mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-08 11:37:04 +00:00
- Synchronized data.
This commit is contained in:
parent
0d4795e3a0
commit
bd52c432e7
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070702 High Risk Flaw in Sun's Java Web Start",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472673/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472673/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://docs.info.apple.com/article.html?artnum=307177",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070629 flac123 0.0.9 - Stack overflow in comment parsing",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472504/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472504/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.isecpartners.com/advisories/2007-002-flactools.txt",
|
||||
|
@ -55,17 +55,17 @@
|
||||
{
|
||||
"name" : "20071029 FLEA-2007-0062-1 firefox",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/482925/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/482925/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20071026 rPSA-2007-0225-1 firefox",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/482876/100/200/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/482876/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20071029 rPSA-2007-0225-2 firefox thunderbird",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/482932/100/200/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/482932/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070630 New flaw found in Firefox 2.0.0.4: Firefox file input focus vulnerabilities",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070702 PHPDirector <= 0.21 (SQL injection/Upload SHELL) Remote Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472661/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472661/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "4139",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070702 PHPDirector <= 0.21 (SQL injection/Upload SHELL) Remote Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472661/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472661/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "4139",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070701 Advisory : Internet Explorer Zone Domain Specification Dos and Page suppressing.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472651/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472651/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070712 Bogus BID 24744",
|
||||
@ -65,7 +65,7 @@
|
||||
{
|
||||
"name" : "20071222 Bid 24744 ?",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/485536/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/485536/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070701 Advisory : Internet Explorer Zone Domain Specification Dos and Page suppressing.",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070703 Buffer overflow in HP Instant Support Driver Check (SDD) ActiveX control",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472728/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472728/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.shinnai.altervista.org/index.php?mod=02_Forum&group=Exploits&argument=Remote&topic=1183360239.ff.php&page=last",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070703 Moodle XSS / Liesbeth base CMS sensitive information disclosure",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472727/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472727/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://securityvulns.ru/Rdocument391.html",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070703 Moodle XSS / Liesbeth base CMS sensitive information disclosure",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472727/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472727/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://securityvulns.ru/Rdocument392.html",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070630 WheatBlog 1.1 RFI/SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472575/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472575/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "24715",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070702 PHPDirector <= 0.21 (SQL injection/Upload SHELL) Remote Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472661/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472661/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "4139",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070702 AV Arcade 2.1b (view_page.php) Remote SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472663/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472663/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "4138",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070724 TPTI-07-13: Borland Interbase ibserver.exe Create-Request Buffer Overflow Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474561/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474561/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://dvlabs.tippingpoint.com/advisory/TPTI-07-13",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070703 MySQLDumper vulnerability: Bypassing Apache based access control possible",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472756/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472756/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070804 Re: MySQLDumper vulnerability: Bypassing Apache based access control possible",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070703 Cross Site Scripting in Oliver Library Management System",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472738/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472738/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070703 Cross Site Scripting in Oliver Library Management System",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070629 akocomment SQL INJECTION (all version)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472652/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472652/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "38914",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20080301 The Router Hacking Challenge is Over!",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/489009/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/489009/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.securityfocus.com/data/vulnerabilities/exploits/24682.html",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070702 FreeDomain.co.nr Clone SQL Injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472656/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472656/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "24737",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20071122 MyBlog (MyCMS) Remote PHP Code execution / PHP Code injection ..",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/484064/100/100/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/484064/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20071123 Re: MyBlog (MyCMS) Remote PHP Code execution / PHP Code injection ..",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/484111/100/100/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/484111/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "4145",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070629 SQL Injection In Script VBZooM V1.12",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472510/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472510/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "2861",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070705 Session fixation in Zen Cart CMS",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472875/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472875/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://sourceforge.net/project/shownotes.php?release_id=474574&group_id=83781",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070705 EnjoySAP, SAP GUI for Windows - Stack Overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472887/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472887/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "4148",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070705 EnjoySAP, SAP GUI for Windows - Stack Overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472887/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472887/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "4148",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070705 EnjoySAP, SAP GUI for Windows - Stack Overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472887/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472887/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "4148",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070705 SAP Internet Graphics Server XSS and Heap Overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472889/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472889/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.ngssoftware.com/advisories/medium-risk-vulnerability-in-sap-internet-graphics-server/",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070705 SAP DB Web Server Stack Overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472891/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472891/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.ngssoftware.com/advisories/critical-risk-vulnerability-in-sap-db-web-server-stack-overflow/",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070705 Internet Communication Manager Denial Of Service Attack",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472890/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472890/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070705 Internet Communication Manager Denial Of Service Attack",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070820 ZDI-07-049: EMC Legato Networker Remote Exec Service Stack Overflow Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/477172/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/477172/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.zerodayinitiative.com/advisories/ZDI-07-049.html",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070705 [NETRAGARD SECURITY ADVISORY][Maia Mailguard 1.0.2 Arbitrary Code Execution][NETRAGARD-20070628]",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472886/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472886/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.netragard.com/pdfs/research/NETRAGARD-20070628-MAILGUARD.txt",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070705 AsteriDex (Asterisk / Trixbox) remote code execution",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472907/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472907/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "4151",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070705 Redirection Vulnerability in wp-pass.php, WordPress 2.2.1",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472885/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472885/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "DSA-1564",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070703 Security on AIR: Local file access through JavaScript",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472733/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472733/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "41473",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070702 AV Arcade 2.1b (COOKIE[ava_userid]) Get Admin Rights",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/472666/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/472666/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "24736",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070706 phpTrafficA <=1.4.3 Admin Login Bypass",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473041/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473041/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://corryl.altervista.org/index.php?mod=read&id=1183748959",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20070709 EEYE: Sun Java WebStart JNLP Stack Buffer Overflow Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473224/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473224/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070711 SUN Java JNLP Overflow",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473356/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473356/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "30284",
|
||||
|
@ -55,17 +55,17 @@
|
||||
{
|
||||
"name" : "20070709 Firefox wyciwyg:// cache zone bypass",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473191/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473191/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070720 rPSA-2007-0148-1 firefox thunderbird",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474226/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474226/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070724 FLEA-2007-0033-1: firefox thunderbird",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474542/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474542/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://lcamtuf.coredump.cx/ffcache/",
|
||||
|
@ -60,7 +60,7 @@
|
||||
{
|
||||
"name" : "20070710 Internet Explorer 0day exploit",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473276/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473276/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070710 Internet Explorer 0day exploit",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070718 SYMSA-2007-006: Citrix EPA ActiveX Control Design Flaw",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474204/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474204/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.symantec.com/content/en/us/enterprise/research/SYMSA-2007-006.txt",
|
||||
|
@ -60,17 +60,17 @@
|
||||
{
|
||||
"name" : "20070709 WinPcap NPF.SYS Privilege Elevation Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473270/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473270/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070710 Re: Re: WinPcap NPF.SYS Privilege Elevation Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473301/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473301/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070710 Re: WinPcap NPF.SYS Privilege Elevation Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473297/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473297/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "4165",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20071112 CVE-2007-3694: Cross site scripting (XSS) in broadcast machine",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/483575/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/483575/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.int21.de/cve/CVE-2007-3694-bm.html",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070710 Flashbb <= 1.1.7 - Remote File Inclusion Exploit",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473281/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473281/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "4169",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070710 TippingPoint IPS Signature Evasion",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473311/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473311/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070710 TippingPoint IPS Signature Evasion",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070710 Entertainment CMS Admin Login Bypass",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473282/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473282/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "24847",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070618 Fusetalk SQL injection submission.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/471637/100/200/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/471637/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "37140",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070708 CodeIgniter 1.5.3 vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473190/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473190/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070709 CodeIgniter 1.5.3 vulnerabilities",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070708 CodeIgniter 1.5.3 vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473190/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473190/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070709 CodeIgniter 1.5.3 vulnerabilities",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070708 CodeIgniter 1.5.3 vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473190/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473190/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070709 CodeIgniter 1.5.3 vulnerabilities",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070708 CodeIgniter 1.5.3 vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473190/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473190/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070709 CodeIgniter 1.5.3 vulnerabilities",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070708 PHP Comet-Server",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473188/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473188/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "36150",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070711 TippingPoint detection bypass",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473394/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473394/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070611 TippingPoint detection bypass",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20071224 Double directory traversal in ImgSvr 0.6.21",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/485490/100/100/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/485490/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "24853",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20070712 Command Injection in XML Digital Signatures",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473552/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473552/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070712 Whitepaper: Command Injection in XML Digital Signatures and Encryption",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473553/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473553/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.isecpartners.com/advisories/2007-04-dsig.txt",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20070712 Command Injection in XML Digital Signatures",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473552/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473552/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070712 Whitepaper: Command Injection in XML Digital Signatures and Encryption",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473553/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473553/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.isecpartners.com/advisories/2007-04-dsig.txt",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070711 Advisory - Clam AntiVirus RAR File Handling Denial Of Service Vulnerability.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473371/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473371/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070711 Advisory - Clam AntiVirus RAR File Handling Denial Of Service Vulnerability.",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070711 Advisory - Clam AntiVirus RAR File Handling Denial Of Service Vulnerability.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473371/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473371/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070711 RE: Advisory - Clam AntiVirus RAR File Handling Denial Of Service Vulnerability.",
|
||||
@ -65,12 +65,12 @@
|
||||
{
|
||||
"name" : "20070711 Re: Advisory - Clam AntiVirus RAR File Handling Denial Of Service Vulnerability.",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473373/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473373/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070731 FLEA-2007-0037-1 unrar",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/475155/30/5610/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/475155/30/5610/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "39603",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20080229 rPSA-2008-0094-1 kernel",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/488972/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/488972/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugzilla.kernel.org/show_bug.cgi?id=8765",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20070720 rPSA-2007-0148-1 firefox thunderbird",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474226/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474226/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070724 FLEA-2007-0033-1: firefox thunderbird",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474542/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474542/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-18.html",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20070720 rPSA-2007-0148-1 firefox thunderbird",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474226/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474226/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070724 FLEA-2007-0033-1: firefox thunderbird",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474542/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474542/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-18.html",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20070720 rPSA-2007-0148-1 firefox thunderbird",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474226/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474226/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070724 FLEA-2007-0033-1: firefox thunderbird",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474542/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474542/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-19.html",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20070720 rPSA-2007-0148-1 firefox thunderbird",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474226/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474226/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070724 FLEA-2007-0033-1: firefox thunderbird",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474542/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474542/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-21.html",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20070720 rPSA-2007-0148-1 firefox thunderbird",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474226/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474226/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070724 FLEA-2007-0033-1: firefox thunderbird",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474542/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474542/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.mozilla.org/security/announce/2007/mfsa2007-25.html",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070906 iTunes 7.3.x - Heap overflow in album cover parsing",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/478750/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/478750/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "https://www.isecpartners.com/advisories/2007-005-itunes.txt",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070706 Another You tube clone script vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473192/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473192/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://chxsecurity.org/advisories/adv-2-mid.txt",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070711 Powered By Dvbbs Version 7.1.0 Sp1 By Pass",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473374/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473374/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "39747",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070711 Advisory: Arbitrary kernel mode memory writes in AVG",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473360/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473360/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "24870",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473874/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473874/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[announce] 20070712 MySQL Community Server 5.0.45 has been released!",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473874/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473874/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[announce] 20070712 MySQL Community Server 5.0.45 has been released!",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473874/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473874/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[announce] 20070712 MySQL Community Server 5.0.45 has been released!",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070711 durito: enVivo!CMS SQL injection",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473355/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473355/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070711 durito: enVivo!CMS SQL injection",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070711 Calyptix Security Advisory CX-2007-05 - eSoft InstaGate EX2 Cross-Site Request Forgery Attack",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473663/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473663/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://labs.calyptix.com/CX-2007-05.php",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070711 Calyptix Security Advisory CX-2007-05 - eSoft InstaGate EX2 Cross-Site Request Forgery Attack",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473663/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473663/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://labs.calyptix.com/CX-2007-05.php",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070711 Calyptix Security Advisory CX-2007-05 - eSoft InstaGate EX2 Cross-Site Request Forgery Attack",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473663/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473663/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://labs.calyptix.com/CX-2007-05.php",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070713 AzDG Dating Gold v3.0.5 ===> Remote File Include Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473664/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473664/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "24910",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070720 rPSA-2007-0147-1 tcpdump",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474225/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474225/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070713 [scip_Advisory 3159] SiteScape forum prior 7.3 Cross Site Scripting",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473624/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473624/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=3159",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070712 MkPortal - Multiple SQL Injection Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473495/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473495/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "4179",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070716 WhitePapers By SecNiche Security",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473707/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473707/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070721 [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos",
|
||||
@ -65,7 +65,7 @@
|
||||
{
|
||||
"name" : "20070721 Re: [WEB SECURITY] [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474474/100/200/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474474/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070721 [CVE-2007-3816][Advisory] JWIG Context-Dependent Template Calling Dos",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20070713 Opera/Konqueror: data: URL scheme address bar spoofing",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473703/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473703/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070716 Re: Opera/Konqueror: data: URL scheme address bar spoofing",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473782/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473782/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://alt.swiecki.net/oper1.html",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20070713 Opera/Konqueror: data: URL scheme address bar spoofing",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473703/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473703/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070714 Re: Opera/Konqueror: data: URL scheme address bar spoofing",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473712/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473712/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://alt.swiecki.net/oper1.html",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070714 Session Riding and multiple XSS in WebCit",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473714/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473714/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "24913",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070714 Session Riding and multiple XSS in WebCit",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473714/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473714/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "24913",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070713 MSIE7 entrapment again (+ FF tidbit)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473702/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473702/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://lcamtuf.coredump.cx/ietrap3/",
|
||||
@ -65,12 +65,12 @@
|
||||
{
|
||||
"name" : "HPSBST02280",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/482366/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/482366/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT071480",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/482366/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/482366/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MS07-057",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070713 MSIE7 entrapment again (+ FF tidbit)",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473702/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473702/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "2892",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070716 ExLibris Aleph and Metalib Cross Site Scripting Attack",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473785/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473785/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://escarpment.net/exlibris.txt",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070716 ExLibris Aleph and Metalib Cross Site Scripting Attack",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473785/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473785/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070716 ExLibris Aleph and Metalib Cross Site Scripting Attack",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20070801 FLEA-2007-0039-1 firefox",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/475265/100/200/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/475265/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070803 FLEA-2007-0040-1 thunderbird",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/475450/30/5550/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/475450/30/5550/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugzilla.mozilla.org/show_bug.cgi?id=388121",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20070801 FLEA-2007-0039-1 firefox",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/475265/100/200/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/475265/100/200/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070803 FLEA-2007-0040-1 thunderbird",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/475450/30/5550/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/475450/30/5550/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://bugzilla.mozilla.org/show_bug.cgi?id=389580",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20090821 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/505990/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/505990/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[apache-cvs] 20070801 svn commit: r561616 - in /httpd/httpd/trunk: CHANGES",
|
||||
|
@ -60,22 +60,22 @@
|
||||
{
|
||||
"name" : "20070815 Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/476677/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/476677/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070816 Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/476803/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/476803/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070814 COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/476464/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/476464/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070814 Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/476538/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/476538/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "[openwall-announce] 20070814 Linux 2.4.35-ow2",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20070718 Oracle Security: Insert / Update / Delete Data via Views",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473997/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473997/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070721 Oracle bad Views - Exploit released",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474326/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474326/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://rawlab.mindcreations.com/codes/exp/oracle/bunkerview.sql",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070718 Oracle Security: SQL Injection in APEX CHECK_DB_PASSWORD",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474002/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474002/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070724 Oracle E-Business Suite - Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474515/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474515/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070724 Oracle E-Business Suite - Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474515/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474515/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070724 Oracle E-Business Suite - Multiple Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474515/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474515/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://www.integrigy.com/security-resources/analysis/Integrigy_Oracle_CPU_July_2007_Analysis.pdf",
|
||||
|
@ -60,17 +60,17 @@
|
||||
{
|
||||
"name" : "20070725 [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474601/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474601/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070726 RE: [CAID 35525, 35526]: CA Products Arclib Library Denial of Service Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474683/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474683/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20070725 n.runs-SA-2007.024 - CA eTrust Antivirus Infinite Loop DoS (remote) Advisory",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/474605/100/100/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/474605/100/100/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://supportconnectw.ca.com/public/antivirus/infodocs/caprodarclib-secnot.asp",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070909 Husrev Forums v2.0.1:PoWerBoard Sql",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/478974/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/478974/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "http://yollubunlar.org/husrev-forums-v201powerboard-sql-injection-exploit-3503.html",
|
||||
|
@ -55,7 +55,7 @@
|
||||
{
|
||||
"name" : "20070717 Insanely simple blog - Multiple vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473868/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473868/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "24934",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "20070717 Insanely simple blog - Multiple vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/473868/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/473868/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "20080610 [web-app] Insanely Simple Blog 0.5 (index) Remote SQL Injection Vulnerabilities",
|
||||
"refsource" : "BUGTRAQ",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/493224/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/493224/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "5774",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "HPSBST02280",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/482366/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/482366/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT071480",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/482366/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/482366/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MS07-057",
|
||||
|
@ -55,12 +55,12 @@
|
||||
{
|
||||
"name" : "HPSBST02280",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/482366/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/482366/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "SSRT071480",
|
||||
"refsource" : "HP",
|
||||
"url" : "http://www.securityfocus.com/archive/1/archive/1/482366/100/0/threaded"
|
||||
"url" : "http://www.securityfocus.com/archive/1/482366/100/0/threaded"
|
||||
},
|
||||
{
|
||||
"name" : "MS07-057",
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user