "http://www.kapda.ir/advisory-444.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20061020 [KAPDA::#60] Mambo V4.6.x vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/449305/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/449305/100/0/threaded"
},
{
"name" : "http://www.kapda.ir/advisory-444.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20061010 [Fedora] libtool-ltdl uses relative paths to resolve and load libraries",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448153/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448153/100/0/threaded"
},
{
"name" : "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=209930",

View File

@ -55,7 +55,7 @@
{
"name" : "20061113 New Bug MiniBB Forum <= 2 Remote File Include (index.php)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/451402/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/451402/100/0/threaded"
},
{
"name" : "2371",

View File

@ -55,7 +55,7 @@
{
"name" : "20061012 Iono all version fullpath disclosure",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448446/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448446/100/0/threaded"
},
{
"name" : "32410",

View File

@ -55,7 +55,7 @@
{
"name" : "20061012 Google Earth (kml & kmz files) buffer overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448544/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448544/100/0/threaded"
},
{
"name" : "20061012 Google Earth (kml & kmz files) buffer overflow",

View File

@ -55,7 +55,7 @@
{
"name" : "20061023 http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/449501/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/449501/100/0/threaded"
},
{
"name" : "http://www.red-database-security.com/advisory/oracle_apex_css_notification_msg.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20061006 Vulnerability in Btitracker",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/447928/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/447928/100/0/threaded"
},
{
"name" : "20422",

View File

@ -55,7 +55,7 @@
{
"name" : "20061115 Outpost Multiple insufficient argument validation of hooked SSDT function Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/451672/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/451672/100/0/threaded"
},
{
"name" : "http://www.matousec.com/info/advisories/Outpost-Multiple-insufficient-argument-validation-of-hooked-SSDT-functions.php",

View File

@ -55,7 +55,7 @@
{
"name" : "20061006 Hazir Site v2.0 Admin SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/447829/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/447829/100/0/threaded"
},
{
"name" : "20375",

View File

@ -55,7 +55,7 @@
{
"name" : "20061012 phpBB Add Name Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/448630/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/448630/100/0/threaded"
},
{
"name" : "20516",

View File

@ -55,12 +55,12 @@
{
"name" : "20061118 PhpBB Module Dimension Remote File Include",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/452012/100/200/threaded"
"url" : "http://www.securityfocus.com/archive/1/452012/100/200/threaded"
},
{
"name" : "20061119 PhpBB Module Dimension Remote File Include",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/452100/100/200/threaded"
"url" : "http://www.securityfocus.com/archive/1/452100/100/200/threaded"
},
{
"name" : "2464",

View File

@ -55,7 +55,7 @@
{
"name" : "20070423 FLEA-2007-0012-1: madwifi",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/466689/30/6900/threaded"
"url" : "http://www.securityfocus.com/archive/1/466689/30/6900/threaded"
},
{
"name" : "http://madwifi.org/ticket/880",

View File

@ -55,7 +55,7 @@
{
"name" : "20070423 FLEA-2007-0012-1: madwifi",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/466689/30/6900/threaded"
"url" : "http://www.securityfocus.com/archive/1/466689/30/6900/threaded"
},
{
"name" : "http://madwifi.org/ticket/880",

Some files were not shown because too many files have changed in this diff Show More