- Synchronized data.

This commit is contained in:
CVE Team 2018-10-15 17:03:25 -04:00
parent 0d4795e3a0
commit bd52c432e7
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
1484 changed files with 1931 additions and 1931 deletions

View File

@ -55,7 +55,7 @@
{
"name" : "20070702 High Risk Flaw in Sun's Java Web Start",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472673/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472673/100/0/threaded"
},
{
"name" : "http://docs.info.apple.com/article.html?artnum=307177",

View File

@ -55,7 +55,7 @@
{
"name" : "20070629 flac123 0.0.9 - Stack overflow in comment parsing",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472504/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472504/100/0/threaded"
},
{
"name" : "http://www.isecpartners.com/advisories/2007-002-flactools.txt",

View File

@ -55,17 +55,17 @@
{
"name" : "20071029 FLEA-2007-0062-1 firefox",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/482925/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/482925/100/0/threaded"
},
{
"name" : "20071026 rPSA-2007-0225-1 firefox",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/482876/100/200/threaded"
"url" : "http://www.securityfocus.com/archive/1/482876/100/200/threaded"
},
{
"name" : "20071029 rPSA-2007-0225-2 firefox thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/482932/100/200/threaded"
"url" : "http://www.securityfocus.com/archive/1/482932/100/200/threaded"
},
{
"name" : "20070630 New flaw found in Firefox 2.0.0.4: Firefox file input focus vulnerabilities",

View File

@ -55,7 +55,7 @@
{
"name" : "20070702 PHPDirector <= 0.21 (SQL injection/Upload SHELL) Remote Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472661/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472661/100/0/threaded"
},
{
"name" : "4139",

View File

@ -55,7 +55,7 @@
{
"name" : "20070702 PHPDirector <= 0.21 (SQL injection/Upload SHELL) Remote Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472661/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472661/100/0/threaded"
},
{
"name" : "4139",

View File

@ -55,7 +55,7 @@
{
"name" : "20070701 Advisory : Internet Explorer Zone Domain Specification Dos and Page suppressing.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472651/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472651/100/0/threaded"
},
{
"name" : "20070712 Bogus BID 24744",
@ -65,7 +65,7 @@
{
"name" : "20071222 Bid 24744 ?",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/485536/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/485536/100/0/threaded"
},
{
"name" : "20070701 Advisory : Internet Explorer Zone Domain Specification Dos and Page suppressing.",

View File

@ -55,7 +55,7 @@
{
"name" : "20070703 Buffer overflow in HP Instant Support Driver Check (SDD) ActiveX control",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472728/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472728/100/0/threaded"
},
{
"name" : "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Exploits&argument=Remote&topic=1183360239.ff.php&page=last",

View File

@ -55,7 +55,7 @@
{
"name" : "20070703 Moodle XSS / Liesbeth base CMS sensitive information disclosure",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472727/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472727/100/0/threaded"
},
{
"name" : "http://securityvulns.ru/Rdocument391.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20070703 Moodle XSS / Liesbeth base CMS sensitive information disclosure",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472727/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472727/100/0/threaded"
},
{
"name" : "http://securityvulns.ru/Rdocument392.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20070630 WheatBlog 1.1 RFI/SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472575/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472575/100/0/threaded"
},
{
"name" : "24715",

View File

@ -55,7 +55,7 @@
{
"name" : "20070702 PHPDirector <= 0.21 (SQL injection/Upload SHELL) Remote Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472661/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472661/100/0/threaded"
},
{
"name" : "4139",

View File

@ -55,7 +55,7 @@
{
"name" : "20070702 AV Arcade 2.1b (view_page.php) Remote SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472663/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472663/100/0/threaded"
},
{
"name" : "4138",

View File

@ -55,7 +55,7 @@
{
"name" : "20070724 TPTI-07-13: Borland Interbase ibserver.exe Create-Request Buffer Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474561/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474561/100/0/threaded"
},
{
"name" : "http://dvlabs.tippingpoint.com/advisory/TPTI-07-13",

View File

@ -55,7 +55,7 @@
{
"name" : "20070703 MySQLDumper vulnerability: Bypassing Apache based access control possible",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472756/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472756/100/0/threaded"
},
{
"name" : "20070804 Re: MySQLDumper vulnerability: Bypassing Apache based access control possible",

View File

@ -55,7 +55,7 @@
{
"name" : "20070703 Cross Site Scripting in Oliver Library Management System",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472738/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472738/100/0/threaded"
},
{
"name" : "20070703 Cross Site Scripting in Oliver Library Management System",

View File

@ -55,7 +55,7 @@
{
"name" : "20070629 akocomment SQL INJECTION (all version)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472652/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472652/100/0/threaded"
},
{
"name" : "38914",

View File

@ -55,7 +55,7 @@
{
"name" : "20080301 The Router Hacking Challenge is Over!",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/489009/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/489009/100/0/threaded"
},
{
"name" : "http://www.securityfocus.com/data/vulnerabilities/exploits/24682.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20070702 FreeDomain.co.nr Clone SQL Injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472656/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472656/100/0/threaded"
},
{
"name" : "24737",

View File

@ -55,12 +55,12 @@
{
"name" : "20071122 MyBlog (MyCMS) Remote PHP Code execution / PHP Code injection ..",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/484064/100/100/threaded"
"url" : "http://www.securityfocus.com/archive/1/484064/100/100/threaded"
},
{
"name" : "20071123 Re: MyBlog (MyCMS) Remote PHP Code execution / PHP Code injection ..",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/484111/100/100/threaded"
"url" : "http://www.securityfocus.com/archive/1/484111/100/100/threaded"
},
{
"name" : "4145",

View File

@ -55,7 +55,7 @@
{
"name" : "20070629 SQL Injection In Script VBZooM V1.12",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472510/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472510/100/0/threaded"
},
{
"name" : "2861",

View File

@ -55,7 +55,7 @@
{
"name" : "20070705 Session fixation in Zen Cart CMS",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472875/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472875/100/0/threaded"
},
{
"name" : "http://sourceforge.net/project/shownotes.php?release_id=474574&group_id=83781",

View File

@ -55,7 +55,7 @@
{
"name" : "20070705 EnjoySAP, SAP GUI for Windows - Stack Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472887/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472887/100/0/threaded"
},
{
"name" : "4148",

View File

@ -55,7 +55,7 @@
{
"name" : "20070705 EnjoySAP, SAP GUI for Windows - Stack Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472887/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472887/100/0/threaded"
},
{
"name" : "4148",

View File

@ -55,7 +55,7 @@
{
"name" : "20070705 EnjoySAP, SAP GUI for Windows - Stack Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472887/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472887/100/0/threaded"
},
{
"name" : "4148",

View File

@ -55,7 +55,7 @@
{
"name" : "20070705 SAP Internet Graphics Server XSS and Heap Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472889/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472889/100/0/threaded"
},
{
"name" : "http://www.ngssoftware.com/advisories/medium-risk-vulnerability-in-sap-internet-graphics-server/",

View File

@ -55,7 +55,7 @@
{
"name" : "20070705 SAP DB Web Server Stack Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472891/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472891/100/0/threaded"
},
{
"name" : "http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-sap-db-web-server-stack-overflow/",

View File

@ -55,7 +55,7 @@
{
"name" : "20070705 Internet Communication Manager Denial Of Service Attack",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472890/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472890/100/0/threaded"
},
{
"name" : "20070705 Internet Communication Manager Denial Of Service Attack",

View File

@ -55,7 +55,7 @@
{
"name" : "20070820 ZDI-07-049: EMC Legato Networker Remote Exec Service Stack Overflow Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/477172/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/477172/100/0/threaded"
},
{
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-07-049.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20070705 [NETRAGARD SECURITY ADVISORY][Maia Mailguard 1.0.2 Arbitrary Code Execution][NETRAGARD-20070628]",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472886/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472886/100/0/threaded"
},
{
"name" : "http://www.netragard.com/pdfs/research/NETRAGARD-20070628-MAILGUARD.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20070705 AsteriDex (Asterisk / Trixbox) remote code execution",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472907/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472907/100/0/threaded"
},
{
"name" : "4151",

View File

@ -55,7 +55,7 @@
{
"name" : "20070705 Redirection Vulnerability in wp-pass.php, WordPress 2.2.1",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472885/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472885/100/0/threaded"
},
{
"name" : "DSA-1564",

View File

@ -55,7 +55,7 @@
{
"name" : "20070703 Security on AIR: Local file access through JavaScript",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472733/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472733/100/0/threaded"
},
{
"name" : "41473",

View File

@ -55,7 +55,7 @@
{
"name" : "20070702 AV Arcade 2.1b (COOKIE[ava_userid]) Get Admin Rights",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/472666/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/472666/100/0/threaded"
},
{
"name" : "24736",

View File

@ -55,7 +55,7 @@
{
"name" : "20070706 phpTrafficA <=1.4.3 Admin Login Bypass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473041/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473041/100/0/threaded"
},
{
"name" : "http://corryl.altervista.org/index.php?mod=read&id=1183748959",

View File

@ -55,12 +55,12 @@
{
"name" : "20070709 EEYE: Sun Java WebStart JNLP Stack Buffer Overflow Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473224/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473224/100/0/threaded"
},
{
"name" : "20070711 SUN Java JNLP Overflow",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473356/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473356/100/0/threaded"
},
{
"name" : "30284",

View File

@ -55,17 +55,17 @@
{
"name" : "20070709 Firefox wyciwyg:// cache zone bypass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473191/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473191/100/0/threaded"
},
{
"name" : "20070720 rPSA-2007-0148-1 firefox thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474226/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474226/100/0/threaded"
},
{
"name" : "20070724 FLEA-2007-0033-1: firefox thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474542/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474542/100/0/threaded"
},
{
"name" : "http://lcamtuf.coredump.cx/ffcache/",

View File

@ -60,7 +60,7 @@
{
"name" : "20070710 Internet Explorer 0day exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473276/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473276/100/0/threaded"
},
{
"name" : "20070710 Internet Explorer 0day exploit",

View File

@ -55,7 +55,7 @@
{
"name" : "20070718 SYMSA-2007-006: Citrix EPA ActiveX Control Design Flaw",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474204/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474204/100/0/threaded"
},
{
"name" : "http://www.symantec.com/content/en/us/enterprise/research/SYMSA-2007-006.txt",

View File

@ -60,17 +60,17 @@
{
"name" : "20070709 WinPcap NPF.SYS Privilege Elevation Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473270/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473270/100/0/threaded"
},
{
"name" : "20070710 Re: Re: WinPcap NPF.SYS Privilege Elevation Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473301/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473301/100/0/threaded"
},
{
"name" : "20070710 Re: WinPcap NPF.SYS Privilege Elevation Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473297/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473297/100/0/threaded"
},
{
"name" : "4165",

View File

@ -55,7 +55,7 @@
{
"name" : "20071112 CVE-2007-3694: Cross site scripting (XSS) in broadcast machine",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/483575/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/483575/100/0/threaded"
},
{
"name" : "http://www.int21.de/cve/CVE-2007-3694-bm.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20070710 Flashbb <= 1.1.7 - Remote File Inclusion Exploit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473281/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473281/100/0/threaded"
},
{
"name" : "4169",

View File

@ -55,7 +55,7 @@
{
"name" : "20070710 TippingPoint IPS Signature Evasion",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473311/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473311/100/0/threaded"
},
{
"name" : "20070710 TippingPoint IPS Signature Evasion",

View File

@ -55,7 +55,7 @@
{
"name" : "20070710 Entertainment CMS Admin Login Bypass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473282/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473282/100/0/threaded"
},
{
"name" : "24847",

View File

@ -55,7 +55,7 @@
{
"name" : "20070618 Fusetalk SQL injection submission.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/471637/100/200/threaded"
"url" : "http://www.securityfocus.com/archive/1/471637/100/200/threaded"
},
{
"name" : "37140",

View File

@ -55,7 +55,7 @@
{
"name" : "20070708 CodeIgniter 1.5.3 vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473190/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473190/100/0/threaded"
},
{
"name" : "20070709 CodeIgniter 1.5.3 vulnerabilities",

View File

@ -55,7 +55,7 @@
{
"name" : "20070708 CodeIgniter 1.5.3 vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473190/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473190/100/0/threaded"
},
{
"name" : "20070709 CodeIgniter 1.5.3 vulnerabilities",

View File

@ -55,7 +55,7 @@
{
"name" : "20070708 CodeIgniter 1.5.3 vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473190/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473190/100/0/threaded"
},
{
"name" : "20070709 CodeIgniter 1.5.3 vulnerabilities",

View File

@ -55,7 +55,7 @@
{
"name" : "20070708 CodeIgniter 1.5.3 vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473190/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473190/100/0/threaded"
},
{
"name" : "20070709 CodeIgniter 1.5.3 vulnerabilities",

View File

@ -55,7 +55,7 @@
{
"name" : "20070708 PHP Comet-Server",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473188/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473188/100/0/threaded"
},
{
"name" : "36150",

View File

@ -55,7 +55,7 @@
{
"name" : "20070711 TippingPoint detection bypass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473394/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473394/100/0/threaded"
},
{
"name" : "20070611 TippingPoint detection bypass",

View File

@ -55,7 +55,7 @@
{
"name" : "20071224 Double directory traversal in ImgSvr 0.6.21",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/485490/100/100/threaded"
"url" : "http://www.securityfocus.com/archive/1/485490/100/100/threaded"
},
{
"name" : "24853",

View File

@ -55,12 +55,12 @@
{
"name" : "20070712 Command Injection in XML Digital Signatures",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473552/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473552/100/0/threaded"
},
{
"name" : "20070712 Whitepaper: Command Injection in XML Digital Signatures and Encryption",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473553/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473553/100/0/threaded"
},
{
"name" : "http://www.isecpartners.com/advisories/2007-04-dsig.txt",

View File

@ -55,12 +55,12 @@
{
"name" : "20070712 Command Injection in XML Digital Signatures",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473552/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473552/100/0/threaded"
},
{
"name" : "20070712 Whitepaper: Command Injection in XML Digital Signatures and Encryption",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473553/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473553/100/0/threaded"
},
{
"name" : "http://www.isecpartners.com/advisories/2007-04-dsig.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20070711 Advisory - Clam AntiVirus RAR File Handling Denial Of Service Vulnerability.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473371/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473371/100/0/threaded"
},
{
"name" : "20070711 Advisory - Clam AntiVirus RAR File Handling Denial Of Service Vulnerability.",

View File

@ -55,7 +55,7 @@
{
"name" : "20070711 Advisory - Clam AntiVirus RAR File Handling Denial Of Service Vulnerability.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473371/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473371/100/0/threaded"
},
{
"name" : "20070711 RE: Advisory - Clam AntiVirus RAR File Handling Denial Of Service Vulnerability.",
@ -65,12 +65,12 @@
{
"name" : "20070711 Re: Advisory - Clam AntiVirus RAR File Handling Denial Of Service Vulnerability.",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473373/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473373/100/0/threaded"
},
{
"name" : "20070731 FLEA-2007-0037-1 unrar",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/475155/30/5610/threaded"
"url" : "http://www.securityfocus.com/archive/1/475155/30/5610/threaded"
},
{
"name" : "39603",

View File

@ -55,7 +55,7 @@
{
"name" : "20080229 rPSA-2008-0094-1 kernel",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/488972/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/488972/100/0/threaded"
},
{
"name" : "http://bugzilla.kernel.org/show_bug.cgi?id=8765",

View File

@ -55,12 +55,12 @@
{
"name" : "20070720 rPSA-2007-0148-1 firefox thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474226/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474226/100/0/threaded"
},
{
"name" : "20070724 FLEA-2007-0033-1: firefox thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474542/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474542/100/0/threaded"
},
{
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-18.html",

View File

@ -55,12 +55,12 @@
{
"name" : "20070720 rPSA-2007-0148-1 firefox thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474226/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474226/100/0/threaded"
},
{
"name" : "20070724 FLEA-2007-0033-1: firefox thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474542/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474542/100/0/threaded"
},
{
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-18.html",

View File

@ -55,12 +55,12 @@
{
"name" : "20070720 rPSA-2007-0148-1 firefox thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474226/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474226/100/0/threaded"
},
{
"name" : "20070724 FLEA-2007-0033-1: firefox thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474542/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474542/100/0/threaded"
},
{
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-19.html",

View File

@ -55,12 +55,12 @@
{
"name" : "20070720 rPSA-2007-0148-1 firefox thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474226/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474226/100/0/threaded"
},
{
"name" : "20070724 FLEA-2007-0033-1: firefox thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474542/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474542/100/0/threaded"
},
{
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-21.html",

View File

@ -55,12 +55,12 @@
{
"name" : "20070720 rPSA-2007-0148-1 firefox thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474226/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474226/100/0/threaded"
},
{
"name" : "20070724 FLEA-2007-0033-1: firefox thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474542/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474542/100/0/threaded"
},
{
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-25.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20070906 iTunes 7.3.x - Heap overflow in album cover parsing",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/478750/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/478750/100/0/threaded"
},
{
"name" : "https://www.isecpartners.com/advisories/2007-005-itunes.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20070706 Another You tube clone script vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473192/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473192/100/0/threaded"
},
{
"name" : "http://chxsecurity.org/advisories/adv-2-mid.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20070711 Powered By Dvbbs Version 7.1.0 Sp1 By Pass",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473374/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473374/100/0/threaded"
},
{
"name" : "39747",

View File

@ -55,7 +55,7 @@
{
"name" : "20070711 Advisory: Arbitrary kernel mode memory writes in AVG",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473360/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473360/100/0/threaded"
},
{
"name" : "24870",

View File

@ -55,7 +55,7 @@
{
"name" : "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473874/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473874/100/0/threaded"
},
{
"name" : "[announce] 20070712 MySQL Community Server 5.0.45 has been released!",

View File

@ -55,7 +55,7 @@
{
"name" : "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473874/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473874/100/0/threaded"
},
{
"name" : "[announce] 20070712 MySQL Community Server 5.0.45 has been released!",

View File

@ -55,7 +55,7 @@
{
"name" : "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473874/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473874/100/0/threaded"
},
{
"name" : "[announce] 20070712 MySQL Community Server 5.0.45 has been released!",

View File

@ -55,7 +55,7 @@
{
"name" : "20070711 durito: enVivo!CMS SQL injection",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473355/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473355/100/0/threaded"
},
{
"name" : "20070711 durito: enVivo!CMS SQL injection",

View File

@ -55,7 +55,7 @@
{
"name" : "20070711 Calyptix Security Advisory CX-2007-05 - eSoft InstaGate EX2 Cross-Site Request Forgery Attack",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473663/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473663/100/0/threaded"
},
{
"name" : "http://labs.calyptix.com/CX-2007-05.php",

View File

@ -55,7 +55,7 @@
{
"name" : "20070711 Calyptix Security Advisory CX-2007-05 - eSoft InstaGate EX2 Cross-Site Request Forgery Attack",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473663/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473663/100/0/threaded"
},
{
"name" : "http://labs.calyptix.com/CX-2007-05.php",

View File

@ -55,7 +55,7 @@
{
"name" : "20070711 Calyptix Security Advisory CX-2007-05 - eSoft InstaGate EX2 Cross-Site Request Forgery Attack",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473663/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473663/100/0/threaded"
},
{
"name" : "http://labs.calyptix.com/CX-2007-05.php",

View File

@ -55,7 +55,7 @@
{
"name" : "20070713 AzDG Dating Gold v3.0.5 ===> Remote File Include Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473664/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473664/100/0/threaded"
},
{
"name" : "24910",

View File

@ -55,7 +55,7 @@
{
"name" : "20070720 rPSA-2007-0147-1 tcpdump",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474225/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474225/100/0/threaded"
},
{
"name" : "http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12",

View File

@ -55,7 +55,7 @@
{
"name" : "20070713 [scip_Advisory 3159] SiteScape forum prior 7.3 Cross Site Scripting",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473624/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473624/100/0/threaded"
},
{
"name" : "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=3159",

View File

@ -55,7 +55,7 @@
{
"name" : "20070712 MkPortal - Multiple SQL Injection Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473495/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473495/100/0/threaded"
},
{
"name" : "4179",

View File

@ -55,7 +55,7 @@
{
"name" : "20070716 WhitePapers By SecNiche Security",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473707/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473707/100/0/threaded"
},
{
"name" : "20070721 [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos",
@ -65,7 +65,7 @@
{
"name" : "20070721 Re: [WEB SECURITY] [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474474/100/200/threaded"
"url" : "http://www.securityfocus.com/archive/1/474474/100/200/threaded"
},
{
"name" : "20070721 [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos",

View File

@ -55,12 +55,12 @@
{
"name" : "20070713 Opera/Konqueror: data: URL scheme address bar spoofing",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473703/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473703/100/0/threaded"
},
{
"name" : "20070716 Re: Opera/Konqueror: data: URL scheme address bar spoofing",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473782/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473782/100/0/threaded"
},
{
"name" : "http://alt.swiecki.net/oper1.html",

View File

@ -55,12 +55,12 @@
{
"name" : "20070713 Opera/Konqueror: data: URL scheme address bar spoofing",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473703/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473703/100/0/threaded"
},
{
"name" : "20070714 Re: Opera/Konqueror: data: URL scheme address bar spoofing",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473712/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473712/100/0/threaded"
},
{
"name" : "http://alt.swiecki.net/oper1.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20070714 Session Riding and multiple XSS in WebCit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473714/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473714/100/0/threaded"
},
{
"name" : "24913",

View File

@ -55,7 +55,7 @@
{
"name" : "20070714 Session Riding and multiple XSS in WebCit",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473714/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473714/100/0/threaded"
},
{
"name" : "24913",

View File

@ -55,7 +55,7 @@
{
"name" : "20070713 MSIE7 entrapment again (+ FF tidbit)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473702/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473702/100/0/threaded"
},
{
"name" : "http://lcamtuf.coredump.cx/ietrap3/",
@ -65,12 +65,12 @@
{
"name" : "HPSBST02280",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/archive/1/482366/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/482366/100/0/threaded"
},
{
"name" : "SSRT071480",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/archive/1/482366/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/482366/100/0/threaded"
},
{
"name" : "MS07-057",

View File

@ -55,7 +55,7 @@
{
"name" : "20070713 MSIE7 entrapment again (+ FF tidbit)",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473702/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473702/100/0/threaded"
},
{
"name" : "2892",

View File

@ -55,7 +55,7 @@
{
"name" : "20070716 ExLibris Aleph and Metalib Cross Site Scripting Attack",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473785/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473785/100/0/threaded"
},
{
"name" : "http://escarpment.net/exlibris.txt",

View File

@ -55,7 +55,7 @@
{
"name" : "20070716 ExLibris Aleph and Metalib Cross Site Scripting Attack",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473785/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473785/100/0/threaded"
},
{
"name" : "20070716 ExLibris Aleph and Metalib Cross Site Scripting Attack",

View File

@ -55,12 +55,12 @@
{
"name" : "20070801 FLEA-2007-0039-1 firefox",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/475265/100/200/threaded"
"url" : "http://www.securityfocus.com/archive/1/475265/100/200/threaded"
},
{
"name" : "20070803 FLEA-2007-0040-1 thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/475450/30/5550/threaded"
"url" : "http://www.securityfocus.com/archive/1/475450/30/5550/threaded"
},
{
"name" : "http://bugzilla.mozilla.org/show_bug.cgi?id=388121",

View File

@ -55,12 +55,12 @@
{
"name" : "20070801 FLEA-2007-0039-1 firefox",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/475265/100/200/threaded"
"url" : "http://www.securityfocus.com/archive/1/475265/100/200/threaded"
},
{
"name" : "20070803 FLEA-2007-0040-1 thunderbird",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/475450/30/5550/threaded"
"url" : "http://www.securityfocus.com/archive/1/475450/30/5550/threaded"
},
{
"name" : "http://bugzilla.mozilla.org/show_bug.cgi?id=389580",

View File

@ -55,7 +55,7 @@
{
"name" : "20090821 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/505990/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/505990/100/0/threaded"
},
{
"name" : "[apache-cvs] 20070801 svn commit: r561616 - in /httpd/httpd/trunk: CHANGES",

View File

@ -60,22 +60,22 @@
{
"name" : "20070815 Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/476677/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/476677/100/0/threaded"
},
{
"name" : "20070816 Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/476803/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/476803/100/0/threaded"
},
{
"name" : "20070814 COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/476464/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/476464/100/0/threaded"
},
{
"name" : "20070814 Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/476538/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/476538/100/0/threaded"
},
{
"name" : "[openwall-announce] 20070814 Linux 2.4.35-ow2",

View File

@ -55,12 +55,12 @@
{
"name" : "20070718 Oracle Security: Insert / Update / Delete Data via Views",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473997/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473997/100/0/threaded"
},
{
"name" : "20070721 Oracle bad Views - Exploit released",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474326/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474326/100/0/threaded"
},
{
"name" : "http://rawlab.mindcreations.com/codes/exp/oracle/bunkerview.sql",

View File

@ -55,7 +55,7 @@
{
"name" : "20070718 Oracle Security: SQL Injection in APEX CHECK_DB_PASSWORD",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474002/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474002/100/0/threaded"
},
{
"name" : "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf",

View File

@ -55,7 +55,7 @@
{
"name" : "20070724 Oracle E-Business Suite - Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474515/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474515/100/0/threaded"
},
{
"name" : "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf",

View File

@ -55,7 +55,7 @@
{
"name" : "20070724 Oracle E-Business Suite - Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474515/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474515/100/0/threaded"
},
{
"name" : "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf",

View File

@ -55,7 +55,7 @@
{
"name" : "20070724 Oracle E-Business Suite - Multiple Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474515/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474515/100/0/threaded"
},
{
"name" : "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf",

View File

@ -60,17 +60,17 @@
{
"name" : "20070725 [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474601/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474601/100/0/threaded"
},
{
"name" : "20070726 RE: [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474683/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/474683/100/0/threaded"
},
{
"name" : "20070725 n.runs-SA-2007.024 - CA eTrust Antivirus Infinite Loop DoS (remote) Advisory",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/474605/100/100/threaded"
"url" : "http://www.securityfocus.com/archive/1/474605/100/100/threaded"
},
{
"name" : "http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.asp",

View File

@ -55,7 +55,7 @@
{
"name" : "20070909 Husrev Forums v2.0.1:PoWerBoard Sql",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/478974/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/478974/100/0/threaded"
},
{
"name" : "http://yollubunlar.org/husrev-forums-v201powerboard-sql-injection-exploit-3503.html",

View File

@ -55,7 +55,7 @@
{
"name" : "20070717 Insanely simple blog - Multiple vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473868/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473868/100/0/threaded"
},
{
"name" : "24934",

View File

@ -55,12 +55,12 @@
{
"name" : "20070717 Insanely simple blog - Multiple vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/473868/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/473868/100/0/threaded"
},
{
"name" : "20080610 [web-app] Insanely Simple Blog 0.5 (index) Remote SQL Injection Vulnerabilities",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/archive/1/493224/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/493224/100/0/threaded"
},
{
"name" : "5774",

View File

@ -55,12 +55,12 @@
{
"name" : "HPSBST02280",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/archive/1/482366/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/482366/100/0/threaded"
},
{
"name" : "SSRT071480",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/archive/1/482366/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/482366/100/0/threaded"
},
{
"name" : "MS07-057",

View File

@ -55,12 +55,12 @@
{
"name" : "HPSBST02280",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/archive/1/482366/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/482366/100/0/threaded"
},
{
"name" : "SSRT071480",
"refsource" : "HP",
"url" : "http://www.securityfocus.com/archive/1/archive/1/482366/100/0/threaded"
"url" : "http://www.securityfocus.com/archive/1/482366/100/0/threaded"
},
{
"name" : "MS07-057",

Some files were not shown because too many files have changed in this diff Show More