This reference map lists the various references for MISC and
provides the associated CVE entries or candidates. It uses data from
CVE version 20061101 and candidates that were active as of
2022-07-07.
Note that the list of references may not be complete.
MISC:20190228 Qkr! with MasterPass iOS Application - MITM SSL Certificate Vulnerability (CVE-2019-6702) |
CVE-2019-6702
|
MISC:[Qemu-devel][PULL 65/65] 20190114 slirp: check data length while emulating ident |
CVE-2019-6778
|
MISC:[oss-security] 20120201 Re: CVE Request (two ids) -- Xchat-WDK (prior 1499-4 [2012-01-18]) and Xchat-v2.8.6 on Maemo architecture -- Heap-based buffer overflow by processing UTF-8 line from server containing characters outside BMP |
CVE-2012-0828
|
MISC:[oss-security] 20120228 Re: CVE request: init script x11-common creates directories in insecure manners |
CVE-2012-1093
|
MISC:[oss-security] 20120301 Re: CVE request: init script x11-common creates directories in insecure manners |
CVE-2012-1093
|
MISC:[oss-security] 20190124 CVE-2019-6778 QEMU: slirp: heap buffer overflow in tcp_emu() |
CVE-2019-6778
|
MISC:[oss-security] 20190218 Linux kernel: three KVM bugs (CVE-2019-6974, CVE-2019-7221, CVE-2019-7222) |
CVE-2019-7221
|
MISC:ftp://ftp.4d.com/ACI_PRODUCT_REFERENCE_LIBRARY/4D_PRODUCT_DOCUMENTATION/PDF_Docs_by_4D_Product_A-Z/4D_WebSTAR/Software_Change_History.txt |
CVE-2004-0695 CVE-2004-0696 CVE-2004-0697 CVE-2004-0698
|
MISC:ftp://ftp.aerasec.de/pub/advisories/kav4unix/kav4unix-local-root-exploit.txt |
CVE-2005-2582
|
MISC:ftp://ftp.apcftp.com/hardware/webcard/firmware/sy/v310/install.txt |
CVE-2001-0564
|
MISC:ftp://ftp.caldera.com/pub/updates/OpenUNIX/CSSA-2002-SCO.29/CSSA-2002-SCO.29.txt |
CVE-2002-0885
|
MISC:ftp://ftp.dell.com/Manuals/Common/integrated-dell-remote-access-cntrllr-6-for-monolithic-srvr-v1.95_FAQ2_en-us.pdf |
CVE-2013-4783 CVE-2013-4785
|
MISC:ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02%3A05.asc |
CVE-2002-0803
|
MISC:ftp://ftp.gnome.org/pub/GNOME/stable/sources/libgtop/libgtop-1.0.13.tar.gz |
CVE-2001-0927
|
MISC:ftp://ftp.graphicsmagick.org/pub/GraphicsMagick/snapshots/ChangeLog.txt |
CVE-2017-16352 CVE-2017-16353
|
MISC:ftp://ftp.isc.org/isc/dhcp/dhcp-1.0-history/dhcp-1.0.0-1.0pl1.diff.gz |
CVE-1999-0808
|
MISC:ftp://ftp.kde.org/pub/kde/security_patches/post-3.4.2-kdebase-kcheckpass.diff |
CVE-2005-2494
|
MISC:ftp://ftp.linksys.com/pub/befsr41/befvp41-1402.zip |
CVE-2002-0426
|
MISC:ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch |
CVE-2000-0994 CVE-2000-0995 CVE-2000-0996 CVE-2000-0997 CVE-2000-0998 CVE-2000-0999
|
MISC:ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.7/common/008_fd.patch |
CVE-2006-0098
|
MISC:ftp://ftp.openbsd.org/pub/OpenBSD/patches/4.3/common/013_pf.patch |
CVE-2009-0687
|
MISC:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.2-webrick-dos-1.patch |
CVE-2006-1931
|
MISC:ftp://ftp.ruby-lang.org/pub/ruby/1.8/ruby-1.8.2-xmlrpc-dos-1.patch |
CVE-2006-1931
|
MISC:ftp://ftp.simplesystems.org/pub/png-group/src/libpng-1.5.1beta01-README.txt |
CVE-2011-0408
|
MISC:ftp://ftp.software.ibm.com/pc/pccbbs/pc_servers/dir5.10.3_docs_relnotes.pdf |
CVE-2005-2969
|
MISC:ftp://ftp.support.acer-euro.com/utilities/LaunchAppFix/AcerLAppFix.zip |
CVE-2006-6121
|
MISC:ftp://ftp.symantec.com/public/english_us_canada/products/symantec_mail_security/5.0_smtp/updates/release_notes_p175.txt |
CVE-2007-1252
|
MISC:ftp://ftp.us.dell.com/sysman/readme_160_A00.txt |
CVE-2007-4360
|
MISC:ftp://ftp.zyxel.com/public/zywall10/firmware/zywall10_V3.50(WA.2)C0_Standard.zip |
CVE-2002-0438
|
MISC:ftp://ftp2.dlink.com/PRODUCTS/DCS-936L/REVA/BETA/DCS-936L_REVA_RELEASE_NOTES_v1.05.07_EN.pdf |
CVE-2017-7851
|
MISC:ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DAP-1650/REVA/DAP-1650_REVA_RELEASE_NOTES_v1.04B02_J65H.pdf |
CVE-2019-12768
|
MISC:ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-600M/REVC/DIR-600M_REVC_FIRMWARE_PATCH_NOTES_3.05B01_EN.pdf |
CVE-2017-10676
|
MISC:ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-615/REVT/DIR-615_REVT_FIRMWARE_PATCH_v20.12PTb04.zip |
CVE-2017-7404 CVE-2017-7405 CVE-2017-7406
|
MISC:ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-615/REVT/DIR-615_REVT_RELEASE_NOTES_20.12PTB04.pdf |
CVE-2017-11436
|
MISC:ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-655/REVC/DIR-655_REVC_RELEASE_NOTES_v3.02B05_BETA03.pdf |
CVE-2019-13560 CVE-2019-13561 CVE-2019-13562 CVE-2019-13563
|
MISC:ftp://ftpna.beasys.com/pub/releases/security/patch_CR259534_81SP5.zip |
CVE-2006-1358
|
MISC:ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX |
CVE-1999-1286 CVE-1999-1410
|
MISC:http://007software.net/multiple-cross-site-scripting-in-netgear-router-version1-0-0-24/ |
CVE-2016-11016
|
MISC:http://0a29.blogspot.com/2011/11/0a29-11-1-cross-site-scripting.html |
CVE-2011-5184
|
MISC:http://0a29.blogspot.com/2011/12/0a29-11-2-privilege-escalation.html |
CVE-2011-4834
|
MISC:http://0day.2600.ir/exploits/3900 |
CVE-2007-2715
|
MISC:http://0day.2600.ir/exploits/3901 |
CVE-2007-2643
|
MISC:http://0day.2600.ir/exploits/3903 |
CVE-2007-2647
|
MISC:http://0day.today/exploits/28864 |
CVE-2017-15580
|
MISC:http://0day5.com/archives/1346/ |
CVE-2017-17731
|
MISC:http://0day5.com/archives/1542/ |
CVE-2017-17730
|
MISC:http://0dd.zone/2018/04/23/UMLet-XXE/ |
CVE-2018-1000548
|
MISC:http://0nto.wordpress.com/2012/02/13/sths-v2-web-portal-2-2-sql-injection-vulnerabilty/ |
CVE-2012-1217
|
MISC:http://0x000000.com/index.php?i=409 |
CVE-2007-4557
|
MISC:http://0x1byte.blogspot.com/2011/04/php-phar-extension-heap-overflow.html |
CVE-2012-2386
|
MISC:http://0x6a616d6573.blogspot.com/2011/07/phpmyadmin-fud.html |
CVE-2011-2507
|
MISC:http://0x90.com.ar/Advisory/20071031.txt |
CVE-2007-5818
|
MISC:http://0x90.com.ar/Advisory/20071106.txt |
CVE-2007-5918
|
MISC:http://0x90.com.ar/Advisory/20080321.txt |
CVE-2008-1492
|
MISC:http://0x90.com.ar/Advisory/20080920-2.txt |
CVE-2008-6038
|
MISC:http://0x90.eu/ff_tls_poc.html |
CVE-2007-4879
|
MISC:http://0xhuesca.com/cve-2019-18655.html |
CVE-2019-18655
|
MISC:http://1.337.zone/2019/04/07/intelbras-iwr-3000n-1-5-0-unproper-de-authorization/ |
CVE-2019-11414
|
MISC:http://104.207.151.48/woo-feed-manage-list.php |
CVE-2019-1010124
|
MISC:http://10degres.net/cve-2016-11018-image-gallery-sql-injection/ |
CVE-2016-11018
|
MISC:http://118.89.230.52/about/details.docx |
CVE-2017-11651
|
MISC:http://1337day.com/exploits/13067 |
CVE-2010-4966
|
MISC:http://1337day.com/exploits/15481 |
CVE-2009-0302
|
MISC:http://1337day.com/exploits/17325 |
CVE-2012-5294
|
MISC:http://1337day.com/exploits/17328 |
CVE-2012-5300
|
MISC:http://14house.blogspot.com/2007/01/fastilo-open-source-shopping-cart-vuln.html |
CVE-2007-0258
|
MISC:http://14house.blogspot.com/2007/01/freewebshoporg-remote-file-inclusion.html |
CVE-2007-0531
|
MISC:http://14house.blogspot.com/2007/08/acg-news-sql-injection.html |
CVE-2007-4603
|
MISC:http://14house.blogspot.com/2007/08/arcadem-rfi-sql-injection-flaws.html |
CVE-2007-4551 CVE-2007-4552
|
MISC:http://14house.blogspot.com/2007/08/phpns-sql-injection.html |
CVE-2007-4628
|
MISC:http://14house.blogspot.com/2007/09/e-smart-cart-sql-injection.html |
CVE-2007-4762
|
MISC:http://1v1.name/show-283-1.html |
CVE-2007-5064
|
MISC:http://2012.appsec-forum.ch/conferences/#c17 |
CVE-2012-5370 CVE-2012-5371 CVE-2012-5372 CVE-2012-5373 CVE-2012-6051
|
MISC:http://2016.hack.lu/archive/2016/Wavestone%20-%20Hack.lu%202016%20-%20Hadoop%20safari%20-%20Hunting%20for%20vulnerabilities%20-%20v1.0.pdf |
CVE-2016-4946 CVE-2016-4947 CVE-2016-4948 CVE-2016-4949 CVE-2016-4950
|
MISC:http://207.202.218.172/ |
CVE-2001-1031
|
MISC:http://4004securityproject.wordpress.com/2009/10/21/erotik-auktionshaus-sql-injection-news-php/ |
CVE-2010-0720
|
MISC:http://4004securityproject.wordpress.com/2010/02/21/ero-auktion-2010-sql-injection-news-php/ |
CVE-2010-0723
|
MISC:http://4004securityproject.wordpress.com/2010/02/21/ero-auktion-v-2-0-sql-injection-news-php/ |
CVE-2010-0723
|
MISC:http://4004securityproject.wordpress.com/2010/02/22/php-auktion-pro-sql-injection-news-php/ |
CVE-2010-0722
|
MISC:http://4004securityproject.wordpress.com/2010/02/26/dz-erotik-auktionshaus-v-4-rgo-news-php-sql-injection/ |
CVE-2010-1094
|
MISC:http://4004securityproject.wordpress.com/2010/02/28/uigafanclub-index-php-sql-injection/ |
CVE-2010-1365
|
MISC:http://4004securityproject.wordpress.com/2010/03/03/smartplugs-1-3-sql-injection-showplugs-php |
CVE-2010-1271
|
MISC:http://4004securityproject.wordpress.com/2010/03/07/bild-flirt-system-v2-0-index-php-id-sql-injection/ |
CVE-2010-0955
|
MISC:http://4004securityproject.wordpress.com/2010/03/11/eros-erotik-webkatalog-start-php-rubrikidsql-injection/ |
CVE-2010-0964
|
MISC:http://4004securityproject.wordpress.com/2010/03/14/phppool-media-domain-verkaufs-und-auktions-portal-index-php-sql-injection/ |
CVE-2010-0973
|
MISC:http://4004securityproject.wordpress.com/2010/03/16/phpscripte24-auktionshaus-community-standart-system/ |
CVE-2010-1270
|
MISC:http://4004securityproject.wordpress.com/2010/03/18/phpscripte24-niedrig-gebote-pro-auktions-system-ii-blind-sql-injection-auktion-php/ |
CVE-2010-1269
|
MISC:http://4004securityproject.wordpress.com/2010/03/20/pay-per-watch-bid-auktions-system-blind-sql-injection-auktion-php-id_auk/ |
CVE-2010-1855
|
MISC:http://4004securityproject.wordpress.com/2010/03/22/woltlab-burning-board-teamsite-hack-v3-0-ts_other-php-sql-injection-exploit-2/ |
CVE-2010-1338
|
MISC:http://445544.44.ohost.de/worldlabburningboardadon2python-1.txt |
CVE-2010-1338
|
MISC:http://45.32.113.185/075a6fa2d5db3bf3457896bee6db6787.html |
CVE-2018-8827
|
MISC:http://50.56.33.56/blog/?p=314 |
CVE-2012-6636 CVE-2013-4710
|
MISC:http://52.117.224.77/xfce4-pdos.webm |
CVE-2018-15120
|
MISC:http://62.131.86.111/analysis.htm |
CVE-2004-0549
|
MISC:http://64.38.62.221/ariasecucom/forum/showthread.php?t=89 |
CVE-2007-0152
|
MISC:http://74.124.215.220/~projclient/client/auditor/profile.php |
CVE-2019-7553
|
MISC:http://85.10.222.122/mantis/public_show_bug.php?bug_id=452 |
CVE-2007-3581
|
MISC:http://9to5mac.com/2015/05/27/how-to-fix-ios-text-message-bug-crash-reboot/ |
CVE-2015-1157
|
MISC:http://NeoSecurityTeam.net/advisories/Advisory-17.txt |
CVE-2005-2110 CVE-2005-4463 CVE-2006-0985 CVE-2006-0986
|
MISC:http://a3100r.com |
CVE-2021-44620 CVE-2021-46006 CVE-2021-46007 CVE-2021-46008 CVE-2021-46009 CVE-2021-46010
|
MISC:http://abbyydownloads.com/fc12/PreviousReleaseNotes/ReleaseNotes_FC12_R1_U3_1299.18_build_12.0.1.516.pdf |
CVE-2018-13791 CVE-2018-13793
|
MISC:http://abdilahrf.github.io/login-rate-limiting-bypass |
CVE-2018-11678
|
MISC:http://abhikafle.com.np/opera-url-spoofing-poc/ |
CVE-2016-4075
|
MISC:http://ac15v10.com |
CVE-2021-44971
|
MISC:http://ac23.com |
CVE-2022-32384 CVE-2022-32385 CVE-2022-32386
|
MISC:http://ac68u.com |
CVE-2021-45757
|
MISC:http://aceware.com |
CVE-2022-24238 CVE-2022-24239 CVE-2022-24240 CVE-2022-24241 CVE-2022-24581
|
MISC:http://aceweb.com |
CVE-2022-24238 CVE-2022-24239 CVE-2022-24240 CVE-2022-24241 CVE-2022-24581
|
MISC:http://acexy.com |
CVE-2021-28936 CVE-2021-28937
|
MISC:http://acid-root.new.fr/advisories/09290806.txt |
CVE-2006-4528 CVE-2006-4529
|
MISC:http://acid-root.new.fr/advisories/10060904.txt |
CVE-2006-4631 CVE-2006-4632 CVE-2006-4633
|
MISC:http://acid-root.new.fr/poc/08060901.txt |
CVE-2006-4595
|
MISC:http://acid-root.new.fr/poc/09060902.txt |
CVE-2006-4601
|
MISC:http://acid-root.new.fr/poc/10060903.txt |
CVE-2006-4584 CVE-2006-4585 CVE-2006-4586
|
MISC:http://acid-root.new.fr/poc/12060927.txt |
CVE-2006-5085 CVE-2006-5086
|
MISC:http://acid-root.new.fr/poc/13061007.txt |
CVE-2006-5259 CVE-2006-5314 CVE-2006-5315 CVE-2006-5316 CVE-2006-5317 CVE-2006-5318 CVE-2006-5319 CVE-2006-5320
|
MISC:http://acid-root.new.fr/poc/14061118.txt |
CVE-2006-6280
|
MISC:http://acid-root.new.fr/poc/15061124.txt |
CVE-2006-6253 CVE-2006-6254
|
MISC:http://acid-root.new.fr/poc/16061221.txt |
CVE-2006-6754 CVE-2006-6755 CVE-2006-6756
|
MISC:http://acid-root.new.fr/poc/17061224.txt |
CVE-2006-6849
|
MISC:http://acid-root.new.fr/poc/18070102.txt |
CVE-2007-0093
|
MISC:http://acid-root.new.fr/poc/19070104.txt |
CVE-2007-0115 CVE-2007-0122
|
MISC:http://acid-root.new.fr/poc/20070107.txt |
CVE-2007-0202 CVE-2007-0205
|
MISC:http://acid-root.new.fr/poc/21070125.txt |
CVE-2007-0596 CVE-2007-0597 CVE-2007-0598 CVE-2007-0599 CVE-2007-0601
|
MISC:http://acidr00t.free.fr/poc/sturgeonupv1.txt |
CVE-2006-3381
|
MISC:http://activemq.apache.org/security-advisories.data/CVE-2020-11998-announcement.txt |
CVE-2020-11998
|
MISC:http://activemq.apache.org/security-advisories.data/CVE-2020-13920-announcement.txt |
CVE-2020-13920
|
MISC:http://activemq.apache.org/security-advisories.data/CVE-2020-13947-announcement.txt |
CVE-2020-13947
|
MISC:http://activemq.apache.org/security-advisories.data/CVE-2020-1941-announcement.txt |
CVE-2020-1941
|
MISC:http://adamcaudill.com/2012/08/12/neoinvoice-blind-sql-injection-cve-2012-3477/ |
CVE-2012-3477 CVE-2012-4673
|
MISC:http://adamziaja.com/poc/201312-xss-mybb.html |
CVE-2014-3826
|
MISC:http://adamziaja.com/poc/201401-xss-otrs.html |
CVE-2014-1695
|
MISC:http://addict3d.org/index.php?page=viewarticle&type=security&ID=4377 |
CVE-2005-2141
|
MISC:http://addict3d.org/index.php?page=viewarticle&type=security&ID=5268 |
CVE-2005-3696
|
MISC:http://adodb.cvs.sourceforge.net/adodb/adodb_official/adodb-postgres7.inc.php?revision=1.1&view=markup |
CVE-2006-4618
|
MISC:http://adrianhayter.com/exploits.php |
CVE-2015-1516 CVE-2015-4552 CVE-2017-14652
|
MISC:http://adsystems.com.pl/adg-mod_security171.txt |
CVE-2003-1171
|
MISC:http://adtran.com |
CVE-2021-25679 CVE-2021-25680 CVE-2021-25681
|
MISC:http://adv.salvatorefresta.net/Amblog_1.0_Joomla_Component_Multiple_SQL_Injection_Vulnerabilities-10082010.txt |
CVE-2010-4937
|
MISC:http://adv.salvatorefresta.net/JE_Guestbook_1.0_Joomla_Component_Multiple_Remote_Vulnerabilities-30092010.txt |
CVE-2010-4865
|
MISC:http://adv.salvatorefresta.net/JQuarks4s_Joomla_Component_1.0.0_Blind_SQL_Injection_Vulnerability-08112010.txt |
CVE-2010-4638
|
MISC:http://adv.salvatorefresta.net/JS_Calendar_1.5.1_Joomla_Component_Multiple_Remote_Vulnerabilities-09102010.txt |
CVE-2010-4794 CVE-2010-4795
|
MISC:http://adv.salvatorefresta.net/TTVideo_1.0_Joomla_Component_SQL_Injection_Vulnerability-27072010.txt |
CVE-2010-2909
|
MISC:http://adv.salvatorefresta.net/Teams_1_1028_100809_1711_Joomla_Component_Multiple_Blind_SQL_Injection_Vulnerabilities-10082010.txt |
CVE-2010-4941
|
MISC:http://adv.salvatorefresta.net/allCineVid_Joomla_Component_1.0.0_Blind_SQL_Injection_Vulnerability-18012011.txt |
CVE-2011-0511
|
MISC:http://advanced.com |
CVE-2022-24138 CVE-2022-24139 CVE-2022-24140 CVE-2022-27438
|
MISC:http://advisories.ariko-security.com/2012/audyt_bezpieczenstwa_2m2.html |
CVE-2012-4928
|
MISC:http://advisories.ariko-security.com/november/audyt_bezpieczenstwa_745.html |
CVE-2010-4631 CVE-2010-4632
|
MISC:http://advisories.echo.or.id/adv/adv27-K-159-2006.txt |
CVE-2006-1653
|
MISC:http://advisories.echo.or.id/adv/adv28-K-159-2006.txt |
CVE-2006-1718
|
MISC:http://advisories.echo.or.id/adv/adv30-theday-2006.txt |
CVE-2006-2107
|
MISC:http://advisories.echo.or.id/adv/adv31-y3dips-2006.txt |
CVE-2006-2806
|
MISC:http://advisories.echo.or.id/adv/adv32-K-159-2006.txt |
CVE-2006-7012
|
MISC:http://advisories.echo.or.id/adv/adv33-K-159-2006.txt |
CVE-2006-3185
|
MISC:http://advisories.echo.or.id/adv/adv36-matdhule-2006.txt |
CVE-2006-3556
|
MISC:http://advisories.echo.or.id/adv/adv37-matdhule-2006.txt |
CVE-2006-3530
|
MISC:http://advisories.echo.or.id/adv/adv38-matdhule-2006.txt |
CVE-2006-3749 CVE-2006-3750 CVE-2006-3751
|
MISC:http://advisories.echo.or.id/adv/adv39-matdhule-2006.txt |
CVE-2006-3690
|
MISC:http://advisories.echo.or.id/adv/adv40-matdhule-2006.txt |
CVE-2006-3771
|
MISC:http://advisories.echo.or.id/adv/adv41-theday-2006.txt |
CVE-2006-3931
|
MISC:http://advisories.echo.or.id/adv/adv42-theday-2006.txt |
CVE-2006-4057
|
MISC:http://advisories.echo.or.id/adv/adv43-matdhule-2006.txt |
CVE-2006-4051
|
MISC:http://advisories.echo.or.id/adv/adv44-matdhule-2006.txt |
CVE-2006-4052
|
MISC:http://advisories.echo.or.id/adv/adv45-K-159-2006.txt |
CVE-2006-4196
|
MISC:http://advisories.echo.or.id/adv/adv46-matdhule-2006.txt |
CVE-2006-4544
|
MISC:http://advisories.echo.or.id/adv/adv47-theday-2006.txt |
CVE-2006-4975
|
MISC:http://advisories.echo.or.id/adv/adv48-theday-2006.txt |
CVE-2006-5220
|
MISC:http://advisories.echo.or.id/adv/adv49-theday-2006.txt |
CVE-2006-5243
|
MISC:http://advisories.echo.or.id/adv/adv50-theday-2006.txt |
CVE-2006-5244
|
MISC:http://advisories.echo.or.id/adv/adv51-K-159-2006.txt |
CVE-2006-5240
|
MISC:http://advisories.echo.or.id/adv/adv52-theday-2006.txt |
CVE-2006-5241
|
MISC:http://advisories.echo.or.id/adv/adv53-K-159-2006.txt |
CVE-2006-5627
|
MISC:http://advisories.echo.or.id/adv/adv54-theday-2006.txt |
CVE-2006-5289
|
MISC:http://advisories.echo.or.id/adv/adv55-theday-2006.txt |
CVE-2006-5402
|
MISC:http://advisories.echo.or.id/adv/adv57-theday-2006.txt |
CVE-2006-5796
|
MISC:http://advisories.echo.or.id/adv/adv58-theday-2006.txt |
CVE-2006-5768
|
MISC:http://advisories.echo.or.id/adv/adv59-theday-2006.txt |
CVE-2006-7194
|
MISC:http://advisories.echo.or.id/adv/adv60-theday-2006.txt |
CVE-2006-5795 CVE-2006-5811
|
MISC:http://advisories.echo.or.id/adv/adv61-matdhule-2006.txt |
CVE-2006-6078
|
MISC:http://advisories.echo.or.id/adv/adv65-K-159-2007.txt |
CVE-2007-0900
|
MISC:http://advisories.echo.or.id/adv/adv66-K-159-2007.txt |
CVE-2007-1060
|
MISC:http://advisories.echo.or.id/adv/adv67-K-159-2007.txt |
CVE-2007-1391
|
MISC:http://advisories.echo.or.id/adv/adv68-K-159-2007.txt |
CVE-2007-1415
|
MISC:http://advisories.echo.or.id/adv/adv69-K-159-2007.txt |
CVE-2007-1446
|
MISC:http://advisories.echo.or.id/adv/adv71-theday-2007.txt |
CVE-2007-1571
|
MISC:http://advisories.echo.or.id/adv/adv72-theday-2007.txt |
CVE-2007-1458
|
MISC:http://advisories.echo.or.id/adv/adv73-K-159-2007.txt |
CVE-2007-1439
|
MISC:http://advisories.echo.or.id/adv/adv74-theday-2007.txt |
CVE-2007-1459
|
MISC:http://advisories.echo.or.id/adv/adv75-theday-2007.txt |
CVE-2007-1472
|
MISC:http://advisories.echo.or.id/adv/adv76-theday-2007.txt |
CVE-2007-1513
|
MISC:http://advisories.echo.or.id/adv/adv77-K-159-2007.txt |
CVE-2007-1628
|
MISC:http://advisories.echo.or.id/adv/adv78-K-159-2007.txt |
CVE-2007-1721
|
MISC:http://advisories.echo.or.id/adv/adv80-K-159-2007.txt |
CVE-2007-1787
|
MISC:http://advisories.echo.or.id/adv/adv81-K-159-2007.txt |
CVE-2007-2481 CVE-2007-2482
|
MISC:http://advisories.echo.or.id/adv/adv82-K-159-2007.txt |
CVE-2007-2483 CVE-2007-2484
|
MISC:http://advisories.echo.or.id/adv/adv83-K-159-2007.txt |
CVE-2007-4231
|
MISC:http://advisories.echo.or.id/adv/adv84-K-159-2007.txt |
CVE-2007-6058
|
MISC:http://advisories.echo.or.id/adv/adv85-K-159-2007.txt |
CVE-2007-6106
|
MISC:http://advisories.echo.or.id/adv/adv86-K-159-2007.txt |
CVE-2007-6362
|
MISC:http://advisories.echo.or.id/adv/adv88-K-159-2008.txt |
CVE-2008-2083
|
MISC:http://advisories.echo.or.id/adv/adv89-K-159-2008.txt |
CVE-2008-2087
|
MISC:http://advisories.echo.or.id/adv/adv91-K-159-2008.txt |
CVE-2008-2190
|
MISC:http://advisories.echo.or.id/adv/adv92-K-159-2008.txt |
CVE-2008-2189
|
MISC:http://advisories.echo.or.id/adv/adv93-K-159-2008.txt |
CVE-2008-2198
|
MISC:http://advisories.echo.or.id/adv/adv94-K-159-2008.txt |
CVE-2008-2199
|
MISC:http://advisories.mageia.org/MGASA-2013-0196.html |
CVE-2013-3551 CVE-2013-4088
|
MISC:http://advisory.patriotichackers.com/index.php?itemid=3 |
CVE-2006-1906
|
MISC:http://advisory.patriotichackers.com/index.php?itemid=5 |
CVE-2006-1972
|
MISC:http://advsys.net/ken/utils.htm |
CVE-2020-29384
|
MISC:http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html |
CVE-2021-27582
|
MISC:http://airscanner.com/security/05081201_verichat.htm |
CVE-2006-4614
|
MISC:http://airscanner.com/security/05081701_implus.htm |
CVE-2006-4615
|
MISC:http://airscanner.com/security/06062602_pocketexpensepro.htm |
CVE-2006-4745
|
MISC:http://airscanner.com/security/07080701_axis.htm |
CVE-2007-4926 CVE-2007-4927 CVE-2007-4928 CVE-2007-4929 CVE-2007-4930
|
MISC:http://airspan4wimax.googlepages.com/ |
CVE-2008-1262 CVE-2008-1542
|
MISC:http://aix.software.ibm.com/aix/efixes/security/cmsd_advisory.asc |
CVE-2010-4435
|
MISC:http://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js |
CVE-2021-37504
|
MISC:http://akat1.pl/?id=2 |
CVE-2016-6253
|
MISC:http://akky.xrea.jp/security/7-zip4.txt |
CVE-2017-2107
|
MISC:http://aktuell.ruhr-uni-bochum.de/pm2011/pm00330.html.de |
CVE-2011-1096
|
MISC:http://alastairs-place.net/2006/11/dmg-vulnerability/ |
CVE-2006-6061
|
MISC:http://algorithmia.com |
CVE-2021-42951
|
MISC:http://alguienenlafisi.blogspot.com/2013/10/dvr-tvt-directory-traversal.html |
CVE-2013-6023
|
MISC:http://alive.znep.com/~marcs/security/mozillacookie/demo.html |
CVE-2002-2013
|
MISC:http://all-community.de/pub/pages/changes.php?language=en |
CVE-2007-0516
|
MISC:http://almorabea.net/cve-2019-16902.txt |
CVE-2019-16902
|
MISC:http://almorabea.net/cves/cve-2020-7213.txt |
CVE-2020-7213
|
MISC:http://almorabea.net/en/2020/01/19/write-up-for-the-parallel-vulnerability-cve-2020-7213/ |
CVE-2020-7213
|
MISC:http://als.regnet.cz/fpm2/feedback/2 |
CVE-2012-3818
|
MISC:http://alt.swiecki.net/linux_kernel/sys_open-kmem_cache_alloc-2.6.39-rc4.txt |
CVE-2011-2184
|
MISC:http://alt.swiecki.net/oper1.html |
CVE-2007-3819 CVE-2007-3820
|
MISC:http://aluigi.altervista.org/adv/aa2k6x-adv.txt |
CVE-2006-1145 CVE-2006-1146 CVE-2006-1147
|
MISC:http://aluigi.altervista.org/adv/aa2k7x-adv.txt |
CVE-2007-4754 CVE-2007-4755
|
MISC:http://aluigi.altervista.org/adv/aaboompb-adv.txt |
CVE-2007-5249 CVE-2007-5250
|
MISC:http://aluigi.altervista.org/adv/acroagent-adv.txt |
CVE-2008-1280
|
MISC:http://aluigi.altervista.org/adv/acrogroup-adv.txt |
CVE-2008-1279
|
MISC:http://aluigi.altervista.org/adv/acropxe-adv.txt |
CVE-2008-1410 CVE-2008-1411
|
MISC:http://aluigi.altervista.org/adv/actp-adv.txt |
CVE-2004-1547 CVE-2004-1548 CVE-2004-1549 CVE-2004-2616
|
MISC:http://aluigi.altervista.org/adv/adplugbof-adv.txt |
CVE-2006-3581 CVE-2006-3582
|
MISC:http://aluigi.altervista.org/adv/almsrvx_1-adv.txt |
CVE-2011-4529 CVE-2011-4530 CVE-2011-4531 CVE-2011-4532
|
MISC:http://aluigi.altervista.org/adv/alsapbof-adv.txt |
CVE-2006-4089
|
MISC:http://aluigi.altervista.org/adv/amp2zero-adv.txt |
CVE-2005-0212
|
MISC:http://aluigi.altervista.org/adv/aquabof-adv.txt |
CVE-2006-7075
|
MISC:http://aluigi.altervista.org/adv/argonauti-adv.txt |
CVE-2008-1281
|
MISC:http://aluigi.altervista.org/adv/armadioz-adv.txt |
CVE-2009-2547
|
MISC:http://aluigi.altervista.org/adv/armazzo-adv.txt |
CVE-2009-2549
|
MISC:http://aluigi.altervista.org/adv/armazzofs-adv.txt |
CVE-2009-2548
|
MISC:http://aluigi.altervista.org/adv/armynchia-adv.txt |
CVE-2008-3492
|
MISC:http://aluigi.altervista.org/adv/asgulo-adv.txt |
CVE-2008-1320 CVE-2008-1321 CVE-2008-1322
|
MISC:http://aluigi.altervista.org/adv/asurabof-adv.txt |
CVE-2007-4508
|
MISC:http://aluigi.altervista.org/adv/asusvsbugs-adv.txt |
CVE-2005-3489 CVE-2005-3490
|
MISC:http://aluigi.altervista.org/adv/asuxdpc-adv.txt |
CVE-2008-1491
|
MISC:http://aluigi.altervista.org/adv/atrondos-adv.txt |
CVE-2006-3673 CVE-2006-3674
|
MISC:http://aluigi.altervista.org/adv/atvise_1-adv.txt |
CVE-2011-4873
|
MISC:http://aluigi.altervista.org/adv/badblue-adv.txt |
CVE-2007-6377 CVE-2007-6378 CVE-2007-6379
|
MISC:http://aluigi.altervista.org/adv/barradrive-adv.txt |
CVE-2007-6314 CVE-2007-6315 CVE-2007-6316 CVE-2007-6317
|
MISC:http://aluigi.altervista.org/adv/battlemages-adv.txt |
CVE-2004-2360
|
MISC:http://aluigi.altervista.org/adv/bcarrydos-adv.txt |
CVE-2005-3493
|
MISC:http://aluigi.altervista.org/adv/bcloneboom-adv.txt |
CVE-2006-4005 CVE-2006-4006
|
MISC:http://aluigi.altervista.org/adv/bf2urlz-adv.txt |
CVE-2010-2627
|
MISC:http://aluigi.altervista.org/adv/bfccown-adv.txt |
CVE-2005-2789 CVE-2005-2790 CVE-2005-2791
|
MISC:http://aluigi.altervista.org/adv/bontagobof-adv.txt |
CVE-2005-0501
|
MISC:http://aluigi.altervista.org/adv/bootixtftpd-adv.txt |
CVE-2008-1403
|
MISC:http://aluigi.altervista.org/adv/borfs-adv.txt |
CVE-2006-2537
|
MISC:http://aluigi.altervista.org/adv/brainzbof-adv.txt |
CVE-2006-4197
|
MISC:http://aluigi.altervista.org/adv/bv2x-adv.txt |
CVE-2007-4373 CVE-2007-4374 CVE-2007-4378 CVE-2007-4379
|
MISC:http://aluigi.altervista.org/adv/bzflagboom-adv.txt |
CVE-2005-4584
|
MISC:http://aluigi.altervista.org/adv/ca3dex-adv.txt |
CVE-2005-0671 CVE-2005-0672
|
MISC:http://aluigi.altervista.org/adv/carcbackazz-adv.txt |
CVE-2008-1979
|
MISC:http://aluigi.altervista.org/adv/cellfucktor-adv.txt |
CVE-2007-4832 CVE-2007-4838
|
MISC:http://aluigi.altervista.org/adv/chasercool-adv.txt |
CVE-2005-0693
|
MISC:http://aluigi.altervista.org/adv/chatany-ghost-adv.txt |
CVE-2004-1802
|
MISC:http://aluigi.altervista.org/adv/cheesebof-adv.txt |
CVE-2006-3814
|
MISC:http://aluigi.altervista.org/adv/chmpokbof-adv.txt |
CVE-2005-2639
|
MISC:http://aluigi.altervista.org/adv/chrome-boom-adv.txt |
CVE-2004-1831
|
MISC:http://aluigi.altervista.org/adv/closedview-adv.txt |
CVE-2008-1842
|
MISC:http://aluigi.altervista.org/adv/closedview_old-adv.txt |
CVE-2008-3544
|
MISC:http://aluigi.altervista.org/adv/closedviewx-adv.txt |
CVE-2008-0068 CVE-2008-1851 CVE-2008-1852 CVE-2008-1853
|
MISC:http://aluigi.altervista.org/adv/cnedrabof-adv.txt |
CVE-2005-1776
|
MISC:http://aluigi.altervista.org/adv/cod4statz-adv.txt |
CVE-2008-2106
|
MISC:http://aluigi.altervista.org/adv/codesys_1-adv.txt |
CVE-2011-5007 CVE-2011-5008 CVE-2011-5009 CVE-2011-5058
|
MISC:http://aluigi.altervista.org/adv/codmapbof-adv.txt |
CVE-2006-5058
|
MISC:http://aluigi.altervista.org/adv/cogent_1-adv.txt |
CVE-2011-3493
|
MISC:http://aluigi.altervista.org/adv/cogent_2-adv.txt |
CVE-2011-3500
|
MISC:http://aluigi.altervista.org/adv/cogent_3-adv.txt |
CVE-2011-3501
|
MISC:http://aluigi.altervista.org/adv/cogent_4-adv.txt |
CVE-2011-3502
|
MISC:http://aluigi.altervista.org/adv/crysislog-adv.txt |
CVE-2008-6737
|
MISC:http://aluigi.altervista.org/adv/csdoombof-adv.txt |
CVE-2006-1402 CVE-2006-1403
|
MISC:http://aluigi.altervista.org/adv/csdos.txt |
CVE-2003-1325 CVE-2006-0734
|
MISC:http://aluigi.altervista.org/adv/culplayer-adv.txt |
CVE-2007-6609
|
MISC:http://aluigi.altervista.org/adv/cyanuro-adv.txt |
CVE-2008-0755 CVE-2008-0756
|
MISC:http://aluigi.altervista.org/adv/d3engfspb-adv.txt |
CVE-2007-5248
|
MISC:http://aluigi.altervista.org/adv/daqfactory_1-adv.txt |
CVE-2011-3492
|
MISC:http://aluigi.altervista.org/adv/dawnfs-adv.txt |
CVE-2007-5265
|
MISC:http://aluigi.altervista.org/adv/dim3bof-adv.txt |
CVE-2006-7095 CVE-2006-7096
|
MISC:http://aluigi.altervista.org/adv/divxplayer-adv.txt |
CVE-2005-0304
|
MISC:http://aluigi.altervista.org/adv/doomsdayfs-adv.txt |
CVE-2006-1618
|
MISC:http://aluigi.altervista.org/adv/doubletakedown-adv.txt |
CVE-2008-0973 CVE-2008-0974 CVE-2008-0975 CVE-2008-0976 CVE-2008-0977 CVE-2008-0978 CVE-2008-0979
|
MISC:http://aluigi.altervista.org/adv/dpa_1-adv.txt |
CVE-2012-0406 CVE-2012-0407
|
MISC:http://aluigi.altervista.org/adv/dropteamz-adv.txt |
CVE-2007-5262 CVE-2007-5263 CVE-2007-5264
|
MISC:http://aluigi.altervista.org/adv/dualsbof-adv.txt |
CVE-2006-0304
|
MISC:http://aluigi.altervista.org/adv/dumbit-adv.txt |
CVE-2006-3668
|
MISC:http://aluigi.altervista.org/adv/dumsdei-adv.txt |
CVE-2007-4642
|
MISC:http://aluigi.altervista.org/adv/ecsqdamn-adv.txt |
CVE-2008-1984
|
MISC:http://aluigi.altervista.org/adv/emerdal-adv.txt |
CVE-2008-5284
|
MISC:http://aluigi.altervista.org/adv/empiredos-adv.txt |
CVE-2006-2393
|
MISC:http://aluigi.altervista.org/adv/enetx-adv.txt |
CVE-2006-1194 CVE-2006-1195
|
MISC:http://aluigi.altervista.org/adv/escaz-adv.txt |
CVE-2008-1221
|
MISC:http://aluigi.altervista.org/adv/esignal_1-adv.txt |
CVE-2011-3494
|
MISC:http://aluigi.altervista.org/adv/ethboom-adv.txt |
CVE-2004-1869
|
MISC:http://aluigi.altervista.org/adv/evilcube-adv.txt |
CVE-2006-1100 CVE-2006-1101 CVE-2006-1102
|
MISC:http://aluigi.altervista.org/adv/ezipirla-adv.txt |
CVE-2008-0758 CVE-2008-0759 CVE-2008-0767
|
MISC:http://aluigi.altervista.org/adv/fearfspb-adv.txt |
CVE-2007-5247
|
MISC:http://aluigi.altervista.org/adv/fengulo-adv.txt |
CVE-2007-6626 CVE-2007-6627 CVE-2007-6628 CVE-2007-6629 CVE-2007-6630
|
MISC:http://aluigi.altervista.org/adv/fenicex-adv.txt |
CVE-2006-2022 CVE-2006-2023
|
MISC:http://aluigi.altervista.org/adv/festahc-adv.txt |
CVE-2006-4024
|
MISC:http://aluigi.altervista.org/adv/flatfragz-adv.txt |
CVE-2005-3491 CVE-2005-3492
|
MISC:http://aluigi.altervista.org/adv/freecivx-adv.txt |
CVE-2006-3913
|
MISC:http://aluigi.altervista.org/adv/freesshdnull-adv.txt |
CVE-2008-0852
|
MISC:http://aluigi.altervista.org/adv/fsdbof-adv.txt |
CVE-2007-5256
|
MISC:http://aluigi.altervista.org/adv/ftplogsrvz-adv.txt |
CVE-2008-0608
|
MISC:http://aluigi.altervista.org/adv/funlabsboom-adv.txt |
CVE-2005-0848 CVE-2005-0849
|
MISC:http://aluigi.altervista.org/adv/gc2boom-adv.txt |
CVE-2004-1751
|
MISC:http://aluigi.altervista.org/adv/genecysbof-adv.txt |
CVE-2006-2554 CVE-2006-2555
|
MISC:http://aluigi.altervista.org/adv/ggwbof-adv.txt |
CVE-2005-3483
|
MISC:http://aluigi.altervista.org/adv/ggzcdos-adv.txt |
CVE-2006-1275
|
MISC:http://aluigi.altervista.org/adv/gliderbof-adv.txt |
CVE-2005-3485
|
MISC:http://aluigi.altervista.org/adv/gnefs-adv.txt |
CVE-2006-3908
|
MISC:http://aluigi.altervista.org/adv/gnunetzero-adv.txt |
CVE-2006-2413
|
MISC:http://aluigi.altervista.org/adv/goahead-adv3.txt |
CVE-2002-1603
|
MISC:http://aluigi.altervista.org/adv/grboom-adv.txt |
CVE-2004-2371
|
MISC:http://aluigi.altervista.org/adv/gskeyinuse-adv.txt |
CVE-2005-1504 CVE-2005-1556
|
MISC:http://aluigi.altervista.org/adv/gswsshit-adv.txt |
CVE-2008-0096 CVE-2008-0097
|
MISC:http://aluigi.altervista.org/adv/haloboom-adv.txt |
CVE-2004-1667
|
MISC:http://aluigi.altervista.org/adv/haloloop-adv.txt |
CVE-2005-1741
|
MISC:http://aluigi.altervista.org/adv/hgmcrash-adv.txt |
CVE-2004-2361
|
MISC:http://aluigi.altervista.org/adv/iceexec-adv.txt |
CVE-2004-1561
|
MISC:http://aluigi.altervista.org/adv/igi2fs-adv.txt |
CVE-2004-1900
|
MISC:http://aluigi.altervista.org/adv/ihudos-adv.txt |
CVE-2007-6103
|
MISC:http://aluigi.altervista.org/adv/ipsimene-adv.txt |
CVE-2008-0944 CVE-2008-0945 CVE-2008-0946
|
MISC:http://aluigi.altervista.org/adv/jamsgbof-adv.txt |
CVE-2005-0984
|
MISC:http://aluigi.altervista.org/adv/kailleraex-adv.txt |
CVE-2006-3491
|
MISC:http://aluigi.altervista.org/adv/lfscbof-adv.txt |
CVE-2007-5464
|
MISC:http://aluigi.altervista.org/adv/libnemesibof-adv.txt |
CVE-2007-6631
|
MISC:http://aluigi.altervista.org/adv/lieroxxx-adv.txt |
CVE-2006-1074 CVE-2006-1075
|
MISC:http://aluigi.altervista.org/adv/lithfs-adv.txt |
CVE-2004-1500
|
MISC:http://aluigi.altervista.org/adv/lithsock-adv.txt |
CVE-2004-1395
|
MISC:http://aluigi.altervista.org/adv/live555x-adv.txt |
CVE-2007-6036
|
MISC:http://aluigi.altervista.org/adv/lmmgt2ho-adv.txt |
CVE-2006-3879
|
MISC:http://aluigi.altervista.org/adv/lotr3boom-adv.txt |
CVE-2004-2165
|
MISC:http://aluigi.altervista.org/adv/lstnpsx-adv.txt |
CVE-2008-0763 CVE-2008-0764
|
MISC:http://aluigi.altervista.org/adv/maildisable-adv.txt |
CVE-2008-1276 CVE-2008-1277
|
MISC:http://aluigi.altervista.org/adv/meccaffi-adv.txt |
CVE-2008-1357
|
MISC:http://aluigi.altervista.org/adv/metastock_1-adv.txt |
CVE-2011-3488
|
MISC:http://aluigi.altervista.org/adv/mlipodbof-adv.txt |
CVE-2006-6547
|
MISC:http://aluigi.altervista.org/adv/mobilinkhof-adv.txt |
CVE-2008-0912
|
MISC:http://aluigi.altervista.org/adv/monopdx-adv.txt |
CVE-2006-1046
|
MISC:http://aluigi.altervista.org/adv/movicon_1-adv.txt |
CVE-2011-3491 CVE-2011-3498
|
MISC:http://aluigi.altervista.org/adv/movicon_3-adv.txt |
CVE-2011-3499
|
MISC:http://aluigi.altervista.org/adv/mptho-adv.txt |
CVE-2006-4192
|
MISC:http://aluigi.altervista.org/adv/mtaboom-adv.txt |
CVE-2005-3064
|
MISC:http://aluigi.altervista.org/adv/mtpbugs-adv.txt |
CVE-2005-1401 CVE-2005-1402
|
MISC:http://aluigi.altervista.org/adv/nasbugs-adv.txt |
CVE-2007-1543 CVE-2007-1544 CVE-2007-1545 CVE-2007-1546 CVE-2007-1547
|
MISC:http://aluigi.altervista.org/adv/nascarzero-adv.txt |
CVE-2006-3393
|
MISC:http://aluigi.altervista.org/adv/neoaxis_1-adv.txt |
CVE-2012-0907
|
MISC:http://aluigi.altervista.org/adv/neoenginex-adv.txt |
CVE-2006-6226 CVE-2006-6227
|
MISC:http://aluigi.altervista.org/adv/neromedia-adv.txt |
CVE-2008-1905
|
MISC:http://aluigi.altervista.org/adv/neronet-adv.txt |
CVE-2005-3484
|
MISC:http://aluigi.altervista.org/adv/netinsp-adv.txt |
CVE-2008-1400 CVE-2008-1401 CVE-2008-1402
|
MISC:http://aluigi.altervista.org/adv/netrekfs-adv.txt |
CVE-2007-1251
|
MISC:http://aluigi.altervista.org/adv/nfshp2cbof-adv.txt |
CVE-2004-2099
|
MISC:http://aluigi.altervista.org/adv/nowsmsz-adv.txt |
CVE-2008-0871
|
MISC:http://aluigi.altervista.org/adv/ocpbof-adv.txt |
CVE-2006-4046
|
MISC:http://aluigi.altervista.org/adv/officescaz-adv.txt |
CVE-2008-1365 CVE-2008-1366
|
MISC:http://aluigi.altervista.org/adv/openttdx-adv.txt |
CVE-2006-1998 CVE-2006-1999
|
MISC:http://aluigi.altervista.org/adv/outgunx-adv.txt |
CVE-2006-2399 CVE-2006-2400 CVE-2006-2401 CVE-2006-2402
|
MISC:http://aluigi.altervista.org/adv/ovbbccb_1-adv.txt |
CVE-2011-2608
|
MISC:http://aluigi.altervista.org/adv/packettrash-adv.txt |
CVE-2008-1311
|
MISC:http://aluigi.altervista.org/adv/painkkeybof-adv.txt |
CVE-2005-0330
|
MISC:http://aluigi.altervista.org/adv/panza-adv.txt |
CVE-2006-2575
|
MISC:http://aluigi.altervista.org/adv/panzone-adv.txt |
CVE-2005-2295
|
MISC:http://aluigi.altervista.org/adv/pbwebbof-adv.txt |
CVE-2006-2587
|
MISC:http://aluigi.altervista.org/adv/peercasthof-adv.txt |
CVE-2007-6454
|
MISC:http://aluigi.altervista.org/adv/perforces-adv.txt |
CVE-2008-1302 CVE-2008-1303 CVE-2008-1338
|
MISC:http://aluigi.altervista.org/adv/picobof-adv.txt |
CVE-2004-1854
|
MISC:http://aluigi.altervista.org/adv/plantvisor_1-adv.txt |
CVE-2011-3487
|
MISC:http://aluigi.altervista.org/adv/pqcorez-adv.txt |
CVE-2008-0693
|
MISC:http://aluigi.altervista.org/adv/pragmassh-adv.txt |
CVE-2008-0132
|
MISC:http://aluigi.altervista.org/adv/pragmatel-adv.txt |
CVE-2008-0153
|
MISC:http://aluigi.altervista.org/adv/prowizbof-adv.txt |
CVE-2007-6510
|
MISC:http://aluigi.altervista.org/adv/pulsex-adv.txt |
CVE-2007-1804
|
MISC:http://aluigi.altervista.org/adv/q3cbof-adv.txt |
CVE-2006-2875
|
MISC:http://aluigi.altervista.org/adv/q3cfilevar-adv.txt |
CVE-2006-3324 CVE-2006-3325
|
MISC:http://aluigi.altervista.org/adv/q3infoboom-adv.txt |
CVE-2005-0430
|
MISC:http://aluigi.altervista.org/adv/q3msgboom-adv.txt |
CVE-2005-0983
|
MISC:http://aluigi.altervista.org/adv/qnxph_1-adv.txt |
CVE-2013-2687 CVE-2013-2688
|
MISC:http://aluigi.altervista.org/adv/ragefreeze-adv.txt |
CVE-2004-1850
|
MISC:http://aluigi.altervista.org/adv/rakzero-adv.txt |
CVE-2005-1899
|
MISC:http://aluigi.altervista.org/adv/raydiumx-adv.txt |
CVE-2006-2408 CVE-2006-2409 CVE-2006-2410 CVE-2006-2411 CVE-2006-2412
|
MISC:http://aluigi.altervista.org/adv/rdrum-adv.txt |
CVE-2005-2375 CVE-2005-2376
|
MISC:http://aluigi.altervista.org/adv/remotelynowhere-adv.txt |
CVE-2008-1278
|
MISC:http://aluigi.altervista.org/adv/rintintin-adv.txt |
CVE-2008-0671 CVE-2008-0672 CVE-2008-0673
|
MISC:http://aluigi.altervista.org/adv/rorbof-adv.txt |
CVE-2007-6041
|
MISC:http://aluigi.altervista.org/adv/rpmlpdbof-adv.txt |
CVE-2008-0766
|
MISC:http://aluigi.altervista.org/adv/rslogix_1-adv.txt |
CVE-2011-3489
|
MISC:http://aluigi.altervista.org/adv/rsniff-adv.txt |
CVE-2004-1918
|
MISC:http://aluigi.altervista.org/adv/ruttorrent-adv.txt |
CVE-2008-0364
|
MISC:http://aluigi.altervista.org/adv/ruttorrent2-adv.txt |
CVE-2008-7166
|
MISC:http://aluigi.altervista.org/adv/sapone-adv.txt |
CVE-2008-0244
|
MISC:http://aluigi.altervista.org/adv/scadapro_1-adv.txt |
CVE-2011-3490 CVE-2011-3495 CVE-2011-3496 CVE-2011-3497
|
MISC:http://aluigi.altervista.org/adv/scichatdt-adv.txt |
CVE-2008-1169
|
MISC:http://aluigi.altervista.org/adv/scorchbugs-adv.txt |
CVE-2005-3486 CVE-2005-3487 CVE-2005-3488
|
MISC:http://aluigi.altervista.org/adv/scrapboom-adv.txt |
CVE-2005-0621
|
MISC:http://aluigi.altervista.org/adv/sentinella-adv.txt |
CVE-2008-0760
|
MISC:http://aluigi.altervista.org/adv/shttpd-adv.txt |
CVE-2007-6404 CVE-2007-6405
|
MISC:http://aluigi.altervista.org/adv/simbinzero-adv.txt |
CVE-2007-1170
|
MISC:http://aluigi.altervista.org/adv/skulltagfs-adv.txt |
CVE-2006-2012
|
MISC:http://aluigi.altervista.org/adv/skulltaghof-adv.txt |
CVE-2007-4537
|
MISC:http://aluigi.altervista.org/adv/skulltagod-adv.txt |
CVE-2008-3597
|
MISC:http://aluigi.altervista.org/adv/slmaildos-adv.txt |
CVE-2008-1689 CVE-2008-1691
|
MISC:http://aluigi.altervista.org/adv/slnetmsg-adv.txt |
CVE-2008-0152
|
MISC:http://aluigi.altervista.org/adv/smsgheit-adv.txt |
CVE-2008-5421
|
MISC:http://aluigi.altervista.org/adv/sof2guidboom-adv.txt |
CVE-2005-0568
|
MISC:http://aluigi.altervista.org/adv/sof2ignore-adv.txt |
CVE-2005-2115
|
MISC:http://aluigi.altervista.org/adv/sof2pbbof-adv.txt |
CVE-2009-3924
|
MISC:http://aluigi.altervista.org/adv/sof2pbfs-adv.txt |
CVE-2006-0771
|
MISC:http://aluigi.altervista.org/adv/soldatdos-adv.txt |
CVE-2007-4531 CVE-2007-4532
|
MISC:http://aluigi.altervista.org/adv/soliddb_1-adv.txt |
CVE-2010-4055 CVE-2010-4056 CVE-2010-4057
|
MISC:http://aluigi.altervista.org/adv/soliduro-adv.txt |
CVE-2008-1705 CVE-2008-1706 CVE-2008-1707 CVE-2008-1708
|
MISC:http://aluigi.altervista.org/adv/sparkletfs-adv.txt |
CVE-2006-3573
|
MISC:http://aluigi.altervista.org/adv/specview_1-adv.txt |
CVE-2012-5972
|
MISC:http://aluigi.altervista.org/adv/ssboom-adv.txt |
CVE-2003-1143
|
MISC:http://aluigi.altervista.org/adv/stalker39x-adv.txt |
CVE-2008-6703 CVE-2008-6704 CVE-2008-6705
|
MISC:http://aluigi.altervista.org/adv/stalkerboom-adv.txt |
CVE-2008-6702
|
MISC:http://aluigi.altervista.org/adv/steamcazz-adv.txt |
CVE-2008-0548 CVE-2008-0549 CVE-2008-0550
|
MISC:http://aluigi.altervista.org/adv/strong2boom-adv.txt |
CVE-2005-1808
|
MISC:http://aluigi.altervista.org/adv/sunagex-adv.txt |
CVE-2008-6670 CVE-2008-6671 CVE-2008-6672
|
MISC:http://aluigi.altervista.org/adv/surgeftpizza-adv.txt |
CVE-2008-1052
|
MISC:http://aluigi.altervista.org/adv/surgemailz-adv.txt |
CVE-2008-1054 CVE-2008-1055
|
MISC:http://aluigi.altervista.org/adv/swat4x-adv.txt |
CVE-2008-3286
|
MISC:http://aluigi.altervista.org/adv/t3cbof-adv.txt |
CVE-2004-1853
|
MISC:http://aluigi.altervista.org/adv/t3wmbof-adv.txt |
CVE-2005-1772
|
MISC:http://aluigi.altervista.org/adv/tegob1-adv.txt |
CVE-2006-1150
|
MISC:http://aluigi.altervista.org/adv/thindirtrav-adv.txt |
CVE-2008-1620
|
MISC:http://aluigi.altervista.org/adv/timbuto-adv.txt |
CVE-2008-1117 CVE-2008-1337
|
MISC:http://aluigi.altervista.org/adv/tincat2bof-adv.txt |
CVE-2005-0906
|
MISC:http://aluigi.altervista.org/adv/toneboom-adv.txt |
CVE-2004-1618
|
MISC:http://aluigi.altervista.org/adv/twincat_1-adv.txt |
CVE-2011-3486
|
MISC:http://aluigi.altervista.org/adv/ufo2ko-adv.txt |
CVE-2006-3788 CVE-2006-3789 CVE-2006-3790 CVE-2006-3791 CVE-2006-3792
|
MISC:http://aluigi.altervista.org/adv/umod-adv.txt |
CVE-2004-1958
|
MISC:http://aluigi.altervista.org/adv/unrealcbof-adv.txt |
CVE-2010-2702
|
MISC:http://aluigi.altervista.org/adv/unrealcfs-adv.txt |
CVE-2008-6441
|
MISC:http://aluigi.altervista.org/adv/unrfs-adv.txt |
CVE-2004-1805
|
MISC:http://aluigi.altervista.org/adv/unsecure-adv.txt |
CVE-2004-0608
|
MISC:http://aluigi.altervista.org/adv/usurdat-adv.txt |
CVE-2008-3135
|
MISC:http://aluigi.altervista.org/adv/ut2004null-adv.txt |
CVE-2008-3396
|
MISC:http://aluigi.altervista.org/adv/ut3mendo-adv.txt |
CVE-2008-3409 CVE-2008-3410
|
MISC:http://aluigi.altervista.org/adv/vaboom-adv.txt |
CVE-2006-1408 CVE-2006-1409
|
MISC:http://aluigi.altervista.org/adv/vaboom2-adv.txt |
CVE-2007-4533 CVE-2007-4534 CVE-2007-4535
|
MISC:http://aluigi.altervista.org/adv/ventrilobotomy-adv.txt |
CVE-2008-3680
|
MISC:http://aluigi.altervista.org/adv/versantcmd-adv.txt |
CVE-2008-1319
|
MISC:http://aluigi.altervista.org/adv/vietcong2fs-adv.txt |
CVE-2009-2916
|
MISC:http://aluigi.altervista.org/adv/virtbugs-adv.txt |
CVE-2005-3135 CVE-2005-3136
|
MISC:http://aluigi.altervista.org/adv/visibroken-adv.txt |
CVE-2008-7126 CVE-2008-7127
|
MISC:http://aluigi.altervista.org/adv/vlcboffs-adv.txt |
CVE-2007-6681 CVE-2007-6682 CVE-2008-1881
|
MISC:http://aluigi.altervista.org/adv/vlcxhof-adv.txt |
CVE-2008-0295 CVE-2008-0296
|
MISC:http://aluigi.altervista.org/adv/vymesbof-adv.txt |
CVE-2004-1574
|
MISC:http://aluigi.altervista.org/adv/waccaz-adv.txt |
CVE-2008-0151
|
MISC:http://aluigi.altervista.org/adv/wachof-adv.txt |
CVE-2008-0151
|
MISC:http://aluigi.altervista.org/adv/warkings-adv.txt |
CVE-2005-1702 CVE-2005-1703
|
MISC:http://aluigi.altervista.org/adv/wartimesboom-adv.txt |
CVE-2005-1718
|
MISC:http://aluigi.altervista.org/adv/warzonebof-adv.txt |
CVE-2006-3849
|
MISC:http://aluigi.altervista.org/adv/wawix-adv.txt |
CVE-2006-6512 CVE-2006-6513 CVE-2006-6514 CVE-2006-6539
|
MISC:http://aluigi.altervista.org/adv/webcamxp-adv.txt |
CVE-2008-5674
|
MISC:http://aluigi.altervista.org/adv/webrickcgi-adv.txt |
CVE-2008-1891
|
MISC:http://aluigi.altervista.org/adv/whitedunboffs-adv.txt |
CVE-2008-0100 CVE-2008-0101
|
MISC:http://aluigi.altervista.org/adv/wicassert-adv.txt |
CVE-2007-5711
|
MISC:http://aluigi.altervista.org/adv/wicboom-adv.txt |
CVE-2008-6713
|
MISC:http://aluigi.altervista.org/adv/wilco-again-adv.txt |
CVE-2004-2449
|
MISC:http://aluigi.altervista.org/adv/winipds-adv.txt |
CVE-2008-0790 CVE-2008-0791
|
MISC:http://aluigi.altervista.org/adv/winuaebof-adv.txt |
CVE-2007-6537
|
MISC:http://aluigi.altervista.org/adv/wsftpweblog-adv.txt |
CVE-2008-5692 CVE-2008-5693
|
MISC:http://aluigi.altervista.org/adv/xinehof-adv.txt |
CVE-2008-1482
|
MISC:http://aluigi.altervista.org/adv/xinermffhof-adv.txt |
CVE-2008-0225
|
MISC:http://aluigi.altervista.org/adv/xinkaa-adv.txt |
CVE-2005-0502
|
MISC:http://aluigi.altervista.org/adv/xmpbof-adv.txt |
CVE-2007-6731 CVE-2007-6732
|
MISC:http://aluigi.altervista.org/adv/xprallyboom-adv.txt |
CVE-2005-0325
|
MISC:http://aluigi.altervista.org/adv/xprallyfs-adv.txt |
CVE-2005-0729
|
MISC:http://aluigi.altervista.org/adv/xtacacsdz-adv.txt |
CVE-2008-7232
|
MISC:http://aluigi.altervista.org/adv/yagerbof-adv.txt |
CVE-2005-1163 CVE-2005-1164 CVE-2005-1165
|
MISC:http://aluigi.altervista.org/adv/yak-adv.txt |
CVE-2004-2184
|
MISC:http://aluigi.altervista.org/adv/zdaebof-adv.txt |
CVE-2006-1592 CVE-2006-1593
|
MISC:http://aluigi.altervista.org/adv/zdaemonull-adv.txt |
CVE-2008-3314
|
MISC:http://aluigi.altervista.org/adv/zilabzcsx-adv.txt |
CVE-2008-5279 CVE-2008-5280
|
MISC:http://aluigi.altervista.org/adv/zoidboom-adv.txt |
CVE-2005-1643
|
MISC:http://aluigi.altervista.org/adv/zoidboom2-adv.txt |
CVE-2007-4358
|
MISC:http://aluigi.altervista.org/adv/zoomprayer-adv.txt |
CVE-2007-6533
|
MISC:http://aluigi.altervista.org/poc/badbluebof.txt |
CVE-2007-6377
|
MISC:http://aluigi.altervista.org/poc/crossfirebof.zip |
CVE-2006-1010
|
MISC:http://aluigi.altervista.org/poc/monkeydos.zip |
CVE-2004-0276
|
MISC:http://aluigi.altervista/adv/lfsbof-adv.txt |
CVE-2007-4425 CVE-2007-4426
|
MISC:http://aluigi.freeforums.org/post8780.html |
CVE-2009-4251
|
MISC:http://aluigi.org/adv/igss_1-adv.txt |
CVE-2011-1565
|
MISC:http://aluigi.org/adv/igss_2-adv.txt |
CVE-2011-1567
|
MISC:http://aluigi.org/adv/igss_3-adv.txt |
CVE-2011-1567
|
MISC:http://aluigi.org/adv/igss_4-adv.txt |
CVE-2011-1567
|
MISC:http://aluigi.org/adv/igss_5-adv.txt |
CVE-2011-1567
|
MISC:http://aluigi.org/adv/igss_6-adv.txt |
CVE-2011-1568
|
MISC:http://aluigi.org/adv/igss_7-adv.txt |
CVE-2011-1567
|
MISC:http://aluigi.org/adv/igss_8-adv.txt |
CVE-2011-1566
|
MISC:http://aluigi.org/adv/inbatch_1-adv.txt |
CVE-2010-4557
|
MISC:http://aluigi.org/adv/integraxor_1-adv.txt |
CVE-2010-4598
|
MISC:http://aluigi.org/adv/irm_1-adv.txt |
CVE-2012-2276 CVE-2012-2277
|
MISC:http://aluigi.org/adv/nfr_2-adv.txt |
CVE-2011-2750
|
MISC:http://aluigi.org/adv/proservrex_1-adv.txt |
CVE-2012-3792 CVE-2012-3793 CVE-2012-3794 CVE-2012-3795 CVE-2012-3796 CVE-2012-3797
|
MISC:http://aluigi.org/adv/qtsslame-adv.txt |
CVE-2010-2621
|
MISC:http://aluigi.org/adv/r2_1-adv.txt |
CVE-2012-1221 CVE-2012-1222 CVE-2012-1223
|
MISC:http://aluigi.org/adv/real_5-adv.txt |
CVE-2011-1525
|
MISC:http://aluigi.org/adv/realwin_1-adv.txt |
CVE-2010-4142
|
MISC:http://aluigi.org/adv/realwin_2-adv.txt |
CVE-2011-1563
|
MISC:http://aluigi.org/adv/realwin_3-adv.txt |
CVE-2011-1563
|
MISC:http://aluigi.org/adv/realwin_4-adv.txt |
CVE-2011-1563
|
MISC:http://aluigi.org/adv/realwin_5-adv.txt |
CVE-2011-1563
|
MISC:http://aluigi.org/adv/realwin_6-adv.txt |
CVE-2011-1564
|
MISC:http://aluigi.org/adv/realwin_7-adv.txt |
CVE-2011-1563
|
MISC:http://aluigi.org/adv/realwin_8-adv.txt |
CVE-2011-1563
|
MISC:http://aluigi.org/adv/samsux_1-adv.txt |
CVE-2012-4329 CVE-2012-4330
|
MISC:http://aluigi.org/adv/unrwebdos-adv.txt |
CVE-2007-4442 CVE-2007-4443
|
MISC:http://aluigi.org/adv/ut3webown-adv.txt |
CVE-2008-4243
|
MISC:http://aluigi.org/adv/vlcboffs-adv.txt |
CVE-2008-1881
|
MISC:http://aluigi.org/adv/wachof-adv.txt |
CVE-2008-7031 CVE-2008-7225
|
MISC:http://aluigi.org/adv/winccflex_1-adv.txt |
CVE-2011-4875 CVE-2011-4876 CVE-2011-4877 CVE-2011-4878 CVE-2011-4879
|
MISC:http://aluigi.org/adv/wincomalpd-adv.txt |
CVE-2008-5158 CVE-2008-5159 CVE-2008-5176
|
MISC:http://aluigi.org/adv/winlog_1-adv.txt |
CVE-2011-0517
|
MISC:http://aluigi.org/adv/winlog_2-adv.txt |
CVE-2012-4353 CVE-2012-4354 CVE-2012-4355 CVE-2012-4356 CVE-2012-4357 CVE-2012-4358 CVE-2012-4359
|
MISC:http://aluigi.org/fakep/unrealfp.zip |
CVE-2008-3286
|
MISC:http://aluigi.org/poc/aaboompb.zip |
CVE-2007-5249 CVE-2007-5250
|
MISC:http://aluigi.org/poc/armynchia.zip |
CVE-2008-3492
|
MISC:http://aluigi.org/poc/bcloneboom.zip |
CVE-2006-4005 CVE-2006-4006
|
MISC:http://aluigi.org/poc/cellfucktor.zip |
CVE-2007-4838
|
MISC:http://aluigi.org/poc/closedview.zip |
CVE-2008-1842
|
MISC:http://aluigi.org/poc/d3engfspb.zip |
CVE-2007-5248
|
MISC:http://aluigi.org/poc/dontcrysis.txt |
CVE-2008-6712
|
MISC:http://aluigi.org/poc/dosboxxx.zip |
CVE-2007-6328
|
MISC:http://aluigi.org/poc/doubletakedown.zip |
CVE-2008-0973 CVE-2008-0974 CVE-2008-0975 CVE-2008-0976 CVE-2008-0977 CVE-2008-0978 CVE-2008-0979
|
MISC:http://aluigi.org/poc/dumsdei.zip |
CVE-2007-4642 CVE-2007-4643 CVE-2007-4644
|
MISC:http://aluigi.org/poc/ezipirla.zip |
CVE-2008-0758 CVE-2008-0759 CVE-2008-0767
|
MISC:http://aluigi.org/poc/fearfspb.zip |
CVE-2007-5247
|
MISC:http://aluigi.org/poc/fengulo.zip |
CVE-2007-6626 CVE-2007-6627 CVE-2007-6628 CVE-2007-6629 CVE-2007-6630
|
MISC:http://aluigi.org/poc/ipsimene.zip |
CVE-2008-0945 CVE-2008-0946
|
MISC:http://aluigi.org/poc/libnemesibof.zip |
CVE-2007-6631
|
MISC:http://aluigi.org/poc/lmmgt2ho.zip |
CVE-2006-3879
|
MISC:http://aluigi.org/poc/perforces.zip |
CVE-2008-1302 CVE-2008-1303 CVE-2008-1338
|
MISC:http://aluigi.org/poc/pragmassh.zip |
CVE-2008-0132
|
MISC:http://aluigi.org/poc/prowizbof.zip |
CVE-2007-6510
|
MISC:http://aluigi.org/poc/pulsex.zip |
CVE-2007-1804
|
MISC:http://aluigi.org/poc/qtsslame.zip |
CVE-2010-2621
|
MISC:http://aluigi.org/poc/rfactorx.zip |
CVE-2007-4444 CVE-2007-4445
|
MISC:http://aluigi.org/poc/rorbof.zip |
CVE-2007-6041
|
MISC:http://aluigi.org/poc/ruttorrent.zip |
CVE-2008-0364
|
MISC:http://aluigi.org/poc/skulltagloop.zip |
CVE-2008-2748
|
MISC:http://aluigi.org/poc/slmaildos.zip |
CVE-2008-1689 CVE-2008-1690
|
MISC:http://aluigi.org/poc/sof2pbbof.zip |
CVE-2009-3924
|
MISC:http://aluigi.org/poc/soldatdos.zip |
CVE-2007-4531 CVE-2007-4532
|
MISC:http://aluigi.org/poc/soliduro.zip |
CVE-2008-1705 CVE-2008-1706 CVE-2008-1707 CVE-2008-1708
|
MISC:http://aluigi.org/poc/steamcazz.zip |
CVE-2008-0549 CVE-2008-0550
|
MISC:http://aluigi.org/poc/sunagex.zip |
CVE-2008-6670 CVE-2008-6671 CVE-2008-6672
|
MISC:http://aluigi.org/poc/timbuto.zip |
CVE-2008-1117 CVE-2008-1337
|
MISC:http://aluigi.org/poc/toribashish.zip |
CVE-2007-4446 CVE-2007-4447 CVE-2007-4448 CVE-2007-4449 CVE-2007-4450 CVE-2007-4451 CVE-2007-4452
|
MISC:http://aluigi.org/poc/unrealcbof.txt |
CVE-2010-2702
|
MISC:http://aluigi.org/poc/unrwebdos.zip |
CVE-2007-4442 CVE-2007-4443
|
MISC:http://aluigi.org/poc/ut2004null.zip |
CVE-2008-3396
|
MISC:http://aluigi.org/poc/ut3mendo.zip |
CVE-2008-3409 CVE-2008-3410
|
MISC:http://aluigi.org/poc/ventrilobotomy.zip |
CVE-2008-3680
|
MISC:http://aluigi.org/poc/wicassert.zip |
CVE-2007-5711
|
MISC:http://aluigi.org/poc/wincomalpd.zip |
CVE-2008-5158 CVE-2008-5159 CVE-2008-5176
|
MISC:http://aluigi.org/poc/winuaebof.zip |
CVE-2007-6537
|
MISC:http://aluigi.org/poc/xinehof.zip |
CVE-2008-1482
|
MISC:http://aluigi.org/poc/xtacacsdz.zip |
CVE-2008-7232
|
MISC:http://aluigi.org/poc/zdaemonull.zip |
CVE-2008-3314
|
MISC:http://aluigi.org/poc/zilabzcsx.zip |
CVE-2008-5279 CVE-2008-5280
|
MISC:http://aluigi.org/poc/zoidboom2.zip |
CVE-2007-4358
|
MISC:http://aluigi.org/testz/myhttpup.zip |
CVE-2007-6378
|
MISC:http://aluigi.org/testz/tftpx.zip |
CVE-2008-1311 CVE-2008-1620
|
MISC:http://amateras.sourceforge.jp/cgi-bin/fswiki/wiki.cgi?page=sns |
CVE-2006-6413
|
MISC:http://ambit.com |
CVE-2017-12757
|
MISC:http://americaninfosec.com/research/index.html |
CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 CVE-2012-4893
|
MISC:http://an7isec.blogspot.co.il/2014/04/pown-noobs-acunetix-0day.html |
CVE-2014-2994
|
MISC:http://anacondapartners.com/cgi-local/apexec.pl?template=ap_releasenotestemplate.html&f1=ap_af_updates_menu&f2=ap_af_releasenotes_clip |
CVE-2001-0593
|
MISC:http://anatoliasecurity.com/adv/as-adv-2010-002.txt |
CVE-2010-4792
|
MISC:http://anchorcms.com/ |
CVE-2020-23342
|
MISC:http://anders.fix.no/software/#unix |
CVE-2011-2688
|
MISC:http://android.git.kernel.org/?p=platform/frameworks/base.git;a=commit;h=cf4550c3198d6b3d92cdc52707fe70d7cc0caa9f |
CVE-2009-3698
|
MISC:http://android.git.kernel.org/?p=platform/frameworks/base.git;a=commit;h=dba8cb76371960457e91b31fa396478f809a5a34 |
CVE-2010-4832
|
MISC:http://android.git.kernel.org/?p=platform/packages/apps/Mms.git;a=commit;h=4d26623ce82230e8e7009adb921c5edea370a9e0 |
CVE-2011-0680
|
MISC:http://android.googlesource.com/kernel/common/+/688078e7 |
CVE-2020-0067
|
MISC:http://androidcommunity.com/gingerbreak-root-for-gingerbread-app-20110421/ |
CVE-2011-1823
|
MISC:http://anixis.com |
CVE-2018-5354
|
MISC:http://anna.svn.sourceforge.net/viewvc/anna/branches/0.30/anna.pl?r1=22&r2=23 |
CVE-2006-6190
|
MISC:http://anonaddy.com |
CVE-2021-42216
|
MISC:http://anonscm.debian.org/cgit/apt-cacher-ng/apt-cacher-ng.git/diff/?id=6f08e6a3995d1bed4e837889a3945b6dc650f6ad |
CVE-2014-4510
|
MISC:http://anonsvn.ethereal.com/viewcvs/viewcvs.py/trunk/epan/dissectors/packet-ospf.c |
CVE-2005-3651
|
MISC:http://anonsvn.ethereal.com/viewcvs/viewcvs.py?view=rev&rev=13707 |
CVE-2005-0739
|
MISC:http://anonsvn.wireshark.org/viewvc/trunk-1.2/epan/dissectors/packet-lwres.c?view=diff&r1=31596&r2=28492&diff_format=h |
CVE-2010-0304
|
MISC:http://antid0te.com/syscan_2013/SyScan2013_Mountain_Lion_iOS_Vulnerabilities_Garage_Sale_Whitepaper.pdf |
CVE-2013-3948 CVE-2013-3949 CVE-2013-3950 CVE-2013-3951 CVE-2013-3952 CVE-2013-3953 CVE-2013-3954 CVE-2013-3955
|
MISC:http://antilamo.skifstone.com/vuln/whisper32.txt |
CVE-2005-2664
|
MISC:http://antirez.com/news/119 |
CVE-2018-11218 CVE-2018-11219
|
MISC:http://antisecurity.org/bplawyercasedocument-1-0-mssql-vulnerabilities.antisecurity |
CVE-2009-3499
|
MISC:http://antisecurity.org/dvd-zone-view_mag-phpmag_id-bsqlxss-multiple-remote-vulnerabilities.antisecurity |
CVE-2009-3495 CVE-2009-3496
|
MISC:http://antisnatchor.com/2008/12/18/eclipse-birt-reflected-xss |
CVE-2009-4521
|
MISC:http://antisnatchor.com/2009/06/20/pentaho-1701062-multiple-vulnerabilities/ |
CVE-2009-5099 CVE-2009-5100 CVE-2009-5101
|
MISC:http://antoniocannito.it/?p=137#afd |
CVE-2020-10387
|
MISC:http://antoniocannito.it/?p=137#afl |
CVE-2020-10459
|
MISC:http://antoniocannito.it/?p=137#afld |
CVE-2020-10458
|
MISC:http://antoniocannito.it/?p=137#afr |
CVE-2020-10457
|
MISC:http://antoniocannito.it/?p=137#bxss1 |
CVE-2020-10388
|
MISC:http://antoniocannito.it/?p=137#bxss2 |
CVE-2020-10461
|
MISC:http://antoniocannito.it/?p=137#csvinj |
CVE-2020-10460
|
MISC:http://antoniocannito.it/?p=137#rce1 |
CVE-2020-10386
|
MISC:http://antoniocannito.it/?p=137#rce2 |
CVE-2020-10389
|
MISC:http://antoniocannito.it/?p=137#rce3 |
CVE-2020-10390
|
MISC:http://antoniocannito.it/?p=137#uxss |
CVE-2020-10391 CVE-2020-10392 CVE-2020-10393 CVE-2020-10394 CVE-2020-10395 CVE-2020-10396 CVE-2020-10397 CVE-2020-10398 CVE-2020-10399 CVE-2020-10400 CVE-2020-10401 CVE-2020-10402 CVE-2020-10403 CVE-2020-10404 CVE-2020-10405 CVE-2020-10406 CVE-2020-10407 CVE-2020-10408 CVE-2020-10409 CVE-2020-10410 CVE-2020-10411 CVE-2020-10412 CVE-2020-10413 CVE-2020-10414 CVE-2020-10415 CVE-2020-10416 CVE-2020-10417 CVE-2020-10418 CVE-2020-10419 CVE-2020-10420 CVE-2020-10421 CVE-2020-10422 CVE-2020-10423 CVE-2020-10424 CVE-2020-10425 CVE-2020-10426 CVE-2020-10427 CVE-2020-10428 CVE-2020-10429 CVE-2020-10430 CVE-2020-10431 CVE-2020-10432 CVE-2020-10433 CVE-2020-10434 CVE-2020-10435 CVE-2020-10436 CVE-2020-10437 CVE-2020-10438 CVE-2020-10439 CVE-2020-10440 CVE-2020-10441 CVE-2020-10442 CVE-2020-10443 CVE-2020-10444 CVE-2020-10445 CVE-2020-10446 CVE-2020-10447 CVE-2020-10448 CVE-2020-10449 CVE-2020-10450 CVE-2020-10451 CVE-2020-10452 CVE-2020-10453 CVE-2020-10454 CVE-2020-10455 CVE-2020-10456
|
MISC:http://antoniocannito.it/?p=342#xss1 |
CVE-2020-10462
|
MISC:http://antoniocannito.it/?p=342#xss10 |
CVE-2020-10471
|
MISC:http://antoniocannito.it/?p=342#xss11 |
CVE-2020-10472
|
MISC:http://antoniocannito.it/?p=342#xss12 |
CVE-2020-10473
|
MISC:http://antoniocannito.it/?p=342#xss13 |
CVE-2020-10474
|
MISC:http://antoniocannito.it/?p=342#xss14 |
CVE-2020-10475
|
MISC:http://antoniocannito.it/?p=342#xss15 |
CVE-2020-10476
|
MISC:http://antoniocannito.it/?p=342#xss16 |
CVE-2020-10477
|
MISC:http://antoniocannito.it/?p=342#xss2 |
CVE-2020-10463
|
MISC:http://antoniocannito.it/?p=342#xss3 |
CVE-2020-10464
|
MISC:http://antoniocannito.it/?p=342#xss4 |
CVE-2020-10465
|
MISC:http://antoniocannito.it/?p=342#xss5 |
CVE-2020-10466
|
MISC:http://antoniocannito.it/?p=342#xss6 |
CVE-2020-10467
|
MISC:http://antoniocannito.it/?p=342#xss7 |
CVE-2020-10468
|
MISC:http://antoniocannito.it/?p=342#xss8 |
CVE-2020-10469
|
MISC:http://antoniocannito.it/?p=342#xss9 |
CVE-2020-10470
|
MISC:http://antoniocannito.it/?p=343#csrf1 |
CVE-2020-10478
|
MISC:http://antoniocannito.it/?p=343#csrf10 |
CVE-2020-10487
|
MISC:http://antoniocannito.it/?p=343#csrf11 |
CVE-2020-10488
|
MISC:http://antoniocannito.it/?p=343#csrf12 |
CVE-2020-10489
|
MISC:http://antoniocannito.it/?p=343#csrf13 |
CVE-2020-10490
|
MISC:http://antoniocannito.it/?p=343#csrf14 |
CVE-2020-10491
|
MISC:http://antoniocannito.it/?p=343#csrf15 |
CVE-2020-10492
|
MISC:http://antoniocannito.it/?p=343#csrf16 |
CVE-2020-10493
|
MISC:http://antoniocannito.it/?p=343#csrf17 |
CVE-2020-10494
|
MISC:http://antoniocannito.it/?p=343#csrf18 |
CVE-2020-10495
|
MISC:http://antoniocannito.it/?p=343#csrf19 |
CVE-2020-10496
|
MISC:http://antoniocannito.it/?p=343#csrf2 |
CVE-2020-10479
|
MISC:http://antoniocannito.it/?p=343#csrf20 |
CVE-2020-10497
|
MISC:http://antoniocannito.it/?p=343#csrf21 |
CVE-2020-10498
|
MISC:http://antoniocannito.it/?p=343#csrf22 |
CVE-2020-10499
|
MISC:http://antoniocannito.it/?p=343#csrf23 |
CVE-2020-10500
|
MISC:http://antoniocannito.it/?p=343#csrf24 |
CVE-2020-10501
|
MISC:http://antoniocannito.it/?p=343#csrf25 |
CVE-2020-10502
|
MISC:http://antoniocannito.it/?p=343#csrf26 |
CVE-2020-10503
|
MISC:http://antoniocannito.it/?p=343#csrf27 |
CVE-2020-10504
|
MISC:http://antoniocannito.it/?p=343#csrf3 |
CVE-2020-10480
|
MISC:http://antoniocannito.it/?p=343#csrf4 |
CVE-2020-10481
|
MISC:http://antoniocannito.it/?p=343#csrf5 |
CVE-2020-10482
|
MISC:http://antoniocannito.it/?p=343#csrf6 |
CVE-2020-10483
|
MISC:http://antoniocannito.it/?p=343#csrf7 |
CVE-2020-10484
|
MISC:http://antoniocannito.it/?p=343#csrf8 |
CVE-2020-10485
|
MISC:http://antoniocannito.it/?p=343#csrf9 |
CVE-2020-10486
|
MISC:http://antoniovazquezblanco.github.io/docs/advisories/Advisory_C54APM_Multiple.pdf |
CVE-2014-1405 CVE-2014-1406 CVE-2014-1407 CVE-2014-1408
|
MISC:http://antoniovazquezblanco.github.io/docs/advisories/Advisory_RomPagerXSS.pdf |
CVE-2013-6786
|
MISC:http://app.com |
CVE-2017-12884 CVE-2017-12885
|
MISC:http://appcheck-ng.com/remote-command-execution-in-wordpress-form-manager-plugin-cve-2015-7806/ |
CVE-2015-7806
|
MISC:http://appcheck-ng.com/safenet-sas-owa-agent-directory-traversal-vulnerability/ |
CVE-2014-5359
|
MISC:http://appcheck-ng.com/unpatched-vulnerabilites-in-magento-e-commerce-platform/ |
CVE-2014-9758
|
MISC:http://apple.slashdot.org/apple/02/09/21/122236.shtml?tid=172 |
CVE-2002-1898
|
MISC:http://applefun.blogspot.com/2007/01/moab-02-01-2007-vlc-media-player-udp.html |
CVE-2007-0017
|
MISC:http://applefun.blogspot.com/2007/01/moab-10-01-2007-apple-dmg-ufs.html |
CVE-2007-0229
|
MISC:http://application.com |
CVE-2017-11738 CVE-2017-11739 CVE-2017-11740
|
MISC:http://applications.com |
CVE-2017-11557
|
MISC:http://appsec.ws/Presentations/FlashFlooding.pdf |
CVE-2011-3642
|
MISC:http://appspace.com |
CVE-2021-27990
|
MISC:http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2 |
CVE-2006-0212
|
MISC:http://ar3av.free.fr/faille-dotclear.php |
CVE-2007-3672 CVE-2007-3688
|
MISC:http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf |
CVE-2020-20949 CVE-2020-20950
|
MISC:http://archiva.apache.org/security.html#CVE-2019-0213 |
CVE-2019-0213
|
MISC:http://archiva.apache.org/security.html#CVE-2020-9495 |
CVE-2020-9495
|
MISC:http://archive.is/eF2GR |
CVE-2017-12778
|
MISC:http://archive.is/https:/mantisbt.org/bugs/view.php?id=23908 |
CVE-2018-6382
|
MISC:http://archive.openmya.devnull.jp/2007.06/msg00060.html |
CVE-2007-2225 CVE-2007-2227
|
MISC:http://archive.today/rdkeQ |
CVE-2017-18362
|
MISC:http://archives.neohapsis.com/archives/apps/freshmeat/2001-07/0002.html |
CVE-2001-1266
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2012-02/0121.html |
CVE-2012-1001
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2012-02/0186.html |
CVE-2012-0359
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2012-05/0061.html |
CVE-2011-1517
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2012-10/0103.html |
CVE-2012-3821
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2012-10/0154.html |
CVE-2012-5687
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2012-11/0005.html |
CVE-2012-4512
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2012-11/0089.html |
CVE-2012-4576
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2013-01/0075.html |
CVE-2013-1360
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2013-05/0005.html |
CVE-2013-1420
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2013-05/0114.html |
CVE-2013-2120
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2013-07/0015.html |
CVE-2013-4088
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2013-07/0085.html |
CVE-2013-2600
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2013-07/0086.html |
CVE-2013-2600
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2013-07/0100.html |
CVE-2013-2738 CVE-2013-2739 CVE-2013-2745
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2013-07/0108.html |
CVE-2013-4763
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2013-08/0009.html |
CVE-2013-2625
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2013-10/0048.html |
CVE-2013-5978
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2013-10/0134.html |
CVE-2013-6275
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2013-11/0012.html |
CVE-2013-6364
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2013-11/0013.html |
CVE-2013-6365
|
MISC:http://archives.neohapsis.com/archives/bugtraq/2013-12/0051.html |
CVE-2013-6880
|
MISC:http://archives.neohapsis.com/archives/fulldisclosure/2006-07/att-0487/NDSA20060705.txt.asc |
CVE-2006-3848
|
MISC:http://archives.neohapsis.com/archives/fulldisclosure/2007-07/att-0179/Belkin_Router_fw_40503_xss_06_64.txt |
CVE-2007-3784
|
MISC:http://archives.neohapsis.com/archives/fulldisclosure/2009-05/att-0135/IIS_Advisory.pdf |
CVE-2009-1535
|
MISC:http://archives.neohapsis.com/archives/fulldisclosure/2012-01/att-0591/advisory_sudo.txt |
CVE-2012-0809
|
MISC:http://archives.neohapsis.com/archives/hp/2002-q3/0064.html |
CVE-2005-3277
|
MISC:http://archives.neohapsis.com/archives/openbsd/2005-10/1523.html |
CVE-2005-4351
|
MISC:http://archives.neohapsis.com/archives/win2ksecadvice/2000-q4/0109.html |
CVE-2000-1225 CVE-2001-1481
|
MISC:http://archives.postgresql.org/pgsql-hackers/2002-08/msg00708.php |
CVE-2002-1399
|
MISC:http://archives.postgresql.org/pgsql-hackers/2002-08/msg00713.php |
CVE-2002-1399
|
MISC:http://archives.postgresql.org/pgsql-hackers/2002-08/msg02047.php |
CVE-2002-1401
|
MISC:http://archives.postgresql.org/pgsql-hackers/2002-08/msg02081.php |
CVE-2002-1401
|
MISC:http://archives.seul.org/or/announce/Jun-2005/msg00001.html |
CVE-2005-2050
|
MISC:http://arctic.org/~dean/patches/GeoIP-1.4.0-update-vulnerability.patch |
CVE-2007-0159
|
MISC:http://arfis.wordpress.com/2007/09/13/rfi-02-awratecom-message-board/ |
CVE-2007-5599
|
MISC:http://arfis.wordpress.com/2007/09/13/rfi-02-clanlite/ |
CVE-2007-5168
|
MISC:http://arfis.wordpress.com/2007/09/13/rfi-02-eark/ |
CVE-2006-6086 CVE-2007-5216
|
MISC:http://arfis.wordpress.com/2007/09/13/rfi-02-galmeta-post/ |
CVE-2007-5567
|
MISC:http://arfis.wordpress.com/2007/09/13/rfi-02-godsend/ |
CVE-2007-5215
|
MISC:http://arfis.wordpress.com/2007/09/13/rfi-02-openelibrary/ |
CVE-2005-0679
|
MISC:http://arfis.wordpress.com/2007/09/13/rfi-02-phpblog/ |
CVE-2007-5566
|
MISC:http://arfis.wordpress.com/2007/09/13/rfi-02-phpscms/ |
CVE-2007-5565
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-ajax-file-browser/ |
CVE-2007-4921
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-der-dirigent/ |
CVE-2007-5146
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-ez-ticket/ |
CVE-2006-5523
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-frontaccounting/ |
CVE-2007-4279 CVE-2007-5117 CVE-2007-5148
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-guanxicrm-business-solution/ |
CVE-2007-5096
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-mods-4-xoops-contenido-ez-publish/ |
CVE-2007-5115
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-myipacng-stats/ |
CVE-2007-5165
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-nexty/ |
CVE-2007-5163
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-online-fantasy-football-league/ |
CVE-2007-5097
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-phpffl-fantasy-football-league-manager/ |
CVE-2007-4934 CVE-2007-4935
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-phplister/ |
CVE-2007-5167
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-phpmyprofiler/ |
CVE-2007-5114
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-public-media-manager/ |
CVE-2007-5149
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-puzzle-apps-cms/ |
CVE-2007-5147
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-remasys/ |
CVE-2007-5160
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-sitesys/ |
CVE-2007-5166
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-universibo/ |
CVE-2007-5164
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-02-webspotblogging/ |
CVE-2006-2860
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-03-myphppagetool/ |
CVE-2007-4947
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-03-openengine/ |
CVE-2007-5035
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-03-phportal/ |
CVE-2007-4950
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-03-phpreactor/ |
CVE-2007-4949
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-03-pslash/ |
CVE-2007-5014
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-03-streamline-php-media-server/ |
CVE-2007-5015
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-03-webmedia-explorer/ |
CVE-2007-4948
|
MISC:http://arfis.wordpress.com/2007/09/14/rfi-03-yapig-yet-another-php-image-gallery/ |
CVE-2007-4951
|
MISC:http://argeniss.com/research/10MinSecAudit.zip |
CVE-2007-1442
|
MISC:http://aria-security.com/forum/showthread.php?goto=newpost&t=88 |
CVE-2007-0116
|
MISC:http://aria-security.com/forum/showthread.php?p=112 |
CVE-2007-0090
|
MISC:http://aria-security.com/forum/showthread.php?p=114 |
CVE-2007-0094
|
MISC:http://aria-security.com/forum/showthread.php?p=128 |
CVE-2007-0399
|
MISC:http://aria-security.com/forum/showthread.php?p=129 |
CVE-2007-0519
|
MISC:http://aria-security.com/forum/showthread.php?t=85 |
CVE-2007-0096
|
MISC:http://aria-security.com/forum/showthread.php?t=87 |
CVE-2007-0089
|
MISC:http://aria-security.net/advisory/ASPintranet.txt |
CVE-2006-5987
|
MISC:http://aria-security.net/advisory/Real%20Estate%20Listing%20System.txt |
CVE-2006-5955
|
MISC:http://aria-security.net/advisory/WWWeb%20Cocepts.txt |
CVE-2006-5991
|
MISC:http://aria-security.net/advisory/bpg.txt |
CVE-2006-6110
|
MISC:http://aria-security.net/advisory/cpanel.txt |
CVE-2006-5883
|
MISC:http://aria-security.net/advisory/directadmin.txt |
CVE-2006-5983
|
MISC:http://aria-security.net/advisory/eShopping.txt |
CVE-2006-6073
|
MISC:http://aria-security.net/advisory/helm.txt |
CVE-2006-5984
|
MISC:http://aria-security.net/advisory/i-Gallery34.txt |
CVE-2006-6088
|
MISC:http://aria-security.net/advisory/xtremeg.txt |
CVE-2006-6937
|
MISC:http://aria-security.net/forum/showthread.php?p=1106 |
CVE-2007-6217
|
MISC:http://aria-security.net/forum/showthread.php?p=1116 |
CVE-2007-6163
|
MISC:http://aria-security.net/forum/showthread.php?p=1174 |
CVE-2007-6517
|
MISC:http://aria-security.net/forum/showthread.php?p=1189 |
CVE-2007-6671
|
MISC:http://aria-security.net/forum/showthread.php?p=1238 |
CVE-2008-0370
|
MISC:http://aria-security.net/forum/showthread.php?t=447 |
CVE-2007-6138
|
MISC:http://aria-security.net/forum/showthread.php?t=448 |
CVE-2007-6143
|
MISC:http://ariko-security.com/feb2010/ad439.html |
CVE-2010-0671
|
MISC:http://arkoon.net/advisories/ext2-make-empty-leak.txt |
CVE-2005-0400
|
MISC:http://armoredbarista.blogspot.de/2012/02/investigating-hashdos-issue.html |
CVE-2012-2739
|
MISC:http://arquilliere.blog.rhonealpesjob.com/index.php/post/2007/09/11/Premiere-faille-publiee-de-lannee |
CVE-2007-4882
|
MISC:http://arquilliere.blog.rhonealpesjob.com/index.php/post/2007/09/12/Decouverte-de-vulnerabilite-publication-et-patch |
CVE-2007-4882
|
MISC:http://arstechnica.com/articles/paedia/wpa-cracked.ars |
CVE-2008-5230
|
MISC:http://arstechnica.com/business/news/2012/03/ie-9-on-latest-windows-gets-stomped-at-hacker-contest.ars |
CVE-2012-1545 CVE-2012-1876
|
MISC:http://arstechnica.com/business/news/2012/04/backdoor-in-mission-critical-hardware-threatens-power-traffic-control-systems.ars |
CVE-2012-1803 CVE-2012-2441
|
MISC:http://arstechnica.com/journals/apple.ars/2007/2/14/7063 |
CVE-2007-1338
|
MISC:http://arstechnica.com/news.ars/post/20090113-new-method-of-phishmongering-could-fool-experienced-users.html |
CVE-2008-5912 CVE-2008-5913 CVE-2008-5914 CVE-2008-5915
|
MISC:http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/ |
CVE-2012-4929 CVE-2012-4930
|
MISC:http://arstechnica.com/security/2012/09/oracle-database-stealth-password-cracking-vulnerability/ |
CVE-2012-3137
|
MISC:http://arstechnica.com/security/2012/12/developer-warns-of-critical-vulnerability-in-many-samsung-smartphones/ |
CVE-2012-6422
|
MISC:http://arstechnica.com/security/2013/01/critical-java-vulnerabilies-confirmed-in-latest-version/ |
CVE-2013-0431 CVE-2013-1490
|
MISC:http://arstechnica.com/security/2013/08/holy-sht-smart-toilet-hack-attack/ |
CVE-2013-4866
|
MISC:http://arstechnica.com/security/2013/09/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers/ |
CVE-2007-6755 CVE-2013-6078
|
MISC:http://arstechnica.com/security/2014/07/mass-exploit-of-wordpress-plugin-backdoors-sites-running-joomla-magento-too/ |
CVE-2014-4725
|
MISC:http://arstechnica.com/security/2015/06/new-exploit-turns-samsung-galaxy-phones-into-remote-bugging-devices/ |
CVE-2015-4640 CVE-2015-4641
|
MISC:http://arstechnica.com/security/2015/12/unauthorized-code-in-juniper-firewalls-decrypts-encrypted-vpn-traffic/ |
CVE-2015-7755 CVE-2015-7756
|
MISC:http://arstechnica.com/security/2016/08/new-attack-steals-ssns-e-mail-addresses-and-more-from-https-pages/ |
CVE-2016-7152 CVE-2016-7153
|
MISC:http://artemis.abenteuer-mittelerde.de/pub/adv02-phptgb.txt |
CVE-2006-3752 CVE-2006-3753 CVE-2006-3837
|
MISC:http://arthrocyber.com/research |
CVE-2017-5998
|
MISC:http://arthrocyber.com/research#finding_3 |
CVE-2017-7352
|
MISC:http://arthrocyber.com/research#finding_5 |
CVE-2017-7693
|
MISC:http://arthur.barton.de/cgi-bin/gitweb.cgi?p=ngircd.git;a=blobdiff;f=src/ngircd/conn.c;h=c6095a31c613bc5ca127d55b8723e15b836f1cca;hp=9752a6191c7e2da5b0df64779e9cc28ad1e6241c;hb=627b0b713c52406e50c84bb9459e7794262920a2;hpb=95428a72ffb5214826b61d5e77f860e7ef6a6c9e |
CVE-2009-4652
|
MISC:http://arthur.barton.de/cgi-bin/viewcvs.cgi/ngircd/ngircd/src/ngircd/irc-channel.c?r1=1.40&r2=1.41&diff_format=h |
CVE-2008-0285
|
MISC:http://artica-proxy.com/telechargements/ |
CVE-2020-15051
|
MISC:http://artica.com |
CVE-2021-36697 CVE-2021-36698
|
MISC:http://article.gmane.org/gmane.comp.emulators.kvm.devel/100742 |
CVE-2012-4461
|
MISC:http://article.gmane.org/gmane.comp.security.oss.general/122 |
CVE-2008-1142
|
MISC:http://article.gmane.org/gmane.comp.security.oss.general/3660 |
CVE-2010-3843
|
MISC:http://article.gmane.org/gmane.comp.security.virus.clamav.devel/2853 |
CVE-2007-2650
|
MISC:http://article.gmane.org/gmane.comp.version-control.git/120733 |
CVE-2009-2108
|
MISC:http://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558 |
CVE-2005-4048
|
MISC:http://article.gmane.org/gmane.linux.drivers.ipw3945.devel/1618 |
CVE-2007-5938
|
MISC:http://article.gmane.org/gmane.linux.kernel/1853266 |
CVE-2014-9390
|
MISC:http://article.gmane.org/gmane.mail.virus.amavis.user/33635 |
CVE-2009-1391
|
MISC:http://article.gmane.org/gmane.mail.virus.amavis.user/33638 |
CVE-2009-1391
|
MISC:http://article.gmane.org/gmane.network.tcpdump.devel/4968 |
CVE-2011-1935
|
MISC:http://arxiv.org/abs/1410.7756 |
CVE-2014-8671 CVE-2014-8672
|
MISC:http://arxiv.org/abs/1502.07373 |
CVE-2015-7327
|
MISC:http://arxiv.org/pdf/1410.7756v1.pdf |
CVE-2014-8671 CVE-2014-8672
|
MISC:http://aryanitin.com/2017-01-01-CVE-2017-17749/ |
CVE-2017-17749
|
MISC:http://aryanitin.com/2017-12-20-CVE-2017-17750/ |
CVE-2017-17750
|
MISC:http://aryanitin.com/2017-12-20-CVE-2017-17751/ |
CVE-2017-17751
|
MISC:http://asdedc.bid/aspcms.html |
CVE-2017-14653
|
MISC:http://asert.arbornetworks.com/2007/03/any-ani-file-could-infect-you/ |
CVE-2007-1765
|
MISC:http://asfws12.files.wordpress.com/2012/11/asfws2012-jean_philippe_aumasson-martin_bosslet-hash_flooding_dos_reloaded.pdf |
CVE-2012-5370 CVE-2012-5371 CVE-2012-5372 CVE-2012-5373 CVE-2012-6051
|
MISC:http://asg-zena.com |
CVE-2021-45024 CVE-2021-45025 CVE-2021-45026
|
MISC:http://asg.com |
CVE-2021-45024 CVE-2021-45025 CVE-2021-45026
|
MISC:http://asheesh2000.blogspot.com/2013/08/mcafee-vulnerability-manager-75-cross.html |
CVE-2013-5094
|
MISC:http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566 |
CVE-2014-3566
|
MISC:http://aspell.net/buffer-overread-ucs.txt |
CVE-2019-20433
|
MISC:http://assets.yourcircuit.com/Internet/web/Container%20Site/Misc/Footer-content/privacy-policy/security-advisories.aspx |
CVE-2014-2650 CVE-2014-2651
|
MISC:http://astaro.org/showthread.php?p=77667 |
CVE-2007-4243
|
MISC:http://astaro.org/showthread.php?p=77694 |
CVE-2007-4243
|
MISC:http://astaro.org/showthread.php?p=78258 |
CVE-2007-4243
|
MISC:http://astaro.org/showthread.php?t=17782 |
CVE-2007-4243
|
MISC:http://astaro.org/showthread.php?t=17930 |
CVE-2007-4243
|
MISC:http://astaro.org/showthread.php?t=18280 |
CVE-2007-4243
|
MISC:http://astaro.org/showthread.php?t=18307 |
CVE-2007-4243
|
MISC:http://astaro.org/showthread.php?t=18551 |
CVE-2007-4243
|
MISC:http://asus.com |
CVE-2021-41435 CVE-2021-41436 CVE-2021-45756 CVE-2021-45757
|
MISC:http://asylum.seraum.com/Security-Alert-GED-ECM-Maarch-Critical-Vulnerabilities.html |
CVE-2015-1587
|
MISC:http://atomic111.github.io/article/homematic-ccu2-fileread |
CVE-2018-7296
|
MISC:http://atomic111.github.io/article/homematic-ccu2-filewrite |
CVE-2018-7300
|
MISC:http://atomic111.github.io/article/homematic-ccu2-firmware-via-plain-http |
CVE-2018-7298
|
MISC:http://atomic111.github.io/article/homematic-ccu2-remote-code-execution |
CVE-2018-7297
|
MISC:http://atomic111.github.io/article/homematic-ccu2-untrusted_addon |
CVE-2018-7299
|
MISC:http://atomic111.github.io/article/homematic-ccu2-xml-rpc |
CVE-2018-7301
|
MISC:http://attmgr.com/fixed-vulnerability-issue/ |
CVE-2019-5970 CVE-2019-5971
|
MISC:http://attrition.org/pipermail/vim/2007-April/001545.html |
CVE-2007-6758
|
MISC:http://attrition.org/security/advisory/misc/infowar/iw_sec_01.txt |
CVE-1999-0351
|
MISC:http://atutor.ca/news.php#010806 |
CVE-2006-3996
|
MISC:http://autoindex.sourceforge.net/change_log.html |
CVE-2007-5983
|
MISC:http://autonessus.cvs.sourceforge.net/viewvc/autonessus/AutoNessus/www/bulk_update.pl?r1=1.2&r2=1.3 |
CVE-2008-4520
|
MISC:http://avideoyouphptube.com |
CVE-2021-25874 CVE-2021-25875 CVE-2021-25876 CVE-2021-25877 CVE-2021-25878
|
MISC:http://aviv.raffon.net/2007/03/14/PhishingUsingIE7LocalResourceVulnerability.aspx |
CVE-2007-1499
|
MISC:http://aviv.raffon.net/2007/06/11/AppleSafariForWindowsOutWithACrash.aspx |
CVE-2007-3185
|
MISC:http://aviv.raffon.net/2007/09/25/ReadyAIMFire.aspx |
CVE-2007-4901 CVE-2007-5124
|
MISC:http://aviv.raffon.net/2007/12/18/GoogleToolbarDialogSpoofingVulnerability.aspx |
CVE-2007-6536
|
MISC:http://aviv.raffon.net/2008/01/02/YetAnotherDialogSpoofingFirefoxBasicAuthentication.aspx |
CVE-2008-0367
|
MISC:http://aviv.raffon.net/2008/01/05/FirefoxDialogSpoofingFAQ.aspx |
CVE-2008-0367
|
MISC:http://aviv.raffon.net/2008/01/17/SkypeCrosszoneScriptingVulnerability.aspx |
CVE-2008-0454
|
MISC:http://aviv.raffon.net/2008/01/22/NoMoreVideosForYouComeBackWhenPatchAvailable.aspx |
CVE-2008-0583
|
MISC:http://aviv.raffon.net/2008/01/31/AttackersCanSkypeFindYou.aspx |
CVE-2008-0582
|
MISC:http://aviv.raffon.net/2008/05/14/InternetExplorerQuotPrintTableOfLinksquotCrossZoneScriptingVulnerability.aspx |
CVE-2008-2281
|
MISC:http://aviv.raffon.net/2008/05/31/SafariPwnsInternetExplorer.aspx |
CVE-2008-2540
|
MISC:http://aviv.raffon.net/2010/02/18/SkeletonsInAdobesSecurityCloset.aspx |
CVE-2010-0189
|
MISC:http://avm.com |
CVE-2017-8087
|
MISC:http://avveng.com/cve.html |
CVE-2020-10817
|
MISC:http://awstats.sourceforge.net/docs/awstats_changelog.txt |
CVE-2010-4368
|
MISC:http://ax10v1.com |
CVE-2021-41450 CVE-2021-41451
|
MISC:http://axtls.sourceforge.net |
CVE-2019-10013 CVE-2019-8981 CVE-2019-9689
|
MISC:http://azurit.elbiahosting.sk/ffsniff/ffsniff-0.2.tar.gz |
CVE-2006-6585
|
MISC:http://b.fl7.de/2014/05/huawei-e303-sms-vulnerability-CVE-2014-2946.html |
CVE-2014-2946
|
MISC:http://b.fl7.de/2015/09/vtiger-crm-authenticated-rce-cve-2015-6000.html |
CVE-2015-6000
|
MISC:http://b.fl7.de/2016/01/vtiger-crm-6.4-auth-rce.html |
CVE-2016-1713
|
MISC:http://b2evolution.net/news/2012/04/06/b2evolution-4-1-4-stable |
CVE-2012-5910 CVE-2012-5911
|
MISC:http://b2evolution.net/news/2013/04/29/b2evolution-4-1-7-and-5-0-3 |
CVE-2013-2945 CVE-2013-7352
|
MISC:http://b3hr0uz.persiangig.com/VbStyleVuln.txt |
CVE-2006-2335
|
MISC:http://b3n7s.github.io/acccheck-command-injection.html |
CVE-2018-12268
|
MISC:http://badlock.org/ |
CVE-2015-5370 CVE-2016-0128 CVE-2016-2110 CVE-2016-2111 CVE-2016-2112 CVE-2016-2113 CVE-2016-2114 CVE-2016-2115 CVE-2016-2118
|
MISC:http://badminton.com |
CVE-2022-30490
|
MISC:http://badwebmasters.net/advisory/017/ |
CVE-2003-1187
|
MISC:http://badzmanaois.blogspot.com/2008/09/google-chrome-inspect-element-denial-of.html |
CVE-2008-6997
|
MISC:http://baigocms.com |
CVE-2022-26607
|
MISC:http://baigosso.com |
CVE-2020-20584
|
MISC:http://bani.anime.net/banimod/forums/viewtopic.php?p=27322 |
CVE-2005-0983
|
MISC:http://baraktawily.blogspot.co.il/2017/09/gem-in-box-xss-vulenrability-cve-2017.html |
CVE-2017-14506 CVE-2017-14683
|
MISC:http://baraktawily.blogspot.com/2014/01/soapui-code-execution-vulnerability-cve.html |
CVE-2014-1202
|
MISC:http://barmat.io/blog/2014/10/01/stored-xss-vulnerability-in-the-wordpress-plugin-subscribe2/ |
CVE-2014-6604
|
MISC:http://basercms.net/security/JVN92765814 |
CVE-2016-4876
|
MISC:http://bash-x.net/undef/adv/craftygallery.html |
CVE-2006-1667 CVE-2006-1668
|
MISC:http://bash-x.net/undef/exploits/crappy_syntax.txt |
CVE-2006-1667 CVE-2006-1668
|
MISC:http://basixonline.net/nex-forms-wordpress-form-builder-demo/change-log/ |
CVE-2021-34675 CVE-2021-34676
|
MISC:http://bazaar.launchpad.net/~ecryptfs/ecryptfs/trunk/revision/558 |
CVE-2011-3145
|
MISC:http://bazaar.launchpad.net/~hudson-openstack/nova/trunk/revision/1604 |
CVE-2011-3147
|
MISC:http://bazaar.launchpad.net/~juju-core/juju-core/trunk/revision/4119 |
CVE-2015-1316
|
MISC:http://bazaar.launchpad.net/~mailman-coders/mailman/2.1/view/head:/NEWS |
CVE-2020-12137
|
MISC:http://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/3097.15.15 |
CVE-2012-2102
|
MISC:http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/644 |
CVE-2014-1423
|
MISC:http://bazaar.launchpad.net/~online-accounts/signon/upstream/revision/645 |
CVE-2014-1423
|
MISC:http://bazaar.launchpad.net/~wicd-devel/wicd/experimental/revision/682 |
CVE-2012-0813
|
MISC:http://bb.domaindlx.com/bingung/shellcore/advisories.asp?bug_report=display&infamous_group=103 |
CVE-2006-4750
|
MISC:http://bb.domaindlx.com/bingung/shellcore/advisories.asp?bug_report=display&infamous_group=106 |
CVE-2006-6674
|
MISC:http://bbs.microdesktop.com/2017/09/25/wordpress-4-8-wp-jobs-1-5-job-qualification-edit-box-xss/ |
CVE-2017-14751
|
MISC:http://bbs.pediy.com/showthread.php?t=87615 |
CVE-2009-1800
|
MISC:http://bbs.wolvez.org/topic/125/ |
CVE-2010-1097
|
MISC:http://bbs.wolvez.org/topic/56/ |
CVE-2009-2132
|
MISC:http://bbs.wolvez.org/viewtopic.php?id=148 |
CVE-2010-4897
|
MISC:http://bbs.wolvez.org/viewtopic.php?id=170 |
CVE-2010-4854
|
MISC:http://bbs.wolvez.org/viewtopic.php?id=172 |
CVE-2010-4796
|
MISC:http://bbs.wolvez.org/viewtopic.php?id=180 |
CVE-2010-4811 CVE-2010-4812
|
MISC:http://bbs.wolvez.org/viewtopic.php?id=208 |
CVE-2011-5076 CVE-2011-5077
|
MISC:http://bbs.wolvez.org/viewtopic.php?id=211 |
CVE-2011-1064
|
MISC:http://bdtask.com |
CVE-2020-36012
|
MISC:http://bebugs.be.com/devbugs/detail.php3?oid=2505312 |
CVE-2000-0279
|
MISC:http://beetel.com |
CVE-2020-25498
|
MISC:http://bekhzod0725.github.io/cybersecurity/2018/02/16/exploiting-muracms.html |
CVE-2018-7486
|
MISC:http://belsec.com/advisories/139/summary.html |
CVE-2007-1302
|
MISC:http://belsec.com/advisories/142/summary.html |
CVE-2007-1304 CVE-2007-1305
|
MISC:http://bendawang.site/article/finecms-V5.0.11-multi-vulnerablity |
CVE-2017-14192 CVE-2017-14193 CVE-2017-14194 CVE-2017-14195
|
MISC:http://benji.redkod.org/audits/ipb.2.1.pdf |
CVE-2005-3547
|
MISC:http://benmmurphy.github.io/blog/2015/06/04/redis-eval-lua-sandbox-escape/ |
CVE-2015-4335
|
MISC:http://bftpd.sourceforge.net/news.html#302460 |
CVE-2020-6835
|
MISC:http://bigant.com |
CVE-2022-23345 CVE-2022-23346 CVE-2022-23347 CVE-2022-23348 CVE-2022-23349 CVE-2022-23350 CVE-2022-23352 CVE-2022-26281
|
MISC:http://bilishim.com/2020/12/18/zero-hunting-2.html |
CVE-2020-35136
|
MISC:http://billblough.net/blog/2015/03/04/cve-2014-6440-heap-overflow-in-vlc-transcode-module/ |
CVE-2014-6440
|
MISC:http://bindshell.net/advisories/konq355 |
CVE-2007-1308
|
MISC:http://bindshell.net/advisories/konq355/konq355-patch.diff |
CVE-2007-1308
|
MISC:http://bindshell.net/papers/ftppasv/ftp-client-pasv-manipulation.pdf |
CVE-2007-1562 CVE-2007-1563 CVE-2007-1564 CVE-2007-1565
|
MISC:http://bird.network.cz |
CVE-2019-16159
|
MISC:http://biyosecurity.be/bugs/adpforum2.txt |
CVE-2006-1157
|
MISC:http://biyosecurity.be/bugs/dvguestbook.txt |
CVE-2006-1070 CVE-2006-1071
|
MISC:http://biyosecurity.be/bugs/easycms.txt |
CVE-2006-3128
|
MISC:http://biyosecurity.be/bugs/mphorum.txt |
CVE-2006-1151
|
MISC:http://biyosecurity.be/bugs/n8cms.txt |
CVE-2006-1007 CVE-2006-1008
|
MISC:http://biyosecurity.be/bugs/oxynews.txt |
CVE-2006-1271
|
MISC:http://biyosecurity.be/bugs/patm.txt |
CVE-2006-1209
|
MISC:http://biyosecurity.be/bugs/phpuploadcenter2.txt |
CVE-2006-1207 CVE-2006-1208
|
MISC:http://biyosecurity.be/bugs/wmnews.txt |
CVE-2006-1233
|
MISC:http://bl0g.yehg.net/2011/02/zikula-cms-124-cross-site-request.html |
CVE-2011-0535
|
MISC:http://bl0g.yehg.net/2011/04/joomla-161-and-lower-information.html |
CVE-2011-2891 CVE-2011-2892
|
MISC:http://bl4cksecurity.blogspot.com/2009/03/microsoft-gdiplus-emf-gpfontsetdata.html |
CVE-2009-1217
|
MISC:http://blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Wojtczuk |
CVE-2009-0066
|
MISC:http://blacksecurity.org/exploits/38/FILECOPA_V1.01_and_Below_Pre_Authentication_Remote_Overflow/111.html |
CVE-2006-2254
|
MISC:http://blackwolfsec.cc/2017/07/20/Metinfo-directory-traversal-bypass/ |
CVE-2017-11500
|
MISC:http://blackwolfsec.cc/2018/01/22/Nonecms/ |
CVE-2018-6022
|
MISC:http://blackwolfsec.cc/2018/01/23/Nonecms_ssrf/ |
CVE-2018-6029
|
MISC:http://blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-dev/27787 |
CVE-2006-1931
|
MISC:http://blamcast.net/articles/highly-critical-security-flaws-in-drupal-audio-module |
CVE-2007-1035
|
MISC:http://blip.tv/file/3414004 |
CVE-2009-3734 CVE-2010-2465 CVE-2010-2466 CVE-2010-2467 CVE-2010-2468 CVE-2010-2469
|
MISC:http://blob.yewipeya.net/bpost.php?postid=0008 |
CVE-2009-3594
|
MISC:http://blog.0x3a.com/post/104954032239/cve-2014-4936-malwarebytes-anti-malware-and |
CVE-2014-4936
|
MISC:http://blog.0x42424242.in/2019/03/vstarcam-investigational-security.html |
CVE-2019-11014
|
MISC:http://blog.0x42424242.in/2019/03/vstarcam-investigational-security_22.html |
CVE-2019-11014
|
MISC:http://blog.0x42424242.in/2019/04/besder-investigative-journey-part-1_24.html |
CVE-2019-11878
|
MISC:http://blog.0xlabs.com/2017/03/solarwinds-lem-ssh-jailbreak-and.html |
CVE-2017-5198 CVE-2017-5199
|
MISC:http://blog.0xlabs.com/2018/03/openvpn-remote-information-disclosure.html |
CVE-2018-7544
|
MISC:http://blog.48bits.com/2009/12/12/exposing-hms-hicp-protocol-0day-light/ |
CVE-2009-4462
|
MISC:http://blog.48bits.com/?p=103 |
CVE-2007-2523
|
MISC:http://blog.48bits.com/?p=172 |
CVE-2007-5587
|
MISC:http://blog.48bits.com/?p=176 |
CVE-2007-4675
|
MISC:http://blog.48bits.com/?p=510 |
CVE-2009-3103
|
MISC:http://blog.48bits.com/?p=781 |
CVE-2009-4463
|
MISC:http://blog.51cto.com/010bjsoft/2171087 |
CVE-2018-16363
|
MISC:http://blog.51cto.com/010bjsoft/2175710 |
CVE-2018-17317
|
MISC:http://blog.51cto.com/010bjsoft/2298828 |
CVE-2018-18320
|
MISC:http://blog.51cto.com/010bjsoft/2298902 |
CVE-2018-18319
|
MISC:http://blog.51cto.com/12653365/2328557 |
CVE-2020-17563 CVE-2020-17564
|
MISC:http://blog.51cto.com/13770310/2173956 |
CVE-2018-16819
|
MISC:http://blog.51cto.com/13770310/2173957 |
CVE-2018-16820
|
MISC:http://blog.51cto.com/13770310/2177212 |
CVE-2018-16821
|
MISC:http://blog.51cto.com/13770310/2177214 |
CVE-2018-16822
|
MISC:http://blog.51cto.com/13770310/2177226 |
CVE-2018-17365
|
MISC:http://blog.abhisek.me/2012/06/xss-on-palo-alto-networks-global.html |
CVE-2012-4043
|
MISC:http://blog.acrossecurity.com/2010/10/breaking-setdlldirectory-protection.html |
CVE-2007-6753
|
MISC:http://blog.acrossecurity.com/2011/10/google-chrome-pkcs11txt-file-planting.html |
CVE-2011-3640
|
MISC:http://blog.addepar.com/2013/07/an-atypical-web-vulnerability.html |
CVE-2013-3300
|
MISC:http://blog.agavi.org/post/58189391/false-agavi-vulnerability-reports |
CVE-2008-4920
|
MISC:http://blog.alguien.at/2014/02/hackeando-el-router-zte-zxv10-w300-v21.html |
CVE-2014-0329
|
MISC:http://blog.amossys.fr/teampass-multiple-cve-01.html |
CVE-2017-15051 CVE-2017-15052 CVE-2017-15053 CVE-2017-15054 CVE-2017-15055
|
MISC:http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html |
CVE-2020-5219 CVE-2021-21277
|
MISC:http://blog.apps.npr.org/2018/02/15/pym-security-vulnerability.html |
CVE-2018-1000086
|
MISC:http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html |
CVE-2013-3051
|
MISC:http://blog.azimuthsecurity.com/2013/06/attacking-crypto-phones-weaknesses-in.html |
CVE-2013-2221 CVE-2013-2222 CVE-2013-2223
|
MISC:http://blog.beford.org/?p=8 |
CVE-2007-6589
|
MISC:http://blog.bestpractical.com/2013/04/on-our-security-policies.html |
CVE-2013-3525
|
MISC:http://blog.beyondtrust.com/triggering-ms14-066 |
CVE-2014-6321
|
MISC:http://blog.binamuse.com/2013/05/multiple-vulnerabilities-on-sketchup.html |
CVE-2013-3662 CVE-2013-3663 CVE-2013-3664 CVE-2013-7388
|
MISC:http://blog.binaryfactory.ca/2013/11/cve-2013-5726-tweetbot-for-ios-and-mac-user-disclosureprivacy-issue/ |
CVE-2013-5726
|
MISC:http://blog.bkis.com/?p=704 |
CVE-2009-1849
|
MISC:http://blog.bkis.com/?p=713 |
CVE-2009-2375
|
MISC:http://blog.bkis.com/?p=737 |
CVE-2009-3214
|
MISC:http://blog.bkis.com/e107-multiple-vulnerabilities/ |
CVE-2009-4083 CVE-2009-4084
|
MISC:http://blog.bkis.com/en/libxml2-vulnerability-in-google-chrome-and-apple-safari/ |
CVE-2010-4008
|
MISC:http://blog.blackdown.de/2005/05/09/fixing-the-ipt_recent-netfilter-module/ |
CVE-2005-2873
|
MISC:http://blog.blindspotsecurity.com/2016/06/advisory-http-header-injection-in.html |
CVE-2016-5699
|
MISC:http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups/ |
CVE-2009-4536 CVE-2009-4537
|
MISC:http://blog.c22.cc/2013/03/11/privoxy-proxy-authentication-credential-exposure-cve-2013-2503/ |
CVE-2013-2503
|
MISC:http://blog.c22.cc/2013/09/05/a-sneak-peak-into-android-secure-containers-2/ |
CVE-2013-5113 CVE-2013-5114
|
MISC:http://blog.ceruleanstudios.com/?p=404 |
CVE-2008-5401 CVE-2008-5402 CVE-2008-5403
|
MISC:http://blog.checkpoint.com/2015/04/20/analyzing-magento-vulnerability/ |
CVE-2015-1397 CVE-2015-1398 CVE-2015-1399 CVE-2015-3457 CVE-2015-3458
|
MISC:http://blog.checkpoint.com/2015/11/05/check-point-discovers-critical-vbulletin-0-day/ |
CVE-2015-7808
|
MISC:http://blog.checkpoint.com/2016/12/27/check-point-discovers-three-zero-day-vulnerabilities-web-programming-language-php-7 |
CVE-2016-7478 CVE-2016-7479 CVE-2016-7480
|
MISC:http://blog.checkpoint.com/wp-content/uploads/2016/12/PHP_Technical_Report.pdf |
CVE-2016-7478 CVE-2016-7479 CVE-2016-7480
|
MISC:http://blog.cinu.pl/2015/11/php-static-code-analysis-vs-top-1000-wordpress-plugins.html |
CVE-2015-9439
|
MISC:http://blog.cloudpassage.com/2013/11/18/cve-2013-6795-vulnerability-rackspace-windows-agent-updater/ |
CVE-2013-6795
|
MISC:http://blog.cmpxchg8b.com/2013/08/security-debianisms.html |
CVE-2013-1662
|
MISC:http://blog.cmpxchg8b.com/2013/11/qnx.html |
CVE-2013-3694
|
MISC:http://blog.codecatoctin.com/2018/02/antman-authentication-bypass.html |
CVE-2018-7739
|
MISC:http://blog.conviso.com.br/2013/03/spree-commerce-multiple-unsafe.html |
CVE-2013-1656
|
MISC:http://blog.cppcms.com/post/123 |
CVE-2018-11367
|
MISC:http://blog.cr0.org/2009/05/write-once-own-everyone.html |
CVE-2008-5353
|
MISC:http://blog.cr0.org/2009/06/bypassing-linux-null-pointer.html |
CVE-2009-1895
|
MISC:http://blog.cr0.org/2009/07/old-school-local-root-vulnerability-in.html |
CVE-2009-1894
|
MISC:http://blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html |
CVE-2009-2692
|
MISC:http://blog.crackpassword.com/2010/09/smartphone-forensics-cracking-blackberry-backup-passwords/ |
CVE-2010-3741
|
MISC:http://blog.crozat.net/2017/06/synology-photostation-password-vulnerabilty.html |
CVE-2017-9552
|
MISC:http://blog.cryptographyengineering.com/2013/03/attack-of-week-rc4-is-kind-of-broken-in.html |
CVE-2013-2566
|
MISC:http://blog.cryptographyengineering.com/2013/09/rsa-warns-developers-against-its-own.html |
CVE-2007-6755 CVE-2013-6078
|
MISC:http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html |
CVE-2007-6755
|
MISC:http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html |
CVE-2014-3566
|
MISC:http://blog.csdn.net/wangtua/article/details/75228728 |
CVE-2017-14158
|
MISC:http://blog.csdn.net/wdone/article/details/73958872 |
CVE-2017-10674
|
MISC:http://blog.csnc.ch/2015/09/saml-sp-authentication-bypass-vulnerability-in-nevisauth |
CVE-2015-5372
|
MISC:http://blog.curesec.com/article/blog/27.html |
CVE-2013-6223
|
MISC:http://blog.curesec.com/article/blog/Bolt-224-Code-Execution-44.html |
CVE-2015-7309
|
MISC:http://blog.curesec.com/article/blog/NibbleBlog-403-CSRF-46.html |
CVE-2015-6966
|
MISC:http://blog.curesec.com/article/blog/NibbleBlog-403-Code-Execution-47.html |
CVE-2015-6967
|
MISC:http://blog.curesec.com/article/blog/Serendipity-201-Blind-SQL-Injection-52.html |
CVE-2015-6943
|
MISC:http://blog.curesec.com/article/blog/Serendipity-201-Code-Execution-48.html |
CVE-2015-6968
|
MISC:http://blog.curesec.com/article/blog/Serendipity-201-Persistent-XSS-51.html |
CVE-2015-6969
|
MISC:http://blog.cyberoam.com/2012/07/ssl-bridging-cyberoam-approach/ |
CVE-2012-3372
|
MISC:http://blog.cylance.com/spear-team-cve-2015-0932 |
CVE-2015-0932
|
MISC:http://blog.datomic.com/2018/03/important-security-update.html |
CVE-2018-10054
|
MISC:http://blog.dbouman.nl/2022/04/02/How-The-Tables-Have-Turned-CVE-2022-1015-1016/ |
CVE-2022-1015
|
MISC:http://blog.depthsecurity.com/2013/11/dahua-dvr-authentication-bypass-cve.html |
CVE-2013-6117
|
MISC:http://blog.depthsecurity.com/2014/07/os-command-injection-in-infoblox-netmri.html |
CVE-2014-3418 CVE-2014-3419
|
MISC:http://blog.didierstevens.com/2010/03/29/escape-from-pdf/ |
CVE-2010-1239 CVE-2010-1240
|
MISC:http://blog.didierstevens.com/2010/03/31/escape-from-foxit-reader/ |
CVE-2010-1239
|
MISC:http://blog.didierstevens.com/2010/06/29/quickpost-no-escape-from-pdf/ |
CVE-2010-1240
|
MISC:http://blog.diniscruz.com/2013/08/neo4j-csrf-payload-to-start-processes.html |
CVE-2013-7259
|
MISC:http://blog.diniscruz.com/2013/08/using-xmldecoder-to-execute-server-side.html |
CVE-2013-4221
|
MISC:http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html |
CVE-2013-7285
|
MISC:http://blog.donews.com/zwell/archive/2006/01/17/698810.aspx |
CVE-2006-0359
|
MISC:http://blog.drinsama.de/erich/en/security/2007080801-security-issue-in-serendipity.html |
CVE-2007-4282
|
MISC:http://blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html |
CVE-2014-0242
|
MISC:http://blog.emaze.net/2014/05/sap-multiple-vulnerabilities.html |
CVE-2014-4159 CVE-2014-4160 CVE-2014-4161
|
MISC:http://blog.emaze.net/2017/12/typo3-unrestricted-file-upload-remote.html |
CVE-2017-14251
|
MISC:http://blog.ensilo.com/the-av-vulnerability-that-bypasses-mitigations |
CVE-2015-8577 CVE-2015-8578 CVE-2015-8579
|
MISC:http://blog.erratasec.com/2015/02/extracting-superfish-certificate.html#.VOq6Yfn8Fp4 |
CVE-2015-2077 CVE-2015-2078
|
MISC:http://blog.erratasec.com/2015/02/some-notes-on-superfish.html#.VOq6Yvn8Fp4 |
CVE-2015-2077 CVE-2015-2078
|
MISC:http://blog.espocrm.com/news/espocrm-2-6-0-released |
CVE-2014-7985 CVE-2014-7986 CVE-2014-7987
|
MISC:http://blog.fefe.de/?ts=b26ca29d |
CVE-2010-3312
|
MISC:http://blog.fefe.de/?ts=b72905a8 |
CVE-2009-1439
|
MISC:http://blog.filerun.com |
CVE-2021-35503 CVE-2021-35504 CVE-2021-35505 CVE-2021-35506
|
MISC:http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html |
CVE-2012-4681
|
MISC:http://blog.fireeye.com/research/2012/12/council-foreign-relations-water-hole-attack-details.html |
CVE-2012-4792
|
MISC:http://blog.fireeye.com/research/2013/01/happy-new-year-from-new-java-zero-day.html |
CVE-2013-0422
|
MISC:http://blog.fireeye.com/research/2013/02/in-turn-its-pdf-time.html |
CVE-2013-0640 CVE-2013-0641
|
MISC:http://blog.fireeye.com/research/2013/02/yaj0-yet-another-java-zero-day-2.html |
CVE-2013-1493
|
MISC:http://blog.fortify.com/blog/2011/02/08/Double-Trouble |
CVE-2010-4476
|
MISC:http://blog.fortinet.com/the-upcoming-blackhat-europe-2010-presentation/ |
CVE-2010-1241
|
MISC:http://blog.fox-it.com/2014/04/08/openssl-heartbleed-bug-live-blog/ |
CVE-2014-0160
|
MISC:http://blog.fuseyism.com/index.php/2013/01/15/security-icedtea-2-1-4-2-2-4-2-3-4-released/ |
CVE-2012-3174 CVE-2013-0422
|
MISC:http://blog.fuseyism.com/index.php/2013/02/20/security-icedtea-2-1-6-2-2-6-2-3-7-for-openjdk-7-released/ |
CVE-2013-0169 CVE-2013-1484 CVE-2013-1485 CVE-2013-1486
|
MISC:http://blog.fxiao.me/ghidra/ |
CVE-2019-13623 CVE-2019-13625
|
MISC:http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html |
CVE-2009-3555
|
MISC:http://blog.gerv.net/2014/10/new-class-of-vulnerability-in-perl-web-applications/ |
CVE-2014-1572 CVE-2014-1573
|
MISC:http://blog.globalnetworks.gr/?p=4 |
CVE-2006-0248
|
MISC:http://blog.guya.net/2008/10/07/malicious-camera-spying-using-clickjacking/ |
CVE-2008-4503
|
MISC:http://blog.guya.net/2014/04/07/to-listen-without-consent-abusing-the-html5-speech/ |
CVE-2014-3803
|
MISC:http://blog.h3xstream.com/2014/02/jira-path-traversal-explained.html |
CVE-2014-2314
|
MISC:http://blog.hac425.top/2018/05/16/CVE-2018-10945-mongoose.html |
CVE-2018-10945
|
MISC:http://blog.hac425.top/2018/05/16/openwrt_rpcd_acl_fail.html |
CVE-2018-11116
|
MISC:http://blog.hispasec.com/lab/230 |
CVE-2007-4463 CVE-2007-4464
|
MISC:http://blog.hispasec.com/lab/advisories/adv_Fileinfo-2_09_multiple_vulnerabilities.txt |
CVE-2007-4463 CVE-2007-4464
|
MISC:http://blog.hispasec.com/lab/advisories/adv_MagellanExplorer_3_32_Remote_Traversal.txt |
CVE-2007-4842
|
MISC:http://blog.hispasec.com/lab/advisories/adv_TotalCommander_7_01_Remote_Traversal.txt |
CVE-2007-4756
|
MISC:http://blog.hispasec.com/lab/advisories/adv_UnrealCommander_0_92_build_573_Multiple_FTP_Based_Vulnerabilities.txt |
CVE-2007-4843 CVE-2007-4844
|
MISC:http://blog.iancaling.com/post/145309944453 |
CVE-2016-10308
|
MISC:http://blog.iancaling.com/post/145973147383 |
CVE-2016-10309
|
MISC:http://blog.iancaling.com/post/153011925478 |
CVE-2016-10305 CVE-2016-10306 CVE-2016-10307
|
MISC:http://blog.iancaling.com/post/155127766533/ |
CVE-2017-7318
|
MISC:http://blog.iancaling.com/post/155395764003 |
CVE-2016-10306
|
MISC:http://blog.iancaling.com/post/159276197313/ |
CVE-2017-7576
|
MISC:http://blog.iancaling.com/post/160596244178 |
CVE-2017-9131 CVE-2017-9132 CVE-2017-9133 CVE-2017-9134 CVE-2017-9135 CVE-2017-9136
|
MISC:http://blog.iancaling.com/post/160817658078 |
CVE-2017-9137
|
MISC:http://blog.innerewut.de/2008/6/16/why-you-should-upgrade-to-rails-2-1 |
CVE-2008-4094
|
MISC:http://blog.inspired-sec.com/archive/2017/03/17/COM-Moniker-Privesc.html |
CVE-2017-0100
|
MISC:http://blog.intothesymmetry.com/2017/03/critical-vulnerability-in-json-web.html |
CVE-2017-16007
|
MISC:http://blog.invisibledenizen.org/2008/07/kaminskys-dns-issue-accidentally-leaked.html |
CVE-2008-1447
|
MISC:http://blog.isecurion.com/2018/04/23/invoice-plane-v1-5-cross-site-scripting-vulnerability/ |
CVE-2017-18217
|
MISC:http://blog.isecurion.com/2018/05/09/impinj-speedway-r420-rfid-reader/ |
CVE-2018-5303 CVE-2018-5304
|
MISC:http://blog.ivanristic.com/2012/06/modsecurity-and-modsecurity-core-rule-set-multipart-bypasses.html |
CVE-2009-5031 CVE-2012-2751
|
MISC:http://blog.kamens.us/2010/08/03/mac-os-x-mail-parental-controls-vulnerability/ |
CVE-2010-3887
|
MISC:http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html |
CVE-2006-4111
|
MISC:http://blog.kotowicz.net/2014/01/xssing-with-shakespeare-name-calling.html |
CVE-2014-1403
|
MISC:http://blog.krisk.org/2013/02/packets-of-death.html |
CVE-2013-1634
|
MISC:http://blog.ksplice.com/2010/09/cve-2010-3081/ |
CVE-2010-3081
|
MISC:http://blog.malerisch.net/2016/05/trendmicro-smex-session-predictable-cve-2015-3326.html |
CVE-2015-3326
|
MISC:http://blog.malerisch.net/2016/09/microsoft--out-of-bounds-read-pdf-library-cve-2016-3374.html |
CVE-2016-3374
|
MISC:http://blog.malerisch.net/2016/12/alcatel-omnivista-8770-unauth-rce-giop-corba.html |
CVE-2016-9796
|
MISC:http://blog.mastodon-tootdon.com/entry/2019/05/20/204019 |
CVE-2019-5961
|
MISC:http://blog.metalgenix.com/genixcms-v0-0-2-release-security-and-bug-fixes/17 |
CVE-2015-2678
|
MISC:http://blog.metasploit.com/2010/02/exploiting-samba-symlink-traversal.html |
CVE-2010-0926
|
MISC:http://blog.metasploit.com/2010/08/vxworks-vulnerabilities.html |
CVE-2010-2965 CVE-2010-2966 CVE-2010-2967 CVE-2010-2968
|
MISC:http://blog.metasploit.com/2010/09/return-of-unpublished-adobe.html |
CVE-2010-2883
|
MISC:http://blog.mindedsecurity.com/2011/07/jquery-is-sink.html |
CVE-2011-4969
|
MISC:http://blog.mindedsecurity.com/2015/03/the-old-is-new-again-cve-2011-2461-is.html |
CVE-2011-2461
|
MISC:http://blog.mindedsecurity.com/2015/09/autoloaded-file-inclusion-in-magento.html |
CVE-2015-6497
|
MISC:http://blog.mindedsecurity.com/2016/01/request-parameter-method-may-lead-to.html |
CVE-2015-8379
|
MISC:http://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html |
CVE-2017-1000486
|
MISC:http://blog.mo60.cn/index.php/archives/ruijie.html |
CVE-2022-33128
|
MISC:http://blog.mobiledefense.com/2012/05/mobile-defense-finds-two-security-vulnerabilities-in-xelex-mobiletrack/ |
CVE-2012-2562 CVE-2012-2567
|
MISC:http://blog.morphisec.com/exploit-bypass-emet-cve-2015-2545 |
CVE-2015-2545
|
MISC:http://blog.mozilla.com/security/2007/07/10/security-issue-in-url-protocol-handling-on-windows/ |
CVE-2007-3670
|
MISC:http://blog.mozilla.com/security/2008/06/18/new-security-issue-under-investigation/ |
CVE-2008-2785
|
MISC:http://blog.mozilla.com/security/2008/12/30/md5-weaknesses-could-lead-to-certificate-forgery/ |
CVE-2004-2761
|
MISC:http://blog.mozilla.com/security/2010/02/22/secunia-advisory-sa38608/ |
CVE-2010-1028
|
MISC:http://blog.mudynamics.com/2012/03/20/gnutls-and-libtasn1-vulns/ |
CVE-2012-1569 CVE-2012-1573
|
MISC:http://blog.mylookout.com/blog/2012/05/21/zte-security-vulnerability |
CVE-2012-2949
|
MISC:http://blog.mywarwithentropy.com/2012/02/8021x-password-exploit-on-many-htc.html |
CVE-2011-4872
|
MISC:http://blog.n0ipr0cs.io/post/2018/04/29/XSS-Flexense-DiskBoss-Enterprise-all-versions |
CVE-2018-10294 CVE-2018-10563 CVE-2018-10564 CVE-2018-10565 CVE-2018-10566 CVE-2018-10567 CVE-2018-10568
|
MISC:http://blog.n0where.org/post/171292151 |
CVE-2009-4972
|
MISC:http://blog.ncircle.com/blogs/vert/archives/2009/03/successful_exploit_renders_mic.html |
CVE-2009-0093
|
MISC:http://blog.neargle.com/2016/09/21/flask-src-review-get-a-xss-from-debuger/ |
CVE-2016-10516
|
MISC:http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/ |
CVE-2010-4258
|
MISC:http://blog.nelhage.com/2011/08/breaking-out-of-kvm/ |
CVE-2011-1751
|
MISC:http://blog.netinfiltration.com/2013/11/03/oracle-reports-cve-2012-3152-and-cve-2012-3153/ |
CVE-2012-3152 CVE-2012-3153
|
MISC:http://blog.netinfiltration.com/2014/01/19/upcoming-exploit-release-oracle-forms-and-reports-11g/ |
CVE-2012-3152 CVE-2012-3153
|
MISC:http://blog.newskysecurity.com/2016/09/brute-force-vulnerability-netgear-arlo/ |
CVE-2016-10116
|
MISC:http://blog.newskysecurity.com/2016/09/factory_reset_vuln_in_netgear_arlo/ |
CVE-2016-10115
|
MISC:http://blog.nibblesec.org/2010/12/typo3-sa-2010-020-typo3-sa-2010-022.html |
CVE-2010-3714 CVE-2010-5099
|
MISC:http://blog.nibblesec.org/2015/03/the-old-is-new-again-cve-2011-2461-is.html |
CVE-2011-2461
|
MISC:http://blog.nicovideo.jp/niconews/ni055746.html |
CVE-2015-5639
|
MISC:http://blog.noobroot.com/#!/2013/10/0-day-wordpress-cart66-plugin-15114.html |
CVE-2013-5977
|
MISC:http://blog.noobroot.com/2014/02/owncloud-600a-when-xss-vulnerability.html |
CVE-2014-1665
|
MISC:http://blog.npmjs.org/post/171169301000/v571 |
CVE-2018-7408
|
MISC:http://blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html |
CVE-2010-1870
|
MISC:http://blog.onapsis.com/analyzing-sap-security-notes-october-2014-edition/ |
CVE-2014-0995 CVE-2014-8589 CVE-2014-8590 CVE-2014-8591 CVE-2014-8592 CVE-2014-8659 CVE-2014-8660 CVE-2014-8661 CVE-2014-8662 CVE-2014-8663 CVE-2014-8664 CVE-2014-8665 CVE-2014-8666 CVE-2014-8667 CVE-2014-8668 CVE-2014-8669
|
MISC:http://blog.onapsis.com/sap-security-note-2067859-potential-exposure-to-digital-signature-spoofing/ |
CVE-2014-8587
|
MISC:http://blog.opensecurityresearch.com/2012/09/simple-cross-site-scripting-vector-that.html |
CVE-2012-5851
|
MISC:http://blog.pear.php.net/2017/02/02/security-html_ajax-058/ |
CVE-2017-5677
|
MISC:http://blog.pentest.space/2017/07/023-ftp-commander-802-unsafe-dll.html |
CVE-2017-11749
|
MISC:http://blog.pentest.space/2017/07/spider-player-253-unsafe-dll-loading.html |
CVE-2017-11748
|
MISC:http://blog.pfsense.org/?p=633 |
CVE-2011-5047
|
MISC:http://blog.php-security.org/archives/58-Suhosin-caught-another-remote-code-execution-vulnerability.html |
CVE-2006-6361
|
MISC:http://blog.php-security.org/archives/80-Watching-the-PHP-CVS.html |
CVE-2007-2727 CVE-2007-2728
|
MISC:http://blog.php-security.org/archives/82-Suhosin-0.9.20-and-crypt-Thread-Safety-Vulnerability.html |
CVE-2007-2844
|
MISC:http://blog.phusion.nl/2008/06/23/ruby-186-p230187-broke-your-app-ruby-enterprise-edition-to-the-rescue/ |
CVE-2008-2662 CVE-2008-2663 CVE-2008-2664 CVE-2008-2725 CVE-2008-2726
|
MISC:http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/ |
CVE-2012-6496 CVE-2012-6497
|
MISC:http://blog.pi3.com.pl/?p=111 |
CVE-2010-1938
|
MISC:http://blog.pi3.com.pl/?p=277 |
CVE-2011-4362
|
MISC:http://blog.pi3.com.pl/?p=402 |
CVE-2011-4970
|
MISC:http://blog.pi3.com.pl/?p=69 |
CVE-2010-0010
|
MISC:http://blog.pi3.com.pl/?p=831 |
CVE-2021-3411
|
MISC:http://blog.psi2.de/en/2010/02/20/going-commercial-with-firefox-vulnerabilities/ |
CVE-2010-1028
|
MISC:http://blog.ptsecurity.com/2012/11/attacking-mongodb.html |
CVE-2012-6619
|
MISC:http://blog.qt.io/blog/2018/12/04/qt-5-11-3-released-important-security-updates/ |
CVE-2018-19865
|
MISC:http://blog.quaji.com/2014/02/remote-code-execution-on-all-enterprise.html |
CVE-2014-1861
|
MISC:http://blog.quarkslab.com/cve-2016-7259-an-empty-file-into-the-blue.html |
CVE-2016-7259
|
MISC:http://blog.randorisec.fr/logicaldoc-from-guest-to-root/ |
CVE-2017-1000021 CVE-2017-1000022 CVE-2017-1000023
|
MISC:http://blog.rastating.com/wp-easycart-privilege-escalation-information-disclosure/ |
CVE-2015-2673
|
MISC:http://blog.recurity-labs.com/2017-08-10/scm-vulns |
CVE-2017-17831
|
MISC:http://blog.redyops.com/wordpress-plugin-popup-maker/ |
CVE-2019-17574
|
MISC:http://blog.rewolf.pl/blog/?p=1778 |
CVE-2017-3196
|
MISC:http://blog.robertlee.name/2008/10/conjecture-speculation.html |
CVE-2008-4609
|
MISC:http://blog.rubygems.org/2017/08/27/2.6.13-released.html |
CVE-2017-0899 CVE-2017-0900 CVE-2017-0901 CVE-2017-0902
|
MISC:http://blog.rubygems.org/2017/10/09/2.6.14-released.html |
CVE-2017-0903
|
MISC:http://blog.rubygems.org/2017/10/09/unsafe-object-deserialization-vulnerability.html |
CVE-2017-0903
|
MISC:http://blog.rubygems.org/2018/02/15/2.7.6-released.html |
CVE-2018-1000073 CVE-2018-1000074 CVE-2018-1000075 CVE-2018-1000076 CVE-2018-1000077 CVE-2018-1000078 CVE-2018-1000079
|
MISC:http://blog.s21sec.com/2007/09/sobre-la-vulnerabilidad-del-ekiga.html |
CVE-2007-4897
|
MISC:http://blog.safebreach.com/2016/02/09/http-response-splitting-in-node-js-root-cause-analysis/ |
CVE-2016-2216
|
MISC:http://blog.sat0ri.com/?p=292 |
CVE-2009-4194
|
MISC:http://blog.sbarbeau.fr/2018/03/nosql-injection-leading-to.html |
CVE-2017-1000493
|
MISC:http://blog.scrt.ch/2013/03/24/mongodb-0-day-ssji-to-rce/ |
CVE-2013-1892
|
MISC:http://blog.scrt.ch/2013/06/04/mongodb-rce-by-databasespraying/ |
CVE-2013-3969
|
MISC:http://blog.scrt.ch/2013/07/24/vlc-abc-parsing-seems-to-be-a-ctf-challenge/ |
CVE-2013-4233 CVE-2013-4234
|
MISC:http://blog.sec-consult.com/2015/05/kcodes-netusb-how-small-taiwanese.html |
CVE-2015-3036
|
MISC:http://blog.sec-consult.com/2016/01/deliberately-hidden-backdoor-account-in.html |
CVE-2015-8362 CVE-2016-1984
|
MISC:http://blog.sec-consult.com/2017/06/ghosts-from-past-authentication-bypass.html |
CVE-2017-3216
|
MISC:http://blog.secret-team.cn/index.php/archives/5/ |
CVE-2017-6899
|
MISC:http://blog.securelayer7.net/fb50-smart-lock-vulnerability-disclosure/ |
CVE-2019-13143
|
MISC:http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/ |
CVE-2017-15878 CVE-2017-15881 CVE-2017-16570
|
MISC:http://blog.securelayer7.net/time-to-disable-tp-link-home-wifi-router/ |
CVE-2018-11714
|
MISC:http://blog.securestate.com/courion-authentication-bypass-vulnerability-disclosure-cve-2013-2747/ |
CVE-2013-2747
|
MISC:http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html |
CVE-2014-4607 CVE-2014-4608 CVE-2014-4609 CVE-2014-4610 CVE-2014-4611
|
MISC:http://blog.securitymouse.com/2014/07/i-was-wrong-proving-lz4-exploitable.html |
CVE-2014-4715
|
MISC:http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2 |
CVE-2013-0256
|
MISC:http://blog.sendsafely.com/post/69590974866/web-based-single-sign-on-and-the-dangers-of-saml-xml |
CVE-2013-6440
|
MISC:http://blog.senr.io/blog/cve-2017-9466-why-is-my-router-blinking-morse-code |
CVE-2017-9466
|
MISC:http://blog.senr.io/blog/devils-ivy-flaw-in-widely-used-third-party-code-impacts-millions |
CVE-2017-9765
|
MISC:http://blog.senr.io/devilsivy.html |
CVE-2017-9765
|
MISC:http://blog.shekyan.com/2014/05/cve-2014-1849-foscam-dynamic-dns-predictable-credentials-vulnerability.html |
CVE-2014-1849
|
MISC:http://blog.sjinks.pro/wordpress/858-information-disclosure-via-sql-injection-attack/ |
CVE-2010-4257
|
MISC:http://blog.skylined.nl/20161114001.html |
CVE-2015-0040
|
MISC:http://blog.skylined.nl/20161118002.html |
CVE-2016-3247
|
MISC:http://blog.skylined.nl/20161122001.html |
CVE-2015-0050
|
MISC:http://blog.skylined.nl/20161123001.html |
CVE-2015-1251
|
MISC:http://blog.skylined.nl/20161125001.html |
CVE-2013-3120
|
MISC:http://blog.skylined.nl/20161128001.html |
CVE-2016-0063
|
MISC:http://blog.skylined.nl/20161201001.html |
CVE-2015-6168
|
MISC:http://blog.skylined.nl/20161202001.html |
CVE-2013-0019
|
MISC:http://blog.skylined.nl/20161205001.html |
CVE-2016-3222
|
MISC:http://blog.skylined.nl/20161206001.html |
CVE-2015-1730
|
MISC:http://blog.skylined.nl/20161207001.html |
CVE-2013-1309
|
MISC:http://blog.skylined.nl/20161208001.html |
CVE-2013-1306
|
MISC:http://blog.skylined.nl/20161212001.html |
CVE-2013-3111
|
MISC:http://blog.skylined.nl/20161214001.html |
CVE-2013-3143
|
MISC:http://blog.skylined.nl/20161216001.html |
CVE-2013-0090
|
MISC:http://blog.skylined.nl/20161219001.html |
CVE-2013-6627
|
MISC:http://blog.skylined.nl/20161220001.html |
CVE-2014-1785
|
MISC:http://blog.skylined.nl/20161221001.html |
CVE-2014-4138
|
MISC:http://blog.spiderlabs.com/2013/04/java-is-so-confusing.html |
CVE-2013-2423
|
MISC:http://blog.spiderlabs.com/2014/01/daumgame-activex-0day.html |
CVE-2013-7246
|
MISC:http://blog.spiderlabs.com/2014/01/sap-sybase-ase-157-security-updates.html |
CVE-2013-7245
|
MISC:http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html |
CVE-2014-0050
|
MISC:http://blog.spiderlabs.com/2014/09/cve-2014-6283-sap-ase-missing-authorization-checks-and-arbitrary-code-execution.html |
CVE-2014-6283
|
MISC:http://blog.sucuri.net/2013/04/wordpress-plugin-social-media-widget.html |
CVE-2013-1949
|
MISC:http://blog.sucuri.net/2013/12/wordpress-optimizepress-theme-file-upload-vulnerability.html |
CVE-2013-7102
|
MISC:http://blog.sucuri.net/2014/07/mailpoet-vulnerability-exploited-in-the-wild-breaking-thousands-of-wordpress-sites.html |
CVE-2014-4725
|
MISC:http://blog.sucuri.net/2014/07/malware-infection-breaking-wordpress-sites.html |
CVE-2014-4725
|
MISC:http://blog.sucuri.net/2014/07/remote-file-upload-vulnerability-on-mailpoet-wysija-newsletters.html |
CVE-2014-4725
|
MISC:http://blog.sucuri.net/2015/02/zero-day-in-the-fancybox-for-wordpress-plugin.html |
CVE-2015-1494
|
MISC:http://blog.swiecki.net/2018/01/fuzzing-tcp-servers.html |
CVE-2016-10708
|
MISC:http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html |
CVE-2016-1521 CVE-2016-1522 CVE-2016-1523 CVE-2016-1526
|
MISC:http://blog.talosintel.com/2016/05/multiple-7-zip-vulnerabilities.html |
CVE-2016-2334 CVE-2016-2335
|
MISC:http://blog.talosintel.com/2016/06/esnet-vulnerability.html |
CVE-2016-4303
|
MISC:http://blog.talosintel.com/2016/06/the-poisoned-archives.html |
CVE-2016-4300 CVE-2016-4301 CVE-2016-4302
|
MISC:http://blog.talosintelligence.com/2014/09/looking-glasses-with-bacon.html |
CVE-2014-3926
|
MISC:http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html |
CVE-2017-5638
|
MISC:http://blog.talosintelligence.com/2017/11/exploiting-cve-2016-2334.html |
CVE-2016-2334
|
MISC:http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html |
CVE-2018-4878
|
MISC:http://blog.techorganic.com/2014/05/14/from-fuzzing-to-0-day |
CVE-2014-3791
|
MISC:http://blog.tehtri-security.com/2011/01/blackhat-dc-2011-inglourious-hackerds.html |
CVE-2010-2599
|
MISC:http://blog.teusink.net/2009/05/grabit-172-beta-3-nzb-file-parsing.html |
CVE-2009-1586
|
MISC:http://blog.tmcnet.com/blog/tom-keating/computer-hardware/dataprobe-ibootbar-review.asp |
CVE-2007-6759 CVE-2007-6760
|
MISC:http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elayerbb-1-1-3-xss%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/ |
CVE-2019-13972 CVE-2019-13973 CVE-2019-13974
|
MISC:http://blog.topsec.com.cn/%E5%A4%A9%E8%9E%8D%E4%BF%A1%E5%85%B3%E4%BA%8Elibtiff%E4%B8%ADinvertimage%E5%87%BD%E6%95%B0%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E7%9A%84%E5%88%86%E6%9E%90/ |
CVE-2020-19131
|
MISC:http://blog.topsec.com.cn/textpattern-background-any-file-upload/ |
CVE-2020-19510
|
MISC:http://blog.topsec.com.cn/typesetter-5-1-storage-type-cross-site-script/ |
CVE-2020-19511
|
MISC:http://blog.torproject.org/blog/one-cell-enough |
CVE-2009-0654
|
MISC:http://blog.trendmicro.com/flaw-in-3rd-party-app-weakens-windows-mobile/ |
CVE-2007-0111
|
MISC:http://blog.trendmicro.com/trend-micro-finds-more-windows-mobile-flaws/ |
CVE-2007-0674 CVE-2007-0685
|
MISC:http://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/ |
CVE-2015-2426
|
MISC:http://blog.trendmicro.com/trendlabs-security-intelligence/an-analysis-of-a-windows-kernel-mode-vulnerability-cve-2014-4113/ |
CVE-2014-4113
|
MISC:http://blog.trendmicro.com/trendlabs-security-intelligence/an-analysis-of-windows-zero-day-vulnerability-cve-2014-4114-aka-sandworm/ |
CVE-2014-4114
|
MISC:http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2015-0016-escaping-the-internet-explorer-sandbox/ |
CVE-2015-0016
|
MISC:http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/ |
CVE-2017-5638
|
MISC:http://blog.trendmicro.com/trendlabs-security-intelligence/new-adobe-flash-zero-day-used-in-pawn-storm-campaign/ |
CVE-2015-7645
|
MISC:http://blog.trendmicro.com/trendlabs-security-intelligence/new-zero-day-vulnerability-cve-2015-5123-in-adobe-flash-emerges-from-hacking-team-leak/ |
CVE-2015-5123
|
MISC:http://blog.trendmicro.com/trendlabs-security-intelligence/one-bit-rule-system-analyzing-cve-2016-7255-exploit-wild/ |
CVE-2016-7255
|
MISC:http://blog.trendmicro.com/trendlabs-security-intelligence/trend-micro-discovers-apache-vulnerability-that-allows-one-click-modification-of-android-apps/ |
CVE-2015-1835
|
MISC:http://blog.trendmicro.com/trendlabs-security-intelligence/two-new-android-bugs-mess-up-messaging-may-lead-to-multiple-send-charges/ |
CVE-2015-3839 CVE-2015-3840
|
MISC:http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/ |
CVE-2015-5119
|
MISC:http://blog.trustlook.com/2014/01/23/trustlook-reported-microsofts-first-ever-android-vulnerability/ |
CVE-2014-1670
|
MISC:http://blog.vijatov.com/index.php?itemid=11 |
CVE-2008-5734
|
MISC:http://blog.visionsource.org/2010/01/28/opencart-csrf-vulnerability/ |
CVE-2010-1610
|
MISC:http://blog.volema.com/curl-rce.html |
CVE-2013-0249
|
MISC:http://blog.vulnhunt.com/index.php/2012/01/01/cal-2011-0080/ |
CVE-2012-2225
|
MISC:http://blog.vulnhunt.com/index.php/2012/02/02/cal-2012-0004-opera-array-integer-overflow/ |
CVE-2012-1003
|
MISC:http://blog.vulnhunt.com/index.php/2012/03/06/cal-2012-0006xunlei-dll-injection-vulnerability/ |
CVE-2012-2224
|
MISC:http://blog.vulnhunt.com/index.php/2012/06/14/cal-2012-0015-opera-website-spoof/ |
CVE-2012-3560
|
MISC:http://blog.vulnhunt.com/index.php/2012/09/17/ie-execcommand-fuction-use-after-free-vulnerability-0day_en/ |
CVE-2012-4969
|
MISC:http://blog.washingtonpost.com/securityfix/2007/08/ftp_files_expose_web_site_cred.html |
CVE-2007-4356
|
MISC:http://blog.watchfire.com/files/advisory-android-browser.pdf |
CVE-2011-2357
|
MISC:http://blog.watchfire.com/files/androiddnsweakprng.pdf |
CVE-2012-2808
|
MISC:http://blog.watchfire.com/files/googleappenginesdk.pdf |
CVE-2011-1364 CVE-2011-4211 CVE-2011-4212 CVE-2011-4213
|
MISC:http://blog.watchfire.com/wfblog/2008/06/javascript-code.html |
CVE-2008-2640
|
MISC:http://blog.watchfire.com/wfblog/2008/09/winamp-nowplayi.html |
CVE-2008-3567
|
MISC:http://blog.watchfire.com/wfblog/2008/12/breaking-google-gears-cross-origin-communication-model.html |
CVE-2008-6512
|
MISC:http://blog.watchfire.com/wfblog/2011/08/android-browser-cross-application-scripting-cve-2011-2357.html |
CVE-2011-2357
|
MISC:http://blog.whiterabbitxyj.com/cve/FeiFeiCMS_4.1_code_execution.doc |
CVE-2019-9825
|
MISC:http://blog.whiterabbitxyj.com/cve/Xiao5uCompany_1.7_csrf.doc |
CVE-2018-14960
|
MISC:http://blog.xwings.net/?p=127 |
CVE-2008-6252
|
MISC:http://blog.zerodaylab.com/2018/09/zerodaylab-discovers-ee-unquoted.html |
CVE-2018-14327
|
MISC:http://blog.zoller.lu/2009/01/tzo-2009-2-avira-antivir-priviledge.html |
CVE-2009-2761
|
MISC:http://blog.zoller.lu/2009/03/remote-code-execution-in-pdf-still.html |
CVE-2009-0836
|
MISC:http://blog.zoller.lu/2009/04/advisory-f-prot-frisk-cab-bypass.html |
CVE-2009-1783
|
MISC:http://blog.zoller.lu/2009/04/advisory-firefox-denial-of-service.html |
CVE-2009-1828
|
MISC:http://blog.zoller.lu/2009/04/advisory-firefox-dos-condition.html |
CVE-2009-1827
|
MISC:http://blog.zoller.lu/2009/04/avg-zip-evasion-bypass.html |
CVE-2009-1784
|
MISC:http://blog.zoller.lu/2009/04/clamav-094-and-below-evasion-and-bypass.html |
CVE-2009-1241
|
MISC:http://blog.zoller.lu/2009/04/comodo-antivirus-evasionbypass.html |
CVE-2009-5125
|
MISC:http://blog.zoller.lu/2009/04/ibm-proventia-evasion-limited-details.html |
CVE-2009-1240
|
MISC:http://blog.zoller.lu/2009/04/mcafee-multiple-bypassesevasions-ziprar.html |
CVE-2009-1348
|
MISC:http://blog.zoller.lu/2009/05/advisory-apple-safari-remote-code.html |
CVE-2009-1698
|
MISC:http://blog.zoller.lu/2009/05/iis-6-webdac-auth-bypass-and-data.html |
CVE-2009-1535
|
MISC:http://blog.zoller.lu/2010/08/cve-2010-xn-loadlibrarygetprocaddress.html |
CVE-2010-3127
|
MISC:http://blog.zx2c4.com/749 |
CVE-2012-0056
|
MISC:http://blog.zynamics.com/2010/06/09/analyzing-the-currently-exploited-0-day-for-adobe-reader-and-adobe-flash/ |
CVE-2010-1297
|
MISC:http://blog2.lemondeinformatique.fr/management_du_si/2006/05/notre_ami_imad_.html |
CVE-2005-4848
|
MISC:http://blogcms.com/ |
CVE-2010-4750
|
MISC:http://blogs.23.nu/ilja/stories/14493/ |
CVE-2007-1397
|
MISC:http://blogs.23.nu/prdelka/stories/13144/ |
CVE-2006-5556 CVE-2006-5557 CVE-2006-5558
|
MISC:http://blogs.adobe.com/psirt/2008/05/potential_flash_player_issue.html |
CVE-2007-0071
|
MISC:http://blogs.adobe.com/psirt/2009/04/potential_adobe_reader_issue.html |
CVE-2009-1492
|
MISC:http://blogs.adobe.com/psirt/2009/04/update_on_adobe_reader_issue.html |
CVE-2009-1493
|
MISC:http://blogs.adobe.com/psirt/2009/07/potential_adobe_reader_and_fla.html |
CVE-2009-1862
|
MISC:http://blogs.adobe.com/psirt/2009/09/potential_photoshop_elements_8.html |
CVE-2009-3489
|
MISC:http://blogs.adobe.com/psirt/2009/09/potential_robohelp_server_8_is.html |
CVE-2009-3068
|
MISC:http://blogs.adobe.com/psirt/2009/12/new_adobe_reader_and_acrobat_v.html |
CVE-2009-4324
|
MISC:http://blogs.adobe.com/psirt/2009/12/potential_adobe_illustrator_cs.html |
CVE-2009-4195
|
MISC:http://blogs.adobe.com/psirt/2010/02/adobe_download_manager_issue.html |
CVE-2010-0189
|
MISC:http://blogs.adobe.com/psirt/2010/11/potential-issue-in-adobe-reader.html |
CVE-2010-4091
|
MISC:http://blogs.cisco.com/security/talos/fileinfo-plugin-dos |
CVE-2015-2869
|
MISC:http://blogs.computerworld.com/malware-and-vulnerabilities/21693/yet-another-java-security-flaw-discovered-number-53 |
CVE-2013-0431 CVE-2013-1489 CVE-2013-1490
|
MISC:http://blogs.conus.info/node/28 |
CVE-2009-1979
|
MISC:http://blogs.csoonline.com/the_skype_mystery_why_blame_the_august_windows_updates |
CVE-2007-4429
|
MISC:http://blogs.exposit.co.uk/2009/02/23/vulnerability-in-quality-center/ |
CVE-2007-5289
|
MISC:http://blogs.flexerasoftware.com/secunia-research/2015/12/vulnerability-in-microsofts-unicode-scripts-processor-allows-execution-of-arbitrary-code.html |
CVE-2015-6130
|
MISC:http://blogs.imeta.co.uk/JDeabill/archive/2008/07/14/303.aspx |
CVE-2009-0358
|
MISC:http://blogs.iss.net/archive/sslmitmiscsrf.html |
CVE-2009-3555
|
MISC:http://blogs.iss.net/archive/trend.html |
CVE-2006-5268 CVE-2006-5269 CVE-2007-0072 CVE-2007-0073 CVE-2007-0074 CVE-2008-0012 CVE-2008-0013 CVE-2008-0014
|
MISC:http://blogs.ixiacom.com/ixia-blog/hack-scada-zero-day-vulnerability-discovery-on-the-nano-10-plc/ |
CVE-2013-5741
|
MISC:http://blogs.mcafee.com/mcafee-labs/digging-into-the-sandbox-escape-technique-of-the-recent-pdf-exploit |
CVE-2013-0641
|
MISC:http://blogs.mcafee.com/mcafee-labs/mcafee-labs-detects-zero-day-exploit-targeting-microsoft-office-2 |
CVE-2013-3906
|
MISC:http://blogs.mcafee.com/mcafee-labs/the-day-of-the-golden-jackal-%E2%80%93-further-tales-of-the-stuxnet-files |
CVE-2011-3402
|
MISC:http://blogs.msdn.com/developingfordynamicsgp/archive/2008/10/02/why-does-microsoft-dynamics-gp-encrypt-passwords.aspx |
CVE-2010-2011
|
MISC:http://blogs.msdn.com/sdl/archive/2008/12/18/ms08-078-and-the-sdl.aspx |
CVE-2008-4844
|
MISC:http://blogs.perl.org/users/neilb/2021/11/addressing-cpan-vulnerabilities-related-to-checksums.html |
CVE-2020-16156
|
MISC:http://blogs.quickheal.com/remote-desktop-protocol-vulnerability-cve-2012-0002-not-dead-yet/ |
CVE-2012-0002
|
MISC:http://blogs.reucon.com/srt/2007/05/11/openfire_3_3_1_fixes_critical_security_issue.html |
CVE-2007-2975
|
MISC:http://blogs.securiteam.com/?author=28 |
CVE-2006-0009 CVE-2006-4854
|
MISC:http://blogs.securiteam.com/?p=451 |
CVE-2006-3059
|
MISC:http://blogs.securiteam.com/?p=508 |
CVE-2006-3590
|
MISC:http://blogs.securiteam.com/?p=535 |
CVE-2005-0944
|
MISC:http://blogs.securiteam.com/?p=557 |
CVE-2006-0009 CVE-2006-4274
|
MISC:http://blogs.securiteam.com/?p=559 |
CVE-2006-0009 CVE-2006-4274
|
MISC:http://blogs.securiteam.com/?p=586 |
CVE-2006-4534
|
MISC:http://blogs.securiteam.com/?p=717 |
CVE-2006-5745
|
MISC:http://blogs.securiteam.com/?p=759 |
CVE-2006-5994
|
MISC:http://blogs.securiteam.com/?p=763 |
CVE-2006-6561
|
MISC:http://blogs.securiteam.com/index.php/archives/1150 |
CVE-2008-4250
|
MISC:http://blogs.securiteam.com/index.php/archives/347 |
CVE-2006-1305
|
MISC:http://blogs.securiteam.com/index.php/archives/554 |
CVE-2006-7066
|
MISC:http://blogs.securiteam.com/index.php/archives/624 |
CVE-2006-4868
|
MISC:http://blogs.sun.com/kah/entry/derby_10_6_1_has |
CVE-2009-4269
|
MISC:http://blogs.technet.com/b/mmpc/archive/2011/04/12/analysis-of-the-cve-2011-0611-adobe-flash-player-vulnerability-exploitation.aspx |
CVE-2011-0611
|
MISC:http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx |
CVE-2012-0507
|
MISC:http://blogs.technet.com/b/msrc/archive/2010/06/10/windows-help-vulnerability-disclosure.aspx |
CVE-2010-1885 CVE-2010-2265
|
MISC:http://blogs.technet.com/b/srd/archive/2010/06/10/help-and-support-center-vulnerability-full-disclosure-posting.aspx |
CVE-2010-2265
|
MISC:http://blogs.technet.com/b/srd/archive/2011/01/07/assessing-the-risk-of-public-issues-currently-being-tracked-by-the-msrc.aspx |
CVE-2010-3970 CVE-2010-3971 CVE-2010-3972 CVE-2010-3973 CVE-2010-4588 CVE-2011-0346 CVE-2011-0347
|
MISC:http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx |
CVE-2011-0662 CVE-2011-0665 CVE-2011-0666 CVE-2011-0667 CVE-2011-0670 CVE-2011-0671 CVE-2011-0672 CVE-2011-0673 CVE-2011-0674 CVE-2011-0675 CVE-2011-0676 CVE-2011-0677 CVE-2011-1225 CVE-2011-1226 CVE-2011-1227 CVE-2011-1228 CVE-2011-1229 CVE-2011-1230 CVE-2011-1231 CVE-2011-1232 CVE-2011-1233 CVE-2011-1234 CVE-2011-1235 CVE-2011-1236 CVE-2011-1237 CVE-2011-1238 CVE-2011-1239 CVE-2011-1240 CVE-2011-1241 CVE-2011-1242
|
MISC:http://blogs.technet.com/bluehat/archive/2008/08/14/targeted-fuzzing.aspx |
CVE-2008-4066
|
MISC:http://blogs.technet.com/msrc/archive/2006/02/13/419439.aspx |
CVE-2005-3240
|
MISC:http://blogs.technet.com/msrc/archive/2006/05/19/429353.aspx |
CVE-2006-2492
|
MISC:http://blogs.technet.com/msrc/archive/2006/06/20/437826.aspx |
CVE-2006-3086
|
MISC:http://blogs.technet.com/msrc/archive/2006/07/10/441006.aspx |
CVE-2006-3493
|
MISC:http://blogs.technet.com/msrc/archive/2006/07/28/443837.aspx |
CVE-2006-3942
|
MISC:http://blogs.technet.com/msrc/archive/2006/10/12/poc-published-for-ms-office-2003-powerpoint.aspx |
CVE-2006-5296
|
MISC:http://blogs.technet.com/msrc/archive/2006/10/26/ie-address-bar-issue.aspx |
CVE-2006-5544
|
MISC:http://blogs.technet.com/msrc/archive/2006/10/27/adodb-connection-poc-published.aspx |
CVE-2006-5559
|
MISC:http://blogs.technet.com/msrc/archive/2007/01/31/issue-regarding-windows-vista-speech-recognition.aspx |
CVE-2007-0675
|
MISC:http://blogs.technet.com/msrc/archive/2007/04/12/microsoft-security-advisory-935964-posted.aspx |
CVE-2007-1748
|
MISC:http://blogs.technet.com/msrc/archive/2009/12/27/new-reports-of-a-vulnerability-in-iis.aspx |
CVE-2009-4444
|
MISC:http://blogs.technet.com/msrc/archive/2010/02/03/security-advisory-980088-released.aspx |
CVE-2010-0555
|
MISC:http://blogs.technet.com/srd/archive/2009/04/14/ntlm-credential-reflection-updates-for-http-clients.aspx |
CVE-2009-0550
|
MISC:http://blogs.technet.com/srd/archive/2009/06/09/ms09-024.aspx |
CVE-2009-1533
|
MISC:http://blogs.technet.com/srd/archive/2009/06/11/latest-baidu-public-posting-requires-adminisrator-to-elevate.aspx |
CVE-2009-2653
|
MISC:http://blogs.technet.com/srd/archive/2009/08/11/ms09-035-asp-net-denial-of-service-vulnerability.aspx |
CVE-2009-1536
|
MISC:http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx |
CVE-2008-0015 CVE-2008-0020 CVE-2009-0901 CVE-2009-2493 CVE-2009-2494
|
MISC:http://blogs.technet.com/srd/archive/2010/01/12/ms10-001-font-file-decompression-vulnerability.aspx |
CVE-2010-0018
|
MISC:http://blogs.technet.com/swi/archive/2008/01/08/ms08-001-part-2-the-case-of-the-moderate-icmp-mitigations.aspx |
CVE-2007-0066
|
MISC:http://blogs.technet.com/swi/archive/2008/01/08/ms08-001-part-3-the-case-of-the-igmp-network-critical.aspx |
CVE-2007-0069
|
MISC:http://blogs.technet.com/swi/archive/2008/06/05/why-there-wont-be-a-security-update-for-wkimgsrv-dll.aspx |
CVE-2008-1898
|
MISC:http://blogs.technet.com/swi/archive/2008/10/14/ms08-066-how-to-correctly-validate-and-capture-user-mode-data.aspx |
CVE-2008-3464
|
MISC:http://blogs.technet.com/swi/archive/2008/12/30/information-regarding-md5-collisions-problem.aspx |
CVE-2004-2761
|
MISC:http://blogs.zdnet.com/hardware/?p=6655 |
CVE-2010-0221 CVE-2010-0222 CVE-2010-0224 CVE-2010-0225 CVE-2010-0227 CVE-2010-0228
|
MISC:http://blogs.zdnet.com/security/?p=1230 |
CVE-2008-2540
|
MISC:http://blogs.zdnet.com/security/?p=1348 |
CVE-2008-2947 CVE-2008-2948 CVE-2008-2949
|
MISC:http://blogs.zdnet.com/security/?p=1733 |
CVE-2008-3873
|
MISC:http://blogs.zdnet.com/security/?p=1759 |
CVE-2008-3873
|
MISC:http://blogs.zdnet.com/security/?p=2658 |
CVE-2009-0238
|
MISC:http://blogs.zdnet.com/security/?p=2934 |
CVE-2009-1042 CVE-2009-1043 CVE-2009-1044
|
MISC:http://blogs.zdnet.com/security/?p=2941 |
CVE-2009-1044
|
MISC:http://blogs.zdnet.com/security/?p=3013 |
CVE-2009-1169
|
MISC:http://blogs.zdnet.com/security/?p=358 |
CVE-2007-3671
|
MISC:http://blogs.zdnet.com/security/?p=427 |
CVE-2007-4315
|
MISC:http://blogs.zdnet.com/security/?p=438 |
CVE-2007-4315
|
MISC:http://blogs.zdnet.com/security/?p=5505 |
CVE-2010-0189
|
MISC:http://blogs.zdnet.com/security/?p=577 |
CVE-2007-3896
|
MISC:http://blogs.zdnet.com/security/?p=768 |
CVE-2007-6506
|
MISC:http://blogs.zdnet.com/security/?p=896 |
CVE-2008-1113 CVE-2008-1114
|
MISC:http://blogs.zdnet.com/security/?p=901 |
CVE-2008-1113 CVE-2008-1114
|
MISC:http://blogsecurity.net/news/news-130707/ |
CVE-2007-4104
|
MISC:http://blogsecurity.net/wordpress/2-vanilla-xss-on-wordpress-wp-registerphp/ |
CVE-2007-5105 CVE-2007-5106
|
MISC:http://blogsecurity.net/wordpress/feedburner-feed-hijacking/ |
CVE-2007-5229
|
MISC:http://blogsecurity.net/wordpress/feedsmith-feedburner-vulnerability-fixed/ |
CVE-2007-5229
|
MISC:http://blogsecurity.net/wordpress/news-260707/ |
CVE-2007-4104
|
MISC:http://blogsecurity.net/wordpress/news/news-100607-1/ |
CVE-2007-3238
|
MISC:http://bludit.com |
CVE-2020-19228
|
MISC:http://bluebox.com/corporate-blog/bluebox-uncovers-android-master-key/ |
CVE-2013-4787
|
MISC:http://bluetooth.lol |
CVE-2020-6616
|
MISC:http://bmc.com |
CVE-2017-17674 CVE-2017-17675 CVE-2017-17677 CVE-2017-17678
|
MISC:http://board.raidrush.ws/showthread.php?t=386983 |
CVE-2008-1120
|
MISC:http://boltcms.com |
CVE-2021-40219
|
MISC:http://bookeen.com |
CVE-2021-45783
|
MISC:http://bot24.blogspot.ca/2013/04/swfupload-object-injectioncsrf.html |
CVE-2012-3414
|
MISC:http://bot24.blogspot.com/2014/05/auracms-30-cross-site-scripting-local.html |
CVE-2014-3974 CVE-2014-3975
|
MISC:http://bouk.co/blog/elasticsearch-rce/ |
CVE-2014-3120
|
MISC:http://breachattack.com/ |
CVE-2013-3587
|
MISC:http://breakingmalware.com/vulnerabilities/sedating-watchdog-abusing-security-products-bypass-mitigations/ |
CVE-2015-8577 CVE-2015-8578 CVE-2015-8579
|
MISC:http://breakingmalware.com/vulnerabilities/vulnerability-patching-learning-from-avg-on-doing-it-right/ |
CVE-2015-8578
|
MISC:http://breakthesec.com |
CVE-2019-7385
|
MISC:http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html |
CVE-2017-12615
|
MISC:http://breeze.github.io/doc-net/release-notes.html |
CVE-2017-9424
|
MISC:http://brian.mastenbrook.net/display/27 |
CVE-2009-0123
|
MISC:http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html |
CVE-2006-3146 CVE-2006-5405
|
MISC:http://bridge.qodeinteractive.com/change-log/ |
CVE-2017-13138
|
MISC:http://browsbox.com |
CVE-2022-29704
|
MISC:http://browser-shredders.blogspot.com/2014/01/cve-2014-1449-maxthon-cloud-browser-for.html |
CVE-2014-1449
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-1-adodbrecordset-filter-property.html |
CVE-2006-3354
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-11-htmldlgsafehelper-fonts.html |
CVE-2006-3511
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-12-trieditdocument-url.html |
CVE-2006-3591
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-13-revealtrans-transition.html |
CVE-2006-3605
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-14-konqueror-replacechild.html |
CVE-2006-3672
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-15-folderitem-access.html |
CVE-2006-3658
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-16-mhtmlfile-location.html |
CVE-2006-3659
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-17-dximagetransformmicrosoftgradi.html |
CVE-2006-3657
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-18-webviewfoldericon-setslice.html |
CVE-2006-3730
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-19-datasourcecontrol.html |
CVE-2006-3729
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-2-internethhctrl-image-property.html |
CVE-2006-3357
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-20-ovctl-newdefaultitem.html |
CVE-2006-3910
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-21-cenroll-stringtobinary.html |
CVE-2006-3899
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-22-internethhctrl-click.html |
CVE-2006-3898
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-23-nmsaasfsourcemediadescription.html |
CVE-2006-3897
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-24-formslistbox1-listwidth.html |
CVE-2006-3944
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-25-native-function-iterator.html |
CVE-2006-3915
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-26-opera-css-background.html |
CVE-2006-3945
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-27-ndfxarteffects-rgbextracolor.html |
CVE-2006-3943
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-29-adodbrecordset-nextrecordset.html |
CVE-2006-7206
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-3-outlookexpressaddressbook_02.html |
CVE-2005-4840
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-30-orphan-object-properties.html |
CVE-2006-7066
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-31-safari-khtmlparserpoponeblock.html |
CVE-2006-3946
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-5-dhtml-setattributenode.html |
CVE-2006-3372
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-6-structuredgraphicscontrol.html |
CVE-2006-3427
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-7-tableframeset.html |
CVE-2006-3471
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-8-rdsdatacontrol-url.html |
CVE-2006-3510
|
MISC:http://browserfun.blogspot.com/2006/07/mobb-9-directanimationdauserdata-data.html |
CVE-2006-3513
|
MISC:http://bscw.gmd.de/WhatsNew.html |
CVE-2002-0094
|
MISC:http://buddhalabs.com/Advisories/WebAdvisories.html |
CVE-2013-3590 CVE-2013-3597 CVE-2013-3598
|
MISC:http://buddieshub27.blogspot.com/2018/09/cve-2018-16310-technicolor-tg588v-v2.html |
CVE-2018-16310
|
MISC:http://bugix-security.blogspot.com/2011/04/cve-2011-0611-adobe-flash-zero-day.html |
CVE-2011-0611
|
MISC:http://bugreport.ir/?/27 |
CVE-2008-0427 CVE-2008-0428
|
MISC:http://bugreport.ir/index.php?/34 |
CVE-2008-1906 CVE-2008-1907 CVE-2008-1908
|
MISC:http://bugreport.ir/index.php?/35 |
CVE-2008-1895 CVE-2008-1896
|
MISC:http://bugreport.ir/index.php?/35/exploit |
CVE-2008-1895
|
MISC:http://bugreport.ir/index.php?/36 |
CVE-2008-1990 CVE-2008-1991 CVE-2008-1992 CVE-2008-1993
|
MISC:http://bugreport.ir/index.php?/40 |
CVE-2008-2679 CVE-2008-2680 CVE-2008-2681 CVE-2008-2682
|
MISC:http://bugreport.ir/index.php?/41 |
CVE-2008-2756 CVE-2008-2757 CVE-2008-2758 CVE-2008-2759 CVE-2008-2760 CVE-2008-2761 CVE-2008-2762 CVE-2008-2763 CVE-2008-2764 CVE-2008-2765 CVE-2008-2766 CVE-2008-2767 CVE-2008-2768
|
MISC:http://bugreport.ir/index.php?/42 |
CVE-2008-2753
|
MISC:http://bugreport.ir/index_52.htm |
CVE-2008-3955
|
MISC:http://bugreports.qt.nokia.com/browse/QTWEBKIT-22 |
CVE-2009-4975
|
MISC:http://bugs.adobe.com/jira/browse/FP-1265 |
CVE-2009-1862
|
MISC:http://bugs.ariadne-cms.org/view.php?id=277 |
CVE-2011-4938
|
MISC:http://bugs.cacti.net/view.php?id=2646 |
CVE-2015-8369
|
MISC:http://bugs.cacti.net/view.php?id=2652 |
CVE-2015-8604
|
MISC:http://bugs.cacti.net/view.php?id=2667 |
CVE-2016-3172
|
MISC:http://bugs.cacti.net/view.php?id=2673 |
CVE-2016-3659
|
MISC:http://bugs.centos.org/bug_view_advanced_page.php?bug_id=4517 |
CVE-2010-4238
|
MISC:http://bugs.cubecart.com/?do=details&id=459 |
CVE-2005-3152 CVE-2006-0245
|
MISC:http://bugs.debian.org/405342 |
CVE-2007-4601
|
MISC:http://bugs.debian.org/433996 |
CVE-2008-4407
|
MISC:http://bugs.debian.org/496373 |
CVE-2008-4955
|
MISC:http://bugs.debian.org/496386 |
CVE-2008-4996
|
MISC:http://bugs.debian.org/496391 |
CVE-2008-4957
|
MISC:http://bugs.debian.org/496401 |
CVE-2008-4977
|
MISC:http://bugs.debian.org/496413 |
CVE-2008-4950
|
MISC:http://bugs.debian.org/496417 |
CVE-2008-5034
|
MISC:http://bugs.debian.org/496424 |
CVE-2008-4953
|
MISC:http://bugs.debian.org/496429 |
CVE-2008-4997
|
MISC:http://bugs.debian.org/506530 |
CVE-2008-5705 CVE-2008-5706
|
MISC:http://bugs.debian.org/864466 |
CVE-2017-9525
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi/0001-r1333-Fixed-crashes-with-very-long-revisions-attributes.txt?bug=349528;msg=15;att=1 |
CVE-2006-0597
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi/0002-r1335-Applied-patch-from-Emiliano-to-fix-possible-buffer-overflow.txt?bug=349528;msg=15;att=2 |
CVE-2006-0598
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi/0003-r1472-Do-not-distinguish-between-invalid-user-name-and-invalid-password.txt?bug=349528;msg=15;att=3 |
CVE-2006-0599
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi/11_missed_security_fixes.dpatch?bug=400582;msg=71;att=1 |
CVE-2006-6331
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi/gnupg.CVE-2006-3746.diff?bug=381204;msg=15;att=1 |
CVE-2006-3746
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi/squid_redirect.diff?bug=350308;msg=5;att=1 |
CVE-2006-0046
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=196063 |
CVE-2003-0450
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=211920 |
CVE-2005-3532
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261386 |
CVE-2004-0690
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755 |
CVE-2004-1487 CVE-2004-1488
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278384 |
CVE-2004-0987
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=289784 |
CVE-2005-0117
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294352 |
CVE-2004-2473
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=295407 |
CVE-2005-0625
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=301118 |
CVE-2005-0870
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=302412 |
CVE-2005-0990
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305142 |
CVE-2005-2214
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=307852 |
CVE-2005-1391
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757 |
CVE-2005-2471
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=323789 |
CVE-2005-2963
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=325285 |
CVE-2005-2734 CVE-2006-0330 CVE-2006-4030
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=328365 |
CVE-2005-3011
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329384 |
CVE-2005-3070
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=329387 |
CVE-2005-4534
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=330894 |
CVE-2005-3737
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=330895 |
CVE-2005-3302
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=330907 |
CVE-2005-0023
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=332434 |
CVE-2005-3146 CVE-2005-3147 CVE-2005-3148
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=337127 |
CVE-2005-4693
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=338920 |
CVE-2006-0512
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=340842 |
CVE-2005-3862
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289 |
CVE-2005-3191 CVE-2005-3192
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836 |
CVE-2005-4348
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=345071 |
CVE-2006-1251
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=345238 |
CVE-2005-4601
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=346197 |
CVE-2006-0106
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349528 |
CVE-2006-0597 CVE-2006-0598 CVE-2006-0599 CVE-2006-0600
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=349924 |
CVE-2007-2797
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350020 |
CVE-2006-0043
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=350308 |
CVE-2006-0046
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=356555 |
CVE-2006-1279 CVE-2006-1280
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=356896 |
CVE-2006-1902
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=357392 |
CVE-2006-1296
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359239 |
CVE-2006-1565
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=359241 |
CVE-2006-1566
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=360438 |
CVE-2006-1656
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=361775 |
CVE-2006-1772
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365897 |
CVE-2006-2213
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=366484 |
CVE-2006-2366
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=366816 |
CVE-2006-2542
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=371076 |
CVE-2006-3123
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694 |
CVE-2006-3469
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=376824 |
CVE-2006-2450
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=377049 |
CVE-2006-3404
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=380273 |
CVE-2006-3122
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=382474 |
CVE-2006-3126
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=392016 |
CVE-2006-5790 CVE-2006-5791
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=394454 |
CVE-2006-6679 CVE-2006-6681 CVE-2006-6682 CVE-2006-6683 CVE-2006-6684
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=397875 |
CVE-2006-6318
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=402644 |
CVE-2006-6614
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=413658 |
CVE-2007-1444
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414072;msg=12;filename=DS_VideoDecoder.c---SVN--22205.patch;att=1 |
CVE-2007-1387
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414370 |
CVE-2008-1096
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417894 |
CVE-2007-2654
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255 |
CVE-2007-2165
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=428157 |
CVE-2007-3209
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=430691 |
CVE-2007-2836
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=431336 |
CVE-2007-2835
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=439346 |
CVE-2007-4542
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=443913 |
CVE-2007-5037
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=446956 |
CVE-2007-5469
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=447795 |
CVE-2007-3919
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=448319 |
CVE-2007-5718
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449541 |
CVE-2007-6010
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=457300 |
CVE-2007-6454
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=457446 |
CVE-2007-6381
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=461519 |
CVE-2007-6720
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=473127 |
CVE-2008-1692
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=475733 |
CVE-2008-1994
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476339 |
CVE-2009-0179
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476603 |
CVE-2008-1994
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25 |
CVE-2008-4098
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480972 |
CVE-2008-2266
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=484305 |
CVE-2009-0316
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494648 |
CVE-2008-4998
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494765 |
CVE-2008-3699
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432#21 |
CVE-2008-5080
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496402 |
CVE-2008-4938
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496404 |
CVE-2008-3883
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496415 |
CVE-2008-4958
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496464 |
CVE-2008-4475
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506348 |
CVE-2008-5157
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506350 |
CVE-2008-5141
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508479 |
CVE-2009-0547
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511509 |
CVE-2009-0124
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511511 |
CVE-2009-0128
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511515 |
CVE-2009-0127
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511517 |
CVE-2009-0125
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=511520 |
CVE-2009-0130
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512995 |
CVE-2009-0282
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513456 |
CVE-2009-0415
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=513528 |
CVE-2009-0642
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=515603 |
CVE-2009-1515
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=517683 |
CVE-2009-0758
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=525078 |
CVE-2009-1440
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=525820 |
CVE-2009-1515
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526409 |
CVE-2009-1631
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712 |
CVE-2009-1891
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534731 |
CVE-2009-2260
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539452 |
CVE-2009-4720
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=542218 |
CVE-2009-3369
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=548546 |
CVE-2009-4193
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=548633 |
CVE-2009-5067
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=567058 |
CVE-2010-0442
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=570737 |
CVE-2010-0426
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572818 |
CVE-2010-0744
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=573615 |
CVE-2009-1299
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=576308 |
CVE-2010-1147
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583290 |
CVE-2009-4882 CVE-2010-2155
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590670 |
CVE-2010-2930
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598308 |
CVE-2010-3387
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598743 |
CVE-2010-4339
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605419 |
CVE-2010-4337
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=606544 |
CVE-2011-1548
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608497 |
CVE-2010-4540 CVE-2010-4541 CVE-2010-4542 CVE-2010-4543
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=616673 |
CVE-2012-3355
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=627042. |
CVE-2011-1925
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628836 |
CVE-2010-4777
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=649384 |
CVE-2011-4328
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650500 |
CVE-2011-4363
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=650555 |
CVE-2011-4944
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652249 |
CVE-2011-4613
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=652417 |
CVE-2012-0813
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=654341 |
CVE-2012-6076
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655044 |
CVE-2012-0039
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=655496 |
CVE-2012-0808
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=660846 |
CVE-2012-0841
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536 |
CVE-2012-1151
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661548 |
CVE-2012-1152
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=663189 |
CVE-2012-1176
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=665923 |
CVE-2012-1586
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668082 |
CVE-2012-3425
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668397 |
CVE-2012-2095
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668666 |
CVE-2012-2104
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668667 |
CVE-2012-4678
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668778 |
CVE-2012-2103
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=668779 |
CVE-2012-2120
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=670389 |
CVE-2012-2135
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=676309 |
CVE-2012-2668
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=677814 |
CVE-2011-2730 CVE-2011-2731 CVE-2011-2732
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678026 |
CVE-2012-3378
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681278 |
CVE-2012-3410
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683372 |
CVE-2012-3411
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683655 |
CVE-2012-3466
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683879 |
CVE-2012-3457
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683984 |
CVE-2012-3526
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=684121 |
CVE-2012-3461
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=685281 |
CVE-2012-3505
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686962 |
CVE-2012-3549
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=690319 |
CVE-2013-0288
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691062 |
CVE-2012-4533
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=691145 |
CVE-2012-4520
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697582 |
CVE-2012-6093
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698910 |
CVE-2013-0232
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699625 |
CVE-2013-0251
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699649 |
CVE-2013-0252
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699650 |
CVE-2013-0252
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700098 |
CVE-2013-1049
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700912 |
CVE-2013-0332
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701586 |
CVE-2013-0308
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839 |
CVE-2013-1776 CVE-2013-2776 CVE-2013-2777
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702296 |
CVE-2013-1667
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702525 |
CVE-2013-1821
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=706644 |
CVE-2013-2208
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=707776 |
CVE-2013-2074
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=710597 |
CVE-2013-2132
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=711600 |
CVE-2013-2162
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717880 |
CVE-2013-4242
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729573 |
CVE-2013-4579
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=730507 |
CVE-2013-6395
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=732006 |
CVE-2013-7085
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736247 |
CVE-2014-1624
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736358 |
CVE-2014-1640
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737160 |
CVE-2014-1833
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737562 |
CVE-2014-1876
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861347 |
CVE-2017-8305
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=862707 |
CVE-2017-9146
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=10;filename=90-remote-vulnerability.dpatch;att=1;bug=451875 |
CVE-2007-6062
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=31;filename=diff;att=1;bug=534982 |
CVE-2009-2855
|
MISC:http://bugs.debian.org/cgi-bin/bugreport.cgi?msg=5;filename=interdiff;att=1;bug=440535 |
CVE-2007-4739
|
MISC:http://bugs.digium.com/view.php?id=11637 |
CVE-2008-0095
|
MISC:http://bugs.digium.com/view.php?id=9313 |
CVE-2007-1594 CVE-2007-2297
|
MISC:http://bugs.digium.com/view.php?id=9316 |
CVE-2007-1595
|
MISC:http://bugs.dokuwiki.org/index.php?do=details&task_id=2488 |
CVE-2012-2128
|
MISC:http://bugs.fi/fuzzing/index.html |
CVE-2016-3977
|
MISC:http://bugs.fi/media/afl/optipng/1/ |
CVE-2016-3981
|
MISC:http://bugs.fi/media/afl/optipng/2/ |
CVE-2016-3982
|
MISC:http://bugs.freedesktop.org/attachment.cgi?id=30599&action=edit |
CVE-2009-3938
|
MISC:http://bugs.gentoo.org/342687 |
CVE-2010-4071
|
MISC:http://bugs.gentoo.org/attachment.cgi?id=101400&action=view |
CVE-2006-5793
|
MISC:http://bugs.gentoo.org/attachment.cgi?id=135423 |
CVE-2007-5936 CVE-2007-5937
|
MISC:http://bugs.gentoo.org/attachment.cgi?id=163282&action=view |
CVE-2008-3522
|
MISC:http://bugs.gentoo.org/attachment.cgi?id=166174&action=view |
CVE-2008-4201
|
MISC:http://bugs.gentoo.org/attachment.cgi?id=54352&action=view |
CVE-2005-0753
|
MISC:http://bugs.gentoo.org/attachment.cgi?id=58329&action=view |
CVE-2005-1152
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=102631 |
CVE-2005-2763 CVE-2005-2764
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=107871 |
CVE-2005-2960 CVE-2005-3137
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=109858 |
CVE-2005-3283
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=109997 |
CVE-2005-2974 CVE-2005-3350
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=112061 |
CVE-2005-3785
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=116314 |
CVE-2005-3534
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=117063 |
CVE-2005-4595
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=122376 |
CVE-2006-1390
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=125902 |
CVE-2006-1390
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=127167 |
CVE-2006-1390
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=127319 |
CVE-2006-1390
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=129136 |
CVE-2006-1712
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=133520 |
CVE-2006-4800
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=133988 |
CVE-2006-3355
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=136721 |
CVE-2006-3534 CVE-2006-3535
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=141728 |
CVE-2006-1168
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=142047 |
CVE-2007-0664
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=142142 |
CVE-2006-4028
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=144854 |
CVE-2006-3743 CVE-2006-3744
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=148228 |
CVE-2006-4925
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=154380 |
CVE-2006-5793
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=157048 |
CVE-2006-6303
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=159542 |
CVE-2007-1500
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=166901 |
CVE-2006-6979
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=180879 |
CVE-2007-3056
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=181214 |
CVE-2007-4321
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=184071 |
CVE-2007-3531
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=184886 |
CVE-2007-3770
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=187139 |
CVE-2007-3387
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=188806 |
CVE-2005-4790
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=192539 |
CVE-2007-5137
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=195503 |
CVE-2007-5423
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=198965 |
CVE-2007-5947 CVE-2007-5959 CVE-2007-5960
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=198976 |
CVE-2006-7227 CVE-2006-7228 CVE-2006-7230 CVE-2007-1659 CVE-2007-1660 CVE-2007-1661 CVE-2007-1662 CVE-2007-4766 CVE-2007-4767 CVE-2007-4768
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=199205 |
CVE-2007-5894
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=199206 |
CVE-2007-5769 CVE-2007-6263
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=199211 |
CVE-2007-5972
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=199212 |
CVE-2007-5971
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=199214 |
CVE-2007-5901 CVE-2007-5902
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=199509 |
CVE-2007-6035
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=199958 |
CVE-2007-6111 CVE-2007-6112 CVE-2007-6113 CVE-2007-6114 CVE-2007-6115 CVE-2007-6116 CVE-2007-6117 CVE-2007-6118 CVE-2007-6119 CVE-2007-6120 CVE-2007-6121 CVE-2007-6438 CVE-2007-6439 CVE-2007-6441 CVE-2007-6450 CVE-2007-6451
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=200110 |
CVE-2007-5824 CVE-2007-5825
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=200771 |
CVE-2007-4575
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=200909 |
CVE-2007-5947 CVE-2007-5959 CVE-2007-5960
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=201289 |
CVE-2007-6531
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=201799 |
CVE-2007-4575
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=201860 |
CVE-2007-5503
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=202351 |
CVE-2007-6353
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=202354 |
CVE-2007-6354 CVE-2007-6355 CVE-2007-6356
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=202747 |
CVE-2007-6454
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=202770 |
CVE-2007-6520 CVE-2007-6521 CVE-2007-6522 CVE-2007-6524
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=209535 |
CVE-2008-1734
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=214627#c3 |
CVE-2008-1769
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=222819 |
CVE-2008-3520 CVE-2008-3522
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=240576 |
CVE-2008-4579 CVE-2008-4580
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=262708 |
CVE-2009-1045
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=313565 |
CVE-2010-1158
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=51285 |
CVE-2004-0771
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=59526 |
CVE-2004-1453
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=67667 |
CVE-2004-1097
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=72113 |
CVE-2004-0946
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=75181 |
CVE-2005-0627
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=77731 |
CVE-2005-0427
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=83541 |
CVE-2005-0687
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=83686 |
CVE-2005-0665
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=83792 |
CVE-2005-0653
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=84659 |
CVE-2005-0830
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=84680 |
CVE-2005-0764
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=85770 |
CVE-2005-0825
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=87916 |
CVE-2005-1122 CVE-2005-1123
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=88537 |
CVE-2005-1108 CVE-2005-1109
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=90423 |
CVE-2005-1275 CVE-2005-1739
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=90622 |
CVE-2005-1151 CVE-2005-1152
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=90626 |
CVE-2005-0758
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=91584 |
CVE-2005-1544
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=91785 |
CVE-2005-1707
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=93079 |
CVE-2005-1874
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=93558 |
CVE-2005-1941
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=93782 |
CVE-2005-1751 CVE-2005-1759
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=94473 |
CVE-2005-1880
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=94584 |
CVE-2005-2459
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=94722 |
CVE-2005-1266
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=95492 |
CVE-2005-2024
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=96320 |
CVE-2005-2050
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=96782 |
CVE-2005-2449
|
MISC:http://bugs.gentoo.org/show_bug.cgi?id=99464 |
CVE-2005-4807
|
MISC:http://bugs.ghostscript.com/show_bug.cgi?id=691295 |
CVE-2010-1628
|
MISC:http://bugs.ghostscript.com/show_bug.cgi?id=691339 |
CVE-2010-4820
|
MISC:http://bugs.ghostscript.com/show_bug.cgi?id=692856 |
CVE-2012-4875
|
MISC:http://bugs.horde.org/show_bug.cgi?id=916 |
CVE-2002-0181 CVE-2002-2024
|
MISC:http://bugs.horde.org/ticket/11189 |
CVE-2012-6620
|
MISC:http://bugs.hylafax.org/bugzilla/show_bug.cgi?id=719 |
CVE-2005-3538 CVE-2005-3539
|
MISC:http://bugs.icu-project.org/trac/changeset/39671 |
CVE-2017-7867 CVE-2017-7868
|
MISC:http://bugs.icu-project.org/trac/changeset/40494 |
CVE-2017-15396
|
MISC:http://bugs.kde.org/show_bug.cgi?id=102328 |
CVE-2005-1046
|
MISC:http://bugs.kde.org/show_bug.cgi?id=138499 |
CVE-2006-6979
|
MISC:http://bugs.kde.org/show_bug.cgi?id=96020 |
CVE-2005-0404
|
MISC:http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=11660 |
CVE-2014-1922
|
MISC:http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=11661 |
CVE-2014-1923
|
MISC:http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=11662 |
CVE-2014-1923
|
MISC:http://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=11666 |
CVE-2014-1924 CVE-2014-1925
|
MISC:http://bugs.ledger-cli.org/show_bug.cgi?id=1222 |
CVE-2017-12481
|
MISC:http://bugs.ledger-cli.org/show_bug.cgi?id=1224 |
CVE-2017-12482
|
MISC:http://bugs.libgd.org/?do=details&task_id=89 |
CVE-2007-3472
|
MISC:http://bugs.libgd.org/?do=details&task_id=94 |
CVE-2007-3473
|
MISC:http://bugs.mantisbt.org/changelog_page.php |
CVE-2005-3335
|
MISC:http://bugs.mantisbugtracker.com/view.php?id=3375 |
CVE-2006-6574
|
MISC:http://bugs.mantisbugtracker.com/view.php?id=7364 |
CVE-2006-6574
|
MISC:http://bugs.monkey-project.com/ticket/185 |
CVE-2013-2181
|
MISC:http://bugs.musicbrainz.org/ticket/1764 |
CVE-2006-3600
|
MISC:http://bugs.mysql.com/2408 |
CVE-2004-0837
|
MISC:http://bugs.mysql.com/bug.php?id=15195 |
CVE-2006-4031
|
MISC:http://bugs.mysql.com/bug.php?id=17647 |
CVE-2006-4226
|
MISC:http://bugs.mysql.com/bug.php?id=20622 |
CVE-2006-3486
|
MISC:http://bugs.mysql.com/bug.php?id=20729 |
CVE-2006-3469
|
MISC:http://bugs.mysql.com/bug.php?id=23675 |
CVE-2007-2693
|
MISC:http://bugs.mysql.com/bug.php?id=25578 |
CVE-2007-3781
|
MISC:http://bugs.mysql.com/bug.php?id=27337 |
CVE-2007-2692
|
MISC:http://bugs.mysql.com/bug.php?id=27515 |
CVE-2007-2691
|
MISC:http://bugs.mysql.com/bug.php?id=28984 |
CVE-2007-3780
|
MISC:http://bugs.mysql.com/bug.php?id=3270 |
CVE-2004-0835
|
MISC:http://bugs.mysql.com/bug.php?id=39337 |
CVE-2008-6992
|
MISC:http://bugs.mysql.com/bug.php?id=4017 |
CVE-2004-0836
|
MISC:http://bugs.mysql.com/bug.php?id=54461 |
CVE-2010-3838
|
MISC:http://bugs.mysql.com/bug.php?id=54575 |
CVE-2010-3677
|
MISC:http://bugs.mysql.com/bug.php?id=55564 |
CVE-2010-3835
|
MISC:http://bugs.mysql.com/bug.php?id=55568 |
CVE-2010-3834
|
MISC:http://bugs.mysql.com/bug.php?id=55826 |
CVE-2010-3833
|
MISC:http://bugs.mysql.com/bug.php?id=64884 |
CVE-2012-2122
|
MISC:http://bugs.mysql.com/bug.php?id=66550 |
CVE-2012-4414
|
MISC:http://bugs.openttd.org/task/3909/getfile/6237/loop_fix.patch |
CVE-2010-2534
|
MISC:http://bugs.php.net/38915 |
CVE-2003-1307
|
MISC:http://bugs.php.net/bug.php?id=34704 |
CVE-2005-3353
|
MISC:http://bugs.php.net/bug.php?id=35307 |
CVE-2005-3883
|
MISC:http://bugs.php.net/bug.php?id=37265 |
CVE-2006-7204
|
MISC:http://bugs.php.net/bug.php?id=40578 |
CVE-2007-3478
|
MISC:http://bugs.php.net/bug.php?id=42862 |
CVE-2008-2829
|
MISC:http://bugs.php.net/bug.php?id=48230 |
CVE-2010-3870
|
MISC:http://bugs.php.net/bug.php?id=50063 |
CVE-2009-3559
|
MISC:http://bugs.phpwebgallery.net/view.php?id=769 |
CVE-2008-3451
|
MISC:http://bugs.proftpd.org/show_bug.cgi?id=3115 |
CVE-2008-4247
|
MISC:http://bugs.proftpd.org/show_bug.cgi?id=3536 |
CVE-2010-4652
|
MISC:http://bugs.proftpd.org/show_bug.cgi?id=4372 |
CVE-2019-12815
|
MISC:http://bugs.python.org/issue13703#msg151870 |
CVE-2012-0876
|
MISC:http://bugs.python.org/issue14579 |
CVE-2012-2135
|
MISC:http://bugs.python.org/issue21766 |
CVE-2014-4650
|
MISC:http://bugs.python.org/issue6706 |
CVE-2009-5010 CVE-2010-3493 CVE-2010-3494 CVE-2010-3495
|
MISC:http://bugs.python.org/issue9061 |
CVE-2010-2480
|
MISC:http://bugs.python.org/msg64682 |
CVE-2008-1679
|
MISC:http://bugs.shaftnet.org/task/113 |
CVE-2006-6246
|
MISC:http://bugs.splitbrain.org/index.php?do=details&task_id=1195 |
CVE-2007-3930
|
MISC:http://bugs.squid-cache.org/show_bug.cgi?id=2858 |
CVE-2010-0639
|
MISC:http://bugs.squid-cache.org/show_bug.cgi?id=3237#c12 |
CVE-2011-4096
|
MISC:http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=4396719 |
CVE-2003-1301
|
MISC:http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=4944300 |
CVE-2003-1301
|
MISC:http://bugs.typo3.org/view.php?id=1250 |
CVE-2005-4875
|
MISC:http://bugs.typo3.org/view.php?id=16362 |
CVE-2010-5102
|
MISC:http://bugs.typo3.org/view.php?id=2248 |
CVE-2006-0327
|
MISC:http://bugs.webidsupport.com/view.php?id=646 |
CVE-2018-1000882
|
MISC:http://bugs.webidsupport.com/view.php?id=647 |
CVE-2018-1000867
|
MISC:http://bugs.webidsupport.com/view.php?id=648 |
CVE-2018-1000868
|
MISC:http://bugs.winehq.org/show_bug.cgi?id=2715 |
CVE-2005-0787
|
MISC:http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1200 |
CVE-2007-0459
|
MISC:http://bugtraq.ru/cgi-bin/forum.mcgi?type=sb&b=2&m=152274 |
CVE-2008-6819
|
MISC:http://bugzilla.cpanel.net/show_bug.cgi?id=283 |
CVE-2004-0490
|
MISC:http://bugzilla.cpanel.net/show_bug.cgi?id=4282 |
CVE-2006-3337
|
MISC:http://bugzilla.ganglia.info/cgi-bin/bugzilla/show_bug.cgi?id=223 |
CVE-2009-0241
|
MISC:http://bugzilla.gnome.org/show_bug.cgi?id=317312 |
CVE-2005-0023
|
MISC:http://bugzilla.gnome.org/show_bug.cgi?id=447414 |
CVE-2007-3257
|
MISC:http://bugzilla.gnome.org/show_bug.cgi?id=524715 |
CVE-2008-2696
|
MISC:http://bugzilla.gnome.org/show_bug.cgi?id=569214 |
CVE-2009-0314
|
MISC:http://bugzilla.gnome.org/show_bug.cgi?id=581604 |
CVE-2009-1631
|
MISC:http://bugzilla.gnome.org/show_bug.cgi?id=701302 |
CVE-2013-3718
|
MISC:http://bugzilla.gnome.org/show_bug.cgi?id=783026 |
CVE-2017-5130
|
MISC:http://bugzilla.kernel.org/show_bug.cgi?id=10423 |
CVE-2009-1265
|
MISC:http://bugzilla.kernel.org/show_bug.cgi?id=2966 |
CVE-2006-2935
|
MISC:http://bugzilla.kernel.org/show_bug.cgi?id=8155 |
CVE-2007-1388
|
MISC:http://bugzilla.kernel.org/show_bug.cgi?id=8765 |
CVE-2007-3731
|
MISC:http://bugzilla.maptools.org/attachment.cgi?id=477&action=diff |
CVE-2012-1173
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2487 |
CVE-2014-8129
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2488 |
CVE-2014-8129
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2500 |
CVE-2018-5360
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2546 |
CVE-2016-3658
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2547 |
CVE-2016-3634
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2548 |
CVE-2016-3633
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2565 |
CVE-2016-3621
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2566 |
CVE-2016-3625
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2567 |
CVE-2016-3619
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2568 |
CVE-2016-3624
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2570 |
CVE-2016-3620
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2593 |
CVE-2016-9448
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2651 |
CVE-2017-7593
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2654 |
CVE-2017-5849
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2655 |
CVE-2017-5849
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2658 |
CVE-2017-7592
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2659 |
CVE-2017-7594
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2664 |
CVE-2017-5563
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2682 |
CVE-2017-9815
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2690 |
CVE-2017-9117
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2693 |
CVE-2017-9147
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2704 |
CVE-2017-9935
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2706 |
CVE-2017-9936
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2707 |
CVE-2017-9937
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2712 |
CVE-2017-10688
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2715 |
CVE-2017-11335
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2727 |
CVE-2017-13726
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2728 |
CVE-2017-13727
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2730 |
CVE-2017-14528
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2745 |
CVE-2019-1010006
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2750 |
CVE-2017-17095
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2767 |
CVE-2017-17942
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2769 |
CVE-2017-17973
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2772 |
CVE-2018-5784
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2778 |
CVE-2018-7456
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2780 |
CVE-2018-8905
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2786 |
CVE-2018-10126
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2788 |
CVE-2018-10779
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2790 |
CVE-2018-10801
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2795 |
CVE-2018-10963
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2798 |
CVE-2018-12900
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2807 |
CVE-2018-17101
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2808 |
CVE-2018-15209
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2809 |
CVE-2018-16335
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2810 |
CVE-2018-17100
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2811 |
CVE-2018-17000
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2816 |
CVE-2018-17795
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2819 |
CVE-2018-18661
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2820 |
CVE-2018-19210
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2831 |
CVE-2020-19131
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2833 |
CVE-2019-7663
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2836 |
CVE-2019-6128
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2851 |
CVE-2020-19143
|
MISC:http://bugzilla.maptools.org/show_bug.cgi?id=2852 |
CVE-2020-19144
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=102141 |
CVE-2002-0009
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=108385 |
CVE-2002-0008
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=108516 |
CVE-2002-0008
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=108812 |
CVE-2002-0010
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=108821 |
CVE-2002-0010
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=108822 |
CVE-2002-0010
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=109679 |
CVE-2002-0010
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=109690 |
CVE-2002-0010
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=146244 |
CVE-2003-0154
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=147777 |
CVE-2002-2435
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=152725 |
CVE-2002-2314
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=154030 |
CVE-2002-2359
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=157646 |
CVE-2002-1308
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=162134 |
CVE-2004-1753
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=289940 |
CVE-2005-2260
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=54901 |
CVE-2002-0007
|
MISC:http://bugzilla.mozilla.org/show_bug.cgi?id=98146 |
CVE-2002-0011
|
MISC:http://bugzilla.opengroupware.org/bugzilla/show_bug.cgi?id=1060 |
CVE-2004-1771
|
MISC:http://bugzilla.opennms.org/show_bug.cgi?id=2760 |
CVE-2008-6095
|
MISC:http://bugzilla.openpegasus.org/show_bug.cgi?id=9182 |
CVE-2011-4967
|
MISC:http://bugzilla.padl.com/show_bug.cgi?id=210 |
CVE-2005-2069
|
MISC:http://bugzilla.padl.com/show_bug.cgi?id=211 |
CVE-2005-2069
|
MISC:http://bugzilla.redhat.com/bugzilla/long_list.cgi?buglist=114535 |
CVE-2004-0154
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1002375 |
CVE-2013-4288
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=112078 |
CVE-2003-0966
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=11880 |
CVE-2000-0520
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=120060 |
CVE-2004-2395 CVE-2004-2396
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=177755 |
CVE-2006-2933
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593 |
CVE-2006-3467
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=195902 |
CVE-2006-2451
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204676 |
CVE-2006-4334 CVE-2006-4335 CVE-2006-4336 CVE-2006-4337 CVE-2006-4338
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218287 |
CVE-2006-6303
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=223129 |
CVE-2007-0001
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=228858 |
CVE-2007-0988
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=233478 |
CVE-2007-1592
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=242558 |
CVE-2007-3104
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=243252 |
CVE-2007-0773
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=244658 |
CVE-2007-1863
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245111 |
CVE-2007-3304
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245112 |
CVE-2006-5752
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245580 |
CVE-2007-3107
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194 |
CVE-2007-3387
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921 |
CVE-2007-4131
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=766469 |
CVE-2011-4605
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=827558 |
CVE-2012-2681
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=829421 |
CVE-2012-2680
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=830243 |
CVE-2012-2683
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=830245 |
CVE-2012-2684
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=830248 |
CVE-2012-2685
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=832124 |
CVE-2012-2734
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=832151 |
CVE-2012-2735
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=846501 |
CVE-2012-3459
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=885569 |
CVE-2012-5629
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=910938 |
CVE-2013-0287
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=911658 |
CVE-2013-0292
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=97958 |
CVE-2003-0788
|
MISC:http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-3848 |
CVE-2007-3848
|
MISC:http://bugzilla.remotesensing.org/show_bug.cgi?id=1029 |
CVE-2006-0405
|
MISC:http://bugzilla.remotesensing.org/show_bug.cgi?id=1034 |
CVE-2006-0405
|
MISC:http://bugzilla.remotesensing.org/show_bug.cgi?id=1102 |
CVE-2006-2024 CVE-2006-2025 CVE-2006-2026
|
MISC:http://bugzilla.remotesensing.org/show_bug.cgi?id=111 |
CVE-2004-0804
|
MISC:http://bugzilla.remotesensing.org/show_bug.cgi?id=843 |
CVE-2005-1544
|
MISC:http://bugzilla.wikimedia.org/show_bug.cgi?id=6055 |
CVE-2006-2611
|
MISC:http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1817 |
CVE-2012-2625
|
MISC:http://bugzilla.xfce.org/show_bug.cgi?id=4805 |
CVE-2009-4996
|
MISC:http://build.prestashop.com/news/prestashop-1-7-3-4-1-6-1-20-maintenance-releases/ |
CVE-2018-13784
|
MISC:http://build.prestashop.com/news/prestashop-1-7-4-4-1-6-1-23-maintenance-releases/ |
CVE-2018-19124 CVE-2018-19125 CVE-2018-19126
|
MISC:http://builds.kayako.net/ |
CVE-2006-5825
|
MISC:http://burnachurch.com/67/directory-traversal-luecke-in-aconon-mail/ |
CVE-2008-0464
|
MISC:http://burninatorsec.blogspot.com/2018/11/reporting-c-serialization-remote-code.html |
CVE-2020-15865
|
MISC:http://burninatorsec.blogspot.com/2020/09/cve-2020-13972-xss-via-ssrf-in.html |
CVE-2020-13972
|
MISC:http://burninatorsec.blogspot.com/2021/04/cve-2020-26885-xss-in-2sxc.html?m=1 |
CVE-2020-26885
|
MISC:http://buttercms.com |
CVE-2022-27260
|
MISC:http://c-skills.blogspot.com/2011/01/adb-trickery-again.html |
CVE-2011-1149
|
MISC:http://c-skills.blogspot.com/2011/04/yummy-yummy-gingerbreak.html |
CVE-2011-1823
|
MISC:http://c-skills.blogspot.com/2011/11/openpam-trickery.html |
CVE-2011-4122 CVE-2011-5054
|
MISC:http://c1a.eu/dlink-dap-1360.html |
CVE-2019-18666
|
MISC:http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638 |
CVE-1999-0656
|
MISC:http://cache-www.intel.com/cd/00/00/21/57/215792_215792.pdf |
CVE-2005-3105
|
MISC:http://cachebleed.info |
CVE-2016-0702
|
MISC:http://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20(Brad%20Woodberg%20-%20Final).pptx |
CVE-2013-5663
|
MISC:http://cansecwest.com/index.html |
CVE-2009-1042 CVE-2009-1043 CVE-2009-1044 CVE-2009-1060
|
MISC:http://cansecwest.com/post/2007-04-20-14:54:00.First_Mac_Hacked_Cancel_Or_Allow |
CVE-2007-2175
|
MISC:http://cansecwest.com/slides/2013/PrivateCore%20CSW%202013.pdf |
CVE-2013-1929
|
MISC:http://caphyon.com |
CVE-2022-27438
|
MISC:http://capnbry.net/daoc/advisory20040323/ |
CVE-2004-1855
|
MISC:http://captainholly.wordpress.com/2009/06/19/slowloris-vs-tomcat/ |
CVE-2012-5568
|
MISC:http://casap.com |
CVE-2021-27332 CVE-2021-3294
|
MISC:http://castlecops.com/t123194-.html |
CVE-2005-1193
|
MISC:http://cat.eyalro.net/ |
CVE-2018-16868 CVE-2018-16869 CVE-2018-16870 CVE-2018-19608
|
MISC:http://catless.ncl.ac.uk/Risks/20.41.html#subj4 |
CVE-1999-1444
|
MISC:http://caucho.com/resin-4.0/changes/changes.xtp |
CVE-2012-2965 CVE-2012-2966 CVE-2012-2967 CVE-2012-2968 CVE-2012-2969
|
MISC:http://cce-interact.cvs.sourceforge.net/cce-interact/Interact/includes/common.inc.php?r1=1.259&r2=1.260 |
CVE-2007-4177
|
MISC:http://ccsinjection.lepidum.co.jp |
CVE-2014-0224
|
MISC:http://ceaseless.ws/bb-csrf/ |
CVE-2008-3421
|
MISC:http://cedri.cc/advisories/EXIF_XSS.txt |
CVE-2005-2735 CVE-2005-2736 CVE-2005-2737
|
MISC:http://census-labs.com/media/corex.txt |
CVE-2009-3586
|
MISC:http://census-labs.com/news/2009/06/08/libtorrent-rasterbar/ |
CVE-2009-1760
|
MISC:http://census-labs.com/news/2009/12/02/corehttp-web-server/ |
CVE-2009-3586
|
MISC:http://census-labs.com/news/2011/10/03/netvolution-referer-SQLi/ |
CVE-2011-3340
|
MISC:http://census-labs.com/news/2016/01/11/gdcm-buffer-overflow-imageregionreaderreadintobuffer/ |
CVE-2015-8396
|
MISC:http://census-labs.com/news/2016/01/11/gdcm-out-bounds-read-jpeglscodec-decodeextent/ |
CVE-2015-8397
|
MISC:http://centreon.com |
CVE-2021-27676
|
MISC:http://cerberusweb.com/cvsweb.pl/support-center/cerberus-support-center/includes/widgets/module_company_tickets.php.diff?r1=1.6;r2=1.7;f=h |
CVE-2006-4539
|
MISC:http://cerberusweb.com/cvsweb.pl/support-center/cerberus-support-center/includes/widgets/module_track_tickets.php.diff?r1=1.17;r2=1.18;f=h |
CVE-2006-4539
|
MISC:http://cerebusforensics.com/yealink/exploit.html |
CVE-2019-14656 CVE-2019-14657
|
MISC:http://ceriksen.com/2012/07/10/wordpress-a-page-flip-book-plugin-local-file-inclusion-vulnerability/ |
CVE-2012-6652
|
MISC:http://ceriksen.com/2013/08/06/squash-remote-code-execution-vulnerability-advisory/ |
CVE-2013-5036
|
MISC:http://ceriksen.com/2013/08/20/graphite-remote-code-execution-vulnerability-advisory/ |
CVE-2013-5093
|
MISC:http://cert.fi/en/reports/2010/vulnerability341748.html |
CVE-2010-0006
|
MISC:http://cert.fi/haavoittuvuudet/2008/advisory-netbsd.html |
CVE-2008-2464
|
MISC:http://cert.fi/haavoittuvuudet/2008/advisory-openssl.html |
CVE-2008-0891 CVE-2008-1672
|
MISC:http://cert.netpeas.org/2011/06/cert-nps2011005-vulnerabilite-potentielle-dans-la-solution-de-gestion-de-la-securite-operationnelle-des-compagnies-aeriennes-%C2%AB-sentinel-safety-information-management-system-%C2%BB/ |
CVE-2011-1913
|
MISC:http://cert.netpeas.org/2011/06/cert-nps2011005-vulnerabilite-potentielle-dans-la-solution-de-gestion-de-la-securite-operationnelle-des-compagnies-aeriennes-suite/ |
CVE-2011-1913
|
MISC:http://cert.ssi.gouv.fr/site/CERTFR-2014-AVI-512/index.html |
CVE-2014-8500 CVE-2014-8601 CVE-2014-8602
|
MISC:http://cert.uni-stuttgart.de/advisories/al-ip-touch-vlan-filtering.php |
CVE-2007-2512
|
MISC:http://cert.uni-stuttgart.de/archive/suse/security/2002/12/msg00101.html |
CVE-2003-0690 CVE-2003-0692
|
MISC:http://ceruleanstudios.com/forums/showthread.php?s=84987af3601384b1dc7ea1f36b237c9c&threadid=64889 |
CVE-2005-3141
|
MISC:http://cewolf.sourceforge.net/new/index.html |
CVE-2022-28219
|
MISC:http://cgi.ebay.com/ws/eBayISAPI.dll?ViewItem&item=7203336538 |
CVE-2005-4131
|
MISC:http://cgi.nessus.org/plugins/dump.php3?id=14312 |
CVE-2004-1003
|
MISC:http://cgit.freedesktop.org/harfbuzz/commit/src/harfbuzz-gpos.c?id=da2c52abcd75d46929b34cad55c4fb2c8892bc08 |
CVE-2011-3193
|
MISC:http://cgit.freedesktop.org/libreoffice/filters/commit/?id=278831e37a23e9e2e29ca811c3a5398b7c67464d |
CVE-2011-2685
|
MISC:http://cgit.freedesktop.org/libreoffice/filters/commit/?id=d93fa011d713100775cd3ac88c468b6830d48877 |
CVE-2011-2685
|
MISC:http://cgit.freedesktop.org/pixman/commit/?id=de60e2e0e3eb6084f8f14b63f25b3cbfb012943f |
CVE-2013-1591
|
MISC:http://cgit.freedesktop.org/poppler/poppler/commit/?id=58e04a08afee39370283c494ee2e4e392fd3b684 |
CVE-2013-7296
|
MISC:http://cgit.freedesktop.org/poppler/poppler/commit/?id=71bad47ed6a36d825b0d08992c8db56845c71e40 |
CVE-2012-2142
|
MISC:http://cgit.freedesktop.org/poppler/poppler/commit/?id=e853106b58d6b4b0467dbd6436c9bb1cfbd372cf |
CVE-2010-3702
|
MISC:http://cgit.freedesktop.org/poppler/poppler/commit/NEWS?id=2bc48d5369f1dbecfc4db2878f33bdeb80d8d90f |
CVE-2012-2142
|
MISC:http://cgit.freedesktop.org/poppler/poppler/tree/fofi/FoFiType1.cc?id=4b4fc5c017bf147c9069bbce32fc14467bd2a81a |
CVE-2009-4035
|
MISC:http://cgit.freedesktop.org/xorg/xserver/commit/?id=d2f813f7db |
CVE-2010-1166
|
MISC:http://chamilo-lms.com |
CVE-2021-43687
|
MISC:http://changelog.cpanel.net/?revision=0;tree=;treeview=;show=html;pp=25;te=1314;pg=2 |
CVE-2008-2070
|
MISC:http://changelog.cpanel.net/index.cgi |
CVE-2007-0890
|
MISC:http://chargen.matasano.com/chargen/2015/3/17/this-new-vulnerability-mercurial-command-injection-cve-2014-9462.html |
CVE-2014-9462
|
MISC:http://checkmk.com |
CVE-2021-40904 CVE-2021-40905 CVE-2021-40906
|
MISC:http://cherokee-project.com/downloads.html |
CVE-2020-12845
|
MISC:http://chevereto.com |
CVE-2021-31721
|
MISC:http://chikista.com |
CVE-2021-42868
|
MISC:http://chromium.googlecode.com/issues/attachment?aid=5579180911289877192&name=Google+Chrome+Advisory.doc |
CVE-2009-1412 CVE-2009-1413
|
MISC:http://chrony.tuxfamily.org/News.html |
CVE-2015-1853
|
MISC:http://chroot.org/exploits/chroot_uu_007 |
CVE-2008-2672
|
MISC:http://chroot.org/exploits/chroot_uu_008 |
CVE-2008-2671
|
MISC:http://chroot.org/exploits/chroot_uu_009 |
CVE-2008-2668 CVE-2008-2669
|
MISC:http://chroot.org/exploits/chroot_uu_010 |
CVE-2007-3889 CVE-2008-2670
|
MISC:http://chxsecurity.org/advisories/adv-1-mid.txt |
CVE-2007-1894
|
MISC:http://chxsecurity.org/advisories/adv-2-mid.txt |
CVE-2007-3773
|
MISC:http://chxsecurity.org/advisories/adv-3-full.txt |
CVE-2008-4732 CVE-2008-4733 CVE-2008-4734
|
MISC:http://chyrp.net/2012/02/02/heres-whats-been-going-on-recently/ |
CVE-2012-1001
|
MISC:http://ciacfug.org/blog/updating-lucee-as-part-of-a-vulnerability-alert-response |
CVE-2021-21307
|
MISC:http://cimg.eu/ |
CVE-2019-13568
|
MISC:http://cinu.pl/research/wp-plugins/mail_041b796c7533880df03a43895fed5f00.html |
CVE-2015-9465
|
MISC:http://cinu.pl/research/wp-plugins/mail_082287dbf7a24d415ff71581fc248330.html |
CVE-2015-9461 CVE-2015-9462
|
MISC:http://cinu.pl/research/wp-plugins/mail_1a40d7e7a2c29847b939f2c7472c335e.html |
CVE-2015-9431
|
MISC:http://cinu.pl/research/wp-plugins/mail_28c91eee00e8e4b5868ebc58b5b1f730.html |
CVE-2015-9456
|
MISC:http://cinu.pl/research/wp-plugins/mail_36e814da6ac4dd903be2c77cfbdd0afd.html |
CVE-2015-9454
|
MISC:http://cinu.pl/research/wp-plugins/mail_3764bb40db5ed12aac2c7812d7544730.html |
CVE-2015-9434
|
MISC:http://cinu.pl/research/wp-plugins/mail_3a14a77571c73684103e0f517a92d757.html |
CVE-2015-9429
|
MISC:http://cinu.pl/research/wp-plugins/mail_468b117b2dc86cb3d2ae4b8c81884a99.html |
CVE-2015-9399
|
MISC:http://cinu.pl/research/wp-plugins/mail_489304900a50751da1495e2ea660bc51.html |
CVE-2015-9436 CVE-2015-9437
|
MISC:http://cinu.pl/research/wp-plugins/mail_4e7cf11876edb93517405b69cb033741.html |
CVE-2015-9428
|
MISC:http://cinu.pl/research/wp-plugins/mail_576345187f5867ec8921b12de5884fb1.html |
CVE-2015-9466
|
MISC:http://cinu.pl/research/wp-plugins/mail_58e88633599b7b2fc0f44ce6fa7ff27d.html |
CVE-2015-9433
|
MISC:http://cinu.pl/research/wp-plugins/mail_604dd4c86dca013f6e5e89751352f36d.html |
CVE-2015-9467 CVE-2015-9468
|
MISC:http://cinu.pl/research/wp-plugins/mail_642d8f7d8715d08f070a35b896f2d8bd.html |
CVE-2015-9449
|
MISC:http://cinu.pl/research/wp-plugins/mail_7ab7e224de198b2eda11dcb072d6bc8d.html |
CVE-2015-9397 CVE-2015-9398
|
MISC:http://cinu.pl/research/wp-plugins/mail_7c87194ce1dcf0642135d17a71ed91cd.html |
CVE-2015-9426
|
MISC:http://cinu.pl/research/wp-plugins/mail_8a2f7613577ea8e613ec274aeec14527.html |
CVE-2015-9448
|
MISC:http://cinu.pl/research/wp-plugins/mail_8af3902b4f3a5d06304937c7eab1ee35.html |
CVE-2015-9432
|
MISC:http://cinu.pl/research/wp-plugins/mail_9acbc3ef2dd43bfb78b6b3dcf6c5ef01.html |
CVE-2015-9420
|
MISC:http://cinu.pl/research/wp-plugins/mail_9ca443a3759e5c7fd889ae0e02e044e6.html |
CVE-2015-9457
|
MISC:http://cinu.pl/research/wp-plugins/mail_9e26c6f71bf8467e4a5017b15d5acddc.html |
CVE-2015-9425
|
MISC:http://cinu.pl/research/wp-plugins/mail_a7012199c9236754edd72786637e5d2d.html |
CVE-2015-9438
|
MISC:http://cinu.pl/research/wp-plugins/mail_ae9e4b6fefceaebd216ddcf003f88bdd.html |
CVE-2015-9401
|
MISC:http://cinu.pl/research/wp-plugins/mail_aea47a98ad3088dbb33528ded8e1b124.html |
CVE-2015-9424
|
MISC:http://cinu.pl/research/wp-plugins/mail_b31beb377f24e401c9ec44a0f331a174.html |
CVE-2015-9400
|
MISC:http://cinu.pl/research/wp-plugins/mail_b5405e735cb605b2fd1a300bb8be4860.html |
CVE-2015-9422 CVE-2015-9423
|
MISC:http://cinu.pl/research/wp-plugins/mail_b677bb83a6c1495f85f76faa5b13011d.html |
CVE-2015-9453
|
MISC:http://cinu.pl/research/wp-plugins/mail_cb24b6204803e8e94943b198edc37af7.html |
CVE-2015-9452
|
MISC:http://cinu.pl/research/wp-plugins/mail_d14e213879cd60e80e538bde21c0359b.html |
CVE-2015-9458 CVE-2015-9459
|
MISC:http://cinu.pl/research/wp-plugins/mail_d9e466122cd9a6ca27db840cca277cdb.html |
CVE-2015-9421
|
MISC:http://cinu.pl/research/wp-plugins/mail_dad9a09a6290ae952bfd97010583bdbd.html |
CVE-2015-9460
|
MISC:http://cinu.pl/research/wp-plugins/mail_e22c10161b1e2e4e54facf2d17e723c3.html |
CVE-2015-9430
|
MISC:http://cinu.pl/research/wp-plugins/mail_ec951d52aa603c9caaca8c7005b84004.html |
CVE-2015-9450 CVE-2015-9451
|
MISC:http://ciprianmp.com/ |
CVE-2019-19908
|
MISC:http://cirt.dk/advisories/cirt-39-advisory.pdf |
CVE-2005-3315
|
MISC:http://cirt.dk/advisories/cirt-40-advisory.pdf |
CVE-2005-1939
|
MISC:http://cirt.dk/advisories/cirt-42-advisory.txt |
CVE-2006-0992
|
MISC:http://cirt.dk/advisories/cirt-43-advisory.pdf |
CVE-2006-1172
|
MISC:http://cirt.dk/advisories/cirt-53-advisory.txt |
CVE-2007-1593
|
MISC:http://citp.princeton.edu/pub/coldboot.pdf |
CVE-2004-0622
|
MISC:http://citrustech.net/~chrisj/perl-httpd/INFO.txt |
CVE-2002-2131
|
MISC:http://classic.chem.msu.su/cgi-bin/ceilidh.exe/gran/gamess/forum/?C35e9ea936bHW-7675-1380-00.htm |
CVE-2011-0636
|
MISC:http://classic.chem.msu.su/cgi-bin/ceilidh.exe/gran/gamess/forum/?C35e9ea936bHW-7676-1022+00.htm |
CVE-2011-0636
|
MISC:http://classic.chem.msu.su/cgi-bin/ceilidh.exe/gran/gamess/forum/?C35e9ea936bHW-7677-1391+00.htm |
CVE-2011-0636
|
MISC:http://classic.chem.msu.su/cgi-bin/ceilidh.exe/gran/gamess/forum/?C35e9ea936bHW-7681-487+00.htm |
CVE-2011-0636
|
MISC:http://clicky.me/tlsvuln |
CVE-2009-3555
|
MISC:http://cloudscan.blogspot.com/2010/09/smarter-stats-533819-file-fuzzing.html |
CVE-2010-3486
|
MISC:http://cloudscan.blogspot.com/2010/09/vendorsmarterstats-bug-cross-site.html |
CVE-2010-3425
|
MISC:http://cm68.de/?cm68news_download |
CVE-2006-6462 CVE-2006-6544
|
MISC:http://cmsblog.msdazu.de/?p=209 |
CVE-2006-5495
|
MISC:http://co3k.org/blog/redcloth-unfixed-xss-en |
CVE-2012-6684
|
MISC:http://coastalsec.io/cve-2018-14772-remote-code-execution |
CVE-2018-14772
|
MISC:http://coastercms.com |
CVE-2020-35275
|
MISC:http://cod3rz.helloweb.eu/exploits/gaestebuch.txt |
CVE-2008-1314
|
MISC:http://codalabs.net/cla-2014-001 |
CVE-2014-2570
|
MISC:http://code.bulix.org/cx46qa-65489 |
CVE-2008-1243
|
MISC:http://code.bulix.org/koom78-65490 |
CVE-2008-1243
|
MISC:http://code.google.com/p/browsersec/wiki/Part2#Same-origin_policy_for_cookies |
CVE-2008-7293 CVE-2008-7294 CVE-2008-7295 CVE-2008-7296 CVE-2008-7297 CVE-2008-7298
|
MISC:http://code.google.com/p/chironfs/issues/detail?id=6 |
CVE-2007-5101
|
MISC:http://code.google.com/p/chromium/issues/detail?id=320183 |
CVE-2013-6645
|
MISC:http://code.google.com/p/chromium/issues/detail?id=32309 |
CVE-2010-0648
|
MISC:http://code.google.com/p/chromium/issues/detail?id=45400 |
CVE-2010-3414
|
MISC:http://code.google.com/p/chromium/issues/detail?id=48733 |
CVE-2011-1659
|
MISC:http://code.google.com/p/chromium/issues/detail?id=7338 |
CVE-2009-2060 CVE-2009-2071
|
MISC:http://code.google.com/p/chromium/issues/detail?id=82063 |
CVE-2011-2808
|
MISC:http://code.google.com/p/chromium/issues/detail?id=8473 |
CVE-2009-2060 CVE-2009-2071
|
MISC:http://code.google.com/p/chromium/issues/detail?id=97426 |
CVE-2011-3640
|
MISC:http://code.google.com/p/chromium/issues/detail?id=9877 |
CVE-2010-0051 CVE-2010-0652 CVE-2010-0653 CVE-2010-0654
|
MISC:http://code.google.com/p/cityhash/source/browse/trunk/NEWS |
CVE-2012-6051
|
MISC:http://code.google.com/p/ggbook/issues/detail?id=17 |
CVE-2012-5103
|
MISC:http://code.google.com/p/golismero/source/detail?r=2b3bb43d68676efd687361f7de29380189031ab8 |
CVE-2012-0054
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=128 |
CVE-2015-0010
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=136 |
CVE-2014-8836
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=149 |
CVE-2014-9161
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=151 |
CVE-2014-9675
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=153 |
CVE-2014-9674
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=154 |
CVE-2014-9673
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=155 |
CVE-2014-9672
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=157 |
CVE-2014-9671
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=158 |
CVE-2014-9670
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=163 |
CVE-2014-9669
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=164 |
CVE-2014-9668
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=166 |
CVE-2014-9667
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=167 |
CVE-2014-9666
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=168 |
CVE-2014-9665
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=183 |
CVE-2014-9664
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=184 |
CVE-2014-9663
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=185 |
CVE-2014-9662
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=187 |
CVE-2014-9661
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=188 |
CVE-2014-9660
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=190 |
CVE-2014-9659
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=194 |
CVE-2014-9658
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=195 |
CVE-2014-9657
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=196 |
CVE-2014-9656
|
MISC:http://code.google.com/p/google-security-research/issues/detail?id=21 |
CVE-2014-8823
|
MISC:http://code.google.com/p/googleappengine/wiki/SdkReleaseNotes |
CVE-2011-1364 CVE-2011-4211 CVE-2011-4212 CVE-2011-4213
|
MISC:http://code.google.com/p/inception-h2hc/ |
CVE-2008-4844
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README |
CVE-2011-3695 CVE-2011-3696 CVE-2011-3697 CVE-2011-3698 CVE-2011-3699 CVE-2011-3700 CVE-2011-3701 CVE-2011-3702 CVE-2011-3703 CVE-2011-3704 CVE-2011-3705 CVE-2011-3706 CVE-2011-3707 CVE-2011-3708 CVE-2011-3709 CVE-2011-3710 CVE-2011-3711 CVE-2011-3712 CVE-2011-3713 CVE-2011-3714 CVE-2011-3715 CVE-2011-3716 CVE-2011-3717 CVE-2011-3718 CVE-2011-3719 CVE-2011-3720 CVE-2011-3721 CVE-2011-3722 CVE-2011-3723 CVE-2011-3724 CVE-2011-3725 CVE-2011-3726 CVE-2011-3727 CVE-2011-3728 CVE-2011-3729 CVE-2011-3730 CVE-2011-3731 CVE-2011-3732 CVE-2011-3733 CVE-2011-3734 CVE-2011-3735 CVE-2011-3736 CVE-2011-3737 CVE-2011-3738 CVE-2011-3739 CVE-2011-3740 CVE-2011-3741 CVE-2011-3742 CVE-2011-3743 CVE-2011-3744 CVE-2011-3745 CVE-2011-3746 CVE-2011-3747 CVE-2011-3748 CVE-2011-3749 CVE-2011-3750 CVE-2011-3751 CVE-2011-3752 CVE-2011-3753 CVE-2011-3754 CVE-2011-3755 CVE-2011-3756 CVE-2011-3757 CVE-2011-3758 CVE-2011-3759 CVE-2011-3760 CVE-2011-3761 CVE-2011-3762 CVE-2011-3763 CVE-2011-3764 CVE-2011-3765 CVE-2011-3766 CVE-2011-3767 CVE-2011-3768 CVE-2011-3769 CVE-2011-3770 CVE-2011-3771 CVE-2011-3772 CVE-2011-3773 CVE-2011-3774 CVE-2011-3775 CVE-2011-3776 CVE-2011-3777 CVE-2011-3778 CVE-2011-3779 CVE-2011-3780 CVE-2011-3781 CVE-2011-3782 CVE-2011-3783 CVE-2011-3784 CVE-2011-3785 CVE-2011-3786 CVE-2011-3787 CVE-2011-3788 CVE-2011-3789 CVE-2011-3790 CVE-2011-3791 CVE-2011-3792 CVE-2011-3793 CVE-2011-3794 CVE-2011-3795 CVE-2011-3796 CVE-2011-3797 CVE-2011-3798 CVE-2011-3799 CVE-2011-3800 CVE-2011-3801 CVE-2011-3802 CVE-2011-3803 CVE-2011-3804 CVE-2011-3805 CVE-2011-3806 CVE-2011-3807 CVE-2011-3808 CVE-2011-3809 CVE-2011-3810 CVE-2011-3811 CVE-2011-3812 CVE-2011-3813 CVE-2011-3814 CVE-2011-3815 CVE-2011-3816 CVE-2011-3817 CVE-2011-3818 CVE-2011-3819 CVE-2011-3820 CVE-2011-3821 CVE-2011-3822 CVE-2011-3823 CVE-2011-3824 CVE-2011-3825 CVE-2011-3826
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/111WebCalendar-1.2.3 |
CVE-2011-3695
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/60cycleCMS.2.5.2 |
CVE-2011-3696
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/ATutor-2.0 |
CVE-2011-3706
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/AdaptCMS_2.0.2_Beta |
CVE-2011-3698
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/AlegroCart_1.2.3 |
CVE-2011-3701
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/Ananta_Gazelle1.0 |
CVE-2011-3702
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/Arctic-Fox-CMS-v0.9.4 |
CVE-2011-3705
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/CodeIgniter_1.7.2 |
CVE-2011-3719
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/CopperminePhotoGallery-1.5.12 |
CVE-2011-3722
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/CubeCart-4.4.3 |
CVE-2011-3724
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/DoceboLMS_4.0.4 |
CVE-2011-3726
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/Dolphin-7.0.4 |
CVE-2011-3728
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/ExoPHPDesk_1.2.1 |
CVE-2011-3736
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/MicroBlog_0-9-5 |
CVE-2011-3756
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/NuSOAP |
CVE-2011-3761
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/OpenBlog-1.2.1 |
CVE-2011-3762
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PHP-Easy-Survey-Package-2.1.1 |
CVE-2011-3774
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PHP-Nuke-8.0 |
CVE-2011-3784
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PHP-Point-Of-Sale-10.7 |
CVE-2011-3785
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PHPDevShell-V3.0.0-Beta-4b |
CVE-2011-3773
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PHPfileNavigator-2.3.3 |
CVE-2011-3775
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PhpGedView-all-4.2.3 |
CVE-2011-3778
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PhpHostBot_2.0 |
CVE-2011-3779
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PhpSecInfo |
CVE-2011-3788
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/PliggCMS1.1.3 |
CVE-2011-3794
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/ReOS_v2_0_5 |
CVE-2011-3799
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/SugarCRM-6.1.0 |
CVE-2011-3803
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/TinyWebGallery-1.8.3 |
CVE-2011-3810
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/WSN_Software_6.0.6 |
CVE-2011-3820
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/WeBid-1.0.0 |
CVE-2011-3815
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/WebCalendar-1.2.3 |
CVE-2011-3814
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/WebsiteBaker_2.8.1 |
CVE-2011-3817
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/WoW-Server-Status_4.1 |
CVE-2011-3819
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/Zend |
CVE-2011-3825
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/achievo-1.4.5 |
CVE-2011-3697
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/adodb |
CVE-2011-3699
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/aef-1.0.8 |
CVE-2011-3700
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/anecms-1.0 |
CVE-2011-3703
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/appRain-d-0.1.0 |
CVE-2011-3704
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/auth |
CVE-2011-3707
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/automne4-v4_0_2-install |
CVE-2011-3708
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/b2evolution-3.3.3 |
CVE-2011-3709
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/bbpress-1.0.2 |
CVE-2011-3710
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/bigace_2.7.5 |
CVE-2011-3711
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/cakephp-1.3.7 |
CVE-2011-3712
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/cftp-r80 |
CVE-2011-3713
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/clansphere_2010.0 |
CVE-2011-3714
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/clantiger1.1.3 |
CVE-2011-3715
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/claroline-1.9.7 |
CVE-2011-3716
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/clipbucket_2.0.9_stable_Fr |
CVE-2011-3717
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/cmsmadesimple-1.9.2 |
CVE-2011-3718
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/conceptcms_inst10_0531_100820 |
CVE-2011-3720
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/concrete5.4.0.5 |
CVE-2011-3721
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/craftysyntax3.0.2 |
CVE-2011-3723
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/deluxebb-1.3 |
CVE-2011-3725
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/dokuwiki-2009-12-25c |
CVE-2011-3727
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/dotproject-2.1.4 |
CVE-2011-3729
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/drupal-7.0 |
CVE-2011-3730
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/e107_0.7.24 |
CVE-2011-3731
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/eggblog_4.1.2 |
CVE-2011-3732
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/elgg-1.7.6 |
CVE-2011-3733
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/energine-2.3.8 |
CVE-2011-3734
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/escort-agency-cms |
CVE-2011-3735
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/eyeOS-2.2.0.0 |
CVE-2011-3737
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/fengoffice_1.7.2 |
CVE-2011-3738
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/freeway_1_5_alpha_Burstow |
CVE-2011-3739
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/frontaccounting-2.3.1 |
CVE-2011-3740
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/ganglia-3.1.7 |
CVE-2011-3741
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/helpcenterlive-2.1.7 |
CVE-2011-3742
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/hesk-2.2 |
CVE-2011-3743
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/htmlpurifier-4.2.0 |
CVE-2011-3744
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/hycuscms-1.0.3 |
CVE-2011-3745
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/jcow.4.2.1 |
CVE-2011-3746
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/joomla-1.6.0 |
CVE-2011-3747
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/ka-map-1.0-20070205 |
CVE-2011-3749
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/kamads-2_b3 |
CVE-2011-3748
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/kplaylist.1.8.502 |
CVE-2011-3750
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/lifetype-1.2.10 |
CVE-2011-3751
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/limesurvey190plus-build9642-20101214 |
CVE-2011-3752
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/linpha-1.3.4 |
CVE-2011-3753
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/mambo-4.6.5 |
CVE-2011-3754
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/mantisbt-1.2.4 |
CVE-2011-3755
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/moodle-2.0.1 |
CVE-2011-3757
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/mound-2.1.6 |
CVE-2011-3758
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/mybb-1.6 |
CVE-2011-3759
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/nucleus3.61 |
CVE-2011-3760
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/open-realty-2.5.8 |
CVE-2011-3765
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/opencart_v1.4.9.3 |
CVE-2011-3763
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/opendocman-1.2.6-svn-2011-01-21 |
CVE-2011-3764
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/orangehrm-2.6.0.2 |
CVE-2011-3766
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/oscommerce-3.0a5 |
CVE-2011-3767
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phorum-5.2.15a |
CVE-2011-3768
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phpAlbum_v0.4.1.14.fix06 |
CVE-2011-3770
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phpBook-2.1.0 |
CVE-2011-3771
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phpFormGen-2.09 |
CVE-2011-3776
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phpScheduleIt_1.2.12 |
CVE-2011-3787
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phpads-2.0 |
CVE-2011-3769
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phpcollab-2.5 |
CVE-2011-3772
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phpfreechat-1.3 |
CVE-2011-3777
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phpicalendar-2.4 |
CVE-2011-3780
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phpids-0.6.5 |
CVE-2011-3781
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phpld-2-151.2.0 |
CVE-2011-3782
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phpmyfaq-2.6.13 |
CVE-2011-3783
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phprojekt-6.0.5 |
CVE-2011-3786
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phpwcms-1.4.7r412 |
CVE-2011-3789
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/piwigo-2.1.5 |
CVE-2011-3790
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/piwik-1.1 |
CVE-2011-3791
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/pixelpost_v1.7.3 |
CVE-2011-3792
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/pixie_v1.04 |
CVE-2011-3793
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/podcastgen1.3 |
CVE-2011-3795
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/prestashop_1.4.0.6 |
CVE-2011-3796
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/projectpier-0.8.0.3 |
CVE-2011-3797
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/rapidleech-2.3-v42-svn322 |
CVE-2011-3798
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/serendipity-1.5.5 |
CVE-2011-3800
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/simpletest-1.0.1 |
CVE-2011-3801
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/statusnet-0.9.6 |
CVE-2011-3802
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/sweetrice-0.7.1 |
CVE-2011-3804
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/taskfreak-multi-mysql-0.6 |
CVE-2011-3805
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/tcexam_11.1.015 |
CVE-2011-3806
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/textpattern-4.2.0 |
CVE-2011-3807
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/theHostingTool-v1.2.3 |
CVE-2011-3809
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/thebuggenie_2.1.2 |
CVE-2011-3808
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/tomatocart-1.1.3 |
CVE-2011-3811
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/vanilla-2.0.16 |
CVE-2011-3812
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/vwar-1.5.0r15 |
CVE-2011-3813
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/webinsta-mail-list-1.3e |
CVE-2011-3816
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/wordpress_2.9.2 |
CVE-2011-3818
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/xajax |
CVE-2011-3821
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/xoops-2.5.0 |
CVE-2011-3822
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/yamamah_1.0 |
CVE-2011-3823
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/yourls-1.5 |
CVE-2011-3824
|
MISC:http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/zikula-1.2.4 |
CVE-2011-3826
|
MISC:http://code.google.com/p/libproxy/source/detail?r=853 |
CVE-2012-4504
|
MISC:http://code.google.com/p/maviliguestbook/issues/detail?id=1 |
CVE-2012-5296 CVE-2012-5297 CVE-2012-5298 CVE-2012-5299
|
MISC:http://code.google.com/p/memcachedb/source/browse/trunk/ChangeLog?spec=svn98&r=98 |
CVE-2009-1494
|
MISC:http://code.google.com/p/memcachedb/source/detail?r=98 |
CVE-2009-1494
|
MISC:http://code.google.com/p/memcachedb/source/diff?spec=svn98&r=98&format=side&path=/trunk/memcachedb.c |
CVE-2009-1494
|
MISC:http://code.google.com/p/naxsi/source/detail?r=307 |
CVE-2012-3380
|
MISC:http://code.google.com/p/openjpeg/issues/detail?id=170 |
CVE-2012-3535
|
MISC:http://code.google.com/p/pidgin-knotify/issues/detail?id=1 |
CVE-2010-3088
|
MISC:http://code.google.com/p/reaver-wps/ |
CVE-2011-5053
|
MISC:http://code.google.com/p/simpleinvoices/issues/detail?id=35 |
CVE-2007-1341
|
MISC:http://code.google.com/p/skylined/issues/detail?id=3 |
CVE-2010-1098
|
MISC:http://code.google.com/p/smarty-php/issues/detail?id=98&can=1 |
CVE-2012-4277
|
MISC:http://code.google.com/p/swfupload/issues/detail?id=376 |
CVE-2012-3414
|
MISC:http://code.google.com/p/tinyguestbook/issues/detail?id=1 |
CVE-2011-5199
|
MISC:http://code.google.com/p/tinyguestbook/issues/detail?id=3 |
CVE-2011-5201
|
MISC:http://code.google.com/p/tunnelblick/issues/detail?id=212 |
CVE-2012-4677
|
MISC:http://code.google.com/p/webapplicationfingerprinter/issues/detail?id=8 |
CVE-2010-1438
|
MISC:http://code.google.com/p/webgrind/issues/detail?id=66 |
CVE-2012-1790
|
MISC:http://code.vtiger.com/vtiger/vtigercrm/commit/52fc2fb520ddc55949c2fbedaabd61ddd0109375 |
CVE-2019-5009
|
MISC:http://code610.blogspot.com/2016/08/testing-sql-injections-in-comvirtuemart.html |
CVE-2016-10379
|
MISC:http://code610.blogspot.com/2016/09/sql-injection-in-latest-e107-cms.html |
CVE-2016-10378
|
MISC:http://code610.blogspot.com/2017/01/genixcms-sql-injection-quick-autopsy.html |
CVE-2017-5346
|
MISC:http://code610.blogspot.com/2017/04/multiple-crashes-in-vlc-224.html |
CVE-2017-9300 CVE-2017-9301
|
MISC:http://code610.blogspot.com/2017/05/divided-realplayer-160232.html |
CVE-2017-9302
|
MISC:http://code610.blogspot.com/2017/05/turnkey-feat-otrs.html |
CVE-2017-9299
|
MISC:http://code610.blogspot.com/2017/07/readwrite-access-violation-acunetix.html |
CVE-2017-11673 CVE-2017-11674
|
MISC:http://code610.blogspot.com/2017/10/patch-your-fortinet-cve-2017-14182.html |
CVE-2017-14182
|
MISC:http://code610.blogspot.com/2017/11/more-sql-injections-in-manageengine.html |
CVE-2017-16846 CVE-2017-16847 CVE-2017-16848 CVE-2017-16849 CVE-2017-16850 CVE-2017-16851
|
MISC:http://code610.blogspot.com/2017/11/rce-via-xss-horde-5219.html |
CVE-2017-16906 CVE-2017-16907 CVE-2017-16908
|
MISC:http://code610.blogspot.com/2017/11/sql-injection-in-manageengine.html |
CVE-2017-16542 CVE-2017-16543
|
MISC:http://code610.blogspot.com/2018/01/post-auth-sql-injection-in-freepbx.html |
CVE-2018-6393
|
MISC:http://code610.blogspot.com/2018/04/few-bugs-in-latest-nagios-xi-5413.html |
CVE-2018-10553 CVE-2018-10554
|
MISC:http://code610.blogspot.com/2018/05/make-free-vlc.html |
CVE-2018-11516
|
MISC:http://code610.blogspot.com/2018/06/exploiting-cyberark-1021603.html |
CVE-2018-12903
|
MISC:http://code610.blogspot.com/2018/07/crashing-nmap-760.html |
CVE-2018-15173
|
MISC:http://code610.blogspot.com/2018/07/crashing-nmap-770.html |
CVE-2018-15173
|
MISC:http://code610.blogspot.com/2018/08/updating-xnview.html |
CVE-2018-15174 CVE-2018-15175 CVE-2018-15176
|
MISC:http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html |
CVE-2019-16899 CVE-2019-16900 CVE-2019-16901
|
MISC:http://code610.blogspot.com/2020/03/pentesting-zen-load-balancer-quick.html |
CVE-2020-11490 CVE-2020-11491
|
MISC:http://codeaudit.blogspot.com/ |
CVE-2007-4145
|
MISC:http://codecanyon.net/user/Endober |
CVE-2017-12761
|
MISC:http://codecollaborator.com |
CVE-2021-41657
|
MISC:http://codes.zerial.org/php/wp-trackbacks_dos.phps |
CVE-2009-3622
|
MISC:http://codesecure.blogspot.com/2011/12/struts-2-session-tampering-via.html |
CVE-2011-5057
|
MISC:http://codevigilant.com/disclosure/wp-plugin-activehelper-livehelp-a3-cross-site-scripting-xss |
CVE-2014-4513
|
MISC:http://codevigilant.com/disclosure/wp-plugin-alipay-a3-cross-site-scripting-xss |
CVE-2014-4514
|
MISC:http://codevigilant.com/disclosure/wp-plugin-all-video-gallery-a1-injection |
CVE-2014-5186
|
MISC:http://codevigilant.com/disclosure/wp-plugin-anyfont-a3-cross-site-scripting-xss |
CVE-2014-4515
|
MISC:http://codevigilant.com/disclosure/wp-plugin-bic-media-a3-cross-site-scripting-xss |
CVE-2014-4516
|
MISC:http://codevigilant.com/disclosure/wp-plugin-bookx-local-file-inclusion/ |
CVE-2014-4937
|
MISC:http://codevigilant.com/disclosure/wp-plugin-cbi-referral-manager-a3-cross-site-scripting-xss |
CVE-2014-4517
|
MISC:http://codevigilant.com/disclosure/wp-plugin-contactme-a3-cross-site-scripting-xss |
CVE-2014-4518
|
MISC:http://codevigilant.com/disclosure/wp-plugin-conversador-a3-cross-site-scripting-xss |
CVE-2014-4519
|
MISC:http://codevigilant.com/disclosure/wp-plugin-cross-rss-local-file-inclusion/ |
CVE-2014-4941
|
MISC:http://codevigilant.com/disclosure/wp-plugin-dmca-watermarker-a3-cross-site-scripting-xss |
CVE-2014-4520
|
MISC:http://codevigilant.com/disclosure/wp-plugin-dsidxpress-a3-cross-site-scripting-xss |
CVE-2014-4521
|
MISC:http://codevigilant.com/disclosure/wp-plugin-dssearchagent-wordpress-edition-a3-cross-site-scripting-xss |
CVE-2014-4522
|
MISC:http://codevigilant.com/disclosure/wp-plugin-easy-career-openings-a3-cross-site-scripting-xss |
CVE-2014-4523
|
MISC:http://codevigilant.com/disclosure/wp-plugin-easy-post-types-a3-cross-site-scripting-xss |
CVE-2014-4524
|
MISC:http://codevigilant.com/disclosure/wp-plugin-ebay-feeds-for-wordpress-a3-cross-site-scripting-xss |
CVE-2014-4525
|
MISC:http://codevigilant.com/disclosure/wp-plugin-efence-a3-cross-site-scripting-xss |
CVE-2014-4526
|
MISC:http://codevigilant.com/disclosure/wp-plugin-enl-newsletter-a1-injection/ |
CVE-2014-4939
|
MISC:http://codevigilant.com/disclosure/wp-plugin-envialosimple-email-marketing-y-newsletters-gratis-a3-cross-site-scripting-xss |
CVE-2014-4527
|
MISC:http://codevigilant.com/disclosure/wp-plugin-fbpromotions-a3-cross-site-scripting-xss |
CVE-2014-4528
|
MISC:http://codevigilant.com/disclosure/wp-plugin-flash-photo-gallery-a3-cross-site-scripting-xss |
CVE-2014-4529
|
MISC:http://codevigilant.com/disclosure/wp-plugin-flog-a3-cross-site-scripting-xss/ |
CVE-2014-4530
|
MISC:http://codevigilant.com/disclosure/wp-plugin-game-tabs-a3-cross-site-scripting-xss |
CVE-2014-4531
|
MISC:http://codevigilant.com/disclosure/wp-plugin-garagesale-a3-cross-site-scripting-xss |
CVE-2014-4532
|
MISC:http://codevigilant.com/disclosure/wp-plugin-geo-redirector-a3-cross-site-scripting-xss |
CVE-2014-4533
|
MISC:http://codevigilant.com/disclosure/wp-plugin-hdw-player-video-player-video-gallery-a1-injection |
CVE-2014-5180
|
MISC:http://codevigilant.com/disclosure/wp-plugin-html5-video-player-with-playlist-a3-cross-site-scripting-xss |
CVE-2014-4534
|
MISC:http://codevigilant.com/disclosure/wp-plugin-import-legacy-media-a3-cross-site-scripting-xss |
CVE-2014-4535
|
MISC:http://codevigilant.com/disclosure/wp-plugin-infusionsoft-a3-cross-site-scripting-xss |
CVE-2014-4536
|
MISC:http://codevigilant.com/disclosure/wp-plugin-jrss-widget-ssrfxspa/ |
CVE-2014-9292
|
MISC:http://codevigilant.com/disclosure/wp-plugin-keyword-strategy-internal-links-a3-cross-site-scripting-xss |
CVE-2014-4537
|
MISC:http://codevigilant.com/disclosure/wp-plugin-lastfm-rotation-local-file-inclusion |
CVE-2014-5181
|
MISC:http://codevigilant.com/disclosure/wp-plugin-malware-finder-a3-cross-site-scripting-xss |
CVE-2014-4538
|
MISC:http://codevigilant.com/disclosure/wp-plugin-movies-a3-cross-site-scripting-xss |
CVE-2014-4539
|
MISC:http://codevigilant.com/disclosure/wp-plugin-oleggo-livestream-a3-cross-site-scripting-xss |
CVE-2014-4540
|
MISC:http://codevigilant.com/disclosure/wp-plugin-omfg-mobile-a3-cross-site-scripting-xss |
CVE-2014-4541
|
MISC:http://codevigilant.com/disclosure/wp-plugin-ooorl-a3-cross-site-scripting-xss |
CVE-2014-4542
|
MISC:http://codevigilant.com/disclosure/wp-plugin-pay-per-media-player-a3-cross-site-scripting-xss |
CVE-2014-4543
|
MISC:http://codevigilant.com/disclosure/wp-plugin-podcast-channels-a3-cross-site-scripting-xss |
CVE-2014-4544
|
MISC:http://codevigilant.com/disclosure/wp-plugin-proquoter-a3-cross-site-scripting-xss |
CVE-2014-4545
|
MISC:http://codevigilant.com/disclosure/wp-plugin-quartz-a1-injection |
CVE-2014-5185
|
MISC:http://codevigilant.com/disclosure/wp-plugin-rezgo-a3-cross-site-scripting-xss |
CVE-2014-4546
|
MISC:http://codevigilant.com/disclosure/wp-plugin-rezgo-online-booking-a3-cross-site-scripting-xss |
CVE-2014-4547
|
MISC:http://codevigilant.com/disclosure/wp-plugin-ruven-toolkit-a3-cross-site-scripting-xss |
CVE-2014-4548
|
MISC:http://codevigilant.com/disclosure/wp-plugin-sagepay-direct-for-woocommerce-payment-gateway-a3-cross-site-scripting-xss |
CVE-2014-4549
|
MISC:http://codevigilant.com/disclosure/wp-plugin-shortcode-ninja-a3-cross-site-scripting-xss |
CVE-2014-4550
|
MISC:http://codevigilant.com/disclosure/wp-plugin-simple-retail-menus-a1-injection |
CVE-2014-5183
|
MISC:http://codevigilant.com/disclosure/wp-plugin-social-connect-a3-cross-site-scripting-xss |
CVE-2014-4551
|
MISC:http://codevigilant.com/disclosure/wp-plugin-spotlightyour-a3-cross-site-scripting-xss |
CVE-2014-4552
|
MISC:http://codevigilant.com/disclosure/wp-plugin-spreadshirt-rss-3d-cube-flash-gallery-a3-cross-site-scripting-xss/ |
CVE-2014-4553
|
MISC:http://codevigilant.com/disclosure/wp-plugin-ss-downloads-a3-cross-site-scripting-xss |
CVE-2014-4554
|
MISC:http://codevigilant.com/disclosure/wp-plugin-stripshow-a1-injection |
CVE-2014-5184
|
MISC:http://codevigilant.com/disclosure/wp-plugin-style-it-a3-cross-site-scripting-xss |
CVE-2014-4555
|
MISC:http://codevigilant.com/disclosure/wp-plugin-swipe-hq-checkout-for-eshop-a3-cross-site-scripting-xss |
CVE-2014-4556
|
MISC:http://codevigilant.com/disclosure/wp-plugin-swipe-hq-checkout-for-jigoshop-a3-cross-site-scripting-xss |
CVE-2014-4557
|
MISC:http://codevigilant.com/disclosure/wp-plugin-swipehq-payment-gateway-woocommerce-a3-cross-site-scripting-xss |
CVE-2014-4558
|
MISC:http://codevigilant.com/disclosure/wp-plugin-swipehq-payment-gateway-wp-e-commerce-a3-cross-site-scripting-xss |
CVE-2014-4559
|
MISC:http://codevigilant.com/disclosure/wp-plugin-tera-chart-local-file-inclusion/ |
CVE-2014-4940
|
MISC:http://codevigilant.com/disclosure/wp-plugin-tom-m8te-local-file-inclusion |
CVE-2014-5187
|
MISC:http://codevigilant.com/disclosure/wp-plugin-toolpage-a3-cross-site-scripting-xss |
CVE-2014-4560
|
MISC:http://codevigilant.com/disclosure/wp-plugin-ultimate-weather-plugin-a3-cross-site-scripting-xss/ |
CVE-2014-4561
|
MISC:http://codevigilant.com/disclosure/wp-plugin-url-cloak-encrypt-a3-cross-site-scripting-xss |
CVE-2014-4563
|
MISC:http://codevigilant.com/disclosure/wp-plugin-validated-a3-cross-site-scripting-xss |
CVE-2014-4564
|
MISC:http://codevigilant.com/disclosure/wp-plugin-verification-code-for-comments-a3-cross-site-scripting-xss |
CVE-2014-4565
|
MISC:http://codevigilant.com/disclosure/wp-plugin-verweise-wordpress-twitter-a3-cross-site-scripting-xss |
CVE-2014-4566
|
MISC:http://codevigilant.com/disclosure/wp-plugin-video-comments-webcam-recorder-a3-cross-site-scripting-xss |
CVE-2014-4567
|
MISC:http://codevigilant.com/disclosure/wp-plugin-video-posts-webcam-recorder-a3-cross-site-scripting-xss |
CVE-2014-4568
|
MISC:http://codevigilant.com/disclosure/wp-plugin-videowhisper-live-streaming-integration-a3-cross-site-scripting-xss |
CVE-2014-4569
|
MISC:http://codevigilant.com/disclosure/wp-plugin-videowhisper-video-presentation-a3-cross-site-scripting-xss |
CVE-2014-4570
|
MISC:http://codevigilant.com/disclosure/wp-plugin-vn-calendar-a3-cross-site-scripting-xss |
CVE-2014-4571
|
MISC:http://codevigilant.com/disclosure/wp-plugin-votecount-for-balatarin-a3-cross-site-scripting-xss |
CVE-2014-4572
|
MISC:http://codevigilant.com/disclosure/wp-plugin-walk-score-a3-cross-site-scripting-xss |
CVE-2014-4573
|
MISC:http://codevigilant.com/disclosure/wp-plugin-webengage-a3-cross-site-scripting-xss |
CVE-2014-4574
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wikipop-a3-cross-site-scripting-xss |
CVE-2014-4575
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wordpress-social-login-a3-cross-site-scripting-xss |
CVE-2014-4576
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-amasin-the-amazon-affiliate-shop-local-file-inclusion |
CVE-2014-4577
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-app-maker-a3-cross-site-scripting-xss |
CVE-2014-4578
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-appointments-schedules-a3-cross-site-scripting-xss |
CVE-2014-4579
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-blipbot-a3-cross-site-scripting-xss |
CVE-2014-4580
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-consultant-a3-cross-site-scripting-xss |
CVE-2014-4582
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-contact-sidebar-widget-a3-cross-site-scripting-xss |
CVE-2014-4583
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-easybooking-a3-cross-site-scripting-xss |
CVE-2014-4584
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-easycart-information-disclosure/ |
CVE-2014-4942
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-facethumb-a3-cross-site-scripting-xss |
CVE-2014-4585
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-football-a3-cross-site-scripting-xss |
CVE-2014-4586
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-guestmap-a3-cross-site-scripting-xss |
CVE-2014-4587
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-media-player-a3-cross-site-scripting-xss |
CVE-2014-4589
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-microblogs-a3-cross-site-scripting-xss |
CVE-2014-4590
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-picasa-image-a3-cross-site-scripting-xss |
CVE-2014-4591
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-planet-a3-cross-site-scripting-xss |
CVE-2014-4592
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-responsive-preview-a3-cross-site-scripting-xss |
CVE-2014-4594
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-restful-a3-cross-site-scripting-xss |
CVE-2014-4595
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-rss-poster-a1-injection/ |
CVE-2014-4938
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-social-invitations-a3-cross-site-scripting-xss |
CVE-2014-4597
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-tmkm-amazon-a3-cross-site-scripting-xss |
CVE-2014-4598
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-ttisbdir-a3-cross-site-scripting-xss |
CVE-2014-4599
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wp-ultimate-email-marketer-a3-cross-site-scripting-xss |
CVE-2014-4600
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wpcb-a3-cross-site-scripting-xss |
CVE-2014-4581
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wphotfiles-a3-cross-site-scripting-xss |
CVE-2014-4588
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wppm-a3-cross-site-scripting-xss |
CVE-2014-4593
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wpsnapapp-a3-cross-site-scripting-xss |
CVE-2014-4596
|
MISC:http://codevigilant.com/disclosure/wp-plugin-wu-rating-a3-cross-site-scripting-xss |
CVE-2014-4601
|
MISC:http://codevigilant.com/disclosure/wp-plugin-xen-carousel-a3-cross-site-scripting-xss |
CVE-2014-4602
|
MISC:http://codevigilant.com/disclosure/wp-plugin-yahoo-updates-for-wordpress-a3-cross-site-scripting-xss |
CVE-2014-4603
|
MISC:http://codevigilant.com/disclosure/wp-plugin-yawpp-a1-injection |
CVE-2014-5182
|
MISC:http://codevigilant.com/disclosure/wp-plugin-your-text-manager-a3-cross-site-scripting-xss |
CVE-2014-4604
|
MISC:http://codevigilant.com/disclosure/wp-plugin-zdstats-a3-cross-site-scripting-xss |
CVE-2014-4605
|
MISC:http://codevigilant.com/disclosure/wp-plugin-zeenshare-a3-cross-site-scripting-xss |
CVE-2014-4606
|
MISC:http://codewhitesec.blogspot.com/2017/04/amf.html |
CVE-2017-5983
|
MISC:http://codex.wordpress.org/Roles_and_Capabilities |
CVE-2007-1732 CVE-2007-3238 CVE-2007-4153
|
MISC:http://codologic.com/forum/ |
CVE-2020-13873
|
MISC:http://codologic.com/forum/index.php?u=/category/news-and-announcements |
CVE-2020-5305 CVE-2020-5306 CVE-2020-5843
|
MISC:http://cognito.co.nz/mwcommunity/viewtopic.php?f=1&t=3542 |
CVE-2017-9615
|
MISC:http://coheigea.blogspot.com/2012/04/note-on-cve-2011-1096.html |
CVE-2011-1096
|
MISC:http://colander.altervista.org/advisory/ASPDisc.txt |
CVE-2006-2870
|
MISC:http://colander.altervista.org/advisory/ASzGB.txt |
CVE-2006-2882
|
MISC:http://colander.altervista.org/advisory/CAForum.txt |
CVE-2006-2822
|
MISC:http://colander.altervista.org/advisory/CANews.txt |
CVE-2006-2499 CVE-2006-2500
|
MISC:http://colander.altervista.org/advisory/CuteGuestbook.txt |
CVE-2006-2232
|
MISC:http://colander.altervista.org/advisory/DayfoxBlog.txt |
CVE-2006-2522
|
MISC:http://colander.altervista.org/advisory/HTGuestBook2.txt |
CVE-2006-2771
|
MISC:http://colander.altervista.org/advisory/TDGuestBook.txt |
CVE-2006-2837
|
MISC:http://colander.altervista.org/advisory/UBlog.txt |
CVE-2006-2246
|
MISC:http://colander.altervista.org/advisory/bloggage.txt |
CVE-2006-2010
|
MISC:http://colander.altervista.org/advisory/riblog.txt |
CVE-2006-2004
|
MISC:http://colander.altervista.org/advisory/vlbook.txt |
CVE-2006-3260
|
MISC:http://collectiveidea.com/blog/archives/2016/10/06/bundlers-multiple-source-security-vulnerability/ |
CVE-2016-7954
|
MISC:http://comments.gmane.org/gmane.comp.db.postgresql.pgbouncer.general/1251 |
CVE-2015-6817
|
MISC:http://comments.gmane.org/gmane.mail.mutt.devel/8379 |
CVE-2005-2642
|
MISC:http://communities.vmware.com/thread/348773 |
CVE-2009-2899
|
MISC:http://community.invisionpower.com/topic/300051-invision-power-board-305-released/ |
CVE-2009-5159
|
MISC:http://community.jboss.org/message/625307 |
CVE-2011-3348
|
MISC:http://community.kaseya.com/xsp/f/355.aspx |
CVE-2019-14510
|
MISC:http://community.kaseya.com/xsp/f/355/t/24675.aspx |
CVE-2019-14510
|
MISC:http://community.livejournal.com/lj_dev/708069.html |
CVE-2006-0496
|
MISC:http://community.mybb.com/thread-66255.html |
CVE-2010-4625
|
MISC:http://community.mybboard.net/showthread.php?tid=27675 |
CVE-2008-0788
|
MISC:http://community.mybboard.net/showthread.php?tid=5853&pid=35088#pid35088 |
CVE-2006-0219
|
MISC:http://community.mybboard.net/showthread.php?tid=5853&pid=35151#pid35151 |
CVE-2006-0219
|
MISC:http://community.mybboard.net/showthread.php?tid=7368 |
CVE-2006-1272
|
MISC:http://community.websense.com/blogs/securitylabs/archive/2010/06/09/having-fun-with-adobe-0-day-exploits.aspx |
CVE-2010-1297
|
MISC:http://community.websense.com/blogs/securitylabs/archive/2010/09/10/brief-analysis-on-adobe-reader-sing-table-parsing-vulnerability-cve-2010-2883.aspx |
CVE-2010-2883
|
MISC:http://community.websense.com/blogs/securitylabs/archive/2014/02/13/msie-0-day-exploit-cve-2014-0322-possibly-targeting-french-aerospace-organization.aspx |
CVE-2014-0322
|
MISC:http://community.websense.com/blogs/securitylabs/archive/2015/02/05/another-day-another-zero-day-internet-explorer-s-turn-cve-2015-0072.aspx |
CVE-2015-0072
|
MISC:http://computerworld.com/action/article.do?command=viewArticleBasic&articleId=9053818 |
CVE-2007-6506
|
MISC:http://computerworld.com/networkingtopics/networking/story/0,10801,103744,00.html |
CVE-2006-0527
|
MISC:http://condor-git.cs.wisc.edu/?p=condor.git;a=commitdiff;h=94e84ce4 |
CVE-2012-3490
|
MISC:http://condor-wiki.cs.wisc.edu/index.cgi/tktview?tn=1018 |
CVE-2009-4133
|
MISC:http://conference.hackinthebox.org/hitbsecconf2011ams/?page_id=1388 |
CVE-2011-2382 CVE-2011-2383
|
MISC:http://conference.hitb.org/hitbsecconf2007kl/?page_id=148 |
CVE-2007-5232
|
MISC:http://conference.hitb.org/hitbsecconf2007kl/materials/D2T1%20-%20Billy%20Rios%20-%20Slipping%20Past%20the%20Firewall.pdf |
CVE-2007-5232
|
MISC:http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69 |
CVE-2010-1637
|
MISC:http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=74 |
CVE-2010-1638
|
MISC:http://connx.com |
CVE-2021-40649 CVE-2021-40650
|
MISC:http://console-cowboys.blogspot.com/2013/01/swann-song-dvr-insecurity.html |
CVE-2013-7487 CVE-2015-8286
|
MISC:http://contagiodump.blogspot.com/2009/12/virustotal-httpwww.html |
CVE-2009-4324
|
MISC:http://contagiodump.blogspot.com/2010/10/potential-new-adobe-flash-player-zero.html |
CVE-2010-3654
|
MISC:http://contagiodump.blogspot.com/2011/04/apr-8-cve-2011-0611-flash-player-zero.html |
CVE-2011-0611
|
MISC:http://contentdelivery.lexmark.com/webcontent/CVE-2011-4538.pdf |
CVE-2011-4538
|
MISC:http://contentdelivery.lexmark.com/webcontent/Email_shortcut_vulnerability.pdf |
CVE-2011-3269
|
MISC:http://core.ifconfig.se/~core/?p=21 |
CVE-2008-6554
|
MISC:http://core.spip.org/projects/spip/repository/revisions/20541 |
CVE-2013-2118
|
MISC:http://core.trac.wordpress.org/changeset/11798 |
CVE-2009-2762
|
MISC:http://core.trac.wordpress.org/changeset?reponame=&new=21153%40branches%2F3.4&old=21076%40trunk#file16 |
CVE-2012-3383
|
MISC:http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Balsee%5D_6.20.0.1_insecure_dll_hijacking |
CVE-2010-5211
|
MISC:http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bcelframe_office%5D_2008_insecure_dll_hijacking |
CVE-2010-5207
|
MISC:http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Be-press-one_office%5D_insecure_dll_hijacking |
CVE-2010-5205 CVE-2010-5206
|
MISC:http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bflash_player%5D_10.1.x_insecure_dll_hijacking_%28dwmapi.dll%29 |
CVE-2010-3976
|
MISC:http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bibm_lotus_symphony%5D_3-beta-4_insecure_dll_hijacking |
CVE-2010-5204
|
MISC:http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bkingsoft_office%5D_2010_insecure_dll_hijacking |
CVE-2010-5208
|
MISC:http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/%5Bnuance_pdf_reader%5D_6.0_insecure_dll_hijacking |
CVE-2010-5209
|
MISC:http://core.yehg.net/lab/pr0js/advisories/dll_hijacking/[sorax_pdf_reader]_2.0_insecure_dll_hijacking |
CVE-2010-5210
|
MISC:http://coreftp.com |
CVE-2022-22899
|
MISC:http://coreftp.com/forums/viewtopic.php?f=15&t=4022509 |
CVE-2018-20658 CVE-2022-22899
|
MISC:http://corelabs.coresecurity.com/index.php?action=view&type=advisory&name=WordPress_Privileges_Unchecked |
CVE-2009-2334 CVE-2009-2335 CVE-2009-2336 CVE-2009-2431 CVE-2009-2432
|
MISC:http://corelabs.coresecurity.com/index.php?module=Wiki&action=view&type=advisory&name=Hyperic_HQ_Multiple_XSS |
CVE-2009-2897 CVE-2009-2898
|
MISC:http://corryl.altervista.org/index.php?mod=Download/Exploit#exploit-LRCF-v3.4.rar |
CVE-2007-3199
|
MISC:http://corryl.altervista.org/index.php?mod=read&id=1183748959 |
CVE-2007-3647
|
MISC:http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk/ |
CVE-2010-5150 CVE-2010-5151 CVE-2010-5152 CVE-2010-5153 CVE-2010-5154 CVE-2010-5155 CVE-2010-5156 CVE-2010-5157 CVE-2010-5158 CVE-2010-5159 CVE-2010-5160 CVE-2010-5161 CVE-2010-5162 CVE-2010-5163 CVE-2010-5164 CVE-2010-5165 CVE-2010-5166 CVE-2010-5167 CVE-2010-5168 CVE-2010-5169 CVE-2010-5170 CVE-2010-5171 CVE-2010-5172 CVE-2010-5173 CVE-2010-5174 CVE-2010-5175 CVE-2010-5176 CVE-2010-5177 CVE-2010-5178 CVE-2010-5179 CVE-2010-5180 CVE-2010-5181 CVE-2010-5182 CVE-2010-5183 CVE-2010-5184
|
MISC:http://cpanel.net/tsr-2013-0010-full-disclosure/ |
CVE-2013-6171
|
MISC:http://cpansearch.perl.org/src/GAAS/libwww-perl-6.02/Changes |
CVE-2011-0633
|
MISC:http://cpt.com |
CVE-2022-26643
|
MISC:http://cr.yp.to/antiforgery/cachetiming-20050414.pdf |
CVE-2005-1797
|
MISC:http://cr.yp.to/qmail/venema.html |
CVE-1999-0144 CVE-1999-0250
|
MISC:http://cr.yp.to/talks/2013.03.12/slides.pdf |
CVE-2013-2566
|
MISC:http://crackingdrupal.com/blog/greggles/mitigation-against-cve-2010-1584-drupal-context-module-xss |
CVE-2010-1584
|
MISC:http://crafter.com |
CVE-2017-15680 CVE-2017-15681 CVE-2017-15682 CVE-2017-15683 CVE-2017-15684 CVE-2017-15685
|
MISC:http://crash.ihug.co.nz/~Sneuro/zerogif/ |
CVE-2002-1091
|
MISC:http://crisp.cs.du.edu/?q=ca2007-1 |
CVE-2008-2956 CVE-2008-2957
|
MISC:http://crisp.cs.du.edu/?q=node/36 |
CVE-2007-3846
|
MISC:http://crisp.tweakblogs.net/blog/ie-and-2-letter-domain-names.html |
CVE-2008-3172 CVE-2008-3173
|
MISC:http://crk.com.br/produtos/ |
CVE-2020-13968
|
MISC:http://crmeb.com |
CVE-2020-25466
|
MISC:http://cross-site-scripting.blogspot.com/2010/05/brekeke-pbx-2448-cross-site-request.html |
CVE-2010-2114
|
MISC:http://cross-site-scripting.blogspot.com/2010/05/datatrack-system-35-persistent-xss.html |
CVE-2010-2043 CVE-2010-2078 CVE-2010-2079
|
MISC:http://cross-site-scripting.blogspot.com/2010/05/pacific-timesheet-674-cross-site.html |
CVE-2010-2111
|
MISC:http://cross-site-scripting.blogspot.com/2010/05/uniform-server-565-xsrf.html |
CVE-2010-2113
|
MISC:http://cross-site-scripting.blogspot.com/2010/06/tcexam-101006-arbitrary-upload.html |
CVE-2010-2153
|
MISC:http://cross-site-scripting.blogspot.com/2010/07/bit-weaver-27-local-file-inclusion.html |
CVE-2010-5086
|
MISC:http://cross-site-scripting.blogspot.com/2010/07/cms-made-simple-18-local-file-inclusion.html |
CVE-2010-2797
|
MISC:http://cross-site-scripting.blogspot.com/2010/07/news-office-2018-reflected-xss.html |
CVE-2010-2844
|
MISC:http://cross-site-scripting.blogspot.com/2010/07/nubuilder-100420-local-file-inclusion.html |
CVE-2010-2850
|
MISC:http://cross-site-scripting.blogspot.com/2010/07/nubuilder-100420-reflected-xss.html |
CVE-2010-2849
|
MISC:http://cross-site-scripting.blogspot.com/2010/07/orbis-102-reflected-xss.html |
CVE-2010-2669
|
MISC:http://cross-site-scripting.blogspot.com/2010/07/runcms-21-magpie-rss-module-reflected.html |
CVE-2010-2852
|
MISC:http://crypto.di.uminho.pt/CACE/CT-RSA2012-openssl-src.zip |
CVE-2011-4354
|
MISC:http://crypto.junod.info/2012/12/13/hash-dos-and-btrfs/ |
CVE-2012-5374 CVE-2012-5375
|
MISC:http://crypto.stanford.edu/advisories/CVE-2007-6244/ |
CVE-2007-6244
|
MISC:http://crypto.stanford.edu/dns/dns-rebinding.pdf |
CVE-2007-5273 CVE-2007-5274 CVE-2007-5275 CVE-2007-5276 CVE-2007-5277 CVE-2007-5375
|
MISC:http://crypto.stanford.edu/~dabo/papers/ssl-timing.pdf |
CVE-2003-0147
|
MISC:http://cs.cybozu.co.jp/information/20131202up01.php |
CVE-2013-6003 CVE-2013-6004 CVE-2013-6900 CVE-2013-6901 CVE-2013-6902 CVE-2013-6903 CVE-2013-6904 CVE-2013-6905 CVE-2013-6906 CVE-2013-6907 CVE-2013-6908 CVE-2013-6909 CVE-2013-6910 CVE-2013-6911 CVE-2013-6912 CVE-2013-6913 CVE-2013-6914 CVE-2013-6915 CVE-2013-6916
|
MISC:http://csdl.computer.org/comp/proceedings/hicss/2004/2056/09/205690277.pdf |
CVE-2003-0363
|
MISC:http://csirt.fe.up.pt/docs/TORQUE-audit.pdf |
CVE-2006-5677
|
MISC:http://csrf.htmlpurifier.org/news/2013/0717-1.0.4-released |
CVE-2013-7464
|
MISC:http://cturt.github.io/SETFKEY.html |
CVE-2016-1886
|
MISC:http://cturt.github.io/sendmsg.html |
CVE-2016-1887
|
MISC:http://cuppa.com |
CVE-2022-27984 CVE-2022-27985
|
MISC:http://cupu.us/adv/15-iFX-2006-adv-midicart-phpbackdoor.txt |
CVE-2006-6463 CVE-2006-6464
|
MISC:http://customer.march-hare.com/webtools/bugzilla/attachment.cgi?tt=1&id=1790&action=view |
CVE-2010-1326
|
MISC:http://cve.circl.lu/cve/CVE-2020-8184 |
CVE-2020-7070
|
MISC:http://cve.killedkenny.io/cve/CVE-2009-5145 |
CVE-2009-5145
|
MISC:http://cve.killedkenny.io/cve/CVE-2015-0249 |
CVE-2015-0249
|
MISC:http://cve.killedkenny.io/cve/CVE-2015-1378 |
CVE-2015-1378
|
MISC:http://cve.killedkenny.io/cve/CVE-2015-1591 |
CVE-2015-1591
|
MISC:http://cve.killedkenny.io/cve/CVE-2015-2147 |
CVE-2015-2147
|
MISC:http://cve.killedkenny.io/cve/CVE-2015-3309 |
CVE-2015-3309
|
MISC:http://cve.killedkenny.io/cve/CVE-2015-5263 |
CVE-2015-5263
|
MISC:http://cve.killedkenny.io/cve/CVE-2015-5594 |
CVE-2015-5594
|
MISC:http://cve.killedkenny.io/cve/CVE-2015-8375 |
CVE-2015-8375
|
MISC:http://cve.killedkenny.io/cve/CVE-2015-8621 |
CVE-2015-8621
|
MISC:http://cve.killedkenny.io/cve/CVE-2015-8697 |
CVE-2015-8697
|
MISC:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0012 |
CVE-2002-0053
|
MISC:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0013 |
CVE-2002-0053
|
MISC:http://cve.mitre.org/cve/identifiers/syntaxchange.html |
CVE-2014-10000 CVE-2014-1004 CVE-2014-1137 CVE-2014-1155 CVE-2014-9999
|
MISC:http://cve.mitre.org/cve/identifiers/tech-guidance.html#extraction_or_parsing |
CVE-2014-1004 CVE-2014-1137 CVE-2014-1155
|
MISC:http://cve.mitre.org/data/board/archives/2014-01/msg00000.html |
CVE-2014-1004 CVE-2014-1137 CVE-2014-1155
|
MISC:http://cvewalkthrough.com/cve-2020-13480html-injection |
CVE-2020-13480
|
MISC:http://cvewalkthrough.com/variant-unauthenticated-information-disclosure-via-api/ |
CVE-2020-23446
|
MISC:http://cvs.alioth.debian.org/cgi-bin/cvsweb.cgi/turqstat/utility.cpp.diff?cvsroot=turqstat&r2=1.41&r1=1.40&f=u |
CVE-2005-2658
|
MISC:http://cvs.claroline.net/cgi-bin/viewcvs.cgi/claroline/claroline/admin/adminusers.php?only_with_tag=V_1_8&r2=1.109.2.1&r1=1.10 |
CVE-2007-4742
|
MISC:http://cvs.moodle.com/blog/index.php?r1=1.18.2.2&r2=1.18.2.3 |
CVE-2006-5219
|
MISC:http://cvs.moodle.org/moodle/mod/hotpot/report.php?r1=1.8.6.1&r2=1.8.6.2 |
CVE-2008-6124
|
MISC:http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?r1=1.62.2.14.2.6&r2=1.62.2.14.2.7 |
CVE-2006-4483
|
MISC:http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/html.c?r1=1.112&r2=1.113 |
CVE-2006-1490
|
MISC:http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/html.c?view=log |
CVE-2006-1490
|
MISC:http://cvs.php.net/viewvc.cgi/php-src/ext/curl/streams.c?r1=1.14.2.2.2.3&r2=1.14.2.2.2.4 |
CVE-2006-4483
|
MISC:http://cvs.php.net/viewvc.cgi/php-src/ext/gd/libgd/wbmp.c?r1=1.2.4.1&r2=1.2.4.1.8.1 |
CVE-2007-1001
|
MISC:http://cvs.php.net/viewvc.cgi/php-src/ext/json/JSON_parser.c?r1=1.1.2.14&r2=1.1.2.15 |
CVE-2009-1271
|
MISC:http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?r1=1.166&r2=1.167 |
CVE-2007-3806
|
MISC:http://cvs.php.net/viewvc.cgi/php-src/ext/standard/dir.c?view=log |
CVE-2007-3806
|
MISC:http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.10&r2=1.445.2.14.2.11 |
CVE-2006-4482
|
MISC:http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.36&r2=1.445.2.14.2.37 |
CVE-2007-0911
|
MISC:http://cvs.php.net/viewvc.cgi/php-src/ext/standard/string.c?r1=1.445.2.14.2.58&r2=1.445.2.14.2.59 |
CVE-2007-4661
|
MISC:http://cvs.php.net/viewvc.cgi/php-src/ext/zip/php_zip.c?r1=1.1.2.48&r2=1.1.2.49 |
CVE-2009-1272
|
MISC:http://cvs.postnuke.com/viewcvs.cgi/Historic_PostNuke_Library/postnuke-devel/html/user.php.diff?r1=1.18&r2=1.19 |
CVE-2005-1049
|
MISC:http://cvs.savannah.gnu.org/viewcvs/texinfo/texinfo/util/texindex.c?r1=1.16&r2=1.17 |
CVE-2006-4810
|
MISC:http://cvs.savannah.gnu.org/viewvc/foomatic-gui/foomatic/pysmb.py?root=foomatic-gui&r1=1.2&r2=1.3&view=patch |
CVE-2011-2899
|
MISC:http://cvs.savannah.nongnu.org/viewvc/freetype2/src/base/ftbitmap.c?root=freetype&r1=1.17&r2=1.18 |
CVE-2007-3506
|
MISC:http://cvs.schmorp.de/rxvt-unicode/Changes?view=log |
CVE-2021-33477
|
MISC:http://cvs.schmorp.de/rxvt-unicode/src/command.C?r1=1.582&r2=1.583 |
CVE-2021-33477
|
MISC:http://cvs.sourceforge.net/viewcvs.py/*checkout*/bzflag/bzflag/ChangeLog?rev=2.103 |
CVE-2005-4584
|
MISC:http://cvs.sourceforge.net/viewcvs.py/beehiveforum/beehiveforum/forum/index.php?rev=1.121&view=log |
CVE-2005-4460 CVE-2005-4461
|
MISC:http://cvs.sourceforge.net/viewcvs.py/enlightenment/e17/libs/imlib2/ChangeLog?rev=1.20&view=markup |
CVE-2004-0802
|
MISC:http://cvs.sourceforge.net/viewcvs.py/flatnuke/flatnuke/Changelog?rev=1.78&view=markup |
CVE-2005-4448 CVE-2005-4449
|
MISC:http://cvs.sourceforge.net/viewcvs.py/ipsec-tools/ipsec-tools/src/racoon/isakmp_agg.c?r1=1.20.2.3&r2=1.20.2.4&diff_format=u |
CVE-2005-3732
|
MISC:http://cvs.sourceforge.net/viewcvs.py/phpcms/phpcms/parser/include/class.layout_phpcms.php?rev=1.12.2.37&view=markup |
CVE-2005-1840
|
MISC:http://cvs.sourceforge.net/viewcvs.py/phplogcon/phplogcon/submit.php?r1=1.4&r2=1.5 |
CVE-2005-4286
|
MISC:http://cvs.sourceforge.net/viewcvs.py/qmailadmin/qmailadmin/qmailadmin.c?r1=1.6.2.10&r2=1.6.2.11 |
CVE-2006-1141
|
MISC:http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-802_11.c?r1=1.31.2.11&r2=1.31.2.12 |
CVE-2007-1218
|
MISC:http://cvs.tcpdump.org/cgi-bin/cvsweb/tcpdump/print-bgp.c?r1=1.91.2.11&r2=1.91.2.12 |
CVE-2007-3798
|
MISC:http://cvsweb.netbsd.org/bsdweb.cgi/basesrc/usr.sbin/mopd/mopd/process.c.diff?r1=1.7&r2=1.8&f=h |
CVE-2000-0750 CVE-2000-0751
|
MISC:http://cvsweb.netbsd.org/bsdweb.cgi/pkgsrc/devel/ncurses/patches/patch-ncurses_tinfo_captoinfo.c?rev=1.1&content-type=text/x-cvsweb-markup |
CVE-2021-39537
|
MISC:http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/stdlib/qsort.c?rev=1.23&content-type=text/x-cvsweb-markup |
CVE-2017-1000378
|
MISC:http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys/arch/i386/i386/gdt.c |
CVE-2018-14775
|
MISC:http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys/arch/i386/i386/gdt.c.diff?r1=1.37&r2=1.37.8.1&f=h |
CVE-2018-14775
|
MISC:http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c.diff?r1=1.126&r2=1.127&f=h |
CVE-2016-8858
|
MISC:http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/kex.c?rev=1.127&content-type=text/x-cvsweb-markup |
CVE-2016-8858
|
MISC:http://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/glibc/crypt_blowfish/crypt_gensalt.c?only_with_tag=CRYPT_BLOWFISH_1_0 |
CVE-2006-0591
|
MISC:http://cvsweb.xfree86.org/cvsweb/xc/programs/Xserver/fb/fbglyph.c |
CVE-2001-0955
|
MISC:http://cweiske.de/tagebuch/airtame-security.htm |
CVE-2017-7450
|
MISC:http://cxf.apache.org/note-on-cve-2011-2487.html |
CVE-2011-2487
|
MISC:http://cxf.apache.org/security-advisories.data/CVE-2020-13954.txt.asc?version=1&modificationDate=1605183670659&api=v2 |
CVE-2020-13954
|
MISC:http://cxf.apache.org/security-advisories.data/CVE-2020-1954.txt.asc?version=1&modificationDate=1585730169000&api=v2 |
CVE-2020-1954
|
MISC:http://cxf.apache.org/security-advisories.data/CVE-2021-30468.txt.asc |
CVE-2021-30468
|
MISC:http://cxib.net/stuff/apache.fnmatch.phps |
CVE-2011-0419
|
MISC:http://cxib.net/stuff/apr_fnmatch.txts |
CVE-2011-0419
|
MISC:http://cxib.net/stuff/glob-0day.c |
CVE-2010-4754 CVE-2010-4755 CVE-2010-4756
|
MISC:http://cxib.net/stuff/proftpd.gnu.c |
CVE-2010-4051 CVE-2010-4052
|
MISC:http://cxib.net/stuff/vspoc232.c |
CVE-2011-0762
|
MISC:http://cxsecurity.com/issue/WLB-2011090012 |
CVE-2011-5083
|
MISC:http://cxsecurity.com/issue/WLB-2013040083 |
CVE-2013-3525
|
MISC:http://cxsecurity.com/issue/WLB-2013040105 |
CVE-2013-3535
|
MISC:http://cxsecurity.com/issue/WLB-2013070028 |
CVE-2013-4147
|
MISC:http://cxsecurity.com/issue/WLB-2013080065 |
CVE-2013-5319
|
MISC:http://cxsecurity.com/issue/WLB-2013110059 |
CVE-2013-6799
|
MISC:http://cxsecurity.com/issue/WLB-2013110149 |
CVE-2013-6837
|
MISC:http://cxsecurity.com/issue/WLB-2014010087 |
CVE-2013-2251
|
MISC:http://cxsecurity.com/issue/WLB-2015050095 |
CVE-2015-3903
|
MISC:http://cxsecurity.com/issue/WLB-2015050162 |
CVE-2007-6758
|
MISC:http://cxsecurity.com/research/103 |
CVE-2011-4153 CVE-2012-0781
|
MISC:http://cybellum.com/doubleagent-taking-full-control-antivirus/ |
CVE-2017-5565 CVE-2017-5566 CVE-2017-5567 CVE-2017-6186 CVE-2017-6417
|
MISC:http://cybellum.com/doubleagentzero-day-code-injection-and-persistence-technique/ |
CVE-2017-5565 CVE-2017-5566 CVE-2017-5567 CVE-2017-6186 CVE-2017-6417
|
MISC:http://cyber-crime.ru/cve/CVE-2018-17058.html |
CVE-2018-17058
|
MISC:http://cyber-security-group.cs.tau.ac.il/# |
CVE-2020-12667
|
MISC:http://cyber-security.org/DataDetayAll.asp?Data_id=586 |
CVE-2006-6795
|
MISC:http://cyber-security.org/DataDetayAll.asp?Data_id=587 |
CVE-2006-6850
|
MISC:http://cybergibbons.com/?p=2844 |
CVE-2015-7285 CVE-2015-7286 CVE-2015-7287 CVE-2015-7288
|
MISC:http://cybergibbons.com/alarms-2/multiple-serious-vulnerabilities-in-rsi-videofieds-alarm-protocol/ |
CVE-2015-8252 CVE-2015-8253 CVE-2015-8254
|
MISC:http://cybergibbons.com/security-2/shodan-searches/interesting-shodan-searches-sd-advanced-dvrs/ |
CVE-2015-2909
|
MISC:http://cyberlink.com |
CVE-2022-29333
|
MISC:http://cybermind.user.stfunoob.com/w48crash/ |
CVE-2007-1260
|
MISC:http://cyberworldmirror.com/vulnerability-phpmyadmin-lets-attacker-perform-drop-table-single-click/ |
CVE-2017-1000499
|
MISC:http://cybozu.co.jp/products/dl/notice_060825/ |
CVE-2006-4444
|
MISC:http://cyclos.com |
CVE-2021-31673 CVE-2021-31674
|
MISC:http://cyruxnet.org/modulo_dic_xoops.htm |
CVE-2004-1640
|
MISC:http://d-link.com |
CVE-2020-25366 CVE-2020-25367 CVE-2020-25368 CVE-2021-33259 CVE-2021-34201 CVE-2021-34202 CVE-2021-34203 CVE-2021-34204 CVE-2021-41441 CVE-2021-41442 CVE-2021-41445 CVE-2022-28932
|
MISC:http://d.pidgin.im/viewmtn/revision/info/3d02401cf232459fc80c0837d31e05fae7ae5467 |
CVE-2010-0013
|
MISC:http://d.pidgin.im/viewmtn/revision/info/4be2df4f72bd8a55cdae7f2554b73342a497c92f |
CVE-2010-0013
|
MISC:http://d3adend.org/blog/?p=403 |
CVE-2014-0072 CVE-2014-0073
|
MISC:http://d4igoro.blogspot.com/2006/04/linpha-xss-vulnerabilities.html |
CVE-2006-1848
|
MISC:http://d4igoro.blogspot.com/2006/04/planetsearch-xss-vulnerabilities.html |
CVE-2006-1801
|
MISC:http://d4igoro.blogspot.com/2006/04/powerclan-114-sql-injection.html |
CVE-2006-1805
|
MISC:http://d4igoro.blogspot.com/2006/05/321soft-php-gallery-09-directory.html |
CVE-2006-2210 CVE-2006-2211
|
MISC:http://d4igoro.blogspot.com/2006/05/c2005-comments-script-xss.html |
CVE-2006-2290
|
MISC:http://d4igoro.blogspot.com/2006/05/dynamic-galerie-10-path-traversal-xss.html |
CVE-2006-2294 CVE-2006-2295
|
MISC:http://d4igoro.blogspot.com/2006/05/php-linkliste-10b-xss.html |
CVE-2006-2176
|
MISC:http://d4igoro.blogspot.com/2006/05/phpkb-knowledge-base-xss.html |
CVE-2006-2184
|
MISC:http://daimacn.com/?id=6 |
CVE-2017-6518
|
MISC:http://daniels-it-blog.blogspot.com/2020/06/when-your-anti-virus-turns-against-you.html |
CVE-2020-15401
|
MISC:http://daniels-it-blog.blogspot.com/2020/07/gog-galaxy-escalation-of-privileges.html |
CVE-2020-15528 CVE-2020-15529
|
MISC:http://daniels-it-blog.blogspot.com/2020/07/iobit-malware-fighter-arbitrary-code.html |
CVE-2020-23864
|
MISC:http://daniels-it-blog.blogspot.com/2020/07/steam-arbitrary-code-execution-part-2.html |
CVE-2020-15530
|
MISC:http://danpros.com |
CVE-2022-25022
|
MISC:http://dark-assassins.com/forum/viewtopic.php?t=142 |
CVE-2005-2075
|
MISC:http://dark-assassins.com/forum/viewtopic.php?t=145 |
CVE-2005-2074
|
MISC:http://dark-assassins.com/forum/viewtopic.php?t=90 |
CVE-2005-2166 CVE-2005-2167 CVE-2005-2168
|
MISC:http://darkcode.ath.cx/f0rum/ind3x.php?action=vthread&forum=12&topic=114 |
CVE-2007-4007
|
MISC:http://darkcode.ath.cx/f0rum/ind3x.php?action=vthread&forum=12&topic=80 |
CVE-2007-3934
|
MISC:http://darkircop.org/unix.c |
CVE-2008-5029
|
MISC:http://datools.kr/zeroboard/view.php?id=datools_notice&page=5&sn1=&divpage=1&sn=off&ss=on&sc=on&select_arrange=headnum&desc=asc&no=506 |
CVE-2020-7872
|
MISC:http://davidsopas.com/blog/2007/12/17/lineshout-v10-software-html-injection/ |
CVE-2007-6486
|
MISC:http://davidsopaslabs.blogspot.com/2013/ |
CVE-2013-6295
|
MISC:http://davidsopaslabs.blogspot.com/2013/07/prestashop-persistent-xss-and-csrf.html |
CVE-2013-4791 CVE-2013-4792
|
MISC:http://davidsopaslabs.blogspot.com/2013/10/how-salesman-could-hack-prestashop.html |
CVE-2013-6295
|
MISC:http://dcsl.ul.ie/advisories/02.htm |
CVE-2008-1094
|
MISC:http://dcsl.ul.ie/advisories/03.htm |
CVE-2008-0971
|
MISC:http://ddilabs.blogspot.com/2014/02/fun-with-hp-data-protector-execbar.html |
CVE-2013-2347
|
MISC:http://ddrt.co.uk/complaint-handling-software/ |
CVE-2019-11019 CVE-2019-11020
|
MISC:http://deathrow.vistech.net/DEFCON16/VMS.PDF |
CVE-2008-3940 CVE-2008-3946 CVE-2008-3947
|
MISC:http://debbugs.gnu.org/cgi/bugreport.cgi?bug=17428#8 |
CVE-2014-3423
|
MISC:http://debork.se/poc/001_smbftpd.c |
CVE-2007-5184
|
MISC:http://debugtrap.com/2017/05/09/tm06-vulnerabilities/ |
CVE-2017-9025 CVE-2017-9026
|
MISC:http://debugtrap.com/2018/03/01/joomla_sige_xss/ |
CVE-2018-7717
|
MISC:http://deicide.siyahsapka.org/exploits/proz_ex2.c |
CVE-2005-0523
|
MISC:http://demo.coastercms.org/admin/home |
CVE-2020-35275
|
MISC:http://demo.coastercms.org/admin/login |
CVE-2020-35275
|
MISC:http://demo.coastercms.org/homepage/blog |
CVE-2020-35275
|
MISC:http://demo.ynetinteractive.com/mobiketa/index.php?url=myCampaign&view=-9999'+/*!50000union*/+select=[SQL] |
CVE-2017-12760
|
MISC:http://demo.ynetinteractive.com/soa/ |
CVE-2017-12759
|
MISC:http://demos.turnkeywebtools.com/phplivehelper/docs/change_log.txt |
CVE-2008-3763 CVE-2008-3764
|
MISC:http://depo2.nm.ru/WebWiz_Forum_v9.5_CSRF.txt |
CVE-2008-3392
|
MISC:http://depo2.nm.ru/WebWiz_Forum_v9.5_XSS.txt |
CVE-2008-3391
|
MISC:http://depo2.nm.ru/WebWiz_Forum_v9.5_XSS2.txt |
CVE-2008-3391
|
MISC:http://depo2.nm.ru/WebWiz_Rich_Text_Editor_v4.02_XSS.txt |
CVE-2008-3367
|
MISC:http://descriptions.securescout.com/tc/11010 |
CVE-1999-0524
|
MISC:http://descriptions.securescout.com/tc/11011 |
CVE-1999-0524
|
MISC:http://descriptions.securescout.com/tc/17969 |
CVE-2007-1899
|
MISC:http://descriptions.securescout.com/tc/17970 |
CVE-2007-3650
|
MISC:http://descriptions.securescout.com/tc/17971 |
CVE-2007-3651
|
MISC:http://descriptions.securescout.com/tc/17972 |
CVE-2007-3652
|
MISC:http://descriptions.securescout.com/tc/17973 |
CVE-2007-3653
|
MISC:http://determina.blogspot.com/2007/01/whats-wrong-with-wmf.html |
CVE-2006-4071
|
MISC:http://dev.anything-digital.com/Forum/Announcements/9100-Urgent-sh404SEF-security-release-Joomla-1.5/ |
CVE-2010-4405
|
MISC:http://dev.cmsmadesimple.org/bug/view/11715 |
CVE-2018-1000092
|
MISC:http://dev.cmsmadesimple.org/bug/view/11741 |
CVE-2018-1000094
|
MISC:http://dev.cmsmadesimple.org/bug/view/11762 |
CVE-2018-1000158
|
MISC:http://dev.cmsmadesimple.org/bug/view/12001 |
CVE-2019-10017
|
MISC:http://dev.cmsmadesimple.org/bug/view/12002 |
CVE-2019-10105
|
MISC:http://dev.cmsmadesimple.org/bug/view/12003 |
CVE-2019-10107
|
MISC:http://dev.cmsmadesimple.org/bug/view/12004 |
CVE-2019-10106
|
MISC:http://dev.cmsmadesimple.org/bug/view/12022 |
CVE-2019-11513
|
MISC:http://dev.cmsmadesimple.org/bug/view/12146 |
CVE-2019-17629
|
MISC:http://dev.cmsmadesimple.org/bug/view/12148 |
CVE-2019-17226
|
MISC:http://dev.cmsmadesimple.org/bug/view/12149 |
CVE-2019-17630
|
MISC:http://dev.cmsmadesimple.org/bug/view/12274 |
CVE-2020-10681
|
MISC:http://dev.cmsmadesimple.org/bug/view/12275 |
CVE-2020-10682
|
MISC:http://dev.cmsmadesimple.org/bug/view/12288 |
CVE-2020-22732
|
MISC:http://dev.cmsmadesimple.org/bug/view/12291 |
CVE-2020-22842
|
MISC:http://dev.cmsmadesimple.org/bug/view/12312 |
CVE-2020-13660
|
MISC:http://dev.cmsmadesimple.org/bug/view/12317 |
CVE-2020-23481 CVE-2020-27377
|
MISC:http://dev.cmsmadesimple.org/bug/view/12321 |
CVE-2020-23240
|
MISC:http://dev.cmsmadesimple.org/bug/view/12322 |
CVE-2020-23241
|
MISC:http://dev.cmsmadesimple.org/bug/view/12324 |
CVE-2020-14926
|
MISC:http://dev.cmsmadesimple.org/bug/view/12325 |
CVE-2020-36408 CVE-2020-36409 CVE-2020-36410 CVE-2020-36411 CVE-2020-36412 CVE-2020-36413 CVE-2020-36414 CVE-2020-36415 CVE-2020-36416
|
MISC:http://dev.cmsmadesimple.org/bug/view/12432 |
CVE-2021-28935
|
MISC:http://dev.cmsmadesimple.org/bug/view/12502 |
CVE-2022-23906
|
MISC:http://dev.cmsmadesimple.org/bug/view/12503 |
CVE-2022-23907
|
MISC:http://dev.cmsmadesimple.org/project/changelog/5392 |
CVE-2016-7904
|
MISC:http://dev.cmsmadesimple.org/project/changelog/5471 |
CVE-2018-7448
|
MISC:http://dev.cmsmadesimple.org/project/files/69 |
CVE-2017-6070 CVE-2017-6071 CVE-2017-6072
|
MISC:http://dev.cmsmadesimple.org/project/files/729 |
CVE-2019-1010290
|
MISC:http://dev.dotclear.org/2.0/changeset/2:3427 |
CVE-2011-1584
|
MISC:http://dev.ektron.com/forum.aspx?g=posts&t=28048 |
CVE-2009-4473
|
MISC:http://dev.ektron.com/notices.aspx?id=19074 |
CVE-2009-4473
|
MISC:http://dev.exiv2.org/issues/1295 |
CVE-2017-9239
|
MISC:http://dev.fckeditor.net/changeset/973 |
CVE-2007-5156
|
MISC:http://dev.fckeditor.net/ticket/1325 |
CVE-2007-5156
|
MISC:http://dev.gentoo.org/~rbu/security/debiantemp/datafreedom-perl |
CVE-2008-4997
|
MISC:http://dev.gentoo.org/~rbu/security/debiantemp/dpkg-cross |
CVE-2008-4950
|
MISC:http://dev.gentoo.org/~rbu/security/debiantemp/firehol |
CVE-2008-4953
|
MISC:http://dev.gentoo.org/~rbu/security/debiantemp/freevo |
CVE-2008-4955
|
MISC:http://dev.gentoo.org/~rbu/security/debiantemp/gccxml |
CVE-2008-4957
|
MISC:http://dev.gentoo.org/~rbu/security/debiantemp/initramfs-tools |
CVE-2008-4996
|
MISC:http://dev.gentoo.org/~rbu/security/debiantemp/postfix |
CVE-2008-4977
|
MISC:http://dev.gentoo.org/~rbu/security/debiantemp/printfilters-ppd |
CVE-2008-5034
|
MISC:http://dev.lintrack.org/ticket/101 |
CVE-2006-7179
|
MISC:http://dev.metasploit.com/redmine/issues/5610 |
CVE-2011-5010
|
MISC:http://dev.metasploit.com/redmine/issues/5820 |
CVE-2011-4075
|
MISC:http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/ie_execcommand_uaf.rb |
CVE-2012-4969
|
MISC:http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/intrust_annotatex_add.rb |
CVE-2012-5896
|
MISC:http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/ibm_pcm_ws.rb |
CVE-2012-0201
|
MISC:http://dev.mutt.org/trac/ticket/2885 |
CVE-2007-2683
|
MISC:http://dev.mybb.com/issues/1330 |
CVE-2010-5096
|
MISC:http://dev.mysql.com/doc/refman/5.0/en/news-5-0-23.html |
CVE-2006-3486
|
MISC:http://dev.mysql.com/doc/refman/5.1/en/news-5-1-12.html |
CVE-2006-3486
|
MISC:http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html |
CVE-2012-0553 CVE-2013-1492
|
MISC:http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-30.html |
CVE-2013-1492
|
MISC:http://dev.plone.org/plone/ticket/5432 |
CVE-2006-1711
|
MISC:http://dev.robotbattle.com/bugs/view.php?id=0000546 |
CVE-2008-2696
|
MISC:http://dev.robotbattle.com/mantis/bug_view_advanced_page.php?bug_id=447 |
CVE-2005-4676
|
MISC:http://dev.sourcefabric.org/browse/CS-4179 |
CVE-2012-1933
|
MISC:http://dev.tiki.org/item4109 |
CVE-2012-3996
|
MISC:http://dev.vaadin.com/ticket/6257 |
CVE-2011-0509
|
MISC:http://dev.zenoss.org/trac/changeset/15257 |
CVE-2010-0712
|
MISC:http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/SA_BEA03_36.00.jsp |
CVE-2003-0624
|
MISC:http://devalias.net/devalias/2017/09/07/squiz-matrix-multiple-vulnerabilities/ |
CVE-2017-14196 CVE-2017-14197 CVE-2017-14198
|
MISC:http://devco.re/blog/2016/04/21/how-I-hacked-facebook-and-found-someones-backdoor-script-eng-ver/ |
CVE-2016-2350 CVE-2016-2351 CVE-2016-2352 CVE-2016-2353
|
MISC:http://developer.berlios.de/bugs/?func=detailbug&bug_id=1573&group_id=809 |
CVE-2004-0604
|
MISC:http://developer.joomla.org/security/news/9-security/10-core-security/323-20101101-core-sqli-info-disclosurevulnerabilities.html |
CVE-2010-4696
|
MISC:http://developer.joomla.org/security/news/9-security/10-core-security/340-20110401-core-information-disclosure.html |
CVE-2011-2889
|
MISC:http://developer.longtailvideo.com/trac/ticket/1585 |
CVE-2012-3351
|
MISC:http://developer.mozilla.org/devnews/index.php/2006/10/02/update-possible-vulnerability-reported-at-toorcon/ |
CVE-2006-5159 CVE-2006-5160
|
MISC:http://developer.pidgin.im/attachment/ticket/6500/nss-cert-verify.patch |
CVE-2008-3532
|
MISC:http://developer.pidgin.im/ticket/14830 |
CVE-2012-1257
|
MISC:http://developer.pidgin.im/viewmtn/revision/diff/be5e66abad2af29604bc794cc4c6600ab12751f3/with/7eb1f6d56cc58bbb5b56b7df53955d36b9b419b8 |
CVE-2011-3594
|
MISC:http://developer.postgresql.org/cvsweb.cgi/pgsql-server/src/backend/utils/adt/cash.c.diff?r1=1.51&r2=1.52 |
CVE-2002-1397
|
MISC:http://developers.jccorp.net/modules/newbb/viewtopic.php?topic_id=33&forum=8 |
CVE-2007-1795
|
MISC:http://development.openoffice.org/releases/3.1.1.html |
CVE-2009-0200 CVE-2009-0201
|
MISC:http://dfdrconsulting.com/2019/cyber-security/cve-2019-15506-kaseya-vsa-critical-information-disclosure-unauthenticated-access/ |
CVE-2019-15506
|
MISC:http://dfdrconsulting.com/cve-2018-6569-west-wind-web-server-unauthenticated-admin-access-process-execution-termination/ |
CVE-2018-6569
|
MISC:http://dfdrconsulting.com/cve-2018-6603-promise-technology-webpam-pro-e-http-response-header-injection-xss/ |
CVE-2018-6603
|
MISC:http://dgb.github.io/2019/04/05/bootstrap-sass-backdoor.html |
CVE-2019-10842
|
MISC:http://dicas3000.blogspot.com/2008/10/blue-coat-k9-web-protection-v40230-beta.html |
CVE-2008-4515
|
MISC:http://digihax.com/ |
CVE-2008-0662
|
MISC:http://digisol.com |
CVE-2020-35262
|
MISC:http://digit-labs.org/files/exploits/deslock-probe-read.c |
CVE-2008-4363
|
MISC:http://digit-labs.org/files/exploits/xnu-superblob-dos.c |
CVE-2007-6359
|
MISC:http://digital.net/~gandalf/Rose_Frag_Attack_Explained.txt |
CVE-2004-0744
|
MISC:http://digitalparadox.org/advisories/aass.txt |
CVE-2005-1029 CVE-2005-1030
|
MISC:http://digitalparadox.org/advisories/lico.txt |
CVE-2005-1032
|
MISC:http://digitalparadox.org/advisories/metabid.txt |
CVE-2005-1364
|
MISC:http://digitalparadox.org/advisories/pafdb.txt |
CVE-2005-0782 CVE-2005-0952
|
MISC:http://digitalparadox.org/advisories/postnuke.txt |
CVE-2005-1048 CVE-2005-1049 CVE-2005-1050
|
MISC:http://digitalparadox.org/advisories/prodcart.txt |
CVE-2005-0994 CVE-2005-0995
|
MISC:http://digitalparadox.org/advisories/sqc.txt |
CVE-2005-0962
|
MISC:http://digitalparadox.org/advisories/storeportal.txt |
CVE-2005-1293
|
MISC:http://digitalparadox.org/viewadvisories.ah?view=36 |
CVE-2005-1384
|
MISC:http://digitalparadox.org/viewadvisories.ah?view=37 |
CVE-2005-1413
|
MISC:http://digitalparadox.org/viewadvisories.ah?view=42 |
CVE-2005-2206 CVE-2005-2207
|
MISC:http://dipper.info/security/20051012/ |
CVE-2005-3251
|
MISC:http://dir-2640-us.com |
CVE-2021-34201 CVE-2021-34202 CVE-2021-34203 CVE-2021-34204
|
MISC:http://dir-820l.com |
CVE-2022-26258
|
MISC:http://dir-868lw.com |
CVE-2021-33259
|
MISC:http://dir-x1860.com |
CVE-2021-41441 CVE-2021-41442 CVE-2021-41445
|
MISC:http://dircproxy.securiweb.net/ticket/89 |
CVE-2007-5226
|
MISC:http://directory.com |
CVE-2022-31382 CVE-2022-31383 CVE-2022-31384
|
MISC:http://discussion.treocentral.com/showthread.php?p=1199445&posted=1#post1199445 |
CVE-2007-0859
|
MISC:http://discuz.com |
CVE-2018-14729
|
MISC:http://dishix.blogspot.com/2011/11/exploiting-xtcommerce-v304-sp21-cross.html |
CVE-2011-5011
|
MISC:http://dishix.blogspot.com/p/xtcommerce-v304-sp21-cross-site-request_29.html |
CVE-2011-5011
|
MISC:http://disse.cting.org/2013/08/05/joomla-core-3_1_5_reflected-xss-vulnerability/ |
CVE-2013-5583
|
MISC:http://disse.cting.org/2014/07/30/vmturbo-operation-manager-remote-command-execution/ |
CVE-2014-5073
|
MISC:http://disse.cting.org/blog/2012/06/22/fckeditor-reflected-xss-vulnerability/ |
CVE-2012-4000
|
MISC:http://dist.trolltech.com/developer/download/175791_3.diff |
CVE-2007-4137
|
MISC:http://dist.trolltech.com/developer/download/175791_4.diff |
CVE-2007-4137
|
MISC:http://dividead.wordpress.com/2009/06/01/glibc-timezone-integer-overflow/ |
CVE-2009-5029
|
MISC:http://dixell.com |
CVE-2021-45420 CVE-2021-45421
|
MISC:http://dl.acm.org/citation.cfm?id=2046756&dl=ACM&coll=DL |
CVE-2011-1096
|
MISC:http://dl.acm.org/citation.cfm?id=2046771 |
CVE-2011-5319
|
MISC:http://dl.acm.org/citation.cfm?id=2714650 |
CVE-2016-2813
|
MISC:http://dl.aircrack-ng.org/breakingwepandwpa.pdf |
CVE-2008-5230
|
MISC:http://dl.packetstormsecurity.net/1006-exploits/silverstripe-shell.txt |
CVE-2010-5091
|
MISC:http://dl.packetstormsecurity.net/1009-exploits/phpmyfaq268-xss.txt |
CVE-2010-4821
|
MISC:http://dl.packetstormsecurity.net/1202-exploits/iknsupport-xss.txt |
CVE-2012-1069
|
MISC:http://dl.packetstormsecurity.net/1202-exploits/joomlacurrencyconverter-xss.txt |
CVE-2012-1018
|
MISC:http://dl.packetstormsecurity.net/1202-exploits/projectopen-xss.txt |
CVE-2012-1027
|
MISC:http://dl.packetstormsecurity.net/1202-exploits/smartycms-xss.txt |
CVE-2012-1066
|
MISC:http://dle-news.ru/bags/v97/1549-patchi-bezopasnosti-dlya-versii-97.html |
CVE-2013-7387
|
MISC:http://dlink.com |
CVE-2022-26258
|
MISC:http://dmasoftlab.com/ |
CVE-2021-30147
|
MISC:http://dmcdonald.net/?page_id=43 |
CVE-2011-4552 CVE-2011-4553 CVE-2011-4554 CVE-2011-4555 CVE-2011-4677 CVE-2011-4678
|
MISC:http://dmcdonald.net/vwar.txt |
CVE-2010-5063 CVE-2010-5064 CVE-2010-5065 CVE-2010-5066 CVE-2010-5067 CVE-2010-5279
|
MISC:http://dmxready.helpserve.com/index.php?_m=news&_a=viewnews&newsid=12 |
CVE-2009-0338 CVE-2009-0339
|
MISC:http://dnlongen.blogspot.com/2014/04/CVE-2014-2719-Asus-RT-Password-Disclosure.html |
CVE-2014-2719
|
MISC:http://dnlongen.blogspot.com/2014/10/CVE-2014-2718-Asus-RT-MITM.html |
CVE-2014-2718
|
MISC:http://dnlongen.blogspot.com/2015/01/usaa-mobile-app-gives-away-your-account.html |
CVE-2015-1314
|
MISC:http://dns.measurement-factory.com/surveys/sum1.html |
CVE-2006-0987 CVE-2006-0988
|
MISC:http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth |
CVE-2021-41125
|
MISC:http://docs.electric-cloud.com/commander_doc/5_0_3/HTML5/ReleaseNotes/commander_releasenotes.htm |
CVE-2014-7180
|
MISC:http://docs.google.com/View?docid=ajfxntc4dmsq_14dt57ssdw |
CVE-2008-6060 CVE-2008-6061 CVE-2008-6062
|
MISC:http://docs.google.com/View?docid=df36cd52_19xzmkwqcg |
CVE-2008-7216
|
MISC:http://docs.info.apple.com/article.html?artnum=303411 |
CVE-2006-1982
|
MISC:http://docs.info.apple.com/article.html?artnum=304063 |
CVE-2006-3462 CVE-2006-3465
|
MISC:http://docs.info.apple.com/article.html?artnum=304916 |
CVE-2006-5681
|
MISC:http://docs.info.apple.com/article.html?artnum=307176 |
CVE-2007-4706 CVE-2007-4707 CVE-2007-6166
|
MISC:http://docs.info.apple.com/article.html?artnum=307177 |
CVE-2006-4339 CVE-2006-6731 CVE-2006-6736 CVE-2006-6745 CVE-2007-0243 CVE-2007-2435 CVE-2007-2788 CVE-2007-2789 CVE-2007-3503 CVE-2007-3504 CVE-2007-3655 CVE-2007-3698 CVE-2007-3922 CVE-2007-4381 CVE-2007-5232 CVE-2007-5862
|
MISC:http://docs.info.apple.com/article.html?artnum=32478 |
CVE-2003-1009
|
MISC:http://docs.joomla.org/Vulnerable_Extensions_List |
CVE-2012-5232
|
MISC:http://docs.joomla.org/Vulnerable_Extensions_List#Barter_Sites_1.3 |
CVE-2011-4829 CVE-2011-4830
|
MISC:http://docs.joomla.org/Vulnerable_Extensions_List#New_format_Feed_Starts_Here |
CVE-2010-0694
|
MISC:http://docs.joomla.org/Vulnerable_Extensions_List#Techfolio_1.0 |
CVE-2011-5113
|
MISC:http://docs.joomla.org/Vulnerable_Extensions_List#Vik_Real_Estate_1.0 |
CVE-2011-4823
|
MISC:http://docs.oasis-open.org/mqtt/disallowed-chars/v1.0/disallowed-chars-v1.0.pdf |
CVE-2017-7653
|
MISC:http://docs.opsview.com/doku.php?id=opsview-core:changes#opsview_core_20130822 |
CVE-2013-3935 CVE-2013-3936
|
MISC:http://docs.opsview.com/doku.php?id=opsview4.4:changes#fixes |
CVE-2013-3935 CVE-2013-3936 CVE-2013-5694
|
MISC:http://docs.safe.com/fme/html/FME_Server_Documentation/Content/AdminGuide/Default_User_Accounts_and_Passwords.htm |
CVE-2018-20402
|
MISC:http://docs.zotonic.com/en/latest/developer-guide/releasenotes/rel_0.47.0.html |
CVE-2019-11504
|
MISC:http://doctors.com |
CVE-2022-28568
|
MISC:http://documents.iss.net/whitepapers/IBM_X-Force_WP_final.pdf |
CVE-2007-0071
|
MISC:http://documents.software.dell.com/sonicwall-gms-os/8.2/release-notes/known-issues?ParentProduct=867 |
CVE-2018-5691
|
MISC:http://dojo.bullguard.com/blog/burglar-hacker-when-a-physical-security-is-compromised-by-iot-vulnerabilities/ |
CVE-2017-7726 CVE-2017-7728 CVE-2017-7729 CVE-2017-7730
|
MISC:http://dontpanic.42.nl/2017/12/there-is-proxy-in-your-atlassian.html |
CVE-2017-9506
|
MISC:http://dotclear.org/blog/post/2014/08/18/Dotclear-2.6.4 |
CVE-2014-5316
|
MISC:http://dotcms.com |
CVE-2020-35274
|
MISC:http://dotcms.com/security/SI-39 |
CVE-2017-5344
|
MISC:http://dotxed.net/2011/websicherheit/lazy-xss-wenn-statistiken-und-loggs-zur-gefahr-werden.html |
CVE-2011-4562
|
MISC:http://douphp.com |
CVE-2022-25574
|
MISC:http://dovernetworks.com/wp-content/uploads/2013/12/OpenFloodlight-12302013.pdf |
CVE-2013-7333
|
MISC:http://dovernetworks.com/wp-content/uploads/2014/03/OpenFloodlight-03052014.pdf |
CVE-2014-2304
|
MISC:http://download.eyesofnetwork.com/EyesOfNetwork-5.3-x86_64-bin.iso |
CVE-2020-27886 CVE-2020-27887
|
MISC:http://download.lighttpd.net/lighttpd/security/lighttpd-1.4.31_fix_connection_header_dos.patch |
CVE-2012-5533
|
MISC:http://download.novell.com/Download?buildid=Ad2xk29hHTg~ |
CVE-2007-2616
|
MISC:http://download.savannah.gnu.org/releases/quagga/quagga-1.2.2.changelog.txt |
CVE-2017-16227
|
MISC:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2016-343-01 |
CVE-2017-8371
|
MISC:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2017-090-02 |
CVE-2017-7968
|
MISC:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-103-01 |
CVE-2021-22748
|
MISC:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-01 |
CVE-2021-22750 CVE-2021-22751 CVE-2021-22752 CVE-2021-22753 CVE-2021-22754 CVE-2021-22755 CVE-2021-22756 CVE-2021-22757 CVE-2021-22758 CVE-2021-22759 CVE-2021-22760 CVE-2021-22761 CVE-2021-22762
|
MISC:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-02,http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-03 |
CVE-2021-22763 CVE-2021-22764
|
MISC:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-03 |
CVE-2021-22765 CVE-2021-22766 CVE-2021-22767 CVE-2021-22768
|
MISC:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-05 |
CVE-2021-22749
|
MISC:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-01 |
CVE-2021-22778 CVE-2021-22779 CVE-2021-22780 CVE-2021-22781 CVE-2021-22782
|
MISC:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-02 |
CVE-2021-22769 CVE-2021-22770 CVE-2021-22771
|
MISC:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-03 |
CVE-2021-22777
|
MISC:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-04 |
CVE-2021-22784
|
MISC:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-05 |
CVE-2021-22772
|
MISC:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-06 |
CVE-2021-22706 CVE-2021-22707 CVE-2021-22708 CVE-2021-22721 CVE-2021-22722 CVE-2021-22723 CVE-2021-22726 CVE-2021-22727 CVE-2021-22728 CVE-2021-22729 CVE-2021-22730 CVE-2021-22773 CVE-2021-22774
|
MISC:http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-222-01 |
CVE-2021-22704
|
MISC:http://download.strongswan.org/patches/10_openssl_ecdsa_signature_patch/strongswan-4.3.5-5.0.3_openssl_ecdsa_signature.patch |
CVE-2013-2944
|
MISC:http://download.strongswan.org/security/CVE-2013-6075/strongswan-4.3.3-5.1.0_id_dn_match.patch |
CVE-2013-6075
|
MISC:http://download.wikimedia.org/mediawiki/1.16/mediawiki-1.16.2.patch.gz |
CVE-2011-0537
|
MISC:http://download2.rapid7.com/r7-0025/ |
CVE-2006-5379
|
MISC:http://download2.rapid7.com/r7-0025/nv_exploit.c |
CVE-2006-5379
|
MISC:http://download4.boulder.ibm.com/sar/CMA/RAA/013m6/0/UpdateLog.txt |
CVE-2010-4094
|
MISC:http://downloads.asterisk.org/pub/security/AST-2009-007.html |
CVE-2009-3723
|
MISC:http://downloads.asterisk.org/pub/security/AST-2011-001-1.6.2.diff |
CVE-2011-0495
|
MISC:http://downloads.asterisk.org/pub/security/AST-2014-001-1.8.diff |
CVE-2014-2286
|
MISC:http://downloads.asterisk.org/pub/security/AST-2014-002-1.8.diff |
CVE-2014-2287
|
MISC:http://downloads.asterisk.org/pub/security/AST-2014-003-12.diff |
CVE-2014-2288
|
MISC:http://downloads.asterisk.org/pub/security/AST-2014-004-12.diff |
CVE-2014-2289
|
MISC:http://downloads.asterisk.org/pub/security/AST-2016-006.html |
CVE-2016-7550
|
MISC:http://downloads.asterisk.org/pub/security/AST-2019-006.html |
CVE-2019-18790
|
MISC:http://downloads.asterisk.org/pub/security/AST-2019-007.html |
CVE-2019-18610
|
MISC:http://downloads.asterisk.org/pub/security/AST-2020-001.html |
CVE-2020-28327
|
MISC:http://downloads.asterisk.org/pub/security/AST-2020-002.html |
CVE-2020-28242
|
MISC:http://downloads.asterisk.org/pub/security/AST-2021-007.html |
CVE-2021-31878
|
MISC:http://downloads.digium.com/pub/asa/AST-2007-024.html |
CVE-2007-5690
|
MISC:http://downloads.digium.com/pub/security/AST-2009-004-1.6.1.diff.txt |
CVE-2009-2651
|
MISC:http://downloads.digium.com/pub/security/AST-2017-012.html |
CVE-2017-17664
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/17649-directory-traversal.exploit |
CVE-2006-1995
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/18632.pl |
CVE-2006-6750
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/18632.txt |
CVE-2006-6751
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/19816.html |
CVE-2006-7237
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/20309.pl |
CVE-2006-5196
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/21155-AcroPDF_DoS.html |
CVE-2006-6027
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/21447.html |
CVE-2006-6310
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/21641.c |
CVE-2006-6651
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/21662.html |
CVE-2006-6660
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/21802.html |
CVE-2006-6847
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/21924.html |
CVE-2007-1402
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/22003.py |
CVE-2007-0256
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/22534.html |
CVE-2007-1049
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/22719.html |
CVE-2007-1240
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/22728.html |
CVE-2007-1241
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/22747.pl |
CVE-2006-6751 CVE-2007-1195
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/22754.py |
CVE-2007-1192
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/23167.html |
CVE-2007-1773 CVE-2007-1774
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/24127.html |
CVE-2007-2885
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/24135.html |
CVE-2007-2892
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/25008.html |
CVE-2007-3991
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/25081.html |
CVE-2007-4052
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/25148.html |
CVE-2007-4146
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/25170.html |
CVE-2007-4229
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/25508.php |
CVE-2007-4778
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/26458.txt |
CVE-2007-6090
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/27150.pl |
CVE-2008-7155
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/27477.html |
CVE-2008-0494
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/27478.cpp |
CVE-2008-7162
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/27490.html |
CVE-2008-4727
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/27588.html |
CVE-2008-0700
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/27690.html |
CVE-2008-0749
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/28138.html |
CVE-2008-1273
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/28163.html |
CVE-2008-1326 CVE-2008-1327
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/28164.html |
CVE-2008-7133
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/28221.html |
CVE-2008-1355
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/28519.html |
CVE-2008-7140
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/28520.html |
CVE-2008-7141
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/28523.html |
CVE-2005-4879
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/28527.html |
CVE-2008-7132
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/28587.html |
CVE-2008-6211
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/28608.html |
CVE-2008-1787
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/28609.html |
CVE-2008-6550
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/28650.html |
CVE-2008-6205
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/28668.c |
CVE-2008-3544
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/28902.html |
CVE-2008-2030
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/28922.html |
CVE-2008-6596 CVE-2008-6597
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/29020.html |
CVE-2008-6615 CVE-2008-6616
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/29059.pl |
CVE-2008-2130
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/29795.html |
CVE-2008-2832
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/29963.html |
CVE-2008-7168
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/30121.pl |
CVE-2008-3164
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/30155.html |
CVE-2008-3201
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/30156.html |
CVE-2008-3202
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/30157.html |
CVE-2008-6839
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/30223.html |
CVE-2008-6442
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/30321.pl |
CVE-2008-3263
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/30509.html |
CVE-2008-3566
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/30534.pl |
CVE-2008-3495
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/30567.html |
CVE-2008-3559
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/30576.html |
CVE-2008-3560
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/30617-poc.pl |
CVE-2008-3667
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/30635.html |
CVE-2008-4424
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/30660.html |
CVE-2008-4438
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/30677.php |
CVE-2007-5156
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/31064.php |
CVE-2008-7002
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/31603.pl |
CVE-2008-4508
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/31898.html |
CVE-2008-6173
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/31908.html |
CVE-2008-4761
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/32063.pl |
CVE-2008-6553
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/32613.pl |
CVE-2008-4255
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/32952.pl |
CVE-2008-5874
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/33002-2.php |
CVE-2008-5498
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/33002.php |
CVE-2008-5498
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/33969.html |
CVE-2009-0821
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/34701.vbs |
CVE-2009-1481
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/34871.html |
CVE-2009-1800
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/36397.txt |
CVE-2009-3662
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/37042-2.pl |
CVE-2009-4654
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/61334.py |
CVE-2013-4858
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/ASPNuke-0601-sql.txt |
CVE-2005-2067
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/Blackorpheus_poc |
CVE-2006-1917
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/DevBB-1.0.0-xss.txt |
CVE-2006-2070
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/LifeType105SQLInjJuly052006.pl |
CVE-2006-3577
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/MagicNewsPlus-pw-change.pl |
CVE-2006-0157
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/Openserver_bof.c |
CVE-2006-0072
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/PHPCabinetRFIAugust052006.html |
CVE-2006-4044
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/PHPCollab_NetOffice_SQLINJ.php |
CVE-2006-1495
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/PHPList-lfi.php |
CVE-2006-1746
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/PHPWebSite_fi_poc |
CVE-2006-1819
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/PP2003sp2patched_fr_exploit-method.txt |
CVE-2006-3656
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/PwsPHP_SQL_Inj.php |
CVE-2006-0942
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/RadLance-0515-lfi.pl |
CVE-2006-2404
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/SimpleBBS-RCE-posts.php.pl |
CVE-2006-1800
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/TClanPortal_sql_inj.pl |
CVE-2005-4656
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/VWar_1.5.0_R12.pl |
CVE-2006-1636
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/abarcar_sql_poc.txt |
CVE-2006-2853
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/backoffice_mult_exp.pl |
CVE-2005-2191
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/cijfer-vscxpl.pl |
CVE-2006-0099
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/cisco_ip7940_dos.pl |
CVE-2006-0179
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/duclassified-detail.asp-sql-inj.txt |
CVE-2006-2132
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/edirectorypro-sql-inj.txt |
CVE-2006-2296
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/eimagepro-xss.txt |
CVE-2006-2300
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/enigmahaber-4.2-xss.txt |
CVE-2006-2873
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/exchangepop3.pl |
CVE-2006-0537
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/flashfxp_decrypt.c |
CVE-2003-1483
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/freefaq-0.9.e-rfi.pl |
CVE-2006-5436
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/iBWD_poc.txt |
CVE-2006-2854
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/jupitercms-lteq1.1.5-local-file-include.txt |
CVE-2006-2105
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/mpg1DoS3.pl |
CVE-2006-1655
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/multicalendars-3.0-sql-inj.txt |
CVE-2006-2293
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/pacheckbook-1.1-mutlsql.txt |
CVE-2006-2209
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/php-iCalendar-221.upload.php |
CVE-2006-1291
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/phpMyAgenda_fi.txt |
CVE-2006-2009
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/sage-inputvalidation.xml |
CVE-2006-4712
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/sami_ftp_poc.pl |
CVE-2006-0441
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/singapore-0.9.7-xss.txt |
CVE-2006-2262
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/solaris_lpd_unlink.pm |
CVE-2005-4797
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/streamripper-aug292006.c |
CVE-2006-3124
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/vbulletin-3.0.10-sql-inj.txt |
CVE-2006-2805
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/x-poll_poc.txt |
CVE-2006-3960
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/x-protection_poc.txt |
CVE-2006-3959
|
MISC:http://downloads.securityfocus.com/vulnerabilities/exploits/xueBook_poc.txt |
CVE-2006-2855
|
MISC:http://downloads.snowtide.com/CHANGELOG.html |
CVE-2019-17063
|
MISC:http://downloadvi.com/downloads/IPServer/v7.6/760272/v760272RN.pdf |
CVE-2019-5997
|
MISC:http://downloadvi.com/downloads/IPServer/v7.8/780182/v780182RN.pdf |
CVE-2021-20623
|
MISC:http://dproxy.cvs.sourceforge.net/dproxy/dproxy-nexgen/dns_decode.c?revision=1.10&view=markup |
CVE-2007-1866
|
MISC:http://dr.com |
CVE-2020-27373 CVE-2020-27374 CVE-2020-27375 CVE-2020-27376 CVE-2021-44595 CVE-2021-44596
|
MISC:http://dringen.blogspot.com.au/2014/07/invision-power-board-blind-sql.html |
CVE-2014-4928
|
MISC:http://drosenbe.blogspot.com/2010/03/nano-as-root.html |
CVE-2010-1160 CVE-2010-1161
|
MISC:http://drosenbe.blogspot.com/2010/05/integer-overflow-in-ldso-cve-2010-0830.html |
CVE-2010-0830
|
MISC:http://drponidi.5u.com/advisory.htm |
CVE-2004-0675
|
MISC:http://drunkenblog.com/drunkenblog-archives/000760.html |
CVE-2006-1552
|
MISC:http://drupal.org/files/issues/db_rewrite_sql_12.patch |
CVE-2011-1661
|
MISC:http://drupal.org/files/sa-2005-007/4.6.3.patch |
CVE-2005-3973
|
MISC:http://drupal.org/files/sa-2005-008/4.6.3.patch |
CVE-2005-3975
|
MISC:http://drupal.org/files/sa-2005-009/4.6.3.patch |
CVE-2005-3974
|
MISC:http://drupal.org/files/sa-2007-025/SA-2007-025-5.2.patch |
CVE-2007-5593
|
MISC:http://drupal.org/files/sa-2008-067/SA-2008-067-5.11.patch |
CVE-2008-6171
|
MISC:http://drupal.org/files/sa-core-2009-005/SA-CORE-2009-005-5.16.patch |
CVE-2009-1576
|
MISC:http://drupal.org/node/1329898 |
CVE-2011-4113
|
MISC:http://drupal.org/node/1394172 |
CVE-2012-1623
|
MISC:http://drupal.org/node/1394220 |
CVE-2012-1624
|
MISC:http://drupal.org/node/1394428 |
CVE-2012-1625
|
MISC:http://drupal.org/node/1401580 |
CVE-2012-1627
|
MISC:http://drupal.org/node/1401644 |
CVE-2012-1630
|
MISC:http://drupal.org/node/1401678 |
CVE-2012-1633
|
MISC:http://drupal.org/node/1401838 |
CVE-2012-1634
|
MISC:http://drupal.org/node/1407206 |
CVE-2012-1631
|
MISC:http://drupal.org/node/1409422 |
CVE-2012-1636 CVE-2012-5233
|
MISC:http://drupal.org/node/1416824 |
CVE-2012-1639
|
MISC:http://drupal.org/node/1417000 |
CVE-2012-1640
|
MISC:http://drupal.org/node/144538 |
CVE-2007-6752
|
MISC:http://drupal.org/node/1461438 |
CVE-2012-1648 CVE-2012-1649
|
MISC:http://drupal.org/node/1461470 |
CVE-2012-1651
|
MISC:http://drupal.org/node/1461892 |
CVE-2012-1653
|
MISC:http://drupal.org/node/1471780 |
CVE-2012-1654
|
MISC:http://drupal.org/node/1471800 |
CVE-2012-1655 CVE-2012-1656
|
MISC:http://drupal.org/node/1471808 |
CVE-2012-1657
|
MISC:http://drupal.org/node/1471822 |
CVE-2012-1658
|
MISC:http://drupal.org/node/1471940 |
CVE-2012-1659
|
MISC:http://drupal.org/node/1472214 |
CVE-2012-1660
|
MISC:http://drupal.org/node/1482126 |
CVE-2012-2056 CVE-2012-2057 CVE-2012-2058 CVE-2012-2059 CVE-2012-2060 CVE-2012-2061 CVE-2012-2062
|
MISC:http://drupal.org/node/1482342 |
CVE-2012-2063
|
MISC:http://drupal.org/node/1482420 |
CVE-2012-2064
|
MISC:http://drupal.org/node/1482428 |
CVE-2012-2065
|
MISC:http://drupal.org/node/1482528 |
CVE-2012-2066 CVE-2012-2067
|
MISC:http://drupal.org/node/1482744 |
CVE-2012-2068
|
MISC:http://drupal.org/node/1492624 |
CVE-2012-2069
|
MISC:http://drupal.org/node/1506390 |
CVE-2012-2070
|
MISC:http://drupal.org/node/1506404 |
CVE-2012-2071
|
MISC:http://drupal.org/node/1506412 |
CVE-2012-2072
|
MISC:http://drupal.org/node/1506420 |
CVE-2012-2073
|
MISC:http://drupal.org/node/1506428 |
CVE-2012-2074
|
MISC:http://drupal.org/node/1506438 |
CVE-2012-2075
|
MISC:http://drupal.org/node/1506448 |
CVE-2012-2076 CVE-2012-2077
|
MISC:http://drupal.org/node/1506542 |
CVE-2012-2154 CVE-2012-2155
|
MISC:http://drupal.org/node/1506728 |
CVE-2012-2080
|
MISC:http://drupal.org/node/1507446 |
CVE-2012-2081
|
MISC:http://drupal.org/node/1507466 |
CVE-2012-2082
|
MISC:http://drupal.org/node/1507510 |
CVE-2012-2083
|
MISC:http://drupal.org/node/1515282 |
CVE-2012-2296
|
MISC:http://drupal.org/node/1515722 |
CVE-2012-2084
|
MISC:http://drupal.org/node/1528614 |
CVE-2012-2096
|
MISC:http://drupal.org/node/1528864 |
CVE-2012-2097
|
MISC:http://drupal.org/node/1538704 |
CVE-2012-2117
|
MISC:http://drupal.org/node/1547506 |
CVE-2012-2301
|
MISC:http://drupal.org/node/1547508 |
CVE-2012-2301
|
MISC:http://drupal.org/node/1547520 |
CVE-2012-2297
|
MISC:http://drupal.org/node/1547660 |
CVE-2012-2298
|
MISC:http://drupal.org/node/1547674 |
CVE-2012-2299 CVE-2012-2300 CVE-2012-2301
|
MISC:http://drupal.org/node/1547686 |
CVE-2012-2302
|
MISC:http://drupal.org/node/1547736 |
CVE-2012-2303
|
MISC:http://drupal.org/node/1547738 |
CVE-2012-2304
|
MISC:http://drupal.org/node/1557852 |
CVE-2012-2305
|
MISC:http://drupal.org/node/1557868 |
CVE-2012-2306 CVE-2012-2307
|
MISC:http://drupal.org/node/1557872 |
CVE-2012-2308
|
MISC:http://drupal.org/node/1557874 |
CVE-2012-2309
|
MISC:http://drupal.org/node/1558248 |
CVE-2012-2310
|
MISC:http://drupal.org/node/1569482 |
CVE-2012-2339
|
MISC:http://drupal.org/node/1569508 |
CVE-2012-2340
|
MISC:http://drupal.org/node/1585532 |
CVE-2012-2702
|
MISC:http://drupal.org/node/1585544 |
CVE-2012-2703 CVE-2012-2704
|
MISC:http://drupal.org/node/1585564 |
CVE-2012-2705
|
MISC:http://drupal.org/node/1585648 |
CVE-2012-2706 CVE-2012-3802
|
MISC:http://drupal.org/node/1585678 |
CVE-2012-2707 CVE-2012-2708
|
MISC:http://drupal.org/node/1585890 |
CVE-2012-2907
|
MISC:http://drupal.org/node/1585960 |
CVE-2012-2710
|
MISC:http://drupal.org/node/1597262 |
CVE-2012-2711
|
MISC:http://drupal.org/node/1597364 |
CVE-2012-2712
|
MISC:http://drupal.org/node/1597414 |
CVE-2012-2713 CVE-2012-2714
|
MISC:http://drupal.org/node/1608780 |
CVE-2012-2715
|
MISC:http://drupal.org/node/1608822 |
CVE-2012-2716
|
MISC:http://drupal.org/node/1608828 |
CVE-2012-2717
|
MISC:http://drupal.org/node/1608854 |
CVE-2012-2718
|
MISC:http://drupal.org/node/1608864 |
CVE-2012-2719
|
MISC:http://drupal.org/node/1619808 |
CVE-2012-2720
|
MISC:http://drupal.org/node/1619810 |
CVE-2012-2721 CVE-2012-3800
|
MISC:http://drupal.org/node/1619812 |
CVE-2012-2724
|
MISC:http://drupal.org/node/1619818 |
CVE-2012-2724
|
MISC:http://drupal.org/node/1619820 |
CVE-2012-2724
|
MISC:http://drupal.org/node/1619824 |
CVE-2012-2722
|
MISC:http://drupal.org/node/1619830 |
CVE-2012-2723 CVE-2012-3799
|
MISC:http://drupal.org/node/1619848 |
CVE-2012-2724
|
MISC:http://drupal.org/node/1619852 |
CVE-2012-2725
|
MISC:http://drupal.org/node/1619856 |
CVE-2012-2726
|
MISC:http://drupal.org/node/1632702 |
CVE-2012-3798
|
MISC:http://drupal.org/node/1632704 |
CVE-2012-3798
|
MISC:http://drupal.org/node/1632734 |
CVE-2012-2727 CVE-2012-3798
|
MISC:http://drupal.org/node/1632900 |
CVE-2012-2728
|
MISC:http://drupal.org/node/1632908 |
CVE-2012-2729
|
MISC:http://drupal.org/node/1632918 |
CVE-2012-2730
|
MISC:http://drupal.org/node/1633048 |
CVE-2012-2731
|
MISC:http://drupal.org/node/1633054 |
CVE-2010-2021
|
MISC:http://drupal.org/node/1649346 |
CVE-2012-4468
|
MISC:http://drupal.org/node/1663306 |
CVE-2012-4469
|
MISC:http://drupal.org/node/1679412 |
CVE-2012-4470
|
MISC:http://drupal.org/node/1679422 |
CVE-2012-4471
|
MISC:http://drupal.org/node/1679442 |
CVE-2012-4472 CVE-2012-4476 CVE-2012-4477 CVE-2012-4478 CVE-2012-4479
|
MISC:http://drupal.org/node/1679466 |
CVE-2012-4473
|
MISC:http://drupal.org/node/1679486 |
CVE-2012-4474
|
MISC:http://drupal.org/node/1679532 |
CVE-2012-4475
|
MISC:http://drupal.org/node/1679820 |
CVE-2012-4482 CVE-2012-4483
|
MISC:http://drupal.org/node/1691446 |
CVE-2012-4484
|
MISC:http://drupal.org/node/1700550 |
CVE-2012-4487
|
MISC:http://drupal.org/node/1700578 |
CVE-2012-4485
|
MISC:http://drupal.org/node/1700584 |
CVE-2012-4486 CVE-2012-4487
|
MISC:http://drupal.org/node/1700588 |
CVE-2012-4488
|
MISC:http://drupal.org/node/1700594 |
CVE-2012-4489
|
MISC:http://drupal.org/node/1708058 |
CVE-2012-4490
|
MISC:http://drupal.org/node/1708198 |
CVE-2012-4491
|
MISC:http://drupal.org/node/1719392 |
CVE-2012-4492 CVE-2012-4494
|
MISC:http://drupal.org/node/1719402 |
CVE-2012-4493
|
MISC:http://drupal.org/node/1719482 |
CVE-2012-4495
|
MISC:http://drupal.org/node/1732946 |
CVE-2012-5704 CVE-2012-5705
|
MISC:http://drupal.org/node/1733056 |
CVE-2012-4497
|
MISC:http://drupal.org/node/1762160 |
CVE-2012-4498
|
MISC:http://drupal.org/node/1762470 |
CVE-2012-4499
|
MISC:http://drupal.org/node/1762480 |
CVE-2012-4500
|
MISC:http://drupal.org/node/1762886 |
CVE-2012-5585
|
MISC:http://drupal.org/node/1768632 |
CVE-2012-5554
|
MISC:http://drupal.org/node/1789284 |
CVE-2012-5537
|
MISC:http://drupal.org/node/1789306 |
CVE-2012-5538
|
MISC:http://drupal.org/node/1796036 |
CVE-2012-5539
|
MISC:http://drupal.org/node/1802218 |
CVE-2012-5540
|
MISC:http://drupal.org/node/1802230 |
CVE-2012-5541
|
MISC:http://drupal.org/node/1802258 |
CVE-2012-5542
|
MISC:http://drupal.org/node/1808832 |
CVE-2012-5543
|
MISC:http://drupal.org/node/1808846 |
CVE-2012-5544
|
MISC:http://drupal.org/node/1808852 |
CVE-2012-5569
|
MISC:http://drupal.org/node/1808856 |
CVE-2012-5545
|
MISC:http://drupal.org/node/1815770 |
CVE-2012-5547
|
MISC:http://drupal.org/node/1822066 |
CVE-2012-5548 CVE-2012-5549 CVE-2012-5550
|
MISC:http://drupal.org/node/1822166 |
CVE-2012-5551
|
MISC:http://drupal.org/node/1828340 |
CVE-2012-5552
|
MISC:http://drupal.org/node/1834046 |
CVE-2012-6065
|
MISC:http://drupal.org/node/1834048 |
CVE-2012-6065
|
MISC:http://drupal.org/node/1834866 |
CVE-2012-5553
|
MISC:http://drupal.org/node/1834868 |
CVE-2012-5554
|
MISC:http://drupal.org/node/1840740 |
CVE-2012-5556
|
MISC:http://drupal.org/node/1840886 |
CVE-2012-5557
|
MISC:http://drupal.org/node/1840892 |
CVE-2012-5558
|
MISC:http://drupal.org/node/1840954 |
CVE-2012-5558
|
MISC:http://drupal.org/node/1840956 |
CVE-2012-5558
|
MISC:http://drupal.org/node/1840992 |
CVE-2012-5559
|
MISC:http://drupal.org/node/1841046 |
CVE-2012-5584
|
MISC:http://drupal.org/node/1853198 |
CVE-2012-5585
|
MISC:http://drupal.org/node/1853200 |
CVE-2012-5586
|
MISC:http://drupal.org/node/1853214 |
CVE-2012-5587 CVE-2012-5588
|
MISC:http://drupal.org/node/1853244 |
CVE-2012-5589
|
MISC:http://drupal.org/node/1853268 |
CVE-2012-5590
|
MISC:http://drupal.org/node/1853376 |
CVE-2012-5591
|
MISC:http://drupal.org/node/1859282 |
CVE-2012-5654
|
MISC:http://drupal.org/node/1871508 |
CVE-2013-0182
|
MISC:http://drupal.org/node/1903264 |
CVE-2013-0257
|
MISC:http://drupal.org/node/1903282 |
CVE-2013-0258
|
MISC:http://drupal.org/node/1903300 |
CVE-2013-0259
|
MISC:http://drupal.org/node/1903324 |
CVE-2013-0260
|
MISC:http://drupal.org/node/1916312 |
CVE-2013-0317
|
MISC:http://drupal.org/node/1916370 |
CVE-2013-0318
|
MISC:http://drupal.org/node/1922400 |
CVE-2013-0319
|
MISC:http://drupal.org/node/1922410 |
CVE-2013-0320
|
MISC:http://drupal.org/node/1922416 |
CVE-2013-0321
|
MISC:http://drupal.org/node/1922418 |
CVE-2013-0322
|
MISC:http://drupal.org/node/1922438 |
CVE-2013-0323
|
MISC:http://drupal.org/node/1922446 |
CVE-2013-0324
|
MISC:http://drupal.org/node/1922756 |
CVE-2013-0325
|
MISC:http://drupal.org/node/1929474 |
CVE-2013-1778
|
MISC:http://drupal.org/node/1929482 |
CVE-2013-1779
|
MISC:http://drupal.org/node/1929484 |
CVE-2013-1780
|
MISC:http://drupal.org/node/1929486 |
CVE-2013-1781
|
MISC:http://drupal.org/node/1929488 |
CVE-2013-1782
|
MISC:http://drupal.org/node/1929496 |
CVE-2013-1783
|
MISC:http://drupal.org/node/1929500 |
CVE-2013-1784
|
MISC:http://drupal.org/node/1929508 |
CVE-2013-1785
|
MISC:http://drupal.org/node/1929512 |
CVE-2013-1786
|
MISC:http://drupal.org/node/1929514 |
CVE-2013-1787
|
MISC:http://drupal.org/node/1942330 |
CVE-2013-1859
|
MISC:http://drupal.org/node/1948358 |
CVE-2013-1887
|
MISC:http://drupal.org/node/1954588 |
CVE-2013-1905
|
MISC:http://drupal.org/node/1960338 |
CVE-2013-1924
|
MISC:http://drupal.org/node/2248077 |
CVE-2014-8745
|
MISC:http://drupal.org/node/2248145 |
CVE-2014-8076
|
MISC:http://drupal.org/node/2254925 |
CVE-2014-7980
|
MISC:http://drupal.org/node/757974 |
CVE-2010-1976 CVE-2010-1984
|
MISC:http://drupal.org/node/757980 |
CVE-2010-1976 CVE-2010-1984
|
MISC:http://drupal.org/node/927016 |
CVE-2010-5275 CVE-2010-5276
|
MISC:http://drupal.org/node/933960 |
CVE-2010-5277
|
MISC:http://drupalcode.org/project/persona.git/commitdiff/fe0f9bb |
CVE-2013-4227
|
MISC:http://drupalcode.org/project/simplenews.git/commitdiff/36352c1 |
CVE-2012-2724
|
MISC:http://drupalcode.org/project/simplenews.git/commitdiff/6d5704c |
CVE-2012-2724
|
MISC:http://drupalcode.org/project/simplenews.git/commitdiff/faec6a6 |
CVE-2012-2724
|
MISC:http://drwetter.org/cs-probs/avocent-sshbug.txt |
CVE-2005-2984
|
MISC:http://ds-develop.de/advisories/advisory-2016-01-07-1-avm.txt |
CVE-2015-7242
|
MISC:http://ds9a.nl/cgi-bin/cvstrac/pdns/tktview?tn=21 |
CVE-2005-0428
|
MISC:http://dsecrg.com/pages/vul/DSECRG-09-030.html |
CVE-2009-1212
|
MISC:http://dsecrg.com/pages/vul/show.php?id=118 |
CVE-2008-5518
|
MISC:http://dsecrg.com/pages/vul/show.php?id=119 |
CVE-2009-0038
|
MISC:http://dsecrg.com/pages/vul/show.php?id=120 |
CVE-2009-0039
|
MISC:http://dsecrg.com/pages/vul/show.php?id=125 |
CVE-2009-1968
|
MISC:http://dsecrg.com/pages/vul/show.php?id=134 |
CVE-2009-1553
|
MISC:http://dsecrg.com/pages/vul/show.php?id=137 |
CVE-2009-1315 CVE-2009-1316
|
MISC:http://dsecrg.com/pages/vul/show.php?id=138 |
CVE-2009-1554
|
MISC:http://dsecrg.com/pages/vul/show.php?id=139 |
CVE-2010-0108
|
MISC:http://dsecrg.com/pages/vul/show.php?id=148 |
CVE-2009-2684
|
MISC:http://dsecrg.com/pages/vul/show.php?id=149 |
CVE-2010-1460
|
MISC:http://dsecrg.com/pages/vul/show.php?id=154 |
CVE-2010-2654 CVE-2010-2655 CVE-2010-2656
|
MISC:http://dsecrg.com/pages/vul/show.php?id=155 |
CVE-2009-3439 CVE-2009-3440 CVE-2009-3441
|
MISC:http://dsecrg.com/pages/vul/show.php?id=168 |
CVE-2010-2904
|
MISC:http://dsecrg.com/pages/vul/show.php?id=305 |
CVE-2010-3591
|
MISC:http://dsecrg.com/pages/vul/show.php?id=306 |
CVE-2010-3599
|
MISC:http://dsecrg.com/pages/vul/show.php?id=307 |
CVE-2010-3595
|
MISC:http://dsecrg.com/pages/vul/show.php?id=314 |
CVE-2011-5154
|
MISC:http://dsecrg.com/pages/vul/show.php?id=330 |
CVE-2011-5263
|
MISC:http://dsecrg.com/pages/vul/show.php?id=333 |
CVE-2011-4805
|
MISC:http://dsecrg.com/pages/vul/show.php?id=336 |
CVE-2011-4707
|
MISC:http://dsecrg.com/pages/vul/show.php?id=337 |
CVE-2011-5260
|
MISC:http://dsecrg.com/pages/vul/show.php?id=405 |
CVE-2012-1977
|
MISC:http://dsecrg.com/pages/vul/show.php?id=406 |
CVE-2012-0227
|
MISC:http://dsecrg.com/pages/vul/show.php?id=412 |
CVE-2012-1289
|
MISC:http://dsecrg.com/pages/vul/show.php?id=413 |
CVE-2012-1289
|
MISC:http://dsecrg.com/pages/vul/show.php?id=414 |
CVE-2012-1290
|
MISC:http://dsecrg.com/pages/vul/show.php?id=415 |
CVE-2012-1291
|
MISC:http://dsecrg.com/pages/vul/show.php?id=416 |
CVE-2012-1292
|
MISC:http://dsecrg.com/pages/vul/show.php?id=417 |
CVE-2012-4924
|
MISC:http://dsl-g2452dg.com |
CVE-2022-28932
|
MISC:http://dualec.org/ |
CVE-2014-4191 CVE-2014-4192 CVE-2014-4193
|
MISC:http://dualec.org/DualECTLS.pdf |
CVE-2014-4191 CVE-2014-4192 CVE-2014-4193
|
MISC:http://duke.leto.net/2019/10/01/zcash-metadata-leakage-cve-2019-16930.html |
CVE-2019-16930
|
MISC:http://dumpco.re/bugs/wp-plugin-carts-guru-id |
CVE-2019-12241
|
MISC:http://dumpco.re/bugs/wp-plugin-print-my-blog-ssrf |
CVE-2019-11565
|
MISC:http://dumpco.re/bugs/wp-plugin-wp-booking-system-sqli |
CVE-2019-12239
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-07-06 |
CVE-2007-2418
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-07-07 |
CVE-2007-0754
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-07-09 |
CVE-2007-2419
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-07-10 |
CVE-2007-2514
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-07-11 |
CVE-2007-3181
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-07-12 |
CVE-2007-2417
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-07-13 |
CVE-2007-3566
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-07-15 |
CVE-2007-4827
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-07-17 |
CVE-2007-5084
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-07-18 |
CVE-2007-5323
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-07-20 |
CVE-2007-4674
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-08-01 |
CVE-2008-0033
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-08-02 |
CVE-2008-0027
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-08-03 |
CVE-2008-0116
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-08-04 |
CVE-2007-6026
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-08-05 |
CVE-2008-2541
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-08-06 |
CVE-2008-2468
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-08-07 |
CVE-2008-3479
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-09-04 |
CVE-2009-1717
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-09-08 |
CVE-2009-3846
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-09-09 |
CVE-2009-4176
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-09-10 |
CVE-2009-4177
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-09-11 |
CVE-2009-4178
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-09-12 |
CVE-2009-4179
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-09-13 |
CVE-2009-4180
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-09-14 |
CVE-2009-4181
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-09-15 |
CVE-2007-2281
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-10-03 |
CVE-2010-2308
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-10-05 |
CVE-2010-3107
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-10-06 |
CVE-2010-3106
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-10-07 |
CVE-2010-3032
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-10-09 |
CVE-2010-2877
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-10-10 |
CVE-2010-2878
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-10-12 |
CVE-2010-2879
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-10-13 |
CVE-2010-2866
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-10-14 |
CVE-2010-2867
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-10-15 |
CVE-2010-2870
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-11-01 |
CVE-2010-4188
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-11-02 |
CVE-2011-0555
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-11-03 |
CVE-2011-0556
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-11-04 |
CVE-2010-4189
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-11-05 |
CVE-2011-0569
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-11-12 |
CVE-2011-3006
|
MISC:http://dvlabs.tippingpoint.com/advisory/TPTI-11-13 |
CVE-2011-3007
|
MISC:http://dvlabs.tippingpoint.com/blog/2007/07/24/step-by-step-of-how-tpti-07-013-was-discovered |
CVE-2007-3566
|
MISC:http://dvlabs.tippingpoint.com/blog/2008/06/18/vulnerability-in-mozilla-firefox-30 |
CVE-2008-2785
|
MISC:http://dvlabs.tippingpoint.com/blog/2009/02/25/pwn2own-2009 |
CVE-2009-1042 CVE-2009-1043 CVE-2009-1044 CVE-2009-1060
|
MISC:http://dvlabs.tippingpoint.com/blog/2009/03/18/pwn2own-2009-day-1---safari-internet-explorer-and-firefox-taken-down-by-four-zero-day-exploits |
CVE-2009-1042 CVE-2009-1043 CVE-2009-1044 CVE-2009-1060
|
MISC:http://dvlabs.tippingpoint.com/blog/2009/03/20/pwn2own-day-2 |
CVE-2009-1043
|
MISC:http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010 |
CVE-2010-1117 CVE-2010-1118 CVE-2010-1119 CVE-2010-1120 CVE-2010-1121
|
MISC:http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011 |
CVE-2011-1290 CVE-2011-1344 CVE-2011-1345 CVE-2011-1346 CVE-2011-1347 CVE-2011-1416 CVE-2011-1417
|
MISC:http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ca |
CVE-2011-0758
|
MISC:http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-hp |
CVE-2011-0921 CVE-2011-0922 CVE-2011-0923 CVE-2011-0924
|
MISC:http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-ibm |
CVE-2011-1033
|
MISC:http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-microsoft |
CVE-2011-0976 CVE-2011-0977 CVE-2011-0978 CVE-2011-0979 CVE-2011-0980
|
MISC:http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-novell |
CVE-2010-4327
|
MISC:http://dx.doi.org/10.14722/ndss.2017.23456 |
CVE-2017-18227
|
MISC:http://dynpg.com |
CVE-2020-27406
|
MISC:http://dzv365zjfbd8v.cloudfront.net/changelogs/woocommerce-help-scout/changelog.txt |
CVE-2021-24212
|
MISC:http://e-rdc.org/v1/news.php?readmore=101 |
CVE-2008-2881 CVE-2008-3185
|
MISC:http://e-rdc.org/v1/news.php?readmore=102 |
CVE-2008-6250
|
MISC:http://e-rdc.org/v1/news.php?readmore=108 |
CVE-2008-4205 CVE-2008-4206 CVE-2008-4207
|
MISC:http://e-rdc.org/v1/news.php?readmore=126 |
CVE-2009-0727
|
MISC:http://e-rdc.org/v1/news.php?readmore=129 |
CVE-2009-1053
|
MISC:http://e-rdc.org/v1/news.php?readmore=130 |
CVE-2009-1052
|
MISC:http://e-rdc.org/v1/news.php?readmore=131 |
CVE-2009-1051
|
MISC:http://e-rdc.org/v1/news.php?readmore=132 |
CVE-2009-4797
|
MISC:http://e-rdc.org/v1/news.php?readmore=137 |
CVE-2009-2044
|
MISC:http://e-rdc.org/v1/news.php?readmore=142 |
CVE-2009-3357 CVE-2009-3368
|
MISC:http://e-rdc.org/v1/news.php?readmore=91 |
CVE-2008-6427
|
MISC:http://e-rdc.org/v1/news.php?readmore=98 |
CVE-2008-2916
|
MISC:http://e107.org/comment.php?comment.news.672 |
CVE-2004-2262
|
MISC:http://e107.org/comment.php?comment.news.872 |
CVE-2011-0457
|
MISC:http://e107.org/e107_plugins/bugtrack/bugtrack.php?id=3195&action=show |
CVE-2006-4757
|
MISC:http://e107.org/svn_changelog.php?version=0.7.20 |
CVE-2010-0996 CVE-2010-0997
|
MISC:http://eagle.kecapi.com/sec/fd/phpMyAdmin.html |
CVE-2004-2631 CVE-2004-2632
|
MISC:http://eagleget.com |
CVE-2020-21046
|
MISC:http://easyio.com |
CVE-2022-26643
|
MISC:http://ebascripts.com/ |
CVE-2007-2190
|
MISC:http://echo.or.id/adv/adv011-y3dips-2005.txt |
CVE-2005-0655 CVE-2005-0656
|
MISC:http://echo.or.id/adv/adv02-y3dips-2004.txt |
CVE-2004-2670 CVE-2004-2671
|
MISC:http://echo.or.id/adv/adv03-y3dips-2004.txt |
CVE-2004-1447 CVE-2004-1448
|
MISC:http://echo.or.id/adv/adv05-y3dips-2004.txt |
CVE-2004-1662
|
MISC:http://echo.or.id/adv/adv07-y3dips-2004.txt |
CVE-2004-1571 CVE-2004-1572 CVE-2004-1573
|
MISC:http://echo.or.id/adv/adv08-y3dips-2004.txt |
CVE-2004-1504 CVE-2004-1505
|
MISC:http://echo.or.id/adv/adv09-y3dips-2004.txt |
CVE-2004-1219
|
MISC:http://echo.or.id/adv/adv12-y3dips-2005.txt |
CVE-2005-1135 CVE-2005-1136 CVE-2005-1137
|
MISC:http://echo.or.id/adv/adv13-theday-2005.txt |
CVE-2005-1622
|
MISC:http://echo.or.id/adv/adv14-theday-2005.txt |
CVE-2005-1838 CVE-2005-1839
|
MISC:http://echo.or.id/adv/adv15-theday-2005.txt |
CVE-2005-1962 CVE-2005-1963
|
MISC:http://echo.or.id/adv/adv16-theday-2005.txt |
CVE-2005-1967 CVE-2005-1968
|
MISC:http://echo.or.id/adv/adv18-theday-2005.txt |
CVE-2005-2009 CVE-2005-2010
|
MISC:http://echo.or.id/adv/adv19-theday-2005.txt |
CVE-2005-2045 CVE-2005-2046 CVE-2005-2047 CVE-2005-2048 CVE-2005-2049
|
MISC:http://echo.or.id/adv/adv20-theday-2005.txt |
CVE-2005-2053
|
MISC:http://echo.or.id/adv/adv21-theday-2005.txt |
CVE-2005-2062 CVE-2005-2063
|
MISC:http://echo.or.id/adv/adv24-theday-2005.txt |
CVE-2005-4463
|
MISC:http://echo.or.id/adv/adv26-K-159-2006.txt |
CVE-2006-0131 CVE-2006-0688
|
MISC:http://echo.or.id/adv/adv27-K-159-2006.txt |
CVE-2006-0688
|
MISC:http://echo.or.id/adv/adv35-y3dips-2006.txt |
CVE-2006-3353
|
MISC:http://echo.or.id/adv/adv62-y3dips-2007.txt |
CVE-2007-0497
|
MISC:http://echo.or.id/adv/adv63-y3dips-2007.txt |
CVE-2007-0677
|
MISC:http://echo.or.id/adv/adv64-y3dips-2007.txt |
CVE-2007-0881
|
MISC:http://ecm.com |
CVE-2020-35276
|
MISC:http://ecos.sourceware.org/ecos/problemreport.html |
CVE-2017-1000020
|
MISC:http://ednolo.alumnos.upv.es/?p=1295 |
CVE-2012-6371
|
MISC:http://eeye.com/html/research/advisories/AD20050111.html |
CVE-2005-0416
|
MISC:http://egavilanmedia.com |
CVE-2020-29228 CVE-2020-29230 CVE-2020-29231 CVE-2020-35273 CVE-2020-35276
|
MISC:http://egavilanmedia.com/ |
CVE-2020-35396
|
MISC:http://eidelweiss-advisories.blogspot.com/2010/04/snipegallery-315-multiple-remote-file.html |
CVE-2010-2126
|
MISC:http://eidelweiss-advisories.blogspot.com/2010/08/pecio-cms-v205-template-multiple-remote.html |
CVE-2010-3204
|
MISC:http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/ |
CVE-2012-1823 CVE-2012-2311 CVE-2012-2335
|
MISC:http://ekoparty.org/2011/juliano-rizzo.php |
CVE-2011-3389
|
MISC:http://elaboration.8bit.co.uk/projects/texts/advisories/AdvServer.DoS.txt |
CVE-2002-1994
|
MISC:http://electricsheep.org/release_notes.html |
CVE-2005-4581
|
MISC:http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html |
CVE-2006-6170
|
MISC:http://elegerov.blogspot.com/2006/10/here-is-lame-proof-of-concept-code-for.html |
CVE-2006-5550
|
MISC:http://element-it.com |
CVE-2022-24573
|
MISC:http://elitecms.net/download.php |
CVE-2018-12250
|
MISC:http://elixir.ematia.de/trac/ticket/119 |
CVE-2012-2146
|
MISC:http://ellsec.org/print.php?type=N&item_id=141 |
CVE-2006-3607
|
MISC:http://elouai.com/force-download.php |
CVE-2007-5732
|
MISC:http://em386.blogspot.com/2007/11/your-favorite-better-than-c-scripting.html |
CVE-2007-6183
|
MISC:http://em386.blogspot.com/2010/12/webkit-css-type-confusion.html |
CVE-2012-4512
|
MISC:http://embed.plnkr.co/xHbhB29JWWyMUMeHsLrm |
CVE-2018-1000160
|
MISC:http://emboss.github.io/blog/2013/08/21/openssl-prng-is-not-really-fork-safe/ |
CVE-2013-7373
|
MISC:http://emco.com |
CVE-2022-28944
|
MISC:http://emerson.com |
CVE-2021-45420 CVE-2021-45421
|
MISC:http://employee.com |
CVE-2021-43712
|
MISC:http://en.0day.today/exploit/27771 |
CVE-2017-8382
|
MISC:http://en.community.dell.com/techcenter/extras/m/white_papers/20441859 |
CVE-2015-7270 CVE-2015-7271 CVE-2015-7272 CVE-2015-7273 CVE-2015-7274 CVE-2015-7275
|
MISC:http://en.community.dell.com/techcenter/extras/m/white_papers/20485410 |
CVE-2018-1207 CVE-2018-1211
|
MISC:http://en.community.dell.com/techcenter/systems-management/w/wiki/4929.how-to-check-if-ipmi-cipher-0-is-off.aspx |
CVE-2013-4783 CVE-2013-4785
|
MISC:http://en.ejointech.com/ |
CVE-2022-23332
|
MISC:http://en.hongdian.com/Products/Details/H8922 |
CVE-2021-28149 CVE-2021-28150 CVE-2021-28151 CVE-2021-28152
|
MISC:http://en.intelbras.com.br/downloads |
CVE-2019-20004
|
MISC:http://en.irfanview-forum.de/vb/showthread.php?5647-V4-25-bluescreen-with-Windows-7-cdd-dll-win32k-sys |
CVE-2009-3678
|
MISC:http://en.nsfocus.com/advisories/1301.html |
CVE-2013-6791
|
MISC:http://en.rstzone.org/xzero-community-classifieds-v4-95-11-lfi-sql-in-t9394.rst |
CVE-2007-6566 CVE-2007-6567
|
MISC:http://en.securitylab.ru/lab/ |
CVE-2012-2965 CVE-2012-2966 CVE-2012-2967 CVE-2012-2968 CVE-2012-2969 CVE-2012-3309 CVE-2012-3312 CVE-2012-3908
|
MISC:http://en.securitylab.ru/lab/PT-2008-09 |
CVE-2009-1922
|
MISC:http://en.securitylab.ru/lab/PT-2009-01 |
CVE-2009-0681
|
MISC:http://en.securitylab.ru/lab/PT-2009-05 |
CVE-2009-0682
|
MISC:http://en.securitylab.ru/lab/PT-2009-09 |
CVE-2009-0686
|
MISC:http://en.securitylab.ru/lab/PT-2009-11 |
CVE-2009-0824
|
MISC:http://en.securitylab.ru/lab/PT-2009-13 |
CVE-2009-0825
|
MISC:http://en.securitylab.ru/lab/PT-2011-20 |
CVE-2011-4214
|
MISC:http://en.securitylab.ru/lab/PT-2011-21 |
CVE-2011-4215
|
MISC:http://en.securitylab.ru/lab/PT-2011-25 |
CVE-2011-5071
|
MISC:http://en.securitylab.ru/lab/PT-2011-30 |
CVE-2011-4723
|
MISC:http://en.securitylab.ru/lab/PT-2011-48 |
CVE-2012-1916 CVE-2012-1917 CVE-2012-1918 CVE-2012-1919 CVE-2012-1920
|
MISC:http://en.securitylab.ru/lab/PT-2012-05 |
CVE-2012-2965 CVE-2012-2966 CVE-2012-2967 CVE-2012-2968 CVE-2012-2969
|
MISC:http://en.securitylab.ru/lab/PT-2012-15 |
CVE-2012-3309 CVE-2012-3312
|
MISC:http://en.securitylab.ru/lab/PT-2012-24 |
CVE-2013-5751
|
MISC:http://en.securitylab.ru/lab/PT-2012-42 |
CVE-2012-3028 CVE-2012-3031
|
MISC:http://en.securitylab.ru/lab/PT-2012-43 |
CVE-2012-3030
|
MISC:http://en.securitylab.ru/lab/PT-2012-44 |
CVE-2012-3032
|
MISC:http://en.securitylab.ru/lab/PT-2012-45 |
CVE-2012-3034
|
MISC:http://en.securitylab.ru/lab/PT-2012-48 |
CVE-2012-3037
|
MISC:http://en.securitylab.ru/lab/PT-2012-50 |
CVE-2012-3040
|
MISC:http://en.securitylab.ru/lab/PT-2012-53 |
CVE-2013-7387
|
MISC:http://en.securitylab.ru/lab/PT-2013-01 |
CVE-2013-1881
|
MISC:http://en.securitylab.ru/lab/PT-2013-13 |
CVE-2013-6244
|
MISC:http://en.securitylab.ru/lab/PT-2014-09 |
CVE-2014-3787
|
MISC:http://en.securitylab.ru/lab/PT-2018-22 |
CVE-2018-19203
|
MISC:http://en.securitylab.ru/lab/PT-2018-23 |
CVE-2018-19204
|
MISC:http://en.securitylab.ru/poc/301420.php |
CVE-2007-4429
|
MISC:http://en.securitylab.ru/poc/extra/301419.php |
CVE-2007-4429
|
MISC:http://en.wikipedia.org/wiki/Talk:Itheora |
CVE-2008-0797
|
MISC:http://en.wooyun.org/bugs/wooyun-2013-034?2592 |
CVE-2013-6348
|
MISC:http://enablesecurity.com/2008/10/03/apple-mailapp-security-advisory/ |
CVE-2008-4491
|
MISC:http://encode.com |
CVE-2021-41945
|
MISC:http://endity.com/board/index.php?act=ST&f=3&t=68&s=363128162825b2d7fcf60c9cd2a292fe |
CVE-2002-1429
|
MISC:http://english.securitylab.ru/lab/PT-2012-06 |
CVE-2011-4963
|
MISC:http://eprint.iacr.org/2003/052/ |
CVE-2003-0131
|
MISC:http://eprint.iacr.org/2004/111 |
CVE-2011-3389
|
MISC:http://eprint.iacr.org/2005/033 |
CVE-2005-0366
|
MISC:http://eprint.iacr.org/2005/033.pdf |
CVE-2005-0366
|
MISC:http://eprint.iacr.org/2006/136 |
CVE-2011-3389
|
MISC:http://eprint.iacr.org/2007/419.pdf |
CVE-2007-6043
|
MISC:http://eprint.iacr.org/2011/232.pdf |
CVE-2011-1945
|
MISC:http://eprint.iacr.org/2011/633 |
CVE-2011-4354
|
MISC:http://eprint.iacr.org/2013/448 |
CVE-2013-4242
|
MISC:http://eprint.iacr.org/2014/140 |
CVE-2014-0076
|
MISC:http://eprint.iacr.org/2016/594.pdf |
CVE-2016-2178
|
MISC:http://epsilonlambda.wordpress.com/2011/06/11/subrion-cms-multiple-vulnerabilities/ |
CVE-2011-5211 CVE-2011-5212
|
MISC:http://erlang.org/doc/efficiency_guide/commoncaveats.html#list_to_atom-1 |
CVE-2019-16764
|
MISC:http://eromang.zataz.com/2012/02/15/cve-2012-0209-horde-backdoor-analysis/ |
CVE-2012-0209
|
MISC:http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/ |
CVE-2012-2102
|
MISC:http://eromang.zataz.com/2012/09/16/zero-day-season-is-really-not-over-yet/ |
CVE-2012-4969
|
MISC:http://eromang.zataz.com/2012/12/29/attack-and-ie-0day-informations-used-against-council-on-foreign-relations/ |
CVE-2012-4792
|
MISC:http://erratasec.blogspot.com/2007/02/trivial-remote-solaris-0day-disable.html |
CVE-2007-0882
|
MISC:http://erratasec.blogspot.com/2007/06/niiiice.html |
CVE-2007-3187
|
MISC:http://es.geocities.com/jplopezy/SmarterMailXSS.txt |
CVE-2008-0872
|
MISC:http://es.geocities.com/jplopezy/firefoxspoofing.html |
CVE-2009-2654
|
MISC:http://es.geocities.com/jplopezy/officescan.zip |
CVE-2009-1435
|
MISC:http://es.geocities.com/jplopezy/pruebamozilla.html |
CVE-2008-2014
|
MISC:http://es.geocities.com/jplopezy/pruebasafari3.html |
CVE-2008-1999 CVE-2008-2000 CVE-2008-2001
|
MISC:http://escarpment.net/exlibris.txt |
CVE-2007-3834 CVE-2007-3835
|
MISC:http://esoln.net/esoln/blog/2019/06/14/discuzml-v-3-x-code-injection-vulnerability/ |
CVE-2019-13956
|
MISC:http://esupport.trendmicro.com/support/vb/solution/ja-jp/1120144.aspx |
CVE-2018-3608
|
MISC:http://esupport.trendmicro.com/support/viewxml.do?ContentID=EN-1038646&id=EN-1038646 |
CVE-2008-2434
|
MISC:http://ethereum.com |
CVE-2022-23327 CVE-2022-23328
|
MISC:http://etizazmohsin.com/hsmx.html#csrf |
CVE-2021-40518
|
MISC:http://etizazmohsin.com/hsmx.html#database |
CVE-2021-40519
|
MISC:http://etizazmohsin.com/hsmx.html#rce |
CVE-2021-40521
|
MISC:http://etizazmohsin.com/hsmx.html#ssh |
CVE-2021-40520
|
MISC:http://etizazmohsin.com/hsmx.html#xss |
CVE-2021-40517
|
MISC:http://europe.nokia.com/nokia/0,,93034,00.html |
CVE-2006-3134
|
MISC:http://evader.wordpress.com/2006/02/16/kyocera-printers/ |
CVE-2006-0788 CVE-2006-0789
|
MISC:http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf |
CVE-2006-6895 CVE-2006-6896 CVE-2006-6897 CVE-2006-6898 CVE-2006-6899 CVE-2006-6900 CVE-2006-6901 CVE-2006-6902 CVE-2006-6903 CVE-2006-6904 CVE-2006-6905 CVE-2006-6906 CVE-2006-6907 CVE-2006-6908
|
MISC:http://events.ccc.de/congress/2006/Fahrplan/attachments/1158-Subverting_Ajax.pdf |
CVE-2007-0044 CVE-2007-0045 CVE-2007-0046 CVE-2007-0047 CVE-2007-0048
|
MISC:http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html |
CVE-2006-6893
|
MISC:http://events.ccc.de/congress/2008/Fahrplan/attachments/1109_collin_mulliner_eusecwest08_attacking_nfc_phones_slim.pdf |
CVE-2008-5825 CVE-2008-5826 CVE-2008-5827
|
MISC:http://events.ccc.de/congress/2008/Fahrplan/events/2639.en.html |
CVE-2008-5825 CVE-2008-5826 CVE-2008-5827
|
MISC:http://events.ccc.de/congress/2009/Fahrplan/attachments/1483_26c3_ipv4_fuckups.pdf |
CVE-2010-0308
|
MISC:http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html |
CVE-2009-4536 CVE-2009-4537 CVE-2010-0013 CVE-2010-0277
|
MISC:http://events.ccc.de/congress/2010/Fahrplan/events/3957.en.html |
CVE-2010-4669 CVE-2010-4670 CVE-2010-4671
|
MISC:http://events.ccc.de/congress/2012/Fahrplan/events/5400.en.html |
CVE-2012-5445
|
MISC:http://events.linuxfoundation.org/sites/events/files/slides/ABS2015.pdf |
CVE-2014-7915 CVE-2014-7916 CVE-2014-7917
|
MISC:http://evilc0de.blogspot.com/2009/09/tpdugg-joomla-component-11-blind-sql.html |
CVE-2009-4628
|
MISC:http://evilc0de.blogspot.com/2010/03/osdate-rfi-vuln.html |
CVE-2010-1055
|
MISC:http://evilc0de.blogspot.com/2010/03/pre-e-learning-portal-sql-injection.html |
CVE-2010-0954
|
MISC:http://evilc0de.blogspot.com/2010/04/joomla-component-redtwitter-lfi-vuln.html |
CVE-2010-1983
|
MISC:http://evilfingers.com/advisory/Firefox_User_Interface_Null_Pointer_Dereference_Dispatcher_Crash_n_Remote_DoS.php |
CVE-2008-4324
|
MISC:http://evilfingers.com/advisory/google_chrome_poc.php |
CVE-2008-6995
|
MISC:http://evilpacket.net/2010/dec/22/information-leakage-django-administrative-interfac/ |
CVE-2010-4534
|
MISC:http://evuln.com/vulns/1/summary.html |
CVE-2006-0065
|
MISC:http://evuln.com/vulns/10/summary.html |
CVE-2006-0078
|
MISC:http://evuln.com/vulns/100/summary.html |
CVE-2006-1238
|
MISC:http://evuln.com/vulns/101/summary.html |
CVE-2006-1334
|
MISC:http://evuln.com/vulns/102/description.html |
CVE-2006-1341
|
MISC:http://evuln.com/vulns/103/summary.html |
CVE-2006-1259
|
MISC:http://evuln.com/vulns/104/summary.html |
CVE-2006-1256
|
MISC:http://evuln.com/vulns/105/summary.html |
CVE-2006-1328
|
MISC:http://evuln.com/vulns/106/description.html |
CVE-2006-1553 CVE-2006-1554 CVE-2006-1555
|
MISC:http://evuln.com/vulns/107/summary.html |
CVE-2006-1533
|
MISC:http://evuln.com/vulns/108/summary.html |
CVE-2006-1499
|
MISC:http://evuln.com/vulns/109/summary.html |
CVE-2006-1534
|
MISC:http://evuln.com/vulns/11/summary.html |
CVE-2006-0079
|
MISC:http://evuln.com/vulns/110 |
CVE-2006-1560
|
MISC:http://evuln.com/vulns/111 |
CVE-2006-1561 CVE-2006-1562 CVE-2006-1563
|
MISC:http://evuln.com/vulns/113/description.html |
CVE-2006-1575 CVE-2006-1576
|
MISC:http://evuln.com/vulns/114/summary.html |
CVE-2006-1571
|
MISC:http://evuln.com/vulns/115/summary.html |
CVE-2006-1568 CVE-2006-1569
|
MISC:http://evuln.com/vulns/116/summary.html |
CVE-2006-1612 CVE-2006-1613
|
MISC:http://evuln.com/vulns/117/summary.html |
CVE-2006-1637 CVE-2006-1638
|
MISC:http://evuln.com/vulns/118/summary.html |
CVE-2006-1640 CVE-2006-1641
|
MISC:http://evuln.com/vulns/119/summary.html |
CVE-2006-1639
|
MISC:http://evuln.com/vulns/120/summary.html |
CVE-2006-1755 CVE-2006-1756
|
MISC:http://evuln.com/vulns/121/summary.html |
CVE-2006-1657 CVE-2006-1658
|
MISC:http://evuln.com/vulns/122/summary.html |
CVE-2006-1979
|
MISC:http://evuln.com/vulns/123/summary.html |
CVE-2006-1690 CVE-2006-1691
|
MISC:http://evuln.com/vulns/124/summary.html |
CVE-2006-1798
|
MISC:http://evuln.com/vulns/125/summary.html |
CVE-2006-1817 CVE-2006-1818
|
MISC:http://evuln.com/vulns/126/ |
CVE-2006-2136
|
MISC:http://evuln.com/vulns/127/summary.html |
CVE-2006-2145 CVE-2006-2146
|
MISC:http://evuln.com/vulns/128/ |
CVE-2006-2135
|
MISC:http://evuln.com/vulns/129/summary.html |
CVE-2006-2139
|
MISC:http://evuln.com/vulns/13/summary.html |
CVE-2006-0084
|
MISC:http://evuln.com/vulns/130/summary.html |
CVE-2006-2128 CVE-2006-2129
|
MISC:http://evuln.com/vulns/131/summary.html |
CVE-2006-2130 CVE-2006-2131
|
MISC:http://evuln.com/vulns/133/summary.html |
CVE-2006-2239
|
MISC:http://evuln.com/vulns/134/description.html |
CVE-2006-4325
|
MISC:http://evuln.com/vulns/135/description.html |
CVE-2006-4323 CVE-2006-4324
|
MISC:http://evuln.com/vulns/136/description.html |
CVE-2006-4327 CVE-2006-4328
|
MISC:http://evuln.com/vulns/137/summary.html |
CVE-2006-4797
|
MISC:http://evuln.com/vulns/139/summary.html |
CVE-2010-4848
|
MISC:http://evuln.com/vulns/14/exploit.html |
CVE-2006-0104
|
MISC:http://evuln.com/vulns/14/summary.html |
CVE-2006-0102 CVE-2006-0103 CVE-2006-0104
|
MISC:http://evuln.com/vulns/144/summary.html |
CVE-2010-4358
|
MISC:http://evuln.com/vulns/146/summary.html |
CVE-2010-4363
|
MISC:http://evuln.com/vulns/147/summary.html |
CVE-2010-4784
|
MISC:http://evuln.com/vulns/148/summary.html |
CVE-2010-4783
|
MISC:http://evuln.com/vulns/15/summary.html |
CVE-2006-0123 CVE-2006-0124
|
MISC:http://evuln.com/vulns/151/summary.html |
CVE-2010-4407
|
MISC:http://evuln.com/vulns/16/summary.html |
CVE-2006-0110
|
MISC:http://evuln.com/vulns/17/exploit.html |
CVE-2006-0134 CVE-2006-0135
|
MISC:http://evuln.com/vulns/17/summary.html |
CVE-2006-0134 CVE-2006-0135
|
MISC:http://evuln.com/vulns/174/summary.html |
CVE-2011-1060
|
MISC:http://evuln.com/vulns/175/summary.html |
CVE-2011-1061
|
MISC:http://evuln.com/vulns/18/summary.html |
CVE-2006-0153 CVE-2006-0154 CVE-2006-0155
|
MISC:http://evuln.com/vulns/19/summary.html |
CVE-2006-0140
|
MISC:http://evuln.com/vulns/2/summary.html |
CVE-2006-0067
|
MISC:http://evuln.com/vulns/20 |
CVE-2006-0156
|
MISC:http://evuln.com/vulns/21/summary.html |
CVE-2006-0160
|
MISC:http://evuln.com/vulns/22/summary.html |
CVE-2006-0167 CVE-2006-0168
|
MISC:http://evuln.com/vulns/23/summary.html |
CVE-2006-0169
|
MISC:http://evuln.com/vulns/24/summary.html |
CVE-2006-0180
|
MISC:http://evuln.com/vulns/25/summary.html |
CVE-2006-0182 CVE-2006-0183
|
MISC:http://evuln.com/vulns/26/summary.html |
CVE-2006-0209
|
MISC:http://evuln.com/vulns/27/summary.html |
CVE-2006-0205
|
MISC:http://evuln.com/vulns/28/summary.html |
CVE-2006-0204 CVE-2006-0205
|
MISC:http://evuln.com/vulns/29/exploit.html |
CVE-2006-0206
|
MISC:http://evuln.com/vulns/29/summary.html |
CVE-2006-0206
|
MISC:http://evuln.com/vulns/3/summary.html |
CVE-2006-0076
|
MISC:http://evuln.com/vulns/30/summary.html |
CVE-2006-0252
|
MISC:http://evuln.com/vulns/31/summary |
CVE-2006-0320
|
MISC:http://evuln.com/vulns/32/exploit |
CVE-2006-0361
|
MISC:http://evuln.com/vulns/32/summary/ |
CVE-2006-0361
|
MISC:http://evuln.com/vulns/33/summary.html |
CVE-2006-0249
|
MISC:http://evuln.com/vulns/34/summary |
CVE-2006-0318
|
MISC:http://evuln.com/vulns/35/summary.html |
CVE-2006-0234
|
MISC:http://evuln.com/vulns/36/summary.html |
CVE-2006-0233
|
MISC:http://evuln.com/vulns/37/summary.html |
CVE-2006-0310 CVE-2006-0311 CVE-2006-0312
|
MISC:http://evuln.com/vulns/38/summary/bt/ |
CVE-2006-0352
|
MISC:http://evuln.com/vulns/39/summary.html |
CVE-2006-0349 CVE-2006-0350
|
MISC:http://evuln.com/vulns/4/summary.html |
CVE-2006-0069
|
MISC:http://evuln.com/vulns/40/summary.html |
CVE-2005-4058 CVE-2006-0345 CVE-2006-0346
|
MISC:http://evuln.com/vulns/41/summary.html |
CVE-2006-0324
|
MISC:http://evuln.com/vulns/42/summary.html |
CVE-2006-0370 CVE-2006-0371
|
MISC:http://evuln.com/vulns/43/summary.html |
CVE-2006-0403
|
MISC:http://evuln.com/vulns/44/summary.html |
CVE-2006-0404
|
MISC:http://evuln.com/vulns/45/summary.html |
CVE-2006-0409
|
MISC:http://evuln.com/vulns/46/summary.html |
CVE-2006-0439 CVE-2006-0440
|
MISC:http://evuln.com/vulns/47/summary.html |
CVE-2006-0417
|
MISC:http://evuln.com/vulns/48/summary.html |
CVE-2006-0461
|
MISC:http://evuln.com/vulns/49/summary.html |
CVE-2006-0443
|
MISC:http://evuln.com/vulns/5/summary.html |
CVE-2006-0074
|
MISC:http://evuln.com/vulns/50/summary.html |
CVE-2006-0462
|
MISC:http://evuln.com/vulns/51/ |
CVE-2006-0471 CVE-2006-0472 CVE-2006-0473
|
MISC:http://evuln.com/vulns/51/summary.html |
CVE-2006-0471 CVE-2006-0472 CVE-2006-0473
|
MISC:http://evuln.com/vulns/55/summary.html |
CVE-2006-0605 CVE-2006-0606
|
MISC:http://evuln.com/vulns/58/description.html |
CVE-2006-0604
|
MISC:http://evuln.com/vulns/58/summary.html |
CVE-2006-0602 CVE-2006-0603
|
MISC:http://evuln.com/vulns/59/summary.html |
CVE-2006-0653 CVE-2006-0654 CVE-2006-0655
|
MISC:http://evuln.com/vulns/6/summary.html |
CVE-2006-0075
|
MISC:http://evuln.com/vulns/61/summary.html |
CVE-2006-0570 CVE-2006-0571 CVE-2006-0572
|
MISC:http://evuln.com/vulns/63/summary.html |
CVE-2006-0657
|
MISC:http://evuln.com/vulns/65/summary.html |
CVE-2006-0661
|
MISC:http://evuln.com/vulns/7/exploit.html |
CVE-2006-0136 CVE-2006-0137
|
MISC:http://evuln.com/vulns/7/summary.html |
CVE-2006-0136 CVE-2006-0137
|
MISC:http://evuln.com/vulns/70/summary.html |
CVE-2006-0648
|
MISC:http://evuln.com/vulns/71/summary.html |
CVE-2006-0673
|
MISC:http://evuln.com/vulns/72/summary.html |
CVE-2006-0723 CVE-2006-0724
|
MISC:http://evuln.com/vulns/73/summary.html |
CVE-2006-0722
|
MISC:http://evuln.com/vulns/78/summary.html |
CVE-2006-0795
|
MISC:http://evuln.com/vulns/79/summary.html |
CVE-2006-0735
|
MISC:http://evuln.com/vulns/8/summary.html |
CVE-2006-0088
|
MISC:http://evuln.com/vulns/81/summary.html |
CVE-2006-0780 CVE-2006-0781 CVE-2006-0782
|
MISC:http://evuln.com/vulns/83/summary.html |
CVE-2006-0829
|
MISC:http://evuln.com/vulns/84/summary.html |
CVE-2006-0809 CVE-2006-0810 CVE-2006-0811
|
MISC:http://evuln.com/vulns/85/summary.html |
CVE-2006-0877
|
MISC:http://evuln.com/vulns/86/summary.html |
CVE-2006-0896
|
MISC:http://evuln.com/vulns/87/summary.html |
CVE-2006-0940 CVE-2006-0941
|
MISC:http://evuln.com/vulns/88/summary.html |
CVE-2006-1129 CVE-2006-1130
|
MISC:http://evuln.com/vulns/89/summary.html |
CVE-2006-0957 CVE-2006-0958
|
MISC:http://evuln.com/vulns/9/summary.html |
CVE-2006-0066
|
MISC:http://evuln.com/vulns/90/summary.html |
CVE-2006-1020
|
MISC:http://evuln.com/vulns/91/description.html |
CVE-2006-1134
|
MISC:http://evuln.com/vulns/92/summary.html |
CVE-2006-1264 CVE-2006-1265
|
MISC:http://evuln.com/vulns/93/summary.html |
CVE-2006-1107 CVE-2006-1108
|
MISC:http://evuln.com/vulns/94/summary.html |
CVE-2006-1276
|
MISC:http://evuln.com/vulns/95/summary.html |
CVE-2006-1277 CVE-2006-1278
|
MISC:http://evuln.com/vulns/96/summary.html |
CVE-2006-1217
|
MISC:http://evuln.com/vulns/97/summary.html |
CVE-2006-1237
|
MISC:http://evuln.com/vulns/98/summary.html |
CVE-2006-1234
|
MISC:http://evuln.com/vulns/99/summary.html |
CVE-2006-1232
|
MISC:http://ex1200t.com |
CVE-2021-42872 CVE-2021-42875 CVE-2021-42877
|
MISC:http://example.com |
CVE-2014-1850
|
MISC:http://exchange.kg/other/chrome3_0day-denial_of_service_crash.html |
CVE-2010-0664
|
MISC:http://exim.org/static/doc/security/CVE-2019-15846.txt |
CVE-2019-15846
|
MISC:http://explo.it/exploits/11068 |
CVE-2010-0946
|
MISC:http://exploit.iedb.ir/exploits-177.html |
CVE-2013-4117
|
MISC:http://exploit.kitploit.com/2017/08/alzip-851-buffer-overflow.html |
CVE-2017-11323
|
MISC:http://exploitlabs.com/files/advisories/EXPL-A-2005-002-samsung-adsl.txt |
CVE-2005-0864 CVE-2005-0865
|
MISC:http://exploitlabs.com/files/advisories/EXPL-A-2005-003-adventiachat.txt |
CVE-2005-0919
|
MISC:http://exploitlabs.com/files/advisories/EXPL-A-2005-004-edata.txt |
CVE-2005-0924
|
MISC:http://exploitlabs.com/files/advisories/EXPL-A-2005-007-hsphere.txt |
CVE-2005-1606
|
MISC:http://exploitlabs.com/files/advisories/EXPL-A-2005-008-sitestudio.txt |
CVE-2005-1605
|
MISC:http://exploitlabs.com/files/advisories/EXPL-A-2005-009-coolcafe.txt |
CVE-2005-2035 CVE-2005-2036
|
MISC:http://exploitlabs.com/files/advisories/EXPL-A-2005-011-quickblogger.txt |
CVE-2005-4785
|
MISC:http://exploitlabs.com/files/advisories/EXPL-A-2005-013-mimic2.txt |
CVE-2005-4858 CVE-2005-4859
|
MISC:http://exploitlabs.com/files/advisories/EXPL-A-2005-014-perldiver.txt |
CVE-2005-3066 CVE-2005-3067
|
MISC:http://exploitlabs.com/files/advisories/EXPL-A-2005-015-tellme.txt |
CVE-2005-4698 CVE-2005-4699 CVE-2005-4700
|
MISC:http://exploitlabs.com/files/advisories/EXPL-A-2006-005-shttpd.txt |
CVE-2006-5216
|
MISC:http://exploitsdownload.com/exploit/na/kunena-20-sql-injection |
CVE-2012-4868
|
MISC:http://expressvpn.com |
CVE-2020-29238
|
MISC:http://expzh.com/TONGDA-OA-SQL-Injection.pdf |
CVE-2019-9759
|
MISC:http://exrick.com |
CVE-2021-43432
|
MISC:http://extendedsubset.com/?p=8 |
CVE-2009-3555
|
MISC:http://extendedsubset.com/Renegotiating_TLS.pdf |
CVE-2009-3555
|
MISC:http://extensions.joomla.org/extensions/e-commerce/shopping-cart/7951 |
CVE-2010-1305
|
MISC:http://extensions.joomla.org/extensions/extension/e-commerce/shopping-cart/catalog |
CVE-2016-1000119 CVE-2016-1000120
|
MISC:http://extensions.joomla.org/extensions/extension/photos-a-images/galleries/gallery-pro |
CVE-2016-1000113 CVE-2016-1000114
|
MISC:http://extensions.joomla.org/extensions/extension/photos-a-images/slider |
CVE-2016-1000121 CVE-2016-1000122
|
MISC:http://extensions.joomla.org/extensions/extension/photos-a-images/slideshow/slideshow |
CVE-2016-1000117 CVE-2016-1000118
|
MISC:http://extensions.thethinkery.net/ |
CVE-2010-1721
|
MISC:http://extensis.com |
CVE-2022-24251 CVE-2022-24252 CVE-2022-24253 CVE-2022-24254 CVE-2022-24255
|
MISC:http://extraexploit.blogspot.com/2010/08/dll-hijacking-my-test-cases-on-default.html |
CVE-2010-5237 CVE-2010-5238 CVE-2010-5243
|
MISC:http://extraexploit.blogspot.com/2010/11/full-disclosure-xplpdf-adober-reader-94.html |
CVE-2010-4091
|
MISC:http://f-security.jp/v6/support/information/100161.html |
CVE-2017-10830
|
MISC:http://f0kp.iplus.ru/bz/008.txt |
CVE-2002-1341
|
MISC:http://f0kp.iplus.ru/bz/024.en.txt |
CVE-2003-0395
|
MISC:http://f1security.co.kr/cve/cve_190314.htm |
CVE-2019-12288 CVE-2019-12289
|
MISC:http://fastcompression.blogspot.fr/2014/06/debunking-lz4-20-years-old-bug-myth.html |
CVE-2014-4611
|
MISC:http://fc19.ifca.ai/preproceedings/180-preproceedings.pdf |
CVE-2018-19151 CVE-2018-19152 CVE-2018-19153 CVE-2018-19154 CVE-2018-19155 CVE-2018-19156 CVE-2018-19157 CVE-2018-19158 CVE-2018-19159 CVE-2018-19160 CVE-2018-19161 CVE-2018-19162 CVE-2018-19163 CVE-2018-19164 CVE-2018-19165 CVE-2018-19166 CVE-2018-19167
|
MISC:http://fd.the-wildcat.de/pma_e36a091q11.php |
CVE-2008-4096
|
MISC:http://fdcl.svn.sourceforge.net/viewvc/*checkout*/fdcl/trunk/Changelog |
CVE-2007-4234
|
MISC:http://feedback.filerun.com/topics/189-critical-security-update-available/ |
CVE-2017-14738
|
MISC:http://felinemenace.org/advisories/bmv_advisory.txt |
CVE-2005-3278 CVE-2005-3279
|
MISC:http://felinemenace.org/advisories/macosx.txt |
CVE-2005-0975
|
MISC:http://felinemenace.org/~jaguar/advisories/log2mail.txt |
CVE-2004-0450
|
MISC:http://fereidani.com/articles/show/76_kerio_control_8_3_1_boolean_based_blind_sql_injection |
CVE-2014-3857
|
MISC:http://ferruh.mavituna.com/article/?574 |
CVE-2004-2057 CVE-2004-2058 CVE-2004-2059 CVE-2004-2060
|
MISC:http://ffmpeg.mplayerhq.hu/ |
CVE-2011-0723
|
MISC:http://ffmpeg.org/security.html |
CVE-2013-3670
|
MISC:http://fgc.fortinet.com/encyclopedia/vulnerability/fg-vd-09-012-cisco.html |
CVE-2009-2876
|
MISC:http://fgc.fortinet.com/encyclopedia/vulnerability/fg-vd-09-013-cisco.html |
CVE-2009-2878
|
MISC:http://fiberhome.com |
CVE-2021-42912
|
MISC:http://fil.rezo.net/secu-14346-14350+14354.patch |
CVE-2009-3041
|
MISC:http://files.iclinks.com/datasheets/Scadaflex%20II/Scadaflex%20SC-1%20&%20SC-2_A1_compressed.pdf |
CVE-2022-25359
|
MISC:http://filezilla.sourceforge.net/forum/viewtopic.php?t=1328 |
CVE-2005-2898
|
MISC:http://firebitsbr.wordpress.com/2014/07/16/vsla-security-advisory-fire-scada-dos-2013-001-http-dos-requests-flooding-crash-device-vulnerabilities-elipse-e3-scada-plc/ |
CVE-2014-8652
|
MISC:http://firmware.grandstream.com/BETA/Release_Note_HT80x_1.0.29.8.pdf |
CVE-2021-37915
|
MISC:http://firmware.re/usenixsec14/ |
CVE-2013-5638 CVE-2013-6277 CVE-2013-6360 CVE-2013-6362
|
MISC:http://firmware.re/vulns/acsa-2013-002.php |
CVE-2013-6276 CVE-2013-6277
|
MISC:http://firmware.re/vulns/acsa-2013-005.php |
CVE-2013-6362
|
MISC:http://firmware.re/vulns/acsa-2013-006.php |
CVE-2013-5638
|
MISC:http://firmware.re/vulns/acsa-2013-007.php |
CVE-2013-5637
|
MISC:http://firmware.re/vulns/acsa-2013-014.php |
CVE-2013-6360
|
MISC:http://firmware.re/vulns/acsa-2015-002.php |
CVE-2016-11022
|
MISC:http://firstsight.me/2017/12/lack-of-binary-protection-at-asus-vivo-baby-and-hivivo-for-android-that-could-result-of-several-security-issues |
CVE-2017-17944 CVE-2017-17945
|
MISC:http://firstsight.me/2019/10/5000-usd-xss-issue-at-avast-desktop-antivirus-for-windows-yes-desktop/ |
CVE-2019-18653 CVE-2019-18654
|
MISC:http://firstsight.me/2019/10/illegal-rendered-at-download-feature-in-several-apps-including-opera-mini-that-lead-to-extension-manipulation-with-rtlo/ |
CVE-2019-18624
|
MISC:http://fish2.com/ipmi/cipherzero.html |
CVE-2013-4782 CVE-2013-4783 CVE-2013-4784
|
MISC:http://fish2.com/ipmi/dell/secret.html |
CVE-2013-4785
|
MISC:http://fish2.com/ipmi/remote-pw-cracking.html |
CVE-2013-4786
|
MISC:http://flaked.sockpuppet.org/2018/05/16/a-unified-timeline.html |
CVE-2017-17688
|
MISC:http://flets-w.com/topics/2018/20180207a.html |
CVE-2018-0516
|
MISC:http://flets-w.com/topics/azukeru_vulnerability/ |
CVE-2017-10827
|
MISC:http://flets-w.com/topics/inst_tool_vulnerability/ |
CVE-2017-10828
|
MISC:http://flets-w.com/topics/mihariban_vulnerability/ |
CVE-2017-10826
|
MISC:http://flets-w.com/topics/setsuzoku_tool_vulnerability/ |
CVE-2017-2242
|
MISC:http://flets-w.com/topics/setup_tool_vulnerability/ |
CVE-2017-10825
|
MISC:http://flipbox.net/news/620/ |
CVE-2018-15810
|
MISC:http://fluxbb.com |
CVE-2020-28873 CVE-2021-43677
|
MISC:http://fogproject.org/forum/threads/stored-xss-vulnerability-in-fog-project-version-0-27-through-0-32.10394 |
CVE-2014-3111
|
MISC:http://forcehacker.com/forum/viewtopic.php?t=2352 |
CVE-2007-4157
|
MISC:http://foregroundsecurity.com/secure-coding-and-security-qa/111-infoblox-netmri-621-612-and-60242-multiple-cross-site-scripting-xss |
CVE-2011-5178
|
MISC:http://foreversong.cn/archives/1070 |
CVE-2018-7172
|
MISC:http://foreversong.cn/archives/1081 |
CVE-2018-7219
|
MISC:http://foreversong.cn/archives/1183 |
CVE-2018-11231
|
MISC:http://forge.centreon.com/projects/centreon/repository/revisions/13749 |
CVE-2012-5967
|
MISC:http://forge.joomla.org/sf/go/artf5985?nav=1 |
CVE-2006-6832
|
MISC:http://forge.joomla.org/sf/go/artf6844?nav=1 |
CVE-2006-6832
|
MISC:http://forge.prestashop.com/browse/BOOM-4612 |
CVE-2018-5681
|
MISC:http://forge.prestashop.com/browse/BOOM-4613 |
CVE-2018-5682
|
MISC:http://forge.prestashop.com/browse/BOOM-4917 |
CVE-2018-7491
|
MISC:http://forge.typo3.org/issues/35532 |
CVE-2012-5888
|
MISC:http://forkcms.com |
CVE-2020-24036
|
MISC:http://foro.elhacker.net/index.php/topic,131756.htm |
CVE-2006-3670
|
MISC:http://foro.elhacker.net/index.php?topic=93436.0 |
CVE-2005-3509
|
MISC:http://fortconsult.net/files/fortconsult.dk/citrix_advisory.pdf |
CVE-2007-2850
|
MISC:http://fortconsult.net/files/fortconsult.dk/citrix_advisory_dec2006.pdf |
CVE-2006-6334
|
MISC:http://fortiguard.com/advisory/FG-VD-16-068 |
CVE-2016-7289
|
MISC:http://fortiguard.com/advisory/FG-VD-16-079 |
CVE-2017-0003
|
MISC:http://fortiguard.com/advisory/fortinet-discovers-php-stack-based-buffer-overflow-vulnerabilities |
CVE-2016-6289 CVE-2016-6297
|
MISC:http://fortiguardcenter.com/encyclopedia/ips/38068 |
CVE-2014-1617
|
MISC:http://fortune.com/2019/02/05/zcash-vulnerability-cryptocurrency/ |
CVE-2019-7167
|
MISC:http://forum.antichat.ru/showpost.php?p=340740 |
CVE-2007-6727 CVE-2007-6728
|
MISC:http://forum.aria-security.com/showthread.php?p=21 |
CVE-2008-1354
|
MISC:http://forum.aria-security.com/showthread.php?p=70 |
CVE-2008-1843 CVE-2008-1844
|
MISC:http://forum.aria-security.com/showthread.php?p=76 |
CVE-2008-1921
|
MISC:http://forum.aria-security.com/showthread.php?t=49 |
CVE-2008-1974
|
MISC:http://forum.aria-security.net/showthread.php?p=1521 |
CVE-2008-1162
|
MISC:http://forum.aria-security.net/showthread.php?p=2233 |
CVE-2008-1921
|
MISC:http://forum.aria-security.net/showthread.php?t=511 |
CVE-2008-0720
|
MISC:http://forum.aria-security.net/showthread.php?t=522 |
CVE-2008-0757
|
MISC:http://forum.centos-webpanel.com/informations/ |
CVE-2019-10893
|
MISC:http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&forum=Network%20Infrastructure&topic=WAN%2C%20Routing%20and%20Switching&CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.1ddf7bc9 |
CVE-2007-4430
|
MISC:http://forum.coppermine-gallery.net/index.php/board,58.0.html |
CVE-2018-14478
|
MISC:http://forum.corsair.com/v3/showthread.php?t=155646 |
CVE-2018-19592
|
MISC:http://forum.farsinewsteam.com/index.php?showtopic=71 |
CVE-2006-0660
|
MISC:http://forum.farsinewsteam.com/index.php?showtopic=76 |
CVE-2006-0660
|
MISC:http://forum.farsinewsteam.com/showthread.php?p=16 |
CVE-2006-3602
|
MISC:http://forum.fuzzylime.co.uk/st/content/download/ |
CVE-2007-3267
|
MISC:http://forum.ghc.ru/showthread.php?fid=32&tid=179&old_block=0 |
CVE-2005-3082
|
MISC:http://forum.hivemail.com/showthread.php?p=26745 |
CVE-2006-0757 CVE-2006-0758 CVE-2006-0759
|
MISC:http://forum.hwbot.org/showpost.php?p=480524 |
CVE-2017-7262
|
MISC:http://forum.hwbot.org/showthread.php?t=167605 |
CVE-2017-7262
|
MISC:http://forum.intern0t.net/exploits-vulnerabilities-pocs/1049-intern0t-adpeeps-8-5d1-cross-site-scripting-html-injection-vulnerabilities.html |
CVE-2009-4939 CVE-2009-4943
|
MISC:http://forum.intern0t.net/intern0t-advisories/1049-intern0t-adpeeps-8-5d1-cross-site-scripting-html-injection-vulnerabilities.html |
CVE-2009-4945
|
MISC:http://forum.intern0t.net/intern0t-advisories/1081-intern0t-lightneasy-2-2-2-html-injection-vulnerability.html |
CVE-2009-1937
|
MISC:http://forum.intern0t.net/intern0t-advisories/1082-intern0t-sitecore-net-6-0-0-cross-site-scripting-vulnerability.html |
CVE-2009-2163
|
MISC:http://forum.intern0t.net/intern0t-advisories/1119-intern0t-pivot-1-40-4-7-multiple-vulnerabilities.html |
CVE-2009-2133 CVE-2009-2134
|
MISC:http://forum.intern0t.net/intern0t-advisories/1120-intern0t-skybluecanvas-1-1-r237-multiple-vulnerabilities.html |
CVE-2009-2114 CVE-2009-2116
|
MISC:http://forum.intern0t.net/intern0t-advisories/1121-intern0t-tbdev-01-01-2008-multiple-vulnerabilities.html |
CVE-2009-2138 CVE-2009-2141
|
MISC:http://forum.intern0t.net/intern0t-advisories/1122-intern0t-translucid-1-75-multiple-vulnerabilities.html |
CVE-2009-2145
|
MISC:http://forum.intern0t.net/intern0t-advisories/1123-intern0t-webmedia-explorer-cross-site-scripting-vulnerability.html |
CVE-2009-2107
|
MISC:http://forum.intern0t.net/intern0t-advisories/1998-intern0t-livezilla-cross-site-scripting-vulnerability.html |
CVE-2009-4450
|
MISC:http://forum.joomla.org/index.php?topic=86460.msg439766#msg439766 |
CVE-2006-4229
|
MISC:http://forum.joomlaitalia.com/index.php?topic=388.0 |
CVE-2008-0829
|
MISC:http://forum.mamboserver.com/showthread.php?t=83001 |
CVE-2006-3773
|
MISC:http://forum.maxthon.com/forum/index.php?showtopic=18207 |
CVE-2005-0905
|
MISC:http://forum.maxthon.com/index.php?/topic/24472-unquoted-search-path-and-potential-abuses/ |
CVE-2019-16647
|
MISC:http://forum.openads.org/index.php?showtopic=503412651 |
CVE-2007-0477
|
MISC:http://forum.openx.org/index.php?s=8d4c74dab4fd4597a7facda7c7414703&showtopic=503422735 |
CVE-2008-6163
|
MISC:http://forum.openx.org/index.php?showtopic=503454011 |
CVE-2009-4830
|
MISC:http://forum.pivotx.net/viewtopic.php?p=10639#p10639 |
CVE-2011-1035
|
MISC:http://forum.pixelpost.org/showthread.php?t=3535 |
CVE-2006-1104 CVE-2006-1105 CVE-2006-1106
|
MISC:http://forum.qnap.com/viewtopic.php?f=11&t=11214&start=20#p63346 |
CVE-2009-3200
|
MISC:http://forum.qnap.com/viewtopic.php?f=12&t=12104&start=10#p63341 |
CVE-2009-3200
|
MISC:http://forum.scadabr.com.br/t/report-falhas-de-seguranca-em-versoes-do-scadabr/3615/4 |
CVE-2021-26828 CVE-2021-26829
|
MISC:http://forum.sitepanel2.com/index.php?showtopic=271 |
CVE-2005-1444 CVE-2005-1445 CVE-2005-1446 CVE-2005-1447
|
MISC:http://forum.swsoft.com/showthread.php?s=&postid=172761#post172761 |
CVE-2007-2269
|
MISC:http://forum.synology.com/enu/viewtopic.php?f=173&t=77644 |
CVE-2014-2264
|
MISC:http://forum.tufat.com/showthread.php?p=116753#post116753 |
CVE-2007-1341
|
MISC:http://forum.w3bcms.de/viewtopic.php?f=5&t=256 |
CVE-2009-0597
|
MISC:http://forum.wampserver.com/read.php?2,138295,150615,page=6#msg-150615 |
CVE-2018-8732
|
MISC:http://forum.wampserver.com/read.php?2,138295,150722,page=6#msg-150722 |
CVE-2018-8817
|
MISC:http://forum.wampserver.com/read.php?2,144473 |
CVE-2016-10031 CVE-2016-10072
|
MISC:http://forum.wampserver.com/read.php?2,153491 |
CVE-2018-1000848
|
MISC:http://forum.xchat.org/viewtopic.php?t=2918 |
CVE-2006-4455
|
MISC:http://forum.xda-developers.com/showthread.php?p=35469999 |
CVE-2012-6422
|
MISC:http://forum.xda-developers.com/showthread.php?t=1044765 |
CVE-2011-1823
|
MISC:http://forum.xda-developers.com/showthread.php?t=2051290 |
CVE-2012-6422
|
MISC:http://forum.xda-developers.com/showthread.php?t=2255491 |
CVE-2013-2596
|
MISC:http://forum.xda-developers.com/wiki/index.php?title=HTC_Vision#Rooting_the_G2 |
CVE-2011-1149
|
MISC:http://forums.agaresmedia.com/viewtopic.php?f=13&t=19 |
CVE-2007-4552
|
MISC:http://forums.agaresmedia.com/viewtopic.php?f=13&t=407 |
CVE-2007-6615
|
MISC:http://forums.alienvault.com/discussion/1609/patch-release-4-3-1 |
CVE-2013-5300
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2606 |
CVE-2007-0575
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2607 |
CVE-2007-0642 CVE-2007-0784
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2620 |
CVE-2007-0814
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2621 |
CVE-2007-0813
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2622 |
CVE-2007-0806
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2641 |
CVE-2007-0874
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2642 |
CVE-2007-0875
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2643 |
CVE-2007-0873
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2672 |
CVE-2007-1020
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2673 |
CVE-2007-1046
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2674 |
CVE-2007-1043
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2677 |
CVE-2007-1045
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2686 |
CVE-2007-1050
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2692 |
CVE-2007-1143 CVE-2007-1144
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2693 |
CVE-2007-1156
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2707 |
CVE-2007-1328
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2722 |
CVE-2007-1389 CVE-2007-1390
|
MISC:http://forums.avenir-geopolitique.net/viewtopic.php?t=2728 |
CVE-2007-1451
|
MISC:http://forums.dawnoftime.org/viewtopic.php?t=2102 |
CVE-2007-5265
|
MISC:http://forums.exponentcms.org/index.php?p=/discussion/comment/1591#Comment_1591 |
CVE-2016-7789 CVE-2016-9019
|
MISC:http://forums.grsecurity.net/viewtopic.php?f=3&t=2290 |
CVE-2010-2955
|
MISC:http://forums.grsecurity.net/viewtopic.php?t=1646 |
CVE-2007-0253 CVE-2007-0257
|
MISC:http://forums.invisionpower.com/index.php?act=Attach&type=post&id=10026 |
CVE-2006-2498
|
MISC:http://forums.invisionpower.com/lofiversion/index.php/t200085.html |
CVE-2006-0633
|
MISC:http://forums.kayako.com/f3/3-30-00-stable-released-18304/ |
CVE-2008-3700 CVE-2008-3701
|
MISC:http://forums.macrumors.com/showpost.php?p=6121914&postcount=118 |
CVE-2008-3876
|
MISC:http://forums.macrumors.com/showthread.php?t=551617 |
CVE-2008-3876
|
MISC:http://forums.miranda-im.org/showthread.php?t=1070 |
CVE-2005-1093
|
MISC:http://forums.mozillazine.org/viewtopic.php?f=48&t=1603515&start=0 |
CVE-2009-4102
|
MISC:http://forums.ocsinventory-ng.org/viewtopic.php?id=7215 |
CVE-2010-4777
|
MISC:http://forums.reprap.org/read.php?415,823246 |
CVE-2018-1000537
|
MISC:http://forums.spybot.info/showthread.php?t=34737 |
CVE-2008-4396
|
MISC:http://forums.unrealircd.com/viewtopic.php?t=2985 |
CVE-2006-1214
|
MISC:http://forums.vtiger.com/viewtopic.php?p=38609 |
CVE-2007-3598
|
MISC:http://forums.vtiger.com/viewtopic.php?p=44233 |
CVE-2007-3602
|
MISC:http://forums.winamp.com/showthread.php?s=&threadid=238648 |
CVE-2006-0708
|
MISC:http://forums.xmbforum.com/viewthread.php?tid=754523 |
CVE-2005-2574
|
MISC:http://forums.xmbforum.com/viewthread.php?tid=773046 |
CVE-2003-0375
|
MISC:http://forums.zmanda.com/showthread.php?p=8068 |
CVE-2009-3102
|
MISC:http://foscam.us/forum/h264-ip-camera-web-interface-authentication-bypass-test-tool-t3252.html |
CVE-2012-3002
|
MISC:http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/ |
CVE-2015-4852
|
MISC:http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/#jenkins |
CVE-2015-8103
|
MISC:http://framework.zend.com/security/advisory/ZF2012-03 |
CVE-2012-4451
|
MISC:http://framework.zend.com/security/advisory/ZF2014-06 |
CVE-2014-8089
|
MISC:http://freaky.staticusers.net/macsec/data/powerbooksecurity-data.html |
CVE-1999-1393
|
MISC:http://freecode.com/projects/limesurvey/releases/342070 |
CVE-2012-4927
|
MISC:http://freecode.com/projects/this/releases/353516 |
CVE-2013-3523
|
MISC:http://freecode.com/projects/tinc/releases/354122 |
CVE-2013-1428
|
MISC:http://freeconnects.webcindario.com/index.php?option=com_content&task=view&id=41&Itemid=1 |
CVE-2005-4573
|
MISC:http://freehost07.websamba.com/greyhats/abusiveparent-discussion.htm |
CVE-2004-1319
|
MISC:http://freehost07.websamba.com/greyhats/similarmethodnameredir.htm |
CVE-2004-0727
|
MISC:http://freeradius.org/security.html |
CVE-2017-9148
|
MISC:http://freetexthost.com/0lcsrgt3vw |
CVE-2009-4535
|
MISC:http://freetexthost.com/abydoz3jwu |
CVE-2009-4265
|
MISC:http://freetexthost.com/eiyfyt0km5 |
CVE-2009-4531
|
MISC:http://freetexthost.com/n5l0h34pxc |
CVE-2009-4529
|
MISC:http://freetexthost.com/ncyss3plli |
CVE-2009-3902
|
MISC:http://freetexthost.com/qr1tffkzpu |
CVE-2009-4811
|
MISC:http://freetype.com |
CVE-2022-27405 CVE-2022-27406
|
MISC:http://freewebstat.com/changelog-english.html |
CVE-2005-4012 CVE-2005-4013 CVE-2005-4014 CVE-2005-4015
|
MISC:http://freshmeat.net/projects/captchaphp/?branch_id=57290&release_id=206985 |
CVE-2005-4163
|
MISC:http://freshmeat.net/projects/crypt_blowfish |
CVE-2011-2483
|
MISC:http://freshmeat.net/projects/freebiblesearch/?branch_id=77256&release_id=292446 |
CVE-2009-0327
|
MISC:http://freshmeat.net/projects/gtalkbot/?branch_id=67830&release_id=245004 |
CVE-2007-0627
|
MISC:http://freshmeat.net/redir/phpmyadmin/8001/url_changelog/ |
CVE-2001-1060
|
MISC:http://freshmeat.net/releases/71514/ |
CVE-2002-0280
|
MISC:http://fritzbox.com |
CVE-2017-8087
|
MISC:http://froala.com |
CVE-2021-30109
|
MISC:http://fruitywifi.com/index_eng.html |
CVE-2020-24849
|
MISC:http://fscripts.com/index.php |
CVE-2006-4285
|
MISC:http://fsp.cvs.sourceforge.net/fsp/fsplib/fsplib.c?r1=1.17&r2=1.18 |
CVE-2007-3962
|
MISC:http://fsp.cvs.sourceforge.net/fsp/fsplib/fsplib.c?r1=1.19&r2=1.20 |
CVE-2007-3961
|
MISC:http://fsp.cvs.sourceforge.net/fsp/fsplib/fsplib.c?r1=1.21&r2=1.22 |
CVE-2007-3962
|
MISC:http://ftp.belnet.be/linux/gentoo-portage/sys-kernel/gentoo-sources/files/gentoo-sources-2.4.CAN-2003-0643.patch |
CVE-2003-0643
|
MISC:http://ftp.de.debian.org/debian/pool/main/h/hsolink/hsolink_1.0.118.orig.tar.gz |
CVE-2010-1671 CVE-2010-2929 CVE-2010-2930
|
MISC:http://ftp.debian.org/debian/dists/stable-proposed-updates/squirrelmail_1.2.6-2_i386.changes |
CVE-2005-0152
|
MISC:http://ftp.gnqs.org/pub/gnqs/source/by-version-number/v3.50/Generic-NQS-3.50.8-ChangeLog.txt |
CVE-2000-0247
|
MISC:http://ftp.kep.online.fr/Indexu_5.0.1_File_Inclusion_Exploit-by_King-Hacker_and-Khamaileon.txt |
CVE-2006-1767
|
MISC:http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2021-001.txt.asc |
CVE-2021-45484 CVE-2021-45487 CVE-2021-45488 CVE-2021-45489
|
MISC:http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.3.1-relnotes.txt |
CVE-2015-5334
|
MISC:http://ftp.sas.com/techsup/download/hotfix/drugdev/32drg02/SDD_Release_Notes_32DRG02.pdf |
CVE-2007-6763
|
MISC:http://full-discl0sure.blogspot.com/2009/07/battle-blog-sqlhtml-injection.html |
CVE-2009-3718 CVE-2009-3719
|
MISC:http://fundisom.com/owned/warning |
CVE-2004-0485
|
MISC:http://fux0r.phathookups.com/advisory/sp-x11-advisory.txt |
CVE-2004-2614
|
MISC:http://fux0r.phathookups.com/advisory/sp-x12-advisory.txt |
CVE-2004-2029
|
MISC:http://fux0r.phathookups.com/advisory/sp-x14-advisory.txt |
CVE-2004-2517
|
MISC:http://g-laurent.blogspot.com/2009/09/windows-vista7-smb20-negotiate-protocol.html |
CVE-2009-3103
|
MISC:http://g-laurent.blogspot.com/2009/11/windows-7-server-2008r2-remote-kernel.html |
CVE-2009-3676
|
MISC:http://g30rg3x.com/wp-files/dpm_11gx.zip |
CVE-2008-0508
|
MISC:http://g30rg3x.com/xsrf-bajo-deans-permalinks-migration-10 |
CVE-2008-0508
|
MISC:http://g3cko.info/gallery2-4.patch |
CVE-2004-1106
|
MISC:http://gaganpreet.in/blog/2013/07/24/kwallet-security-analysis/ |
CVE-2013-7252
|
MISC:http://galaxkey.com |
CVE-2020-27509
|
MISC:http://galleryproject.org/gallery_3_0_8 |
CVE-2013-2138
|
MISC:http://galleryproject.org/gallery_3_0_9 |
CVE-2013-2240 CVE-2013-2241
|
MISC:http://gamasutra.com/view/news/340907/A_nowfixed_Origin_vulnerability_potentially_opened_the_client_to_hackers.php |
CVE-2019-11354
|
MISC:http://gazie.com |
CVE-2020-21731
|
MISC:http://gazie.devincentiis.it/ |
CVE-2020-21731
|
MISC:http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905 |
CVE-2004-0554
|
MISC:http://gcc.gnu.org/bugzilla/show_bug.cgi?id=26763 |
CVE-2008-1685
|
MISC:http://gcc.gnu.org/bugzilla/show_bug.cgi?id=41633 |
CVE-2009-2911
|
MISC:http://gcc.gnu.org/bugzilla/show_bug.cgi?id=54411 |
CVE-2012-3509
|
MISC:http://genesys.com |
CVE-2021-26787
|
MISC:http://genhex.org/releases/031003.txt |
CVE-2004-2078 CVE-2004-2079 CVE-2004-2080
|
MISC:http://geodesicsolutions.com/changelog/7.3/changelog.html |
CVE-2014-3871
|
MISC:http://geronimo.apache.org/2007/08/21/apache-geronimo-201-released.html |
CVE-2007-4548
|
MISC:http://gerrit.ovirt.org/gitweb?p=vdsm.git;a=commit;h=5fe1615b7949999fc9abd896bde63bf24f8431d6 |
CVE-2013-4236
|
MISC:http://get-simple.info |
CVE-2020-24861
|
MISC:http://get-simple.info/changelog |
CVE-2013-1420
|
MISC:http://get-simple.info/extend/plugin/multi-user/133/ |
CVE-2020-23837
|
MISC:http://get-simple.info/extend/plugin/my-smtp-contact/1221/ |
CVE-2021-29400
|
MISC:http://getad.chat.ru/ |
CVE-2002-1230
|
MISC:http://gh0s7.net/vonage2 |
CVE-2017-16902
|
MISC:http://ghg-santeikohyo.env.go.jp/tool |
CVE-2017-2209
|
MISC:http://ghost.com |
CVE-2022-28397
|
MISC:http://ghost.org/docs/security/#privilege-escalation-attacks |
CVE-2022-27139
|
MISC:http://gibbon.com |
CVE-2022-27305
|
MISC:http://gibbonedu.com |
CVE-2022-27305
|
MISC:http://git-blame.blogspot.com/2014/12/git-1856-195-205-214-and-221-and.html |
CVE-2014-9390
|
MISC:http://git.bluemind.net/bluemind/commit/b11aa12d3c2f4c5dac4f9059f8b6bac1bf873244 |
CVE-2019-9563
|
MISC:http://git.deluge-torrent.org/deluge/commit/?h=1.3-stable&id=318ab179865e0707d7945edc3a13a464a108d583 |
CVE-2017-7178
|
MISC:http://git.deluge-torrent.org/deluge/commit/?h=develop&id=11e8957deaf0c76fdfbac62d99c8b6c61cfdddf9 |
CVE-2017-7178
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0b6cd1918e1ec4ffd087400a754a845180a4522b |
CVE-2018-15909
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0d3901189f245232f0161addf215d7268c4d05a3 |
CVE-2018-15908
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=0edd3d6c634a577db261615a9dc2719bca7f6e01 |
CVE-2018-16511
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=241d91112771a6104de10b3948c3f350d6690c1d |
CVE-2018-16541
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3005fcb9bb160af199e761e03bc70a9f249a987e |
CVE-2018-19475
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=39b1e54b2968620723bf32e96764c88797714879 |
CVE-2018-10194
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=3e5d316b72e3965b7968bb1d96baa137cd063ac6 |
CVE-2018-16802
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=430e219ea17a2650577d70021399c4ead05869e0 |
CVE-2019-25059
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5516c614dc33662a2afdc377159f70218e67bde5 |
CVE-2018-16509
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=5b5536fa88a9e885032bc0df3852c3439399a5c0 |
CVE-2018-16543
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=643b24dbd002fb9c131313253c307cf3951b3d47 |
CVE-2018-16802
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=67d760ab775dae4efe803b5944b0439aa3c0b04a |
CVE-2018-19476
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=78911a01b67d590b4a91afac2e8417360b934156 |
CVE-2018-16509
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=79cccf641486a6595c43f1de1cd7ade696020a31 |
CVE-2018-16509
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=8e9ce5016db968b40e4ec255a3005f2786cce45f |
CVE-2018-15911
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=a054156d425b4dbdaaa9fda4b5f1182b27598c2b |
CVE-2018-16539
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=aeea342904978c9fe17d85f4906a0f6fcce2d315 |
CVE-2018-19475
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b326a71659b7837d3acde954b18bda1a6f5e9498 |
CVE-2018-16513
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b575e1ec42cc86f6a58c603f2a88fcc2af699cc8 |
CVE-2018-16542
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=b60d50b7567369ad856cebe1efb6cd7dd2284219 |
CVE-2018-11645
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c3476dde7743761a4e1d39a631716199b696b880 |
CVE-2018-15910
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=c432131c3fdb2143e148e8ba88555f7f7a63b25e |
CVE-2018-16540
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=e01e77a36cbb2e0277bc3a63852244bec41be0f6 |
CVE-2018-15909
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ea735ba37dc0fd5f5622d031830b9a559dec1cc9 |
CVE-2018-16510
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=ef252e7dc214bcbd9a2539216aab9202848602bb |
CVE-2018-19477
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=fb713b3818b52d8a6cf62c951eba2e1795ff9624 |
CVE-2018-17183
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=027c546e0dd11e0526f1780a7f3c2c66acffe209 |
CVE-2020-16304
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=1497d65039885a52b598b137dd8622bd4672f9be |
CVE-2018-16585
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=407c98a38c3a6ac1681144ed45cc2f4fc374c91f |
CVE-2020-16307
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=971472c83a345a16dac9f90f91258bb22dd77f22 |
CVE-2018-16585
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=commitdiff;h=aadb53eb834b3def3ef68d78865ff87a68901804 |
CVE-2020-16306
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;a=log |
CVE-2020-15900
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;h=2c2dc335c212750e0fb8ae157063bc06cafa8d3e |
CVE-2020-16295
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;h=434753adbe8be5534bfb9b7d91746023e8073d16 |
CVE-2018-19476
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;h=4f73e8b4d578e69a17f452fa60d2130c5faaefd6 |
CVE-2020-16291
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;h=606a22e77e7f081781e99e44644cd0119f559e03 |
CVE-2018-19477
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;h=93cb0c0adbd9bcfefd021d59c472388f67d3300d |
CVE-2020-16290
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;h=aba3375ac24f8e02659d9b1eb9093909618cdb9f |
CVE-2020-16288
|
MISC:http://git.ghostscript.com/?p=ghostpdl.git;h=ae1061d948d88667bdf51d47d918c4684d0f67df |
CVE-2022-2085
|
MISC:http://git.ghostscript.com/?p=mujs.git;a=commit;h=25821e6d74fab5fcc200fe5e818362e03e114428 |
CVE-2018-6191
|
MISC:http://git.ghostscript.com/?p=mujs.git;a=commit;h=4d45a96e57fbabf00a7378b337d0ddcace6f38c1 |
CVE-2018-5759
|
MISC:http://git.ghostscript.com/?p=mujs.git;h=7f50591861525f76e3ec7a63392656ff8c030af9 |
CVE-2019-12798
|
MISC:http://git.ghostscript.com/?p=mupdf.git;a=commit;h=55c3f68d638ac1263a386e0aaa004bb6e8bde731 |
CVE-2017-17858
|
MISC:http://git.ghostscript.com/?p=mupdf.git;a=commit;h=97096297d409ec6f206298444ba00719607e8ba8 |
CVE-2019-14975
|
MISC:http://git.ghostscript.com/?p=mupdf.git;a=commit;h=af1e390a2c7abceb32676ec684cd1dbb92907ce8 |
CVE-2020-26519
|
MISC:http://git.ghostscript.com/?p=mupdf.git;h=0f0fbc07d9be31f5e83ec5328d7311fdfd8328b1 |
CVE-2017-14686
|
MISC:http://git.ghostscript.com/?p=mupdf.git;h=26527eef77b3e51c2258c8e40845bfbc015e405d |
CVE-2018-6544
|
MISC:http://git.ghostscript.com/?p=mupdf.git;h=2b16dbd8f73269cb15ca61ece75cf8d2d196ed28 |
CVE-2017-14687
|
MISC:http://git.ghostscript.com/?p=mupdf.git;h=2c4e5867ee699b1081527bc6c6ea0e99a35a5c27 |
CVE-2017-7264
|
MISC:http://git.ghostscript.com/?p=mupdf.git;h=96751b25462f83d6e16a9afaf8980b0c3f979c8b |
CVE-2020-16600
|
MISC:http://git.ghostscript.com/?p=mupdf.git;h=aaf794439e40a2ef544f15b50c20e657414dec7a |
CVE-2019-13290
|
MISC:http://git.ghostscript.com/?p=mupdf.git;h=ab1a420613dec93c686acbee2c165274e922f82a |
CVE-2017-14685
|
MISC:http://git.ghostscript.com/?p=mupdf.git;h=b03def134988da8c800adac1a38a41a1f09a1d89 |
CVE-2018-6544
|
MISC:http://git.ghostscript.com/?p=mupdf.git;h=b7892cdc7fae62aa57d63ae62144e1f11b5f9275 |
CVE-2020-19609
|
MISC:http://git.ghostscript.com/?p=mupdf.git;h=cee7cefc610d42fd383b3c80c12cbc675443176a |
CVE-2021-3407
|
MISC:http://git.ghostscript.com/?p=mupdf.git;h=ed19bc806809ad10c4ddce515d375581b86ede85 |
CVE-2019-13290
|
MISC:http://git.ghostscript.com/?p=mupdf.git;h=f5712c9949d026e4b891b25837edd2edc166151f |
CVE-2021-37220
|
MISC:http://git.gnome.org/browse/evince/commit/?id=439c5070022e |
CVE-2011-5244
|
MISC:http://git.gnome.org/browse/evince/commit/?id=d4139205b010 |
CVE-2011-5244
|
MISC:http://git.gnome.org/browse/gdk-pixbuf/ |
CVE-2012-2370
|
MISC:http://git.gnome.org/browse/pango/commit/pango/opentype/harfbuzz-gpos.c?id=a7a715480db66148b1f487528887508a7991dcd0 |
CVE-2011-3193
|
MISC:http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=2183683bd633818dd031b090b5530951de76f392 |
CVE-2015-1607
|
MISC:http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git;a=commit;h=f0f71a721ccd7ab9e40b8b6b028b59632c0cc648 |
CVE-2015-1606
|
MISC:http://git.haproxy.org/?p=haproxy.git;a=commit;h=58df5aea0a0c926b2238f65908f5e9f83d1cca25 |
CVE-2018-20103
|
MISC:http://git.haproxy.org/?p=haproxy.git;a=commit;h=8ef706502aa2000531d36e4ac56dbdc7c30f718d |
CVE-2019-11323
|
MISC:http://git.haproxy.org/?p=haproxy.git;a=commit;h=efbbdf72992cd20458259962346044cafd9331c0 |
CVE-2018-20102
|
MISC:http://git.hunter-ht.cn/zhanggen/objcopy_crash_input_1 |
CVE-2018-14038
|
MISC:http://git.imagemagick.org/repos/ImageMagick/commit/70a2cf326ed32bedee144b961005c63846541a16 |
CVE-2016-5239
|
MISC:http://git.kernel.dk/?p=blktrace.git;a=log;h=d61ff409cb4dda31386373d706ea0cfb1aaac5b7 |
CVE-2018-10689
|
MISC:http://git.kernel.org/?p=boot/dracut/dracut.git;a=commit;h=e1b48995c26c4f06d1a71 |
CVE-2012-4453
|
MISC:http://git.kernel.org/?p=linux/kernel/git/avi/kvm.git;a=commitdiff;h=04045f98e0457aba7d4e6736f37eed189c48a5f7 |
CVE-2007-4997
|
MISC:http://git.kernel.org/?p=linux/kernel/git/luto/linux.git;a=commit;h=bc3b94c31d65e761ddfe150d02932c65971b74e2 |
CVE-2014-9585
|
MISC:http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.35.y.git;a=commitdiff;h=b7ae15e7707050baafe5a35e3d4f2d175197d222 |
CVE-2007-5087
|
MISC:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d281da7ff6f70efca0553c288bb883e8605b3862 |
CVE-2010-4076 CVE-2010-4077
|
MISC:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=9926e4c74300c4b31dee007298c6475d33369df0 |
CVE-2008-1294
|
MISC:http://git.kernel.org/?p=utils/util-linux-ng/util-linux-ng.git;a=blobdiff;f=login-utils/login.c;h=230121316d953c59e7842c1325f6e9f326a37608;hp=aad27794327c60391b5148b367d2c79338fc6ee4;hb=8ccf0b253ac0f4f58d64bc9674de18bff5a88782;hpb=3a4a13b12a8065b0b5354686d2807cce421a9973 |
CVE-2008-1926
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=008ba2a13f2d04c947adc536d19debb8fe66f110 |
CVE-2017-15649
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04197b341f23b908193308b8d63d17ff23232598 |
CVE-2016-10741
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0499680a42141d86417a8fbaa8c8db806bea1201 |
CVE-2011-4915
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0558f33c06bb910e2879e355192227a8e8f0219d |
CVE-2017-18232
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0a0b98734479aa5b3c671d5190e86273372cab95 |
CVE-2018-11508
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0a1d52994d440e21def1c2174932410b4f2a98a1 |
CVE-2019-9213
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0c17d1d2c61936401f4702e1846e2c19b200f958 |
CVE-2017-16996
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d0e57697f162da4aa218b5feafe614fb666db07 |
CVE-2017-9150
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0ddcff49b672239dda94d70d0fcf50317a9f4b51 |
CVE-2018-8087
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848c9c93c2c828ef4c3a8ca36ce46c7 |
CVE-2018-13405
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1137b5e2529a8f5ca8ee709288ecba3e68044df2 |
CVE-2017-16939
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1572e45a924f254d9570093abde46430c3172e3d |
CVE-2017-18255
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=179d1c5602997fef5a940c6ddcf31212cbfebd14 |
CVE-2017-17855
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e3921471354244f70fe268586ff94a97a6dd4df |
CVE-2017-15128
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=20e2b791796bd68816fa115f12be5320de2b8021 |
CVE-2017-9984 CVE-2017-9985
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=21b5944350052d2583e82dd59b19a9ba94a007f0 |
CVE-2017-15129
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=251e22abde21833b3d29577e4d8c7aaccd650eee |
CVE-2017-18174
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901 |
CVE-2017-18017
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2 |
CVE-2017-18218
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=28f5a8a7c033cbf3e32277f4cc9c6afd74f05300 |
CVE-2017-18204
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=297a6961ffb8ff4dc66c9fbf53b924bd1dda05d5 |
CVE-2018-8043
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=29ec90660d68bbdd69507c1c8b4e33aa299278b1 |
CVE-2018-18397
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f93459d689d990b3ecfbe782fec89b97d3279 |
CVE-2018-18021
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=30a61ddf8117c26ac5b295e1233eaa9629a94ca3 |
CVE-2017-18249
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=318aaf34f1179b39fa9c30fa0f3288b645beee39 |
CVE-2018-10021
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=384632e67e0829deb8015ee6ad916b180049d252 |
CVE-2017-15126
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3e4c56d41eef5595035872a2ec5a483f42e8917f |
CVE-2017-18224
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=412b65d15a7f8a93794653968308fc100f2aa87c |
CVE-2017-18222
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4374f256ce8182019353c0c639bb8d0695b4c941 |
CVE-2017-17853
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=468f6eafa6c44cb2c5d8aad35e12f06c240a812a |
CVE-2017-17852
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=471d17148c8b4174ac5f5283a73316d12c4379bc |
CVE-2016-3139
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4971613c1639d8e5f102c4e797c3bf8f83a5a69e |
CVE-2017-15649
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=49d31c2f389acfe83417083e1208422b4091cd9e |
CVE-2017-7533
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4a491b1ab11ca0556d2fda1ff1301e862a2d44c4 |
CVE-2018-7757
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4ea77014af0d6205b05503d1c7aac6eace11d473 |
CVE-2018-10124
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=574823bfab82d9d8fa47f422778043fbb4b4f50e |
CVE-2019-5489
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=57ebd808a97d7c5b1e1afb937c2db22beba3c1f8 |
CVE-2018-1065
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5800dc5c19f34e6e03b5adab1282535cb102fafd |
CVE-2018-15594
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5af10dfd0afc559bb4b0f7e3e8227a1578333995 |
CVE-2017-15127
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=687cb0884a714ff484d038e9190edc874edcf146 |
CVE-2017-18202
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6aeb75e6adfaed16e58780309613a578fe1ee90b |
CVE-2017-18360
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6c85501f2fabcfc4fc6ed976543d252c4eaf4be9 |
CVE-2017-14954
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6d8c50dcb029872b298eea68cc6209c866fd3e14 |
CVE-2018-12232
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6ea8d958a2c95a1d514015d4e29ba21a8c0a1a91 |
CVE-2017-18208
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=704620afc70cf47abb9d6a1a57f3825d2bca49cf |
CVE-2018-20169
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=70feee0e1ef331b22cc51f383d532a0d043fbdcc |
CVE-2017-18221
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=727ba748e110b4de50d142edca9d6a9b7e6111d8 |
CVE-2018-12904
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=73223e4e2e3867ebf033a5a8eb2e5df0158ccc99 |
CVE-2018-10675
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=77f8269606bf95fcb232ee86f6da80886f1dfae8 |
CVE-2019-9003
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7a9cdebdcc17e426fb5287e4a82db1dfe86339b2 |
CVE-2018-17182
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7b38460dc8e4eafba06c78f8e37099d3b34d473c |
CVE-2018-18690
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=81f9c4e4177d31ced6f52a89bb70e93bfb77ca03 |
CVE-2018-12714
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=853bc26a7ea39e354b9f8889ae7ad1492ffa28d2 |
CVE-2017-18216
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8dca4a41f1ad65043a78c2338d9725f859c8d2c3 |
CVE-2017-18174
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4 |
CVE-2018-16658
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6 |
CVE-2017-15116
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95a762e2c8c942780948091f8f2a4f32fce1ac6f |
CVE-2017-16995
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=966031f340185eddd05affcf72b740549f056348 |
CVE-2018-18386
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38 |
CVE-2019-7308
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9824dfae5741275473a23a7ed5756c7b6efacc9d |
CVE-2018-20511
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9903e41ae1f5d50c93f268ca3304d4d7c64b9311 |
CVE-2018-10074
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b54d816e00425c3a517514e0d677bb3cec49258 |
CVE-2018-7480
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9de4ee40547fd315d4a0ed1dd15a2fa3559ad707 |
CVE-2018-10940
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9f645bcc566a1e9f921bdae7528a01ced5bc3713 |
CVE-2018-13406
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a2ef990ab5a6705a356d146dd773a3b359787497 |
CVE-2011-4915
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4866aa812518ed1a37d8ea0c881dc946409de94 |
CVE-2017-7889
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a5ec6ae161d72f01411169a938fa5f8baea16e8f |
CVE-2017-17856
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ac64115a66c18c01745bbd3c47a36b124e5fd8c0 |
CVE-2017-15306
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=adb4f11e0a8f4e29900adb2b7af28b6bbd5c1fa4 |
CVE-2017-18261
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ae6650163c66a7eff1acd6eb8b0f752dcfa8eba5 |
CVE-2018-5344
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b550a32e60a4941994b437a8d662432a486235a5 |
CVE-2017-8797
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b799207e1e1816b09e7a5920fbb2d5fcf6edd681 |
CVE-2018-18445
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b86e33075ed1909d8002745b56ecf73b833db143 |
CVE-2017-18257
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b9a41d21dceadf8104812626ef85dc56ee8a60ed |
CVE-2017-18203
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ba3021b2c79b2fa9114f92790a99deb27a65b728 |
CVE-2017-1000380
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bb7f0f989ca7de1153bd128a40a71709e339fa03 |
CVE-2017-17854
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bd23a7269834dc7c1f93e83535d16ebc44b75eba |
CVE-2018-12633
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c131187db2d3fa2f8bf32fdf4e9a4ef805168467 |
CVE-2017-17862
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c40f7d74c741a907cfaeb73a7697081881c497d0 |
CVE-2018-20784
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c4c07b4d6fa1f11880eab8e076d3d060ef3f55fc |
CVE-2019-9162
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cabfb3680f78981d26c078a26e5c748531257ebb |
CVE-2018-1066
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb2595c1393b4a5211534e6f0a0fbad369e21ad8 |
CVE-2018-14734
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cfa39381173d5f969daf43582c95ad679189cbc9 |
CVE-2019-6974
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d11662f4f798b50d8c8743f433842c3e40fe3378 |
CVE-2017-1000380
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d26c25a9d19b5976b319af528886f89cf455692d |
CVE-2018-18021
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd |
CVE-2018-18955
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda |
CVE-2019-7308
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d4fdf8ba0e5808ba9ad6b44337783bd9935e0982 |
CVE-2017-18241
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d8ba61ba58c88d5207c1ba2f7d9a2280e7d03be9 |
CVE-2018-8897
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dad48e73127ba10279ea33e6dbc8d3905c4d31c0 |
CVE-2017-18193
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd83c161fbcc5d8be637ab159c0de015cbff5ba4 |
CVE-2018-10087
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276 |
CVE-2018-18710
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360 |
CVE-2016-1575 CVE-2016-1576
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ea25f914dc164c8d56b36147ecc86bc65f83c469 |
CVE-2017-17857
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f09444639099584bc4784dfcd85ada67c6f33e0f |
CVE-2018-11232
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f1e255d60ae66a9f672ff9a207ee6cd8e33d2679 |
CVE-2018-16276
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3069c6d33f6ae63a1668737bc78aaaa51bff7ca |
CVE-2018-7492
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f43f39958beb206b53292801e216d9b8a660f087 |
CVE-2018-19854
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f7068114d45ec55996b9040e98111afa56e010fe |
CVE-2018-11506
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f961e3f2acae94b727380c0b74e2d3954d0edf79 |
CVE-2017-8797
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fbe0e839d1e22d88810f3ee3e2f1479be4c0aa4a |
CVE-2018-6927
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdf82a7856b32d905c39afc85e34364491e46346 |
CVE-2018-15572
|
MISC:http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/log/drivers/gpu/drm/i915/i915_gem_execbuffer.c |
CVE-2018-20669
|
MISC:http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-69340 |
CVE-2020-25628
|
MISC:http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71623 |
CVE-2022-30598
|
MISC:http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-73736 |
CVE-2022-30600
|
MISC:http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74204 |
CVE-2022-30596
|
MISC:http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74318 |
CVE-2022-30597
|
MISC:http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74333 |
CVE-2022-30599
|
MISC:http://git.musl-libc.org/cgit/musl/commit/?id=b3d9e0b94ea73c68ef4169ec82c898ce59a4e30a |
CVE-2014-3484
|
MISC:http://git.php.net/?p=php-src.git;a=blob;f=sapi/cgi/cgi_main.c;h=a7ac26f0#l1569 |
CVE-2012-2335
|
MISC:http://git.php.net/?p=php-src.git;a=commit;h=05255749139b3686c8a6a58ee01131ac0047465e |
CVE-2017-11628
|
MISC:http://git.php.net/?p=php-src.git;a=commit;h=5f8380d33e648964d2d5140f329cf2d4c443033c |
CVE-2017-11628
|
MISC:http://git.php.net/?p=php-src.git;a=commit;h=aa82e99ed8003c01f1ef4f0940e56b85c5b032d4 |
CVE-2016-6293
|
MISC:http://git.qemu.org/?p=qemu.git;a=commit;h=1d7678dec4761acdc43439da6ceda41a703ba1a6 |
CVE-2014-0148
|
MISC:http://git.qemu.org/?p=qemu.git;a=commit;h=24342f2cae47d03911e346fe1e520b00dc2818e0 |
CVE-2014-0144
|
MISC:http://git.qemu.org/?p=qemu.git;a=commit;h=2d51c32c4b511db8bb9e58208f1e2c25e4c06c85 |
CVE-2014-0144
|
MISC:http://git.qemu.org/?p=qemu.git;a=commit;h=5dab2faddc8eaa1fb1abdbe2f502001fc13a1b21 |
CVE-2014-0144
|
MISC:http://git.qemu.org/?p=qemu.git;a=commit;h=63fa06dc978f3669dbfd9443b33cde9e2a7f4b41 |
CVE-2014-0144
|
MISC:http://git.qemu.org/?p=qemu.git;a=commit;h=6d4b9e55fc625514a38d27cff4b9933f617fa7dc |
CVE-2014-0144
|
MISC:http://git.qemu.org/?p=qemu.git;a=commit;h=7b103b36d6ef3b11827c203d3a793bf7da50ecd6 |
CVE-2014-0144
|
MISC:http://git.qemu.org/?p=qemu.git;a=commit;h=97f1c45c6f456572e5b504b8614e4a69e23b8e3a |
CVE-2014-0144
|
MISC:http://git.qemu.org/?p=qemu.git;a=commit;h=a1b3955c9415b1e767c130a2f59fee6aa28e575b |
CVE-2014-0144
|
MISC:http://git.qemu.org/?p=qemu.git;a=commit;h=ce48f2f441ca98885267af6fd636a7cb804ee646 |
CVE-2014-0144
|
MISC:http://git.qemu.org/?p=qemu.git;a=commit;h=d65f97a82c4ed48374a764c769d4ba1ea9724e97 |
CVE-2014-0144
|
MISC:http://git.qemu.org/?p=qemu.git;a=commit;h=f56b9bc3ae20fc93815b34aa022be919941406ce |
CVE-2014-0144
|
MISC:http://git.qemu.org/?p=qemu.git;a=commitdiff;h=246f65838d19db6db55bfb41117c35645a2c4789 |
CVE-2014-0147
|
MISC:http://git.qemu.org/?p=qemu.git;a=commitdiff;h=36cf2a37132c7f01fa9adb5f95f5312b27742fd4 |
CVE-2013-4535
|
MISC:http://git.savannah.gnu.org/cgit/bash.git/commit/?h=devel&id=863d31ae775d56b785dc5b0105b6d251515d81d5 |
CVE-2012-6711
|
MISC:http://git.savannah.gnu.org/cgit/bash.git/tree/CHANGES?h=bash-4.4-testing#n65 |
CVE-2019-9924
|
MISC:http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=3774fc08b502c3e685afca098b6e8a195aded6a0 |
CVE-2017-8287
|
MISC:http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=57cbb8c148999ba8f14ed53435fc071ac9953afd |
CVE-2015-9383
|
MISC:http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=779309744222a736eba0f1731e8162fce6288d4e |
CVE-2017-7858
|
MISC:http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=7bbb91fbf47fc0775cc9705673caf0c47a81f94b |
CVE-2017-7857
|
MISC:http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=beecf80a6deecbaf5d264d4f864451bde4fe98b8 |
CVE-2016-10328
|
MISC:http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=e6699596af5c5d6f0ae0ea06e19df87dce088df8 |
CVE-2017-7864
|
MISC:http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/?id=f958c48ee431bef8d4d466b40c9cb2d4dbcb7791 |
CVE-2017-8105
|
MISC:http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/psaux/psobjs.c?id=db5a4a9ae7b0048f033361744421da8569642f73 |
CVE-2015-9382
|
MISC:http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=7962a15d64c876870ca0ae435ea2467d9be268d9 |
CVE-2015-9381
|
MISC:http://git.savannah.gnu.org/cgit/freetype/freetype2.git/commit/src/type1/t1parse.c?id=e3058617f384cb6709f3878f753fa17aca9e3a30 |
CVE-2015-9290
|
MISC:http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272 |
CVE-2009-5155
|
MISC:http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42ccd1e2377945fd0414eca1a49294bff454 |
CVE-2018-20482
|
MISC:http://git.savannah.gnu.org/cgit/tar.git/commit/?id=cb07844454d8cc9fb21f53ace75975f91185a120 |
CVE-2019-9923
|
MISC:http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS |
CVE-2018-20483
|
MISC:http://git.savannah.gnu.org/gitweb/?p=lilypond.git;a=commit;h=b84ea4740f3279516905c5db05f4074e777c16ff |
CVE-2020-17353
|
MISC:http://git.savannah.gnu.org/gitweb/?p=quagga.git;a=commitdiff;h=8794e8d229dc9fe29ea31424883433d4880ef408 |
CVE-2013-6051
|
MISC:http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=2549e421c14aff886629b8482c14af800f411070 |
CVE-2014-10375
|
MISC:http://git.savannah.nongnu.org/cgit/exosip.git/commit/?id=f2ed389fe84613512cc560127883e51e6cf8c054 |
CVE-2021-32611
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=1713eec29a |
CVE-2014-125022
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=18f94df8af |
CVE-2014-125015
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=19587c9332f5be4f6bc6d7b2b8ef3fd21dfeaa01 |
CVE-2020-20892
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=1f097d168d |
CVE-2014-125020
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=2240e2078d |
CVE-2014-125023
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=35eeff30caf34df835206f1c12bcf4b7c2bd6758 |
CVE-2018-9841
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=3edc3b159503d512c919b3d5902f7026e961823a |
CVE-2014-125005
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=47b7c68ae54560e2308bdb6be4fb076c73b93081 |
CVE-2018-10001
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=4c3e1956ee |
CVE-2014-125024
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=5430839144 |
CVE-2014-125021
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=61d59703c91869f4e5cdacd8d6be52f8b89d4ba4 |
CVE-2014-125009
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=6ba02602aa7fc7d38db582e75b8b093fb3c1608d |
CVE-2014-125004
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=6e42ccb9db |
CVE-2014-125025
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=77bb0004bbe18f1498cfecdc68db5f10808b6599 |
CVE-2014-125017
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=8001e9f7d17e90b4b0898ba64e3b8bbd716c513c |
CVE-2014-125003
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=8a3b85f3a7 |
CVE-2014-125018
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=8c55ff393340998faae887dfac19e7ef128e1e58 |
CVE-2014-125006
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=91253839e14cce9793ee93f184cef609ca8195d5 |
CVE-2014-125010
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=a392bf657015c9a79a5a13adfbfb15086c1943b9 |
CVE-2014-125012
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=a94cb36ab2ad99d3a1331c9f91831ef593d94f74 |
CVE-2017-16840
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=b25e84b739 |
CVE-2014-125019
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=c919e1ca2ecfc47d796382973ba0e48b8f6f92a2 |
CVE-2014-125013
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=d1e6602665 |
CVE-2014-125014
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=d42ec8433c687fcbccefa51a7716d81920218e4f |
CVE-2014-125011
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=dfefc9097e9b4bb20442e65454a40043bd189b3d |
CVE-2014-125007
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=e5c7229999 |
CVE-2014-125016
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=f1caaa1c61310beba705957e6366f0392a0b005b |
CVE-2014-125002
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commit;h=f5d1d1e4667ba346ea7e0f97e6d2756bc9d4abde |
CVE-2014-125008
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=0c61661a2cbe1b8b284c80ada1c2fdddf4992cad |
CVE-2020-20902
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=373c1c9b691fd4c6831b3a114a006b639304c2af |
CVE-2020-22049
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=584f396132aa19d21bb1e38ad9a5d428869290cb |
CVE-2020-24020
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=673fce6d40d9a594fb7a0ea17d296b7d3d9ea856 |
CVE-2020-22051
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=6f2a3958cfac135c60b509a61a4fd39432d8f9a9 |
CVE-2020-22054
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=a7fd1279703683ebb548ef7baa2f1519994496ae |
CVE-2020-22029
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=ce5274c1385d55892a692998923802023526b765 |
CVE-2020-22020
|
MISC:http://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=d6f293353c94c7ce200f6e0975ae3de49787f91f |
CVE-2020-24995 CVE-2021-30123
|
MISC:http://git.videolan.org/?p=vlc.git;a=commit;h=81023659c7de5ac2637b4a879195efef50846102 |
CVE-2019-12874
|
MISC:http://git.videolan.org/?p=vlc/vlc-3.0.git;a=commit;h=2b4f9d0b0e0861f262c90e9b9b94e7d53b864509 |
CVE-2019-13962
|
MISC:http://git.videolan.org/?p=vlc/vlc-3.0.git;a=commit;h=d5c43c21c747ff30ed19fcca745dea3481c733e0 |
CVE-2020-13428
|
MISC:http://git.videolan.org/gitweb.cgi/vlc.git/?a=commit;h=cf489d7bff3c1b36b2d5501ecf21129c78104d98 |
CVE-2008-1769
|
MISC:http://git.videolan.org/gitweb.cgi/vlc.git/?p=vlc.git;a=commitdiff;h=bf02b8dd211d5a52aa301a9a2ff4e73ed8195881 |
CVE-2013-3565
|
MISC:http://git.zx2c4.com/Pwnnel-Blicker/tree/pwnnel-blicker-for-kids.sh |
CVE-2012-3485
|
MISC:http://git.zx2c4.com/Pwnnel-Blicker/tree/pwnnel-blicker.c |
CVE-2012-3483
|
MISC:http://github.com/Illydth/wowraidmanager/commit/7dd6367ae85003dd5d715431b6ab695f2c2f200a |
CVE-2008-7050
|
MISC:http://github.com/OpenSIPS/opensips/commit/54e027adfa486cfcf993828512b2e273aeb163c2 |
CVE-2013-3722
|
MISC:http://github.com/klen/python-mode/issues/162 |
CVE-2013-5106
|
MISC:http://github.com/mantisbt/mantisbt/commit/221cf323f16a9738a5b27aaba94758f11281d85c |
CVE-2020-25288
|
MISC:http://github.com/mantisbt/mantisbt/commit/5595c90f11c48164331a20bb9c66098980516e93 |
CVE-2020-25781
|
MISC:http://github.com/mantisbt/mantisbt/commit/8c6f4d8859785b67fb80ac65100ac5259ed9237d |
CVE-2020-25830
|
MISC:http://github.com/mantisbt/mantisbt/commit/9de20c09e5a557e57159a61657ce62f1a4f578fe |
CVE-2020-25781
|
MISC:http://github.com/meldium/breach-mitigation-rails |
CVE-2013-3587
|
MISC:http://github.com/phpbb/phpbb3/commit/4ea3402f9363c9259881bc8ea6ce7fc6cb212657 |
CVE-2010-1630
|
MISC:http://github.com/senchalabs/connect/issues/831 |
CVE-2013-4691
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-27r3-rxch-2hm7 |
CVE-2021-3320
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-289f-7mw3-2qf4 |
CVE-2021-3510
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-3c2f-w4v6-qxrp |
CVE-2021-3433
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-3gvq-h42f-v3c7 |
CVE-2020-10064
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-46h3-hjcq-2jjr |
CVE-2021-3430
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-5qhg-j6wc-4f6q |
CVE-2020-13599
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7364-p4wc-8mj4 |
CVE-2021-3432
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7548-5m6f-mqv9 |
CVE-2021-3431
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7fhv-rgxr-x56h |
CVE-2020-13598
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7g38-3x9v-v7vp |
CVE-2021-3455
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-89j6-qpxf-pfpc |
CVE-2021-3323
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8q65-5gqf-fmw5 |
CVE-2021-3581
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8w87-6rfp-cfrm |
CVE-2021-3434
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94jg-2p6q-5364 |
CVE-2021-3319
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-94vp-8gc2-rm45 |
CVE-2020-13603
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-c3gr-hgvr-f363 |
CVE-2021-3625
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-f6vh-7v4x-8fjp |
CVE-2020-10069
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fj4r-373f-9456 |
CVE-2021-3330
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fm6v-8625-99jf |
CVE-2021-3835
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx88-6c29-vrp3 |
CVE-2021-3454
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-g9mg-fj58-6fqh |
CVE-2020-13602
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gc66-xfrc-24qr |
CVE-2020-10066
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hg2w-62p6-g67c |
CVE-2020-10065
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hvfp-w4h8-gxvj |
CVE-2021-3861
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-hx4p-j86p-2mhr |
CVE-2020-13600
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-j76f-35mc-4h63 |
CVE-2021-3436
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-mm57-9hqw-qh44 |
CVE-2020-13601
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-p86r-gc4r-4mq3 |
CVE-2021-3322
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-vf79-hqwm-w4xc |
CVE-2020-10072
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-w44j-66g7-xw99 |
CVE-2021-3321
|
MISC:http://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xhg3-gvj6-4rqh |
CVE-2021-3435
|
MISC:http://github.security.telekom.com/2020/11/wire-secure-messenger-format-string-vulnerability.html |
CVE-2020-27853
|
MISC:http://githubcommherflower.com |
CVE-2022-30034
|
MISC:http://gl2logic.com/cerberus/cerberus.php?app=Old_News&SHOWID=7 |
CVE-2008-3397
|
MISC:http://gleg.net/advisory_netbsd2.shtml |
CVE-2004-1323 CVE-2004-1374
|
MISC:http://gleg.net/downloads/VULNDISCO_META_FREE.tar.gz |
CVE-2006-5779 CVE-2006-5780
|
MISC:http://gleg.net/fprot.txt |
CVE-2006-6293 CVE-2006-6352
|
MISC:http://gleg.net/helix.txt |
CVE-2006-6026
|
MISC:http://gleg.net/realplayer11.html |
CVE-2008-0098
|
MISC:http://gleg.net/vulndisco_meta.shtml |
CVE-2006-5779 CVE-2006-5780 CVE-2006-5792 CVE-2006-5812 CVE-2006-5813 CVE-2006-5814 CVE-2006-5815 CVE-2006-6293
|
MISC:http://glide.stanford.edu/yichen/research/sec.pdf |
CVE-2005-0454 CVE-2005-2838 CVE-2005-3365 CVE-2005-3585 CVE-2005-4223 CVE-2005-4224 CVE-2005-4225 CVE-2005-4226 CVE-2005-4227
|
MISC:http://glucose.jp/release/19 |
CVE-2012-0313
|
MISC:http://gmda.altervista.org/AjaXplorer-2.3.3/cka.txt |
CVE-2008-6639
|
MISC:http://gms.cl0udz.com/Floodlight_DoS.pdf |
CVE-2018-1000617
|
MISC:http://gms.cl0udz.com/ONOS_Vul.pdf |
CVE-2018-1000614
|
MISC:http://gms.cl0udz.com/ONOS_app_overwrite.pdf |
CVE-2018-1999020
|
MISC:http://gms.cl0udz.com/OVSDB_DOS.pdf |
CVE-2018-1000615
|
MISC:http://gms.cl0udz.com/Openconfig_xxe.pdf |
CVE-2018-1000616
|
MISC:http://gnats.netbsd.org/45558 |
CVE-2011-4119
|
MISC:http://gnats.netbsd.org/47360 |
CVE-2012-5663
|
MISC:http://gnu.com |
CVE-2020-21813 CVE-2020-21814 CVE-2020-21815 CVE-2020-21816 CVE-2020-21817 CVE-2020-21818 CVE-2020-21819 CVE-2020-21827 CVE-2020-21830 CVE-2020-21831 CVE-2020-21832 CVE-2020-21833 CVE-2020-21834 CVE-2020-21835 CVE-2020-21836 CVE-2020-21838 CVE-2020-21839 CVE-2020-21840 CVE-2020-21841 CVE-2020-21842 CVE-2020-21843 CVE-2020-21844
|
MISC:http://go-ethereum.com |
CVE-2022-23327 CVE-2022-23328
|
MISC:http://golem.ph.utexas.edu/~distler/blog/archives/001102.html |
CVE-2007-0231
|
MISC:http://goodfellas.shellcode.com.ar/own/VULWAR200706041 |
CVE-2007-4916
|
MISC:http://goodfellas.shellcode.com.ar/own/VULWAR200706223.txt |
CVE-2007-3435
|
MISC:http://goodfellas.shellcode.com.ar/own/VULWKU200706142 |
CVE-2007-4916
|
MISC:http://googlechromereleases.blogspot.com/2011/03/stable-and-beta-channel-updates_15.html |
CVE-2011-0609
|
MISC:http://googleonlinesecurity.blogspot.com/2011/08/fuzzing-at-scale.html |
CVE-2011-2424
|
MISC:http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html |
CVE-2014-3566
|
MISC:http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html |
CVE-2014-5119
|
MISC:http://googleprojectzero.blogspot.com/2014/09/exploiting-cve-2014-0556-in-flash.html |
CVE-2014-0556
|
MISC:http://googleprojectzero.blogspot.com/2015/01/exploiting-nvmap-to-escape-chrome.html |
CVE-2014-5332
|
MISC:http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html |
CVE-2015-3693 CVE-2016-0823
|
MISC:http://googleprojectzero.blogspot.com/2015/11/hack-galaxy-hunting-bugs-in-samsung.html |
CVE-2015-7897
|
MISC:http://googleprojectzero.blogspot.in/2015/06/owning-internet-printing-case-study-in.html |
CVE-2015-1158 CVE-2015-1159
|
MISC:http://gosecure.net/2018/01/10/vmware-horizon-v4h-v4pa-desktop-agent-privilege-escalation-vulnerability-cve-2017-4946/ |
CVE-2017-4946
|
MISC:http://gotfault.net/research/advisory/gadv-powerd.txt |
CVE-2006-0681
|
MISC:http://gotfault.wordpress.com/2007/01/18/umount-bug/ |
CVE-2007-0822
|
MISC:http://gotfault.wordpress.com/2007/02/01/a-funny-case/ |
CVE-2007-0823
|
MISC:http://government.com |
CVE-2020-20425 CVE-2020-20426
|
MISC:http://governmentsecurity.org/articles/DefaultLoginsandPasswordsforNetworkedDevices.php |
CVE-2000-1242
|
MISC:http://grailsblog.objectcomputing.com/posts/2018/09/23/security-vulnerability-in-asset-pipeline-and-jetty.html |
CVE-2018-1000817
|
MISC:http://grandstream.com/support/firmware |
CVE-2018-17563 CVE-2018-17564 CVE-2018-17565
|
MISC:http://greyhathackers.wordpress.com/2010/01/02/left-4-dead-stats-1-1-sql-injection-vulnerability/ |
CVE-2010-0980
|
MISC:http://greyhathackers.wordpress.com/2010/01/07/sniggabo-cms-v2-21-xss-vulnerability/ |
CVE-2010-1072
|
MISC:http://greyhatsecurity.org/firefox.htm |
CVE-2005-1476 CVE-2005-1477
|
MISC:http://greyhatsecurity.org/vulntests/ffrc.htm |
CVE-2005-1476 CVE-2005-1477
|
MISC:http://grid.ncsa.illinois.edu/myproxy/security/myproxy-adv-2011-01.txt |
CVE-2011-0738
|
MISC:http://group-office.svn.sourceforge.net/viewvc/group-office?view=rev&revision=261 |
CVE-2007-2720
|
MISC:http://groups-beta.google.com/group/linux.kernel/browse_thread/thread/13b43bd5783842f6/7ce3c5a514a497ab?q=io_queue_init&rnum=3#7ce3c5a514a497ab |
CVE-2005-0916
|
MISC:http://groups.csail.mit.edu/pag/ardilla/ |
CVE-2009-4649
|
MISC:http://groups.csail.mit.edu/pag/ardilla/geccbblite-XSS2-lenient-T.txt |
CVE-2009-4649
|
MISC:http://groups.csail.mit.edu/pag/ardilla/geccbblite-XSS2-strict-T.txt |
CVE-2009-4649
|
MISC:http://groups.drupal.org/node/216314 |
CVE-2007-6752
|
MISC:http://groups.google.ca/group/microsoft.public.win32.programmer.kernel/browse_thread/thread/c5946bf40f227058/7bd7b5d66a4e5aff |
CVE-2006-6696
|
MISC:http://groups.google.com/group/comp.lang.ruby/browse_thread/thread/19f69e8a081fc0d1/e138e014b74352ca |
CVE-2008-3790
|
MISC:http://groups.google.com/group/comp.os.vms/browse_thread/thread/a5f68773805f862d/8a42e91fe1e9cd36 |
CVE-2007-3729 CVE-2007-3730
|
MISC:http://groups.google.com/group/comp.protocols.dns.bind/browse_thread/thread/49ef622c8329fd33 |
CVE-2009-0025 CVE-2009-0265
|
MISC:http://groups.google.com/group/comp.text.tex/browse_thread/thread/5d56d3d744351578 |
CVE-2009-1382 CVE-2009-1383 CVE-2009-2460 CVE-2009-2461
|
MISC:http://groups.google.com/group/django-users/browse_thread/thread/15df9e45118dfc51/ |
CVE-2009-3695
|
MISC:http://groups.google.com/group/gnu.cfengine.help/browse_thread/thread/fc25e7d98f8ba401/38151ed821803be0#38151ed821803be0 |
CVE-2005-2960 CVE-2005-3137
|
MISC:http://groups.google.com/group/gnu.emacs.bug/browse_frm/thread/9424ec1b2fdae321/c691a2da8904db0f?hl=en&lr=&ie=UTF-8&oe=UTF-8&rnum=1&prev=/groups%3Fq%3Dguninski%2Bemacs%26hl%3Den%26lr%3D%26ie%3DUTF-8%26oe%3DUTF-8%26selm%3Dmailman.763.1041357806.19936.bug-gnu-emacs%2540gnu.org%26rnum%3D1#c691a2da8904db0f |
CVE-2003-1232
|
MISC:http://groups.google.com/group/linux.debian.bugs.dist/browse_thread/thread/aacd036037217998/8d095f85f3665bff?lnk=raot |
CVE-2012-1176
|
MISC:http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/c3e1ab0034ca4b4c/66aa896c3a78b2f7 |
CVE-2010-0433
|
MISC:http://groups.google.com/group/memcached/browse_thread/thread/ff96a9b88fb5d40e |
CVE-2009-1494
|
MISC:http://groups.google.com/group/php-ids/browse_thread/thread/3ec15f69d6b3dba0 |
CVE-2007-3576 CVE-2007-3580
|
MISC:http://groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301?hl=en |
CVE-2008-7248
|
MISC:http://groups.google.com/group/sqlelixir/browse_thread/thread/efc16227514cffa?pli=1 |
CVE-2012-2146
|
MISC:http://groups.google.com/group/vim_dev/attach/9290f26f9bc11b33/K-arbitrary-command-execution.patch.v3?part=2 |
CVE-2008-4101
|
MISC:http://groups.google.com/group/vim_dev/attach/dd32ad3a84f36bb2/K-arbitrary-command-execution.patch?part=2 |
CVE-2008-4101
|
MISC:http://groups.google.com/group/vim_dev/browse_thread/thread/1434d0812b5c817e/6ad2d5b50a96668e |
CVE-2008-4101
|
MISC:http://groups.google.com/groups?hl=en&lr=&ie=UTF-8&oe=UTF-8&frame=right&th=d429cd2ef1d3a2b7&seekm=ai6c0q%242289%241%40FreeBSD.csie.NCTU.edu.tw#link16 |
CVE-2002-0820
|
MISC:http://grsecurity.net/news.php#digitalfud |
CVE-2007-0253 CVE-2007-0257
|
MISC:http://grsecurity.net/~spender/64bit_dos.c |
CVE-2010-3858 CVE-2010-4243
|
MISC:http://grsecurity.net/~spender/cheddar_bay.tgz |
CVE-2009-1897
|
MISC:http://grsecurity.net/~spender/exploit_demo.c |
CVE-2009-2584
|
MISC:http://grsecurity.net/~spender/sctp.c |
CVE-2013-1828
|
MISC:http://grsecurity.net/~spender/viro.txt |
CVE-2015-2686
|
MISC:http://grsecurity.net/~spender/wireless-infoleak-fix2.patch |
CVE-2010-2955
|
MISC:http://grsecurity.net/~spender/wunderbar_emporium.tgz |
CVE-2009-2692
|
MISC:http://grsecurity.org/test/grsecurity-2.1.14-2.6.32-200912112157.patch |
CVE-2009-4306
|
MISC:http://grutztopia.jingojango.net/2012/10/hph3c-and-huawei-snmp-weak-access-to.html |
CVE-2012-3268
|
MISC:http://gsasec.blogspot.com/2009/05/claroline-v1811-cross-site-scripting.html |
CVE-2009-1907
|
MISC:http://gsasec.blogspot.com/2009/05/dokeos-free-185-multiple.html |
CVE-2009-2007 CVE-2009-2008 CVE-2009-2009
|
MISC:http://gsasec.blogspot.com/2009/05/php-nuke-v80-referer-sql-injection.html |
CVE-2009-1842
|
MISC:http://gsasec.blogspot.com/2009/05/vanilla-v117-cross-site-scripting.html |
CVE-2009-1845
|
MISC:http://gtkatlantic.gradator.net/oldnews.html |
CVE-2015-0841
|
MISC:http://gu1.aeroxteam.fr/2012/01/19/bypass-screensaver-locker-program-xorg-111-and-up/ |
CVE-2012-0064
|
MISC:http://gultsch.de/gajim_roster_push_and_message_interception.html |
CVE-2015-8688
|
MISC:http://gynvael.coldwind.pl/?id=483 |
CVE-2012-4363
|
MISC:http://h.ackack.net/?p=258 |
CVE-2010-1728 CVE-2010-1729 CVE-2010-1730 CVE-2010-1731
|
MISC:http://h07.w.interia.pl/Safari.rar |
CVE-2010-1939
|
MISC:http://h1.ripway.com/lintah/adv/txt/01-iFX-2006-AuraCMS-v1.62-XSS-Bug.txt |
CVE-2006-3558 CVE-2006-3559
|
MISC:http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/JSF-outputText-tag-the-good-the-bad-and-the-ugly/ba-p/6368011#.U8ccVPlXZHU |
CVE-2013-5855
|
MISC:http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Once-Bled-Twice-Shy-OpenSSL-CVE-2014-0195/ba-p/6501048 |
CVE-2014-0195
|
MISC:http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/Pwn2Own-2013/ba-p/5981157 |
CVE-2013-0401 CVE-2013-0402 CVE-2013-0787 CVE-2013-0912 CVE-2013-1488 CVE-2013-1491 CVE-2013-2549 CVE-2013-2550 CVE-2013-2551 CVE-2013-2552 CVE-2013-2553 CVE-2013-2554 CVE-2013-2555 CVE-2013-2556 CVE-2013-2557
|
MISC:http://h30499.www3.hp.com/t5/HP-Security-Research-Blog/ZDI-14-173-CVE-2014-0195-OpenSSL-DTLS-Fragment-Out-of-Bounds/ba-p/6501002 |
CVE-2014-0195
|
MISC:http://h4cky0u.org/viewtopic.php?t=2097 |
CVE-2005-2648
|
MISC:http://h4cky0u.org/viewtopic.php?t=637 |
CVE-2006-0450
|
MISC:http://h4x0resec.blogspot.com/2014/11/wordpress-html5-mp3-player-with.html |
CVE-2014-9177
|
MISC:http://h4x0resec.blogspot.com/2014/11/wordpress-sexy-squeeze-pages-plugin.html |
CVE-2014-9176
|
MISC:http://ha.cker.info/exploitation-of-server-side-template-injection-with-craft-cms-plguin-seomatic/ |
CVE-2018-14716
|
MISC:http://ha.ckers.org/blog/20060621/malformed-ascii-bypasses-filters/ |
CVE-2006-3227
|
MISC:http://ha.ckers.org/blog/20060621/us-ascii-xss-part-2 |
CVE-2006-3227
|
MISC:http://ha.ckers.org/blog/20070309/firefox-header-redirection-javascript-execution/ |
CVE-2009-1312
|
MISC:http://ha.ckers.org/blog/20070511/bluehat-errata/ |
CVE-2009-0357
|
MISC:http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/ |
CVE-2007-3072 CVE-2007-3073 CVE-2007-3074
|
MISC:http://ha.ckers.org/blog/20070516/read-firefox-settings-poc/#comment-35888 |
CVE-2007-3072 CVE-2007-3075
|
MISC:http://ha.ckers.org/blog/20070531/google-desktop-0day/ |
CVE-2007-3150
|
MISC:http://ha.ckers.org/blog/20070606/additional-image-bypass-on-windows/ |
CVE-2007-3163
|
MISC:http://ha.ckers.org/blog/20070608/cross-domain-basic-auth-phishing-tactics/ |
CVE-2007-3164
|
MISC:http://ha.ckers.org/blog/20070702/ie60-protocol-guessing/ |
CVE-2007-3576
|
MISC:http://ha.ckers.org/blog/20070823/xss-and-possible-information-disclosure-in-urchin/ |
CVE-2007-5112 CVE-2007-5113
|
MISC:http://ha.ckers.org/blog/20081007/clickjacking-details/ |
CVE-2008-4503
|
MISC:http://ha.ckers.org/google-desktop-0day/ |
CVE-2007-3150
|
MISC:http://ha.ckers.org/slowloris/ |
CVE-2007-6750 CVE-2009-5110 CVE-2009-5111
|
MISC:http://ha.ckers.org/xss.html#XSS_Non_alpha_non_digit2 |
CVE-2007-0995
|
MISC:http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html |
CVE-2011-2505 CVE-2011-2506 CVE-2011-2507 CVE-2011-2508
|
MISC:http://ha.xxor.se/2011/07/phpmyadmin-3x-pregreplace-rce-poc.html |
CVE-2011-2507
|
MISC:http://haacked.com/archive/2008/11/27/subtext-2.1-security-update.aspx |
CVE-2008-6283
|
MISC:http://habrahabr.ru/company/mailru/blog/274855 |
CVE-2016-1897 CVE-2016-1898
|
MISC:http://habrahabr.ru/post/174423/ |
CVE-2013-1904
|
MISC:http://habrahabr.ru/post/182706/ |
CVE-2013-2866
|
MISC:http://hac425.unaux.com/index.php/archives/53/ |
CVE-2018-14443
|
MISC:http://hac425.unaux.com/index.php/archives/59/ |
CVE-2018-14444
|
MISC:http://hac425.unaux.com/index.php/archives/62/ |
CVE-2018-14445
|
MISC:http://hac425.unaux.com/index.php/archives/63/ |
CVE-2018-14446
|
MISC:http://hac425.unaux.com/index.php/archives/64/ |
CVE-2018-14447
|
MISC:http://hac425.unaux.com/index.php/archives/66/ |
CVE-2018-14448
|
MISC:http://hack.fi/~muzzy/sony-drm/ |
CVE-2005-3650
|
MISC:http://hackademix.net/2007/09/24/googhole-xss-pwning-gmail-picasa-and-almost-200k-customers/ |
CVE-2007-5112
|
MISC:http://hackademix.net/2009/11/21/ies-xss-filter-creates-xss-vulnerabilities/ |
CVE-2009-4074
|
MISC:http://hackathology.blogspot.com/2008/01/pixasa-finesse-71-72-privilege.html |
CVE-2008-1246
|
MISC:http://hackberry.ath.cx/research/1.txt |
CVE-2007-2013
|
MISC:http://hackberry.ath.cx/research/2.txt |
CVE-2007-2015
|
MISC:http://hackberry.ath.cx/research/3.txt |
CVE-2007-2014
|
MISC:http://hacker.feiyulive.com/wordpress/index.php/116/ |
CVE-2018-20528
|
MISC:http://hackerdom.ru/~dimmo/phpexpl.c |
CVE-2003-1307
|
MISC:http://hackerone.com/reports/59661 |
CVE-2015-4721
|
MISC:http://hackerone.com/reports/59664 |
CVE-2015-4724
|
MISC:http://hackers.by.lv/showthread.php?p=408 |
CVE-2005-4645
|
MISC:http://hackers.by.lv/showthread.php?p=416 |
CVE-2005-3574
|
MISC:http://hackerscenter.com/archive/view.asp?id=28145 |
CVE-2008-0134 CVE-2008-0135 CVE-2008-0136 CVE-2008-0208 CVE-2008-0209
|
MISC:http://hackingcomtapioca.blogspot.com.br/2014/10/hacking-trendnet-tew-823dru.html |
CVE-2014-8579
|
MISC:http://hackingspirits.com/vuln-rnd/vuln-rnd.html |
CVE-2006-3014
|
MISC:http://hackingspirits.com/vuln-rnd/w3wp-remote-dos.zip |
CVE-2006-1364
|
MISC:http://hackish.altervista.org/forum/viewtopic.php?t=221 |
CVE-2007-5572
|
MISC:http://hacktheplanet.nu/djihax.pdf |
CVE-2020-29664
|
MISC:http://hacktivity.websecgeeks.com/modx-csrf-and-xss/ |
CVE-2014-8773 CVE-2014-8774 CVE-2014-8775
|
MISC:http://hacktivity.websecgeeks.com/word-press-firewall-plugin-xss/ |
CVE-2014-4664
|
MISC:http://hacktivity.websecgeeks.com/x3-cms-xss-and-csrf/ |
CVE-2014-8771 CVE-2014-8772
|
MISC:http://hakre.wordpress.com/2010/02/16/the-short-memory-of-wordpress-org-security/ |
CVE-2010-0682
|
MISC:http://hal.archives-ouvertes.fr/docs/00/28/14/29/PDF/floating-point-article.pdf |
CVE-2010-4645
|
MISC:http://hamid.ir/security/acidcat.txt |
CVE-2005-4370 CVE-2005-4371
|
MISC:http://hamid.ir/security/bitzipper.txt |
CVE-2006-2520
|
MISC:http://hamid.ir/security/cutenews.txt |
CVE-2006-1339 CVE-2006-1340
|
MISC:http://hamid.ir/security/nexus.txt |
CVE-2006-1081
|
MISC:http://hamid.ir/security/nodez.txt |
CVE-2006-1162 CVE-2006-1163 CVE-2006-1164
|
MISC:http://hamid.ir/security/pluggedoutblog.txt |
CVE-2006-0562 CVE-2006-0563
|
MISC:http://hamid.ir/security/runcms.txt |
CVE-2006-0721
|
MISC:http://hamid.ir/security/studip.txt |
CVE-2006-3361
|
MISC:http://hamid.ir/security/winhki.txt |
CVE-2006-1323
|
MISC:http://handra.rampa.sk/dawb/patch?repoPURL=http%3A%2F%2Fcode.haskell.org%2FXMonadContrib&repoPHash=20130708144813-1499c-0c3e284d3523c0694b9423714081761813bc1e89 |
CVE-2013-1436
|
MISC:http://hat-squad.com/bugreport/mdaemon-raw.txt |
CVE-2003-1200
|
MISC:http://hatriot.github.io/blog/2014/06/29/gitlist-rce/ |
CVE-2013-7392 CVE-2014-4511 CVE-2014-5023
|
MISC:http://hauntit.blogspot.com/2012/03/en-gpeasy-233-html-injection-xss.html |
CVE-2012-6513
|
MISC:http://hauntit.blogspot.com/2012/03/en-quickcartv50-information-disclosure.html |
CVE-2012-6049
|
MISC:http://hauntit.blogspot.com/2012/03/en-quickcmsv40-xss-over-get.html |
CVE-2012-3833
|
MISC:http://hauntit.blogspot.com/2012/03/en-yaqas-cms-alpha1-information.html |
CVE-2012-4257
|
MISC:http://hauntit.blogspot.com/2012/04/en-e107-cms-reflected-xss-in.html |
CVE-2012-3843
|
MISC:http://hauntit.blogspot.com/2012/04/en-efront-3610-cms-information.html |
CVE-2012-6515
|
MISC:http://hauntit.blogspot.com/2012/04/en-jnews-jnewscore751-information.html |
CVE-2012-4256
|
MISC:http://hauntit.blogspot.com/2012/04/en-nbill-lite-joomla-component-html.html |
CVE-2012-6514
|
MISC:http://hauntit.blogspot.com/2012/04/en-vbulletin-4112-cross-site-scripting.html |
CVE-2012-3844
|
MISC:http://hauntit.blogspot.com/2013/04/en-smf-204-full-disclosure.html |
CVE-2013-7466 CVE-2013-7467
|
MISC:http://hauntit.blogspot.com/2014/02/en-xss-in-orangehrm.html |
CVE-2014-100021
|
MISC:http://hauntit.blogspot.de/2013/01/en-mantis-bug-tracker-1212-persistent.html |
CVE-2013-0197
|
MISC:http://haxx.ml/post/140552592371/remote-code-execution-in-apache-jetspeed-230-and |
CVE-2016-0709 CVE-2016-0710 CVE-2016-2171
|
MISC:http://haxx.ml/post/141655340521/all-your-meetings-are-belong-to-us-remote-code |
CVE-2016-0783 CVE-2016-0784
|
MISC:http://hayageek.github.io/jQuery-Upload-File/4.0.11/jquery.uploadfile.min.js |
CVE-2021-37504
|
MISC:http://hayageek.github.io/jQuery-Upload-File/4.0.11/uploadfile.css |
CVE-2021-37504
|
MISC:http://haygeek.com |
CVE-2021-37504
|
MISC:http://hboeck.de/archives/578-How-long-does-it-take-to-fix-a-crash-bug.html |
CVE-2007-6715
|
MISC:http://heartbeat.skype.com/2007/08/what_happened_on_august_16.html |
CVE-2007-4429
|
MISC:http://heartbeat.skype.com/2007/08/where_we_are_at_1100_gmt.html |
CVE-2007-4429
|
MISC:http://heartbleed.com/ |
CVE-2014-0160
|
MISC:http://height8.com |
CVE-2021-3380
|
MISC:http://heimdal.com |
CVE-2022-24618
|
MISC:http://heise.de/newsticker/meldung/Datenschutzpanne-in-Mac-OS-X-Yosemite-2514198.html |
CVE-2014-8839
|
MISC:http://helith.net/txt/siemens_gigaset_se461_wimax_router_remote_dos.txt |
CVE-2009-1152
|
MISC:http://hellknights.void.ru/shados/snmp_sploit.c |
CVE-2008-0680
|
MISC:http://help.hancom.com/update_en_multilang/details/HOfficeNEO_update.htm |
CVE-2019-16337 CVE-2019-16338
|
MISC:http://help.kaseya.com/WebHelp/EN/RN/index.asp#VSAReleaseNotes.htm |
CVE-2019-15506
|
MISC:http://help.neobizbox.com/ |
CVE-2020-7850
|
MISC:http://help.pronestor.com/download/PronestorBooking/ReleaseNotes/ReleaseNotes.htm |
CVE-2019-17390
|
MISC:http://hexo.imagemlt.xyz/post/seacms-backend-getshell/index.html |
CVE-2018-14421
|
MISC:http://hextechsecurity.com/?p=123 |
CVE-2015-3459
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/diff/0a5b75e019b6/coders/rle.c |
CVE-2017-9098
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/file/233618f8fe82/ChangeLog |
CVE-2018-18544
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/135bdcb88b8d |
CVE-2017-16669
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/1b47e0078e05 |
CVE-2017-13134
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/1b9e64a8901e |
CVE-2017-16669
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/2a21cda3145b |
CVE-2017-16669
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/2b7c826d36af |
CVE-2017-16669
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/358608a46f0a |
CVE-2017-14649
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/3bbf7a13643d |
CVE-2017-14042
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/3dc7b4e3779d |
CVE-2017-16669
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/493da54370aa |
CVE-2017-14165
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/75245a215fff |
CVE-2017-16669
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/95d00d55e978 |
CVE-2017-12937
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/98721124e51f |
CVE-2017-14103
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/be898b7c97bd |
CVE-2017-12936
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/cd699a44f188 |
CVE-2017-12935
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/d0a76868ca37 |
CVE-2017-11403
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/e8086faa52d0 |
CVE-2017-16669
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/f423ba88ca4e |
CVE-2017-11722
|
MISC:http://hg.code.sf.net/p/graphicsmagick/code/rev/fcd3ed3394f6 |
CVE-2017-16669
|
MISC:http://hg.code.sf.net/p/rcdcap/code/rev/0af05606c55b#l2.10 |
CVE-2021-37222
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/11ad3aeb8ab1 |
CVE-2019-7397
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/15d1b5fd003b |
CVE-2018-20184
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/28f8bacd4bbf |
CVE-2019-19953
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/40fc71472b98 |
CVE-2019-11007
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/44ab7f6c20b4 |
CVE-2019-19950
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/52a91ddb1aa6 |
CVE-2018-5685
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/5402c5cbd8bd |
CVE-2019-11473 CVE-2019-11474
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/57ac0ae85e2a |
CVE-2019-11506
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/648e2b406589 |
CVE-2018-20189
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/648e3977a293 |
CVE-2018-20185
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/7cff2b1792de |
CVE-2019-11009
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/85f5bdcd246a |
CVE-2019-11505
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/86a9295e7c83 |
CVE-2019-11007
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/944dcbc457f8 |
CVE-2019-11473 CVE-2019-11474
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/a348d9661019 |
CVE-2019-11010
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/b6fb77d7d54d |
CVE-2019-11005
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/bc99af93614d |
CVE-2019-19951
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/d823d23a474b |
CVE-2019-11008
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick/rev/f7610c1281c1 |
CVE-2019-11006
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset;node=7292230dd185 |
CVE-2017-16352
|
MISC:http://hg.graphicsmagick.org/hg/GraphicsMagick?cmd=changeset;node=e4e1c2a581d8 |
CVE-2017-16353
|
MISC:http://hg.libsdl.org/SDL_image/ |
CVE-2019-19721
|
MISC:http://hg.nginx.org/unit/file/tip/CHANGES |
CVE-2019-7401
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/corba/rev/161ec4dd450d |
CVE-2013-2446
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/hotspot/rev/663b5c744e82 |
CVE-2013-2421
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/hotspot/rev/c954aab38a7f |
CVE-2013-2431
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/hotspot/rev/ed3ac73a70ab |
CVE-2013-2445
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jaxws/rev/e07c518282ba |
CVE-2013-2415
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/09c14ca57ff0 |
CVE-2013-2444
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/0e80792291c0 |
CVE-2013-2407
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/1111f9acb96b |
CVE-2013-1500
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/141facdacbf0 |
CVE-2013-2456
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/20f287fec09f |
CVE-2013-2436
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/259d4998ce2f |
CVE-2013-2473
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/25ebac17c3cb |
CVE-2013-2452
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/285765be3123 |
CVE-2013-2450
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2899c3dbf5e8 |
CVE-2013-2422
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/2a9c79db0040 |
CVE-2013-2465
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/31c782610044 |
CVE-2013-0401
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/3927a18bbcbf |
CVE-2013-2412
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/3cd4bec64e31 |
CVE-2013-2472
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/4c3d38927a26 |
CVE-2013-2471
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/5d5ca338574f |
CVE-2013-2455
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/64055b403176 |
CVE-2013-2469
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/6784c9903db7 |
CVE-2013-1569 CVE-2013-2383 CVE-2013-2384
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/76eb3fb80740 |
CVE-2013-1557
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/7ca8a40795d8 |
CVE-2013-2417
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/89d9ec9e80c1 |
CVE-2013-2470
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/8dd8266a2f4b |
CVE-2013-2451
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/90c9f1577a0b |
CVE-2013-2429
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/91ce9432f88d |
CVE-2013-2448
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/98ad2f1e25d1 |
CVE-2013-2426
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/9efb5fb77027 |
CVE-2013-2458
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/a19614a3dabb |
CVE-2013-1488
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/abe9ea5a50d2 |
CVE-2013-2461
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/b1a2b9ac9714 |
CVE-2013-2449
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/b453d9be6b3f |
CVE-2013-2423
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/b79d56eee18e |
CVE-2013-2463
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/c14aa930b032 |
CVE-2013-2453
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/c82ed89b21bc |
CVE-2013-2407
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/c98afec1bf86 |
CVE-2013-2459
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/cc656d61e713 |
CVE-2013-2447
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/cf93d3828aa8 |
CVE-2013-2420
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/d868fe7c7618 |
CVE-2013-2430
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/da1867780fc9 |
CVE-2013-2424
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/ec931d812faa |
CVE-2013-2454
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/jdk/rev/ffef9e05564e |
CVE-2013-2457
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u-dev/langtools/rev/17ee569d0c01 |
CVE-2013-1571
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u/corba/rev/0a879f00b698 |
CVE-2014-0428
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u/corba/rev/b1548473f261 |
CVE-2013-5884
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u/hotspot/rev/0344da726f70 |
CVE-2013-2443
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u/hotspot/rev/839100e42498 |
CVE-2013-5893
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u/jaxp/rev/42be8e6266ab |
CVE-2014-0376
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u/jaxp/rev/783ceae9b736 |
CVE-2014-0376
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/160cde99bb1a |
CVE-2013-2460
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/496c51673dec |
CVE-2014-0373
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/9d29c19f1de1 |
CVE-2013-5907
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/abe1cb2d27cb |
CVE-2014-0416
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/e6160aedadd5 |
CVE-2014-0368
|
MISC:http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/f6dce3552285 |
CVE-2013-2443
|
MISC:http://hg.pidgin.im/pidgin/main/rev/4c897372b5a4 |
CVE-2013-6489
|
MISC:http://hg.tryton.org/2.4/trytond/rev/279f0031b461 |
CVE-2012-2238
|
MISC:http://hi.baidu.com/azy0922/blog/item/f950cbc2890729130ef47783.html |
CVE-2009-2653
|
MISC:http://hi.baidu.com/fs_fx/blog/item/f8de1d18ba8c9b76dbb4bd56.html |
CVE-2010-1282
|
MISC:http://hi.baidu.com/fs_fx/blog/item/fa74a61705b5e24621a4e951.html |
CVE-2010-0129
|
MISC:http://hi.baidu.com/hirfire/blog/item/c3c0f6dda3ca47d18d10291a.html |
CVE-2009-1737
|
MISC:http://hi.baidu.com/muma_reader/blog/item/46bd0d7a04eb75e92f73b36e.html |
CVE-2008-4664
|
MISC:http://hi.baidu.com/wi4r/blog/item/8b1c06fb2e3de8819f514671.html |
CVE-2009-1800
|
MISC:http://hi.baidu.com/yuange1975/item/b2cc7141c22108e91e19bc2e |
CVE-2011-5279
|
MISC:http://hidden-one.co.in/2020/06/17/cve-2020-13887-kordil-edms-through-2-2-60rc3-allows-remote-command-execution/ |
CVE-2020-13887
|
MISC:http://hidden-one.co.in/2020/06/17/cve-2020-13888-kordil-edms-through-2-2-60rc3-allows-stored-xss/ |
CVE-2020-13888
|
MISC:http://hidden-one.co.in/2020/07/07/cve-2020-1020-stored-xss-on-elementor-wordpress-plugin/ |
CVE-2020-15020
|
MISC:http://hidden-one.co.in/2021/04/09/cve-2020-23761-stored-xss-vulnerability-in-subrion-cms-version/ |
CVE-2020-23761
|
MISC:http://hidden-one.co.in/2021/04/09/cve-2020-23762-stored-xss-vulnerability-in-the-larsens-calender-plugin-version/ |
CVE-2020-23762
|
MISC:http://hidden-one.co.in/2021/04/09/cve-2020-23763-sql-injection-leading-to-authentication-bypass-in-online-book-store-1-0/ |
CVE-2020-23763
|
MISC:http://hiltont.blogspot.com/2007/08/sony-rootkit-version-2.html |
CVE-2007-4785
|
MISC:http://hispahack.ccc.de/mi020.html |
CVE-2000-1228 CVE-2000-1229 CVE-2000-1230 CVE-2000-1231 CVE-2000-1232 CVE-2000-1233 CVE-2000-1234
|
MISC:http://hjafari.blogspot.com/2009/09/invisible-browsing-5052-ibkey-local.html |
CVE-2009-4107
|
MISC:http://hkpco.kr/advisory/CVE-2013-1059.txt |
CVE-2013-1059
|
MISC:http://hmarco.org/bugs/CVE-2013-4788.html |
CVE-2013-4788
|
MISC:http://hmarco.org/bugs/CVE-2014-1226-s3dvt_0.2.2-root-shell.html |
CVE-2014-1226
|
MISC:http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html |
CVE-2015-8370
|
MISC:http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-dis |
CVE-2016-3672
|
MISC:http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html |
CVE-2016-3672
|
MISC:http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.html |
CVE-2016-4484
|
MISC:http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html |
CVE-2015-8777
|
MISC:http://hmarco.org/bugs/google_email_app_4.2.2_denial_of_service.html |
CVE-2015-1574
|
MISC:http://hmarco.org/bugs/linux-ASLR-integer-overflow.html |
CVE-2015-1593
|
MISC:http://hmarco.org/bugs/s3dvt_0.2.2-root-shell.html |
CVE-2013-6876
|
MISC:http://hoito.org/en/products/ |
CVE-2006-1930
|
MISC:http://holisticinfosec.blogspot.com/2008/02/fastest-fix-in-west-vendors-excellent.html |
CVE-2008-0793
|
MISC:http://holisticinfosec.org/content/view/102/45/ |
CVE-2009-1320
|
MISC:http://holisticinfosec.org/content/view/108/45/ |
CVE-2009-1454 CVE-2009-1455
|
MISC:http://holisticinfosec.org/content/view/109/45/ |
CVE-2009-2073
|
MISC:http://holisticinfosec.org/content/view/111/45/ |
CVE-2009-1797 CVE-2009-1798
|
MISC:http://holisticinfosec.org/content/view/112/45/ |
CVE-2009-2004 CVE-2009-2005 CVE-2009-2006
|
MISC:http://holisticinfosec.org/content/view/113/45/ |
CVE-2009-1732 CVE-2009-1733
|
MISC:http://holisticinfosec.org/content/view/115/45/ |
CVE-2009-4941 CVE-2009-4942
|
MISC:http://holisticinfosec.org/content/view/120/45/ |
CVE-2009-4979 CVE-2009-4980 CVE-2009-4981
|
MISC:http://holisticinfosec.org/content/view/123/45/ |
CVE-2009-4994
|
MISC:http://holisticinfosec.org/content/view/129/45/ |
CVE-2009-4555
|
MISC:http://holisticinfosec.org/content/view/130/45/ |
CVE-2009-4786 CVE-2009-4787 CVE-2009-4788
|
MISC:http://holisticinfosec.org/content/view/133/45/ |
CVE-2010-0636 CVE-2010-0637
|
MISC:http://holisticinfosec.org/content/view/135/45/ |
CVE-2010-1541 CVE-2010-1542
|
MISC:http://holisticinfosec.org/content/view/141/45/ |
CVE-2010-1994 CVE-2010-1995 CVE-2010-1996
|
MISC:http://holisticinfosec.org/content/view/144/45/ |
CVE-2010-2594
|
MISC:http://holisticinfosec.org/content/view/146/45/ |
CVE-2010-2344 CVE-2010-2345
|
MISC:http://holisticinfosec.org/content/view/148/45/ |
CVE-2010-1514 CVE-2010-1515 CVE-2010-2281 CVE-2010-2282
|
MISC:http://holisticinfosec.org/content/view/157/45/ |
CVE-2010-5088
|
MISC:http://holisticinfosec.org/content/view/159/45/ |
CVE-2010-4147
|
MISC:http://holisticinfosec.org/content/view/168/45/ |
CVE-2010-4751 CVE-2010-4753
|
MISC:http://holisticinfosec.org/content/view/184/45/ |
CVE-2011-3392
|
MISC:http://holisticinfosec.org/content/view/188/45/ |
CVE-2012-0790
|
MISC:http://holisticinfosec.org/content/view/51/45/ |
CVE-2008-1550
|
MISC:http://holisticinfosec.org/content/view/62/45/ |
CVE-2008-2052
|
MISC:http://holisticinfosec.org/content/view/63/45/ |
CVE-2008-6654
|
MISC:http://holisticinfosec.org/content/view/64/45/ |
CVE-2008-2531
|
MISC:http://holisticinfosec.org/content/view/65/45/ |
CVE-2008-2335
|
MISC:http://holisticinfosec.org/content/view/67/45/ |
CVE-2008-6433 CVE-2008-6434
|
MISC:http://holisticinfosec.org/content/view/71/45/ |
CVE-2008-2923
|
MISC:http://holisticinfosec.org/content/view/72/45/ |
CVE-2008-2951
|
MISC:http://holisticinfosec.org/content/view/78/45/ |
CVE-2008-3339 CVE-2008-3340 CVE-2008-3341
|
MISC:http://holisticinfosec.org/content/view/79/45/ |
CVE-2008-3393 CVE-2008-3394
|
MISC:http://holisticinfosec.org/content/view/80/45/ |
CVE-2008-3724
|
MISC:http://holisticinfosec.org/content/view/81/45/ |
CVE-2008-6969
|
MISC:http://holisticinfosec.org/content/view/85/45/ |
CVE-2008-4898 CVE-2008-4899
|
MISC:http://holisticinfosec.org/content/view/86/45/ |
CVE-2008-4892
|
MISC:http://holisticinfosec.org/content/view/88/45/ |
CVE-2008-4891
|
MISC:http://holisticinfosec.org/content/view/90/45/ |
CVE-2008-4909
|
MISC:http://holisticinfosec.org/content/view/91/45/ |
CVE-2008-5786
|
MISC:http://holisticinfosec.org/content/view/93/45/ |
CVE-2008-5055 CVE-2008-5056
|
MISC:http://holisticinfosec.org/content/view/95/45/ |
CVE-2008-6240
|
MISC:http://holisticinfosec.org/content/view/96/45/ |
CVE-2008-6238 CVE-2008-6239
|
MISC:http://holisticinfosec.org/content/view/97/45/ |
CVE-2009-0408
|
MISC:http://homakov.blogspot.com/2012/03/how-to.html |
CVE-2012-2055
|
MISC:http://homakov.blogspot.com/2014/01/using-content-security-policy-for-evil.html |
CVE-2016-2845
|
MISC:http://home.com |
CVE-2022-28077 CVE-2022-28078
|
MISC:http://home.gdal.org/private/zdi-can-1221/zdi-can-1221.txt |
CVE-2012-1173
|
MISC:http://home.kabelfoon.nl/~jaabogae/han/m_401b.html |
CVE-2004-2513
|
MISC:http://home.netscape.com/security/notes/jscachebrowsing.html |
CVE-1999-0790
|
MISC:http://homepage.mac.com/adonismac/Advisory/bypass_mcafee_entreprise_password.html |
CVE-2007-1538
|
MISC:http://homepage.mac.com/adonismac/Advisory/crack_mcafee_password_protection.html |
CVE-2007-1538
|
MISC:http://homepage.mac.com/adonismac/Advisory/steg/camouflage.html |
CVE-2007-0164
|
MISC:http://homepage.mac.com/adonismac/Advisory/steg/steganography.html |
CVE-2007-0163
|
MISC:http://hospital.com |
CVE-2022-26244
|
MISC:http://hosting-4-creloaded.com/node/116 |
CVE-2009-5076 CVE-2009-5077
|
MISC:http://hostingcontroller.com/English/patches/ForAll/index.html |
CVE-2002-0212
|
MISC:http://hp.cso.uiuc.edu/ftp/pub/hp/patches/11.20/PHSS_25454 |
CVE-2001-1509
|
MISC:http://hpdoger.me/2018/08/18/%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E5%A4%8D%E7%8E%B0%EF%BC%9ABluecms%201.6/ |
CVE-2018-16432
|
MISC:http://hpdoger.me/2018/08/23/Csrf%20in%20YFCMF%203.0/ |
CVE-2018-16431
|
MISC:http://hplipopensource.com/hplip-web/release_notes.html |
CVE-2013-0200
|
MISC:http://hptcybersec.com/ssrf_PoC.jpg |
CVE-2021-39497
|
MISC:http://hsj.shadowpenguin.org/misc/apcupsd_exp.txt |
CVE-2003-0098
|
MISC:http://htmly.com |
CVE-2022-25022
|
MISC:http://httpd.apache.org/security/vulnerabilities_24.html |
CVE-2019-17567 CVE-2020-13938 CVE-2020-13950 CVE-2020-35452 CVE-2021-26690 CVE-2021-26691 CVE-2021-30641 CVE-2021-31618 CVE-2021-34798 CVE-2021-36160 CVE-2021-44224 CVE-2021-44790
|
MISC:http://huge-it.com/joomla-catalog/ |
CVE-2016-1000125
|
MISC:http://huge-it.com/joomla-portfolio-gallery/ |
CVE-2016-1000115 CVE-2016-1000116 CVE-2016-1000124
|
MISC:http://huge-it.com/joomla-video-gallery/ |
CVE-2016-1000123
|
MISC:http://hunesion.com |
CVE-2017-16900
|
MISC:http://hustlelabs.com/advisories/04072006_rarlabs.pdf |
CVE-2006-3845
|
MISC:http://hydra.hellug.gr |
CVE-2019-17502
|
MISC:http://hyp3rlinx.altervista.org |
CVE-2019-12323 CVE-2019-13577 CVE-2019-18895 CVE-2019-19245 CVE-2019-19382 CVE-2020-6857
|
MISC:http://hyp3rlinx.altervista.org/advisories/ADMINER-UNAUTHENTICATED-SERVER-SIDE-REQUEST-FORGERY.txt |
CVE-2018-7667
|
MISC:http://hyp3rlinx.altervista.org/advisories/ADOBE-ANIMATE-MEMORY-CORRUPTION-VULNERABILITY.txt |
CVE-2016-7866
|
MISC:http://hyp3rlinx.altervista.org/advisories/ADOBE-CREATIVE-CLOUD-PRIVILEGE-ESCALATION.txt |
CVE-2017-3006
|
MISC:http://hyp3rlinx.altervista.org/advisories/APACHE2TRIAD-SERVER-STACK-v1.5.4-MULTIPLE-CVE.txt |
CVE-2017-12965 CVE-2017-12970 CVE-2017-12971
|
MISC:http://hyp3rlinx.altervista.org/advisories/ARGUS-SURVEILLANCE-DVR-v4-UNAUTHENTICATED-PATH-TRAVERSAL-FILE-DISCLOSURE.txt |
CVE-2018-15745
|
MISC:http://hyp3rlinx.altervista.org/advisories/ARTICA-WEB-PROXY-v3.06-REMOTE-CODE-EXECUTION-CVE-2017-17055.txt |
CVE-2017-17055
|
MISC:http://hyp3rlinx.altervista.org/advisories/AS-ENHSQLPORTAL0602.txt |
CVE-2015-4660
|
MISC:http://hyp3rlinx.altervista.org/advisories/AS-FORTISANDBOX-0801.txt |
CVE-2015-7360
|
MISC:http://hyp3rlinx.altervista.org/advisories/AS-GENIXCMS0621.txt |
CVE-2015-5066
|
MISC:http://hyp3rlinx.altervista.org/advisories/AS-JSPMYSQLADMINISTRADOR-0904.txt |
CVE-2015-6944 CVE-2015-6945
|
MISC:http://hyp3rlinx.altervista.org/advisories/AS-MYSQLLITEADMINISTRATOR0621.txt |
CVE-2015-5064
|
MISC:http://hyp3rlinx.altervista.org/advisories/AS-NOVIUSOS0629.txt |
CVE-2015-5353 CVE-2015-5354
|
MISC:http://hyp3rlinx.altervista.org/advisories/AS-OPENFIRE-CSRF.txt |
CVE-2015-6973
|
MISC:http://hyp3rlinx.altervista.org/advisories/AS-OPENFIRE-PRIV-ESCALATION.txt |
CVE-2015-7707
|
MISC:http://hyp3rlinx.altervista.org/advisories/AS-OPENFIRE-XSS.txt |
CVE-2015-6972
|
MISC:http://hyp3rlinx.altervista.org/advisories/AS-PHPIPAM0812.txt |
CVE-2015-6529
|
MISC:http://hyp3rlinx.altervista.org/advisories/AS-SILVERSTRIPE0607.txt |
CVE-2015-5062 CVE-2015-5063
|
MISC:http://hyp3rlinx.altervista.org/advisories/AS-SYMPHONY0606.txt |
CVE-2015-4661
|
MISC:http://hyp3rlinx.altervista.org/advisories/AS-ZCMS0612.txt |
CVE-2015-7346
|
MISC:http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-(IPO)-v9.1.0-10.1-SOFT-CONSOLE-REMOTE-BUFFER-OVERFLOW-0DAY.txt |
CVE-2017-11309
|
MISC:http://hyp3rlinx.altervista.org/advisories/AVAYA-OFFICE-IP-(IPO)-v9.1.0-10.1-VIEWERCTRL-ACTIVE-X-BUFFER-OVERFLOW-0DAY.txt |
CVE-2017-12969
|
MISC:http://hyp3rlinx.altervista.org/advisories/BARCODEWIZ-v6.7-ACTIVEX-COMPONENT-BUFFER-OVERFLOW.txt |
CVE-2018-5221
|
MISC:http://hyp3rlinx.altervista.org/advisories/CLOUDME-SYNC-UNAUTHENTICATED-REMOTE-BUFFER-OVERFLOW.txt |
CVE-2018-6892
|
MISC:http://hyp3rlinx.altervista.org/advisories/CONCRETE5-v8.1.0-HOST-HEADER-INJECTION.txt |
CVE-2017-7725
|
MISC:http://hyp3rlinx.altervista.org/advisories/CVE-2017-14083-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-REMOTE-ENCRYPTION-KEY-DISCLOSURE.txt |
CVE-2017-14083
|
MISC:http://hyp3rlinx.altervista.org/advisories/CVE-2017-14084-TRENDMICRO-OFFICESCAN-XG-CURL-MITM-REMOTE-CODE-EXECUTION.txt |
CVE-2017-14084
|
MISC:http://hyp3rlinx.altervista.org/advisories/CVE-2017-14085-TRENDMICRO-OFFICESCAN-XG-REMOTE-NT-DOMAIN-PHP-INFO-DISCLOSURE.txt |
CVE-2017-14085
|
MISC:http://hyp3rlinx.altervista.org/advisories/CVE-2017-14086-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-START-REMOTE-PROCESS-CODE-EXECUTION-MEM-CORRUPT.txt |
CVE-2017-14086
|
MISC:http://hyp3rlinx.altervista.org/advisories/CVE-2017-14087-TRENDMICRO-OFFICESCAN-XG-HOST-HEADER-INJECTION.txt |
CVE-2017-14087
|
MISC:http://hyp3rlinx.altervista.org/advisories/CVE-2017-14089-TRENDMICRO-OFFICESCAN-XG-PRE-AUTH-REMOTE-MEMORY-CORRUPTION.txt |
CVE-2017-14089
|
MISC:http://hyp3rlinx.altervista.org/advisories/CVE-2018-18551-SERVERSCHECK-MONITORING-SOFTWARE-CROSS-SITE-SCRIPTING.txt |
CVE-2018-18551
|
MISC:http://hyp3rlinx.altervista.org/advisories/CVE-2018-18552-SERVERSCHECK-MONITORING-SOFTWARE-ARBITRARY-FILE-WRITE-DOS.txt |
CVE-2018-18552
|
MISC:http://hyp3rlinx.altervista.org/advisories/CVS-SUITE-2009R2-INSECURE-LIBRARY-LOADING-CVE-2018-6461.txt |
CVE-2018-6461
|
MISC:http://hyp3rlinx.altervista.org/advisories/DEVICELOCK-PLUG-PLAY-AUDITOR-v5.72-UNICODE-BUFFER-OVERFLOW.txt |
CVE-2018-10655
|
MISC:http://hyp3rlinx.altervista.org/advisories/DEWESOFT-X3-REMOTE-INTERNAL-COMMAND-ACCESS.txt |
CVE-2018-7756
|
MISC:http://hyp3rlinx.altervista.org/advisories/EASYCOM-PHP-API-BUFFER-OVERFLOW.txt |
CVE-2017-5358
|
MISC:http://hyp3rlinx.altervista.org/advisories/EASYCOM-SQL-IPLUG-DENIAL-OF-SERVICE.txt |
CVE-2017-5359
|
MISC:http://hyp3rlinx.altervista.org/advisories/EHCP-v0.37.12.b-CLEARTEXT-PASSWORD-STORAGE.txt |
CVE-2018-6618
|
MISC:http://hyp3rlinx.altervista.org/advisories/EHCP-v0.37.12.b-INSECURE-CRYPTO.txt |
CVE-2018-6619
|
MISC:http://hyp3rlinx.altervista.org/advisories/EHCP-v0.37.12.b-MULTIPLE-CSRF.txt |
CVE-2018-6458
|
MISC:http://hyp3rlinx.altervista.org/advisories/EHCP-v0.37.12.b-UNVERIFIED-PASSWORD-CHANGE.txt |
CVE-2018-6617
|
MISC:http://hyp3rlinx.altervista.org/advisories/EHCP-v0.37.12.b-XSS-COOKIE-THEFT.txt |
CVE-2018-6362
|
MISC:http://hyp3rlinx.altervista.org/advisories/EHCP-v0.37.12.b-XSS-FTP-BACKDOOR-ACCOUNT.txt |
CVE-2018-6361
|
MISC:http://hyp3rlinx.altervista.org/advisories/EXTPLORER-ARCHIVE-PATH-TRAVERSAL.txt |
CVE-2016-4313
|
MISC:http://hyp3rlinx.altervista.org/advisories/FSPRO-LABS-EVENT-LOG-EXPLORER-XML-INJECTION-INFO-DISCLOSURE.txt |
CVE-2018-16252
|
MISC:http://hyp3rlinx.altervista.org/advisories/FTP-VOYAGER-SCHEDULER-CSRF-REMOTE-CMD-EXECUTION.txt |
CVE-2017-6803
|
MISC:http://hyp3rlinx.altervista.org/advisories/HFS-HTTP-FILE-SERVER-v2.3-REMOTE-BUFFER-OVERFLOW-DoS.txt |
CVE-2020-13432
|
MISC:http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-CSRF-PERMALINK-INJECTION.txt |
CVE-2017-7620
|
MISC:http://hyp3rlinx.altervista.org/advisories/MANTIS-BUG-TRACKER-PRE-AUTH-REMOTE-PASSWORD-RESET.txt |
CVE-2017-7615
|
MISC:http://hyp3rlinx.altervista.org/advisories/MICROSOFT-DVD-MAKER-XML-EXTERNAL-ENTITY-FILE-DISCLOSURE.txt |
CVE-2017-0045
|
MISC:http://hyp3rlinx.altervista.org/advisories/MIST-SERVER-v2.12-UNAUTHENTICATED-PERSISTENT-XSS-CVE-2017-16884.txt |
CVE-2017-16884
|
MISC:http://hyp3rlinx.altervista.org/advisories/MOBAXTERM-TFTP-PATH-TRAVERSAL-REMOTE-FILE-ACCESS.txt |
CVE-2017-6805
|
MISC:http://hyp3rlinx.altervista.org/advisories/MONGOOSE-WEB-SERVER-v6.5-CSRF-COMMAND-EXECUTION.txt |
CVE-2017-11567
|
MISC:http://hyp3rlinx.altervista.org/advisories/MOXA-MX-AOPC-SERVER-v1.5-XML-EXTERNAL-ENTITY.txt |
CVE-2017-7457
|
MISC:http://hyp3rlinx.altervista.org/advisories/MOXA-MXVIEW-v2.8-DENIAL-OF-SERVICE.txt |
|